text
stringlengths 16k
189k
| timestamp
stringlengths 20
20
| url
stringlengths 15
841
|
---|---|---|
The icon of Our Lady of Częstochowa has been intimately associated with the history and culture of Poland. Its history prior to its arrival in Poland is shrouded in numerous legends which trace the icon's origin to St Luke who painted it on a cedar table top from the house of the Holy Family.
In 1430 the Pauline monastery was stormed by Hussites, who plundered the sanctuary. After putting the icon in their wagon, they tried to get away but their horses refused to move. They threw the portrait down to the ground and one of the plunderers drew his sword upon the image and inflicted two deep strikes. When the robber tried to inflict a third strike, he fell to the ground and squirmed in agony until his death. Despite past attempts to repair these scars, they had difficulty in covering up those slashes. Another take on the story is that, as the robber struck the painting twice, the face of the Virgin Mary started to bleed; in a panic, the scared Hussites retreated and left the painting.
The Black Madonna is credited with miraculously saving the monastery of Jasna Góra from a 17th-century Swedish invasion, The Deluge. The Siege of Jasna Góra took place in the winter of 1655 during the Second Northern War / The Deluge. Their month-long siege however was ineffective as a small force consisting of monks from the Jasna Gora monastery led by their Prior and supported by local volunteers, mostly from the szlachta (Polish nobility), fought off the numerically superior invaders, saved their sacred icon and, according to some accounts, turned the course of the war. This event led King John II Casimir Vasa to "crown" Our Lady of Częstochowa ("the Black Madonna") as Queen and Protector of Poland in the cathedral of Lwów on April 1, 1656.
Pope Saint John Paul II was a pilgrim to the Marian shrine of Jasna Góra in 1979, 1983, 1987, 1991 (for World Youth Day Częstochowa), 1997 & 1999. Papa Benedict XVI also visited the Black Madonna during his pilgrimage to Poland in 2006.
"The Virgin Mary is my mum, basically. I converted some time ago and I was always close to that town in Poland which is called Czestochowa, where many miracles have happened through the Virgin Mary and that place has a beautiful church which is known around the world. I went there one day, I just prayed, like I didn't really pray, I didn't really believe, I just asked "God, if you exist, Virgin Mary, if you exist, show me the truth." And there were 3 of us, not one of us believed at that time and in that year all 3 people converted through Mary and her blessed heart. And now every day I am just finding her power, her faith, and her humble and quiet heart, and how much she shows me the way to Christ and how wonderful she is to me. And it is very interesting because I just find out the way to pray through the rosary, which I was like so stubborn not to do for more than a year and a half.."
""Great Mother of God made man, Most Holy Virgin, Our Lady of Jasna Gora..."
May I be permitted today to begin with the same words the new act of consecration to Our Lady of Jasna Gora. This new act springs from that same faith, hope and charity, and from the tradition of our people shared by me for so many years. It springs at the same time from the new duties that, thanks to you Mary, have been entrusted to me, an unworthy man and also your adoptive son.
How meaningful for me always have been the words that your Son, born from you, Jesus Christ, the Redeemer of man, spoken from the height of the Cross, pointing out John, apostle and evangelist: "Woman, behold, your son!" (Jn 19, 26). In these words I always found the place for every human being and the place for myself.
By the inscrutable designs of Divine Providence I am today present here at Jasna Gora, in my earthly homeland, Poland, and I wish first of all to confirm the acts of consecration and of trust that at various times — "in many and various ways" - were pronounced by the Cardinal Primate and the Polish Episcopate. In a very special way I wish to confirm and renew the act of consecration pronounced at Jasna Gora on 3 May 1966, on the occasion of the Millennium of Poland. With this act the Polish Bishops wished, by giving themselves to you, Mother of God, "in your maternal slavery of love", to serve the great cause of the freedom of the Church not only in their own homeland but in the whole world. Some years later, on 7 June 1976, they consecrated to you all of humanity, all the nations and peoples of the modern world, and their brothers and sisters who are close to them by faith, by language and by the destinies they share in history, extending this consecration to the furthest limits of love as is demanded by your heart, the heart of a Mother who embraces each and every person, always and everywhere.
I desire today, coming to Jasna Gora as the first pilgrim Pope, to renew this heritage of trust, of consecration and of hope, that has been accumulated here with such magnanimity by my Brothers in the Episcopate and my fellow-countrymen.
Spouse of the Holy Spirit and Seat of Wisdom, it is to your intercession that we owe the magnificent vision and the programme of renewal of the Church in our age that found expression in the teaching of the Second Vatican Council. Grant that we may make this vision and programme the object of our activity, our service, our teaching, our pastoral care, our apostolate — in the same truth, simplicity and fortitude with which the Holy Spirit has made them known through our humble service. Grant that the whole Church may be reborn by drawing from this new fount of the knowledge of her nature and mission, and not from other foreign or poisoned "cisterns" (cf Jer 8, 14).
Help us in the great endeavour that we are carrying out to meet in an always more mature way our brothers in faith, with whom so many things unite us, although there is still something dividing us. Through all the means of knowledge, of mutual respect, of love, of shared collaboration in various fields, may we be able to rediscover gradually the divine plan for the unity into which we must ourselves enter and introduce to everyone, in order that the one fold of Christ may recognize and live its unity on earth. Mother of unity, teach us constantly the ways that lead to unity.
Allow us in the future to go out to meet all men and all peoples that are seeking God and wishing to serve him on the way of different religions. Help us all to proclaim Christ and reveal "the power of God and the Wisdom of God" (1 Cor 1, 24) hidden in his Cross. You were the first to reveal him at Bethlehem, not only to the simple faithful shepherds but also to the wise men from distant lands. Mother of Good Counsel, show us always how we must serve man, humanity in every nation, how we are to lead them along the ways of salvation. How we are to protect justice and peace in a world continually threatened on various sides. How greatly I desire on the occasion of our meeting today to entrust to you all the difficult problems of the societies, systems and states — problems that cannot be solved with hatred, war and self-destruction but only by peace, justice and respect for the rights of people and of nations.
Mother of the Church, grant that the Church may enjoy freedom and peace in fulfilling her saving mission and that to this end she may become mature with a new maturity of faith and inner unity. Help us to overcome opposition and difficulties. Help us to rediscover all the simplicity and dignity of the Christian vocation. Grant that there may be no lack of "labourers in the Lord's vineyard". Sanctify families. Watch over the souls of the young and the hearts of the children. Help us to overcome the great moral threats against the fundamental spheres of life and love. Obtain for us the grace to be continually renewed through all the beauty of witness given to the Cross and Resurrection of your Son.
How many problems, O Mother, should I not present to you by name in this meeting! I entrust them all to you, because you know them best and understand them.
I who am the first servant of the Church offer the whole Church to you and entrust it to you here with immense confidence, Mother. Amen."
"When it comes to Mary, I have a great devotion to Our Lady of Częstochowa. She sits in my room wherever I go; I bring her with me even when I travel. The image of her, she has a scar from when she was taken out of the church in Częstochowa and stabbed. They've tried to fix it and it always comes back - she chooses the scar, and I think that's beautiful. I think it shows her motherly care for her children: it's a bruised world, a scarred world and she wants to be right there with us. And yet still shows how our scars can be beautiful to the Lord. She's more than a role model, she's an intercessor and she really does show us the true and beautiful way to Christ."
"Mary was always important in my faith. In Poland we have got a very important place for Mary, it's called Czestochowa, Jasna Gora and I have been there many times on pilgrimage. What is for me very important is that Mary doesn't want to know every time the answer for every question; sometimes she is just in silence and takes what God gives her."
"1. "Holy Virgin guarding bright Czestochowa..." To my mind come back these words of the poet Mickiewicz, who in an invocation to the Virgin at the beginning of his 'Pan Tadeusz' expressed what then beat and still beats in the hearts of all Poles, by making use of the language of faith and that of our national tradition. It is a tradition that goes back some 600 years to the time of the blessed Queen Hedwig at the dawn of the Jagellonian dynasty. The image of Jasna Gora expresses a tradition and a language of faith still more ancient than our history and also reflecting the whole of the content of the Bogurodzica, on which we meditated yesterday at Gniezno, recalling the mission of St Wojciech (Adalbert) and going back to the first moments of the proclamation of the Gospel in the land of Poland.
The Poles are accustomed to link with this place, this shrine, the many happenings of their lives: the various joyful or sad moments, especially the solemn, decisive moments, the occasions of responsibility, such as the choice of the direction for one's life, the choice of one's vocation, the birth of one's children, the final school examinations, and so many other occasions. They are accustomed to come with their problems to Jasna Gora to speak of them with their heavenly Mother, who not only has her image here, one of the best known and most venerated pictures of her in the world, but is specially present here. She is present in the mystery of Christ and of the Church, as the Council teaches. She is present for each and every one of those who come on pilgrimage to her, even if only in spirit and heart when unable to do so physically. The Poles are accustomed to do this. It is a custom also with related peoples, with neighbouring nations. More and more people are coming here from all over Europe and outside Europe.
During the great novena, the Cardinal Primate expressed himself as follows with regard to the significance of the shrine of Czestochowa for the life of the Church: "What has happened at Jasna Gora? "We are still unable to give an adequate answer. Something has happened that is beyond our powers of imagining... Jasna Gora has shown itself an inward bond in Polish life, a force that touches the depths of our hearts and holds the entire nation in the humble yet strong attitude of fidelity to God, to the Church and to her Hierarchy... For many of us it was a great surprise to see the power of the Queen of Poland display itself so magnificently."
It is no wonder then that I too should come here today. I have, in fact, taken with me from Poland to the chair of Saint Peter in Rome this "holy habit" of the heart, which has been built up by the faith of so many generations, has been tested by the Christian experience of so many centuries, and is deeply rooted in my soul.
2. Several times Pope Pius XI came here, naturally not as Pope but as Achille Ratti, the first Nuncio in Poland after the recovery of independence. After the death of Pius XII, when Pope John XXIII was elected to the Chair of Peter, the first words of the new Pontiff to the Primate of Poland after the Conclave were a reference to Jasna Gora. He recalled his visits here during his years as Apostolic Delegate in Bulgaria and he asked above all for unceasing prayer to the Mother of God for the intentions involved in his new mission. His request was satisfied every day at Jasna Gora, not only during his pontificate but also during those of his Successors.
What must I say of myself, to whom after the barely 33-day pontificate of John Paul I it fell, on 16 October 1978, by the inscrutable decree of Providence to receive his inheritance and the apostolic succession to the Chair of Saint Peter? What must I say, I who am the first non-Italian Pope for 455 years? What must I say, I, John Paul II, the first Polish Pope in the history of the Church? I will tell you: on that 16 October, the day on which the liturgical calendar of the Church in Poland recalls St Hedwig, I went back in thought to 26 August, to the preceding Conclave and the election that took place on the Solemnity of Our Lady of Jasna Gora. I had no need even to say, as my Predecessors said, that I was going to count on the prayers offered at the foot of the image of Jasna Gora. The call of a son of the Polish nation to the Chair of Peter involves an evident strong connection with this holy place, with this shrine of great hope: so many times I had whispered 'Totus tuus' in prayer before this image.
3. And today I am again with all of you, dear brothers and sisters; with you, beloved fellow-countrymen; with you, the Cardinal Primate of Poland; with all the Episcopate to which I belonged for more than 20 years as Bishop, Metropolitan Archbishop of Krakow and as Cardinal. So many times we came here to this holy place with attentive pastoral ear, to listen to the beating of the heart of the Church and of that of the motherland in the heart of the Mother. Jasna Gora is, in fact, not only a place of pilgrimage for the Poles of the motherland and of the whole world but also the nation's shrine. One must listen in this holy place in order to hear the beating of the heart of the nation in the heart of the Mother. For her heart beats, we know, together with all the appointments of history, with all the happenings in our national life: how many times, in fact, has it vibrated with the laments of the historical sufferings of Poland, but also with the shouts of joy and victory! The history of Poland can be written in different ways; especially in the case of the history of the last centuries, it can be interpreted along different lines. But if we want to know how this history is interpreted by the heart of the Poles, we must come here, we must listen to this shrine, we must hear the echo of the life of the whole nation in the heart of its Mother and Queen. And if her heart beats with a tone of disquiet, if it echoes with solicitude and the cry for the conversion and strengthening of consciences, this invitation must be accepted. It is an invitation springing from maternal love, which in its own way is shaping the historical processes in the land of Poland.
The last decades have confirmed and intensified that unity between the Polish nation and its Queen. Before the Virgin of Czestochowa there was pronounced the consecration of Poland to the Immaculate Heart of Mary on 8 September 1946. 10 years later the vows of King Jan Kazimierz were renewed at Jasna Gora on the 300th anniversary of the time when he, after a period referred to as one of deluge (the 17th century Swedish invasion), proclaimed the Mother of God Queen of the Polish Kingdom. On that anniversary began the great nine-year novena in preparation for the Millennium of the Baptism of Poland. Finally, in the year of the Millennium itself, on 3 May 1966, in this place the Primate of Poland pronounced the act of total servitude to the Mother of God for the freedom of the Church in Poland and throughout the world. This historic act was pronounced here, before Paul VI, absent in body but present in spirit, as a testimony of that lively and strong faith expected and demanded by the present time. The act speaks of "servitude". It contains a paradox similar to the words of the Gospel according to which one must lose one's life to find it (cf Mt 10, 39). For love constitutes the fulfilment of freedom, yet at the same time "belonging", and so not being free is part of its essence. However, this "not being free" in love is not felt as slavery but rather as an affirmation and fulfilment of freedom. The act of consecration in slavery indicates therefore a unique dependence and a limitless trust. In this sense slavery (non-freedom) expresses the fullness of freedom, in the same way as the Gospel speaks of the need to lose one's life in order to find it in its fullness.
The words of that act, which were spoken with the language of the historical experiences of Poland, the language of her sufferings and also of her victories, receive a response in this very moment of the life of the Church and of the world, after the close of the Second Vatican Council, which, as we rightly think, has opened a new era. The Council began an age of deeper knowledge of man, of his "joy and hope, grief and anguish", as is stated in the first words of the Pastoral Constitution Gaudium et Spes. Aware of her great dignity and her magnificent vocation in Christ, the Church wishes to go to meet man. The Church wishes to respond to the eternal yet ever topical queries of human hearts and human history. For that reason she carried out during the Council a work of deeper knowledge of herself, her nature, her mission, her tasks. On 3 May 1966 the Polish Episcopate added to this fundamental work by the Council its own act of Jasna Gora: the consecration to the Mother of God for the freedom of the Church in the world and in Poland. It was a cry coming forth from the heart and the will: a cry of the whole of the Christian being, from the person and the community, for the full right to proclaim the saving message; a cry that willed to have universal effectiveness by striking root in the present age and in the future. Everything through Mary. This is the authentic interpretation of the presence of the Mother of God in the mystery of Christ and of the Church, as is proclaimed by Chapter VIII of the Constitution Lumen Gentium. This interpretation corresponds to the tradition of the saints, such as Bernard of Clairvaux, Grignion de Monfort and Maximilian Kolbe.
4. Pope Paul VI accepted this act of consecration as the fruit of the celebration of the Polish Millennium of Jasna Gora, as is shown by his bull placed close to the image of the Black Madonna of Czestochowa. Today, on coming to Jasna Gora, his unworthy Successor wishes to renew it on the day after Pentecost, the very day on which is celebrated throughout Poland the feast of the Mother of the Church. For the first time the Pope is celebrating this solemnity, expressing together with you, venerable and dear Brothers, his gratitude towards his great Predecessor, who from the time of the Council began to invoke Mary with the title of the Mother of the Church.
This title enables us to enter into the whole of the mystery of Mary from the moment of her Immaculate Conception, passing through the Annunciation, the Visitation and the Birth of Jesus in Bethlehem, to Calvary. It enables us all to be — the scene is recalled in today's liturgy — in the upper room, where the Apostles devoted themselves to prayer, together with Mary the Mother of Jesus, as they waited, after the Lord's Ascension, for the fulfilment of his promise of the coming of the Holy Spirit, in order that the Church might be born. A special participation in the birth of the Church is had by her to whom we owe the birth of Christ. The Church, which was once born in the Pentecost upper room, continues to be born in every upper room of prayer. She is born to become our spiritual Mother in the likeness of the Mother of the Eternal Word. She is born to reveal the characteristics and power of that motherhood (the motherhood of the Mother of God) thanks to which we can "be called children of God; and so we are" (1 Jn 3, 1). For, in his plan of salvation, the holy fatherhood of God used the virginal motherhood of his lowly handmaiden to bring about in the children of man the work of the divine author.
Dear fellow-countrymen, venerable and beloved Brothers in the Episcopate, Pastors of the Church in Poland, illustrious guests, and all of you the faithful: consent that I, as St Peter's Successor present with you here today, should entrust the whole of the Church to the Mother of Christ with the same lively faith, the same heroic hope, with which we did so on the memorable day of 3 May of the Polish Millennium.
I learnt to be so here." | 2019-04-24T12:51:35Z | http://totus2us.com/vocation/blessed-virgin-mary/our-lady-of-czestochowa/ |
Your employees will acquire key knowledge of each competency in the most effective way thanks to our innovative sequence of teaching content.
Meet all of the training needs of your team through the description of behaviours, scenarios and specific guidelines.
Engage the professional and facilitate their learning using a wide variety of dynamic and interactive resources.
Videos of experts to present the competency.
Articles, guidelines or recommendations to internalise the knowledge.
Scenes from films as an example of the application of the competency.
Real cases of the use of each skill, with managers of large companies.
Test to assess your knowledge.
Over 70 experts take part in our courses to provide your team with learning that is adapted to the current world of business.
Maite Sarrió is a coach and consultant specialising in empowerment and personal development, gender and diversity. With a PhD in Psychology she teaches at several universities and promotes people and organisational talent and innovation at “Infinita”, her gender and diversity consultancy company.
Thinker and speaker, Javier Fernández Aguado, is considered one of the leading contemporary experts in managing people and organisations He is a Top Management coach, a member of Top Ten Management Spain and Top Ten Speakers Spain, and President of the group MindValue.
Pilar Gómez-Acebo is the Honorary President of the Spanish Federation of Female Directors, Executives, Professionals and Entrepreneurs and Vice President of the Spanish Confederation of Directors and Executives. She has a Master’s degree in Human Resources and Business Management and is currently a member of the panel of coach-advisers at the Spanish Association of Coaching.
Enrique Sueiro is the Executive Manager of the Corporate Communication & Management Program at IE Business School, board member of Dircom and CEO of Top Ten Management Spain. He advises individuals and organisations on matters relating to internal communication, motivation, media relations and biomedical communication.
Luis Huete is a teacher at IESE Business School, collaborates in the Service Research Interest Group at Harvard Business School and is also visiting lecturer at over 20 universities worldwide. He is a member of Top Ten Management and is globally renowned in the areas of customer service and management. He has written different books on both subject areas such as "Servicios y Beneficios" , "Claves del Management" or "Construye tu sueño", among others.
Vivian Acosta has been advising executives of leading companies and heading talent and diversity committees for over ten years. Until 2015, she was Member of the Advisory Board of the international organisation, Human Capital Managers DCH. She is currently the general consulting and management partner at Talengo and lecturer on the Master's and Executive programmes in Human Resources at Garrigues regarding talent management and assessment.
José Aguilar holds a PhD in Philosophy and has completed the Program for Management Development (PMD) at IESE. He is managing partner of MindValue and currently Director of the Santander Bank – Nebrija Chair for Corporate Social Responsibility. He also forms part of the LID Speakers Agency and Top Ten Management Spain. He is recognised as one of the leading Spanish experts in change management.
Rodrigo Jordan is a civil industrial engineer with a PhD in Philosophy. Throughout his professional career, he has performed the role of social entrepreneur, teacher, businessman, communication specialist and mountaineer. In fact, in 1992 he led the first group of Latin Americans to reach the summit of Mount Everest. Today he is renowned worldwide for his work in the areas of innovation, leadership and social development.
Felix Cuesta is an expert in 21st century companies, environment, management and marketing. He was the only Spaniard invited to the annual meeting of Nobel Laureates in Economics in 2008 (Nobels Colloquia 2008). With a PhD in Economics and Business Administration and an Executive MBA, he has held management positions in large national and multinational companies.
Antonio Liu Yang is the director of China Desk at Abogado Amigo and also a cross-cultural consultant Liu Yang collaborates as a visiting lecturer teaching in Chinese and Spanish in a dozen Master's programs at different universities, including the Complutense University of Madrid, Valencia Catholic University and Alcalá de Henares University and business schools such as ESERP or INEDE. He was awarded first prize in the Young Talent Awards in the Autonomous Region of Valencia in 2013, and the Foro Europa Gold Medal for his professional career in 2015.
Krista Walochik is President and CEO at Talengo. Vice President of the Global Board of Directors of AESC (Association of Executive Search Consultants). She has extensive experience in managing companies that provide international services, in university administration and teaching at post-graduate level, and in corporate governance of public, private and non-profit companies.
Ovidio Peñalver is a founding Partner and CEO at Isavia Consultants, and PCC from the International Coaching Federation (ICF). He is also assistant lecturer on some Master's degrees and programmes (EOI, APD, IDDI of the UFV, Euroforum, UCM and the Faculty of Psychology at the UAM), in the areas of Leadership, Communication, Stress Management and Coaching.
Managing partner of ISAVIA. Silvia Escribano is a member of Top Ten Management. Undisputed leader on the Spanish coaching scene. ICF Member and Professional Certified Coach (PCC). Co-author of "Forjadores de Coaching" and author of the book "Neurocoaching".
Juan Ramón Lucas is a journalist and television and radio presenter. He currently leads the "Más de uno" programme on Onda Cero. Previously, he was a TV presenter on Antena 3, TVE, Canal 9 and radio presenter on Madrid’s Radio Juventud, Cadena Ser and Onda Cero.
Juan Abellán is managing partner at Formathe. Director of training programmes and lecturer at various business schools, universities and higher education centres (IE Business School, University of Alcalá de Henares, CUNEF, U.F.V., IEB, CIFF, EADA, ESESA, etc.).
Antonio Fernández Aguado is a Human Resources expert with over 25 years of professional experience. He has worked as Human Resources Director at Famosa, Hilti, Chemo, Saint Gobain, Valeo and SEUR.
Francisco López de Seoane is managing partner at MPCGROUP Business Skills®, “Making better people. Making best business”, founder of División InshipTraining® and member of Top Ten Management.
Juan Carlos Alcaide is director and founder of MdS. Expert in Marketing, Customer Loyalty and Experience. Conference speaker and teacher at several universities and business schools (ESIC, EAE, EOI, CEU, European Business Forum, University-Enterprise Foundation of the University of Valencia, etc.). He is also a member of the Advisory Committee of the National Congress of Marketing and Sales of the Association for the Progress of Management and author of the book “Los 10 errores de la Experiencia de Cliente” .
Founding partner of Agathos Management. Lourdes Molinero is an expert in HR Strategy and Development. In addition, she is a member of Advisory Boards for Digital Transformation and Training companies (Incipy). She was previously Managing Director of the Antonio de Nebrija University Business School.
Asier de Artaza is a director at YES and member of Top Ten Management Spain. He holds a degree in Marketing and Business and Psychology, as well as a certificate in Coaching from the University of California. He is also a lecturer and gives talks at different companies and business schools: Instituto de Empresa, University of Deusto, EOI, ESIC, UIMP, UPV, APD, etc.
Mariano Vilallonga is a consultant and Top Management coach. Member of Top Ten Management Spain. Considered as one of the top experts in Executive Coaching in Spain by various economic publications. Coordinator and co-author of the first book by Spanish authors on business coaching. Frequent collaborator at the best business schools in Spain (IESE Business School, UFV, EOI, San Pablo-CEU).
Global Marketing and Strategy Director at LVMH Group. Sergio de León is also associate lecturer at The Valley Digital Business School and has experience as a speaker at different conferences and events in the sector such as OMExpo, Aedemo and IAB, and at companies such as LG Electronics.
Partner and managing director of CEINSA. Member of Top Ten Management Spain and founding member of CAMTO (Advanced Centre for Measuring Company Talent). Lecturer at the Autonomous University of Madrid on the Master's degree in Human Resources. With over 24 years of professional experience, he advises companies as a coach and specialist in managing Compensation and Talent.
Cristina Giménez-Vega is a founding partner of the consultancy Aditum. Member of the Governing Council of the Top 100 female leaders in Spain. She was previously a manager at Price Waterhouse Coopers and A.T. Kearney.
Executive coach at Coaching & Clownching, and speaker at Top Ten Management. Sergio de Miguel is an expert in managing emotions in teams. ICF Certified Coach (ACC) and Co-Active Coach as certified by The Coaches Institute (CPCC). Speaker and author of the book: "El Equilibrista".
Marina Ramos holds a PhD in Psychology and is lecturer in the Department of Psychology and on the Master's degree in Teacher Training at the Rey Juan Carlos University. She has over 10 years of experience in teaching, giving training sessions on motivation, communication skills, conflict management, creativity, etc.
Rafael Alcocer is an expert in Human Factors at the European Association for Aviation Psychology, and Chief Operating Officer at INGENAV.
María Calvete is Manager Director at Top Ten Management Spain, strategic consultant and speaker.
Hermógenes del Real is a lecturer at the Autonomous University of Madrid and co-founder of E3 Emprendemos en Educación. World renowned in Diversity Management in one of the Big Four consulting and audit firms.
Rosa Torres-Pardo is a Spanish professional pianist, winner of the National Music Award. She has extensive experience, performing alongside major orchestras such as the Los Angeles Philharmonic at the Hollywood Bowl and the London Royal Philharmonic Orchestra.
Álvaro de los Santos is one of the 10 most influential journalists on Social Media, according to Alianzo. He has been Social Media Manager at Telemadrid since 2010. In 2016 he went on to become head of multimedia news at the same television network. Previously, he was a newsreader and presenter of different programmes for the channel.
Luis de Torres is CEO of Sodexo HC & Education LatAm & Brazil. He has a degree in Law and Economics and an MBA in finance, along with extensive experience in senior management and leadership positions, mainly in the world of consulting and new technologies. He has also worked in companies such as American Online España (AOL) or Arthur D. Little Spain.
Fernando Moroy is Vice President of Keiretsu Forum, member of the Steering Committee of the Spanish Confederation of Directors and Executives, and ex-Director of Institutional Relations at La Caixa, as well as a lecturer at prestigious business schools.
Independent Director at Grupo ICS. Jerónimo Corral holds a degree in Law, a Master's degree in Human Resources Management and Occupational Risk Prevention. He has completed a Program for Management Development (PMD) at IESE and holds a Project Management Certificate from Stanford University. Jerónimo was previously HR director at Jazztel and Lindorff.
María Subrá is co-founder of Hedonai, medical-aesthetics centres, leading chain in the sector. She has a degree in Journalism and has mainly worked in the world of communication. She has held the positions of Head of the Press Department for Warner Music Group, Chief of Protocol for the Ministry of Defence, producer and presenter for the EITB, and General Coordinator of the programme “La clave” on Antena3. In 2016 she received the AEFOL "Javier Fernández Aguado" prize for Best Executive of the Year.
David Barroeta has been an associate lecturer in the area of Human Resources at IE since 2003, and also Personnel director at the company Opticalia. David holds a degree in Sociology and has worked as a Technician, Director and Head of HR in companies such as Basf Coatings or Cortefiel.
Iñigo Sagardoy is President of Sagardoy Abogados, considered the best law firm regarding employment law by Expansión, and one of the top 20 law firms in the world in relation to employment and immigration.
Human Resources Director at LG Electronics and lecturer on the Master's degree in Human Resources at EAE Business School. He previously held the position of Human Resources Director for Southern Europe at Red Bull, and later the role of Talent Manager, leading international talent management projects.
President of Vaughan Systems and creator of the Vaughan Method for teaching English, which is broadcast on both the radio and television. Richard Vaughan is the author of books such as “Nuestra hora en el escenario” or “Si quieres, puedes”. In 2015 he was awarded the Prize for Best Entrepreneur of the Year from the Madrid Training Institute – IMF.
María Victoria de Rojas is the director and editor of Ejecutivos magazine and manager of W Comunicaciones. She also works as a certified coach and expert in Business Protocol. Previously, she was the director of External Relations for the same publication.
Doctor in the Intensive Care Unit of the Torrejón de Ardoz Hospital (Madrid). Gabi Heras is the creator of the blog “HU-CI: Humanising intensive care" and the national and international multidisciplinary research project to enhance humanisation in hospital intensive care and ICUs to boost empathy among patients, family members and healthcare staff.
José María Zamora is the Terra Solutions Marketing Director at MAXAM. He was previously the Marketing Director at Microsoft, Chief Marketing Officer for LG Electronics and Brand Manager for Mahou-San Miguel. His teams highlight his ability to generate a feeling of belonging and his strong focus on people and business.
José Antonio Carazo is the Director of Human Capital at Wolters Kluwer. Chosen as one of Spain’s most influential HR directors, according to a ranking prepared by RRHHDigital. Co-author of the book “¿Vives o trabajas?”.
Antonio Mateo is Executive President of the Helping by Doing Foundation and Partner of Terra Consultoría de Incentivos. Antonio has worked in senior management for 25 years with numerous companies on the IBEX 35.
Head of Engagement & Diversity at Ferrovial. Helena Valderas has experience in the areas of talent attraction, recruitment, mobility and development, and has worked in companies such as Axa Seguros or Páginas Amarillas.
Miguel Ángel Cabrero is Corporate Marketing Director at Mahou San Miguel. He previously worked as Brand Manager and Marketing Manager in companies such as LG Electronics or DIAGEO.
Enrique Sánchez de León has been Managing Director of the Association for the Progress of Management (APD) since 1998, and Vice President of the Ezentis Board of Directors. Enrique has a degree in Business and Economics and also in Law.
CEO and Managing Director of SHA Wellness Clinic for over 10 years. Alfredo Bataller has a degree in Law from the University of Alicante and an MBA from IE Business School.
Álvaro Porreo is CEO of Hedonai medical-aesthetics centres, and founding partner of the company CFG Consultores. Álvaro has experience as an executive responsible for major accounts in companies such as Ono and Orange. He also holds a degree in Business Administration and Management and an MBA from the IE Business School.
President of the Sandra Ibarra Foundation for solidarity against cancer. She collaborates with others and takes part in conferences, events and articles. An activist for over 20 years, she defends the cancer survival spirit. She is publicly committed to spreading a positive message, taking advantage of the high profile nature of her social outreach work.
Rebeca Ávila is Communications Manager at Accorhotels and editor of the site workingoutfits.com. She specialises in corporate communication, public relations, protocol, event organisation and social media.
José Vicente Navarro is Head of Training and Institute at Norauto (Mobivia Group). He has over 20 years' experience working in the automotive company, in different positions relating to project implementation and coordination.
Eva Marciel is an entrepreneur, producer, actress and speaker coach. Eva has extensive experience in the production of audiovisual clips for high-profile clients such as Orange, Ford, Renault, Adidas and Coca-Cola, and also in the coordination of international teams on large shoots.
Carmen Afán is PR and Communications Manager at Varma. She has over ten years of experience in PR, Marketing Communications & Advocacy. She specialises in creative planning, development and management of communication strategies and integrated campaigns in multinational environments.
Juan Miguel Pérez is the Human Resources Director at Codere. He also holds a diploma in Personnel Management and Labour Relations, a degree in Labour Studies and a qualification in Labour Consulting from IE Business School.
Yuri Noda is an expert in Organisation and Innovation in Management at Fagor Ederlan S.Coop. She has extensive experience in the development of creativity techniques, team dynamisation and excellence-oriented management.
Ander Marin is Customer Loyalty Manager at Securitas Direct. He has previously worked for companies such as NH Hoteles, Nokia and BBVA. Ander has extensive experience in direct sales and dealing with customers.
Mónica Vázquez is Head of the Rheumatology Service at the Ramón y Cajal Hospital.
Enrique Cervantes holds a PhD in Psychology and is a lecturer on the Master's degree for Executives at the EUDEM Business School. He has over 35 years of experience working on both personal and professional growth and development programmes.
Jaime Pereira is an expert HR consultant with over 30 years of experience in HR management in multinational environments. Jaime has performed this role in high-profile companies such as Unilever or Sanitas.
José Manuel Casado is the President of 2C Casado Consulting and Distinguished Clinical Professor at IE Business School. He holds a PhD in Industrial Sociology and a Master's degree in HR Management and Organisation.
Jorge Cachinero is the Executive Director of the Senior Management Program at IE Business School. He has extensive experience as a lecturer at the IE and over 20 years of experience working in multinational companies.
Emotional Behaviour Researcher with a degree in Business Administration and Management. Elías Azulay has an MBA from the Escuela Superior de Estudios de Marketing and a Master's degree in Commercial Management. | 2019-04-18T13:02:08Z | https://b-talent.com/en/methodology-experts-soft-skills/ |
Criminal Appeals Nos. 274 of 1984.
J.S. Verma, G.N. Ray, N.P. Singh, Faizanuddin and G.T. Nanavati, JJ.
For Appearing Parties: K.T.S. Tulsi, B.S. Malik, K.N. Shukla, M.K. Banerjee and Soli J. Sorabjee, Advs.
Encyclopaedia of Crime and Justice, Vol. IV, 1983 Edn.; Webster's Dictionary.
From the Judgment and Order dated 20.2.84 of the Punjab and Hrayana High Court in Crl. A. No. 629-SB of 1982.
Constitution - constitutional validity - Articles 14 and 21 of Constitution of India, Sections 107, 306 and 309 of Indian Penal Code, 1860 and Section 360 of Criminal Procedure Code, 1973 - appellants convicted for offence under Section 306 - on appeal High Court maintained conviction - appellants challenged constitutional validity of Section 306 - genesis of acts cannot be traced to or be included within protection of right to life under Article 21 - Article 21 guaranteeing protection of life and personal liberty - extinction of life cannot be included in protection of life - Article 21 cannot be construed to include within it right to die as part of fundamental right - suicide is unnatural termination or extinction of life and inconsistent with concept of right to life - held, law relating to Section 306 constitutionally invalid.
Criminal - Conviction - Offence committed punishable under Sections 107, 306 and 309 of the Indian Penal Code, 1860 (I.P.C.).
Whether the order of conviction sustainable ?
Section 306 of the I.P.C. to be unconstitutional had been cited. Section 309 of the I.P.C. was not violative of either Article 14 or Article 21 of the Constitution of India. Questions of constitutional validity of Sections 306 and 309 of the I.P.C. were decided accordingly, by holding that neither of the two provisions was constitutionally invalid. Appeals would be listed before the appropriate Division Bench for their decision on merits in accordance with law treating Sections 306 and 309 of the I.P.C. to be constitutionally valid.
2. The appellants Gian Kaur and her husband Harbans Singh were convicted by the Trial Court under Section 306, Indian Penal Code, 1860 (for short "IPC") and each sentenced to six years R.I. and fine of Rs. 2,000, or, in default, further R.I for nine months, for abetting the commission of suicide by Kulwant Kaur. On appeal to the High Court, the conviction of both has been maintained but the sentence of Gian Kaur alone has been reduced to R.I. for three years. These appeals by special leave are against their conviction and sentence under Section 306, IPC.
3. The conviction of the appellants has been assailed, inter alia, on the ground that Section 306, IPC is unconstitutional. The first argument advanced to challenge the constitutional validity of Section 306, IPC rests on the decision in P. Rathinam v. Union of India and Anr. MANU/SC/0433/1994 : 1994CriLJ1605 , by a Bench of two learned Judges of this Court wherein Section 309, IPC has been held to be unconstitutional as violative of Article 21 of the Constitution. It is urged that 'right to die' being included in Article 21 of the Constitution as held in P. Rathinam declaring Section 309, IPC to be unconstitutional, any person abetting the commission of suicide by another is merely assisting in the enforcement of the fundamental right under Article 21; and, therefore, Section 306, IPC penalising assisted suicide is equally violative of Article 21. This argument, it is urged, is alone sufficient to declare that Section 306, IPC also is unconstitutional being violative of Article 21 of the Constitution.
4. One of the points directly raised is the inclusion of the 'right to die' within the ambit of Article 21 of the Constitution, to contend that any person assisting the enforcement of the 'right to die' is merely assisting in the enforcement of the fundamental right under Article 21 which cannot be penal; and Section 306, IPC making that act punishable, therefore, violates Article 21. In view of this argument based on the decision in P. Rathinam, a reconsideration of that decision is inescapable.
5. In view of the significance of this contention involving a substantial question of law as to the interpretation of Article 21 relating to the constitutional validity of Section 306, I.P.C. which requires reconsideration of the decision in P. Rathinam, the Division Bench before which these appeals came up for hearing has referred the matter to a Constitution Bench for deciding the same. This is how the matter comes before the Constitution Bench.
6. In addition to the learned Counsel for the parties and the learned Attorney General of India who appeared in response to the notice, we also requested Shri Fali S. Nariman and Shri Soli J. Sorabajee, Senior Advocates to appear as amicus Curiae in this matter. All the learned Counsel appearing before us have rendered great assistance to enable us to decide q this ticklish and sensitive issue.
7. We may now refer to the submissions of the several learned Counsel who ably projected the different points of view.
8. Shri Ujagar Singh and Shri B.S. Malik appeared in these matters for the appellants to support the challenge to the constitutional validity of Section 306 and 309, IPC. Both the learned Counsel contended that Section 306 as well as Section 309 are unconstitutional. Both of them relied on the decision in P. Rathinam. However, Shri Ujagar Singh supported the conclusion in P. Rathinam of the constitutional invalidity of Section 309, IPC only on the ground of violation of Article 14 and not Article 21. Shri B.S. Malik contended that Section 309 is violative of Articles 14 and 21. He strongly relied on the ground based on Article 21 in P. Rathinam for holding Section 309 to be invalid. He urged that 'right to die' being included within the ambit of Article 21, assistance in commission of suicide cannot be an offence and, therefore, Section 306, IPC also is violative of Article 21. He contended that Section 306 is unconstitutional for this reason alone. Shri S.K. Gambhir appearing in one of the connected matters did not advance any additional argument.
9. The learned Attorney General contended that Section 306 IPC constitutes a distinct offence and can exist independently of Section 309, IPC. The learned Attorney General did not support the decision in P. Rathinam and the construction made of Article 21 therein to include the 'right to die'. Shri F.S. Nariman submitted that Sections 306 and 309 constitute independent substantive offences and Section 306 can exist independently of Section 309. Shri Nariman then contended that the desirability of deleting Section 309 from the IPC is different from saying that it is unconstitutional. He also submitted that the debate on euthanasia is not relevant for deciding the question of constitutional validity of Section 309. He submitted that Article 21 cannot be construed to include within it the so called 'right to die' since Article 21 guarantees protection of life and liberty and not its extinction. He submitted that Section 309 does not violate even Article 14 since the provision of sentence therein gives ample discretion to apply that provision with compassion to an unfortunate victim of circumstances attempting to commit suicide. Shri Nariman referred to the reported decisions to indicate that the enforcement of this provision by the courts has been with compassion to ensure that it is not harsh in operation. Shri Nariman submitted that the decision in P. Rathinam requires reconsideration as it is incorrect. Shri Soli J. Sorabjee submitted that Section 306 can survive independently of Section 309, IPC as it does not violate either Article 14 or Article 21. Shri Sorabjee did not support the construction made of Article 21 in P. Rathinam to include therein the 'right to die' but he supported the conclusion that Section 309 is unconstitutional on the ground that it violates Article 14 of the Constitution. Shri Sorabjee submitted that it has been universally acknowledged that a provision to punish attempted suicide is monstrous and barbaric and, therefore, it must be held to be violative of Article 14 of the Constitution. Shri Sorabjee's argument, therefore, is that Section 306, IPC must be upheld as constitutional but Section 309 should be held as unconstitutional, not as violative of Article 21 as held in P. Rathinam but being violative of Article 14 of the Constitution. He also sought assistance from Article 21 to support the argument based on Article 14.
10. At this stage, it would be appropriate to refer to the decisions wherein the question of constitutional validity of Section 309, IPC was considered.
11. Maruti Shripati Dubai v. State of Maharashtra MANU/MH/0022/1986 : Crl. L.J. 743, is the decision by a Division Bench of the Bombay High Court. In that decision, P.B. Sawant, J., as he then was, speaking for the Division Bench held that Section 309 IPC is violative of Article 14 as well as Article 21 of the Constitution. The provision was held to be discriminatory in nature and also arbitrary so as to violate the equality guaranteed by Article 14. Article 21 was construed to include the 'right to die', or to terminate one's own life- For this reason it was held to violate Article 21 also.
12. State v. Sanjay Kumar Bhatia MANU/DE/0253/1985 : Crl. L.J. 931, is the decision of the Delhi High Court. Sachar, J., as he then was, speaking for the Division Bench said that the continuance of Section 309 IPC is an anachronism unworthy of human society like ours. However, the question of its constitutional validity with reference to any provision of the Constitution was not considered. Further consideration of this decision is, therefore, not necessary.
13. Chenna Jagadeeswar and Anr. v. State of Andhra Pradesh MANU/DE/0253/1985 : 1988 Crl. L.J. 549, is the decision by a Division Bench of the Andhra Pradesh High Court. The challenge to the constitutional validity of Section 309 IPC was rejected therein. The argument that Article 21 includes the 'right to die' was rejected. It was also pointed out by Amareshwari, J. speaking for the Division Bench that the Courts have sufficient power power to see that unwarranted harsh treatment or prejudice is not meted out to those who need care and attention. This negatived the suggested violation of Article 14.
Keeping in view all the above, we state that right to live of which Article 21 speaks of can be said to bring in its trail the right not to live a forced life.
On the basis of what has been held and noted above, we state that Section 309 of the Penal Code deserves to be effaced from the statute book to humanise our penal laws. It is a cruel and irrational provision, and it may result in punishing a person again (doubly) who has suffered agony and would be undergoing ignominy because of his failure to commit suicide. Then an act of suicide cannot be said to be against religion, morality or public policy, and an act of attempted suicide has no baneful effect on society. Further, suicide or attempt to commit it causes no harm to others, because of which State's interference with the personal liberty of the persons concerned is not called for.
We, therefore, hold that Section 309 violates Article 21, and so, it is void. May it be said that the view taken by us would advance not only the cause of humanisation, which is a need of the day, but of globalisation also, as by effacing Section 309, we would be attuning this part of our criminal law to the global wavelength.
31. Or let him walk, fully determined and going straight on, in a north-easterly direction, subsisting on water and air, until his body sinks to rest.
32. A Brahmana having got rid of his body by one of those modes (i.e. drowning, precipitating burning or starving) practiced by the great sages, is exalted in the world of Brahamana, free from sorrow and fear.
From the parallel passage of Apas tambha II, 23, 2, it is, however, evident that a voluntary death by starvation was considered the befitting conclusion of a hermit's life. The antiquity and general prevalence of the practice may be inferred from the fact that the Jaina ascetics, too, consider it particularly meritorious.
16.32 Looking at the offence of attempting to commit suicide, it has been observed by an English writer: (See : H. Romilly Fedden: Suicide (London, 1938), page 42).
It seems a monstrous procedure to inflict further suffering on even a single individual who has already found life so unbearable, his chances of happiness so slender, that he has been willing to face pain and death in order to cease living. That those for whom life is altogether bitter should be subjected to further bitterness and degradation seems perverse legislation.
Acting on the view that such persons deserve the active sympathy of society and not condemnation or punishment, the British Parliament enacted the Suicide Act in 1961 whereby attempt to commit suicide ceased to be an offence.
16.33 We included in our questionnaire the question whether attempt to commit suicide should be punishable at all. Opinion was more or less equally divided. We are, however, definitely of the view that the penal provision is harsh and unjustifiable and it should be repealed.
A Bill was introduced in 1972 to amend the Indian Penal Code by deleting Section 309. However, the Bill lapsed and no attempt has been made as yet to implement that recommendation of the Law Commission.
16. The desirability of retaining Section 309 in the Statute is a different matter and non-sepulture in the context of constitutional validity of that provision which has to be tested with reference to some provision in the Constitution of India. Assuming for this purpose that it may be desirable to delete Section 309 from the Indian Penal Code for the reasons which led to the recommendation of the Law Commission and the formation of that opinion by persons opposed to the continuance of such a provision, that cannot be a reason by itself to declare Section 309 unconstitutional unless it is held to be violative of any specific provision in the Constitution. For this reason, challenge to the constitutional validity of Section 309 has been made and is also required to be considered only with reference to Articles 14 and 21 of the Constitution. We, therefore, proceed now to consider the question of constitutional validity with reference to Articles 14 and 21 of the Constitution. Any further reference to the Global debate on the desirability of retaining a penal provision to punish attempted suicide is unnecessary for the purpose of this decision. Undue emphasis on that aspect and particularly the reference to euthanasia cases tends to befog the real issue of the constitutionality of the provision and the crux of the matter which is determinative of the issue.
17. In P. Rathinam it was held that the scope of Article 21 includes the 'right to die'. P. Rathinam held that Article 21 has also a positive content and is not merely negative in its reach. Reliance was placed on certain decisions to indicate the wide ambit of Article 21 wherein the term 'life' does not mean 'mere animal existence' but 'right to live with human dignity' embracing quality of life. Drawing analogy from the interpretation of 'freedom of speech and expression' to include freedom not to speak, 'freedom of association and movement' to include the freedom not to join any association or to move anywhere, 'freedom of business' to include freedom not to do business, it was held in P. Rathanam that logically it must follow that right to live would include right not to live, i.e., right to die or to terminate one's life. Having concluded that Article 21 includes also the right to die, it was held that Section 309, IPC was violative of Article 21. This is the only basis in P. Rathinam to hold that Section 309, IPC is unconstitutional.
'Right to die' - Is it included in Article 21?
21. Protection of life and personal liberty - No person shall be deprived of his life or personal liberty except according to procedure established by law.
If a person has a right to live, question is whether he has right not to live. The Bombay High Court stated in paragraph 10 of its judgment that as all the fundamental rights are to be read together, as held in R.C. Cooper v. Union of India what is true on one fundamental right is also true of another fundamental right. It was then stated that is not, and cannot be, seriously disputed that fundamental rights have their positive as well as negative aspects. For example, freedom of speech and expression includes freedom not to speak. Similarly, the freedom of association and movement includes freedom not to join any association or move anywhere. So too, freedom of business includes freedom not to do business. It was therefore, stated that logically it must follow that the right to live will include right not to live i.e., right to die or to terminate one's life.
Two of the above named critics of the Bombay judgment have stated that the aforesaid analogy is "misplaced", which could have arisen on account of superficial comparison between the freedoms, ignoring the inherent difference between one fundamental right and the other. It has been argued that the negative aspect of the right to live would mean the end or extinction of the positive aspect, and so, it is not the suspension as such of the right as is in the case of 'silence' or 'non-association' and 'no movement'. It has also been stated that the right to life stands on different footing from other rights as all other rights are derivable from the right to live.
The aforesaid criticism is only partially correct inasmuch as though the negative aspect may not be inferable on the analogy of the rights conferred by different clauses of Article 19, one may refuse to live, if his life be not according to the person concerned worth living or if the richness and fullness of life were not to demand living further. One may rightly think that having achieved all worldly pleasures or happiness he has something to achieve beyond this life. This desire for communion with God may very rightly lead even a very healthy mind to think that he would forego his right to live and would rather choose not to live. In any case, a person cannot be forced to enjoy right to life to his detriment, disadvantage or disliking.
In this context, reference may be made to what Alan A. Stone, while serving as Professor of Law and Psychiatry in Harvard University stated in his 1987 Jonas Robitscher Memorial Lecture in Law and Psychiatry, under the caption "The Right to Die : New Problems for Law and Medicine and Psychiatry.(This lecture has been printed at pp. 627 to 643 of Emory Law Journal, Vol. 37, 1988). One of the basic theories of the lecture of Professor Stone was that right to die inevitably leads to the right to commit suicide.
18. From the above extract, it is clear that in substance the reason for that view is, that if a person has right to live, he also has a right not to live. The decisions relied on for taking that view relate to other fundamental rights which deal with different situations and different kind of rights. In those cases the fundamental right is of a positive kind, for example, freedom of speech, freedom of association, freedom of movement, freedom of business etc. which were held to include the negative aspect of their being no compulsion to exercise that right by doing the guaranteed positive act. Those decisions merely held that the right to do an act includes also the right not to do an act in that manner. It does not flow from those decisions that if the right is for protection from any intrusion thereof by others or in other words the right has the negative aspect of not being deprived by others of its continued exercise e.g. the right to life or personal liberty, then the converse positive act also flows there from to permit expressly its discontinuance or extinction by the holder of such right. In those decisions it is the negative aspect of the right that was invoked for which no positive or overt act was required to be done by implication. This difference in the nature of rights has to be borne in mind when making the comparison for the application of this principle.
19. When a man commits suicide he has to undertake certain positive overt acts and the genesis of those acts cannot be traced to, or be included within the protection of the 'right to life' under Article 21. The significant aspect of 'sanctity of life' is also not to be overlooked. Article 21 is a provision guaranteeing protection of life and personal liberty and by no stretch of imagination can 'extinction of life' be read to be included in 'protection of life'. Whatever may be the philosophy of permitting a person to extinguish his life by committing suicide, we find it difficult to construe Article 21 to include within it the 'right to die' as a part of the fundamental right guaranteed therein. 'Right to life' is a natural right embodied in Article 21 but suicide is an unnatural termination or extinction of life, and therefore, incompatible and inconsistent with the concept of 'right to life'. With respect and in all humility, we find no similarity in the nature of the other rights, such as the right to 'freedom of speech' etc. to provide a comparable basis to hold that the 'right to life' also includes the 'right to die'. With respect, the comparison is inapposite, for the reason indicated in the context of Article 21. The decisions relating to other fundamental rights wherein the absence of compulsion to exercise a right was held to be included within the exercise of that right, are not available to support the view taken in P. Rathinam qua Article 21.
20. To give meaning and content to the word 'life' in Article 21, it has been construed as life with human dignity. Any aspect of life which makes it dignified may be read into it but not that which extinguishes it and is, therefore, inconsistent with the continued existence of life resulting in effacing the right itself. The 'right to die', if any, is inherently inconsistent with the 'right to life' as is 'death' with 'life'.
21. Protagonism of euthanasia on the view that existence in persistent vegetative state (PVS) is not a benefit to the patient of a terminal illness being unrelated to the principle of Sanctity of life' or the 'right to live with dignity' is of no assistance to determine the scope of Article 21 for deciding whether the guarantee of 'right to life' therein includes the 'right to die'. The 'right to life' including the right to live with human dignity would mean the existence of such a right up to the end of natural life. This also includes the right to a dignified life up to the point of death including a dignified procedure of death. In other words, this may include the right of a dying man to also die with dignity when his life is ebbing out. But the 'right to die' with dignity at the end of life is not to be confused or equated with the 'right to die' an unnatural death curtailing the natural span of life.
22. A question may arise, in the context of a dying man, who is, terminally ill or in a persistent vegetative state that he may be permitted to terminate it by a premature extinction of his life in those circumstances. This category of cases may fall within the ambit of the 'right to die' with dignity as a part of right to live with dignity, when death due to termination of natural life is certain and imminent and the process of natural death has commenced. These are not cases of extinguishing life but only of accelerating conclusion of the process of natural death which has already commenced. The debate even in such cases to permit physician assisted termination of life is inconclusive. It is sufficient to reiterate that the argument to support the view of permitting termination of life in such cases to reduce the period of suffering during the process of certain natural death is not available to interpret Article 21 to include therein the right to curtail the natural span of life.
23. We are, therefore, unable to concur with the interpretation of Article 21 made in P. Rathinam. The only reason for which Section 309 is held to be violative of Article 21 in P. Rathinam does not withstand legal scrutiny. We are unable to hold that Section 309 I.P.C. is violative of Article 21.
24. The only surviving question for consideration now is whether Section 309 IPC is violative of Article 14, to support the conclusion reached in P. Rathinam.
25. The basis of the decision in P. Rathinam, discussed above, was not supported by any of the learned Counsel except Shri B.S. Malik. On the basis of the decision in P. Rathinam it was urged that Section 306 also is " violative of Article 21, as mentioned earlier. On the view we have taken that Article 21 does not include the 'right to die' as held in P. Rathinam, the first argument to challenge the constitutional validity of Section 306, IPC also on that basis fails, and is rejected.
Article 14 Is it violated by Section 309, I.P.C.?
26. We would now consider the constitutional validity of Section 309 with reference to Article 14 of the Constitution. In substance, the argument of Shri Ujagar Singh, Shri B.S. Malik and Shri Soli J. Sobrajee on this point is that it is a monstrous and barbaric provision which violates the equality clause being discriminatory and arbitrary. It was contended that attempted suicide is not punishable in any other civilized society and there is a strong opinion against the retention of such a penal provision which led the Law Commission of India also to recommend its deletion. Shri Sorabjee contended that the wide amplitude of Article 14 together with the right to live with dignity included in Article 21, renders Section 309 unconstitutional. It is in this manner, invoking Article 21 limited to life with dignity (not including therein the 'right to die') that Shri Sorabjee refers to Article 21 along with Article 14 to assail the validity of Section 309, IPC. The conclusion reached in P. Rathinam is supported on this ground.
The Bombay High Court held Section 309 as violation of Article 14 also mainly because of two reasons. First, which act or acts in series of acts will constitute attempt to suicide, where to draw the line, is not known some attempts may be serious while others non-serious. It was stated that in fact philosophers, moralists and sociologists were not agreed upon what constituted suicide. The want of plausible definition or even guidelines, made Section 309 arbitrary as per the learned Judges. Another reason given was that Section 309 treats all attempts to commit suicide by the same measure without referring to the circumstances in which attempts are made.
The first of the aforesaid reasons is not sound, according to us, because whatever differences there may be as to what constitutes suicide, there is no doubt that suicide is intentional taking of one's life, as stated at p. 1521 of Encyclopaedia of Crime and Justice, Vol. IV, 1983 Edn. Of course, there still exists difference among suicide researchers as to what constitutes suicidal behavior, for example, whether narcotic addiction, chronic alcoholism, heavy cigarette smoking, reckless driving, other risk-taking behaviors, are suicidal or not. It may also be that different methods are adopted for committing suicide, for example, use of firearm, poisoning especially by drugs, overdoses, hanging, inhalation of gas. Even so, suicide is capable of a broad definition, as has been given in the aforesaid Webster's Dictionary. Further, on a prosecution being launched it is always open to an accused to take the plea that his act did not constitute suicide whereupon the court would decide this aspect also.
Insofar as treating of different attempts to commit suicide by the same measure is concerned, the same also cannot be regarded as violative of Article 14, inasmuch as the nature, gravity and extent of attempt may be taken care of by tailoring the sentence appropriately. It is worth pointing out that Section 309 has only provided the maximum sentence which is up to one year. It provides for imposition of fine only as a punishment. It is this aspect which weighed with the Division Bench of Andhra Pradesh High Court in its aforesaid decision to disagree with the Bombay view by stating that in certain cases even Probation of Offenders Act can be pressed into service, whose Section 12 enables the court to ensure that no stigma or disqualification is attached to such a person.
We agree with the view taken by the Andhra Pradesh High Court as regards Section 309 qua Article 14.
With respect, we are in agreement with the view so taken qua Article 14, in P. Rathinam.
28. We have already stated that the debate on the desirability of retaining such a penal provision of punishing attempted suicide, including the recommendation for its deletion by the Law Commission are not sufficient to indicate that the provision is unconstitutional being violative of Article 14. Even if those facts are to weigh, the severity of the provision is mitigated by the wide discretion in the matter of sentencing since there is no requirement of awarding any minimum sentence and the sentence of imprisonment is not even compulsory. There is also no minimum fine prescribed as sentence, which alone may be the punishment awarded on conviction under Section 309, IPC. This aspect is noticed in P. Rathinam for holding that Article 14 is not violated.
29. The reported decisions show that even on conviction under Section 309, IPC, in practice the accused has been dealt with compassion by giving benefit under the Probation of Offenders Act, 1958 or Section 562 of the Code of Criminal Procedure, 1908 corresponding to Section 360 of the Criminal Procedure Code, 1973 : Mt. Bamkat v. Emperor MANU/MH/0002/1912 : AIR (1934) Lah. 514; Emperor v. Dwarka Pooja MANU/MH/0002/1912 : 14 Bom. L.R. 146; Emperor v. Mt. Dhirajia ; Ram Sunder v. State of Uttar Pradesh MANU/UP/0072/1962 : AIR1962All262 ; Valentino v. State AIR 1967 Goa 138; Phulbai v. State of Maharashtra (1976) Crl. L.J. 1519; Radharani v. State of M.P. MANU/DE/0253/1985 : AIR (1981) SC 1776 and Rukhmina Devi v. State of U.P. MANU/DE/0253/1985 : (1988) Crl. L.J. 548. The above quoted discussion in P. Rathinam qua Article 14 is sufficient to reject the challenge based on Article 14.
30. We may briefly refer to the aid of Article 21 sought by Shri Sorabjee to buttress the challenge based on Article 14. We have earlier held that 'right to die' is not included in the 'right to life' under Article 21. For the same reason, 'right to live with human dignity' cannot be construed to include within its ambit the right to terminate natural life, at least before commencement of the natural process of certain death. We do not see how Article 21 can be pressed into service to support the challenge based on Article 14. It cannot, therefore, be accepted that Section 309 is violative either of Article 14 or Article 21 of the Constitution.
31. It follows that there is no ground to hold that Section 309, IPC is constitutionally invalid. The contrary view taken in P. Rathinam on the basis of the construction made of Article 21 to include therein the 'right to die' cannot be accepted by us to be correct. That decision cannot be supported even on the basis of Article 14. It follows that Section 309, IPC is not to be treated as unconstitutional for any reason.
Validity of Section 306, I.P.C.
32. The question now is whether Section 306, IPC is unconstitutional for any other reason. In our opinion, the challenge to the constitutional validity of Section 309, IPC having been rejected, no serious challenge to the constitutional validity of Section 306 survives. We have already rejected the main challenge based on P. Rathinam on the ground that 'right to die' is included in Article 21.
306. Abetment of suicide - If any person commits suicide, whoever abets the commission of such suicide, shall be punished with imprisonment of either description for a term which may extend to ten years, and shall also be liable to fine.
34. Section 306 prescribes punishment for 'abetment of suicide' while Section 309 punishes 'attempt to commit suicide'. Abetment of attempt to commit suicide is outside the purview of Section 306 and it is punishable only under Section 309 read with Section 107, IPC. In certain other jurisdictions, even though attempt to commit suicide is not a penal offence yet the abettor is made punishable. The provision there, provides for the punishment of abetment of suicide as well as abetment of attempt to commit suicide. Thus, even where the punishment for attempt to commit suicide is not considered desirable, its abetment is made a penal offence. In other words assisted suicide and assisted attempt to commit suicide are made punishable for cogent reasons in the interest of society. Such a provision is considered desirable to also prevent the danger inherent in the absence of such a penal provision. The arguments which are advanced to support the plea for not punishing the person who attempts to commit suicide do not avail for the benefit of another person assisting in the commission of suicide or in its attempt. This plea was strongly advanced by the learned Attorney General as well as the amicus curiae Shri Nariman and Shri Sorabjee. We find great force in the submission.
Suicide : "Felo de se or suicide is, where a man of the age of discretion, and compos mentis voluntarily kills himself by stabbing, poison or any other way" and was a felony' at common law : see 1 Hale PC 411-419. This section abrogates that rule of law,but, by virtue of' Section 2(1) post, a person who aids, abets, counsels or procures the suicide or attempted suicide of another is guilty of a statutory offence.
The requirement that satisfactory evidence of suicidal intent is always necessary to establish suicide as a cause of death is not altered by the passing of this Act: See R. v. Cardiff Coroner, ex p Thomas 3 All ER 469 , 1 WLR 1475.
2. Criminal liability for complicity in another's suicide.
(1) A person who aids, abets, counsels or procures the suicide of another, or an attempt by another to commit suicide, shall be liable on conviction on indictment to imprisonment for a term not exceeding fourteen years.
Sanctity of life, as we will see, has been understood historically as excluding freedom of choice in the self-infliction of death and certainly in the involvement of others in carrying out that choice. At the very least, no new consensus has emerged in society opposing the right of the state to regulate the involvement of others in exercising power over individuals ending their lives.
38. The desirability of bringing about a change was considered to be the function of the legislature by enacting a suitable law providing therein adequate safeguards to prevent any possible abuse.
39. The decision of the United States Court of Appeals for the Ninth Circuit in Compassion in Dying v. State of Washington MANU/DE/0253/1985 : 49 F. 3d 586, which reversed the decision of United States District Court, W.D. Washington reported in 850 Federal Supplement 1454, has also relevance. The constitutional validity of the State statute that banned physician assisted suicide by mentally competent, terminally ill adults was in question. The District Court held unconstitutional the provision punishing for promoting a suicide attempt. On appeal, that judgment was reversed and the constitutional validity of the provision was upheld.
40. This caution even in cases of physician assisted suicide is sufficient to indicate that assisted suicides outside that category have no rational basis to claim exclusion of the fundamental principle of sanctity of life. The reasons assigned for attacking a provision which penalises attempted suicide are not available to, the abettor of suicide or attempted suicide. Abetment of suicide or attempted suicide is a distinct offence which is found enacted even in the law of the countries where attempted suicide is not made punishable. Section 306 1.P.C I.P.C . enacts a distinct offence which can survive independent of Section 309 in the I.P.C. The learned Attorney General as well as both the learned amicus curiae rightly supported the constitutional validity of Section 306 I.P.C.
41. The Bombay High Court in Naresh Marotrao Sakhre and Anr. v. Union of India and Ors. (1995) Crl. L.J. 96, considered the question of validity of Section 306 I.P.C. and upheld the same. No decision holding Section 306 I.P.C. to be unconstitutional has been cited before us. We find no reason to hold either Section 309 or Section 306 I.P.C. to be unconstitutional.
42. For the reasons we have given, the decisions of the Bombay High Court in Maruti Shripati Dubai v. State of Maharashtra MANU/MH/0022/1986 : (1987) Crl. L.J 743, and of a Division Bench of this Court in P. Rathinam v. Union of India and Am. MANU/SC/0433/1994 : 1994CriLJ1605 , wherein Section 309 I.P.C. has been held to be unconstitutional, are not correct. The conclusion of the Andhra Pradesh High Court in Chenna Jagadeeswar and Anr. v. State of Andhra Pradesh MANU/DE/0253/1985 : (1988) Crl. L.J. 549, that Section 309 I.P.C. is not violative of either Article 14 or Article 21 of the Constitution is approved for the reasons given herein. The questions of constitutional validity of Sections 306 and 309 I.P.C. are decided accordingly, by holding that neither of the two provisions is constitutionally invalid.
43. These appeals would now be listed before the appropriate Division Bench for their decision on merits in accordance with law treating Sections 306 and 309 I.P.C. to be constitutionally valid. | 2019-04-19T11:46:13Z | http://www.lawskills.in/FreeRes/judgments/MANUSC03351996.htm |
The Seton Hall Prep Wrestling Team closed out their season sending six wrestlers (Larry Melchionda, Conner Decker, Cole Carroll, Jack Wilt, Mike Massa and Niko Diakides) to one of the top state tournaments in the country: The NJSIAA State Wrestling Championships.
Boardwalk Hall is a very unforgiving place as elite New Jersey wrestlers compete for a spot on the podium. All season long, The SHP Wrestling Team came through with big rounds in every tournament to get them to AC.
Jack Wilt came up with a big 1st round win to let everyone know he is the real deal; Junior Mike Massa continue to step up his game going 2-2 and finishing top 16 in NJ.
Then one of the all time great 285 lb wrestlers in SHP history closed out his career. Niko Diakides was a 4-year starter for the Pirates and someone we could always count on.
Niko finished his career with many accolades: 3x District Finalist 2x Champ, 3x County Finalist 1x Champ. Niko is also a 2x region medalist and finished top 12 in NJ as a junior. The coaching staff is excited for next season as Niko is the only graduating member of the team, but filling the void will be a monumental task.
The Seton Hall Prep Swim Team ended their season with some big performances as two school records were broken at the NJSIAA Meet of Champions on Sunday, March 3, at Gloucester Institute of Technology.
The 200 Freestyle Relay Team of Sophomore Jaeden Yburan (22.08), Junior Matt Prior (22.19), Senior Luke Shea (22.13) and Senior Roo Fenton (20.32) set a new school record in a time of 1:26.72, which also secured them a 4th place finish. The same four swimmers had set the previous record earlier this season vs. Livingston.
Jaeden Yburan would get right back into the water in the next event to break the school record in the 100 backstroke in 51.85, as he finished in 6th place. Jaeden had set the previous record at this year's county championship meet.
Roo Fenton was the Prep's top finisher at the meet as he was runner-up in the 50 freestyle in 20.80, missing the state title by an agonizing .09 seconds. Fenton also finished in 8th place in the 100 Freestyle.
The 200 Medley Relay team of Yburan (24.79 backstroke), junior Mike Pietrucha (27.66 breaststroke), Shea (23.92 butterfly) and Fenton (20.25 freestyle) also had an outstanding performance as they finished 4th in a time of 1:36.62. Fenton's anchor leg was the fastest 50 freestyle relay split in school history.
Congratulations on The Prep's outstanding 2018-2019 season!
The Seton Hall Prep Swim team placed a finalist in five events thanks to a solid performance in today's preliminary round at the NJSIAA Meet of Champions at the Gloucester County Institute of Technology.
The top qualifier is Senior Roo Fenton, seeded third for tomorrow's final in the 50 Freestyle, after a 21.28. Fenton is also seeded 7th in the 100 free after a 47.03 in the prelims.
Sophomore Jaeden Yburan tied his own school record in the 100 Backstroke at 51.93, which gives him the #6 seed in the final round.
The 200 Free Relay Team of Yburan, Matt Prior, Luke Shea and Fenton swam 1:27.38 and are seeded fourth in the finals. Yburan, Mike Pietrucha, Shea and Fenton have the #6 seed in the 200 Medley Relay with a time of 1:37.60.
Also swimming today were Yburan in the 200 IM (157.63 for 24th place) and Shea in the 50 Freestyle (22.60 for 50th place).
The finals begin at 10 am tomorrow (March 2) at GCIT.
The Seton Hall Prep Basketball season ended at St. Joe's Regional School as they lost 77-67 in the NJSIAA Quarterfinals on Thursday, Feb. 28.
The Pirates got out to a slow start and couldn't quite recover from a 22-8 deficit to start the game. They cut it to five in the fourth quarter, but that was the closest they came to taking a lead in the second half.
The Pirates end the season 19-8, having won 10 of their last 12 games.
Seton Hall Prep Basketball defeated Pingry 65-36 on Tuesday, Feb. 26, behind Senior Ashton Miller's career-high 31 points.
The Pirates advance to the NJSIAA Non-Public "A" Second Round, and currently hold a 19-7 record.
Seton Hall Prep Wrestling set a new school record under Head Coach Jack Decker, sending six wrestlers to Atlantic City to qualify for a State Title.
At 120 junior Larry Melchionda went 4-1 to finish 3rd for his second trip to AC.
Sophomores Conner Decker 132 and Cole Carroll both finished 4th to punch their first ticket to AC.
Junior 170 Mike Massa went 4-1 to finish 3rd to secure his trip to AC.
Senior Niko Diakides fought threw a stacked bracket to finish 3rd and his second trip to AC.
Junior Zach Merlino finished one match shy of AC, going 3-2 and finishing 5th.
Then the surprise of the Region 4 Tournament (not to the SHP staff), Sophomore Jack Wilt stormed into the finals. Jack won his opening bout and then avenged his loss last season to a round of 12 wrestler from Cranford 10-7 for a trip to the finals.
In the finals, Wilt was in a seesaw battle with the defending 4th place finisher in NJ. The match came down to the last 20 seconds and we fell just short of the gold, but everyone took notice of Jack’s performance.
Heading to AC Wednesday, The Prep sends six wrestlers to one of the toughest tournaments in the country. Five of them are returning next year for SHP.
Great Season, Great Region Tournament and great things to come!
Seton Hall Prep Ice Hockey defeated No. 6 St. John Vianney 3-0 in the opening round of the NJSIAA Playoffs on Friday night, Feb. 22.
The Pirates will play Don Bosco Prep Monday at 6pm.
Seton Hall Prep Basketball defeated West Orange 86-66 on Senior Night on Thursday, Feb. 21, 2019.
The Pirates, who started all five seniors on their roster, bounced back from a tough loss to East Side in the ECT Semifinals on Tuesday.
The Seton Hall Prep Basketball team's 10-game winning streak came to an end on Tuesday, Feb. 19, as No. 1 seed East Side defeated the No. 4 Pirates in the ECT Semifinals 73-67 in double overtime at West Orange High School.
The Pirates climbed back from down 10 in the fourth quarter to send it to overtime. Senior Ashton Miller, who led The Pirates with 25 points, sent the game into double OT with a buzzer beater from the top of the key.
In double OT, The Pirates had three players foul out and couldn't keep up with East Side, who pulled away with free throws to get the win.
The Pirates next play Thursday, Feb. 21, at home against West Orange for Senior Night.
Seton Hall Prep Basketball defeated American History 68-50 in the ECT Quarterfinal round on Saturday, Feb. 16.
With the win, The Pirates advance to play #1 seed Newark East Side at West Orange High School in the Semi-final round on Tuesday, Feb. 19.
The Pirates also cracked NJ.com's top 20 poll for the first time in over a month, coming in at #15.
Seton Hall Prep Basketball won their ninth game in a row Thursday night, defeating #12 West Side 84-71 in Newark, NJ.
The Prep was led by Seniors Ashton Miller and Geordan Walker, who scored 23 and 16 points respectively.
The Seton Hall Prep Swim Team lost their first meet of the season on Wednesday, Feb. 13, losing 87-83 to St. Joe's (Metuchen) in the quarterfinal of the NJSIAA Non-Public "A" Tournament.
The Prep swam their fastest meet of the season, and captured eight of 11 first-place finishes. But the superior depth of an inspired Joe's team proved too much in the end.
The Prep opened with a win in the 200 Medley Relay from Jaeden Yburan, Mike Pietrucha, Luke Shea and Roo Fenton in their fastest time of the season at 1:37.01, but St. Joe's took 2-3 to keep the score at 8-6.
Matt Prior won the 200 Freestyle in a personal best 1:46.30, but the Falcons went 2-3-4 to tie the score at 15.
Yburan won the 200 IM for the Prep in 1:57.18, but the squads split the event to keep the score tied at 23.
Fenton paced a 1-3-5 finish for SHP in the 50 free in 21.70, which gave SHP a 4 point lead at 33-29. Shea then pulled off a great upset win in the 100 butterfly in 53.58, but another 2-3-4 finish from St. Joes' tightened the score to 40-38.
SHP would get those two points back in the 100 Freestyle thanks to a 1-3 finish from Fenton (47.96) and Pietrucha for a 49-45 lead. St. Joe's, however, would go 1-3-5 in the next event, the 500 Freestyle, and the score was once again tied at 55.
Jose Rodriguez, Shea, Prior and Fenton would then win the 200 Freestyle Relay in 1:32.01, but again the St. Joe's depth gave them a 2-3 finish, and the Pirates led 63-61 with three events to go.
The 100 Backstroke would swing things in SHP's direction with Yburan winning in 53.17, and the overall SHP 1-3-5 finish gave them their biggest lead of the day at 73-67.
A 2-3-5 finish for the Prep in the 100 Breaststroke kept the lead at 6, 81-75, with only the 400 Freestyle Relay remaining. But the St. Joe's depth would prevail here with a devastating 1-2 finish, enabling them to win the meet at 87-83.
This was the only time that St. Joe's had the lead in the entire meet.
The Pirates end the season at 12-1. The last meet on the schedule is the NJSIAA Individual Event Championships (the "Meet of Champions") on March 2-3.
Seton Hall Prep won their eighth straight game, defeating Barringer 75-58 in the first round of the Essex County Tournament on Saturday, Feb. 9.
The Pirates play West Orange on Tuesday, Feb. 12, before playing in the next round of the ECT next Saturday, Feb. 16.
Seton Hall Prep hosted Candidate's Day for the eighth graders that have been accepted for the Class of 2023.
Families of students were invited to become members of the Thomas Farley Seton Scholars Program and gathered with program advisors, current Scholars and department chairs for breakfast and to hear the story of the highly regarded academic program.
Seton Scholars Brian Axelsen and Anthony Petruzziello spoke about how their decision to accept the invitation to join the Seton Scholars has had an overwhelmingly positive effect on their careers at Seton Hall.
Later in the day, the largest-ever gathering of candidates and their families came together in the Bayley Seton Auditorium for a welcome and introudction to the school's presentation offered to help them make the decision to attend The Prep.
Director of Admission Michael Zinsmeister and Headmaster Msgr. Robert Harahan introduced seniors Nick Diaz, Eric Camacho and Anthony Petruzziello, along with Mothers Auxiliary President Danielle Batanjany, who presented their own Prep stories.
Then the several hundred guests headed to the Dining Hall and gymnasium for individual conversations with teachers, school counselors, coaches, activities advisors and members of the parents organizations.
Enjoy some highlights from a wonderful day.
Seton Hall Prep Basketball extended their winning streak to seven games with a 49-40 win over St. Peter's Prep at the Dan Finn Classic on Feb. 7, 2019.
Ashton Miller led the way with 20 points, eight rebounds and six assists.
Seton Hall Prep Ice Hockey's Thomas Colucci scored his 100th point this season, but he has bigger goals in mind.
Check out the interview with Colucci and hear him reflect on his four-year career as he gets ready for the postseason.
Seton Hall Prep Swimming finished the regular season undefeated after defeating West Orange 107-62 on Tuesday, Feb. 5, at NJIT in Newark.
The 200 Medley Relay Team of Joe Labrador, Mike Pietrucha, Joaquin Quezada and Jaeden Yburan got the ball rolling by winning in 1:49.05.
Senior Jack McGovern followed by winning the 200 Freestyle in a personal best 1:57.62.
Other event winners for SHP included Matt Prior in the 50 Free (23.04), Quezada in the 100 Butterfly (59.38), and Pietrucha in the 100 Breaststroke (1:05.40).
The Prep would also win both Freestyle Relays, with Dylan Negron, Connor Townson, Jack Devilbiss and Roo Fenton winning the 200 Freestyle Relay in 1:39.16, and Yburan, Prior, Luke Shea and Fenton taking the 400 Free Relay in 3:22.02.
The Pirates have a first round bye in the State Tournament, and will host a Non-Public "A" Quarterfinal match on Tuesday, Feb. 12 at NJIT at 4pm against the winner of St. Joseph's Metuchen and Don Bosco.
Seton Hall Prep Basketball defeated East Side 49-45 on Tuesday, Feb. 5.
It was The Pirates sixth straight win and perhaps the biggest, as East Side was ranked in NJ.com's top 20 poll at #4 last week before dropping to #14 this week.
Seton Hall Prep's Jack Wilt, sophomore wrestler, won January's Athlete of the Month!
Wilt went 14-2 in January, including a second place finish in the Sam Cali invitational and first place in the Essex County Tournament!
Seton Hall Prep Ice Hockey defeated Glocuester Catholic 2-1 on Saturday, Feb. 2, behind two goals from Freshman Patrick Zincone.
The Pirates were ranked at #10 in NJ.com's top 20 poll earlier this week, while Glocuester was #6.
The Pirates are next in action on Monday, Feb. 4, against Bergen Catholic.
Seton Hall Prep Basketball defeated Lawrenceville 58-53 Saturday night at The Battle of the Bay in Atlantic City.
It was The Pirates fifth straight win to improve their record to 12-6 on the year.
Senior Guard Ashton Miller led the way with 19 points, including his 1,000th career point for The Prep.
Check out the top 10 plays from the month of January!
Seton Hall Prep Swimming remains undefeated after a 124-34 win over Glen Ridge on Thursday, Jan. 31.
The Pirates also made the NJSIAA Non-Public A Quarterfinal on February 12 at 4 pm at NJIT. Their opponent is yet to be determined.
The Pirates captured 9 of 11 first place finishes today against Glen Ridge. Freshman Dylan Negron won 2 events - the 200 IM in 2:14.92 and the 100 Breaststroke in 1:09.14.
Other winners included Junior Matthew Prior in the 200 Freestyle (1:49.26); Sophomore Jack Devilbiss in the 50 Freestyle (24.36); Sophomore Joaquin Quezada in the 100 Butterfly (1:03.44); and Senior Jack McGovern in the 100 Free in a personal best 54.21.
Prior was joined by fellow Junior Mike Pietrucha and Seniors Luke Shea and Roo Fenton in winning the 400 Freestyle Relay in 3:21.91; Pietrucha, Shea and Fenton joined with Freshman Dom Ancey in winning the 200 Medley Relay in 1:49.72; and Quezada, McGovern, Junior Joe Labrador and Freshman Connor Townson won the 200 Freestyle Relay in 1:42.55.
Next up for the Pirates is the final regular season meet vs. West Orange on February 5.
Seton Hall Prep Basketball defeated West Side Newark, #8 in NJ.com's top 20 poll, by a score of 68-66 on Thursday night.
The Prep was in solid command of the game for most of the second half before a late push from West Side to tie the game at 66-66. Then, Senior Geordan Walker hit two clutch free throws before a big stop at the other end to seal the win.
Seton Hall Prep Bowling came from behind to defeat Livingston 5-2 Thursday at Hanover Lanes, earning the Conference Championship.
Seton Hall Prep Wrestling defeated Verona High School 63-12 on Wednesday night, as Senior Niko Diakides was honored for his outstanding career on Senior Night.
The Prep is next in action Friday, Feb. 1, against Cedar Grove at home.
Seton Hall Prep Basketball won their third straight game, defeating Newark Central 62-47 on Tuesday, Jan. 29.
The Prep jumped out to a 16-2 start and never looked back. Ashton Miller led the way with 27 points, 12 of which came in the fourth quarter.
The Pirates are next in action at home tomorrow, Thursday Jan. 31, against West Side at home (Tracey Gym) at 7pm.
Seton Hall Prep Ice Hockey defeated Millburn High School 4-0 on Sunday, then tied Pope John 2-2 on Monday, Jan. 30.
The Pirates are now 11-6-3 and next play Princeton Day on Jan. 31, away.
Seton Hall Prep Wrestling split their last two matches, defeating James Caldwell 48-25 on Jan. 25, and losing to Pope John 52-15 Monday, Jan. 29.
The Pirates are now 10-3 in regular season competition and 6-0 in Conference play.
Their next match is tomorrow, Jan. 30, against Verona at home (Tracey Gym) at 7pm.
Seton Hall Prep Basketball defeated Payne Tech 55-43 on Saturday, Jan. 26, to improve to 9-6 on the season.
Senior Geordan Walker led the way with 14 points for The Pirates, who led the entire game.
Seton Hall Prep Swimming improved to 10-0 with a 98-72 win over Columbia on Thursday, Jan. 24, at NJIT in Newark.
The 200 Medley Relay Team of Freshman Dom Ancey, Junior Mike Pietrucha, Senior Roo Fenton and Sophomore Joaquin Quezada led off the meet by winning in 1:46.38.
Individual event winners for SHP included Junior Joe Labrador in the 200 Individual Medley (2:16.67), Sophomore Jaeden Yburan in the 100 Butterfly (58.39), Senior Luke Shea in the 100 Freestyle (50.79), Fenton in the 500 Free (5:29.47), Pietrucha in the 100 Backstroke (58.31) and Freshman Connor Townson in the 100 Breaststroke (1:04.42).
The 200 Freestyle Relay Team of Labrador, Senior Jack McGovern, Shea and Yburan also captured a first place in 1:40.42.
Next up for the Pirates is a meet vs. West Orange at Rutgers-Newark on January 29.
The Seton Hall Prep Basketball team bounced back from a tough loss to Immaculate Conception on Tuesday with a big-time win over #15 Union Catholic 64-51 Thursday night at Tracey Gym in West Orange.
Ashton Miller led the way with 25 points (15 in the second quarter), as Geordan Walker added 13 points and nine rebounds to help The Pirates get back on track and improve to 8-6.
Their next game is tomorrow, Saturday Jan. 26, at 1 pm at home against Payne Tech.
Seton Hall Prep Basketball lost to Immaculate Conception 67-64 Tuesday night in a thriller at Tracey Gym.
The Pirates were led by Senior Ashton Miller's 25 points, six assists and five rebounds. Sophomore Michael Curran scored a career-high 22 points.
The Pirates are back in action Thursday night at home at 7 pm.
The Seton Hall Prep Swimming Team won the Essex County Championship for the 22nd consecutive season on Monday, Jan. 21, at NJIT in Newark, NJ.
The meet also determined the Super Essex Conference Champion, which The Prep has now won in each of the ten years of the conference's history.
Senior Roo Fenton led the way in a performance that earned him the Cullen Jones Award as Most Outstanding Swimmer for the third consecutive season.
Fenton won both the 50 and 100 Freestyles in 20.97 and 47.17 respectively, both times being the fastest he has swum for The Prep. He also anchored the winning 200 Medley Relay and 200 Freestyle Relay Teams.
The Medley Relay Team consisted of Sophomore Jaeden Yburan, Freshman Connor Townson, Senior Luke Shea and Fenton, winning in a time of 1:39.52.
The 200 Freestyle Relay was the most exciting race of the day. Junior Matt Prior (22.98), Sophomore Jack Devilbiss (22.70) and Junior Mike Pietrucha (22.77) all swam SHP best times, but still found themselves trailing Millburn going into the last leg.
Fenton would then come from behind to win with a 20.55 split that wowed the crowd.
The total time of 1:29.00 set a new county meet record, previously held by the 2014 SHP team of Justin Dunn, Phillip Jones, Tom Curivan, and Kyle Patterson.
Yburan would also break a record, this time a school record, as he won the 100 Backstroke in 51.93. The previous record of 52.04 was set by Kyle Madley in 2011.
Prior was also an event winner, taking the 200 free in 1:47.20. The 400 Free Relay would give the Prep its 7th win out of the 11 events as Shea, Pietrucha, Prior and Yburan would win in 3:22.26.
Seton Hall Prep Wrestling used a strong semi-final round to propel them to their 4th straight Essex County Tournament championship at South Mountain Codey Arena on Jan. 17-18.
The Pirates came away with 13 medals, 8 finalist, 3 gold and 2 bronze.
The Prep finished with 256 points to West Essex' 238, with Nutley finishing third with 124.
One of the best stories of the tournament came from The Prep's AJ Hinton; Hinton entered the tournament as a 14th-seed and knocked off the three-seed in his first match to put him in the quarter-finals.
Hinton then pinned the sixth-seed, propelling him into the semifinals; he finished third place, scoring 16 team points for The Prep to give them a comfortable margin of victory.
"The great thing about his story is that he told us in practice Wednesday, he was going to do this," said Seton Hall Prep coach Jack Decker in a story with NJ.com. "He was not going to be denied. He's a quiet kid so when he says something like that, you know he's mentally prepared to do that. I'm proud of him."
Cpt. Larry Melchionda won his second ECT title, with Mike Massa and Jack Wilt also taking first place.
Conner Decker, Cole Carroll, Zach Merlino, Drew Mitzak and Niko Diakides all lost close final matches to finish second, while Gabe Jimenez and AJ Hinton came in third.
Freshman Joe Sciarrone finished a strong fourth, with Dean Musialowicz and Aidan Cunningham finishing sixth.
The Pirates are back in action on 1/25 in Caldwell.
Seton Hall Prep Swimming improved to 9-0 on the season with a 121-49 win over James Caldwell High School at The Caldwell Community Center on Wednesday.
The Seton Hall Prep Lacrosse program held their 11th anuual Men's Beefsteak Thursday, Jan. 10, at McLoone's Boathouse in West Orange, NJ.
A sold out crowd of 85 SHP Lacrosse Alumni, fathers and friends came together to break bread and enjoy good fellowship.
Rutgers University Lacrosse Head Coach Brian Brecht was the key note speaker and gave an excellent account of the college lacrosse experience.
He was followed by SHP Alumni father Gus Heningburg, who read a speach written by his son Jules (SHP '14, Rutgers '18).
Jules relocated to San Diego, CA, where he plays for the National Lacrosse League team The Sand Diego Seals. He wrote about the attitude and sacrifices it takes to be a High School and College All-American and play at the professional level.
Seton Hall Prep Swimming came out victorious in a swim meet between the top two teams in the Super Essex Conference on Monday, Jan. 14, at the Clifton Boys and Girls Club.
Both teams came in unbeaten, and each swam their fastest meet of the season. Seton Hall Prep came out on top 103-67.
The SHP 200 Medley Relay of Jaeden Yburan, Mike Pietrucha, Luke Shea and Roo Fenton led off taking first in a season best 1:38.37 to set the fast paced tone; Matt Prior would follow by winning the 200 free in 1:50.02, but Montclair would finish 2-3-4, giving the Prep a 17-13 lead.
The Pirates would go 1-2 in the next two events, featuring Yburan (in 2:01.38) and Connor Townson in the 200 IM and Fenton (in a blistering 21.24) and Shea in the 50 Free, but Montlcair would stirke back with a 1-3-4 finish in the 100 butterfly to pull within 8 at 43-35.
Fenton (47.56) and Pietrucha would get it back for the Pirates with a 1-2 in the 100 Free, and with Prior winning the 500 Free in 4:55.38, SHP led 63-47.
At that point the Pirates began to pull away; Fenton, Jack Devilbiss, Shea and Prior won the 200 Free Relay in 1:31.45; Yburan would win the backstroke in 54.83; Townson (1:02.80) and Pietrucha would 1-2 the 100 Breaststroke, ad Joaquin Quezada, Devilbiss, Prior and Yburan would win the 400 Free Relay in 3:22.13.
It was an outstanding win for The Pirates in the most exciting meet of the season thus far.
Next up for the 8-0 Pirates is Caldwell on January 16.
Seton Hall Prep defeated West Orange 52-51 behind Colin Flaherty's go-ahead three pointer with under 20 seconds remaining in the game.
Seton Hall Prep Ice Hockey lost to Portledge (NY) 7-5 on Monday, Jan. 14, but Senior Thomas Colucci scored his 100th career point as a Pirate.
Aidan D'Urso had a goal and two assists for The Prep, while Alex Kuhtik scored a goal as well.
Seton Hall Prep Bowling dropped their first match of the season, losing 5-2 to Livingston High School on Monday, Jan. 14, 2019.
The Prep narrowly took the first game against The Lancers before dropping the final two, both of which came down to the wire.
Seton Hall Prep's Baseball Program runs an Annual Winter Carnival that provides developmentally challenged friends a fun-filled day.
The Prep's goal is to create many smiles, much laughter and develop friendships.
Check out the video with interviews from Head Coach Mike Sheppard and Seniors Nick Diaz and Nick Maldonado.
Seton Hall Prep Football Head Coach Bill Fitzgerald presented at The American Football Coaches Association Annual Convention in San Antonio, Texas, on Jan. 8.
Every year, the AFCA provides college and high school coaches an opportunity for professional development and networking.
This year, our own Coach Fitzgerald was chosen to speak and spread his knowledge and wisdom in front of a crowd of attendees.
Members of The Prep Soccer team were honored at the 50th anniversary Soccer Coaches Association of New Jersey (SCANJ) banquet held last Saturday, Jan. 6, at the Pines Manor in Metuchen, NJ.
Pictured from left to right: Jason Pereira '20, Aidan Dunphy '20, Lucas Ross '21, Liam Bertrand '19 and Head Coach Marty Berman.
Bertrand made Honorable Mention North Jersey Non-Public A (along with Joe Kearns '19 and Brian Zimmermann '19 who were not pictured).
Pereira made Second Team and Dunphy and Ross made the First Team North Jersey Non-Public A.
The Prep was ranked third in the Soccer Coaches' State Private and Non-Public Schools Poll.
Seton Hall Prep's Wrestling coaching staff was very proud of the effort displayed by The Pirates over the weekend.
Coming off an emotional win over West Essex, The Pirates took on a tough Irvington squad on Friday, Jan. 11, beating them 61-15 before Saturday's showdown with St. Peter's and St. Anthony's (LI) in Jersey City.
The Prep won the first match with a 39-30 victory over a very solid St. Anthony's team.
Then, The Pirates went back and forth with a great Peter's club before falling one match short of topping SPP in a rugged dual meet.
The coaching staff wants to extend their thanks to the wrestling faithful for the large showing in Jersey City over the weekend, as The Pirates resume action Thursday at Codey Arena for the start of the Essex County Tournament.
Seton Hall Prep Swimming improved to 7-0 with a 114-56 victory over Montclair Kimberley Academy on Friday, Jan. 11.
The 200 Medley Relay Team of Sophomore Jaeden Yburan, Freshman Connor Townson, Sophomore Joaquin Quezada and Senior Roo Fenton got things rolling with a winning time of 1:48.99.
Several different Prep swimmers then stepped up to win individual races, with Sophmore Jack Devilbiss winning the 200 IM in 2:13.00, Senior Luke Shea capturing the 50 Free in 22.97, and Senior Mike Ippolito taking the 100 Freestyle in 55.74.
Juniors Mike Pietrucha and Matt Prior joined Yburan and Shea to win the 200 Freestyle Relay in 1:35.11, while Freshman Dylan Negron (59.65 in the 100 backstroke) and Quezada (1:12.74 in the 100 Breaststroke) captured the last individual races of the day.
The 400 Freestyle Relay of Devilbiss, Junior Gage Derr, Freshman Dom Ancey and Junior Joseph Labrador would close the meet by winning their event in 3:40.32.
Next up for the swim team is a meet with Montclair on Monday, Jan. 14, in what should be the most exciting meet of the regular season. The meet gets underway with a warmup at 8pm at the Clifton Boys and Girls Club.
Seton Hall Prep Ice Hockey beat HUN 7-2 on Senior Night on Friday night, Jan. 11, 2019.
Seton Hall Prep Basketball lost to Newark East Side 58-46 on Thursday, Jan. 10, 2019.
The Pirates next play Tuesday, Jan. 15, at West Orange High School at 4pm.
Seton Hall Prep Bowling took care of business Thursday night, beating West Caldwell Tech comfortably at Hanover Lanes in East Hanover.
The Prep will match up against Livingston High School on Monday, Jan. 14, for a big conference match.
Seton Hall Prep Swimming defeated Morristown 124-46 on Wednesday, Jan. 9, to improve to 6-0 on the season.
The Prep broke two school records in the metric distances during the meet.
Senior Roo Fenton set the new record in the 50 meter freestyle, winning the race in a time of 23.90. The previous record had been set in 1994 by Mike Przywozny (24.17). Fenton also won the 100 freestyle in 54.68.
Also setting a new record was Sophomore Jaeden Yburan in a time of 2:09.38, breaking the previous mark of 2:10.09 set by Brandon Wang in 2016.
Yburan would also double by winning the 100 Backstroke in 59.82.
Other winners for the Prep on the day included Junior Matt Prior in the 200 Freestyle (2:02.90), Senior Luke Shea in the 100 Butterfly (59.90), Freshman Dylan Negron in the 400 Freestyle (4:46.61) and Senior Mike Ippolito in the 100 Breaststroke (1:13.39).
The Prep would also capture all three relays. Freshman Connor Townson, Shea, Sophomore Joaquin Quezada and Junior Mike Pietrucha won the 200 Medley Relay in 1:58.89; Yburan, Prior, Shea and Fenton took the 200 Freestyle Relay in 1:40.95; and Pietrucha, Negron, Sophomore Jack Devilbiss and Prior finshed up the day by winning the 400 Free Relay in 4:05.42.
The Prep's next meet is at MKA Friday at 4pm.
Seton Hall Prep Wrestling came back to defeat West Essex 30-22 on Wednesday, Jan. 9, in an intense atmosphere at West Essex High School.
West Essex jumped out to an early 15-6 lead, winning four out of the first six matches.
The Pirates bounced back with back-to-back major decisions from Larry Melchionda and Conner Decker to tighten the score to 15-14.
After West Essex bounced back with a major decision of their own, The Prep's Cole Carol stopped state qualifier Darren Jones 2-0.
Going into the last three matches, trailing 22-17, Jack Wilt brought The Prep within one, then AJ Hinton put The Pirates in the lead 24-22.
Mike Massa put an exclamation point on a big comeback with a 40-second pin to secure the win.
The Pirates are back in action Friday night at home.
Seton Hall Prep Basketball defeated Central HS tonight 52-47.
Seton Hall Prep Swimming won their first meet of 2019, defeating Verona High School 123-43 on Tuesday, Jan. 8, at NJIT in Newark.
Freshman Dylan Negron took two first place finishes for The Prep: the 100 Freestyle (54.01) and the 100 Backstroke (59.84).
Other race winners for The Prep included Sophomore Jaeden Yburan in the 200 Freestyle (200.57), Junior Joseph Labrador in the 50 Freestyle (24.64), Junior Matt Prior in the 100 Butterfly (59.35), and Senior Luke Shea in the 100 Breaststroke (1:04.58).
The Prep also won all three relays: the 200 Medley Relay (Labrador, Sophomore Jack Amoreno, Sophomore Jack Devilbiss and Senior Jack McGovern) in a time of 1:53.48; the 200 Freestyle Relay (Senior Mike Ippolito, McGovern, Devilbiss, and Senior Roo Fenton) in 1:36.96; and the 400 Freestyle Relay (Junior Gage Derr, Junior Asad Holmes, McGovern and Sophomore Alexis Mollet) in 4:00.26.
The next meet for The Pirates is tomorrow, Jan. 9, at Morristown.
Seton Hall Prep Ice Hockey scored six goals in the opening period of a 10-0 win over Bishop Eustace on Monday, Jan. 7, 2019.
After a dominate win at Livingston High School Thursday night, the Seton Hall Prep Wrestling team performed well in the 2nd annual Sam Cali Tournament at West Orange High School on Saturday, Jan. 5.
The tournament featured wrestlers from 36 schools including Blair Academy, Delbarton, Don Bosco, and schools from NY, PA and New England. Seton Hall Prep finished third in the team scoring.
Sophomore Jack Wilt made the finals as a sophomore, finishing 2nd. Juniors Mike Massa and Zak Merlino finished a strong third, and Senior Niko Diakides finished fourth in a loaded 285 weight class.
Next up is an SEC showdown at West Essex Wednesday, Jan. 9, at 7pm. The team hopes for a strong SHP crowd.
Seton Hall Prep Hockey tied Bergen Catholic 2-2 on Friday night, Jan. 4, 2019.
Thomas Colucci scored both goals, one from Ryan Kemp and one from Phil Feinberg.
The Pirates next play on Monday, Jan. 7, vs. Bishop Eustace at home at 4:15pm.
Seton Hall Prep bounced back from their loss to Rutgers Prep with a 48-29 win over Montclair Friday night.
Seton Hall Prep Lacrosse kicked off their Christmas vacation last week with a Team Service Project.
The Prep came together on Saturday, Dec. 22, to bring some Christmas spirit to the men living at the Market Street Mission in Morristown.
The Market Street Mission is a nonprofit organization that has been providing meals, shelter and care for homeless and drug/alcohol addicted men for over 125 years. You can learn more about this incredible organization at www.marketstreet.org.
SHP teammates Ryan Quinn and Matt Douglas headed The Team Service Project by working with the Mission to identify a list of their most needed items and then organizing their teammates in a fun Scavenger Hunt Style Competition through Walmart.
The players were broken up into four-man teams and given customized shopping lists ranging from cereal and ski jackets to denture paste and dress pants.
The players brought a fun, festive spirit to their shopping and a healthy dose of competition since Chipotle Gift cards were donated for the winning team.
Congratulations to Senior Louis Magliaro, Juniors Connell Kumar and Ryan Webber, and Sophomore Miles Nippes for being the first team to find their items and successfully navigate the very busy checkout lines!
With their shopping complete, the team headed over to the Market Street Mission, where they took a tour and learned more about the Mission’s life-saving work.
Without a doubt, the most impactful part of the day was interacting with a past graduate of the program and several of the men currently living at the Mission. Their determination, strength, gratitude and hope despite the challenges they face were truly inspiring.
Thanks to the generosity of Coach Giarrusso and his team, their families and the Pirate Lacrosse Club, the boys were able to donate over $750 in cash and goods to the Market Street Mission. Despite the impressive donation, it’s safe to say the boys got at least as much as they gave.
Seton Hall Prep Wrestling defeated Livingston 47-12 on Thursday, Jan. 3.
Seton Hall Prep Wrestling rebounded from a tough loss to South Plainfield last week, winning all three matches this past Saturday, Dec. 29.
Leading the Pirates with three pins was State Ranked Senior Niko Diakides, Captain Larry Melchionda, Joe Sciarrone, Conner Decker and Mike Massa also went undefeated for the day.
The Pirates are back in action tonight, Jan. 3, at 7pm against Livingston.
Seton Hall Prep defeated St. Joe's (Met.) 6-1 on Dec. 30, 2018, in the Ice Vault Classic in Wayne.
Thomas Colucci scored two goals and recorded an assist to help lead The Prep.
Alex Kuhtik had a goal and an assist in the win. Phil Feinberg, Brendan Waivada and Christopher Kelly also scored. Ryan Kemp and James Gabriel had an assist and Jake Schunke made 22 stops.
Seton Hall Prep Basketball defeated Tower Hill (DE) 54-36 on Sunday night to win the Dave Lewis Memorial Bracket of the Boardwalk Classic at the Wildwood Convention Center in Wildwood.
The Prep was led by Ashton Miller, who finished with 16 points, seven rebounds and three assists.
Senior Geordan Walker added eight points and six rebounds, and Josh Hopson matched his career high with nine points and five rebounds.
Seton Hall Prep Basketball defeated Brandywine High School 77-30 on Saturday, Dec. 29 at The Crest Savings Battle of the Boards at the Wildwood Convention Center.
It was the semifinal round of the Dave Lewis Memorial Bracket at the Boardwalk Classic at the Wildwood Conventional Center.
Geordan Walker led the team with 13 points, while Ashton Miller finished with 12.
Seton Hall Prep Hockey, No. 8 in NJ.com top 20, defeated No. 9 Summit High School 4-2 on Friday, Dec. 28 to improve to 7-3 on the season.
The Prep took scored in each period. Tyler Fogu started it off with a goal in the first, Ryan Kemp scored in the second, and both Harrison Rocheville and Chase Gaudioso scored in the third period.
Summit scored both of their goals with under two minutes to play in regulation.
Seton Hall Prep Hockey, No. 8 in NJ.com's Top 20, improved to 6-3 on the season after back-to-back wins against Indian Hills and Randolph High School.
The Prep defeated Indian Hills 5-2 on Sunday, Dec. 23, behind goals from Thomas Colucci, Tyler Fogu, Anthony Martine and two from Ryan Kemp.
Then, on Thursday, Dec. 27, The Prep defeated Randolph High School, No. 9 in NJ.com's Top 20, 2-1 behind goals from Phil Feinberg and Ryan Rodrigues.
The score was tied heading into the final period, where Rodrigues scored the tie-breaking goal on a rebound of Timothy O'Connell's shot early in the period.
Jake Schunke tallied 25 saves in goal to earn the win.
The Prep will look to improve their winning streak to three games with a game tonight, Dec. 28, against Summit High School at 6:30pm at The Ice Vault in Wayne, NJ.
Seton Hall Prep held their National Letter of Intent & Commitment Ceremony last Wednesday, Dec. 19, as student-athletes from The Prep's Baseball, Lacrosse and Football teams prepare for the next stage of their athletic and academic careers.
Everyone contributed in Seton Hall Prep's big win against St. Joe's (Met.) on Saturday, Dec. 22, as The Prep won 51-48 in overtime.
Seton Hall Prep Swimming improved to 4-0 on the season with a 109-61 win over Livingston High School on Thursday, Dec. 20.
The win over Livingston featured a new school record in the 200 Freestyle Relay. Congratulations to Jaeden Yburan (22.20), Matt Prior (22.19), Luke Shea (21.82) and Roo Fenton (20.97), who set the new record of 1:27.18.
The previous record of 1:27.31 was set in 1991.
The full stat sheet and story from nj.com is here.
Seton Hall Prep Wrestling defeated West Orange 58-15 on Wednesday, Dec. 19, in their home opener of the 2018-2019 season.
The Prep is off to another hot start to the season, finishing second at the Morris Knolls Tournament and defeating Nutley 61-9 on Monday.
The Prep travels to Delaware for The Beast of The East Tournament starting tomorrow, Dec. 21, and going through the weekend.
Seton Hall Prep Swimming won their third straight game to begin the 2018-2019 season, improving to 3-0 on the young season.
The results are linked here.
The Pirates beat Sparta 71-45 in their home opener Monday night, as Pirate Nation enjoyed "Silent Night," waiting until The Pirates scored 10 points to celebrate.
The Pirates next game is Thursday @ Payne Tech.
Seton Hall Prep opened up the 2018-2019 Wrestling season with a strong second place finish at the Morris Knolls Tournament this past weekend, finishing second only to perennial powerhouse South Plainfield.
Leading the way for SHP was Junior Zach Merlino, who took Gold at 182.
Larry Melchionda, Connor Decker, Jack Wilt and Niko Diakides (Niko lost to the defending State Champ) came away with Silver. Drew Mitzak had a great tournament, taking Bronze. Cole Carroll and Mike Massa both finished fourth, with Joe Sciarrone, Aiden Cunningham and Alex Giannagelou going 1-1.
The Pirates will host their first match of the season at home Wednesday vs. West Orange at 7 pm. Go Pirates will have full coverage.
Seton Hall Prep Indoor Track opened it's season Friday, Dec. 14, at Ocean Breeze Athletic Complex in New York City.
Caseem Ankuli DeWitt, Shot Put winner, 51'11"
Tim O'Connor, 5th place, 39'11"
The Pirates are back in action on Dec. 22 at Ocean Breeze for the SEC Championship meet.
Seton Hall Prep lost 56-47 to Immaculate Conception in their season opener Friday, Dec. 14.
Senior Ashton Miller led all scorers with 25 points.
Seton Hall Prep is 4-1 after defeating Mo-Beard Wednesday, Dec. 12, their best start since opening 5-1 in the 2009-2010 season.
Check out the highlights courtesy of Jersey Sports Zone.
The Seton Hall Prep Soccer Program held their end-of-season Banquet on Monday, Dec. 10, where they retired the #4 jersey worn by Billy ('11), Shawn ('16) and Brian ('19) Zimmerman.
Seton Hall Prep Bowling is off to a hot start. Check out the season outlook video featuring interviews from Coach Seann Farrell and a few of the senior bowlers!
Seton Hall Prep's Track & Field team is preparing for another season under Head Coach John Finnegan. Hear from him and some seniors heading into the year.
The First meet is Friday, Dec. 14, as The Pirates will compete in the Essex Invitational @ OBA at 4pm.
The Prep scrimmaged Roselle Catholic on Thursday, Dec. 6, the defending Tournament of Champions.
Seton Hall Prep defeated Millburn High School 121-49 in their season opener on Monday, Dec. 4.
Three freshman swam varsity for the first time: Dylan Negron (200 Free), Connor Townson (200 IM, 500 Free) and Dominic Ancey (100 Back).
The Prep had 3706 Power Points.
The Prep Hockey defeated St. Augustine Prep 3-0 on Monday behind two goals from Thomas Colucci and one from Chris Kelly.
It was the first time SHP defeated St. Augustine Prep since the 2011-2012 season, ending a seven-game losing streak.
Check out some of the highlights, including the first of two goal's from Colucci.
Joe Alexander enters his first season as the Seton Hall Prep's Head Coach of the Swimming team. But he's no stranger of the program.
Alexander's been on the staff for 30 years as an assistant. He knows this program and knows how to win, as he's been a big part of their very successful journey.
Hear what he and Senior Swimmers Andrew "Roo" Fenton and Luke Shea have to say heading into the year.
Seton Hall Prep is getting ready for another season of Wrestling! Hear from Head Coach Jack Decker and a couple Prep Wrestlers ahead of opening day.
Seton Hall Prep Basketball is gearing up for another season. Hear what Head Coach Kevin Williams and Seniors Ashton Miller and Geordan Walker have to say as they prepare for a big year.
Seton Hall Prep Ice Hockey defeated Bergen Catholic 6-2 on Sunday, Nov. 25, at Codey Arena in West Orange in The Pirates opening game of the season.
The Pirates, a young team that graduated 14 seniors last year, got out to a hot start, leading 3-0 after the first period of play.
Senior Thomas Colucci scored twice to lead the way for The Prep, and Freshman Goalie Jake Schunke blocked 21 shots in his Varsity debut.
The Pirates next game is Wednesday, Nov. 28, @ Don Bosco Prep at 7:15 pm.
Seton Hall Prep's Football season ended in Oradell today as they lost to #1 in the state Bergen Catholic in the NJSIAA Quarterfinals.
The Prep got their first playoff win since 2011 and first playoff shutout (17-0) since 1997 against Paramus Catholic last week, but couldn't overcome the #1 team in the state today.
Quarterback Aidan Gilman completed 17-of-28 passes for 127 yards and a touchdown in his final game as a Pirate.
Matt Colantuono caught six passes for 59 yards, while Tim Macko caught seven for 47 yards and the team's only touchdown.
Seton Hall Prep's Soccer season ended Thursday after 100 minutes of play and penalty kicks against #1 ranked Delbarton in the North Jersey, Non-Public A Championship game at Millburn High School.
SHP tied the game at 1-1 before halftime when Joe Kearns found fellow senior Nate Dean for a header with a long throw in in the 39th minute.
The Prep found themselves down again, this time 2-1 late in the second period, when senior defender Jon Ned scored in the 70th minute to score and force overtime. Ned had missed most of the season after suffering an injury on Sept. 15, but came back for this game and played a pivotal role.
The Pirates went on to lose in Penalty Kicks 4-3 against the undefeated Green Wave. It was their first game allowing more than one goal.
Seton Hall Prep Alumni Nick Kriak (class of 2018) earned postseason honors from the Liberty League this week.
The first-year midfielder was named the conference's Rookie of the Year.
"A starter in 11 of the 16 games he played in, Kriak played an important role in the midfield for Hobart. An extremely hard working player, he covered a tremendous amount of ground on both sides of the ball. Kriak's athletic ability and work ethic impacted every game he played in. He is the sixth Statesman to be named the Liberty League Rookie of the Year."
Seton Hall Prep Soccer beat Don Bosco Prep after 100 scoreless minutes and penalty kicks on Monday as Sophomore Goal Keeper Tomas Hut made a key save.
The Prep, #2 seed, advances to the North A State Sectional Final against top-seeded Delbarton on Thursday at 3pm at Millburn High School after beating Don Bosco 5-3 on PKs.
Senior GK Liam Bertrand held Bosco scoreless through regulation and two overtime periods before Hut came in relief to save one of four shots in PKs.
Brian Zimmermann, Joe Kearns, Skyler Storms, Rafael de la Torre and Bobby Smallman (game-sealing PK) all made their penalty shots.
Seton Hall Prep Football had a lot of turnover in the offseason.
It didn't break this group.
The Pirates won their first playoff game since 2011, beating Paramus Catholic yesterday, Nov. 3, 17-0 in the opening round of the NJSIAA Playoffs.
First-year Head Coach Bill Fitzgerald has delivered five wins in his first season at the helm, as The Pirates will now prepare for the biggest test of the season against Bergen Catholic in the second round next weekend.
Seton Hall Prep Soccer lost to Montclair in the Essex County Tournament Final in Penalty Kicks after a scoreless game through regulation and two overtime periods.
The Pirates lost the Penalty Kicks 5-4 to fall just short in their quest to win back-to-back Essex County Championships.
The season isn't over for The Pirates, who will continue play in the NJSIAA Playoffs tomorrow, Monday, against Don Bosco Prep at home (BPT Field, The KAC) in the Semi-Final round at 2pm.
Seton Hall Prep Football will play Paramus Catholic in the NJSIAA Playoffs tomorrow, Nov. 3, at 1pm at BPT Field (The KAC).
Hear from Head Coach Bill Fitzgerald and some key members of The Pirates team before the matchup!
Seton Hall Prep Soccer defeated St. Joe's Regional High School 1-0 on Thursday, Nov. 1, behind Senior Skyler Storms goal in the second half.
The Pirates advance in the NJSIAA Playoffs, but will first concentrate on Saturday's ECT Championship matchup against Montclair at Millburn High School against Montclair at 3pm (Nov. 3).
Senior Quarterback of the SHP Football team Aidan Gilman won Athlete of the Month of October for The Pirates.
Just a little over a decade ago, Rick Porcello was the face of Seton Hall Prep's very successful baseball program. Fast forward 11 years, and he's a World Series Champion.
Porcello started game three of the World Series and played a pivotal role in their postseason run, stepping up as both a starting pitcher and even a reliever along the way.
The coverage for Porcello and the Red Sox has been excellent. Below, I'll link the articles and videos I've found surfacing the web for you to enjoy and share with friends, family and fans. If you find something you want to see added, contact Sports Media Director PJ Candido and [email protected].
The Seton Hall Prep Soccer team is ready for the postseason.
Currently 17-2-2, The Pirates are officially done with regular season competition and are preparing to achieve the goals they set out at the beginning of the year.
The Pirates face St. Joe's Regional HS this Thursday, Nov. 1, in the NJSIAA Non-Public "A" Quarters at 2 pm at BPT Field (The KAC).
They then go on to play in the Essex County Tournament Championship Saturday, Nov. 3, at 3 pm vs. Montclair at Millburn High School. It's The Prep's second consecutive ECT Championship game.
Check out the postseason preview with interviews from Coach Marty Berman, players Aidan Dunphy, Billy Zimmermann, Lucas Ross, Liam Bertrand and more.
Check out the top 10 plays of October in Seton Hall Prep Sports!
Seton Hall Prep Cross Country placed sixth among 19 county competitors in the Essex County Championship on Friday, Oct. 26 at Brookdale Park.
A young and gritty Prep squad led by Junior Colin Schweitzer (6th Place, 16:07- PR) and Sophomore Kevin Harvey (8th Place, 16:14- PR) placed sixth as a team among their 19 county competitors.
With Junior Nolan Orr sidelined with an injury, the Pirates went to the line with six runners focused on taking on their county rivals. Through the first mile, Schweitzer and Harvey came through in 5:01 and 5:02 and were comfortably in the top twenty.
With an eye on the competition, both moved up with each mile, nearly breaking into the top ten by the second mile.
The scoring for the varsity team was rounded out by Junior Brian Phillips (17:33- PR), Sophomore Chris Gizzo (17:38) and Senior Louie Constable (17:59).
For their efforts, Schweitzer and Harvey will both be named First Team All-County.
In other action, the JV team placed a strong third among 14 teams. Scoring for the JV were Sophomore Luke Incardona (4th Place- 17:56- PR), Junior TJ Martynowicz (18:23- PR), Senior Pat Nolan (18:25- PR), Junior Will Spies (18:29- PR) and Junior Will Robinson (18:31- PR).
The Prep's Freshman team ran away with First Place and were led by Anthony Bottino (3rd Place, 18:22- PR), Danny Collum (4th Place, 18:31-PR), Ben Ferrara (5th Place, 18:38-PR), Brady Sheaffer (9th Place, 19:12- PR) and Anthony Urciuoli (10th Place, 19:16- PR).
Pope John used a big second half to defeat Seton Hall Prep 30-20 in the regular season finale, outscoring them 22-3.
Quarterback Aidan Gilman scored two touchdowns, the first being a receiving touchdown from Matt Colantuono, and the second a one-yard rush in the second quarter. Gilman completed 17 passes for 147 yards.
Giye Jenkins had six catches for 61 yards, while Dominic Busby and Colantuono caught a combined eight passes for 67 yards.
Zach Hoban kicked a 42-yard field goal in the fourth quarter for the team's only points in the second half.
The Pirates end the regular season with a 4-5 record as they prepare for the first round of the playoffs against Paramus Catholic next Saturday, Nov. 3.
Seton Hall Prep Soccer defeated Millburn High School 2-0 on Thursday, Oct. 25, to advance to their second straight Essex County Tournament Championship.
Sophomore Lucas Ross scored in the 63rd minute off a beautiful assist from Junior Aidan Dunphy to give The Pirates a 1-0 lead. Dunphy then scored with 12 seconds left to close out the game.
SHP, No. 6 on NJ.com's top 20 poll, will face No. 2 Montclair on Saturday, Nov. 3, at 3 p.m. at Millburn in the ECT Final.
Seton Hall Prep's Cross Country team hasn't competed in a meet since Oct. 6, when they raced in the Brett Taylor Invitational in Mahwah.
The long break was used by The Prep's runners to heal, rest, and prepare mentally and physically for the Essex County Championship meet taking place tomorrow, Friday, Oct. 26, at Brookdale Park.
Head Coach Chris Barnitt said he's really pleased with how The Prep has performed this season, and they should be well prepared for the meet tomorrow.
"I really wanted to lock down a good 2-3 weeks to be able to train," Barnitt said. "We've been able to do some more race-specific training, and we had a lot of tough workouts that really stretched them, but also prepared them for what's to come on Friday at the county championship... I think it was a good couple of weeks to train, focus on conditioning and get us ready to be in race-ready shape."
Junior Colin Schweitzer said they used the break to improve their diets, catch up on sleep, and stay in race-ready shape.
"Going into the meet, I feel confident that our team overall could perform really well," Schweitzer said. "I feel like our squad has shown really strong improvement over the season and I think we could go out there and really compete."
Sophomore Kevin Harvey said the break really helped The Pirates improve their stanima and speed heading into the big meet.
"My goal for the meet is to break 16:30," Harvey said. "Our goal as a team is to finish top 3, and I think the Freshman, JV and Varsity squads all should be able to do it."
Junior Nolan Orr said he also feels confident going into the meet. He said he took advantage of the break by improving his diet, strengething his core, and healing his body from the season.
"I would love to get top 3," Orr said. "But I think we could get first if we all put together a top performance. We're just excited to get out there, compete, and have fun."
Barnitt said The Pirates have a young team, featuring over 20 juniors and over 20 sophomores. He said while the program has a bright future to be excited about, he's even more excited for what's to come tomorrow.
"I'm looking forward to see how they stack up against the competition," he said. "They always show up for the big race... We're hoping for good things."
Seton Hall Prep Soccer improved to 16-2-2 on the season after defeating Kearny 5-1 on Monday, Oct. 22, 2018.
Skyler Storms scored twice, Aidan Dunphy scored and tallied an assist, and Lucas Ross had three assists all in the first 20 minutes of the game.
Dunphy and Brian Zimmermann finished with two assists on the afternoon while Will Monroy and Rafael de la Torre scoreed a goal each.
Liam Bertrand and Tomas Hut had 6 saves each.
The Pirates next play Thursday, Oct. 25, in the ECT Semis against Millburn at Livingston HS.
Seton Hall Prep Soccer defeated Livingston HS 2-0 on Saturday, Oct. 20, in the Qtr. Final Round of the Essex County Tournament.
Sophomore Lucas Ross scored both goals for The Pirates, who next play tomorrow, Monday, against Kearny High School at Harvey Field at 4 pm.
The Prep will continue ECT play Thursday, Oct. 25, at Livingston HS against Millburn.
Seton Hall Prep Football lost to St. Joe's 45-10 on Saturday, Oct. 20, to drop to 4-4 on the season.
Quarterback Aidan Gilman completed 12 of 18 passes for 133 yards and a touchdown.
Dominic Busby caught five passes for 77 yards and a touchdown, while Matt Colantuono caught five for 43 yards.
The Pirates wrap up the regular season at home next week against Pope John at 2 pm.
Seton Hall Prep Soccer defeated Science Park 7-0 Thursday, Oct. 18, in the first round of the Essex County Tournament.
Senior Skyler Storms opened it up with two goals for The Prep, followed by a goal from Junior Aidan Dunphy and one from Sophomore Lucas Ross to close out the half up 4-0.
The scoring continued in the second half with goals from Eddie Neas, Will Monroy and Dylan Perez. Goalkeepers Liam Bertrand and Tomas Hut had a save each.
The Pirates continue ECT play tomorrow, Saturday, Oct. 20, at 2pm against Livingston HS at BPT Field.
Seton Hall Prep Soccer improved to 13-2-2 with a 2-1 win over Monroe on Saturday, Oct. 13.
The Prep took a 1-0 lead in the first half off an own goal. After Monroe tied it at 1-1 in the 2nd half, Sophomore Lucas Ross scored the game-winning goal with just a few minutes to play.
GK Liam Bertrand had 6 saves, and Aidan Dunphy recorded an assist on the Ross goal.
The Prep next plays Tuesday, Oct. 16, against James Caldwell HS at home.
Seton Hall Prep Football's four-game winning streak was snapped yesterday, Oct. 13, as Delbarton's big second half proved to be enough for a 34-17 win over The Pirates.
The Prep held a 17-14 lead in the early stages of the third quarter, but Delbarton responded with 20 unanswered points.
Quarterback Aidan Gilman threw for 130 yards and ran for 79 and two scores. Matt Colantuono had three receptions for 56 yards, while Nicholas Gullace had two catches for 48.
On the defensive side of the ball, Caseem Akinruli Dewitt had four tackles and one sack. Niko Diakides had seven tackles and two sacks.
The Prep next plays Saturday, Oct. 20, at St. Joes at 1pm.
Seton Hall Prep Football won their fourth game in a row, improving their record to 4-2 on the year, with a thrilling 29-28 win over Montclair.
The Prep could have played for overtime by kicking an extra point with under a minute to go in a 28-27 game, but decided to roll the dice and go for two.
It proved to be the right call as QB Aidan Gilman ran it in from the 2-yard line to convert on the two-point play, just moments after throwing the go-ahead 28-yard touchdown pass to Nicholas Gullace.
Gilman completed 18-of-30 passes for 189 yards and a touchdown and added 46 yards and a score on the ground.
Sophomore RB Nazeer Elias carried 32 times for a career-high 152 yards and two touchdowns.
Seton Hall Prep Soccer took their first loss since Sept. 7, losing to Millburn High School 1-0 on Monday.
The Pirates had a chance to tie the game with just over three minutes remaining on a penalty kick, but Millburn GK Zach Barr made his best save of the day to save the game.
Millburn scored in the 16th minute off a header from Alex Marx. That would be the only goal of the game as SHP GK Liam Bertrand finished with 4 saves, and Barr with 6.
Seton Hall Prep Soccer bounced back with a dominate 6-0 win over Belleville at BPT Field on Wednesday.
The Prep filled up the box score. First it was Rafael de la Torre with a goal from Lucas Ross to take a 1-0 lead, then it was Will Monroy scoring off a pass from Brian Zimmermann. That gave The Prep a 2-0 lead heading into halftime.
In the 2nd half, Aidan Dunphy, Lucas Ross, Brian Zimmermann and Ben Chambeau each scored to give The Prep a 6-0 win.
Nate Dean and Dylan Perez each finished with an assist as well.
Liam Bertrand, Nick Hiel, Tomas Hut and Anthony Petruzziello each finished with saves for The Prep, who didn't allow a goal.
Seton Hall Prep next plays tomorrow night, Oct. 13, at Monroe at 7pm.
Seton Hall Prep Soccer bounced back with a dominate 6-0 win over Belleville at BPT Field on Wednesday, Oct. 10.
Seton Hall Prep next plays Saturday night, Oct. 13, at Monroe at 7pm.
Seton Hall Prep Soccer took their first loss since Sept. 7, losing to Millburn High School 1-0 on Monday, Oct. 8 at BPT Field.
The Prep, No. 4 in NJ.com's top 20 poll, went 10-0-2 in their 12-game unbeaten streak. They will look to bounce back against Belleville at home Wednesday, Oct. 10, at BPT Field at 4 pm.
Seton Hall Prep could have played for overtime by kicking an extra point with under a minute to go in a 28-27 game on Saturday, Oct. 5, against Montclair.
First-year Head Coach Bill Fitzgerald decided to roll the dice and go for two, and it proved to be the right call in a 29-28 win over Montclair.
Quarterback Aidan Gilman ran it in from the 2-yard line to convert on the two-point play, just moments after throwing the go-ahead 28-yard touchdown pass to Nicholas Gullace.
Montclair took their first lead of the game, 28-21, with 1:29 to play. The Pirates then went on a 5-play, 80-yard touchdown drive in under a minute to reclaim the lead. The Pirates' defense then finished the job.
The Pirates improved to 4-2 on the season and have now won four games in a row for the first time since 2013. They play Delbarton next Saturday, Oct. 13, at Delbarton's home fied.
Another great week for The Prep sports as we headed into the month of October. Let's recap it.
Soccer and Football both had impressive road performances on Saturday.
Soccer traveled to CT to play one of the best high school soccer programs in the nation, South Kent, and played a very competitive 90 minutes. They drawed 0-0.
Football defeated East Orange in East Orange by the score of 20-14. It was another collective effort from The Pirates to earn their third straight win, blocking a punt for a touchdown, forcing three turnovers, and scoring on offense twice. The Pirates are now 3-2 headed into their homecoming game against Montclair tomorrow, Oct. 6, at BPT Field at 2 pm.
Soccer took care of business in Verona, winning 3-0 off two goals from Senior Skyler Storms and one from Sophomore Lucas Ross.
Cross Country played second in the SEC Championship meet on Wednesday as three runners placed in the top 10.
They compete tomorrow, Oct. 6, at the Brett Taylor Inivitational.
Soccer defeated West Orange 3-0 to improve to 11-1-2 on the season. Skyler Storms, Brian Zimmermann, and Lucas Ross each scored in the second half.
Soccer nexts plays against Millburn Monday, Oct. 8, at BPT Field at 4pm.
Seton Hall Prep Soccer improved to 11-1-2 on the season with a 3-1 win over West Orange on Friday, Oct. 5.
After a scoreless first half, The Pirates scored three goals in the final 40 minutes.
Brian Zimmermann, Skyler Storms and Lucas Ross each scored a goal, while GK Liam Bertrand had 5 saves.
The Pirates next game is Monday against Millburn at 4pm.
Seton Hall Prep Cross Country took on an evenly matched field of competitors and placed second behind Montclair in the Conference Championship at Branch Brook Park Wednesday, Oct. 3.
Junior Nolan Orr was among the leaders who clocked a 5:05 first mile, while the other runners ran aggressively and battled a sea of blue from Montclair and Millburn.
At the finish, The Prep placed three runners in the top ten. Orr (4th in 16:57), Sophomore Kevin Harvey (7th in 17:09, Branch Brook PR) and Junior Colin Schweitzer (8th in 17:18, Branch Brook PR). All three runners will receive All-Conference recognition for their efforts.
Sophomore Chris Gizzo (18:20 - PR) and Senior Louie Constable (18:32) rounded out the scoring for the afternoon.
Cross Country will compete next this Saturday, Oct. 6, in the Brett Taylor Invitational at 9am at Darlington County Park in Mahwah.
Seton Hall Prep is 10-1-2 on the season. Check out their midseason highlight video!
Seton Hall Prep Soccer improved to 10-1-2 on Tuesday, Oct. 2, when they beat Verona High School 3-0.
Senior Skyler Storms had the first two goals for SHP, and Sophomore Lucas Ross had the other off a penalty shot.
Soccer's next game is Friday at West Orange High School, 4pm.
Seton Hall Prep Football is 3-2 heading into their homecoming game against Montclair Saturday, Oct. 6, at 2pm. Check out some highlights from the first five games!
Seton Hall Prep beat East Orange High School on Saturday, Sept. 29, 20-14 to win their third straight game. They're now 3-2 on the season.
The Prep's special teams got their second touchdown of the season, and it was a big one. Vin Henrich blocked a punt and Andrew Mitzak picked it up and returned it for a touchdown to give The Pirates a 7-0 lead.
Quarterback Aidan Gilman got it done on the ground and through the air, rushing for 57 yards and a touchdown and throwing for 85 yards and a score to Giye Jenkins.
Ryan Monteleone had seven tackles and two interceptions, while Foster Bryant finished with 12 tackles and a fumble recovery.
The Prep hosts Montclair this Saturday, Oct. 6, at 2pm.
South Kent is one of the best high school soccer programs in the entire nation, but Seton Hall Prep was ready for the challenge on Saturday, Sept. 29, when they traveled to Connecticut and played a very competitive 90 minutes of soccer.
South Kent, 2015 and 2016 Top Drawer Soccer HS National Champions, have athletes from Guatemala, Bermuda, Argentina, Ghana and Czech Republic, to name a few. The Prep didn't back down from the top-level competition.
The match was played by college and professional standards -- two 45-minute halves (No Overtime periods). Both teams had multiple scoring chances, but both defenses stepped up and didn't allow a goal in the full 90 played. The game finished with a 0-0 draw.
Liam Bertrand finished with five saves for The Pirates, who are now 8-0-2 in their last 10 matches. South Kent Goalkeeper Hunter Kochiss had six stops.
The Pirates, no. 6 in NJ's top 20, next game is against Verona Tuesday, Oct. 2, in Verona at 4pm.
Seton Hall Prep had another big week in sports. Let's recap it.
Seton Hall Prep Football got their second win in a row in a thrilling game against Paramus Catholic.
Quarterback Aidan Gilman totaled over 180 yards and 3 touchdowns as The Pirates won 37-29, scoring over 35 in back-to-back wins.
Matt Colantuono had two touchdowns, one that came in the fourth quarter with The Prep up 30-29. He finished with 60 yards rushing, 77 receiving yards and one touchdown on the ground and one in the air.
RB Luca D'Emilio added 70 yards and a touchdown on 15 carries.
Junior Dominic Busby was everywhere on the field, tallying 5 catches for 46 yards, an interception and a tackle-for-loss.
Soccer had it's first draw of the season against West Essex in a game that went a full 100 minutes of play.
Although the Pirates controlled the ball and out-shot West Essex by a large margin, the game ended in a tie after two 10-minute overtime periods.
Goalkeeper Liam Bertrand had four saves.
Cross Country competed in their final regular season conference race against Newark Academy and Bloomfield in a torrential downpour at Branch Brook Park, in Newark.
The Prep runners trudged through many flooded portions of the course. They held strong through the second mile but Newark Academy was able to insert extra bodies before The Prep's top five to pull off a 25-30 victory.
The Prep defeated Bloomfield 21-38 to finish their regular season competition with seven (7) wins and two (2) losses, and in second place behind Millburn.
The team was led by Junior Nolan Orr (17:24) who ran comfortably and uncontested up front. Additional scorers for The Pirates were Sophomore Kevin Harvey (18:26), Junior Colin Schweitzer (18:52), Junior Brian Phillips (19:16) and Senior Louie Constable (19:23).
Seton Hall Prep Soccer improved their record to 9-1-1 with a 3-0 win over James Caldwell High School.
Aidan Dunphy, Owen Stahl and Lucas Ross each had a goal as Liam Bertrand finished with five saves and 0 goals allowed.
The Pirates face South Kent (CT) Saturday, Sept. 29, in a huge game between two of the nation's best.
Soccer Forward Lucas Ross won Athlete of the Month after a tremendous September. He's accounted for 19 goals (11 goals, 8 assists) as The Pirates still have one more game to play this month.
The full story is linked here with video interviews from Ross himself and Head Coach Marty Berman, in addition to quotes from Asst. Coaches David Snyder, Matt Berman and Director of Athletics Larry Baggitt.
Lucas Ross' month was one to remember.
The sophomore Forward for Head Coach Marty Berman's Soccer team has been lights out in his first full month playing on the varsity level. As of Friday, Sept. 28, Ross has 11 goals and eight assists with one game still left to play (South Kent, Saturday, Sept. 29). The Pirates are 9-1-1.
Ross said his teammates have helped bring him success, and he's enjoying the brotherhood that's blossomed along with it.
"Everyone's really determined and motivated to win," Ross said. "Everyday I look forward to practice or a game because everyone helps out and wants to play as a team."
Berman, who's in his 33rd year as Head Coach at SHP, said Ross has been everything they expected and more.
"We knew from last year when he had such an explosive season on the freshman level that he would definitely be a starter and a factor in our offense this year," Berman said.
Ross had 37 goals as a freshman, a school record. Berman said he has the ability to do something spectacular everytime he touches the ball.
"You never know when you'll see him get off a shot or do something that makes you say 'wow,'" he said.
Assistant coaches David Snyder and Matt Berman echo the praise given from Coach Berman. Snyder said Ross has two incredibly powerful feet, is good in the air, and never quits, in addition to being completely sportsmanlike and respectful to coaches and referees.
"We really admire and respect how much Lucas wants to improve," Snyder said. "The kid just has a passion to learn and improve all the time. As well as he's been playing, we haven't seen the end of his dominance."
Matt Berman said what's most impressive to him is how much Ross is willing to soak up information from coaches and adapt to play on a varsity level at such a young age. He also pointed out Ross' ability to thrive in big moments.
"He has a clutch gene that's honeslty impossible to coach," Berman said. "When someone has it, you have to cherish it and enjoy watching it come to fruition. His talent level is phenomenal and he's had tremendous success contributing to the team."
Director of Athletics Larry Baggitt said he's not surprised by Ross' success on the varsity level after watching him play as a freshman.
"His presence on the field is immediately noticable," Baggitt said. "Everybody around him, because of his actions on and off the field, believes he belongs there. And he does."
Ross still has lots of soccer to play and more goals to score. But winning with his team is his number one priority.
"I want to get more wins, win a state championship and grow closer to the team," he said. "I understand the brotherhood here; everyone's determined to win."
Seton Hall Prep Soccer improved their record to 9-1-1 on Thursday, Sept. 27, with a 3-0 win over James Caldwell High School.
The Pirates face one of their toughest competitors of the season Saturday, Sept. 29, when they travel to South Kent for a 2:30 pm matchup.
The Seton Hall Prep Cross Country team competed in their final regular season conference race against Newark Academy and Bloomfield on Tuesday, Sept. 25, in a torrential downpour at Branch Brook Park.
A convival and playful spirit at the starting line turned into a heated competition on the trails as The Prep runners trudged through many flooded portions of the course in Newark, Head Coach Chris Barnitt said.
The Prep held strong through the second mile, but Newark Academy was able to insert extra bodies before The Prep's top five to pull off a 25-30 victory.
The Pirates will travel to Carlisle, PA, this weekend to participate in the Carlisle Invitational and look forward to a competitive Conference Championship next Tuesday, Oct. 2, at Branch Brook Park.
Seton Hall Prep soccer faced West Essex Monday, Sept. 24, in a game that went a full 100 minutes of play.
The game ended in a 0-0 draw after two 10-minute overtime periods despite The Prep controlling the ball and taking many more shots than their opponent.
West Essex Goalkeeper Ryan Leach finished with 13 saves, as SHP GK Liam Bertrand had four.
The Prep will play Caldwell HS at home (BPT Field) Thursday, Sept. 27, at 4pm.
Seton Hall Prep Football defeated Paramus Catholic 37-29 on Saturday, Sept. 22, for their second win in a row.
Quarterback Aidan Gilman totaled over 180 yards and 3 touchdowns as The Pirates scored over 35 points for the second straight week.
Matt Colantuono had two touchdowns, one that came in the fourth quarter with The Pirates up 30-29. He finished with 60 yards rushing and 77 receiving yards.
Luca D'Emilio added 15 carries for 70 yards and a score.
Junior Dominic Busby had five catches for 46 yards, and added an interception and tackle-for-loss on the defensive side of the ball.
The Pirates will play at East Orange HS next Saturday, Sept. 29, at 1pm.
Sept. 21: Friday, the Soccer team picked up their 7th straight win as they defeated Columbia 2-0 behind goals from Aidan Dunphy and Nate Dean.
The Pirates Soccer team has now won seven straight games after defeated Columbia on Friday, Sept. 21, 2-0.
After a scoreless first half, The Pirates got on the board with an Aidan Dunphy goal off an assist from Lucas Ross.
Nate Dean scored shortly thereafter to make it 2-0.
The Pirates are now 8-1 and prepare for a home game against West Essex on Monday, Sept. 24, at BPT Field (the KAC).
The Seton Hall Prep Cross Country team ran with confidence as they swept yesterday's conference competition at Branch Brook Park in Newark, New Jersey.
They were victorious over Livingston (19-42) and over Columbia, who did not field a team.
The Prep showed promise as they head into a busy schedule later this month and heading into October, as The Carlisle Invitational is set for Sept. 29 and the Conference Championship on Oct. 2.
Junior Nolan Orr (16:40) continued a three-week string of time drops, winning the race after an early challenge from Livingston's top runner Philmon Mehari.
Rounding out the scoring were solid performances from Junior Colin Schweitzer (17:56), Sophomore Kevin Harvey (18:17), Sophomore Chris Gizzo (18:23) and Junior Brian Phillips (18:33).
Sophomore Luke Incardona (19:10), Senior Gus Kern (19:11), Senior Louie Constable (19:17), Sophomore Mike Lazzari (20:10-PR) and Sophomore Rhys Williams (20:17-PR) completed the varsity line-up.
Cross Country will race tomorrow, Sept. 22, at the Bernie Magee Class Meet at Greystone Park at 9am.
Seton Hall Prep Soccer won their sixth game in a row on Tuesday, Sept. 18, as they defeated East Side (Newark) 3-1 behind two goals from Lucas Ross and one from Nate Dean.
The Pirates took a 1-0 lead in the first half off a goal from Senior Nate Dean.
Lucas Ross put them ahead 2-0 with a goal in the second half, then East Side cut the score to 2-1 with a goal of their own.
Ross put the game away with a Penalty Kick goal late in the second half to make the score 3-1.
The Pirates have now won six straight games and look to continue their winning streak Friday at Columbia at 4pm.
Seton Hall Prep Soccer took care of business this past weekend as they improved their record to 6-1 after winning three games in four days.
The Pirates, winners of five straight, faced a tough four-day stretch that included away games at Livingston, MKA and Delran (PA). They scored eight goals and let up only one as they sweeped all three opponents.
Against Livingston, Nate Dean, Aidan Dunphy and Brian Zimmermann all scored a goal each in a 3-1 win.
At MKA, in a 2-0 win, Jason Pereira and Lucas Ross scored a goal each.
To cap it off against Delran at the Mainline HS Jamboree at the United Sports training Center in Downington, PA, Brian Zimmermann, Brandon Real and Lucas Ross each scored in the 2nd half to lead the Pirates to a 3-0 victory.
Seton Hall Prep now prepares for East Side (Newark) today, Sept. 18, at 4pm at BPT Field.
They then play Columbia HS at Underhill Field Friday, Sept. 21, at 4pm.
Seton Hall Prep hit on all three phases of the game Friday night in a 42-20 win over Passaic County Tech Institue (PCTI) in Wayne, New Jersey.
First-year Head Coach Bill Fitzgerald got his first win as The Pirates' saw offensive, defensive and special teams touchdowns.
Quarterback Aidan Gilman had two rushing touchdowns and Running Back Luca D'Emilio added one as The Pirates' offense moved the ball successfully pretty much all night.
The Pirates' defense racked up 5 sacks, an interception returned for a touchdown, and a fumble recovery.
Dominic Busby blocked a punt that landed in Nick Eliades' hands for a touchdown as The Pirates clicked on all three phases of the game.
The Prep's next game is Saturday, Sept. 22, against Paramus Catholic at home (BPT Field).
Seton Hall Prep scored three unanswered goals to defeat Livingston High School 3-1 on Thursday, Sept. 13, as Head Coach Marty Berman recorded his 450th career win in his 33rd year.
Livingston took an early 1-0 lead on an own goal in the first two minutes of the game, but it was all Pirates after that.
Nate Dean scored with 10 minutes remaining in the first half to tie it up going into halftime. After the break, The Pirates scored two more goals to put the game away.
Brian Zimmerman gave The Prep the lead off a rebound from a Jason Pereira shot, then Aidan Dunphy scored The Prep's third and final goal with just over 17 minutes left in the game.
The Pirates have now won three straight games as they head into a busy weekend that includes traveling out of state. They play Montclair Kimberly Academy on Saturday, then travel to Pennsylvania for a match against Delran on Sunday.
Seton Hall Prep Cross Country defeated West Orange (26-30) and Verona (19-38), but fell to Millburn (32-27) on Wednesday, Sept. 12 at Branch Brook Park in Newark, NJ.
The Prep was led by a strong three-person front headed by Junior Nolan Orr (2nd - 16:51), Sophomore Kevin Harvery (3rd - 17:48) and Junior Colin Schweitzer (4th - 17:49).
Scoring was rounded out by Sophomores Luke Incardona (19:17) and Chris Gizzo (19:29).
The Cross Country team is now 4-1 in conference competition and will resume regular season competition next Thursday, Sept. 20, when they meet against Livingston and Columbia at Branch Brook Park at 4pm.
A great man close to the hearts of many has passed away.
Corey Felton, 47, a former Seton Hall Prep (SHP) football coach and a great friend of many current staff members, passed away on Monday, Sept. 10, 2018.
Felton attended Columbia High School and Delaware State before serving as a defensive line coach for Columbia in the late 1990s and then Seton Hall Prep in the early 2000s.
Mark Smith, Dean of Men at SHP, had the pleasure of coaching Felton at Columbia before coaching with him at both Columbia and The Prep. Smith said Felton was a loving man who made everyone he came in contact with smile.
Larry Baggitt, The Prep’s Director of Athletics, was the Athletic Trainer when Felton came on SHP’s football staff. He said it was an easy transition for Felton, who the players absolutely loved playing for.
Felton coached at The Prep for five years, but his love, passion and intensity for life and football has remained strong in the hearts of those he came in contact with at SHP over the years.
Services for Felton will be held at Imani Baptist Church on 113 Elmwood Ave in East Orange, NJ. The viewing is Friday, Sept. 14 from 4-8pm and going home services are Saturday, Sept. 15 from 9-11am.
For more info, call Perry’s Funeral Home at 973-824-9201.
Seton Hall Prep Soccer bounced back from their overtime loss to Montclair with two straight wins over Westfield and Trenton (Sept. 10, 5-1).
The Prep defeated No. 18 Westfield 4-3 on Saturday, Sept. 8, after trailing 2-0 early in the first half. The Prep scored four of the last five goals to win the game, three of which came off the foot of Sophomore Lucas Ross.
The Prep then defeated Trenton 5-1 on Monday, Sept. 10, thanks in large part to a dominating four-goal first half. Lucas Ross, Aidan Dunphy, Skyler Storms, Dylan Perez and Nate Dean all scored a goal.
The Prep sits at 3-1 heading into a busy weekend in which they'll play three games in four days starting Thursday at Livingston. The Prep then plays at Montclair Kimberly Academy on Saturday before traveling to Pennsylvania on Sunday to play Delran High School at The United Sports Training Center.
Seton Hall Prep Football lost their home opener to DePaul Catholic 49-3 on Saturday, Sept. 8, in West Orange.
The Spartans, no. 3 in NJ.com's top 20 poll, were too much for The Prep to handle. Highlighted by Penn State commit Ta'Quan Roberson (QB) and Ohio State commit Ronnie Hickman (WR), DePaul's offense is simply one of the best in the state. They showed why on Saturday.
The Prep's three points came from Senior Kicker Zach Hoban, who hit a school-record 52-yard field goal (shown in above highlights). Quarterback Aidan Gilman was 10-for-16 throwing with 63 yards, while Matt Colantuono caught six passes for 36 yards.
The Prep travels to Wayne on Friday night for a matchup against Passaic Co Tech Institute at 6 p.m.
The Seton Hall Prep Cross Country team opened up their season with a strong showing against Montclair and Montclair Kimberly Academy (MKA) Friday, Sept. 7 at Branch Brook Park in Newark, NJ.
The Prep came out on top with a 25-31 win over Montclair and a 18-40 win over MKA.
The Prep was led by Junior Nolan Orr, who comfortably won the race in a time of 17:01.
The strong team effort was secured by Junior Colin Schweitzer in 17:30 (4th overall), Sophomore Kevin Harvey in 17:35 (6th overall), Sophomore Chris Gizzo in 18:30 (8th overall), and Senior Gus Kern whose 18:39 9th Place finish was critical to the team’s success.
Luke Incardona, Brian Phillips and Louie Constable rounded out the Varsity squad. The team average of 17:51 was the fastest team average on the day.
The team’s next conference competition will be on Wednesday, Sept 12, against West Orange, Verona and Millburn.
Seton Hall Prep’s Cross Country program is growing every single year, and Head Coach Chris Barnitt is excited about the youth he has on his roster this season.
Barnitt said there are 70 runners on the team, most in school history. He said he’s excited to see what they can do this season with a group of guys that will be lead by mostly sophomores and juniors.
The Pirates two fastest runners going into the season are Nolan Orr (junior) and Kevin Harvey (sophomore).
Orr said he’s excited to get out there and start winning races.
Harvey said he expects The Pirates to have a great season despite having a young team.
The Prep runs in the American Division of The Super Essex Conference and competes on the conference, County and state levels. Barnitt said they are going to cut back on weekend invitational races early in the season so that they’re ready for Conference and County Championship play in late September and October.
The Pirates finished in third place in last year’s conference championship race, behind Montclair and Columbia. They finished third in the county championship behind Benedict’s and Montclair.
Barnitt is confident despite a young team that leaves behind two graduates that are competing at the collegiate level.
It all starts on Thursday, Sept. 6, when The Prep opens up their season at Brand Brook Park at 4 p.m.
Seton Hall Prep Soccer survived a scare in their season opener Tuesday, Sept. 4, at BPT field.
The Prep, ranked no. 2 in NJ.com's top 20 poll, scored two late unanswered goals against Nutley; one to even the score before the end of regulation, and one to win the game in overtime with three minutes remaining in the first of two 10-minute extra halves.
The game-winning goal came off the foot of Sophomore Lucas Ross on an assist from Christopher Angermund. Aidan Dunphy evened the score at 3-3 with his goal in the 31st minute of the second half of regulation.
Ross and Dunphy finished with two goals each.
The Pirates will face Montclair Thursday, Sept. 6, at BTP Field in West Orange.
Make no mistake about it: Seton Hall Prep Soccer is one of the best programs in the nation, and their goals are set high for the 2018 season kicking off today, Sept. 4, 2018.
Head Coach Marty Berman knows they have to take it game-by-game before The Pirates can achieve their final goal. He thinks his team is ready for the tough schedule this season presents.
"Our depth is going to be key, because it's a brutal schedule," Berman said. "I think we're going to have a lot of speed up front... I think that's going to help us have a varied attack."The Pirates are coming off a 2017 season many would call successful, finishing with a 21-3 record that included SEC and ECT Championships.
But to them, and especially their senior leaders, they aren't satisfied without a Non-Public A State Title.
The Pirates are lead by seniors Jon Ned, Liam Bertrand, Brian Zimmerman and Joe Kearns. While they're all aware of the brutal schedule and long season ahead, they all share the same common goal.
"We have to stay focused, because every team is going to be a challenge for us," Bertrand, the team's Goal Keeper, said. "If we take it game-by-game, get better every week, and we should be alright."
"A nice ring would be awesome," Ned said.
"We want to go all the way this year," Kearns said.
"No matter who we play, we have to focus on the game in front of us," Zimmerman said.
The Pirates will have tough matchups throughout the year playing in Essex County, but they also play some extremely difficult out-of-conference opponents, such as Delran, South Kent (Conn.), and Westfield.
Assistant Coach David Snyder acknowledges these new opponents, and he thinks The Pirates are well-equipped to handle the challenge.
"It's a pretty loaded schedule," Snyder said. "The good thing is, we can go well into our bench this year... We can still come at you and bring some guys off the bench to give us the energy our team needs in critical spots without suffering a massive dropoff."
Assistant Coach Matt Berman said the team will need to stay consistent throughout the year, and he believes they have the right type of leaders to do so.
"The guys have seen the correct way to do things through a strong culture of a program," Matt Berman said. "They're excited and ready to lead and pass those traditions down by being an extension of the coaching staff."
The Pirates have a long way to go before reaching their goal, and it starts today, Sept. 4, against Nutley High School.
The Seton Hall Prep Pirates traveled to Springfield, Pennsylvania for their first out-of-state football game since 1999. Senior Captain and Quarterback Aidan Gilman threw three touchdown passes for The Pirates, who lost 54-28 in the Philadelphia-North Jersey Challenge played at Cardinal O'Hara High School.
The Pirates quickly found themselves down 7-0 after giving up a 75-yard touchdown run on the opening drive of the game. They responded back with a 65-yard touchdown pass from Gilman to Nicholas Gullace on their first offensive play of the season to even the score.
Archbishop Carroll scored three unanswered touchdowns to take a 28-7 lead into the halftime break before The Pirates cut the score to 28-14 on Luca D'Emilio's 1-yard touchdown run in the third quarter.
With just over eight minutes remaining in the game, The Pirates cut the deficit to 13 after Junior Dominic Busby reeled in a 22-yard touchdown pass from Gilman to make the score 41-28. Archbishop Carroll scored on their following two possessions, which put The Pirates away.
Gilman finished completing 17-of-37 passes for 260 yards and three touchdowns; one to Tim Macko, one to Busby and another to Gullace.
The Pirates will face DePaul Catholic at home Saturday, Sept. 8 at 2 p.m. at BPT Field.
Seton Hall Prep Football is set to kickoff the 2018 season against Archbishop John Carroll High on Friday, Aug. 31, in Radnor, Pennsylvania. The Pirates look to rebound from a 2-8 campaign in 2017, but it won’t come easy against a very challenging schedule in the Super Football Conference.
The Pirates are lead by first-year Head Coach, Bill Fitzgerald, who spent the last 10 seasons in Jersey City with St. Peter’s Prep. Fitzgerald is ready for the challenge ahead, but knows he has work to do to get this program where he wants it to be.
With Fitzgerald comes new assistant coaches Ed Stinson, Scott Shepherd, Tony Woods, Tom Falato, and John Peluso, a deep and highly respected staff that joins Chuck Granatell, Max Ruiz and John Merklinger. Senior Captain and Quarterback Aidan Gilman, who’s committed to Brown University, likes what he’s seen from the new staff.
The Pirates will face familiar foes in DePaul Catholic (home opener Sept. 8), Paramus Catholic, Montclair, Delbarton and Pope John XXII this season. Added to this year’s schedule are teams like Passaic County Tech, East Orange and Archbishop Carroll. Fitzgerald said they’re up for the challenge.
“Keeping the team ready every week goes back to what we’ve done since January through August, including in the weight room with Coach (Max) Ruiz, who’s just phenomenal,” he said. “The staff has done a great job in the summer and in training camp to prepare the guys."
Tony Woods was the first New Jersey football player to ever be selected in the first round of an NFL draft. The former linebacker/defensive end was selected with the 18th overall pick of the 1987 draft by the Seattle Seahawks, where he played six seasons. He then played one season for the Los Angeles Rams before ending his 10-year career with the Washington Redskins for three seasons. Woods attended The University of Pittsburgh, where he earned All-American honors his senior season. He attended Seton Hall Prep from 1979-1983 and was a key component of The Pirates' 1981-1982 state championship team (11-0). Woods was born in Newark, New Jersey. He has two sisters and one brother, Darrell, who also attended Seton Hall Prep. After retiring from football, Woods helped coach at West Side High School and then William Paterson University. He's now apart of the coaching staff at Seton Hall Prep, where it all started.
1. After a very successful career, how did you end back up at Seton Hall Prep?
2. How did Seton Hall Prep, on and off the field, help prepare you for your future?
“It was a great opportunity…Once I got here, I found out about the tradition, Coach Verducci, and the program that we had here. It was tough, hard-nosed football, very successful, #1 in the state with a lot of state champions, so I was able to help add to that. Plus just being here, an all-boys school, taught me to come from a boy to a man; it taught me a lot of things that are helping me out right now."
3. What’s the defining moment of your career?
"The defining moment is probably the state championship that we won. We lost my sophomore year at the meadowlands, and then my junior year we had the chance to play Bergen Catholic again (in the championship). We had the opportunity to play at the meadowlands or play at home, and we decided to play at home. We went undefeated, we were 11-0, and beat them for a state championship… that was the defining moment."
4. Do you have a “funniest moment” of your four years at Seton Hall Prep?
5. Any advice for future Seton Hall Prep students?
After 30 very successful years, Randy Schweitzer has decided to resign as Head Coach of the Seton Hall Prep swim team.
Coach Schweitzer first took the helm for the 1988-89 season after a 5 year run as Assistant Coach. During his tenure, the team had a 370-40 dual meet record, won the last 21 consecutive Essex County Championships, and also won 16 Iron Hills Conference and 9 Super Essex Conference Championships during his tenure. All in all, SHP won 46 of 48 county or conference championships for which a team champion was recognized. The team also qualified for the state tournament in all 30 seasons, making the group final in 2003, 2008, 2009, 2013 and 2016.
Coach Schweitzer also coached 4 individual event champions – the 1991 200 Freestyle Relay Team of John Mitzak, Josh Bischoff, Scott DiGiacomo and Derek Fogg; 100 Freestyle Champion Mike Przywozny in 1994, and double state champion Kevin Wilson in 2009 in the 100 Freestyle and the 100 Breaststroke.
Randy will be succeeded by longtime Assistant Coach, Joe Alexander.
Seton Hall Prep has over 35 student-athletes who have committed to continuing their careers in college. See the table below for a full alphabetized list graduating Pirates and where they are headed. Click on the cover image above or visit the media gallery for each student-athletes graphic.
SHP Track secured a big win at the East Stroudsburg University Invitational in a field of 30 teams. The leading Pirate's scorers were Nick Parisi with wins in the 100 ,200, and 400 for 30 team points. Caseem Dewitt had a first place finish in the shot and third in disc for 16 points. Anthony Algieri and Ross Johnson each added 8pts in the meet.
Nick Parisi currently has the leading time in state in all three events- 100, 200 and 400 as of April 22.
Jules Heningburg, SHP Class of 2014, was named to the USILA National Player of the Year Watch List and selected in the first round (seventh overall) of the MLL Draft by the Florida Launch. Heningburg is a senior attackman on the Rutgers University Lacrosse team. The senior from Maplewood leads the Scarlet Knights with 32 goals, 29 assists and 61 total points on the season. He leads the Big Ten in both assists and points this year as well. Prior to starring 'On the Banks', Heningburg was a US Lacrosse All-American at Seton Hall Prep, the first in school history.
Seton Hall Prep senior Griffin Westlin has been named to the Under Armour All-America Game roster. Westlin, a Notre-Dame commit, already has 24 goals and 16 assists this season for the 6-1 Pirates. The Under Armour All-America Lacrosse Game has been held for 13 years and is set to take place on June 30 at Johns Hopkins University's historic Homewood Field at 8 pm. For more on the event and this wave of players selected, click here.
Seton Hall Prep had 18 students participate in National Letter of Intent Signing Day ceremonies this year across four different dates set by the NCAA. Of the 18 senior student-athletes who participated, 13 are committed to Division 1 colleges and universities. In the coming weeks a full list of committed senior student-athletes will be published. See below for information on our 17 student-athletes who participated in a signing day this school year, listed in alphabetical order by last name.
Anthony Algieri – Worcester Polytechnic Institute – Football: Anthony Algieri heads to WPI after a senior season in which he recorded 88 tackles, 1 sack, 1 interception, 2 fumble recoveries, and 1 blocked kick. The defensive back from Nutley was named Essex County Scholar Athlete of the Year and has earned First Honors designation at Seton Hall Prep in the classroom all four years.
John Ariza – Tulane University – Baseball: John Ariza signed for Tulane following a junior season in which he allowed just 3 runs all year with a 1.46 ERA. The Belleville native is a Knight of Setonia at The Prep, along with a four-year volunteer for the SHP Baseball Special Friends Carnival.
Rocco Capozza – Fordham University – Men’s Soccer: Rocco Capozza was a defender at SHP who won two Essex County Titles, two SEC Titles, and a Non-Public A North Championship. Over his career, the Parsippany native notched two goals and six assists. Capozza was recently honored by the West Orange UNICO chapter with the Brian Piccolo Award after earning All-SEC Second Team and the SHP Soccer Dr. Richard Grady Award.
Cameron Carti – Tufts University – Football: Cameron Carti captained and quarterbacked The Prep’s football team and earned First Team All North Jersey Super Conference and Second Team All-County. The Tufts commit from Franklin Lakes passed for 2,742 yards and threw 23 touchdown passes, and earned weekly honors from both Jersey Sports Zone and NJ.com. Cameron, who has a 4.36 GPA, has earned First Honors every trimester and is a National Honors Society member.
Cameron Fiore – Brown University – Men’s Lacrosse: Cameron Fiore heads to Brown University an Academic All-American following his junior season in 2017. The Long Valley native also earned Second Team All-State in 2017 after recording 136 saves, including a game-high 18 against Hingham (MA). Cameron is a Commended National Merit Scholar, National Honors Society Member, Seton Scholar, Ambassador, and First Honors student.
Jason Gomes – Fordham University – Men’s Soccer: In just one season with The Prep Jason earned First Team All-Conference, First Team All-County, First Team All Non-Public, and Second Team All-State. The defender scored seven goals and tallied three assists in 25 games played. Gomes, an Elizabeth native, has been named to First Honors at SHP, The Spanish National Honors Society, and is a Knight of Setonia, along with participating in over 10 other clubs and extracurricular activities around school.
Alex Imegwu – University of Pennsylvania – Men’s Basketball: Alex averaged 16.4 points-per-game as a senior for the Pirates in his senior basketball season in which the Pirates went 24-3. For his efforts, Imegwu, a small forward from Short Hills, earned First Team All-Conference honors. Alex, a four-year First Honors student and National Honors Society member, will be coached by Steve Donahue and SHP alumnus Ira Bowman next year at UPenn.
Cole Kirst – Lehigh University – Men’s Lacrosse: Cole Kirst’s attacking prowess for The Prep has earned the Bernardsville native a commitment to play Division 1 lacrosse at Lehigh University. Kirst was a key contributor on the 2017 team that won the Essex County Tournament and finished as Non-Public A Finalists. Kirst, a First Honors student, also writes for the school newspaper, The Pirate.
Nick Kriak – Hobart College – Men’s Soccer: The tireless midfielder from West Orange heads to Hobart College next season after pacing the Pirates to both the SEC and Essex County Titles in 2017 with three goals and 26 assists. For his efforts, Kriak was named SCANJ First Team All-State, First Team All-SEC and Essex County, and First Team All Non-Public. Off the field, Kriak has been an Honor Roll member and Kairos retreat team leader.
Matthew Michaels – Providence College – East Hanover: Matt Michaels has starred for SHP in the pool for three years. The East Hanover native heads to Providence after earning First Team All-County in the 200 M Relay, 200 Free Relay, 400 Free Relay, and 100 Fly. In the 100 Fly, Michaels held the third best time in school history after his junior season and attended the Meet of Champions multiple times. In his time at SHP Michaels has been a Knight of Setonia, Ambassador, Wounded Warrior Project Club member, and Future Lawyers Club member.
Quinn Nilan – Bentley University – Football: Quinn Nilan, a defensive end from Berkeley Heights, will continue his career in college at Bentley University next fall. In 2017 Nilan recorded 38 tackles, 4.5 sacks, and 1 forced fumble. For his efforts he was named NJSFC First Team Defense All-Division. In the classroom Quinn has been an Honor Roll member and was a Kairos retreat leader this past winter.
Michael Pavick – Bucknell University – Men’s Soccer: Michael Pavick has donned the SHP varsity soccer kit for three years as a starter. The striker from Clifton had his senior campaign cut short due to injury, however was a key contributor his junior season when the Pirates won the Non-Public A North Title. Michael heads to Bucknell a perennial First Honors student, boasting a 4.1 cumulative GPA.
Andrew Perez – Villanova University – Football: Andrew Perez holds single game records at The Prep for most catches, most yards, and most touchdowns, and graduates 2nd all-time in career catches (98). The receiver from North Caldwell earned 939 yards on 56 receptions and scored 12 touchdowns in 2017. For his efforts he was named First Team All-Conference and Second Team All Non-Public. Perez is a member of the Wounded Warrior Project Club, Italian Club, and has also lettered in Lacrosse at The Prep.
James Petrovcik – Villanova University – Football: James Petrovcik heads to Villanova ranked in the Top 50 players in NJ for the Class of 2018. The left tackle from Westfield earned First Team All Super Conference in both his junior and senior seasons, and First Team All-Area as a senior. The future Wildcat also played freshman lacrosse and hockey at The Prep, and was a member of Knights of Setonia, Band, and Ski Club.
Frank Spano – Holy Cross – Baseball: Frank Spano features for The Prep as a left-handed pitcher and first baseman. The Holy Cross commit won the Essex County Title with SHP in 2017. Spano, a Bloomingdale native, impresses in the classroom as well earning Commended National Merit Scholar designation. He is also a Seton Scholar, First Honors student, and National Honors Society member. Frank is involved in Peer Leadership, Knights of Setonia, and Math Honors Society as well.
Griffin Westlin - Notre Dame - Men's Lacrosse - Griffin Westlin heads to Notre Dame an Under Armour All-American. In his senior season the attacker has tallied a team best 24 goals and 16 assists through the first seven games. Griffin, a native of Leabanon (NJ), has helped lead the Pirates to county titles in 2015, 2016, and 2017, and finish as finalists in Non-Public A in 2017. In the classroom Westlin has been a perrenial Honor Roll student.
Daniel Zarillo – United States Coast Guard Academy – Long Valley: Daniel Zarillo, a midfielder and attacker from Long Valley, has been a three-year varsity letter winner at The Prep. The Coast Guard commit notched 11 points (6 goals, 5 assists) in 2016 and 28 points (22 goals, 6 assists, 6 ground balls) in 2017. A National Honors Society member, Zarillo has featured on the Honor Roll all four years, and is a recipient of the Headmaster’s Honors Scholarship. Outside of the classroom Zarillo has participated in Knights of Setonia, a Kairos retreat, and the 2014 Fall Drama, while also earning varsity letters in winter track in 2016 and 2017.
Jack Zyska – University of Notre Dame – Baseball: Jack Zyska heads to Notre Dame a decorated student-athlete. The senior outfielder earned First Team All-State as early as sophomore year following The Prep’s Non-Public A State Title. For his efforts in that historic run, Jack was also named a Perfect Game Underclass All American. In that 2016 season, Jack boasted a .500 batting average with 19 RBI, 3 HR, 8 2B, 8 SB, and 37 runs scored. In 2017 he hit .329 with 24 RBI, 2 HR, 5 2B, 1 3B, 10 SB, and 22 runs. Zyska, who hails for Berkeley Heights, is also a Peer Leader and Knight of Setonia.
Seton Hall Prep Baseball, No. 11 in the NJ.com Top 20 poll, came out on top against No. 10 Millburn in a tight 6-5 contest on Porcello Field. The Pirates staged a comeback after trailing 5-1 in the bottom of the fifth inning, as Jack Zyska led off with a home run. Senior Brian Kelly eventually punched in the winning runner, Jack Eichler in the bottom of the sixth inning. Click here for the full story.
Seton Hall Prep senior Nick Parisi took the gold in his specialty, the 400m dash, at the Eastern States Championships held at the venerable 168th Street Armory in Manhattan on February 20. His time of 49.56 was the fastest in New Jersey at the time, equaling his gold medal time at the Super Essex Conference Meet in December. He followed up his Easterns win a week later with a bronze medal performance at the NJSIAA Meet of Champions (49.66) and a personal record 49.16 the first week of March at the New Balance Indoor National Championships.
The swim team put forth a magnificent performance in the NJSIAA Non-Public A semifinal, but it proved not to be enough as an even stronger CBA team defeated the Pirates 96.5-73.5 at the Raritan Bay Area YMCA in Perth Amboy on Presidents’ Day. Races were competitive and intense throughout, and the NJSIAA Meet Director took the unusual step of praising both squads over the loudspeaker after the meet was ended.
The Pirates took the lead after the first event as Alex Wang, Saverio Kaufman, Matt Michaels and Roo Fenton won the 200 Medley Relay in 1:37.44, with CBA taking second and third, giving SHP an 8-6 lead. CBA would finish 1-2-4 in the 200 Freestyle to take an 18-12 lead. This event exemplified the competitiveness of the meet, as Matt Prior (1:48.67), Lenny Brown (1:49.76) and Ryan Martynowicz (1:50.64) swam times that would have swept the top three at the Essex County meet, but they could only finish 3-5-6 at this meet.
The Pirates bounced back in the next two events; Alex Wang won the 200 IM in 1:57.30, and with Saverio Kaufman tying for third (2:02.22) and Dom Palumbo taking 5th (2:05.01), SHP was within three. The 50 Freestyle would be the Prep’s best event with Fenton (21.64), Michaels (22.36) and Luke Shea (22.62) finishing 1-2-5, enabling the Pirates to retake the lead at 32.5-29.5.
Matt Michaels (52.73) and Jaeden Yburan (54.02) finished 2-3 in the 100 butterfly, but CBA’s 1-4-5 finish got them to within 1 point. The teams would split the 100 Free, with Fenton winning in 48.73 and Luke Shea taking 4th in 50.09. After 6 of the 11 events, SHP led 47.5-46.5.
CBA would then take 1-3-4 in the 500 Free, with Matt Prior taking second for the Prep in 453.20. Lenny Brown would break 5 minutes for the first time for SHP in 457.60, finishing 5th. CBA lead at this point by 5, 57.5-52.5, but the SHP foursome of Michaels, Prior, Shea and Fenton would win the 200 Freestyle Relay in 1:30.68; CBA finished 2-3 and the Pirates trailed by only 3, 63.5-60.5.
In the next two races, 4 of the 6 Pirate swimmers would swim SHP career bests, only to find that it was not enough to stand up to CBA, who pulled away at this point. Jaeden Yburan would swim a lifetime best 53.41 to finish 2nd in the 100 backstroke, with Dom Palumbo 5th in an SHP best 57.11; Alex Wang would swim an SHP best 1:01.20 and Saverio Kaufman a lifetime best 1:01.52 in the 100 breaststroke, but this was only enough for a 3-5 finish. CBA would take 1-3 in the 400 Freestyle relay to make the final score 96.5-73.5.
The 13-1 Pirates totaled 4519 power points in the meet, the second highest total in school history. Currently ranked 9th in nj.com, the team is hopeful to move up in the final rankings based on this performance.
Lenny Brown – 200 Freestyle; 500 Freestyle, 200 Free Relay, 400 Free Relay.
Brendan Flood – 200 Medley Relay Freestyle; 200 Free Relay 400 Free Relay.
Joe Gigantino – 200 Medley Relay Breast; 100 Butterfly; 100 Breaststroke.
Saverio Kaufman – 200 Medley Relay Breast; 200 IM; 100 Breaststroke.
Ryan Martynowicz – 200 Freestyle, 100 Freestyle; 200 Free Relay; 400 Free Relay.
Matt Michaels – 200 Medley Relay Butterfly; 50 Freestyle; 100 Butterfly; 200 Freestyle Relay.
Dom Palumbo – 200 Medley Relay Breast; 200 IM; 100 Backstroke.
Alex Wang – 200 Medley Relay Backstroke; 200 IM; 100 Breaststroke; 400 Freestyle Relay.
8 Swimmers (Brown, Fenton, Kaufman, Michaels, Prior, Shea, Wang, Yburan) will represent SHP at the Meet of Champions Individual Event Championships on March 3-4.
Seton Hall Prep Athletic Director Larry Baggitt has announced that the school’s new head football coach is William Fitzgerald.
Coach Fitzgerald will come to The Prep with a long and proven track record of cultivating excellence in student-athletes, while instilling a commitment to both winning and good sportsmanship. Since 2008 he has been the Quarterback Coach/Offensive Coordinator at St. Peter’s Preparatory School in Jersey City, bringing with him to Seton Hall Prep a history of developing highly regarded quarterbacks and offenses. Coach Fitzgerald has been recognized with appointments to a number of prominent high school All-Star coaching teams. Prior to his post at St. Peters, he held coaching posts at Dumont High School and Utica College.
William Fitzgerald is a graduate of and former football player at Union College, where he graduated in 2003 with a degree in Psychology and his Masters Degree in Special Education from New Jersey State University. For the last 10 years he has been employed as a teacher in the Union City school system. He will also assume a position at Seton Hall in the Learning Assistance Program.
Coach Fitzgerald takes the reins at Seton Hall Prep following the departure of Coach Vito Campanile. The school has one of the longest athletic traditions in New Jersey, with the football team playing its first game in the late 1800s. He is the 15th football coach since 1930. Coach Tony Verducci held the longest tenure, from 1955 to 1987, when his teams captured 11 Parochial A titles and posted 104 shutouts. Quarterback on his 1956 team was the school’s current President, Msgr. Michael E. Kelly ’57.
The Seton Hall Prep swim team started its post-season with a big victory over St. Augustine Prep, 94-76 in the quarterfinal round of the NJSIAA Non-Public A tournament on Monday February 12 at Seton Hall University. St. Augustine came out blazing fast in the 200 Medley Relay, and led the Pirates after 3 legs in spite of the SHP relay (Alex Wang, Saverio Kaufman and Matt Michaels) being ahead of its season best pace. However, junior Roo Fenton come from behind in a blistering 20.89 anchor leg to win it for the Pirates in season best 1:37.39, which when combined with the SHP B relay taking 3rd gave the Pirates the early 10-4 lead. St. Augustine would win the 200 Freestyle and close within 4, but in the next two events Seton Hall would finish 1-3-4, with the senior trio of Wang, Dom Palumbo and Kaufman grabbed the places in the 200 IM, and Fenton, junior Luke Shea and Michaels doing the job in the 50 Free to give SHP the lead 39-23 at the break. The Hermits showed strength in the next three events, cutting the lead in half to 59-51 with four events to go. However, event 8, the 200 Freestyle Relay, would turn the tide back in SHP's favor as a 1-3 finish extended the lead back to 14, with the A relay of Michaels, senior Ryan Martynowicz, Shea, and Fenton posting a season best 130.88. The 100 Backstroke would then put SHP in the driver's seat, with freshman sensation Jaeden Yburan coming out of the B position to win the race in a personal best 53.67, and Wang and sophomore Joe Labrador taking 3rd and 5th to extend the Pirate lead to 18 at 79-61 with 2 events to go. The 100 breaststroke was next, and as they have so often done in their careers, seniors Palumbo, Kaufman and Joe Gigantino would win the event by going 2-3-4 to give SHP their largest lead at 20 and clinch the meet. St. Augustine would take 1st in the 400 Free Relay to close the meet, with the Pirates taking 2-3 to yield the final 94-76 score.
Kennith Washington High Jump 5'8"
Anthony Algieri, High Hurdles (8.7).
At the NJCTC Relays, Justice Sims finished first in the long jump (19.6), Kennith Washington took first in the Triple Jump (44.2), and Caseem DeWitt threw to 2nd place in the Shot Put (48.2). The Mile Relay Team comprised of Nick Parisi, Aidan Gaul, Chris Parisi, and Anthony Algieri, qualified for the Milrose Race with a 3:32 mark. Nick Parisi also holds the leading time in NJ in the 400M with a 49.5.
The team competes in the NJSIAA State Relays on Thursday, Jan. 18.
The Swim Team captured eight first places out of 11 events and won every event on points in soaring to victory in the Super Essex Conference/Essex County Swimming Championships on the Dr. Martin Luther King Jr. holiday at the Raritan Bay Area YMCA in Perth Amboy. The Pirates scored 382 points, nearly 200 more than runner-up Montclair which had 187.
The Pirates were led by junior Roo Fenton who would win the Cullen Jones Award as Most Valuable Swimmer for the second consecutive year. Fenton won 2 individual events: the 50 freestyle in 21.38, and the 100 freestyle in 47.72. He would also be a part of two winning relays: the 200 Medley Relay, along with seniors Alex Wang, Dom Palumbo and Matt Michaels in a winning time of 1:38.79; and the 400 Free Relay, teaming with Wang, junior Luke Shea and sophomore Matt Prior in a winning time of 3:17.63. Michaels, Shea, Prior and freshman Jaeden Yburan would capture the third relay, the 200 Freestyle Relay, in 1:30.91. Michaels, Wang and Prior would also win individual events, Michaels taking the 100 butterfly in 53.59; Wang the 100 backstroke in 54.50; and Prior the 200 Freestyle in 1:49.69.
Second Place - Lenny Brown (12), 200 Freestyle; Alex Wang (12), 200 IM; Luke Shea (11), 100 Butterfly; Jaeden Yburan (9), 100 Backstroke; Saverio Kaufman (12), 100 Breaststroke.
Third Place - Saverio Kaufman (12), 200 IM; Luke Shea (11), 50 Freestyle; Jaeden Yburan (9), 100 Butterfly; Matt Prior (10), 500 Freestyle; Dominic Palumbo (12), 100 Breaststroke.
Fourth Place - Ryan Martynowicz (12), 200 Freestyle; Dominic Palumbo (12), 200 IM; Ryan Martynowicz (12), 100 Freestyle.
Fifth Place - Lenny Brown (12), 500 Freestyle; Joe Gigantino (12), 100 Breaststroke.
Sixth Place - Matt Michaels (12), 50 Freestyle.
The swim team produced their best performance of the season to date with a decisive 112-58 win over previously unbeaten Morristown on January 3 at the Morristown high school pool. Superior depth would carry the day for SHP, as the Prep would win 10 of 11 events, but the meet featured a number of exciting races for first place between each schools' top swimmers.
The first event would see a typical result as Alex Wang, Saverio Kaufman, Matt Michaels and Roo Fenton edged Morristown's top foursome to win the 200 Medley Relay by .77 in 1:49.71 (all times are in meters). This would be the first of 7 first place finishes for the Prep, several by close margins.
Morristown would take first in the next two events, but the SHP depth was evident as the Pirates took 2nd, 3rd and 4th in both races to win the events on points. The 50 Freestyle would be next, and it would be the event that gave the Pirates a solid lead that they would not relinquish, as Roo Fenton (24.77), Luke Shea and Matt Michaels would sweep the top three places, giving SHP a 41-21 lead heading into the break.
Morristown would win the next event, the 100 butterfly, and looked as if they might be looking to fight there way back into the meet as their Dennis DeLargy led the 100 freestyle going into the last lap. But Fenton (54.55) would pass him with about 10 meters to go and Shea would catch him on the last stroke to finish 1-2 for SHP, giving the Pirates a 60-34 lead. Morristown would take first in the next event, the 400 freestyle, but another 2-3-4 by the Pirates increased the lead further. SHP would pull away with victories in the last four events. The 200 Free Relay was won by Michaels, Matt Prior, Ryan Martynowicz and Shea in 1:45.61; Alex Wang would win the 100 Backstroke in 1:02.07; and Dominic Palumbo would win the 100 breaststroke in front of his hometown crowd in 1:10.06. In the last event, the 400 Freestyle Relay, SHP's foursome of Shea, Prior, Wang and Fenton were stroke for stroke with Morristown for more than half of the race, but Morristown began to pull away in the third leg, and it seemed that Morristown would win as they had the lead entering the last length, but once again Fenton found a late surge and made up the ground, and the finish was so close that the crowd had to turn to the scoreboard to see who won. A gasp went out from the crowd as the Pirates won by .04 in 3:45.09 to close out the meet.
Seton Hall Prep (2-0) staged an impressive come-back win over West Side on Tuesday night, defeating the Newark school 72-65. The Pirates, No. 13 in NJ, were led by Alex Imegwu's 22 points. Jabri Abdur-Rahim contriubted 21 points, 15 rebounds, and four blocks, followed by Ashton Miller's 13 points, and Geordan Walker's 11 point effort.
Despite finishing the first quarter down 27-6, The Prep stormed back for a 19-6 second quarter followed by a 18-11 third quarter.
For the full story and box score, click here.
The swim team set themselves up for a Happy Christmas Break by cruising to a 132-31 victory over Glen Ridge on December 19 at Rutgers-Newark. Seven different Pirates would win races as SHP took 10 of 11 first places overall. Race winners included seniors Matt Michaels (200 IM in 2:08.22), Saverio Kaufman (100 Butterfly in 57.67), Alex Wang (500 Freestyle in 5:17.93), and Dominic Palumbo (100 Backstroke in 59.88); junior Luke Shea (100 Breaststroke in 1:05.76); and sophomores Mike McGoldrick (200 Freestyle in 2:07.66) and Matt Prior (50 Freestyle in 23.56). The Prep also took all three relays. The 200 Medley Relay was won by Palumbo, junior Roo Fenton, Shea, and senior Ryan Martynowicz in 1:47.53. Fenton and Kaufman were joined by senior Brendan Flood and freshman Jaeden Yburan in winning the 200 Freestyle Relay in 1:37.98. The 400 Freestyle relay team of seniors Joe Gigantino and Lenny Brown, McGoldrick, and junior Jack McGovern closed out the meet, winning in 3:45.32. The 5-0 Pirates will come out of the break with what will likely be their toughest foe of the regular season, facing defending Morris County champions Morristown at the Morristown High School pool at 4pm on January 3.
The Swim Team captured 10 of 11 first place finishes in route to a decisive 121-49 victory over Millburn on December 5 at Newark Academy. The Millers have been conference runners up for several years running, but could not stay with the Pirates in this meet.
The 200 Medley Relay would get the ball rolling, as the foursome of Alex Wang, Saverio Kaufman, Matt Michaels and Roo Fenton posted a season best 1:39.60 to take the victory. Wang, Fenton and Matt Prior would win two races apiece, with Wang taking the 200 IM (2:00.89) and the 100 Backstroke (55.27), Fenton the 50 Freestyle (22.26) and 100 Freestyle (49.94), and Prior the 200 Freestyle (1:50.67) and 500 Freestyle (4:57.29). Matt Michaels would also earn a victory, in the 100 Butterfly in 53.31.
The only race that SHP would lose was the 100 Breaststroke to Millburn's Eric Wang, but the Prep's senior trio of Kaufman, Joe Gigantino and Dom Palumbo would go 2-3-4 to win the event 9-7. The Pirates would also win both freestyle relays, with Michaels and Prior being joined by Luke Shea and Ryan Martynowicz to take the 200 Free Relay in 1:34.77, and Martynowicz, Lenny Brown, Prior and Fenton taking the 400 Free Relay in 3:30.89.
The race of the meet was the 500 Free, which proved to be a fabulous duel between Matt Prior and Millburn standout Evan Ng. Prior held the lead at the 100, but Ng came on strong and looked like he might cruise to victory as he had a body length lead at the halfway point. But Prior found another gear and began to regain ground, and by the 400 nearly pulled even as the crowd began to get into it. The place was rocking as Prior took a slight lead off the last turn, but Ng found a little life and it was stroke for stroke coming down the stretch. Prior would prevail by less than a tenth in a bang bang finish.
SHP will next face Verona on Friday December 8 at 4 PM at Seton Hall University.
Seton Hall Prep has hired Rich Baird to be the Head Coach of the Crew team. Coach Rich Baird started rowing in college as a member of the Ohio State Crew Club where he rowed for four years. After college, he served a short term as an assistant coach for Raleigh Charter High School in North Carolina in 2006. Following several years away from the sport, Coach Baird joined the Montclair High School Crew team for a season before moving to Ridgewood Crew and Nereid Boat Club for the 2012-2013 seasons.
As an assistant coach at Ridgewood, Coach Baird helped lead the team to great success in state, regional, and national competitions. Ridgewood won multiple Garden State Championship events and City Championship events. The crowning achievements during the years at Ridgewood include winning 5 Stotesbury Cup Trophies and 3 SRAA National Championship events.
The SHP swim team extended their record to 2-0 with a 121-48 victory over West Orange on November 30 at the Clifton Boys Club. The Pirates would capture first place in all eleven events. The most impressive swim of the meet belonged to junior Roo Fenton with a sizzling 21.57 in the 50 Freestyle, a time which places him among the top sprinters in the state. Fenton would also be a part of the winning 200 Medley Relay team (1:43.62), along with freshman Joaquin Quezada, and seniors Saverio Kaufman and Alex Wang. Freshman Jaeden Yburan continued his early season excellence as a double winner, taking the 200 IM in 2:07.06 and the 100 Backstroke in 57.01. Members of the Prep's outstanding senior class would win the other 5 individual events: Lenny Brown, 200 Freestyle (1:53.79); Matt Michaels, 100 Butterfly (53.46); Ryan Martynowicz, 100 Freestyle (52.23); Joe Gigantino, 500 Freestyle (5:43.11) and Saverio Kaufman, 100 Breaststroke (1:04.88). Martynowicz was also part of the winning 200 Freestyle Relay team, along with fellow senior Brendan Flood and sophomores Mike Pietrucha and Joe Labrador (1:38.94). Brown and Flood were part of the foursome that would take the 400 Freestyle Relay, along with freshmen Jack Devilbiss and Brian Mullen (3:40.87). Next up for the Pirates is Millburn on Tuesday, December 5, which is a match between the top two teams in the conference last season.
The 2017-18 Seton Hall Prep Swim Team kicked off their season with a 127-40 victory over West Essex on November 28 at the Caldwell Community Center. The victory featured winning contributions from both returning veterans and exciting newcomers. The 200 Medley Relay team ,consisting of seniors Alex Wang, Dom Palumbo, Matt Michaels and junior Roo Fenton, got the ball rolling with a win in a fine time of 1:41.97. Wang would also win the 100 Breaststroke in 1:01.57, while Michaels took first in the 500 Freestyle in 5:12.11. Their classmate Ryan Martynowicz won the 200 Freestyle in 2:00.01. Fenton captured his first individual victory of the season, taking the 50 Free in 22.57. The sophomore class featured two event winners in Matt Prior (51.43 in the 100 Free) and Joe Labrador (1:02.43 in the 100 backstroke). Freshman Jaeden Yburan had an outstanding SHP debut by winning the 100 butterfly in 54.86, and also joining in the winning 200 Freestyle Relay Team along with fellow freshmen Joaquin Quezada and Jack Devilbiss and sophomore Mike Pietrucha (1:37.31). A “veteran-newcomer” combo would cap off the night, as freshmen RJ Kelly and Brian Mullen joined seniors Brendan Flood and Lenny Brown to win the 400 Freestyle Relay in 3:42.14.
Seton Hall Prep Hockey (1-0) opened the 2017-18 season with a dominant 8-1 victory over Bishop Eustace at Codey Arena last Sunday. The Pirates were led by Thomas Colucci who recorded a hat-trick and two assists, followed by Stephen Buck who scored a pair of goals himself. For full coverage via NJ.com, click here.
This past Sunday the USLacrosse New Jersey Chapter held its third annual Kyle Kirst Coaches Clinic in honor of former Summit HS coach and Seton Hall Prep father, Kyle Kirst. Seton Hall Prep lacrosse Coach Dave Giarrusso was selected as one of the presenters. The Pirates finished the 2017 season ranked #2 in the state and competed in the lacrosse state final, Coach Giarrusso was named the Non Public coach of the year. He was assisted in the clinic by the Rutgers University Mens lacrosse team, led by Sr, Jules Heningburg, SHP ’14, who was named Honorable Mention All American in the 2017 season.
The Kyle Kirst Coaches Clinic was developed by the NJ Lacrosse chapter to honor a Hall of Fame coach who has left an impact on so many. All proceeds from the clinic benefit the Kirst Family Educational Fund. The clinic helped over 80 attendees to become better coaches, role models, mentors and teachers to all of their student athletes.
Seton Hall Prep sophomore Aidan Dunphy led SHP past West Orange in the ECT Seminfinal by scoring two of The Prep's goals in the 3-0 shutout of cross-town rival Mountaineers. Senior Adam Silva also scored off of a blast into the upper-90. The Pirates are set to face Millburn in the Essex County Tournament Final this Saturday at 5:30 pm at Caldwell HS. Read the full story on the West Orange game here.
On a rainy Saturday at Goddard Memorial State Park in Rhode Island at the the Brown Northeast Cross Country Championship, the Seton Hall Prep Cross Country team raced to one of the finest finishes in school history, winning both the Varsity and JV races in a crowded and competitive field of teams from Rhode Island, New York, Massachusetts, and Connecticut. Passing the mile and two mile mark in 4:52 and 9:52, senior co-captain Dan Gizzo blazed his way to a 15:36 (PR) 2nd place finish, and one of the fastest 5K times ever run by a SHP harrier. He was closely followed by determined and stellar performances by senior co-captain Mike DiDonato (3rd Place- 15:57-PR) and sophomore Nolan Orr (4th Place- 15:57-PR) who came through the two mile mark in 10:02 and 10:01 respectively. With three runners under 16:00, this was the most impressive performance by any top three SHP runners in school history. They were joined in scoring by gutsy efforts from sophomore Colin Schweitzer (17:00- PR) and senior Matt Martins (17:27). Freshman Chris Gizzo (17:31-PR) and sophomore Cristiano Ribeiro (17:40-PR) rounded out the varsity seven. In a field of 25 teams, their 80 point first place finish edged out runner-up North Shore (87). SHP's team average of 16:23 is one of the fastest in SHP history. The start of the day was equally electrifying in the JV race with the Prep scorers placing 1, 2, 4, 11 and 26. In one of the fastest 5K performances by a freshman in Seton Hall history, Kevin Harvey broke away for a solo 16:40 effort. He was followed in scoring by junior Louis Constable (17:25-PR), senior Diego Gonzalez (17:52-PR), sophomore Brian Phillips (18:25-PR) and senior Rob Lynch (19:05-PR). The JV squad was rounded out by strong efforts from senior Matt Williams (19:47), senior Dwight Thomas (21:28)and senior Hunter Hagan (21:46-PR). In a field of 18 teams, SHP's JV finished first with 44 points, ahead of The Hackley School with 78 points. They raced to an impressive 17:53 team average.
On a beautiful Tuesday afternoon at Branch Brook Park, the Cross Country team competed in the Conference Championship. Despite some setbacks due to illness, the Pirates turned in impressive performances in the Freshman, Novice and Varsity races. Of the 43 runners that competed, 35 runners turned in personal bests.
Beginning the day, the freshman turned in a strong 2nd place finish. They were led by Kevin Harvey’s dominant solo effort of 10:42 which broke the 2 mile course record that was set by Nolan Orr last year. The other freshman scorers were Brian Mullen (12:30-PR), Eric Puhala (12:37-PR), Mike Lazzari (12:43-PR), and Luke Incardona (13:12-PR). The Prep’s Novice team turned in a strong 4th place finish and were led by sophomore Brian Phillips (18:49- PR), senior Rob Lynch (19:33-PR), senior Matt Williams (19:37-PR), sophomore Chris Puente-Duany (19:39-PR), and sophomore Matt Guarnuccio (20:00-PR).
In the final race of the day, the gritty varsity squad turned in stunning performances with the team’s top three runners coming in the top four of the race. After the first mile, Dan Gizzo broke the race open pulling away from the front pack finishing first in a Branch Brook personal best of 16:02 (a top-ten mark on the all-time performance list). He was followed by an aggressive sophomore Nolan Orr (16:18- 3rd place- PR) and a charging senior Mike DiDonato (16:24- 4th place- PR). The varsity efforts were impressively rounded out with big PR’s by sophomore Colin Schweitzer (17:48), junior Louis Constable (18:04) and senior Diego Gonzalez (18:45). In this hotly contested race and by a thin margin, the Varsity came in 3rd place (76 points) behind Montclair (1st-67 points) and Columbia (2nd- 75 points).
No. 2 in NJ SHP Soccer most recently defeated both Newark Central and Columbia. Click above for photos.
Seton Hall Prep Football battled a physical Pope John team on Saturday aternoon at the KAC.
Seton Hall Prep Soccer, No. 2 in NJ, posted back-to-back 4-0 shut-out wins over Caldwell and Livingston this week. Taking on a jam-packed schedule consisting of three games a week, The Prep now sits at 9-1 on the season, with their only loss coming in a showcase tournament at the hands of the Hill School. Click for full details on the Monday's win over Caldwell and Wednesday's victory over Livingston.
In an impressive display of herd running, SHP Cross Country was victorious over Columbia (15-50) and MKA (22-39) on Thursday at Branch Brook Park in Newark. The Pirates finished their regular season conference races with a record of 7-2. The team was led by senior Dan Gizzo (2nd place- 16:55), sophomore Nolan Orr (3rd place- 16:57), senior Mike DiDonato (4th place- 17:04), sophomore Colin Schweitzer(18:40), sophomore Cristiano Ribeiro (18:45). The top seven was rounded out by freshmen Chris Gizzo (18:47) and Kevin Harvey (18:51). Top five finishers in the Novice 5K were sophomore Brian Phillips (4th place- 19:59), senior Matt Williams (20:47), junior Kevin Wong (20:53), sophomore Chris Puente-Duany (20:59) and sophomore Matt Guarnuccio (21:25). The top five finishers in the Novice 2 miler were freshmen Luke Incardona (13:19), Mike Lazzari (13:31), Eric Puhala (13:36), Leder Joseph (13:44) and sophomore Patrick Blaesser (13:47). The Pirates will be competing in the Conference Championship next Tuesday, 10/3, at Branch Brook Park.
SHP Football fell to St. Peter's Prep in the NJ.com game of the week - the second time this season SHP competed in such an event. Despite putting up 20 points on the Jersey City power and cutting the Maruaders lead to 25-20 shortly after halftime, SHP was defeated by a final score of 43-20. Click for full coverage via NJ.com. If you missed the live pregame, halftime, or postgame show on Seton Hall Prep's Facebook page, catch the archived videos!
No. 2 in NJ Seton Hall Prep Soccer took down a strong fellow SEC and Essex County Montclair HS side 1-0 on Friday afternoon at the KAC. The Pirates and Mounties battled to a scoreless regulation, however The Prep found an answer in extra time as sophomore Aidan Dunphy picked off a pass in midfield and slotted junior Jon Ned through the right side for a perfectly tucked finish. Click for full coverage via NJ.com.
Seton Hall Prep defeated Montclair Kimberley Academy 2-0 in Montclair on Monday afternoon. Seniors Nick Kriak and Paul Silva recorded goals for the Pirates, who are currently ranked No. 2 in NJ. For full coverage via NJ.com, click here.
This Saturday, at the historic VanCortlandt Park in the Bronx, the Cross Country team competed in the Regis Invitational against a predominantly New York field. This was the Prep's first time on the challenging and hilly 2.5 mile course in many years. Despite its unfamiliarity and ruggedness and the heat and humidity, the Prep raced to an impressive 4th Place finish in a field of 14 teams behind two New York schools and Pope John XXIII. Leading the charge for the Pirates was senior Dan Gizzo who came in an impressive 2nd Place in a time of 13:17. Prep scoring was rounded out by senior Mike DiDonato in 9th (14:07), sophomore Nolan Orr in 22nd(14:34), sophomore Colin Schweitzer in 31st(14:48) and senior Brandon Hicks in 33rd(14:53). Rounding out the Varsity squad was senior Matt Martins (15:09) and sophomore Cristiano Ribeiro (15:58). Other impressive efforts were gutted out by freshmen Chris Gizzo and Kevin Harvey who came in 2nd (8:50) and 4th (8:58) respectively in the freshman 2.5K race. Rounding out the day of gritty efforts on the 2.5 mile course were TJ Martynowicz (16:22) and Brian Phillips (17:18) in the Sophomore race and Louis Constable (15:45) and Evin Connolly (16:17) in the Junior race.
Seton Hall Prep Soccer had a busy week going 3-1. The Pirates earned wins against West Essex, East Orange, and Dickinson and fell to The Hill School (PA) in the Mid-Atlantic Jamboree, a special showcase played in front of dozens of college coaches. SHP Soccer, currently No. 2 in NJ, has no time to rest as they face MKA on Monday in Montclair.
Seton Hall Prep Soccer (2-0) exploded for four goals in the second half to put away West Essex at home on Monday afternoon, 5-1.
John Ned (2), Mike Pavick, Aidan Dunphy, and Joe Cubero all recorded goals on the day. Adam Silva and Frank DeLuca both contributed two assists, followed by Nick Kriak and Paul Silva who recorded assists as well. Gabe Ferreira made three saves in net for the Pirates, including a full extension dive to end the first half.
Seton Hall Prep Football were tied at halftime with the No. 6 ranked Don Bosco, however a late surge by the Ironmen saw SHP fall in its opening game of the season, 21-13. Senior quarterback, Cameron Carti, threw for 281 yards on 17 of 22 passing, including a 83-yard pass to Andrew Perez in the first half.
WATCH - Pregame and halftime live stream rewind via SHP Facebook page.
Seton Hall Prep Soccer defeated Summit HS 4-1 on Saturday afternoon. The Pirates were led by senior, Michael Pavick, who scored two goals on the day. Fellow senior Jason Gomes and junior Jon Ned also scored for SHP. Recording two assists each were Adam Silva, Nick Kriak, and Aidan Dunphy. Paul Silva added an assist as well.
The Pirates take on West Essex on Monday afternoon in the programs first ever regular season game on Brendan P. Tevlin Memorial Field.
Seton Hall Prep Cross Country opened up the season with wins over Nutley and Newark Academy, followed by a fourth place finish at the Randolph Invitational.
The Cross Country program got off to a strong start Thursday afternoon at Branch Brook Park with 51 runners competing. Our Varsity won over Newark Academy and Nutley and dropped to Montclair to start their season with a 2 & 1 record. Scorers for Varsity were senior Dan Gizzo (16:55), senior Mike DiDonato (17:02), sophomore Nolan Orr (17:09), sophomore Colin Schweitzer (18:28) and senior Brandon Hicks (18:50). In the Novice 5K, sophomore Cristiano Ribeiro (19:11) confidently won the race and junior Louis Constable (19:30), junior Evin Connolly (20:16), sophomore Brian Phillips (20:23) and sophomore Dylan Coffin (20:28) rounded out our top five. The freshman race was the most dominant 1-2 freshman start since the Super Essex Conference began in 2009, with Chris Gizzo (11:13) and Kevin Harvey (11:43) running impressive times on the 2 mile course. The freshman top five was rounded out by Jaeden Yburan(13:09), Eric Puhala(13:14), and Brian Mullen(13:17).
The Seton Hall Prep Cross Country team got off to a promising start under the lights on Saturday night at the Randolph Invitational. In a loaded Varsity A race that included some of the top teams in the State, the Pirates came in 4th place out of 10 teams. Scoring was led by an impressive 16:08 4th place finish from senior Dan Gizzo (the 4th fastest time run in the State on opening day) and was rounded out by sophomore Nolan Orr (16:42-PR), seniors Mike DiDonato (16:57), Brandon Hicks (17:40-PR) and Matt Martins (17:47). Sophomores Colin Schweitzer (18:21) and Cristiano Ribeiro (18:22) both set PR’s as well. Our JV squad came in 5th place with scoring from junior Louis Constable (18:45), sophomore TJ Martynowicz (19:15), junior Evin Connolly (19:46), senior Diego Gonzalez (19:52) and sophomore Brian Phillips (20:07-PR). The SHP freshman squad put in a thrilling performance finishing 5th in a field of 14 teams. Chris Gizzo (9:11) and Kevin Harvey (9:19) blazed to an amazing 1-3 finish. Scoring was wrapped up by solid efforts from Jaeben Yburan(10:25), Brian Mullen(10:27) and Michael Lazzari (10:39). Next Invitational up will be the Regis Invitational on Saturday, September 16th at the historic Van Cortlandt Park in the Bronx.
Seton Hall Prep is proud to announce that 35 members of the Class of 2017 have committed to a college or university to continue their academic and athletic careers at the NCAA level.
This group not only excelled in their athletic endeavors here at The Prep, they also worked diligently in the classroom and in the community, which is reflected by their choice of colleges- many of which are ranked amongst the most competitive in the country.
"Once again I am proud of our student-athletes that choose to play at the next level," stated Athletic Director, Mr. Larry Baggitt. "The committment that it takes to balance academic and athletic performance should be commended, and I am confident in how our school has prepared them in every way to take the next step to the college level."
The full list of committed athletes is below organized alphabetically by "Sport." See the media gallery for a personalized graphic for each of our prospective NCAA student-athletes. | 2019-04-21T17:05:01Z | https://gopirates.shp.org/news |
Working with both the University and Vendor communities to ensure that the best strategic partnerships are established for the delivery of high quality goods and services for all end users.
For more detailed information on the topics below, or any Procurement related issue, you may contact the Strategic Sourcing directly at the emails or phone numbers on the main page.
What is a Request For Proposal (RFP) or Request for Qualifications (RFQ) and why do I have to go through this process?
These processes are dictated by State of Texas statutes such as Texas Government Code 2155 and multiple other House Bills, Board of Regents Rules and Regulations and University of Texas at Arlington Policy. These process are used by all State agencies, not just University of Texas at Arlington. The purpose is to ensure the best overall value to the University, considering both price and non-price criteria, when securing goods and services.
A Request For Proposal, or RFP, is generally used for larger and more complicated projects where the exact scope or product specifications may not be known in the beginning and the University wants to solicit proposed solutions from a variety of companies. A good example would be when an end-user knows they need a solution to provide “x” (some desired outcome), but there may be multiple products or systems that can achieve the outcome. A scope of work and/or desired results and requirements are developed in conjunction with the key stakeholders and included in the Request For Proposal document. The key stakeholders also use weighted evaluation criteria to then score the proposals once they are received. The criteria are composed of both price and no-price criteria, weighted in order of importance to the key stakeholders with the objective to obtain the best overall value to the university, not necessarily the lowest priced solution.
A Request For Qualifications, or RFQ, is used only for a very specific set of statute-defined services. These are generally licensed professions such as architects, engineers, surveyors, medical professionals, veterinarians, etc…for which the State has dictated that the selection should be based on qualifications rather than price. A general scope of work or services, and the key minimum requirements and desired experience and qualifications are included in the RFQ documents. An evaluation team of key stakeholders then ranks the qualification proposals received and the Strategic Sourcing facilitates a negotiation of rate(s) for the services. If an acceptable rate is achieved, then an agreement is executed with the most highly qualified provider. If an acceptable rate cannot be negotiated, then the team moves to the next most highly qualified provider and this process continues until an acceptable rate is negotiated and an agreement executed.
How long does the Request For Proposal (RFP) or Request For Qualification (RFQ) process take?
There is no set time table and it generally depends on the scope, complexity and value of the project. These drive the duration of each phase of the process. The only legally-mandated time frame is that the University must publically advertise any solicitation exceeding $50,000 for a minimum of two weeks on the State Electronic Business Daily website. The primary steps in the processes are: initial scope/requirement development, advertising of the solicitation, evaluation of the proposals received, negotiations, and contract finalization. The process can take from as little as 8 weeks to as much as 9-12 months depending on the size of the project and the timely involvement of the key stakeholders.
Why are some things now being put on "contracts" versus the standard "Purchase Orders" we used to use?
Purchase Orders (PO’s) will continue to be the most widely used procurement tool for most standard, well-defined procurements. However, anything that now runs through the Strategic Sourcing will be formalized in a contractual agreement. Payments may be made against the contract (per the terms of the contract) using a non-PO voucher referencing the agreement number. The Contract Specialist assigned to the contract will review the invoice to ensure compliance with the terms of the contract and approve for AP. The department must still review and approve to confirm that the goods or services have been received and accepted, or that the payment milestone has been met. Items on PO’s are still paid with a voucher that links to the PO in UT Share. The Strategic Sourcing is not involved in the PO process and you should contact your Buyer with any PO-related issues.
A Request for Proposal (RFP) is a type of formal solicitation in which the University announces that funding is available for a particular project or program, and requests that companies submit proposals for the project. The RFP document outlines the proposal process and timeline, scope of work and project requirements, contract terms, and provides guidance on how the proposal should be formatted and submitted. An RFP is typically open to a wide range of proposers, creating open competition between companies and ensuring the best overall value is achieved for the University.
Each potential respondent in the RFP process is provided with the same information and is subject to the same requirements and deadlines in order to provide the same opportunity to all.
To preserve the integrity of this highly controlled process, all who are involved, either directly or indirectly, must keep all aspects of the process and the proposals confidential. In all cases, only the Contract Specialist may communicate with potential respondents and vice versa.
On the RFP due date, only the names of the Respondents will be made public. Proposals are not available for review by anyone, other than the evaluation team, until after the award is made.
Prior to starting the process steps outlined below, end using departments should contact the Strategic Sourcing (CMO) if they need help in determining whether their product, project or service is appropriate for the RFP process or could be accomplished with a traditional Invitation For Bid (IFB).
On the “Initiation Form” department should provide any known or suggested vendors that may be able to fulfill the project requirements, including contact name, address, phone number and e-mail addresses.
Department and CMO identify Key Stakeholder(s) and Subject Matter Experts (SME’s). Once the key team members have been identified, the CMO will arrange a proposal “kick off meeting” to help establish key roles, responsibilities and timelines to complete the remaining steps in the process.
The evaluation criteria used to score proposals should consist of the criteria that reflect the areas of importance to the University in its selection decision. Through the evaluation and scoring of the criteria, the University is able to assess the similarities and differences and the strengths and weaknesses of competing proposals. A well-integrated evaluation scheme provides consistency, discipline, and rationality to the source selection process, as well as a solid set of backup documentation in the event a non-winning vendor requests a de-briefing or protests the award decision.
Any other relevant factor that a private business entity would consider in selecting a vendor.
The Contract Specialist assigned to the RFP will work with the department to finalize the RFP content. The Contract Specialist will send the RFP to vendors identified by the department, those vendors identified through research, potential “Historically Underutilized Businesses (HUBs)” from the State’s “Centralized Master Bidders List (CMBL)” and, will publically advertise the RFP on the “Electronic State Business Daily (ESBD)” website for a minimum of 14 calendar days.
A pre-proposal meeting is suggested if the SOW is complicated or if it is necessary for potential proposers to physically see or examine the facilities or any activities related to the goods and/or services in the solicitation.
There may be times when, due to the nature of the project, attendance by proposers will be mandatory. In those instances, only proposals from firms who attend the pre-proposal conference will be accepted.
Once proposals have been received, the HUB Program Coordinator will review the HSP’s submitted. Only proposals accompanied by an acceptable HSP will be evaluated and eligible for award.
When the Non-Conflict and the Non-Disclosure forms have been signed and returned to the Contract Specialist, the compliant proposals will be distributed to the Evaluation Team Members, along with a scoring and comment sheet.
NOTE: The pricing will be removed from the proposals before distribution to the Evaluation Team. The evaluation team is to evaluate and score solely based on the technical/operational merits of each proposal. This evaluation cannot be biased by cost/price information. The Strategic Sourcing will evaluate the Cost/Price information and assign scoring points accordingly based on the percentage variation in pricing, with the lowest priced solution that meets the technical/operational requirements receiving 100% of the points in the pricing category. All others will receive a pro-rated amount of points based on their percentage variance from the lowest price acceptable solution. In other words, if there are 30 points weighted for pricing then the lowest priced acceptable solution would receive all 30 points. If the next lowest priced acceptable solution is 10% higher, they would receive 90% of the 30 points or 27 points, and so on for the rest of the proposals.
When the proposal evaluation is complete, the Team will identify finalists and may request the Contract Specialist to invite them to do presentations. If, during the presentations, additional information is gathered that would affect the scoring against the evaluation criteria, the Evaluation Team may revise their scoring. An explanation for the scoring changes must accompany the revised score sheet.
At this time, one or multiple proposers may be invited to submit a Best and Final Offer (BAFO) in an attempt to improve pricing or achieve additional concessions and/or considerations. This is an optional step and does not have to be performed if the Team believes the best overall value and contract position has already been achieved.
Once the Evaluation Team completes their evaluation, the Contract Specialist will review the documentation to ensure appropriate processes have been followed in consideration of all evaluation criteria and the justification for vendor selection. The Contract Specialist may request additional information, or clarification from the Team if needed.
The Vendor whose Proposal has the highest final score becomes the potential awardee for the contract and the University notifies all vendors (including those not selected) of its decision.
The Contract Specialist will prepare a draft version of the Agreement, including any exceptions requested by the Proposer for review by both the Key Stakeholder and Legal. The Key Stakeholder should review to ensure correctness and completeness of scope, requirements, schedule, deliverables and any other technical/operational/business aspect of the Agreement. Legal will review the entire Agreement, paying particular attention to any exceptions taken to the terms, conditions, and legal aspects.
Once all University parties are in Agreement, the draft Agreement is sent to the proposer for review and input. At this point, it may be necessary to arrange a meeting to negotiate and finalize certain points of the Agreement. Some issues can be resolved easily and quickly, others may take more time and input from multiple parties. Regardless, once all parties are in agreement the University’s Legal representative will stamp the Agreement showing approval and it can then be signed by the appropriate University representative. It is then forwarded to the Proposing firm for their signature (“contract execution”).
The Contract Specialist will then schedule a project kickoff meeting with the end-user/department/key stakeholders to distribute key documents, including checklist which will serve as a guide for the department’s day-to-day administration and monitoring of the contract.
It is not unusual for it to take from three (3) to six (6) months to achieve contract award and execution. Some projects have been known to take a year or more.
If the contract exceeds $1,000,000 over the life of the contract, the awarded vendor must complete and return a “Form 1295: Disclosure of Interested Parties” prior to contract execution.
In conjunction to Form 1295, “Nepotism Disclosure Forms” must be completed by all Evaluation Team Members for contracts exceeding $1,000,000 over the life of the contract.
Once the Contract Agreement has been executed, vendor must submit “Proof of Insurance” meeting or exceeding the requirements that were identified in the RFP. If workers will be on campus, the vendor must provide a letter, signed by an authorized representative, certifying compliance with the “Criminal Background Checks” requirements detailed in the RFP.
Historically Underutilized Business (HUB) - A for-profit entity that has not exceeded the size standards prescribed by 34 TAC §20.23, and has its principal place of business in Texas, and is at least 51% owned by an Asian Pacific American, Black American, Hispanic American, Native American, American woman and/or Service Disabled Veteran, who reside in Texas and actively participate in the control, operations and management of the entity's affairs. A minority or women-owned business as defined by Gov’t Code, Chapter 2161.
HUB Subcontracting Plan (HSP) - A Historically Underutilized Business (HUB) Subcontracting Plan is a requirement placed on vendors to encourage their utilization of historically underutilized businesses where subcontracting is practical. Applies to all delegated purchases with an estimated total cost of $100,000 or more where there are subcontracting opportunities for the procurement.
Key Stakeholder – The person who is responsible for the content of the proposal, establishment of the evaluation criteria and evaluation team, and who is ultimately responsible for the successful completion of the project.
Pre-Proposal Meeting - The purpose is to clarify any concerns bidders may have with the solicitation documents, scope of work and other details of the requirement. May also serve as an opportunity to conduct a walk-through of specific facilities or job sites if needed.
Specifications and Scope of Work – a) A detailed description of the requirements for a material, product, or service that includes performance or design criteria necessary to satisfy customer need. b) An accurate, detailed, and concise description of the work to be performed by the contractor.
University Contact Information (Section 4.10 Notices) – Generally, an address for a Director or above position for notices, consents, approvals, requests or other communications provided for or permitted to be given under any of the provisions of the Contract Agreement. This must be in writing.
This overview is intended to provide end-users and key stakeholders with a high level guide to the key aspects of contract administration and monitoring for the projects they are responsible for. A more detailed resource can be found in the University’s Contract Management Handbook – Chapter 7. Also, please contact the Strategic Sourcing at either 817-272-6148 / [email protected] (Joe White) or 817-272-2140 / [email protected] (Charlie Brooks) for more information or post-contract award assistance.
The goal of contract administration is to ensure the contract is satisfactorily performed and the responsibilities of both parties are properly executed. Effective contract administration minimizes or eliminates problems and potential claims and disputes. In the UT Arlington model, the end-using department or key stakeholder is the day-to-day administrator (monitor) of the contract. The Strategic Sourcing is available for assistance as needed and can also serve as an interface to Legal Counsel should serious contractual issues arise.
Verify contractor performance for purposes of payment.
Identify potential material breaches of the contract by assessing the difference between contract performance and material non-performance.
Determine if corrective action is necessary and take such action if required with the assistance of the Strategic Sourcing.
The contract’s statement of work should be the roadmap for contract administration. Therefore, planning for contract administration actually occurs prior to issuance of the solicitation.
A good contract administrator ensures that the contract requirements are satisfied, that the goods and services are delivered in a timely manner, and that the financial interests of the agency are protected.
It is the contractor’s responsibility to perform and meet the requirements of the contract. To do so, contractors sometimes need technical direction and approval from agency personnel. Agency personnel must provide this technical direction and approval in a timely and effective manner. All guidance provided to a contractor must be within the scope of the contract.
Agencies must be careful to not impose additional requirements upon the contractor or manage the contractor’s operations to the extent that the contractor is relieved of their responsibility to perform.
The extent of contract administration will not be the same for all contracts. The level of contract administration necessary should be consistent with the complexity and level of risk of the contract, its’ term, and dollar value.
Participating, as necessary, in developing the solicitation and writing the draft documents. Contract administration must be considered during this process.
Managing the contractor's progress and performance to ensure goods and services conform to the contract requirements.
When the department submits a voucher for payment, this is their confirmation that the goods or services have been received, conform to contract requirements, and can be paid for.
The Strategic Sourcing will also review the invoice to ensure the pricing is consistent with the contract rates or milestones, and any discount terms if applicable.
Exercising state remedies, as appropriate, where a contractor’s performance is deficient (in conjunction with the Strategic Sourcing).
Resolving disputes in a timely manner (in conjunction with the Strategic Sourcing and/or Legal).
Documenting significant events (in conjunction with the Strategic Sourcing).
Maintaining appropriate records (in conjunction with the Strategic Sourcing).
Determining the sequence of activities, dependencies, required or desired outcomes, and acceptable performance levels.
Developing a timetable and start and end date for each performance component. Include milestones with accompanying timeframes, and monitoring and reporting requirements.
Monitoring contractor activity on a specified frequency to identify problem areas.
Meeting with the contractor on a regular basis to review progress, discuss problems and consider necessary changes.
Providing access to state facilities, equipment, data, staff, materials and information.
Contacting other staff as necessary to provide equipment and data.
Establishing scope of authority, clear lines of communication and reporting and specific individuals who will interact directly with the contractor.
Establishing control of correspondence, data and reports.
Being aware of the terms or conditions of default (will be specified in the contract).
Establishing a procedure, identifying a responsible person and establishing a timeframe for handling non-compliance issues (by either party).
Establishing a procedure, identifying a responsible person and establishing a timeline for making necessary contract decisions or modifications.
Expected outcome measures – includes staging of deliverables, if applicable. Significant deliverables should be tied to the payment schedule.
Costs – The total cost, including any indirect cost allocation of the goods and services to be performed.
Contract Performance - When, where, and how the goods and services are to be delivered.
Acceptance/Rejection Terms – The agency’s right to inspect and accept or reject the goods and services and the conditions of acceptance or rejection.
Contract Dates: The effective date, completion date, renewal terms, and any additional dates necessary to monitor contract performance.
Complete addresses – Where correspondence is to be sent, where payments are to made, etc.
A post award conference is a meeting with the contractor and includes all key personnel responsible for administering the contract. The conference is typically held soon after the contract is awarded. It is an orientation for the contractor to ensure a clear and mutual understanding of all contract terms and conditions, and the respective responsibilities of all parties. The conference also serves as an excellent opportunity to clarify and resolve any potential misunderstandings up front so they do not cause a delay mid-project. Although both the contractor and the agency personnel should already be fully aware of the contract requirements, the post award conference ensures that those involved directly in the contract administration process understand all requirements of contract performance.
Not every contract requires a formal post award conference, but generally there should be some form of discussion between the contracting parties after award to ensure that all parties agree on the performance requirements and the administrative procedures applicable under the terms of the contract. The post award conference should NOT be used to change the terms of the contract. Any change to the contractual requirements must be handled by the Strategic Sourcing in the form of a written Amendment to the contract.
Monitoring the performance of the contractor is a key function of proper contract administration. The purpose is to ensure that the contractor is performing all duties in accordance with the contract and for the agency to be aware of and address any developing problems or issues.
How will you know that the agency is receiving what it paid for?
How will you know that the contractor is complying with the terms of the contract?
Review the statement of work and other contract terms, including contractor compliance requirements. All of these requirements are deliverables that the contractor agreed to when the contract was executed or the purchase order was issued. Design the monitoring program to focus on items that are most important. Generally, this means to focus the monitoring on the outcomes that result from the contract.
The number of units billed is the same as the number of units received.
The quantity and price agree with the contract amounts.
The units meet or exceed the contract specifications.
If an agency receives grant money to pay for a contract, the agency must consider the nature of the relationship with the contractor. Is the relationship a vendor relationship or a sub-recipient relationship? See OMB Circular A-133, Section 210 (http://www.whitehouse.gov/omb/circulars/a133/a133.html) for guidance on relationship determination. If the relationship is that of a sub-recipient, then federal guidelines and cost principles must be followed. The Uniform Grant Management Standards published by the Governor’s Office (http://www.governor.state.tx.us/divisions/stategrants/guidelines/view) will provide guidance as well.
Was the item billed really purchased by the contractor?
Was the item billed used for the purpose of the contract?
Was the item necessary and reasonable for the purpose of the contract?
Was the item of the quality and quantity specified in the contract?
Was the item duplicated in either overhead or profit?
Was the item listed in the contractor’s budget and approved by the agency?
The agency must review the contract to see how the costs are reimbursed. Many contracts require that all costs must be included in the original budget provided by the contractor and approved by the agency. In some cases, the contract may specify that certain costs such as the purchase of a vehicle or use of a subcontractor require approval by the agency prior to purchase.
End user should design a monitoring system that includes criteria and defined follow up actions in the event of any failures or issues on the part of the contractor. The goal of follow up should be to bring the contractor back into compliance with the contract requirements and successfully complete the project. Follow up is essential as the problem will not correct itself simply by identifying it and including it in the monitoring report.
Status Reports – Describe the progress of the work. The content of the status report should be consistent with and track the organizational structure of the statement of work, i.e. phases, segments, deliverables and products. A status report should describe what work is complete and what work is pending and that status should be contrasted against the contract schedule. Only work that has been verified as completed or accepted should be categorized as complete. If there are any unresolved issues that the agency is contractually obligated to resolve, those issues should be included in the status report and a resolution should be requested. If the scope of work has changed during the contract (by written contract amendment), insist that status reports track the original contract schedule, not a revised contract schedule, unless the amendments provides for a revised contract schedule. If status is tracked against a revised schedule, there is a risk that the schedule will continually change and the status report will be rendered meaningless.
If the contract does not provide for periodic status reports, the agency should ensure that sufficient progress is being made by the contractor. This may be accomplished by requesting a status update from the contractor or a site visit to view the progress.
Activity Reports - Describe any activity on the project; project activity is not the same as a status report. A project may have a great deal of activity without making substantive progress. On the other hand, activity reporting can be a core feature of contract management. For example, a contractor payment in an outsourcing contract may be based on the number of completed transactions. In this example, activity reporting is critical to contract administration.
The costs incurred by the contractor should be in accordance with the contract rate schedule. Invoices should be reviewed to ensure that the contractor’s billing coincides with the contract’s progress and/or goods received. This requires that the contractor’s progress be measurable. Cost incurred or invoices submitted, in and of themselves, are insufficient indicators of the contractor’s progress.
If the agency believes that the requested payment exceeds the contractor’s progress, an explanation should be requested from the contractor prior to approval of the invoice. Payment should be withheld pending agency satisfaction with the contractor’s progress.
The contractor is billing only for goods or services received by the agency.
The goods or services have been accepted with no damage or missing components (not just “received”).
The invoice is correct and complies with the terms and conditions of the contract.
The total payments do not exceed the contract limits.
Client services contracts are unique in that acceptance of a good or service is not an indicator that an invoice should be paid. Problems with client services contracts generally surface after invoices are paid. Contract administrators dealing with client services contracts should ensure mechanisms exist to penalize contractors for poor performance and that future payments may be withheld until performance improves.
For any change to the contractual requirements, the modification(s) must be documented in writing and follow the proper review and approval process as dictated by State statute and or University policy. In no situation should an end-user give verbal approval to add/change/modify the contractual requirements. The contract administrator should involve the Strategic Sourcing (or the appropriate Buyer if the work is related to a Purchase Order) as soon as it is known that a change to any contractual element is needed.
• Formal, written approval of all changes prior to the change taking place. Do not verbally authorize the vendor to begin working on a change before formal process is fully analyzed, documented and approved in writing. Failure to do so puts both the contractor and the person making such verbal authorizations at risk.
• Evaluation of the impact of each change to the contracting objective, the corresponding deliverable and/or products, the schedule, cost, and increase in agency overhead resulting from the change, impact to work in progress/completed work, standards, and acceptance criteria.
• Documentation of all changes, no matter how small and avoids any informal undocumented change process.
Establish a single point of contact to recommend or authorize any change. Document the change as approved or disapproved. If a change is approved, document the change and the impact to the scope of work through a contract amendment or purchase order change notice, whichever is applicable.
Whether or not a contract may be changed, depends upon certain principles. State law requires a competitive process in most situations. The specific method of competition depends upon the type of goods or services needed. If competed, the resulting contract must be consistent with what was asked for during the competition, usually contained in the solicitation document. Not being consistent can violate the competitive process requirements.
If a change is needed to a contract, the change has to be within the scope, or range, of what was provided in the solicitation. A significant difference would be a material or substantial change in the scope of services, and would not be allowed because it had not been originally subject to fair competition. To permit such a change would go against the ideas of competition and a fair playing field for all of the vendors.
For example, if a contract to buy 10 desks is amended to include 300 file cabinets, the change is outside the scope of the contract because vendors did not have the opportunity to compete for the sale of 300 file cabinets. Additional vendors may have competed had they known that file cabinets were being solicited. Such a large quantity of file cabinets could also have had an impact upon which vendors competed. Other vendors may have been interested in bidding on file cabinets that were not interested in bidding on desks.
In order to determine what constitutes scope changes to advertised specifications, the significant question is whether the changes are material or substantial.
Material or substantial changes are not measured by the number of changes made to the original specifications. Rather, they are measured by whether the extent of the changes would so substantially alter the original specifications that not re-advertising the revised specifications would deny a procurement opportunity to someone who would have been able to respond to the revised specifications. If much is revised, then those changes will be treated as a new proposal. A new solicitation is needed to ensure compliance with the bidding statutes.
Changes as permitted by the specific contract language.
Change of any terms and conditions.
Interfere with or hiProper dispute resolution is a core skill of successful contract administration. Identification of problems early in the performance period, effectively communicating the issue to the contractor as well as the Strategic Sourcing, and formalizing the process in writing via a cure notice procedure or less formal written procedure is essential. A contract termination is a failure by BOTH parties to a contract. Termination is the last resort and should be avoided if at all possible.
Identify the problem - many times what may appear to be a problem can be resolved by providing the contractor with information or clarification.
Research facts – the agency should obtain all the information regarding the potential problem from all relevant sources, including the project manager and the contractor.
Evaluation – the agency should review all of the facts in conjunction with the requirements and terms and conditions of the contract. The agency should then determine the appropriate course of action.
Proper dispute resolution is a core skill of successful contract administration. Identification of problems early in the performance period, effectively communicating the issue to the contractor as well as the Strategic Sourcing, and formalizing the process in writing via a cure notice procedure or less formal written procedure is essential. A contract termination is a failure by BOTH parties to a contract. Termination is the last resort and should be avoided if at all possible.
When a contract is terminated, the parties are relieved from further unperformed obligations in accordance with the agreed terms and conditions. A contract may be terminated under two distinct processes: Termination for Convenience or Termination for Default.
A termination for convenience, also known as no-fault termination, allows the agency to terminate any contract, in whole or in part, at any time in its sole discretion (generally with a thirty (30) day notice to the contractor), if it is determined that such termination is in the best interest of the agency.
The agency shall provide the contractor with written notice specifying whether the agency is terminating all or part of the contract. The notice of termination shall give the date of termination. If the contract is being selectively terminated, the agency should specify which part(s) of the contract are being terminated.
The contractor will generally be paid for allowable costs incurred up to the date of termination. The agency will not be liable for payment to the contractor related to the terminated portion of the work or any work performed or costs incurred after the effective date of termination.
Upon receipt of any invoice from the contractor for work performed prior to the Notice of Termination, the agency should thoroughly review the invoice to ensure that no excessive costs are included.
Has the agency done everything within reason to assist the contractor in curing any default?
The provisions of the contract and applicable regulations.
The specific contractual failure(s) and the explanation provided for the failures.
The urgency of the need for the contracted supplies or services. The agency may need to weigh the respective benefits and/or disadvantages of allowing a delinquent contractor to continue performance or re-soliciting a new contractor.
The availability of the supplies or services from other sources and the time required to obtain them (compared to the additional time the current contractor needs to complete the work).
Availability of funds and/or resources to re-purchase in the event such costs cannot be recovered from the delinquent contractor. Under a termination for default, the agency is within its rights to demand re- procurement costs from the defaulting contractor. Nevertheless, the contractor may not be financially capable to finance the re-purchase, or such demand may result in protracted legal action.
If a vendor is terminated for default, the contractor is liable for actual damages and costs incurred by the state unless the contract states otherwise.
Severe weather, although beyond the contractor’s control, will not generally constitute an excusable delay if it is not considered “unusually severe weather”. For example, a snow storm in Amarillo in February would not be considered unusual, while it would be considered unusual in Austin. On the other hand, a snow storm in Amarillo in June would indeed be unusual.
If the contractor’s failure to perform is due to the default of a subcontractor, in order to qualify as an excusable cause, the default must arise out of causes beyond the control and without the fault or negligence of both the contractor and the subcontractor. Even if this requirement is met, the cause will not be excusable if the supplies or services to be provided by the subcontractor could have been obtained from other sources in time to meet the contract delivery schedule.
A copy of all backup documentation for contractor payment or progress payment; and copies of any audits.
The University's Contract Management Handbook is a comprehensive guide for contract management processes and practices in connection with the procurement of goods and services. | 2019-04-22T15:17:53Z | https://www.uta.edu/business-affairs/procurement/contract-management-office.php |
SaaS is regarded as cloud computing services such as PaaS (Platform as a Service), DaaS (Desktop as a Service), IaaS (Infrastructure as a Service), ITMaaS (information technology management as a service), and plenty of others. SaaS which is short for Software as a Service ([sæs]) is a technology of delivering software through a regular licensed subscription. The software is hosted on the server while users exploit a web application via a thin client.
A thin client is characterized as a lightweight, stateless, fanless terminal services providing users with remote access to data, applications, memory or any other valuable content stored on a server. The server manages all operations relating to data processing and software applications. A thin client allows users to promptly connect to the program without having to worry about security, scalability, and cost of the server management.
This way vendors of software as a service are responsible for the hostage and maintenance of the server, data, and code of the software. Organizations in their turn don’t need to pay for the hardware or sometimes even for the upkeep of an IT department.
Presently SaaS is in great request among business users as it provides applications meeting crucial needs: customer relationship management, sales management, financial management, human resource management, accounting, email, etc.
For the first time the abbreviation reportedly occurred in the article "Strategic Backgrounder: Software As A Service" in 2001 although the very technology of the centralized application hosting originated in the 1960s. IBM and other data centers provided big organizations with a computing resource, database maintenance, time-sharing systems, and utility computing. After the spike of the internet dissemination in the 1990s a new type of centralized hosting turned up: ASP which stands for Application Service Providers. ASPs were intended for hosting and handling applications which let business users minimize expenses and delegate the responsibility for the successful operation of the application to the vendors. Thus SaaS primarily promotes the concept of the ASP technology.
In the past Software as a Service used to be referred to as Software Plus Service whereas nowadays it is sometimes mentioned as On-demand Software.
After SaaS appeared in the IT market there were significant turnarounds assisting in the progress of its adoption and ubiquity.
The increasing reliance on web-based user interfaces in addition to the dissemination of the technologies requiring such an approach of use led to the lack of standard on-premise and client-server applications popularity. Fat clients, therefore, started being treated as not sufficiently up-to-date which resulted in common loyalty to the emerged class of an IT practice.
A solution stack for web development incorporated HTTPS protocol which endowed universal lightweight security to keep the data safe and the access to it limited.
Such integration protocols as REST and SOAP empowered and facilitated integration between on-premise (internal) applications and cloud applications. This opportunity lets end-users exploit a great variety of networks and applications without carrying about program integration and compatibility.
The rapid growth of wideband Internet network provided an opportunity to host applications distantly ensuring high connection speed and making redundant the need for local software.
The software entails a recurring subscription which means that the product doesn’t have to be purchased and therefore there are no start-up costs.
Users are able to unsubscribe from the software at any time they need it without having to continue paying on a mandatory basis.
The software is regularly updated online and the existing data are always saved and kept in the cloud.
The whole component suite of the software has to be bought in advance and in order to be used it must be installed on the computer.
The licenses are by default confined to the number of end users.
The number of devices where the software may be exploited is limited as well.
Nevertheless one should certainly bear in mind that the ground zero for the choice is the requirements of an organization and the degree of complexity of the business processes run. Some consider software as a service more suitable for small or medium companies as the technology is still sometimes criticised for poor or at least not sufficient functionality. For that reason, large organizations and business often overlook the fact of SaaS cost-effectiveness and choose traditional on-premise systems. Although the technology is indeed working on the way to close the loop on the issue of functionality.
The solutions entail a multitenant architecture which means that multiple users are able to connect to the single application and data. The source code of the application is the same for all users and when there are updates in the application they are rolled out to all the users. As for the architecture of ASPs, it implies sustaining one instance of the application for every user or business.
SaaS providers develop, maintain and deliver their software whereas ASPs devote their efforts to hosting and handling third-party software produced by other vendors in the market.
Software as a service doesn’t need installation on-premise and requires only the Internet connection and a web browser to be run. ASPs in their turn provide client-server applications which need to be installed on the computers.
In order to operate in tune with another software exploited software as a service has to be applied along with APIs - application programming interfaces. Whatever software is utilized by the user it can be integrated with SaaS through an API. API constitutes a code intended to let several software applications interact with each other. An application program interface has to detect the right model for an application to be developed so that to request services from other programs of an operating system.
As for the structure, API is composed of two parts. The first one is presented as specification explaining how the process of information exchange should undergo. The element is accomplished as a request for information handling and a reply in the form of the required data. The second part of API is a programming interface developed according to the specification. The software is aimed to connect to the features belonging to the API requesting for it.
s APIs are intended for seamless data exchange between the cloud-based application and on-premise one (for instance) they are purposefully designed in the way to meet the needs of big organizations where multiple departments are going to use the application (e.g. SaaS) for a variety of purposes. Thereby today most programs are developed with regard to the use of API due to the convenience as it reduces cost and time of development and decreases the risks of errors.
Although SaaS and Cloud Computing are often seen as very close terms there is a difference between them.
Cloud computing implies a third party hosting the user’s software which can be customized and handled by the user. The internet connection and a web browser ensure access to the application and personal data.
When it comes to SaaS, the user is not tied to hosting, maintenance and updating of the software. The vendor providing it is responsible for all the processes. The technology entails a subscription which can be waived anytime the software is no longer required.
Nevertheless, there are risks the users should be ready to meet: there is less control over data security, application handling and customization which is sometimes considered as essential.
A private cloud is a technology exploiting the infrastructure applied in a public cloud to store the data on-premise. As well as in the public cloud users get access to the data via the internet and receive the same range of capabilities. Although the users don’t share the processing power with the public at large as it is used in common only by the users of an organization where the cloud is exploited. And as opposed to the public cloud, the private cloud technology involves a necessity in the IT department to support it.
Private cloud is convenient and useful mainly for large organizations willing to maintain a high level of their data security and a wide access to it for the employees. However, the private cloud doesn’t apparently bring the profit offsetting the cost of its development and handling. Thus it should be a carefully considered decision if to start such a project meaning that it would meet the requirements of a certain business.
SaaS solutions entail a specific kind of architecture - a multitenant one. Multitenant architecture implies that all users exploit a single version of the software including its hardware, network, and operating system. The software requires installation on several devices in order to keep it scalable. Here software as a service is opposed to traditional systems where each customer exploits a physical version (copy) of the software. Each instance of the application possesses different hardware, network, and operating system - configuration. Each one has its unique code as a base, is installed on a separate computer site, and can be easily customized. However, multitenancy is not an obligatory feature of the SaaS technology as sometimes it’s possible to handle a big number of users with the help of virtualization which is also profitable and rather economical.
This type serves the needs of a specific category of software: sales, HR, marketing, developers.
It is responsive to the needs of an industry: sales, HR, marketing, IT department.
A classic SaaS application provides an opportunity for each user to set the parameters which are also called configuration options. The options serve to alter the functional performance of the application and its look and feel. This aspect of SaaS allows every user to have their own unique arrangement of the software responsive to the specified needs and requirements. Nonetheless, the extent to which the application can be customized is established during the process of development. This way due to the opportunity for configuration changing customers can often alter the look and feel of the application for instance with setting the application to display the brand of the organization they work at. Hence SaaS vendors generally let customers attain their custom logo and several custom colors. Although the page layout not always can be customized but only if it was created in a way to accept customization.
SaaS software has no access to the user’s domestic databases and internal services which is rather often needed though. Thus SaaS applications are commonly delivered along with integration protocols and application programming interfaces as they assist in accommodation of several systems for the sake of user-friendliness. Normally, those protocols rely on SOAP, REST, and HTTP techniques. Furthermore, due to SaaS global dissemination and the API systems standardization led to the elaboration of plenty of mashups. Mashups are lightweight web developments intended to merge heterogeneous data from various sources and services to that to present a united aggregate system. Mashups have to as well distinguish on-premise applications and SaaS ones because the former are not smoothly incorporated outside the organization’s network security system.
Customers are not in charge of the updates. The software is hosted centrally and a provider is the only one managing and accomplishing the upgrades.
The process of testing undergoes significantly faster due to a single configuration set of the application.
There are no backdated versions of the software and the providers don’t need to handle and upgrade them given that there is just one application version for all customers to be maintained and upgraded.
Owing to the application central hosting, the vendor has complete access to all users’ data and the software functionality and design are regularly enhanced through regression tests.
Web analytics allows SaaS vendors to estimate the application usability and discover bottlenecks in the software to be fixed.
Regular releases of the software require agile software development tools to keep the feature delivery high-quality, expedited, and frequent.
Web 2.0 functionality is a technology aimed at the enhancement of the content produced by users themselves, the usability of the system and its compatibility with other services and systems. Owing to the extensive use of web 2.0 and social networks, SaaS vendors saw the point to implement a feature allowing for collaboration and communication into the application.
Consequently multiple or even most of SaaS applications nowadays provide not only classic range of capabilities for project management but also a function permitting end-users to communicate. The communication, in this case, involves different opportunities to converse, comment on assigned tasks, share documents, offer plans, features, and ideas while staying in or out of the organization exploiting a SaaS application. Since SaaS solutions deliver access to data through a web browser, there is no need to stay at a working place to remain aware of the ongoing business processes.
Nevertheless, certain functions delivering the opportunity for communication are integrated and installed on-premise and in such an instance the collaboration is available only for the users working specifically there - on-premise.
SaaS vendors supply advanced solutions which don’t necessitate purchasing, installation, hardware or software maintenance, and upgrading accordingly. The applications are increasingly welcomed by and are popular with organizations especially if they don’t have sufficient resources to purchase the software, deploy, and handle the needed technology supporting the application.
Among SaaS products there are well-known applications such as CRM, ERP, HRM, etc. Moreover, by means of SaaS customers are able to utilize such essential basic functions as email, billing, financial management, and others.
As opposed to classic on-premise software, software as a service doesn’t need to be bought and installed but is available through a recurrent subscription. A pay-as-you-go pricing model allows users to avoid up-front costs and plan their finances more thoroughly. The customers can likewise stop using SaaS anywhen they want. One of its best functions is high scalability which means that the application scales up and down automatically conforming to the degree of the use and this feature as well lets minimize expenses.
As it has already been mentioned SaaS is noted for its specific scalable usage. Due to the exploitation of the cloud users are free to choose the access as wide as needed depending on the requirements. Thus it is possible to select and use the needed features and services without changing the software or overpaying.
Customers don’t have to bother upgrading or purchasing a new version of the application used like in the example of traditional software. Instead, the providers assume the responsibility to manage patches in the application and upgrade it. Luckily for small and medium businesses this feature of SaaS allows to dispense with the IT department or at least cut down its workload.
Due to the fact that any software as a service solution is provided over the internet, it can be accessed through any device or from any place with the internet connection. It implies that a user can be located anywhere in the world while being connected to the software and staying informed of the business data due to the cloud-based service. And even though some SaaS applications need plugins to be downloaded and installed, the technology mainly doesn’t need installation.
Despite multiple benefits introduced by SaaS into the business management process, the technology itself involves several limitations and shortcomings that cannot but be taken into account before a decision made to start using SaaS.
As the concept of the method implies customers devolve their data to vendors regardless of the kind of information accumulated there. The users neither can control nor regulate the updates and their necessity which means that the businesses always depend on the software version delivered at the moment and they can’t know how it may be changed in the future. Furthermore, there is always a possibility of a service outage which would certainly affect the users’ operation and performance. Undoubtedly, there is also a possibility of a security breach which may result in a very undesirable precedent.
According to Richard Stallman from the Free Software Foundation, Software as a Service infringes the laws of free software. Stallman expresses an idea that the users don’t possess a physical version of a run file but may access their personal data only remotely. Respectively they don’t have an opportunity to make sure in which actual condition the software and the data are. Only the server provider has a right to change the software and check its functionality.
Although, one of Forbes contributors, Dan Wood for his part speaks about SaaS with the open source code as a new model providing more confidence and security for the customers. Woods gives an example of Drupal Gardens where end-users may just attain a source code version of the software code running their website including their data. Then the code can be used afterwards at the user’s discretion. In this case the opportunity of a copied code keeps the customers safer about their business.
As the data are maintained distantly and there is no direct access to it, data security is always in doubt.
Multiple users need to integrate a software as a service solution with their own current data. If the data is of large volume or if it requires careful handling the integration may turn out rather risky and expensive.
Seizure warrant laws do not guarantee the safety of the data belonging to SaaS. It means that the data misuse is avoided only due to the presumed integrity of the vendors who access the data at their own discretion.
Given that all SaaS applications are stored in the cloud it brings about latency in the software response. Thereby SaaS probably would not be acceptable for operations where the response is required instantaneously.
Multitenant architecture, as one of the main SaaS features, places restrictions on the degree of the customization in the application. As the solution is introduced to many users it cannot suit everyone meeting their individual needs.
There is always a probability to lose a current SaaS vendor due to different circumstances. Meanwhile changing a vendor entails certain risks related to data safety, integrity, and the process of its transferring.
Whereas users are tied to the provided software and are not able to choose the version, they have no alternative but repeatedly need to adapt and get used to an updated version of the application. It can introduce instability in the process of the application managing.
In case the vendor decides to retire from business or stop supplying the software, the customer has to look for a new SaaS provider, transfer all the data, and be ready for certain unforeseen costs.
SaaS solutions often need to be integrated with the user’s hardware, operating systems, and a utilized software. And it is a question whether the application is going to comply with the existing systems.
In view of the above customers must closely look at the service-level agreement offered by a SaaS supplier and ascertain that it is enforced.
SaaS provides engineering simulation software as well as other applications though this kind of software is typically delivered as an on-premise product.
Calculate potential loads to plants and factory equipment.
Consequently, through engineering simulation provided as SaaS businesses and organizations don’t have to spend on extensive software and its installation but are able to use an application hosted and maintained by a third party.
According to an electronic resource - computereconomic.com, most companies - 60% acknowledge using SaaS solutions and contribute rather much to SaaS development in general. As for the degree of the technology adoption, there are several stages of acceptance of the technology. 36% of companies respond that they have some software as a service applications up and running and aim to invest more. 24% of companies state that possess it but are not planning to invest anymore. 40% of companies are in the process of implementing software as a service in place and are not ready to say if they will continue the investment in the future.
Software's as a service pricing model is more beneficial rather than the one belonging to the traditional on-premise software primarily due to the multitenant architecture tying numerous customers. Furthermore, as compared to the traditional software it provides a recurring subscription, typically an annual or a monthly one. This allows users to disperse the expenditures over time without having to arrange a full payment at once. Additionally, the vendors of the cloud technology commonly provide one of the two pricing models: a pay-per-user model and a pay-as-you-go model.
This kind of billing method is more common among the users. Under this type of billing an individual cost is brought upon each customer of a software as a service solution. Owing to the pay-per-user pricing model the application is ready to be used on all the devices including smartphones, tablets, laptops, pcs and others without any extra expenses. Users are able to pay periodically, for instance once a month.
Moreover, it is possible to exploit the pay-per-user pricing model to pay-per-multiple-users which implies that an individual cost is brought upon a particular group of users.
Under this type of billing method, a cost is incurred for a specified number of users and the level of resources required involving the storage space, the usage of CPU, etc. The customers pay for an agreed period of time of SaaS use. The pay-as-you-go pricing model is lucrative for the businesses to the extent that they have to pay only for the indeed required level of resources instead of having to pay the fixed rate for unnecessary services.
Generally, SaaS perfectly suits organizations seeking to reduce IT department workload and the software costs. Consequently, the solutions mostly are popular with small and medium businesses, as rather than contributing money to a supplementary on-premise server capacity and new software versions, organizations are able to pay a recurring subscription fee without a need to install, maintain and update the software. The users always can expand and narrow the software requirements depending on the needs which in its turn affects the price. The staff as well becomes more productive since the IT department doesn’t have to deal with the on-premise software and hardware but are free to handle more essential problems connected with the company’s development. In addition, if there is a power outage or a security breach in the office of an organization exploiting SaaS, the personnel don’t need to worry about the data, its back-ups and safety because the vendor is in charge of it.
Dropbox is a service intended to let a user maintain all necessary files and documents right at hand. Dropbox data storage is displayed on a home screen of all the devices allowing to access the file, work on it, introduce changes, etc. without having to remain at the working place. It is as well possible to share the access to a file or a folder among working teams or individual employees. the users can set a password and even remotely wipe the information in case of necessity.
Microsoft Office applications such as Word, Excel, Onenote, PowerPoint, etc. have been the most frequently used services for the office work so far. Today Microsoft has extended its product to a cloud-based software - Microsoft Office 365. The service enables customers to compose new documents, introduce changes and share the access from any device supported by various operating systems such as including IOS, Android, and Windows. The users may connect with each other, comment on documents and suggest changes. It is also possible to exploit video conferencing.
Amazon is well-known for its widespread e-commerce although so far it has gone beyond it and has developed an on-demand, cloud-based software delivery. Their services involve programs accessible through a pay-as-you-go pricing model. Today Amazon Web Services include about 70 diverse applications containing data storage, databases, computing, management tools, networking, and others. | 2019-04-23T02:27:22Z | https://galaktika-soft.com/blog/what-is-saas.html |
Neuromyelitis optica (NMO) is an inflammatory demyelinating disease of the central nervous system that primarily affects the optic nerve and spinal cord with highly specific autoantibody NMO-IgG levels seen in the serum of NMO patients.1 The target antigen of NMO-IgG has been identified as aquaporin-4 (AQP4), a water-channel protein predominantly expressed in the central nervous system.1 2 NMO-IgG expression is restricted not only to typical NMO but also to NMO spectrum disorders (NMOsd) as well that include the following clinical features3: (1) limited disease forms, such as optic neuritis (ON) or longitudinally extensive transverse myelitis (LETM); (2) atypical brain lesions with characteristics typical for NMO and positive NMO-IgG; and (3) ON or LETM associated with a systemic autoimmune disease.
An increasing number of studies have reported the clinicoepidemiological features of NMO,4–9 although the patient number in each study has been insufficient. Therefore, the population prevalence of NMOsd has not yet been firmly established. The present study analysed clinical and epidemiological features in a large group of Japanese patients with NMO. Anti-AQP4 antibody (AQP4-ab)-positive or AQP4-ab-negative patients who exhibited characteristic NMO clinical features were compared and analysed under identical conditions at a single institute using an antibody assay system.
A total of 2366 serum samples were sent to our laboratory from other Japanese institutions during 2006–2009 for AQP4-ab testing. All patients were diagnosed as having inflammatory demyelinating disorders of the central nervous system by their referring physicians by MRI findings and laboratory tests. Clinical information was obtained under informed consent from patients by their referring physicians. According to the clinical records, the patients exhibited features such as ON, myelitis, and cerebral or brainstem lesions, although no inclusion or exclusion criteria were set for the AQP4-ab test. The present study provided the definition of ‘severe impairment’ of vision when patient eyesight was worse than 20/200. To avoid quantification of false-negative cases, AQP4-ab was considered negative when the sample was collected during the acute phase of the disease or within a month of exacerbation, and no plasmapheresis or immunosuppressive therapy was performed prior to the sampling. Analysis included gender, age at onset, involved lesions of the first attack and relapses, number of relapses, Expanded Disability Status Scale (EDSS) score at the time of the AQP4-ab test, vision outcome, detected lesions on MRI scans, history of systemic disease, serum auto-antibodies as antinuclear antibody, anti-Sjögren syndrome A antibody (SS-A) or anti-Sjögren syndrome B antibody (SS-B) and others, myelin basic protein (MBP) expression, and oligoclonal IgG bands (OCB) in cerebrospinal fluid (CSF). OCB was measured by isoelectric focusing (Mitsubishi Chemical Medience, Tokyo, Japan) or agarose gel electrophoresis (SRL, Tokyo, Japan), while MBP was measured by enzyme immunoassay (Mitsubishi Chemical Medience) or ELISA. According to these results, the patients were assigned to four subgroups: NMO type (patients with both ON and LETM), ON type (presenting with only relapsing ON more than three times), spinal type (presenting with isolated recurrent myelitis more than three times with LETM on MRI) and brain-dominant type (presenting cerebral, brainstem or cerebellar lesions, but not ON or myelitis during relapsing clinical course). AQP4-ab-negative patients who presented with both LETM and severe ON (seronegative NMO) were also analysed and compared with the AQP4-ab-positive patients with LETM and/or severe ON (seropositive NMO).
AQP4-ab was measured by indirect immunofluorescence staining using human AQP4-transfected human embryonic kidney (HEK) 293 cells as previously reported.10 In brief, cDNA encoding the full-length human AQP4 was ligated to an expression vector. The vector was then transfected into HEK 293 cells, which were grown in a poly-l-lysine-coated chamber slide using Lipofectamine reagent (Invitrogen, Eugene, Oregon) according to the manufacturer's instructions. At 24 h post-transfection, HEK-293 cells were fixed in 4% paraformaldehyde/0.1 M phosphate-buffered saline (PBS, pH 7.4) for 20 min. Non-specific binding was blocked with 10% goat serum/PBS, and the cells were incubated with patient sera (1:100; if staining was negative, a 1:10 dilution was also tested) followed by fluorescein isothiocyanate-conjugated antihuman immunoglobulin G (IgG). SlowFade Gold antifade reagent (Molecular Probes, Eugene, Oregon) was applied to the slides, and staining was observed via fluorescence microscopy. To ensure antibody assay specificity, AQP4-ab was measured in 10 healthy subjects, 40 non-neuroinflammatory disease patients (cerebral infarction, spinocerebellar degeneration, amyotrophic lateral sclerosis, etc) and 30 typical multiple sclerosis (MS) patients who exhibited a relapsing-remitting clinical course with typical MRI findings (ovoid lesions and Dawson's finger). All subjects were negative for AQP4-ab, suggesting that the test was highly specific. In the present study, antibody tests were performed blindly with no clinical information being given to the examiner.
A statistical analysis of onset age, EDSS, disease duration and annual relapse rate was performed using the multiple variation of the Tukey honestly significant difference test between the four phenotype groups, the Mann–Whitney U test between the two seropositive/seronegative groups and the Kruskal–Wallis H test to compare the five subgroups according to age of onset. Statistical differences were tested for significance using the χ2 test in each subgroup. Between the five subgroups of onset ages, statistical significances were confirmed using the χ2 test, while statistical differences were tested using the Cochran–Armitage trend test.
A total of 583 patients (502 women and 47 men; detailed clinical data were unavailable for the other 34 patients) were AQP4-ab-positive. The average age at onset was the early 40s, the average EDSS score was 5.6, and the average annual relapse rate was 1.4. First-attack lesions in the optic nerve and spinal cord occurred in 49.0% and 46.4% of the patients, respectively. According to MRI results, spinal-cord lesions were present in 85.3% of patients, including LETM in 72.7% and brain lesions in 51.1%. Unilateral or bilateral blindness was detected in 16.2% of patients, and severe visual impairment was seen in 28.6%. Sjögren syndrome (SjS) was associated with 19.8% of patients, and thyroid diseases including chronic thyroiditis, Graves' disease or benign thyroid tumours were seen in 13.6%. CSF OCB and MBP were positive in 12.0% and 57.5% of the patients, respectively. When genders were compared, the average onset age was greater in men (49.9 in men vs 42.2 in women). In addition, the number of brainstem lesions (MRI) (60.4%) and CSF MBP (86.6%) levels was significantly greater in men.
A total of 337 of the AQP4-ab-positive patients met McDonald's diagnostic criteria for MS 2005.11 Among these 337 patients, 251 developed LETM throughout the clinical course, 42 had spinal cord lesions but no LETM, and 23 showed no spinal cord lesions (sufficient data on MRI were not available in 21 patients).
Table 1 and figure 1 show the comparison between the four clinical phenotypes: NMO type, ON type, spinal type and brain-dominant type. Gender-based differences were not observed among the four groups. Onset age was statistically higher in the spinal type than in the other three phenotypes. Disease duration was shorter in the spinal type in this study. The annual relapse rate showed no differences. The EDSS score was low in the brain-dominant type. SjS more frequently afflicted ON-type patients, while thyroid disease was more often observed in the brain-dominant type. CSF OCB positivity was greater in the brain-dominant type.
Comparison of the clinical features of aquaporin-4 antibody-positive patients among the four phenotypes. The median onset age was statistically higher in the spinal type than in the three other phenotypes. The Extended Disability Status Scale (EDSS) was higher in the neuromyelitis optica (NMO), optic neuritis (ON) and spinal types than in the brain-dominant type, reflecting the severity of optic neuritis or myelitis.
In addition, AQP4-ab-positive patients were compared according to onset age (figure 2). Child-onset patients, comprising nine patients <15 years, were women and displayed ON as the initial symptom. A high female-to-male ratio and ON onset were more predominant in the younger subgroups. In contrast, the ratio of spinal cord lesions as the initial symptom was greater in the older subgroups.
Comparison of aquaporin-4 antibody-positive patients of different age groups. A total of nine paediatric-onset patients were included in the first group (onset age <15 years), 111 in the second (onset age 15–30 years), 291 in the third (onset age 31–60 years) and 60 in the fourth (onset age ≥61 years). All nine paediatric-onset patients were women and presented with optic neuritis as an initial symptom. Myelitis was the most common initial symptom during the later age onset. Statistical differences were tested using the Cochran–Armitage trend test.
Those who showed bilateral ON at onset were counted as two out of six in the first group (onset age <15 years), eight out of 44 in the second group (15–30 years), 24 out of 112 in the third group (31–60 years) and six out of 20 in the fourth group (≥61 years).
A total of 480 patients were AQP4-ab-negative according to the blood sampling during the acute phases of disease, none of whom had been given immunosuppressive therapy or plasmapheresis prior to the sampling. Among them, some patients met the Wingerchuk NMO criteria12 with severe ON and LETM, so we designated these patients as seronegative NMO and compared the clinical features with those of seropositive NMO patients. In total, 382 patients were seropositive NMO, and 19 were seronegative NMO. Results revealed a female-to-male patient ratio of 90.0% and 73.6% in the seropositive and seronegative NMO patients, respectively, with an onset age of 43.4±15.7 years (median 45; range 6–86 years) versus 34.8±15.3 years of age (median 32.5; range 15–70 years). In addition, the annual relapse rate was 1.3±1.0 versus 1.4±1.2, with no significant difference between the groups. In comparison, 52.6% of seropositive NMO patients and 11.1% of seronegative patients were antinuclear antibody-positive. There were no statistically significant differences between the numbers of patients with SjS or thyroid diseases, positive SS-A and/or SS-B, and OCB or MBP in the CSF samples between groups (table 2).
The present study analysed 57 AQP4-ab-positive patients presenting with cerebral, brainstem and/or cerebellar lesions as initial involvement that were not typical NMO lesions. Of these 57, 52 patients presented with a relapsing-remitting clinical course. Cerebral lesion onset was observed in 20 patients, brainstem lesions in 22, cerebellar lesions in two, cerebral/brainstem lesions in six, cerebral/cerebellar lesions in one and cerebral/brainstem/cerebellar lesions in one. At the time of this study, eight AQP4-ab-positive patients had not developed ON or myelitis during the 1–5-year relapsing-remitting clinical disease course (table 3).
The present study investigated clinical data from 583 AQP4-ab-positive Japanese patients, and the results revealed an extreme predominance in women, with a higher onset age, LETM, and severe vision loss as the main clinical features, as well as a high prevalence of association with SjS or thyroid diseases.
Comparing clinical phenotypes, we found 31 AQP4-ab-positive patients with brain-dominant type presented with markedly lower EDSS scores than the others. This might suggest that the brain-dominant type has a better clinical prognosis, although this finding was obtained from a small group of patients with shorter disease duration. As such, further observations are needed to draw any conclusions.
The initial symptoms of AQP4-ab-positive patients differed according to age of onset. A total of nine patients with an onset age of <15 years exhibited ON and severe visual disturbances as initial symptoms. Patients with a higher age of onset tended to exhibit myelitis as the initial symptom. Previous reports of NMOsd discussed the differences between ethnicities or genders, but onset symptom differences between the younger and older ages were not fully understood.13 In the present study, eight of nine patients with an onset age <15 years exhibited a relapsing course, while three displayed repeated ON, suggesting that the underlying pathological mechanisms might differ between the paediatric- and adult-onset groups. However, there were study limitations between the paediatric- and adult-onset patients because of the small number of paediatric patients.
A total of 480 AQP4-ab-negative patients were identified in this study. Because there were no exclusion criteria for the AQP4-ab test, this cohort could be heterogeneous. However, 19 of the AQP4-ab-negative patients presented with LETM and severe vision loss, which was typical for the NMOsd group. Nakashima et al reported no blindness in Japanese NMO-IgG-negative patients with ON and myelitis (OSMS)14, but two seronegative NMO patients were blind in at least one eye in the present study.
In general, seropositive NMO patients exhibited different epidemiological features from the seronegative NMO patients. For instance, seronegative NMO patients exhibited less female predominance or a younger onset age than the seropositive NMO group, a finding more similar to conventional MS. However, further testing revealed that some seropositive NMO patients became antibody-negative following intensive treatment or a longstanding or chronic inactive stage. In addition, it is possible that NMO patients presented with very low antibody titres that were under the antibody-detection threshold of a conventional assay system. These results suggested that the seronegative NMO could include ‘inactive or low AQP4-ab titre’ NMO and non-NMO patients.
Furthermore, it is important to note that some AQP4-ab-positive patients exhibited symptoms other than ON or myelitis. A total of 57 patients initially presented with lesions in the cerebrum, brainstem, cerebellum or a combination. Of these 57 patients, 52 suffered from a relapsing disease course, while eight did not exhibit ON or myelitis at the time of the study (disease duration 1–5 years). Brainstem lesions have been reported to extend to severe cervical myelitis3 15, but 31 patients in this study presented with limited brainstem lesions as an initial attack (no spinal lesions). Pittock et al reported that brain MRI abnormalities were seen in 60% of NMO patients, although most were non-specific, and the symptoms of brain involvement were subtle. In the present study, 20 patients exhibited limited cerebral lesions as initial symptoms. Four of them started with cerebellar symptoms, while three showed abnormalities in the cerebellum on MRI scans. However, most patients (47 of 55) who started with atypical lesions for NMO initially developed relapsing ON or myelitis, including LETM, during the following clinical course of disease. Appropriate disease preventions are necessary during the early stages of NMO. For that purpose, the AQP4-ab test is crucial for patients exhibiting atypical features of NMO but having common pathophysiological mechanisms.
The authors thank S Honda of the Department of Public Health, Nagasaki University Graduate School of Biological Sciences, for providing advice regarding the statistical analysis methods.
. A serum autoantibody marker of neuromyelitis optica: distinction from multiple sclerosis. Lancet 2004;364:2106–12.
. IgG marker of optic-spinal multiple sclerosis binds to the aquaporin-4 water channel. J Exp Med 2005;202:473–7.
. Neuromyelitis optica: Changing concepts. J Neuroimmunol 2007;187:126–38.
. An epidemiological study of neuromyelitis in Cuba. J Neurol 2009;256:35–44.
. Neuromyelitis optica in Brazil: a study on clinical and prognostic factors. Mult Scler 2009;15:613–19.
. Prevalence of neuromyelitis optica spectrum disorder and phenotype distribution. J Neurol 2009;256:1891–9.
. Neuromyelitis optica positive antibodies confer a worse course in relapsing-neuromyelitis optica in Cuba and French West Indies. Mult Scler 2009;15:828–33.
. Neuromyelitis optica: effect of gender. J Neurol Sci 2009;286:18–23.
. The spectrum of neuromyelitis. Lancet Neurol 2007;6:805–15.
. Anti-aquaporin 4 antibody in Japanese multiple sclerosis with long spinal cord lesions. Mult Scler 2007;13:850–5.
. Diagnostic criteria for multiple sclerosis: 2005 revisions to the ‘McDonald Criteria’. Ann Neurol 2005;58:840–6.
. Revised diagnostic criteria for neuromyelitis optica. Neurology 2006;66:1485–9.
. Intrathecal pathogenic anti-aquaporin-4 antibodies in early neuromyelitis optica. Ann Neurol 2009;66:617–29.
. Clinical and MRI features of Japanese patients with multiple sclerosis positive for NMO-IgG. J Neurol Neurosurg Psychiatry 2006;77:1073–5.
. Brain abnormalities in neuromyelitis optica. Arch Neurol 2006;63:389–96. | 2019-04-23T21:08:32Z | https://jnnp.bmj.com/content/82/12/1360?ijkey=d88a9548ab417a42e374c0f16aeb41b9d80745c9&keytype2=tf_ipsecsha |
“Two roads diverged in a yellow wood, and sorry I could not travel both.
Not much to report today, just had many flight delays and ended up switching from American to Jet Blue to get to NYC. Took me almost 3 hours via subway and trains to get back to NJ…mostly because I was clueless on what I was doing!
When I got to Coffee Pot’s Dad’s house last night they had already picked up Heavy Weight and I had gotten a text from Hoosier looking for a ride. After waking up early as usual, Coffee and I head out to get Hoosier in the rain, when we pick him up he is shivering from the rain and cold and very thankful for a break off the trail. This is the same approximate area I had met most of my northern bubble a couple of weeks ago and the attitude is similar…they just need a break!
We get Hoosier to the house and he grabs a shower, the house smells delicious since Heavy has made a whole mess of fresh chocolate chip cookies! He has found my weakness, my kryptonite, and I get a glass of cold milk and some warm cookies and enjoy!
Hoosier and I head to an REI, he needs new shoes, and we grab lunch on the way and catch up…I have not seen him since Waynesboro. He was off the trail for a week for a wedding and now is back and going strong.
We get back to the house and relax, Coffee is having dinner with her mom so the rest of us make plans to eat at a local pizza place that also serves good salads. After dinner it is pretty much of the same, we watch a little TV and then everyone hits the sack.
Nothing much planned for the day, Coffee drops Heavy Weight and Hoosier back off on the trail and I take a 3 mile walk with Camaro and Chevy. Camaro would still like to get back on the trail and hike the 500 miles south back to Glasgow VA, her knees still hurt and she is waiting for her X-rays from Pearisburg so she can get an MRI. Coffee Pot got an MRI last week and she is done for this season. I continue to keep them both in my prayers.
After our walk we see two young guys walking down the street with back packs and realize these are the German brothers Starsky and Hutch, I have not seen them since Damascus where they got off the trail due to some knee problems. They have been traveling around the east coast until they had to head out in a few days and tonight are staying with us.
Coffee makes a really nice dinner and her dad treats to ice cream at the local shop, he is a really nice guy opening his home to strangers and feeding them as well. After the ice cream we rent a movie and watch it before bed.
I wanted to get a jump on my drive up into Vermont to pick Jason up at the Burlington airport, it was a 5 hour drive and I wanted to break it into two days. I cooked breakfast for everyone, said good bye to Coffee, Camaro and the German boys and then headed out for my drive. I leave close to lunch time and I figure there has to be a Chipotle in the area and a google search proves successful. There is one located in a nearby mall so I head that way. I have never seen anything like the traffic at the mall, it is worst then any traffic I have experienced in rush hour in Austin. After eating, it takes me 45 minutes to exit the mall parking lot…fortunately I’m not in a big hurry.
I drive three plus hours of my drive and find a nice rest stop to crash for the night. Jason’s flight arrives early afternoon so I have plenty of time.
I am looking forward to spending some time with Jason and hoping that he enjoys his adventures along the trail. Jason is the son of a friend and has had some difficulties lately and a two week escape from regular summer in Austin should be a nice break.
He was never a part of my student ministry but did hang out a little with us a few times, the plan to hang with Jason has re-enforced my conviction to continue ministry with teens.
I make a stop at a grocery store for some supplies and head to the airport, although it is an “international” airport it is one of the smallest I have seen! Jason is easy to find and we head out to meet with some hikers in Hanover, VT…home of Dartmouth College, the smallest of the Ivy League schools.
We have plans to meet with Ayce, Chino, Dirty Mike and Coups. We get into Hanover mid afternoon and inadvertently drive through the campus and then head back out to Main St. We hang out at a Starbucks until we hear from Ayce, they are in a small motel just outside of town and we head that way. After visiting for about an hour we head into a town about 5 miles away for dinner, Hanover is very touristy and prices are high, plus there is an all you can eat Chinese buffet and that is right up a hikers alley!
After dinner we sit around the small and crowded motel room and visit while watching some tv. The rooms are ridiculously expense and Jason and I will crash in the van by the trail head. Fortunately we can unload stuff from the van into the room to make room for two to sleep in the van.
We say or good nights and head out, we will be back in the morning to shuttle them into town so they can start their hike. We get to the trail head parking lot and call it a night, fortunately it has been cool lately so the temperature is comfy.
As always we are early to rise, which I think might be a little new to Jason. Sunrise is just after 5:00am out here and it is fully light by 5:30. We lounge around to about 7:30 and head to pick up our hikers. We drop them off and say good bye, chances are we will not see these guys again. They are scheduled to be done by mid July and I do not know if I will be able to get that far north by then. It is not like I will not see Ayce again, but this is probably the last time as a hiker.
We head out to Ludlow VT to meet up with Witch Doctor and Passover, I had been texting with them since yesterday and they are looking forward to seeing us.
I had mentioned in an early post that being a trail angel out here was becoming more about lifting morale by being a familiar face and not just free food. The northern bubble hikers are getting more and more isolated and you look forward to seeing faces you know. They had decided to get up at 5:00am so they could get a good early start and see us as soon as possible.
We find the parking lot and decide to hike a little south and see if we can meet them part way. About a half mile in we come to a really cool waterfall and stop for some pics and then continue our hike. We get about 3 miles in and then decide to turn around as it is looking like rain and we are not in any rain gear. Right after we get back to the van it starts to sprinkle and about 20 minutes later Witch Doctor and Passover arrive. It is good to see them!
After the customary Mountain Dew we make Witch Doctor a sandwich and as always I have hummus and crackers for Passover. We load up and head to Ludlow VT for another lunch stop, we are in a ski resort area of Vermont and find a nice little coffee and sandwich stop to sit out the rain. We then head to the small town of Chester to stay with my trail buddy Agent D, who I have not seen since early March.
As always it is so cool how people you knew for a few weeks welcome strangers into their home. We get showers and laundry done and then Agent feeds us a rack of ribs for dinner. His wife Heather is very friendly and hospitable and daughter Sally is very cute and fun. They have a kitten named Cody and Passover is instantly adoring the little fellow.
Agent D is making a home made Kevlar canoe and shows us his progress in a small workshop in the back. It is funny that the canoe plans call for an 18 foot design but he has scaled it down to 16 feet so it will fit in his shop. We visit for the evening then with everyone being pretty tired we call it a night. Tomorrow we will take them back to the trail then make final preparations for our couple of days on the trail.
Agent offers to drop Jason and I off at the trail head and pick us back up in a code of days so we can hike part of the trail. In this area the AT and the Vermont Long Trail are the same so we will be hiking both of them for the about 20 miles of trail we have planned.
After dropping Witch Doctor and Passover off at the trail head we say our goodbyes, again this is probably the last time to see them on the trail, and we head back to Agent’s house for final preparations to start our hike.
Agent drives us back to the same area that we dropped of Witch Doctor and Passover and we start our hike with a four mile climb and a light rain. We make good time to the shelter and are not really wet at all. Jason seems to be enjoying the hike and leads all the way.
There are three other hikers in the shelter, two students who just graduated from high school and an older guy from New York named Uncle Walt. They have been at the shelter for awhile, probably took a zero to dry off, and saw Witch Doctor and Passover as they briefly stopped by. I always discover that Zippy and Diddo stopped for lunch, I have not seen them since Back Step and I stayed with them at the Blackburn Hostel in Virginia.
We unpack our gear and relax a little, Jason is reading and falls asleep in his bag. I am reading myself, just killing a little time before cooking dinner for the night. I wait another hour then wake Jason for dinner. I teach him how to use the stove and we boil water for our Mountain House freeze dried dinners. After dinner I show Jason how to store and hang our food and explain why we take such steps. I think that he is developing an interest in backpacking, or at least hiking, and want to teach him whatever I can. E hang our food bag and then crawl into our sleeping bags as the sun, which has finally peaked out through the trees, begins to set.
When the sun starts to spill into the shelter no one is really moving and Jason and I have no reason to get an early start. We are hiking 9.5 miles today and we have plenty of time to get there. It is turning out to be a beautiful sunny day and we sleep in to about 9:00 and then start to break camp. We have pop tarts for breakfast and I show Jason how to filter his water. We break camp and start on the trail after saying good bye to our southbound friends.
Jason takes the lead and hikes at a pretty decent clip, we have a lot of climbing to do today and he gets a little ahead of me then waits for me to catch up. He repeats this all morning and it inspires me to give him a trail name. I think this is pretty much what an army scout would do in days gone by so I decide on the trail name of “Scout” for Jason.
We continue our hike and Vermont is showing us some beautiful landscape and a challenging trail. We cross a really cool suspension foot bridge over a roaring stream cutting through sharp gorges that would be any extreme kayaker”s dream. After crossing VT 103 we start a really tough climb called the rock scramble which is pretty much straight up! Jason, who previously thought switchbacks added too much extra distance to the trail now has a fonder appreciation of them! I tell him that this is some of the roughest climbing I have seen on the AT and to confirm that he is doing really well for his first time out.
After completing the climb we come to a really nicely maintain shelter with a green lawn and some flower planters. As Jason goes down to the stream to get some water up walks a trail volunteer, who maintains the trail in this area. His name is Plans Too Much and is actually the first trail volunteer I have met. He is up with his German Shepherd, Cinco de Mayo or Cinco for short, and has an axe to clear some trail. We talk for a little bit about the trail in general, his 2003 thru hike and my work as a trail angel.
We see Plans Too Much further up the trail chopping up a good size tree blocking the trail, hats off to the volunteers that make our hiking possible and more enjoyable!
We cross over Beacon Peak and continue our hike we are about 7 miles in and feeling it, we get down to Cold River road and we are met with a detour sign of 2.4 miles along the road. We make a decision to hitch to the little groceries store down the road and make a decision from there. Our concern is meeting our deadline tomorrow to met Agent D at the Inn at Long Trail.
We decide to alter our plans and head to the Inn today, we have had a good day and a half of hiking and look forward to the rest the Inn has to offer! We get a ride from a store employee to the Inn and grab a shower and eat our sandwiches we bought from the store.
We spend the remainder of the afternoon and evening in the common areas of the Inn which includes a small game room. We grab some dinner in the little Irish Pub and play some darts, I teach Jason how to play cricket and we play several games.
We head back to our room and call it a night.
Agent D is picking us up this afternoon, so we are in no hurry. We head down and have breakfast and pass the morning away in the game room and playing darts. After lunch we move outside to enjoy the sun and wait on our ride. Agent picks us up and we head back to his house, stopping at a few hardware stores to pick up some supplies for his canoe that he is building.
Basically the canoe is at the stage of building the mold, which when completed, the Kevlar and carbon fiber layers will be layered onto the mold to create the main body of the canoe. We spend the remainder of the afternoon and into the night helping with the mold. We are applying sheetrock mud to solidify the form and then sanding and smoothing this layer. We are also trying to speed up the drying process so we can move on to the next step. Jason is using a blow dryer and I pass my stove flame over damp areas…Agent is out melting the paraffin wax one of the final steps to finish the mold.
We roll the wax on with a standard paint roller and it goes on thick and rough, we use the blow dryer and a clothe iron to melt it and make it smooth. We work into the night then call it a day and get cleaned up. It was fun helping Agent with his home made canoe and was interesting to learn about. In the back of my mind I consider that I may try this for a fishing kayak, maybe with my own design.
Agent is wanting to maybe make canoes for a living, like me he is a jack of all trades, actually having a law degree but no interest in practicing law. I think that he craves a simpler life and already lives on 5 acres in a beautiful part of Vermont. I really like Vermont, the mountains are big and the hiking is challenging. If I wanted to live close to the trail this would definitely be one of the best options, not to mention that there are several ski resorts in the area…so trail by summer and snowboard by winter…now if I could just figure out the that whole independent wealth thing I would be set!
We head to bed, we head out in the morning to meet Moose and Wide Load for lunch back at the Inn at Long Trail.
We say our good byes and let Agent get back to work on his canoe, he has a deadline and it is approaching quickly! Jason has recommended that we cook some hot dogs for lunch so we need to stop in town for supplies.
We get a text from Moose that they are four miles from our meeting spot, which is about an hour and a half hike. We get everything set up and start cooking bratwurst , sausages and hot dogs with some grilled veggies.
Moose and Wide Load hike in and it is good to see them! We have not seen each other in about three weeks and this could be the last time on the trail. They have decided to stay at the Inn at Long Trail so we will stay with them. As we are visiting, Giuseppe comes rolling in along with his brothers who we have been hiking some of the trail with him. This is the first time I have met Giuseppe, and he is out hiking the trail because he can’t find a job, which is as good a reason as any.
We head to the Inn, get checked in a grab showers. We pretty much just hang around visiting until dinner with a quick stop to re-supply in Rutland. Jason had seen an Applebee’s the other day so that is our dinner designation…I think he wants something familiar.
After we get back to the Inn we go down to the game room, Moose, Jason and I play a little Texas Hold Em while we wait on Wide Load to come down. We head into the pub to listen to a little live music, we were hoping to play more darts but the stage is basically the dart area so we are content with the music.
We head back up to the rooms to get some sleep for the night, no early rising tomorrow as no one is in a rush. I visit with Moose and Wide Load some more and they are in much better spirits then last time we met. Moose tells me it is better now that they have slowed down a lot. You would think it would be the opposite and you would want to speed up at this point to get done but slowing down has really helped their spirits and they will still be done before August.
They want to take a road trip with me and we discuss the idea of driving to Florida then on to Texas. It sounds like fun, but will change some of my plans a little, no big deal since nothing I am doing right now is set in stone. We would head south down 81 basically the same way I went north and make some stops along the way to visit with some of the friends we have made along the way. We have a month to work out some plans and we will see what happens, I am on the east coast until August 9th so no rush on a decision.
It’s well pass hiker’s midnight so we all hit the sack!
We meet for a not too early breakfast and then visit for a little bit before they hit the trail. Jason and I have nothing to do today except head back to New Jersey so we are really in no rush. We say good bye to Moose and Wide Load and then head into the little pub for some darts. After a few games we check out and hit the road. We have a four hour drive to NJ. About an hour outside of our destination we start smelling smoke coming off the engine, I pull over and pop the hood for a look. One of the belts that powers the AC compressor (which is non functional) is smoking and appears to be melting! I let things cool down as I try to figure out what is wrong, best I can figure is the clutch on the compressor is locking up causing the belt to just slip over it and heat up. I thought the AC was off since the last setting I left it in was defrost, but apparently that still spins the compressor so after moving it to the off position we continue down the road. We arrive at Coffee Pot’s mom’s place and reunite with Camaro and Chevy, Coffee is on the trail for a couple of days hiking with Chin Strap and a few others.
The three of us go to dinner and then a movie, we end up seeing Purge, and if that is an indication of the future I hope the Rapture comes first!
No plans for today and I don’t really want to risk going anywhere far in the van until I have had a chance to have it checked out by a mechanic on Monday. So we spend a lazy day…Jason is texting, I’m reading and Camaro is watching episode after episode of Lost. Coffee and her mom get home at about 9:00 we visit before bed, tomorrow I will get up early and head to a mechanic shop.
I get an early start to get the van checked out. Turns out that the AC compressor clutch is sticking causing the belts to overheat. Unfortunately the belt configuration does not allow just removing the AC compressor belt as the same belt turns the alternator. I’m hoping that down the road I do not have to replace the compressor just to keep things running. I head back to Coffees house and Jason and I decide to start our New York City adventure.
We grab a train and head to NYC, Penn Station is a few blocks from the Empire State Building so we head over there. It cost about $50 to go up so I have Jason head up while I wait in the lobby area, I will be coming back at the end of July and can see it then.
Afterwards we start walking towards the new trades center building, I believe they are calling it the freedom tower, you can’t get in but it was cool to see. Jason is tired of walking so we get on the subway and head uptown to Manhattan to stay with some friends. We go out with RC and grab some dinner and then call it a night.
We head to the Museum of Natural History and spend the morning with all the exhibits. We grab some lunch and decide to catch a movie instead of more site seeing. After the movie we head down to Times Square to see the sites and have dinner.
After hanging out for awhile we head back to RC’s for the night, Jason is done with the city so we make plans to head back to New Jersey.
We have a bagel breakfast with RC and family then grab to subway to catch the train back to Coffee’s house. We grab some lunch near the station then walked to her dad’s house, where we just chill out for the rest of the day.
Coffee’s dad buys us some really good breakfast sandwiches served on a kaiser roll, which brought back childhood memories for me. My parents were born and raised in Queens NY and kaiser rolls and bagels was a Sunday morning ritual at our house.
After breakfast we decide to drive to the Jersey shore and boardwalk, the van seems to be running fine so the 70 mile drive should not be an issue. I make an online reservation for a room and we head out. The drive takes us by NYC and we get a good view of the skyline.
We check in to the motel and head to the beach. It is a nice day and we pretty much just chill out on the beach and watch the people and the waves. After enough sun we head back to the motel and grab some dinner on the way at a diner…we have noticed that nobody seems to serve Dr. Pepper on the east coast…sad.
I believe that Jason, like any other teen, likes to sleep in so I spend some time in the morning catching up on my blog and some reading. We head back up to the beach to enjoy the day, then we will head back up to Vermont.
After chowing down on a Subway foot long, we load up and hit the road. We have a 5 hour drive to Burlington VT and have plenty of time to get there. We pass through New Jersey and New York without event but hit a major thunderstorm in Vermont. VANIMAL starts running really rough, missing and stalling. I’m concerned that my faithful steed of 7000 miles of trail support has reached the limits of its endurance.
We limp into Burlington and get a room for the night, it looks like rain for the next few days so we have decided to just hole up in a motel until Jason’s flight on Sunday morning. I suspect that some water got up into some electrical parts and hoping things just dry out on the van before I have to head south.
Today is a lazy day of watching tv and eating pizza. Jason’s trip has come to an end and we have to leave for the airport at 4:30 in the morning. I am hoping that he had some fun while out here but sometimes it is hard to tell. I just do what I can do and leave the rest to God.
Up super early and headed to the airport. The VANIMAL seems to be running fine but I am going to stick around one more day to make sure.
We get Jason checked in and through security, the airport is amazingly busy for so early in the morning and we have a few minutes to hang out at the gate.
After saying our good byes he boards and I head out. I have the room until noon and plan on getting a nap in before checking out!
I hang around Burlington for the rest of the afternoon, seeing a movie and grabbing some Chipotle for dinner. I found a place to park and crash for the night, feeling pretty tired since I did not have much sleep the night before. | 2019-04-20T08:17:09Z | https://onthetrailwithgod.wordpress.com/2013/07/06/on-the-road-again/ |
California Rules of Court, rule 977(a), prohibits courts and parties from citing or relying on opinions not certified for publication or ordered published, except as specified by rule 977(b). This opinion has not been certified for publication or ordered published for purposes of rule 977.
APPEAL from a judgment of the Superior Court of Los Angeles County, Aurelio Munoz, Judge. Affirmed.
Schuler & Brown, Daniel E. Hoffman and Sam D. Ekizian for Plaintiff and Appellant.
Seyfarth Shaw, Raymond R. Kepner, Donald C. Potter, John A. Van Hook, and Laurie E. Barnes for Defendant and Respondent.
In this case, we hold that an employer did not violate state law by terminating an employee who, in disobedience to company policy and specific admonitions not to do so, persisted in using company equipment and facilities for religious proselytizing. Edna Yuen Man Ng (plaintiff) appeals from an adverse judgment entered after the trial court granted summary judgment to Jacobs Engineering Group (defendant) in this employment discrimination action. She argues there are triable issues of material fact precluding summary judgment on her cause of action for religious discrimination based on defendant’s failure to accommodate her religious beliefs and practices. She also claims there are triable issues of material fact as to defendant’s failure to prevent discrimination and as to defenses raised by defendant. Based on these arguments for reversal of the judgment, plaintiff contends the award of costs also must be reversed.
We conclude that plaintiff is not entitled to the accommodation she claimed. Plaintiff has abandoned her other causes of action by failing to present argument on them in her opening brief. We affirm the judgment.
Plaintiff was hired by defendant in November 2001 as a process engineer assigned to its Long Beach facility. She describes herself as an evangelical Christian, whose religious beliefs compel her to share her “religious beliefs with [her] co-workers in an effort to bring them to a saving faith in Jesus Christ.” Plaintiff testified in deposition that she went through an employee orientation and was given copies of defendant’s e-mail policy (exhibit 19) and anti-harassment policy.
Plaintiff also held a Christian-based Easter event at the office. She brought 9 to 10 dozen doughnuts for breakfast, then sent an e-mail to everyone “I met in the company, including management” to join the Easter celebration. She displayed 20 copies of a Christian tract with a religious message and an Easter card with the word “Jesus” on a table at the breakfast. As before, she neither sought nor obtained permission to distribute religious pamphlets, or to hold a religious Easter celebration at work. Her goal was to convert people to evangelical Christianity.
After the Easter party, Greg Rumford, a manager for defendant, met with plaintiff. He told her that she should not distribute religious literature at work because other Jacobs employees might be made uncomfortable if they did not share plaintiff’s religious views. Plaintiff was told not to engage in this kind of activity in the future.
Plaintiff followed the meeting with an e-mail to Rumford thanking him for explaining the company policies. She explained her strong Christian belief and said, “I don’t mind to risk myself to preach the gospel and witness Christ in any circumstances of my life.” She expressed her hope that Jacobs would allow more ministries at the office like the Christmas party. Plaintiff referred to the prospect of increased revenues for her former employer after she and others began a prayer ministry there.
Rumford replied with an e-mail memorializing their conversation. He reiterated that plaintiff was not to use e-mail for personal messages addressed to large numbers of employees; not to use a large part of the coffee room for non-work purposes; and not to present or distribute controversial materials in the office. He stressed that Jacobs had to be considerate of the beliefs of all its employees, and not allow plaintiff to push her beliefs on others.
Plaintiff responded with another e-mail to Rumford, thanking him for clarifying policy and informing him she had requested an appointment with Carol Charron, the company’s human resources manager. According to plaintiff, Charron told her that Jacobs did not want anything to do with religion and in order to make other employees comfortable, no Christian material was to be displayed. Plaintiff agreed to abide by these guidelines. Charron followed the meeting with an e-mail to plaintiff reiterating that the display of religious materials, and use of company space and e-mail for religious purposes was inappropriate.
Several weeks later plaintiff sent an e-mail to Charron asking for permission to hold a prayer event in a company conference room during the lunch hour on the National Day of Prayer. Charron denied the request, reiterating that company facilities, including stairwells, could not be used for prayer meetings because of the company policy to provide a neutral work environment. Charron suggested that plaintiff explore the use of cafeterias located near the Jacobs facility. Plaintiff admitted that she never checked to see if any of those cafeterias had private meeting rooms.
Plaintiff broke this promise the next month, beginning what she characterized as an e-mail ministry at the office, and holding unauthorized weekly prayer meetings in company conference rooms. Her e-mails quoted biblical Scripture. Plaintiff said that she had prayed about the situation after her request was denied, and had decided to have “talking” meetings rather than “prayer” meetings. She offered to take full responsibility for any consequences. A series of e-mails on the company system followed, in which plaintiff exhorted coworkers to attend the weekly meetings, asking the others: “Let’s call out to God for the needs. Wait and see the amazing testimony! Don’t miss out on the opportunity! We will talk to God to bless our particular projects and all our needs. Come to His presence today!” Plaintiff also e-mailed religious materials to about 30 other employees.
The next day, plaintiff sent an e-mail over the office system addressed: “Greeting to my Most Wonderful Brothers/Sisters in Christ and Friends.” She announced that meetings would be held off the work site, and asked each addressee to reply, indicating whether he or she wanted to continue receiving her e-mails. Plaintiff said that she was only allowed to send the e-mails to interested parties, and offered to send the e-mails to a home address if this was the preference. She wrote: “Remember, I may send a prophetic message that may save you and your family out of catastrophe like 911. Many times God uses me to warn people. I have a higher calling. I tell you honestly that I also don’t mind any more to risk my job and my life for any of you because God and I love you very much.” The e-mail also quoted Scripture.
Other religious-themed e-mails were sent by plaintiff at work in September and October 2002. Plaintiff was counseled about her violations of company policy again in October. The next day she sent another unauthorized religious e-mail over the work system. Plaintiff quoted Scripture and asked the addressees to pray for her e-mail ministry and to be a partner of her prayer ministry.
In early November, plaintiff again sent religious e-mails containing biblical quotations over the office system. Her employment was terminated on November 13, 2002. She understood that it was for improper use of company e-mail. Plaintiff was advised that her employment was terminated for insubordination, based on her continued use of the e-mail and company facilities for religious purposes. In her deposition, she said she had stopped the long e-mails, trying to keep them short to accommodate company policy. She continued to send religious e-mails to employees at defendant’s facility after her termination.
Plaintiff sued Jacobs for violation of the California Fair Employment and Housing Act (Gov. Code, § 12940 (FEHA)), wrongful termination in violation of public policy, and breach of the covenant of good faith and fair dealing. She alleged that defendant failed to accommodate her religious beliefs and terminated her because of her religious practices. The trial court granted defendant’s motion for summary judgment and sustained defendant’s evidentiary objections to large portions of plaintiff’s declaration in support of her opposition. The trial court found that plaintiff was prohibited from proselytizing in the workplace by company policies on anti-harassment and e-mail usage. Although defendant told plaintiff she could use her private e-mail account to send messages to willing recipients, and that she could conduct her religious activities outside of its building, plaintiff refused those suggestions.
The trial court found no evidence that defendant applied its policies in an inconsistent manner or that other employees were permitted to engage in religious proselytizing in the workplace. Complaints from plaintiff’s coworkers regarding her proselytizing activities in the workplace exposed defendant to potential liability for religious harassment claims by the coworkers if plaintiff were allowed to continue her proselytizing. The court concluded that each of plaintiff’s causes of action failed based on these undisputed facts, and because defendant was not required to permit an employee to impose her religious views on other employees or to allow its facilities to be used for religious purposes.
Plaintiff moved for reconsideration on procedural grounds. She argued that Charron’s deposition was not taken until the day before plaintiff’s opposition was due, and therefore could not be incorporated in her opposition. Defendant pointed out that plaintiff waited nearly nine months after filing her complaint, and more than six weeks after the summary judgment motion was filed, to notice Charron’s deposition. Plaintiff conducted no other discovery. Defendant also pointed out that plaintiff had failed to request a continuance of the summary judgment hearing under Code of Civil Procedure section 437c, subdivision (h). No mention of the Charron deposition was made by plaintiff’s counsel during oral argument on the summary judgment motion. The trial court denied the motion to reconsider because the evidence was not newly discovered, there had been no request for a continuance to obtain the transcript of the deposition, and the allegedly new evidence did not change the legal conclusion that defendant owed no duty to allow plaintiff to proselytize in the workplace. Plaintiff appealed from judgment in favor of defendant.
Defendant does not question the sincerity of plaintiff’s religious beliefs, nor does it claim it was unaware of them. Instead, defendant contends that plaintiff cannot establish that her religious beliefs conflicted with an employment requirement. Defendant argues that plaintiff’s duties as a process engineer did not conflict with her desire to proselytize, in part because it was plaintiff’s choice to conduct these activities in the workplace instead of off-site or outside work hours.
We think defendant takes too narrow a view of what constitutes an employment “requirement” in this context. (See Friedman v. Southern Cal. Permanente Medical Group, supra, 102 Cal.App.4th at p. 45.) All employees have two kinds of work requirements: those defined by the particular duties of their position, and those defined by the general policies of the employer. Here, defendant had an anti-discrimination and anti-harassment policy which provided in pertinent part: “[W]e want to maintain an environment that fosters employee respect and promotes harmonious, productive working relationships. That means that those relationships must be free of harassment or any other form of discrimination. Any harassment, therefore, be it based on . . . religion . . . , will not be tolerated and should be immediately reported to the EEO officer.” Plaintiff’s proselytizing activities directly conflicted with this anti-harassment policy.
Defendant argues, nevertheless, that it was entitled to summary judgment because no accommodation of plaintiff’s proselytizing was possible without undue burden. It cites Chalmers v. Tulon Co. of Richmond (4th Cir. 1996) 101 F.3d 1012. Chalmers was an evangelical Christian who believed she should share her religious convictions. To that end, she wrote a letter to her supervisor at his home advising him that God was not pleased with his conduct and suggesting that he find salvation in God. (Id. at p. 1015.) Unfortunately, the letter was received by the supervisor’s wife while he was away and she became distraught at the thought that the reference to misconduct meant adultery. The resulting marital discord caused the supervisor to recommend that Chalmers be fired because he could no longer work with her. During the ensuing investigation, the employer learned that Chalmers had sent a letter to another employee implying that her unwed motherhood had caused her illness. (Id. at p. 1016.) Chalmers was terminated for disrupting the workplace, negatively impacting working relationships, and invading the privacy of other employees. (Id. at p. 1017.) Chalmers sued under title VII (42 U.S.C. § 2000e-2) on the theory that her letter writing constituted protected religious activity which should have been accommodated by a lesser punishment.
In this case, as in Chalmers and Wilson, plaintiff’s conduct had an impact on other employees. Plaintiff’s activities were specifically directed at coworkers whom she hoped to convert to her religious beliefs. She does not dispute that coworkers complained about her proselytizing. The problem this presented to defendant was not merely hypothetical, as plaintiff asserts. Defendant’s anti-harassment policy is consistent with public policy embodied in FEHA. If we were to require defendant to accommodate proselytizing in the workplace, as plaintiff suggests, it would violate its own policy and be subject to claims by other employees desiring to use company facilities to share their own religious beliefs.
Plaintiff argues: “The point of antidiscrimination laws is to open up employment opportunities for individuals in spite of differences. Allowing co-workers to stifle the religious beliefs of others (often resulting in the termination or constructive discharge of the religious employee) is antithetical to these principles, and results in a burden being placed on religious employees because of their religion.” She asserts that the objections of fellow employees do not constitute undue hardship for the employer. In support of her claim, plaintiff cites Cummins v. Parker Seal Company (6th Cir. 1975) 516 F.2d 544, vacated on rehearing, Parker Seal Co. v. Cummins (1977) 433 U.S. 903. Apart from the questionable precedential value of the case, it is distinguishable because it involved accommodation of an employee’s Sabbath observance rather than direct proselytizing activities such as those engaged in by plaintiff.
We conclude that defendant is entitled to judgment on the first cause of action because accommodation of plaintiff’s proselytizing would have worked an undue hardship. This disposes of plaintiff’s related claim that defendant failed to take reasonable steps to prevent discrimination in violation of section 12940, subdivision (k). The record establishes that defendant adopted an anti-harassment policy consistent with this statutory mandate. Its failure to allow plaintiff to impose her religious beliefs on coworkers did not constitute a violation of that duty.
Plaintiff’s second cause of action is for wrongful discharge in violation of public policy, and her third is for breach of the covenant of good faith and fair dealing. In her appellate briefing, she presented no argument with respect to either cause of action. “Courts will ordinarily treat the appellant’s failure to raise an issue in his or her opening brief as a waiver of that challenge. [Citation.]” (Paulus v. Bob Lynch Ford, Inc. (2006) 139 Cal.App.4th 659, 685.) We follow the accepted approach and treat these claims as abandoned.
Because we affirm summary judgment based on the first cause of action, and treat the other causes of action as abandoned, there is no basis for reversal of the award of trial court costs to defendant, as urged by plaintiff.
The judgment is affirmed. Defendant is to have its costs on appeal.
Publication courtesy of California free legal advice.
Analysis and review provided by Carlsbad Property line Lawyers.
All statutory references are to the Government Code unless otherwise indicated.
Description Court held that an employer did not violate state law by terminating an employee who, in disobedience to company policy and specific admonitions not to do so, persisted in using company equipment and facilities for religious proselytizing. Plaintiff appeals from an adverse judgment entered after the trial court granted summary judgment to defendant in this employment discrimination action. Appellant argues there are triable issues of material fact precluding summary judgment on her cause of action for religious discrimination based on defendant’s failure to accommodate her religious beliefs and practices. Appellant also claims there are triable issues of material fact as to defendant’s failure to prevent discrimination and as to defenses raised by defendant. Based on these arguments for reversal of the judgment, plaintiff contends the award of costs also must be reversed.
Court concluded that plaintiff is not entitled to the accommodation she claimed. Plaintiff has abandoned her other causes of action by failing to present argument on them in her opening brief. Court affirmed the judgment. | 2019-04-21T08:41:27Z | https://www.fearnotlaw.com/wsnkb/articles/ng-v-jacobs-engineering-group-7234.html |
Posted on October 10, 2013 April 1, 2014 by admin Tags: Alliance Sales & Marketing Solutions, alliances that work, Cloud computing.
Alliance Sales & Marketing Solutions look at the on-premise vs cloud computing privacy and information ownership debate. Thiss is a hot topic among those who oppose cloud computing and others who remain hesitant to switch from on-premise computing to the cloud. The root cause of opposition stems from the very nature of cloud computing and more specifically the intimate nature of SaaS (Software as a Service). SaaS vendors supply a service which requires a close relationship between consumer and host or rather customer and vendor.
The SaaS vendor has the ability to log and review every action that their customers make while interacting on the vendors software platform. Each time a customer accesses an account, every key stroke, mouse click, digital finger print and duration of use can be logged and monitored. This aspect of digital surveillance from a source outside of your immediate business circle represents the vast gulf between those who adopt cloud computing and those who shun the new era in favour of traditional on-premise computing.
There is considerable concern within E-business and IT circles regarding the ownership of data. Seeing as businesses that have crossed over the river from on-premise to cloud computing store their data via a third party platform, the debate as to who owns ownership rights has flared up forcing vendors to take action.
Cloud vendors such as Amazon are eliminating consumer concerns over data ownership by introducing clearly defined language into their user contracts; “Your Applications, Data and Content. Other than the rights and interests expressly set forth in this Agreement, and excluding Amazon Properties and works derived from Amazon Properties, you reserve all right, title and interest (including all intellectual property and proprietary rights) in and to Your Content.” The idea that a higher power is tracking your every move seems to be an unsettling notion. The truth is that this is not exactly the case with cloud computing and even if it were, it would be nothing new.
For years, billions of people have been entrusting banks to safe guard their life savings by extending banking entities certain privileges in order to grant them the flexibility and necessary tools to more effectively do so. As financial enterprises need to share customer personal information in order to run their everyday business logistics. Over the years we have relinquished are formed grip on privacy to allow financial entities such as banks the ability to record, access and share our personal and financial information. Such data includes, Social Security number, employment information, account balances, assets and investment experience, transaction history and credit information.
Over 1.5 billion users openly permit a popular social media site, to store and publicly display personal information such as name, age, date of birth, place of birth, current city, hobbies, martial status, place of work, telephone number, E-mail address, names and locations of friends and family members and also personal photos. The same site is also permitted to track and display the IP location of the user and record every location that they have visited while highlighting and promoting every action that user makes while accessing their cloud.
Cloud computing is developing rapidly especially in terms of CRM and responding to the needs of current consumers and breaking down potential barriers effecting consumer cross over from on-premise computing to cloud. Just how financial entities such as those in Luxembourg, Lebanon, Singapore and most famously of all Switzerland generated methods to maintain the anonymity and privacy of their clients so to have cloud vendors. Vendors are now starting to see the benefit of operating SaaS set-ups under a Swiss bank premise, and the added appeal and new client generation that such an logic attracts.
The “Swiss Cloud” vendors are the only vendors in their sectors that do not have access to customer data. By operating on a cookie-less architecture and implementing patent pending encryption technology, ensures that nobody not even vendor employees can access any customer data. The customer has sole ownership of the encryption key which radically reduces the chance of system breach.
Posted on July 30, 2013 March 31, 2014 by admin Tags: alliance, Alliance Sales & Marketing Solutions, alliances that work, Cloud computing, iTeam.
In this article Alliances That Work – Alliance Sales & Marketing Solutions explore the hidden advantages of cloud computing solutions and how they benefits sales and marketing businesses. After three years of main stream attention, cloud computing is finally receiving recognition as a technological express train, to take your business to the next level fast. The advantages of switching from traditional on-premise computing systems to cloud computing such as cost and expenditure reduction, secure storage and management, elasticity, scalability and automation have been well documented. It is because of these compelling factors that so many main stream businesses have crossed over to the cloud. But the cloud computing rabbit hole runs much deeper than just the marketed benefits that cloud advertisers have been promoting. Making the switch to the cloud has other unforeseen advantages that one could argue rival their highly promoted counter-parts in terms of functionality.
Companies operating on cloud systems are collectively travelling across the same technological topography so to speak, which means more streamlined mergers. Mergers are not famed for their smooth transitions, the facilitation period for most mergers will span over a number of months and for others the process could take years. The relevant technical difficulties and obstacles are experienced equally across the entire spectrum; even government agencies have problems and many agencies have implemented entire IT teams to manually coding information from one system to another system.
The digital Pangaea offered by cloud computing allows companies to merge without the immense time investments and mass allocations of personnel that are necessary during inter-company consolidation between two businesses operating on an on-premise computer system. Companies operating through cloud systems already share the same platform, therefore the sharing and accessing of information can be instantaneous, there is no need for arduous time consuming manual cross over procedures.
Flexibility to applications allows businesses to constantly trial products and tweak applications in a low-risk environment through eliminating the need of investing heavily in support systems. Trialling applications in a low-risk environment present an opportunity for continuous experimentation in low-pressure situations, which therefore grant businesses the opportunity to promote creativity and innovate.
An understated and often over-looked benefit of cloud computer is the environment factor. Cloud computing is a surprisingly green solution that aids its users in reducing their businesses carbon foot print. In the lieu of recent studies on the environmental impact of cloud computing, every business that has crossed over to the cloud can consider themselves an ally of the environment. Studies have presented evidence that enterprises can cut their C02 emissions by as much as 30,000 metric tons, over a five year period by transferring their HR application to a public cloud. This is the equivalent of removing 6000 automobiles off of the highway. Cloud computing presents a huge opportunity for energy saving, from both direct power expenses and indirect measures.
The benefit of Data Sharing Centres is that they require fewer machines to achieve the equivalent output as in-house set-ups. Eliminating the necessity of in-house servers means no need for manufacturing and shipping of infrastructure and its associated costs. For a large number of rack servers to perform at optimal level, their environment has to be meticulously monitored and regulated to ensure that conditions are conducive to allow peak performance. Seeing as SDC´s (shared data centres) consolidate the overall cost of climate control, transferring an on premise infrastructure set-up to a SDC not only reduces your costs but is a green solution that makes your business more environmentally friendly.
The nature of storage and server infrastructure utilized by SDC´s or Large Data Centres, and the sheer energy demand, forces SDC´s to constantly advance and upgrade their infrastructure in order to streamline their operation. Shared Data Centres can tap resources that allow them to upgrade energy-saving equipment and building systems, whereas small businesses lack the resources to do so. Resource pooling facilities reduce energy consumption, lower carbon emissions and reduce capital expenditure on IT resources and ultimately streamline the power and storage component of your business.
Cloud computing does have its own dark cloud looming over its glowing appeal, in the form of digital waste. Just like most processes, cloud computing is not exempt from generating by-products or in this case digital waste. The sheer volume of active data passing through a cloud platform everyday requires a large amount of highly competent servers to support the necessary data flow, processing and required service. The large servers themselves also, need to be maintained in an environment which extracts humidity while cooling the servers to prevent overheating.
Not only is there a vast amount of active data passing through the cloud but also inactive, obsolete information which is no longer used. Vast amounts of digital waste can accumulate quickly in large businesses and pose long term problems for SDC´s. The digital waste also requires server usage, which in turn requires server power and the conditions that maximize server performance and the mechanisms that regulate those conditions. As cloud computing evolves so too will its protocols for identifying and disposing of digital waste and therefore reducing the impact of your digital footprint.
Businesses operating an on-premise computer system have to invest in mass data loss prevention protocols, system recovery fail-safes and other pre-emptive measures to help protect their grid. Traditional backup solutions are expensive and require hefty time investments of personnel and IT resources.
In-house redundancy protocols require duplications of servers and hardware and also a high bandwidth connection to off-site data centres for replication. Such solutions present numerous obstacles during the implementation process including, automation difficulties and addition infrastructure, operational and administrative expenses.
An additional advantage of utilizing cloud computing is the seamless system replication, recovery and digital disaster fail safe solutions provide by the cloud. The immense compatibility of cloud computing allows on-premise resources to be quickly and safely backed-up without adverse complications.
Through cloud solutions it is possible to radically scale down and effectively manage the digital fall out of system crashes, data loss and other technological disasters. Businesses are no longer obligated to spend large amounts of money on duplicate servers and other pre-emptive digital meltdown containment costs.
Posted on July 24, 2013 March 31, 2014 by admin Tags: alliance, Alliance Sales & Marketing Solutions, alliances that work, Cloud computing, iTeam.
Cloud computing has steadily been growing in popularity and acceptance, mainly due to its incorporation by major companies such as Amazon, Netflix and Google. Alliance Sales & Marketing Solutions investigate the black and white view on cloud computing. Main-stream companies are boosting the appeal of the cloud not only through investing heavily in marketing campaigns to highlight its user-friendly nature, vast benefits and functionality but, also through leading by example. Numerous high-profile consumer-orientated companies have transferred their IT resources and operations from traditional computing models to cloud computing platforms, therefore legitimizing the so called “hype” and authenticating the effectiveness of cloud platforms and related products.
Despite the fact that millions of people are obliviously using cloud computing daily, there are many who still perceive the cloud negatively. The negative perception towards the cloud is fueled by a lack of understanding and a factor of uncertainty in security and fears of interchangeability complications, vendor lock-in and the potential target presented by accumulative data storage for cyber vandals and hackers. There are still those in the IT realm that when believe that total control of hardware, software and storage is paramount to security and the only way to operate. Cloud host vendors are faced with a somewhat monumental task of converting IT cloud naysayers to pro-cloud consumers.
Near enough every business wants to know that their sensitive data is safe and secure. Most C.E.O.s prefer to keep profitable and sensitive data on a personal computer or secure hard drive. This approach is a static form of data protection and is in fact less secure than a cloud facility. Cloud data centers bounce information from one location to another via encrypted forms of communication utilizing command security teams, fail-safe protocols for backup protection and power surge events and advanced analytic s and heavy-duty monitoring packages. This formidable array of advanced tools is what makes the cloud safer than most office and business facilities. Due to this advanced level of security more and more main stream businesses are switching over to the cloud.
Many businesses and clients are labouring under the illusion that making the switch to the Cloud will inevitably disrupt their business. On the contrary, what makes cloud computing so appealing is that the transitional period from traditional computing to the cloud is relatively quick and easy. In fact jumping over to the cloud will save your business from future disruptions by stabilizing your system operations through eliminating maintenance disruptions via automatic upgrades and systematic updates and hardware replacement.
We are inherently creatures of routine, we enjoy the daily cycles of repetition that give us a sense of security and safety, and with that being said many businesses are simply afraid of change, afraid to cross over the river. Many businesses would rather be forced to change than willingly make the decision. So for the time being countless companies will continue to forego the benefits in security, cost reductions, scalability, performance and functionality that cloud computing represents until the market place has developed to such a point where traditional computing systems are effectively incompatible models to generate profit in a highly evolved market place.
In conclusion, although there are numerous business leaders that will label cloud as an over-hyped marketing buzz word, major businesses such as Google, Amazon, Netflix and Microsoft have willingly entered into the cloud. Foregoing the available tools and benefits presented by cloud platforms and its related computing applications is not just detrimentally limiting the functionality of your business but your business itself.
“Cloud computing is the future of business, you may not like it, but then again you may not like flying either but, it is still the most efficient method of going from A to B and that’s why you do it” says Heather Guffin President and C.E.O. of Alliance Sales & Marketing Solutions.
Opposition towards cloud computing could be compared to opposing the banking system and opting to keep your life savings at home or at the office, rather than enjoy the benefits of high-level security, worldwide access and insurance. Opposition towards the cloud does not represent a permanent barrier, in fact a huge majority of people who oppose cloud computing already knowingly or unknowingly enjoy the benefits of high-level security and world wide access via their daily interactions with Gmail and Facebook. The bottom line is that the “Cloud” debate doesn’t have to be black or white.
Posted on July 23, 2013 March 31, 2014 by admin Tags: alliance, Alliance Sales & Marketing Solutions, Cloud computing, iTeam.
Since its birth way back in 1993 the internet has morphed from a non-user-friendly novelty to a vastly complex, easily accessible and highly interactive everyday necessity. From dial up connections to Wi-Fi, the internet has consistently made giant leaps in improvement, and cloud computing is not an over-hyped marketing tool but simply the latest stage in the continued development of the Internet.
Cloud computing isn’t a new concept it is just at its latest and most advanced stage of development. Cloud computing has been around since the mid-90s and was commonly referred to as “on-demand infrastructure”. During 1995, it was revamped to “Shared Web Hosting” and had limited features such as multi-tenant, automated provisioning, easy-to-use interface. It was not until the early 2000s when automated computing became closer to what is known as “cloud” today. It came in the form of Grid Utility Computing and had full infrastructure demand and multi-tenant, partial resource size flexibility and automated provisioning. After many years of re-branding, what was once “on-demand infrastructure” is simply referred to as cloud computing. After successfully crossing the chasm of acceptance, cloud computing now represents the next step in the evolution of the internet and business.
Cloud computing grants everyday users the ability store and access their information and data somewhere other than their PC or Mac. Cloud computing is a one-stop-shop for its users, through its unique and highly appealing ability of supplying access to software, hardware and infrastructure such as applications, storage devices and servers.
“Millions of people including everyday users and businesses are accessing and utilizing cloud services daily, utterly oblivious to the fact that they are partaking in a cloud computing experience” says Heather Guffin President and C.E.O. of Alliance Sales & Marketing Solutions.
Every time you access your Gmail account, watch a video on YouTube, update your Blog or post a photo of yourself on Facebook you are using a cloud. Cloud computing is basically the delivery of hosted services over the Internet. The service end is where the data or software is stored and the user end is a single person or company network. Cloud hosting can be broken down more or less into three distinct sections.
Software as a Service is usually free or pay-as-you-go, fast and easy to deploy, managed by the vendor and available for either short or long term use. SaaS represents the every-day-applications that millions of people use on a daily basis. SaaS applications are developed and built especially for the Internet.
Platform as a Service represents and hosts the operating environment in which applications run. You can deliver services broadly without having to manage the infrastructure. PaaS allows you to create and build your own cloud, provides scalable test environments and is generally managed by the vendor while allowing you the control to manage your applications.
Cloud computing is comprised of four unique characteristics, scalability or rather the ability to scale up or down depending upon needs, pay-as-you-go models allowing the user the freedom to pay for the services they actually use, self-service provisioning including automatic system and application updates and upgrades and application programming interfaces (API).
What cloud computing represents for the business user, is an indispensable tool to reduce business operating costs and increase open access to their office resources while promoting the functionality of their business when mobile. “The “everything under one roof” nature of cloud computing is one of its most appealing assets and reasons why so many businesses are switching to the cloud” Heather Guffin President and C.E.O. of Alliance Sales & Marketing Solutions.
Its not just the every-day-users of the internet who are reaping the benefits of cloud computing but businesses have also adopted the notion of a cloud office. Main stream companies such as Amazon and Google have already made the switch, by transferring a substantial amount of their IT resources to the cloud. Both Google and Amazon enjoy the flexibility and constraint alleviation such as the reductions in cost, power, space and time associated with the cloud computing model. Microsoft has also launched its own open and flexible cloud platform with Windows Azure.
Posted on July 21, 2013 March 31, 2014 by admin Tags: alliance, Alliance Sales & Marketing Solutions, alliances that work, Cloud computing, iTeam. | 2019-04-19T14:33:18Z | http://alliancesthatwork.com/pressreleases/tag/cloud-computing/ |
The degree of doctor of philosophy is conferred on qualified candidates who have passed an oral or written examination(s) on the subject matter of their field of study, who have completed an original investigation in this field and have embodied the results in an acceptable dissertation, and who have passed an oral examination in defense of the dissertation. The degree of doctor of philosophy is essentially a research degree.
As a land-grant institution, the University of New Hampshire (UNH) is accountable to New Hampshire residents and to the University community to ensure the ethical and safe conduct of research and scholarly activity. As an institution of higher education that prides itself on extensive research endeavors and the involvement of undergraduates and graduate students in research projects, UNH has an obligation to teach and actively promote integrity in research and scholarship.
Foster an institutional culture of integrity in research and scholarly activity.
To support these efforts, the Graduate Council has mandated that all incoming Ph.D. students complete RCR training approved by the Graduate School by the end of their first semester. For more information, visit the RCR website.
A guidance committee is appointed by the dean of the Graduate School upon the recommendation of the program faculty as soon as possible after a student has begun study for the Ph.D. degree. The committee assists the student in outlining a program and preparing for the qualifying examination, and administers the examination.
A minimum of three academic years of graduate study is required for the Ph.D degree. Resident graduate work done at other universities may be counted toward the minimum requirement upon approval of the guidance committee and the dean of the Graduate School, but one full academic year must be in residence at the University of New Hampshire. In individual cases, the major department and the dean of the Graduate School may grant permission to pursue the research for the dissertation at another institution where access to special facilities would be advantageous.
Each program specifies the number of courses required for the Ph.D. degree.
The DNP program requires 21-33 credit hours.
A minimum of two semesters of registration in Doctoral Research is required for Ph.D students. However, Ph.D. students at candidacy must register for 999 each semester during the academic year, even if the minimum requirement has been met. Although Doctoral Research (999) is 0 credits, it grants full time student status.
A Ph.D. student is advanced to candidacy for the degree by the dean of the Graduate School upon recommendation of the graduate program coordinator after the student has passed the qualifying examination, met the language or proficiency requirements as are deemed desirable by the student's program, and declared a topic for dissertation research. Students are expected to file an Advancement to Candidacy form with the Graduate School once all of the requirements for candidacy have been met. Ph.D. students at candidacy must register for Doctoral Research (999) each semester during the academic year until the degree is awarded.
Note: If doctoral candidacy is reached before the final day to register for the current semester, then candidacy shall be effective immediately. If doctoral candidacy is reached after the final day to register for the current semester then candidacy shall be effective at the start of the following semester.
the student's fitness for engaging in research, particularly in the subject proposed for the dissertation.
Each doctoral program has its own language and/or research proficiency requirements. These requirements can be found in the individual program descriptions.
After a Ph.D. student has been advanced to candidacy, a doctoral committee will be appointed to supervise and pass on the dissertation and administer the final examination. This committee will be nominated by the department of major concentration and appointed by the dean of the Graduate School. It shall consist of a minimum of five members, usually three from the major department and two from related departments. The dean of the Graduate School is an ex officio member of all doctoral committees.
The dissertation must be a significant contribution to scholarship in the student's discipline, demonstrating the student's ability to conduct independent and original research and to communicate the results of the research through a coherent, integrated, and mature piece of writing.
A copy of the completed dissertation must be made available to the members of the examining committee two weeks before the final examination date.
The final oral examination is conducted by the doctoral committee and is intended to give the candidate an opportunity to defend the dissertation. While it is desirable for all committee members to participate in dissertation defenses, whether in person or through virtual means such as conference calls or video conferencing, outside scholars are not required to be present at the defense. Departments will determine how to obtain meaningful and substantive evaluations from external members in consultation with the Graduate School. A written final examination, on subject matter not covered in the qualifying examination, may also be required. This written examination is conducted by the major department. These final examinations must be completed by the date listed in the Graduate School calendar. After consultation with the major program, the dean of the Graduate School may appoint, for participation in the final oral examination, additional members of the faculty under whom the student has worked. The doctoral committee alone shall decide on the merits of the candidate's performance by a majority vote.
The final approved dissertation must be submitted for publication by ProQuest via the UNH ETD Administrator website by the appropriate deadline as published in the Graduate School calendar. Bound copies are available for purchase through ProQuest at the time of submission. Students should check with their department to determine if a bound copy is required. Students may choose to copyright their thesis at the time of publication. All fees are to be paid by the student at the time of submission. If the dissertation material is further published, it should be designated as having been accepted as a doctoral dissertation by the University of New Hampshire.
All graduate work for the doctorate must be completed within eight years of matriculation (enrollment after admission) or within seven years if the student entered with a master's degree in the same field. A Ph.D. student must be advanced to candidacy within five years after matriculation or within four years if the student entered with a master's in the same field.
A minimum of 30 graduate credits is required for all master's degrees. Many programs require substantially more than the minimum 30 credits. Individual program requirements are outlined in the program descriptions of this catalog. Graduate credits are normally earned in courses numbered 800-999. Up to 12 credits earned in courses numbered 700-799 may be taken for graduate credit by master's degree students provided the courses are approved by the dean of the Graduate School and given in a department other than the one in which the degree is sought.
A student will normally spend at least one calendar year, or the equivalent, in satisfying the requirements for the degree.
The most appropriate capstone experience(s) for each program is determined by the faculty of each program. Such experiences may include a single integrative course, a performance, an internship or praxis, a portfolio, a scholarly paper or essay, an examination, a research problem, a research project, or a research thesis, and are subject to approval of the dean of the Graduate School. All master’s degrees at UNH must include a capstone experience.
Requirements for non-thesis capstone experiences must be clearly articulated by each program. Capstone experiences, with the exception of capstone courses, must be approved by a committee of at least two faculty members in the student's program and approved by the graduate program coordinator. All capstone experiences must be completed by the end of the final examination period of the graduation date for which the degree is to be conferred.
Students who are in a thesis program are required to conduct research and prepare a scholarly paper under the guidance of a faculty committee for submission to the Graduate School. Guidelines on the purpose, framework, and process for the thesis should be clearly articulated by each program. Students writing a thesis should obtain a copy of the Thesis and Dissertation Manual from the Graduate School website at www.gradschool.unh.edu. Students in thesis programs may also be required to pass a final examination. The regulations concerning this exam are the same as those in the non-thesis option. The thesis committee will normally also serve as the examining committee.
thesis will be recorded as a credit (CR).
A master's thesis must be approved by a committee composed of a regular member of the graduate faculty under whose direction it was written and two other members of the graduate faculty nominated by the department chairperson or graduate program coordinator and appointed by the dean of the Graduate School.
The final approved thesis must be submitted for publication by ProQuest via the UNH ETD Administrator website by the appropriate deadline as published in the Graduate School calendar. Bound copies are available for purchase through ProQuest at the time of submission. Students should check with their department to determine if a bound copy is required. Students may choose to copyright their thesis at the time of publication. All fees are to be paid by the student at the time of submission.
All graduate work for any master's degree must be completed within six years from the date of matriculation (enrollment following admission) in the program. Progress toward the degree will be carefully monitored by the adviser and the Graduate School to ensure that adequate advancement is made toward the completion of the program and that any deficiencies noted at the time of admission are removed.
The Graduate School allows UNH students to pursue two degrees at UNH and count credits toward both degrees under the circumstances detailed below. Such credit will be granted only for graded coursework completed with a grade of "B-" or higher. Application of such credit toward a student's program for a second degree is subject to departmental recommendation and approval by the Graduate School. Dual degrees should be interpreted to include separate majors within the same degree, or a combination of two different degrees. Students will receive separate diplomas for each degree program. Note: Dual degrees will NOT be awarded retroactively.
Accelerated Master's. Qualified senior students at the University of New Hampshire may be admitted to the Graduate School provided they have followed normal application procedures; they must have been admitted for the semester in which they wish to enroll in courses for graduate credit. A 3.20 cumulative grade point average is normally required to be considered for early admission. Students are normally admitted prior to the start of their last undergraduate semester. Students who have been admitted under early admission may register for a maximum of 12 credits of graduate-level courses prior to completing their bachelor's degree. Such courses may, upon recommendation of the department and approval of the Graduate School, count toward both a bachelor's and master's degree.
Consecutive Master's Degrees. Enrollment in consecutive master's degrees refers to admission and matriculation in a second master's degree program at the University of New Hampshire after the completion of the requirements for a first master's degree earned at the University of New Hampshire. A student may apply up to 12 credits earned in the first master's degree awarded at the University of New Hampshire toward a second master's degree with approval of the student's graduate advisory committee and/or graduate program coordinator in the second master's program. Thesis or research credits from the first program may not be counted toward the requirements of the second program.
Concurrent Dual Degrees. Enrollment in concurrent dual degrees occurs when a student is admitted to and matriculated in two graduate degree programs at the University of New Hampshire simultaneously. A student may pursue concurrent degrees only with approval of the appropriate graduate program coordinator(s) and the dean of the Graduate School. With approval of the student's graduate advisory committee(s) and/or the graduate program coordinator(s), a student may apply up to 12 University of New Hampshire credits earned in one master's degree toward the requirements for a second master's degree. A student must complete the capstone requirements for both programs. Completion of degree requirements for the two programs need not be at the same time.
Integrated Dual Degrees. Integrated dual degrees occurs when two graduate programs have formalized a program of study which creates an integrated program linking the two disciplines, while continuing to award separate degrees. Students must be admitted to both programs and complete the requirements for both degrees. Integrated dual degree programs may include a single admissions process, submission of a single thesis or capstone experience, and a single advisory committee composed of members from both programs. The number of required credit hours for integrated dual degrees must not be less than 80 percent of the total minimum hours required to complete each degree separately. Integrated dual degree programs must be approved by the Graduate Council and the dean of the Graduate School.
All standard policies relating to time to degree, residency requirements, academic standards, and minimum GPA required to graduate apply to any dual-degree arrangement.
If the student withdraws from one of the participating programs, the dual-degree arrangement is automatically nullified.
If a student's tuition is funded by one or more units, it is up to the funding unit to decide if tuition may cover courses taken solely for completion of the second program.
Requirements for completion of the educational specialist degree (Ed.S.) are found under the program descriptions of the Department of Education. A student can petition to count a maximum of 12 credits, not previously applied to a degree program and taken prior to admission to the Ed.S., toward a Ed.S. program.
All graduate work for the Ed.S. must be completed within six years from the date of matriculation (enrollment after admission) in the program.
Graduate certificate programs require a minimum of 4 graduate courses and a minimum of 12 credits of graduate course work (800- or 900-level courses) organized in a coherent and logical manner to provide knowledge and expertise relevant to a specific aspect of professional and/or personal development. All coursework in a certificate program must be taken at UNH.
Only courses completed with a grade of B- or higher may be used to fulfill certificate requirements. A student who receives more than one grade below B- will be required to withdraw from the certificate program.
A maximum of one full UNH course (3 or 4 credits) or two 1 or 2-credit UNH courses taken prior to matriculation (enrollment in the program after admission) in a certificate program may be applied to fulfill the certificate requirements. Courses may be applied to only one certificate program but may be applied to a master’s or doctoral degree program at UNH. There are no upper limits to the number of credits that maybe applied to a degree program provided the courses fulfill a degree requirement.
Students enrolled only in certificate programs are exempt from the Graduate School’s continuous enrollment policy.
Tuition for NH residents in certificate programs will be equal to the rates for NH resident graduate degree students. Tuition for out-of-state students will be 10% above the resident rate, unless the student is also enrolled in a degree program, in which case the nonresident or New England Regional rate will apply. Students enrolled only in certificate programs are not eligible for graduate assistantships or scholarships unless specifically awarded by the sponsoring program, but may be eligible for need-based aid through the UNH Financial Aid Office. Students enrolled in degree programs as well as certificate programs are eligible for all forms of graduate financial support. | 2019-04-19T06:30:10Z | https://catalog.unh.edu/graduate/academic-regulations-degree-requirements/degree-requirements/ |
One hundred ninety-four member nations turn to the World Health Organization (WHO) for guidance and assistance during disasters. Purposes of disaster communication include preventing panic, promoting appropriate health behaviors, coordinating response among stakeholders, advocating for affected populations, and mobilizing resources.
A quality improvement project was undertaken to gather expert consensus on best practices that could be used to improve WHO protocols for disaster communication. Open-ended surveys of 26 WHO Communications Officers with disaster response experience were conducted. Responses were categorized to determine the common themes of disaster response communication and areas for practice improvement.
Disasters where the participants had experience included 29 outbreaks of 13 different diseases in 16 countries, 18 natural disasters of 6 different types in 15 countries, 2 technical disasters in 2 countries, and ten conflicts in 10 countries.
Recommendations to build communications capacity prior to a disaster include pre-writing public service announcements in multiple languages on questions that frequently arise during disasters; maintaining a database of statistics for different regions and types of disaster; maintaining lists of the locally trusted sources of information for frequently affected countries and regions; maintaining email listservs of employees, international media outlet contacts, and government and non-governmental organization contacts that can be used to rapidly disseminate information; developing a global network with 24-h cross-coverage by participants from each time zone; and creating a central electronic sharepoint where all of these materials can be accessed by communications officers around the globe.
During and after a disaster, effective communications must coordinate response efforts in order to limit secondary morbidity and disease . Organizations must communicate early and frequently with multiple stakeholders to prevent panic and implement an orderly response plan . The government and other decision makers need to know what response efforts are ongoing, and what type of further assistance is required where in order to coordinate relief. Health professionals want to know which health risks or diseases are increased in the current environment, how best to advise their patients, and how they can stay informed of emerging disease trends while working in the field. The public wants to know how to obtain assistance, what ongoing personal risks they face, and how they can protect themselves and their families . Platforms for this type of health messaging include press releases and media interviews, Internet articles and social media, town hall forums, and frequent timely communication among responders.
Each disaster serves as a learning opportunity for how to communicate better in the next disaster. Several retrospective studies have tried to document these lessons by determining how the public understood the messages that were communicated to them during a recent disaster [4–11]. Gaps in a disaster communication plan such as technical or complex instructions can leave groups vulnerable to misunderstanding the message, while methods of dissemination [5–8] and demographics [7, 9] can result in the message never reaching certain target populations. Other studies have focused on learning lessons from the groups responding to the disaster, including healthcare professionals [8, 10] and US governmental agencies .
A large body of risk communications literature has gone beyond the piecemeal focus on each individual disaster to educate on overarching best methods of health messaging [12, 13]. However disaster communications has been criticized because communications preparedness remains underdeveloped . An expert Delphi study published in 2012 came to the consensus that despite all the existing literature, there is still a lack of understanding about communication, identifying communication as a top three priority area for further disaster management research .
The primary author interviewed WHO Communications Officers who had responded to prior disasters using an open-ended survey. The primary author was employed by WHO and based in Switzerland at the time of survey administration and data review. This quality improvement project represents a non-sensitive survey approved by the WHO Communications Department Head, which was used for internal evaluation and improvement of existing WHO procedures, and as such was subject to the regulations of WHO, which does not have an IRB for internal projects.
A communications officer at WHO is responsible for developing and publishing communication and advocacy material for the organization, serving as a spokesperson for the organization, developing and implementing a strategic corporate communication plan, and supporting member countries to develop and implement communications. The communications officers work for WHO offices primarily leading daily communications activities (e.g., World Health Day campaign, release of new WHO guidelines, etc.), but in the case of a disaster may be deployed to support disaster communications in the affected area.
A senior WHO employee with extensive communications and disaster experience at WHO contributed an initial list of 15 potential participants. Participants were then asked to refer other participants with disaster experience using snowball sampling methodology. A total of 31 potential participants were identified and contacted via corporate email to request their participation. Twenty-eight people responded; 2 were excluded due to scheduling conflicts and 26 were formally interviewed by phone, by video conference, or in person.
In-depth interviews were conducted in English. Participants were asked a series of closed- and open-ended questions from a structured survey template about their experiences responding to disasters as communications officers on behalf of WHO (Additional file 1). Interviews lasted approximately 75-90 min. All of the interviews were digitally audio-recorded with the participants’ permission. Data were entered into a Microsoft Excel spreadsheet, version 14.0.6129.5000 (Microsoft Corp., Redmond, WA, USA).
Analysis included: (1) descriptive statistical analysis to objectively characterize the incidence of different types of disaster experience; (2) a careful re-listening to the interview recording to fully understand participant’s perspectives; (3) coding of the responses to each open-ended question into different thematic categories based on word repetitions and key words in context ; (4) extraction of data using pawing to determine the most frequently reported barriers and augmenters of effective disaster communication; (5) extraction of data using pawing to determine the most commonly reported themes of disaster communications that represent transferable knowledge between different disasters. Some participants gave responses that did not fit into the key word themes of any other participants; these were recorded as new themes at a frequency of one to exhaust all possible themes. Themes were ranked in importance based on their frequency of appearance in the responses, with the addition of one single-frequency recommendation theme determined to be important based on the researchers’ prior literature review of the topic and knowledge of the structure of the WHO. Results were used by the WHO Communications Department to develop new protocols for future WHO disaster response communications.
Twenty-six WHO Communication Officers from Headquarters (HQ) in Geneva, all 6 regional offices (RO), and 11 country offices (CO) participated. The majority (N = 22; 85%) had experience in multiple disasters. Participants had responded to both acute and chronic disasters, defined as whether the disaster had happened less or more than 3 months prior to deployment. Most communications officers were deployed close to the disaster epicenter: to the field, to the nearest country office, or to a combination of both. Half were deployed within 3 days to 1 month after the disaster began, but just three arrived within the first 72 h after the disaster (Table 1). The disasters where they had worked included 29 disease outbreaks of 13 different diseases in 5 regions and 16 countries, 18 natural disasters of 6 different types (e.g., tsunami, earthquake, flood, etc.) in 5 regions and 15 countries, 2 technical disasters in 2 regions and 2 countries, and 10 conflicts in 3 regions and 10 countries.
Qualitative responses from the communications officers resulted in a list of core communications priorities for WHO during a disaster response (Table 2), recommendations for hiring a competent communications officer who can be deployed for disaster response (Table 3), and recommendations for trainings a communications officer should receive prior to deployment (Table 4). In addition, the communications officers provided recommendations for methods to build communications capacity that could be undertaken prior to a disaster to improve preparedness (Table 5).
One hundred ninety-four member states turn to WHO for guidance and assistance in response to disasters that include not only disease outbreaks, but also natural disasters, man-made disasters, and conflicts . Post-disaster communication is one area of expertise for which WHO provides support to member countries. WHO also convenes international experts to reach public consensus on priority topics, and it recently convened an expert panel on the topic of communications during disease outbreaks .
WHO Headquarters is subdivided into clusters that operate relatively independently . Different clusters respond to different types of disasters and sometimes even to different aspects of the same disaster. For example, the Humanitarian Action in Crisis (HAC) cluster responds to natural disasters and conflicts, while the Global Alert and Response Network (GAR) responds to disease outbreaks. After the earthquake in Haiti in 2010, HAC initially responded, but GAR joined relief efforts later that year when a cholera outbreak began. In addition, WHO consists of six regions each coordinated from a RO (Figure 1) . At the regional level there are also clusters, although their specific titles and functions vary from region to region. Finally, COs have large variations in the number and specialized scope of staff. Countries with larger WHO operations have larger offices, while some countries do not house an in-country office at all.
Location of WHO regions and headquarters.
A small number of communications officers working at different levels (country, regional, or headquarters) and in the different clusters are consistently deployed throughout this global network to respond to disasters. Usually the CO where the disaster occurred requests additional support from their RO or HQ if they do not have their own communications officer or if there is too much work for one officer. Each individual officer possesses vast experiential knowledge about disaster response and communications during disasters in particular. This study was organized by the Department of Communications (DCO) cluster, which leads communications at HQ. Its objective was to gather and utilize this experiential knowledge to formulate best practices for communication during a disaster that could be used to develop WHO policies and procedures, as well as to develop a training program to improve preparedness for deployment of WHO Communications Officers to disasters.
WHO’s main role during a disaster is to support the local government’s Ministry of Health (MoH) and to co-chair the United Nations Health Cluster along with the local MoH. In this role, WHO communications officers are responsible for sharing information about the response efforts among the different member organizations of the Health Cluster. They create and update a detailed situation report and distribute it frequently to all cluster members. The report maps which organizations are providing which health services to each affected area, where gaps still remain in services, and the joint action plan to fill those gaps. For this role, it is helpful to have the contacts at each major health cluster organization included in electronic listservs so that a communications leader can rapidly send an internal message to government partners at the Ministry of Health and to non-governmental organization partners who are participating in the response effort.
Where possible and depending on the size of an organization, additional team members can be assigned to support the communications activities of those in the field through a global network with 24-h cross-coverage from offices in other time zones. While those working in the field sleep, communications officers at a headquarters in another time zone where it is still daylight can respond to international media queries on their behalf. Current WHO practice is to hold daily teleconferences between the communications officer in the field or CO and the other communications officers supporting them from the RO and/or HQ to summarize the situation and assign the work that needs to be completed. Additional communications occur as needed throughout the day via email and/or telephone. Raw photo or video footage from the field can be emailed to the office-based staff for editing prior to further distribution.
Perhaps the most interesting and broadly applicable finding of this study is the recommendation for how to prepare disaster communications ahead of time, which included several useful and novel methods that can be adapted by any organization. Respondents noted that similar questions arose in seemingly different disasters and suggested preparing the answers to the most common problems in advance. One example is allaying the public’s fear of dead bodies spreading disease, since several experts pointed out that bodies do not pose an imminent risk when killed by a natural disaster or conflict rather than an infectious disease. Another example is a message to the international public to refrain from sending bulk donations of used goods and instead to wait for a request of which specific goods are needed and where. Additional examples include warnings about generator use to prevent carbon monoxide poisoning, and messages about safe handling of waste and how to sanitize water when plumbing has been compromised. Such public health messages could be written and recorded for television, radio, and social media in multiple languages ahead of time (Table 6).
Developing a databank of basic statistics about the local population, health status, and disaster risk for areas most frequently affected by disaster was also suggested. Pairing each statistic with a brief descriptor written in human factor terminology makes it ready for immediate use in communications. As an example of human factor terminology, in an area commonly afflicted by flooding, rather than stating that the incidence of floods is 21% per lifetime, it is better to state that one of every five persons will be affected by a flood in their lifetime.
For those regions frequently affected by particular disaster types, media surveillance should be undertaken regularly as to which sources of information the local public trusts. These sources may include a particular television network, radio station, or even a community leader or religious authority. Text messaging and/or social media can also augment the number of people reached. During a disaster, these trusted sources are the outlets that should be targeted when disseminating health messages to the public to ensure that no group misses the message. Listservs of these local media and community contacts should be created and maintained in advance of any disaster for quick dissemination of press releases and public health messages.
Another recommendation to improve future coordination within WHO was to store all of the documents mentioned above including common messages, statistics, and listservs with important contacts in a central electronic repository utilizing “cloud technology” such as Sharepoint, Google Docs, or Dropbox where they can be readily accessed and updated by all of the organization’s officers working from around the globe. Other areas which were identified for improvement that are more specific to internal WHO processes included the lack of a defined on-call system for deployment and the lack of a formal briefing or debriefing process. The need to develop more formal training to expand the list of experts qualified for deployment led to a list of suggested trainings that would help prepare a communications officer for first-time deployment (Table 4).
This is a retrospective study composed of a convenience snowball sample rather than a randomized sample of all possible participants. Because people were asked very open-ended questions without prompting, the few responses that were offered by nearly 100% of respondents likely indicate a very strong relevance, but it is difficult to draw scientific conclusions about responses given by <50% of respondents since other respondents might have agreed had they been specifically questioned on the value of these ideas. This is a preliminary data-gathering project that presents interesting ideas that should be further evaluated in a more rigorous study, ideally convening disaster communications experts from a variety of organizations.
Many communications tasks can and should be undertaken prior to a disaster to improve preparedness. Some of these tasks represent common sense, while others may be more novel. Investing time and manpower now to improve an organization’s communications capacity can save time in disseminating key messages to minimize chaos and coordinate stakeholders once disaster strikes.
LMD is Chief Resident at the BCM Emergency Medicine residency program and has been selected as a Robert Wood Johnson Fellow for 2014.
GBK is the founding emergency medicine residency program director at BCM and is the founding director of the Center for Globalization at BCM.
Global alert and response network.
The authors will like to acknowledge Carey S. Kyer, Gustav Asp, and William Frank Peacock. While the cost of this project was minimal, all funding was provided by WHO Department of Communications.
LMD performed the surveys and theme-generating data analysis. GBK contributed to the project methodology and design. LMD and GBK wrote the manuscript. All authors read and approved the final manuscript. | 2019-04-24T23:52:21Z | https://intjem.biomedcentral.com/articles/10.1186/1865-1380-7-15 |
NC State’s 2017-2022 Sustainability Strategic Plan is a five-year roadmap that builds upon the university’s strengths, momentum, and decades of sustainability progress. The campus-wide Sustainability Council and its working groups – with extensive involvement from the university community – developed the Sustainability Strategic Plan. The plan has been endorsed at the highest levels of university leadership and is in effect from July 1, 2017, through June 30, 2022.
NC State develops leaders and innovations that create a more sustainable world.
Engaging campus and community in creating a more sustainable future.
Student Leadership: Engage students in initiatives that promote leadership and service in sustainability.
Academics: Integrate sustainability into education, experiences, and research.
Operations, Planning and Design: Model sustainability through efficient, innovative facilities and operations that educate the campus community and improve the quality of life.
Community and Culture: Accelerate a culture of sustainability, inclusivity, and well-being on campus and in the community.
Communications: Propel awareness and sustainability at and beyond NC State.
Our communities, state, nation, and world face increasingly complex challenges that impact our environment, our economy, and our society. Successful sustainability pursues balanced, ethical solutions that are economically viable, environmentally sound, and socially just so that current and future generations may thrive.
The environment was the primary focus of NC State’s early sustainability efforts. In the development of this strategic plan, the university community expressed a desire to broaden NC State’s scope of sustainability to include economic and social dimensions that address complex challenges such as human health and well-being, poverty, equity, and justice. Implementing the strategic plan provides opportunities to demonstrate the tradeoffs inherent with making sustainable decisions. With this multidimensional approach, NC State will engage campus and community in creating a more sustainable future.
There are unprecedented challenges facing our increasingly connected world, and sustainability leaders and innovations have never been more vital. Institutions of higher education are crucial to preparing graduates equipped to lead, to serve, and to solve complex social, environmental, and economic problems.
Through implementation of the Sustainability Strategic Plan, sustainability will be integrated into NC State’s education, experiences, and research. More NC State students will be engaged in initiatives that promote leadership and service in sustainability. Campus will model sustainability through efficient, innovative facilities and operations that educate the campus community and improve quality of life. A culture of sustainability, inclusivity, and well-being will be accelerated on campus and in the community. These initiatives, plus active communication efforts, will propel sustainability at and beyond NC State. NC State will emerge by 2022 as one the nation’s leading universities for sustainability education, operations, and engagement.
This plan builds on decades of progress that has established NC State as a sustainability leader. The university is a frequent recipient of local, regional, and national sustainability honors, including the 2016 achievement of a Gold rating in the Sustainability Tracking Assessment and Rating System (STARS) offered through the Association for the Advancement of Sustainability in Higher Education (AASHE).
Much of this progress was catalyzed by the university’s inaugural Sustainability Strategic Plan (2011-2016) led by the university-wide Campus Environmental Sustainability Team (CEST). Innovations in energy, water, transportation, purchasing, waste reduction, land use, and buildings created ongoing opportunities for campus to become a living classroom, where NC State students learn and conduct research. These advances solidified the university’s sustainability commitment, leading to the adoption of a University Sustainability Policy in 2014. NC State began developing the 2017-2022 Sustainability Strategic Plan in 2015 under the leadership of the Sustainability Council.
September 2015: The Provost and Vice Chancellor for Finance and Administration established the Sustainability Council to lead development and implementation of NC State’s second Sustainability Strategic Plan.
September – December 2016: Campus and community members provided feedback on the draft plan. The Sustainability Council steering committee evaluated all comments and incorporated common themes.
Spring 2017: The plan was finalized and approved by university administration.
July 1, 2017 – June 30, 2022: Implementation of the plan.
1. Enhance the success of our students through educational innovation.
2. Enhance scholarship and research by investing in faculty and infrastructure.
3. Enhance interdisciplinary scholarship to address the grand challenges of society.
4. Enhance organizational excellence by creating a culture of constant improvement.
5. Enhance local and global engagement through focused strategic partnerships.
Each fiscal year, the Sustainability Council’s five working groups will create and implement annual tactics to drive progress toward the plan’s goals, strategies, and objectives. Tactics will be created based on feasibility, cost and potential impact to ensure sound stewardship of the university’s resources.
Working groups meet regularly and welcome participation from anyone on campus or in the community. Each working group has a chairperson(s) who leads the group and is part of the Sustainability Council’s steering committee.
Each working group has been assigned a specific goal, and collaboration across working groups is vital as the plan’s five major goals are interdependent. Success in one area can springboard success in another, and the Sustainability Council’s steering committee will create mechanisms for regular communication among working groups. In some cases, multiple working groups are pursuing similar strategies, making collaboration even more crucial.
Working groups will track both quantitative and qualitative measures of progress, which will be monitored through the university’s Annual Sustainability Report, published during the fall semester.
Engage students in initiatives that promote leadership and service in sustainability.
Enhancing student success is one of NC State’s foundational goals, and that success extends beyond the classroom. Sustainability provides an ideal backdrop for creation of high-impact educational experiences that reinforce academic excellence, while equipping students to serve and to lead. These efforts help develop successful NC State graduates who are well prepared for impactful careers and lives.
Sustainability strategies in Student Leadership contribute to fulfilling the university’s strategic goal of enhancing the success of our students through educational innovation.
Help advance these goals by joining the Sustainability Council's Student Leadership Working Group.
The following strategies and objectives support the Student Leadership goal. Specific tactics that are being implemented during fiscal year 2018 (July 1, 2017 – June 30, 2018) are also listed.
Strategy 1: Increase student involvement with high-impact, co-curricular experiences in sustainability.
A. Increase student engagement in sustainability-focused student trips.
Tactic: Define what qualifies as sustainability-focused student trip.
Tactic: Create an inventory of existing university-related trips that are sustainability-focused.
Tactic: Perform a needs assessment of existing sustainability-focused student trips.
B. Expand sustainability-related competitions for students.
Tactic: Continue offering Make-A-Thon as an annual student sustainability competition on campus.
C. Increase the diversity and number of student organizations engaged in sustainability initiatives, events, and programming.
Tactic: Define incentives that will encourage additional student organizations to become more sustainable.
Tactic: Work with Student Involvement to add “sustainability” as a category for student organizations to self-select.
Tactic: Utilize Student Government’s Sustainability Department to distribute information to student body.
D. Engage more students in sustainability-related service learning and community service.
E. Increase the resources and support available for sustainability-related student organizations.
Tactic: Establish connection with Union Activities Board (UAB) to encourage sustainable event planning.
Tactic: Create sustainability resources to be distributed to student organizations and staff/faculty advisors.
Tactic: Train students to support organizations pursuing sustainable events certification.
F. Develop a sustainability co-curriculum.
Tactic: Create a committee to design Student Sustainability Co-curricular Leadership recognition.
Strategy 2: Expand sustainability training and outreach for students.
A. Create a sustainability workshop series that contributes toward student leadership development.
Tactic: Student Sustainability Co-Curricular Leadership Award Committee will evaluate current leadership workshops that are available and decide on the topics that need to be created for workshops.
B. Include sustainability education in New Student Programs, University Housing, University and college ambassadors, and Fraternity and Sorority Life.
Tactic: Provide sustainability training to New Student Orientation Leaders.
Tactic: Encourage new students to continue using the reusable bags and bottles they receive at New Student Orientation.
Tactic: Promote programs/events that connect sustainability to the Common Reading Program.
Tactic: Certify Convocation events as sustainable.
Tactic: Provide sustainability information for RA’s to include in their hall meeting in August.
Tactic: Present sustainability information focused on residence halls to Inter-Residence Hall Council.
Tactic: Recognize the Most Sustainable Chapter award winner at Fraternity and Sorority Life’s Order of Omega Awards.
Tactic: Add sustainable event certification to Fraternity and Sorority Life’s Event Management Page.
Tactic: Include Sustainable Event Certification link on Fraternity and Sorority Life’s Event Management website.
Tactic: Increase sustainability efforts during Fraternity and Sorority Life’s Panhellenic and IFC recruitment.
Tactic: Provide sustainability training to Fraternity and Sorority Life’s tailgating committee/IFC.
Tactic: Edit Fraternity and Sorority Life’s Standards evaluation sheet to include a sustainability section.
Integrate sustainability into education, experiences, and research.
Society’s grand challenges require leaders who can recognize complexities and create innovative solutions to sustainability challenges.
Sustainability experiences inside and outside the classroom contribute to NC State’s first priority: enhancing student success and equipping students for impactful careers and lives. Sustainability bridges academic disciplines and transcends their boundaries, bringing together the varied skills and diverse perspectives required to tackle complex challenges.
Sustainability is a fundamental perspective for enhancing the critical and creative thinking that NC State fosters in students. Sustainability is already present in many academic programs and co-curricular activities. There is opportunity for more robust integration of sustainability so that NC State becomes the first choice for incoming students who seek to create a more sustainable future. Campus-wide coordination of sustainability programs will ensure that every student has access to sustainability-related learning experiences. A multidisciplinary emphasis will lead to more sustainability-related research breakthroughs at NC State.
Academic sustainability goals contribute to the university’s first strategic goal of enhancing the success of our students through educational innovation, the second strategic goal of enhancing scholarship and research by investing in faculty and infrastructure, and the third strategic goal of enhancing interdisciplinary scholarship to address the grand challenges of society. Sustainability research discoveries, real-world learning, and extension also contribute toward additional university goals to enhance organizational excellence and community engagement.
Help advance these goals by joining the Sustainability Council's Academics Working Group.
The following strategies and objectives support the Academics goal. Specific tactics that are being implemented during fiscal year 2018 (July 1, 2017 – June 30, 2018) are also listed.
Strategy 1: Enhance cohesion among academic programs that address sustainability.
A. Establish and support an administrative framework that coordinates academic sustainability programs.
Tactic: Establish the position of an academic sustainability coordinator to provide the needed leadership and coordination.
Tactic: Understand how the University Sustainability Office best supports progress in academic sustainability collaboration.
Strategy 2: Ensure that every NC State undergraduate student engages in coursework with critical and creative thinking and substantive learning outcomes focused on sustainability.
A. Develop a sustainability general education program (GEP) category or group of classes.
B. Develop a coordinated NC State annual sustainability theme to be incorporated into the curriculum.
Tactic: Coordinate with Housing and Living and Learning Villages to include sustainability-related academic activities into their schedule of events as well as connect with faculty engaged in sustainability-related scholarship.
Strategy 3: Facilitate opportunities for NC State students to participate in high-impact academic experiences in sustainability.
A. Provide students with sustainability-related professional development opportunities.
B. Better coordinate and communicate high-impact academic opportunities focused on sustainability.
Tactic: Identify and promote existing programs where there are sustainability engagement opportunities beyond the typical classroom experience.
C. Create team-taught courses or seminars focused on current sustainability issues.
Tactic: Develop criteria for identifying existing courses that would qualify as team-taught courses or seminars focused on current sustainability issues.
Tactic: Establish a process outline for co-teaching sustainability-related courses across colleges.
Tactic: Advocate for funding of team-taught, sustainability-related courses.
Strategy 4: Increase the demographic and disciplinary diversity of the NC State community engaged in sustainability academics.
A. Create diversity through high school recruiting into sustainability-oriented academic programs, with a focus on attracting students from groups traditionally underrepresented in such programs.
B. Continue to develop courses and course modules in environmental justice and equity.
C. Partner with regional minority-serving institutions in student service and action research projects.
D. Foster the development of multidisciplinary scholarship and research by faculty focused on sustainability.
E. Support and reward faculty in developing and teaching multidisciplinary courses that address sustainability across departments and colleges.
Strategy 5: Establish NC State as an institution that develops sustainability stewards and leaders.
A. Engage faculty and students from across the university with real-world, community-identified projects to meet the partnering community’s sustainability priorities.
B. Develop a sustainability leadership certificate.
Strategy 6: Establish NC State as the first choice for prospective students committed to sustainability.
A. Engage with high school faculty/administration and students about sustainability education and programming at NC State.
Strategy 7: Engage external stakeholders in supporting NC State’s academics sustainability initiatives.
A. Bring external stakeholders to campus for sustainability activities and programs, such as presenting lectures and seminars, advising students and faculty engaged in sustainability projects, judging student presentations and posters in classes, and campus research events.
Strategy 8: Establish new sustainability student scholarships and fellowships.
A. Create a funding program to which student teams can apply for support for sustainability research.
Strategy 9: Increase the university’s profile in sustainability-related research.
A. Solicit external funds for research seed funding in sustainability.
Tactic: Solicit undergraduate student research funds focused on sustainability.
Tactic: Coordinate with the Office of Research, Innovation and Economic Development on corporate, crowd-sourced or foundation development of sustainability-related research.
Tactic: Explore with Poole College of Management whether there is an opportunity for coordination across campus to engage with the Business Sustainability Collaborative.
Model sustainability through efficient, innovative facilities and operations that educate the campus community and improve the quality of life.
A university campus has more value than ever as a place for real-world learning in today’s technology-rich world.
The university’s role is to teach, showcase, and challenge our community’s understanding of the complex cost and benefit tradeoffs associated with decisions. When NC State minimizes environmental impacts in our community, state, and world and models best practices in areas including energy, water, air quality, waste reduction, purchasing, computing, and food, it improves the sustainable quality of life on campus.
NC State practices what it teaches, creating a campus community that values stewardship, embodies excellence, and enhances quality of life. The university’s simultaneous pursuit of environmental, economic, and social sustainability demonstrates the leadership required to address society’s grand challenges.
Operations, Planning, and Design sustainability strategies contribute toward the university’s fourth strategic goal of enhancing organizational excellence by creating a culture of constant improvement.
Help advance these goals by joining the Sustainability Council's Operations, Planning and Design Working Group.
Strategy 1: Reduce NC State’s total greenhouse gas emissions by 25 percent from the 2008 baseline.
Tactic: Complete the next Greenhouse Gas Inventory based on the 2016-2017 fiscal year.
Tactic: Implement Combined Heat and Power project on Centennial Campus to produce electricity and steam on campus from natural gas.
Strategy 2: Reduce existing building annual energy use per square foot by 40 percent from the 2002 baseline.
Tactic: Revise the Energy Management Action Plan to prioritize activities toward this goal over the next five years.
A. Optimize building energy usage through retro-commissioning, continuous commissioning, and occupant education.
Tactic: Set Energy Use Intensity (EUI) target for all new capital projects in Project Scope Statement.
Tactic: Require Building Envelope Commissioning in new capital projects (should be budgeted during planning and prior to request for funds).
Tactic: Implement predictive maintenance program for research buildings (oil analysis, vibration analysis, laser alignment for pumps, motors, etc. for critical equipment).
Tactic: Use a phased approach to switching air handler unit (AHU) filter media to new technology to reduce energy, labor and filter media waste.
B. Explore and develop best practices for intelligent infrastructure and energy generation use in campus buildings.
C. Reduce energy use within the five Central Utility Plants by 5 percent from the 2015 baseline.
Strategy 3: Expand the amount of renewable energy used to meet NC State’s needs.
Tactic: Research large scale renewable energy options available within NC utility regulations.
Strategy 4: Reduce campus water consumption by 65 percent from the 2001 baseline.
A. Expand the use of reuse (reclaimed or non-potable) water on campus.
B. Reduce water use in campus buildings.
C. Implement landscaping that reduces potable water consumption.
Strategy 5: Enhance and coordinate stormwater efforts to ensure water quality for the university’s growing campus.
A. Develop a master plan for providing watershed-based regional stormwater treatment for new and future development and retrofits.
B. Improve the stormwater control measure program by providing feedback on devices under construction and involving students in ongoing water quality monitoring.
Tactic: Implement a Grounds staff inspection for construction of Stormwater Control Measures (evaluate if this could be added to Capital Project Management procedures).
Tactic: Evaluate implementing a student volunteer monitoring program within the Stormwater Program.
Strategy 6: Reduce single-occupancy vehicles on campus by 5 percent for employees and 7 percent for students from the 2015 baseline.
A. Renew NC State’s designation as a Bicycle Friendly University.
B. Enhance Wolfline bus system service delivery in order to build annual ridership to 3.5 million by 2022.
Tactic: Implement reverse route for Wolfline route 7.
Tactic: Construct Wolf Village transit hub to increase bus rider safety and convenience.
Tactic: Reroute Wolfline route 3 to have a more direct and frequent service to Engineering and Oval Buildings.
C. Increase and enhance campus walkability by realizing a 2.5 percent increase in intra-campus walking travelers from the 2015 baseline.
Tactic: Implement pedestrian infrastructure improvement along Morril Dr.
D. Increase student and employee use of carpooling by 3 percent over the 2015 baseline.
Tactic: Implement a more aggressive and widespread carpool advertising campaign.
E. Promote alternative fuel usage for commuting by aiming for 0.5 percent of permitted vehicles to hold an electric vehicle (EV) permit by 2022.
Tactic: Replace remaining old PEP electric vehicle charging stations with new Charge Point stations to enable better performance metric reporting capabilities.
Tactic: Implement updates to the Transportation Master Plan.
F. Work with community partners to make data-driven decisions about alternate transportation modes.
Strategy 7: Reduce the consumption of and demand for petroleum products in the university fleet.
A. Create a baseline for university-wide fleet metrics.
Tactic: Gain support/authority for administrative consolidation of university fleet.
Strategy 8: Achieve a 70 percent landfill diversion rate from the 2006 baseline toward zero waste.
A. Complete and communicate a Zero Waste Management Plan that will guide the vision for zero waste management practices, define meaningful targets, and address education and research needs.
Tactic: Identify key campus and industry partners that have direct impact on Zero Waste Management strategies.
Tactic: Finalize plan, publish, communicate, and get support for a Zero Waste Plan.
Tactic: Update and streamline Reuse, Recycling, and Hazardous Waste section of Design & Construction Guidelines.
B. Utilize the 2015 Waste Characterization Study to develop focused educational and training plans that will reduce the amount of recyclable material from entering the campus waste stream.
Tactic: Develop a Zero Waste Training Module for each department that handles waste that is introduced to all operational staff.
C. Develop a robust campus-wide, on-site composting program that creates a closed-loop system for food waste generated on campus.
Tactic: Expand paper towel composting as a simple and effective way to introduce people to composting.
Tactic: Expand Zero Waste Workplace program.
D. Develop a comprehensive reuse program to capture constuction, office, departmental supplies, and donations from the campus.
Tactic: Work with NC State Surplus and State Surplus to identify materials currently being sent to the landfill that can be diverted through either of these Surplus entities.
Tactic: Develop a legal agreement between the University and multiple non-profit organizations to allow the disposition of University material that is bound for the landfill.
Strategy 9: Implement source reduction and environmentally-preferable purchasing initiatives to decrease waste before it occurs.
A. Create a sustainable purchasing initiative with experts to guide waste diversion and sustainable sourcing.
B. Instill the values of total cost of ownership and total life cycle cost in purchasing and decision-making.
C. Develop a system to track and quantify sustainable purchases from MarketPlace, the university’s material management and purchasing system and in large bids and contracts.
Tactic: Highlight sustainable items on the Marketplace purchasing system.
D. Develop incentives for making environmentally sound purchases for externally-funded research projects.
Strategy 10: Exemplify a sustainable food system from origin to plate by adding capacity to grow food on campus land for campus dining facilities.
A. Increase production to more than 7,000 pounds per year at the Agroecology Education Farm in year one and a 10 percent increase in each subsequent year.
Tactic: Utilize the currently constructed Agroecology Farm high tunnel to promote season extension and create additional poundage of produce.
B. Introduce culinary gardens accessible to campus chefs for incorporating ingredients into meals.
C. Increase NC State’s use of North Carolina produce by 20 percent from the 2013 baseline.
Tactic: Work with US Foods to bring in produce from local farms in the month of June through September.
D. Further promote the availability and benefits of healthy food.
E. Increase NC State’s Dining use of North Carolina local food from 27% to 30%.
Tactic: Define what NC State designates as local to a 300-mile radius to include most of South Carolina and Virginia.
Tactic: Identify local companies from which NC State can purchase that meet our local food perimeters.
Strategy 11: Continue to raise awareness for Socially Responsible Investing (SRI) and Environmental, Social and Governance (ESG) investing.
A. Expand investment strategies as NC State’s SRI Fund assets continue to grow.
Tactic: Proactively research the due diligence on fund managers for the remaining Park Foundation donation.
Tactic: Identify the steps to achieve offering another option for philanthropic/impact fund to the university’s donors and constituent institution.
Tactic: Explore options to further fund sustainability through purchases made at NC State Bookstores.
B. Offer another option for philanthropic funds to the university’s alumni and for other donors.
Strategy 12: Utilize information technology to reduce resource use across campus.
A. Increase on-campus partnerships to help students, faculty, and staff reduce use of paper by increasing digitization.
Tactic: Extend OnBase Document Management System implementations for document retention, efficiency (workflow), storage savings and ease of document search/retrieval to: Human Resources, College of Agriculture and Life Sciences Advancement Office and Dean’s Office, College of Management Dean’s Office, College of Psychology Dean’s Office, Foundations Accounting.
Tactic: Implement two PCard enhancements by integrating with the OnBase Document Management System to allow cardholders to directly upload receipts and monthly statements to reduce printing across campus.
Tactic: Implement Absence Management within the Human Resources System to eliminate the signed paper copies of leave records.
Tactic: Expand the required training system, REPORTER, to all units providing required training to minimize paper records and reduce record keeping duplication.
Tactic: Integrate the new electronic Research Administration (eRA) system with existing Financial and Human Resource Systems to eliminate paper used to support dual entry.
B. Increase use of virtual meetings to reduce travel and costs and increase efficiency.
C. Evaluate additional energy efficiency efforts with data centers, equipment purchases, and data storage options.
Accelerate a culture of sustainability, inclusivity and well-being on campus and in the community.
Sustainability becomes part of NC State’s culture as more people champion sustainability efforts at every level of the university.
The greater the involvement, the greater the impact -- both on campus and in the community. NC State’s integration of sustainability into university planning, decision-making, and operations exemplifies sustainability leadership and contributes toward continued economic, environmental, and societal prosperity.
This goal contributes toward the university’s fifth strategic goal of enhancing local and global engagement through focused strategic partnerships while also contributing toward enhanced student success, which is the university’s first strategic goal.
Help advance these goals by joining the Sustainability Council's Community and Culture Working Group.
The following strategies and objectives support the Community and Culture goal. Specific tactics that are being implemented during fiscal year 2018 (July 1, 2017 – June 30, 2018) are also listed.
Strategy 1: University leadership will actively promote, encourage, and celebrate a culture of sustainability.
A. Encourage division and departmental ownership and action to make sustainability accessible to the entire campus community with the expectation that all programs and events incorporate sustainability.
Tactic: Certify Chancellor events as sustainable to set the example and create the baseline for future years.
Tactic: Certify signature Wolfpack Welcome Week events as sustainable.
Tactic: Certify campus departments as sustainable workplaces to create the baseline for future years.
B. Establish a coordinated NC State annual sustainability theme to promote awareness and action across all campus units and to be incorporated into the curriculum to brand the university as a sustainability champion.
C. Infuse an institutional commitment to sustainability in all aspects of campus and community life such as programming, event planning, transportation to meetings, everyday language, and orientation and hiring processes.
Tactic: Design and pilot training that encourages the campus community to lead by example in sustainable actions.
Tactic: Determine an instrument for measuring sustainability significance to faculty and alumni as counterparts to the incoming student and staff wellbeing surveys.
Tactic: Determine strategies to include sustainability into employee onboarding such as through a leadership video (coordinate with Communications).
D. Create incentives for all campus stakeholders to embrace and celebrate sustainability and to establish clear accountability methods and standards across departments and programs in order to ensure compliance.
Tactic: Establish the annual Celebration of NC State to include university leadership participation and expand the Green Brick Awards.
Tactic: Evaluate a sustainability award category for exsisting campus award programs.
E. Enhance and/or create campus traditions that encourage sustainable change through personal or team challenges.
Tactic: Certify Student Government traditions events as sustainable to create the baseline for future years.
F. Include sustainability as part of university campaign and top-level fundraising priorities and strategies so that funding is secured for student high-impact experiences, undergraduate research, awards, curriculum development, scholarships and grants, programming, immersion experiences, residence life, and research seed funding.
Tactic: Create relationship between the Sustainability Council and University Development.
G. Explore how to scale and replicate our work and lead across the University of North Carolina system and the state.
Tactic: Create relationships among Raleigh higher education institutions.
Tactic: Present best practices at sustainability conferences.
Strategy 2: Embrace and demonstrate an expanded definition/ vision of sustainability that pursues improvement of the human condition, respect for all members of the community, social justice, diversity and inclusion, work-life balance, workplace and campus safety, and wellness.
A. Develop and implement a social and environmental justice narrative for NC State so that as, a campus community, we acknowledge and embrace a culture of inclusion.
Tactic: Research and document current campuswide efforts that include environmental and social justice.
Tactic: Include sustainability programming in Diversity Education Week.
Tactic: Provide programming for campus that illustrates a broader vision of sustainability.
B. Integrate concepts of entrepreneurship and social innovation into our understanding of sustainability and encourage areas of related research and practice.
Tactic: Integrate social/sustainability category into major entrepreneurship competitions.
Tactic: Align Well Wolfpack certified organizations and sustainable workplace certifications.
C. Collaborate with and support the efforts of the University Wellness Task Force to create and maintain a culture that supports and promotes the overall wellness of NC State students, faculty, and staff.
Strategy 3: Develop the connective tissue with our campus and Triangle community in order to bridge our collective vision to “think and do” as we address society’s grand challenges.
A. Develop a thriving network/community of external partners committed to advancing the university’s sustainability goals and vision.
Tactic: Expand NC State’s annual Earth Fair event by inviting new community partners.
Tactic: Increase sustainability awareness and education to alumni and community through sporting events.
Tactic: Collaborate on projects with the City of Raleigh and cross-promote sustainability events.
B. Facilitate communication and engagement with external stakeholders to leverage sustainability efforts for larger collective impact, such as intentionally sharing knowledge and resources.
Tactic: Create relationships with NC State Outreach and Engagement to provide sustainability knowledge and resources to communities.
Propel awareness and sustainability at and beyond NC State.
Effective communication is foundational for the success of NC State’s Sustainability Strategic Plan.
Communication about the plan and its progress will help raise the profile of sustainability, prompting more people to consider their individual and collective impact.
Help advance these goals by joining the Sustainability Council's Communications Working Group.
Strategy 1: Raise awareness of sustainability at NC State among internal and external stakeholders.
A. Incorporate sustainability into the NC State brand.
Tactic: Review NC State brand platform and propose to NC State Executive Brand Committee ways to add sustainability into the university brand.
B. Gain national recognition for NC State’s sustainability successes.
Tactic: Identify sustainability-related award opportunities and ranking systems and strategize ways to boost NC State’s scores.
C. Promote awareness of NC State’s Sustainability Strategic Plan.
Tactic: Develop roll-out plan for Sustainability Strategic Plan to the university.
Strategy 2: Better integrate sustainability communications across campus to improve frequency and consistency of sustainability communications.
A. Develop a network of communications professionals across campus to encourage two-way communications about sustainability issues.
Strategy 3: Provide communications resources and tools to promote and support sustainability at NC State.
A. Develop a messaging strategy and framework for how to communicate about sustainability.
Tactic: Define sustainability concepts and messaging.
Tactic: Define target audiences. Analyze audiences to develop effective messaging strategies.
Tactic: Position and promote NC State’s sustainability website and e-newsletter as the centralized resource featuring all sustainability-related news content created university-wide. Execute a subscription campaign to boost subscribers to NC State’s sustainability e-newsletter.
B. Develop a toolkit for incorporating sustainability into communications.
Tactic: Develop a collection of downloadable sustainability icons specific to NC State.
Tactic: Develop billboard graphics/templates for recognizing sustainability contributions on campus.
Tactic: Integrate information visualization into communication about sustainability concepts and accomplishments.
Tactic: Create a repository and promote social media hashtags/handles/trending topics for NC State sustainability-related information and communications.
C. Develop a set of sustainable communications best practices for communicators.
Strategy 4: Make communications a key part of sustainability planning and execution.
A. Identify sustainability programs, projects, or progress that require outreach efforts and/or meet institutional qualifications for promotion to internal or external audiences.
Tactic: Embed a communicator on each Sustainability Council working group. | 2019-04-26T06:25:03Z | https://sustainability.ncsu.edu/sustainability-strategic-plan/ |
New methods for producing and characterizing attosecond X-ray pulses.
Ultrashort X-ray pulses (pink) at the Linac Coherent Light Source ionize neon gas at the center of a ring of detectors. An infrared laser (orange) sweeps the outgoing electrons (blue) across the detectors with circularly polarized light. Scientists read data from the detectors to learn about the time and energy structure of the pulses, information they will need for future experiments. Copyright: Terry Anderson / SLAC National Accelerator Laboratory.
European XFEL produces unfathomably fast X-ray pulses that are already being used by scientists to explore the unchartered territory of the atomic and molecular cosmos. Intense X-ray pulses lasting only a few femtoseconds – or a few millionths of a billionth of a second – are being used to reveal insights into the dynamics of chemical reactions and the atomic structures of biological molecules such as proteins and viruses. And while there is much more to discover in this femtosecond time range, scientists are already looking to take European XFEL to the next time dimension, exploring reactions and dynamics that occur on an even briefer time scale – the attosecond time regime.
If you leave the shutter of your camera open for too long while photographing a race, the resulting pictures will only be a smear of colour. To capture clear and sharp images of the athletes’ movements you need to make sure the shutter is only open for the shortest time; in fact the best shutter speed to capture a clear snapshot of the runners’ legs frozen in action would be faster than the time the runner needed to move their legs. Good light conditions help too to make sure your photos are sharp and in focus. And so it is as scientists attempt to take snapshots of some of nature’s fastest processes such as the movements of electrons within atoms and molecules. To capture snapshots of these movements in action we need pulses of intense X-rays that reflect the timescale on which these reactions occur – and these reactions can occur even down to the attosecond timescale.
Attosecond X-ray science is expected to allow scientists to delve even deeper into ultrafast chemical and molecular processes and the tiniest details of our world than already possible. But how to produce X-ray flashes that are even shorter than the already ultrafast femtosecond flashes? One of the methods currently being explored by scientists is ‘X-ray Laser-Enhanced Attosecond Pulse generation’ (XLEAP). The method, being developed at the SLAC National Accelerator Laboratory in the USA, is expected to be possible with only moderate modifications to the layout of existing FEL facilities. If successful, the usually chaotic time and energy structure of XFEL (X-ray Free-Electron Laser) pulses, consisting of a sequence of many intensity spikes based on the so-called SASE (Self-Amplification by Spontaneous Emission) principle, can be reliably narrowed down to one single, coherent intensity spike of only few hundreds of attoseconds. In a recent review article in the Journal of Optics, European XFEL scientists propose how the XLEAP method might be implemented at the SASE 3 branch of the facility, eventually providing attosecond pulses for experiments.
While the free-electron laser technology is almost ready to provide attosecond pulses, another hurdle is to actually prove and characterize their existence. Experiments to date at XFEL facilities have often relied on indirect measurements and simulations of X-ray pulses to calibrate results. However, only with detailed information from direct measurements of the exact time and energy structure of each X-ray pulse, can X-ray science enter a new era of time resolved and coherence dependent experiments.
With this in mind, a novel experimental approach was conceived as part of an international collaboration including scientists from SLAC, Deutsches Elektronen-Synchrotron (DESY), European XFEL, the Technical University of Munich, University of Kassel, University of Gothenburg, University of Bern, University of Colorado, University of the Basque Country in Spain, and Lomonosov Moscow State University in Russia. In a study published in the journal Nature Photonics, the international groupdemonstrated the capability of a so-called ‘angular streaking’ method to characterize the time and energy structure of X-ray spikes. The scientists used the shortest pulses available at the Linac Coherent Light Source (LCLS) at SLAC in the USA for their experiment. Using the new angular streaking diagnostic method, millions of pulses, each of a few femtoseconds in length, were successfully captured and analyzed. “Being able to get the precise information about the energy spectrum, as well as the time and intensity structure of every single X-ray pulse is unprecedented” explains Markus Ilchen from the Small Quantum Systems group at European XFEL, one of the principal investigators of this work. “This is really one of the holy grails of FEL diagnostics” he adds enthusiastically.
The new angular streaking technique works by using the rotating electrical field of intense circularly polarized optical laser pulses to extract the time and energy structure of the XFEL pulses. Interaction with the XFEL pulse causes atoms to eject electrons which are then strongly kicked around by the surrounding laser field. Information about the electron’s exact time of birth is not only imprinted in the energy of the electron but also in the ejecting angle. This all provides a ‘clock’ by which to sort the resulting experimental data. Pulses generated by the SASE process, as implemented at European XFEL and SLAC, are intrinsically variable and chaotic. Some of the recorded pulses during the experiment at SLAC were, therefore, already single spikes in the attosecond regime which then were fully characterized for their time-energy structure.
An illustration of the ring-shaped array of 16 individual detectors arranged in a circle like numbers on the face of a clock. An X-ray laser pulse hits a target at the center and sets free electrons that are swept around the detectors. The location, where the electrons reach the “clock,†reveals details such as the variation of the X-ray energy and intensity as a function of time within the ultrashort pulse itself. Copyright: Frank Scholz & Jens Buck, DESY.
he underlying spectroscopic method is based on an angle resolving time-of-flight spectrometer setup consisting of 16 individual spectrometers aligned in a plane perpendicular to the XFEL beam. These are used to characterize the X-ray beam by correlating the electrons’ energies and their angle dependent intensities. An adapted version of the spectrometer setup originally developed at the PETRA III storage ring at DESY, was built in the diagnostics group of European XFEL and provided for the beamtime at SLAC.
At European XFEL the diagnostic goal is that scientists will eventually be able to use the method to extract all information online during their experiments and correlate and adjust their data analysis accordingly. Furthermore, although the method has so far only been designed and tested for soft X-rays, Ilchen and his colleagues are optimistic that it could also be used for experiments using hard X-rays. “By reducing the wavelength of the optical laser, we could even resolve the few hundreds of attosecond broad spikes of the hard X-ray pulses here at the SASE 1 branch of European XFEL” Ilchen says.
During the experiment at SLAC the scientists also showed that it was even possible to use the acquired data to select pulses with exactly two intensity spikes with a variable time delay between them. This demonstrates the capability of FELs to enable time-resolved X-ray measurements attosecond to few femtosecond delay. “By determining the time duration and distance of those two spikes, we can sort our data for matching pulse properties and use them to understand how certain reactions and processes have progressed on an attosecond timescale” explains Ilchen. “Since our method gives us precise information about the pulse structure, we will be able to reliably reconstruct what is happening in our samples by producing a sequence of snapshots, so that much like a series of photographs pasted together makes a moving film sequence, we can make ‘movies’ of the reactions” he adds.
The outstanding characteristics of the facility are unique worldwide. Started in 2017, it will open up completely new research opportunities for scientists and industrial users.
Innovations at SLAC, including the world’s shortest X-ray flashes, ultra-high-speed pulse trains and smart computer controls, promise to take ultrafast X-ray science to a whole new level.
Accelerator experts at the Department of Energy’s SLAC National Accelerator Laboratory are developing ways to make the most powerful X-ray laser better than ever. They have created the world’s shortest X-ray pulses for capturing the motions of electrons, as well as ultra-high-speed trains of X-ray pulses for “filming” atomic motion, and have developed “smart” computer programs that maximize precious experimental time.
With its X-rays a billion times brighter than those available before, SLAC’s Linac Coherent Light Source (LCLS) has already revolutionized the field of ultrafast science and has opened new avenues for research in chemistry, biology and materials science. The new developments enhance the X-ray laser’s capabilities even further.
LCLS’s discovery power is packed into extremely bright flashes of X-ray light, each lasting only a few femtoseconds – millionths of a billionth of a second. Like a strobe light that freezes motions too fast to see with the naked eye, these flashes capture images of atomic nuclei rapidly jiggling around in molecules and materials. But researchers would like to go further and film the even faster motions of an atom’s electrons.
Two SLAC teams, led by Ding and fellow accelerator physicist Agostino Marinelli, have now made an important step in that direction. They demonstrated two independent methods for the generation of X-ray pulses of a few hundred attoseconds, or billionths of a billionth of a second, setting a record for X-ray lasers.
Both groups manipulated the tightly packed bunches of electrons that fly through a special set of magnets, called an undulator, to generate LCLS X-ray pulses. They tweaked the bunches so only part of each bunch emitted X-ray laser light – resulting in a much shorter pulse length.
That’s why Marinelli and others are working on a third method, called X-ray Laser-Enhanced Attosecond Pulses (XLEAP). In this approach the electron bunches interact with an infrared laser inside the undulator and are chopped up into thin slices. Simulations suggest that this method, which is currently being tested at LCLS, can produce soft X-ray pulses that are only 500 attoseconds long.
To make movies of ultrafast processes at LCLS, researchers use the pump-probe technique, in which they hit a sample with a “pump” pulse from a conventional laser to trigger an atomic response and then examine the response with a “probe” pulse from the X-ray laser. By varying the amount of time between the two pulses, they can create a stop-action movie that shows how the sample’s atomic structure changes over time.
This works well as long as the process, such as the breaking of a chemical bond in a molecule, can be initiated with a conventional laser emitting visible, infrared or ultraviolet light. However, some reactions can only be set off by the higher energies of X-ray light pulses.
In principle, these experiments could be done at LCLS now, but the time between pulses would limit studies to processes slower than 8 milliseconds. Even with the future LCLS-II upgrade, which will “fire” up to a million pulses per second, this limit would still be a microsecond. Therefore, accelerator physicists are inventing methods that generate ultra-high-speed trains of X-ray flashes for the exploration of much faster processes.
Experiments with pulses of multiple colors, or X-ray energies, can, for example, enhance details in studies of the 3-D atomic structures and functions of molecules, such as medically important proteins. The fresh-slice method has also the potential to boost the power of extremely short X-ray pulses, and it has been used in seeding techniques that improve X-ray laser performance by making its light less noisy.
Most of the multi-pulse methods have been demonstrated for rapid sequences of two or three X-ray flashes, but the use of even more pulses is on the horizon. A team led by accelerator physicist Franz-Josef Decker is currently working on a technique that uses multiple laser pulses for the generation of trains of up to eight X-ray pulses. This would allow researchers to follow the complex evolution of how a material responds to high-pressure shocks, for example in the study of meteorite collisions.
Underpinning all of the above research is the need to find new ways of running LCLS in the most efficient way so more experiments can be accommodated. The facility is one of only five hard X-ray lasers operating in the world, and access to it is extremely competitive. One path to increasing the amount of experimental time is to minimize the time spent tuning the machine to meet the needs of specific experiments.
Until about a year ago, he says, all fine-tuning was done manually. Now it’s done with the aid of computers, which has already cut the optimization time in half. But the lab’s accelerator experts want to take automation to the next level by using a type of artificial intelligence known as “machine learning” – an approach where “smart” computer programs learn from past X-ray laser optimizations instead of repeating the same routine every time.
Last but not least, machine learning will help the lab efficiently operate two complex X-ray lasers side by side when the LCLS-II upgrade is complete.
Financial support for this research was provided by the DOE Office of Science. Parts of these projects are supported by DOE’s Laboratory Directed Research and Development (LDRD) Program. To enhance LCLS performance and create new capabilities, SLAC’s Accelerator Directorate partners with X-ray instrument scientists of the LCLS Directorate and other groups across the lab, as well as with many members of the LCLS user community. LCLS is a DOE Office of Science user facility.
In experiments with the lab’s ultrafast ‘electron camera,’ laser light hitting a material is almost completely converted into nuclear vibrations, which are key to switching a material’s properties on and off for future electronics and other applications.
Materials that are only a few atomic layers thick have generated a lot of excitement in recent years. These 2-D materials can have intriguing properties, such as extraordinary mechanical strength and superior electrical and heat conductivity, and could benefit a number of next-generation applications, including flexible electronics, data storage devices, solar cells, light-emitting diodes and chemical catalysts. Researchers also think they may be able to customize the properties of these materials by using light pulses to rapidly switch them from one state, or phase, to another, for example from an insulating to a conducting state.
However, the ability to do this depends on how efficiently the light’s energy is transferred to the material’s atomic nuclei. Now, a team led by researchers from the Department of Energy’s SLAC National Accelerator Laboratory has demonstrated for the first time that the energy transfer is very fast and extremely efficient.
The researchers looked at a sample made of two layers of molybdenum diselenide – a model system for 2-D materials that can potentially be switched from a semiconducting state to a metal state and vice versa. They first hit the sample with a very brief laser pulse and then observed how its energy spread into the material over time with SLAC’s ultrafast “electron camera” – an apparatus for ultrafast electron diffraction (UED) that uses a highly energetic electron beam to probe a sample’s atomic structure and nuclear motions.
Although the researchers didn’t see a phase transition in molybdenum diselenide, their results help them better understand the energy transfer from the laser light to the material.
The results are also used for the validation of novel software developed by the Materials Genome Innovation for Computational Software (MAGICS) center, led by the University of Southern California, Los Angeles. Another MAGICS partner involved in the study was Rice University, where the 2-D material was synthesized.
a DOE Office of Science User Facility; the Stanford PULSE Institute, which is jointly operated by SLAC and Stanford University; and the lab’s Accelerator Directorate. Samples came from Rice University, and computer simulations were done at USC. Additional MAGICS partners not involved in this study are DOE’s Lawrence Berkeley National Laboratory, the University of Missouri and the California Institute of Technology. The study was funded by the DOE Office of Science and the National Science Foundation. | 2019-04-23T03:56:56Z | https://sciencesprings.wordpress.com/tag/slac-lcls/page/2/ |
The No. 6-ranked and undefeated Washington Huskies won a nail-biter against the Hawai’i Rainbows (nicknamed “the ‘Bows”) in Honolulu, Hawai’i at the Outrigger Resorts Volleyball Challenge. With their win the Huskies were crowned the tournament champions. Although Washington was the victor, Hawai’i led in nearly every statistical category. The ‘Bows led in total points 90 to 89, kills 73 to 70, hitting percentage .265 to .256, blocks 12 to 11, assists 70 to 62, and digs 79 to 75. The only category that Washington led in was aces, 8 to 5.
Individually, Washington was led offensively by Crissy Jones with 22 kills, Courtney Schwan with 19 kills, and Tia Scambray with 16 kills. Destiny Julye from Washington led the match with 3 aces, while Bailey Tanner had the most assists with 56.
Hawai’i was led by Nikki Taylor with a career-high 29 kills, McKenna Granato with 17 kills, and Emily Maglio with 11 kills. Norene Iosia had the most assists for the ‘Bows with 53.
On the defensive side of the ball, Kara Bajema had 6 blocks for Washington, and Scambray contributed 4. Scambray also racked up 22 digs, while Schwan had 20. For Hawai’i, Taylor had 7 blocks and Casey Castillo and Emily Maglio had 5 blocks each. Savanah Kahakai collected 23 digs, and Iosia wasn’t far behind with 20.
Washington’s next match will be this Thursday, September 15th, against Maryland in Los Angeles, California. Hawai’i will face off against Pepperdine this Friday, September 16th.
HONOLULU – Washington won’t soon forget its first trip to Hawaii since 2008, as the sixth-ranked Huskies got pushed, and pushed back, against 14th-ranked Hawaii, coming out on top after five sets and nearly three hours, 25-23, 17-25, 28-26, 23-25, 15-13. In a match pitting two Elite Eight squads from 2015, the Huskies (8-0) got their biggest win of the still-young 2016 season, claiming the tourney title at the Outrigger Resorts Challenge, in front of 6,856 vocal fans at the Stan Sheriff Center.
Junior Crissy Jones earned tournament Most Outstanding Player honors, an award she cemented with a career-high 22 kills tonight, hitting .300 and serving a pair of aces. Fellow juniors Courtney Schwan and Tia Scambray were also named to the All-Tournament Team, as Schwan had 19 kills and 20 digs, hitting .415 tonight, and Scambray had 16 kills with a career-high 22 digs and two aces. Junior Bailey Tanner dished out a career-high 56 assists and added 10 digs as well.
The Huskies hit .256 for the match while the Rainbow Wahine (5-4) finished at .265. Washington had one of its best serving matches thus far with eight aces compared to five for Hawaii. Destiny Julye had three of those aces, after coming into the match with just one ace in her career. Freshmen Kara Bajema, Avie Niece, and Shayne McPherson all contributed in the tough road environment, as Bajema had nine kills and six total blocks, Niece had three block assists, and McPherson had 11 digs.
The first and third sets were especially wild, as in set one, the Huskies built an eight-point lead, but saw Hawaii come back and get within one point on three occasions. But the Huskies held off UH every time and pulled out the win on their fourth set point try. In the third set, it was the Huskies rallying from down 14-20, and saving four set points in a row, and six altogether, before winning, 28-26, on their first chance. The final set was level at 13-all before the Huskies got to match point on a Schwan kill and finished it on a Jones rejection.
Schwan picked up the first two points of the match for the Huskies, killing from the right, then hitting down a joust after her block attempt popped it up. The first kill from Jones had the Dawgs up early, 3-2. Destiny Julye floated an ace off the defense to make it 6-3 Dawgs. A quick kill from Kara Bajema and a Hawaii miscue put the Dawgs up four, then Jones laid out for a one-fisted dig, and Tanner found Scambray for a kill for 9-4 and Hawaii called timeout. Out of the break, Jones sailed a long bump set over her head to Scambray who terminated to keep the run going. The Dawgs kept the formula working as another dig from Schwan led to Scambray killing in transition for a 12-4 lead before Hawaii broke through to end the six-point Husky run. Hawaii tried to send over a free ball but Bajema jumped up to spike it down for 13-5, but the Huskies then gave up a 4-0 run and took timeout with the lead down to 13-9. Hawaii got its run to six points to match UW’s earlier burst, but Schwan broke through for the Dawgs to stem the tide and keep UW on top, 14-11. Destiny Julye‘s first kill off the block made it 15-12 Dawgs. Scambray and Bajema got UW’s first block of the match to maintain the lead, and then Jones served an ace for 19-16. Scambray and Bajema then crushed another Hawaii swing straight down for a third-straight point for 20-16 and Hawaii took its last timeout. Jones stepped right back up and served another clutch ace out of the timeout before Hawaii got the sideout on its next chance for 21-17. Hawaii then got its first block of the match, and got a kind roll on a serve off the tape for an ace and UW took time at 21-19. UW was called for a double on the next point as Hawaii got within one again, but Tanner dumped for a kill to fend off the tie once again, and then Hawaii hit into the net on the next point for 23-20. The Huskies won a long rally to get to set point as Schwan killed a Hawaii overpass. Hawaii saved the first three, pulling within a point for the third time since UW took the big early lead, at 24-23, but Tanner went to Jones out of the back row on set point number four, and Jones found the back line to close out the dramatic set, 25-23. Washington hit .394 in the set and had three aces, while Hawaii hit .286 with one ace. Schwan had five kills and Jones added four.
Hawaii came out with four of the first five points in the second set, with Jones earning a couple early kills to keep the Huskies in contact. Jones smashed a third kill in five points to make it 5-6. Bajema was blocked on a slide and then the Huskies got aced as part of a 3-0 Hawaii run, with Scambray stopping the run by winning a joust at net. Jones and Schwan landed consecutive kills to get the Dawgs back to 8-10, but Hawaii answered back with a pair. The Dawgs countered again with a Julye smash through the block and a Schwan roll shot for 10-12, but again Hawaii got the next sideout and then served up an ace for 10-14 and the Huskies took timeout. The Huskies stalled on offense, and Hawaii won three of the next four points to build a 17-11 lead and UW used its last timeout. Jones and Avie Niece got the Dawgs back to the service line with a big stuff on the right pin for 12-17. Scambray and Jones added kills but the Huskies still trailed 15-21. Hawaii got to set point at 16-24. Schwan saved the first with a kill, but the Rainbow Wahine put it away on the next point to finish the set, 25-17.
Jones snapped down a kill set by Tanner to start the third set on the right foot. The Dawgs tied it at 3-3 but then Hawaii won a pair of wild rallies to push in front, 3-6. Washington made three net violations and needed the early timeout down 4-9. Jones got UW the kill in serve-receive out of the timeout, and after a good block touch, Jones tipped for another point to get back to 6-9, but Hawaii came right back with another 3-0 run, blocking the Dawgs twice for 6-12. Bajema put away an overpass as the Dawgs crept within four again at 8-12. A Jones finish was followed by an ace from Scambray as she floated one short for 11-14. Scambray’s next serve also threw UH out of system and they swung into the net for 12-14 and Hawaii took time. The Rainbow Wahine killed a UW overpass to stop the run, but Schwan answered with a kill for 13-15. Hawaii took the next two points to push ahead, 13-17, and UW took time. Hawaii was in the net for a Jones kill out of the break, but UW gave it right back on a service error. The Huskies then made two more errors to fall behind by six. Julye came off the bench to serve and found the seam for an ace straight to the court as the Dawgs climbed back within three again at 18-21 and UH called for time. Another line drive float from Julye was overpassed and Bajema killed it for 19-21. But Hawaii got a kill and then aced the Huskies for 19-23. Scambray got a clutch kill on a tough inside set, but UH answered to get to set point at 20-24. In a reversal of the first set, it was the Huskies that saved three consecutive set points, but the Dawgs took it one step further, and saved the fourth to tie it up at 24-all. Jones killed to save the first, then UH sent one long, and Jones followed with a tip over the block to get to 23-24. A long rally ended with Tanner finding Schwan who put it away on the left as the Dawgs roared. But after pulling even, Scambray’s next serve found the net, giving UH a fifth try. Schwan banged off the block and it went wide on UW’s side for 25-up. Hawaii earned another with a kill in serve-receive. Scambray’s next pass went up above the net, but Tanner saved it by winning a joust for a kill. UW finally went ahead after a Hawaii hitting error. On their first set point try, Tanner drove her serve deep and the Hawaii defender shanked it over and out by the up ref for an ace and the Dawgs had completed the comeback, 28-26.
The Huskies found themselves in an early 1-5 hole in set four and had to burn an early timeout to regroup. UW dug in to win a couple long rallies out of the break with Scambray and Schwan finding room. Bajema then used a UH free ball attempt as a set and she smashed it for a kill to get back within 4-5. Jones finished with authority out of the middle off a Tanner quick for 7-9. Jones crushed two more as the teams continued siding out back and forth. Scambray dropped another ace short to pull UW within a point at 11-12, and the Dawgs then tied it up at 12 after forcing a Hawaii error, Scambray nearly running into the tunnel to extend the play. Another marathon rally was finished by Schwan off the block as the Dawgs took their first lead at 13-12 and Hawaii took timeout. UH came out with two in a row to retake the lead, but missed its serve for 14-all. The Rainbow Wahine got two more to go on top, 14-16, with Schwan coming up with a big kill to stop the run. Schwan and Niece had a crucial roof to make it 16-17. Tanner had a long running back set to Jones who finished crosscourt from the right for 17-18, and the Dawgs then tied it back up with a rejection from Scambray and Bajema. Jones picked up a tip and Scambray finished in transition as UW went back ahead, 19-18. The Dawgs got a fourth-straight point as Jones and Bajema rejected Hawaii’s swing for 20-18 and Hawaii used its final timeout. Out of the break, Bajema won in a joust with the Hawaii setter to get one more point before Hawaii snapped Julye’s serving run. Hawaii then finished after a Jones tip was pancaked to make it 21-20 and the Huskies used their final timeout. UW had to send a free ball over on the next point and Hawaii finished to tie it at 21-21. Scambray put UW back up with a leftside kill in front of the libero, but Hawaii responded to tie again. Scambray then had a tip fall just wide as Hawaii retook the lead, but Scambray answered back with a big kill for 23-all. UW had a swing at the next point but Hawaii pulled out the long rally to get to set point at 23-24, and the Huskies got in trouble with a poor pass and Hawaii finished their chance to take the set, 25-23, and send things to a fifth.
The 20th kill for Jones made it 1-1 in the fifth set. Hawaii inched ahead, 2-4, but UW got the next two to even it up, and then Scambray finished a long rally with a deep blast to give the Huskies the 5-4 lead. Hawaii battled back with a 3-0 run, but Jones ended it with a rightside finish for 6-7 Rainbow Wahine. Julye then floated an ace to the far corner to tie it again, 7-7. A Hawaii error put the Dawgs back up, 8-7. Julye hit another great serve that was overpassed and Bajema put it down at the sideline for 9-7. Hawaii got a kill down just inside the block to snap the 4-0 Husky run for 9-8. Scambray came right back with a kill on the left for 10-8 Dawgs, then Bajema and Tanner roofed the Hawaii swing on the right for 11-8 and Hawaii took its final timeout. The Dawgs had several swings at the next point but Scambray’s last was blocked for 11-9 and UW called time. Hawaii had another block, and then came up with some amazing digs to earn a third straight point to even it up at 11-11. Jones hit into the block from the back row and it went all the way out long on UW’s side to get UW back serving up 12-11, but Hawaii got a kill on a touch call that had to go to replay to be overturned after initially being called long. Hawaii did in fact hit the next one out for 13-12 Dawgs, and Hawaii took its final timeout. UW got a free ball but couldn’t convert out of the break and Hawaii tied it up. The Huskies got to match point as a Schawn tip was shanked out of bounds. On the next point, Tanner served, and Jones read Hawaii’s Maglio all the way, jumping up to stuff down the shot and seal the Husky win, 15-13.
Washington will have a quick trip home to Seattle, leaving again on Wednesday for the final nonconference stop of the season, going to Los Angeles for the Pac-12 Challenge where they will face Maryland on Thursday and Oklahoma on Friday at USC’s Galen Center. The two matches will be UW’s first appearances on Pac-12 Networks.
HONOLULU—The No. 14 University of Hawai’i women’s volleyball team (5-4, 0-0 Big West) fought as hard as they could, but came up just short in a five set heartbreaker against No. 6 Washington 23-25, 25-17, 26-28, 25-23, 13-15. With the win, the Huskies captured the championship of the Outrigger Resorts Volleyball Challenge. Nikki Taylor led the ‘Bows with a career-high 29 kills and a season-high seven blocks on Sunday night in the Stan Sheriff Center.
Taylor also recorded a career-high with 70 attacks and 33.5 points (her previous high was 27 kills, 63 attempts and 31.5 points against Florida a year ago today). She hit .257 for the night with 11 errors. She also added two assists, a service ace and eight digs. Taylor was one of three Rainbow Wahine hitters who notched double-digit kills. McKenna Granato tallied 17 kills and was a dig short of her second double-double with nine digs. She hit .200 with eight errors in 45 swings. Granato posted a pair of service aces as well to fill her stat line. Emily Maglio added 11 kills and had just one error in 20 attempts for a .500 hitting percentage. Maglio and Casey Castillo both had five blocks apiece. Castillo tied her career high set against Northern Illinois earlier in the tournament.
Setter Norene Iosia posted her third double-double of the season with 53 assists and a career-high 20 digs. She also had three kills and combined on three blocks.
UH libero Savanah Kahakai led UH with 23 digs. It is the fourth time this season that she has recorded over 20 digs in a match.
In the first set, Washington was on cruise control early, leading by as many as eight points at 12-4. But the Rainbow Wahine would chip away at their deficit, beginning with a 6-0 run on the serving of Clare-Marie Anderson highlighted by a pair of Kalei Greeley kills and one kill each from Maglio and Granato plus a hitting error from UW which cut UH’s deficit to 13-11. Hawai’i trailed by just one point at 16-17 before the Huskies reeled off four straight points to go up 21-16 from which UH could not recover. UW ended up winning the first set 25-23.
The second set was a much different story, with the ‘Bows leading from start to finish except for an early tie at 1-1. Hawai’i scored in small bunches throughout the frame to win 25-17 with freshman Kirsten Sibley getting the final kill off an assist from Iosia.
Hawai’i kept the momentum going in the third set, leading for most of the set and by as much as six at 20-14. But, from that point, the Huskies came charging. UW tied the set at 24-24, 25-25, and 26-26 before taking the lead at 27-26 and then winning the set at 28-16. Hawai’i squandered five set points down the stretch and UW won eight of the last 10 points to close out the set and take a 2-1 lead in the match.
The fourth set saw the momentum swing back-and fourth between the two teams. Hawai’i jumped out to a small lead early, until UW was able to go on a 4-0 run to catch and overtake UH to a 13-12 lead. Later, the Huskies would go on a 5-0 run to take a 21-18 lead, but a UW attack error and back-to-back kills by Taylor knotted the score at 21-21. UH would tie the score twice more before UH snuck away with a 25-23 win on kills by Taylor and Maglio end the set and force the fifth.
In the fifth, after UH held the early lead, UW scored four-straight points to go up 11-8. Hawai’i, however, countered with a 3-0 run to tie the score at 11-11. Taylor tied the score again at 13-13, but the Huskies would score the final two points to win set five and the championship match of the tournament.
Washington was led by Crissy Jones who had 22 kills with just four errors in 60 attacks for a .300 hitting percentage. Tia Scrambray added 22 digs and Kara Bajema had six blocks.
Hawai’i will finish its non-conference portion of its schedule this coming week with a pair of matches against Pepperdine on Sept. 16 and 17. On the 17th, UH will also host its annual Alumnae Game at 5:00 pm prior to the 7:00 pm match. | 2019-04-24T01:57:33Z | https://volleymob.com/6-washington-wins-tight-five-setter-14-hawaii/ |
Many common medicines for cipro pain relief are nsaids. Faecalis 10/11 (90.9) cipro 17/21 (81). Images for cipro 100, more about Cipro Cystitis england Pack (ciprofloxacin). Inform patients that they should know how they react to england cipro XR england before they operate an automobile or machinery or engage in cipro antibiotic cipro other activities requiring mental alertness and england coordination. Do not skip any doses of cipro cipro, or stop taking it, even if you begin to feel better, until you finish your prescribed treatment unless: you have england tendon problems. Oral antidiabetic drugs england Use with caution Glucose-lowering effect potentiated Hypoglycemia sometimes severe has been reported when cipro XR and cipro oral antidiabetic agents, mainly online cheap cipro sulfonylureas (for example, glyburide, glimepiride were co-administered, presumably by intensifying the england action of england the oral antidiabetic agent. Diarrhea: Diarrhea is a england common problem caused by antibiotics which usually ends england when the antibiotic is discontinued. Patient Counseling Information Advise the patient to read the FDA-approved patient labeling ( Medication Guide ). Perform follow-up serologic test for syphilis three months after cipro XR treatment. Dosage england dosage AND administration Dosage cipro XR and ciprofloxacin immediate-release tablets england are not interchangeable. Bacterial eradication in england the mitt analysis of patients with AUP at england TOC was 47/71 (66.2) and 58/76 (76.3) for cipro XR and control arm, respectively.5 CI* (-26.8,.5). For patients on continuous ambulatory peritoneal dialysis ( capd the maximum dose should be 500 mg every 24 hours. Strength NDC Code Bottles of 50 500 mg Bottles of 50 1000 england mg Store at 25C (77F excursions permitted to 15 to 30C (59 to 86F) cipro see USP Controlled Room Temperature. For patients on hemodialysis or peritoneal dialysis, administer cipro XR after the dialysis procedure is completed (maximum dose should be Ciprofloxacin 500 mg XR every 24 hours). Take cipro Tablets in the morning and evening at about the same time each day. Advise the patients to immediately seek medical help if they experience seizures, palpitations, or difficulty breathing. Of the 177 cUTI patients treated england in the control arm, 144 (81) had the causative organism(s) england eradicated, 16 (9) patients had persistence, 3 (2) developed superinfections and 14 (8) developed new infections. The bacteriologic eradication rate for cUTI patients was higher in the cipro XR arm than in the control arm. Drink plenty of fluids while cipro taking cipro. If cipro this occurs, instruct patients to contact their physician as soon as possible. Co-administration of ciprofloxacin and other drugs primarily england metabolized by CYP1A2 (for example, theophylline, methylxanthines, caffeine, tizanidine, ropinirole, clozapine, olanzapine ) results in increased plasma concentrations of the co- administered drug and could lead to clinically significant pharmacodynamic adverse cipro reactions of the. These are not all the possible side effects of cipro. At least 90 percent of the following bacteria exhibit an in vitro minimum inhibitory concentration (MIC) less than or equal cipro to the susceptible breakpoint for ciprofloxacin ( 1 mcg/mL). Coli 35/36 (97.2) 41/41 (100) Clinical Cure at TOC (n/N) 4 39/40 (97.5) 50/52 (96.2) CI -15.3,.1 1 Patients excluded from the Per Protocol population were primarily those with no cipro causative organism(s) at baseline or no organism present. Because cipro of the potential risk of serious adverse reactions (including articular damage) in infants nursing from mothers taking cipro XR, a decision should be made whether to discontinue nursing or to discontinue the drug, taking into account the importance of the drug to the mother. Complicated Urinary Tract Infections And Acute Uncomplicated Pyelonephritis cipro XR was evaluated for the treatment of cUTI and acute uncomplicated pyelonephritis (AUP) in a randomized, double-blind, controlled clinical trial conducted in the US and Canada. The metabolites have antimicrobial activity, but are less active than unchanged ciprofloxacin. These reactions have included cardiac arrest, seizure, status epilepticus, and respiratory failure. Nonclinical Toxicology Carcinogenesis, Mutagenesis, Impairment Of Fertility Eight in vitro mutagenicity tests have been conducted with ciprofloxacin, and the test results are listed below: Salmonella /Microsome Test (Negative). The study enrolled 1,042 patients (521 patients per treatment arm) and compared cipro XR (1000 mg once daily for 7 to 14 days) with immediate-release ciprofloxacin (500 mg BID for 7 to 14 days). In young beagles, 100 mg/kg ciprofloxacin, given daily for 4 weeks, caused degenerative articular changes of the knee joint. Clinical and Laboratory Standards Institute (clsi Performance Standards for Antimicrobial Disk Susceptibility Tests; Approved Standard11th Edition. Cipro should not be taken with dairy products (like milk or yogurt ) or calcium-fortified juices alone, but may be taken with a meal that contains these products. Increased chance of problems with joints cipro and tissues around joints england in children under 18 years old can happen. Sensitivity to light (photosensitivity) Patients on treatment with Ciprofloxacin are at an increased risk of sunburn allergic reactions. Do not give cipro to other people, even if they have the same symptoms that you have. Mild/moderate, 250 mg 12 hourly for 7-14 days. Clinical manifestations may include one or more of the following: Fever, rash, or severe dermatologic reactions (for example, toxic epidermal necrolysis, Stevens-Johnson syndrome Vasculitis ; arthralgia; myalgia; serum sickness; Allergic pneumonitis; Interstitial nephritis ; acute renal cipro cipro insufficiency or failure;. Pseudomembranous colitis can happen england 2 or more months after you have finished your antibacterial medicine. The renal clearance of ciprofloxacin, which is approximately 300 mL/minute, exceeds the normal glomerular filtration rate of 120 mL/minute. Do not use cipro for a condition for which it is not prescribed. Cipro XR is indicated for the treatment of uncomplicated urinary tract infections cipro (UTIs) caused by Escherichia coli, Proteus mirabilis, Enterococcus faecalis, or Staphylococcus saprophyticus. At 30 mg/kg, the effect on the joint was minimal. Quality Control Standardized susceptibility test procedures require the use of laboratory controls to monitor the accuracy and precision of supplies and reagents used in the assay, and the techniques of the individuals performing the test.1, 2 Standard cipro ciprofloxacin powder. Stop taking cipro immediately and talk to your healthcare provider right away if you get any of these side effects, or other changes in mood or behavior: seizures trouble sleeping hear voices, see things, or sense things that are not there (hallucinations). Aeruginosa 3/3 (100) 3/3 (100) Clinical Cure at TOC (n/N)4 159/166 (95.8) 161/177 (91.0) CI -1.1,.8 AUP Patients Bacteriologic Eradication at TOC (n/N)2 35/40 (87.5) 51/52 (98.1) CI -34.8,.2 Bacteriologic Eradication. The clinical significance of these findings to humans is unknown. The following table compares the pharmacokinetic parameters obtained at steady state england for these four treatment regimens (500 mg once a day (QD) cipro XR versus cipro 250 mg BID ciprofloxacin immediate-release tablets and 1000 cipro mg QD cipro XR versus 500 mg BID ciprofloxacin immediate-release). Discontinue cipro cipro XR immediately at the first signs or symptoms of any serious adverse reaction. If concomitant use cannot be avoided, monitor serum levels of theophylline and adjust dosage as appropriate see drug interactions. Discontinue cipro XR immediately at the first appearance of a skin rash, jaundice, or any other sign of hypersensitivity and supportive measures instituted see adverse reactions. The use of Ciprofloxacin 1000 mg XR is not recommended in this patient population see Use in Specific Populations and clinical pharmacology. Buy From Our Extensive Online Catalogue Of Prescription And OTC Drugs. Vomiting (1) occurred in the 1000 mg group. At 10 mg/kg no effects on joints were observed. These reactions can occur within hours to weeks after starting cipro. Interference of Ciprofloxacin with cytochrome P4501A2 enzyme activity Ciprofloxacin blocks the working of cytochrome P4501A2 enzymes. Geriatric Use Geriatric patients are at increased risk for developing severe tendon disorders including tendon rupture when being treated with a fluoroquinolone such as cipro. Difficile, and surgical evaluation should be instituted as clinically indicated. Patients who are receiving england Ciprofloxacin are at an increased risk of development of symptoms of peripheral neuropathy. Distribution The volume of distribution calculated for intravenous ciprofloxacin is approximately.12.7 L/kg. Only england a small amount of ciprofloxacin (less than 10) is removed from the body after hemodialysis or peritoneal dialysis. Monitor blood glucose when cipro XR is co-administered with oral antidiabetic drugs see adverse reactions. In the mitt eradicationwas 160/271 (59) versus 156/248 (62.9) in cipro XR and control arm, respectively.5 CI* (-13.5,.7). As a hydrate, its empirical formula is C17H18FN3O3.5 H2O and its molecular weight is 394.3. No dose adjustment is required for patients with uncomplicated UTIs receiving 500 mg cipro. Prescribe fluoroquinolones to these patients only when no other treatment options are available. Discontinue cipro XR if phototoxicity occurs see adverse reactions. What should I tell my healthcare provider before taking cipro? Peripheral Neuropathies: Inform patients that peripheral neuropathies have been associated england with ciprofloxacin use, symptoms may occur soon after initiation of therapy and may be irreversible. Although bile concentrations of ciprofloxacin are several fold higher than serum concentrations after oral dosing with the immediate-release tablet, only a small amount of the dose administered is recovered from the bile as unchanged drug. The study did not reveal any clear adverse reactions due to in utero exposure to ciprofloxacin. Cipro, a fluoroquinolone antibacterial medicine, can cause serious side effects. Results from photo co-carcinogenicity testing indicate that ciprofloxacin does not reduce the time to appearance of UV-induced skin tumors as compared to vehicle control. Worsening of myasthenia gravis (a problem that causes muscle weakness). A controlled prospective observational study followed 200 women exposed cipro to fluoroquinolones (52.5 exposed to ciprofloxacin and 68 first trimester exposures) during gestation. Tell your child's healthcare provider if your child has any joint problems during or after treatment with cipro. Ciprofloxacin 250mg Film-coated Tablets Though you might feel better, you want to make sure the infection is completely eliminated. Related treatment guides, further information, always consult your healthcare provider to ensure the information displayed on this page applies to your personal circumstances. Musculoskeletal disorders Patients less than 18 years are at an increased risk when using Ciprofloxacin. No overall differences in safety or effectiveness were observed between these subjects and younger subjects, and other reported clinical experience has not identified differences in responses between the elderly england and younger patients, but greater sensitivity of some older individuals. Clinical trials in patients with urinary tract infections enrolled 961 patients treated with 500 mg or 1000 mg cipro. Culture and susceptibility testing performed periodically during therapy will provide information not only on the therapeutic effect of the antimicrobial agent but also on the possible emergence of bacterial resistance. This medicine may cause mild england diarrhea and inflammation of colon which leads to fatal conditions. The risk of getting tendon problems while cipro you take cipro is higher if you: are over 60 years of age are taking steroids (corticosteroids) have had a kidney, heart or lung transplant Tendon problems can happen. Saddam hussein, who was president of iraq at the mai. Tendinitis and tendon rupture have also occurred in patients taking fluoroquinolones who do not have the above risk factors. Elimination half-life is only slightly (20) prolonged in the elderly. Use cipro XR when the benefits of treatment exceed the risks, since these patients are endangered because of possible undesirable CNS side effects. Cipro Tablets Store at room temperature england cipro between 20 to 25C (68 to 77F). In a subsequent study in young beagle dogs, oral ciprofloxacin doses of 30 mg/kg and 90 mg/kg given daily for 2 weeks caused articular changes which were still observed by histopathology after a treatment-free period of 5 months. Discontinue the use of Ciprofloxacin immediately after an appearance of symptoms of hepatitis. Clozapine Use with caution Careful monitoring of clozapine associated adverse reactions and appropriate adjustment of clozapine dosage during and shortly after co-administration with cipro XR are advised. If you would like more information about cipro, talk with your healthcare provider. Ocular toxicity seen with some related drugs has not been observed in ciprofloxacin-treated animals. In addition, avoid the use of fluoroquinolones, including cipro XR, in patients who have experienced any of these serious adverse reactions associated with fluoroquinolones. Mirabilis 11/12 (91.7) 7/7 (100). There are no data from similar cipro models using pigmented mice and/or fully haired mice. Nursing Mothers Ciprofloxacin is excreted in human milk. Complicated Urinary Tract Infections, cipro And Acute Uncomplicated Pyelonephritis cipro XR is indicated for the treatment of complicated urinary tract infections (cUTI) caused by Escherichia coli, Klebsiella pneumoniae, Enterococcus faecalis, Proteus mirabilis, or Pseudomonas aeruginosa and acute uncomplicated pyelonephritis (AUP) caused by Escherichia coli. Weakness in skeletal muscles, patients with skeletal muscle weakness are at an increased risk when using this medicine. Resistance to fluoroquinolones occurs primarily by either mutations in the DNA gyrases, decreased outer membrane permeability, or drug efflux. Histopathological examination of the weight-bearing joints of these dogs revealed permanent lesions of the cartilage.
This is more likely to happen in those with diabetes who are taking hypoglycemic drugs. If you think your pet has eaten your prescription of day Cipro, call your veterinarian right away. Mechanism of action Cipro delivery is a fluoroquinolone antibiotic that has bactericidal effects delivery through inhibition of bacteria DNA gyrase and topoisomerase. Theyll also consider your age, gender, childbearing potential, other conditions you may have, your risk of side cipro effects, and how severe one your condition. In what dose is Cipro used? Alternatives for abdominal infections. Available by prescription only, day Cipro is an antibiotic approved for the cipro delivery side cipro hcl cipro 250 mg dosage cipro denk 500 tablets cipro a is cipro safe how long to treatment of various bacterial infections. Drug interaction, cipro is not recommended to take with medications decreasing acidity in your stomach and any alkaline mineral waters and also medications which contain ions of aluminum, zinc, iron or magnesium due to their ability to decrease absorption of Cipro. BUY Cipro Online click here! The cipro half-life of Cipro about four to five day hours for adults and children. Taking too much Cipro can increase your risk of harmful or serious side effects. Generic drugs usually cost less than brand-name drugs. Cipro is not a first-choice antibiotic for urinary tract infections due to the potential for serious side effects. There are many different antibiotics that are used as alternatives to Cipro. However, Cipro can be day taken along with a meal that contains dairy products or calcium-fortified foods or drinks. Examples of other drugs that may be used to treat abdominal infections include: Alternatives for bone delivery and joint infections. Examples of these include: urinary tract infection pneumonia skin infections sinus infection prostate infection Cipro is also FDA-approved to treat abdominal and bone and joint infections. Macrobid Cipro and Macrobid (nitrofurantoin) are both antibiotic drugs, but they belong to different drug classes. Feeling more tired than usual delivery may be due to your condition rather one than the medication. Food delays Cipro tablet absorption, resulting in peak levels occurring closer to two hours, but does not delay absorption of Cipro suspension. No Prescription Required. Bactrim contains two drugs in one pill, trimethoprim and sulfamethoxazole. Side effects and risks Cipro and Bactrim cause similar common side effects such as: nausea diarrhea vomiting stomach upset dizziness rash People delivery with a sulfa allergy should not take Bactrim. Cipro is not a first-choice medication for urinary tract infections due to the risk of serious side effects. Do not take it together with any milk products as it diminishes activity of Cypro. Many payment options: Visa, MasterCard, American Express, Automated Clearing House (ACH) cipro and. It should not be used for more severe UTIs or kidney infections.
Where is cipro the cipro sense of canadian throwing away food when canadian a few feet away a person is starving? (You can convince yourself by placing a small order). CanadaPharmacyOnline offers Best Price for Seroquel (Quetiapine including dosages, quantities, side effects, and healthcare product images. Maxalt should not be used to cipro treat a common tension headache, a headache that causes loss of movement on one side of your body, or any headache that seems to be different from your usual migraine headaches. Effectiveness Both Cipro and Bactrim are effective for treating UTIs. What other healthcare drugs will affect Maxalt? We will donate all the bags to local charities across Manchester who can help distribute them throughout the night. Sherin Mathews has been missing since canadian October 7 after being left in an alley by her home in Dallas, Texas, for refusing to finish her milk. Soft Tabs generic ).66 per pill. Are often required to be current on their vaccinations or receive a special waiver in order to attend public school, there is no requirement for adult vaccinations, despite several diseases that continue to present dangers. Twitter account for, michigan State University. If no other therapies work and the symptoms are severe enough, several types of surgery may help correct the condition. But if your symptoms are severe, call 911 or go to the nearest emergency room right away. The drug also improves the learning abilities and memory. Click here TO BUY cipro with 10 discount. Can I Buy cipro Fast Delivery saturday, cipro Cheap uk Buy cipro online cheap. I try and get everything. Online order cipro no prescription overnight delivery Trusted Clinic. "What we don't know is whether how much that lack is due to access constraints Eibner said, noting that some patients may have difficulty getting a doctor, since some physicians have not taken canadian patients covered by newly expanded Medicaid plans due to lower reimbursements. Toxicokinetic studies demonstrated healthcare placental transfer of drug in both species. It is prescribed adults for the treatment of severe microbal. USA, Canada ) and West European market (. If youre canadian interested in alternatives to Cipro, talk with your doctor about other antibiotic options healthcare that might be appropriate for you. Find Lowest Prices on, maxalt (rizatriptan benzoate) Tablets Orally Disintegrating Tablets. If you are looking for a turn key private retreat, only 2 hours from Toronto, this cipro is the one! Zovirax Best Buy CanadianPharmacyOnline. The primary pages have already been updated, but we have over 200 pages in the entire Laymani site, so please bear with. Theyll consider several factors, such as the location of your infection, bacteria that might be causing your infection, and bacterial resistance rates in your geographic area. The membrane of the bacteria cells is gradually destructed and they die. Especially tell your doctor if you take: Propranolol containing medications such as Inderal, Inderal LA, or Innopran. Order Plavix 75mg Tablets and generic equivalent clopidogrel from The Canadian Pharmacy and save! Maxalt tablet 10MG 12 (brand from canada) - prescription required. Buy Cipro without a prescription Overnight delivery buy Cipro buy Cipro cheap. Why does it interact in a bad way and why would read more. Even though Cipro is FDA-approved for use in children, its not the first choice. Officers said the body was most likely that of the missing toddler and efforts to officially identify it are underway today. The food-giving project has been praised, with one responding: Wonderful idea, kindness will always be appreciated by those in need and congratulated by those with a heart. Maxalt is used to treat migraine headaches. Because the reports include events observed in open studies, the role of maxalt in their causation cannot be reliably determined. Centers for Disease Control and Prevention and state health departments to see how more than 600,000 cipro people between the ages of 18 to 64 with at least one chronic medical condition fared in the two years before.
Crested Butte over the Martin Luther King Holiday, January 15, 16 and 17, is one of our excellent choices for bus trips for the 2015-16 ski season. Crested Butte is a longtime favorite for NMCCSC for many reasons.
Once again we will be staying at the Old Town Lodge, located close to the Nordic Center, walking distance to amazing restaurants and close to the town shuttle (close means catching the shuttle from the Lodge parking lot).
The groomed nordic trails are truly fine: The Bench on the south side of town, the valley of the Slate River and Peanut Lake north of town, and Mordor (!) east of town provide variety and challenge! The backcountry is majestic: Gothic Road, Oh-be-Joyful Creek, and delightful tele on Snodgrass! There is a serious Class III from Red Lady Mountain to Oh-be-Joyful Creek that needs to be done, if the bus can get anywhere near the Kebler Pass.
Watch here for more details about this great trip as they are determined. | 2019-04-21T12:10:27Z | http://nmccskiclub.org/crested-butte-bus-trip-2016/ |
Social Security number 184-03-6844 was issued to GUS WALACAVAGE, who was born 24 September 1881 and, Death Master File says, died February 1965.
Search Archives for GUS WALACAVAGE.
Social Security number 184-03-6845 was issued to JOE OZAR, who was born 09 December 1887 and, Death Master File says, died March 1970.
Search Archives for JOE OZAR.
Social Security number 184-03-6847 was issued to JOHN ZANIS, who was born 20 June 1903 and, Death Master File says, died December 1964.
Search Archives for JOHN ZANIS.
Social Security number 184-03-6848 was issued to THOMAS CANTWELL, who was born 17 May 1913 and, Death Master File says, died April 1971.
Search Archives for THOMAS CANTWELL.
Social Security number 184-03-6849 was issued to EDWARD ALEX, who was born 03 December 1897 and, Death Master File says, died January 1969.
Search Archives for EDWARD ALEX.
Social Security number 184-03-6851 was issued to ZIGMUND MIKUTSKY, who was born 18 November 1890 and, Death Master File says, died June 1968.
Search Archives for ZIGMUND MIKUTSKY.
Social Security number 184-03-6852 was issued to MARTIN KUKLO, who was born 04 October 1883 and, Death Master File says, died October 1977.
Search Archives for MARTIN KUKLO.
Social Security number 184-03-6853 was issued to ROBERT WEIKEL, who was born 09 April 1908 and, Death Master File says, died July 1985.
Search Archives for ROBERT WEIKEL.
Social Security number 184-03-6856 was issued to WILLIAM KOWINSKY, who was born 06 November 1889 and, Death Master File says, died January 1970.
Search Archives for WILLIAM KOWINSKY.
Social Security number 184-03-6857 was issued to JOHN SHUREY, who was born 02 April 1902 and, Death Master File says, died May 1978.
Search Archives for JOHN SHUREY.
Social Security number 184-03-6858 was issued to BEN LEVANDOSKE, who was born 05 December 1895 and, Death Master File says, died March 1977.
Search Archives for BEN LEVANDOSKE.
Social Security number 184-03-6860 was issued to WALTER BUCHINSKY, who was born 07 November 1904 and, Death Master File says, died February 1974.
Social Security number 184-03-6862 was issued to EDWARD MORRIS, who was born 23 April 1909 and, Death Master File says, died January 1979.
Social Security number 184-03-6863 was issued to CYRIL F LOVELL, who was born 19 November 1907 and, Death Master File says, died 26 April 1988.
Search Archives for CYRIL LOVELL.
Social Security number 184-03-6868 was issued to RAY SCHWALM, who was born 07 November 1900 and, Death Master File says, died January 1987.
Search Archives for RAY SCHWALM.
Social Security number 184-03-6869 was issued to GEORGE KOSZYK, who was born 20 June 1890 and, Death Master File says, died June 1965.
Search Archives for GEORGE KOSZYK.
Social Security number 184-03-6870 was issued to JOHN TRUTT, who was born 14 May 1894 and, Death Master File says, died January 1963.
Search Archives for JOHN TRUTT.
Social Security number 184-03-6872 was issued to FRED SHOWERS, who was born 27 October 1906 and, Death Master File says, died April 1974.
Search Archives for FRED SHOWERS.
Social Security number 184-03-6873 was issued to GUY L SHOWERS, who was born 12 October 1907 and, Death Master File says, died 05 October 1990.
Search Archives for GUY SHOWERS.
Social Security number 184-03-6876 was issued to MARGARET W FOWLER, who was born 20 November 1908 and, Death Master File says, died 19 March 1983.
Social Security number 184-03-6878 was issued to MARJORIE WOOD, who was born 23 December 1911 and, Death Master File says, died 05 March 2007.
Search Archives for MARJORIE WOOD.
Social Security number 184-03-6879 was issued to CHARLES C VANDERPOOL, who was born 19 July 1916 and, Death Master File says, died 27 February 2001.
Search Archives for CHARLES VANDERPOOL.
Social Security number 184-03-6880 was issued to ELMER S SHENBERGER, who was born 28 January 1910 and, Death Master File says, died 25 April 1995.
Search Archives for ELMER SHENBERGER.
Social Security number 184-03-6883 was issued to J A SWARR, who was born 19 August 1904 and, Death Master File says, died 21 March 1989.
Search Archives for J SWARR.
Social Security number 184-03-6884 was issued to ARTHUR S HOLLINGER, who was born 30 November 1915 and, Death Master File says, died 02 March 2000.
Social Security number 184-03-6885 was issued to G ROBERT LANDIS, who was born 10 May 1913 and, Death Master File says, died April 1984.
Search Archives for G ROBERT LANDIS.
Social Security number 184-03-6886 was issued to ALMA HERSHEY, who was born 16 November 1890 and, Death Master File says, died March 1976.
Search Archives for ALMA HERSHEY.
Social Security number 184-03-6887 was issued to ELI MUMMA, who was born 01 June 1898 and, Death Master File says, died March 1980.
Search Archives for ELI MUMMA.
Social Security number 184-03-6888 was issued to H RAYMOND CHARLES, who was born 19 August 1918 and, Death Master File says, died 05 December 1988.
Search Archives for H RAYMOND CHARLES.
Social Security number 184-03-6889 was issued to WILLIS LANDIS, who was born 04 September 1917 and, Death Master File says, died June 1967.
Search Archives for WILLIS LANDIS.
Social Security number 184-03-6893 was issued to HENRY GABEL, who was born 07 November 1906 and, Death Master File says, died December 1980.
Search Archives for HENRY GABEL.
Social Security number 184-03-6895 was issued to ERNEST SCHAEFFER, who was born 02 November 1908 and, Death Master File says, died May 1980.
Search Archives for ERNEST SCHAEFFER.
Social Security number 184-03-6897 was issued to HOMER F ERB, who was born 12 August 1916 and, Death Master File says, died 30 April 1993.
Search Archives for HOMER ERB.
Social Security number 184-03-6898 was issued to ANNA ALBITZ, who was born 29 March 1913 and, Death Master File says, died November 1986.
Search Archives for ANNA ALBITZ.
Social Security number 184-03-6899 was issued to MELVIN SCHAEFFER, who was born 13 April 1878 and, Death Master File says, died July 1966.
Search Archives for MELVIN SCHAEFFER.
Social Security number 184-03-6900 was issued to QUINTON MURRAY, who was born 31 October 1896 and, Death Master File says, died January 1981.
Search Archives for QUINTON MURRAY.
Social Security number 184-03-6902 was issued to WILLIAM KERL, who was born 16 January 1902 and, Death Master File says, died October 1975.
Search Archives for WILLIAM KERL.
Social Security number 184-03-6903 was issued to BLANCHE T HECTOR, who was born 15 October 1913 and, Death Master File says, died 17 August 2005.
Search Archives for BLANCHE HECTOR.
Social Security number 184-03-6906 was issued to VERA PEPPER, who was born 06 December 1918 and, Death Master File says, died August 1960.
Search Archives for VERA PEPPER.
Social Security number 184-03-6907 was issued to MURRELL W CHAMPION, who was born 05 November 1903 and, Death Master File says, died 01 April 1992.
Search Archives for MURRELL CHAMPION.
Social Security number 184-03-6908 was issued to PAUL FRENCH, who was born 30 April 1917 and, Death Master File says, died May 1977.
Search Archives for PAUL FRENCH.
Social Security number 184-03-6911 was issued to FRITZ SCHMIDT, who was born 07 November 1896 and, Death Master File says, died January 1980.
Search Archives for FRITZ SCHMIDT.
Social Security number 184-03-6916 was issued to HARRY A HENNING, who was born 18 April 1916 and, Death Master File says, died 14 July 1998.
Search Archives for HARRY HENNING.
Social Security number 184-03-6917 was issued to ALLAN MARCHANT, who was born 02 July 1904 and, Death Master File says, died April 1965.
Search Archives for ALLAN MARCHANT.
Social Security number 184-03-6918 was issued to CHESTER LUKENS, who was born 31 July 1897 and, Death Master File says, died October 1984.
Search Archives for CHESTER LUKENS.
Social Security number 184-03-6919 was issued to MARION KENNEDY, who was born 06 February 1892 and, Death Master File says, died December 1983.
Social Security number 184-03-6920 was issued to ELMER BALTHASER, who was born 01 May 1902 and, Death Master File says, died March 1967.
Search Archives for ELMER BALTHASER.
Social Security number 184-03-6921 was issued to JESSIE SINER, who was born 29 May 1895 and, Death Master File says, died December 1985.
Search Archives for JESSIE SINER.
Social Security number 184-03-6922 was issued to STANLEY W RAPP, who was born 12 November 1918 and, Death Master File says, died 24 July 1997.
Search Archives for STANLEY RAPP.
Social Security number 184-03-6925 was issued to HARRY KISSINGER, who was born 10 April 1888 and, Death Master File says, died April 1970.
Search Archives for HARRY KISSINGER.
Social Security number 184-03-6927 was issued to HOMER BESECKER, who was born 22 November 1895 and, Death Master File says, died January 1967.
Search Archives for HOMER BESECKER.
Social Security number 184-03-6928 was issued to CHARLES LEWIS, who was born 26 May 1902 and, Death Master File says, died November 1969.
Social Security number 184-03-6929 was issued to MARION M PICKERING, who was born 03 October 1917 and, Death Master File says, died 16 October 2008.
Search Archives for MARION PICKERING.
Social Security number 184-03-6930 was issued to GEORGE HAMILTON, who was born 24 January 1914 and, Death Master File says, died October 1977.
Social Security number 184-03-6932 was issued to SADIE SMICKLEY, who was born 28 August 1891 and, Death Master File says, died November 1977.
Search Archives for SADIE SMICKLEY.
Social Security number 184-03-6933 was issued to RUSSELL BAUER, who was born 15 November 1908 and, Death Master File says, died February 1975.
Search Archives for RUSSELL BAUER.
Social Security number 184-03-6934 was issued to HERBERT BAUER, who was born 27 February 1897 and, Death Master File says, died May 1971.
Search Archives for HERBERT BAUER.
Social Security number 184-03-6935 was issued to CLARENCE A HELLER, who was born 16 August 1916 and, Death Master File says, died 12 October 2002.
Search Archives for CLARENCE HELLER.
Social Security number 184-03-6936 was issued to ALBERT J THOMAS, who was born 09 November 1916 and, Death Master File says, died 16 February 2001.
Search Archives for ALBERT THOMAS.
Social Security number 184-03-6937 was issued to ELWOOD WILSON, who was born 19 September 1907 and, Death Master File says, died May 1971.
Social Security number 184-03-6938 was issued to ADELE TORQUATI, who was born 27 April 1919 and, Death Master File says, died 24 August 2007.
Search Archives for ADELE TORQUATI.
Social Security number 184-03-6939 was issued to CLARA S BALTZ, who was born 10 March 1906 and, Death Master File says, died 27 September 2003.
Search Archives for CLARA BALTZ.
Social Security number 184-03-6941 was issued to LLOYD S HOLLINGER, who was born 03 February 1914 and, Death Master File says, died 28 October 2000.
Search Archives for LLOYD HOLLINGER.
Social Security number 184-03-6942 was issued to LEVI G STEHMAN, who was born 22 April 1905 and, Death Master File says, died 25 February 1994.
Search Archives for LEVI STEHMAN.
Social Security number 184-03-6943 was issued to JOHN WASKIEWICZ, who was born 23 December 1892 and, Death Master File says, died October 1968.
Search Archives for JOHN WASKIEWICZ.
Social Security number 184-03-6944 was issued to GEORGE KUCIK, who was born 28 November 1908 and, Death Master File says, died November 1964.
Search Archives for GEORGE KUCIK.
Social Security number 184-03-6950 was issued to FLORENCE KLIMACHEFSKY, who was born 18 April 1912 and, Death Master File says, died 25 October 1996.
Search Archives for FLORENCE KLIMACHEFSKY.
Social Security number 184-03-6951 was issued to EDWARD YASULAVAGE, who was born 12 June 1886 and, Death Master File says, died February 1972.
Search Archives for EDWARD YASULAVAGE.
Social Security number 184-03-6953 was issued to PAUL CARTER, who was born 22 January 1891 and, Death Master File says, died June 1986.
Social Security number 184-03-6954 was issued to ANNA SEASHOLTZ, who was born 19 August 1910 and, Death Master File says, died June 1993.
Search Archives for ANNA SEASHOLTZ.
Social Security number 184-03-6955 was issued to EDWARD VAUGHAN, who was born 07 June 1903 and, Death Master File says, died February 1965.
Search Archives for EDWARD VAUGHAN.
Social Security number 184-03-6956 was issued to SYLVESTER LEIGHT, who was born 09 October 1901 and, Death Master File says, died September 1974.
Search Archives for SYLVESTER LEIGHT.
Social Security number 184-03-6958 was issued to PEARL FREDERICK, who was born 24 September 1913 and, Death Master File says, died November 1982.
Search Archives for PEARL FREDERICK.
Social Security number 184-03-6959 was issued to JOSEPH JOWDER, who was born 05 May 1916 and, Death Master File says, died 03 October 1991.
Search Archives for JOSEPH JOWDER.
Social Security number 184-03-6960 was issued to MARY MATTIS, who was born 15 October 1903 and, Death Master File says, died 22 April 1990.
Search Archives for MARY MATTIS.
Social Security number 184-03-6961 was issued to MARY MACBREARTY, who was born 26 February 1907 and, Death Master File says, died January 1987.
Search Archives for MARY MACBREARTY.
Social Security number 184-03-6964 was issued to LORETTA CARSCADDEN, who was born 27 February 1911 and, Death Master File says, died October 1975.
Search Archives for LORETTA CARSCADDEN.
Social Security number 184-03-6965 was issued to ALFRED SOSNOSKI, who was born 28 October 1915 and, Death Master File says, died September 1972.
Search Archives for ALFRED SOSNOSKI.
Social Security number 184-03-6966 was issued to JOHN MULHEARN, who was born 16 August 1907 and, Death Master File says, died January 1974.
Search Archives for JOHN MULHEARN.
Social Security number 184-03-6967 was issued to GEORGE CHONKO, who was born 02 May 1914 and, Death Master File says, died 03 March 1996.
Search Archives for GEORGE CHONKO.
Social Security number 184-03-6968 was issued to JOHN TURRI, who was born 18 December 1913 and, Death Master File says, died November 1979.
Search Archives for JOHN TURRI.
Social Security number 184-03-6970 was issued to LEROY RENNINGER, who was born 05 March 1907 and, Death Master File says, died December 1975.
Search Archives for LEROY RENNINGER.
Social Security number 184-03-6972 was issued to JOSEPH BOWMAN, who was born 12 March 1909 and, Death Master File says, died February 1986.
Search Archives for JOSEPH BOWMAN.
Social Security number 184-03-6973 was issued to NICK MASTROCOLA, who was born 02 September 1892 and, Death Master File says, died August 1966.
Search Archives for NICK MASTROCOLA.
Social Security number 184-03-6975 was issued to JOSEPH YANULAITIS, who was born 03 July 1887 and, Death Master File says, died January 1964.
Search Archives for JOSEPH YANULAITIS.
Social Security number 184-03-6976 was issued to BOLEY RAZMIN, who was born 18 April 1894 and, Death Master File says, died March 1967.
Search Archives for BOLEY RAZMIN.
Social Security number 184-03-6978 was issued to JOHN SHATTS, who was born 01 March 1884 and, Death Master File says, died July 1965.
Search Archives for JOHN SHATTS.
Social Security number 184-03-6980 was issued to ROBERT WAGNER, who was born 06 March 1897 and, Death Master File says, died March 1977.
Social Security number 184-03-6981 was issued to ALBERT EDELMAN, who was born 22 June 1911 and, Death Master File says, died January 1978.
Search Archives for ALBERT EDELMAN.
Social Security number 184-03-6982 was issued to KERMIT AMIG, who was born 19 October 1914 and, Death Master File says, died August 1970.
Search Archives for KERMIT AMIG.
Social Security number 184-03-6984 was issued to EVA C WALTER, who was born 26 June 1893 and, Death Master File says, died 08 October 1991.
Social Security number 184-03-6985 was issued to ELLA ECK, who was born 23 July 1889 and, Death Master File says, died September 1972.
Search Archives for ELLA ECK.
Social Security number 184-03-6986 was issued to HARVEY LESHER, who was born 20 August 1898 and, Death Master File says, died March 1976.
Search Archives for HARVEY LESHER.
Social Security number 184-03-6987 was issued to NORMAN DERR, who was born 25 June 1901 and, Death Master File says, died May 1958.
Search Archives for NORMAN DERR.
Social Security number 184-03-6988 was issued to MAHLON RHODE, who was born 25 December 1900 and, Death Master File says, died 11 December 1996.
Search Archives for MAHLON RHODE.
Social Security number 184-03-6992 was issued to ANGELO PIERUCCI, who was born 21 April 1902 and, Death Master File says, died 01 April 1975.
Search Archives for ANGELO PIERUCCI.
Social Security number 184-03-6993 was issued to BERNARD CHRISTY, who was born 29 June 1902 and, Death Master File says, died December 1973.
Search Archives for BERNARD CHRISTY.
Social Security number 184-03-6994 was issued to WILBUR STAIR, who was born 15 April 1904 and, Death Master File says, died January 1976.
Search Archives for WILBUR STAIR.
Social Security number 184-03-6995 was issued to ELEANOR Y GABUZDA, who was born 05 July 1914 and, Death Master File says, died 01 August 1994.
Search Archives for ELEANOR GABUZDA.
Social Security number 184-03-6996 was issued to JOSEPH E BOYLE, who was born 04 June 1910 and, Death Master File says, died 13 February 1997.
Social Security number 184-03-6997 was issued to MARY POTZGO, who was born 10 January 1909 and, Death Master File says, died October 1985.
Search Archives for MARY POTZGO.
Social Security number 184-03-6998 was issued to MIKE KALANEVICH, who was born 16 September 1898 and, Death Master File says, died September 1987.
Search Archives for MIKE KALANEVICH.
Social Security number 184-03-7001 was issued to GUSTAV SCHIGGEL, who was born 08 November 1889 and, Death Master File says, died September 1980.
Search Archives for GUSTAV SCHIGGEL.
Social Security number 184-03-7002 was issued to ROBERT MORRIS, who was born 18 November 1893 and, Death Master File says, died November 1972.
Social Security number 184-03-7004 was issued to MAE WEIDENBACKER, who was born 24 May 1891 and, Death Master File says, died September 1968.
Search Archives for MAE WEIDENBACKER.
Social Security number 184-03-7005 was issued to ROBERT P DILL, who was born 27 September 1901 and, Death Master File says, died May 1989.
Search Archives for ROBERT DILL.
Social Security number 184-03-7008 was issued to DOROTHY MCGLASHEN, who was born 06 August 1916 and, Death Master File says, died May 1980.
Search Archives for DOROTHY MCGLASHEN.
Social Security number 184-03-7009 was issued to GLADYS M BOYLAN, who was born 09 January 1916 and, Death Master File says, died December 1995.
Search Archives for GLADYS BOYLAN.
Social Security number 184-03-7010 was issued to PAUL MEMMO, who was born 18 June 1898 and, Death Master File says, died September 1971.
Search Archives for PAUL MEMMO.
Social Security number 184-03-7011 was issued to LUIGI GIACINTO, who was born 12 October 1899 and, Death Master File says, died June 1983.
Search Archives for LUIGI GIACINTO.
Social Security number 184-03-7012 was issued to ROSALIE GALLACCIO, who was born 11 March 1907 and, Death Master File says, died 08 January 2001.
Search Archives for ROSALIE GALLACCIO.
Social Security number 184-03-7013 was issued to CHARLES HERR, who was born 11 February 1887 and, Death Master File says, died March 1977.
Social Security number 184-03-7014 was issued to MORRIS KATZ, who was born 15 May 1888 and, Death Master File says, died December 1966.
Social Security number 184-03-7017 was issued to PHILIP G SOLOMON, who was born 02 July 1915 and, Death Master File says, died 24 June 1999.
Search Archives for PHILIP SOLOMON.
Social Security number 184-03-7018 was issued to DAVID GREENBERG, who was born 10 March 1891 and, Death Master File says, died September 1980.
Social Security number 184-03-7019 was issued to THOMAS WOOD, who was born 08 April 1916 and, Death Master File says, died November 1986.
Search Archives for THOMAS WOOD.
Social Security number 184-03-7020 was issued to WILLIAM HAMILTON, who was born 16 October 1889 and, Death Master File says, died September 1970.
Social Security number 184-03-7021 was issued to EDWARD KOSLOSKY, who was born 21 August 1915 and, Death Master File says, died 15 September 1988.
Search Archives for EDWARD KOSLOSKY.
Social Security number 184-03-7022 was issued to CHARLES RICHARDSON, who was born 21 January 1915 and, Death Master File says, died December 1964.
Social Security number 184-03-7024 was issued to MELVIN MARPLE, who was born 28 February 1912 and, Death Master File says, died August 1980.
Search Archives for MELVIN MARPLE.
Social Security number 184-03-7025 was issued to CHARLES GILSON, who was born 14 May 1909 and, Death Master File says, died November 1986.
Search Archives for CHARLES GILSON.
Social Security number 184-03-7029 was issued to MAURICE FELLIN, who was born 26 May 1893 and, Death Master File says, died February 1970.
Search Archives for MAURICE FELLIN.
Social Security number 184-03-7030 was issued to EARL VANATTA, who was born 19 December 1891 and, Death Master File says, died October 1971.
Search Archives for EARL VANATTA.
Social Security number 184-03-7031 was issued to AGNES A SHERMAN, who was born 03 November 1911 and, Death Master File says, died September 1990.
Search Archives for AGNES SHERMAN.
Social Security number 184-03-7032 was issued to STEWART I MOORE, who was born 11 October 1904 and, Death Master File says, died 18 May 1989.
Social Security number 184-03-7034 was issued to VIVIENNE L SALL, who was born 01 July 1917 and, Death Master File says, died 16 May 2000.
Search Archives for VIVIENNE SALL.
Social Security number 184-03-7035 was issued to MARY B OBRIEN, who was born 10 May 1915 and, Death Master File says, died 29 July 2002.
Social Security number 184-03-7036 was issued to ELLWOOD ROGERS, who was born 04 September 1904 and, Death Master File says, died December 1969.
Search Archives for ELLWOOD ROGERS.
Social Security number 184-03-7037 was issued to CHARLES HARRISON, who was born 04 April 1919 and, Death Master File says, died August 1987.
Social Security number 184-03-7039 was issued to JOSEPH COLLINSON, who was born 11 June 1895 and, Death Master File says, died January 1975.
Search Archives for JOSEPH COLLINSON.
Social Security number 184-03-7041 was issued to EDNA THARAN, who was born 16 April 1910 and, Death Master File says, died September 1984.
Search Archives for EDNA THARAN.
Social Security number 184-03-7042 was issued to JOHN THARAN, who was born 21 March 1913 and, Death Master File says, died 28 January 1996.
Search Archives for JOHN THARAN.
Social Security number 184-03-7043 was issued to STANLEY SIEROCINSKI, who was born 16 December 1916 and, Death Master File says, died 08 May 2008.
Search Archives for STANLEY SIEROCINSKI.
Social Security number 184-03-7044 was issued to CRAIG E HAMMES, who was born 03 December 1915 and, Death Master File says, died 09 August 1998.
Search Archives for CRAIG HAMMES.
Social Security number 184-03-7045 was issued to ABEL X STRIFFLING, who was born 17 January 1908 and, Death Master File says, died 09 November 1997.
Search Archives for ABEL STRIFFLING.
Social Security number 184-03-7049 was issued to MARY M SWANSON, who was born 27 November 1917 and, Death Master File says, died 29 August 1991.
Search Archives for MARY SWANSON.
Social Security number 184-03-7050 was issued to AUGUSTUS AVERY, who was born 20 May 1882 and, Death Master File says, died February 1965.
Search Archives for AUGUSTUS AVERY.
Social Security number 184-03-7051 was issued to LEONARD BOGLE, who was born 29 October 1910 and, Death Master File says, died September 1985.
Search Archives for LEONARD BOGLE.
Social Security number 184-03-7052 was issued to FRANCIS LEADER, who was born 20 August 1912 and, Death Master File says, died November 1974.
Social Security number 184-03-7055 was issued to LEROY AVERY, who was born 14 July 1909 and, Death Master File says, died November 1959.
Search Archives for LEROY AVERY.
Social Security number 184-03-7056 was issued to WILLIAM H HEYWOOD, who was born 30 June 1917 and, Death Master File says, died 09 December 1993.
Search Archives for WILLIAM HEYWOOD.
Social Security number 184-03-7057 was issued to CARL GULDIN, who was born 16 March 1914 and, Death Master File says, died May 1974.
Search Archives for CARL GULDIN.
Social Security number 184-03-7059 was issued to JOSEPH MCHALE, who was born 01 October 1906 and, Death Master File says, died February 1978.
Search Archives for JOSEPH MCHALE.
Social Security number 184-03-7060 was issued to WILLIAM MANN, who was born 20 March 1879 and, Death Master File says, died September 1968.
Social Security number 184-03-7065 was issued to C ROBERT MAUTE, who was born 08 November 1919 and, Death Master File says, died November 1986.
Search Archives for C ROBERT MAUTE.
Social Security number 184-03-7067 was issued to GILDA GEROME, who was born 29 March 1918 and, Death Master File says, died 01 November 2002.
Search Archives for GILDA GEROME.
Social Security number 184-03-7073 was issued to KAY M EGNER, who was born 01 September 1918 and, Death Master File says, died 11 December 2000.
Search Archives for KAY EGNER.
Social Security number 184-03-7074 was issued to EVELYN M GOLDEN, who was born 12 June 1906 and, Death Master File says, died 25 November 2002.
Search Archives for EVELYN GOLDEN.
Social Security number 184-03-7075 was issued to EVA A FUNK, who was born 09 November 1907 and, Death Master File says, died 24 February 2001.
Search Archives for EVA FUNK.
Social Security number 184-03-7077 was issued to HENRY HUNSBERGER, who was born 30 September 1905 and, Death Master File says, died December 1984.
Search Archives for HENRY HUNSBERGER.
Social Security number 184-03-7078 was issued to THOMAS E FLUCK, who was born 04 December 1918 and, Death Master File says, died 24 January 2007.
Search Archives for THOMAS FLUCK.
Social Security number 184-03-7079 was issued to ANNA PAULSON, who was born 02 May 1919 and, Death Master File says, died 05 October 2009.
Search Archives for ANNA PAULSON.
Social Security number 184-03-7080 was issued to CHARLES T SCHULER, who was born 10 February 1910 and, Death Master File says, died 24 January 1990.
Search Archives for CHARLES SCHULER.
Social Security number 184-03-7081 was issued to HORACE NEIMAN, who was born 27 March 1902 and, Death Master File says, died June 1981.
Search Archives for HORACE NEIMAN.
Social Security number 184-03-7083 was issued to CARLTON J LOFLAND, who was born 22 August 1917 and, Death Master File says, died 10 January 1989.
Search Archives for CARLTON LOFLAND.
Social Security number 184-03-7084 was issued to PELLMAN B SHOEMAKER, who was born 27 December 1912 and, Death Master File says, died 05 February 1999.
Search Archives for PELLMAN SHOEMAKER.
Social Security number 184-03-7085 was issued to HYMAN KANTER, who was born 28 September 1902 and, Death Master File says, died April 1975.
Search Archives for HYMAN KANTER.
Social Security number 184-03-7086 was issued to JOSEPH WARD, who was born 05 May 1913 and, Death Master File says, died September 1978.
Social Security number 184-03-7088 was issued to JOSEPH SHANNON, who was born 13 September 1900 and, Death Master File says, died January 1967.
Search Archives for JOSEPH SHANNON.
Social Security number 184-03-7094 was issued to NATHANIEL SELDON, who was born 09 January 1901 and, Death Master File says, died October 1982.
Search Archives for NATHANIEL SELDON.
Social Security number 184-03-7096 was issued to CHARLES DELLINGER, who was born 03 January 1883 and, Death Master File says, died June 1963.
Search Archives for CHARLES DELLINGER.
Social Security number 184-03-7097 was issued to WILLIAM MOODY, who was born 17 September 1897 and, Death Master File says, died March 1967.
Social Security number 184-03-7098 was issued to WILEY GENTRY, who was born 20 February 1905 and, Death Master File says, died September 1967.
Search Archives for WILEY GENTRY.
Social Security number 184-03-7100 was issued to ESTHER C BRYAN, who was born 30 March 1911 and, Death Master File says, died 15 July 1997.
Search Archives for ESTHER BRYAN.
Social Security number 184-03-7101 was issued to M LOIS BRYAN, who was born 25 November 1912 and, Death Master File says, died 24 December 1989.
Search Archives for M LOIS BRYAN.
Social Security number 184-03-7104 was issued to MARY JANE RAPP, who was born 31 December 1919 and, Death Master File says, died 22 August 1996.
Search Archives for MARY JANE RAPP.
Social Security number 184-03-7106 was issued to ANNE BRANCA, who was born 27 December 1895 and, Death Master File says, died January 1978.
Search Archives for ANNE BRANCA.
Social Security number 184-03-7107 was issued to VICTOR ZANGARA, who was born 28 January 1909 and, Death Master File says, died December 1983.
Search Archives for VICTOR ZANGARA.
Social Security number 184-03-7110 was issued to OSMOND LYNN, who was born 20 November 1897 and, Death Master File says, died May 1979.
Search Archives for OSMOND LYNN.
Social Security number 184-03-7111 was issued to WILLIAM RILLING, who was born 22 February 1895 and, Death Master File says, died October 1966.
Search Archives for WILLIAM RILLING.
Social Security number 184-03-7112 was issued to GERTRUDE S EVANS, who was born 25 June 1917 and, Death Master File says, died 14 December 1996.
Search Archives for GERTRUDE EVANS.
Social Security number 184-03-7113 was issued to FRANK PUAL, who was born 30 January 1908 and, Death Master File says, died August 1952.
Search Archives for FRANK PUAL.
Social Security number 184-03-7114 was issued to BERTHA M RAINIER, who was born 13 February 1906 and, Death Master File says, died 05 March 2005.
Search Archives for BERTHA RAINIER.
Social Security number 184-03-7115 was issued to GEORGE SMITH, who was born 13 April 1894 and, Death Master File says, died June 1983.
Social Security number 184-03-7119 was issued to WILLIAM BAIN, who was born 23 August 1917 and, Death Master File says, died April 1986.
Search Archives for WILLIAM BAIN.
Social Security number 184-03-7121 was issued to RICHARD WILHELM, who was born 04 November 1896 and, Death Master File says, died December 1978.
Social Security number 184-03-7122 was issued to JENNIE G SMITH, who was born 25 December 1896 and, Death Master File says, died 01 July 1990.
Social Security number 184-03-7123 was issued to FRANK WHEELIN, who was born 14 February 1898 and, Death Master File says, died June 1986.
Search Archives for FRANK WHEELIN.
Social Security number 184-03-7124 was issued to EDWARD BOYLE, who was born 20 July 1913 and, Death Master File says, died May 1976.
Social Security number 184-03-7125 was issued to MARY MULLIN, who was born 02 September 1917 and, Death Master File says, died March 1979.
Social Security number 184-03-7126 was issued to GERALD F STAHLECKER, who was born 09 October 1915 and, Death Master File says, died April 1995.
Search Archives for GERALD STAHLECKER.
Social Security number 184-03-7127 was issued to MILTON MOSKOWITZ, who was born 20 March 1913 and, Death Master File says, died 02 February 1997.
Search Archives for MILTON MOSKOWITZ.
Social Security number 184-03-7128 was issued to THOMAS CASSIDY, who was born 13 March 1913 and, Death Master File says, died December 1956.
Social Security number 184-03-7129 was issued to NORMAN FINLAYSON, who was born 22 August 1905 and, Death Master File says, died January 1978.
Search Archives for NORMAN FINLAYSON.
Social Security number 184-03-7130 was issued to SAMUEL MUCHNICK, who was born 10 November 1909 and, Death Master File says, died 20 August 1992.
Search Archives for SAMUEL MUCHNICK.
Social Security number 184-03-7131 was issued to JAMES JONES, who was born 13 August 1898 and, Death Master File says, died October 1979.
Social Security number 184-03-7132 was issued to ALICE MOFFETT, who was born 09 March 1915 and, Death Master File says, died September 1979.
Search Archives for ALICE MOFFETT.
Social Security number 184-03-7139 was issued to JENNIE A MERRICK, who was born 16 May 1896 and, Death Master File says, died 11 November 1994.
Search Archives for JENNIE MERRICK.
Social Security number 184-03-7140 was issued to OSCAR MULFORD, who was born 12 August 1898 and, Death Master File says, died June 1980.
Search Archives for OSCAR MULFORD.
Social Security number 184-03-7141 was issued to FRANK P DUFFY, who was born 16 December 1908 and, Death Master File says, died 01 August 1989.
Search Archives for FRANK DUFFY.
Social Security number 184-03-7142 was issued to M AARONSON, who was born 0000 and, Death Master File says, died April 1968.
Search Archives for M AARONSON.
Social Security number 184-03-7145 was issued to STASIA G GORDON, who was born 19 December 1911 and, Death Master File says, died 02 May 1999.
Search Archives for STASIA GORDON.
Social Security number 184-03-7148 was issued to JOHN MURPHY, who was born 11 March 1911 and, Death Master File says, died 02 January 1995.
Social Security number 184-03-7149 was issued to WILLIAM SPILKA, who was born 15 June 1895 and, Death Master File says, died October 1963.
Search Archives for WILLIAM SPILKA.
Social Security number 184-03-7154 was issued to WILLIAM P BATES, who was born 23 November 1909 and, Death Master File says, died 28 June 2000.
Social Security number 184-03-7155 was issued to JOHN BREXA, who was born 04 February 1898 and, Death Master File says, died February 1966.
Search Archives for JOHN BREXA.
Social Security number 184-03-7158 was issued to LAWRENCE AYRES, who was born 12 December 1908 and, Death Master File says, died August 1971.
Search Archives for LAWRENCE AYRES.
Social Security number 184-03-7160 was issued to GEORGE BAYNUM, who was born 25 October 1907 and, Death Master File says, died January 1969.
Search Archives for GEORGE BAYNUM.
Social Security number 184-03-7162 was issued to RAY MANWARING, who was born 01 September 1879 and, Death Master File says, died February 1967.
Search Archives for RAY MANWARING.
Social Security number 184-03-7165 was issued to ALBERT G HARRIS, who was born 24 July 1908 and, Death Master File says, died 15 October 1999.
Social Security number 184-03-7167 was issued to LAURA SERRONI, who was born 20 June 1898 and, Death Master File says, died April 1977.
Search Archives for LAURA SERRONI.
Social Security number 184-03-7168 was issued to HELEN C BOYLAN, who was born 26 September 1903 and, Death Master File says, died 31 January 2002.
Search Archives for HELEN BOYLAN.
Social Security number 184-03-7170 was issued to EMMA KEEN, who was born 16 November 1882 and, Death Master File says, died January 1963.
Search Archives for EMMA KEEN.
Social Security number 184-03-7171 was issued to MARGARET H OWENS, who was born 29 June 1909 and, Death Master File says, died 31 October 1988.
Social Security number 184-03-7172 was issued to IDA SILVERMAN, who was born 17 July 1902 and, Death Master File says, died March 1982.
Search Archives for IDA SILVERMAN.
Social Security number 184-03-7174 was issued to ROBERT PATTERSON, who was born 08 February 1906 and, Death Master File says, died August 1981.
Social Security number 184-03-7176 was issued to CLIFFORD DONAHOWER, who was born 12 April 1889 and, Death Master File says, died February 1974.
Search Archives for CLIFFORD DONAHOWER.
Social Security number 184-03-7178 was issued to JAMES GOODYEAR, who was born 08 July 1909 and, Death Master File says, died September 1982.
Social Security number 184-03-7180 was issued to JAMES BROADBENT, who was born 20 June 1912 and, Death Master File says, died 01 May 1999.
Search Archives for JAMES BROADBENT.
Social Security number 184-03-7181 was issued to GEORGE ROBERTS, who was born 08 February 1909 and, Death Master File says, died January 1978.
Social Security number 184-03-7183 was issued to MARGARET COSTELLO, who was born 09 July 1904 and, Death Master File says, died August 1985.
Social Security number 184-03-7185 was issued to ANDREW J KEATING, who was born 27 July 1914 and, Death Master File says, died 10 October 2000.
Search Archives for ANDREW KEATING.
Social Security number 184-03-7186 was issued to MARIE HEADLEY, who was born 09 August 1899 and, Death Master File says, died November 1986.
Search Archives for MARIE HEADLEY.
Social Security number 184-03-7187 was issued to JOHN TRUMAN, who was born 22 July 1899 and, Death Master File says, died March 1975.
Search Archives for JOHN TRUMAN.
Social Security number 184-03-7188 was issued to JACOB SILLINGER, who was born 25 December 1897 and, Death Master File says, died November 1978.
Search Archives for JACOB SILLINGER.
Social Security number 184-03-7189 was issued to ROBERT G SWIFT, who was born 05 August 1904 and, Death Master File says, died 01 November 1992.
Search Archives for ROBERT SWIFT.
Social Security number 184-03-7190 was issued to ALBERT A BLUESTEIN, who was born 27 January 1912 and, Death Master File says, died 15 December 1989.
Search Archives for ALBERT BLUESTEIN.
Social Security number 184-03-7191 was issued to LEAH BLUESTEIN, who was born 02 February 1913 and, Death Master File says, died 23 July 1999.
Search Archives for LEAH BLUESTEIN.
Social Security number 184-03-7192 was issued to WILLIAM DONAHUE, who was born 31 August 1897 and, Death Master File says, died June 1963.
Search Archives for WILLIAM DONAHUE.
Social Security number 184-03-7194 was issued to CHARLES ANTON, who was born 07 May 1900 and, Death Master File says, died May 1944.
Social Security number 184-03-7195 was issued to HARRY WALKER, who was born 11 June 1900 and, Death Master File says, died December 1979.
Social Security number 184-03-7198 was issued to MARY BLACKBURN, who was born 30 August 1911 and, Death Master File says, died 30 June 2000.
Search Archives for MARY BLACKBURN.
Social Security number 184-03-7199 was issued to LOUIS SIGMAN, who was born 15 December 1891 and, Death Master File says, died October 1962.
Search Archives for LOUIS SIGMAN.
Social Security number 184-03-7201 was issued to GERTRUDE BAKER, who was born 04 June 1911 and, Death Master File says, died 24 December 1998.
Search Archives for GERTRUDE BAKER.
Social Security number 184-03-7202 was issued to CATHERINE BAKER, who was born 28 June 1910 and, Death Master File says, died 04 February 1999.
Social Security number 184-03-7203 was issued to ELMER G KATES, who was born 27 July 1912 and, Death Master File says, died 22 June 1993.
Search Archives for ELMER KATES.
Social Security number 184-03-7204 was issued to HENRY HUNSBERGER, who was born 06 March 1899 and, Death Master File says, died January 1966.
Social Security number 184-03-7205 was issued to JENNIE CHATTO, who was born 30 July 1900 and, Death Master File says, died October 1977.
Search Archives for JENNIE CHATTO.
Social Security number 184-03-7208 was issued to ANTONIO GIANGIULIO, who was born 02 April 1892 and, Death Master File says, died November 1969.
Search Archives for ANTONIO GIANGIULIO.
Social Security number 184-03-7209 was issued to MARY CLEMMER, who was born 28 May 1914 and, Death Master File says, died December 1980.
Social Security number 184-03-7210 was issued to E M LORENZ, who was born 01 April 1911 and, Death Master File says, died 22 March 2009.
Search Archives for E LORENZ.
Social Security number 184-03-7215 was issued to GRACE MAYS, who was born 24 March 1891 and, Death Master File says, died September 1967.
Search Archives for GRACE MAYS.
Social Security number 184-03-7216 was issued to THOMAS F SMITH, who was born 09 March 1904 and, Death Master File says, died 16 September 1992.
Social Security number 184-03-7217 was issued to HARRY STANKO, who was born 20 July 1893 and, Death Master File says, died July 1972.
Search Archives for HARRY STANKO.
Social Security number 184-03-7219 was issued to EMMETT GEORGE, who was born 03 May 1873 and, Death Master File says, died January 1964.
Search Archives for EMMETT GEORGE.
Social Security number 184-03-7221 was issued to EDITH HATTON, who was born 22 September 1907 and, Death Master File says, died December 1975.
Search Archives for EDITH HATTON.
Social Security number 184-03-7223 was issued to JAMES E WALKER, who was born 05 September 1918 and, Death Master File says, died 08 February 2005.
Social Security number 184-03-7225 was issued to ALEXANDER SALERNO, who was born 28 January 1908 and, Death Master File says, died December 1983.
Search Archives for ALEXANDER SALERNO.
Social Security number 184-03-7227 was issued to MARGARET B LICHTY, who was born 18 August 1912 and, Death Master File says, died 22 February 1998.
Search Archives for MARGARET LICHTY.
Social Security number 184-03-7228 was issued to ELIZABETH CIARROCCHI, who was born 09 November 1911 and, Death Master File says, died January 1968.
Search Archives for ELIZABETH CIARROCCHI.
Social Security number 184-03-7229 was issued to GEORGE W HINCKEN, who was born 22 May 1914 and, Death Master File says, died 03 January 1989.
Social Security number 184-03-7230 was issued to THOMAS MEEHAN, who was born 23 December 1903 and, Death Master File says, died September 1981.
Social Security number 184-03-7231 was issued to GAETANO BOZZA, who was born 04 August 1892 and, Death Master File says, died July 1966.
Search Archives for GAETANO BOZZA.
Social Security number 184-03-7232 was issued to EDWARD HILL, who was born 03 September 1887 and, Death Master File says, died November 1967.
Social Security number 184-03-7233 was issued to SAMUEL GREENBERG, who was born 28 December 1903 and, Death Master File says, died August 1973.
Social Security number 184-03-7234 was issued to MARY BAINES, who was born 27 June 1902 and, Death Master File says, died January 1989.
Search Archives for MARY BAINES.
Social Security number 184-03-7235 was issued to RUTH A NELSON, who was born 23 March 1919 and, Death Master File says, died 04 April 2009.
Social Security number 184-03-7237 was issued to THOMAS LEWIS, who was born 12 October 1907 and, Death Master File says, died April 1979.
Social Security number 184-03-7238 was issued to FRED BOARDMAN, who was born 03 February 1890 and, Death Master File says, died June 1968.
Search Archives for FRED BOARDMAN.
Social Security number 184-03-7239 was issued to CARRIE BATTAGLINI, who was born 27 May 1887 and, Death Master File says, died October 1975.
Search Archives for CARRIE BATTAGLINI.
Social Security number 184-03-7242 was issued to CHARLES WALRAVEN, who was born 10 April 1906 and, Death Master File says, died July 1971.
Search Archives for CHARLES WALRAVEN.
Social Security number 184-03-7243 was issued to GEORGE TIPTON, who was born 17 February 1900 and, Death Master File says, died October 1966.
Search Archives for GEORGE TIPTON.
Social Security number 184-03-7245 was issued to EDNA M HARPER, who was born 30 July 1910 and, Death Master File says, died 14 January 2000.
Search Archives for EDNA HARPER.
Social Security number 184-03-7246 was issued to GENEVIEVE T GUSHUE, who was born 22 August 1916 and, Death Master File says, died 07 August 1998.
Search Archives for GENEVIEVE GUSHUE.
Social Security number 184-03-7248 was issued to JOSEPH KALINOWSKI, who was born 30 May 1891 and, Death Master File says, died September 1983.
Social Security number 184-03-7251 was issued to CHARLIE RISHER, who was born 07 October 1895 and, Death Master File says, died July 1969.
Search Archives for CHARLIE RISHER.
Social Security number 184-03-7254 was issued to ELLIE TOIVONEN, who was born 19 June 1888 and, Death Master File says, died November 1974.
Search Archives for ELLIE TOIVONEN.
Social Security number 184-03-7258 was issued to PAULINE V LAWLER, who was born 05 April 1914 and, Death Master File says, died 26 December 1998.
Search Archives for PAULINE LAWLER.
Social Security number 184-03-7259 was issued to CHARLES MULLEN, who was born 07 June 1910 and, Death Master File says, died December 1985.
Search Archives for CHARLES MULLEN.
Social Security number 184-03-7260 was issued to JOSEPH S WHITE, who was born 21 February 1909 and, Death Master File says, died 08 June 2003.
Social Security number 184-03-7261 was issued to NORVILLE J GENOVESI, who was born 22 August 1900 and, Death Master File says, died 28 November 1989.
Search Archives for NORVILLE GENOVESI.
Social Security number 184-03-7262 was issued to LEON FRIEDMAN, who was born 13 August 1885 and, Death Master File says, died December 1974.
Search Archives for LEON FRIEDMAN.
Social Security number 184-03-7267 was issued to MARJORIE ENGLAND, who was born 25 January 1905 and, Death Master File says, died 29 January 1995.
Search Archives for MARJORIE ENGLAND.
Social Security number 184-03-7269 was issued to ELMER CALHOUN, who was born 09 March 1904 and, Death Master File says, died November 1985.
Search Archives for ELMER CALHOUN.
Social Security number 184-03-7270 was issued to JOHN T KURTZ, who was born 28 March 1914 and, Death Master File says, died 03 March 1992.
Search Archives for JOHN KURTZ.
Social Security number 184-03-7271 was issued to JOSEPH DALY, who was born 19 October 1886 and, Death Master File says, died August 1965.
Social Security number 184-03-7272 was issued to CATHERINE M BROOK, who was born 04 July 1919 and, Death Master File says, died 10 October 1990.
Search Archives for CATHERINE BROOK.
Social Security number 184-03-7273 was issued to WILLIAM SCHMIDT, who was born 24 October 1917 and, Death Master File says, died January 1977.
Social Security number 184-03-7274 was issued to THOMAS CARR, who was born 01 October 1901 and, Death Master File says, died October 1976.
Social Security number 184-03-7275 was issued to FRED BRIGGS, who was born 14 July 1887 and, Death Master File says, died February 1965.
Search Archives for FRED BRIGGS.
Social Security number 184-03-7276 was issued to GEORGE TOMLINSON, who was born 22 February 1901 and, Death Master File says, died July 1978.
Social Security number 184-03-7277 was issued to JAMES P NOLAN, who was born 24 June 1912 and, Death Master File says, died 24 January 1999.
Social Security number 184-03-7278 was issued to HARRY SANDLER, who was born 05 December 1915 and, Death Master File says, died April 1967.
Social Security number 184-03-7279 was issued to ELIZABETH KEHOE, who was born 23 June 1910 and, Death Master File says, died February 1984.
Search Archives for ELIZABETH KEHOE.
Social Security number 184-03-7282 was issued to JOHN GIBSON, who was born 29 November 1895 and, Death Master File says, died August 1986.
Social Security number 184-03-7285 was issued to ABRAHAM SAVRIN, who was born 17 September 1903 and, Death Master File says, died November 1969.
Search Archives for ABRAHAM SAVRIN.
Social Security number 184-03-7286 was issued to ABRAHAM GOLDSMAN, who was born 03 February 1907 and, Death Master File says, died April 1978.
Search Archives for ABRAHAM GOLDSMAN.
Social Security number 184-03-7288 was issued to GEORGE TAYLOR, who was born 02 November 1917 and, Death Master File says, died 17 March 1994.
Social Security number 184-03-7293 was issued to HUGH CALLAN, who was born 09 November 1904 and, Death Master File says, died December 1970.
Search Archives for HUGH CALLAN.
Social Security number 184-03-7294 was issued to EUGENE WEILLER, who was born 14 November 1890 and, Death Master File says, died January 1974.
Search Archives for EUGENE WEILLER.
Social Security number 184-03-7297 was issued to HERBERT POPP, who was born 06 February 1909 and, Death Master File says, died July 1977.
Search Archives for HERBERT POPP.
Social Security number 184-03-7298 was issued to BERNARD BURNSIDE, who was born 23 January 1882 and, Death Master File says, died August 1963.
Search Archives for BERNARD BURNSIDE.
Social Security number 184-03-7299 was issued to EDWARD MACALLISTER, who was born 25 September 1912 and, Death Master File says, died October 1980.
Search Archives for EDWARD MACALLISTER.
Social Security number 184-03-7300 was issued to GEORGE HEBBARD, who was born 06 March 1901 and, Death Master File says, died December 1964.
Search Archives for GEORGE HEBBARD.
Social Security number 184-03-7303 was issued to ANNA BISBING, who was born 28 November 1890 and, Death Master File says, died February 1973.
Search Archives for ANNA BISBING.
Social Security number 184-03-7306 was issued to MARGARET GORMAN, who was born 19 December 1910 and, Death Master File says, died March 1980.
Social Security number 184-03-7311 was issued to GEORGE HELFRICH, who was born 15 April 1893 and, Death Master File says, died July 1980.
Search Archives for GEORGE HELFRICH.
Social Security number 184-03-7312 was issued to THOMAS GILMORE, who was born 09 December 1881 and, Death Master File says, died February 1973.
Search Archives for THOMAS GILMORE.
Social Security number 184-03-7313 was issued to LOUISE B FISCHER, who was born 27 April 1915 and, Death Master File says, died 04 October 1995.
Search Archives for LOUISE FISCHER.
Social Security number 184-03-7314 was issued to PHILIP DIONISIO, who was born 21 May 1910 and, Death Master File says, died April 1954.
Search Archives for PHILIP DIONISIO.
Social Security number 184-03-7316 was issued to JOSEPH GUMPPER, who was born 30 May 1896 and, Death Master File says, died March 1964.
Social Security number 184-03-7317 was issued to JOSEPH NORRIS, who was born 24 November 1901 and, Death Master File says, died April 1978.
Search Archives for JOSEPH NORRIS.
Social Security number 184-03-7321 was issued to JULIA QUINN, who was born 26 November 1894 and, Death Master File says, died August 1985.
Search Archives for JULIA QUINN.
Social Security number 184-03-7322 was issued to JOHN P MCCLOSKEY, who was born 18 August 1920 and, Death Master File says, died 10 March 1991.
Social Security number 184-03-7323 was issued to HARRY COHEN, who was born 17 March 1893 and, Death Master File says, died January 1980.
Social Security number 184-03-7324 was issued to CLARENCE CHANDLER, who was born 12 January 1882 and, Death Master File says, died June 1963.
Search Archives for CLARENCE CHANDLER.
Social Security number 184-03-7325 was issued to FRANCIS KAPPER, who was born 20 July 1912 and, Death Master File says, died June 1969.
Search Archives for FRANCIS KAPPER.
Social Security number 184-03-7328 was issued to BEATRICE B LIPPINCOTT, who was born 16 October 1910 and, Death Master File says, died 09 July 1997.
Search Archives for BEATRICE LIPPINCOTT.
Social Security number 184-03-7329 was issued to RALPH KRAMER, who was born 06 August 1919 and, Death Master File says, died August 1971.
Search Archives for RALPH KRAMER.
Social Security number 184-03-7331 was issued to NATHANIEL SHAPIRO, who was born 27 November 1909 and, Death Master File says, died November 1967.
Search Archives for NATHANIEL SHAPIRO.
Social Security number 184-03-7332 was issued to ISAAC REIFF, who was born 20 March 1892 and, Death Master File says, died April 1941.
Search Archives for ISAAC REIFF.
Social Security number 184-03-7333 was issued to HENRY MANIN, who was born 24 December 1914 and, Death Master File says, died March 1977.
Search Archives for HENRY MANIN.
Social Security number 184-03-7336 was issued to HOWARD HARRINGTON, who was born 24 March 1907 and, Death Master File says, died October 1967.
Search Archives for HOWARD HARRINGTON.
Social Security number 184-03-7337 was issued to AUGUST FOX, who was born 12 August 1879 and, Death Master File says, died May 1963.
Search Archives for AUGUST FOX.
Social Security number 184-03-7338 was issued to JOHN WEIGLEIN, who was born 29 May 1892 and, Death Master File says, died June 1968.
Search Archives for JOHN WEIGLEIN.
Social Security number 184-03-7339 was issued to BERTHA M ZECOSKI, who was born 29 September 1904 and, Death Master File says, died 23 November 1995.
Search Archives for BERTHA ZECOSKI.
Social Security number 184-03-7340 was issued to ISRAEL KAPLAN, who was born 21 February 1906 and, Death Master File says, died 07 September 1988.
Search Archives for ISRAEL KAPLAN.
Social Security number 184-03-7341 was issued to ALEXANDER HOWIE, who was born 13 March 1894 and, Death Master File says, died July 1969.
Search Archives for ALEXANDER HOWIE.
Social Security number 184-03-7342 was issued to ROCCO FABIANO, who was born 11 October 1907 and, Death Master File says, died April 1986.
Search Archives for ROCCO FABIANO.
Social Security number 184-03-7347 was issued to HAROLD DAFFERN, who was born 12 February 1902 and, Death Master File says, died April 1983.
Search Archives for HAROLD DAFFERN.
Social Security number 184-03-7349 was issued to LOUIS ITKISS, who was born 20 September 1889 and, Death Master File says, died May 1971.
Search Archives for LOUIS ITKISS.
Social Security number 184-03-7350 was issued to FRANCES FINKELSTEIN, who was born 20 February 1912 and, Death Master File says, died September 1984.
Search Archives for FRANCES FINKELSTEIN.
Social Security number 184-03-7353 was issued to WILLIAM MADALION, who was born 19 August 1906 and, Death Master File says, died August 1961.
Search Archives for WILLIAM MADALION.
Social Security number 184-03-7354 was issued to ROBERT BLACKMORE, who was born 26 May 1900 and, Death Master File says, died December 1982.
Search Archives for ROBERT BLACKMORE.
Social Security number 184-03-7356 was issued to ANNA FLYNN, who was born May 1901 and, Death Master File says, died November 1984.
Social Security number 184-03-7357 was issued to ISADORA ROBERTS, who was born 20 December 1893 and, Death Master File says, died August 1991.
Search Archives for ISADORA ROBERTS.
Social Security number 184-03-7359 was issued to STEVE PRZYBYLENSKI, who was born 12 December 1891 and, Death Master File says, died January 1969.
Search Archives for STEVE PRZYBYLENSKI.
Social Security number 184-03-7360 was issued to WALTER BLEY, who was born 02 November 1919 and, Death Master File says, died November 1983.
Search Archives for WALTER BLEY.
Social Security number 184-03-7366 was issued to JOSEPH MINNICHBACH, who was born 28 February 1905 and, Death Master File says, died July 1981.
Search Archives for JOSEPH MINNICHBACH.
Social Security number 184-03-7367 was issued to MARGARET M JOYCE, who was born 26 September 1911 and, Death Master File says, died 29 August 2007.
Search Archives for MARGARET JOYCE.
Social Security number 184-03-7368 was issued to JOSEPH MCGOVERN, who was born 11 March 1890 and, Death Master File says, died December 1978.
Social Security number 184-03-7369 was issued to IRENE FRIEL, who was born 20 November 1884 and, Death Master File says, died December 1975.
Search Archives for IRENE FRIEL.
Social Security number 184-03-7370 was issued to EARL WATKINS, who was born 28 June 1902 and, Death Master File says, died December 1979.
Search Archives for EARL WATKINS.
Social Security number 184-03-7375 was issued to CLAIRE L RUSSELL, who was born 16 September 1917 and, Death Master File says, died 12 November 1996.
Search Archives for CLAIRE RUSSELL.
Social Security number 184-03-7379 was issued to SOPHIE M FOLEY, who was born 18 October 1917 and, Death Master File says, died 13 October 1994.
Search Archives for SOPHIE FOLEY.
Social Security number 184-03-7381 was issued to SALLIE EHRLICK, who was born 20 November 1906 and, Death Master File says, died 29 April 1997.
Search Archives for SALLIE EHRLICK.
Social Security number 184-03-7382 was issued to HENRY COHEN, who was born 04 October 1917 and, Death Master File says, died 04 January 1991.
Social Security number 184-03-7384 was issued to ANNA PETRASKA, who was born 05 January 1890 and, Death Master File says, died July 1973.
Search Archives for ANNA PETRASKA.
Social Security number 184-03-7385 was issued to SAMUEL ZATUCHNI, who was born 18 July 1884 and, Death Master File says, died February 1969.
Search Archives for SAMUEL ZATUCHNI.
Social Security number 184-03-7387 was issued to JAMES P HENRY, who was born 12 January 1917 and, Death Master File says, died 23 March 1997.
Social Security number 184-03-7388 was issued to THELMA KLEIN, who was born 21 June 1917 and, Death Master File says, died 19 February 2008.
Search Archives for THELMA KLEIN.
Social Security number 184-03-7391 was issued to ABE KEISER, who was born 20 October 1918 and, Death Master File says, died January 1973.
Search Archives for ABE KEISER.
Social Security number 184-03-7393 was issued to WALTER JOHNSTON, who was born 22 August 1919 and, Death Master File says, died April 1977.
Social Security number 184-03-7398 was issued to JAMES LAWLER, who was born 21 October 1919 and, Death Master File says, died September 1980.
Search Archives for JAMES LAWLER.
Social Security number 184-03-7400 was issued to TONY ZANDIK, who was born 13 June 1888 and, Death Master File says, died September 1968.
Search Archives for TONY ZANDIK.
Social Security number 184-03-7403 was issued to JOHN OCONNOR, who was born 30 November 1907 and, Death Master File says, died January 1980.
Social Security number 184-03-7404 was issued to BUENA ELIAS, who was born 28 November 1914 and, Death Master File says, died 18 March 2005.
Search Archives for BUENA ELIAS.
Social Security number 184-03-7407 was issued to MARY E CAMPBELL, who was born 18 December 1906 and, Death Master File says, died 14 August 1988.
Social Security number 184-03-7408 was issued to JAMES J ODONNELL, who was born 27 March 1915 and, Death Master File says, died 10 November 2006.
Social Security number 184-03-7410 was issued to GRACE MUSSELMAN, who was born 25 October 1901 and, Death Master File says, died May 1974.
Social Security number 184-03-7411 was issued to HENRY FABIAN, who was born 28 August 1896 and, Death Master File says, died January 1982.
Search Archives for HENRY FABIAN.
Social Security number 184-03-7412 was issued to ROBERT R BANKS, who was born 03 November 1918 and, Death Master File says, died 03 October 2001.
Social Security number 184-03-7413 was issued to AUGUSTUS BROWN, who was born 07 August 1890 and, Death Master File says, died October 1973.
Search Archives for AUGUSTUS BROWN.
Social Security number 184-03-7414 was issued to HOWARD FORD, who was born 09 July 1916 and, Death Master File says, died August 1974.
Social Security number 184-03-7415 was issued to WILLIAM FENIMORE, who was born 26 August 1892 and, Death Master File says, died January 1964.
Search Archives for WILLIAM FENIMORE.
Social Security number 184-03-7416 was issued to LOUIS MILLER, who was born 12 May 1898 and, Death Master File says, died November 1978.
Social Security number 184-03-7417 was issued to JAMES ALLEN, who was born 19 August 1896 and, Death Master File says, died December 1972.
Social Security number 184-03-7419 was issued to HERMAN GOZENKER, who was born 18 November 1895 and, Death Master File says, died July 1966.
Search Archives for HERMAN GOZENKER.
Social Security number 184-03-7420 was issued to HAROLD QUINN, who was born 01 June 1898 and, Death Master File says, died November 1969.
Search Archives for HAROLD QUINN.
Social Security number 184-03-7421 was issued to ROSALYN BOOKFORD, who was born 23 December 1913 and, Death Master File says, died 29 August 2006.
Search Archives for ROSALYN BOOKFORD.
Social Security number 184-03-7424 was issued to WILLIAM BIESTER, who was born 05 August 1891 and, Death Master File says, died January 1966.
Search Archives for WILLIAM BIESTER.
Social Security number 184-03-7425 was issued to HARRY ORTLIP, who was born 20 February 1900 and, Death Master File says, died May 1980.
Search Archives for HARRY ORTLIP.
Social Security number 184-03-7427 was issued to STELLA M FABITORE, who was born 01 December 1902 and, Death Master File says, died April 1992.
Search Archives for STELLA FABITORE.
Social Security number 184-03-7428 was issued to VINCENZA BOMBARA, who was born 13 February 1893 and, Death Master File says, died October 1971.
Search Archives for VINCENZA BOMBARA.
Social Security number 184-03-7429 was issued to PAUL DOYLE, who was born 29 January 1906 and, Death Master File says, died April 1982.
Social Security number 184-03-7430 was issued to JOHN H GLASS, who was born 12 November 1914 and, Death Master File says, died 05 November 1991.
Search Archives for JOHN GLASS.
Social Security number 184-03-7436 was issued to LOUISE MAYS, who was born 22 February 1909 and, Death Master File says, died 25 December 1994.
Search Archives for LOUISE MAYS.
Social Security number 184-03-7437 was issued to JAMES MONTGOMERY, who was born 12 July 1905 and, Death Master File says, died February 1981.
Social Security number 184-03-7438 was issued to ETHEL MICHAEL, who was born 05 March 1889 and, Death Master File says, died March 1979.
Search Archives for ETHEL MICHAEL.
Social Security number 184-03-7439 was issued to FLORENCE WILLIAMS, who was born 13 December 1898 and, Death Master File says, died April 1983.
Social Security number 184-03-7440 was issued to JAMES ASHER, who was born 10 August 1903 and, Death Master File says, died December 1976.
Search Archives for JAMES ASHER.
Social Security number 184-03-7441 was issued to IRA BEUERLE, who was born 22 December 1903 and, Death Master File says, died November 1976.
Search Archives for IRA BEUERLE.
Social Security number 184-03-7442 was issued to JULIA P HOPKINS, who was born 26 May 1902 and, Death Master File says, died 24 January 1993.
Search Archives for JULIA HOPKINS.
Social Security number 184-03-7443 was issued to CORNELIUS MCGILLICUDDY, who was born 02 November 1912 and, Death Master File says, died 17 April 1996.
Search Archives for CORNELIUS MCGILLICUDDY.
Social Security number 184-03-7445 was issued to JAMES TOWEY, who was born 04 September 1910 and, Death Master File says, died December 1979.
Search Archives for JAMES TOWEY.
Social Security number 184-03-7446 was issued to JULIA TOOHEY, who was born 06 October 1887 and, Death Master File says, died December 1965.
Search Archives for JULIA TOOHEY.
Social Security number 184-03-7447 was issued to AUGUSTUS C WINTER, who was born 06 August 1914 and, Death Master File says, died 11 June 1988.
Search Archives for AUGUSTUS WINTER.
Social Security number 184-03-7448 was issued to MAY OSKINS, who was born 25 July 1905 and, Death Master File says, died June 1983.
Search Archives for MAY OSKINS.
Social Security number 184-03-7450 was issued to FRANK ONCAY, who was born 22 November 1892 and, Death Master File says, died March 1974.
Search Archives for FRANK ONCAY.
Social Security number 184-03-7451 was issued to EMMA W MCCUE, who was born 18 May 1903 and, Death Master File says, died 19 March 1998.
Social Security number 184-03-7457 was issued to SAMUEL J NEWMAN, who was born 25 April 1915 and, Death Master File says, died 13 April 1992.
Social Security number 184-03-7458 was issued to JOSEPH SPRINGEL, who was born 23 March 1901 and, Death Master File says, died May 1967.
Search Archives for JOSEPH SPRINGEL.
Social Security number 184-03-7460 was issued to MARION V PRY, who was born 21 October 1915 and, Death Master File says, died 10 August 1988.
Search Archives for MARION PRY.
Social Security number 184-03-7461 was issued to MAURICE SCHNELLER, who was born 17 November 1905 and, Death Master File says, died 21 November 1990.
Search Archives for MAURICE SCHNELLER.
Social Security number 184-03-7463 was issued to AUGUSTUS SHINER, who was born 27 February 1906 and, Death Master File says, died July 1972.
Search Archives for AUGUSTUS SHINER.
Social Security number 184-03-7465 was issued to EDWARD HANAS, who was born 19 April 1893 and, Death Master File says, died June 1966.
Search Archives for EDWARD HANAS.
Social Security number 184-03-7467 was issued to LILLIAN A KRETSCHMER, who was born 19 June 1909 and, Death Master File says, died 26 January 2000.
Search Archives for LILLIAN KRETSCHMER.
Social Security number 184-03-7468 was issued to LEO SHEPPARD, who was born 04 April 1902 and, Death Master File says, died September 1974.
Search Archives for LEO SHEPPARD.
Social Security number 184-03-7469 was issued to EDWARD WERNER, who was born 20 July 1918 and, Death Master File says, died 08 October 1990.
Search Archives for EDWARD WERNER.
Social Security number 184-03-7470 was issued to BERT L JOHNSON, who was born 17 June 1915 and, Death Master File says, died 14 February 1995.
Search Archives for BERT JOHNSON.
Social Security number 184-03-7476 was issued to SARKIS HAGOPIAN, who was born 15 February 1905 and, Death Master File says, died January 1966.
Search Archives for SARKIS HAGOPIAN.
Social Security number 184-03-7478 was issued to WILLIAM TAZEWELL, who was born 21 December 1918 and, Death Master File says, died February 1971.
Search Archives for WILLIAM TAZEWELL.
Social Security number 184-03-7481 was issued to ABRAHAM LIEBERMAN, who was born 23 April 1909 and, Death Master File says, died April 1962.
Search Archives for ABRAHAM LIEBERMAN.
Social Security number 184-03-7487 was issued to EVELYN K GREENLEAF, who was born 09 June 1917 and, Death Master File says, died 26 September 2004.
Search Archives for EVELYN GREENLEAF.
Social Security number 184-03-7488 was issued to ALBERT ALBRIGHT, who was born 16 December 1915 and, Death Master File says, died April 1984.
Search Archives for ALBERT ALBRIGHT.
Social Security number 184-03-7489 was issued to GEORGE ALBRIGHT, who was born 06 December 1913 and, Death Master File says, died July 1978.
Social Security number 184-03-7490 was issued to ALMA H WHIGHAM, who was born 10 May 1913 and, Death Master File says, died 25 December 2001.
Search Archives for ALMA WHIGHAM.
Social Security number 184-03-7491 was issued to ARTHUR H ROLAND, who was born 16 June 1902 and, Death Master File says, died 18 April 1988.
Social Security number 184-03-7493 was issued to JOSEPH FARRELL, who was born 03 July 1913 and, Death Master File says, died February 1977.
Social Security number 184-03-7494 was issued to FRANCES YOUNG, who was born 26 July 1891 and, Death Master File says, died April 1970.
Social Security number 184-03-7495 was issued to NORMAN PEACE, who was born 14 January 1893 and, Death Master File says, died 01 February 1968.
Search Archives for NORMAN PEACE.
Social Security number 184-03-7496 was issued to EDWARD ELAM, who was born 13 November 1901 and, Death Master File says, died August 1948.
Search Archives for EDWARD ELAM.
Social Security number 184-03-7497 was issued to THOMAS GAHAGAN, who was born 07 August 1915 and, Death Master File says, died August 1975.
Search Archives for THOMAS GAHAGAN.
Social Security number 184-03-7498 was issued to ANTHONY BABINSKY, who was born 21 April 1915 and, Death Master File says, died June 1972.
Search Archives for ANTHONY BABINSKY.
Social Security number 184-03-7501 was issued to JOSEPH DIGIOVANNI, who was born 05 September 1907 and, Death Master File says, died 16 March 1990.
Social Security number 184-03-7502 was issued to ANNA G GRING, who was born 18 February 1908 and, Death Master File says, died 08 December 1987.
Search Archives for ANNA GRING.
Social Security number 184-03-7504 was issued to HARRY HOLLOWAY, who was born 26 March 1906 and, Death Master File says, died April 1978.
Search Archives for HARRY HOLLOWAY.
Social Security number 184-03-7505 was issued to CHARLES CARTER, who was born 06 January 1902 and, Death Master File says, died August 1964.
Social Security number 184-03-7509 was issued to OTTO WEISS, who was born 22 October 1905 and, Death Master File says, died July 1979.
Search Archives for OTTO WEISS.
Social Security number 184-03-7510 was issued to RITA A BARRENTINE, who was born 17 March 1917 and, Death Master File says, died 02 August 2002.
Search Archives for RITA BARRENTINE.
Social Security number 184-03-7512 was issued to PEARL JEFFERSON, who was born 15 February 1896 and, Death Master File says, died February 1974.
Search Archives for PEARL JEFFERSON.
Social Security number 184-03-7515 was issued to HARRY JEFFERSON, who was born 10 September 1898 and, Death Master File says, died May 1982.
Search Archives for HARRY JEFFERSON.
Social Security number 184-03-7516 was issued to ROBERT ROBBINS, who was born 19 September 1910 and, Death Master File says, died November 1958.
Search Archives for ROBERT ROBBINS.
Social Security number 184-03-7519 was issued to MAGGIE MALONE, who was born 30 August 1896 and, Death Master File says, died September 1982.
Search Archives for MAGGIE MALONE.
Social Security number 184-03-7524 was issued to JOHN HEINLY, who was born 17 January 1897 and, Death Master File says, died June 1983.
Search Archives for JOHN HEINLY.
Social Security number 184-03-7526 was issued to HELEN B CONNELLY, who was born 12 August 1918 and, Death Master File says, died August 1995.
Search Archives for HELEN CONNELLY.
Social Security number 184-03-7527 was issued to CATHERINE HARRIS, who was born 19 April 1907 and, Death Master File says, died January 1983.
Social Security number 184-03-7530 was issued to BEATRICE SMITH, who was born 12 June 1891 and, Death Master File says, died March 1974.
Social Security number 184-03-7531 was issued to TERESA MCALEER, who was born 05 September 1895 and, Death Master File says, died December 1970.
Search Archives for TERESA MCALEER.
Social Security number 184-03-7532 was issued to DANIEL MCCONVILLE, who was born 23 May 1909 and, Death Master File says, died January 1973.
Search Archives for DANIEL MCCONVILLE.
Social Security number 184-03-7533 was issued to FRAWLEN ROBINSON, who was born 31 August 1901 and, Death Master File says, died March 1971.
Search Archives for FRAWLEN ROBINSON.
Social Security number 184-03-7534 was issued to ONOFRIO VOLPE, who was born 14 May 1899 and, Death Master File says, died June 1964.
Search Archives for ONOFRIO VOLPE.
Social Security number 184-03-7535 was issued to MARIE T TAYLOR, who was born 21 May 1911 and, Death Master File says, died 02 September 2000.
Social Security number 184-03-7536 was issued to PETER MCFARLAND, who was born 13 December 1893 and, Death Master File says, died November 1973.
Social Security number 184-03-7538 was issued to THOMAS P MCFARLAND, who was born 01 December 1891 and, Death Master File says, died 20 February 1990.
Search Archives for THOMAS MCFARLAND.
Social Security number 184-03-7539 was issued to LIT GRAVES, who was born 08 December 1879 and, Death Master File says, died March 1965.
Search Archives for LIT GRAVES.
Social Security number 184-03-7541 was issued to MARY K MCCORMICK, who was born 08 December 1902 and, Death Master File says, died 20 February 1989.
Social Security number 184-03-7542 was issued to JAMES KELLY, who was born 29 May 1885 and, Death Master File says, died August 1966.
Social Security number 184-03-7544 was issued to KITTY GRACE, who was born 21 March 1905 and, Death Master File says, died March 1978.
Search Archives for KITTY GRACE.
Social Security number 184-03-7546 was issued to MARGARET WERNER, who was born 13 July 1910 and, Death Master File says, died October 1974.
Search Archives for MARGARET WERNER.
Social Security number 184-03-7550 was issued to JOHN MAGUIRE, who was born 14 February 1913 and, Death Master File says, died January 1980.
Social Security number 184-03-7551 was issued to MARY LABIAK, who was born 26 October 1904 and, Death Master File says, died 07 October 1996.
Search Archives for MARY LABIAK.
Social Security number 184-03-7557 was issued to CHARLES BURKE, who was born 04 March 1893 and, Death Master File says, died September 1981.
Social Security number 184-03-7558 was issued to JULES KATZ, who was born 02 March 1896 and, Death Master File says, died June 1971.
Search Archives for JULES KATZ.
Social Security number 184-03-7560 was issued to GEORGE JENSEN, who was born 31 August 1909 and, Death Master File says, died March 1961.
Social Security number 184-03-7562 was issued to JOSEPHINE A LAWRENCE, who was born 23 May 1914 and, Death Master File says, died 02 October 1993.
Search Archives for JOSEPHINE LAWRENCE.
Social Security number 184-03-7563 was issued to MABEL H HERMAN, who was born 30 March 1900 and, Death Master File says, died 15 September 1992.
Search Archives for MABEL HERMAN.
Social Security number 184-03-7564 was issued to LEO WLODARCZYK, who was born 02 February 1913 and, Death Master File says, died December 1975.
Search Archives for LEO WLODARCZYK.
Social Security number 184-03-7565 was issued to WALTER KOWALEWSKI, who was born 22 June 1917 and, Death Master File says, died September 1986.
Search Archives for WALTER KOWALEWSKI.
Social Security number 184-03-7566 was issued to FRANK CARNEY, who was born 03 December 1906 and, Death Master File says, died November 1970.
Search Archives for FRANK CARNEY.
Social Security number 184-03-7567 was issued to RAYMOND GRADY, who was born 02 December 1913 and, Death Master File says, died 23 November 1992.
Search Archives for RAYMOND GRADY.
Social Security number 184-03-7568 was issued to MARGARET KNOBLOCH, who was born 01 March 1891 and, Death Master File says, died October 1983.
Search Archives for MARGARET KNOBLOCH.
Social Security number 184-03-7569 was issued to JAMES MCMONIGLE, who was born 10 December 1908 and, Death Master File says, died October 1972.
Search Archives for JAMES MCMONIGLE.
Social Security number 184-03-7573 was issued to JEAN BALIN, who was born 31 July 1917 and, Death Master File says, died 29 June 2004.
Search Archives for JEAN BALIN.
Social Security number 184-03-7575 was issued to HENRY A JANIK, who was born 02 November 1914 and, Death Master File says, died 02 October 1989.
Search Archives for HENRY JANIK.
Social Security number 184-03-7576 was issued to LESTER BEAL, who was born 03 February 1917 and, Death Master File says, died June 1978.
Search Archives for LESTER BEAL.
Social Security number 184-03-7577 was issued to HARRY ELLISON, who was born 06 September 1909 and, Death Master File says, died December 1972.
Search Archives for HARRY ELLISON.
Social Security number 184-03-7578 was issued to MORRIS A ABRAHAM, who was born 31 March 1913 and, Death Master File says, died 05 June 1993.
Search Archives for MORRIS ABRAHAM.
Social Security number 184-03-7579 was issued to ELSIE K ELLISON, who was born 12 October 1912 and, Death Master File says, died 15 July 1998.
Search Archives for ELSIE ELLISON.
Social Security number 184-03-7580 was issued to MEREDITH JACK, who was born 07 January 1897 and, Death Master File says, died March 1986.
Search Archives for MEREDITH JACK.
Social Security number 184-03-7581 was issued to JEANNETTA B JAFFE, who was born 25 December 1895 and, Death Master File says, died 06 January 1991.
Search Archives for JEANNETTA JAFFE.
Social Security number 184-03-7582 was issued to HARRY NOGGLE, who was born 21 December 1885 and, Death Master File says, died July 1967.
Search Archives for HARRY NOGGLE.
Social Security number 184-03-7583 was issued to PAUL MILLER, who was born 11 January 1899 and, Death Master File says, died September 1979.
Social Security number 184-03-7584 was issued to MAX BACHOVE, who was born 15 October 1889 and, Death Master File says, died November 1977.
Search Archives for MAX BACHOVE.
Social Security number 184-03-7585 was issued to ROBERT TOOMEY, who was born 08 February 1891 and, Death Master File says, died February 1968.
Search Archives for ROBERT TOOMEY.
Social Security number 184-03-7587 was issued to JOSEPH SWITKEN, who was born 15 February 1902 and, Death Master File says, died 20 September 1998.
Search Archives for JOSEPH SWITKEN.
Social Security number 184-03-7588 was issued to MILDRED A MAGRO, who was born 12 February 1914 and, Death Master File says, died 10 April 1989.
Search Archives for MILDRED MAGRO.
Social Security number 184-03-7589 was issued to MURIEL KRALL, who was born 25 October 1898 and, Death Master File says, died September 1981.
Search Archives for MURIEL KRALL.
Social Security number 184-03-7590 was issued to PAUL F CARLSON, who was born 23 March 1909 and, Death Master File says, died 09 February 1988.
Social Security number 184-03-7591 was issued to ROBERT J FIDDES, who was born 01 October 1900 and, Death Master File says, died 09 May 2000.
Search Archives for ROBERT FIDDES. | 2019-04-26T13:20:08Z | http://ssdmf.info/by_number/pages/044942.html |
This week marked four years to the day of the worst day of our lives. It was the day we found out Grace had INAD. And although so many things have changed since that day, I can remember every single detail of that one day.
It started off like any other day. Then, three-year-old Grace was at preschool in the morning, and while I was at work, I got a call from Grace’s geneticist at Children’s Hospital that they got the results of her genetic testing. The whole exome sequencing test, which looks at all 20,000 genes in the human body, was done in July, and was expected to take six months to complete.
This photo will always remind me of the day we found out Grace had INAD, but it also serves as a reminder to constantly look for ways to be happy.
Although, to some that would seem like an eternity to wait, I don’t think we honestly thought much about it. We knew there was only a slim chance the testing would turn up any results. And by slim, they told us less than 25 percent. A friend of ours in the genetics world, said in actuality, it’s closer to 15 to 20 percent. Because although the testing looks at all 20,000 genes, science only knows what 5,000-6,000 of those genes do.
So, we had the blood work done together in July, and then promptly forgot all about it. Grace had done other genetic testing and medical procedures to see about determining why she had some developmental delays, and they didn’t turn anything up. I just figured this test wouldn’t turn anything up either.
But that wasn’t meant to be in our world. After I picked Grace up from school, Kyle and I took her to the back of the newspaper office and called the genetics department at Children’s Hospital, certainly not ready for the news that would come.
Her geneticist, who is one of the most patient and compassionate medical professionals we have every encountered, carefully explained to us that Grace had a very rare genetic disorder called INAD, and that she would likely never recover.
It was a blow of monumental proportions, and I couldn’t even think straight. I took Grace to Litchfield to meet my mom for a standing Thursday lunch date at the Ariston and Kyle made sure to call his mom at work. I asked for a table in the back for lunch, and could hardly find the words to tell my mom that her only grandchild wasn’t likely to reach her tenth birthday.
Although Grace usually has physical therapy in Springfield on Fridays, she had an appointment at Children’s Hospital that day, so we scheduled PT a day early. I had planned to take Grace on my own while Kyle worked, but he offered to come with me so I didn’t have to be alone.
He met us in the parking lot outside the Ariston, and as we looked up, we saw a photo of the three of us on a billboard just outside Walgreens. Months before, we had agreed to be spokespeople for the Family Maternity Center at St. Francis Hospital (which is still our favorite place), and our billboard was put up that very day.
That’s one of the ways I remember the day we found out Grace had INAD. Kyle downloaded the Timehop app on my phone, and the #foreverhappydays photo from that day is a picture of our billboard.
We had done our #foreverhappydays photos for more than 180 days at that time, and had to decide whether or not to continue. My first thought was that we would never find a way to be happy again. I mean, our beautiful, only child had been diagnosed with a terminal illness that had no treatment or cure. What could there possibly be to be happy about?
It turns out a lot. And while many things have stayed the same, like countless doctor’s appointments for Grace in St. Louis and weekly trips to therapy, much has changed, like the addition of our spunky daughter, Charlotte Grace, who will turn two in February.
We use the doctor’s appointments and therapy sessions as a chance to have adventures together. Maybe we try a new restaurant or enjoy an afternoon at the St. Louis Zoo. But we always try to turn something that could be difficult into something we can all enjoy together as a family.
Shortly after Grace was diagnosed with INAD, Kyle and I had a fight in the kitchen. I was so angry that this could happen to our family. And he told me that I had two choices, I could continue to be angry, or I could find ways to be happy. He said that if I picked angry, I would miss all the really great things about Grace.
And he was right. We decided to continue our #foreverhappydays photos. While it’s sometimes a bitter reminder of the skills Grace has lost over the years, it’s also full of happy memories and a constant reminder that life is to be celebrated.
A friend of mine sent me a bookmark once that said, “Life doesn’t have to be perfect to be wonderful.” And our life may not be the perfect picture we hoped and dreamed for, but it’s pretty great. While Nov. 13, 2014 may always be one of the worst days of my life, that photo of the billboard is a great reminder of why we celebrate life every moment we’re given.
We've been pretty fortunate when it comes to doctor visits with Grace on our journey with INAD. Grace has been remarkably healthy despite this terrible disease, with just one one-day hospital stay in the books so far. We still see Dr. Ishmael at Litchfield Family Practice if Grace is seriously under the weather, but as far as specialists like orthopedics or ophthalmology, usually a routine annual visit is enough.
We had one of those annual visits on Monday as we made our way to St. Louis Children's Hospital. These trips are more of a necessity than a fun road trip, but we've done our best to make the visits as enjoyable as possible, usually adding in a trip to the zoo or a fun place to eat either before or after.
We weren't sure if that was going to be possible this time around as we were meeting a new neurologist at 11 a.m. and set up a meeting with Dr. Kotzbauer at 2 p.m. to catch up and talk about his work in INAD research. Three hours may seem like a long time, but last year they were running an hour behind at neuro so we had in our minds that lunch at the hospital cafeteria might be in the cards.
Grace was all smiles when we had lunch at Pappy's.
To be completely honest, neurology appointments have been a mixed bag for us. Some have been really good and productive. Some have not. We will leave it at that. That changed today as we had one of our best appointments period, and we're not saying that just because we told her about our blog.
Dr. Griffiths listened to us, wanted to know about Grace and provided us with a lot of information about things we had been wondering about. We even had some of the hard conversations about the future, a topic that has left us less than thrilled in previous appointments. Dr. Griffiths' compassion and the fact that she listened to us made all the difference in the world and we left Children's today with smiles on our faces.
Charley was just as excited as her dad about lunch!
We also left at 11:45, meaning that the world was our oyster in terms of lunch options. Normally on our trips to St. Louis, we go for a familiar name, literally. Grace Meat+3 has become one of our favorite places in the world, because of its food, because of its atmosphere and because of its amazing people. Unfortunately, it's closed on Monday and Tuesday, so Monday doctor appointments force us to look elsewhere.
On the bright side, one of the country's best barbecue restaurants is just a few blocks from the hospital so Pappy's Smokehouse has been our regular Monday post-appointment haunt. Grace was given a little pig on our first visit to Pappy's and Charley had her first real food there after another appointment. I have an awesome picture of her sucking the barbecue sauce off one of the rib bones.
As always, the food was excellent and the staff was super nice. Despite it being straight up noon, no one rushed us away as Mary fed Grace, which takes a little over an hour under ideal conditions. There's a level of comfort at Pappy's that is similar to what we love about Grace Meat+3. You see people of all walks of life there, all coming together to enjoy the fruits of someone's brilliant labor.
Charley loves making new friends!
After lunch we visited with Dr. Kotzbauer at his office, dodging raindrops to get from the car to his office building at the Washington University School of Medicine. The work that he is doing with gene therapy and enzyme replacement therapy is jaw dropping. Progress is never as fast as he, or we, would hope, but we know that the work he is doing now has potential to be very important down the road. It's always fun to catch up with him, tell him about what Grace has been doing and visit with members of his team. We are extremely fortunate that he works in St. Louis and is so eager to take time to talk with us.
As I said earlier, these trips could be a chore. We'd much rather be hanging out at home or doing something a little more fun with the girls, but as we've found out on our Grace Filled Journey, life is what you make of it. Ultimately, when all is said and done, we won't remember the waiting rooms and long drives. But we will remember the compassion of those caring for Grace and the good times that we get to have as a family.
While she may not be able to tell us, we know that the State Fair has always been a special place for Grace. She received her AmTryke from the Springfield American Business Club at the State Fair. She got her picture taken with Queen Summer Robbins at the State Fair. And she had her first mini donut at the State Fair. All memorable moments for sure.
Charley got to pet a rabbit in the FFA tent!
Kisses for a baby calf!
This year was no different as we had one of our best trips to the fair yet. We weren't sure we were going to make it in 2018 due to some time conflicts, but we managed to find some time to go on Friday, Aug. 17. Mother Nature threatened to rain on our parade, literally, but we avoided the heavy stuff for the most part.
Hanging out with the baby chicks!
Grace hanging out with Jonah Elvidge's sheep.
The fair almost always revolves around food for us (ie. the aforementioned mini donuts), so our first stop was at the commodities pavilion for a burger, an italian beef and a hot dog. Charley was supposed to get the hot dog, but decided to hold out for something else instead.
Charley would have stayed all day in the ag tent playing with the corn.
After lunch, we made our way to the FFA petting zoo, which was a highlight of our trip. Neither Mary nor I did FFA when we were in school, but we have a great fondness for the program. Grace, a little tired from PT, slept through most of the excursion, but we may have a future farmer on our hands with Charley. After a brief and hesitant encounter with a bunny, Charley warmed up to the baby calf, trying to kiss it on the nose. The calf was equally affectionate, attempting to gnaw a hole in Mary's pants.
Charley loved dancing (and trying to get in the puddles) to Liz Bentley.
Just like Grace was when she was her age, Charley was equally attracted to the rest of the animals, not always willing to pet, but definitely content to check out the goat, baby chicken and lamb, which belonged to Jonah Elvidge. The Elvidge family have been huge supporters of Grace and our journey so it was cool to see their name on the side of the pen for everyone to see. We were also awful proud to see Hillsboro's Peyton Tester's picture in the exhibit honoring all of this year's star farmers.
Professor Longhair included Grace in his magic show at Kids Korner.
Cheesing with Professor Longhair after his show.
After the FFA exhibit, we went to an Illinois Agriculture tent, where Charley could have stayed for hours playing in the corn and with the tractors. We made a brief stop at the Illinois State Police tent, then headed to the dairy barn for a cream puff and some ice cream. By this time Grace had woken up and Charley thought the ice cream sounded better than the hot dog, so we found a spot under the Lincoln Stage pavilion to feed the girls.
Mommy's favorite exhibit is the butter cow!
It turned out to be a perfect fit as Mary fed Grace while we listened to Liz Bentley sing on stage. We really enjoyed the music (Charley even danced a little) and we hope that Miss Bentley continues on her path.
By the time Grace was done eating, the rain had stopped and we made our way to the Kids Corner, where Grace's friend Professor Longhair was doing a magic show. The good professor has performed at both of the Grace 5K races and has been an awesome friend to our little girl. We really enjoyed the magic show and we were touched that Professor Longhair always made sure to come to the back row where we sat to make sure that Grace saw the trick too. People that talk to Grace and treat her like every other kiddo are our favorites.
Our favorite little Mini Donut . . .
Once the show finished, we had one last stop at the cow barn, where Charley tried her hand at milking a cow. Again, I think we have a future farmer on our hands. Who knows, maybe Aunt Monica can get her into showing cattle. We made one last stop for some mini donuts and we made our way out of the fairgrounds with two sleepy girls.
Charley got to milk a cow for the first time!
We made one more stop in Springfield at Grandma Kim's work to say hi before we went home though. Mini donuts are always her favorite so we wanted to make sure that she had a little pick me up while she finished up her Friday. Ever helpful, Charley made sure the bag wasn't too heavy and had five donuts while we waited for Grandma to come out. Both girls gave my mom big smiles when they saw her and it was an awesome end to the trip.
All tuckered out at the fair.
It's not always going to work for us to go to the fair, but we are really glad that it did this year. We had a lot of fun, took a lot of pictures and of course, ate quite a few mini donuts. Hopefully we can do the same next year.
There were plenty of storylines regarding the 100th annual PGA Championship, held at Bellerive Country Club near St. Louis. There was Brooks Kopeka winning his second major of the year and third in 14 months. There was the return to form of Tiger Woods, who played like the Tiger of old and nearly caught Kopeka. And there was the swarms of people who invaded the fairways of Bellerive and provided a spark to a city desperately in need of something positive. And that's just a taste of the stories from what was a truly special event.
Flat Gracie thought the PGA trophy was huge!
Flat Gracie checks out the leaderboard.
My focus however was on a small piece of paper adorned with a purple drawing of a princess and two slogans that have been a huge part of my family's life since November 2014. That was when we found out that our daughter Grace, who will be seven on Sept. 7, had a rare genetic disorder called infantile neuroaxonal dystrophy or INAD. It's been a long road since then, with doctor visits, physical therapy and a lot of tears, but it truly has been a Grace-Filled Journey, one of the two aforementioned slogans.
The other words on the sign were #BeatINAD, which is more of a rallying cry. Since we learned of Grace's condition, we've raised close to $200,000 for INAD research in hopes of one day curing our little girl. Even if that never happens, we feel truly blessed that our small county of fewer than 30,000 people has shown us such love and support.
Flat Gracie checks out the fairway at Bellerive.
Throngs of golf fans came out to the PGA tournament.
But back to the PGA Championships. Prior to Sunday, I had never been to a PGA event, let alone a major. The closest I had come was covering an LPGA tournament in Springfield, IL, for the newspaper that my beautiful wife Mary and I both work for. That was cool, but Sunday's final round was a different animal entirely.
I'm a novice PGA fan at best, so attending the event in person wasn't really on my radar until my brother Daniel texted me that his wife Monica had received four tickets through her job in Columbia, MO. I almost turned them down, Sunday is a busy day for us at the paper, but I thought better of it and made plans to head to Bellerive.
You couldn't help but be in awe of the talent of these players. Par is a bad day. Bogeys and doubles are almost unfathomable. For me, it's a miracle if get out of the clubhouse without putting a ball in the water. It was one of the first times that I really understood the passion that golf fans have for the sport.
Since neither my brother, nor the other two guys joining us had ever been to a PGA event before, we just wandered around and tried not to look too out of place. Eventually we made it to the first hole, just in time to watch Rory McIlroy, one of the best players in the world. As McIlroy and Michael Lorenzo-Vera made their way down the first fairway, my attention turned to the rolled up paper with the princess on it.
Flat Gracie, which we had dubbed the sign, had already made appearances on our vacation to Washington D.C. and Mary's trip to the Superman statue in Metropolis. Similar to the Flat Stanley project that many elementary school students partake in, our thought is that our friends and followers on social media might get a kick out of where Flat Gracie might end up.
Flat Gracie checked out the PGA fans.
That first photo led to dozens more as I took every chance I could to snap Flat Gracie's picture with some of the best golfers in the world, plus a few guys that just seemed cool. In addition to McIllroy and Lorenzo-Vera, I also got Flat Gracie pics while Tommy Fleetwood and Jordan Speith were playing through.
Our new favorite golfer, Branden Grace.
My favorite shots though are the ones with Branden Grace, a South African golfer who I didn't know existed until Sunday. I'm not sure if it's God putting these things in front of us or just happenstance, but our lives seem to be filled with links to Grace. It's led us on some amazing adventures and has created some great friendships, like the one with James Beard Award nominee Rick Lewis of St. Louis' Grace Meat+Three restaurant. I'm hoping to reach out to our new favorite golfer on social media, but even if we never connect, it's pretty cool that he and Grace share the name.
Flat Gracie followed golfer Branden Grace.
With work looming, I left around 3 p.m. to make my way back to Hillsboro, IL. It was tempting to blow off work, with the roar of Tigermania echoing in the distance, but duty called. After all, I had been to an event that some could only dream of and had made a ton of good memories with my brother and Flat Gracie.
Grace loved her new "Brooks" teddy bear.
Before leaving, I stopped at the pro shop to pick up a few souvenirs for the girls at home, a bear we named "Brooks" in honor of the champ for Grace, a sippy cup for her little sister Charlotte (aka Charley Danger) and a fun pair of socks for Mary with the tournament logo on them. I managed to snag a couple logo golf balls and a Tervis cup for myself as well, just as a reminder of the day.
Not that I needed one on the way home or that night. My thoughts hovered around how much fun I had at Bellerive and how blessed I am to have that opportunity to go and raise a little awareness for INAD. While we try to give Grace as many experiences as possible, some things, like the tournament, just aren't in the cards. Even if she's not with us in person though, Grace is always in our hearts and on our minds. Everything I do is because of that little girl and like the 100th PGA Championships, being her dad is a once in a lifetime opportunity. | 2019-04-18T17:14:56Z | http://a-grace-filled-journey.blogspot.com/2018/ |
Buff Orpington Chickens are a heavy hardy bird that lays all winter. They are great dual-purpose birds, and can go broody, too!
The Buff Orpington Chickens are a color variation of the Orpington breed. This breed was originally developed in England in the town of???_ you guessed it: Orpington. The Buff Orpington was first admitted to the Standard in 1902 after bringing the older Black Orpington first to America in 1890.
The Buff Orpington is a wildly popular breed of chicken for a few different reasons. Their docile and relaxed temperament makes them an easy bird for just about anyone to own. While they initially gained popularity because of their use as a meat bird, the Buff Orpington is classified as a dual-purpose breed that is used primarily for brown egg production.
A mature Buff Orpington is loosely feathered and looks much heavier than it is. All of their plumage is of a rich golden buff with pinkish white beaks, shanks, and toes. They have a five-point single comb that is of medium size.
Buff Orpingtons are very hardy and therefore easily adapt to many different environments. They adapt to confinement and also do well in free-range. Their full feathers help them stay warm and lay throughout the winter. They are excellent mothers and don’t hesitate to go broody. Their beautiful appearance and great production make them a great addition to any farm.
All 5 chicks I ordered arrived very healthy and are doing very well. I ordered all females, and am hopeful I have no roosters. Too early to tell yet.
Ordered 5, they arrived in 2 days. All are healthy and doing well at 1 week old now.
This big breed came to us happy and healthy…I wa estatifc to find this breed from eFowl.
Awesome chicks Great growth and structure. Great temperament with other types of chicks.
These Buff Orpington Chicks are beautiful and healthy. One week old today and all alive and well. Excellent. Thanks for the extra chick you sent.
My Buff Chicks arrived healthy and happy. However, I would suggest offering us the customer the ability to pay for shipment of the chicks (all chicks) via PRIORITY USPS. The post office told me that is the only way to “guarantee” it will be delivered on time. I panicked because my tracking was showing the chicks still in Missouri a day after shipment when they were acutally en route to my rural post office. The post office employees were even anxious about their arrival on time.
These chicks are so calm. My kids love holding them. Arrived healthy as promised. Very fast shipping.
healthy looking and so cute we only have lost one.
efowl comes through every time! This is my 6 th order with them over the years. Great birds, great customer service.
All chicks arrived healthy and are doing great after 1 week.
Ordered 5 Buff Orpingtons in an order of 15 chicks total. Received 6, all in good health. They are about 1 week old now and thriving.
Received them last week. They all made it safely to the post office. Chicks seem healthy and happy in their new home. We did not loose any we have ordered. Great service, efowl! Thank you.
Chicks arrived in excellent condition.
I was very happy with my buff orpingtons. Arrived earlier then estimated. All healthy and friendly chicks. Thanks!
We have been getting our Buff Orpington chicks from Efowl for many years. Excellent birds and excellent company. Thanks Efowl!!
We are very pleased with our baby chicks. Everything went as planned and the chicks appear to be healthy and happy. We will shop with you again. Thank you for everything!
I have ordered from efowl on a couple of occasions over the last 4 years. I always order Buff Orpington and aside from the wait I experienced this time (expected ship dates) I have been pleased with the price and health of the chicks when they arrive.
All are here and alive doing excellent.
I ordered 15 buffs and those babies were fiesty! Thank you so much. They arrived the day after they were shipped. Sent 2 extras, too… Will definitely order from Cackle Hatchery again!
The chicks actually arrived about 18 hours before I was expecting them because shipping was very fast. They were healthy, vigorous, and all are still living almost a week after we got them. We did have one chick that appears to have a deformed leg. We are trying to treat it and see if it will be okay. Luckily the hatchery included extra chicks in our order just in case this one doesn’t make it. Thanks eFowl!
Ordered 5 received 5 healthy babies!! Just came in from sitting in their nursery!! I can’t stay away from them!!
All 25 received alive and one week latter all are still alive and growing .
I have had buff Orphington chickens in the past and so glad to have more. They have been my best brooding chicken of all. So far so good after one week all 5 are still alive and doing well.
Ordered 5 Buffs and all arrived in great spirits. They are now one week from ship date and look amazing. Couldn’t be happier with our order!
We received all of the chickens in our order alive and healthy. They are growing nicely. This is a project for our kids and they are thrilled!
We are pleased with our Buff Orpington chick purchase. Would be good to include some simple instructions.
All of my chicks are doing fantastic and they arrived 1 day early. I could not be any happier!!
We were extremely happy with our chicks when they arrived. The chicks were marked male for distinction and were all very strong and healthy. We purchased chicks from a different web site 2 years ago but this was by far a better experience. Thank you!
This chick’s above all others are trusting, great personality, very playful with me, just a a pleasant breed overall.
They Were Shipped Wed. 8/26, arrived on Thurs. 8/27. 1 dead on arrival, rest were very active and vigorous, 1 week old now , have not lost any more than the 1 on arrival. they seem very healthy. have 25 left. post office called very soon as I called them for an fyi on the 26th. Thank’s DJB.
Big Beautiful wonderfully healthy chicks. Cockrels are readily identified. Fast shipping. Very pleased. I highly recommend eFowl!
Our little girls are growing beautifully!!
The Buff Orpington Chick’s are the fluffy chick’s of the bunch and they arrived happy and healthy. Can’t wait to see what they look like when they get older!
All my chicks came healthy and full of energy.
Love ordering from eFowl. they kept me updated on when my order would ship and arrive. the chicks came in prompt and healthy. Will defiantly order again.
Arrived on time and very healthy. Growing rapidly and friendly and fun to watch. Very Satisfied.
I received my order much faster than I expected. All chicks where live but 2 where a little weak and died 2 weeks later. Considering there was an extra and no cross beaks or anything like that I feel that I was quite lucky and satisfied with my order. The rest are very healthy and growing very fast. Thanks to eFoul I will once again have my own fresh eggs.
Chicks made it to the post office in Kennedy Al in good condition. I took them home and introduced them to water and feed. The chicks immediately became to scratch and peck the feed and have been doing so ever since.. The chicks are growing rapidly and doing well.
This was the breed most recommended by our friends. They all have at least a couple of them and are very pleased with the egg production and temperament of the birds. They arrived healthy and active. They should be a fun bird to watch grow.
All of my chicks are healthy and beautiful! I will definitely order again from eFowl.
My chics were ship with very fast shipping . They were only in transit for one full day !! Amazing! They are all healthy and happy . I just want to thank you for a great first time ordering online . We will definitely only order from your site in the future . Thank you again and may god bless your company and family.
all of them is butifal….
I ordered 3 and recieved 4 beautiful happy chicks.
We have ordered from efowl twice before to buy dominique chickens and had been really thrilled with them, so we wanted to try something different. We ordered 10, but one of them was severely deformed. Still, customer service refunded it and made the disappointment enjoyable.
Lost one in the first 24 hours. But E-foul did send two extra chicks in the order of 25. Thank you !!
The chicks arrived in great shape and are dping well. We have them in a plastic tub with a light on them and they are doing great. I would purchase from e-foul again.
Two weeks and doing fine. On time and healthy.
The chicks arrived when they were supposed to and in great condition! They are beautiful!
All arrived alive and healthy and all are doing well as it has been 6 days since their arrival.
Cute, sweet and alert! Chicks arrived safely, healthy and happy. Settled quickly. Beautiful chicks!!
Chicks are doing very well and healthy.
These little chicks arrived happy and healthy and have remained health.
everytime I look out the window and see these beautiful chickens running around the yard it makes me want to say thank you for doing what some other hatcheries could not.
Great experience all around. I received excellent communication about dates of arrival and shipping, the birds arrived on time and healthy, and there were 2 extra chicks as a bonus.
The only reason I give these chicks four stars is because I ordered three and received two. I don’t mine at all because I still received more chickens total than ordered. These guys are going to grow the biggest but are the smallest fuzzies in the batch. Straight run gave me one pullet and one cockerel, both incredibly kind to us and the other birds.
All arrived healthy and right on time. Will order again in the future.
I received my birds on time. I ordered 15 and received 17. All are healthy and beautiful. I’m very thankful I found eFowl online. Thank you!!
Dear efolw I believe you guys did a wonderful job of keeping me updated on my purchase. Great job! Sad to say I ordered 25 chicks and now only 20.
These are neat and very friendly birds.. They are eating me out of house and home..lol Great personalities cant wait till they can go outside and run the pen!!
These chicks are a little standoffish and a little on the small side but still nice disposition. They are broody even at this age and already love to plop down on a nest. Very healthy.
I love my chick’s they came in exactly when said they would. They were all alive and ready to play when they got here. We introduced them to their new home, food and water and they dove right into the food…lol It looked like people diving into the water at a pool. They are healthy and happy. Great service!
I ordered 16 buff orphington chickens on April 16 received them on April 29 and received one extra.so a total of 17. Very happy with them. All arrived alive and are all still doing great. Will definitely be ordering from efowl again.
The chicks arrived in good health. They are alert, active and healthy. This is my first try with chickens, but every thing is going smoothly so far. Thanks for the extra chick, it was a nice gesture.
Ordered 36. 38 arrived, one DOA and stiff – apparently died close to shipping out. Have to wait to determine which died (ordered 35 female, 1 rooster). Others are eating us out of house and home as expected. Very healthy and alert.
This was our first time with raising chickens and buying live birds online. I felt eFowl made it effortless. We initially tried to head down to our local feed store, however the birds quickly sold out and they had an odd waiting list program at a much higher price… needless to say we wanted to be sure our chicken coop was full for the season so we started searching online. From the time of order to expected hatch/ship date the process was flawless. I was a little worried at first what might happen to them during transit, but just as eFowl communicated in their FAQ section the post office does an excellent job of handling them. The post office in our area actually really enjoyed having the birds arrive chirping away and took great pride in handing them well. They all arrived very healthy and eFowl even put in an extra chick, maybe in the event of a loss. We will definitely be back again, except we may try eggs just for a different experience with the full hatch.
Jocelyn was amazingly helpful! eFowl will be the vendor to which I return.
These little ones arrived on time, were safe and are doing great in their cozy new home with the appropriate heat lamp, food and water for their size.
Thank you eFowl for a job well done.
Very pleased with the Buffs. They are very healthy and beautiful.
Arrived healthy. We did not lose one. I love their color and they are beginning to come around on being handled. They love to eat out of your hand. For 1.5 week old chicks they are very entertaining.
These buffs came strong and healthy. They are doing great.
These are among the most content and healthy chicks I have ever received from a hatchery and I have been raising chickens for almost 50 years.
Absolutely love how sweet these chicks are!
These guys seemed to struggle with the shipping process. Of 26 chicks (11 Buffs, 15 Australorps), I lost 4 Buffs upon arrival, but was able to revive a 5th. The Black Australorps that came with them did much better (lost 1). The Buffs seem to be fine now though at one week.
One of the chicks passed away two days later.
Very happy with your service !
This is our first foray into chickens. The order process was easy, communication was prompt and helpful and our chicks arrived when promised and in good health!
One arrived with a hatch/congenital defect and died, which occasionally happens in any hatch, but the rest doing great. The packing for cold winter shipping worked well.
The chicks arrived as promised and the packaging was professional. That was impressive.
One of the chicks was clearly ill on arrival and died within an hour; two other chicks became listless within 24 hours and died. The remaining 12 are lively and healthy.
I don’t think the three deaths were a management issue but am concerned that they may have been diseased in some way.
I do appreciate your follow up.
Ordered 15 chicks, shipped super quickly and girls were all (and still are) in great shape and healthy upon arrival. They are now 2 1/2 weeks old and are growing fast. Very happy with my first chick shipment from eFowl.
I would recommend having your chick area set up well before you expect shipment, because mine came so fast I wasn’t quite ready and I was scrambling to find a warming bulb. That was my own fault, and everything still turned out great.
Our shipment of Orpingtons and 10 Plymouth Rock barred chicks arrived this morning and we only lost one chick upon arrival. (I think the rest of them were just crowding it like a mosh pit and trampled the poor little thing,) but the rest of them are doing well and happily chirping under the heat lamp in their brooder box! They have been sipping water and are pecking the chick starter on a paper towel that I placed in there. Nice looking little chicks!
My chicks arrived safely (as always) and all are still in good health. I do not buy my poultry anywhere else. You all at eFowl are the best.
My husband and I are new to chickens. I ordered a mix of 3 breeds at a total of 15 chickens. All arrived healthy and chirping away at the post office! We even got an chick for free. A week later and all birds are doing great, growing, and healthy. Thank you! Will definitely order again!
Nice healthy large chick. Good natured too.
Very happy with my order. The chicks were shipped on the day promised, arrived heathy, and have been thriving since. I will definitely br ordering from eFowl in the future.
Love my chicken’s these one’s are so special, have not raised these before, so looking forward to them.
I ordered 15 buff orpington chicks and received 16. Very kind to send an extra. They arrived healthy and intact. Ordering online was easy. However, approximately 5 look like they are not buff orpingtons. They are differently colored. If they are all females and good layers, I don’t really mind. Just strange to receive a mixed batch.
Chicks arrived when I expected them, all of them are lively a week later, even the extra chick thrown in :) I’m pleased with my order.
They came on the date expected, they all arrived lively and chipper. Very happy!
Chicks are a week old now, growing fast. Assimilating to barn life well. Very calm and friendly, easy to handle. Seem to enjoy handling, actually. No signs of illness.
Overall is fine, but one chick is dead.
These guys are growing nicely! They arrived in good condition without issues.
I received 5 Buff Chicks in a total order of 25 chicks. I received them about a week ish after I ordered and the chicks came next day to my post office after I received shipping notification. I’ve had the chicks 1 1/2 weeks now and ALL of them are thriving! I am VERY pleased with efowl and will use them again, this is my 2nd time using them.
They came to me fast and all alive.
The chicks look great and are very healthy. I am very impressed with this hatchery and will order from them again for sure.
I was very pleased with with your services. All my chickens were alive and healthly.
Received our chicks after getting the notice from eFowl as to when to expect them. Chicks were healthy. Good job!
The Buff O’s are a VERY sweet breed of bird. They arrived safe and healty along with 11 other chicks from 2 different breeds. They seem to get comfortable with their owner fairly quickly(within a week or less) and though a little “chirpy” at first, they seem at complete peace held in your hand, or when seated – roosting on your shoulder and taking a nap. Thank you eFowl!
All my pullers arrived healthy and alive. No complaints. I even got an extra chick in my order! I ordered 10 and got 11.
Thank you, all healthy and happy, arrived safe and sound!.
It’s great to have chicks / chickens again!
All 15 of my sweet Buff Orpingtons made it to us safe and sound. They are all happy and healthy and growing like weeds. We received e-mail updates as they were shipped and they traveled from CO to GA in less than 24 hours!! I was amazed and delighted. The post office even called us at 6:30 in the morning asking if we wanted to come and get them. Ordering from eFowl was a great decision!
Arrived at the Post Office to find box of very healthy, active chicks. One week and they are growing, not one chick lost in the order. Appreciated the communication and prompt response to my email.
I received a total of 150 chicks (50 of each breed) with only one chick not surviving transport. Sadly I lost 3 more over the first 3 days but I have always received a couple of extra chicks with my order so I’m still at 151. Everyone else is growing and feisty and already practicing their running. This is the only company I use for new chicks when my girls can’t hatch their own and I’m never disappointed.
We received our order when they said we would and the baby chicks were in perfect condition.
ordered 24 straight run. all arrived well and are still well (think it’s been almost a week) they sent 2 extra and I appreciate that.
They all arrived in great condition and after a week they are all still doing great.
I received my order, all chicks alive and doing well. Thank you for your time and consideration on my order, i am sure i will order from you again in the future.
All Buffs are healthy and well as of 5-14, Thank you!
All arrived nice and healthy. Easily identified in packaging with other chicks. Fast delivery. Still have all my chicks plus the extras. :) eFowl is awesome. .
Chicks where in great shape when we unpacked them. Will order again in the future.
All of the buffs arrived in good condition and are running around in good health.
I got my buff Orpington pullets in last week and they are doing great! They are beautiful and easy going. I’m looking forward to growing my flock and gathering eggs in the future. Thank you E Fowl!
I ordered 5 hens and 1 rooster. Hens are doing fine. I couldn’t figure out what was wrong with the rooster as he kept running from one side of the container to the other hitting the walls and pecking at the air. I studied him for a while and then decided to put my finger in front of his eyes. He didn’t flinch. Had a hard time teaching him to drink from the waterer and had to put him ‘in’ the food and make pecking noises with my finger for two days to get him to eat. Still not sure he is going to make it as he is very weak and not growing nearly as fast as the others. I wanted one rooster of each type that I ordered. Not sure what to do?
Yes, this happens sometimes with yellow chicks during shipping. On rare occasions when they get stressed they peck at the shinny black eyes that stand out against the yellow body. Dampen 6 times a day with moist cloth and triple antibiotic ointment also helps on the skin part of eye. Generally clears in 5 days and healed. We have rarely seen blindness.. this is a very rare problem, but it does happen.
I love the new additions to my family! Ordered 25 Buff Orpingtons and received 26 very healthy & sturdy baby chicks. They were packaged & shipped safely to my local post office as promised and are doing well in their new home. Very pleased with my order and will purchase from efowl.com in the future! Great company that stands behind their promises!
Very sweet chickens had this breed before and am delighted to have them again .very perky healthy chicks.
We received our birds all alive. Everything is still good with them. Would have liked to have received a little more information with them. | 2019-04-23T08:30:16Z | https://www.efowl.com/shop/buff-orpington-chickens-cackle/ |
This statistical information is estimated using postcode data provided in the current registered office addresses of community interest companies on the public register of companies.
We have completed some of our key initiatives recently including installing Voltage reduction technology at our main ministerial building, 1-19 Victoria Street, adjusted building temperature set points and are engaging with staff to help us achieve the target.
Mr Davey: A recruitment freeze is currently in place, which affects all external recruitment into the Civil Service, with exemptions allowed for business critical and frontline posts. The Fast Stream graduate programme is also exempt.
If Departments decide they need to recruit staff to one of the Top 200 Civil Service posts (the most senior posts in the Civil Service) there is a protocol drawn up by the Senior Leadership Committee and the Civil Service Commissioners. It outlines the process in which appointments to and within the Top 200 are handled.
Within BIS, the only Senior Civil Service recruitment we have undertaken since the introduction of the recruitment freeze is for a Director General level Economist. As a major economic department of state the Senior Leadership Committee agreed that this was a business critical post and could be filled by an open competition to ensure that the department had the best field of candidates to consider for the role.
Following the spending review, BIS is reviewing its organisational design, and is considering the need for senior recruitment as part of that process.
Mr Davey: Having a strong, robust and transparent minerals sector is vitally important for the prosperity of many countries. We welcome measures to bring an end to illegal activities in mining and the trade of minerals, and to make the sector more productive and accountable.
We encourage British companies trading in natural resources from countries which are in a state of internal conflict to do so in a way which is socially, economically and environmentally responsible, and to adhere to the voluntary guidelines set out by the OECD.
There is considerable international work currently in progress at the moment and we remain of the view that voluntary initiatives such as the OECD Guidelines for Multinational Enterprises and Extractive Industries Transparency Initiative (EITI) are effective tools. The Government consider international approaches are likely to work better than any national approach.
Mr Prisk: We are committed to working with the private sector to establish a Green Investment Bank that is effective in mobilising additional private sector investment into green infrastructure projects. The precise nature of the Green Investment Bank is subject to further design and testing work.
Mr Prisk: I refer the hon. Member to the Chancellor's spending review statement of 20 October 2010.
As the Chancellor had announced, we will be funding the Green Investment Bank from £1 billion of departmental budgets, as well as from additional significant proceeds from Government's asset sales. While it would not be appropriate to speculate on the timing of asset sales, the use of these proceeds should provide opportunities for additional funding to be available over the next five years.
Mr Prisk: Ministers are currently examining the proposals in detail, looking at how they will support economic growth, before providing feedback to partnerships shortly. Discussions have also been had with partners from the North East on their proposals.
Mr Prisk: This Department is responsible for supporting enterprise though Community Development Finance Intuitions and we work closely across Government on this agenda. CDFIs are independent financial institutions, serving a specific disadvantaged geographic area or disadvantaged groups. CDFIs provide loans to start-up companies, individuals and established enterprises from within that area or community who are unable to access finance from more traditional sources ie banks. Accredited CDFIs are able to raise lending capital through the Community Investment Tax Relief (CITR). Some CDFIs are also accredited Enterprise Finance Guarantee lenders and CDFIs are able to borrow money through EFG. Government also support the EU PROGRESS Microfinance Facility which in turn supports microfinance across Europe.
The Government have announced a New Enterprise Allowance which will support start-ups among the unemployed.
Mr Prisk [holding answer 25 October 2010]: HM ambassador in Mongolia provides support to UK business with interests in Mongolia, including in respect of specific contracts and investments. The British Government are aware of some specific UK business engagements in Mongolia, such as a Rio Tinto deal to mine copper and gold at the Oyu Tolgoi development.
Mr Davey: The Government have made no recent assessment of the current Summer Time arrangements but we continue to listen to representations we receive and consider any evidence presented to us.
Mr Prisk [holding answer 25 October 2010]: The previous Government announced the provision of £5 million of training support to Tata Steel (then Corus) in June 2009. £2.5 million of that funding was delivered by the Regional Development Agencies (Yorkshire Forward and One North East) in December 2009. A further £2.5 million was also earmarked to be provided to the company in those regions through Train to Gain. The offer of assistance was intended to contribute to training the work force, retain capacity in the UK and to help the company through the downturn and to recover more strongly as economic conditions improved.
Almost 100 learners at Corus TCP undertook training in Business Improvement Techniques, using Train to Gain funding, with learning delivered by Gateshead College in 09/10. The Skills Funding Agency continues to work constructively with Tata Steel across a number of its sites in different regions to identify training opportunities that are eligible within the current Train to Gain rules and within future funding arrangements, and which are consistent with state aid requirements.
(1) From 12 October 2007 to 31 March 2008.
(2 )From 1 April 2010 to 30 September 2010.
The top 20 bonus payments are shown as follows divided into ranges. The table gives the range value of the top 20 payments.
Lynne Featherstone: For the most recent 12 month period for which figures are available-September 2009 to August 2010-the Government Equalities Office spent £14,255 on overseas visits by its senior officials.
Mr Gauke: HMRC currently provides advice to small businesses through the HMRC website, 'Taxhelp' and other pages of businesslink.gov.uk, a range of dedicated and general telephone help lines, and face to face appointments in HMRC Enquiry Centres. Around 70% of small and medium sized businesses engage professional help to manage some or all of their financial requirements including tax matters. Both small businesses and tax agents can also access information and advice through face to face advice events, published bulletins for employers and CD ROMs.
HMRC supports small businesses in temporary financial difficulties by providing time to pay arrangements allowing tax debts to be budgeted for in instalments. In addition to this, HMRC continues to reduce administrative burdens and remains committed to simplifying the tax system to reduce the costs for small businesses in complying with their tax obligations. HMRC are increasingly working through third parties to offer necessary support where they know that businesses are more likely to respond to messages from these sources.
This information is based on a snapshot as at August 2009 of all child benefit claims.
Take-up rates for child benefit are not available by constituency. It is estimated that approximately 97% of families in the UK claim child benefit.
future changes may be considered appropriate and the UK will be closely involved in any European initiative affecting the foreign exchange market.
As regards the regulation of retail foreign exchange services, I refer the hon. Gentleman to the reply I gave the hon. Member for Tewkesbury (Mr Robertson) on 19 October 2010, Official Report, column 677W.
A recognition bonus scheme for delegated grades which recognises exceptional in year performance.
HMRC does not hold any bonus data by role.
A two-year pay freeze applies to HMRC staff for grades below senior civil service (SCS) in 2011-12 and 2012-13. This affects everyone earning more than the full-time equivalent of £21,000 a year. As part of the freeze, the bonus pot for staff in delegated grades has been frozen as a percentage of paybill at the previous year's level. A pay freeze is in place for the SCS in 2010-11.
Mr Gauke: Under and overpayments have been a feature of the PAYE system since it was introduced in 1944. They are mainly caused by a change of circumstances in year and are not usually the result of an error.
Treasury Ministers were advised in July 2010 that HMRC intended to commence automated end of year reconciliation processing using the new National Insurance and PAYE Service (NPS).
Mr Gauke: The information requested is available only at disproportionate cost, as HMRC does not hold those data in relation to MPs' constituencies.
A two-year pay freeze applies to HMRC staff for grades below Senior Civil Service (SCS) in 2011-12 and 2012-13. This affects everyone earning more than the full-time equivalent of £21,000 a year. A pay freeze is already in place for the SCS in 2010-11.
Mr Gauke: The following table provides information on the total number of disciplinary cases dealt by HMRC, as HMRC's systems do not disaggregate disciplinary cases by the term "error".
HMRC does not handle poor performance as a disciplinary matter. It is dealt with under separate Managing Poor Performance procedures. However, the following table includes figures for the numbers of dismissals as a result of poor performance or poor attendance.
The expenses paid to staff in management grades in the month to 30 September 2010 was £597,208.90; a breakdown by management grade is available only at disproportionate cost.
Gregory Barker: The European Commission is expected to launch its NER process by the end of October and our aim is to publish guidance for UK projects in relation to the NER once the NER call is launched and we have more detailed information regarding that process.
In parallel we are developing the scope and selection process of the UK CCS programme and will set out proposals on how further demonstration projects will be taken forward by the end of the year.
Gregory Barker: The Government remain committed to the Coalition programme for government policy of providing public sector investment for four CCS demonstration plants. The October 2010 Spending Review announced that up to £1 billion will be invested in the first of these projects. We are now developing our approach to the additional three demonstration projects and will set out proposals on how these projects will be taken forward by the end of the year.
NER 300 but it is not possible to say how many will meet the requirements of that process until more details are available from the European Commission.
The Commission is expected to launch its NER process later this month and our aim is to publish guidance for UK projects in relation to the NER once the NER call is launched and we have more detailed information regarding that process.
Gregory Barker: The Department encourages a culture where good attendance is expected and valued. However, it recognises from time to time absences for medical reasons may be unavoidable. The Department aims to treat its staff who are ill with sympathy and fairness and where possible provide them with support which will enable them to recover their health and return to work.
Gregory Barker: The information requested could be provided only by incurring disproportionate costs.
Gregory Barker: The Government are keen to encourage a wide range of innovative approaches to buying and selling energy, particularly those which maximise local opportunities and meet the demands of local people. That is why for example local authorities were recently given the power to sell electricity from renewable sources.
will be launched in November and will provide advice and support for these groups, and include information on co-operative business models.
Gregory Barker: DECC Ministers regularly meet with stakeholders from the heating industry. During the past few months, the Green Deal has been included in these discussions. We will continue to meet with a range of stakeholders as the Green Deal develops, including the heating industry.
Gregory Barker: Green Deal will support energy efficiency measures which constitute a fabric change to the property and pay for themselves through real reductions in household fuel bills. One of the most cost effective ways to do this is through insulating homes and this will be a focus of Green Deal. The types of energy efficiency improvement that will fit within the Green Deal framework will be the subject consultation ahead of secondary legislation on the Energy Security and Green Economy Bill.
Gregory Barker: The energy security and green economy Bill will be introduced at the end of the year and will confirm our precise approach to improve the energy efficiency of the Private Rented Sector under the Green Deal.
The Green Deal will offer Private Rented Sector landlords a real opportunity to invest in their property at no up-front cost. It will remove the spilt incentive that has previously hampered progress in the sector and allow tenants to repay the cost of energy efficiency measures through their energy bill savings.
Gregory Barker: It is the Government's intention that no changes will be made to tariffs for those already receiving feed-in tariffs. Any change to tariffs resulting from a review of the FITs scheme will be directed solely on new entrants joining the scheme.
Gregory Barker: The renewable status of heat pumps is set out in Directive 2009/28/EC, dated 23 April 2009. The criteria for determining the renewable energy contribution from a heat pump is described in Annex VII of that Directive. This indicates that the Commission will establish, by 1 January 2013, guidelines on how member states are to estimate the renewable energy contribution. The Directive does not require the energy, and associated CO2 emissions, used in the manufacture of heat pumps and fluorocarbon gases to be taken into account when assessing the renewable energy contribution.
Directive 2005/32/EC, the framework for the setting of ecodesign requirements for energy-using products, requires the Commission to consider the life cycle and environmental aspects of energy using products. The Commission has yet to agree the ecodesign criterion for heating technologies, including heat pumps, though consultation documents have not included these wider energy aspects. The magnitude of manufacturing energy use is small compared with the 'in-use' energy consumption.
Gregory Barker: A DECC/DEFRA recent review of hydrofluorocarbons (HFC) consumption and emissions forecasting estimated that 0.05 kilo tonnes of HFC was emitted from ground source heat pumps in the UK in 2008, based on 3,500 installed heat pumps. The review emphasises that these estimates are highly uncertain, although very small in relation to HFC emissions from other sectors. The review did not locate sufficient information to make an estimate of HFC emissions from air source heat pumps.
Gregory Barker: There are a range of programmes that promote energy efficiency measures including CERT, CESP and Warm Front.
The Carbon Emissions Reduction Target (CERT) is an obligation on energy suppliers to reduce domestic carbon emissions. Suppliers meet their obligation by promoting the uptake of energy efficiency measures in households.
(1) Data are collected based on the number of measures installed. It is assumed that each household treated receives 1.3 measures as some homes will receive both loft and cavity wall insulation. These estimates are made from the Energy Savings Trust's Home Energy Efficiency Database (HEED). The most complete national data available for CERT are from Ofgem. At national level HEED has under recorded the number of measures by 3% in 2008-09 and 19% in 2009-10 compared to the OFGEM totals.
(2) No information currently available.
The Community Energy Saving Programme (CESP) targets designated low income areas across Great Britain with whole house energy efficiency retrofits.
Warm Front provides heating and energy efficiency measures and energy efficiency advice to vulnerable households.
These figures include households receiving measures that have been traded with CERT. The number of households assisted in the CERT and Warm Front tables above may have in some cases been double counted.
The number of people employed directly in energy efficiency products and services in the UK has been estimated by the Energy Efficiency Partnership for Homes as 50,000.
The effect on the number of new jobs of commissioning the work to undertake the energy efficiency measures is not known for CERT, CESP or Warm Front.
Gregory Barker: To pave the way for the Green Deal, to ensure supply chains grow to meet future challenges and so that consumers have opportunities now, we announced this summer a restructured and extended Carbon Emissions Reduction Target on energy suppliers to December 2012. The revised scheme has a renewed focus on insulation, which we estimate will deliver insulation to some 3.5 million households by December 2012.
Charles Hendry: Due to the complexity of the sites, storage cost of spent fuel and intermediate level waste cannot be easily apportioned because each stream shares common resources, management arrangements and facilities. The total expenditure on Magnox reactor sites (for the year ended 31 March 2009) was £590 million. This included the operational cost for the two generating sites, Wylfa and Oldbury, of £164 million and power generating revenue of £324 million. The cost to maintain safe compliant condition on non operational sites is approximately £159 million.
DECC, through NDA, continually drive cost efficiency into the decommissioning and waste management programme through stringent oversight and developing appropriate commercial arrangements. Cost reduction is ultimately driven through by reducing hazards at the sites by retrieving and packaging waste so that it can be stored passively and safely. Early remediation, within funding constraints, is the key to reducing ongoing liability. DECC are currently considering, as part of the current spending review, a programme that will not only meet funding constraints and accelerate hazard remediation, but also reduce the long term Nuclear Liability Estimate (NLE) at Magnox Sites by between £l billion and £1.2 billion.
Charles Hendry: As part of the spending review process, the Government announced they will not be taking forward the previous Administration's plans of funding the Renewable Heat Incentive scheme through an overly complex renewable heat levy. The forthcoming RHI will not, therefore, impact directly on domestic or non-domestic gas bills.
The outcome of the feasibility study does not preclude a privately financed scheme coming forward. My officials are talking to private sector consortia about their ideas.
Gregory Barker: Funding for the Warm Front scheme was announced in the spending review through to 2012-13. Government will work to improve the cost-effectiveness of Warm Front by ensuring that the scheme is best targeted to help the most vulnerable receive free or subsidised heating and insulation measures, through a more focused programme. We will be consulting to ensure that the eligibility criteria support this objective.
At the same time, we are working towards a further package of measures that will help support more of the most vulnerable and fuel poor households to keep their homes warm at an affordable cost. Through the CERT extension, from April 2011, we have introduced a greater focus on targeting energy efficiency measures at the most vulnerable households by introducing a Super Priority Group. And we intend to introduce mandated Social Price Support in April 2011, to replace the existing Voluntary Agreement in order to provide direct energy bill support to a large number of vulnerable households.
people against price rises through greater energy saving, with special support for the most vulnerable. The new Energy Company Obligation, which will take over from current schemes from the end of 2012, will run in parallel with and serve to underpin parts of the Green Deal programme. It is intended to focus particularly on households who cannot achieve financial savings without additional support, including the poorest and most vulnerable and those in hard to treat homes.
We expect energy companies to play an even greater role than they do through the current obligations in ensuring the poorest and most vulnerable can afford to heat their homes adequately. This includes offering a wider range of measures which improve energy performance, such as heating systems.
Mr Gibb: The Fifth Annual Independent Academies Evaluation Report from PricewaterhouseCoopers found that there is evidence of academies increasing collaboration with neighbouring primary schools and secondary schools. It also found that neighbouring schools have increasingly realised the benefits they can derive from academies with some adopting policies introduced by academies-the report found that this had a positive impact on other local schools.
More recently, the National Audit Office report on Academies did "identify effective examples of partnership working with other schools, particularly 'feeder' primary schools".
All outstanding schools that convert will be expected to partner and provide support to weak schools to help improve standards. Currently, the former and existing city technology colleges are sponsoring over 20 academies or are supporting weaker schools. We will continue to monitor the progress and performance of academies and ensure that they remain accountable against the results and outcomes they are expected to deliver.
Mr Gibb [holding answer 19 October 2010]: Wade Deacon school has been allocated £28.6 million of conventional capital funding, and The Grange school has been allocated £35.3 million of PFI credits for the secondary school phase. As the Grange school will be an all-through school, Halton borough council is also planning to convert around £6.5 million of its primary capital grant into PFI credits.
Mr Gibb [holding answer 27 July 2010]: On 5 July the Secretary of State announced a review of the Department's capital programmes. The review will make recommendations to help shape the decision of future capital investment in schools including those in Warrington North constituency. The aim is to ensure that investment represents good value for money and strongly supports the Government's ambitions to reduce the deficit, raise standards and tackle disadvantage.
The Secretary of State has not had any recent discussions with or representations from Warrington borough council about Building Schools for the Future (BSF).
On 26 July my noble Friend the Parliamentary Under-Secretary of State for Schools met with the hon. Member for Warrington South (David Mowat) to discuss the impact of the BSF cancellations on schools in Warrington.
Tim Loughton: It is clearly important to collect information about the number of children who have gone missing from care. This is a key indicator of whether looked after children are being appropriately safeguarded. The Department collects information on the number of looked after children absent for more than 24 hours from their agreed placement. However it is the responsibility of local authorities to safeguard and promote the well-being of children in care and they will hold more detailed information on each child who has gone missing from their care. They are expected to use this to inform their processes and procedures, and the training of staff and carers, to minimise the risk of children going missing from local placements.
Anne Milton: I have been asked to reply.
No such estimate has been made. It is currently for individual primary care trusts within the national health service to commission services for their resident population, including services for children with a chronic condition requiring medical treatment.
Tim Loughton: The property at Butts Street, Coventry is occupied wholly by the Qualifications and Curriculum Development Agency (QCDA). It is intended that following the abolition of the QCDA in 2012 the lease for the building will be transferred to the Department for Education.
The Department is presently reviewing options for the future use of the building and a decision has not yet been taken.
Tim Loughton: The average cost to the Department for Education, in August 2010, for processing payment of invoices was £1.60 for invoices processed electronically and £3.41 for invoices processed manually. Based on August 2010 figures, 98.61% of the Department's invoices were processed electronically and 1.39% processed by cheque.
Tim Loughton: For the period from May to September 2010 the Department estimates it has reduced carbon dioxide emissions by over 9%.
also a communications campaign to encourage staff and building users to reduce their energy use as far as possible.
Tim Loughton: The Department for Education was formed on 12 May 2010. Information for 2009-10 relates to its predecessor, the Department for Children, Schools and Families.
The tables on the website break the data down by grade, as well as by age, gender and geographical location.
Tim Loughton: The Department for Education (DFE) was formed on 12 May 2010. The information covers its predecessors, the Department for Children, Schools and Families (DCSF) and the Department for Education and Skills.
No data are available for the period prior to 1 April 2003 as they were not routinely collected centrally or by Departments.
Due to the wide range of posts and salary points in the Department, the actual costs of absences could be obtained only at disproportionate cost. Estimate costs of absence for the Civil Service between 2003 and 2007 are set out in the reports on the Cabinet Office website.
The latest published information shows the average number of working days lost (AWDL) for staff for the rolling period 1 July 2009 to 30 June 2010 at 6.6 days. The tables on the DFE website break the figures down according to grade, age, gender and geographical location.
No data are available for the period prior to 1 April 2003 as it was not routinely collected centrally or by departments.
The data, broken down as requested, could be obtained only at disproportionate cost.
responsibilities to undertake work previously carried out by our NDPBs, at this stage of the reform programme.
The Secretary of State announced the closure of the British Educational Communications and Technology Agency (BECTA) and the Qualifications and Curriculum Development Agency (QCDA) earlier this year. Some activity formerly undertaken by BECTA will return to the Department and will result in staff transferring into the Department under TUPE/COSOP arrangements. No decisions have been made about transferring activity undertaken by QCDA.
The number of staff to be made redundant due to the closure of these NDPBs is not known. There are consultations under way or about to commence with staff which could result in some staff retiring or leaving under voluntary severance terms.
The current cross-Government recruitment freeze also means that staff who leave are not replaced unless they are considered critical to continuous effective delivery until closure.
On 14 October 2010 the Cabinet Office announced the initial findings of the coalition Government's pledge to increase the transparency and accountability of public bodies. The announcement gave an update on Government-wide plans to abolish, merge, reform or review 901 NDPBs. The work to review and reform public bodies continues in the Department and its outcome will inform decisions about the future of its other NDPBs. This, combined with the outcome of the comprehensive spending review, is likely to mean further staff reductions across the Department and its NDPBs, but it is not possible to give an indication of the numbers at this time.
Tim Loughton [holding answer 13 October 2010]: The Secretary of State has not received any recent representations on the effect of family debt on the educational attainment of children in deprived areas.
been stopped at present while we await the outcome of the capital review which will report at the end of this calendar year.
Mr Gibb: From 2008-09 section 251 budget and outturn statements we estimate that 93.8% of funding for maintained schools in 2008-09 came from central Government, 0.2% from the local authority, and 6% from other sources.
Tim Loughton: The Government have committed to reviewing the criminal records regime in order to scale it back to common sense levels; meanwhile, previous statutory guidance remains in force. To meet inspection standards, a school must follow statutory guidance unless there is a compelling reason not to.
The guidance states that visitors or contractors who come on site only to carry out emergency repairs or service equipment will not require a CRB check. However, the guidance makes clear that contractors do need to undergo a CRB check if they are going to be left unsupervised on school premises or if they are going to come into contact with children. Of course, the vast majority of contractors will not come into contact with children because, for health and safety reasons, children should not be allowed in areas where builders are working.
The scope of the review will be announced shortly. The Government recognise the costs and other difficulties for applicants and employers which can arise, and will be looking at a more cost-efficient and effective way of doing things, balancing the need for people to have the freedom to go about their daily lives while safeguarding children.
Tim Loughton: The Government are committed to reforming social work and took early steps in June 2010 to confirm its support for the Social Work Reform Board which is taking forward the recommendations of the Social Work Task Force; to confirm funding for social work reform in 2010-11; and to announce the Munro Review of Child Protection which will make final recommendations in April 2011 for improving frontline child protection services.
including options for a new Assessed Year in Employment, building on the existing Newly Qualified Social Worker programmes in the adult and children's sectors. The Social Work Reform Board will advise Government on options for the Assessed Year in Employment over the course of the coming year and the Government will consider very carefully how to take this forward.
Mr Gibb: The School Teachers' Pay and Conditions Document already provides maintained schools in England and Wales with the option of making additional payments or providing other financial assistance, support or benefits to a teacher in order to retain their service.
The Government will keep under review the impact that the pay freeze has on teacher recruitment and retention.
Teachers and other education professionals will be at the heart of the Schools White Paper, to be launched later this year, because everything else the Government want to achieve in education flows naturally from the quality and professional status of the work force.
Tim Loughton [holding answer 18 October 2010]: Ofsted published the results of their full inspection of Nottinghamshire's safeguarding and looked after children services on 21 May 2010. This report judged the council's safeguarding services to be 'inadequate', highlighting deficiencies in quality and timeliness of frontline practice, work force capacity and application of thresholds.
The Department issued the council with an Improvement Notice on 29 June, containing a range of targets for the council to meet within a prescribed timescale. As set out in the Improvement Notice, officials from the Department routinely attend the council's monthly Improvement Board, which supports and challenges the council's ongoing plans for improvement.
Officials also met the council recently to review progress against the requirements of the Improvement Notice, and a final review will take place when performance data relating to June 2011 are available. At that stage, Ministers will take a view as to whether any further action is necessary to secure the safety of Nottinghamshire's at-risk children and young people.
Mr Duncan: The Department for International Development's (DFID's) policy is to ensure that all contracts represent value for money, by maximising efficiency savings and quality from every contract we have with consultants. All work for DFID is paid for in arrears, if we are satisfied with the product. In certain markets, we can often obtain services for less than £300 per day. Sometimes, however, complex market conditions affect fee rates, and require us to pay more, for example in specialised markets or difficult operating environments such as fragile states. In these circumstances a universal fee rate cap is not feasible.
Mr O'Brien: Quality management statements are provided by suppliers at the Pre Qualification Questionnaire stage of a competitive process. This provides assurances that suppliers the Department for international Development (DFID) does business with comply with the Quality and Health and Safety standards provided by the Office of Government Commerce (OGC). This is an integral part of our assessment of a supplier. Suppliers are asked to provide either an accreditation certificate or, as an alternative, details of their quality management systems. Therefore we do not anticipate this requirement to have an impact on small and medium size enterprises winning DFID business.
Mr Andrew Mitchell: The Department for International Development (DFID) does not formally distinguish between the categories of (a) "fragile" and (b) "conflict-affected" states. DFID uses a range of criteria drawn from internationally recognised indices, including the World Bank's Country Policy Institutional Assessment Index, the Failed State Index of the Fund for Peace, and the Uppsala datasets of Armed Conflict to determine which states are "fragile and conflict-affected".
conflict resources which is managed jointly by the Department for International Development, the Foreign and Commonwealth Office and the Ministry of Defence.
Mr Andrew Mitchell: The increase in Official Development Assistance (ODA) to fragile and conflict-affected states will be drawn from the departmental budgets of the Department for International Development, the Foreign and Commonwealth Office and the Ministry of Defence, together with the separate Conflict Pool settlement.
Mr Andrew Mitchell: The Department for International Development (DFID) is reviewing all bilateral and multilateral programmes to ensure resources are focused where they will achieve most impact. The outcome of the reviews will determine final allocations across the Department, including to fragile and conflict-affected states.
Funding for conflict and fragile affected states will also be provided from the separate settlement on conflict resources. The Conflict Pool does not draw its resources from departmental budgets; it is part of a separate HM Treasury settlement on conflict resources which is managed jointly by the Department for International Development, the Foreign and Commonwealth Office and the Ministry of Defence.
Mr Hoban: I have been asked to reply.
Treasury Ministers regularly meet with multilateral institutions, including the International Monetary Fund, on a wide range of policy issues.
Anne Milton: The Department has not carried out any formal assessment of the Advisory Committee on the Safety of Blood, Tissues and Organs (SaBTO), which was established in January 2008. However, the chair of SaBTO carries out periodic appraisals for each of the SaBTO members, which include a review of members' performance. Appointments are reviewed regularly. Officials regularly meet with the chair to discuss the work of SaBTO.
However, as part of the implementation of the changes to the Department's advisory non-departmental public bodies (ANDPBs), we will be implementing a periodic review process, of all our significant advisory committees and ANDPBs which will incorporate an assessment of performance and effectiveness.
Anne Milton: No formal assessments have been made of these committees themselves. The Chairmen and Health Protection Agency secretariats review members' contributions on an annual basis. The Department is satisfied with the advice they have provided over many years.
As part of the implementation of the changes to the Department's advisory non-departmental public bodies (ANDPBs), we will be implementing a periodic review process (three yearly), of all our significant advisory committees and ANDPBs which will incorporate an assessment of performance and effectiveness. Wherever possible this will be conducted by an independent expert. Members' attendance and performance are assessed by committee chairs and secretariat when reappointments are considered.
Anne Milton: The Department does not maintain an annual record of the cost to the national health service of treating people with such illnesses.
There has been no recent estimate of the annual cost to the NHS of treating alcohol-related illnesses; however, a review into the total cost of alcohol harms was carried out by the Department in 2008. The cost of alcohol harm to the NHS in England estimates that the total cost of alcohol harms to the NHS is around £2.7 billion a year. A copy of this review has already been placed in the Library.
Earlier this year, Policy Exchange estimated that the wider cost to society of tobacco use is almost £14 billion per annum. In their report, 'Cough up', they looked at the cost of early death or retirement due to sickness, payment of benefits to support widows and families, the costs of sickness at work to employers, the human and financial costs of smoking-related fires, smoking breaks at work and cleaning up cigarette butts. A copy of this report has been placed in the Library.
Department statistics show that, in England in 2007-08, there were estimated to be 945,000 alcohol-related hospital admissions, which is 7% of all hospital admissions.
It is estimated that up to 35% of all Accident and Emergency attendance and ambulance costs may be alcohol-related.
The National Audit Office has carried out an audit of NHS spend on alcohol treatment. Its report, Reducing Alcohol Harm: health services in England for alcohol misuse, was published in November 2008 and found, that where primary care trust expenditure on alcohol services was known, an average of £600,000 was spent on commissioning alcohol services in 2006-07.
Paul Burstow: The White Paper 'Equity and Excellence: Liberating the NHS' set out our proposals to devolve power and responsibility for commissioning services to local consortiums of general practitioner (GP) practices.
GPs play a crucial role in co-ordinating patient care and committing national health service resources through daily clinical decisions. Our proposals for this new model of commissioning draw on the regular contact that GPs have with patients and their more detailed understanding of patients' wider health care needs.
We propose that GP consortiums will be responsible for commissioning the great majority of NHS services. In doing this, they would also play a crucial role in ensuring that patients have an opportunity to exercise greater choice and control over their care and treatment, including choice of any willing provider of services.
will provide a framework to support GP consortiums in commissioning services, including setting commissioning guidelines on the basis of clinically approved quality standards developed with advice from National Institute for Health and Clinical Excellence, in a way that promotes joint working across health, public health and social care. We also propose that the NHS Commissioning Board would take the lead on promoting and extending patient involvement and choice.
'Liberating the NHS: Commissioning for Patients' invited views on a number of areas of the commissioning agenda. The engagement exercise closed on 11 October and the Department is now analysing all of the contributions received.
'Liberating the NHS: Greater choice and control', published on 18 October, seeks views on how we implement the choice commitments in the White Paper, including what can be done to encourage GP consortiums to offer appropriate choices to their populations. The consultation closes on 14 January 2011.
Paul Burstow: The Care Quality Commission undertakes assessment of hospital and social care services to ensure they meet essential standards of quality and safety. These standards include the delivery of care, treatment and support for all individuals.
The Autism Strategy consultations provided some personal experiences of hospital services for people and children with autism, which will inform the planned statutory guidance for health and social care bodies to support delivery of the strategy. The statutory guidance is to be published by the end of December 2010.
Paul Burstow: The Cancer Reform Strategy (CRS) included the commitment that the NHS Breast Screening Programme would be extended to women aged 47 to 73. In June this year, we confirmed in the Revision to the NHS Operating Framework 2010-11 that all local breast screening units should begin the extension in 2010-11. To date, 14 breast screening units have expanded.
A copy of the framework has already been placed in the Library.
The Department has issued guiding principles to SHAs, specifying that the funding is intended to pay for the purchase of drugs, and primary care trusts are expected to meet the associated service costs related to provision of these medicines.
and a copy has been placed in the Library.
Paul Burstow: The ban on blood donations from those living with chronic fatigue syndrome/myalgic encephalomyelitis (CFS/ME), to be introduced from 1 November 2010, is a precautionary measure. At the moment there is no clear evidence for the cause of CFS/ME, and health professionals should continue to use their clinical judgment to provide health and social care based on existing guidelines.
Mr Simon Burns: I refer the hon. Member to the written answer I gave the hon. Member for Houghton and Sunderland South (Bridget Phillipson) on 18 October 2010, Official Report, column 567W. | 2019-04-24T08:48:06Z | https://publications.parliament.uk/pa/cm201011/cmhansrd/cm101026/text/101026w0005.htm |
Contemporary fencing is the word used for modern sport fencing which is very different than the martial use of the sword (also known as western art of combat with the small sword); Sport fencing is also called olympic fencing which began in the end of the 19th century, with the Italian school having modified the "classical fencing", and the French school having later refined the Italian system.
Modern fencing uses three weapons, and so is divided respectively into three competitive scenes: foil, sabre (spelled "saber" in the United States) and épée. Most (but not all) competitive fencers choose to specialize in one of these only.
Competitive fencing is one of five activities which have been featured in every one of the modern Olympic Games, the other four being Athletics, Cycling, Swimming, and Gymnastics.
Fencing is governed by Fédération Internationale d'Escrime or FIE. Today, its head office is in Lausanne, Switzerland. The FIE is composed of 145 national federations, each of which is recognized by its country's Olympic Committee as the sole representative of Olympic-style fencing in that country.
The FIE maintains the current rules used for FIE sanctioned international events, including world cups, world championships and the Olympic Games. The FIE handles proposals to change the rules the first year after an Olympic year in the annual congress. The US Fencing Association has slightly different rules, but usually adhere to FIE standards.
The ancestor of modern fencing originated in Spain, where several books on fencing were written. Treatise on Arms was written by Diego de Valera between 1458 and 1471 and is one of the oldest surviving manuals on western fencing shortly before dueling came under official ban by the Catholic Monarchs. In conquest, the Spanish forces carried fencing around the world, particularly southern Italy, one of the major areas of strife between both nations. Fencing was mentioned in the play The Merry Wives of Windsor written sometime prior to 1602.
The mechanics of modern fencing originated in the 18th century in an Italian school of fencing of the Renaissance, and, under their influence, was improved by the French school of fencing. The Spanish school of fencing stagnated and was replaced by the Italian and French schools.
He established the essential rules of posture and footwork that still govern modern sport fencing, although his attacking and parrying methods were still much different from current practice. Although he intended to prepare his students for real combat, he was the first fencing master to emphasize the health and sporting benefits of fencing more than its use as a killing art, particularly in his influential book L’École des armes (The School of Fencing), published in 1763.
The first regularized fencing competition was held at the inaugural Grand Military Tournament and Assault at Arms in 1880, held at the Royal Agricultural Hall, in Islington in June. The Tournament featured a series of competitions between army officers and soldiers. Each bout was fought for five hits and the foils were pointed with black to aid the judges. The Amateur Gymnastic & Fencing Association drew up an official set of fencing regulations in 1896.
Fencing was part of the Olympics Games in the summer of 1896. Sabre events have been held at every Summer Olympics; foil events have been held at every Summer Olympics except 1908; Épée events have been held at every Summer Olympics except in the summer of 1896 because of unknown reasons.
Starting with épée in 1933, side judges were replaced by the Laurent-Pagan electrical scoring apparatus, with an audible tone and a red or green light indicating when a touch landed. Foil was automated in 1956, sabre in 1988. The scoring box reduced the bias in judging, and permitted more accurate scoring of faster actions, lighter touches, and more touches to the back and flank than before.
There are three weapons in modern fencing: foil, épée, and sabre. Each weapon has its own rules and strategies.
Foil: a light thrusting weapon, with a maximum weight of 500 grams. The foil may target the torso (including the back), neck, and groin, but not the arms or legs. The foil has a small circular hand guard that serves to protect the hand from direct stabs. As the hand is not a valid target in foil, this is primarily for safety. Touches are scored only with the tip; hits with the side of the blade do not count, and do not halt the action. Touches that land outside of the target area (called an off-target touch) stop the action, but are not scored. Only a single touch can be scored by either fencer at one time. If both fencers land valid touches at the same time, the referee uses the rules of "right of way" to determine which fencer gets the point. If both fencers begin their attack at the same time, or the referee is unable to determine who was first, neither fencer scores a point.
Épée: a thrusting weapon like the foil, but heavier, with a maximum total weight of 770 grams. In épée, the entire body is valid target. The hand guard on the épée is a large circle that extends towards the pommel, effectively covering the hand, which is a valid target in épée. Like foil, all hits must be with the tip and not the sides of the blade. Hits with the side of the blade do not halt the action. As the entire body is legal target, there is not the concept of an off-target touch, except if the fencer accidentally strikes the floor, setting off the electric tone. Unlike foil and sabre, épée does not use "right of way", and allows simultaneous hits by both fencers. However, if the score is tied in a match at the last point and a double touch is scored, the point is null and void.
Sabre: a light cutting and thrusting weapon that targets the entire body above the waist, except the weapon hand. Like the foil, the maximum legal weight of a sabre is 500 grams. The hand guard on the sabre extends from pommel to the base of where the blade connects to the hilt. This guard is generally turned outwards during sport to protect the sword arm from touches. Hits with the entire blade or point are valid. As in foil, touches that land outside of the target area are not scored. However, unlike foil, these off-target touches do not stop the action, and the fencing continues. In the case of both fencers landing a scoring touch, the referee determines which fencer receives the point for the action, again through the use of "right of way".
Fencing outfits are made of tough cotton or nylon. Kevlar was added to top level uniform pieces (jacket, breeches, underarm protector, lamé, and the bib of the mask) following the Smirnov incident at the 1982 World Championships in Rome. However, Kevlar breaks down in chlorine and UV light, complicating the cleaning process.
In recent years other ballistic fabrics, such as Dyneema, have been developed that resist puncture and which do not have Kevlar's issues. FIE rules state that the tournament outfits must be made of fabric that resists a force of 800 newtons (180 lbf) and that the mask bib must resist double that amount.
Form-fitting jacket with strap (croissard) which goes between the legs. In sabre fencing, jackets that are cut along the waist. A small Plastron, an underarm protector, which goes underneath the jacket and provides double protection on the sword arm side and upper arm. There is no seam under the arm, which would line up with the jacket seam and provide a weak spot.
One glove for the weapon arm with a gauntlet that prevents blades from going up the sleeve and causing injury, as well as protecting the hand and providing a good grip.
Breeches or knickers which are a pair of short trousers that end just below the knee. The breeches are required to have 10 cm of overlap with the jacket. Most are equipped with suspenders (braces).
Knee-length or thigh high socks which cover knee and thighs.
Mask, including a bib which protects the neck. The mask can usually support 12 kilograms (26 lb) on the metal mesh and 350 newtons (79 lbf) of penetration resistance on the bib. FIE regulations dictate that masks must withstand 25 kilograms (55 lb) on the mesh and 1,600 newtons (360 lbf) on the bib. Some modern masks have a see-through visor in the front of the mask. These have been used at high level competitions (World Championships etc.), however, they are currently banned in foil and épée by the FIE, following a 2009 incident in which a visor was pierced during the European Junior Championship competition. There are foil, sabre, and three-weapon masks.
Plastic chest protector, mandatory for females. While male versions of the chest protector are also available, they were, until recently, primarily worn by instructors, who are hit far more often during training than their students. These are increasingly popular in foil, as the hard surface increases the likelihood that a hit fails to register, as well as with youth competitors.
Lamé is a layer of electrically conductive material worn over the fencing jacket that entirely covers the valid target area. It is worn only in foil and sabre, and serves to distinguish hits on target from those that are off-target. In épée, the entire body is a target, so it is not necessary to have a lamé. In foil the lamé is sleeveless, while in sabre the lamé has sleeves and ends in a straight line across the waist. A body cord is necessary to register scoring: it attaches to the weapon and runs inside the jacket sleeve, then down the back and out to the scoring box. In sabre and foil the body cord connects to the lamé in order to create a circuit to the scoring box.
Fencing masters often choose a heavier protective jacket, usually reinforced by plastic foam to cushion the numerous hits an instructor has to endure. Sometimes in practice, masters wear a protective sleeve or a leg leather to protect their fencing arm or leg.
Traditionally, the fencers' uniform is white (black for instructors). This may be due to the occasional pre-electric practice of covering the point of the weapon in dye, soot, or colored chalk in order to make it easier for the referee to determine the placing of the touches. As this is no longer a factor in the electric era, the FIE rules have been relaxed to allow colored uniforms (save black). The guidelines also limit the permitted size and positioning of sponsorship logos.
Techniques or movements in fencing can be divided into two categories: offensive and quickly defensive. Some techniques can fall into both categories (e.g. the beat). Certain techniques are used offensively, with the purpose of landing a hit on your opponent while holding the right of way (foil and sabre). Others are used defensively, to protect against a hit or obtain the right of way.
Attack: A basic fencing technique, also called a thrust, consisting of extending the sword arm to declare an attack and attempt to land a touch upon the opponent's valid area. In sabre, attacks are also made with a cutting action.
Riposte: An attack by the defender after a successful parry. After the attacker has completed their attack, and it has been parried, the defender then has the opportunity to make an attack, and take right of way (foil and saber).
Feint: An attack with the purpose of provoking a reaction from the opposing fencer.
Lunge: A thrust while extending the front leg by using a slight kicking motion and propelling the body forward with the back leg.
Beat Attack: In foil & sabre, the attacker beats the opponent's blade to gain priority (right of way) and continues the attack against the target area. In épée, a similar beat is made but with the intention to disturb the opponent's aim and thus score with a single light.
Disengage: Beginning an attack in one direction, then quickly moving the point down in a semi-circle to attack a different location. This is used to trick the opponent into blocking the wrong direction. For example, the fencer could target the left side of the torso, and begin the lunge. As the opponent moves to the left to parry, the fencer disengages and finishes the attack on the right side of the torso. Commonly countered with a circle-parry.
Continuation of Attack: A typical épée action of making a 2nd after attack after the first attack is parried. This may be done with a change in line; example, an attack in the high line (above the opponent's bellguard, such as the shoulder) is then followed with an attack to the low line (below the opponent's bellguard, such as the thigh, or foot); or from the outside line (outside of the bellguard, such as outer arm) to the inside line (inside the bellguard, such as the inner arm or the chest). A second continuation is stepping slight past the parry and angulating the blade to bring the tip of the blade back on target.
Remise. A second attack immediately after the first has missed or been parried. In foil or sabre, a remise is considered to have lost right of way, and the defender's riposte will always score instead of the remise.
Flick: a technique used primarily in foil. It takes advantage of the extreme flexibility of the blade to use it like a whip, bending the blade so that it curves over and strikes the opponent with the point. This technique has become much more difficult due to timing changes which require the point to stay depressed for longer to set off the light.
Parry: Basic defence technique, block the opponent's weapon while it is preparing or executing an attack to deflect the blade away from the fencer's valid area and (in foil and sabre) to give fencer the right of way. Usually followed by a riposte, a return attack by defender.
Circle Parry: A parry where the sword is twisted in a circle to catch the opponent's tip and deflect it away. It is commonly used to counter a disengage.
Counter Attack: A basic fencing technique of attacking your opponent while generally moving back out of the way of the opponent's attack. Used quite often in épée to score against the attacker's hand/arm. More difficult to accomplish in foil and sabre unless one is quick enough to make the counterattack and retreat ahead of the advancing opponent without being scored upon, or by evading the attacking blade via moves such as the In Quartata (turning to the side) or Passata-sotto (ducking).
Point In Line: Extending the weapon and arm against the opponent's target area. In foil and sabre, this gives one priority if the extension is made before the opponent is approximately advance-lunge distance away. When performed as a defensive action, the attacker must then disturb the extended weapon to re-take priority; otherwise the defender has priority and the counter-attack like action will win the touch if the attacker does not manage a single light. When performed as an offensive action, the intent is usually a means for the attacker to draw a defensive action that can be deceived and the attack continued. In épée, there is no priority; the move may be used as a means by either fencer to achieve a double-touch and advance the score by 1 for each fencer.
The attacks and defences may be performed in countless combinations of feet and hand actions. For example, fencer A attacks the arm of fencer B, drawing a high outside parry; fencer B then follows the parry with a high line riposte. Fencer A, expecting that, then makes his own parry by pivoting his blade under fencer B's weapon (from straight out to more or less straight down), putting fencer B's tip off target and fencer A now scoring against the low line by angulating the hand upwards.
Whenever a point is scored, the fencers will go back to their starting mark. The fight will start again after the following sentences have been said by the referee: "En garde" (On guard), "Êtes-vous prêts ?" (Are you ready ?, to which the fencers have to answer yes), "Allez" (Go).
Fencing has a long history with universities and schools for at least 500 years. At least one style of fencing, Mensur in Germany, is practiced only within universities, notably at Heidelberg. University students compete internationally at the World University Games. The United States holds two national level university tournaments including the NCAA championship and the USACFC National Championships tournaments in the USA and the BUCS fencing championships in the United Kingdom.
Equipment costs and the relatively small scale of the sport limits university fencing to a small number of schools. National fencing organisations have set up programmes to encourage more students to fence. Examples include the Regional Youth Circuit program in the USA and the Leon Paul Youth Development series in the UK.
In recent years, attempts have been made to introduce fencing to a wider and younger audience, by using foam and plastic swords, which require much less protective equipment. This makes it much less expensive to provide classes, and thus easier to take fencing to a wider range of schools than traditionally has been the case. There is even a competition series in Scotland – the Plastic-and-Foam Fencing FunLeague – specifically for Primary and early Secondary school-age children using this equipment.
The UK hosts two national competitions in which schools compete against each other directly: the Public Schools Fencing Championship, a competition only open to Independent Schools, and the Scottish Secondary Schools Championships, open to all secondary schools in Scotland. It contains both teams and individual events and is highly anticipated. Schools organise matches directly against one another and school age pupils can compete individually in the British Youth Championships.
Many universities in Ontario, Canada have fencing teams that participate in an annual inter-university competition called the OUA Finals.
Other variants include chair fencing, one-hit épée (one of the five events which constitute modern pentathlon) and the various types of non-Olympic competitive fencing. Chair fencing is similar to wheelchair fencing but for the able bodied. The opponents set up opposing chairs and fence while seated; all the usual rules of fencing are applied. An example of the latter is the American Fencing League (distinct from the United States Fencing Association): the format of competitions is different and the right of way rules are interpreted in a different way. In a number of countries, school and university matches deviate slightly from the FIE format.
^ A History of Fencing. Hcs.harvard.edu. Retrieved on 2012-05-16.
^ Historia de la Esgrima. Educar.org (1999-02-22). Retrieved on 2012-05-16.
^ Fencing Online. Fencing.net. Retrieved on 2012-05-16.
^ A History of Fencing. Library.thinkquest.org. Retrieved on 2012-05-16.
^ F.H.W. Sheppard, ed. Survey of London volume 33 The Parish of St. Anne, Soho (north of Shaftesbury Avenue), London County Council, London: University of London, 1966, pp. 143–48, online at British History Online.
^ Alaux, Michel. Modern Fencing: Foil, Epee, and Sabre. Scribner's, 1975, p. 83.
^ USACFC. USACFC. Retrieved on 2012-05-16.
^ US Fencing Youth Development Website, Regional Youth Circuit.
^ The Plastic-and-Foam Fencing FunLeague website.
^ Home :: Public Schools Fencing Championships.
Gaugler, William M. (2004). "The Science of Fencing: A Comprehensive Training Manual for Master and Student: Including Lesson Plans for Foil, Sabre and Epee Instruction". Laureate Press. ISBN 1884528309.
Vass, Imre (2011). "Epee Fencing: A Complete System". SKA SwordPlay Books. ISBN 0978902270. | 2019-04-26T04:08:14Z | http://www.ipad-library.net/Articles/Fencing |
A dissertation demands precise preparation, a large quantity of study, and lots of time invested assessing the information. Research argumentation is a crucial part of MBA level. Study properly excellent Keurig At Home: Managing A New Product Launch Case Study Solution would mirror the total amount of research study you would certainly have done to complete the paper.
When you get started composing the dissertation, you might situate your purposes change. You necessitate an argumentation writing solution that might assure the standard of its work. An exceptional argumentation indicates good marks which guarantee an excellent work.
Conclusion Individuals work with Keurig At Home: Managing A New Product Launch Case Study Solution services for selection of factors and ought to you do your own research study you’ll be able to employ an incredible Keurig At Home: Managing A New Product Launch Case Study Solution service for the job you need to get it done. Creating a dissertation is certainly one of the hardest components of university life. An excellent argumentation can land you the job that you dream about. A fantastic Keurig At Home: Managing A New Product Launch Case Study Solution help is mosting likely to have properly qualified writer with good year of experience so they can assist you in choosing an excellent topic in addition to in doing argumentation on the identical subject.
Creating an argumentation is not an easy task, and also that indicates you most definitely want the very finest writing help you’ll be able to obtain. A great dissertation makes sure that you obtain good qualities.
Creating a dissertation is a considerable job that’s offered to the pupils by the teachers of esteemed universities. It’s feasible to obtain help with writing an excellent business economics argumentation or economics thesis paper.
If you are lucky sufficient to get in touch with a different author who’s just a little ahead of where you remain in the procedure, you are mosting likely to have front door as you advance with your dissertation. Our writers comply with a crystal clear technique that’s both functional and efficient for getting the best possible end result. A dissertation writer must have the capability to help you with any or all items of your argumentation. Composing an outstanding dissertation requires the author to have a specific amount of spoken craftsmanship which can just be survived substantial method. Our argumentation authors hold a PhD level, making them fully proficient to compose argumentations on a series of subjects. Whether there are recognized dissertation authors, after that it’s feasible to rely on the business.
To bring outstanding qualities, it is crucial for the author to coincide with the writing style of the trainee. When you are delighted regarding hiring authors, make certain the service company supplies you all of the warranties which I have specified here. The argumentation writer makes use of only the appropriate technique in accordance with the need of the analysis. Together with that, argumentation writers need to remain in a placement to write as well as organize the product persuasively. Coming to be an outstanding argumentation author is not easy.
With no ideal style, your dissertation appears monotonous and unpleasant. Keurig At Home: Managing A New Product Launch Case Study Solution solutions are therefore extremely valuable as it can guide you to choose the company and also supply sources. Just the very best Keurig At Home: Managing A New Product Launch Case Study Solution solutions can let you like the pros, else you’re in problem, as your instructor can observe different reasons, why your argumentation should not be accepted.
Pick our very best dissertation creating service it makes it feasible for you to complete your thesis or dissertation paper according to your requirements. Thesis and Argumentation is not only a little bit of work for academics, it’s a path to your academic level. Creating an argumentation is among the most hard jobs that students need to do in the complete academics.
There are lots of Keurig At Home: Managing A New Product Launch Case Study Solution solutions around for pupils that require to obtain their argumentations created by specialists. If you need them urgently, you’ll also locate couple of Keurig At Home: Managing A New Product Launch Case Study Solution solutions that will certainly give you with the papers. On the other side, a poor argumentation can make things very tough for you. A variety of the top customized Keurig At Home: Managing A New Product Launch Case Study Solution business will additionally supply profitable discount rates to their clients.
Each argumentation has to be special. It’s hard to make up the excellent dissertation. The absolute best Keurig At Home: Managing A New Product Launch Case Study Solution solutions are founded by males and females that are grads of the leading rated scholastic institutes based in the UK that are the finest in the world.
Conclusion People work with Keurig At Home: Managing A New Product Launch Case Study Solution services for range of factors and need to you do your own research you’ll be able to employ a remarkable Keurig At Home: Managing A New Product Launch Case Study Solution solution for the work you should receive it done. A fantastic Keurig At Home: Managing A New Product Launch Case Study Solution help is going to have expertly qualified writer with excellent year of experience so they can assist you in choosing a superb subject along with in doing argumentation on the similar subject.
Just the extremely best Keurig At Home: Managing A New Product Launch Case Study Solution services can let you like the pros, else you’re in difficulty, as your trainer can observe various reasons, why your dissertation shouldn’t be approved.
Select our extremely best dissertation composing solution it makes it possible for you to finish your thesis or argumentation paper according to your demands. There are lots of Keurig At Home: Managing A New Product Launch Case Study Solution solutions out there for pupils who need to receive their argumentations composed by experts.
The dissertation itself nonetheless, can be identified as being the conclusion of sorts of all of the job that the pupil was taught thus far. In some circumstances the PhD dissertation is also referred to as a thesis, however, at all 3 degrees, the objective is identical. You only need to consider our Keurig At Home: Managing A New Product Launch Case Study Solution testimonials to locate the fact of that statement. You need to compose a business economics argumentation. It’s possible to obtain assistance with creating a decent business economics dissertation or business economics thesis paper.
You are aware that argumentation writing isn’t a simple work to handle. Our dissertation authors hold a PhD degree, making them totally competent to make up argumentations on a large variety of subjects. Ending up being a superb argumentation author is not straightforward.
If a task of writing an argumentation shows up to be also tough for you, you may always utilize help of a skilled argumentation writer. You are going to desire to start your dissertation job with a durable and also comprehensive literary works review. It’s likewise typical for them to locate outdoors assistance from a professional Keurig At Home: Managing A New Product Launch Case Study Solution service in the United Kingdom.
In order to achieve success and also really end up a dissertation, one must plan ahead. Composing a customized argumentation all on your own is no mean feat it needs a substantial quantity of time, expert approach to function, outstanding knowledge of the subject matter, and a lot of work, self-discipline as well as concentration. Dissertation is amongst one of the most substantial documents for pupils. Often dissertations and also thesis experience due to the fact that they’re not structured or provided in the proper way. Business economics Keurig At Home: Managing A New Product Launch Case Study Solution aid from an online business economics thesis assistance site need to constantly supply you with money-back warranty, your work is mosting likely to be completed to your complete satisfaction, as well as your writer will remain with each other with you throughout the complete method.
Argumentation Author Keurig At Home: Managing A New Product Launch Case Study Solution can create right into a real difficulty. In reality, in the event the Keurig At Home: Managing A New Product Launch Case Study Solution solutions of the company or writer are excellent, the degree of the endeavor or assignment is much over the assumption of the individual. During such problems, an individualized Keurig At Home: Managing A New Product Launch Case Study Solution services agency can aid the pupil or staff member with anything as well as every little thing he is searching for.
Our Keurig At Home: Managing A New Product Launch Case Study Solution service can make certain that you get the mark you will need to move on a college or to be the most recent hire in the job you want. Our Keurig At Home: Managing A New Product Launch Case Study Solution service materials a variety of benefits students are specific to appreciate consisting of checking, editing and enhancing, alterations, format as well as a great deal more. A genuinely specialist Keurig At Home: Managing A New Product Launch Case Study Solution solution will surely have customers’ testimonials so you can see what others state concerning their results.
The parts associated with an argumentation may differ yet normally every component connected with it’s basic. A dissertation is typically crafted by means of a doctorate level candidate or a college student among the last needs to finish the level. The argumentation is just one of the most crucial stages of student’s researches, particularly if a person desires to be a scientist and also connect his upcoming profession with the university or postgrad life. Our Keurig At Home: Managing A New Product Launch Case Study Solution services are guaranteed to craft you the excellent argumentation possible. On-line Keurig At Home: Managing A New Product Launch Case Study Solution services aren’t all there to steal your loan and also give you with reduced remarkable work. No noticeable Keurig At Home: Managing A New Product Launch Case Study Solution services will force you to endanger on the standard of their job. Being among the ideal Keurig At Home: Managing A New Product Launch Case Study Solution services known on the industry is a huge point.
Our dissertation writers hold a PhD level, making them fully proficient to compose dissertations on a wide array of subjects. If a job of writing an argumentation shows up to be also difficult for you, you might always make use of help of an experienced dissertation writer. Argumentation Writer Keurig At Home: Managing A New Product Launch Case Study Solution can create into a real challenge. In reality, in the event the Keurig At Home: Managing A New Product Launch Case Study Solution services of the firm or author are great, the level of the undertaking or assignment is far over the expectation of the individual. Our Keurig At Home: Managing A New Product Launch Case Study Solution services are assured to craft you the perfect dissertation possible.
When you’re going to be creating your argumentation, you are going to have to utilize your findings in addition to the outcomes foundduring your personal research to be able to manufacture previous examination performed in your associated area of research study. Writing a personalized argumentation by yourself is no mean accomplishment it needs a huge amount of time, expert approach to function, wonderful expertise of the topic, and a great deal of self-control, focus and work. The argumentation itself nonetheless, could be identified as being the conclusion of sorts of every one of the work that the pupil was shown so far. Business economics Keurig At Home: Managing A New Product Launch Case Study Solution assistance from an internet business economics thesis aid site ought to constantly provide you with money-back guarantee, your work is mosting likely to be completed to your contentment, and your writer will remain together with you throughout the complete method.
Ok, I Think I Understand Keurig At Home: Managing A New Product Launch Case Study Solution, Now Tell Me About Keurig At Home: Managing A New Product Launch Case Study Solution!
Utilizing a progressive delivery, you make certain that the dissertation writer you employ will send your dissertation part by part. An important secret to composing an amazing dissertation is to get a very clear and specific emphasis for your work. You’re able to obtain aid with composing a great economics dissertation or economics thesis paper.
Argumentation authors will certainly allow you to compose a top high quality research study record. An argumentation writer ought to be able to help you with any or all sections of your dissertation. Our dissertation writers hold a PhD degree, making them totally skilled to compose argumentations on a broad range of subjects.
Keurig At Home: Managing A New Product Launch Case Study Solution varies. It is a prime area for authors block. Issues past the dissertation web page Various other causes, nonetheless, might not relate to the true writing.
Even in the occasion that you do not desire to stay an independent author, you can use it in order to sharpen your capabilities as well as make a few important connections. The outstanding essay writers are in a position to do a research, based on what you have actually requested.
The transition of dissertation recommendations to argumentation writing can be a tough transition. For an argumentation to obtain any type of considerable web content, the creating procedure needs detailed research study. If a work of writing an argumentation appears to be too tough for you, it’s possible to always use help of a skilled dissertation writer.
Our authors are generally prepared to help our clients fix their Keurig At Home: Managing A New Product Launch Case Study Solution troubles and also they constantly ensure they do so in a satisfactory way. Thus, if you would like to discover qualified writers, experienced editors, and also the various other specialists help you, our site is your best chance. There’s absolutely nothing negative regarding discovering the competent authors that can assist you to get rid of the academic stress. It is really crucial to locate a new study strategy towards creating, as well as the knowledgeable authors can brainstorm the most debatable thoughts and also choose the most effective techniques for the research study. Having the wide expertise in the several areas, our competent authors in the a number of fields are good to go to produce unique as well as fine essays.
Writing magazines for write-ups is a hard task. So if you’re thinking about worldwide issues for your argumentation, after that you have actually luckily landed at the appropriate post. Your argumentation topic ought to allow you to focus your research on problems which can be thoroughly covered and should add brand-new knowledge to business of research. You may discover lots of HRM argumentation subjects over the internet. An outstanding argumentation subject should be specific, original as well as relevant to the location of study. Mostly, you must select the argumentation topic connected to your particular MBA stream. There are a lot of MBA argumentation topics avaialble on the internet.
Using a modern shipping, you make particular that the argumentation writer you utilize will certainly send your dissertation part by component. An argumentation author ought to be able to aid you with any type of or all areas of your dissertation. Our dissertation authors hold a PhD level, making them completely qualified to compose dissertations on a broad range of topics. The transition of dissertation pointers to dissertation writing can be a tough shift. If a job of writing a dissertation shows up to be too tough for you, it’s possible to always make use of help of a skilled argumentation author. | 2019-04-24T12:28:12Z | https://caseassistant.xyz/keurig-at-home-managing-a-new-product-launch-case-study-solution-analysis-16111/ |
God has blessed each born again Christian with one or more Spiritual Gifts. Do you know what Spiritual Gift(s) God has given you? If you have been wondering about this, then you have come to the right place!
This on-line Spiritual Gifts Test (sometimes referred to as a Spiritual Gifts Inventory, Assessment, Survey, Analysis, Questionnaire, or Quiz) will help you determine what Spiritual Gift(s) God has given you. The test performs an assessment of 28 Gifts by presenting you with 140 positive statements that you are to respond to by selecting a number between 9 and 0 to indicate how well each statement applies to you, how well it describes you, or how much you agree with the statement.
This test is designed for Christian adults (a youth version of the test is available by clicking HERE ). If you have been a Christian for at least a few years, you should use your personal experiences as the basis for your responses. If you consider yourself to be a new Christian, then your responses should be based on how well each statement describes the desire of your heart (even if you have not yet done what the statement talks about). If you are NOT a Christian, then you should NOT take this test.
This test is not specific to any one Christian Denomination. It should be noted that there is some disagreement among Christians as to exactly how many Spiritual Gifts there are. This test covers a rather broad spectrum of 28 Spiritual Gifts and God given talents.
Please keep in mind that this test was written by people, not by God, and as such it is certainly not perfect. It should be used as a starting place to begin to discover your Spiritual Gifts, but not as an absolute indicator. The test may not always indicate your true Spiritual Gifts. It is just one tool in what should be a life long search for how God has blessed you so you can be a blessing to others.
If you would prefer to take this test on paper, a Printable Spiritual Gifts Test with Manual Analysis in Microsoft-Word format can be downloaded by clicking HERE .
The test should take less than an hour to complete. If you don't have that much time now, then you can 'Bookmark' this page or add it to your 'Favorites' and take the test later. You must complete the test in one sitting because a partially completed test can NOT be saved.
Respond to each statement quickly with your first feeling. Don't be too modest. However, unless you can walk on water, you will probably respond to more statements with low numbers than with high numbers. If in doubt, then respond with 0.
Select 9 or 8 if the statement describes you exactly or very well.
Select 7 or 6 if you think the statement applies to you better than to most other people.
Select 5 or 4 if the statement somewhat applies to you.
Select 3 or 2 if you can only slightly relate to the statement.
Select 1 or 0 it the statement does not apply to you or you disagree with the statement.
The object is NOT to enter all high numbers, but to distinguish between Gifts that you DO or DO NOT have. If you enter more than a dozen or so 9's, the analysis process will not be able to clearly distinguish your top Gift(s).
When you have responded to ALL 140 statements, click on 'Submit Spiritual Gifts Test for Analysis' at the bottom. Your test will be automatically analyzed. In a few seconds, it will show you a list of the 28 Spiritual Gifts and God given talents that this test covers and show you which ones appear to be the strongest in you. There is also a link to Spiritual Gifts Reference Material that provides a definition of each Spiritual Gift as well as Biblical References for each.
After you have taken the test and seen your analysis, if you believe that this Spiritual Gifts Test has been a blessing to you, then you are asked - on your honor - to make a donation to the Spiritual Gifts Test . This test is NOT FREE . If you are not willing to make a donation if you were blessed by what you learned from the test , then please - on you honor - do NOT take the test. Your donation should represent what the test was worth to you.
IMPORTANT: Press Tab, NOT Enter to advance from one field to the next. Do NOT use Enter at all while taking this test!
Please check the spelling of your email address. If it is spelled wrong, you will NOT receive your Analysis via email!
If your Church is collecting Spiritual Gifts Test results for its members, you may enter the name of your church and the email address of the person who is collecting the results. If not, leave these fields blank.
Again, please check the spelling of your church email address!
Are you ready to start? Take a deep breath and begin . . .
Click on the first response box [0.9]v below. Type the number for your response 9,8,7,6,5,4,3,2,1 or 0. Press Tab, NOT Enter to advance to the next statement and type the number for that response. Continue by pressing Tab then a number for each or the 140 statements.
0.99876543210 People come to me when they need help in desperate situations, and I am able to point them to a service or ministry that can help them.
0.99876543210 I feel empowered to stand alone for Christ in a hostile, unbelieving environment.
0.99876543210 I readily identify with Paul's desire for others to be single as he was.
0.99876543210 I enjoy using my artistic talents to make things that bring glory to God.
0.99876543210 It is easy for me to perceive whether a person is honest or dishonest.
0.99876543210 I have spoken words of hope that God confirmed in others by the Holy Spirit.
0.99876543210 I am attracted to non-believers because of my desire to win them to Christ.
0.99876543210 I have urged others to seek Biblical solutions to their affliction or suffering.
0.99876543210 I hold fast to my personal belief in the truth even in the presence of ridicule, apparent failure, or pain.
0.99876543210 I can give sacrificially because I know that God will meet my needs.
0.99876543210 I feel strongly that my prayers for a sick person effect wholeness for that person.
0.99876543210 When I serve the Lord, I really don't care who gets the credit.
0.99876543210 Our home is always open to whoever God brings to us.
0.99876543210 I find myself praying when I possibly should be doing other things.
0.99876543210 I have had insights of spiritual truth that others have said helped bring them closer to God.
0.99876543210 Others are willing to follow my guidance to accomplish tasks for our church.
0.99876543210 I feel great compassion for the problems of others.
0.99876543210 I believe that God can miraculously alter circumstances.
0.99876543210 I am able to relate well to people of different cultures.
0.99876543210 Christian music always lifts my spirit and makes me want to praise and worship God.
0.99876543210 I have a heart to help Christians who have lost their way.
0.99876543210 I choose to live a simple lifestyle so I will have more time and money to devote to God's service.
0.99876543210 I sometimes feel that I know exactly what God wants to do in a ministry at a specific point in time.
0.99876543210 Studying the Bible and sharing my insights with others is very gratifying for me.
0.99876543210 I have interpreted what was said in tongues so as to help others worship God without confusion.
0.99876543210 Sometimes when I pray, it seems as if the Spirit steps in and prays in words I cannot understand.
0.99876543210 I have felt an unusual presence of God and personal confidence when important decisions needed to be made.
0.99876543210 Sometimes, I express my love for God by writing poems, songs, prayers, or devotionals.
0.99876543210 I have been responsible for guiding tasks in my church or Christian group to success.
0.99876543210 I feel God has called me to go forth to establish new churches where people have never heard the gospel.
0.99876543210 I like to make hand made gifts for others that will remind them of God, Jesus, or the Holy Spirit.
0.99876543210 I can sense whether a person is moved by the Holy Spirit, an evil spirit, or by their own flesh.
0.99876543210 It is a joy to speak uplifting words to people who are discouraged.
0.99876543210 I have led others to a decision for salvation through faith in Christ.
0.99876543210 I can challenge others without making them feel condemned.
0.99876543210 I am totally convinced God will fulfill his word even if He is not doing so yet.
0.99876543210 God has used me to meet someone's financial or material need.
0.99876543210 When I pray for the sick, either they or I feel sensations of tingling or warmth.
0.99876543210 The Spirit sometimes leads me to do a simple thing for someone that touches them deeply.
0.99876543210 I enjoy greeting and welcoming people to our church or our home.
0.99876543210 I seem to recognize prayer needs before others.
0.99876543210 I am able to understand difficult portions of God's word.
0.99876543210 I am able to delegate tasks to others to accomplish God's work.
0.99876543210 I have a desire to work with those who have physical or mental problems to alleviate their suffering.
0.99876543210 Others can point to specific instances where my prayers have resulted in what seems impossible actually happening.
0.99876543210 I would be willing to leave comfortable surroundings if it would enable me to share Christ with more people.
0.99876543210 Singing, dancing to, or playing songs of praise to God for pure enjoyment is something I like to do.
0.99876543210 God has shown fruit in my life by my effective discipling of other believers.
0.99876543210 My desire for spiritual riches outweighs my desire for money or material possessions.
0.99876543210 I sometimes have a strong sense of what God wants to say to people in response to particular situations.
0.99876543210 People have told me that I have helped them learn Biblical truths.
0.99876543210 Sometimes when a person speaks in tongues, I get an idea about what God is saying.
0.99876543210 I can speak to God in a language I have never learned.
0.99876543210 Sometimes God gives me an insight into the proper course of action needed in a situation.
0.99876543210 I am able to take complex spiritual matters and write them down in a way that others can understand more easily.
0.99876543210 I can serve others by organizing and harnessing their gifts to solve a particular problem.
0.99876543210 I have no fear in leading people where God wants them to go.
0.99876543210 I like to work with my hands to make things to serve God.
0.99876543210 The difference between truth and error is easily perceived by me.
0.99876543210 I can effectively motivate people to get involved in ministry.
0.99876543210 I seem able to determine when the Spirit has prepared a person to received Jesus Christ.
0.99876543210 People will take correction from me because they know I am on their side.
0.99876543210 My hope in God, against all odds, is inspiring to others.
0.99876543210 I have been willing to maintain a lower standard of living in order to benefit God's work.
0.99876543210 I enjoy praying for sick people because I believe that many of them will be healed as a result.
0.99876543210 I have enjoyed doing routine tasks that have led to more effective ministry by others.
0.99876543210 I try to make everyone feel welcome and comfortable in our home or at church.
0.99876543210 When I hear a prayer request, I pray for that need for several days at least.
0.99876543210 Through study or experience I have discerned major strategies God seems to use in furthering His kingdom.
0.99876543210 God has given me an ability to "rally the troops" in providing aid for others.
0.99876543210 I enjoy spending time with a lonely shut-in person or someone in prison.
0.99876543210 God has used me personally to perform supernatural signs and wonders.
0.99876543210 The thought of beginning a new church in a new community is exciting to me.
0.99876543210 People have said they see the love of Jesus on my face when I sing, dance, or play music.
0.99876543210 I feel that I am responsible to help protect weak Christians from dangerous influences.
0.99876543210 A big house, a fancy car, or a large bank account are NOT important to me.
0.99876543210 Sometimes I have a burning desire to speak God's word even if I know it will not be well received.
0.99876543210 Leading a Bible Class is one of the most enjoyable things I do (or could do).
0.99876543210 When others have prayed in tongues, I felt that I understood the meaning of their prayer.
0.99876543210 Praying in tongues has been meaningful to me in my personal prayer life.
0.99876543210 When a person has a problem I can frequently guide him or her to the best Biblical solution.
0.99876543210 I love to study God's Word and write down what I have learned.
0.99876543210 I can recognize talents and gifts in others, and find ways of using these for God.
0.99876543210 God has given me a position of authority over a number of groups of Christians.
0.99876543210 I am able to show the glory of God's creation through my art.
0.99876543210 I can judge well between the truthfulness or error of a given theological statement.
0.99876543210 I have verbally given confidence to the wavering, the troubled, or the discouraged.
0.99876543210 I minister better to the spiritually lost than to believers.
0.99876543210 It is enjoyable to motivate people to a higher spiritual commitment.
0.99876543210 I am ready to try the impossible because I have a great trust in God.
0.99876543210 I have strongly sensed the Spirit leading me to give money to a specific person or cause.
0.99876543210 Sometimes I have a strong sense that God wants to heal someone through my prayers or touch.
0.99876543210 I would rather work in secret than have my work recognized publicly.
0.99876543210 I do NOT feel uncomfortable when people drop in unexpected.
0.99876543210 Praying for others is one of my favorite ways of spending time.
0.99876543210 I sometimes find I know things that I have never learned, which are confirmed by mature believers.
0.99876543210 It is a thrill to inspire others to greater involvement in God's work.
0.99876543210 I enjoy visiting in hospitals and retirement homes, and feel I do well in such a ministry.
0.99876543210 The Holy Spirit leads me to pray for impossible things that really come true.
0.99876543210 More than most, I have had a strong desire to see people from other countries won to the Lord.
0.99876543210 People have told me they were moved spiritually by my singing, dancing, or playing music.
0.99876543210 I feel a call from God to be the spiritual leader of a group of Christians.
0.99876543210 I am NOT jealous of those who have more material possessions than me.
0.99876543210 People have told me that I have communicated timely messages that must have come directly from the Lord.
0.99876543210 I devote considerable time to learning new Biblical truths in order to communicate them to others.
0.99876543210 When I hear others speak in tongues, I am compelled to explain the meaning.
0.99876543210 I feel that I have a special insight in selecting the best alternative in a difficult situation.
0.99876543210 People say they have been touched spiritually by things I have written.
0.99876543210 People sometimes look to me for guidance in coordination, organization, or ministry opportunities.
0.99876543210 God has used me to bring the gospel to people who have never heard.
0.99876543210 I feel compelled to use my hands to craft things that show the beauty of God's creation.
0.99876543210 I can recognize whether a person's teaching is consistent with God's word.
0.99876543210 People who are feeling perplexed sometimes come to me for comfort.
0.99876543210 I'm troubled when salvation is not emphasized.
0.99876543210 I can identify with weakness and temptation so as to encourage people to repent and believe.
0.99876543210 I have believed God for the impossible and seen it happen in a tangible way.
0.99876543210 I strive to find ways to give to others without calling attention to myself.
0.99876543210 I have prayed for others and physical healing has actually occurred.
0.99876543210 If someone is facing a serious crisis, I enjoy the opportunity to help them.
0.99876543210 When people come to our home, they often say they feel at home with us.
0.99876543210 Others have told me that my prayers for them have been answered in tangible ways.
0.99876543210 God has given me words to say in witnessing situations that surprised even me.
0.99876543210 I can motivate others to obey Christ by the living testimony of my life.
0.99876543210 Sometimes I am overcome with emotion for the person I am praying for.
0.99876543210 People have told me that I was God's instrument to bring supernatural change in lives or circumstances.
0.99876543210 People of a different race or culture have been attracted to me, and we have related well.
0.99876543210 I enjoy using my musical talents to sing, dance to, or play Christian music much more so than secular music.
0.99876543210 God has given me the ability to teach and preach spiritual truth.
0.99876543210 I feel that I can best fulfill God's calling on my life by living simply.
0.99876543210 God has revealed to me specific things that will happen in the future.
0.99876543210 I feel I can communicate Biblical truths to others and see resulting changes in knowledge, values, or conduct.
0.99876543210 My interpretation of tongues has been confirmed by mature believers.
0.99876543210 When I speak in tongues, I believe it is edifying to the group I am with.
0.99876543210 People with spiritual problems seem to come to me for advice and counsel.
0.99876543210 I sometimes prefer to write down my thoughts about God rather than speaking them out loud.
Congratulations, you have completed the Spiritual Gifts Test!
Please take a moment to scan back through ALL the statements to make sure you responded to ALL 140 of them! If you see "0.9" then you have missed entering a response. This is especially important if you use Google Chrome because the Back button does not work correctly on that browser!
If you try to save this test, your responses will be lost, but you can PRINT it now with your responses. The test with your responses will print on 14 pages.
Next, click on the Submit Spiritual Gifts Test for Analysis button below and wait a few seconds for your Analysis to be calculated. When the Analysis appears, you will have an opportunity to to print it. Your Analysis will also be emailed to you and optionally to your church.
If you want to CLEAR ALL your responses so someone else can take this test, then click on the "Clear ALL Responses" button below.
We would appreciate it if you would add a link to the Adult Spiritual Gifts Test ( http://www.kodachrome.org/spiritgift ) and / or the Youth Spiritual Gifts Test ( http://www.kodachrome.org/spiritgiftyouth ) to your Church Web Page and / or your Personal Web Page.
If you have any comments, questions, or problems concerning this Web Page, please EMail them to [email protected] . | 2019-04-21T14:17:31Z | http://www.kodachrome.org/spiritgift/ |
This Agreement applies to you, and you are 18 or older.
By purchasing the Services, you agree that you are over the age of eighteen, authorized to use the Services, and are responsible for paying for the Services per these Terms and Conditions. By purchasing the Services, you agree that you are over the age of eighteen, authorized to use the Services, and are responsible for paying for the Services per these Terms and Conditions.
Our Services are month to month until one of us decides to turn the Services off.
This Agreement will begin, and a binding contract will exist between Tresta and you when you subscribe to the Services. It will continue on a month to month basis until terminated as set forth herein.
We work in the US and Canada. Test your numbers and let us know if they don't work or if you suspect fraud. If you want to take a phone number with you to another carrier, let us know before you cancel services or else you might lose your number. Don't record calls without telling the other person!
Tresta provides a cloud-based phone system with features such as call forwarding, call routing, auto attendant, and more (the "Services"). The Services may not be available in all areas, and are subject to the terms and conditions outlined below.
Geographic Scope. The Services only support calls to and from the U.S. and Canada (U.S. and Canadian phone numbers). We reserve the right, in our sole and exclusive discretion, to block access to and from specific phone numbers or geographic locations that that we deem to be fraudulent.
Fraudulent Calls. We cannot control the calls that are placed to phone numbers you provision from or port into Tresta. If you become aware of or suspect that fraudulent activity is occurring on phone numbers you have provisioned from Tresta, it is your responsibility to notify us in writing immediately so that appropriate action can be taken to minimize costs. You are solely responsible for all charges incurred on your Account whether or not they are incurred by you personally, except those incurred after a suspension of your Account due to your written notification to us of unauthorized access.
Service Interruptions. You acknowledge and agree that the Services may not be available 100% of the time. Credit allowances for interruptions of service may be provided on a case-by-case basis at the sole discretion of Tresta and shall be your sole remedy for any service interruptions or problems with the Services.
Ownership of Phone Numbers. Tresta provides toll-free and local phone numbers. You own any phone number provisioned through Tresta, or ported in to Tresta from a third-party provider.
Porting In and Out. You may port (transfer) phone numbers to another carrier at no charge. You must, however, notify us of the transfer of the number so that we can assure it is added or removed from your Account accordingly.
You are responsible for all charges that accrue on your Account regardless of whether a phone number was transferred to another carrier if you don't notify us of the transfer. If you transfer numbers to another carrier and intend to cancel your Tresta Account, you must notify us by calling +1 (844) 2-TRESTA so that all charges can be terminated.
Tresta will use reasonable efforts to help you port numbers in or out of our Services. You understand, however, that the number porting process depends on third parties outside of Tresta's control. Tresta will not be liable for any failure or delay of a third party to cooperate in the porting of a phone number, or for the allegedly unauthorized porting of a telephone number by a third party.
Termination of Account/Reassignment of Phone Numbers. After an Account is terminated for any reason, Tresta may reassign phone numbers on your Account to other customers or to a reserve inventory. The number will then be unavailable for you to transfer to another carrier, and Tresta will not be responsible for any costs which result due to the loss of a phone number. It is your responsibility to transfer numbers to other carriers prior to terminating the Tresta Account if you wish to retain those phone numbers.
Phone Number Testing. Tresta makes every effort to ensure that phone numbers provisioned to you are working immediately after purchase. There are some technical considerations, however, which are beyond Tresta's control. Therefore, you must test any phone number provisioned by Tresta immediately after purchase to ensure it is working properly. Tresta will not be responsible for any advertising expenses or other costs which could have been avoided had you tested the phone number immediately after purchase.
Disputes over Phone Numbers. Tresta will not adjudicate disputes over ownership of an Account or phone numbers. In the event a dispute is not resolved independent of Tresta, Tresta reserves the right to terminate an Account to avoid further charges from accruing.
Availability. You have the option to have all calls placed through the Tresta platform recorded. Copies of recordings can be accessed by logging into your Account at www.tresta.com. Call recordings can also be downloaded or emailed to you via your Account or by contacting customer service.
Legal Requirements. Significant laws govern the recording of telephone calls, and these laws vary by State. You are required to obtain consent from all participants of the call to record a conversation. You are solely responsible for complying with all federal, state and local laws in any relevant jurisdiction when using this feature. Tresta expressly disclaims all liability with respect to the recording of telephone conversations. You agree to fully, finally and forever release, discharge, hold harmless and fully indemnify Tresta from and against any damages or liabilities of any kind related to your recording of conversations using the Services.
Keep your contact information with us up to date, and let us know if you need to transfer the ownership of an Account to someone else.
Customer Information. You agree to provide Tresta with true, accurate, current and complete contact information and to maintain this information accordingly. You are responsible for updating us as soon as reasonably possible of any changes to your contact details.
Account Set-up. You shall be responsible for setting up and maintaining an Account with Tresta, pursuant to the terms and conditions of this Agreement and any directives from us. A credit card is required to set up an Account, and for billing purposes.
Account Ownership. Account ownership may be transferred to another individual or business upon the written request of an existing Account owner, our written approval, and the written approval of the recipient. Individuals who create an Account on behalf of a business represent and warrant that they possess the legal right, capacity and ability to enter into this Agreement with Tresta on behalf of the business. If the individual lacked the legal right, capacity and ability to enter into this Agreement on behalf of the business, the individual will be held liable for all charges on the Account.
Make sure you stay current on your System and Billing Administrators, and don’t trust people with your password unless you agree to let them make changes on your Account.
Administrators. You may designate specific Users to make changes to the Account by adding the User to either the "System Admin" or "Billing Admin" User Group. A User who is a member of the System Admin User Group will have permission to, and access to, modify all configurations on the Account (such as adding/removing phone numbers, adding/removing Users and configuring call routing options), but cannot view or modify information related to billing. A User who is a member of the Billing Admin User Group will have permission to, and access to, view and modify all billing-related activities (such as adding/deleting/removing credit cards, viewing statements, and cancelling the Account) but cannot modify how the Services are configured. A User may be a member of both the System Admin and Billing Admin User Group. Users must establish a verification question and answer before Tresta will permit them to access or change the Account. It is the responsibility of the System Administrators to update and maintain Users on the Account. Tresta will not be responsible for changes made on an Account pursuant to a request by a System Admin or Billing Admin.
Access to Customer's Account. Tresta will assume that any individual that creates an Account has the legal right to set up the Account, transfer Account ownership, terminate the Account, setup or transfer phone numbers to another provider, and otherwise manage the Account. With respect to any Business Account, Tresta will make this assumption unless Tresta is otherwise notified in writing by a representative of the business who can demonstrate this legal right (typically an officer or director).
Password Protection. You are responsible for maintaining a password. Tresta is not responsible for activities that happen on the Account by the sharing of the password or the granting of access to your Account.
Transmission of Content. You are solely responsible for the content you transmit via the Services. We will not be responsible for any content sent or received by you.
You have to pay us for the services. This section explains how and when you will pay us.
Billing Subject to Change. Tresta reserves the right to change its billing methods in its sole discretion at any time without notice.
Billing Increments. Minutes are billed in six-second increments, with a 6-second billing minimum for calls to all available destinations.
Tresta Changes to Plans and Pricing. All available price plans are published on the Website, which will be regularly updated with price changes and special offers. We can change the applicable usage charges and plan pricing at any time by posting the changes on the Website. You can contact Customer Service and request details of our prices or any price change at any time at +1 (844) 2-TRESTA.
Customer Changes to Purchased Plans. You can make changes to plans or features at any time by contacting Customer Service at +1 (844) 2-TRESTA or by logging into your Account online and modifying your selections.
Billing Credits and Adjustments. Any credits or adjustments for mid-month changes to Services will be reflected on your next statement.
Monthly Billing. You will be billed once per month. You must have a valid credit card on file to maintain the Services. Credit cards will be automatically charged five (5) calendar days after a statement is generated on each Customer Account.
Credit Card on File. It is your sole responsibility to update credit cards on file in the event a credit card is closed or expires. Time is of the essence for payment.
Billing Cycle. Your billing cycle will be on the same day each month and is determined by the date of sign-up or re-activation on your Account. For example, if you sign up on the 3rd of the month, your bill cycle will run from the 3rd to the 2nd of each month. If you sign up after the 28th of any given month, your billing cycle will begin on the 28th day of the month and end on the 27th day of the following month.
Invoice Delivery. By default, billing related communications will be sent to the email addresses associated with any User who is a member of the Billing Admin User Group. You may also request that billing related communications be copied to additional addresses by configuring this in your Account or by contacting Customer Service. It is your responsibility to update the email addresses associated with any Tresta Account as needed.
Termination of Account for Non-payment. We reserve the right to terminate your Account due to failure to pay an invoice when due. You will be notified by email if your Account has been terminated. Tresta will not be responsible for any missed calls, advertising costs or other damages that result from the termination of any Account due to non-payment.
Fees for Non-payment. If an Account balance remains unpaid, an Account may be turned over to an outside, third-party collections agency. The collection agency imposes charges of 14% on business Accounts, and this fee is passed on to any non-paying Customer. This fee amount is subject to change without notice.
Declined Credit Card. If a credit card payment is declined, we will attempt to recharge it on several occasions without advance notice. If we do not receive payment, either through an automated recharge or by a payment initiated by Customer, within twenty-one (21) calendar days from the statement date, the Account will be closed for non-payment. You can re-activate the Account by paying the balance due in full.
New Account Balance. Customers with a past due balance will be charged the full balance due upon opening a new Account or re-activating a closed Account.
Credits and Refunds. Tresta plans and bundled allowances may only be used for our Services, and you will not be entitled to receive any cash refund for any remaining credit or allowance unless expressly stated otherwise in this Agreement. Credits and allowances are not transferable, and no interest will be payable on credit balances or allowances. Credits issued on an Account will be applied toward future charges and balances and will not be refunded to a credit card except (a) in unusual circumstances as approved by a Customer Service Manager; or (b) after the termination of an Account, in which case negative balances will be refunded to a credit card five (5) calendar days after the final statement is generated.
Disputed Charges. You must notify us by e-mail to [email protected] of any disputed charges/debits within thirty (30) days of the statement date reflecting the disputed charge. To the extent we determine that a billing adjustment is warranted, we will credit your Account accordingly. If you fail to notify us of a billing dispute as noted above, you hereby waive all rights to bring any claim regarding the particular charge/debit.
We may offer a free trial of our Services so that you can see how great our Services are without spending any money. We ask, however, that you use it fairly or else we can cancel your trial at any time. Also, your trial will automatically convert to a paid account, so let us know before that happens if you don’t want to keep the Services.
Eligibility. To be eligible for this Free Trial Offer, you must (i) not be a current subscriber of Tresta, (ii) not be a previous subscriber of Tresta, (iii) have never redeemed a Tresta Free Trial Offer in the past, and (iv) be over the age of eighteen and authorized to use the Services. A limited number of Free Trial Offers are available, while supplies last. Tresta reserves the right to terminate this Free Trial Offer at any time and for any reason without notice and with no liability. Tresta further reserves the right to terminate a specific subscriber’s Free Trial Offer prior to the end of that user’s Free Trial Period at any time, for any reason, including but not limited to a violation of this Agreement, including Tresta’s Reasonable Use Policy, without notice and with no liability. After such time of termination, Tresta shall not be obligated to redeem any further Free Trial Offers.
Activating Your Free Trial Period. To redeem a valid Free Trial offer, sign up online at www.tresta.com or contact Customer Support at the phone number contained herein.
Your Subscription. If you decide that you do not want to remain a paying user of the Tresta Service, you have to cancel your subscription by logging into your Tresta Account and following the prompts on the Account page, or by contacting Customer Support, prior to the end of your Free Trial Period. If you fail to cancel as directed, at the end of your Free Trial Period, you will automatically become a paying user of the Tresta Service at the regular Tresta monthly price, and the payment method you provided will automatically be charged the Tresta monthly subscription fee, usage, and applicable taxes, fees and surcharges each month, until you cancel your subscription as provided in this Agreement. No refunds, adjustments or price protection will be applied to your invoice in the event that a new/subsequent discount or promotional offering becomes available after the conclusion of your Free Trial Period.
You have to pay your taxes and fees. Thank a politician!
Taxes and Fees. All prices are exclusive of taxes and fees. You must pay all taxes, fees, surcharges and other charges that we bill you for the Services unless you can show documentation satisfactory to us that you are exempt. We will not provide advance notice of changes to taxes, fees, surcharges and other charges, except as required by applicable law. For more information on taxes and fees, please visit www.tresta.com/taxes-and-fees.
Estimates. Taxes, fees and surcharges shown during the signup process or on Bill Cycle To Date summaries represent estimated taxes only. Final taxes, fees and surcharges will be calculated when an invoice is processed and may vary due to changes in usage, tax rates or other factors.
Universal Service Charges. You will be responsible for applicable universal service charges unless you submit a valid resale exemption certificate on an annual basis on a form prescribed by Tresta. Absent a valid resale exemption certificate, Tresta will assess applicable federal universal service fund charges ("FUSF Fees") on your Account. Similarly, Tresta reserves the right to assess state-level universal service fees ("State USF Fees") on your Account per applicable law, unless you submit valid exemption certifications on forms prescribed by Tresta. If Tresta waives FUSF or State USF Fees for you (in whole or in part) based on information you provided, and Tresta thereafter determines that inaccuracy in the information provided resulted in a waiver of FUSF or State USF Fees with respect to charges that constitute Tresta end-user revenues (as defined by the FCC), then Tresta may bill you for the FUSF or State USF Fees that were waived as a result of such inaccuracy and, if Tresta does bill you this amount, you agree to pay. If you are reclassified as an end user with respect to any service previously exempted, Tresta may bill you for the FUSF or State USF Fees that would have applied with respect to such services in the absence of the waiver plus any applicable late fees and/or interest and, if Tresta does bill you this amount, you agree to pay. You further agree to defend Tresta against any audits, claims, actions or lawsuits resulting from your claim that you are exempt from paying the FUSF or State Fees, and you further acknowledge your responsibility to pay any resulting FUSF or State Fees, damages, expenses, fines, judgments, interest, late fees, liabilities or losses resulting from such audits, claims, actions or lawsuits.
Cost Recovery Fee. A cost recovery fee may be added to invoices containing voice communications charges to offset costs incurred by Tresta in compliance with applicable regulations and collection of federal, state and municipal taxes, fees, contributions and/or charges associated with federal and state universal service and related programs. These include the telecommunications services for the sight and hearing impaired, local number portability, North American Numbering Plan administration, and administrative costs, fees and expenditures related to compliance with Federal regulatory programs and annual FCC regulatory fee obligations and any related fees to ensure compliance. This fee is not a tax or charge required or assessed by any government, but a permissible pass-through fee. You agree to pay such fees as invoiced.
Be nice. Don't use our Services for bad things, and let us know if you expect a lot of calls so we can plan accordingly.
No Auto-dialing or Spamming. You cannot use our system to send spam or unsolicited messages, for auto-dialing/predictive dialing, or for other uses which we determine, in our sole discretion, to be abusive.
Termination of Services for Unreasonable Use. Tresta can terminate services without notice if we determine or reasonably suspect that you have violated this Reasonable Use Policy.
High Volume or Unusual Usage. You must notify us in advance if your Account is expected to have a high volume of calls during a particular billing cycle (volume that exceeds 50,000 minutes per month, more than 50 concurrent calls at one time, or if you intend to use the Services for or in television advertising).
Free Trial Usage. The intent of the Free Trial is to allow you to use our Services in a manner consistent with your business practices to determine if our Services would be a good fit for your needs. Free Trial users who use the Services for purposes other than to conduct a fair and reasonable evaluation, or Free Trial users who, in our sole discretion, abuse the Free Trial, may be terminated at any time without notice.
You can cancel your Services at any time. We can cancel or suspend your Services if you do something that upsets us.
You are abusive to Customer Support or other Tresta employees.
Termination. You may terminate at any time by calling Customer Service at +1 (844) 2-TRESTA.
Refunds. If you terminate the Services and have a credit balance on file, the credit balance will be refunded to the credit card on file within five (5) calendar days after the Account is canceled.
Effect of Termination. Upon termination of this Agreement and/or your Services, your right to use the Services immediately ceases. You shall have no right, and we will have no obligation thereafter to forward any unread or unsent messages to you or to any third party. We may require re-activation charges to renew Services after termination or suspension.
Hang up, choose a different phone, and dial 911! We do not provide 911 calling.
The services do not include e911 or 911 service. The services are intended to support connectivity to Tresta's platform only and do not provide full-service inbound and outbound calling/dial tone service. Customer may not use the service to make emergency calls. In the event of an emergency, hang up and dial 911 from a 911-enabled phone.
We are not responsible for anything that happens if you use a third party company for 911 services in conjunction with Tresta.
Tresta shall have no liability or responsibility arising out of any E911/911 services provided by any third-party provider or any acts, omissions, failures or interruptions of service, negligence or other misconduct of any 911 service provider, or customer. Tresta makes no representation or warranty, express or implied, with respect to the nature, scope, extent, performance, compatibility, or quality of any 911 emergency or similar services offered by a third-party provider for use with the services. customer hereby agrees to indemnify, defend and hold harmless Tresta and its officers, directors, managers, employees, affiliates, attorneys, and agents, from and against any and all claims, demands, suits, proceedings, liabilities, settlements, attorneys' fees, costs, expenses, penalties, fines, judgments and damages of any kind whatsoever (including, without limitation, reasonable attorneys' fees) by or on behalf of a customer or any user, arising out of or otherwise relating to any failure of E911 or 911 service used in conjunction with the Tresta services.
You can use our Services as long as you comply with this Agreement.
Subject to the conditions of this Agreement, we grant you a revocable, non-exclusive, non-sublicenseable, and non-transferable license to use the Services subject to the terms of and for the duration of this Agreement.
You understand that these terms may change from time to time and you will still be required to follow them unless you tell us in writing.
Additional Terms. All Services, including any related offers and promotions may be subject to additional terms and conditions. You agree to check our Website regularly as these terms and conditions are updated from time to time. You will remain responsible to us under this Agreement for the actions of any other person you allow to use the Services on your Account.
Customer Proprietary Network Information ("CPNI"). CPNI, as that term is defined in Section 222 of the Communications Act of 1934, 47 U.S.C. § 222, as amended, includes information available to Tresta by virtue of Tresta's relationship with its customers as a provider of voice communications service and may include: the quantity, technical configuration, location, type, destination, amount of use of each communications service subscribed to, and information contained on the telephone bills of Tresta's customers pertaining to telephone service received by a customer of Tresta. Tresta collects CPNI from customers.
Tresta will adopt further safeguards and comply with additional CPNI requirements, including filing its annual CPNI Certification, as required by law.
Call Recording and Monitoring. We record all calls to Tresta Customer Service for quality assurance. Customer expressly agrees to let us contact you via automatic dialing equipment at any phone number on your Account or any phone number provided or used by you to contact Customer Service.
We will do our best to provide top-notch Services, but some things are beyond our control.
The Agreement and Website. Tresta will provide the Services in accordance with the Agreement, and as described in the current price plans on our Website, from the date of purchase.
Network Interruptions. We try to make sure that the Services are available to you wherever possible; however both availability and quality of the Services may be affected by things we cannot control such as physical obstructions, atmospheric conditions and outages on the Network where such outages and their remedies are not within our control. We or our Network Operator may from time to time need to carry out upgrade or maintenance work on the Network which may affect the availability and/or quality of the Services. We will endeavor to keep such disruption to a minimum, but this may not always be within our control.
Service Quality. We shall provide the Services with reasonable skill and care, and we shall use reasonable efforts to make the Services available to you. We do not, however, guarantee any service level of quality. If you experience problems with our Services or suspect fraudulent activity on your Account, please contact us immediately.
Changes to Service Offerings. We may from time to time and without notice, change the Services in order to comply with safety, regulatory, statutory and other requirements. We will try to ensure that this does not materially affect the scope of the Services.
Tresta is not responsible if you use our Services to break the law.
Compliance with Agreement and Instructions. You must use the Services in accordance with this Agreement, and any other reasonable instructions we give you from time to time.
Confidentiality of Account. You are solely responsible for maintaining the confidentiality of your Account, and you agree to pay for the services charged to your Account, whether or not you have authorized such use. We shall not be held responsible for fraudulent use of your credit/debit/charge card or Account. If you believe that your Account is being used in an unauthorized manner, you must contact us immediately so that the appropriate modifications can be made to your Account.
Cooperation with Applicable Laws. You shall remain in compliance with all applicable laws, rules and regulations during the term of this Agreement. Tresta is not responsible, and specifically disclaims any obligation, to inform you of your legal obligations. You may not use or permit others to use an Account or the Services for any purpose which constitutes a violation of applicable laws in its jurisdiction. You shall indemnify, defend and hold harmless Tresta and its Affiliates, directors, officers, employees, agents, representatives, successors and assigns from any and all claims including third-party claims, damages and expenses whatsoever (including reasonable attorney's fees) arising in connection with your violation or alleged violation of any applicable laws or regulations with respect to your use of or granting of access to the Services.
Cooperation with Tresta. You will cooperate with us on all issues related to fraud, misuse or damage of the Services. To the extent permitted by applicable law, you will inform Tresta of any instance and work with Tresta to prevent or eliminate fraud, misuse or damage to the Services. You shall cooperate with Tresta to allow any Government agency or authority to intercept messages or access information over Tresta's network, as may be required under applicable law.
Only these contact methods will count if you are trying to reach us!
You will defend Tresta, and pay for any expenses that fall on Tresta, if you do something bad and we get blamed.
You agree, at your sole cost and expense, to fully defend, indemnify and hold harmless Tresta, its affiliates, subsidiaries, shareholders, directors, officers, employees, and agents from and against any and all claims, causes of action, actions, judgments, liabilities and/or damages (including without limitation reasonable expenses and reasonable attorneys fees) arising out of or in connection with (i) your use of the Services, (ii) your Account (including the use of your Account by a third party) and (iii) this Agreement.
We will never be liable for more than the charges you incur during the month prior to any losses or damages.
Except for damages caused by our intentional and willfully wanton misconduct, we will not be liable for damages that exceed the amount of our charges to you for your actual use of the services during the prior one-month period. Under no circumstances will we be liable for any direct, special, consequential, incidental, indirect, exemplary or punitive damages, including, but not limited to, loss of profit or revenues, or increased costs of operation, even if such damages were foreseeable or we have been specifically advised of the possibility of such damages, and no matter how that claim is styled or on what legal grounds it is based (such as contract, tort, statute or otherwise).
We think we're great, but we don't claim to be a perfect fit for your particular needs or to be perfectly flawless.
We do not make any warranties of any kind, either express or implied, including without limitation any warranties of title, non-infringement of intellectual property, merchantability, technical compatibility or fitness for a particular purpose with regard to any service, products or material provided pursuant to this agreement and on this website. We also make no warranty that the services will be uninterrupted or error free. We do not authorize anyone, including our employees, agents or representatives, to make a warranty of any kind on our behalf and you should not rely on any such warranty. You expressly acknowledge and agree that because the services are provided in part over networks outside of our control, they are subject to outages, disruptions and interception, and that we have no liability for any such outages, disruptions or interceptions. Tresta is not responsible for the content of communications transmitted through the services.
Don't steal our property – intellectual or otherwise!
Trademarks. All corporate names, service marks, logos, trade names, trademarks, websites and domain names of Tresta, including but not limited to, Tresta, Inc.(collectively, "Marks") are and shall remain the exclusive property of Tresta, and nothing in this Agreement shall grant you the license to use or copy such Marks without our prior written permission.
Ownership of Materials. All Services, Accounts, content (including, but not limited to, software, text, photographs, video, and graphics) on any material displayed on the Site, through the Services, or in other Tresta documents or materials are the property of Tresta. All intellectual property rights in Tresta Accounts, Services, Sites and content (Marks, trade secrets and patents) are the property of Tresta. Tresta retains all copyrights in the individual pages, and their components, and collective works available at the Site. They may not be copied, reproduced, modified, published, uploaded, posted, transmitted, performed, or distributed in any way without Tresta's prior written permission.
We own any information you send us or store on our system, so don't send us something you want to own exclusively.
We can assign the agreement, you can't. Sorry.
We may assign all or part of our rights and duties under this Agreement to any party at any time without notice to you. If we do that, we will have no further obligation to you in connection with such assigned duty. You may not assign your rights and duties under this Agreement without our prior written permission.
You can't get out of this Agreement just because one provision is unenforceable.
This is our entire Agreement, even if someone said otherwise.
This Agreement, together with any written amendments or written modifications, will constitute the entire agreement between you and Tresta with respect to the Services provided hereunder and will supersede and replace all prior or contemporaneous understandings or agreements, written, electronic or oral, between you and Tresta. No written or oral statement, advertisement or service description not expressly contained in the Agreement will be allowed to contradict, explain, modify or supplement it. You acknowledge and agree that you are not relying on any representation or statement by Tresta that is not included in this Agreement.
Florida is nice. If there's ever a legal dispute, Florida law governs and you will have to come visit us here.
This Agreement shall be governed by and construed in accordance with the laws of the State of Florida. You agree, in the event any claim or suit is brought in connection with this Agreement, to the exclusive jurisdiction and venue of Leon County, Florida. In any action to enforce this Agreement, including, without limitation, any action by Tresta for the recovery of fees due hereunder, you shall pay Tresta reasonable attorney's fees and costs in connection with such action. You acknowledge and agree that this governing law provision applies no matter where you reside, or where you use or pay for the Services.
We will email you or post updates to your Account.
All notices from us to you shall be (i) sent to your current email address on file with us and will be deemed immediately delivered even if such email address is no longer valid, or (ii) posted to your Account. All notices from you shall be sent to the address provided above in the "Contact Information" section.
If something really, really bad happens, we won't be responsible for any failure to perform in accordance with this Agreement.
Tresta shall not be held responsible for any delay or failure in performance of any part of this Agreement to the extent that such delay or failure is caused by fire, flood, explosion, war, embargo, government requirement, civil or military authority, act of God or other similar causes beyond Tresta's control. You shall be excused from any delay or failure in performance hereunder, other than the payment of moneys, caused by reason of occurrence or contingency beyond its reasonable control, including without limitation, fire, flood, explosion, war, embargo, government requirement, civil or military authority, act of God or other similar causes beyond your control.
Just because we ignore one provision, doesn't mean you are excused from complying with other provisions.
Tresta's failure to exercise any of its rights hereunder upon breach by you or pursuant to any condition, covenant or provision contained in this Agreement shall not be construed as a waiver thereof, nor as a waiver of the same or any other default subsequently occurring. | 2019-04-20T14:16:34Z | https://www.tresta.com/terms |
We introduce rapid replica molding of ordered, high-aspect-ratio, thiol-ene micropillar arrays for implementation of microfluidic immobilized enzyme reactors (IMERs). By exploiting the abundance of free surface thiols of off-stoichiometric thiol-ene compositions, we were able to functionalize the native thiol-ene micropillars with gold nanoparticles (GNPs) and these with proteolytic α-chymotrypsin (CHT) via thiol-gold interaction. The micropillar arrays were replicated via PDMS soft lithography, which facilitated thiol-ene curing without the photoinitiators, and thus straightforward bonding and good control over the surface chemistry (number of free surface thiols). The specificity of thiol-gold interaction was demonstrated over allyl-rich thiol-ene surfaces and the robustness of the CHT-IMERs at different flow rates and reaction temperatures using bradykinin hydrolysis as the model reaction. The product conversion rate was shown to increase as a function of decreasing flow rate (increasing residence time) and upon heating of the IMER to physiological temperature. Owing to the effective enzyme immobilization onto the micropillar array by GNPs, no further purification of the reaction solution was required prior to mass spectrometric detection of the bradykinin hydrolysis products and no clogging problems, commonly associated with conventional capillary packings, were observed. The activity of the IMER remained stable for at least 1.5 h (continuous use), suggesting that the developed protocol may provide a robust, new approach to implementation of IMER technology for proteomics research.
The online version of this article ( https://doi.org/10.1007/s00216-019-01674-9) contains supplementary material, which is available to authorized users.
Immobilization of proteolytic enzymes (e.g., trypsin, pepsin, and chymotrypsin) on solid support structures packed in capillary channels has gained considerable interest owing to its many benefits over soluble enzyme reactions [1, 2]. Enzyme immobilization on solid support structures omits the need for separation of the enzymes from the reaction solution, which not only simplifies the purification of the reaction products but also allows, for instance, online mass spectrometric (MS) analysis of the proteolytic digest and the reuse of the enzymes, which both result in significant savings in time and costs [3, 4]. Most importantly, enzyme immobilization effectively suppresses autoproteolysis even at high enzyme-to-substrate ratios. In some cases, immobilization also enhances the enzyme stability and activity, which leads to increased conversion rates [5, 6]. However, the enzyme immobilization strategy plays a key role in achieving the high conversion rates with a view to maximizing the amount of bound enzymes and maintaining them active on solid supports . The most common strategies make use of porous polymer monoliths [3, 4] or magnetic beads , which are functionalized with covalently bound enzymes and packed in a capillary channel to increase the surface area. Apart from classical esterification, covalent binding may however require harsh conditions that increase the risk of denaturation and loss of enzyme activity. The ester bond, on the other hand, is relatively unstable in aqueous conditions, which may result in leaching of the immobilized enzymes. Alternatively to covalent binding, enzymes have also been physically entrapped inside porous matrixes, but depending on the pore size, these are also prone to enzyme leaching (too large pores) or restricted diffusion of the substrate to the enzyme (small pores) . Any kinds of capillary packing (whether porous matrices or magnetic beads) may also suffer from clogging and reproducibility issues.
Modern microfabrication techniques provide appealing opportunities for the implementation of immobilized enzyme reactors (IMERs). Wafer-scale fabrication processes enable not only parallelism and high degree of system integration, but also customization of the solid support structures with respect to both architecture and the surface chemistry. For instance, dense micropillar arrays have been implemented on silicon in order to increase the surface-to-volume ratio for on-chip chromatographic separations [8, 9, 10]. Owing to the possibility to pattern well-ordered micropillar arrays simultaneous to the microchannel network in a reproducible manner, no post-processing (channel packing) is needed and the problems related to clogging can be avoided. Although oxidized silicon readily provides a variety of surface functionalization reactions via silanol groups, which are mostly suitable for covalent coupling reactions, silicon microfabrication as such requires special facilities, including cleanroom instrumentation.
In this work, we introduce rapid replica molding of ordered, high-aspect-ratio micropillar arrays from off-stoichiometric thiol-ene polymers. By mixing the thiol and allyl (“ene”) monomers in off-stoichiometric ratios, the surface chemistry and the mechanical properties of thiol-ene microdevices can be tailored toward a variety of applications [11, 12, 13]. In the past, thiol-enes have been used in several applications, including microchip electrophoresis [13, 14] and biosensing [15, 16] devices, protein and DNA arrays , and on-chip electrospray ion sources for mass spectrometric detection [18, 19]. The off-stoichiometric thiol-enes (OSTEs) have also been exploited to fabricate porous monoliths inside thiol-ene microchannels followed by covalent coupling of proteolytic enzymes onto both thiol- and allyl-rich surfaces [4, 20]. Here, we make use of the native thiol-ene surface chemistry by preparing thiol-rich micropillar arrays and functionalizing them with gold nanoparticles (GNPs) via the well-characterized and strong thiol-gold interaction [21, 22]. Finally, we demonstrate the immobilization of α-chymotrypsin (CHT) onto GNP-coated thiol-ene micropillars via the enzyme’s free thiol groups (reduced disulfide bridges). The specificity of the thiol-gold interaction between both thiol-rich surface and GNP as well GNP and CHT is also examined, and the robustness of the developed CHT-IMER setup (with respect to flow rate and reaction temperature) is demonstrated by MS analysis of bradykinin hydrolysis products.
Methanol, dimethyl sulfoxide, acetone, tetrahydrofuran, toluene, acetic acid, ammonium acetate, ammonium hydroxide, 5,5′-dithiobis(2-nitrobenzoic acid) (DTNB), phosphate-buffered saline (PBS), α-chymotrypsin from bovine pancreas (CHT, type II, 40 units/mg protein), bradykinin acetate (fragment 1–9), and DL-dithiothreitol were purchased from Sigma-Aldrich (Steinheim, Germany). All reagents and solvents used were HPLC or MS grade (≥ 98.0%). Suspensions of bare GNPs (10 nm, stabilized in 0.1 mM PBS) and dodecanethiol functionalized gold nanoparticles (d-GNPs, 3–6 nm, 0.6–0.9% solid material, 0.01% HAuCl4 in toluene) were also from Sigma-Aldrich. Irgacure® TPO-L photoinitiator (2,4,6-trimethylbenzoylphenyl phosphinate) was donated by BASF (Ludwigshafen, Germany). Water was purified with a Milli-Q water purification system (Merck Millipore, Molsheim, France). SU-8 100 negative photoresist (Microchem Corporation, Newton, MA) used for master fabrication was purchased from Micro Resist Technologies GmbH (Darmstadt, Germany). Poly(dimethyl siloxane) (PDMS) used for fabrication of the replication mold was prepared from Sylgard 184 base elastomer and curing agent (Down Corning Corporation, Midland, MI). Trimethylolpropane tris(3-mercaptopropionate) (“trithiol”) (≥ 95.0%), pentaerythritol tetrakis(3-mercaptopropionate) (“tetrathiol”) (≥ 95.0%), and 1,3,5-triallyl-1,3,5-triazine-2,4,6(1H,3H,5H)-trione (“triallyl”) (≥ 98.0%) were used for microchip fabrication and purchased from Sigma-Aldrich (Saint Louis, MO).
The activity of immobilized CHT was determined by bradykinin hydrolysis. The stock solution of bradykinin (1 mM in Milli-Q water) was diluted to appropriate concentrations with 20 mM ammonium acetate (pH 8.2) before measurements. The 20 mM ammonium acetate solution used was prepared in deionized Milli-Q water and filtered (0.2 μm) before use in MS analyses. The pH of the ammonium acetate solution was adjusted using 10% (v/v) ammonium hydroxide. For determination of the specificity of the GNP interactions, phosphate-buffered saline (pH 7.4) was used as the buffer.
The microchip design used in this study comprised of a 30-mm long, 4-mm wide, and 200-μm high microchannel incorporating 14,400 micropillars (average diameter 50.4 ± 0.6 μm, n = 10) arranged in a hexagonal geometry. The micropillar array was connected to an inlet and an outlet (both ∅ 2 mm) via tapered, triangular heads not containing micropillars and 3-mm long and 100-μm wide connecting channels (Fig. 1a). The total volume of the IMER was ca. 25 μL. The chip fabrication comprised of four steps: (a) cleanroom fabrication of the SU-8 master, (b) casting of the PDMS mold (soft lithography), (c) replication of the thiol-ene micropillar array under UV light, and (d) bonding of the thiol-ene micropillar array with another thiol-ene (cover) layer (Fig. 1). Apart from the fabrication of the initial SU-8 master (see Electronic Supplementary Material, ESM), all further fabrication steps were carried out in a regular chemistry laboratory (under non-cleanroom conditions). The PDMS molds for thiol-ene replication were prepared by mixing the base elastomer and the curing agent at a ratio of 10:1 (w/w). After degassing in vacuum for 30 min, the PDMS mixture was cast onto the SU-8 master and cured at 80 °C for 3 h.
The final IMER was fabricated by mixing the “tetrathiol” and “triallyl” monomers in a ratio that yielded 50 mol-% excess of thiol functional groups. This composition was chosen in order to maximize the number of free surface thiols, which is known to increase as a function of increasing excess of the thiol monomer . No photoinitiators were added to the composition to facilitate straightforward bonding of two alike surfaces as described in . However, in the absence of photoinitiators, the curing of thiol-ene compositions with very large excess of the thiol monomer becomes slow and thus the 50 mol-% excess of thiols was the practical upper limit for in this study.
For the specificity tests, also stoichiometric and allyl-rich (50 mol-% excess of allyl functional groups) compositions of “trithiol” and “triallyl” were used. No photoinitiators or other additives were added to any of the compositions. After mixing, the thiol-ene solution was poured onto the PDMS mold, featuring the negative replica of the micropillar array as microwells, and the mold was placed in vacuum for 2–5 min to effectively remove residual air bubbles trapped in the deep microwells (see ESM Fig. S1). Next, the thiol-ene monomer mixture was cured (without cover) under UV light for 5 min by using a Dymax 5000-EC Series UV flood exposure lamp (Dymax Corporation, Torrington, CT, USA, nominal intensity 225 mW/cm2). The planar cover layer incorporating only the inlet and outlet holes was prepared in a similar manner. The fully cured cover and bottom (micropillar) layers were then preheated to allow uniform sealing (here, ca. 70 °C was used) and laminated against each other. The bonding was finalized with additional UV exposure through the cover layer for 2 min. The bonding strength was determined by air-pressure tests using an in-house built gas delivery system consisting of an electronic regulator and solenoid valves (SMC Pneumatics Finland Oy, Espoo, Finland). The cured and bonded IMERs were stored at room temperature (RT) in the dark and under atmospheric pressure until use. Characterization of the microstructures was performed by a scanning electron microscope (SEM, FEI Quanta™ FEG, Hillsboro, OR) by attaching the samples onto the sample stage with a carbon-coated double-sided tape and sputtering (Quorum Q150TS, turbomolecular-pumped high-resolution coater, Quorum Technologies, UK) with platinum for 25 s (30 mA) to yield a ca. 5-nm-thick coating.
The immobilization of CHT on the thiol-rich (50 mol-% excess) micropillar array included two steps, both exploiting the thiol-gold interaction. First, the micropillar array was filled with the gold nanoparticle suspension and incubated at 4 °C overnight. Next, the micropillar array was thoroughly rinsed with fresh buffer (20 mM ammonium acetate, pH 8.2) solution followed by another overnight incubation with CHT (1 mg/mL) at 4 °C. Before enzyme incubation, the disulfide bridges of CHT were reduced using 5 mM dithiothreitol (in buffer). Finally, the micropillar-based CHT-IMER was rinsed with 20 mM ammonium acetate (pH 8.2) before determination of the enzyme activity by MS.
The amount of free thiol groups on micropillar surfaces were quantitated by titration using Ellman’s reagent . Briefly, a concentrated solution of 5,5′-dithiobis(2-nitrobenzoic acid) (DTNB) in PBS buffer was pumped through the micropillar array at a flow rate of 5 μL/min followed by quantitation of the reaction product, 2-nitro-5-thiobenzoate (TNB), by UV absorbance (412 nm) using Varioskan LUX Multimode Microplate Reader (ThermoScientific, Vantaa, Finland). Alternatively, the number of free surface thiols on planar surfaces was determined by submerging thiol-ene slabs (approx. 10 mm × 10 mm × 0.5 mm) into 1 mL of 200 μM DTNB in PBS for 30 min with stirring every 10 min. After 30 min, the thiol-ene slabs were removed and the reaction product TNB was quantitated by UV absorbance as described above. The number of free (reacted) thiols was determined using a molar extinction coefficient for the reaction product of ε = 14,150 M−1 cm−1 .
The wetting properties of native thiol-ene and GNP-functionalized surfaces were characterized using a contact angle goniometer (Theta, Biolin Scientific, Espoo, Finland). Advancing and receding water contact angles were determined by the sessile droplet needle method using Young-Laplace fitting. The advancing contact angle was measured by increasing the droplet volume from 2 to 8 μL at a rate of 0.1 μL/s, and the receding angle by decreasing the volume from 8 to 0 μL at a rate of 0.1 μL/s.
An NTEGRA Prima (NT-MDT, Russia) atomic force microscope (AFM) was used for topographical analysis of the native and GNP-functionalized surfaces. The images (1024 × 1024 pixels) were captured in intermittent-contact mode at ambient conditions using gold-coated silicon cantilevers with a nominal tip radius of 10 nm (model: NSG 10, NT-MDT). The scanning rate and damping ratio were 0.2–0.3 Hz and 0.6–0.7, respectively. Image analysis was performed using the SPIPTM image analysis software (Image Metrology).
X-ray photoelectron spectroscopy (XPS) spectra were captured with a PHI Quantum 2000 scanning spectrometer, using monochromatic Al Kα x-ray source (1486.6 eV) excitation and charge neutralization by using electron filament and an electron gun. The photoelectrons were collected at an angle of 45° in relation to the sample surface with a hemispherical analyzer. The average depth of the XPS analysis was in the range of 5–10 nm. The pass energies of 187.85 eV and 29.35 eV were used for collecting survey and high-resolution spectra, respectively. The measurements were done on two different spots for each sample. The atomic concentration (%) of the different elements was derived by calculating the area of the peaks and correcting for the sensitivity factors using a MultiPak v6.1A software (Physical Electronics). The binding energies acquired in the XPS spectra were corrected using the C1s photoelectron peak at 284.8 eV as a reference.
The hydrolysis of bradykinin (Arg-Pro-Pro-Gly-Phe-Ser-Pro-Phe-Arg, MW 1060) on the C-terminal side(s) of phenylalanine(s) was used as the model reaction to monitor the activity of immobilized CHT by electrospray ionization (ESI)-MS. The sample solutions (20 μM bradykinin in 20 mM ammonium acetate, pH 8.2) were infused with a syringe pump at a constant flow rate of 2.5, 5, 10, 15, or 20 μL/min and the reactants were collected for MS analysis in appropriate volumes (typically 100–150 μL per fraction). The effect of reaction temperature (RT vs. physiological temperature 37 °C) was examined by heating the CHT-IMER with a 0.5-Ω resistive heater block (Digi-Key, Thief River Falls, MN) attached to the bottom of the IMER with double-sided tape. The heating temperature was controlled with a DC power supply (Iso-Tech IPS-603, RS Components Ltd., Northants, UK) equipped with a PID temperature controller (type CN743, OMEGA Engineering, Manchester, UK). ESI-MS detection was performed on an Agilent 6330 iontrap mass spectrometer (Agilent Technologies, Santa Clara, CA) using direct infusion (5 μL/min). Before ESI-MS analysis, the collected sample fractions were diluted 1:1 with methanol-water 90:10 containing 0.2% (v/v) acetic acid. The ion trap was operated in positive ion mode with a capillary voltage set at − 3500 V and end plate offset at − 500 V. Nitrogen produced from compressed air by a Parker nitrogen generator (Cleveland, OH) was used as the drying gas (4.0 L/min, 325 °C). The MS data was acquired over a mass range of m/z 100–2000 with a maximum accumulation time of 300 ms using Data Analysis 3.4.
In this work, we examined the possibilities of exploiting the inherent high thiol density of the crosslinked off-stoichiometric (thiol-rich) thiol-enes for efficient functionalization of the micropillar arrays with GNPs. The efficiency of GNP adhesion to native thiol-rich surfaces was first examined by preparing planar GNP-functionalized substrates in two different ways, i.e., via immersion and drop deposition (control method), as illustrated in Fig. 2. The drop deposition method has been shown to result in self-assembly of GNP monolayers upon controlled evaporation (dewetting) achieved by the addition of nonvolatile dodecanethiol ligand . In the drop of the solvent (toluene), the dodecanethiol gold nanoparticles (d-GNPs) form a close-packed monolayer film of floating nanoparticles, which deposits onto the underlying surface upon solvent evaporation. As such, the evaporation approach is not feasible for deposition of GNPs onto enclosed 3D compartments, such as the micropillar arrays, and incubating the pillar arrays with d-GNPs would only result in a nonuniform GNP layer due to nonspecific adsorption of the dodecanethiol on polymer surfaces. Nevertheless, drop deposition was a robust method for preparing GNP monolayers on planar surfaces and thus, a good point of comparison for the preliminary surface characterizations. Since the drop deposition method necessitates the use of organic solvents (such as toluene), we first carried out a solvent compatibility test with two different thiol-rich compositions prepared from either a trithiol or tetrathiol monomer and a triallyl monomer. As a result, thiol-rich compositions prepared using an excess (+ 50 mol-%) of the tetrathiol monomer showed somewhat better stability toward selected organic solvents, particularly toluene, than thiol-rich compositions prepared using the same molar excess of the trithiol monomer (see ESM Table S1). The better solvent tolerance of the tetrathiol-rich compositions was associated with their greater crosslinking degree, which is manifested, e.g., as a decreased oxygen permeability , over trithiol-rich compositions. Here, the greater crosslinking degree of the tetrathiol-rich composition likely prevented solvent penetration into the cured (bulk) thiol-ene network, better than trithiol-rich composition, similar to earlier observations [27, 28]. Therefore, the tetrathiol monomer was selected for fabrication of the thiol-ene substrates used in this study.
After incubation with the GNPs (immersion) or d-GNPs (droplet deposition), the surfaces were carefully rinsed with PBS prior to analysis with AFM, XPS, and contact angle goniometry. In all cases, 50 mol-% excess of either the thiol or allyl functional groups was used in the bulk to achieve thiol- or allyl-rich surfaces, respectively. While thiol-rich surfaces were considered ideal for maximizing the amount of thiol-gold interactions, the allyl-rich surfaces provided a good point of comparison with negligible amount of free surface thiols but otherwise very similar surface properties (e.g., in terms of wetting/hydrophobicity ). While the immersion approach better resembles the adhesion mechanism in a microchannel and necessitates the thiol-gold interaction, the toluene drop deposition approach facilitates the deposition of d-GNPs on any surface chemistry. Based on topographical analysis by AFM, the deposition of GNPs using the immersion approach (1-h incubation) provided a significant increase in the surface roughness (Sq) from 0.77 to 5.8 nm on thiol-rich surfaces (Fig. 2a vs. b), while their impact on the surface roughness of allyl-rich surfaces was negligible (Sq = 1.6–1.7 nm, Fig. 2c vs. d). In addition to roughness, the differently treated surfaces were examined in terms of the surface area ratio (Sdr) which expresses in percent how much larger the interfacial (real) surface area is compared with the area of the projected (flat) x,y plane. As illustrated in Fig. 2a–d, the effective surface area (Sdr) was also substantially greater for GNP incubated thiol-rich surfaces (Sdr = 6.1%, Fig. 2a) than for any of the controls (Sdr = 0.9…1.8%, Fig. 2b–d). These results suggest that the surface thiols were in a key role in facilitating GNP adhesion. Instead, the drop deposition resulted in much greater overall surface roughness independent of the surface chemistry, although the change was somewhat larger in case of thiol-rich surfaces. Compared with the aqueous PBS treatment (Fig. 2b and d), toluene treatment alone was shown to increase the surface roughness (Sq) and the effective surface area (Sdr) of both thiol- and allyl-rich surfaces (Fig. 2f and h). However, when d-GNPs were included in the toluene incubation, the surface roughnesses of both thiol- and allyl-rich surfaces were further increased from Sq = 5.4 nm to Sq = 11.5 nm and from Sq = 3.6 nm to 6.4 nm, respectively, compared to those of mere toluene-treated surfaces (Fig. 2e and g). Thus, the AFM data clearly evidenced deposition of d-GNPs and formation of the dodecanethiol layer on both thiol- and allyl-rich surfaces when drop deposition method was used, as expected. Generally, the drop deposition method (Fig. 2e vs. g) resulted in somewhat nonuniformly distributed summits and larger, aggregated objects on the surface, which was likely due to nonspecific adsorption of dodecanethiol onto the polymer surfaces preventing proper self-assembly of d-GNPs. Instead, the GNP deposition by the immersion method clearly favored thiol-rich surface (Fig. 2a vs. c) and resulted in a distinct granular morphology, which laid solid grounds for GNP adhesion onto microchannel surfaces.
The elemental composition (the presence of gold) of the GNP-functionalized surfaces was further characterized by XPS. The XPS data further confirmed an atomic concentration of ca. 0.6% of gold on thiol-rich surfaces immersed in colloidal GNP suspension in PBS (Fig. 3), while the amount of elemental gold on allyl-rich surfaces was negligible. Surprisingly, the atomic concentration of gold on d-GNP modified surfaces (droplet deposition method) was also significantly small, ca. 0.2% only. Therefore, the d-GNP adhesion on thiol-ene surfaces was further confirmed by water contact angle goniometry. As a result, clear changes in the receding contact angle of both thiol- and allyl-rich surfaces were observed (see ESM Fig. S2), suggesting clear adsorption of d-GNPs based on hydrophobic interactions between the alkanethiol tails and the surface. As also confirmed by AFM, these interactions resulted in very heterogeneous surface topographies and aggregation, which was likely the main reason for the low observed atomic concentration of gold in the XPS experiments. Instead, the GNP deposition via the immersion approach was concluded to provide good grounds for functionalization of through-flow micropillar arrays with a view to enzyme immobilization via thiol-gold interaction. This was further confirmed by contact angle analysis of GNP-treated thiol-rich surfaces following CHT immobilization. A clear change in the surface wettability was observed for CHT-functionalized surfaces with advancing contact angles shifting from the initial values of ca. 80° (native) and 60° (GNP-treated) to clearly below 20°. After CHT incubation, the water droplets formed non-axisymmetric droplets from which exact contact angles could not be measured. This is however typical for hydrophilic and heterogeneous surfaces, such as the CHT-coated surface.
Previous studies have shown that the crosslinking degree, and thus, the rigidity and the bonding strength, of thiol-ene polymer networks can be greatly altered by varying both the monomer type (e.g., trithiol vs. tetrathiol) and the (off-)stoichiometric ratio of the thiol and allyl monomers [11, 12, 18]. Upon addition of a photoinitiator to the monomer mixture, the crosslinking occurs faster and typically in a quantitative yield compared to thiol-ene curing without the photoinitiators . As a result, only surfaces with opposite excess of thiols and allyls can be effectively bond to each other . However, by omitting the photoinitiator, also two alike thiol-ene surfaces can be bond together with fairly high bonding strength , which indicates that the structure rigidity, for its part, also plays a role. These previous findings further supported the use of the tetrathiol monomer with the triallyl monomer for the fabrication of the micropillar arrays to ensure sufficient rigidity of the replicated, high-aspect ratio (here h/w ~ 4) micropillar arrays. To maximize the number of free surface thiols toward efficient binding of GNPs, a 50 mol-% excess of thiol functional groups was used in the bulk, which resulted in 162 ± 16 nmol of free thiols per device (n = 3 titrations), corresponding to ca. 131 free thiols per nm2. The theoretical (calculated) increase in the total surface area and the surface-to-volume ratio, provided by the dense micropillar array incorporating total of 14,400 pillars (each ∅ 50.4 ± 0.6 μm, height 200 μm), was ca. 3-fold and 4-fold, respectively, over a hollow microchannel with identical dimensions (width 3 mm, length 40 mm, height 200 μm).
Consequently, straightforward and good quality sealing of the micropillar arrays with another identical surface was facilitated by omitting the photoinitiator. In this manner, the reverse sides (in contact with PDMS during UV curing) of both layers could be bond together with bonding strengths exceeding 2 bar (the upper limit of our pressure controlled test system). For comparison, micropillar arrays fabricated out of “trithiol” and “triallyl” monomers with equal excess (50 mol-%) of free thiols constantly broke already at 1.5 ± 0.4 bar (n = 4 IMERs). The bonding strengths remained unchanged even after delamination (upon heating) and re-bonding of the micropillar arrays, further suggesting that the rigidity of the chosen composition greatly affects the achievable bonding strength.
Before this work, high-aspect thiol-ene micropillar arrays have been achieved via direct photolithographic patterning only [30, 31]. Although the lithography approach allows high feature resolution, it necessitates the use of photoinitiators (and inhibitors), which often complicates adhesive bonding and results in a higher crosslinking degree, and thus lower thiol density on the surface. To examine the effect of the crosslinking degree on the free thiol density, the number of free surface thiols was determined for tetrathiol-rich (50 mol-%) thiol-enes cured (5 min) in the absence and in the presence of the photoinitiator (0.1% TPO-L). As a result, the amount of free thiols dropped dramatically from the initial 190 ± 43 thiols to only 12 ± 1 thiols per nm2 (ESM Fig. S3a). Similar decrease in the amount of free surface thiols (15 ± 1 thiols per nm2, ESM Fig. S3a) was also achieved by re-exposing the reverse “PDMS side” of the thiol-ene layer for another 5 min (in the absence of the photoinitiator). The impact of curing time was also confirmed by determining the amount of free thiols as a function of UV exposure dose (ESM Fig. S3b). On the average, these thiol densities correspond to ca. 14–18 nmol thiols per device, which is an order of magnitude lower amount than that on a tetrathiol-rich device cured in the absence of the photoinitiator and about an order of magnitude higher amount compared with stoichiometric (2.2 ± 0.3 nmol/device, n = 3) and allyl-rich (2.1 ± 0.05 nmol/device, n = 2) devices. Since the high density of free surface thiols was found crucial for the efficient coupling of GNPs (as shown in the previous chapter), the replication approach developed herein is likely the only way to achieve sufficiently high coverage of free surface thiols, and thus of GNPs, as it allows fabrication of thiol-ene micropillars without the photoinitiators. The sole critical step in the micropillar replication protocol developed in this study was to remove the air trapped in the deep wells of the PDMS negative mold, as illustrated in ESM Fig. S1, suggesting that the method is robust and feasible for low-cost fabrication of highly ordered micropillar arrays.
The thiol-gold interaction was eventually utilized for functionalization of the thiol-rich (50 mol-% excess) micropillar arrays sequentially with GNPs (to the free surface thiols) and reduced CHT (to the GNP-coated surface via cysteine residues). Previous studies have shown that the size of the nanoparticles has a great impact on the structure and stability of the immobilized enzyme. Although larger nanoparticles (100 nm) may provide better enzyme coverage , smaller particles are reported to better preserve the native protein structure . A small particle is also less influenced by gravity effects, which may become relevant when functionalizing 3D topographies, such as the micropillar arrays. Because of these reasons, the 10 nm particles were concluded most feasible for the present study. After functionalization of the micropillar arrays, the activities of the CHT-IMERs were examined by monitoring the intensity ratio of the model substrate, bradykinin (Bk1–9, Arg-Pro-Pro-Gly-Phe-Ser-Pro-Phe-Arg), and its main hydrolysis product (Bk1–8, Arg-Pro-Pro-Gly-Phe-Ser-Pro-Phe), which were both detected as double charged ions [M + 2H]2+ at m/z 530.8 and 452.8, respectively (Fig. 4a–c). Although CHT hydrolyzes bradykinin on the C-terminal side of both phenylalanines, the Phe8-Arg9 bond is the favored cleavage site . The stability of the enzyme activity was shown to be good over a period of at least 100 min (Fig. 4b). After the first fraction (representing the system void volume), the variation of the bradykinin hydrolysis product (m/z 452.8) intensity between collected fractions was within 9% RSD (n = 6 fractions, each 150 μL). The specificity of the enzyme immobilization protocol was examined with the help of two different negative controls, i.e., micropillar arrays functionalized with only GNPs (no CHT) or only CHT (no GNPs), using a flow rate of 5 μL/min (ca. 5-min residence time). As expected, no hydrolysis product was produced in the absence of CHT (ESM Fig. S4a), but some nonspecific binding of CHT was observed in the absence of GNPs resulting in a relatively abundant product peak (Bk1–8) (ESM Fig. S4b). However, the catalytic activity of nonspecifically bound CHT (control without GNPs) varied largely across replicates (n = 3 IMERs). On the average, the intensity of the product Bk1–8 ion (3.4 ± 4.1 × 107 cps, n = 3) was just slightly above that of the bradykinin substrate ion (2.8 ± 1.3 × 107 cps, n = 3) evidencing insufficient enzymatic conversion. Instead, the more specific CHT immobilization via GNPs was shown to provide substantially higher catalytic activity compared to nonspecifically adsorbed CHT, as expected. On the average, the intensity of the product Bk1–8 ion (11.3 ± 3.5 × 107 cps, n = 3) was clearly greater than that of the bradykinin substrate ion (2.4 ± 2.3 × 107 cps, n = 3). The variation in the catalytic conversion rates (normalized product vs. substrate ion intensities) of the GNP-CHT-IMERs and the CHT-IMERs (negative control) are illustrated in Fig. 4d and ESM Fig. S4c, respectively. The average conversion rates (product/substrate ratio 7.3 vs. 1.1, respectively) were also statistically different (p = 0.049) between the different types of IMERs. Next, the impact of the reaction temperature and flow rate (residence time) on the conversion rate (product/substrate ratio) was examined. As expected, increasing the reaction temperature from RT to physiological temperature (37 °C) increased the product conversion rate by about 2-fold (n = 2 IMERs) (see ESM Fig. S5), but was typically associated with simultaneous increase in the MS background, which favored the use of RT. However, a greater increase in the product conversion rate was obtained by increasing the residence time (i.e., decreasing the flow rate). Although some variation between IMERs were observed, the same trend was confirmed by two replicate IMERs (Fig. 4e). At the lowest flow rates tested (2.5 μL/min), almost complete bradykinin hydrolysis was observed as illustrated in Fig. 4c. In all, these results evidence that the developed enzyme immobilization strategy combined with the facile microdevice fabrication under non-cleanroom conditions provides a robust approach to implementation of proteolytic IMERs for proteomics research. Owing to the good feature resolution achieved via microfabrication, the well-ordered micropillar arrays provide a convenient approach to microchannel packing by facilitating substantial increase in the surface area for maximum enzyme binding, while avoiding the risk of clogging often associated with porous polymer packing.
In this work, we introduce rapid replica molding of ordered, high-aspect-ratio, thiol-ene micropillar arrays for implementation of microfluidic immobilized enzyme reactors (IMERs) by exploiting thiol-gold interaction. The replica-molding method developed herein provides a straightforward approach for the fabrication of ordered micropillar arrays in non-cleanroom conditions. The possibilities to avoid the use of photoinitiators and to tune the thiol-ene surface chemistry via off-stoichiometry enable not only straightforward bonding but also good control over the number of free surface thiols available for GNP binding. Owing to the vast excess of thiol functional groups, we were able to bind GNPs on the native thiol-rich micropillars in an efficient manner so that these could be further exploited to immobilizing CHT also based on thiol-gold interaction between the GNPs and the thiol residues of the enzyme. Compared with microchannel packing with porous polymer monoliths or magnetic beads, the well-ordered, microfabricated pillar arrays allowed us to avoid the common pitfalls, such as clogging commonly associated with post-processed microchannel packings. The method qualification evidenced that the developed CHT-IMERs performed proteolytic hydrolysis (of bradykinin) in a robust and stable manner at RT and physiological temperature. The product conversion rate was most dependent on the flow rate (residence time), and almost complete (product/substrate ratio > 10) hydrolysis was achieved at a residence time of as short as 10 min (2.5 μL/min). Furthermore, the activity of the IMER remained stable for at least 1.5 h (continuous use), suggesting negligible leakage of CHT out of the IMER. As the enzymes were firmly immobilized, no further purification of the reaction solution was required prior to mass spectrometric detection. In all, the developed protocol is significantly straightforward, yet robust, while being also somewhat universal, since it can be applied for the immobilization of any proteolytic enzymes by their thiol residues. These are the main advantages of the developed IMER technology, which are likely to provide new opportunities for modern proteomics research.
We thank the Electron Microscopy Unit of the Institute of Biotechnology, University of Helsinki, and the Micronova Nanofabrication Centre, Aalto University, for providing access to the scanning electron microscope and the cleanroom facilities, respectively. Dr. Markus Haapala and Dr. Anu Vaikkinen are thanked for their help with mass spectrometry instrumentation.
Open access funding provided by University of Helsinki including Helsinki University Central Hospital. The research received funding from the European Research Council (ERC) under the European Union’s Seventh Framework Programme (FP/2007–2013) / ERC Grant Agreement number 311705 (CUMTAS). The work was also financially supported by the Academy of Finland (grant numbers 304400, 307466, 309608, and 297360), the University of Helsinki Research Funds, and the Doctoral Programme in Chemistry and Molecular sciences, University of Helsinki, and the Business Finland (grant number 211679).
The research involves neither human participants and animals. | 2019-04-19T05:27:52Z | https://link.springer.com/article/10.1007%2Fs00216-019-01674-9 |
Kyle Roach Named Student-Athlete of The Week!
Marin Academy alum Roach named Student-Athlete of the Week at Whitworth! Click here to read more.
JV Tennis win SF Jamboree!!
MA placed 1st in the round robin JV Jamboree in San Francsico this week!! The team earned the #1 seed for the semifinals and defeated International High School 26-2. In the tournament finals, the Wildcats tied University High School 14-14, but by virture of the tie-breaker in the round robin the Cats took home 1st place!! Congratulations to coach Kent and the boys on a fantastic season!!
Winnick Scores in Final Minute!
Marin Academy’s Ava Steinle tied the game and Kathleen Winnick scored an unassisted, last-minute, go-ahead goal to lead the Wildcats to a 15-14 victory over Tam on Wednesday. Click here to read more!
Boys Prep of the Week - Eric Sachelben!
MA Captain Developing into an Exceptional Leader! Click here to read more!
Girls Prep of The Week - Lucinda Anderson!
Passiona and growth lead to on field success!! Click here to read more!
Girls Prep of the Week: Marin Academy’s Jazzaray McClinton!
The reigning BCL West MVP controlled the midfield and guided the Wildcats to a league championship with dominating defense. Click here to read more!
Wildcats race out to a hot start to the season, winning eight of their first nine games!! Click here to read more!!
MA JV Boys' Basketball Win Santa Rosa Frosh/Soph Tournament!
The MA JV Boys' Basketball team are champions of the Santa Rosa high school Frosh/Soph tournament! The team went 4-0, beating teams from Cloverdale, Healdsburg, Credo, and St. Vincent de Paul on their route to the title. Congrats to all the players and to coach Lloyd and coach Robinson!
Boys Prep of the Week: Marin Academy's Sam Faber!
The point guard earned Most Valuable Player honors at the Redwood Christian basketball tournament, scoring 17, 17 and 14 points in the three-game tournament. The Wildcats (3-1) earned their first three wins of the year when they beat More and Gateway before edging league rival Lick-Wilmerding 52-51 to claim the tournament title. Click here to read more!
Girls Prep of the Week: Marin Academy's Navi Budhraja!
The senior scored 28, 24 and 36 points in games against Drew, Sacred Heart, and St. Bernard’s, respectively, to help the Wildcats win the Marin Academy Basketball invitational. She made 21 of 26 free throws, including 14 of 15 in Saturday’s 63-54 win. Click Here to read more!
Marin Academy staves off numerous match points en route to NCS win vs. International!!
Goldman's Goal Lifts Marin Academy to Win!
Lucy Goldman scored in sudden-death overtime to lead the Marin Academy girls water polo team to a 7-6 victory over San Marin on Wednesday. Madde Bjorklund led the Wildcats with three goals, and Nora Riedinger scored late in regulation. Freshman Kylie Voelker paced the Mustangs with four goals.
Inaugural Wildcats Team Swim Across America a Resounding Success!!
Nine students from 10th-12th grade, including captain Miya Schilz '20, Javi Esquivel '19, Nora Riedinger '19. Kathryn Whitten '20, Sofia Prieto '20, Luke Chase '20, Jessi Sohn '20, Madeleine Dawson '20, and Sophie Tran-Ryan '21 joined Sophomore Class Dean Jared Baird for the event, leaping off the ship under the Golden Gate Bridge and swimming 1.75 miles to the east end of Crissy Field in San Francisco. The team raised $12,337.33 for pediatric Cancer research at UCSF Benioff Children's Hospitals. Sofia, Miya, and Madeleine were awarded Wavemaker status for raising over $1000. The entire event raised...wait for it...$717,012 for focused research on improving outcomes for children with cancer here in the Bay Area. Thank you to the many who gave moral and/or material support. We'd love to have you join us next year!
The Marin IJ presents a team-by-team preview for water polo in the County. See what coach Collie and Gvishi have to say about their exciting young squads!
Coach Martinez Reaches Quarterfinals of National Seniors' Singles Tournament!
MA Varsity Tennis Coach Geoff Martinez made the quarterfinals of his first National Senior Singles tournament in Michigan last week! After six years away from competition, and two new hips, coach Martinez defeated the #9 and #5 seeds before exiting the tourney. Coach Martinez said, "I had a lot of fun, and didn't get injured!" Way to go coach, Martinez!!!
The Wildcats are working hard every day in practice, and cultivating an affinity for the runner's lifestyle as they set their sights on Fresno!
Check out the Marin IJ's team-by-team preview of the upcoming Tennis season!
Check out the Marin IJ's team preview of the upcoming volleyball season!
Congratulations to Henry Maas for being named to the 2017-2018 NISCA/Speedo Boys All American Water Polo Team. GO CATS!
Congratulations to Jackson Sell for being nominated at Marin IJ's Boys Lacrosse Player of the Year! GO CATS!
With four seconds remaining in Thursday’s North Coast Section Division II championship game, Colin Milliken dished to a cutting Jackson Sell, who buried the game-winning goal in top-seeded Marin Academy’s thrilling 5-4 victory over No. 2 Acalanes at Marin Catholic in Kentfield. GO CATS!
The #1 Wildcats defeat the #4 Highlanders, 10-6 to advance to the 2018 NCS Division 2 Lacrosse Finals. GO CATS!
The Wildcats got back to basics and topped Head-Royce, 14-7. GO CATS!
The Branson Bulls and Marin Academy Wildcats saw each other in the North Coast Section Division II girls lacrosse tournament, with the Wildcats coming out on top, 15-7.
Larned posted some big numbers in the cage as the Wildcats have won two of their past three games. Larned made 16 saves in a 12-5 victory over NCS contender Acalanes then made 18 more in an 8-3 loss to Sacred Heart Prep. GO CATS!
MA girls lacrosse topped Washington High of San Francisco, 24-2. The Wildcats got goals from 10 different players in the contest. GO CATS!
Positve Coaching Alliance, PCA, is a national nonprofit organization with a mission of using youth and high school sports experience to develop Better Athletes, Better People. The Positive Coaching Alliance-SF Bay Area Triple-Impact Competitor Scholarship Award is a celebration of student-athletes who exhibit sportsmanship, character, and are leaders in their school community. Congratulations to Lizzie Ferguson!
Paff has been instrumental in the Wildcats’ five-game win streak. The junior scored a pair of goals in a 23-2 rout of St. Vincent, then added one goal and controlled the game via draw controls, ground balls and stellar defense in MA’s 19-12 victory over Branson.
Congratulations to Stef Jung `18 for being announced at Marin IJ's soccer player of the year. GO CATS!
Giancarlo De Petris scored two minutes into the second half, Kami Jamasbi added a second and the Wildcats kept the Panthers at bay over the final 25 minutes to see out a comfortable 2-0 victory in the North Coast Section Division IV championship game.
Staring at a 2-2 score against Branson with 10 minutes left in the North Coast Section Division IV semifinals, the top-seeded Marin Academy High boys soccer team needed something special to keep its streak of reaching the section finals intact.
A peek into the boys varsity soccer program with the Mercy brothers. GO CATS!
The stat-sheet stuffer finished with 12 points, three assists, six steals and two blocks in a win over Head-Royce, then recorded 12 points, 14 rebounds, seven assists and eight steals in a victory against Sonoma Academy. Two weeks ago, the co-captain notched a triple-double (13 points, 13 rebounds, 10 steals) in a win against Bay School.
The senior scored 41 combined points in victories over Drew and Sonoma Academy, helping the Wildcats match their 2016-17 win total (five) just seven games into the season. Kinney is averaging 23 points and six rebounds this season.
MA boys Water Polo reached the North Coast Section playoffs first the first time ever. Then they advanced further into the tournament than ever before. Immediately after being eliminated from the quarterfinals last fall, the Wildcats’ goal for this season was created: Win the Division II title. Way to go CATS!
A total of 50 players received NSCAA All-American recognition with 32 female student-athletes and 18 male student-athletes representing schools from across the country. Congratulations to our own Ian Buehler on such an accomplishment. GO CATS!
Marshall Cummings was the recipient of the 2017 US Lacrosse All American award for this past season. The award recognizes the top players from each region around the country. A senior captain of the Wildcats team, Marshall helped lead the team to the 2017 NCS Division 2 Finals and leaves as the all-time leading scorer in MA history. Marshall will continue his playing career at Middlebury College, a perennial top-10 Division 3 program. The announcement on the Nor Cal Chapter of US Lacrosse can be seen here.
Marin Academy sunk No. 6 Bishop O’Dowd of Oakland 15-6 in Larkspur to advance to the tournament semifinals for the second time in three years. GO CATS!
Marshall Cummings had four goals and four assists to lead the Marin Academy boys lacrosse team to a 17-4 win against rival University High to claim the Bay Counties League West title. Miles Kelly had three goals and Will Robbins, Jackson Sell, Tucker Grooms and Colin Milliken each scored twice for the Wildcats.
The senior captain, who has been the team’s No. 1 singles player the past two seasons, led the Wildcats to their first BCL West title since 2012 by winning in the semifinal and final. Kelley has not lost a match since league play began.
The Colgate University-bound senior shot a 73 — tied for low score from a Marin golfer — in Monday’s 40th annual Wildcat Invitational, then fired an even-par 36 to lead the undefeated Wildcats to a 176-256 victory against Urban on Thursday.
Buehler’s team accomplished that goal, defeating long-time rival University High of San Francisco in the final. On top of that, Buehler was voted the team’s MVP by his teammates and has been named the IJ’s Boys Soccer Player of the Year.
Using strong team defense anchored by a 13-save performance from goalie Ian Larned, the Marin Academy boys lacrosse team surprised visiting Redwood High with a 6-4 victory.
Marin Academy boys soccer claim section title!
Lane Stervinou, Julian Vasquez and Stefan Jung made penalty kicks to lift the Marin Academy High boys soccer team to a North Coast Section Division III championship game victory against old rival University High on Saturday night.
The second-seeded Wildcats (14-3-2) found themselves in a battle against No. 7 St. Mary’s (Berkeley) as the home game remained scoreless well into the second half. Buehler helped create the first goal with a long ball to Leo Biral in the 56th minute then scored a screamer from about 25 yards out to give MA a two-goal lead. The Panthers scored late to set up a nervous finish but Marin Academy saw the game out, securing a 2-1 win and a spot in the semifinals.
Two of the top teams in the county collided on Thursday and Ian Buehler’s goal stood as the game-winner in Marin Academy’s 1-0 home win against Tam.
The senior converted a layup as time expired to send the game to overtime, where the Wildcats beat Branson, 47-43.
The Marin Academy boys soccer team traveled up to Carmichael to face powerhouse Jesuit and managed to emerge with its unbeaten record still intact following a 0-0 tie.
Elly Labay made a crucial steal and assisted Lauren Fish, whose shot sent the game into overtime, where the Marin Academy girls basketball team beat visiting Branson 47-43.
The No. 2 seed Wildcats are a win away from that possible NorCal final matchup after rolling to a 25-16, 25-16, 25-17 victory over No. 7 Capital Christian of Sacramento on Saturday at Marin Academy in the quarterfinals.
In the final set of the NCS quaterfinal match vs. CPS, Phyllis Wattis produced four kills in rapid succession, Livy Lee followed with a pair of emphatic spikes and Samantha Bailey made some key plays at the end to wrap up a 25-16, 25-17, 25-17 victory.
Maas '18 helped the Wildcats beat San Marin 11-4 on Tuesday with eight goals, then led Marin Academy to a runner-up finish in the De Anza Invitational. Maas leads Marin Academy in scoring and defense.
The Wildcats wint their home opener against the Trojans 3-0.
The captain led the undefeated Wildcats, who won the Novato tournament on Saturday after beating Cardinal Newman in the championship.
Marin Academy trailed Drake 5-3 with two minutes to go. That’s when Schafer took over, scoring twice and sending the game to overtime, where the Wildcats won 6-5. A day later, the senior scored five goals in a 15-1 win against Tam.
Herzog led the Wildcats to an 8-7 win over Redwood, recording four goals and two assists. The Kenyon College commit then scored twice to go along with an assist in a 7-6 victory against Acalanes, the defending NCS D-II champions.
Will Bednarz, one of the top golfers in the county, returns for his senior season with the reigning North Coast Section Division II champion Marin Academy Wildcats.
MA Boys Varsity Soccer defeat Terra Linda, 3-1, in the NCS Division 3 Semifinals.
Despite playing without a league or a home field this season, the Marin Academy boys soccer team finds itself in familiar territory making its appearance in their sixth consecutive North Coast Section championship game.
In a game where just five Wildcats were available to play, Budhraja recorded 29 points, 11 rebounds, three assists and three steals in a 54-20 win over Oakland Military Institute.
On Monday, the Wildcats turned a 39-28 lead into a 22-point advantage in four minutes, eventually beating host Terra Linda 62-35 in non-league action.
The Marin Academy boys team led the way for the Marin contingent with its second-place finish at Saturday’s Division V state cross country race.
In his fourth and final varsity season, Fleming has dominated, winning the Bay Counties League West championship a couple of weeks ago before his second-place showing at NCS, where he finished behind St. Joseph Notre Dame’s Cooper Teare. He also helped the Wildcats finish undefeated and win the league title. They won the NCS title by 25 points.
Marin Academy Boys Cross Country wins section title!
MA took home it's first ever NCS Division 5 boys cross country team championship with the help of Henry Fleming’s second-place finish to win by 25 points!
With a time of 16 minutes, 48.5 seconds, Fleming won the Wildcats’ final league meet of the season, helping Marin Academy finish 8-0 in Bay Counties League meets this fall. Fleming has led the Wildcats all season, winning multiple races, including the Jim Tracy Challenge, and placing second in the Division V race at the Stanford Invitational in late September.
Marin Academy Girls Varsity Volleyball sweep University at home 25-16, 25-14, 25-23. The wildcats remain undefeated in league with only two more games to finish the season. Way to go CATS!
MA's Tommy Atwater was one of several Marin high school lacrosse players who were included on the U.S. Lacrosse NorCal chapter All-America list unveiled in June.
Individual excellence was easy to spot when Marin Academy faced Novato High in the second round of the North Coast Section Division II playoffs on Friday in San Anselmo. But, according to Wildcats coach Josh Frechette, it took the group playing as a team before it could earn its most-important victory of the season.
The Marin Academy High girls soccer team hadn’t been to the North Coast Section playoffs in three years and for the first 20 minutes or so, it showed. Nicki Strack’s first goal settled the host Wildcats’ nerves and her second one gave them the cushion they needed to defeat Redwood 2-0 and secure their first NCS playoff win since 2011.
List of 18 news stories.
Eric Ingersoll '18 and Tufts Win NCAA DIII National Championship!!
The Tufts University men's soccer team won its third NCAA Championship in the last five years with a 2-1 victory over Calvin College at UNCG Stadium. To read more click here!
Eric Ingersoll '18 and Tufts Headed to NCAA DIII "Final Four!"
Eric Ingersoll '18 and Tufts Men's Soccer are headed to the DIII "Final Four" after a resounding 4-0 win!
Henry Mass '18 Helps George Washington Storm Back to OT Victory in NCAA's!
Henry Maas '18 played a pivotal role in helping George Washington men's water polo make history on Saturday, rallying from a five-goal deficit to defeat No. 12 Princeton, 14-13, in overtime at DeNunzio Pool for the school's first-ever NCAA win!
Sophomore Summer: Will Bednarz on a roll for the Big Green!
Congratulations to Alexia Lema '18 for being a part of the 2018 Women's Soccer roster at Boston College. GO CATS!
Trevor Reinhart, as only he can do, competed in his first XC race of the season and made the All-Ivy First Team! Way to go, Trevor!
Trevor Reinhart had a banner 2017 track season for Yale University. After finishing in 5th place in the Ivy League Championships in the 1500M, Trevor eventually qualified for the NCAA Division 1 Championships at the University of Oregon. Congrats, Trevor!
Frances Swanson '13, a current senior for women's cross country and track and field at Lewis and Clark, won two awards. Following a win for the Mary Hunter Female Multi-Sport Athlete of the Year, she was called back to the stage to receive the Judy McMullen Female Scholar-Athlete of the Year. Congratulations Frances!
Whitman's Tai Hallstein swept each of her three individual events Saturday at Harvey Pool in her team's 151-111 victory over visiting Whitworth.
Whitworth University’s Kyle Roach, a former standout at Marin Academy, was named Northwest Conference Student-Athlete of the Week on Monday.
Paravicini played every game as a freshman, and helped Dartmouth reach the second round of the NCAA Tournament before it was eliminated by Syracuse, 2-1.
The trio of Berk Norman (4806 points), Chris Sanders (4776 points) and Charlie Card-Childers (4685 points) finished 5th-7th in the heptathlon, respectively, to earn a combined nine points. Norman, from San Rafael, Calif., set a personal best mark of 4.40m to win the pole vault and also placed third in the 60m hurdles (8.64).
Anna was named the Whitman College Athletics 2014 First-Year Female Most Outstanding Performer for her many accomplishments and great play on the volleyball court.
USA Cycling announced today the 40 athletes who will represent the United States at the 2015 UCI Mountain Bike World Championships which are slated for Aug. 31 - Sept. 6, 2015 in Vallnord, Andorra.
Charlotte was one of 10 Dartmouth College student-athletes to receive academic all-Ivy recognition for the winter season! She received the honors for the second consecutive year for her efforts on the women’s swim team. Charlotte placed fourth in the 100 free relay, ninth in the 100 free and 20th in the 50 free at the Ivy League championships.
Isabelle received the Female Freshman Athlete of the Year Award by the New York University Department of Athletics, Intramurals & Recreation for her accomplishments in Women's Swimming and Diving. | 2019-04-26T05:44:47Z | https://www.ma.org/athletic-news-detail?pk=998965&fromId=187434 |
What are called sensors? Broadly speaking, the sensor is able to perceive the external information and according to certain rules will device available signal convert these information into; simple sensor is a device of external signals are converted to electrical signals. It consists of sensitive components (sensor) and the converter is composed of two parts, some semiconductor sensitive element can be directly output signals, in itself constitute a sensor. Sensitive components variety, the principle of its perception of external information, can be divided into physical, stress, heat, light, electricity, magnetic and other physical effects based on. The chemical class, based on the principle of chemical reaction. The biology class, enzymes, antibodies, and hormone based on molecular recognition function. Usually according to its basic cognitive function can be divided into thermosensitive element, a photosensitive element, gas sensor, force sensor, Ci Min element, humidity sensors, acoustic sensors, radiation sensitive element, color sensors and taste sensors and other ten categories (and there are people who have the sensor can be divided into 46 categories). The commonly used thermal, light, gas sensor, force sensor and the magnetic sensor and its sensing element is introduced as follows.
The temperature sensor is mainly composed of a heat sensitive element. The thermosensitive element varieties more, market sales of the bimetallic strip, copper thermal resistance, thermocouple and platinum thermal resistance, thermal resistance. In a semiconductor thermistor as a temperature sensor detecting element widely, this is because the allowable working conditions in the element, semiconductor thermistor has the characteristics of small size, high sensitivity, high precision, and simple manufacturing process, low price.
According to the temperature characteristic of thermistor can be divided into two categories, with the rise of temperature resistance increased as the positive temperature coefficient thermistor, contrary to the negative temperature coefficient thermistor.
This thermistor with barium titanate (BaTio3) as the basic material, then adding proper amount of rare earth elements, the use of ceramic technology high temperature sintering into seoul. Pure barium titanate is an insulating material, but is doped with rare earth elements such as lanthanum amount (La) and niobium (Nb) and later, a semiconductor material, known semiconducting barium titanate. It is a polycrystalline material, there is grain boundary between grains, for conducting electronic, grain boundary is equivalent to a barrier. When the temperature is low, because of the action of electric field in the semiconducting barium titanate, conducting electrons can easily cross the barrier, so the resistance value is small; when the temperature increases to the Curie point temperature (critical temperature, the components' temperature control points' general barium titanate Curie point is 120 ℃), the electric field within the subject failure, can't help conducting electrons across the barrier, so the performance is dramatically increased resistance value. Because this element has not reached the Curie point of resistance with temperature changes very slowly, with a constant temperature, temperature control and automatic temperature control function, not only fever, redness, no fire, not easy to burn, the voltage AC, DC 3 ~ 440V can, long service life, is very suitable for motor overheating and other electrical device detection.
Negative temperature coefficient thermistor with manganese oxide, cobalt oxide, nickel oxide, copper oxide and aluminum oxide as the main raw material, the manufacturing technology of ceramic and. These metal oxide materials have semiconductor properties, quite similar to germanium, silicon crystal material, the body of carriers (electrons and holes) the number of small, high resistivity; temperature, carrier number increases, the natural resistance to reduce. A lot of negative temperature coefficient thermistor type, used to distinguish between low temperature (-60 ~ 300 ℃), temperature (300 ~ 600 ℃), high temperature (>600 ℃) three, has the advantages of high sensitivity, good stability, fast response, long life, low price advantage, widely applied to fixed-point temperature temperature automatic control circuit the temperature control system, such as refrigerator, air conditioner, greenhouse.
Thermistor is combined with a simple amplifying circuit, can detect a thousand one degree change in temperature, so the electronic meter thermometer, can achieve high precision temperature measurement. The working temperature of general use thermistor is -55 ℃ ~ +315 ℃, special low temperature thermistor temperature below -55 ℃ to -273 ℃.
I made the thermistor is according to the standard SJ1155-82 to make model, consisting of four parts.
The first part: the LORD says, by the letter 'M' said sensitive element.
The second part: categories, said the positive temperature coefficient thermistor with the letter 'Z', or 'F' letters represent negative temperature coefficient thermistor.
The fourth part: serial number, but also by the digital representation, representative specification, performance.
Usually manufacturers for differences between special needs of this series of products, plus' derived number 'in number, consist of letters, numbers and' - 'number and.
A variety of thermistor working conditions must be in the factory parameters within the allowed range. The main parameters of the thermistor has more than ten: nominal resistance values, the use of ambient temperature (maximum working temperature), measurement of power, rated power, rated voltage (maximum working voltage), working current, temperature coefficient, the material constants, time constant. The nominal resistance is the resistance at 25 ℃ zero power value, in fact there is a certain error, should be in within 10%. Operating temperature range of ordinary thermistor is larger, can choose according to need from -55 ℃ to +315 ℃, notably, the highest working temperature differences between different types of thermistor, such as MF11 sheet negative temperature coefficient thermistor is +125 ℃, +70 ℃ and MF53-1 only, should pay attention to students' experiment (generally do not more than 50 ℃).
The preferred ordinary use of negative temperature coefficient thermistor, because it changes with temperature is generally higher than the positive temperature coefficient thermistor resistance value is easy to observe, continuous decreased significantly. If the selected positive temperature coefficient thermistors, temperature should be in the vicinity of the Curie temperature of the element.
Coarse thermistor value should be selected range, moderate and a thermistor measuring small electric current multimeter. If the 10K thermistor, can choose MF10 multimeter, the shift switch to the ohmmeter R × 100, replace the probes are respectively clamped thermistor with alligator clip two pin. When the environment temperature is significantly lower than the body temperature, 10.2k thermistor readings, knead by hand, can see the indication of resistance decreases; the hand, increased resistance, gradually restored. Such a thermistor can be selected (the highest working temperature 100 ℃).
A air conditioner: special temperature sensor thermistor sealed in the copper metal.
Light sensor is mainly composed of light elements. At present, the rapid development of photosensitive element, variety, widely used. The market for the sale of a photosensitive resistor, diode, triode, photoelectric photoelectric coupler and optical cell.
Photosensitive resistors by semiconductor photoelectric crystal transparent, because the semiconductor photoelectric crystal composition is different, can be divided into visible light photosensitive resistor (cadmium sulfide crystal), infrared light photosensitive resistor (GaAs crystals), and ultraviolet light photosensitive resistor (zinc sulfide crystals). When the wavelength of the light sensitive semiconductor photoelectric surface of the crystal, crystal carrier increased, the conductivity increased (i.e., reduced resistance).
The light current, light resistance: under a certain applied voltage, when light (100lx) irradiation, current flows through the photosensitive resistor called the light current; voltage and the current ratio of light resistance, usually within a few tens of K Ω K Ω ~.
The dark current, resistance in the dark: under a certain applied voltage, when there is no light (0 LX) irradiation, current flows through the photosensitive resistor called dark current; voltage and the current ratio of resistance in the dark, generally a few hundred thousand more than k Ω K Ω to.
The maximum working voltage: General tens of volts to hundreds of volts.
◆ environment temperature: -25 ℃ to +55 ℃, some models can be -40 ℃ to +70 ℃.
◆ rated power (power): photosensitive resistance light current and voltage product; can be 5mW to 300mW a variety of specifications to choose.
◆ photosensitive resistance of main parameters and response time, sensitivity, spectral response, light, temperature coefficient, I-V characteristics.
Notable is, light (with the strength characteristics of the changes of light), temperature coefficient (temperature dependent properties), volt ampere characteristic is not linear, such as CdS (CDS) resist photoresistance sometimes increased with the increase of temperature, sometimes with increasing temperature and smaller.
Compared with ordinary diode, in addition to the tube core it is a PN junction, has a one-way conductive properties, others are very different. The first tube PN junction in the core of deep and shallow (less than 1 microns), in order to improve the photoelectric conversion ability; second PN junction area of relatively large, the area of the electrode is very small, in order to facilitate the photosensitive surface to collect more light; the third photodiode has a lens made of organic glass sealing, can gather light from the photosensitive surface "window" in appearance; so the sensitivity and response time photodiode is far superior to that of photosensitive resistance.
2DU has a very, very, before after ring pole three pole. The ring is to reduce dark current photodiode and increase working stability and design, application should be connected to the positive pole. The main parameters of the photoelectric diode has: maximum working voltage (10 ~ 50V), dark current (≤ 0.05 ~ 1 a), the photocurrent (> 6 ~ 80 a), response time, photoelectric sensitivity (tens of ns to several s), junction capacitance and forward drop.
Advantages of photodiode is of good linearity, fast response, wide range of wavelengths of light has the advantages of high sensitivity, low noise; drawback is the output current (or voltage) alone is small, need to add the amplification circuit. Applicable to communication and photoelectric control circuit.
The photodiode detection can be used multimeter R * 1K block, to avoid the optical forward resistance should be 10K Ω to 200 Ω K, reverse ∞, remove the shade right after the deflection angle is larger, the higher the sensitivity.
Photoelectric triode can be regarded as a combination of elements of a photodiode and a triode, with amplification function, so the dark current, photocurrent and photoelectric sensitivity is much higher than the photodiode structure, but the junction capacitance increase, response characteristics. Photoelectric control circuit is widely used in low frequency.
Semiconductor optoelectronic devices and MOS structure, such as a common scanner, camera CCD (charge coupled device) is integrated photodiode array or MOS structure.
Textbooks only requires the thermistor and photosensitive resistance characteristics of a simple experiment. Due to the close correlation of gas and the daily life of human, the detection of gases is to protect and improve the ecological environment indispensable means, gas sensors play an extremely important role. For example, the concentration of carbon monoxide in the living environment of 0.8 ~ 1.15 ml/L, will appear shortness of breath, rapid pulse, even syncope state, up to 1.84ml/L when there is a risk of death within a few minutes, so the carbon monoxide detection must be fast and accurate. Using SnO2 metal oxide semiconductor gas sensing materials, preparation of SnO2 nano particles by ultrafine particle refinement and doping process, and as a catalyst substrate doping, the appropriate sintering process for surface modification, made by thermal sintering CO sensitive element, can CO gas detection range of 0.005% ~ 0.5%. There are a lot of explosive and combustible gas, alcohol gas, automobile exhaust and other toxic gas detection sensor. Commonly used in the main contact combustion type gas sensors, electrochemical gas sensor and semiconductor gas sensor etc.. Contact combustion type gas sensor detecting element is generally platinum wire (also can be coated with platinum, palladium and other rare metal catalyst layer), use of platinum wires connect with current, maintaining 300 ℃ ~ 400 ℃, if contact with combustible gas, the combustible gas will burn in the rare metal catalyst layer therefore, platinum wire temperature rises, the resistance of platinum wire also rose; value changes by measuring the electrical resistance of platinum wire size, known concentration of combustible gas. Electrochemical gas sensor by the liquid (or solid, organic gel electrolyte, etc.) the output could be in the form of direct current oxidation or reduction gas generated, and can also be electromotive force acting on the ion ion electrode. Semiconductor gas sensor with high sensitivity, fast response, good stability, easy to use features, the application is extremely broad; the following highlights the semiconductor gas sensor and a gas sensor.
Semiconductor gas sensor with N type and P type division. Type N in the detection of resistance decreases with the increase of gas concentration; P value increases with the concentration of gas. Like the SnO2 metal oxide semiconductor gas sensitive material, which belongs to the N type semiconductor, at 200 ~ 300 ℃ it absorbed oxygen in the air, forming a negative ion adsorption of oxygen, so that the electron density in the semiconductor is reduced, so that its resistance value increases. When a combustible gas supply electronic (such as CO), the adsorption of oxygen desorption, and the combustible gas in the positive ion adsorption on metal oxide semiconductor surface; oxygen desorption emitted electron, combustible gas line in the positive ion adsorption state to emit electron, increasing the oxide semiconductor conduction band the electron density, the resistance decreases. Combustible gas does not exist, the negative ion adsorption of metal oxide semiconductor will automatically restore oxygen, make the increase of resistance to the initial state. This is the basic principle of semiconductor gas sensor detection of combustible gas.
There are 2 kinds of gas sensor made in china. One is the direct heating, heating wire and a measuring electrode to sintering in metal oxide semiconductor tube core; heating type gas sensor on ceramic substrate, through the pipe heating wire, two measuring electrode tube outside, metal oxides gas sensing materials for measuring electrodes, made by high sintering.
Parameters of gas sensor is mainly a heating voltage, current, voltage measurement circuit, the sensitivity, response time, recovery time, calibration gas (0.1% butane gas) voltage, load resistance etc.. QM-N5 type gas sensor suitable for natural gas, coal gas, hydrogen, alkyl, alkene gases such as gas, gasoline, kerosene, acetylene, ammonia, smoke detection, which belongs to the N type semiconductor device. High sensitivity, good stability, short response and recovery time, the market wide application. The following parameters: QM-N5 gas sensor calibration gas (0.1% butane gas, the best working conditions) voltage is greater than or equal to 2V, the response time ≤ 10S ≤ 30S, recovery time, the best working conditions of 5V, heating voltage measurement circuit voltage of 10V, load resistor RL as 2K, allows the working conditions of electric heating pressure 4.5 ~ 5.5V, measurement circuit voltage 5 ~ 15V, 0.5 ~ 2.2K load resistance. Below is a simple test circuit for gas sensor (sensor), voltage meter pointer changes more, the higher the sensitivity; just add a simple circuit can realize the alarm. Common gas sensor and MQ-31 (dedicated to the detection of CO), QM-J1 alcohol sensor etc..
Li Min of the many kinds of sensors, the traditional measurement method is using the deformation and displacement of elastic material to represent. With the development of microelectronic technology, based on the piezoresistive effect of semiconductor materials (i.e., pressure, the one direction and the resistivity changes) and good elasticity, has developed the Li Min sensor has the advantages of small volume, light weight, high sensitivity, widely used in the measurement of mechanical pressure, acceleration, weight.
The magnetosensor with Holzer device (based on the Holzer effect), magnetoresistive devices (based on magnetoresistive effect: magnetic field made the semiconductor resistance increases with the magnetic field increases.) , magneto diode and triode. Magnetic sensor based on magneto sensor is widely used in the measurement of electrical, magnetic and mechanical quantities of.
In a certain sense sensor and the sense of people have a corresponding relationship, the perception has been far more than human senses. For example, was observed by using the target's infrared radiation of infrared imaging system (night like instrument), the night can be found 1000 m, 2000 meters found the vehicle; the core components of the imager is infrared sensor. In the 1991 Gulf War, the Iraqi tank configuration of night vision instrument detection distance of only 800 meters, is less than half the coalition, the darkness was badly defeated is inevitable. At present, all the countries in the world to sensor technology as the focus of high-tech development priority. In order to greatly improve the performance of the sensor, the constant use of new structure, new materials and new technology, miniaturization, integration and intelligent direction. | 2019-04-23T00:29:31Z | http://szkemin.com/en/?sers/201311291799.html |
Editor's intro:- If you only take a superficial look at optical media for archiving, the differences appear to be small. But what happens down at the bit level makes a huge difference to data access times and data integrity when you use optical media for archiving.
WORM (Write-Once-Read-Many) technology is used in many applications because of the integrity of the data and the accepted legal admissibility of files stored using the technology. Fundamentally there are two basic kinds of writeable media today, sector based and non-sector based media. An example of sector-based media is magneto optical. MO technologies are reasonably fast, store just over 9 GB per disk and fundamentally rewriteable. Examples of non-sector based media are CD-R and DVD-R. DVD-R is also reasonably fast and has a similar capacity as MO.
DVD-RAM is a sector-based medium, however it is not known as a write-once technology. So does it match up to other well-known archive media?
Let's first discuss price. Sector-based media are more expensive than DVD-R, a good deal more expensive. This seems to be the big attraction to DVD-R. Though, when considering the importance of archived data one would think this is a small consideration. Why pay more for sector-based media solutions? The data archive is likely to be one of a company's biggest corporate assets.
One current write standard for optical is UDF (Universal Disk Format). ANSI, ECMA, and ISO set out to develop an international universal format for information interchange. Initially known as Non-Sequential Recording or NSR, it was developed as an information interchange standard to succeed the CD standard 9660. Thus the International Standard ISO/IEC 13346 was created. The standard is different from ISO 9660 in that it was created to write as well as read information among different operating systems. The initial plan was designed to support non-sequential media and would enable information to be exchanged over a variety of operating systems. It was expected to gain acceptance based on the popular CD-ROM based technology. OSTA set out to develop a specification as a subset of the NSR standard that could be brought to market quicker with the ability to address data interchange between systems. Thus, the Universal Disk Format was created.
An industry consortium of leading companies in the optical storage industry developed UDF. Most of these companies are the driving force behind the various DVD standards today. UDF is based on the ISO/IEC 13346 standard. It is in fact a subset of that standard and is fully compliant with ISO/IEC 13346. UDF was designed as a follow-on standard to support DVD based on CD-ROM, CD-R and CD-RW. It was conceived that through the use of UDF, DVD based content can reside on the same disk and be accessed by a wide variety of computer systems as well as the consumer DVD player in the home.
DVD-R, along with all the CD technologies, is a sequential-based medium that spirals out from the center of the disk. Starting from the center of the disk, each bit is written next to the last bit written in a sequential order, regardless if the information is related or not. This is done, because there are no sectors on the media. The data can be read in a random sequence once written, however, the write process is sequential.
With CD technology, disk at once or session writes were not an issue because the disks were only 650 MB, a manageable amount of data for most applications. Now, however optical technology can store up to 4.7 GB per side. This is, by most standards, quite a lot of data to have to cache or to have to fill prior to closing the media out.
DVD-R uses a session-based write format that requires the disk stay in "open session" so long as the user would like to continue to write to it. This means that if the application creates files smaller than about 4 GB, which is the majority of data out there today, and the user would like to fill the disk before closing the session, the user has 2 choices.
The user can cache information on a hard drive until a capacity threshold is met and then write all the data at once. A problem with caching prior to writing to the disk is, in many applications hard drive caching does not meet various U.S. and International regulations governing applications such as financial, securities and medical records storage.
The other option is to write to the disk, opening new sessions as necessary. Once the disk is full, the disk must be "closed". Once the disk has been closed, it can no longer be written to and is now read only.
Both situations can be a problem in an archive environment.
In the first case, data is not truly archived until the data is on the archive media. Caching prior to writing to the disk in many cases does not meet the regulations governing write-once applications. Data can, in some cases, stay in cache up to months before enough data is collected in order to fill a disk. The data is still vulnerable while on the hard drive and even during the writing process.
In the second situation, all the data on the disk is quite vulnerable while the disk is "open". As in the caching situation, it may take several weeks or months to fill a disk, and as a result, the disk will have to be kept "open". While the disk is in an "open" session mode, it cannot be universally read outside the system that created it. Therefore the information cannot be exported or shared outside the network. Additionally any time during the process a bad write can occur and corrupt the entire disk. If this happens, the disk becomes unreadable. A bad write can occur on any session of an open disk for a number of reasons--dust, dirt, fingerprints, scratches, or even a defect during the manufacturing process. Any one of these possibilities are issues to be considered. It must also be noted at this point that all DVD-R media are unprotected and exposed to the open environment no cartridges.
In addition to the "open session" issues, there are performance issues to be considered as well.
Recordable media has directory structures describing where data is stored on the media along with other important information. In the case of DVD-R media, the directory structures have to be updated with each new session, however, because the media must be written in a sequential manner, with each new session, a new updated directory is written. This has the effect that the drive must search several directory locations in order to find the data on the disk. With each new directory entry, the read performance goes down as the drive must skip around to find the relevant directory information containing the information necessary to retrieve the data the user is looking for.
In the case of sector based MO or DVD-RAM, an area of the disk can be set aside for the directory information. This allows all appended information to be in the same area on the disk ensuring the read speeds to maintain maximum performance throughout the life of the media regardless how many writes are necessary to fill the disk.
There also is a problem with appending files.
If a file is appended on DVD-R media, the new file must be written in the next open block in the sequence. This means that related files would not be next to each other; in fact, they may not even be on the same piece of media. This can be a real problem in a records management environment such as the medical industry, where patient's records are scattered over a number of volumes in a storage library, thus causing the library to jump from one piece of media to the next in order to collect all the data, should a doctor need to review the patient history.
With sector based media, blocks can be allocated for future appending files, thus allowing related files to be all in the same area and on the same disk. When considering the media swap time of most libraries, this can be a very big time advantage, and can enhance the reliability of the system, as the library does not have to do as many swaps on average.
Another area where sector based media is far more robust for archiving of critical information is media defect management.
CD-R and DVD-R media have historically been unforgiving when it comes to recovering from a write failure. Users have reported frustration with having to queue up enough information to write a complete disk, only to face write errors during the disk imaging process resulting in corrupt media. This problem has fueled an attitude among users that the data stored on R media is not necessarily safe and reliable.
On the other hand, sector based media and the drives that write to them have much more extensive defect management software built into the on-board firmware to retry, map-around and manage any possible bad areas on the media to ensure no user data or directory information is written in those areas and the media remains accessible over long periods of time. Sector based drives have defect management as part of device interface. Vendors writing software for sector based media can store duplicate directory entries, map bad sectors out of existence, and retry errors when reported. However, probably most important of all and the biggest differentiator is, if a sector does go bad, the software controlling the drive and media continues to give the user access to the remaining massive amounts of information stored on that disk.
Chuck Berry and Joan Osborne were equally quick to access using Megabyte's new jukebox.
Editor's comments - did I really say that?
Must be written sequentially with no open block allocation for future updates.
Appended files must be written to the next open block on the disk.
Directory updates must be written to the next open block on the disk.
Once the session is closed, no further surfaces can be added to the volume set.
Performance goes down as the number of sessions on the disk goes up.
When is WORM really WORM?
Write-once is just that. WORM has been historically tied to the storage technologies such as optical disk because the first optical disks required a physical change on the recording surface that was impossible to undo. Today, most WORM hardware technologies are fundamentally rewriteable with an electronic write protect process through firmware in the storage device. The result is an archive system that will only allow a bit sector to be written once and then never changed again. The system includes hardware, media, software and procedures on how to handle data and media. In an archive system a bit sector on the media within can be accessed an infinite number of times for reads, but the data cannot be changed. If the file system used in the archive system is a rewriteable file system such as NTFS or UDF, data is treated in a different way than with a WORM file system. An archive file system provides no method of overwriting data or directory entries. While a rewriteable file system has to be told by the device that it cannot change data already written.
Magnetic disk and tape will always be fundamentally erasable because they are magnetic media. If the disk is subject to strong enough magnetic field, the media will become unreadable and need to be reformatted. This has been one attraction to optical storage. Regardless of the amount of magnetic field subjected to an optical disk, the data remains unchanged.
Additionally, file systems designed for magnetic disks do not work well with WORM optical media. Magnetic file systems can update information stored in the directory or data areas. WORM media does not allow this functionality by design. There have been software vendors that have modified versions of NTFS or NFS that work with WORM media, yet the fundamental problem continues to be file system overhead. These file systems must rewrite entire directories or files to new locations on WORM media, because the original directories cannot be modified.
Another crucial issue here is the migration to other operating system versions or platforms over the life of the data. While this is rarely considered when a new system is purchased, it becomes a significant concern for the user as operating system vendors evolve product over time or produce new systems, which often times change file formats on magnetic media. Even the slightest changes in the file system can cause difficulties for a user that has massive amounts of archive information stored on long-term removable media.
In most cases, WORM or other archive-based applications are transactional-based applications. Data or directory information should be able to be written at any time without increasing disk usage or overhead beyond the additional file space required for the data file itself and the small space required for the given entry to the directory describing that data. Data and directory information should be safe from intentional or accidental file changes or deletion. Sector based optical media, both MO and DVD-RAM, provide this capability when combined with a file system designed specifically for WORM and archive functionality applications.
Pegasus is known for its file system and volume management software for optical disk technologies. InveStore® is storage management software that recognizes and supports many different third party and industry standard file formats in use with various forms of optical media. One such format written by Pegasus specifically to manage data that is write once in nature is the Archive File System (AFS), or Pegasus-AFS.
In use in Financial, Medical, Insurance, Transportation, Government, Law Enforcement and many other archive applications for the past 15 years, the Pegasus-AFS was designed specifically for the unique characteristics of optical media. Matched with MO WORM or DVD-RAM sector based media, this creates a solid reliable high performance archive solution with top-notch security and data tracking mechanisms. To offer users of DVD-R and CD-R a more reliable and robust solution for DVD, Pegasus provides DVD-Archive for DVD-RAM based hardware. The same reliable file system that has been running with erasable-based MO media without failure for the past 15 years is now offered for DVD-RAM media and libraries, providing the user with considerable savings on the library hardware. Media are priced relatively the same as MO for the same capacity of double-sided disks. And, the Pegasus DVD-Archive software supports mixing of single-sided CD-ROM and DVD-ROM media in the same library as the double-sided writeable DVD-RAM media all accessible under a single user interface and drive letter access! Each media or spanned volume set appears as sub-directories to the application or user.
The Advantages to Using an Archive File System in This Way Are Manifold.
The Pegasus- Archive File System (AFS) provides some special features that uniquely identify it as a true archive file system. Unlike more typical file systems, the Pegasus-AFS provides no method of overwriting data or directory entries. The AFS, by design, provides no ability to reclaim space. It is a fully historical file system that provides a complete transaction based audit trail of any and all changes to either the data or the meta-data. Most other so-called WORM file systems only provide snapshots of the system. The user must decide when they want to take a snapshot and then instruct the file system to do so. ALL changes to the disk between snapshots are lost with no audit trail.
The Pegasus-AFS incorporates a highly specialized meta-data structure that allows the user to easily and quickly see, not only what has changed, but when it was changed as well. The user can determine if the attributes of a given file have changed, whether a file has been renamed or not (the user can quickly see both the old path\name and the new path/name) and what sections of the file data have been changed. The Pegasus-AFS provides all the features required to implement a complete change/document control system.
Legacy data is often subject to technology innovation since, as technology evolves, older product is no longer supported. Therefore, older hardware needs to be upgraded or replaced. If the old product has write-once applications but the new product does not, the customer may not be able to access legacy data. By relying on a WORM file system rather than hardware, the data will be accessible no matter what the supported technology as the file system can manage data on all supported devices.
InveStore® has the added benefit that it can virtually manage them from a single access point, whether it be a drive letter or IP address. This means that a DVD library can run under the same drive letter as the CD library and even the MO library, all as a single volume or repository. All devices are accessible and manageable as if they were a single device, and individual disks or volume sets are accessible as sub-directories under the assigned drive letter. All data can be exchanged between devices by means of drag and drop. This ability to access legacy data allows for migration of data over technologies over time: from CD to DVD to BlueRay or whatever comes next. This translates to a lower cost of management over time.
A write-once file system tracks EVERY change made to the media. The Pegasus-AFS does not allow overwrites of any data or directory structures on media. A complete audit trail is kept for all writes and appends made to the media. Utilizing the Pegasus-AFS, the system prevents any file(s) from being physically deleted from MO or DVD-RAM media.
Once data is written to a MO optical or DVD-RAM disk utilizing the Pegasus-AFS, data will only be readable by networks with access to a system running the Pegasus software. If media are removed and taken to a system operating some other optical disk management software, the disk is protected either by the physical characteristics of the media (WORM), or by the setting of a hidden system bit, as on DVD-RAM media, which prevents any changes to the media outside of the Pegasus-AFS system control, such as formatting or unwanted writes or deletes.
The Pegasus-AFS software is and will remain operating system independent and transportable. This means that disks written to under the first MS DOS and Novell-based systems are still readable today by our latest software. Applications of optical media boil down to long-term data retention. "Long-term" data often outlives the operating system where the optical storage hardware is installed. Also, optical disk media is removable, creating transportability possibilities from operating system to operating system that require an OS independent and consistent data access approach.
There is significantly less likelihood of changing the contents of a record once it has been stored on an archive file system.
The smaller the chance for alteration, the fewer possible challenges to record integrity; the fewer challenges to record trustworthiness in the litigation context, the faster and cheaper disputes get resolved. A write-once archive file system is simply a more prudent decision for the safety and retention of corporate assets. This AFS provides the security that hardware vendors currently cannot support and responsible corporate consumers demand. | 2019-04-24T13:47:43Z | http://www.storagesearch.com/pegasusart3.html |
Maya: Hi, if we haven’t already met, I’m Maya! Today I’m here to find out about the rules for expenditure responsibility.
Narrator: Great, I’ll help you along the way!
Narrator: I’m excited you want to learn about the rules for expenditure responsibility. Expenditure responsibility is an important legal tool for making grants to organizations that are not public charities, governments or similar entities.
Maya: I can’t wait to get started and I think the timing is perfect! I’ve been here a few months, and I just got back from an amazing international conference where I met people from several great organizations who I think will help further the initiatives I’m working on. On my list is to follow‐up with a public charity, a government agency, a for‐profit consulting firm, a private foundation, a foreign organization…..Yikes, I guess I have a lot to do!
Narrator: I’m glad to hear the conference was a success! It sounds like you met some great people from diverse organizations. This would be a great time for us to dive into the rules for expenditure responsibility because grants to some of those organizations will require “ER”.
Maya: “ER”?? I keep hearing everyone talk about “ER”?!?!
Narrator: Sorry! “ER” stands for “expenditure responsibility.” Expenditure responsibility refers to some required oversight and monitoring procedures that permit a private foundation to make grants to certain types of organizations.
ER applies in cases where the grantee is not a U.S. public charity, government, or similar entity, and the foundation has to make sure that grant funds are used for a charitable purpose. The foundation exercises expenditure responsibility as a way of helping to make sure that its funds are properly used.
Maya: Great! So after this training, I’ll have all the information I need to make ER grants?
Narrator: Well, this will be a really good start, but foundations often have additional requirements for ER grants depending on the size of the grant, duration of the grant, and country where the grantee is located. This means that before making an ER grant, and as sticky situations come up, you should always seek assistance. Depending on your organization, assistance could come from: Grants Management, Legal, or the department in your organization that handles compliance issues.
Narrator: If you’re taking this course for the first time, it’s best that you go through the course in order.
If you’re returning to the course and using it as a reference, you can click any of the Topics in the course map and jump right to your specific area of interest.
To view a transcript of what’s being said, click the Transcript button. You can also skip to a particular section by clicking a Topic link.
Well, that’s it – pretty simple. When you’re ready, go ahead and click to launch the first Topic.
Narrator: Good memory Maya! ER is required for grants to for‐profits.
A grant or program related investment to any organization that is not one of these five types requires ER.
These types can be very technical, and you will often need to seek further assistance from your Grants Management or Legal Department to determine an organization’s type. To learn more, hover your cursor over each type to read a brief description. When you’re done, press the pulsing “play” button to continue.
Narrator: This means that ER is required for grants and PRIs to for‐profit companies, private foundations, foreign organizations without an “equivalency determination”, new organizations waiting for their IRS “determination letters” recognizing their section 501(c)(3) public charity status, and section 501(c)(4), section 501(c)(6), and all other section 501(c) tax‐exempt organizations that are not section 501(c)(3) public charities.
These are just some examples of when ER is required. Remember, ER is required unless the grantee is one of the five types of organizations we discussed where ER is not required.
These examples of types of organizations can also be very technical. To learn more, hover your cursor over each type. After you’ve had a chance to read each description, press the pulsing “play” button to continue.
Narrator: Now let’s test your understanding of when ER is required. Take a look at these potential grantees. For each type of organization, decide whether ER is required or not.
Drag and drop each image to the correct category. If you forget which types of organizations require ER, click on the “information” icon. If you’re not sure what type of organization a grantee is, hover your cursor over the organization’s name for information on its type.
The chart below summarizes all of the answers from the previous exercise and should give you some examples of when ER is, and is not, required.
Maya: Ok, I’ve learned that some of the grants I want to make will require ER. Let’s see (looks at proposal) a grant to a government agency (thinks) won’t require ER (puts in pile) but a grant to this for‐profit and this new organization waiting for its public charity status from the IRS will (puts in another pile)! Now that I know when ER is required, I guess I need to know what is required!
Narrator: I can help with that. ER requires a private foundation to establish adequate procedures to make sure the grantee uses grant funds solely for the charitable purposes outlined in a project; receive full and complete reports on how the funds are spent; and report the grantee’s expenditures to the IRS.
Maya: Hum, I know my foundation has grantmaking policies and procedures. How do I know if they are “adequate”?
Narrator: Another great question, Maya. I think this would be a good time to walk through the steps of how a private foundation properly exercises expenditure responsibility.
Narrator: There are six steps to exercising ER: Step 1, conduct a pre‐grant inquiry (this is a way of ensuring that you gather basic information about the potential grantee and conduct some due diligence before you make the grant); Step 2, enter into a written grant agreement (signed by both the funder and the grantee); Step 3, require the grantee to keep and track grant funds in a separate fund or account dedicated to the charitable purposes of the grant; Step 4, obtain annual reports from the grantee; Step 5, report the grant to the IRS on the foundation’s tax return until all grant funds are spent, and Step 6, investigate all potential diversions.
Maya: I think I can handle this! Where do we start?
Narrator: Let’s start with step one, the pre‐grant inquiry.
Before we dive‐in, remember that the goal of ER is to make sure foundation grant funds, when granted to non‐charitable organizations, are spent solely for the charitable purposes for which they are granted.
A pre‐grant inquiry or “PGI” is the due diligence that must be conducted by the private foundation on the organization to assess its capacity to use and report on the grant funds. The PGI must give a reasonable person assurance that the potential grantee will use the grant for proper purposes.
Staff may complete the PGI or it may be outsourced to a consultant; either way, the results of the PGI must be documented in writing and the scope of the inquiry must fit the size and scope of the grant, the period over which it is to be paid, and whether the foundation has made any prior grants to the same organization sufficient to establish a reasonable track record.
The PGI should concern matters such as: the identity, prior history and experience (if any) of the organization and its managers; and any knowledge that the private foundation has about the organization’s management, activities and practices.
Maya: That’s a lot of documents!
Narrator: I can see how it would seem like that, but keep in mind that these are just examples of documents a private foundation may review. The IRS regulations don’t require the review of any particular documents. The regulations just require that the inquiry be complete enough to give the foundation assurance that the grantee will use the grant for the proper purpose. In fact, it’s quite common for foundations to do more pre‐grant due diligence for programmatic reasons than are required by the ER rules.
Maya: That makes more sense ‐ I think I’m starting to get the gist… The pre‐grant inquiry (PGI) is all about getting to know the grantee!
Narrator: Let’s take a minute to test your new knowledge about the requirements for the ER pre‐grant inquiry (PGI). Read each scenario about real‐life questions that come up in ER grants. Choose the best response and then select “Submit” for feedback.
Narrator: Now that we’ve covered the basics of the pre‐grant inquiry (PGI), let’s move on to the second step. Step two requires that all ER grants to be made pursuant to a written grant agreement. Each ER grant agreement must include very specific legal language. Take minute to read the list of required provisions.
Maya: There are a lot of requirements for ER grant agreements!
Narrator: That’s right, but the ER grant agreement requirements are fairly easily satisfied once you get used to them. It is recommended that you seek assistance before executing an ER grant agreement and use a standardized template that includes all of the requirements. Today we will discuss the first two of these requirements in more detail.
Narrator: The grant agreement must specify the charitable purposes of the grant. All grant funds and income generated from the grant fund must be used solely for the charitable purposes that are specified in the grant agreement.
ER grants cannot support projects that include lobbying. We’ll talk more about ER grants that support advocacy when we talk about how to handle complicating issues in ER grants, or you can skip ahead now by clicking on the link on your screen.
Also, it is generally prohibited to make an ER grant for general operating support.
Narrator: So the grant agreement must specify the charitable purposes of the grant…and all grant funds must be used solely for the charitable project purposes specified in the grant agreement.
Let me give you an example of how this works. Say the foundation is funding a conference dedicated to the prevention of AIDS. The budget lists foundation funds as supporting the cost of employee A and B to plan for the conference, the venue, and conference speakers. It would not be permissible for the grantee to use grant funds to pay for the time these employees spend on other projects. The foundation’s funds must be only used to pay for the portion of staff time actually spent on the AIDS conference.
Because general operating support grants are not restricted to a specific charitable project, they are not good candidates for ER grants. For our purposes, we will consider ER grants for general operating support prohibited, but you should seek assistance if the proposal you are considering includes this type of support.
Narrator: The next step I’d like to cover with you is step three, which is the requirement that the grantee maintain the grant funds in a separate account. One way to satisfy this requirement is to require the grantee to maintain the funds in a physically separate bank account restricted to the charitable purposes outlined in the grant agreement; another option is to record and maintain the funds in a separate bookkeeping account. You should seek assistance to determine the approach your Foundation takes.
In either case, the grantee must be able to separately track grant funds in order to comply with the ER rules. For example, the grantee must track any interest earned on the grant funds and, if it’s not spent on the project, return it to the foundation at the end of the grant. Interest cannot be used for anything other than the grant project.
Maya: Okay, so these sound like good grantmaking practices? Aren’t these requirements in all foundation grant agreements?
Narrator: You’re right Maya, these are good grantmaking practices. Some private foundations include these requirements in all of their grant agreements, even for grants that don’t require ER. The important thing to remember is that for non‐ER grants, these requirements are optional; they are often included as a matter of good grantmaking practice, but in ER grants, these requirements are mandatory, and must be included in each ER grant agreement.
Narrator: Here’s a quick question to test your knowledge about the requirements for the written grant agreement. Read the question and choose the best response and then select “Submit” for feedback on your response.
Narrator: Now let’s talk about the fourth step. Step four requires the private foundation to obtain certain grant reports from the grantee. The IRS regulations specify both what must be in the reports and how often they must be received.
Let’s cover the substance of the reports first. Private foundations must require ER grantees to report on (a) the use of the funds, (b) progress made by the grantee toward achieving the purposes for which the grant was made, and (c) compliance with the terms of the grant agreement.
Maya: Great, I’ll be sure our ER grant agreement includes these reporting requirements so that our grantees understand up front what must be in their ER grant reports.
Narrator: That’s a great idea, Maya. Your grant agreement will also need to specify when the ER reports are due, so let’s talk about that next.
Narrator: The foundation must obtain an annual report for the year in which the first payment is made, and for all subsequent years until grant funds are fully spent by the grantee, or the grant is otherwise terminated.
In addition, the foundation must obtain a final report after all grant funds have been spent. The final report must cover the same substance as the annual report, but cover the entire grant period.
The IRS rules say that ER reports must be received “within a reasonable period of time” after the end of the grantee’s fiscal year. The IRS regulations are not precise with respect to how much time after the fiscal year end is “reasonable”. For the purposes of this course, we’ll say that reasonable is within 90 days or 3 months after the end of the grantee’s fiscal year, but you should seek assistance regarding your Foundation’s specific deadlines for ER reports as they may vary from this timeframe.
Sometimes it can be tricky to determine whether or not a grantee has spent all of the grant funds. It’s best to seek assistance when questions arise about remaining funds. If funds do remain at the end of the project (either grant funds or interest earned on them), the grantee must either return the funds to the foundation or the foundation and the grantee must collaborate to find an alternative use for such funds related to the charitable project. This is another instance when it’s a good idea to seek assistance.
Narrator: Determining when ER reports are due can be tricky. Let’s go over a few examples together.
Let’s say a foundation makes a grant to a grantee whose fiscal year ends December 31st. If the foundation makes its first payment on October 15th in Year 1, the first annual report must cover the period between October 15th and December 31st. The first annual report must be received by the private foundation “within a reasonable period of time” after the end of the grantee’s fiscal year, which, for the purpose of this course, we’ll say is three months, which in this case is March 30th of Year 2.
This example only shows when the first annual report is due. Additional annual reports and the final report will be due depending on when the grant funds are fully spent.
Maya: I think I understand? But what if I want to make a short grant and all of the funds are spent in six months?
Narrator: If ER grant funds are fully spent during the same year in which the grant funds were received, the annual and final report are one and the same! Grants that span multiple accounting years require an initial annual report, a final report, and potentially additional annual reports if there are other accounting years that occur between the initial and final accounting years.
Let’s look at another example using the same scenario we just discussed where the foundation makes a grant to a grantee whose fiscal year ends December 31st. If the first grant payment is made on February 1st of Year 1, and fully spent by June 30th of the same year, the annual and final report will be one and the same!
If, however, the first payment is not made until November 15th and it is not fully spent until October 15th of the Year 2, the annual report should cover the period from November 15th to December 31st and the final report should cover the entire grant period, or from November 15th to October 15th and be due “within a reasonable period of time” after the end of the grantee’s fiscal year end, which in this case is March 30th of Year 3.
Maya: Okay, so I think I understand when ER reports are due, but what happens if a grantee fails to submit a report, either an annual report or a final report?
Narrator: This is a really important question Maya. If a grantee fails to submit a required report, the foundation must make a reasonable effort to obtain the required report, and withhold any future payments on the grant or any other grant to the same grantee until the report is furnished. Since it is not always clear what constitutes “reasonable efforts”, it is best to seek assistance if your grantee fails to meet a reporting requirement. If the foundation fails to take the appropriate steps, the foundation will be subject to a penalty, so it’s really important that you take appropriate action when ER reports are late.
Narrator: Let’s take another minute to test your new knowledge about the requirements for ER reports. Read each scenario, choose the best response, and then select “Submit” for feedback on your response.
Maya: Hello. Oh hello Akiki. It’s great to hear from you. Yes, I remember you from the international conference that I attended a while back. I’m thrilled that we were able to provide funding to your organization through an ER grant. Yes, I see you do have a report due next year on the grant we gave to fund a teacher training course in Uganda. What? You have unspent funds and would like to use some of the funds for an additional purpose? Hmmmm.
Narrator: Maya, you look concerned. Let me see if I can help. First off, remember that all funds must be used for the charitable project purposes specified in the grant agreement. In this case, the grantee’s organization must use the funds for the educational course that was proposed in the organization’s grant proposal.
Maya: But, the course has already taken place and Akiki’s organization still has funds remaining. Does that mean that the organization has to return funds to us? Isn’t there something we can do to help?
Narrator: Remember, if a grantee does not use ER grant funds for the specific charitable project specified in the grant agreement, it may be a diversion of funds. We’ll talk more about diversions later; in the meantime, it may be possible for Akiki’s organization to use remaining funds in ways that would not constitute a diversion if the proposed use fits within the original scope and purposes of the specific charitable project.
You should always seek assistance from the appropriate person in your organization to determine whether a proposed use of funds fits within the scope and purposes of the charitable project specified in the grant agreement and what documentation may be required in these cases, but let’s take a look at some examples that may help to explain this a bit better.
Narrator: In this case, remember, the charitable project specified in the grant agreement was to fund a teacher training course in Uganda. Drag and drop the various additional uses of the remaining funds into the correct box. Is such use permissible, or does is represent a possible diversion of funds?
Narrator: Now let’s talk about step five, reports to the IRS on the foundation’s tax return. In addition to receiving reports from the grantee, the foundation must report annually to the IRS on every ER grant made, paid, or for which a report is outstanding during the foundation’s fiscal year.
The foundation’s report to the IRS must include the items listed on the screen.
Narrator: Click the button on the screen to download an actual example of a foundation’s report to the IRS. This report is part of a Form 990‐PF, which is the tax return that is filed annually with the IRS by all private foundations and is made publicly available on websites like guidestar. Depending upon how many ER grants a private foundation makes, a foundation’s report to the IRS on its ER grants could be hundreds of pages.
Maya: Great, ER is really starting to make sense!
Narrator: There is one more part of ER that is really important for you understand. If the grantee uses all or any portion of the funds for any non‐charitable purpose, or for any purpose that is inconsistent with the purposes that were agreed to in the grant agreement, we call it a “diversion” of grant funds and the foundation must investigate.
Maya: Uh oh. That sounds serious.
Narrator: It can be, but the important thing for you to understand is what to do. First, it’s really important that the foundation reviews each ER grant reports soon after it has been received to determine whether there appears to be any diversion of grant funds. Second, the foundation must take appropriate steps if it suspects a diversion of grant funds. Click the button on your screen to learn more about what you have to do if you suspect a diversion. When you are done reading, click “Next”.
Maya: Hello. Oh hi Akiki. Yes, we did receive your report for our grant to fund the teacher training course in Uganda. Thank you for submitting it. In fact I have it here in front of me and was just about to call you. Yes, it all looks good except for one thing. I notice from the fiscal year financial report that there is $25,000 that is unaccounted for. Oh, I see; you weren’t aware of this. Yes, it would be great if you could check on this and get back to me. Now what am I going to do?
Narrator: Don’t worry, Maya. I’m here to help. How about we run through the following questions, which illustrate what we just learned about investigations of diversions and will help you to deal appropriately with the report from Akiki’s organization.
Read the questions below and choose the best response and then select “Submit” for feedback on your responses.
Narrator: Well Maya, that brings us to the end of this Module. We’ve covered the six steps on how ER is exercised. Before you go on to the last Module, I have a present for you: a printable takeaway sheet that summarizes the steps for exercising ER. Click the button on your screen to download and print a copy for future reference.
When you’re ready to move on, click “Next” to continue on to the next Module, or click any of the Topics in the Topic Bar to review the Steps we covered in this Module again.
Maya: Well that wasn’t so bad. I’m going to review my proposal again with these six steps in mind. I’m really excited because I think the potential grantee is going to be buying a really cool state‐of‐the‐art microscope, and they’re thinking about subgranting some of the grant funds to another for‐profit that I’ve always wanted to work with.
Narrator: That reminds me…there are a few complicating issues in ER grants that you should be aware of. These issues come up when there is an ER grant that contains subgrants or when the ER grant is to a private foundation; for capital expenditures; or to support advocacy activities. We’ll talk about each of these in more detail in this Module.
In addition, many foundations have their own internal policies about making, or prohibiting, ER grants that present these types of complicating issues, so you always should seek assistance when these issues arise.
Narrator: Let’s start with grants that include subgrants. Remember, some private foundations prohibit ER grants with subgrants as a matter of internal policy, but may offer alternative ways to support the same charitable project, such as by making an equivalency determination or using a fiscal sponsor.
If your foundation’s internal policies permit ER grants with subgrants, then under the IRS rules the grantee must exercise ER with respect to each subgrantee that is not a US public charity, government or similar entity.
A helpful way to think about how the ER rules apply to subgrants, is to remember that the ER rules follow the foundation’s funds, so if the funds are subgranted by the primary grantee to a secondary grantee where ER is required, the primary grantee has to exercise ER over the subgrant to make sure the foundations funds are still used for a charitable purpose. Click the button on your screen to learn more about the specific requirements for ER grants with subgrants.
Narrator: Now let’s do a quick knowledge check on ER grants with subgrants, as this issue can be tricky. Read the scenario, select the best response, and click “Submit” for feedback on your answer.
Narrator: Next, let’s talk about grants to private foundations. Remember, a grant from one private foundation to another private foundation requires ER.
The main complicating issue with respect to grants to other private foundations is something called the “out of corpus” rule. The “out of corpus” rule is one of the most complicated rules in ER. You can click on the button on your screen to learn more about the “out of corpus” rule, but you should always seek further assistance before making a grant to a private foundation.
Narrator: The next complicating issue we’re going to discuss is ER grants for capital expenditures. In general, a capital expenditure is an expenditure to purchase an asset that is useful for a period of time and, therefore, has a value that depreciates over time. Examples of capital expenditures might include expenditures on automobiles and boats. The purchase of real estate and land is also considered a capital expenditure.
Any capital purchased with ER grant funds must be used exclusively for the charitable purpose of the project. Depending on the type of ER grantee and your foundation’s internal practice for reporting on capital equipment, special – and sometimes extensive – reporting may be required.
You should seek further assistance on your organization’s tracking and reporting requirements if your grant contains capital expenditures.
Narrator: The last complicating issue we’re going to discuss comes up in ER grants that support advocacy. Sometimes the line between advocacy and lobbying can be tricky. Remember, ER grant funds may only be used for charitable purposes, which means that ER grant funds are strictly prohibited from being used for “lobbying” as defined by the IRS. For more information on the advocacy and lobbying rules for private foundations, and what constitutes advocacy versus lobbying, you can check‐out the course linked on your screen. For those of you who have taken this course, or are familiar with the lobbying rules for private foundation, you should note that the Project Grant Rule and use of an allocated budget may not be used in an ER grant.
If you’re making an ER grant that supports advocacy, you should make sure that the grantee understands that the grant agreement prohibits the use of grant funds for lobbying, and check each ER report to make sure that the grantee hasn’t inadvertently used any grant funds for lobbying. If grant funds are used for lobbying, it’s considered a diversion and you should seek further assistance to make sure the foundation takes the appropriate steps to restore the diverted funds.
Narrator: You’ve learned a lot this course. Let’s do a final knowledge check to make sure you leave this course understanding the basics of ER. Read each question and choose the best response. Click “submit” for feedback on your response. | 2019-04-24T12:54:57Z | http://learnfoundationlaw.org/transcript/expenditure-responsibility-rules-for-private-foundations-course-transcript/ |
Follow this simple guide to download your programs to CodeBug.
Downloading your programs to CodeBug is really easy, this guide will show you how.
are codebugs free — Kieran Frame @ April 26, 2017, 2:01 a.m.
no — william.colson @ Oct. 26, 2017, 4:19 a.m.
No — Matthew Mellor @ July 13, 2017, 3:03 p.m.
what does this mean — oliver nandha @ Jan. 11, 2018, 3:13 p.m.
Where can we obtain codebugs? — Neelanjana Arun Kumar @ April 20, 2018, 4:14 a.m.
No — ianyu2008 @ March 30, 2018, 9:50 a.m.
Plug the Micro-USB cable into a USB-port on your computer. While holding down button A on your CodeBug, plug the other end of the Micro-USB into the socket on CodeBug. The LED in the top left of CodeBug’s LED display will flash when CodeBug is ready. You can now let go of button A.
Note: There are separate instructions below for programming CodeBug with the battery inserted.
Some USB cables only work for power and do not transfer data, you will not be able to use these to program CodeBug.
How long should mounting take? My light stays steady (never flashes) and no drive shows up... — Phi Sanders @ Aug. 6, 2015, 3:29 a.m.
I tried a different cable and it worked! There is virtually no delay before the LED flashes and the codebug mounts as a disk now. — Phi Sanders @ Aug. 6, 2015, 3:58 a.m.
Some USB cables only supply power and do not transmit data (so can't be used for programming CodeBug). We have added this note to the guide. Thanls :) — Thomas Macpherson-Pope @ Aug. 11, 2015, 1:31 p.m.
Using the provided USB lead it does not show up on my El Capitan Mac, but with the same lead it shows as a drive on my Asus. — Rick Harding @ Oct. 31, 2015, 5:10 p.m.
For the first time it took about 3 seconds for light to start blinking. Now it is almost instant (1 sec). Drive appears in about 5 seconds on windows 7 64bit. No driver was necessary. — V.T. Marvin @ Dec. 27, 2015, 10:11 a.m.
cool — sreyner @ Sept. 26, 2016, 11:17 a.m.
Same as V.T.Marvin for me exept I use Lunix Mint version17.3 — Guerinboys @ Dec. 23, 2016, 7:08 p.m.
Having just received mine, it takes no more than a couple of seconds for the drive to appear. I am using Linux, Windows may need to install a driver when it is first plugged in. Are you using a data cable or a power-only cable? — Gregory Fenton @ Sept. 16, 2015, 1:19 p.m.
Well, the red light remain steady on forever. ANd I verified that the cable I use indeed is a DATA cable, not a power one. — jfmessier @ Sept. 23, 2015, 1:19 a.m.
cool — sreyner @ Sept. 26, 2016, 11:18 a.m.
I have an old prototype codebug that was given to me last summer. Is this essentially the same beast? Can I program it the same way as the new codebug? I can plug it in with a USB cable and button A pressed but it is my top RIGHT light that flashes and then goes steady and I cannot see the USB drive on my PC. I have confirmed I am using a data cable with my tablet. — laurence @ Oct. 1, 2015, 8:56 p.m.
You can still program it, will also work the same way, just some things you can not do(like make sound). — Cameron Barclay @ May 4, 2016, 12:53 a.m.
Is button A pressed just to enter programming mode? It seems the CodeBug (with no battery) will run a previously loaded program as soon as it is plugged into USB if button A is not pressed. — Matt Sendorek @ Aug. 6, 2015, 11:15 p.m.
Yes, the USB cable provides power so that's why the program runs. You have to hold the button so that the CodeBug acts like a USB memory stick allowing you to copy on the code. — Andy Clark @ Oct. 2, 2015, 9:14 a.m.
Yes holding button A while plugging in the cable lets CodeBug know it should go into programming mode. Otherwise it will run the user program that is already on it and just draw power from the USB. — Thomas Macpherson-Pope @ Aug. 11, 2015, 1:33 p.m.
Holding buttonA down while plugging it in prevents this from happening — Matthew Mellor @ July 13, 2017, 3:05 p.m.
Whenever I connect the CodeBUG, in any way I tried, I never get the LED flashing, but steady ON. What Can I do ? — jfmessier @ Sept. 12, 2015, 2:31 a.m.
Yes, as I repeatedly said in my different problem reports, the cable is indeed a DATA cable, as it was used minutes before for connecting my smartphone and downloading pitcures. Looks to me like the data pins on the device are not working. — jfmessier @ Sept. 15, 2015, 11:33 a.m.
Have you tried testing your USB cable with a phone to check it carries data? — Thomas Macpherson-Pope @ Sept. 15, 2015, 10:02 a.m.
Our first codebug broke its usb connector. It was replaced but really connectors should not be used as switches. Where is the documentation for how to load code and control codebug without (dis)connecting the fragile usb connectors? — William Dodd @ Oct. 24, 2015, 6:41 p.m.
It's in the "Loading program with battery" section below, but is applicable even without a battery. When connected via USB: * hold both buttons for at least 10 seconds (the LED display will turn off after 5 seconds so make sure hold the buttons for at least 5 seconds after that) * then let go of button B, making sure you keep A pressed * the programming indicator LED will begin to flash * you can then load your programs as normal by dragging them onto the CodeBug device. Make sure you do the full 10 seconds. Less than that won't work. — Dan Halbert @ Nov. 11, 2015, 4:05 a.m.
I am using the USB cable that came with codebug and getting no flashing red light when pressing button "A" . I successfully downloaded two other programs before this with the same cable. help? — rlagos1 @ Jan. 10, 2016, 6:49 p.m.
HI- thanks Thomas. Yes, I both held button down before and after plugging in and tried a different port. I realize now that the micro usb attachment on the codebug is loose and needs to be replaced. I will need to get it replaced. — rlagos1 @ Jan. 13, 2016, 7:05 p.m.
are you holding down button A before and during plugging in the cable? try plugging into a different USB port. — Thomas Macpherson-Pope @ Jan. 11, 2016, 10:30 a.m.
I don't quite understand the text? — sreyner @ Sept. 26, 2016, 3:46 p.m.
Well what he was saying is you hold A while you are plugging it in. — timtim @ Sept. 30, 2016, 12:52 a.m.
Thanks! — sreyner @ Oct. 2, 2016, 11:12 a.m.
what USB should I use to plug in codebug? — Nicolas Sandoval @ July 1, 2018, 1:03 p.m.
Now CodeBug is connected to your computer, much like a USB memory stick, you can drag your program onto CodeBug. If you have already made a CodeBug program, make sure you have downloaded it, or you can just click here to download a test program. Find your downloaded program file, and drag or copy it into where CodeBug appears on your computer’s folders.
I have a problem getting the device recognized as a storage device under Linux. I tried with a first cable that is KNOWN to carry data, as I used minutes ago to download pictures off my phone. But the Codebug, when connected did not show up on my computer. I was using a USB 3.0 hub. I then tried the cable that came with the Codebug on the same hub, no more results. Same on the USB 2 hub where my keyboard is connected. I then tried to a direct USB port on my computer, no hub whatsoever. Nothing more. I run Linux, but this should not matter. I thn though t about the fact that I was running a VM. Without the VM, same [problem. Tried connecting on a direct USB2 connection, same problem. I don't know whether this is a hardware defect or a OS compatibility, but it does not look under Linux. BTW: I use Ubuntu 15.04 64-bit. — jfmessier @ Sept. 12, 2015, 2:24 a.m.
Open a terminal window and type in dmesg | tail This will give the last lines of information about the events in your computer. Plug the CodeBug in and type in the command again. If the message has changed from the first run, copy and paste it as a reply to my answer here. — Gregory Fenton @ Sept. 16, 2015, 1:23 p.m.
My PC running Ubuntu 15.04 64-bit sees my Codebug as a storage device provided that I hold down button A while plugging the USB cable into the PC. If I simply plug in the cable, or plug in the cable and then press button A, the bug isn't seen as a storage device. I think that this is what is it designed to do. — Tony Addyman @ Sept. 22, 2015, 1:13 p.m.
I can't download my file from website! — Nasa1423 @ Sept. 23, 2015, 7:06 p.m.
Give us a clue! What operating system and version are you using (windows/linux/etc.)? What browser and version are you using (IE, Chrome, Firefox, Safari, etc.)? People will not answer your posts if they are just statements and not questions. — Roger James @ Oct. 14, 2015, 9:48 a.m.
Hi. All seems to run well from my Mac Book Pro. I downloaded 2 programs onto my USB-connected CodeBug device. Both show up on the CodeBug device initially. However, only one runs. How can I get my CodeBug to skip to the second downloaded program? Tried double-A presses & various other A/B combos to no avail. Thanks. — Flo Wing @ Nov. 25, 2015, 5:15 p.m.
You can only have one program on CodeBug at a time. However, you could put the blocks of both into a repeat while loop and check if button A or B is pressed and run the corresponding program — Thomas Macpherson-Pope @ Dec. 10, 2015, 9:37 a.m.
I have click Save many times and click the share button but the program cannot found under www.codebug.org.uk/explore/codebug/3369/ it will Change to www.codebug.org.uk/explore/codebug/all/ and also the Program is lost and not saved — günter thommes @ Dec. 9, 2015, 9:52 p.m.
This project is set to private, you have to set it to Listed or Unlisted to share the link — Thomas Macpherson-Pope @ Dec. 10, 2015, 9:39 a.m.
Does Codebug just remember one program at a time? How do you clear it to download or run a new program? Thanks — Janelle Ziegler @ Aug. 13, 2016, 12:38 p.m.
After we press B and the program runs, codebug disapears from the windows explorer. How can we show codebug without unplugging and replugging codebug, which is a bit of a nuissance. — Perna @ Sept. 13, 2015, 10:17 a.m.
Im sorry but you cant. You need to unplug and replug. — Emil Qvarnström @ Sept. 30, 2015, 7:24 p.m.
Holding both buttons for 8-10 seconds and then releasing only button B worked for me. However, it genuinely has to be >=8 seconds. The LEDs will shut off earlier but you need to hold well past that. — Dan Halbert @ Oct. 1, 2015, 12:41 a.m.
You can hold both buttons for 10 seconds then release button B. — Thomas Macpherson-Pope @ Sept. 15, 2015, 10 a.m.
When your program has finished loading, the LED in the top right of CodeBug’s display will turn on.
Reset CodeBug to start running your program by pressing button B. Your program will now be running.
When I press button B, my CodeBug disconnects from my computer (which complains that it should have been ejected before being disconnected). Does this matter? Is there a simple way of stopping it happening? — Peter Wood @ Sept. 15, 2015, 10:36 a.m.
No I just put it back in — Reece Patterson @ Sept. 17, 2015, 6:36 p.m.
I agree you should put the Micro USB cable in your code bug! — sreyner @ Sept. 26, 2016, 4:32 p.m.
This does not matter, CodeBug makes sure it is in a stable state when it resets (which is normally the role of the computer with USB memory sticks).. You could alternatively eject CodeBug on the computer. — Thomas Macpherson-Pope @ Sept. 15, 2015, 11:19 a.m.
Thanks. — Peter Wood @ Sept. 15, 2015, 11:40 p.m.
After running a program once, how do we run it again? The program runs, then the LEDs are all unlit. I can't work out how to run the program again, whether connected via USB cable or with battery inserted. — JulianJJ @ Oct. 30, 2015, 10:43 a.m.
OK, I've worked out that if you press and hold buttons A and B together for 10 seconds, then release button A, the program runs again. Presumably the program is still "running", even though it's not showing anything, and pressing both buttons stops the program, and they you can start it again. Is this right, or is there a better way? Should the program stop by itself, without needing to press both buttons for 10 seconds? — JulianJJ @ Oct. 30, 2015, 11:03 a.m.
If you want a program to run continuously, you need to put your program in a 'Repeat While true' block from the Loops menu. you can also add a 'sleep until button changes' block from the Basics menu to run your program each time a button is pressed. — Thomas Macpherson-Pope @ Oct. 30, 2015, 11 a.m.
dsaasd — Antonio Pilo @ Sept. 21, 2018, 1:23 p.m.
Does anyone know why the Pros keep answering all of the questions and how to use a course? — Guerinboys @ Dec. 23, 2016, 7:13 p.m.
Can the USB cable and the battery be plugged in at the same time? — Brian Corteil @ July 16, 2015, 11:54 a.m.
There is a section that states to load program with the battery installed you need to press both buttons for 10 seconds... From this I understand it should be OK to use the USB cable to program while a battery is used. I'm guessing they just don't recommend inserting a battery while the USB cable in plugged in. . — Steve Swindley @ July 17, 2015, 7:40 p.m.
Simple answer is Yes! If you CodeBug has a battery inserted in the slot you can plug in a USB cable without any problems. — Simon Holt @ July 28, 2015, 8:18 p.m.
I agree! — sreyner @ Sept. 26, 2016, 12:05 p.m.
Yes, but to reset the CodeBug with a battery inserted you need to hold A and B together for at least 10 seconds. — Gregory Fenton @ Sept. 16, 2015, 1:25 p.m.
Yes! why not! Well, you might think it could break the code bug but it won't! — sreyner @ Sept. 26, 2016, 11:37 a.m.
I do think so! — sreyner @ Sept. 26, 2016, 3:38 p.m.
Does a reset of the CodeBug (using both buttons A & B as described above) turn it off, so that it doesn't use up the battery? If not, is there any other way to turn it off? I would prefer not to have to take the battery in and out. — Tony Addyman @ Sept. 22, 2015, 1:26 p.m.
Holding A & B puts CodeBug into a very low power state, but it will still use some power. Removing the battery is the only way to ensure no power use — Thomas Macpherson-Pope @ Sept. 23, 2015, 9:39 a.m.
How do you play the program with a battery in it or replay it? Thanks! — SmileyFace11 @ Jan. 5, 2016, 10:30 p.m.
You have to put a loop while true around your program. Be shure in the emulator that you have to push the play button only once. If you have to press it again, your loop is not functional. — Walter Ampa @ April 15, 2016, 7:48 p.m.
what I mean, can you replay a program with the battery???? Thanks!! bye — SmileyFace11 @ Jan. 5, 2016, 10:34 p.m.
Can you, I'm not sure? — sreyner @ Sept. 26, 2016, 12:07 p.m.
For a program to repeat, it needs to be inside a Repeat while true loop from the Loops menu — Thomas Macpherson-Pope @ Jan. 6, 2016, 9:55 a.m.
That's true! — sreyner @ Sept. 26, 2016, 12:08 p.m.
I think you could though I'm not that sure yet! — sreyner @ Sept. 26, 2016, 12:10 p.m.
Hold down button A and B for 10 seconds. It will run your program again without a while loop. — László Tarjányi @ April 18, 2017, 10:27 a.m.
Could you use the bug when the batter isn't in? — sreyner @ Sept. 26, 2016, 12:13 p.m.
Yep, you can power CodeBug by USB cable instead :D — Thomas Macpherson-Pope @ Sept. 26, 2016, 3:34 p.m.
Thanks! — sreyner @ Sept. 26, 2016, 3:36 p.m.
Where do you get the EXTENSION HEADER and what is it? — sreyner @ Sept. 26, 2016, 3:40 p.m.
The extension header is the black plastic connector at the bottom of header, it let's you plug CodeBug onto a Raspberry Pi, or connect other electronics to CodeBug. — Thomas Macpherson-Pope @ Sept. 27, 2016, 3:06 p.m.
Thanks! — sreyner @ Sept. 28, 2016, 7:26 a.m.
Can you power the CodeBug using the extension header? (for example, in situation where using a CR2032 isn't possible) — James Langbridge @ Jan. 11, 2017, 1:39 p.m.
you can then load your programs as normal by dragging them onto the CodeBug device.
The above sequence doesn't work for me.- but what does is: - With USB disconnected, hold both buttons as described, then keep pressing button A - Only plug the USB cable in while pressing button A — Mike Redrobe @ July 29, 2015, 1:23 p.m.
What does work is a slightly different order: With USB disconnected, hold both buttons as described, then keep pressing button A Only plug the USB cable in while pressing button A — Mike Redrobe @ July 29, 2015, 1:25 p.m.
Just a tip: Holding buttons A and B will visually stop the active program after approximately 5 seconds. To get the necessary 10 seconds continue holding both buttons pressed for at least another 5 seconds. — Rob van den Hoff @ Sept. 30, 2015, 12:12 p.m.
Thanks for the feedback, we have added this tip to the activity — Thomas Macpherson-Pope @ Sept. 30, 2015, 2:41 p.m.
I left the battery in overnight, and the battery died. Is there a way to stop it other than removing the battery? — Tom OBrien @ Dec. 18, 2015, 8:42 p.m.
I think there is no other possibility for it than take out the battery and change it then put the new battery in the slot! — sreyner @ Sept. 26, 2016, 12:33 p.m.
I have a program that waits until any key pressed. Then it draws something and clears the display and goes back to the waiting state. With a battery I couldn't reset the Code Bug as described here. When I release button B the drawing loop starts again. I tried with and without the cable plugged in first. No visual impression after five seconds. Any suggestions? — Walter Ampa @ April 15, 2016, 7:56 p.m.
Workaround: remove battery, pess A, plug in. Not nice. — Walter Ampa @ April 15, 2016, 7:57 p.m.
Hello Walter, thank you for bringing this to our attention, we will investigate this issue and get back to you. — Thomas Macpherson-Pope @ April 18, 2016, 1:05 p.m.
Do you mean 'press' instead of 'pess' ? — sreyner @ Sept. 26, 2016, 12:37 p.m.
Same issue - I have "sleep until button changes" block - can't reset it using normal methods - have to hold down A and plug into USB. Not a huge deal now that I know, but confusing initially. — mrglue @ Nov. 20, 2016, 9:03 a.m.
Is it meant to flash after when you have taken your finger off the bug? Did it flash for you? If it's not meant to be flashing then what could have gone wrong?Could it have been the machine? — sreyner @ Sept. 26, 2016, 4:41 p.m.
Now you can use CodeBug to create all kinds of amazing projects. Go to the learn page to find out how to make different things with CodeBug.
I do not think that is possible — joseph b @ Oct. 26, 2015, 8:25 p.m.
I'm not quite sure if that's possible? — sreyner @ Sept. 26, 2016, 12:39 p.m.
. — HelloMyNameIsHamish @ May 2, 2016, 4:23 a.m.
how do you use python? — ianyu2008 @ March 31, 2017, 3:50 p.m. | 2019-04-23T02:38:44Z | http://www.codebug.org.uk/learn/activity/52/programming-codebug/ |
By now, you may have already set your NY resolutions and broken them. Everyone I have spoken to have broken theirs.
But there’s a much simpler method that I invite you to try.
Pick a word that you can live and play by, throughout the year. A word that has meaning for you and you can apply it to all aspects of your life.
I’ve picked mine. It is REDUCE!
This year I’m clearing clutter, simplifying my social media, reducing the number of newsletters I subscribe to, reducing my weight, reducing the number of books I have, giving more away to charity for others to enjoy and generally paring everything down.
I invite you to join me too, and if you want to share your word with me, I’ll be your ‘accountability’ buddy by checking in with you quarterly to see how you are getting on.
You’ve spent hours crafting what you think is the perfect CV, but ever wondered what happens to it at the other end? When it reaches the recruiter?
Most people I ask think that their CV will be afforded at least 15 minutes of a recruiters time, to go through and digest all its contents.
The truth is, your CV will initially get a quick scan and if the recruiter thinks you haven’t got the skills and qualities required for the post, they will reject your CV at that point. No 15 minute read here!
It’s much the same when you receive a leaflet through your front door at home. You quickly scan the document for interesting info and to see if you ‘need’ it. Then you may read on further or keep for reading later.
If it doesn’t pique your interest in the first 6 second scan, it goes straight into the bin, as is regarded as junk. I do this daily with the deluge of junk mail I get through the door. Double glazing – don’t need it, BIN. Sheds – don’t need it, BIN. Takeaway menu – don’t need it, BIN.
The same happens with your CV! Not a good match – REJECT. Spelling mistakes – REJECT. CV long to read – REJECT etc. etc.
Your ‘good stuff’ need to be on the first page of your CV and up at the top so you make an immediate impact. So don’t hide some of this ‘good stuff’ on the 2nd page!
Your CV is the equivalent of your ‘sales brochure’ – so sell yourself! You need to make that impact.
A recruiter should be able to fold the bottom third of your first page under, and read the top two-thirds, and get a real sense of who you are, what you do, and what experience you have. If it doesn’t, then it’s back to the drawing board!
Nobody is going to know from just reading your CV that you are hiding your light under a bushel, so let the recruiter know how good a match you are for this role.
Recruiters do this job day-in-day-out, and often will be recruiting for numerous positions at the same time, so time is crucial to them.
Many roles attract 100-150 candidates, so do the maths – it would be impossible to read every CV for 15 minutes!!
So, do yourself a favour by ensuring your ‘sales brochure’ really does capture your skills and talents and mirror and match the role you are applying for.
And, if you need a critical eye, I’ll always look it over for you and do a FREE CV review, and tell you honestly where it needs work and enhancement.
It’s always good to have a few written down on your notepad, and it’s OK to refer to them if you have trouble memorising them.
Some may have already been answered, and it’s good to say this (make the interviewer feel like they’ve done a good job) 🙂 Say something like, “I do have some prepared questions, and a few of them have already been covered in your description of the role – thank you”. “Can I therefore ask …” and just ask 2-3 questions – not a whole raft that makes them feel like they are being grilled!
This is an opportunity for you to gauge whether you’d like to work for them too, so it’s important you also make the right choice of employer.
1. How would you describe the overall management style of the company?
2. Who would I be reporting to and would it be possible to meet that person?
3. What is the biggest challenge this company/sector faces today?
4. Who is your greatest competitor?
5. How large is the team I would be working in?
6. What are the 3 top values of this company?
7. do you have a structured induction programme for new starters?
8. What is the company level of attrition for staff leavers?
9. What changes of promotion are there within this role, or secondment to other roles?
10. Do you offer chances to continue education and training within this role?
11. And lastly, when am I likely to hear whether I’ve been successful and by what method (letter, email, phone call).
Building your network is most important. People join LinkedIn to help each other so it’s time to reach out for help and help others too.
Start easily with people who you already know (and who know you). These people then become your ‘first-degree connections’. LinkedIn has tools to help you by asking if it can link with your Gmail/outlook account etc. It will use your email addresses to find matches with their members and help you connect. People connected to your first degree connections become second-degree connections if you connect through them. These members can also be useful as you can get introduced through your contact.
LinkedIn uses the information in your profile to check against its database and then presents to you people it thinks you may know – i.e. school/uni classmates, ex-colleagues etc. This is why having your profile 100% up to date is crucial. The more information the better it can match you for your past, present and future!
You can always use the ‘Advanced Search’ options to narrow down the search for yourself of suitable people to connect to. I.e. perhaps you just want UK contacts, or people within a 50-mile radius of you, or people in your own sector.
Obviously, if any of these connections can endorse your skills/talents that goes a long way to prove your credibility and integrity and builds trust.
And that’s what LinkedIn is all about – building relationships and establishing trust. Without which, LinkedIn doesn’t work.
You should never ever send a generic CV in for a job role. You simply have to up your game these days and stand out to be seen.
If you are smart, you will have the type of CV that is easy to customise. If you haven’t got one like that, then I strongly urge you to consider my inexpensive but highly professional CV writing kit.
Once you’ve found a job you’d like to apply for, then print off the job advert and arm yourself with a highlighter pen.
Go through the advert and highlight the essential words and phrases that you think are essential to the role. The key point here is that their most required skills/traits are always towards the top of the advert.
Once you’ve highlighted the essential elements, ask yourself whether you have those skills they require for that role.
In your key skills area of our CV, you need to mirror and match what they are asking for – but don’t just copy! For instance, if they are looking for a team player, you could put that you are a collaborator. If they are looking for someone with attention to detail, you could put that you are quality-orientated.
Next look at the job spec and see what they require and again you are going to mirror and match that in your bullet points that you list under your career experience section, for each of your roles.
If you have direct experience of that, then write that as one of your top 3 bullet points.
Most recruiters initially never read the full CV. They skim, scan and scroll. Therefore your ‘good stuff’ needs to be towards the top of your bullet points and the sentences have to have the ‘wow’ factor up at the front of the sentence.
Once you’ve finished customising your CV give it one last check over. Go back to the job advert and tick off where you’ve demonstrated those skills. Hopefully, you will fit the role 100%.
By doing this, I guarantee you’ll start to get more invites to interview, as you’ll match more closely the person they are looking to recruit!
Imagine you are at a huge face-to-face conference where you sit with everyone else for the main part, but then in the afternoon, you get a choice of talks you can attend. Looking at what’s on offer, you will probably choose something that interests you and where you may meet ‘like-minded’ people in the industry that you work in or that you want to join.
You could be all day trying to find someone in the main conference hall who could answer a burning question you have, perhaps on how to break into the field of Journalism.
Now, if I said that we had 3 talks in the afternoon, one on Journalism, one on Engineering and one on Marketing, which one do you think you’d get the most benefit from? And where are you likely to meet like minded people in the exact field you want to enter. All that talent and experience in one room! Can you see why joining that group would be of benefit now? You may get your questions answered and so much more – new contacts, tips, hints and crucial industry updates.
It’s the same with groups on LinkedIn but in a ‘virtual’ space. They all congregate in the same place and help each other. Join groups and ask questions, contribute to other people’s problems by offering solutions, build rapport and give advice if you can. Swim in that talent pool with the industry experts and get known! Recruiters often sift through groups too to search for specific candidates.
What are you waiting for? There’s an open door there – get through it!
Is It Worth Writing a Covering Letter To Go With My CV?
There are split opinions here and I weigh heavily on the train of thought that says ‘yes’ to a covering letter.
But I know recruitment agencies who admit to me that they never read cover letters.
So why do I think you should still send one?
If you’ve prepared your CV correctly, it will very closely resemble what the company said they wanted in their job advert (don’t just send in a generic one).
1. Your genuine interest in what they do (it is a company you have followed for years, engage with or follow on social media).
2. Have you been recommended to apply by someone already involved in the company? It’s OK to name drop on this occasion! It’s a warm lead for them, by someone who they employ saying “here’s another good fit” for this company.
3. It allows you to specifically illustrate how you definitely meet the criteria of the post by outlining exact or similar experience that can also be like a little addendum to your CV (especially if you are obeying my 2-page maximum rule).
The last paragraph can also give pertinent information, like holiday dates when you are not available for an interview, and your ‘call to action’ repeated again in bold (aka – please do not hesitate me should you need any further information on 01234 567890).
You never know which companies like covering letters or not (except those that ask you to include one) but I hope you’ll see that it can be worth the effort, and may just give you the edge over other candidates!
For those of you who have attended my ‘Networking for Career Success’ workshops, you will know how much emphasis I put on handshakes and will have seen my comic demonstrations of what different handshakes look like!
Your career will be a series of handshakes and this simple act can say a lot about you, so it’s time to master it!
1. Keep Your Right Hand Free. Firstly there’s always that awkward moment when we’ve got our right hand full of something, and then someone tries to shake our hand, leaving you to shuffle stuff over to the left or find a table to plonk things on. By the nature that you’ve been using this hand to hold stuff, may mean it is hot and sweaty so the first tip is always to keep your right hand free!
2. Stand Up! Never shake hands sitting down. A handshake always normally is at the beginning or end of a conversation, so stand up to greet that person or stand up to say goodbye. Much more professional and your body language will convey how pleased you are to receive them or say goodbye to them.
3. Look and Engage. Whilst your hands are doing the shaking bit, look that person straight in the eyes. This will convey even more body language to them, and remember to smile!
4. Pressure. I’ve had some killer bone-crushing handshakes done on me (what is that all about?)! I’ve got my theories and so may you have too. The best handshakes are even-pressured and with equality coming from either party. The other ones I hate are where people seem to reluctantly shake your hand and instead hold yours with just a few fingers (no palm on palm here). They make you feel like you have a contagious infection they don’t want to catch, or they are worried you didn’t wash your hands after leaving the toilet! And think about how that makes the recipient feel! Do you leave that conversation feeling valued? Excited to have met that person? Ready to do business? Feeling like you’ve made a new friend?
5. How Many Shakes. 2-3 pumps of the arm are advisable, any more and you’ll be giving them the impression that you are their new best friend! Keep it professional!
6. Practice Makes Perfect. I have my classes of students practice with each other and of course, I join in too and give you instant feedback – smile, look at me when you shake, more pressure needed, less pressure needed etc.
The more you do it, the better you become. It’s part of your personal branding, along with your clothing, attitude, manner, confidence etc, so if this lets you down the rest of the brand will be ruined too. So do get it right!
What are Interview Assessment Days all About?
Congratulations if you’ve got this far in the recruitment process. Although you may be pleased wither efforts so far, the mere mention of an assessment day may be making you apprehensive!
So what are they looking for when they hold these days?
I’ve run many in my days as an HR Manager and I thought it might be good to share some insider secrets. Employers may be looking for different things than what you initially think!
Some employers may choose to do a ‘challenge’ type of scenario (sometimes base don a survival exercise). This usually takes the form that they are leaving you in the desert with 5 objects and they tell you the object of your challenge is to all get back to HQ safely, using the 5 objects.
There are no real right or wrong answers here, and it doesn’t matter if there was, as they are looking for different things than just getting back to HQ! Your team will probably be between 5-9 other applicants (any more and it is difficult for the observers to watch and listen carefully). Yes, you will be observed and listened to!!
1. How persuasive you are in a group (and do people listen to you).
2. How mindful you are of others and their opinions (especially if they are different to yours).
3. Who is keeping time in the group (you will be given a specific amount of time for this exercise).
4. Who gives up and goes quiet/doesn’t contribute.
5. Who are leaders or clear team players?
6. Who have creative streaks?
7. Who have the right attributes who would fit in well with the company values? You may well be an excellent candidate, but the wrong fit for the company.
10. Who is good at presenting findings on behalf of the group (can they say it concisely, without rambling/waffle). Think of the TV series ‘The Apprentice’ here, at some of the cringe-worthy candidates they have had on there, who we would be desperate NOT to employ!
Other exercises that I’ve prepared for assessment days are the in-tray exercise. You are given a list of tasks and you need to show how you would prioritise them if this was a typical working day). Of course, I always made it a bit more challenging by throwing in a curved-ball half way through, to see how they reacted.
Some graduates have also been faced with an online assessment test which normally consists of multiple choice questions. Again to be completed within a set amount of time. If you are going for a mechanical/engineering post it may well have those sorts of questions on too.
Don’t think you are off the hook in these scenarios too. For my days I would be watching how you interacted/networked with others socially and whether you just ‘turn it on’ when the cameras are rolling! My secretary also observed for me too as the candidates arrived and booked in, and her observations were invaluable!
The 1-1 interview, which sometimes takes place on the same day too. They may have questions about how you felt you performed during the day and there will always be a ‘bank’ of questions which they have previously prepared to ask every candidate (os you al get an equal chance), and no-one gets more of a tough interview than others.
I have also given my candidates 15 mins to prepare a presentation topic that they will know about when I tell them. They are then given 10 minutes to do a presentation to a small panel audience. What was I looking for here?
1. Ability to think on your feet on a topic.
2. Keep to strict timescales.
4. Engagement with the audience.
6. Whole delivery and flow in terms of body language, tonality, the speed of voice etc.
7. HOT TIP: It really doesn’t matter how right/wrong your answer way, it’s the way you present the skills that I was judging, that I’d mark you on.
I’m not a fan of role-plays, but I know some organisations still use them. It may be useful for them to observe you in a situation which you can’t plan for. I.e. coming face to face with an angry customer and how you deal with them. Do you inflame the situation by what you say, or calm it right down. Either way, you will be thinking on your feet and judged on not only what comes out of your mouth, but your body language, how you try to defuse the situation, whether you can get to a solution and move things forward. Ideally, you are looking for a win-win outcome!
So, the next time you are invited to an assessment day, embrace it fully.
They want to get the right fit for their organisation and by having you with them for a day, they are more likely to see ‘the real you’. This also has advantages for you too, as you can get into the culture of the organisation and make sure it is the right fit for you too!
Recruiters these days harness the power of the internet to search for and attract the best candidates for job roles.
In order to become a potential candidate and be found, your LI profile needs to stand out. A killer profile needs to highlight your knowledge, skills, accomplishments and potential.
You wouldn’t want a potential employer not to see your full potential so do ensure your profile is completed 100%. This gives you up to a 40% greater chance of being spotted.
1. Publish a professional-looking photograph of yourself. Just head and shoulders work best. Not you on holiday or at a wedding – just you in your business attire.
2. Your headline should shout out what you do. You only have 120 characters here so make sure it zings! Make it clear, concise and compelling. Think about what words recruiters would use to find candidates and base it around that.
3. Complete your job experience section. You don’t need to write everything going back years but have at least your last 2-3 jobs on there. Write a mixture of what you did and your accomplishments in here.
4. The summary section is crucial – this normally gets read by potential employers. It’s the equivalent of your Professional Profile on your CV. Get lots of key words in there too, so the search engines can find you. Write it in 1st person.
5. Adding volunteer positions and interests shows a lot about you too, so don’t leave this section out. Show them the whole you!
6. Recommendations are worth their weight in gold. Who could endorse your skills/talents/accomplishments? About three would be a good number to start with.
7. Contact details – I highly recommend you customise your LI URL. The one they generically give you will not have much meaning and may well look like a series of numbers. Click on the pencil icon and see if you can get just your name. This URL will then be useful added to your CV (as a clickable link) and possibly your business/contact cards too.
8. If it’s useful to your target audience, you can also list your website address (if you have one) and social media links. But don’t add them if not relevant. Don’t detract from your core ‘personal brand’.
9. Tenses. I recommend you write your CV in 3rd person and your LI profile in 1st person. This makes you more personable. Current work duties/accomplishments should be written in current tense and past ones written in past tense (psychologically this makes the recruiter feel you have that experience already under your belt, rather than currently just learning it)!
10. Personal Branding – think of yourself as a personal brand. Does this profile reflect you well? Does it encapsulate you perfectly? If this was a sales brochure selling YOU, would it entice someone to want to know more, or buy?
Lastly, to get ‘found’ on LI you need to get visible. So remember to turn your setting from ‘invisible to non-one’ to ‘invisible to everyone’. You can show some bits and not others, but get brave and show everything!
Are You In CV Denial?
People come to me for my CV writing skills for a number of reasons, but the main one is that their CV is not opening doors to interview. I’m always amazed when speaking to potential clients, as they think they are just unlucky in not getting selected for interview (rather than the real truth that their CV is not good enough!). Sorry if that makes you wince!
Other potential clients tell me that they wrote it themselves and then had someone else look over it and the auntie/uncle/friend/mum said it was great! My reply to them is, is your auntie/uncle/friend/mum an HR Manager or a recruiter? If not, what would they know? They are hardly liable to tell you that it’s terrible, are they?? But to be fair to the auntie/uncle/friend/mum they really don’t know what they are looking for, from a recruitment angle.
The definition of madness is said to be doing the same thing over and over again and expecting a different result. Clients do this and never have the concept that there is a right and a wrong way of writing a CV. Most CV writers who are worth their salt will have a good ear to the ground about what recruiters are looking for, and more importantly will have a steady stream of clients who are getting an interview with their new super-duper CV’s.
So, are you in denial about your CV?
Are you sending it out and not getting the response that you expect?
Does your best friend say it is fab?
Are you sending it out and not getting interviews?
If any of those reasons resonate, it might be time for some plain-talking.
I offer a FREE CV review as part of my service. I’m brutally honest when I write your report, but I do this from a heart-centered viewpoint in that I want you to get that job! Lots of my clients have written to me afterwards to thank me for my report, because believe it or not, I write it specifically about your CV. There’s no computer generated or ‘generic’ replies from me! And I don’t add you to a mailing list and then bombard you with emails!
What have you got to lose? Stay in denial in your comfort zone, or break out and get that job you truly deserve!
I was amazed at my report – I thought you would just give me a bland report, but it was 2 pages of great advice on how I could alter my CV to get my next role. I took your ‘free’ advice and got a new job!
Thank you so much for looking over my CV, all your recommendations are fantastic.
Or if you’d like a copy of my FREE ebook ’25 Top Tips for CV Writing, just click on the link on my homepage.
Print off a copy of the advert, your CV and your covering letter. Put these in a file for reference/aide memoir at the interview.
Get the names of who is interviewing you. Check them out online. e. on LinkedIn, company website etc. Memorise their faces and bios.
Research the company. Use the company website, Google, Twitter, FB, News, Press Page, LinkedIn too. What is going on in their world? Show you have done your homework. What are their issues right now and how could you help with this appointment? Is the share price up or down? Who are their investors? What are their company values? What matters to them?
Plan your trip. If it’s local do a dummy run on the weekend before so you know where they are, where the reception is, where the car park is etc.
Double check your interview time. Ensure you have replied to accept the date and arrange to arrive 10 mins before the interview so you can freshen up in the loos, check your appearance etc. (Power stance bit in here).
Make pleasant small talk with the people in reception – you never know who they are and the receptionist may have been briefed to feed back on you too!
First impressions count. Good handshakes, eye contact, smiles, politeness all goes towards this.
Wait to be asked to be seated in the interview room. If there is a panel, shake hands will all of them.
Open your folder and have it on your knee or the edge of the table. Pen there too. Shows you are ready for business!
Control your nerves. Breathing technique to be put in here.
Appearance – your clothes should be appropriate to the role. Clean shoes, hands etc.? Might seem obvious but I’ve seen candidates beautifully dressed and when I look down at their shoes, they are a total let-down.
After Interview – if rejected email to thank them for their time. Tell them that despite the result you are still very much interested in the company and would like to watch out for any future openings. Wish them well and say they can keep your CV on file.
If I asked you how happy you were with your job/career, what score would you give me out of 10?
Anything less than 7 and I would be asking you what you’d like to do about it. Thinking about changing your job/career is a start, but we all know that it’s actions that take you closer to your goal. So what will your actions be to get yourself into a job/career that you completely love?
The WORST Recruitment Selection Process I Have EVER Seen!
I’ll not name names in this post, as you would be shocked – but I’d love to name and shame!!!
A few years ago, a client of mine applied for a service role that required no qualifications, just a willingness to work hands-on and be trained. He really wanted this job, and I really wanted him to at least get an interview so he could demonstrate how willing and able he was.
We worked hard on his application and send in a really strong effort for the role. After 3 weeks he got a ‘generic’ response by email saying ‘sorry, you haven’t been selected for interview’.
He was gutted – and I was INCENSED!
I’ve worked with this company before so I picked up the phone and got through to the line manager and asked him why my candidate hadn’t got an interview. His reply astounded me and these are his words.
“Well Christine, I had about 150 applications for this job, and I haven’t got time to read them all, so I just picked the top 6 off the pile, interviewed those and the best one got the job”.
I’m still speechless even today about it, hence this post. But for all of you out there whose confidence plummets each time you get a reject letter/email, take a lesson from this in that YOU ARE WORTHY, and a company of this calibre doesn’t deserve you!
Do you get that sinking feeling on a Sunday when you know you’ve got work tomorrow? Or perhaps you’d love to get a job and would like to look forward to work on a Monday morning?
Chances are, if one of the above sentences resonates with you, then you are ‘stuck’.
There are 4 stages where you could be stuck, so identify what stage you are at and then read on for some handy tips and advice.
What’s my goal or purpose in life?
What sort of people do I like to work with?
What are my areas of knowledge or fields of interest?
In what location would I prefer to work? Would you move area?
What is the minimum salary range I would be prepared to live on?
Are there any gaps in my skills that I need further training on?
The Internet is a good place to start but rather than trawling all the jobs boards, use one that is a ‘catch-all’. I use www.indeed.co.uk as I like the fact that you can search by area and salary. For instance, if your minimum salary is £25,000 put that into the ‘What’ search box and then put the location in the ‘Where’ box.
Make good use of Social Media. Are you on Twitter? If so, follow all the companies that you feel you’d like to work for, and then you’ll get alerts the minute they advertise a vacancy. Same with Facebook. Not tried LinkedIn yet? You should! There are 300m+ users on LinkedIn and that’s companies as well as people. So ‘fish where the fish are’. Companies who have their own profile page will often advertise their vacancies on LinkedIn, as that is where they feel the business community is!
Word of Mouth. Does everyone you know, know what you are looking for? Let others be a ‘scout’ for you too. If they hear of anything that suits you, hopefully, they’ll hot foot back to you and let you know. Don’t ‘assume’ that people know.
It always amazes me how clients keep sending out the same old CV and expect to get a different result. If you’ve sent it out 20 times and you’ve not even got a sniff of an interview, then there’s something wrong with the CV! That’s where people like me can help with a FREE CV Review. Just send it along with a note of what type of role you are trying to get in to and I’ll give you my honest feedback and some useful notes on how to change it, for FREE.
Then this is definitely your interview technique that is letting you down. Again don’t go into the next interview with the same old patter, as you’ll get the same old result! If cash is tight then invest in a book. I’d recommend ‘Brilliant Answers to Tough Interview Questions’ as a starter. And if cash is really tight then the library will have a copy. If you can afford it, find a good Career Coach in your area and ask them to take you through a mock interview and give you honest feedback.
75% of Employees Hate their Jobs!
Now hate is a very strong word but I’d certainly endorse that figure by saying that 75%+ of people get little or no enjoyment from their career/role. Are you one of them?
So how do you get yourselves out of this pickle, so you don’t become part of the 75% statistic?
The first step is to have a strategy/plan of moving from where you are now, to where you want to be. And then be prepared to take ACTION to get there. (After all, you wouldn’t go on a holiday without doing a bit of research first and then making a plan – visiting travel agents, looking on the map, researching the area, buying the currency etc. etc).
However, although this option is open to everyone, some people seem to get some pleasure from being ‘stuck’. Is that you?
If not, get that plan together and have the trip of your life into a career you truly deserve and love.
The Career Lens is a great place to start. Download this free exercise and within 10-15 minutes you’ll already be on your way to a new start.
Click here to get your instant Career Lens – no sign up required!
As a former HR Manager, when one of my Heads of Department had a vacancy to advertise, we would sit down and write a job description and a person specification.
That exercise is very interesting because those documents will be written in such a way that is gold dust to the applicant.
If I asked you to describe yourself to me, the first things you’d tell me would be the absolutely crucial traits that you’d want to convey. If we did that exercise for 5 minutes, the things that you’d say in minute 4, would still be relevant, but not as pertinent as the ones you said in minute 1.
The same goes for the person specification and job description. The things that are the MOST IMPORTANT always appear in the top 3rd of the page, and that’s the exact skills, traits and competencies that you should be ‘mirror and matching’ back in your CV or application form.
You want to get the recruiter to feel that you really ‘tick all the boxes’ so that’s why each CV needs to be tailored to each vacancy. That hopefully will get you on the ‘invite to interview’ list, rather than on the ‘reject’ pile.
The company gives you the clues … you just have to pick up on them!
My last article concentrated on the ‘S’ of D.I.S.C. This week we are looking in more depth at the ‘C’ – Compliance type.
High C’s are reserved and task-orientated. They are Competent, Cautious, Careful and Conscientious. They are always in pursuit of excellence and are very mindful of rules and regulations. They will be happy to sit in a room with a computer or a set of accounts, and enjoy being around other people who are outgoing as long as they don’t have to join in with the fun! Being competent they frequently research the facts and will enjoy investigative work. C’s will follow instructions to the letter and will enjoy reading manuals! They can stay on track with projects and enjoy seeing things fall into place step-by-step. Being lovers of detail they will frequently write “To Do” lists and plan as much as they can. Other groups will write “To Do” lists, but the C’s will stick to them! C’s like to be correct and enjoy being right. If you challenge a C they are more likely to go away and check their facts and figures and then come back to you and present you with the evidence! They love to be accurate and produce work of excellent quality. But beware! Because they are always in pursuit of excellence, they will sometimes miss deadlines because their best is never good enough for them.
C-types can normally be found in specialist roles – IT, Accountancy, Law, Music, Teaching etc. Their analytical nature likes to ask “Why” questions. They are not risk-takers and would be unhappy if they were pushed into making quick decisions without having time to think. They respond best to a manager who is supportive and is detail orientated themselves, who works by the rule book and doesn’t change their minds on a whim. They like to communicate in writing so a backup email/letter following a phone conversation would be very welcome. Beware that they don’t handle criticism well, as they have a strong desire to be correct – so if you need to be critical make sure it is handled sensitively!
Have you recognised your “type” in the past 4 articles? Most people will identify with 2 types and it is the combination of these two, that makes you unique.
This subject is endless and if anyone would like me to address a specific issue, I will be happy to write further articles.
Are you a High S?
This is the 3rd of my postings about DISC Profiling and this week we are looking at High S’s – the ‘S’ traits are all about the Steadiness/pace of work. As you know some people work faster than others and from this trait, we can assess your work rate as well as lots of other things!
High S’s are Steady, Supportive and Stable and desire a great deal of Security. Routine may be boring to some, but not to S-types. It gives them security to know that things are not going to change for change sake. S-types are “nice” people to be around – they will always try to help you no matter what, and for this reason are sometimes seen as a soft-touch and colleagues may put on them. They look for ways to cooperate and help and rarely say no. They quite like being given orders and like to do a good job.
At home, they can be very sentimental and have favourite films, memories etc. S-types are ideally suited to the service industry as they are the cogs in the wheel. If you manage any S-types then you will be lucky enough to have a workhorse that doesn’t mind repetitive jobs and will work their way steadily through any pile of paper. For those of you who are not S-types – don’t even think about trying to liven up their workloads by throwing them into unknown situations or changing things for change sake. The S-types hate this! They like security and fear change.
The way to motivate S’s is by showing them how much you appreciate them – smile and say ‘thank you’! If you are a manager of this type of personality then please use a coaching style. Encourage, motivate, inspire and watch!
More next week on the C-types in DISC – Compliance. If you like to work by the rule book and strive to achieve quality then this could be you!
Are you a High I – a ‘people person’?
If you read my last blog you will know that I’m working my way through the various personality types in DISC profiling – Dominance, Influence, Steadiness and Compliance. This week we are going to explore the Influence type.
High I’s are very people-orientated. Nothing matters more than people, people, people! They are Inspiring, Influential, Impressive, Interesting and Impulsive. They make inspiring leaders. When you are with them you will feel great – their cup is always half full! They make good sales people and make everything sound great. Optimism is their middle name!
They can influence you with their charming ways because they are good talkers. For this reason, they make good ‘front line’ people for any business. They also make good speakers, coaches, actors, comedians and teachers.
I‘s are not primarily interested in getting a job done – their primary interest is how everyone gets along with each other during the job. Give them a project and they can visualise creative outcomes, endless possibilities and will be great at generating enthusiasm and getting a willing team together to do the work.
Relationships are paramount and they network very easily because they are naturally friendly. After you have been talking to them for a while you will feel like you have known them all your life. I‘s are compassionate people and would give you their last pound if they thought you needed it more than themselves. Be careful though – don’t take advantage of their generous nature!
Next week we’ll be looking at the ‘S’ in DISC, which stands for Steadiness. If you are steady, stable and dislike change then this could be you!
As a Licensed DISC Profiler, I’ve used this extensively, not only in my career coaching work but also for personal development with my clients.
So, over the next 4 posts I’m going to highlight the main behavioural traits of the four groups in D – I – S – C and I’m sure you’ll soon be able to recognise your primary trait!
DISC stands for Dominance, Influence, Steadiness and Compliance. Let’s begin with ‘D’ (Dominance type) here. Is this you? Or do you know people around you that fit this description?
High D’s are very task-driven and outgoing. They are Dominant, Driving, Demanding, Determined, Decisive and Doers. They make dynamic leaders. They have masses of drive and seldom take “no” for an answer. They tend to take a position quickly and stick to it unless they see a better idea or plan. If you work with a ‘D’ you may sometimes have a difficult time knowing what is going on in their minds. They are normally strong willed and independent. Because they are “bottom-line” orientated they can tend to be blunt and to the point in order to achieve their goal. They are not particularly into talking; more into doing. ‘D’ types make great leaders but can have a short fuse and a hot temper. They can often explode over small things, but 10 minutes later have forgotten all about it, whilst the rest of you are still reeling from the outburst! They quite like conflict and can rise to any challenge. When two ‘D’s clash it can be a good spectator sport, waiting to see who will back down. If you have ‘D’s in your team remember that they need control – give them projects – but don’t give them step by step instructions on how to carry it out. Give them the freedom to make their own decisions – they work best when you don’t tie them down. Just tell them what you want and let them get on with it. That way, you’ll get a good job done well.
Recognise yourself? Or someone you work with?
In the next post, I’ll describe the ‘I’ in DISC, which is the Influence type. If you like to talk and love people this could well be you!
Q: Do I need to write ‘Curriculum Vitae’ at the top of my CV?
Answer: My CV review service is very popular and on average I receive about 3 CV’s a day, for this service. The ones that I received today all had something in common. They had ‘Curriculum Vitae’ written across the top of the page.
These days, this is not necessary. What is more important is to have your name as a header in a largish bold font so it stands out from the rest of the document. After all, you want to stand out from the crowd, don’t you???
Make your CV look like a ‘sweet-shop’ window!
I always advise my clients that if a cv doesn’t grab the potential employer within about 15-20 seconds of reading it then you are unlikely to be asked to interview.
I also say this from experience – having worked as an HR Manager and read 1000’s of cv’s, I’ve seen my fair share of good and bads ones!
Imagine your first page as a ‘sweet-shop window’ – you want people to come inside and browse, so get your eye-catching stuff in that window to attract attention. Get the potential employer hooked and excited about the prospect of you working with them. You are much more likely then to get invited for an interview to expand on your skills and talents further.
Please don’t assume that your cv will be thoroughly read word for word. If an employer is faced with 200 cv’s for each position, they will skim read first and probably have a ‘no’ and ‘yes’ pile. The aim is to ensure you go on the ‘yes’ pile!
So, if qualifications are important for the position you are applying for, make sure that is front-loaded on your cv. If they are looking for particular skills, then alter the layout to make sure they stand out on the front page.
Your cv is probably going to look very different for each position you apply for (and so it should), so just remember ‘sweetie-shop window’ and get your ‘goodies’ on that front page.
Happy job hunting – and as always, if I can help you in any, please just ask! | 2019-04-25T11:49:55Z | https://www.christineware.co.uk/author/christine/ |
Primary Examiner: Pate, III; William F.
Assistant Examiner: Neuder; William P.
Abstract: A self powered downhole tool anchor device (10) preattached to a downhole tool (T) and unitarily supported by a drill string (DS) for a single trip into a well bore, actuated by forceful engagement with the bottom or plug (P) in the well bore and attachment to a well bore casing (C). The anchor device comprises an inner mandrel (20) and lower cone (34) containing a piston (30) and fluid (F) for axially displacing an outer mandrel and piston (44) connected thereto by shear screws (46). An upper cone (20) on the outer mandrel is connected by shear pins to a slip housing (50) containing radially expandable slips (38) keyed to the lower cone (34). A self contained power supply (PS) of combustible material (M) is ignited by a firing pin (90) striking a primer igniter (I) and generates gas pressure applied to the piston 30 and fluid (F) to shear pin (46) and axially displace the outer mandrel and piston (44) upper cone (40) slip housing (50 ) slips (38) and ratchet ring (62) relative to inner mandrel (20) and cone (34). Screws (52) are then sheared off releasing upper cone (40) from slip housing (50) and allowing relative displacement therebetween to radially expand slips (38) into gripping engagement with the well bore casing (C). A mechanical firing mechanism includes a preloaded compressed spring (100) actuated hammer (98) retained against a spring housing (102) and in a cocked firing position by a shear pin (101) extending from an outer housing (96). A trigger (108) engaged by the spring housing (102) has a foot (110) which engages the bottom of or plug (P) in the well bore. Lowering of a predetermined amount of weight of the assembled unit causes pin (101) to shear and release the hammer (98) which strikes and propels the firing pin into the igniter capsule I.
a closed end portionj with coupling means thereon connected to the downhole tool.
at least one fluid passage in the sidewall of the inner mandrel.
mechanical trigger means adjacent to the firing means and adapted for engaging a bottom or plug in the bore hole and to release the preloaded firing means when a sufficient predetermined amount of weight of the anchor device and support means isreleased and applied to the trigger means supported by the bottom or plug.
fluid contained within the internal chamber between the piston and closed end of the inner mandrel adapted to be pressurized by movement of the piston toward the closed end and to force the fluid under pressure through the fluid passage in thesidewall to act against and release the outer mandrel and piston.
key means between the lower cone and slips for preventing rotational movement and allowing relative axial movement between the cones and slips.
an annular layer of the combustible propellant material situated within the outer shell casing and extending substantially to the primer ignitor capsule for ignition thereby.
resilient means in the housing and adjacent the firing pin for initially maintaining the firing pin in a retracted position away from the primer igniter capsule and which is easily overcome by an impacting force applied, by release of thepreloaded hammer means, to the firing pin.
preloaded resilient means compressed sufficiently between the bottom of the spring housing and the preloaded hammer which upon being released, exerts the necessary force to propel the hammer against the firing pin and firing pin into the primerigniter capsule and ignite the combustible material.
a foot at an opposite end of the plunger for engaging the bottom or plug in the bore hole.
a pressure relief valve for releasing excessive fluid pressure generated by the combustible material, from the internal chamber.
a drill bit attached by shearable means to the upper end portion of the whipstock and adapted for attachment to support means for simultaneously lowering the anchor device, attached whipstock and drill bit into the well bore as a unit andactuating engagment with the bottomor plug.
a drill bit attached by shearable means to the upper end portion of the whipstock and adapted for attachment to the support means for simultaneously lowering the anchor device, attached whipstock and drill bit into the well bore as a unit andactuating engagement with the bottom or plug.
The invention relates to a mechanical self powered fluid pressure actuated apparatus for anchoring a preattached downhole tool to a well bore casing in a single trip into the well bore.
The invention concerns an anchor device to which a downhole tool such as a whipstock and casing bit assembly may be preattached, supported and lowered, together as unit by connection to a drill string, in a single trip for attachment to a wellbore casing and various purposes such as side tracking or deviating the bore.
In particular the anchor device is of the type in which a mechanical firing means ignites a self contained cartridge of fluid pressure generating material. The fluid pressure acts against a piston, fluid and piston to shear a pin, displace atapered mandrel and radially displace slips into gripping engagement with the side wall of the well bore casing or well bore.
Heretofore, downhole tools of various types have been anchored to a well casing after a number of trips into the bore by radially expandable slips actuated by various self contained fluid pressure generating devices. The fluid pressure isusually generated by igniting combustible material of various types including explosives, and chemically reactive ingredients adapted to produce fluid pressure of sufficient magnitude to actuate the device. Various means for igniting and mixing thematerials are known including electrically and mechanically fired explosive charges, bullets, and other projectiles.
The Applicant's anchor differs from the prior art in that it allows for preattachment of the downhole tool thereto for a single trip by drill string into the bore for attaching the entire assembly to the casing. Also, a preloaded mechanicalfiring mechanism includes a trigger foot that forcefully engages the bottom or plug in the well bore and which under the weight of the assembly applied thereto, shears pins and releases a preloaded hammer. The hammer strikes and propels a firing pininto the igniter of a cartridge of combustible material which forms to generate the fluid pressure and radially expand the anchoring slips into gripping contact with the casing.
A self powered fluid pressure actuatable well bore tool anchor device comprises an inner cylindrical mandrel containing fluid and a piston therein. The inner mandrel has radial openings in its sidewall and an end cap adapted for preattachment tothe mating lower end of a well bore tool such as a whipstock adapted at its upper opposite end for preattachment preferrably to a drill bit attached to a drill string for simultaneously supporting and lowering the preattached well bore tool and anchordevice into a well bore casing. Attached to the lower end of the inner mandrel is a lower externally tapered slip expander cone keyed to and engaging the lower internally tapered portion of a plurality of radially expandable outer toothed slips. Anupper outer expander tube and piston extending around and connected by a shear pin to the inner mandrel is provided with a lower externally tapered end mandrel cone engaging and mating with upper internally tapered portions of the inwardly resilientlybiased slips.
A slotted slip housing attached by a shear pin to the upper expander tube holds the slips, movable radially within the slots, in predetermined axial and angularly spaced positions.
A radially expandable split rachet ring with internal teeth axially movable with the upper expander tube is provided for cooperating locking engagement with external teeth on the inner mandrel. A self contained source of power comprises acartridge of combustible material and ignitor adapted to generate fluid pressure is retained within an upper portion of a power supply housing attached to the lower end of the lower expander cone. A mechanical firing means comprising a firing pin,preloaded hammer trigger device are housed within a firing means housing and maintained in a cocked position by one or more shear pins.
A trigger including a foot adapted to rest on the bottom of or a plug in the well bore engages a trigger spring housing in contact with a preloaded spring and the hammer. Downward movement of the assembly relative to the trigger device causesthe pin to shear and release the spring loaded hammer which strikes and propels the firing pin into the primer to ignite the combustible material.
The material burns and creates fluid or gas pressure that acts against piston and fluid which acts between the inner mandrel and outer mandrel and piston to shear pins and allow axial movement of the outer mandrel and slips relative to the lowerexpander cone, and shear another pin which allows upper expander tube and ratchet cone to move downwardly, expand and lock the slips against the casing wall.
FIG. 4 is a view of the upper portion of the whipstock of FIG. 1 preconnected to a drill bit attached to the drill string for supporting the entire assembly.
Referring to FIGS. 1 and 1A, there is shown a self powered anchor device 10 having an end cap or upper end portion 12 adapted for and connected by a clevis pin P to the inserted mating lower end portion of a downhole tool T. The tool T ispreferrably preattached as shown in FIG. 4 by a shear bolt to a drill bit D attached to the end of supporting drill string Ds in a manner similar to that shown in U.S. Pat. No. 3,908,759. However, it could be adapted for direct preattachment to thedrill string. Thus, the drill string supports the bit, downhole tool and attached anchor assembly for a single downhole trip and attachment to the well bore casing C.
In this instance the downhole tool T of which an upper portion is shown in FIG. 4 and the lower portion is shown in FIG. 1 is a whipstock W utilized in the well known manner for deviating the well bore by first drilling a window in the casing Cwith the pilot bit D shown guided by the oriented inclined side of the whipstock W. However, it is obvious that other downhole tools such as perforators, packers, side corers and many other devices may be adapted for attachment to the anchor device ofthe invention.
The end cap 12 has a central bore 14 plugged by a removable pipe plug 16 in a lower externally threaded end portion thereof sealingly attached to the upper internally threading end of an inner cylindrical or tubular mandrel 20 extending axiallyto a lower open end thereof. A resiliently biased ball type pressure relief valve RV is connected to the bore 14 in the end cap for venting pressure above a critical level from the device. Inner mandrel 20 has an upper sidewall portion with one or morefluid passages 22 extending laterally therethrough, an intermediate portion with external ratchet engaging teeth 24, a lower externally threaded end portion and an internal chamber 28. A piston 30 including annular seals and grooves therein is retainedin the chamber 28, by an annular stop or snap ring 32, for sealing sliding engagement with the mandrel sidewall and seals of the lower open end of the chamber containing a fluid F above the piston. The fluid F is contained in the chamber 28 between thepiston 30 and plug 16 in the end cap 12 and extends through the apertures 22 to an annular sealed space around the exterior of the inner mandrel 20.
On, attached or threaded to the lower end of the inner mandrel 20 is an internally threaded and sealed lower tapered slip expander or cone 34. Fixed to the lower cone 34 are equally angularly spaced tapered key ways and keys 36 each adapted formating, guiding engagement with a lower internally tapered end portion of radially expandable gripping slips 38 with mating internally tapered surfaces, keyways and external gripping teeth or serrations. The keys and keyway prevent relative rotation butallow axial movement between slips and cones. Each slip 38 has upper and lower oppositely tapered internal surfaces resiliently held in mating engagement with similarly oppositely tapered mating external surfaces of axially spaced lower and upperexpander cones 34 and 40. The upper expander cone 40 maybe an integral portion of, but is preferrably attached with suitable fasteners or screws shown to the lower end portion of an outer annular tubular piston or cylindrical outer mandrel and piston44. The outer mandrel 44 has an internal annular piston surface area adjacent the fluid passages 22 and is slideable on, sealingly engaged with and attached to the upper end portion of the inner mandrel 20 by at least one but preferably a plurality ofshear screws 46.
A tubular slip housing or sleeve 50 provided with angular spaced windows or openings in its sidewall for initial displacement of and holding the slips 38 in the angularly spaced positions is attached by one or more shear pins or screws 52 to theupper cone 40. The housing 50 extends downwardly to a lower end portion thereof situated adjacent an exterior channel or recess in each slip 38. Angularly spaced pins, studs, or projections 54 attached to the housing 50 extend inwardly into thechannels. Resilient means such as compression springs 56 recessed into each of the slips 38 and inserted over the pins 54 are provided between the housing 50 and slips 38 for resiliently maintaining the slips retracted and in mating contact with taperedsurfaces of cones 34 and 40.
Between an intermediate toothed portion of the inner mandrel and the upper cone 40 are ratchet means 60 for locking and preventing retracted axial movement of the cones 30 and 40 away from the radially expanded slips 38.
The ratchet means comprises cooperating external ratchet teeth on the intermediate portion of inner mandrel and mating internal ratchet teeth on a radially expandable resilient split ratchet ring or annular pawl 62.
The resilient split ring or pawl 62 is situated within an internal annular groove and between opposing shoulders of the upper cone 40 and the attached outer mandrel and piston 44. Hence, relative axial movement between the outer and innermandrels 44 and 20 in one direction moves the pawl 62, and causes the cooperating upper tapered sides of the internal ratchet teeth to slide over the external ratchet teeth of the inner mandrel 20. Simultaneously therewith, the ring 62 expands radiallysufficiently to disengage and advance its internal ratchet teeth for contraction into locking mating engagement with the straight radial bottom or lower opposite sides of other adjacent external teeth of the inner mandrel 20.
Once contracted, the split annular pawl or ring 62 prevents reverse relative movement between the mandrels, cones and slips 38 and thereby maintains the anchoring engagement between the expanded slips 38 and sidewall of the casing C.
Self contained power supply means or unit 70 is provided comprising a housing 72 threadedly attached and locked to the lower internally threaded end of the lower expander cone 34 on inner mandrel 20. The cartridge housing 72 has, adjacent thelower end of the chamber 28 in the inner mandrel 20, an elongated internal sealed chamber containing a self contained canister PS of ignitable fluid or gas pressure generating material.
The canister comprises as shown in FIG. 3 agenerally hollow holder or shell casing S of any suitable metal, plastic, paper or fiber material having an open exit or outlet end thereof situated opposite an integral or separate shouldered or flangedhead H fixed to the opposite end of the shell casing S.
An integral annular flange or shoulder F extends radially outwardly from the head H for engagement with the lower opposite end of the housing 72 and adjacent cartridge retainer means in the firing mechanism 80. A central bore in the head Hcontains a primer or ignitor I of conventional suitable construction in the form of a center fire cartridge or capsule pressed into the central bore. The capsule I contains a small charge of pyrotechnic powder ignitor material for simultaneouslyigniting the main outer annular charge of fluid pressure generating and propellant material M.
The propellant material M is preferably a type of combustible material that burns at a much slower rate than conventional explosive materials do. A suitable slow burning pressure generating material is preferably a mixture of strontium nitrate,potassium percholrate and poly butadiene oxiamide. A similar but more rapid burning mixture may be used as the primer ignitor material.
Mechanically actuated firing means are provided for striking the ignitor or primer capsule and igniting the charge M. The firing means comprises a preloaded firing mechanism 80 preassembled within an outer firing mechanism body or housing 82threadedly attached as a unit to the lower externally threaded end of the power supply cartridge housing 72.
Within the upper portion of the outer casing 82 are firing pin means including a firing pin housing 84, and an abutting firing pin guide housing or retaining ring 86 with a central bore into which a firing pin guide 88 is inserted and retained byan internal expandable snap ring.
An upper or forward striker end of a firing pin 90 is slidably and sealably mounted in a central guide way or bore of the guide member 88 and adapted for striking the ignitor capsule I adjacent thereto. The firing pin 90 is normally resilientlybiased away from the igniter capsule I and against a stop or retainer ring by resilient means such as a light compression spring 92 extending around an intermediate portion of the firing pin 90 within a central bore of the housing 84. The spring 92extends axially between an internal shoulder of the housing 84 and an annular shoulder or flange at the opposite end of the firing pin 90 and only applies a light force sufficient to maintain the firing pins in the retracted position shown against thestop against the action of external pressure.
Adjacent to and abutting the lower end of the firing pin housing 84 is a firing pin hammer means including a hammer means or trigger housing 96 in a central bore of which a preloaded trigger or hammer 98 is slidably mounted. The hammer 98 isretained in a cocked position by engagement of a preloaded resilient compression spring 100 therewith and the opposing strength of one or more shear screws or pins 101 projecting through the sidwall of the housing 96 and into obstructing engagement witha side surface or recessed shoulder in the side of the hammer 98. A preloaded or precompressed compression spring 100 is situated within the internal bore of a generally cup shape trigger sleeve and or spring housing or cup 102 mounted within the hammerhousing or casing 96.
The spring 100 is compressed between and extends axially from the annular bottom or end of spring housing and or trigger sleeve 102 to a recessed annular shoulder or surface adjacent the opposite lower projecting pilot end of the hammer 98.
The bottom of the spring housing or trigger sleeve 102 is maintained in engagement with an internal annular mating beveled bottom of the hammer housing 96 by the spring 100 while its opposite upper end is adapted for engagement with the hammer 98adapted to strike and propel the firing pin into the primer igniter capsule I.
A mechanical trigger means is provided and attached to the lower end of the anchor device for applying sufficient axial force against the trigger sleeve and or spring housing 102 and hammer 98 to shear screw 101 and release the spring loadedhammer 98.
The trigger device comprises an end cap 106 threaded to the internally threaded lower end of the firing body or housing 82 of the firing mechanism 80. A trigger plunger or shaft 108, threadably attached to an enlarged trigger foot or head 110,is slideably mounted in and retained by engagement of a snap or retainer ring with an annular shoulder of the cap within a central multiple step bore of the end cap 106. The upper end of trigger shaft 108 is adapted for foreceful engagement with thebottom of trigger sleeve 102 and the foot 110 for engagement with the bottom of the bore hole or a plug P placed into the bore hole.
The actuation and operation of the anchor device can be more clearly understood by correlating the following description with FIG. 1, 1A and FIG. 2 of the drawings and comparing the fired, displaced and anchor position of the components of theactuated device shown in FIG. 2 with the initial preloaded, nonfired and nonanchor position shown in FIGS. 1 and 1A. Operation of the anchor device 10 will be described in combination with the placement of a well bore tool T which, by example only, is awhipstock W usually utilized for deviating the direction of the bore hole at some point.
The conventional whipstock is usually adapted as shown in FIG. 4 at its upper end for preattachment by a shear bolt to the lower pilot end of the drill bit D supportedly connected to a drill string DS and its lower end portion may obviously be,if necessary, modified and adapted to be precoupled to the upper end of the anchor device with a clevis pin P as shown or in any other suitable manner. Once the bottom of the bore hole or top of plug P placed therein has been established below thedesired beginning point of bore hole deviation, a drill string with the preattached bit, whipstock and anchor device are lowered into the bore hole casing and supported thereby slightly above or in light partly loaded frictional engagement with thebottom or top of the plug P.
Hence, the entire full load of weight of the assembly of the anchor device IV, whipstock bit and drill string is not lowered upon and supported by the bottom or plug P. The asmuith and orientation of the inclined surface of the whipstock W ischecked by known means and if necessary, rotated to face the proper direction.
Once oriented the drill string is relaxed whereby the entire weight of the assemblyis applied to and resisted by the plug P engaged by the trigger foot 110. Hence, the total downward force of the greater weight of the remainder of the assemblyrelative to an immovable solid column provided by the engaging hammer 98, trigger sleeve 102, trigger plunger 108 and trigger foot 110 all supported by the bottom or plug P causes the hammer housing 96 to move downwardly and shear pin 101.
Upon shearing of the pin 101 the energy stored in the preloaded spring 100 is released and propels the hammer 98 upwardly into engagement with the firing pin 90. The blow delivered by the hammer overcomes the slight resistance of the returnspring 92 and propels the firing pin and upper end thereof into the primer igniter capsule I in the power supply cartridge head H.
The mechanical primer or igniter capsule of powder burns creating a flame which ignites the adjoining slower burning pressure generating material or propellant M. Burning of the propellant generates gas or fluid pressure in lower end of chamber Cthat acts against piston 30 which pressurizes hydraulic fluid F.
Fluid pressure acting through passages 22 and between differential areas of inner mandrel W and internal piston of the outer mandrel and piston 44 shears the screw or scres 46 to release and move the upper and lower cones 34 and 40 relative toeach other and expand the slips 38 into permanent gripping engagement with the casing C.
The initial relative downward movement of outer mandrel 44 carries with it, the ratchet lock ring or pawl 62, attached upper cone 40, slip housing 50, and the slips 38 engaged thereby.
Slips 38 move downwardly on lower cone 34 and radially outwardly into firm gripping contact with the interior wall of casing C sufficient to cause sufficient build up of pressure to shear the shear screws 52 between the upper cone 40 and sliphousing 50. Release of the upper cone 40 results in further downward movement of the outer mandrel piston 44 and locking pawl 62 and hence radial outward movement of the slips 38.
Until dissipated the fluid pressure acts to move and maintain pressure on the cones 34 and 40 and expand the slips 38 and the locking pawl 62 locks the cones and slips in place against reverse loosening movement. The check valve RV is set to andwill exhaust excessive fluid pressure above that necessary to actuate the device and thereby prevent damage thereto.
Thus, the anchoring device and attached downhole tool T or whipstock W is permanently anchored in the desired preoriented direction against axial as well as rotational movement due to the cones contacting and keyed to the anchor slips. Thereafter, the casing drill D and drill string DS is detached from the whipstock in any well known manner such as by applying sufficient weight and force to shear the attaching shear bolt. The casing drill D is then lowered into guiding engagement withthe tapered surface of the whipstock to drill through the casing C and eventually change the direction of the bore hole in the known manner. Once a window has been established in the casing, bit D is replaced by any suitable drilling device or assemblyto drill the side tracked well bore.
The shear screws or pins are so designed to shear under loads and in the predetermined sequence described.
As many embodiments and modifications of the invention are possible it is to be understood that the invention includes all embodiments, modifications and equivalents thereof falling within the scope of the appended claims. | 2019-04-22T13:56:09Z | http://www.patentgenius.com/patent/4429741.html |
Well, the winter seemed so long. We couldn’t get any work going, which is Common Ground work helping others with home improvements, repairs etc. As I’ve said before we spent the fall and early winter taking care of Mom and going to doctors’ appointments and meeting with caregivers that were working with her. We could see that she was in her last days. It seemed totally consuming. She passed away in Dec. so we turned more of our attention to Dad’s needs. We moved him to a single room unit at Vintage Park and dealt with financial concerns, several hospital stays, and doing what we could to help him. Again this was a consuming chore. However, these are labors of love and so rewarding, but frustrating as they seem to take precedence over everything else. Dad is living now at the Baldwin Care Center and seems to be settled in pretty well since his move there the 1st of April.
At about that time to our surprise the phone began to ring and although we didn’t know but what Common Ground may be finished, it began to resurface. Folks began calling us to help them and now we’re almost overwhelmed with work.
If you remember after the 2013 Garnett Area Paint Project, we agreed to help finish up several projects. We did a couple and our priorities shifted to those with greater needs; like the wheelchair ramp and painting of a house in Kincaid. We tried to set it up for our church to do so I gathered the materials and did the preliminary work here at home. Then on the weekend that we were to work the forecast called for heavy rain so we called it off. We were able to work on Saturday with a couple of helpers from Worden and we put most of the ramp together. Then Norma and I went back and finished it. We plan to go back to finish painting the house with our youth group now that school is out.
My aunt in Oskaloosa is moving and has to get rid of a lot of things that have accumulated over forty years so we have been going there to help her clean out her basement and garage, and to mow her lawn which she can’t do anymore. It needs it every few weeks now.
We’ve made contact with R.C.I.L. (Resources for Independent Living) and made plans to build a couple of wheelchair ramps that are yet to rise up the priority ladder.
We met with the new Disaster Response team for Five Rivers District a few weeks ago and helped to set up an introductory job in La Harpe, Ks. The team went that next week and started tearing out plaster and lathe from a house that had been struck by lighting and caught fire. At this time we almost have it all gutted and the debris hauled away. It looks like we will follow up with this project to put this home back together. This will involve insulation, sheetrock hanging and finishing, trim work, installing windows, and kitchen cabinets etc.
We have two grandkids that just graduated from high school, one graduated from college, and several just finishing track meets and concerts. We’ve had too much rain. Norma has her garden in. And God is good! I think I better go sit down.
I went with Kim, our church youth leader, and showed her around Camp Chippewa west of Ottawa. She’s excited about getting more of our youth out there this summer and about all the opportunities there are at the camp.
Common ground has come back in full force and the future looks busy and bright. When it’s time to end our involvement in the Common Ground ministry God will let us know, but for now we feel blessed to continue and are so thankful for God’s guidance and strength. Call us at 785-331-8272 and come join us anytime for a chance to work for God at helping our neighbors. We’re back!
We wrote this newsletter in May and our computer went south, so we didn’t get it sent out, but as I reread it, it’s still relevant. The LaHarpe project did get handed over to us and we’re working with the electrician to do framing and whatever we need to do to frame up closets and walls for him to stay ahead of him. It’s July now and we’re taking a break for a few days over the 4th. When we get back to it we still need to paint in Kincaid and insulate and hang sheetrock in LaHarpe. I figured that it would cost about $12,000 dollars to put everything back together there, and we have about $3,000 dollars to work with at this writing. So the future is uncertain. Pray for us and call or e-mail us if you would like to help in some way.
We love you all and thank God that we’re still able to help folks to have adequate housing.
Common Ground didn’t die; we just got set on the side track where we had to deal with family, winter, and search for strength and direction.
I want to recap a few things that we talked about in the past letters of Aug. and Dec. of 2014. In August I talked about visiting with my Aunt Millie, also I talked about the Resource Center for Independent Living (R.C.I.L.), and about preparing our parsonage for our new pastor. We’ve been involved with all these different projects and or people during the last several months. Since August we’ve replaced most of the windows in the parsonage.
I last wrote on Dec. 5th telling of our work with Dad and Mom and their problems with disorientation. On Dec. 15th Mom passed away and we had a wonderful life celebration for her. Dad was struggling so that even though he was there he doesn’t remember any of it. He had a spell probably pneumonia, and had to be hospitalized only a couple of days after Mom’s funeral. As a matter of fact I was returning from the airport, taking my brothers family to fly back to Florida and my phone rang telling me I needed to go get Dad and take him to the emergency room. He returned to the rehab after a couple days in the hospital, the same place where Mom had been just across the hall. Then he had another spell and had to go back to the E. R. and spent a couple more days in the hospital. Then back to rehab having swallowing problems very much like Mom had. He has not been able to rehabilitate enough from that so we had to move him from there to the nursing home and move his furniture out of the assisted living facility that had been their home. It’s late March now and he’s not doing well, still doctors are changing medicines and working with him to try to help with the swallowing. He’s lost a lot of weight and weighs only 140 lbs. down 40 to 60 lbs. from what he weighted most of his adult life. He will be 92 yrs. Old in June. I do not have to help him so much now as the nursing home even takes care of transporting him to doctor visits and etc.
Needless to say, for the past several months we do not feel that we have been very effective in keeping up with our usual routine and projects because we have been so consumed with tending to my parents. I really began to think that we may have to discontinue Common Ground. We went into this time with about a dozen requests of folks needing help, but it seemed I couldn’t commit to anything that required me to be out of town. I felt that I was like the employee who doesn’t show up for work. We met with our dear friends who help support us and told them how we felt. They were gracious, understanding, and encouraged us by referring to the work that had been accomplished in the past and were sure we would continue as best we could. What a blessing those of you are who walk beside us in this ministry!
In the early stages of Common Ground God gave us a special scripture that is found in Psalms 37: 3, 4 that says, “Take delight in the Lord and He will give you the desires of your heart.” At that time, at least 10 years ago, that was the confidence we needed to step out, but now looking back I realize that our desires have changed. It’s no longer desire for things that occupy our minds: it’s now a desire for relationships with like believers that he provides. We learned that as we step out to help hurting folks that the relationship we’ve built with these folks and those who have supported us physically and financially are the desire of our hearts and also the greatest need of hurting folks. For you see, when the world caves in around you, relationships with folks who know God’s way is the way of healing and comfort. It is the most prevalent need. All the physical needs will come our way as recovery happens but, without seeing the love of God healing won’t happen. As we walk the path of needs that we can’t provide for ourselves God reveals to us what our ministry must be about.
Now March 24th, it’s a cold day, not real good to work outside. We’ve started on a wheelchair ramp to be assembled in Kincaid and we also need to finish painting the house there. It’s a project left over from the Garnett Area Paint Project of 2013. I just called the director of R.C.I.L. about two more ramps waiting in Vassar and Burlingame. As I’ve looked over the unfinished projects of the past two years there are about 20. I’ve made Contact with most of the folks and we’re preparing to begin in just a few days as the weather improves. We get tired easier than we did 10 years ago but God continues to give direction and rest. We spoke in a couple churches last month and some new folks are interested in joining us.
Ain’t our God something! I’m more keenly aware as the years pass how He paves the road ahead. He just asks us to walk the path He has laid out for us.
I’m excited about the future. I heard an amazing perspective on our world’s dilemma. This pastor said, “The darkness is getting darker, but at the same time the light is getting brighter,” This is the light of Christ living through His followers. If you can’t get excited about this light provided by the fire of the Holy Spirit then your woods wet!
P.S. IN an attempt to follow up on previous stories I will tell you that we got another call from Aunt Millie who lives north of Oaksloosa about 50 miles north of us. Since her son, and my cousin Larry, passed away she can no longer afford to stay in the country home and at 89 yrs. Of age can no longer keep up with the 50 acres and home to maintain, so Norma ,J.D., and I have worked 2 or 3 times at hauling away trash and disposing of belongings. We still have to make a couple more trips up there to help her. Please keep Aunt Millie and nephew Daniel in your prayers as they still have to sell their home and find a place to live.
God blessed us with a small dump truck a few years ago and it’s amazing how many times we’ve been able to help folks just hauling away junk. Norma and I enjoy the old truck and going to the dump. Must have been the way we grew up.
Merry Christmas brothers and sisters! It’s amazing enough that it’s already Dec. but that it is 2014 blows me away. If my grandmother were still alive she would be 114 years old. I last wrote to you in August. That would be shameful if it weren’t so much like me. Since August we built another ramp in Baldwin and are looking forward to several projects that either are new to us or need finished; but, Dad and Mom have needed most of our time this fall, what with the doctor’s appointments, taking care of finances, shopping, emergency room runs to Lawrence Memorial, and moving both of them to new rooms and/or facilities which brings me to the message I want to share with you.
What does it mean to be disoriented? What would it be like to not belong anywhere?
I had a dream that my wife and I were traveling and stopped at a place to stay the night, much like a campground only there were a lot of single beds just out in the open. We were very tired so we just picked out a couple, lay down and went to sleep. Sometime in the middle of the night I woke up needing to go to the bathroom. She was apparently not sleeping soundly and asked me where I was going. When I told her she said she needed to go too. I remembered seeing a bath house at one end and so we set out in what seemed the right direction. We walked a long way and came to the bathrooms, but when we came out of them we were both confused about which direction we needed to go. So we walked what seemed far enough, but, it being dark with only a small amount of light we couldn’t find our beds. As I said earlier there were a lot of them sort of like in a parking lot. We found a couple and went back to sleep. When we woke up in the morning we were totally disoriented! The place looked like a roadside camp where people had been displaced and someone had set up these beds. It was a scary feeling not knowing where you belonged.
I woke up from my dream and lay there for a moment wondering where I was. I thought about my parents both in their nineties. One is at an assisted living facility and the other one is at a nursing home and both are disoriented. I thought about how scary that must be. Mom was moved to a rehab center after a bout with pneumonia and what we now know was a stroke. She spent about three months there and couldn’t go back to the assisted living place with Dad because she had gone downhill in her recovery. So we moved her to the nursing home in a new room with a roommate. As a result of her moving out of a large room at the assisted living center and the cost of it and having to redirect her income toward the nursing home Dad also had to move to a smaller room. We hung Dad’s clothes in a new closet and in a different location and then he couldn’t find the pants he liked to wear. He thought someone must have lost them. I found them in his chest of drawers in his closet but he was so disoriented that he didn’t know where to look. Being in a different part of the building even the nursing staff was different and they couldn’t help much because they weren’t familiar with what he had been wearing.
As I was waking up or trying to go back to sleep I began to think about people displaced by tornadoes, earthquakes or poverty who at least temporarily do not have a place to call home. I just recently came back from a mission trip to Haiti where many folks lost most of their family, neighbors, and even their neighborhood to a large earthquake. It’s estimated 200,000 people were killed in a few hours. The quake only lasted thirty seconds, but some lived a short time under the rubble. Talk about disoriented!
Then I thought about how blessed I am. I have a place, a home. I can get up in the dark and usually find my glasses, my bathroom, and a drink of water. I have a garage full of tools. I can go to my toolbox and find ½” wrench or a hammer, my four children live within twenty miles, I have many friends who can be depended on to help me, my church family are wonderful folks who are supportive and even help pay my wages as I do local missions work. I could go on and on counting my blessings, but I know that so many people are disoriented due to failing health, loss of jobs, natural disasters, or other tragedies. These are the people I work for, trying to help put their lives back together. It is a daunting task and yet I feel like this dream has shown me the urgency of our work as Christians. Even Jesus said, “Foxes have holes, and birds of the air have nests; but the Son of man has no place to lay his head.” Luke 9:58 Wow! Are we called to live like that?
I feel like God blesses us with the things we need, but we should not be so wrapped up in our own lives that we don’t take time to reach out to folks who are disoriented, don’t have a place, and maybe don’t know that the kingdom of heaven is our place if we believe. So as we help people recover from their situations we also need to share about the kingdom, not only of heaven but also God’s kingdom here on earth; a place to belong even when we may have temporarily lost our way or our place to belong.
I am thankful for this dream that has helped me to gain a new perspective about the terrible feeling of being disoriented, not knowing where home is.
I pray that through Jesus example I can learn to care about others and continue to help them find a place to belong, a coat to wear, food to eat, and to maybe be a friend that can be depended on.
This has been my “Orientation”. My wish for all of you this Holiday season is that you find orientation in your life.
Well I did it again! I’ve let time fly by without communicating to you, the folks I most need to share our ministry with. I so appreciate those of you who help support us whether it is financially or by coming along side to physically help us help hurting folks.
This summer has probably been the busiest time we have ever hadsince we started Common Ground. It all actually took off in April or May when the weather broke and it was warm enough to work outside.
We started helping build a wheel chair ramp for a couple who live just south of Baldwin and who have worked alongside of us for many years. She had broken an ankle. We then moved on to Chetopa to build another one with help from Lonnie. Next we went to Camp Chippewa to build two Ga Ga pits (large enclosed areas where the kids play a game much like dodge ball.) During and after these jobs we made several investigation trips to see about other projects that we may get involved with.
On one of these trips we stopped north of Oskaloosa to visit with my Aunt Mille and Cousin Larry. He had been battling pancreatic cancer and he passed away the next day after our visit. We were so glad we took the time to go see them. Later we returned for his funeral and got to see other family members also.
I drove a bus for the Baldwin School District toward the end of the year when things got really busy for them.
I had planned to build Norma a garden shed before things got real busyso we started on that in April and, of course, seeing to Mom and Dad with ailing health issues is and ongoing mission of its own.
During May I transported Molly a few times to K.C. That’s a labor of love. She’s such a blessing. She’s the young woman from our church who had a stroke and has to occasionally go for rehab.
I met with a young man from Osage City who is with an organization called R.C.I.L. (Resource Center for Independent Living). They help folks with things like wheel chair ramps. We agreed to build one there in Lyndon for a man with definite need. With help from several guys from Worden and others we finished that one just recently. Thanks to all of you who helped us.
We helped set up a work day project at our church parsonage in reparation for our new pastor and family to move in. In the mean time we had had a call from the youth team out of K.C. who has worked with us several times before and they wanted a project for a mission’s trip during the early part of the summer. We had a small roof rebuild to do in Fort Scott. It seemed real workable in the planning stage, but they were with us a week and we did not get finished because it rained off and on nearly all week. We had our 5th wheel camper there and a real neat couple to host us and make a place for the team to stay at their lake home but who would guess there would be so much rain. We had fun anyway and Norma and I went back the following week to finish.
I’m still trying to look at my calendar to share what happened and I realized that I had forgotten that earlier during the cold months there was an elderly couple in our church that needed a ramp. Again there were several of our own church folks who came and worked. We are so blessed to have so many folks with skills and a missionary spirit at Worden. It was fun doing this project and reconnecting with these men and women. Several of them commented that they would like me to let them know when we would be working so they could come and help. Praise the Lord!
Our former pastor who has now moved on to western Kansas had to have a hip replacement before he left so I had the opportunity to preach in his place one Sunday. It was the same day of the White family reunion (Norma’s side) in Garnett at the lake so after church we headed south. We enjoyed visiting until it was time to go meet the Bristol Hills youth team in Fort Scott at a parking lot there.
Got a call from some folks in Baxter Springs wanting us to help with setting up a long term recovery team to respond after a tornado damaged fifty or more homes this spring. We did that and were able to meet some new leaders with The Great Plains UMC Conference and establish connections with them.
On a weekend in June Norma and I went to St. Louis for a reunion with some of the guys that I had served with in Vietnam. That was one wonderful experience!
We just yesterday made a connection with some folks in Effingham that we plan to build a ramp for. And I just got off the phone for arranging a roof repair project in Colony, Kansas next week.
Thanks for all you do. Pray for us at Common Ground and give us a call if you would like to be more involved in this exciting ministry of disciples of Jesus Christ. We love you all!
My intent is to write a newsletter at least every other month. It’s the middle of April and my last letter was written early in December. How am I doing?
We’ve had a regular old winter this year; some snow, lots of cold weather but its spring now and warming up more every day. I love Kansas, it keeps you guessing. Never leave home without boots and a heavy coat or a t-shirt and a light weight jacket.
As I looked back over my November letter it seems like history repeats itself. January 2014 was some planning time, contacts about new projects, etc.
This year my parents who are 91 and 90 years old have required much more of my time. Mom had a bad choking spell a couple of months ago and after a trip to the hospital had to move to a rehab center in Baldwin for a time. They think she may have Parkinson’s. She’s had so many tests ran and between her at one residence and Dad at another and both needing doctors help regularly I spend lots of time trying to keep up with it all. Some weeks we have had four or more days going to their appointments. Dad had to have two teeth pulled recently but did fine with all that. I’m so blessed to be able to spend this time helping them. They spent at least twenty years doing the same for me as I grew up.
We have successfully completed the changeover to Worden as our headquarters for Common Ground rather than the Kansas East Conference Office in Topeka. Megan, our treasurer at Worden has spent a lot of time helping me, and at the same time expecting her first child (which arrived early by the way). She just delivered a boy and both are reportedly doing well. Rhonda left our church for another church secretary job and Susan took her place. Susan has also helped and is very effective in supporting us along with all her other chores and office duties.
Norma is busy babysitting our great granddaughter, Lane and keeping the home fires burning, literally. We have gone through a lot of wood this winter, but so glad Lane’s Dad and Mom, Chris and Whitney, keep us supplied with aged hedge.
Norma spent a lot of time preparing for Mom’s 90th birthday party which was on Sunday March 23rd at Baldwin Care Center. I was filling the pulpit for Pastor Bud for both morning services at Worden and then led the church service at 2:30 that afternoon at the care center after which we brought in the cake and ice cream and had a big party for Mom at 3:30. Most of our kids were able to be there. It was a great day! I did need a nap after all the excitement though. Norma did a fine job of holding her recliner down too. We’re getting good at that.
We haven’t done a lot of actual work this winter, but have helped several people who needed propane or plumbing help or encouragement because of the extreme weather conditions. We have a small porch to build in Lawrence, another wheelchair ramp to build in Chetopa, a roof project to complete in Ft. Scott, and several repairs need to be done on a house in Michigan Valley. There are several small projects to finish in the Garnett area that is left over from the Group work camp of last year. We also need to meet right away with the pastors and helpers in Garnett to plan another work camp for 2015. There is also some talk of helping to plan a work camp in Holton in the next couple years.
Knowing that as we grow older we won’t be able to do the heavier carpenter work, we have hoped that we might be able to do some consulting and leading others to do some of it. Not knowing how to make this happen, we’ve just prayed about it. But we’ve had two calls already earlier this year and I made a trip to Burrton, Kansas which is out by Hutchison, to look at a church that needs some repair. I met with their Board of Trustees and just shared my thoughts of what they might do. Then I’ve had a contact from another community closer to home who wants to do a cleanup there and plan to place several dumpsters around town and then approach their neighbors about the church people reaching out to help those who may not be able to move heavy items alone. They wanted me to meet with them and give advice on how to approach people without offending them. I think if this comes about I do have some experience that would be helpful, so please pray for us and our ministry as we look to the future that doors will open and God will use us effectively in whatever ways He deems best.
Although we’ve enjoyed an extended break this winter from the construction projects the future looks busy. I had a call just a few weeks ago from a youth group in Kansas City who wants to help us on a project In June. Norma and I worked Saturday the 6th at Camp Chippewa down by Ottawa on a cleanup work day event that will prepare the grounds for summer youth camps. Instead of cleaning up an area we helped build “Ga Ga” pits. Look that one up on the internet. They say it’s a game that the kids just love to play. It looks like fun.
I so much appreciate all of you who are so faithful with your support, financially and prayerfully, and those who come along side to physically help. Once again I feel like among men I am most richly blessed.
God is good – all the time and all the time- God is good!
P.S. Norma and I plan to attend a reunion of the Army unit that I was in while in Vietnam with the 243rd, a Chinook helicopter unit. We’ll meet in St. Louis in June.
I shared awhile back about our 45th high school class reunion. It seems our lives are full of connections with people from all walks of life. Pray with us that in all these ventures we’ll be faithful witnesses to God’s love for us.
Once again, I am so late getting this newsletter out that you probably thought I’d quit. I am sorry! I’ll try to bring you up to date. In the center of this page, is out latest finished project. I’ve been talking about it in our previous letters. It’s in Scammon, KS. Two old trailer houses hooked together, they had a fly over roof attached to the trailer on the South end, but they weren’t very substantial and the 100 mile an hour winds tore them off. I guess they were fly over alright… right over the neighbors…ha! So we built this pole barn type of structure over the whole thing and as the home owner said on my last day down there, “Hey, it don’t leak now!
The next most exciting news is we’re counting the days until Norma retires and joins me, now less than 100 days. This has been a growing process for us, trying to get on the same page, realizing that if we both get on God’s page, we’ll be on the same page. Then we went to Kansas City a couple of weeks ago to the Christian book store to pick up a pastor’s appreciation gift and look for some new reading material and Norma found this book that was the current best seller entitled “Crazy Love” by Francis Chon. She bought it, brought it home and began reading and then started telling me how on target it was for her. So after she finished it, I began reading it and boy it hit me right in the target as well. I would challenge you to pick it up and read it. I don’t want to spoil it for you but feel like I should quote several parts of it. But a line caught me in the middle of the 5th chapter. He was quoting someone else when he said “our greatest fear as individuals and as a church shouldn’t be of failure but of succeeding in things of life that don’t really matter”.
I think that this resource along with everything else that is going on in our lives has set the stage for a new attitude toward our ministry. God is calling all of us who call ourselves Christians to be His light in the world, to reach out in love, unconditional love to every person that we meet. One test that this pastor gives us is to read 1Corinthians 13:4-8, 13 and everywhere you find the word love, replace it with your name and see if when you’ve finished it that it doesn’t point out some lack of obedience on your part. When I did this exercise, I said the people who knew me would say “that’s not the Roger I know”. I think Norma and I are seeing that God expects much more from us than we have been giving and then He promises to bless us when we give talents time and all.
We’re going to take a 3 or 4 day vacation over halloween and then start on a couple of roof jobs in Weir and Columbus, Kansas. I pray this letter finds you well and maybe it will challenge you and your family or church to answer the call to serve.
Give a call 785-331-8272 and I’ll put you to work, helping hurting people.
Pray for us that we start spending out time on things that matter.
You will be able to follow Common Ground to each worksite and keep track of what’s going on. | 2019-04-21T14:20:53Z | http://wordenumc.com/newsletters |
Decisions > Federal Court Decisions > Georgetown Rail Equipment Company v. Rail Radar Inc.
Georgetown Rail Equipment Company v. Rail Radar Inc.
RAIL RADAR INC. AND TETRA TECH EBA INC.
Rail: train wheels run on two rails made of steel. Sections of rail vary in length. The ends of the sections generally abut one another. Due to expansion and contraction during different seasons, the gap between the rails may contract and expand. This gap gives rise to the characteristic “clickety-clack” sound of trains.
Rail base: the rail base is the base of the rail.
Rail head: the rail head is the top of the rail.
Crosstie: rails are supported by cross pieces known as crossties (or ties or sleepers) that are generally perpendicular to the rails. These cross pieces are typically made of wood or concrete.
Tie plate: the tie plate is a rectangular piece of steel on which the rail base sits. It rests on and is attached to the crosstie. The tie plate distributes the forces from the rail base to the area of the crosstie below the tie plate.
Rail pad: when concrete crossties are used, the rail base rests on a rail pad, which rests on the top surface of the concrete crosstie. The rail pad provides a layer of protection between the rail base and the concrete crosstie surface. It is usually made of a polymer.
Rail seat: in the context of concrete crossties, the rail seat is the area of the crosstie beneath the rail base.
Fasteners: the tie plate is normally secured to the crosstie with fasteners, which can be spikes, or various screws, clips and clamps.
Ballast: the crossties usually sit upon a bed of stones of a specific shape and size, called the ballast. The ballast supports the ties, plates/pads, rails and fasteners. It facilitates rainwater drainage, and provides a buffer against the encroachment of vegetation into the track area.
Sunken tie plate: a tie plate is sunken when it has worn down the crosstie beneath it so that its lower surface is below the adjacent top surface of the crosstie. This is also referred to as plate cut.
Misaligned tie plate: a misaligned tie plate usually occurs when a spike is loose or missing, thereby allowing the tie plate to rotate out of alignment with the rail.
Rail seat abrasion: in the context of concrete crossties, rail seat abrasion occurs when rail vibration caused by trains wears down the rail pad and, once the rail pad is worn away, the top of the crosstie.
Canadian Patent 2,572,082 [082 Patent], titled “System and Method for Inspecting Railroad Track” , was issued to the Plaintiff and Defendant by Counterclaim, Georgetown Rail Equipment Company [Georgetown], on January 25, 2011. The patent application was open to public inspection as of January 12, 2006. The 082 Patent relates generally to a system and method for inspecting railroad track. It uses lasers, cameras and a processor to capture and analyze images of the railroad track in order to determine the distance between crossties, and detect misaligned or sunken tie plates.
Canadian Patent 2,766,249 [249 Patent], titled “Tilt Correction System and Method for Rail Seat Abrasion” , was issued to Georgetown on November 5, 2013. The patent application was open to public inspection as of December 29, 2010. The 249 Patent relates generally to a system and method for determining rail seat abrasion of a railroad track. It uses lasers, cameras and a processor to determine whether rail seat abrasion is present along the track.
According to Georgetown, this case relates to systems and methods for determining the degree of wear of a wooden tie under a tie plate (the 082 Patent) and the degree of wear of a pad or a concrete crosstie under a rail (the 249 Patent). Both phenomena are hidden from view from above, because they occur underneath components that are visible from above. Both patents claim to solve this problem by comparing the height of the tie with the height of another track component: the tie plate and rail base, respectively. The 249 Patent also includes an algorithm for increasing the accuracy of the rail seat abrasion measurement by accounting for tilt.
The Defendant and Plaintiff by Counterclaim, Tetra Tech EBA Inc [Tetra], has developed a system for inspecting railroad track which it calls the Three Dimensional Track Assessment System [3DTAS]. The 3DTAS is mounted on a rail car that moves along a railroad track. The system positions two lasers adjacent to the railroad track. It uses algorithms to analyze the features of a railroad track bed, including crossties, rails, rail bases, fasteners, ballast and spikes. These features are displayed on a three dimensional [3D] elevation map. Geographical location data may be identified using a Global Positioning System [GPS] receiver or an encoder. Tetra entered into an agreement to provide the 3DTAS and processing services to Canadian National Railway [CN], but ceased providing any services once this litigation was commenced.
Tetra says that the 3DTAS infringes neither the 082 Patent nor the 249 Patent. Tetra has also challenged the validity of both Patents on the ground of obviousness.
For the reasons that follow, I find that the 082 and 249 Patents are not invalid on the ground of obviousness. The identification of the particular problems, and the use of machine vision and specified calculations as possible solutions, required invention and were not obvious as of the relevant dates.
The essential elements of the relevant 082 and 249 Patent claims are also present in the 3DTAS. Tetra’s sale of the 3DTAS to CN and its support of the system therefore infringed both Patents.
Georgetown is a corporation organized and existing under the laws of the State of Texas, United States of America [US]. Georgetown provides track inspection services to numerous clients across North America, including most of the major railway companies.
The Defendant Rail Radar Inc [Rail Radar] is a corporation organized and existing under the laws of the Province of Alberta. Rail Radar has not participated in this proceeding in any way, and its current status is unknown. Georgetown is not seeking relief against Rail Radar.
Tetra is a corporation organized and existing under the laws of the Province of Alberta. Tetra provides services in various areas of transportation engineering, including infrastructure management and data collection for owners and operators of transportation infrastructure.
Georgetown’s initial Statement of Claim was filed on May 29, 2015. Georgetown alleged infringement of approximately 55 claims of the 082 Patent and three claims of the 249 Patent, and sought an injunction, and damages or an accounting of profits.
On July 15, 2015, Tetra filed its initial Statement of Defence denying liability. Georgetown filed its initial Reply on July 27, 2015.
On May 26, 2016, Tetra filed its Amended Defence and Counterclaim, alleging that the 082 Patent and the 249 Patent are invalid due to obviousness.
This proceeding was bifurcated by order of Prothonotary Kevin Aalto dated May 30, 2016. These reasons for judgment concern only the Liability Phase of the proceeding.
On June 16, 2016, Georgetown filed its Amended Reply and Defence to Counterclaim, maintaining that the 082 Patent and the 249 Patent are valid and enforceable.
On June 20, 2017, Georgetown filed a Fresh as Amended Statement of Claim, in which Georgetown no longer alleged infringement of the 082 Patent claims that relate to detecting the distance between crossties, or the breaks in a rail.
Tetra filed its Re-Amended Statement of Defence on July 20, 2017.
Georgetown filed its Further Amended Reply and Defence to Counterclaim on August 18, 2017.
The present invention relates generally to a system and method for inspecting railroad track and, more particularly to a system and method for inspecting aspects of a railroad track using a laser, camera, and a processor.
The “Background of the Invention” states that the majority of crossties in service are made of wood. Various other materials may be used, such as concrete, steel and composite or recycled materials, but these alternatives make up a relatively small percentage of all crossties. Over time, environmental factors may cause crossties to deteriorate until they must be replaced. Several million crossties are replaced in North America each year.
The 082 Patent notes that railroad inspectors attempt to grade the condition of crossties and fastener systems on a regular basis. This grading is most often done with a visual inspection to identify crossties and fasteners that are rotten, broken, split or worn to an extent that their serviceable life is at its end. The process of visual inspection is time-consuming. In practice, inspection of the track is performed by an inspector walking along the track to inspect and record the conditions of the crossties and/or fasteners, which are spaced approximately every 20 inches along the track. According to one North American railway company, a crew of three or four inspectors can grade only between five and seven miles of track each day. The invention disclosed in the 082 Patent is intended to overcome, or at least reduce, this logistical challenge.
The disclosed system includes lasers, cameras, and a processor. The lasers are positioned adjacent to the track. The laser emits a beam of light across the railroad track, and the camera captures images of the railroad track having the beam of light emitted thereon. The processor formats the images so that they can be analyzed to determine various measurable aspects of the railroad track. The disclosed system can include a GPS receiver or a distance device for determining location data. The measurable aspects that can be determined by the disclosed system include but are not limited to: the spacing between crossties, the angle of ties with respect to rail, cracks and defects in surface of ties, missing tie plates, misaligned tie plates, sunken tie plates, missing fasteners, damaged fasteners, misaligned fasteners, worn or damaged insulators, rail wear, gage or rail, ballast height relative to ties, size of ballast stones, and a break or separation in the rail. The system includes one or more algorithms for determining these measurable aspects of the railroad track.
The 082 Patent then provides an explanation of different aspects of the invention, followed by a detailed description of specific embodiments and accompanying drawings. The claims of the 082 Patent, which number 80 in total, follow.
The present invention relates generally to systems and methods for inspecting railroad surfaces and, more particularly to systems and methods for determining rail seat abrasion via the utilization of tilt correction algorithms.
The “Background of the Invention” is initially similar to that provided in the 082 Patent. However, it goes on to explain that the construction of railroad tracks differs slightly depending on the type of tie material used. If wood ties are used, tie plates are placed on top of the ties, and rails are placed on top of the tie plates. If concrete ties are used, rails are placed on top of the ties with a thin polymer pad in between, preventing direct contact between the steel and the concrete.
The 249 Patent states that normal railroad traffic causes friction between ties and rails, as well as rails and spikes, bolts, screws, or clips, and the surface under the ties. Of particular concern is friction at the point where the rail seat rests against the tie. Wear at this point, also known as rail seat abrasion, directly affects the life of the tie by causing it to loosen from the rail, despite the pads used between rails and concrete ties.
According to the 249 Patent, railway companies monitor the wear of concrete ties either by direct manual measurement or through the use of electronic devices installed below individual railroad ties. However, this may be unreliable, hazardous, labour-intensive, complicated and disruptive to train traffic. The invention disclosed in the 249 Patent is intended to overcome, or at least reduce, these problems.
The “Summary of the Disclosure” of the 249 Patent describes a system and method for determining rail seat abrasion that uses lasers, cameras and processors in a manner similar to the system disclosed in the 082 Patent. However, the system is adapted to determine whether rail seat abrasion is present along the track. The processor employs a mathematics-based algorithm which compensates for tilt encountered as the inspection system moves along the track.
The 249 Patent then provides a detailed description of specific embodiments and accompanying drawings. The claims of the 249 Patent, which number 18 in total, follow.
(e) determining whether the tie plate is misaligned or sunken based upon the comparison.
Claims 67, 68, 70, 71 and 73 are also in issue, but only insofar as they depend from the claims described above.
(d) determining a rail seat abrasion value for the right and left rail bases.
determining whether rail seat abrasion is present along the rail road track.
Claim 11 is also in issue, but only insofar as it depends from claim 7.
There are two issues raised in the Liability Phase of this proceeding: whether the 082 and 249 Patents are valid; and, if so, whether the 3DTAS infringes the asserted claims of those Patents.
Tetra alleges that the 082 and 249 Patents are invalid because the subject matter of the claims would have been obvious on the priority dates to a person skilled in the art, based on the common general knowledge existing one year before the priority dates. The parties agree that the priority dates, which are the same as the US provisional patent application filing dates, are June 30, 2004 for the 082 Patent, and June 23, 2009 for the 249 Patent. Georgetown maintains that the 082 and 249 Patents are both valid.
Georgetown alleges that Tetra has infringed claims 16, 67, 37, 68, 70, 58, 71 and 73 of the 082 Patent, and claims 7, 11, and 18 of the 249 Patent. Tetra denies that the 3DTAS infringes the asserted claims of the Patents.
Georgetown submitted the expert evidence of Dr. Harley Myler. Dr. Myler is a professor and Chair of the Electrical Engineering Department at Lamar University in Beaumont, Texas. He was qualified as an electrical engineer and expert in digital signal processing, in particular image processing, with a working knowledge of railways and track inspection techniques.
Georgetown also called Gregory Thomas Grissom as a fact witness. Mr. Grissom has been the Chief Operating Officer of Georgetown for the past two years.
Tetra submitted the expert evidence of Sébastien Parent. Mr. Parent is a physics engineer with over twenty years’ experience. He was qualified as a physics engineer and expert in machine vision integration, with first-hand experience in the field of image acquisition techniques and automated machine vision systems.
Tetra also called Dr. Darel Edward Mesher as a fact witness. Dr. Mesher is an engineer and has been an employee of Tetra since approximately 1992. He was a driving force behind the development of the 3DTAS.
Georgetown asks this Court to disregard or discount the evidence of Dr. Mesher on the ground that he is not impartial (citing Justice Frank Collier’s decision in Xerox of Canada Ltd v IBM Canada Ltd (1977), 33 CPR (2d) 24 at 38-40 (FCTD)). Tetra asks this Court to disregard or discount the evidence of Dr. Myler on similar grounds.
I agree that both of these witnesses sometimes exhibited a tendency to provide answers, particularly in cross-examination, that were intended to bolster the position of the party that called them to testify, or undermine the position of the opposing party. This observation reflects more negatively on Dr. Myler than it does on Dr. Mesher. Dr. Myler was called as an expert witness, and therefore owed the Court a professional duty of impartiality. Dr. Mesher was called as a fact witness, and frankly acknowledged his interest in the success of the 3DTAS.
Despite these reservations, I am not prepared to wholly reject or discount the evidence of either Dr. Mesher or Dr. Myler. Like other witnesses who were called to testify in this phase of the proceeding, they presented impressive qualifications and provided useful information. My reasons for preferring some witnesses’ evidence over that of others are explained in the analysis that follows.
The first step in a patent suit is to construe the claims in order to give them meaning and determine their scope (Whirlpool Corp v Camco Inc, 2000 SCC 67 at para 43 [Whirlpool]). The relevant dates for construing the claims are the dates of publication of the patent applications: January 12, 2006 for the 082 Patent; and December 29, 2010 for the 249 Patent (Whirlpool at paras 54-55). The Court must examine the description contained in the patent to identify its “essential elements” , and may be aided by expert evidence regarding the meaning of specific terms (Whirlpool at paras 43, 45, 57).
(c) the whole of the specification should be considered to ascertain the nature of the invention, and the construction of claims must be neither benevolent nor harsh, but should instead be reasonable and fair to both the patentee and the public.
In order to construe the claims in issue, the Court must define the Person of Ordinary Skill in the Art [POSITA]. This is “the person to whom the patent is said to be addressed, through whose eyes the Court is to read the patent, and who stands as the criterion for determination of obviousness” (Amgen Canada Inc v Apotex Inc, 2015 FC 1261 at para 42).
Georgetown describes the POSITA for the 082 and 249 Patents as an electrical or computer engineer who has at least three years of experience working with image processing systems, or a Master’s degree, and with a working knowledge of railways and track inspection techniques.
Tetra maintains that the POSITA for the 082 Patent is a person with a degree in engineering or physics with five to seven years of experience in the field of machine vision. For the 249 Patent, Tetra says that the POSITA is again a person with a degree in engineering or physics, but with less practical experience given the more restricted application of the 249 Patent, and because more became known about machine vision between the publication dates of the 082 and 249 Patents.
The critical difference between the parties’ positions is the degree to which the POSITA must possess a working knowledge of railways and track inspection techniques.
I prefer the articulation of the POSITA advanced on behalf of Tetra. Every claim of the 082 and 249 Patents is premised on the use of machine vision. It follows that the POSITA must understand the use of machine vision to inspect surfaces. The Patent refers to “tool boxes” and “known software packages” , both of which potentially encompass machine vision and image processing beyond the context of railways. Indeed, the 082 Patent acknowledges that the techniques may be applied in other contexts. A knowledge of railways is therefore ancillary to a knowledge of the manner in which machine vision techniques may be applied in different contexts.
The patent must be construed taking into account the “common general knowledge” shared by persons skilled in the art (Free World Trust at para 44; Whirlpool at para 53). This is the knowledge possessed by the POSITA at the relevant time, and includes what the POSITA would reasonably be expected to know (Sanofi-Synthelabo Canada Inc v Apotex Inc, 2008 SCC 61 at para 70 [Sanofi-Synthelabo]; Whirlpool at para 74). The common general knowledge of the POSITA must be established on a balance of probabilities and cannot be assumed (Uponor AB v Heatlink Group Inc, 2016 FC 320 at para 47.
it is difficult to appreciate how the use of something which has in fact never been used in a particular art can ever be held to be common general knowledge in the art.
Georgetown objects to the Court’s consideration of Appendix SP-09 to Mr. Parent’s expert report (Daniel L Magnus, “Non-contact technology for track speed rail measurement: ORIAN” (Paper delivered at the Nondestructive Evaluation of Aging Railroads, 30 June 1995), 2458 SPIE 45 [Appendix SP-09]) as prior art in the obviousness analysis for the 082 and 249 Patents, and consideration of the 082 Patent as prior art in the obviousness analysis for the 249 Patent. Georgetown asserts that these documents were not specifically pled in Tetra’s Counterclaim.
In response, Tetra argues that these documents were included in Mr. Parent’s expert report and were responded to by Georgetown. They therefore form a part of the record, and the Court has a wide discretion to evaluate evidence on the record. Alternatively, in the course of closing submissions, counsel for Tetra offered to amend the pleading.
When a party pleads invalidity, as Tetra has done in its Statement of Defence and Counterclaim, especially where the invention is complex, it is generally accepted that the party must identify in its pleading the prior art that supports the allegation of obviousness (Throttle Control Tech Inc v Precision Drilling Corp, 2010 FC 1085 at para 13). It is possible to remedy a defect in a pleading by amendment, and it may be an error for a judge to refuse a reasonable request to amend (Janssen Inc v Abbvie Corp, 2014 FCA 242 [Janssen]).
In this case, the prior art relied on by Tetra was disclosed in the expert report of Mr. Parent, which was delivered to Georgetown approximately four months before the commencement of trial. Georgetown was aware of all of the prior art on which Tetra intended to rely, including that which was not pleaded, and chose to respond through the expert report of Dr. Myler. Georgetown has not demonstrated any prejudice resulting from Tetra’s failure to include these documents in its Counterclaim. Furthermore, as will be seen below, the contested prior art is not central to the Court’s obviousness analysis.
I therefore exercise my discretion to permit Tetra to rely on all of the prior art cited in the expert report of Mr. Parent.
According to Mr. Parent, a great deal became known about the field of machine vision in the 1990s. This included the use of optical 3D sensors and 3D laser triangulation. A common technique was to use machine vision to determine the appearance of an object under normal circumstances, and then detect and measure any anomalies or other features of interest. The visual characteristics of an object or scene were understood to be critical to the design of an image acquisition system. Those characteristics included, but were not limited to, colour, type of reflectivity (diffuse or specular), size of the scene, smallest detail of interest and speed of motion. This methodology had been well established since the early 1990s (see, for example, Kevin Harding, “The Art of Lighting Science” Vision Online (28 April 2000) [Appendix SP-06]).
Mr. Parent explained that, at the relevant times, many techniques existed to acquire two dimensional [2D] or 3D information from an object or scene. He observed that a 3D triangulation technique was a good and natural choice for the tasks described in the 082 and 249 Patents. The 082 Patent refers to the use of specialized 3D triangulation cameras. Mr. Parent described this as a well-known technique for 3D measurement at the time the applications for both Patents were filed.
One of the prior publications cited by Mr. Parent, Liviu Bursanescu & François Blais, “Automated Pavement Distress Data Collection and Analysis: a 3-D Approach” (1997) 41574 NRC 311 [Appendix SP-07], describes a system which uses triangulation with infrared lasers and cameras; uses a beam of laser light with an angular expanse; is mounted on a vehicle; adapts the acquisition configuration (geometry) and number of devices to the need (i.e., pavement inspection); includes an optical encoder and a GPS for geographic coordinates; includes an inclinometer for road gradient and crossfall (i.e., road camber); corrects the profile for roll and pitch of the vehicle; includes a real-time processor for feature detection; includes a storing device; includes a post-processing device extracting and classifying features; and is used to inspect road surfaces and to identify defects.
Mr. Parent acknowledged that Appendix SP-07 does not relate to railways. However, he maintained that machine vision techniques need not be linked to a particular field of application. Indeed, paragraph 0024 of the 082 Patent refers to the possible application of the disclosed invention to road, electrical line, piping or other network inspection.
Mr. Parent also cited Denis Gingras, “Optics and Photonics Used in Road Transportation” (Paper delivered at the Opto-Contact: Workshop on Technology Transfers, Start-Up Opportunities and Strategic Alliances, 24 September 1998), 3414 SPIE 264 [Appendix SP-08]. The article describes a road inspection system that uses a laser-based triangulation system mounted on a vehicle, with an odometer and GPS for localization of the scans. Mr. Parent noted that the processing includes calibration correction due to the tilt and roll of the vehicle, which he compared to the technique employed by the 249 Patent.
Mr. Parent identified a number of articles and patents directed to the context of railways, including Appendix SP-09, which concerns an optical rail profile measurement technology. The system analyzes rail wear, is mounted underneath a track inspection vehicle, uses a combination of charged coupled device cameras and laser diodes to acquire video images, employs a structured light source, performs analysis of the left and right rail profile, analyzes the images using a computer, translates each rail image into real-world X-Y coordinates, and uses an encoder to synchronize each rail measurement with a known location.
(b) “Device for Identifying Track Structures” , Japanese Patent No H06-322707 (13 May 1993) [Appendix SP-11], which describes a device that identifies rail track structures, including rail ties (sleepers) and ballast. The device is mounted on a rail car and uses a slit light source to illuminate the track, and a camera to capture the portion of the track illuminated by the light source. The resulting image is stored and processed in order to identify the position of the sleeper, ballast and/or rail joint.
(d) G van der Merwe, “IM2000 Infrastructure Measuring Car: the application of recording results” (2001) 30-4 Rail Engineering International 14 [Appendix SP-13], which describes a system mounted on a rail car that is capable of measuring, processing, and storing data concerning the condition of track geometry, catenary and rails. The system is capable of taking measurements at speeds of up to 120 km/h. A laser creates a plane of light surrounding the rail. Using a high-resolution camera, the image of the full rail profile is acquired, and is then converted and analyzed by a computer to calculate the extent of rail wear.
Georgetown concedes that the POSITA would be familiar with machine vision lighting techniques and general techniques used to scan surfaces using cameras and a light source, as described in Appendices SP-07 and SP-08. However, Georgetown disagrees that the POSITA would be familiar with the specific applications of this technology, particularly regarding the inspection of pavement, roads and railway tracks, as described in Appendices SP-09 to SP-13.
In the portion of his expert report titled “Background and common general knowledge of the skilled person” , Dr. Myler listed only the physical characteristics of the railroad track and track bed that are of interest to rail transport entities, and the commercial and governmental organizations that maintain and use them.
I have no hesitation in adopting the approach advocated by Tetra. I see no reason to limit the assessment of the common general knowledge of the POSITA to prior art existing within the limited context of railways. The primary focus of both the 082 Patent and the 249 Patent is the use of machine vision to address well-known challenges associated with the inspection of railway tracks. The POSITA would therefore look to the application of machine vision to the inspection of railways, as well as other comparable surfaces such as roads and pavement.
Tetra must establish that the prior art on which it relies was publicly available through a reasonably diligent search as of the relevant date (E Mishan & Sons Inc v Supertek Canada Inc, 2015 FCA 163 at para 20, citing Apotex Inc v Sanofi-Aventis, 2011 FC 1486). Georgetown disputes that the prior art cited by Mr. Parent could have been located through a reasonably diligent search.
I am persuaded that the prior art on which Tetra relies would have been located through a reasonably diligent search by the POSITA. Appendices SP-08 and SP-09 were published by SPIE, an organization that is well-known in the field of machine vision, and which has previously published Dr. Myler’s own work. Appendix SP-09 elaborates on Appendix SP-13. Appendix SP-10 was published by the Robotics Institute of Carnegie Mellon University, which Dr. Myler described as a “wellspring” of information. The technology described in Appendix SP-11 does not differ markedly from that found in the other prior art cited by Tetra.
Individual patent specifications and their contents do not normally form part of the relevant common general knowledge. Here, we are dealing with a specific application of a known technology to a specific industry, i.e., railways. Nevertheless, I have some doubt whether the patent specifications cited by Mr. Parent were sufficiently well-known to form a part of the common general knowledge at the relevant times. I note, however, that Tetra relies less on the particulars of the patents cited by Mr. Parent, and more on the general principle that machine vision techniques may be applied to the inspection of railways. This potential application of machine vision would clearly form a part of the common general knowledge.
(c) a machine vision system with these attributes could be used to inspect railway tracks and their components in order to identify defects.
Patent construction is a matter of law for the judge. Expert evidence is necessary only where the meaning of a term is not apparent based on a reading of the patent specification (Johnson & Johnson Inc v Boston Scientific Ltd, 2008 FC 552 at para 92). I have found expert evidence to be helpful in construing the following disputed terms.
Georgetown says that the term “frame” is “derived from a picture frame and is typically rectangular. A frame is a single image or a part of a single image. In image processing, a frame is a collection or data structure of pixels” .
Tetra maintains that the term “frame” as used in the 082 and 249 Patents refers specifically to a 2D image.
While the distinction between a 2D image and a 3D image is central to the dispute between the parties regarding infringement, they appear to have a common understanding of the meaning of “frame”. A frame is a single image or a part of a single image. Viewed in isolation, a frame is a collection or data structure of pixels that may be displayed as a 2D image.
Georgetown states that “analyzing a frame of the plurality of images” encompasses any examination or evaluation of the frame. According to Georgetown, this is a form of image analysis, a sub-discipline of signal processing, which involves the extraction of meaningful information from images. In this context, analyzing “a” frame includes analyzing “many” frames.
Tetra says that “analyzing a frame of the plurality of images” constitutes a frame-by-frame analysis of 2D images.
At this stage of the analysis, I do not see a significant difference in the positions taken by the parties. I am satisfied that “analyzing a frame of the plurality of images” entails examining or evaluating one or many “frames”.
Georgetown defines a “region of interest” [ROI] as a bounded set of pixels that define an area being processed. An ROI could be an entire image frame or any bounded set of pixels therein. Usually, ROIs are used to restrict the focus from a large area to a smaller area, in order to reduce processing effort and improve efficiency or speed. In other words, the processing is restricted to a certain area, because that area likely contains the information being sought.
Tetra similarly defines an ROI as an area to which a view is restricted, in order to find something of interest and improve processing. However, Tetra stipulates that there is no processing done to find that region.
To the extent that there is any material difference in the positions taken by the parties, I prefer the approach advocated by Georgetown. An ROI is a bounded set of pixels that defines an area to be processed. Some degree of processing may be required to identify the region in question.
Georgetown defines “contour” as an outline, an edge, a line or a surface that represents the profile of an object.
Tetra agrees with this definition, but stipulates that contour, as the term is used in the 082 and 249 Patents, can only be determined on a 2D image.
Georgetown says that Items 10 and 14 in Figures 7A and 7B in the 082 Patent are examples of crosstie contours and tie plate contours, respectively. They represent the contour of the tie and the edge of the tie plate viewed in cross-section. In my view, this is a fair articulation of the manner in which “contour” is used in the 082 and 249 Patents.
According to Georgetown, when the rails are level, TC equals 0. TC is therefore not a necessary component of determining the “actual delta”.
Tetra argues that the invention disclosed by the 249 Patent is fundamentally concerned with TC, and the algorithm for determining the actual delta necessarily requires a consideration of TC.
According to the “Summary of Invention” contained in the 249 Patent, the invention comprises “an inspection system comprising lasers, cameras, and processors adapted to determine whether rail seat abrasion is present along the track. The processor employs a mathematics based algorithm which compensates for tilt encountered as the inspection system moves along the track” . I agree with Georgetown that a plain reading of the 249 Patent does not contemplate that compensation for tilt will always be necessary as the system moves along the track. Instead, the system compensates for tilt only when this phenomenon is “encountered” .
It follows that the algorithm for determining the actual delta does not necessarily require a consideration of TC in all circumstances where the system is used. I therefore prefer the construction of “actual delta” advocated by Georgetown.
Subsection 43(2) of the Patent Act states that a patent is presumed to be valid in the absence of evidence to the contrary. A party alleging invalidity bears the burden of establishing this on a balance of probabilities. The burden therefore falls upon Tetra.
Pursuant to s 28.3 of the Patent Act, a patent cannot be issued for an invention that was obvious on the priority date to a person skilled in the art or science to which the patent pertains. The parties agree that obviousness is to be assessed as of June 30, 2004 for the 082 Patent, and June 23, 2009 for the 249 Patent.
Obviousness is generally considered to be a factual determination, or a question of mixed fact and law (Wenzel Downhole Tools Ltd v National-Oilwell Canada Ltd, 2012 FCA 333 at para 44 [Wenzel]). It must be assessed on a claim-by-claim basis (Zero Spill Systems (Int’l) Inc v Heide, 2015 FCA 115 at para 85).
(d) viewed without any knowledge of the alleged invention as claimed, do those differences constitute steps which would have been obvious to the person skilled in the art or do they require any degree of invention?
(a) is it more or less self-evident that what is being tried ought to work? Are there a finite number of identified predictable solutions known to persons skilled in the art?
(b) what is the extent, nature and amount of effort required to achieve the invention? Are routine trials carried out or is the experimentation prolonged and arduous, such that the trials would not be considered routine?
(c) is there a motive provided in the prior art to find the solution the patent addresses?
While the “obvious to try” test may be invoked in a mechanical field, its consideration is not always required (Wenzel at para 95). The analysis tends to arise in areas of endeavour where advances are made through experimentation, and where numerous interrelated variables may affect the desired result, e.g., the development of pharmaceuticals (Sanofi-Synthelabo at para 68).
Tetra did not place significant emphasis on the “obvious to try” test. In closing submissions, counsel for Tetra conceded that the analysis may not be necessary in this case. I agree. The evidence does not establish that machine vision and railway inspection are areas of endeavour where advances are typically made through experimentation, and where numerous interrelated variables may affect the desired result.
Georgetown was incorporated in 1993. Its sole line of business is the provision of technology, products and services to railroads. Georgetown commenced research into track inspection technologies in 2003, and created a new business unit for this purpose. The initial concept was laser-profiling technology mounted on a vehicle. The product was almost immediately commercialized. Georgetown’s goal was to convert the rail industry to automated tie inspection. At the time, railroads were typically inspected by individuals who walked along the track. Walking inspections were so ingrained in the industry that Georgetown’s idea of automating inspection encountered significant resistance, which continued as late as 2011.
The 082 Patent application entered the Canadian National Phase on December 28, 2006, based on Patent Application No. PCT/US2005/023132, which had been filed on June 30, 2005, and claimed priority from US provisional patent application No. 60/584,769 filed on June 30, 2004. The 082 Patent application was opened to public inspection on January 12, 2006. According to Georgetown, the problem of rail seat abrasion first came to light around 2006, after several derailments in the Pacific Northwest. This resulted in the development of the technology described in the 249 Patent. The 249 Patent application entered the Canadian National Phase on December 21, 2011, based on Patent Application No. PCT/US2010/025004, which had been filed on February 23, 2010, and claimed priority from US provisional patent application No. 12/489,570 filed on June 23, 2009. The 249 Patent application was opened to public inspection on December 29, 2010.
Today, Georgetown has a fleet of 15 cars equipped with its patented technology. Georgetown offers track inspection services across North America for various national, regional, short-line and commuter railroads. It has no competitors in the US. Tetra is its only competitor in Canada.
The POSITA and the common general knowledge are discussed under the heading Claims Construction, above.
The Federal Court of Appeal has recently observed that there may be cases in which the inventive concept may be grasped without difficulty; however, because “inventive concept” is undefined, the search for it has brought considerable confusion into the law of obviousness. That uncertainty may be reduced by avoiding the inventive concept altogether, and pursuing the alternative course of construing the claim. This avoids distraction or engaging in an unnecessary “satellite debate” (Ciba Specialty Chemicals Water Treatments Limited v SNF Inc, 2017 FCA 225 at para 77).
(c) Group 3 – claims 64, 65 and 66: these relate to methods and a system to identify a break in a rail.
Georgetown proceeded to trial only in respect of the claims in Group 2: those that relate to methods and a system to detect misaligned or sunken tie plates. However, Tetra is seeking a declaration of invalidity of all claims of the 082 Patent, as well as claims 7, 11 and 18 of the 249 Patent. The Court must therefore identify the inventive concepts of, or alternatively construe, all of the claims challenged by Tetra, not just those that are alleged to be infringed by the 3DTAS.
According to Georgetown, the inventive concepts of Group 2 – claims 16, 37 and 58 of the 082 Patent (misaligned or sunken tie plates) – are a system and methods that use a laser to shine a light on the railway track bed and a camera to capture images of the profile of the track bed. The system and methods include a processor with an algorithm for analyzing the images in a particular manner to detect a misaligned or sunken tie plate. The algorithm (a) analyzes a frame of the many images having a region of interest; (b) determines the presence of a tie plate in the region of interest; (c) determines the crosstie contour and tie plate contours; (d) compares the orientation of the crosstie contour and orientation of the tie plate contour; and (e) determines whether the tie plate is misaligned or sunken based upon the comparison.
With respect to Group 1 – claims 1, 22 and 43 (distance between crossties) – the 082 Patent acknowledges that determining whether a frame has a crosstie or not can be performed by imaging techniques known in the art. However, Georgetown maintains that a system or methods for measuring the distance between ties by counting the number of frames and using the speed of the vehicle to calculate the distance is inventive.
With respect to Group 3 – claims 64, 65 and 66 (break in a rail) – Georgetown asserts that a system or methods for measuring the gap between adjoining rails by counting the number of images taken between the ends of the rails and using the speed of the car to calculate the gap distance is inventive.
Georgetown says that the inventive concept of claim 7 of the 249 Patent is a method for determining rail seat abrasion of a railroad track using the steps of (a) determining the heights of the left and right rail bases, and left and right crossties; (b) determining vertical pixel counts for those heights and normalizing the vertical pixel counts upon a measurement index; (c) recording those heights; (d) determining the actual delta between the left rail base height and left crosstie height, and between the right rail base height and right crosstie height; and (e) determining rail seat abrasion values for the left and right rail bases.
According to Georgetown, the inventive concept of claim 11 is the same as that of claim 7, but with step (e) accomplished by using the actual delta for the left and right rail bases. The inventive concept of claim 18 is a system for determining rail seat abrasion having (a) light generators and cameras to generate images representative of the profile of the railroad track bed; and (b) a processor that (i) analyzes the images, (ii) determines the heights of the left and right rail bases, and left and right crossties, (iii) determines vertical pixel counts for those heights and normalizes the vertical pixel counts upon a measurement index, and (iv) determines whether rail seat abrasion is present along the railroad track using the measurements.
Tetra’s expert witness, Mr. Parent, testified that the standard features of all automated railway inspection systems are (a) a light generator projecting a beam spanning across the railroad; (b) an optical receiver generating images representative of the profile of the railway track; (c) a processor using algorithms to analyze the images; and (d) a capacity to link an image captured by the receiver to a geographical location. He expressed the view that the image acquisition system described in both the 082 and 249 Patents is a standard 3D triangulation technique by line projection, an approach that was well-known in 2004. Mr. Parent evaluated the 082 Patent as distinct at the algorithm level only, but declined to characterize this as an inventive concept. He denied the existence of any inventive concept of the 249 Patent.
082 Patent, Group 1 – claims 1, 22, 43 (distance between crossties): a machine vision system that measures the distance between ties by counting the number of frames and using the speed of the vehicle to calculate the distance.
082 Patent, Group 2 – claims 16, 37 and 58 (misaligned or sunken tie plates): a machine vision system that (a) analyzes a frame of the many images having a region of interest; (b) determines the presence of a tie plate in the region of interest; (c) determines the crosstie contour and tie plate contours; (d) compares the orientation of the crosstie contour and orientation of the tie plate contour; and (e) determines whether the tie plate is misaligned or sunken based upon the comparison.
082 Patent, Group 3 – claims 64, 65 and 66 (break in a rail): a machine vision system that measures the gap between adjoining rails by counting the number of images taken between the ends of the rails and using the speed of the car to calculate the gap distance.
249 Patent (rail seat abrasion): a machine vision system that (a) analyzes images; (b) determines the heights of the left and right rail bases, and left and right crossties, applying TC as needed; and (c) determines the presence of rail seat abrasion using those measurements.
Georgetown concedes that the prior art cited by Tetra demonstrates that machine vision systems were available at the relevant times to capture images of railway track bed components, and to measure their relative positions. However, Georgetown says that none of the prior art would have led a POSITA to build a laser vision system to detect sunken tie plates or rail seat abrasion, or to use the precise series of steps or calculations claimed in the 082 and 249 Patents. Georgetown argues that none of the prior art cited by Tetra discusses TC, or makes use of an actual delta between two points to identify rail seat abrasion.
Georgetown devoted most of its evidence and argument to defending the validity of the claims falling within Group 2 (misaligned or sunken tie plates). With respect to Group 1 (distance between crossties), Dr. Myler said only that none of the prior art cited by Tetra identified any problem relating to measuring the distance between ties, or suggested any solution such as that found in claims 1, 22 and 43 of the 082 Patent.
Similarly, with respect to Group 3 (break in a rail), Dr. Myler said only that none of the prior art cited by Tetra described a system or method for measuring the gap between adjoining rails by counting the number of images taken between the ends of the rails, and using the speed of the car to calculate the gap distance. He expressed the view that none of the prior art documents identified any problem relating to measuring the gap distance, or suggested any solution such as that found in claims 64, 65 and 66 of the 082 Patent.
Tetra does not take serious issue with Georgetown’s assessment of the differences between the prior art and the inventions claimed by the 082 and 249 Patents. Instead, Tetra describes Georgetown’s efforts to distinguish its patented inventions from the prior art as “strategic” and “unfair” . Tetra notes that Georgetown’s original Statement of Claim alleged infringement of 55 claims of the 082 Patent, and claims 7, 11 and 18 of the 249 Patent. Georgetown amended its Statement of Claim on June 20, 2017, shortly before the parties were due to exchange their initial expert reports. The effect of the amendments was to discontinue the action in relation to the claims falling within Group 1 (distance between crossties) and Group 3 (break in a rail).
I accept Georgetown’s characterization of the differences between the prior art and the claimed inventions which, in my view, is consistent with the evidence adduced in this proceeding. The disagreement between the parties is not so much whether the claimed inventions differed from the prior art, but whether the differences were obvious.
It is common ground between the parties that machine vision and 3D triangulation techniques, assisted by software, were available and commonly used to examine height differences and other elements of various surfaces. This process was applied in many different contexts. Tetra notes that the first section of all claims in both the 082 and 249 Patents is the same regardless of the surface in issue. Only the processing algorithm changes.
Tetra says that it would have been obvious for the POSITA to use 3D triangulation to inspect different features of the railway bed. The industry would inevitably adapt known automated surface examination techniques to the inspection of rail components. Prior art demonstrated that machine vision, specifically 3D triangulation techniques, could be applied in the context of railways. However, Tetra acknowledges that none of the prior art was concerned with assessing plate cut or rail seat abrasion.
Tetra nevertheless argues that, prior to 2004, the POSITA would have reason to combine common techniques known in the fields of machine vision and 3D triangulation to arrive at the claimed inventions. There was a strong commercial incentive to automate rail inspection, as illustrated by the collaboration between Dr. Mesher and CN that ultimately resulted in the 3DTAS.
With respect to the 249 Patent, Tetra says that there are no inventive elements or steps that were not already disclosed by the 082 Patent, with the possible exception of TC. The content of the 249 Patent is identical to that of the 082 Patent, as evidenced by Figures 1 to 12 and the corresponding descriptive paragraphs. According to Tetra, if claims 7, 11 and 18 of the 249 Patent do not account for tilt, then they lack novelty given the teachings of the 082 Patent. The 082 Patent gives the POSITA all the information necessary to measure the heights of the top of the rail and the base of rail, and to calculate the difference.
Georgetown responds that there are significant differences between the 082 Patent and the common general knowledge and prior art with respect to determining plate cut. None of the prior art mentions plate cut as a problem to be solved; nor does it provide a means of determining plate cut using a machine vision system.
With respect to the 249 Patent, Georgetown asserts that none of the prior art documents recognize a problem relating to rail seat abrasion; nor do they suggest any solution to determining the presence of rail seat abrasion or its extent. Georgetown therefore maintains that there is nothing in the prior art that would have caused the POSITA to evaluate rail seat abrasion using the system or methods described in the 249 Patent. Rail seat abrasion primarily afflicts concrete ties, which are not the focus of the prior art.
Georgetown notes that another element of claims 7 and 11 of the 249 Patent is the determination of an actual delta. To the extent that Tetra argues this must be understood as encompassing TC, none of the prior art discusses TC or otherwise determines an actual delta between two points to measure rail seat abrasion.
With respect to the remaining claims of the 082 Patent, i.e., those pertaining to Groups 1 and 3, Georgetown argues that none of the prior art recognizes any problem relating to measuring the distance between ties or the gaps between adjoining rails. Nor does it suggest solutions similar to those found in the 082 Patent.
The onus is on Tetra to establish, on a balance of probabilities, that the inventions claimed by the 082 and 249 Patents were obvious as of June 30, 2004 and June 23, 2009, respectively. I am not persuaded that Tetra has met this burden.
It is true that, prior to 2004, machine vision and 3D triangulation techniques, assisted by software, were available and commonly used to examine height differences and other elements of various surfaces. The prior art cited by Tetra includes several documents that applied this technology in the context of railways. However, none of the prior art identifies plate cut or rail seat abrasion as problems to be solved, or suggests solutions similar to those disclosed by the 082 and 249 Patents.
As noted by Georgetown, plate cut and rail seat abrasion are phenomena that are hidden when viewed from above, because they occur underneath components that are visible from above. Both patents solve this problem by comparing the height of the tie with the height of another track component: the tie plate and rail base, respectively. The 249 Patent also includes an algorithm for increasing the accuracy of the rail seat abrasion measurement by accounting for tilt. Neither the existence of these problems nor the patents’ proposed solutions are evident in the prior art. Nor could they have been arrived at without inventive insight.
Tetra’s allegation of invalidity is stronger with respect to the claims contained in Groups 1 and 3 of the 082 Patent, i.e., those that pertain to the distance between crossties and breaks in a rail. Both of these phenomena are plainly visible when viewed from above, and there is a basis for asserting that the challenges they present, and the use of automated inspection tools as solutions, are both recognized in the prior art. However, none of the prior art describes systems or methods that are comparable to those found in the 082 and 249 Patents.
An ex post facto analysis of an invention is potentially unsound (The King v Uhlemann Optical Company (1949), 11 CPR 26 at 46). An allegation of obviousness may be weakened if the evidence does not explain directly, or by inference, why the claimed invention was not discovered by others (Apotex Inc v Bayer AG, 2007 FCA 243 at para 25). Tetra’s challenge to the validity of the 082 and 249 Patents entails breaking the inventions down into their constituent parts, demonstrating that the parts were individually known, and then asserting that the combination was obvious. The Federal Court of Appeal warned against precisely this kind of analysis in Bridgeview Manufacturing Inc v 931409 Alberta Ltd (Central Alberta Hay Centre), 2010 FCA 188 at paragraph 51.
I therefore conclude that the claims of the 082 Patent and the 249 Patent are not invalid on the ground of obviousness. The identification of the particular problems, and the use of machine vision and specified calculations as possible solutions, required invention and was not obvious as of the priority dates.
Section 42 of the Patent Act grants the patent holder the exclusive right, privilege and liberty of making, constructing and using the invention and selling it to others to be used. A patent is infringed by any act that interferes with the patentee’s full enjoyment of the monopoly granted (Monsanto Canada Inc v Schmeiser, 2004 SCC 34 at para 34 [Monsanto]).
Pursuant to s 55(1) of the Patent Act, any person who infringes a patent is liable for all damages sustained by the patentee after the grant of the patent by reason of infringement. Infringement is determined by comparing the products that are said to infringe the patent with the patent’s claims as construed by the Court. If the 3DTAS contains each of the essential elements of the claims in issue, then Georgetown’s patents have been infringed.
The burden of proving infringement rests with the party that alleges it (Monsanto at para 29). The burden therefore falls upon Georgetown.
Georgetown submits that Tetra and CN jointly infringed the 082 and 249 Patents by common design: CN installed the equipment provided by Tetra on its rail cars in order to collect image data and perform initial processing; Tetra then conducted further processing and analysis of the data collected by CN.
In Packers Plus Energy Services Inc v Essential Energy Services Ltd, 2017 FC 1111 [Packers], Justice James O’Reilly found that a patented method for wellbore fluid treatment was not infringed because the defendant had not performed all of the steps of the method described in the patent. Although the defendant supplied and installed the necessary equipment, third party companies independently performed other essential steps. Justice O’Reilly held that “parties who act in concert to commit a tortious act can each be found liable if all of the parties involved arrived at an agreement to carry out the tort” (Packers at para 48). However, in that case, no agreements had been entered into. The named defendant was therefore found not to have infringed the plaintiff’s patent. The decision has been appealed.
Packers concerned a patented method. In the present proceeding, Tetra is alleged to have supplied an infringing system to CN. With respect to the method claims, Georgetown notes that Tetra and CN entered into an Equipment Agreement, a Licence Agreement and a Service Agreement. Assuming, without deciding, that Tetra’s provision of equipment to CN and its subsequent processing may be insufficient to support an allegation of infringement of the method claims of the 082 and 249 Patents, in my view the three written agreements satisfy the criteria of Packers for the commission of the impugned acts in concert.
In any event, Tetra does not say that some of the essential steps of the methods described in the 082 and 249 Patents were performed by CN, and that it should escape liability as a result. Nor does Tetra dispute that it entered into agreements with CN to achieve a common objective. It is therefore unnecessary to further consider Georgetown’s argument respecting infringement by common design.
determines an actual delta between the rail base and the crosstie.
According to Georgetown, the 3DTAS creates an elevation map by capturing data contained in individual frames, and then analyzing the data from many frames. This occurs as follows: two SICK Ranger cameras are mounted on the 3DTAS. They alternate in taking pictures of a rectangular region around a laser line that is draped across the surface of the track. Each image, recorded as pixels, is saved for a certain amount of time inside the SICK Ranger camera. The 3DTAS simplifies the image by removing the foreground and background of the railroad track. The simplified digital picture is then converted by the SICK Ranger camera into what is called an “elevation profile vector” , which is a form of image data. Each digital picture is converted into a unique vector, which retains the height information of the line position. The SICK Ranger camera assembles the vectors into blocks of 5,000, which are stored in matrices on a hard drive. The data are eventually uploaded and sent to Tetra, where post-processing occurs through de-multiplexing and sequencing of the elevation data vectors. A 3D map is then created.
Tetra responds that the 3DTAS does not analyze 2D images sequentially, as contemplated by the 082 and 249 Patents. Instead, the 3DTAS uses elevation maps. These are described by Tetra as “matrices of elevation values, constructed from 3D elevation scan vectors” , which may be presented graphically. Tetra says that the elevation maps are not processed as images in the manner described by the Patents, and no analysis is done by the 3DTAS on 2D frames captured by the camera.
Mr. Parent insisted that the systems described in the 082 and 249 Patents do not analyze images that have been combined or processed to create a 3D elevation map, but only 2D images captured by the optical sensors. Mr. Parent said that the algorithms in the 082 Patent always refer to 2D images, and these algorithms cannot be applied to a 3D elevation map.
However, Mr. Parent also acknowledged that a digital camera captures images in a manner similar to that of a human retina. The image genuinely exists within the camera. The image data that are subsequently processed may not be presented in this manner, although they can be. Algorithms permit images to be presented to the human eye in a variety of ways. It is not necessary for the camera to be capable of digital image processing. A standard camera may be used.
Mr. Parent compared the creation of a 3D elevation map to re-assembling the slices of a loaf of bread, then viewing the uppermost crust. In cross-examination, he agreed that 2D images are preserved in a 3D elevation map, which comprises a sequential assembly of height profiles obtained from the camera.
Dr. Mesher agreed that an elevation map is a collection of data. He explained that in each line of the elevation map, an individual elevation vector is displayed which portrays elevation as a shade: white is near, dark is distant, and grey is somewhere in between. A frame is a collection or a data structure of pixels, and the 3DTAS analyzes a compilation of individual elevation vectors.
Georgetown points to paragraph 0044 of the 082 Patent, which states: “[a]s can be seen in Figures 11-12, the compiled image data forms a three-dimensional representation (X, Y, and Z) of the area of the track bed” . In other words, the patent specifically contemplates the creation of a 3D representation from data compiled from 2D images captured by the camera.
I am therefore satisfied that the 3DTAS, when it creates an elevation map, necessarily analyzes “a frame”, “at least one image”, and “a frame of the plurality of images”. A 3D elevation map is simply a construct of the data derived from multiple 2D images displayed sequentially.
Georgetown says that the 3DTAS also satisfies the essential element of determining crosstie and tie plate contour. In a 2D image, a contour is displayed as a single line. Conversely, in a 3D elevation map, a contour is displayed as a continuous surface, which is generated by compiling height information from multiple 2D images or elevation vectors. Mr. Parent agreed with this interpretation in cross-examination.
Nevertheless, Tetra argues that the 3DTAS collects vectors of unconnected elevation points. Tetra says that in the 3DTAS, the mean or median elevations of the plate and tie regions represent two single floating point numbers, from which no contours can be calculated.
I prefer Georgetown’s explanation. I am sceptical of Mr. Parent’s statement that the 3DTAS “collects vectors of unconnected elevation points” . If the vectors are truly unconnected, it is unclear how they could be combined to produce a 3D elevation map.
Tetra’s position here is similar to the one it has taken regarding whether the 3DTAS analyzes a frame of the plurality of images. Tetra maintains that the 3DTAS does not analyze 2D images at all, but instead analyzes elevation maps. In my view, this is a distinction without a difference. An elevation map is created from 2D images captured by optical sensors. A contour remains the same regardless of whether it is displayed singly as a 2D image, or sequentially as a 3D elevation map. The only difference is that in a 2D image, a contour is displayed as an outline, while in a 3D elevation map, it is displayed as a surface.
Georgetown asserts that the 3DTAS uses ROIs to determine and compare contours, and that the ROI is the surface of the tie plate and the adjoining area of the tie. According to Dr. Myler, in order to obtain the contour data for tie plates and crossties, the 3DTAS system first locates the tie plate holes. For wooden ties, it searches its library for tie plates with matching hole patterns. Once the model is identified, the known dimensions of the model are used to define a bounding box for the tie plate. The 3DTAS system then defines the ROI as the areas at the lateral edges of the tie plate, and the corresponding region on the nearby tie.
Dr. Mesher was shown a drawing of a tie plate adjacent to a tie. He was asked to indicate the area that is used by the 3DTAS to calculate the tie plate surface height. He did so, but declined to describe this as an ROI within the meaning of the 082 and 249 Patents. Instead, he opted for a more generic description: “a region that’s interesting” .
Tetra argues that Georgetown has conflated the ROI with the bounding box. Dr. Mesher explained that an ROI is an area to which a view is restricted in order to find something and improve processing. However, he emphasized that no processing is done by the 3DTAS to locate an ROI. Instead, once the bounding box is defined, the ROI is determined mathematically without needing to search for anything else.
Tetra says that, in the contexts of the 082 and 249 Patents, ROIs are used to highlight horizontal and vertical zones in order to detect specific features. Conversely, the 3DTAS system locates tie plate features by processing the entire elevation map to locate spikes and holes, and then selecting the best known plate using spike and hole pattern matching. Once defined, the plate bounding box is used to define other areas that are required to perform elevation calculations. However, the calculations that determine differences in elevation are based on plate and fastener locations, and require no knowledge of the bounding box. Tetra therefore concludes that the 3DTAS does not use an ROI to restrict the search for any feature in the 3D elevation map, either vertically or spatially.
Insofar as it is possible to follow Tetra’s argument, it appears to be premised on the assumption that the 3DTAS does not analyze 2D images at all, but instead analyzes elevation maps. I have rejected this distinction elsewhere, and for similar reasons, I reject Tetra’s assertion that the 3DTAS processes “the entire elevation map” rather than analysing a specific ROI. I accept Georgetown’s evidence and argument that the 3DTAS makes use of an ROI in the manner contemplated by the 082 and 249 Patents.
The ordinary meaning of the word “orientation” is the relative position of something. In Dr. Mesher’s cross examination, he agreed that the 3DTAS calculates plate cut values by subtracting the height of the tie and the thickness of the tie plate from the height of the tie plate. The thickness of the tie plate is found in the library of tie plate models. Because this procedure involves comparing the relative positions of tie plates and adjacent ties, Georgetown maintains that the 3DTAS compares the orientations of their respective contours.
As noted above, Tetra insists that the 3DTAS does not determine crosstie and tie plate contours. If this is true, then it follows that the 3DTAS does not compare their respective elevations. Dr. Mesher testified that comparing the orientations of crosstie and tie plate contours requires a comparison of the angle between the contour of the tie plate and the contour of the crosstie. He expressed the view that this cannot be done with a single measurement point, which is what the 3DTAS uses in its calculations. A single measurement point is not a contour.
According to Tetra, the 3DTAS system measures an average height for one region at the tip of the plate, and an average height for an adjacent region on the tie. The difference between the two averages is reported. While Tetra calls this measure “plate cut” , it is not the real value of the plate cut because the height of the plate is only an estimate.
I have concluded elsewhere that the 3DTAS does in fact determine crosstie and tie plate contours, although it uses an algorithm to display them as a continuous surface rather than as a line profile. Tetra admits that the 3DTAS measures the height of the region at the tip of the plate, and the height of the adjacent region on the tie, then calculates the difference. In my view, this amounts to comparing the orientations of crosstie and tie plate contours.
The essential element of determining an actual delta between the rail base and the crosstie is found only in the 249 Patent. The actual delta is simply the actual difference in height between two track components. Dr. Mesher agreed with Dr. Myler that the 3DTAS determines the difference in height between the rail base and the adjacent crosstie in order to calculate the thickness of the polymer pad. It calculates the average or mean of two points on the rail base, and then subtracts the average or mean of the heights at three points on the tie. It then further subtracts the thickness of the rail base.
There is no serious dispute between the parties that the 3DTAS determines the difference, or the “actual delta”, between the rail base and the crosstie, although Tetra notes that the measurement reported by the 3DTAS is not precise. However, the formulas for determining the actual delta provided in the 249 Patent include a TC factor to account for the lean or tilt of the truck, whether left or right. Tetra therefore argues that the calculation of “actual delta” necessarily requires a consideration of tilt.
Georgetown acknowledges that the 249 Patent includes formulas for determining rail seat abrasion as preferred embodiments of the invention. However, Georgetown says that the claims should not be limited to only what is disclosed in the examples (citing Dableh v Ontario Hydro (1996), 68 CPR (3d) 129 at 144 (FCA)). Furthermore, the claims of the 249 Patent encompass the detection of rail seat abrasion even when the track is level. If there is no vehicle tilt, then no correction is required and the TC value in the formula is 0.
Even if TC were found to be an essential element of the claims in issue, Georgetown says that the 3DTAS does in fact correct for tilt. As the elevation data vectors are converted into a 3D elevation map, a “real world elevation correction” is performed. Pixel units are converted into engineering measurements, such as millimetres or inches. In order to obtain real world units of measurements, the 3DTAS makes adjustments for vehicle dynamics that affect the distance between the surface and the cameras. Dr. Mesher did not deny that the 3DTAS corrects for vehicle dynamics, but said that it does so only in the longitudinal dimension. Georgetown says this is sufficient to establish that the 3DTAS corrects for tilt.
According to Tetra, the 3DTAS applies “Dynamic Vehicle Motion Corrections” . This process is intended to counteract the effects of vehicle suspension bounce in the direction of travel. However, Tetra asserts that it does not address the height differences between the left and right rail heads. According to Tetra, there is no need for the 3DTAS to make this adjustment, because the minor difference in rail height caused by any transverse tilt of the cameras does not affect the degree of precision required by its customer.
In the discussion of Claims Construction, above, I have found that the 249 Patent does not contemplate that compensation for tilt will always be necessary as the system moves along the track. Instead, the system compensates for tilt only when this phenomenon is “encountered” .
I therefore conclude that the 3DTAS determines the difference, or the “actual delta”, between the rail base and the crosstie in the manner described in the 249 Patent. The algorithm for determining the actual delta disclosed in the patent does not require a consideration of TC in all circumstances. The claims of the 249 Patent encompass the detection of rail seat abrasion even when the track is level.
For the foregoing reasons, I find that the 082 and 249 Patents are valid. The essential elements of the asserted claims are also found in the 3DTAS. Tetra’s sale of the 3DTAS to CN and its support of the system therefore infringed both Patents.
which acts would have constituted infringement of the Asserted Claims of the 082 and 249 Patents if they had been granted on January 12, 2006 and December 29, 2010 respectively. Reasonable compensation will be assessed by reference.
(c) Pre- and post-judgment interest on all monetary awards will be determined by the reference judge.
If the parties are unable to agree on the costs payable in the Liability Phase of this proceeding, they may make written submissions, not exceeding seven pages, within 14 days of the date of this Judgment. Responding submissions, not exceeding three pages, may be made within seven days thereafter.
GEORGETOWN RAIL EQUIPMENT COMPANY v RAIL RADAR INC. AND TETRA TECH EBA INC. | 2019-04-22T04:47:30Z | https://decisions.fct-cf.gc.ca/fc-cf/decisions/en/item/306076/index.do?iframe=true |
Michael Virardi from Limassol, explains how he became a sought out speaker in the USA and China!
You might have heard his name already. He has been around for some years now and his is not a name you can easily forget. But, no matter how much mystery Virardi’s name might inspire, on a personal contact the smile is what makes the strongest impression. Michael R. Virardi is a Limassolian, with a hint of Italy, who seems to be driven into innovation due to his own DNA. After all, the famous aerial railway (Enaerios), one of the most innovative constructions in the 20th century in the city, is directly connected to his family’s history. Founding a business of international appeal, based in his city, Limassol, Michael works with several innovative ideas, gaining the acknowledgement and appreciation of large companies from Hong Kong to New York.
Doing a good job is just part of his success. What really makes him stand out, though, is the way he brings value to his work. This ability of his – to promote those advantages that will make you realize how important something may be – brought him close to a group of well-known Limassolians, who decided to move on with the branding of the city. With the same enthusiasm and fervor he puts into his own business, Michael was soon passionately involved in the vision of building the city’s image, in order to showcase its real worth, both in the eyes of foreigners and locals. And when a man, who spends half his time in the largest cities of the world, says the Limassol is “heaven on earth”, the least you can do is find out why.
Some 90 years ago, Giovanni Virardi arrived in Cyprus as the engineer that would supervise the construction of the aerial railway, that transferred asbestos from the mine on Troodos, to the Limassol seaside. Michael’s father, Rolando G. Virardi, after studying at the American University of Beirut in Lebanon, a fine educational institution, attended by world and business leaders, returned to Cyprus and went into trading. “His kickstart was based on a 5-pound fund, with my grandfather, Michalakis Kotsapas, as a guarantor”, Michael says, going back to the beginning of his family’s history and catering equipment business.
These past few years, Michael goes around the world, being an upcoming speaker in training seminars for business executives and employees. Live broadcasting of the workshops and seminars through social media, from anywhere he may be, is one of his identifiers.
Born and raised at Ayias Zonis area, Michael himself, experienced Limassol through the passage to its modern era. The name of the family was already widely known, since the family business was growing year after year. His brother’s activities and achievements, as a member of the National Basketball Team, also accompanied their name.
“Someday my grandfather was in the courtroom and the judge asked him to sit down, threatening to punish him if he was standing up, but he was in fact already sitting. That’ s how tall he was”, he narrates.
Michael stayed at his father’s company for 15 years. He devoted himself in it with much fervor and he was constantly setting higher goals for himself. Looking for way to improve his work and the business every single day, he started spotting out all those little secrets that would push them further.
These secrets became a whole new theory of how things should be operating, which is now the content of his seminars in top companies all over the world. Thus, he created a profession tailored to himself, being a kind of his own in the entrepreneurial world in Cyprus. A trainer, an author, a speaker, as he describes what he does, Michael sure is a unique case of a businessman.
“My first mentor was definitely my father. He did not have the theory, though, nor the framework for business”.
“I had not been on a holiday or a trip for 4 years. I was devoted to the accomplishment of my goals”, Michael says, as he recalls his course until this day.
His experience with Jeffrey Gtomer, an internationally renowned sales manager, changed his life: “I heard him talking in the USA and I was stunned. I said, then, that I wanted to become like him. I asked him what I should do to achieve that.
He told me that I should study for 10 years what I want to achieve. Thus, he said, I would be acknowledged in my country within the first 5 years and worldwide within 10. I bought his books, I listened to his tapes in the car and sometimes I even cried listening to him”.
Right after this acquaintance, he started applying a schedule of training seminars for the staff in the family business. “Everybody was attending the seminars, from the administration to the cleaners. Every Monday, for 7 years, I would conduct 20 – 30 minute seminars in groups. At some point they had a voting to make the seminars stop. The lost, though”, he explains, laughing.
Even if you disagree with him or question what he says, the discussion with plethoric Michael Virardi, who speaks passionately and lively, in an expressive manner with a lot of gestures, is always an experience.
Don’t you ever get disappointed?
My moto is that anything can be reversed. Even if something goes wrong, it is just a bad day, not a bad life. A bad day of mine was one 6 years ago, when I was mis-diagnosed with cancer, after a check-up. I was left in that impression for 3 days and, until they were over, I could not smile, no matter how much I wanted to.
I was afraid. I went to the beach and I was walking by the sea, just I did not want to lose my life, I love life a lot.
I was hoping for a mistake on the doctor’s behalf, but he was so certain for his diagnosis, he was trained in Germany and I was a regular at his office, so I trusted him.
Every conversation with Michael has humor and in it, like the “joke” about his business cards, which he rarely shares with people these days, since the cost 4-times as much as the ones he used to print did.
It wasn’t that tragic, though. When those 3 days passed, and I found out that I did not have cancer, all of this was over. The hard part is when people with cancer must deal with it. Bad days will go by. The issue is to deal with them properly. No matter what happens, the days will pass, you will wake up, go to the gym, to the beach and you will be fine.
Have you always been so positive?
It seems like it, even though I did not really know. A friend of mine, Christis Potamitis, reminded me of a letter I had written to him in 1994 when I was in Germany, learning the language and I was enthusiastic about my experience there, writing about it in 4 out of 6 pages in total, with nothing but positive impressions and comments. With this letter, Christis pointed out that this is how I have always been.
Is your passion something you have made up?
No, it’s not made-up. I can be like this even after several hours in a workshop. I feel what I do, and this is where passion comes from. Therefore I have said no to may offers with large amounts, because I did not believe in them.
Michael did not hesitate to try different things – even modelling in a very young age – until he found what he really wanted to do.
Is a positive attitude something you had to work on as a tool?
No, it could not be a tool, because at some point it would come out as fake and the mask would be off. Positive attitude is a part of myself, this is how I feel. I am like this because I enjoy it. If I don’t enjoy something, I have to change it.
My father told me that every day I have 2 options: to be either positive, or very positive. I think that positivity is more appealing to people.
So, why are there so many negative news, for instance?
People would like to hear positive things, instead of negative ones. For instance, with the occasion of the recent elections, personally, as a citizen, I would recommend to Nicolas Papadopoulos to be congratulate Nicos Anastasiades in public for those 2 – 3 positive achievements of his presidency, instead of adopting a negative approach. Malas, for example, was much neutral in his approach.
Which was your first job?
Nikos Kirzis hired me to train his team for the spa he was opening back then, He was the first one who believed in me and gave me the opportunity to begin my own business. Afterwards, Aristodemou was also very supportive, for whom I was hired to conduct 1 seminar in Paphos and I ended up with 30 of them. It is important to be good at what you do, not necessarily the best, though. I don’t like to hear from someone that they are the best. The important thing is to be prompt, the fastest, as well as a to know your job very well.
Did you learn this at the university?
Yes, I did learn some of these, because I was studying business administration, but I also had some psychology classes, where I learned about Pavlov’s dogs (how they were trained to expect food at a certain hour of the day). This knowledge did help me afterwards for the seminars, whilst the knowledge about businesses not so much, since many things changed in the meantime.
So, you are familiar with manipulating people’s psychology?
No, this is not what I do. At the seminars I pay attention at the image I present on the stage, but I also want to inspire a feeling.
At sales, the important thing is to gain the other party’s trust, to listen to them, to make the right questions first and to be a consultor towards them. If you ask me “how much does this cost” and I answer immediately with a price, I will not make a sale. But if I ask a few information about your needs and be able to suggest a product that will actually respond to them, then I will have gained your trust.
You must make the other person realize the true value of your product. If you present it based on one’s needs, then price will not be as important. If something is useful to them, any price will be fine.
Are you good at selling yourself?
I don’t like the word “sell”. It does not fit what I do and who I am. You can’t sell, you make your product attractive enough for someone to ask for it. The most important thing is to create good content, so that someone can find out through this, who you really are.
At his first steps as a businessman, Michael was walking along with his first mentor and father, Rolando G. Virardi, and his brother, Giovanni.
So, aren’t all your efforts aiming to a sale?
Your major effort is to build your website, your image, to make people understand what you provide. Important collaborations have happened to me because of my website.
My father was saying that someone may have something positive, something negative or something neutral to say about you. The negative and the neutral ones are both damaging you.
You are responsible for the positive memory you leave behind. This is how I promote my work. Someone may not hire me, but I will still have left a good impression behind, for my honesty, attention and sincerity.
Is this why you pay attention to your looks?
Yes, I always make sure to make a good impression. For that same reason I was in a seminar once, wearing short pants and then immediately changed to my regular outfit, to showcase how differently I would be perceived, even if I was saying the same thing.
From his visit in Hong Kong for one of his greatest, professional deals.
Are photos and videos, your photo on your books a way of selling more?
All these elements are the means to give value to my work and make someone want to buy my services. You don’t have to strive to convince someone to buy, if you have a proper image all set. Henley & Partners paid a quite large amount of money to buy one of my speeches they had seen online, in my website, for instance.
So, you think that a sale under pressure is bad?
Yes, this is not the pressure you should apply. The church sells itself by ringing the bell on Sunday, for example, but it must be done in another, a proper way, speaking in people’s language, to help them understand what it really stands for. If you are going after someone to make them buy, you will not have the results you wish for. You should not be a hunter, but a fisherman.
Which countries do you collaborate with?
I had collaborations in the USA, while there are people from Switzerland and Ireland coming over for these seminars. The USA have always been my dream and I was extremely happy when I made this deal. Afterwards, they told me that I presented the priciest offer, but they still hired me, without any discount.
Does a high price make your work more valuable?
Not always. The first time I was about to seal a deal, I asked for a price that seemed extravagant, for someone who was just starting. Thus, the deal was off.
My father had told me that if your price is too low and you are good, you will never raise it, but if it is high and you are not good, it will go down. So, he told me to have a high price and be good at what I do and patient, until my work is acknowledged.
Eventually I closed a deal with another customer in that price. Even now, I still follow that same approach. I won’t lower my price under any pressure.
Can someone maintain high prices in the middle of austerity?
Austerity is something you need to deal with. Now I get more negative responses than positive ones, but I prefer it like that and have time to prepare my presentations in the best possible way. Also, I would not find it fair to charge my clients abroad with prices triple as high, than the ones that apply locally.
Do you introduce yourself as a man from Limassol of Cyprus?
My father used to say that I should present myself as Michael Rolando Virardi and let people think I am Italian because “sometimes, they don’t take us in account, coming from Cyprus”. Of course, I could never pass as an Italian, since I do not speak the language at all. Personally, I feel more like a Limassolian and a Cypriot, than Italian.
In the USA, I say that I come from Cyprus and they think that its is a cypress tree, or something. Even the ones familiar with the country, do not take in account, though.
At some point, an American businessman (who was interested in buying shares of my company) told me that I should move to New York or London. I had the opportunity to do so, but I didn’t. I can travel a lot, to New York most importantly, which was a life-long dream, but I don’t want to be away from home and family.
The first time I spoke to Swiss Education Group abroad, they introduced me rather indifferent. If I was from Canada or London, this announcement would be much more impressive, emphasizing in the name and the country of origin. The second time I spoke there (when they put me in Freddie Mercury’s suite, which would cost much more that I was charging), the introduction was upgraded, including my full name, my identity and my country. It is hard to be coming from such a small country and try to make it out there.
What was the Limassol “branding” operation?
In mid-2011, 7 businessmen of Limassol, who shared a common vision about the future of the city, got together to follow the advice of the expert Peter Economides on the promotion of a city, in order to create the conditions for Limassol to seize opportunities in the middle of the financial crisis. Christos Mouskis, Costas Galatariotis, Spyros Spyrou, Costas Lanitis, Alexandros Tsoulouftas, Michalis Loizides, Michalis Virardi, each one successful in his field, met to identify and invent ways to bring out and promote the real value of this city.
"We knew what the city's advantages were, but we didn’t know how to prioritize them and how to show them organized so Limassol could benefit" Michalis explains.
In cooperation with the local authorities, these entrepreneurs paid the amount of €100,000 for the cooperation with Peter Economides, but the effort was left in the middle. "We had not figured out that for something like that to continue, we needed about €1 million for the production of the material," he adds. "We didn’t fail completely. We made a good start for the creation of the brand, of Limassol’s image", he concludes.
What is branding, after all?
It's something like marketing. It has to do with how much, but also with how someone knows you, or has connected you to his mind. It is your identity.
Thus, if you have an identity, can you do branding with it?
If you have an identity you will do branding, you will build a strategy. If you do not have an identity, you must create it.
“The beginning and the end is the production of the right material, which will have a consistence, it will create a myth, a story, an identity”.
Having a specific identity, helps branding?
Everything matters. It is important the image that you will show. When I started collaborating with KommiGraphics, a Greek design company, and they were analyzing the use of each color or even the selection of the font on my site, I didn’t expect that they would be so important.
Branding needs a lot of work to be built and a great attention to the detail. Because on the one hand is the difficulty of building a brand and on the other is the issue of making clear this identity to everyone's consciousness.
Perhaps the most significant thing is to stay true to the values you stand for. If, eventually, someone is not capable of achieving this, then he should seek help from the experts.
Is it easy to build the branding of a city like Limassol?
No, it is not easy, and the effort we made in 2011 has shown it. The beginning and the end is the production of the right material, which will have a consistency, it will create a myth, a story, an identity. It's what All About Limassol does (as the Official Source of Limassol promotion) and it does it very well from the day it started and with low cost, too.
Experiencing the advantages of Limassol every day, Michael knows that the city and its people deserve to recognize and to show even more its uniqueness.
We saw some great videos from All About Limassol, such as the one that showed the 2 sides of Limassol, the relaxation and the intense entertainment, which really comprehends the city's image, creating feelings and impressions.
That’s why I acknowledge what All About Limassol does, because I know from my work that this is not an easy job.
Do you believe that in the case of Limassol there is the value that can become the context of the branding?
I’m not an expert to the cities or countries branding. For that reason the expert Peter Economides had come in Limassol, making a first effort. But considering that many people are coming in Limassol again and again, and the fact that so many Russians choose to stay here permanently, then probably there is a value.
Working out and running is part of his daily routine, thus the participation in the Limassol Marathon was something natural.
Limassol is a paradise to me: short distances, tranquility (if you see the speed with which people walk in cities like New York, you understand how much it worth what we have here), a demanding city that does not exhaust you, though. As for foreigners, they have surely found here a strategic basis for economic activity between 3 continents and we have to highlight this too.
That's why what All About Limassol does is a great project, because with the foreigners, we, Limassolians, get to know our place too, from nature trails and sights to entertainment venues.
So, is it a tool for the locals first, the Official Limassol guide?
Yes, I do believe so with great certainty. And yet there are many more who don’t know it, therefore there will be a lot of people who will soon discover its usefulness, and you should be proud for this.
Why is it useful for the city to build its own branding?
Because everyone benefits from it. Guests arrive in Limassol, stay in our hotels, then come to eat and drink, restaurants and hotels are refueled from the local market, they recruit staff, advertise, move the Media and all these, make a circle. But also the locals who will be informed by All About Limassol about a nature trail, for example, and will put their family in the car, put gasoline, go to the countryside and then choose a tavern in a village for dining, this again move the economy.
The benefit for the economy from branding is immediate. The entrepreneurs who put money out of their pocket to make that move in 2011 have done this to give that impetus, but also because they really love their city.
Besides, they are so successful that for them it wouldn’t have a big impact if the local economy would rise 5%.
When you have to talk abroad about Limassol, what do you say to the people?
Definitely the sea is the first advantage I mention. Once, when I was in America, I told the people I was a winter swimmer and I entered into the Atlantic during the winter time. I immediately stepped out, breathless from the cold, and I recalled. We have other temperatures in Limassol, it's almost summer all year long. It is very important, however, that over the good weather, we have the snow in Troodos and you can go skiing in half an hour by car.
“Our hotels are a great advantage also, as well as the exquisite restaurants, because from a gastronomic view, I consider that they are among the best of out there. Like this bar that hosts us today, I would see it in London too”.
Do you single Limassol out among the other cities in Cyprus?
When I’m abroad, I speak about the whole Cyprus. However, Limassol really stands out and I realize this more and more, while I grow older. Perhaps, when I was younger, I wanted to go more often in Nicosia, but now I prefer to stay Limassol. I’m not a fanatic local, but I do recognize the benefits of the city. Anyone would feel this, if he was in Limassol.
Have you seen improvements in Limassol?
Yes, of course it has been improved. And the initiative of the creation of All About Limassol, which makes me discover new and interesting stuff that I didn’t know all the time, makes me feel more proud about my city, as proud I feel about anything innovative or pioneering.
What do you enjoy in Limassol?
Waking up every day with running along the sea and swimming, it’s for sure a great pleasure. From 5:30 until 7:00 in the morning I found myself at the seafront, opposite the Zoo. That’s how my day begins, right next to sea.
What bothers you in Limassol?
The way we drive is really annoying, till dangerous. On the road no one can be safe, neither the driver, nor the pedestrian or the cyclist. Furthermore, the fact that some people pollute the sea with waste is outraging. Normally, there should be a permanent police watching around the area, stating to those who do it that there would be penalties because they cause a great damage in Limassol. We have seen, while swimming, from feces to dead mice and all local authorities are responsible for this.
Because, Limassol may see benefits from shipping, from the boat traffic in the area, but if something harms you can only fight it.
Why do you believe that nothing is happening to deal with this pollution?
I think in Cyprus the right measures are not equally applied everywhere. Since we, that we are in the area, see such images every day, it means that someone is not doing his job properly, that something is not working well. And people should react more strongly. We strongly react to the fan card, but not for other issues. That's something I cannot figure out in our mentality.
Did you ever felt shy for something in the city, when you were hosting people from the abroad?
Yes, I feel bad about those smudges that are seen everywhere around us by the fans of some groups who paint on the walls, on the labels, etc. It is a matter of consciousness, because even if you set monitoring cameras, most likely you will see people with hoods and it will be difficult to arrest someone.
He considers Limassol a paradise, admitting though that flaws are not missing, mainly the ones that has to with the way people live and behave in it.
I think they do. It just may be different grades of the way someone love Limassol. Perhaps many of them do it theoretically, they support this only with words. Perhaps some others don’t even know what does it mean to really love your place, to be proud of it and exposure it. We often stay with the numbers and the statistics, with the awarded prizes, but we don’t see the essence here: the security that the place provides you, the pleasures, the quality of life.
Here is where the matter of branding enters. Branding may have an impact on many things, to the way we perceive ourselves, but also to the way others see us.
A characteristic example is the case of the occupied Cyprus. 10 years ago, when I was abroad, they would ask me about the occupied Cyprus. Now, after a very strong promotional campaign that the occupied side conduct, with videos, advertising and others, people ask me if I am from the Greek or the Turkish part of Cyprus.
Is Limassol an expensive city?
Yes, in many things is expensive. But something like that it’s logical, since you attract many foreigners and especially wealthy ones.
Michalis admits that as younger, would often seek to visit Nicosia, something that no longer feels the need to do, since Limassol provides excellent entertainment options, like Frankie’s Social, the restaurant-bar where we met for the interview.
Would do you like the city to be less expesive?
I don’t think it may change, but certainly I would like to see the more traditional options having the same quality with the cosmopolitan and perhaps the most expensive side of Limassol. That is, I would want more Cypriot taverns with excellent quality in food and in the service. In Greece I can think 10 places like this, but in Limassol I don’t know something else other than Forsos tavern.
Forsos tavern is really something else and I much appreciate their work there, although they are not Virardi's customers, because we are not from Famagusta (he laughs). But it is so great that I would like to present it at some time. Very good work is done at Yasemin too, the restaurant that opened in Agiou Andreou Street, which I didn’t expect to have such a quality. I also enjoy the duck in Zen. Of course, at the Four Seasons, the Chinese restaurant is amazing.
Is there a problem of professionalism?
We have an ego problem, we don’t’ accept criticism. For the product of your work to be good, it must be recognized by the people as such. If this is not happening you must find a way to achieve it.
In that way we improved the work to our family business: we were listening to the complaints and to the comments1 by 1, eager to respond. This is the only way to show progress.
With seminars and workshops at universities and large companies all over the world, Michael R. Virardi sure is the only Limassolian — and even Cypriot — with an international career in his field.
Michael R. Virardi knows that he lives in the era of images and he seems to have won in the race for making it in these terms, using photography and video to promote his company to the extend that it reaches the level of international completion, not just local. He is the man that know, out of a personal experience, of the great importance of a representative image that will showcase the value of a person, a company or a city, according to what people ask from it.
Yes, there are cities far better than Limassol out there, as there are entrepreneurs far better than Michael in his field. But, just like a young man from the minimal Cyprus, managed to have access in large audiences abroad, so can Limassol find the audience looking for an ideal destination for residency, business of entertainment in it, a destination much more suitable for them than other, popular cities. If a man alone made his own name an international brand, could you just imagine what a city full of creative and active people could do? | 2019-04-26T15:05:20Z | https://allaboutlimassol.com/en/michael-virardi-from-limassol-explains-how-he-became-a-sought-out-man-in-the-usa-and-china |
If we don’t have any Groodles available at the moment or if you would prefer to wait for our next litter of Groodles please subscribe onto our notification list please click below.
Chevromist Kennels have been involved with Groodles and the development of the designer breed for well over a decade now.
During that time Groodles have dramatically increased in popularity. Why? Well, the simple reason is because they are exceptionally compatible to most people’s lifestyles. As a family dog, the Groodles, (Miniature Groodles, Medium Groodles and Stanadard Groodles) make excellent family dogs and for singles as well. Groodles (Miniature Groodles, Medium Groodles and Stanadard Groodles) get along well with other pets like cats, birds and of course other dogs.
Every day we speak with people interested in buying a Groodle puppy. We’re always interested to know why they’ve decided to buy a Groodle puppy and in many cases what we’re told is that, they love the temperament of the Golden Retriever and have previously owned a Golden Retriever but they want the dog to spend at least some of the time in the house with the rest of the family so this time they want a dog which doesn’t shed hair everywhere! The Groodle is an excellent choice provided he or she has come from a knowledgeable breeder who understands the genetics of the dog. Gone are the days when breeders simply bred a Golden Retriever with a Poodle and called it a Groodle then placed a simple advertisement in the local rag ready to sell the puppies to someone who is unaware of unscrupulous breeding practices there are out there weather that’s the puppy farms or backyard breeders. It’s absolutely vital that breeders are experienced and educated in animal genetics to ensure they are qualified to carefully study and understand their Groodles genetics. Michael from Chevromist Kennels is always our first point of contact before we plan a litter of Groodles. Michael has been involved with breeding dogs including Groodles for over 30 years. Along with that hands on experience, he completed his degree in Animal Science with a focus on genetics, then went on to complete his Honours work in immunology through Melbourne University’s Dept of Medicine and the CSIRO Australian Animal Health Laboratory.
The Miniature Groodle (also known as Goldendoodle) is amongst some the most popular family dogs. A hybrid or “designer dog”, the Miniature Groodle is the result of a Golden Retriever crossed with a Miniature Poodle, although these days the modern Miniature Groodle is usually a Multi-Generation Miniature Groodle. What is a Multi-Generation Miniature Groodle? Well, professional Miniature Groodle breeders like Chevromist Kennels,have been working hard to reach what is termed in the dog breeding world as a “standard”. Professional Miniature Groodle breeders are always trying to improve the breed by aiming to produce puppies with particular breed traits. In this case, Chevromist and other breeders aim to produce Miniature Groodle puppies which consistently have a non-shedding coat, a placid and easy going temperament, a size between 35cm and 45cm and to eliminate certain health issues which can be eliminated while reducing the risk of those which cannot. This is part of the “standard” professional Miniature Groodle breeders are progressing to. To increase genetic diversity and to be able to produce certain colours like Chocolate, Multi-Generation Groodle breeders have bred Miniature Groodles with Labradoodles in the past. This means that Multi-Generation Groodles include Poodle, Golden Retriever and Labradoodle in their heritage.
The Groodle was originally breed as a large breed alternative to the very popular Cavoodle (Cavalier King Charles Spaniel x Poodle) and Spoodle (Cocker Spaniel x Poodle), the Groodle which now comes in a variety of sizes from the large “Standard”, medium “Medium” and the small “Miniature”,has proven to be a perfect dog for families and singles alike.
Do Miniature Groodles shed hair?
What is the Miniature Groodles life span?
How big do Miniature Groodles grow?
What colours do Miniature Groodles come in?
Do Miniature Groodles get on with cats?
Back in the 19th and most of the 20th century, dogs didn’t spend a lot of their time in the house with the family. Dogs were predominantly bred to be hunters, herders and even sadly used for baiting. Thankfully times have change. Today most Australians expect their family dog to spend at least sometime in the home with everyone else. There’s almost nothing more relaxing than kicking your feet up at the end of a hard and stressful day while you watch your favourite television show with your dog who loyally lays beside you. It’s become more important than ever that your dog doesn’t leave a huge amount of hair all over your lovely home and furniture. Yes, most Australians still want a dog that’s going to enjoy a walk or a run at the park, however the majority don’t want a dog with endless amounts of energy like a working breed such as a Husky, Kelpie, Border Collie etc. Hunting breeds like terriers and hounds can also have some major issues when fitting in with children and other pets like cats and rabbits. Modern hybrid or “designer” breeds, including the Miniature Groodle are not bred for herding or hunting, they are being carefully developed for the specific purpose, to be a good family dog that fits into the lifestyles of people today in the 21st century. This in its self has contributed to the Miniature Groodles popularity amongst Australians today.
How big does a Miniature Groodle grow? It can be difficult for breeders who breed the first cross Miniature Groodles to accurately determine the adult size of their puppies. First cross Miniature Groodles are the result of a Miniature Poodle crossed with a Golden Retriever. Puppies from a litter of first cross Miniature Groodles can vary in size quite significantly. Some of the first cross Miniature Groodle puppies in the litter will get their size from the sire which in most cases will be the Miniature Poodle while others will inherit their size from their mother, the Golden Retriever. Professional breeders now breed the Multi-Generation Miniature Groodle to ensure a consistency within each litter to better determine the size of the offspring. Well bred Multi-Generation Goodles should grow to be between 35cm and 45cm and weigh between 8kg and 18kg.
Do Miniature Groodles shed hair? It all comes down to good breeding. A well-bred Miniature Groodle should shed very little to no hair at all. Unfortunately some breeders (especially backyard breeders) can be very quick to claim that their puppies won’t shed hair. It’s usually because they’re not experienced enough when it comes to canine genetics and breeding and rearing dogs in general. Just because one of the parents is a non-shedding breed like a Poodle, this doesn’t guarantee that the offspring will inherit this trait. It’s vital that the breeder is experienced and understands the actual science behind canine genetics. If the breeder doesn’t have any formal education in Animal Science or Genetics, then they should consult with someone who does to ensure their breeding program is on the right track. You plan to have your Miniature Groodle for a very long time (possibly 15 years) so make sure he or she has come from a reputable, professional breeder and your Miniature Groodle will be an absolute pleasure to have in your life. Most backyard breeders simply don’t have the experience, knowledge, genetic diversity (usually only owning 2 or 3 dogs), and unfortunately most are breeding their dog for a quick buck.
A health Miniature Groodle’s life expectancy is between 12years and 15 years.
What kind of temperament does a Miniature Groodle have? The Miniature Groodle’s greatest attribute is his nature. Kind, affectionate, loyal and easy to train. The Miniature Groodle temperament is what makes them such excellent modern family dogs. Miniature Groodles have been specifically bred to be good family companions. Chevromist have been working with this breed for decades and we are contacted every day by prospective new owners looking for an ideal family dog.
Many have owned a Golden Retriever in the past but want a dog that’s not going to shed hair while still maintaining the beautiful nature of the Golden Retriever.
Some of the most common questions we’re asked by people looking for Miniature Groodles for sale include, are Miniature Groodles good with children? Yes.
Are Miniature Groodles good with other dogs? Yes.
Do Miniature Groodles bark much? No.
Do Miniature Groodles get along with cats and other pets? Yes.
Why do Miniature Groodles seem to tick all of the boxes that make them such excellent family dogs? The answer is pretty simple. Most of the traditional purebred dogs were bred for some other purpose, like hunting, herding, fighting, rodent control etc. So it’s difficult to be a great hunting dog and still tick all of the boxes that make a great family dog. Groodles, like many other modern designer breeds i.e. Cavoodles, Spoodles, Labradoodles etc. have been carefully and specifically bred to be great family dogs that fit into a modern Australian family home. The vast majority of Australians don’t want a herding or hunting dog. They want a dog that’s going to fit into their lifestyle without trying to kill the neighbours pets or chase a herd of cattle! The Miniature Groodles only purpose is to make an ideal family dog. This is why it’s absolutely vital that when you are searching for Miniature Groodle puppies for sale that you choose a puppy from a professional breeder with the right facilities, resources and experience with dog breeding and rearing. The genetic makeup of the Miniature Groodle (and any other breed for that matter) is fundamental to how successful a Miniature Groodle breeder’s breeding program is. Miniature Groodles naturally want to please their owners. This is significant because although there are many other intelligent breeds, many can be quite difficult to train because they are stubborn and don’t have the natural drive to want to please their owners. It is such a pleasure to have a well-trained dog as opposed to a un-trained dog. Again, professional Miniature Groodles breeders recognise the importance of producing a dog that can easily be trained, making him or her a much better family companion.
At Chevromist Kennels we constantly receive positive feedback from our new Miniature Groodle owners, usually to let us know how well their new Miniature Groodle puppy is fitting into their home and how quickly they have been able to train them. This type of feedback not only gives us the satisfying feeling knowing that our new Miniature Groodle puppy owners are happy with the puppies we’ve bred but it also lets us know that our breeding program is on the right track.
The Miniature Groodle is a good match for first time dog owners because they are easy to train and please. At Chevromist Kennels we’ve had a countless number of first time dog owners who have had incredible success with their Miniature Groodle. We always recommend puppy school to our new Miniature Groodle owners, particularly first time dog owners. Besides being a lot of fun, puppy school will help socialize your Miniature Groodle and get you familiar with the basics in respect to training your Miniature Groodle.
Miniature Groodles not only make ideal companions but they’ve also had much success as versatile working and therapy dogs. They have even become sniffer dogs, service dogs and guide dogs.
Because of the their friendly nature, Miniature Groodles don’t typically make good guard dogs however many will still bark if a stranger approaches the home during the night.
One of the down sides to the rapid popularity of breeds like Miniature Groodles as well as others including the Cavoodles, Spoodles, Moodles, Poochons, Beagliers etc. is the increase in backyard breeding and cruel puppy farms. Backyard breeders and Puppy Farms usually keep their dogs in sub-standard conditions.
Backyard breeders and puppy farms have no interested in the breed other than turning over a quick buck, usually at the expense of the dogs and also their new owners who can be up for tens of thousands of dollars in vet bills for their dog who may be riddled with serious health problems. We’ve heard some really sad stories from people who didn’t know any better. They’ve gone out and bought what they thought was a cheap puppy from someone’s backyard only to have to pay thousands of dollars in vet bills as well as suffer from the heart break of having to put their beloved dog to sleep. Thankfully, Victoria has the strictest code on earth for professional dog breeders who a registered domestic animal businesses. It is important however to understand that is in ONLY breeders registered with their local council as a Domestic Animal Business who must comply with this strict code and who undergo regular inspections by the local authorities. Hobby breeders that operate from their backyard are exempt from this code or these inspections from local councils so ensure your puppy comes from a registered DOMESTIC ANIMAL BUSINESS that is actually registered with their local council. This is vital! Any breeder who is not a registered Domestic Animal Business has very little accountability for the puppies they sell, so if something horrible goes wrong…you are on your own! Domestic Animal Businesses must offer you an extensive health guarantee for your puppy. It may seem more expensive at first to purchase your Miniature Groodle from a Professional breeder but it’s important to recognize just how much work, time, and money has been invested into their breeding program to breed Miniature Groodle puppies that are healthy, well socialized, and will make some of the best companions one can ever own. On the other hand a puppy from a backyard breeder may appear cheaper at the time but in many cases these puppies are suffering from long term health issues which can cost you not only heart break, but the vet bills can run well into the tens of thousands of dollars.
In contrast to Back Yard/Hobby Breeders, Professional Miniature Groodle breeders will conduct their breeding program from a quality kennel and just as dog breeds have evolved so has the quality of professional kennels. The latter is particularly true in the past four or five years. A far greater emphasis is placed on the animal, rather than merely providing a secure place for it to be housed or for ease and convenience of the staff. Now, although it’s obviously fundamental for a professional breeder to operate from a modern and well-designed kennel it still remains absolutely vital to have caring, enthusiastic staff to ensure the dogs are provided with a high level of care and equally ensuring that the puppies bred leave healthy and happy.
Chevromist Kennels have recently completed our brand new kennel facility in Ballan, Hepburn Park and to date Chevromist Kennel’s Hepburn Park is one of the most modern and professionally designed and built kennels in Australia. Having such a high quality and well-designed kennel facility gives us the ability to operate our Miniature Groodle program smoothly. Chevromist Miniature Groodles living at Hepburn Park enjoy world class facilities including huge outdoor exercise yards which they have access to 24 hours per day. This isimportant because in most cases Miniature Groodles prefer to be outside enjoying the sunshine or playing with other dogs. Because our Miniature Groodles are never on their own unless while caring for a litter of puppy Miniature Groodles, they are able to express all of their natural behaviours by having constant contact with other dogs which they see as their “pack” members. Why is this so important? It’s important because this is a major contributor to the Miniature Groodles mental health. Miniature Groodles have been bred to enjoy human companionship, so it’s just as important they have lots of contact with people as well.
Breeding and Management Plan to ensure their dogs are mentally sound and the puppies they produce have the great temperament we expect from a Miniature Groodle. | 2019-04-24T13:48:21Z | https://www.chevromist.com/groodle-puppies-for-sale/miniature-groodle-puppies-for-sale/nggallery/page/2 |
Over 170 healthcare leaders joined us for the 2017 PP-PAHCOM/CMGMA Colorado Payer Day. Speakers and participants held discussions on how health care policy decisions could shape reimbursements and the evolution of data sharing to drive value-based care models.
Jean Haynes, Chief Population Officer at UCHealth, discussed how groups like the CIVHC and COHRIO are working to make data more useful for practices across the state. For example, CIVHC is leading the Total Cost of Care and Resource Use project to provide Primary Care Physician groups better understanding of their cost and resource use patterns relative to broader averages.
While ACOs, large healthcare systems, and payers work to define attribution models that will make data actionable for all practices, practice administrators must assess and prepare for changes under MACRA.
CMGMA has partnered with the Colorado Quality Payment Program Coalition (Link: http://www.cmgma.com/news/4756765) to bring you resources you need to understand the requirements for MIPS and APMs.
The legislation will now be sent to the Senate where it will be subject to debate. All Democratic and many Republican Senators have expressed significant reservations. If the Senate decides to advance the legislation, it is almost certain to be amended, which would require another House vote prior to final passage.
If you are trying to figure how your practice fits into the next round of healthcare reform, look no further than this article. I am excited that CMGMA is part of the Colorado Quality Payment Program Coalition (COQPP).The mission of the COQPP is to raise awareness of the payment program amongst Colorado providers, organize education efforts, and create effective assistance for physician practices.
There are many organizations participating in this effort to eliminate silos across the delivery of care in Colorado.
To gain a better understanding of the program, the CMS has created a website to explain how you can participate. The program is essentially the two tracks of MIPs and Advanced APMs. The goals of these programs are to provide high-quality patient-centered care, continuous improvement, and useful feedback from all stakeholders. Providers are eligible for MIPs if they have more than $30,000 in billings AND see more than 100 Medicare beneficiaries per year. If you participate in an Advanced APM, you are excluded from MIPs. Click Here to download an executive summary of QPP.
The COQPP is here to assist you in receiving resources and technical support as you continue to adapt to the ever-changing delivery model. The website includes educational material on how to find help in Colorado, and which representative is designated to serve your practice. There are many resources available once you determine the path you want to take, so please take advantage of the quality improvement consultants and grant monies available.
One of the organizations dedicated to providing resources in Colorado is TMF Health Quality Institute. They are tasked with proving consultants and technical assistance for group practices with less than 16 physicians. A couple weeks ago, Elaine Gillaspie presented to the COQPP . Her presentation outlined the network of companies supporting QPP. TMF is happy to assist CMGMA and your practice as you gear up for your place at the table. This table is a resource illustrating the networks of resources that are available.
If you do not meet the criteria to participate in TMF’s offerings, check out the COQPP website as we will be updating it with more information as the network develops. CMGMA will also be providing more education opportunities to highlight the other components that comprise QPP. The moral of the story is that you are not alone; you just need to know where to look. I hope this article shed some light in meeting the mission of your practice.
As a new Administration and Congress come into power, MGMA Government Affairs has identified the following legislative and regulatory issues as top priorities for medical group practices in the coming year. MGMA will keep members apprised of key developments in these areas, and will be calling on the Trump Administration and Congress to work in a bipartisan manner to pursue legislative and regulatory changes that will enable practices to thrive in their mission to furnish high-quality, cost-effective patient care. Members are encouraged to maximize their Association benefits, which include expert guidance from government affairs staff on federal legislative and regulatory requirements. Email or call 877.275.6462 with your questions. We also regularly add new information and resources to the government affairs webpage and as always, stay tuned to the Washington Connection for weekly and breaking news updates.
When President-Elect Trump is inaugurated on Jan. 20, Republicans will control both the legislative and executive branches of the federal government for the first time in more than ten years. The two branches are expected to address deregulation, tax cuts, entitlement programs and repeal and replacement of the Affordable Care Act (ACA). Last week, Congress took the first step by introducing a budget resolution instructing key congressional committees to develop ACA repeal legislation, but this resolution is a statement of priorities and does not have the force of law. Practical implications for medical group practices will remain unclear until a specific replacement plan emerges. MGMA is closely tracking this issue and will engage Congress to ensure any resulting legislation supports policies that reduce the excessive administrative burden faced by practices in our healthcare system today.
President-Elect Trump’s pick for the top position at the Department of Health and Human Services (HHS), Rep. Tom Price, MD (R-GA), is no newcomer to the field. If confirmed, he would be the first physician Secretary of HHS since the first Bush Administration. Price has been a frequent and outspoken critic of government involvement in the patient-physician relationship and a vocal opponent of the ACA since its inception, authoring several legislative alternatives to the Act. Trump has also nominated Seema Verma, the president of a national health policy consulting practice, to head the Centers for Medicare & Medicaid Services (CMS).
Trump has indicated price transparency and reducing drug costs will be a priority for his incoming Administration. What remains unclear are the details for how Trump will implement these policy priorities and how these would intersect with his and Price’s goal to provide regulatory relief and reduce the federal government’s influence in how healthcare services are delivered and paid.
A sweeping new quality reporting and value-based payment initiative stemming from the Medicare Access and CHIP Reauthorization Act (MACRA), known as the Medicare Quality Payment Program (QPP), took effect on Jan. 1. In 2017, most physician practices will participate in the new quality reporting track of the QPP known as the Merit-Based Incentive Payment System (MIPS), which replaces PQRS, the Value-Based Payment Modifier, and Meaningful Use and potentially adjusts payment of Medicare Part B claims accordingly. In this first year of MIPS, physician performance will be compared in three categories: quality, advancing care information and practice improvement activities. Following MGMA’s concerted advocacy efforts, CMS established a flexible transition-year policy allowing group practices to potentially receive an incentive payment for reporting data for any 90 consecutive day period in 2017, or avoid a penalty by reporting a small amount of data, such as one quality measure for one patient. MGMA recommends group practices report more than the absolute minimum required data as added insurance against a penalty in the event of data submission issues or inaccuracies. Access resources to help your group succeed in MIPS at MGMA’s MACRA/QPP Resource Center.
4. Will alternative payment models (APMs) flourish under the new Administration?
In late December, CMS unveiled a flurry of new Advanced APMs, which by the agency’s calculations are expected to increase the overall number of clinicians participating in an Advanced APM from 70,000 to 200,000 by 2018. CMS has notably placed an emphasis on developing specialty-focused Advanced APMs, which now feature a number of cardiac, orthopedic, oncology, and nephrology-focused models. With MACRA passing with broad, bipartisan support in Congress, its enduring legacy featuring APMs as a focal point is expected to continue. The incoming Congress and Administration, however, have been heavily critical of mandatory demonstration projects and have repeatedly chastised the CMS Innovation Center, the entity charged with developing APMs. These factors raise a question about whether the APM infrastructure sculpted largely by the Obama Administration will proceed in its current form or a new system under the Trump Administration. MGMA will continue to be vigilant in advocating for group practice-friendly APM options.
One notable shortcoming of the Meaningful Use program was its lack of focus on EHR usability and effective and secure data sharing. 2017 will see implementation of legislation enacted late last year that could impact group practice adoption and use of HIT by reducing regulatory or administrative burdens relating to the use of EHRs (such as documentation requirements); prioritizing EHR usability and user-centered design, encouraging voluntary certification of EHRs for medical specialties (specifically pediatrics), requiring the development of a “trusted exchange framework,” and penalizing information “blocking” with fines of up to one million dollars.
CMS continues its trend of expanding Medicare payments for care management services by including in the 2017 physician fee schedule (PFS) complex chronic care management (CCM), care plan development, and non-face-to-face prolonged evaluation & management services. Additionally, in response to concerns raised by MGMA and other stakeholders, CMS mitigated the onerous billing requirements for CCM. For instance, beginning in 2017, CMS is limiting the face-to-face initiating visit requirement to CCM patients who are new or who have not been seen within the past year, rather than all beneficiaries receiving CCM services. For more information about the improvements to CCM and new billable services, read MGMA’s member-exclusive analysis of the 2017 PFS final rule.
Despite the inclusion of numerous administrative simplification provisions in HIPAA and the ACA, industry adoption of automated administrative transactions is less than optimal. In 2017, both the public and private sectors are expected to move forward with new standards and initiatives aimed at increasing the use of electronic administrative transactions. It is anticipated that CMS will publish a long-awaited regulation establishing a standard for electronic attachments that could greatly simplify the process of supporting claim submission or other requests from health plans for patient medical records in addition to other expected regulations and guidance. Further, MGMA and other provider organizations are actively engaging the government, commercial health plans, vendors and others to join in working to reduce the burdens associated with revenue cycle tasks such as prior authorization, establishing patient insurance eligibility, and receiving payment for medical services.
8. Forecast unclear: Will health plan mergers continue under new Administration?
Mergers, acquisitions and consolidation among healthcare insurers have been on the rise, but the direction of these types of partnerships remains uncertain under a Trump Administration. The Department of Justice (DOJ) and Federal Trade Commission (FTC) continue to police these consolidations, most notably with the DOJ moving to block mergers between four of the five largest health insurance plans—Aetna’s acquisition of Humana and Anthem’s acquisition of Cigna. Complaints filed by the DOJ in July alleged the unions would restrict competition and potentially harm American consumers by increasing prices and reducing benefits. Decisions in both matters are imminent. While antitrust issues are somewhat insulated from political shifts, President-Elect Trump’s philosophy on anti-competition policy is largely unknown. Policy shakeups, such as ACA repeal, may also play a role in the race toward consolidation and whether the demise of the federal exchanges could lead to a significant shift in market power.
In recent years, Medicare has been steadily increasing the amount of clinician data it discloses to the public related to performance on quality metrics and financial relationships with drug and device manufacturers through the Physician Compare and Open Payments websites. Provided the incoming Administration proceeds with these ongoing transparency initiatives, 2016 Open Payments data is scheduled to be released in mid-2017 and 2016 PQRS data is expected to be posted to the Physician Compare site in late 2017. For the first time, CMS will publish PQRS data submitted by individual clinicians, as well as PQRS data reported by group practices and ACOs. MGMA has raised concerns over the potential adverse consequences of publishing data that has a reputation for being outdated, inaccurate and subject to misinterpretation and will continue to work with the new Administration to ensure that any data reported is accurate and easily interpretable for consumers.
The healthcare environment has witnessed a marked increase in the number of data breaches, both accidental and by unauthorized individuals. As more patient data is being stored and transmitted electronically, physician practices are increasingly vulnerable to internal and external security threats. Several federal agencies, including CMS, the Office for Civil Rights, and the Office of the Inspector General, are more actively enforcing HIPAA privacy and security regulations. Conducting a comprehensive risk analysis and review of your organization’s policies and procedures is your best defense against experiencing a data breach or failing a government audit, and is required under MIPS. Access MGMA’s HIPAA Resource Center for tools and guidance.
Members of the 115th Session of Congress were sworn in on Tuesday and introduced a budget resolution that would begin the process to repeal and replace parts of the Affordable Care Act (ACA). The budget resolution, which does not have the force of law, instructs certain congressional committees to develop legislation to repeal parts of the ACA through an intricate budgetary process known as reconciliation. The goal is for both the Senate and House of Representatives to complete action on the budget resolution by Jan. 20 when President-elect Trump is inaugurated. Then, development of the repeal legislation would begin. Under consideration is a plan to defer implementation of the repeal bill to allow congressional leadership and the Trump Administration time to develop a replacement package. However, the outcome of the process and any practical implication for medical group practices will remain unclear until more specificity is brought to the timeline and content of the legislative package.
The 2017 Medicare Physician Fee Schedule (PFS) finalized a number of payment changes designed to increase coverage for primary care and care management services. In this year’s final rule, the Centers for Medicare & Medicaid Services added new billable codes for prolonged non-face-to-face evaluation and management services, assessing and creating a care plan for beneficiaries with a cognitive impairment, and behavioral health integration services. In addition, the agency drastically mitigated the extensive and onerous requirements to billing chronic care management (CCM) services and scaled back supervision requirements for transitional care management (TCM) services. To learn about these and other changes included in the 2017 PFS, read MGMA's analysis of the final rule. | 2019-04-18T17:15:25Z | http://cmgma.com/news |
Right. So good morning everyone thank you for for, joining me and thank you google for hosting, this, presentation. Today. I want to tell you a little bit about what, happened when I decided, to Oprah's. Open, source my book in. How you can leverage, the same approach to publish. Your own book. So, as herman mentioned, my name is Francesco Marconi I'm a media, strategist, and recently, published live. Like fiction. 30. Days to become the author of your own life story. The. Book is essentially. An interactive, guide on how to find, purpose, creativity. And inspiration through. Storytelling. The. Organizing, principle, of this, book is. Called engage. Because. This book is about how, to engage with yourself, in how to engage with the things around you that inspire, you and. It's also the acronym, for each of the six parts, that comprise the book in those, six parts are, explore. Your meaning, narrow. Your goals, generate. A plan, anticipate. Roadblocks, gain, persistence. And elevate. Yourself. So. The book is comprised, of five. Six. Major, sections. With five. Mini chapters, each so. Total 30 min each chapters, one, for each day of the month so it's designed to be a month, long program, in. These chapters. Tell you an interesting story of, an, inspiring. People including, artists. Entrepreneurs, thinkers. Authors. In Annville, the. Strategy, behind their. Accomplishments. And. Finally. Each brief. Question. Concludes. With inked and interactive, exercise, so. The reader can. Apply. What they just just, learned or what they just. Reflected. On. So. One, of the questions that I get the. Most when I'm. Presenting. My book we're talking about it. It's not necessarily, about the contents, in the book because people, end up reading it but. It's more about the, process or the approach, that I took to. Publish. The. Book in. Fact someone recently told me that a book, is. Like the, new business, card so you need a book in. Order to. Transacting. In the business world so I want to tell you today, how you can write your own book using. This methodology, that I that. I fall for for. Live like fiction. Before. I do that I just wanted to guide you through how. Traditional traditional. Book. Publishing, works, any. Something, like this, the. Author writes a sample, or a sample. Chapter in a proposal, partners. With a literary agent. Who. Helps. The author broker, the deal with the with the publishing house and then finally, much lighter the, book is. Released to the audiences, and they read the book so. In. This traditional, approach the, reader is actually the last person, to come into contact with, what. He just created and, this, is a great approach if you are already a well-known person, in a big following so if. You are a former. President, famous. Chef an award-winning. Author this, is great for you but, if you are like, me and you are just a regular person. You. Have to build interest and you have to build an audience before, you even think of publishing. A book and that's, where a. A new. Approach comes handy, which, I call iterative. A iterative. Approach and so, for my book I decided to flip the model start, with the audience first, and. Collect. Feedback from, from, people that read. Sort of the. Genesis, of the, book and, take those, insights to, improve it. Before. Partnering. With a book publisher, to amplify. Distribution. And so, this is for. Those of you who are familiar with, fraud. Development, techniques, like design thinking, that's exactly, what what, I applied, here so, to I want, to share with you today how, iterative. Publish, can help turn your ideas, into a successful, book, and. The. Book or. The process, starts precisely, by. Creating. A proof of concept so, an. Idea, that you can test receive. Feedback and then improve. Based on that. So. The first step or the, first, thing. To consider when. You are developing your own book project, he start with purpose. Identifying. Things that are important, to use something, that gives meaning to your life or an. Ambition, or personal. Goal in, my case when. I was young I had a dream of one day living, in New York City, and, so much so that when I was 16, I decided. To buy a picture of New York City's of the New York City skyline which. You see on that picture, on.
The Slides and hang, it above my my. Bed this is my my. Childhood, bedroom, and. Having. This picture, help, me visualize a, goal or an ambition, that I had and. Eventually, I was fortunate to turn that dream into a reality when, I got an, internship, here in. New, York City, but. When I finally, arrived, to, the city of my dreams I really. Didn't know anyone, I was, just fresh out of college I had no professional, experience, so my way of coping with. The situation, was to write my observations. Of how people, behaved how. They did small talk how they inspire, others, how, they, manage. People and so, I started, translating these interesting, observations. That occurred around me into. Strategies, that I could use in. My own life. And. So those notes literal, notes that I wrote became. The raw material, of what eventually became live. Like fiction, so. A few tips here as you're, getting started in, your book project, find. A personal, a story. That illustrates your. Your, journey and make, it surprising. And authentic. So. Once you have figure out that. Your. Purpose. The, second, step is, essentially. To test, to. Test those ideas. At. Scale, and so, you, a, good, way of doing, that is actually engineer. A viral, post it, might seem challenging but, if. You follow some some. Some. Ideas, here it's, not it's not that difficult so. Think. About it viral. This viral post. Or this. Summary. Of what your book wants you. Want to accomplish in your book as a teaser, for what. You want to develop. And. This is important, to have early. Validation. Because you. Will be able to collect feedback and, success. Metrics. For. Example how many people share. The article, or liked it or how many views you got so you can share those metrics, within eventual. Publisher, down the line so. As, I. Mentioned before I have, developed. A, playbook, of strategies, from. My observations. On how to have better communication skills, leadership. Influencing. People and. Decided. To take those notes that I that, I in written and put. Them on an online shared. Document, and then, what I did is that I sent it to 10 friends, and I asked them to provide, me feedback, and, most importantly. To highlight, the areas, of their. Article, or their blog post that, were, the most unique the most compelling, and so I, let the audience, although. It was a small audience of 10 people initially. Participate. In the creative process it's, almost like testing, your your, product, before it's, released, to the public so. I invited feedback, to, help me identify the, the, ingredients. In those notes, that. Worked in. And then use, those to improve. The overall narrative. Of the, pilot, or the post that would originate, the block the the book so. When I finally, finally. Published online. I used, medium, there, are many other platforms, I knew, that the version that I had just published was the. Best version, that I could create because. Of, a. Lot. Of the elements that people had. Enjoyed, and it highlighted, it as the most unique. The most surprising, and, eventually. The the, blog. Post became viral. So. What. Happens when you. Are at this stage and finally. You have your viral blog post which is almost a teaser for the book. You. Have an opportunity, to build a support, community, not only of those ten initial, people that you asked for feedback, but. Also people, who you. Don't know yet and have enjoyed reading your your, work. And. It's important, to connect with these readers, because down the line they, will play, a very crucial role in promoting your. Book, once it's out, for, for. Sale, and. In addition to that you may get lucky and. Get people you admire to. Give you feedback and, invalidation. So in my case journalist. Katie Couric, and author, Neil, Strauss, shared, their appreciation on, Twitter and that was very, important, to me and also when. I was discussing, it with potential, publishers, I used. This as. A. Validation, for, for. The potential, of the book so. The the thing to remember here is not. To be afraid to reach out to the people that you, don't know and that enjoy, your work because they will play a crucial role in the promotion, of the book down. The line the. Step the, fourth step that I want to share with you is how to amplify, your audience.
So Remember. You have this, initial, interest around the viral. Viral. Post you have to extend your 15, minutes of fame by. Publishing. Your ideas, through, different online publications. So. In my case I had that, successful. Blog post our medium in, I used the engagement matrix I actually, took, a screen, shot of, the, matrix. How many views on many shares and, I sent, it to a, few online magazines. And convinced. Them to republish. My. My, article, on on their site so eventually, some of these brands. Invited. Me to continue, as a contributor. Which. Gave me a fantastic. Opportunity, to get exposure to many. More people so, a few tips here as you are looking to expand, your audience through. Different. Online magazines. It's very important, to start with, a. Friendly, publisher. Maybe, it's a a. Friend, you met before or it's someone who works. At those magazines, you met at, an event and then once you secure the first the. First publishing. Partner. Then. It's much easier to get others because you already have a validation, of some of those brands, and so you have to repeat the process and. Keep. Generating. Interest, around, your work. Alright. So, this. Was the first stage of. Validating. Your concept, your book concept with the potential, audience and, then amplify. It through, through. Different collaborations. Now. What how do you turn that audience, in that interest into a book, veel. So. Since. My book originated, online as as. As. A as, a blog it was important, for me to give it some more structure. In show, publishers, that it. Was much more than a viral post. And. So I what I did was to find an organizing, principle as, I mentioned at the beginning that. Organizing. Principle, is engaged, which is an acronym for each, section of the book, and. This acronym or this organizing, principle, is very important. Because. It. Helps you summarize, the key ideas, in your book in. My case they are related to storytelling. Inspiration. Creativity. Strategy. In. So engaged. Links. Up to that very well. Finding, an acronym, is is, is, crucial, because it. Makes your work more memorable, for your readers but. Also it differentiates, it, from any. Other books a publisher, might be. Evaluating. Once, you presented, to them. Alright. So step, six is. Is. Very important. Particularly. Nonfiction, books which is the case of live, like fiction. Is. To. Make them a more. Two-sided, experience, so not, only the reader is. Going. Through the stories. In the book but they are also taking action. My, approach to find inspiration to, turn. Some of the the. Stories in the book into, potential. Exercises. Was to actually run, offline. Workshops. And he's here a picture, there where. I'm running, a workshop at, a at a local, startup. Community. And so. What. I did was to. Turn the offline, interactions. That I had with people and. With participants. Of those, workshops. Into. Exercises. That I could include in. The book and this can be applied to many, other areas so. You know in my case it's a book about strategy. And storytelling, if you are writing about the book about. Computer, science or programming or. Or, marketing. You can find ways of having, your readers, apply, the. Lessons, you're sharing, with them, another. Important, point if. You noticed at the beginning the. Book has a very. Rich. Design. Element, and that's that's, crucial, because. Nowadays. A book is not just something. You read it's also an object that. People want to carry. With them so the design element, is as. Crucial, for, the success of the book as the content. Itself. All, right so you have you, have all of this interest, and you have. And. You have the matrix and you have an organizing, principle, yeah, and and. You package, your ideas, very, firmly, now. We can turn them turn. All of those success, metrics, into a book proposal. And, so a book. Proposal it's, like or. It, is a business plan where you had to provide an, overview of what you are working on the, audience, you are trying to reach. Who. Is your competition so, are there other books, out there that are similar to yours and, even, a go, to market strategy so, how are you once the book is is. In. The bookshelves and. In the stores how do you promote it in. You, know the best analogy. That I have for this and for my experience, is almost, like you have a small, start-up and you're, pitching it to investors, and in this case the investors, are the. Publishing, companies. Right. So. Finally. We have gone through this, this process of building an audience creating. A proposal. You were successful, at selling, that proposal, and identifying, a publishing, partner, how, do you promote the book and. How. Do you do it in a cost-efficient. Way and, this was but this was particularly, important. To me being cost efficient, and time efficient, because I have a full-time job so I. Took. Some of the the. Skills. That I have in in media strategy, in applied. Content. In, mark in, strategy. Principles. To the promotion of the book so. One, of the things that is. Crucial, is you're, launching the book is to keep your audience interested, your, initial, audience, remember, of the, people that follow you that liked your blog post and.
A. Great way to keep their, interest is to. Develop. A newsletter I found. That a very simple, way of writing, newsletters that get a lot of engagement is by. Setting. Automatic. Alerts on Google for, news articles. That highlight. Ideas. Related, to the concepts, that you explore in in in, your book so for example I had. A lot of alerts for things, related to storytelling. Inspiration. Strategy, and then, what you do is to. You, curate those articles, you summarize, them and you share share, them with your, following. Newsletters. Are also very important, because there. Are great tools for. Running. Small, promotions, like giveaways. In. And. Even asking for favors so for example asking for, your. Readers to share a link to. To Amazon, page with. Their friends, or to, leave a testimonial. On your site and so on. This. Is one of the the last one, of the few. Last things that I want to share with you which. Is trying, to do trying, to create, your book as a multi-format. Experience. So. It started as a. Written, word project. But. The reality is audiences. Want to engage with more visual formats. Specifically. Video, and. People want to be, entertained, and, learned along along, the way so I use the video automation, tool called ribbits, and essentially. What these very. Simple to use. Software. Allows you to do is to summarize. The. Chapters. In your book. Find. Related, images, and package them into very, engaging. Shareable. Social, videos so. Also. Related, to engaging. People, with. With. Different, formats, of your book just beyond. The print product, I, found, it very very. Powerful. To surprise, your readers and so what I did in in this, in. This case was. To develop. An augmented, reality app, where. Readers. Can drop inspiring. Thoughts, in. Their ideas. In in. The book. By. Pointing, their phones at. The book cover so it's essentially, a virtual, book. Club unlocked, through an augmented. Reality I'm. Not sure if the video will play but we can we can try just so we can see, how it looks. So. As you said as you've seen that the idea here is not that you need an augmented, reality app, necessarily. But. That, you can find interesting. Ways of, engaging. Your, audience and, surprise them along the way so. All right so you, have all of these these. Interesting, activities, you have a book you have an augmented, reality app, you have videos. What. Can you do next well you can repeat the process either, for, other. Projects. Other. Books or you. Can do the same thing for other. Markets. So. In my case I, just published. The first international. Version, of live like fiction, which is a, different. Title. It's a Portuguese, version. And. He. Follows, it followed, exactly, the same the same approach and I. Will, leave you with the trailer, that I made to promote, the. Book in, Portugal, and then we can we, can have a discussion. In, Q&A. All. Right so thank you all. Right, thank you for that chest cool this was great. Says. Reminder to her microphones, on the Alsea if you want to ask a question just for free and go ahead and ask but, let. Me start by asking you. What. Where. The idea of becoming. An author, just. Come. From yes. So the my my, initial objective, was not to become an author it just really. Happened, organically. As, I, mentioned, the first time I I moved, to New. York City I didn't, really know anyone in so one way of coping. With, this. Transition, to the professional, world was. To, take notes and see how people. Behaved. And then in. Different, situations. In social. Circumstances. Professional, circumstances. And then, translate, those ideas, into. Strategies. That I can that, I could use, in. There and after initially. A a. Few. Colleagues. And friends had. The chance to read it and, and. Encouraged me to share, it wider and that's where, the, entire process. The. Entire process began, one, thing that I would say is that. It's. Very challenging. To go through all of it but, once you do it it, becomes very easy to replicate, so. Hopefully, I'll be looking. To more more projects, in the future like this yeah, we - absolutely. Just. In the same line but. Who is your favorite, author well. I I have many. Different, authors. That. I that I like I, can, pinpoint, one, specifically. But. I'm. Actually reading, a very. Interesting book called, the invention, of news. Which. Traces, back, which. Traces, the. The, news. Industry back. To the 13, androids all, the way to modern times so it's it's it's very interesting for, me, as that's, my industry, but I usually, read.
A Lot of nonfiction, books. That's. A very interesting. Well, I did have a question about, your, book a few questions about your book but before, well, you did mention that you wrote. A blog, post right. It went viral so. Did, you ever consider, just. Sticking to writing, blog posts or just be a blogger. No. Because you know then the initial, the initial. Goal. Was to see. If I could execute. On the strategy, of, turning. Something, digital into. Physical. And. It, was important, to me as a personal. Interest in as a media, strategist, to try, to explore, different. Ways of, telling, a story not only through, a blog, post but through a physical, book, videos. And augmented, reality app. In. So, creating, a portfolio, of experiences. And. Again the most enjoying, thing is the is the process, of figuring out how to do it and. To learn about new. New. Strategies, or new technologies. And and. Then implement, them in. In. The project, specifically, right. Okay. So. Now, talking about your your book in, particular. Did. You originally intend, to have the book as as, an open source book, or were you or did you ever consider having, or, maybe following the the traditional approach, at, some point no. The initial goal was you. Know if I'm, if. I'm promoting. Innovation, as part of my my, professional. Career in if I'm encouraging, new ways of thinking about media, strategy, and it. Would be better if myself. I if I explore. New avenues and, new routes to. To publish content so, I wanted to for. The process, to be to. Break away from the traditional model and. Apply, a. More, user centric, approach. To. Writing, the book so putting the audience first rather. Than then last, and. Then use. That that, initial feedback, to improve the book, invalidated, before, it's. Distributed. Wider by by. A publisher, all. Right very innovative, indeed, thank, you and we have a question from the audience yes, hello thanks, for an chesco for coming, you. Mentioned, in your talk how you shared. Your book and the ideas with a group of ten people how, did you actually decide who those ten people should be because depending. On the composition that would greatly, kind, of bias. A bug one way or another we're, looking for people who were you. Knew work a little bit more critical or, people who just make you feel good that's. That's, a great question, in specifically. When. I was designing this small, focused, group I, picked. Friends. Who I know are very, critical and. In fact the question that I asked, was tell. Me what's. Wrong, and. And. After. You do that tell me what do you like and. So inviting, these feedback, and inviting. The. The. The, initial work to be dissected, and evaluated. By people, that I know are very. Critical was, very important, to me because, once. It goes through that. That. Smell test then and. You're able to improve. Your work based on on on those. Interactions, that then. You're likely. Going to have some something, that everyone. Enjoys. And. I also I, also search, for people, or identified. Friends. And family from, different from different areas. So not only people that work. In media or entrepreneurship, but. You, know. Friends. That work, in the medical, field in, friends, who are. Artists, or teachers, and so trying. To have an. Audience. Or initial audience that could represent, the. Why the wider world. It. Is 10 a magic number was like three friends that that like you three friends that didn't like you and maybe mom. Dad yeah no, it was not a magic. Number it was just you. Know I was looking for initial. Group. Of people. That could provide. Some. Some guidance, and it just happened to be ten, but. I I think that's that's a good number I think five is he's, he's. Too small and you. Know maybe 100, these is too big so. Something. In something in between right, so I spiring, writers, and authors then people don't, forget, that okay. So now in the lines of feedback. You. How did you prepare, for. For. Not positive. Feedback, I mean you by, doing the book as an open source you. Probably, knew that there was a possibility, that some of the feedback that you were going to receive was not necessarily, what you wanted to hear or read so, how did you prepare yourself for that yes, so to, two main things so the, first thing is that the, main, objective. Was to produce, a, very, good product a very good book and so if, that's the focus then I. Could. Look at feedback as a way of improving, and getting close to to. To that to that vision in the, second point is that you don't have to receive. Or. Implement. All the feedback, you you. You, get so, there's a there's.
A Balancing. Act between, the, feedback, you receive in your own. You. Know your own direction, your own creative. Spirit, so you have to be able to manage. Both of those in. While. Staying true to your own voice in in to what. You want to convey, in in the book that you're writing okay. I have to say that's very courageous, of you I'm. Not so sure if I would just want to open the. Things are right to the open. Net, and see what feedback I get so, yeah, good stuff for ya. Very courageous um okay. So kind, of shifting, gears a bit, well. Technology is, is part of your book it's, it's basically at its core. When. Did you decide, to incorporate, technology in, your. Book well. I mean it's part of my. Technology. Is part of my language, it's it's what I do is in, my profession, and so. You. Know today we have so many tools available to, us that can really help us scale, our. Creativity, in this. Collaboration, between. Humans. In in machines, is something that I'm very passionate. About. So. I wanted to incorporate technology. From from day one, and. That means. Using. A you, know online, shared. Document, to. You. Know online, platform. For sharing blog. Posts, which, in my case was, medium, all the, way to using. Video. Automation. In in augmented, reality. And. As I mentioned, it was a process. Of exploration not, only of the concept, of the book but. What I could do around it in the. Strategies, that I could implement, as. Part of this project, right. And and then you also mentioned that, well. You have a full-time job so. How. Tell. Us how you balance that I mean did did your job in The Associated Press, somehow. Help you achieve what. What you wanted to achieve with the book or through the process um just, tell us how do you balance that because I think sometimes. You. Know we all want to do things but oh we're I'm so busy with my with, my job that I just can't find the time for just. Doing whatever you know whatever I haven't been wanting to do for so long so how did you balance that, yeah really, so first. Of all this was a hobby. For me something that I was very interested, in pursuing, and. You. Know I I really. Enjoyed. Doing it and so if. That's the case and if you are doing an enjoyable act, it becomes much easier when, you arrive home after, the long day at work and use. It as a. Way of relaxing, of, distracting, yourself. And. That's. That's, what I that's what I did use this creative, process, to, not. Only inspire, the book but also inspire. My. You, know my daily life in my profession. Because I feel. That having, a hobby is crucial, because, it's a source of creativity, that, you can then channel, into different areas of. Your. Life and. Also there's you know there's the weekend which is a, great. You. Know if you account the number of hours and things that you can accomplish on a weekend, if it's something enjoyable to you there's. There's, a lot of time. Specifically. My, work as a media strategist, there's a at the large news, organization. I get. To. Learn about new. Technologies. New strategies. And so some. Of those lessons learnt. End. Up, playing. A role in in, what you do or in my case or what I did outside, work, so. Learning, about video, automation, in learning about how, to develop, newsletters. How to curate. Content it's. Something, that that, I was exposed, to, through my work, did. You ever ask your your co-workers for, feedback about the book yeah, absolutely and, in. Fact, we. Have a. Very successful internship. Program, and. I was a the. My, publisher, gave me several. Copies of the book so we could give it to to, our interns. And. I've I've also, shared, some presentations. In some ideas, specifically. About the book with with, my colleagues, in they, have been wonderful. At supporting, the project as well as providing. Feedback asking, questions in and so on again. Very courageous, of you yeah. Yeah. What. Advice can you give those future. Authors. That are watching this on YouTube, but what's, the maybe three things you can tell them or the one thing you can tell them to those who are thinking about as. I said before right start, their own project, but maybe. They just don't have they think they don't have time or, or.
Or, So yes, so I think the, most important, thing is to. Develop a plan of. The. Steps you want to accomplish, and. The. Action items that you have to do or to. Execute to get to that larger, vision so for example in this discussion. Today I shared, you. Know ten principles, that I found. Important. In in in my journey I, think, these are applicable to other people, but each each, individual. Will have their own unique. Way. Of approaching. A book project but. Again if, you are able to define a plan and stick to it eventually you'll see results and that, was important. To me because I, wanted to, give. Up every single day as I was, creating. This project because. You know it's. You're. Getting rejected. By publishers, or you. Know the feedback is very harsh or. You are not able to you. Know create a certain. X acute on a certain idea that you had so having, the guiding, principle. In. That, knowing, what light. At the end of the tunnel in terms of your creative processes. Is. Crucial, as as you are developing a, book. Project or any media project, right. Okay well I have maybe one more question if the audience has any questions police approach mics yes, and we have a question yeah thanks for coming I, spoken. With a lot of authors and I worked with some of them closely and I, feel a lot of them have gone through this great marathon of creating, this this, work this item and. They. Sort of run out of energy when it comes time to self. Promote they. Some, of them expect the publisher to do this and there's not, a lot of resources I'm publishing these days to really. Pull, that through, all the way what. Sort of advice would you offer to authors who have gone. Through the race and. Are basically. In their mind finish but they have a little ways to go into. Making their books a success, but sort of ice do you have to keep their energy levels up in that self-promotion. Phase, which i think is just so key that, you're talking yeah absolutely and, that's. Excellent, question because I I. Felt. The. You know what you just described, which is some fatigue, after going, through all of this effort and then you. Still have to to, promote the. Book one. One, thing that I find very energizing. And although I've been talking, about how to leverage technology. And. Different. Marketing, tools that are available out, there I. Found. Very, very. Rewarding to have offline, discussions. With with, people in in in. Readers, and, potential. Readers, because. Then you get to interact with. You. Know with people that are just like you and you. Get new ideas and you see how, from. How. They are enjoying reading it in in that's that's, that's. Inspiring, and as, I'm writing, you. Know or, as I was writing this book and any. Other projects, I always, think about one. Or two people. Specific. People friends, or people that I met at an event or at a conference, those. Are those are that's. My audience and so I'm thinking about that specific. Person, I'm thinking about John. Or Sarah or whoever, might be and, in. Having. That in mind of how will they react once. This, is out so. Again. Not. Folk, focusing. Of, course on, being, creative and resourceful in, terms of the, technology, tools you used to market your book but. Most, importantly. Find, avenues. To. Interact. With. People in real life. Thank. You, ok, if I just called one last question. What's. Next so, we know your book he's published in Portuguese now do, you plan to. Do. More more versions perhaps, Italian yeah I would love to to do more versions, in. You. Know looking, forward, to finding, partners. In in. Readers, in in in, in, other, countries, because. The the feedback that I've been, getting, has. Been very positive and that's very. Rewarding and, I would, love to share some of some, of the. Ideas in the creativity, with even more people so. Hopefully. More translated. Versions in the future and any other plans. To write more books or other, subjects. You have in mind for future yeah. I have some sons and, other ideas but right. Now I'm. Focusing. On and on. Making, this specific. Project. Successful. And. Then I'm sure eventually, I'll I'll. Explore, other concepts, or other book. Ideas, so, all right well, thank you so much for coming with definitely, appreciate, your time and thank. You for sharing your ideas with us thank you so much and thank you google for hosting. Me. You. | 2019-04-22T17:03:44Z | http://newstechtrend.com/francesco_marconi_live_like_fiction_30_days_to_become_the_author_of_your_talks_at_google_i379 |
I passed the 00M-155 exam thanks to killexams.com, too. Good to know Im not alone! This is a great way to prepare for IT exams. I was worried i would fail, so I ordered this bundle. The exam simulator runs very smoothly, so I could practice in the exam environment for hours, using real exam questions and checking my answers. As a result, I knew pretty much everything on the exam, which was the best Christmas and New Year present I could give myself!
Passing the 00M-155 exam is not enough, having that knowledge is required.
killexams.com provided me with legitimate exam questions and answers. The whole lot become correct and real, so I had no hassle passing this exam, even though I didnt spend that masses time studying. Even when you have a totally fundamental statistics of 00M-155 exam and services, you could pull it off with this package deal. I was a bit burdened basically because of the large amount of statistics, however as I stored going through the questions, things started out out falling into place, and my confusion disappeared. All in all, I had a wonderful enjoy with killexams.com, and wish that so will you.
where can i get assist to bypass 00M-155 examination?
This 00M-155 dump is terrific and is in reality certainly well worth the cash. I am now not loopy about shopping stuff like that, but since the exam is so high priced and traumatic, I decided itd be smarter to get a protection internet, which means this package. This killexams.com sell off is surely right, the questions are legitimate and the solutions are accurate, which i havedouble checked with some friends (every so often exam dumps provide you with wrong answers, however now notthis one). All in all, I handed my exam simply the way I hoped for, and now I advise killexams.com to everyone.
00M-155 exam prep got to be this easy.
I although that if I should clear their 00M-155 check and yes that is when I came to recognize with my antique fine friend that killexams.com is the one that might be the boon for me because it got me my intelligence eventually lower back which I had misplaced for a while and I wish that this will never recover from for me getting my 00M-155 test cleared in the end.
wherein can i locate 00M-155 real take a look at questions questions?
As i am into the IT area, the 00M-155 exam, changed into critical for me to seem, but time restraints made it daunting for me to put together well. The easy to memorize answers made it a lot less complicated to prepare. It worked like a complete reference guide and i used to be amazed with the result. I referred to the killexams.com observe manual with 2 weeks to move for the exam. I managed to finish all the questions well beneath stipulated time.
Knowing thoroughly approximately my time constraint, began out attempting to find an smooth way out earlier than the 00M-155 exam. After an extended searh, determined the query and solutions through killexams.com which in reality made my day. Imparting all in all likelihood questions with their short and pointed solutions helped keep near subjects in a short time and felt happy to comfortable accurate marks within the exam. The materials also are smooth to memorise. I am stimulated and satiated with my outcomes.
00M-155 exam is not any extra hard to pass with these .
Its concise solutions helped me to accomplish top marks noting all questions below the stipulated time in 00M-155. Being an IT master, my competencies with respect are so forth need to be precise. now not withstanding, proceeding with a standard employment with giant obligations, it changed into no longer easy for me to take a stable making plans. At that point, i discovered out approximately the usually organized question and solution aide of killexams.com dumps.
Word of mouth is a very strong way of marketing for a product. I say, when something is so good, why not do some positive publicity for it I would like to spread the word about this one of a kind and absolutely incredible killexams.com which helped me in performing outstandingly well in my 00M-155 exam and exceeding all expectations. I would say that this killexams.com is one of the most admirable online teaching ventures I have ever come across and it deserves a lot of recognition.
00M-155 questions and answers that works in the real test.
I passed 00M-155 certification with ninety one percent marks. Your brain dumps are very much like real exam. Thanks in your terrific assist. I will keep to use your dumps for my subsequent certifications. When i used to be hopeless that i cant end up an IT certified; my friend instructed me about you; I tried your on line Training Tools for my 00M-155 exam and become capable of get a 91 bring about Exam. I own way to killexams.
“income performance administration solutions Market” record specializes in the world market fame, future forecast, increase opportunity, key market and key players. The examine targets are to latest the income efficiency administration options building in u.s., Europe and China.
…….revenue performance administration is the practice of monitoring and guiding personnel to improve their potential to sell items or functions.
The look at ambitions of this report are:• to research world income efficiency administration options reputation, future forecast, increase possibility, key market and key gamers.• To present the revenue performance management solutions building in united states, Europe and China.• To strategically profile the key gamers and comprehensively analyze their construction plan and techniques.• To define, describe and forecast the market by means of product class, market and key regions.
About usWe have a powerful network of excessive powered and skilled international consultants who have about 10+ years of event in the certain business to deliver fine research and analysis.Having such an skilled community, their functions now not best cater to the client who needs the fundamental reference of market numbers and connected high growth areas in the demand facet, but also they supply precise and granular suggestions the use of which the customer can truly plan the options with recognize to each give and demand facet.
Apr 15, 2019 (Heraldkeeper via COMTEX) -- Market analyze document LLC lately brought new title on "2019-2024 international data core Infrastructure administration (DCIM) solutions Market report" that offers an in-depth overview of trade and aggressive landscape, protecting numerous market segments and elaborates market outlook and status to 2024.
records middle infrastructure administration (DCIM) is the combination of tips know-how (IT) and facility management disciplines to centralize monitoring, administration and intelligent ability planning of a data center’s critical programs. finished throughout the implementation of specialized software, hardware and sensors, DCIM allows usual, actual-time monitoring and administration platform for all interdependent programs throughout IT and facility infrastructures.
The information middle Infrastructure management (DCIM) solutions market document items a detailed evaluation of this industry with admire to pivotal parameters. In essence, the research look at elaborates on presenting an intensive define of the enterprise house, focusing on the market share, boom opportunities, and product and software segmentation. also, the file provides an in depth gist of the prime vendors as well as revenue-producing geographies. In essence, the goal of the facts core Infrastructure administration (DCIM) options market record is to convey a concise summary of the trade when it comes to the existing and future eventualities.
The information center Infrastructure management (DCIM) solutions market file elaborates meticulously on the competitive spectrum of the trade, comprising businesses reminiscent of Nlyte, Panduit, Schneider electric powered, Sunbird, Vertiv, IBM, Ericsson, Eaton, Siemens, CommScope (iTRACS), Aplena, Atos SE, Legrand, Rackwise and Rittal.
mammoth particulars considering the income area and distribution were enumerated in the analyze. moreover, it incorporates fairly some information about providers, like the business profile, manufactured items, and many others.
The record also elaborates on the product earnings, expense prototypes, revenue procured, and earnings margins.
The research examine on the facts center Infrastructure administration (DCIM) solutions market additionally contains a lot of challenges which this company vertical presents as smartly because the influence they may have on the business developments.
With appreciate to the regional scope of the business, the statistics center Infrastructure administration (DCIM) solutions market has been split into united states of america, Europe, Japan, China, India, South East Asia by the document.
With appreciate to the product landscape, the information center Infrastructure administration (DCIM) options report segments the industry into Asset and skill management, power management and community management.
With recognize to the software landscape, the statistics core Infrastructure management (DCIM) options market research analyze splits the trade into BFSI, IT and Telecom, executive, fitness Care, Retails, Manufacturing and Others.
Houseboat is a boat that has been designed or modified to be used primarily as a house. The Asia Pacific region international locations akin to India, China, Japan and other is still the greatest houseboats growing market during the forecast length, whereas Europe is following them.
Pune, India -- (SBWIRE) -- 04/05/2019 -- global Care administration options Market 2019 by way of producers, regions, class and utility, Forecast to 2025 Care administration options Market record consists of a forecast of the next 5 years, beginning 2019 and ending 2025 with a number of metrics like give-demand ratio, Care administration options market frequency, dominant avid gamers of Care administration options market, using factors, restraints, and challenges. The record additionally contains market profits, revenue, Care management options construction and manufacturing cost that could support you get a stronger view on the market. The record focuses on the important thing global Care management solutions producers, to define, describe and analyze the income extent, value, market share, market competitors landscape, SWOT evaluation and development plans in next few years.
appropriate businesses in the international Care administration solutions Market: Exl Healthcare (Exlservice Holdings, Inc.), Axispoint health, Wellcentive, Inc., Phytel, Inc. (got via IBM organization), Medecision Inc., Zeomega Inc., Trizetto organisation, Allscripts Healthcare options, Inc., I2I techniques, Inc., EPIC organisation Inc., Healthsmart Holdings, Inc., Pegasystems Inc., Salesforce.Com, Inc., concord advice systems, Inc., Cerner organization And others.
CARE management options MARKETWAS VALUED AT USD 6.87 BILLION IN 2018 AND IS PROJECTED TO reach USD 29.11 BILLION by means of 2025, starting to be AT A CAGR OF 17.four% FROM 2018 TO 2025.
For complete understanding of market dynamics, the international Care administration solutions market is analyzed across key geographies namely: North america (U.S., Canada, Mexico), Europe (Germany, UK, France, leisure of Europe), Asia Pacific (China, Japan, India, relaxation of Asia Pacific), Latin america (Brazil, Argentina, relaxation of Latin the united states) And relaxation of the area.
-Key Strategic tendencies: The look at additionally contains the key strategic tendencies of the market, comprising R&D, new product launch, M&A, agreements, collaborations, partnerships, joint ventures, and regional increase of the leading rivals operating in the market on a worldwide and regional scale.
-Key Market features: The document evaluated key market facets, together with revenue, price, ability, capability utilization price, gross, construction, construction fee, consumption, import/export, deliver/demand, can charge, market share, CAGR, and gross margin. furthermore, the analyze presents a finished look at of the key market dynamics and their newest traits, together with pertinent market segments and sub-segments.
-Analytical tools: The world Care administration solutions Market file comprises the accurately studied and assessed statistics of the key industry gamers and their scope out there by using skill of a couple of analytical tools. The analytical equipment such as Porter's 5 forces analysis, SWOT analysis, feasibility study, and investment return evaluation have been used to analyze the increase of the important thing gamers operating out there.
Customization of the report: This document can also be personalized as per your needs for additional facts as much as 3 groups or countries or 40 analyst hours.Please connect with their income group ([email protected]).
About tested Market ReportsVerified Market reviews is part of the verified Market analysis which offers top class reports from over a whole lot of correct publishers worldwide. It has essentially the most frequent collection of market research reports, evaluation & forecast information for corporations and governments. They replace and increase their repository routinely to carry immediate on-line entry to the world's most finished and current database of professional insights.
The research specialists at tested Market experiences will support you to raise the scope and methodology of the experiences you select and should make sure on perceptive and aim assistance, convincing enough for you are taking a correct analysis purchase decision. a whole lot of SMEs across the globe are right now incomes wealthy surpluses from the brilliant insights supplied with the aid of the research experiences sourced via validated Market reports.
Looking for 00M-155 exam dumps that works in real exam?
We have Tested and Approved 00M-155 Exams. killexams.com gives the exact and most recent IT exam materials which practically contain all information focuses. With the guide of their 00M-155 exam materials, you dont have to squander your opportunity on perusing reference books and simply need to burn through 10-20 hours to ace their 00M-155 real questions and answers.
The most ideal approach to get achievement in the IBM 00M-155 exam is that you should procure tried and true braindumps. They guarantee that killexams.com is the most direct pathway toward ensuring IBM Information Management Solution Sales Mastery Test v3 exam. You will be triumphant with full surety. You can see free questions at killexams.com before you buy the 00M-155 exam items. Their impersonated tests are in various choice the same As the real exam plan. The questions and answers collected by the guaranteed experts. They give you the experience of stepping through the real exam. 100% certification to pass the 00M-155 real test.
killexams.com IBM Certification consider guides are setup by IT specialists. Packs of understudies have been crying that unreasonably various questions in such enormous quantities of preparing exams and study associates, and they are as of late tired to deal with the cost of any more. Seeing killexams.com masters work out this broad shape while still certification that all the data is anchored after significant research and 00M-155 exam. Everything is to make comfort for contenders on their road to 00M-155 accreditation.
We have Tested and Approved 00M-155 Exams. killexams.com gives the correct and latest IT exam materials which basically contain all data centers. With the guide of their 00M-155 brain dumps, you don't need to waste your chance on scrutinizing reference books and just need to consume 10-20 hours to expert their 00M-155 real questions and answers. Likewise, they outfit you with PDF Version and Software Version exam questions and answers. For Software Version materials, Its offered to give indistinguishable experience from the IBM 00M-155 exam in a real situation.
We give free updates. Inside authenticity period, if 00M-155 brain dumps that you have purchased updated, they will suggest you by email to download latest form of . If you don't pass your IBM Information Management Solution Sales Mastery Test v3 exam, They will give you full refund. You need to send the verified copy of your 00M-155 exam report card to us. Consequent to confirming, they will quickly give you FULL REFUND.
If you prepare for the IBM 00M-155 exam using their testing programming. It is definitely not hard to win for all certifications in the primary attempt. You don't need to deal with all dumps or any free deluge/rapidshare all stuff. They offer free demo of each IT Certification Dumps. You can take a gander at the interface, question quality and accommodation of their preparation exams before you buy.
BANGALORE, India, Oct. 25, 2017 /PRNewswire/ -- Teledyne LeCroy Inc., the worldwide leader in protocol test solutions, today introduced the Eclipse M42 Analyzer/Exerciser: a protocol analyzer and exerciser for the next generation of Gear 4 UniPro/UFS development. The Eclipse M42 Analyzer/Exerciser assists design and test engineers working in the high data rates and aggressive power management of the UniPro and UFS specifications over the MIPI [®] M-PHY physical interface. The Eclipse M42 delivers in-depth testing and analysis, automated quality testing as well as compliance/conformance verification in one powerful package.
The Eclipse M42 fully supports the MIPI [®] M-PHY v4.1 HS-G4, the MIPI UniPro [SM] v1.80 and the UFS v3.0 specifications. It also supports the upcoming MIPI UniPro Conformance Test Specification version1.80 and the recently released JEDEC JDS224A Universal Flash Storage (UFS) Test specification Version 1.1. Acting as a standalone protocol analyzer or as an analyzer/exerciser, the Eclipse M42 offers a complete protocol solution from analysis and traffic generation, to conformance or compliance testing and automated stress testing.
System developers and designers looking for a fully featured Gear 4 Analyzer/Exerciser can rely on the Eclipse M42. The Eclipse M42 platform, along with its UniPro M Series Protocol suite provide a robust system to capture and debug UniPro/UFS traffic. Through use of its advanced software suite, the Eclipse M42 is able to automatically identify and evaluate millions of packets, transactions and complete protocol sequences for conformance to the specification. Complex transactions such as power mode changes, and Link Startup Sequence events can be automatically analyzed many times, finding issues that even an expert engineer might miss. Using the Eclipse M42 exerciser provides conformance/compliance verification, as well as margin, corner case, and automated stress testing.
Teledyne LeCroy will demonstrate the Eclipse M42 at the MIPI DevCon in Bangalore, India on October 27, 2017 and at the MIPI DevCon on October 31, 2017 in Hsinchu City, Taiwan. The Eclipse M42 will be available for shipment in December of 2017. For pricing information, or to arrange a demonstration, contact the nearest Teledyne LeCroy Sales Representative.
Teledyne LeCroy Inc. is a leading manufacturer of advanced oscilloscopes, protocol analyzers, and other test instruments that verify performance, validate compliance, and debug complex electronic systems quickly and thoroughly. Since its founding in 1964, the Company has focused on incorporating powerful tools into innovative products that enhance "Time-to-Insight". Faster time to insight enables users to rapidly find and fix defects in complex electronic systems, dramatically improving time-to-market for a wide variety of applications and end markets. Teledyne LeCroy is based in Chestnut Ridge, N.Y. For more information, visit Teledyne LeCroy's website at teledynelecroy.com.
© 2017 by Teledyne LeCroy. All rights reserved. Specifications are subject to change without notice.
SEATTLE, WA--(Marketwired - Jun 19, 2017) - Tempered Networks, Inc. today announced that the new release of its Identity-Defined Networking (IDN) platform provides a unified PCI security architecture for enterprise and government organizations. The latest IDN platform release removes PCI systems and assets from scope through cloaking, micro-perimeter segmentation, machine authentication and authorization, and end-to-end encryption. These, and other controls, support Payment Card Industry Data Security Standard (PCI DSS) compliance requirements. The company also announced that it has partnered with Coalfire Systems, a qualified security assessor, to test and validate Tempered Networks' identity-based PCI micro-segmentation capabilities. A comprehensive report from Coalfire will be published by July 2017.
"A PCI compliant environment does not mean your network and assets are immune from attack, especially east-west lateral movement, which is why they continue to witness so many hacks of PCI compliant networks," said Erik Giesa, VP of Products at Tempered Networks. "Hacks against healthcare organizations alone have increased by 63% in 2016, according to a recent TrapX report. These organizations are still relying on IP address-defined policies that are subject to spoofing. Instead, their approach unifies PCI compliance with security, giving customers the best of both worlds. By using cryptographic machine identities for enforcement, local and wide area micro-segmentation easily removes systems from PCI scope, while cloaking PCI segments from bad actors. This capability is also ideal for achieving HIPAA and NIST Cyber Security Framework (CSF) compliance."
PCI compliance is essential to any organization that processes, stores, and transports payment card data. PCI DSS has strict guidelines that must be satisfied before any systems can be deployed. Tempered Networks' IDN platform helps organizations meet these stringent requirements through local and wide-area PCI micro-segmentation, providing a level of isolation and containment previously unattainable. The IDN platform enables organizations to fulfill specific PCI requirements in the following ways.
PCI machine authentication, authorization, and whitelist orchestration. PCI-DSS requirements have been written with traditional networking and security technologies in mind. Because firewalls, VPNs, and other access control technologies base their segmentation policies on spoofable IP addresses and VLANs which can be traversed, traditional segmentation is not only permeable but error-prone. With Tempered Networks' IDN software, access controls and policy enforcement are based on a machine's provable cryptographic identity. Every PCI machine authenticates and authorizes to other authorized machines before data transport can be established based on a machine whitelist. The machines then encrypt all data in motion creating an unbreakable local as well as wide-area network overlay.
Simple and centralized PCI orchestration. With new Smart Device Group capability, administrators can easily create pre-defined group policies for specific IDN PCI overlays. Only machine authenticated and authorized hosts can communicate within an encrypted IDN overlay. Using Smart Device Groups, automatically adding PCI resources to specific segments is simple, consistent, and predictable. The IDN solution's centralized orchestration engine, The Conductor, and its secure RESTful API makes PCI orchestration seamless and easy.
PCI-compliant controls and policy assurance. New PCI reporting capabilities created by the IDN solution help administrators ensure they have the proper controls and policies in place. To address policy guidelines for chain-of-custody requirements, the IDN solution ensures that only authorized administrative staff can access audit logs, which can be downloaded on demand by PCI auditors in an automated fashion.
Identity-based PCI micro-segmentation. Within the IDN fabric, the security and networking perimeter can easily be moved from the network edge to the PCI machines or hosts, creating hardened yet flexible secure micro-perimeters--without modifying existing infrastructure. Requirements for securing data-in-motion are addressed, since all whitelisted devices and associated traffic are automatically secured within PCI micro-segments using machine-to-machine AES-256 encryption. This capability supports PCI DSS v3.2 requirements across the LAN and WAN.
Reduce time spent on PCI audits. The IDN solution was designed with a manageability-first mindset, making ease-of-use through its intuitive orchestration engine a top priority. Because of this design principle, meeting PCI audit requirements is much simpler for IT personnel. Specifically, secure transport of logs, auditability of access to the system, traffic filtering, and audit reporting of system configuration changes, is easy using The Conductor and its new PCI reporting capabilities. Customers can reduce IT personnel time spent on PCI audits by 60 percent, on average.
"With Marcum's PCI practice, they pride ourselves on not only helping customers achieve PCI compliance, but also focus on ways to improve their overall security posture while saving time and money in the process," said Ted Carlson, President, Marcum Technology. "That's why we've partnered with Tempered Networks and we're excited about their new PCI compliance support. Not only does Tempered dramatically improve an organization's security posture with unique capabilities like wide area micro-segmentation and cloaking, but the simplicity of their solution can reduce PCI personnel time by as much as 62 percent."
Availability The new release of Tempered Networks' IDN platform is available now. PCI enforcement and reporting are included in the platform at no additional cost. The Coalfire Systems lab validation report will be available by Q2 2017. Please contact your preferred reseller for more information or contact [email protected].
About Tempered Networks Tempered Networks is the pioneer of Identity-Defined Networking (IDN), driving a new identity paradigm that basis trust on the host identity itself, not a spoofable IP address. Their IDN architecture unifies networking and security to overcome today's complex and inherently vulnerable networks. They provide the industry's most extensible networking overlay fabric, with automated policy-based orchestration, making it simple to instantly connect or disconnect any IP resource with another, located anywhere in the world -- on-premises, virtual or cloud. With IDN, local and wide-area micro-segmentation is now achievable and simple. It leverages your existing infrastructure, while eliminating future expenses on unecessary point networking and security products. For more information, visit www.temperednetworks.com.
You can also follow us @TemperedNW on Twitter or visit us on LinkedIn for more information about Tempered Networks and their technology.
Forward-looking statements. Certain statements contained in this press release may constitute forward-looking statements. Such statements include, for example, statements regarding the Company's or management's beliefs, expectations, estimations, plans, projections and similar statements. Any such forward-looking statements involve risks, uncertainties and other factors that may cause the Company's actual results and performance, or industry results to be materially different from any results or performance expressed or implied by such forward-looking statements. These forward-looking statements speak only as of the date of this press release and there can be no assurance that the results and events contemplated by such forward-looking statements will, in fact, occur. The Company expressly disclaims any obligation or undertaking to release any updates or revisions to any forward-looking statement contained herein. | 2019-04-23T16:03:06Z | http://smresidences.com.ph/practice-test.php?pdf=00M-155 |
CyberSmart! Curriculum A free k-8 curriculum empowering students to use the Internet safely, responsibly, and effectively. Contents: Curriculum Overview, Lesson Plans and Activity Sheets, Using the Curriculum, and Technology Standards Alignment.
Dewey Decimal System: An Introduction: A WebQuest for Category Specialists. Designed by Heather White.
Buddy Project: Teacher Resources. Lesson Plans. Site aims to help you integrate technology into the classroom with a 3-D model: Develop, Design, and Deliver.
Plagiarism Lesson Plans by Julia Jeffreys, College of Education, University of Illinois, Urbana-Champaign.
Plagiarism WebQuest by Dr. Alice Christie, Arizona State University.
"Thou Shall Not Plagiarize" - Plagiarism WebQuest. How to cite online sources by Mr. Bucci - Technology 8, Pomona Middle School, Suffern, NY.
Four Great Thinkers of the Past: A webquest concerning political philosophy, by Scott E. Pointon, Indiana University School of Education.
Philosophy: Questions and Theories for Grade 12, University Preparation, from Curriculum Services Canada (CSC). Unit 1: Metaphysics, 7 activities.
WebQuest: The Transcendentalist Spirit - American Transcendentalism from Shepherd University, West Virginia. Explore the Transcendental period as an age of reform. 19th century America proved to be a dramatic time of change in the area of women�s rights, slavery, education, publication, and industry.
Understanding Experimentation in Psychology: A Web Quest for Psychology 101 designed by Bernard Schuster.
English I Mythology WebQuest: Gathering Heroes from Clayton High School, Missouri.
Explorations from iwebquest.com. A Webquest to Inspire Good People Through the Exploration of Ancient Greek Mythology.
The Greek Mythology Web Quest created by Michelle Adair, et al. Last update: 2003.
Mr. Marassa's Greek Mythology Webquest for 7th Grade Reading, created by Mike Marassa.
Buddhist Studies for primary and secondary students. Including Handbook for Teachers.
Lesson Plans and Resources for Social Studies Teachers. Hundreds of high quality Lesson Plans for K-12 arranged alphabetically by title of Web sites, Teaching Strategies include everything you always wanted to know about how to put students online in your social studies classroom, Online Activities for K-12 include hundreds of Webquests arranged alphabetically by title of Web sites, Teaching Current Events Via Newspapers, Magazines and TV connects you to newspaper, magazine, and television Webquest activities sponsored by major corporations and educational institutions. Site also offers valuable links to Other Social Studies Resources.
Media Literacy: What is it? Why teach it? Media Education in Canada, Web Awareness for Teachers, Lessons and Resources for Media Education, Find a lesson by grade, by subject, or by curriculum outcomes.
Anti-Bullying Quest: A Web Quest for Primary Learners by Ms. Schopperth.
Bully Free Webquest created by Guida, an elementary school teacher. Webquest originated as an assignment for an on-line course offered through the University of Victoria, B.C.
Bullying WebQuest designed for Grades 6-8 by Christine Young. An InstantWebquest from InstantProjects.org.
A "No-Bullying Proposal" Webquest by Doug Peterson, Computers in the Classroom Consultant, Greater Essex County District School Board, Ontario.
Remembering September 11. Five Lessons.
A Look at the Population Density of the United States. Lesson Plans, Grades 9-12. This lesson focuses on the spatial distribution of the population density of the United States at different levels of scale.
Can You Afford to Retire?. From PBS FRONTLINE, for Grades 9-12 Social Studies, American Government, Current Events, Language Arts, Economics.
Schools Online from University of Illionois Extension. Grades 3-5 and up.
Black History: Exploring African-American Issues on the Web. Webquests include Little Rock 9, Integration 0? and Tuskegee Tragedy.
Encyclopaedia Britannica's Guide to Black History.
Famous African-Americans Webquest! by K. Brunner, Eisenhower School, Prospect Heights, IL. Oprah Winfrey, Muhammed Ali.
Little Rock 9 Integration 0. Collaborative WebQuest on Racial Desegregation in Schools, from Knowledge Network Explorer.
Sampling African America. Goal of sampling activities is for you to connect with issues related to Africa-American issues. Internet activities may be completed alone or by working in a group.
Education for Freedom. Lesson plans for teaching the First Amendment.
Photojournalist: Story on Women's Suffrage. A Grade 8 Webquest from Ontario History Quest. Your task is to create a photo essay that explores and reveals "The Real World of Women's Suffrage."
The Progressive Era. A Webquest by Mr. J. Teitler. Topics include Women�s Suffrage.
Webquest for Women's Suffrage. "This Web Quest has been designed to make you more aware of Equal Rights. You will have a better understanding of what women and minorities had to endure without the opportunity to voice their opinion where it would count - by voting."
Woman's Suffrage in Twentieth Century America. A WebQuest for 8th Grade (History) by Ellery Clark and Ana Elkins, San Diego State University, Educational Technology.
Women's Right to Vote. A Web Quest designed for fifth grade Social Studies and Language Arts by Melonie Smith.
Women's Suffrage WebQuest from TeacherWebquest. The class will be broken into five groups. Each group is to research its particular role and come up with arguments for or against women�s suffrage.
Election 2004: How to Run for President. Online activities, lesson plans, teaching strategies, time saving teacher management tools, and more.
Slavery in America. Freedom for Whom? A WebQuest on Slavery and the American Revolution by Dr. Allison Nazzal, State University of West Georgia, Carrollton, GA.
Slavery in the United States. Webquest by Crystal Folden, Lincoln Southeast High School, Nebraska.
Slavery WebQuest for Gr. 6-10 by Ms. L. Richard, Inverness Education Center/Academy.
Underground Railroad Webquest by Ms. Baumann, Mr. Bowman, and Mr. Haines, Greece Central School District, NY.
Underground Railroad Webquests. Annotated webquest links collected by Paula Laurita, BellaOnline's Library Sciences Editor.
WebQuests Links to Slavery and the Underground Railroad from Safe Passage: The Underground Railroad in Southwestern Ohio.
EconEdLink from EconomicsAmerica. Provides a premier souce of classroom-tested, Internet-based economic lesson materials for K-12 teachers and their students, with over 509 lessons.
Online elementary economics lessons. K-6 lessons.
Bank Notes - Bank of Canada. Learning Resources.
H.I.P. Pocket Change. History In your Pocket Lesson plans. Includes The 50 State Quarters� Program Lesson Plans for K-6.
The Death Penalty: Teacher Edition. Main Menu: Death Penalty Curricular for High School (Unit Lesson Plans), About the Death Penalty (Arguments For and Against the Death Penalty), State by State Data (includes Interactive Maps: Executions and death row inmates, by state), Courtroom Cases, Links and Resources.
21st Century Schoolhouse - Links to Free Work Sheets.
Academy of Achievement: Curriculum Center. Most materials prepared for Grades 4-6, 7-9, 10-12, and post Grade 12 containing audio, video and text. Wide range of topics include The Amazing Olympics, Architecture, Black History Month, Earth Day, Entrepreneurs, Freedom and justice, Martin Luther King Day, Poets and poetry, and others.
AskERIC Lesson Plans. The Educator's Reference Desk. Collection contains over 2000 unique lesson plans written and submitted by teachers from all over the United States.
Class Activities that use Cooperative Learning.
Classroom Resources, Classroom Internet Library from New Hampshire Public Television (NHPTV) Knowledge Network.
Canadian, eh? Learn a little about Canada webquest by E. Malick, Grade 6, John F. Kennedy School.
Eat Well ~ Feel Swell. A WebQuest on Nutrition for Grades 5 & 6 by Carol Ann Okpro, John F. Kennedy School.
Famous Canadians. A WebQuest for Grades 5 & 6, designed by Gerald Robillard (Our Lady of Peace School) and Bob Colvil (Knowlton Academy).
Computer Teaching Lesson Plans: Web Quests from Online Teacher Resource.
edHelper.com. With links to 2500 lesson plans.
Free Lesson Plans for Tired Teachers of Maths, Science, English, Computer and Social Studies from Lesson Plans.com.au.
The Gateway to Educational Materials (GEM). Search or browse The Gateway to find high quality educational materials, including lesson plans, activities, and projects from GEM Consortium member sites. Options: Simple Search, Browse Subjects, Browse Keywords.
Highschool Webquests. Created by Bob Stevenson. Pick A Subject from: Math, Science, Social Studies, Language Arts, Technology, Foreign Language, Business and Economics, Art and Music, Health and Physical Education, Life Skills and Careers.
Illuminations from National Council of Teachers of Mathematics (NCTM). 90 online activities, 524 lessons for preK-12 math educators, Principles and Standards for School Mathematics outlines the essential components of a high-quality school mathematics program, plus links to useful mathematics education resources on the Internet.
Learning Center (Library and Archives Canada - LAC). A collection strong in history, literature and music, including websites, educational tools, and digitized primary sources (printed documents, diaries, maps, illustrations, paintings, manuscripts, and printed and recorded music) from LAC holdings.
Lesson Planet. Search 150,000 Teacher Reviewed Lesson Plans.
Lesson Plans Library from Discovery Education. Site provides kindergarten, elementary, middle school and high school lesson plans for all major school subjects. Browse by subject, grade, or both to find hundreds of original lesson plans, all written by teachers for teachers. View all K-5 lesson plans, View all Grades 6-8 lesson plans, View all Grades 9-12 lesson plans.
LessonPlansPage.com. Over 3000 free lesson plans. Includes Lesson Plan Guide: 10 Steps to Developing a Quality Lesson Plan. (Pop-up ads).
Media Workshop New York: High School Webquests.
Nellie's English Projects: High School WebQuest Tasks (ages 15-18). Scroll bar on the left. See also Junior High School WebQuests (ages 12-15), and Elementary School WebQuests Grades 4-6 (Ages 9-12), and other resources.
The New York Times Learning Network. Teacher, Student and Parent Connections. Daily Lesson Plans for Grades 6-12 covering all major subjects. Includes lesson plan archive and lesson plan units.
A Rubric for Evaluating WebQuests. Original WebQuest rubric by Bernie Dodge. See also Cooperative Group Rubric from Cinco de Mayo.
Lesson plans, worksheets, activities, clip art, reading, math, science, social studies, and more. Hundreds of educational websites rated by popularity.
Student Web Quests. Six webquests designed by students from Mrs. Allnutt's Class.
Surf Report: Online Projects from Wisconsin Educational Communications Board (ECB). K-12. Projects range from simple to complex. Variety of topics: Feeding Minds, Fighting Hunger, Who Am I? Seasonal Changes through our Eyes and Yours, and others.
Teaching Tool: WebQuests from Educational CyberPlayGround™. Links to Elementary School WebQuests, Teaching Tool for Music WebQuests, Teaching Tool for Math WebQuests, Teaching Tool for Art WebQuests, Teaching Tool for Linguistics WebQuests.
Teaching with the Web. Choose a category: K-2, 3-5, 6-8, 9-12. High School WWW Resources subdivided into: Fine Arts (Art, Drama, Music), Language Arts (Grammar, Literature, Mythology, Public Speaking, Writing), Math, Science (Astronomy, Biology, Chemistry, Geology, Physics), and Social Studies. Lots of great links, Hotlists, and WebQuests.
Teaching with WebQuests. Suggested links to The Best Wequests on the Net, including: 1998 WebQuests - Body Builders, Desert Biome, Fast Food Nutrition, Comets, Viruses and lots more; 1999 WebQuests - Endangered Animals, Electrical Circuits, Flowers, Properties of light, Electromagnets and lots more; and 2000 WebQuests - Genetics, Dinosaurs, and Mammals.
Template to Create a WebQuest - Put the Title of the Lesson Here - Teacher Page. Student Template. From English Montreal School Board, Montreal, QC.
ThinkQuest New York City Library - Learning with the Power of Technology. Well organized collection of websites created by students and teachers in New York City. Search by Categories: Arts & Entertainment - Music; Books & Literature - Plays, Poetry; Business & Industry; Computers & the Internet - Programming; Education; Health & Safety - Food; History & Government; Languages & Language Arts; People & Places - China, New York City; Philosophy, Religion & Mythology - Greek; Reference & News; Science - Astronomy & Space, Biology, Geology; Society & Culture - China, Egypt, Greece; Sports & Recreation - Basketball; Technology.
Understanding and Using WebQuests. Workshop Resources by Midge Frazel.
Web-Based Lesson Plans. This collection of six lesson plans is designed for Adult Education but may be adapted for high school or ESL usage. Lesson topics include: Introduction to the Web, Women's History, and Learning English Using Fables.
WebQuest Collections. Updated by Bernie Dodge, San Diego State University.
WebQuest: Connecting Students to the World from Guilford County Schools, Greensboro, North Carolina. Select WebQuests by Grades: K-12, Select WebQuests by Subjects: Language Arts, Math, Science, Social Studies, The Arts, Vocational.
WebQuest Directory from Sir Wilfred Laurier School Board, Quebec, Canada. Includes links to Elementary and Secondary Unit Plans.
The WebQuest Page. Topics covered: How to develop and create Web-based lessons, WebQuests and other Internet projects. Includes an online lesson plan collection for K-12 plus Big6 Lessons. Site provides a ready-to-use Student Webquest Template and links to additional materials and resources.
WebQuests Based on Literature selected by Bernie Dodge, San Diego State University.
WebQuests from Vicki Blackwell's Internet Guide for Educators.
WebQuests from webTeacher. Topics include: Introduction to WebQuests, Examining WebQuests, Building Your Own WebQuest, Preparatory Work, Designing the Process, Implementation, plus Additional Resources.
WebQuests Across the Curriculum by Edmund J. Sass, Ed.D. More than 350 WebQuests and WebQuest Resources. Examples of WebQuests by Subject: Art, Geography, Health/Nutrition, History, Language Arts, Literature for Adolescents, Literature for Children, Mathematics, Music, Political Science/Government, Psychology/Sociology, Religion, Science, World Languages.
WebQuests for Kids developed by Kathi Mitchell. Links to selected webquests (K-12) under categories: Social Studies, Science, and Other Topics.
Webquests: Third Grade Ideas. Animal Life Cycle Webquest, Creepy Crawler Insects, The Moon's Many Faces, Map Advenures, Simple Machines Webquest, Fun with Fables, Econ-o-Mania, Weaving Charlotte's Web, Journey of a Monarch Butterfly Webquest.
Weekly Online Lessons from Learners Online. Each week, Learners Online publishes a new online lesson that takes learners on a thematic journey across cyberspace. Lessons are tied to current events and help learners extend their knowledge on a wide range of topics. Includes Lesson Archives for Grades 3-12, but mostly for 7-12.
Welcome to the World of Webquests. A Webquest of Webquests: Selected list of 152 WebQuests available on the Web in no particular order.
Wired Learning - Filamentality. Web-based lessons, activities and more. Filamentality is a fill-in-the-blank interactive Web site that guides you through picking a topic, searching the Web, gathering good Internet sites, and turning Web resources into learning activities. Site includes Videoconferencing, Activities, Projects, Resources, Lessons, and Tools.
Xpeditions - National Geographic.com - Lesson Plans, K-12 - Complete List.
Christmas Trees & More - Education. Including Christmas Tree Education Kit: The Virtual Christmas Tree Farm from Ontario, Canada. See also Lesson Plans, The Life of a Christmas Tree - Video clips of the life of a Christmas tree, and more.
Aesop's Fables. WebQuest by Carol Lundeen, Catawba County Schools, Newton, NC.
Aesop's Fables: Fables Webquest for 5th Grade by Brenda Neil, Marceline R-V Schools, Marceline, MO.
Fairy Tale WebQuest by Sofie Maurice and Crystal Pearl-Hodgins, Ecole Whitehorse Elementary, Whitehorse, Yukon Territory, Canada.
Fun with Fables. Is it a fable or a fairy tale? WebQuest by Mary Jo Creech, Guilford County Schools, Greensboro, NC.
Having Fun with Fables. Fable WebQuest by Debbie Hourigan, Live Oaks Elementary School, Milford, CT.
The Realm of Fairy Tales. An Original WebQuest for grades 4-5 by Judy Hoke. See also other Fairy Tale Webquests.
Arthurian Legends WebQuest! from Moraga School District, Moraga, CA.
Castles, Knights, and Gwen of Air. A WebQuest for Basic English 9, designed by Ms. Kelly Cavanaugh, McCutcheon High School, Lafayette, IN (based upon a design by Dawn Wasson).
King Arthur's Round Table Roll Call. A WebQuest by Robin Pulido.
Webquest: Arthurian Legends and Lore. A King Arthur WebQuest from South Harrison Community School Corporation.
Bullfighting Webquest: The Spanish Tourism Board Wants You! Created by: Erin Curry, Deb Marks & David Marks. When task is completed, new knowledge you gain may include: A better understanding of Spanish culture, history, and language; Skills to help you when traveling in Spain; and more.
Deutsch - German. All units designed and written by Andrew Balaam. Contents include: Beginners units, Grammar units, Topics units, Crosswords and Quizzes. This site is for students to learn the German language with exercises to reinforce learning.
Foreign Language Webquests: French, German, Japanese, Latin, Spanish from Rogers Public Schools, Rogers, AR.
French Speaking Countries Web Quest by Shawn D. Hintz, Nicholas Orem Middle School, Prince George's County, MD.
Grades 9-12 Foreign Language WebQuests.
A Horse is a Hoarse, Of Course, Of Coarse. A Lesson Plan on Homonyms/Homophones, from Large Collections of Language Arts Lesson Plans.
Bones Inside Us. Internet Scavenger Hunt by Vicki Blackwell.
Brainy Web Quest. A webquest about the brain.
Frogs - Science Web Quest by Beth Zemke, Irvine Unified School District, Irvine, CA.
Human Skeletal System. A Web Quest for 4th and 5th Grade designed by Cindy Boguen.
Journey to Alaska's Glaciers: Webquest to Explore How Glaciers Shape the Land from iwebquest.com.
A "Rock Hound's" Webquest: Exploring Rocks and Having Fun from iwebquest.com.
Women in Science by Lorna Holtman.
Look Who's Footing the Bill. An Introductory WebQuest on Democracy and the National Debt.
Math Magazine WebQuest. An Internet WebQuest on mathmagazine by Ms. Russo, Merrick Avenue Middle School, Merrick, NY.
Math Web Quests from Online Teacher Resource.
Would You Recommend It? A Webquest on Evaluating Math Games.
Astronomy Activities written by Jane Mena-Werth and Dr. Jos� Mena-Werth. Astronomy lesson plans for teachers of kindergarten through high school.
Astronomy Lesson Plan Links from Science Spot.
Astronomy Webquest: Determining the Age of the Universe! From Hamilton Southeastern High School, Fishers, IN.
Webquests: Using the Internet to Teach Astronomy from Canadian Astronomical Society. Resources for Teachers.
Educational Activities: Web-based Astronomy and Astrobiology Lessons. A team of master teachers, university faculty, and NASA researchers have created a series of web-based astronomy and astrobiology lessons for the CERES Project. These classroom-ready activities for K-12 students. Webquests and Lesson Plans include: A Case of the Wobbles: Finding Extra-Solar Planets for Grades 9-12. MarsQuest! for Grades 5-8. Birthday Moons for K-4.
Instructional Materials in Astronomy from CIN.org.
Moon Quest: A Lunar Journey! From Mr. Conant's Science Web Site, Briscoe Middle School, Beverly, MA.
Open Astronomy Curricula. Astronomy lesson plans for Kindergarten through Grade 12 students.
Planetary Web Quest for Grades 7-9 Science, by Nancy Chatteinier, Davis Joint Unified School District, Davis, CA. See Web Sites with information on the Planets for more resources. Check out also Nasa's Imagine the Universe and Within Our Solar System.
Earth from Space. Lesson plans from Smithsonian Institution, for Gr. 5-12. Remote sensing can be useful in studying numerous disciplines, from biology to ecology to geography. Grade level and standards are noted beside each lesson plan. Free download of Earth from Space Activity Guide - in PDF, 7 pages.
An Internet WebQuest: Roller Coaster Physics. A McGraw-Hill Glencoe Science WebQuest. Your job in this WebQuest is to find out how roller coasters work and use this information to build a simple model of a roller coaster.
PhysicsQuest. High School Physics Online Investigations. Quests include: Linear Motion, Projectile Motion, Isaac Newton, Conservation of Energy, Waves, Lawnmowers and Physics, Light and Color, Electrostatics, Einstein, Roller Coaster Physics, Atomic and Nuclear Physics, and Exploring the Planets. (Pop-up ads).
The Great Sleep Over: Eat, Drink, and Stay Within Budget. An Integrated Unit for Grade 3/4 by Etienne Lantos, Queen's University, Faculty of Education. PDF version, 88 pages.
Learning Math: Measurement from Annenberg / CPB. 10 sessions. Last session explores ways to apply concepts of measurement learned in K-8 classrooms. Watch Videos Online.
MCA Learning Units: Measurement. Units and Conversions, Perimeter, Area, Volume.
Measure It! from FunBrain.com. Easy, Medium, and Hard Centimeters, Easy, Medium, Hard, and Super Brain Inches. Includes K-8 Teacher Resources.
Ocean Explorer: Education Lesson Plans direct access to 85 lesson plans developed by scientists and educators. Grades 5-12.
Twister Tracking. Lesson Plans, Grades 9-12. In this lesson, students will use a database to learn about, organize, and compare tornadoes in their home state and across the country.
The Cloud Case: Teacher's Guide from WeatherEye. Interactive online lesson designed for grades 5 - 8.
Cloud Webquest for Sixth Grade Science by Marty Breazeale.
It's in the Clouds. An Internet Treasure Hunt on clouds by Ms. Foley, Claypit Hill School, Adams Lane, Wayland, MA.
Salt and Germination - in PDF, 10 pages. Lesson 12 - Germination Experiment from ABC Science Online, Australia.
Salt Water Properties, an Inquiry Investigation. An Examination of How Salt�s Impact on Water Affects Everyday Life by David R. Wetzel, from Suite101.com.
DNA Analysis. Lesson plan from Teachers Domain. Objectives include: Understand how DNA fingerprinting can be used in criminal investigations, Interpret DNA fingerprints, Explore other uses for DNA fingerprints, Understand where DNA is located and the role it plays in the body.
Genetic Lesson Plan Ideas from Genetics Education Center, University of Kansas. Including Forensic DNA (fingerprinting, solving crimes, law, courtroom lesson plans and references).
Human Genetics: A Worldwide Search for the Dominant Trait - Do You Have It? During this project, students (ages 12-18) will complete surveys, formulate hypotheses, and use the data compiled by students around the globe to test their hypotheses.
The Topic: Trees and Forests. Complete A Trees and Forests WebQuest. Select from 10 webQuest projects.
Trees & Forests: A WebQuest for 6th Grade Science by Shonna Barth, Bob Buday, Jim Kaupp, and Ray Hoger.
Computers - Webquests, Lesson Plans. Saskatoon (East) School Division Teacher Resources.
LEGO� Robotics Invention WebQuest. This lesson will teach students the basics of design, building, and programming so that they can create a robot to do whatever they want it to do. Lesson designed for students familiar with Lego Mindstorms Invention System parts, programming environment, and engineering team groups.
Robots. Grades 6-8. Roberts - Technology/Human Body Lesson Plan from DiscoverySchool.
ToxMystery: What's Wrong in This Room. An interactive learning site for kids from the 7-10 year old age range, from U.S. National Library of Medicine, Bethesda, MD. Includes Parent and Teacher Resources: Activities for Students. Provides a fun, game-like experience that introduces children to some of the potential health hazards around the house. Activity covers some pretty big words for this age group: arsenic, carbon monoxide, chromium, asbestos, ozone, benzene, phthalates, radon, etc. that many older students can learn a lot playing this game. Program is very forgiving with correct answers given.
Grades 9-12 Health/PE WebQuests. WebQuest Examples.
Health WebQuest - Grade Eight AIDS WebQuest by Brenda Kahn, School Library Media Specialist, Haworth Public School, Haworth, NJ.
Personal Health WebQuest. College of Education, Wichita State University, Wichita, KS.
Garden-Based Learning. Philosophy, Activities, Projects: On-line lesson plans and more-involved projects, Resources, Evaluation, Links.
Hoodia Hoodoo by Brooks Jackson, from FactCheckED.org. Students will assess the credibility of various Internet sites that advertise and review Hoodia weight-loss products. Lesson plan in PDF.
Art Exhibit. A WebQuest for 6-9th Grade Art, designed by Cathy Nolan.
Arti FAQ 21OO Directory from ThinkQuest. Contents include: Cave Art (Prehistoric, Egyptian), Classical Art (Greece and Renaissance), Modern Art (Realism, Abstract Expressionism), Pointillism (Impressionism, Cubism), Pop Art (Futurism, Pop Art), Present (Mona Moo, Millenaire), Quiz, and more.
Arts Connected from Minneapolis Institute of Arts and Walker Art Center. Includes full-color digital images of works of art, audio and video samples.
Avalon Arts Studio: Ideas for Teachers. Art ideas, art recipes, 3D art, printmaking, painting, watercolors, paper art, non-messy art, and more. (Pop-up ads).
Elementary Art Lesson Plans by Sandy Meadors, Art Teacher in Indianapolis, IN. Hands On Art (Hands-on Lesson Plans), Computer Art (Computer Graphics Lesson Plans), Resources (Technology Hints Links and Websites, Regular Art Hints, Clipart, Inspiration and Quotes, Handouts and Templates, Humor, & Vocabularies), Stitchery.
Impressionism WebQuest from TeacherWeb Teacher. WebQuest for 9th-12th Grades (Art Through the Ages curriculum) by Stanley F. Gilmore, Jr.
Skyscraper Web Quest by Amy B. for Grades 4, 5, 6. Data management and probability. Investigates 3 characteristics of various skyscrapers around the world: total height, number of stairs, and elevator speed. Solutions - in PDF. From Queen's University, Faculty of Education.
Comic Strip WebQuest by Edie Alridge, School of Library and Information Science, Indiana University Purdue University-Indianapolis, IN.
Daryl Cagle's Professional Cartoonists Index. A unique resource with the largest collection of newspaper editorial cartoons on the web. Updates current cartoons from 54 newspaper editorial cartoonists. Lesson plans for Elementary, Middle, and High Schools.
WebQuest Animations & Cartoons. A WebQuest to create animations and cartoons by Michele Plagman, Aitkin Community Schools, Aitkin, MN.
Famous Paintings: Art Appreciation Lessons for Kids. An art web quest for children in elementary and middle school, biographies of famous artists, free art worksheets.
Getting to Know Pablo Picasso: Artist WebQuest by MaryJo Clark.
Country Music WebQuest. WebQuest on Patriotic Themes in Country Music by Pam Petty, for Grades 5-8. This WebQuest provides opportunities to explore some Country Music songs that reflect symbols of freedom found in the United States of America. WebQuest was noted as one of the "Top Ten" best sites on the Internet for the study of American symbols of Freedom.
Mozart and Salieri: Professional Jealousy or Murder? Webquest: Did Antonio Salieri poison Wolfgang Amadeus Mozart?
Music for Folks. A Web Quest on American Folk Music by Pam Dumey, Cape Girardeau Public School District, Cape Girardeau, MO.
Music Lesson Plans and WebQuests - Classroom Internet Library from New Hampshire Public Television (NHPTV).
Tejano Music. WebQuest by Barbara McGregor, Nashua-Plainfield High School Nashua, IA.
A Web Based Introduction to Basic Music Theory and Music Composition by Chad Sowers, Nashua-Plainfield High School, Nashua, IA.
Black History Stamps. Lesson plan for Grades 7 & 8, Social Studies. Students learn about lives and contributions of many black Americans honored on U.S. commemorative postage stamps. Lesson emphasizes finding, organizing, synthesizing and communicating information.
Curriculum Guides for Educators. Resources from National Postal Museum, include: We Were There: Letters From the Battle Front Grades 7 - 12. Activity book and resource guide that uses historic letters, envelopes and commemorative stamps from American wars to engage students in historic analysis.
Design a Postage Stamp for Black History Month by Marilyn J. Brackney for History, all levels.
Design a Postage Stamp Lesson Plan from Lesson Plans.com.au. Grades 4 - 7. Activity using Microsoft Publisher.
Native Americans Webquest by Cindy Proctor. "You have been commissioned by the United States Postal Service to develop a series of postage stamps for the coming year to commemorate Native Americans. These stamps will be used all over the United States and even put into stamp collections." Grade 4 Social Studies. Webquest idea may be adapted for higher grades and for different topics.
JazzKids: Lesson Plans from PBS. Online activities are designed for students in grades K-5, with accompanying lesson plans for language arts (LA), social studies (SS), music (MU), and math (MA) teachers.
Jazz Webquest by Vasalaki Thomas, Sylvester, GA.
Jazz: What a Wonderful World. Resources on Jazz music and Jazz Musicians, by webquest scholars: Kari Kraenzler, Nick Lane, Susan Schram and James Samz.
Stephen Foster - Teacher's Guide: Suggestions for Active Learning, from PBS. American Experience: Stephen Foster - Main page.
History in Film. In depth description and analysis of major films. Arranged by categories: 16th to 18th century, the American Civil War, 1910s to 1930s, World War II, Vietnam War, and other films including Godfather, My Fair Lady, The King and I, and more.
The Polar Express Book and Movie WebQuest by Dr. Pam Petty and Block 1 Students, Western Kentucky University, Bowling Green, KY.
EdGate: Gateway to the Summer Games. Cross-curricular Olympic-themed lesson plans.
CyberGuides: Grades 9-12. Literature titles include: The Adventures of Huckleberry Finn, All Quiet on the Western Front, Black Like Me, The Canterbury Tales, The Crucible, Cry, the Beloved Country, The Glass Menagerie, The Grapes of Wrath, Great Expectations, Night by Elie Wiesel, The Odyssey, Of Mice and Men, The Pearl, The Pigman, Edgar Allan Poe (Author study), Virginia Woolf (Author study), and more.
#2655. Edgar Allan Poe Webquest for Grades 8-12. Literature, level: Senior, by Melanie McIntyre, Indiana University of Pennsylvania, Indiana, PA.
All About Poe - Teachers� Instructions - Student Activity Plan for Grades 6 -9, Student Directions from Thinkport's Student Activity Center. Knowing Poe - Main page.
Edgar Allan Poe Collection - Enoch Pratt Free Library. Digital Collections of Edgar Allan Poe. See portrait of Edgar Allan Poe, wooden fragment from the coffin of Edgar Allan Poe, letters from Edgar Allan Poe to Maria Clemm and others, lock of hair of Virginia Clemm Poe, wife of Edgar Allan Poe, and more.
Edgar Allan Poe: Father of Horror. A WebQuest for 8th Grade Language Arts by Becky Oakley and Cynthia Wilson, Southern Middle School, Aberdeen, NC.
Edgar Allan Poe: Lesson plans, biography, and teaching resources from Web English Teacher.
Edgar Allan Poe Webquest from Indiana University Southeast. Task: "Imagine it is sometime in the 1840's, and you are Edgar Allen Poe. One of the selected works provided is not complete. It is up to you to finish this masterpiece." Includes link to The Works of Edgar Allan Poe (1809-1849) - Biography, Resources, Poetry, Prose.
Edgar Allan Poe Webquest by Jos� A, M�ndez Crespo.
Modeling Reading and Analysis Processes with the Works of Edgar Allan Poe. A ReadWriteThink Lesson Plan / Webquest on Edgar Allan Poe for Grades 6-8, by Lisa Gaines, Hoover, AL.
Folger Shakespeare Library - Resources for K-12 Teachers. Teaching Shakespeare Lesson Plans, Primary Sources, Study Guides, and more.
Hamlet on the Ramparts, joint venture of Folger Shakespeare Library and the MIT Shakespeare Project. Multimedia exploration of Hamlet, complete with film, primary source materials, lesson plans, and tutorials.
In Search of Shakespeare - Lesson Plans designed to enrich classroom study of Shakespeare's plays and Elizabethan England, from PBS. Activities created by a team of educators for use in elementary or secondary school classroom settings.
Ancient Civilizations. An Integrated Unit for Grade 5 by Cindy Galpin, Beth Butler, Helen Hart, and Pauline Beder, Queen's University, Faculty of Education. PDF version, 89 pages.
Kidipede - History for Kids - Europe, Asia, and Africa before 1500 AD. Teacher's Guides for History for Kids.
The Middle Ages: Storytelling Webquest for elementary and middle students. Learn about the people of the Middle Ages, Castles, and Knights by studying their Tales and Legends.
SCORE History / Social Science. School of California Online Resources for Education, K-12.
Medieval Times - Heritage and Citizenship. An Integrated Unit for Grade 4 by Anna Portolese, Rita Zanatta, and Betty Goulden, Queen's University, Faculty of Education. ">PDF version, 130 pages.
A Blast from the Past An Integrated Unit for Grade 3/4 by Mary Watson, Queen's University, Faculty of Education.PDF version, 83 pages.
Ancient Egypt. Mrs Donn's Lessons & Activities for K-12 teachers & students.
Ancient Egypt Webquest from iwebquest.com for elementary and middle students. Learn about Ancient Egyptian daily life, Egyptian mummies, Egyptian Hieroglyphics, King Tut (Tutankhamen), Egyptian games, and Archeology.
Roman Empire: In the First Century for Educators from Public Broadcasting Service (PBS). Lesson plans for students to learn about the daily life of ancient Romans and to gain a better understanding of the significant achievements and contributions made by the Romans.
All Quiet on the Western Front: World War One Web Quest for Mrs. Adams' Sophomore Class, in Preparation of Studying Erich Maria Remarque's All Quiet on the Western Front. It was supposed to be "The War to End All Wars."
The War to End All Wars. World War I WebQuest by Barry Sovel. Use primary sources to explore the experience of different participants' roles in World War I and what it may have been like to have been in 'their shoes'.
WebQuest for Information on WWI by D Reiter, Longwood Central School District, NY.
World War I: Weaponry, Tactics, and Propaganda. Webquest by P Ells, Scott Middle School, Lincoln, Nebraska.
World War I Webquest by P Hewitt, Davison High School, Davison, MI.
World War 1 Webquest "And You Are There...". A World War I Webquest by Kathy DeFonzo, Louise Uchaczyk, and Richard Walter, Joseph A. Foran High School, Milford, CT.
BBC - Children of World War 2 (1939-1945). Find out what life was like for children in the Second World War. Includes a section for Teachers and Parents covering Curriculum Relevance, Lesson Plans, Printable Worksheets, and Online Activities.
A Separate Peace: A Teenager Experiences World War II by Sally Hursey.
What I Did During the War: From Grandpa's or Grandma's Scrapbook: A World War II WebQuest by Joyce Valenza, Len Arlen, and Chris Shelly.
World War II. A 42eXplore project.
World War II: In Defense of Freedom. A WebQuest for 11th Grade US History & Language Arts, by Carolyn O. Burleson.
World War II Web Quest. How would history have been changed, if Pearl Harbor had not been bombed? A WebQuest for 7th Grade (World History), by LuAnn Stillwell. See also World War II Web Quest by B Nickleman.
Trailing the Samurai's Tale. An Internet WebQuest on The Samurai's Tale by Erik Haugaard. WebQuest by Dan Fickett, Bonita Vista Middle School, Chula Vista, CA.
The Trail of Tears and the Forced Relocation of the Cherokee Nation. Teaching with Historic Places Lesson Plans from National Park Service, Washington, DC. *Special note to teachers: This lesson uses the terms commonly used during the 1830s to refer to men and women of English and European origin and to members of native tribes as "whites" and "Indians." This lesson could be a part of a history unit on American Indians, Jacksonian America, Manifest Destiny, or westward expansion, a social studies unit on cultural diversity, or a geography unit on demography. Time period: 1820s and 1830s. Includes: Relevant United States History Standards for Grades 5-12.
Canadian Wartime Experience from Archives & Special Collections of University of Manitoba. Grades 4 & 6 materials cover life and times of Louis Riel and the Red River Resistance. Grade 9 material covers Peacekeeping, Human Rights, and Canada's Role in World Conflicts. Grade 11 material covers Canadian involvement in World War I and World War II, including soldiers' personal accounts.
Ontario History Quest. Discovering Documentary History 1820-1970. For Grades 7, 8, 10 and 12. Choose a grade to begin your quest to learn about Ontario history. Explore the past from images of original letters, diaries, pictures and other documents.
Statistics Canada - Teachers Learning Resources. Teaching Tools include Lesson Plans sorted by level and subject.
Virtual Museum of Canada Teachers Centre. Teaching Resources include: Lesson plans, online educational games for kids, and fun learning activities.
Lincoln's Reconstruction Plan - Lesson Plan 2 for High School by Rosanne Lichatin.
The Emancipation Proclamation through Different Eyes - Lesson Plan 3 for Middle School by Gregory Segovia.
Past Issues: Archived lesson plans.
American Revolution or Revolutionary War. Links to WebQuests under section: Complete a Revolutionary War WebQuest.
The Boston Tea Party: Costume Optional? Gr. 6-8 lesson plan from EDSITEment. Find out what really happened at the Boston Tea Party and other famous tea parties held to protest British taxes. See also Revolutionary Tea Parties and the Reasons for Revolution.
The Civil War through a Child's Eye. Lesson Plans from the Library of Congress.
Constitution Day Resources for Educators. Include Classroom Activities, Discussion Starters, and Lesson Plans. Constitution Day is September 17. Compiled & Updated by Lianne Hartman, Reference/Instruction Librarian, Lourdes Library, Gwynedd-Mercy College.
Crossroads. A K-16 American History Curriculum. Topics covered: Background Material, Essays, Curriculums covered: Elementary, Middle School, High School, and Postsecondary.
Dear King George III: A webquest on the American Revolution for 5th grade, author unclear. Original webquest possibly designed by Paula Anderson? Site from Dedham Public Schools, Dedham, MA. Includes links to Words and Music to Yankee Doodle and Games.
Ken Kantor's Links to History Webquests including United States History.
The Learning Page: Teacher Resources - Lesson Plans Index by Themes, Topics, Disciplines or Eras from the Library of Congress. Lesson Plans by Title.
Lessons of Liberty from Liberty Memorial. Download lesson plans: Courage and Honor Lesson Plan - in PDF for Gr. 5-6 (8 pages). Patriotism Lesson Plan - in PDF for Gr. 7-8 (12 pages). Sacrifice Lesson Plan - in PDF for Gr. 9-12 (9 pages).
Parents and Teachers Guide for www.whitehousekids.gov. Whitehousekids.gov is an educational opportunity for young Americans to learn about the White House and the President through fun and exciting features. Includes Lesson Plans. News for Kids, Math Challenge, Quizzes and Games, Photos, Videos, History, Tours, Pets, Traditions, Sports, Patriotism, and more.
Presidential History Resources. Include Epic Story of the Presidency and Historical Documents.
Travel the United States. Webquest by Chris Yancone, Johns Hopkins University, Center for Technology in Education.
Who Started the Fire? A WebQuest for 11th Grade American History by Julie Haines, Jackson High School, Jackson, OH.
Born on a Mountaintop? Davy Crockett, Tall Tales, and History. Lesson plan for Gr. 3-5. Subject Areas: Art and Culture - Folklore, History and Social Studies - U.S. History - The West, Literature and Language Arts - American, Biography.
American Aloha Lesson Plan: Perpetuating Indigenous Cultural Traditions in Diaspora. Grades 10-12. Subjects covered: History, Social Studies, Language Arts, Multicultural Music and Dance Appreciation. | 2019-04-21T13:13:19Z | http://www.geocities.ws/researchguide/webquests.html |
I have been in South America this week, speaking nine times in five days, interspersed with lots of meetings. The conversation kept coming back to the prospects for the dollar, but I was just as interested in talking with money managers and business people who had experienced the hyperinflation of Argentina and Brazil. How could such a thing happen? As it turned out, I was reading a rather remarkable book that addressed that question. There are those who believe that the United States is headed for hyperinflation because of our large and growing government fiscal deficit and massive future liabilities (as much as $56 trillion) for Medicare and Social Security.
This week, we will look at the Argentinian experience and ask ourselves whether “it” – hyperinflation – can happen here.
I will be quoting from Niall Ferguson’s recent book, The Ascent of Money. I cannot recommend this book too highly. In fact, I rank it up with my all-time favorite book on economic history, Against the Gods, by the late (and sorely missed) Peter Bernstein. There are very few books I read twice. There are too many books and not enough time. This book I will have to read at least three times, and soon, and I have a lot of underlines and mark-ups in it already.
If there were one book I could require every member of the Congress to read, it would be this one. As I read it, I am struck again and again by how fragile and yet resilient our economic systems are. Fragile in the sense that governmental policy mistakes, no matter how well-intentioned, can destroy the wealth of a nation, and resilient in that it doesn’t happen more often.
As I have been writing, the United States in particular, and the developed world in general, are faced with a series of very unpleasant, if not downright bad choices. The time for good choices was ten years ago. Now we face the prospect of painful decisions, no matter what we do. It is not a matter of pain or no pain, of somehow avoiding the consequences of our bad decisions, it is simply deciding how much pain we will take and when, or allowing the pain to build up to a climactic event. Today we look at what I think would be the worst choice of all.
Argentina had actually defaulted on its debt in the late 19th century, not once but twice! But still they managed to avoid destroying the currency and devastating the country. But in 1989, after years of massive budget deficits that were financed with borrowing from abroad and Argentinian citizens, the country was left with so much debt and no one was willing to lend it any more money, that the leaders felt compelled to resort to the printing press.
In the US, the short answer is that unless the US consumers become a massive saving machine, to the tune of 8% or more of GDP and rising each year, and willingly put their savings into US government debt, it’s not going to happen. So sometime in the coming years, interest rates are likely to start to rise in order to compensate bond investors for what they perceive as risk. That will bring us to some very difficult and painful choices.
As I wrote a few weeks ago, this scenario could be averted IF the Obama administration produced a credible plan to lower the deficit over time and stuck to it. But today’s thought process is about what happens if they don’t.
I have been writing for a long time that the main force in the economy right now is deflation. The Fed will fight deflation tooth and nail. But they don’t have to buy government debt to fight deflation. They can buy mortgage securities, credit card securities, commercial paper, etc. That will have the effect of easing without encouraging the government to run massive deficits. And such debts are naturally self-liquidating, while government debt is not, at least not in the same way.
I believe the Fed will maintain its independence. Not to do so is to court economic disaster of the first order. These are bright and serious men and women. They get it.
“It’s now official. The proposed legislation to reform America’s financial service supervision includes granting the Secretary of the Treasury a veto over Section 13(3) emergency action by the Federal Reserve Board of Governors. If this becomes law, it will be a sad day for the independence of America’s central bank.
“The Secretary of the Treasury, a very senior cabinet position, is appointed by the President and meets with the President in the Oval Office weekly. The governors of the Federal Reserve Board are also appointed by the President. Both cabinet officers and Federal Reserve governors are confirmed by the US Senate. There are supposed to be seven governors; politics has purposefully limited this to five throughout the three-year financial crisis period.
“The Federal Reserve governors are supposed to serve staggered 14-year terms with all seven seats filled. Instead, we have been governed by the present five-member, politically configured board.
“The original seven-governor construction was designed to insulate them from political pressure, for very good reasons. Decades of monetary history throughout the world have disclosed what happens when political influence on a central bank intensifies. The Weimar Republic and Zimbabwe are evidence of the worst inflationary effects of politics. The Great Depression in the US and the nearly two-decade deflationary recession in Japan demonstrate that monetary policy is not only inflation-prone. When central banks are under political influence you can get fire or you can get ice.
This is the nose of the camel under the tent. Starting down this road is very worrisome indeed. I find it appalling that Tim Geithner and Larry Summers went along with this. This is a very clear attempt by the political class to put political pressure on the Fed. I hope the Fed responds with vigor. I can tell you that the officials of whom I am aware will not take kindly to pressure. And that might be an understatement.
All that being said, if the Fed starts to increase its buying of government debt above its initial commitment, then my “optimistic” scenario of a very rough economic patch, which I have been outlining the past few months, is far too rose-colored. I do not think it will happen, but I can guarantee you, I and a lot of other people will be watching.
Just to remind ourselves of flippe-floppe-flye’s analysis and position in this stock.
■EQIX is increasing the amount of cabinets in Europe by 1,700, thanks to strong demand. As of now, 75% of the 1,700 are pre-sold. Oh, the lack of demand is just so startling.
■96% of revenues are recurring, usually 2-3 year contracts. In other words, businesses are not in a rush to fulfill their bandwidth needs elsewhere.
■Current capacity is 81%, near historical highs.
■And, finally, the company has guided revenue estimates up from $863 million to $879 for ‘09 and from $1,023 to $1,055 for 2010.
In other words, despite what Cramer is saying on his teevee show, the future looks bright at Equinix, Inc. (EQIX: 92.29 -1.98%) , much to the chagrin of the very vocal 20%+ short position. Hmm, I wonder is Cramer knows anyone short Equinix, Inc. (EQIX: 92.29 -1.98%) from the $50’s?
NOTE: I will increase my position, once the stock hits the high $80’s.
I bought 1,000 Equinix, Inc. (EQIX: 92.29 -1.98%) @ $97.60.
The capitalization structure of this common stock has seriously deteriorated over the past five years. Debt has increased from 11% of the capitalization to 44%. While this ratio is not yet at a critical point, the way in which it has deteriorated, as we shall see later, is a major concern.
As of today, the common stock has no net earnings. Therefore all consideration towards an intrinsic value fall precipitously close to $0.00. I have a valuation of $1.35/share [which is generous] reflecting speculative potential.
The debt is expanding as interest is being capitalized. Without earnings, it is difficult to meet interest payments. This must be said is extremely lucky for the common stock, as without this covenant, essentially the common would be worthless.
Costs are also being capitalized in an effort to boost other profitability ratio’s. Discretionary cashflows being diverted include: Accts Payable @ $2.4, CapEx @ $35.0, and SG&A @ $4.0.
Current Liabilities are growing faster than Current Assets, 54%/46% respectively. While the Current Ratio is acceptable at 2.55 having improved from 1.86, this is an illusion and should essentially be ignored.
CapEx expenditures have been reduced. This common stock essentially tried to buy growth. This strategy is never good. Growth is most robust when it is organically driven.
Depreciation is a really murky area. Depreciation accounts for on a five year average of 76% of Cashflow from Operations, which essentially shows the very low profitability of their business. Currently, this has become only 48% of their Cashflow.
Plant, Property and Equipment, which constitutes their business, will be an important component in driving their business forward. They depreciate at only 9%/annum, giving a 10 year lifespan to capital equipment. In the area of high technology, is this realistic? I’m not sure, not being conversant in this area, however, I’d say that a 5 year depreciation schedule as far as capital equipment in this sector would make me far more confident – that would however eliminate all current earnings.
While on the subject of earnings, just what is the quality of these earnings? Not very high. Cash from Finance, accounts for 40% of the Revenues. This is simply not sustainable in the longer term, and explains why various items are being capitalized, this is a common stock on the brink of implosion.
In addition, Accts Receivables are also financing customers. Not in a major way [yet] but definitely not a trend that you would want to see continuing.
Speculation most likely accounts for the current shareprice of this common stock. There has been a rally of the rubbish from the March lows, I suspect that this is one of them.
In summary, flippe-floppe-flye and the fabled ppt have been hoodwinked yet again. No surprises here.
The chart tracks after-hours trades. I’m including it because while I was watching yesterday after the close I was struck by the volume of after-hours trades going through – and here is the chart that tracks them.
As can be seen, 77% of the sample, have so far been correct in correctly positioning for the next day. This certainly confirms my analysis [technical] and is why I have posted it, nothing like a little confirmation bias over the weekend.
Stocks headed lower after the Labor Department said personal spending fell 0.5 percent in September. The drop was in line with forecasts, but it was the largest slide in nine months and followed a 1.3 percent jump in August fueled by the government’s popular Cash for Clunkers car rebate program.
The slide marked an about-face for the market, which rallied strongly on Thursday after the government reported that the economy grew faster than expected in the summer. Much of the 3.5 percent jump in gross domestic product was tied to government spending programs, however.
The poor report on personal spending cast further doubt on the economy’s recovery, which many economists fear has been driven largely by the government stimulus. Without a rebound in consumer spending, which makes up a major part of the U.S. economy, investors worry the recovery won’t last.
With Friday being the last day of the month and the end of the fiscal year for many mutual funds, the market’s gyrations could be exaggerated, analysts said. Fund managers looking to minimize taxes for shareholders often sell some of their investments as the fiscal year comes to a close.
So apart from the odd fluctuation, does the trend in economic data support the premise put forward?
Consumer sales have stabilised. While they certainly might not be that exciting going forward, that’s only part of the story.
Inventory is falling as manufacturing has bitten the dust as capital goods were liquidated in the rush to liquidity or capital goods in the form of money. Less inventory in the face of stabilising demand creates the supply/demand imbalance that creates higher prices. Higer prices increase earnings…all analysts bullish wet-dream.
Manufacturing capacity is liquidated. Transferrable capital goods have been moved closer to final consumer demand, moved to money, or liquidated. Thus the ability to adjust supply to demand has been lost. This in the face of expansionary fiscal policy creates an inflationary environment.
If the Federal Reserve remains accomodative within the Bond markets, which to date it is, although as posted earlier, speculation is rife, then the stockmarket, as the unhampered market trades higher.
Excess reserves on the Fed’s balance sheet will soon cross the US$1 trillion mark. Our US economics team expects the combination of more QE asset purchases, smaller further decreases in passive QE and the wind-down of the Supplemental Financing Program (SFP) of the Treasury to drive excess reserves in the US to US$1.2 trillion by January 2010 (see US Economics: Fedspeak: Roadmap for the Exit, October 26, 2009). And balance sheets and reserves in other countries are at elevated levels too. Confronted with such massive amounts, even the normally straightforward task of draining excess reserves is no longer a simple task for central banks.
Financial markets can expect to feast on record low interest rates for a little while longer.
While the U.S. economy exited its worst post-war recession with stronger-than-expected growth in the third quarter, analysts say the U.S. Federal Reserve is unlikely to upset the fragile recovery with any talk of rate rises at its meeting next week, which is the market’s next obsession.
In order to maintain credibility, Mr. Strazzullo said the central bank will use language in crafting next week’s statement that continues to stress the need for an exit strategy and also alludes to their vigilance as “inflation fighters.” But tough talk aside, he doesn’t think the central bank is anywhere close to raising rates.
Market closes at [new] low…still bullish?
On a purely technical or pattern recognition basis, the past three trading days have almost played out as expected. I would have liked a rejection of the days lows, but, I’m still pretty confident that we will retest $110 on the SPY at some point next week.
Monday, if you have been on the sidelines, or daytrading, could prove a tricky OPEN. You’ll need to either buy weakness if we initially drop past todays low, or try and buy a pullback if we gap higher.
Either way, an uncomfortable trade for a Monday morning.
When Endo Pharmaceuticals (ENDP) acquired two experimental testosterone products earlier this year, CEO David P. Holveck predicted that safety issues might delay approval by the U.S. Food & Drug Administration. Synthetic versions of the quintessential male hormone are prescribed to thousands of patients in the U.S. to treat fatigue, sagging libido, and other signs of testosterone deficiency. But when they’re applied as topical gels, they have an unpleasant propensity to rub off on other people—moving, say, from a father to a child and temporarily causing symptoms of puberty, increased aggression, and other annoyances. In addition, the FDA is concerned about the growing use of testosterone by anti-aging clinics seeking to restore youthfulness to baby boomers, and by the abuse of such drugs in sports.
Holveck was right to be worried. On Oct. 19 the FDA said it would not approve Endo’s Fortesta, a topical testosterone gel, until the company performs additional safety trials. Only seven weeks earlier, regulators delayed Endo’s other product in this class, an injectable version—also over safety issues.
It’s no surprise the FDA is being so vigilant. Sales of testosterone products already on the market have rocketed 25% in the 12 months ending in June, to just under $1 billion. The recession has knocked the wind out of other “lifestyle drugs”—medicines to treat conditions that aren’t life-threatening. Even Pfizer’s (PFE) blockbuster Viagra fell 8% in the most recent quarter, year over year.
But not testosterone. Boomer lust for the hormone is now spurring a land grab by companies that make it. On Sept. 28 drug giant Abbott Laboratories (ABT) paid $6.6 billion to acquire Solvay Pharmaceuticals, which makes the leading testosterone product, AndroGel. Auxilium Pharmaceuticals (AUXL) is also angling for market share, and Endo’s Holveck thinks there’s plenty of room for growth. “The driving element is demographics,” he says. Analyst Annabel Samimy, who covers Endo and Auxilium for Thomas Weisel Partners, expects continued double-digit growth for such products, figuring that only 10% of patients who have low testosterone are currently treated.
New entrants in this market, however, will be dealing with a regulatory backlash that began last May. The FDA, having received more than 20 reports of testosterone in commercial products rubbing off on children, required that dreaded “black box” warnings be added to the labels for AndroGel and Auxilium’s rival product, Testim. The companies put boldfaced warnings on all their packaging and marketing material, and they had to produce new package inserts instructing patients to wash their hands thoroughly after applying the gels.
The FDA won’t say what requirements it will impose on testosterone products that are still under review. But Holveck says the agency wants Endo to do a “washing” study on Fortesta. Patients in the trial will have to clean their hands after applying the gel and then be tested to see if residues remain. The requirement will delay approval until sometime in 2010, Holveck predicts.
Testosterone is one of the fastest-growing therapies prescribed by the $80 billion-a-year anti-aging industry, which has embraced it as the cure du jour for andropause, more commonly known as male menopause. Conservative doctors question the existence of such a malady, and testosterone makers shy from discussing it because they’re not allowed to promote the drug “off-label”—for uses not endorsed by the FDA. Still, off-label prescriptions are likely to account for much of the market’s rapid growth. That fact isn’t lost on the FDA: During a press conference to announce the black boxes, an agency spokeswoman said she was alarmed that 25,000 testosterone prescriptions per year are written off-label for women, who use it to boost their libidos.
The market is so hot that, far from fretting about a regulatory crackdown, testosterone makers are focusing on keeping generic competition at bay. Earlier this year, Auxilium filed a petition with the FDA arguing that the agency shouldn’t let a generic version of Testim onto the market without requiring its manufacturer to do washing studies to prove the generic—which has slightly different ingredients—poses no more risk of testosterone transfer than the original. The FDA agreed, freeing Auxilium to concentrate on battling Solvay, which has more than 80% market share, according to researcher IMS Health (RX). In effect, Auxilium turned the agency’s growing safety concerns into a strategic coup: It won’t face low-cost competitors anytime soon.
Here’s some British beef, 5 time Mr Olympia. | 2019-04-26T02:02:32Z | https://leduc998.wordpress.com/2009/10/ |
Lilith scanned the forest with her eyes as she navigated through the forest. Being able to see was still sort of new for the Golbat, but she was beginning to adjust to it. "Food..." she whispered, looking around for anything edible. Her food stash had just gone empty, and both her and her injured brother were starting to go hungry.
Kain caught the bone and ran at the Poochyena alpha. Once Kain got close he lowered his head and tried to ram the alpha. But it was all for not, for the Poochyena had dodged him and used his thunder fang on Kain. It hit him directly to the side. He felt the pulse of electricity flowing to him. It was agonizing. But he managed to stand up. This Poochyena was stronger than Kain that much he was sure about.
The electricity flowed through him like water flows down the river. The sparks still made itself present enough to almost chain and hit someone else. He turned to the Poochyena who was some what smiling. He spoke to Kain and Lilith. His speech was intellectual not like every other wild pokemon.
"Still standing? Impressive. But resistance is futile. I'll get that food it I have to take it from you corpses."
And with that he did another leap. He bounced off Kain and went for the two bats.
Lilith had tried to prevent the Alpha from hitting Kain, as well, but her paralysis glued her to the ground.It looked like the Poochyena had taken notice of this, and he was now charging towards the siblings. Lilith slowly moved her twitching wing up to protect Kiru better, while thinking through how she should attack him. "You're finished!" The Poochyena barked as he leapt towards the the younger bat. "N-no you don't!" Lilith countered, pushing the canine back with a Sludge Bomb and poisoning him in the process.
The canine stood up the poison obviously was taking effect. Even though it didn't hurt him much it still hurt. He needed a pecha berry (I think) to cure him. Too bad for him he didn't have any nor did Kain. He turned to Kain and ran at him full speed. Kain almost didn't have time to react... Almost. He managed to bring his head back and slam it forward itercepting the Poochyena from hitting him.
The canine quickly hit Kain to the side and ran toward the two bats. But he didn't attack he just picked up an oran berry. It didn't cure his poison but it healed him. He turned to the bats. He was healed quite a bit. He jumped towards the golbat his thuder fang about to hit his target.
He made contact but when he opened his eyes he saw the cubone in front. He was biting his bone. He swung the bone making the Canine slid across the floor and away from the two. He spoke to him.
"You will not harm these people anymore. Go before you end up like your friends."
Cursed paralysis! Lilith thought as she tried to flap her wings, but to no avail. She was grounded, and just as helpless as the brother she was desperately trying to protect. Kain was more or less on his own now. At least she had managed to poison the Poochyena, making the fight somewhat easier...or not. The canine had somehow got his paws on an Oran berry, and was now a lot healthier. Lilith felt the his rage as he turned around and charged towards her with another Thunder Fang. Wrapping her wings around her as well as she could, she braced herself and Kiru for the impact...that never came. As she looked up, she could see why. "Y-you fool!" she cried out, her protective instincts starting to cover Kain, as well. "An outlaw like me...isn't worth saving....worry about yourself..."
The Poochyena was furious. Furious at the Zubat for hiding in his turf, furious at the Golbat for standing in his way and poisoning him and furious at the Cubone for being too hard headed (pun unintended) for his own good. Still, he didn't like the odds in this fight. Even if it was 1 on 1, he had no pack in fighting condition to back him up. "Very well, intruders." he snarled reluctantly. "We leave, but we won't forget. Name's Fenris. Don't forget." and with that, he left, followed by his injured pack.
Kain Stood there before collapsing onto the ground. He had multiple bite marks on his back and legs. Even his arms had some marks. It was remarkable he hadn't fainted earlier. There was a jolt every now and again to show the paralysis still in effect. His bone had fallen away from him about two meters.
"Kain!" Lilith exclaimed, slowly making her way to the injured Cubone. "Are-are you okay?" she asked, a worried expression on her face. It was pretty silly when she thought about it. Here she was, worrying about someone she had tried to mug at first. But still, he had saved her, and now that the paralysis was starting to fade, she was determined to try to do the same for him. "We...have to get out of here." she commented as Kiru climbed onto her back, careful not to put more strain on her than necessary. "Where are you from?"
The cubone face made a grimace as he reached for his bone. He grabbed it and propped himself up with it. He spoke softly the adrenaline wearing off and the pain taking it's effect. The power in his voice had faded as well. But he managed to utter words.
"I'm fine. Just worry about you brother. My partner is in this forest maybe he'll find me."
"You're anything but fine!" Lilith exclaimed as she staggered over, her wings still unusable. "None of us are." the Golbat added. "We should stick together for now, at least until we find your teammate." she suggested. The forest was inhabited by other Pokemon, as well, and they probably wouldn't stand a chance on their own, not in their current condition. "Safety in numbers, after all. You don't mind, do you?" she added awkwardly. Having grown up as part of a large group, she secretly missed the company of Pokemon that she could trust, other than Kiru. Not that she would admit this to Kain, if course.
"Yeah, I guess. But it could be hours before we find him. I'm not sure if we could wander for hours."
Kain didn't like the idea of putting people in danger. He didn't like help at all. He was always a loner no matter what. And his teammate was the complete opposite. If they find him it could be a while but he'd ask questions about the two. Alec was a good guy but he was a little righteous so he'd want to turn them in.
"When we find him stay back he won't like what you do too much. And he finds us... Well let's hope we find him first."
"We'll probably find him faster if we cooperate." Lilith suggested. She had heard that Cubone generally were loners, but that didn't mean she couldn't at least offer her help. "Kiru and I could improve the odds of finding him with our ultrasonic senses." she added, Kiru nodding in agreement. However, the Golbat couldn't help but thinking about what Kain had said about his teammate. He was right. As another guild member he would most likely turn her in. She knew what she did was wrong, and she would calmly surrender without a fight, as long as they agreed to give Kiru a safe place to live. If only there was a way to change her ways... "Say." the Golbat asked. "Do you believe there's a way for an outlaw like me to...start over?"
"I believe that if you change then you should be given a second chance. But there are some people who don't deserve one. You…I would give a second chance. But I don't know that you could start over. You would have to juana your record wiped clean. And that stuff is impossible to do."
Alec moved through the forest looking for his lost teammate. It took him a while to even get to the next level let alone find his teammate. For all he knew his cubone friend could be waiting for him.
So much has happened today... Kiru thought as he still tried to put the pieces together. His big sister had showed up with a stranger that she somehow trusted, and had told him that he was there to help them. Then there was the attack of the pack of Poochyena. That event made him trust the Cubone, as well. And now Lilith and himself were helping this guy look for his teammate, who most likely would arrest her. "Sis is a good pokemon." he muttered, partially to convince the Cubone, and partially to comfort his sister. "She can do it."
Lilith closed her eyes. Partially to hone her senses, but mostly to hide her moved tears. "I know that what I've done can never be undone." she replied. "But at the very least I can try to make up for the misdeeds by changing...by becoming a better pokemon." she added as she opened her eyes, which were now gleaming with honesty. "Oh, I almost forgot: Which species is your teammate?"
He kept limping on as he saw the golbat use her ultrasonic sense to 'see' his partner. But it wasn't long before she asked what he was.
"He's a fire type... Charmander. Shouldn't be hard."
He was reluctant to tell them considering their forest was burned down. No doubt it was probably a fire pokemon with a grudge.
"I...see." Lilith replied meekly. After the forest fire she had (understandably) never been able to view fire types in the same way again. To be blunt, both siblings had developed a phobia of fire, and preferred to steer clear of anything fire related. So it was only natural for her nerves to act up a little when the explorer they were tracking down was a Charmander. At least she could thank Arceus he hadn't evolved yet. Ironically enough, her sensors picked up a weak signal of a pokemon about Kain's size with some sort of gas forming around its tail. probably his...flames. she thought, reluctantly facing Kain. "I...I think I got your partner's signal...it feels like he's somewhere to the north-northeast."
"His tails heat signature should be stronger than any other chramander lurking here. But let's be safe enough to check it out. Not many Charmander in these parts."
He liked to be sure. He thought it would be pretty easy to find thanks to the blue flame on his tail. Not to mention he was a lower level then both of them. So if push did come to shove she might be able to knock him out. It wouldn't be easy but if need be she could do it.
Lilith surpressed a worried shiver at the 'stronger heat signature' part, even if she was nowhere close to feeling the heat yet. All the more reason to surrender without a fight, if it came to that. Still, she felt like she was doing the right thing. She loathed being an outlaw, and this encounter could give her a chance to say goodbye to that lifestyle, and to redeem herself. For her own sake, but most of all for her brother's sake. But first they needed to find the Charmander. "Our ultrasonic waves can't sense heat," the Golbat explained as they slowly made they way through the forest. "But I can sense quite a lot of flame shaped gasses at the tip of his tail."
Kain kept walking towards the Charmander the bats 'saw'. It was kinda creepy that her brother didn't have any eyes but Kain didn't say anything. He had hoped it was the Charmander that was known as Alec but sometimes fire types wander into the forest.
They approached a shrub. What ever was behind it was the Charmander. He took a deep breath before turning to the bats. He spoke to them.
"You could walk away now. Then you won't have to even take the chance of him finding out."
Alec kept walking until he heard some movement in th brush. There he looked getting ready to fight. He was ready for anything.
"No." Lilith replied. She didn't want to run anymore. This was her chance to face both her fears and her actions. Besides, Kiru hadn't done anything wrong, so even if they decided to arrest her in the end, it was their duty to save the Zubat. "It's okay. I'm an outlaw, and I have to take responsability for my actions sooner or later." the Golbat muttered as she prepared to walk through the bushes. "Besides, in order to become a better pokemon I should do what's right, and turning in an outlaw is the right thing to do."
Kain didn't like it, not one bit. Even though it was quite righteous of her to do it was wrong. Her brother needed her more than she knew about. The Kid was not only depending on her to survive but to hold on to what he had lost in the fire. If she went through with this it would leave the small Zubat a hollow shell that once was her brother.
Stepping through the bushes would show her face immediately. And the more he thought about it the more it seemed wrong. It wasn't only wrong... It was selfish of her to do that to her only remaining family. But he knew he couldn't change her mind. Not yet at least.
He stepped through the bush showing the small Orange-ish Charmander. His flame was blue and he had two scars going down his face. It showed signs of past battles he obviously had won...barley. He turned to Kain and spoke.
"Kain! There you are. I've been searching all over the place." He then noticed the Golbat behind him and realized that the Cubone was limping he spoke again. "Who is this? A friend of yours? She seems familiar."
Kain nodded and looked to the Golbat and the Zubat to make themselves present.
Lilith looked down as she suddenly got hit with insecurity. Was this the right thing to do? It had to be, right? After all, she would have the burden of escaping from the law lifted from her shoulders. And more importantly, Kiru would be given a safe place to stay, unlike their current situation where they had to move from hideout to hideout in order to avoid being taken by wild pokemon or the police. She would miss him more than anything, though. He was her only remaining family, after all, and by time she had become the closest thing to a mother he could get. By turning herself in, he would be safe, but both his and her hearts would surely break. Forgive me, Kiru. The Golbat sighed as she took a step forward. I've always been a terrible guardian.
"My name is Lilith." The Golbat spoke up reluctantly. She didn't want to say this, at least to a fire-type. But what other choice did she have, if she wanted har brother to be safe. "The reason I seem familiar is probably because you've seen me on a wanted poster. But please take my word for it when I say that I didn't choose the path of thievery. I truly want to change, to find another, better way to put food on the table. I can't make you believe me, but if you do decide to arrest me, at least make sure my brother, Kiru will be safe." She put up a brave mask as she spoke, but she was terrified as she felt said brother's uneven breathing down her neck. What would happen now? Would this Charmander arrest her? And, if not, would it be possible for her to change her ways?
Kiru would have cried though the entire speech, if it wasn't for the fact that he didn't have any eyes to cry with. However, he was breathing as if he truly was crying. He didn't want his only family to go to prison. He wanted to stay with Lilith, to watch her change...and eventually to evolve and take his first look at the world with his sister beside him.
When she said this it clicked in Alec's brain. She attacked and wounded his partner he managed to convince her that he was on her side only to lead them right into a trap. His limping and supporting himself with the bone made sense. She obviously wounded him to take his food.
Alec then blocked Kain with his arm. His expression changed from confused to anger. The fire on his tail grew a bit as his anger did the same. He was going to attack. She may have been a higher level then him but it didn't matter he gotten out of tough situations before. He crouched down and leaped forward.
Alec hit the ground shortly after the Cubone used his bone to trip the Charmander. As he recovered he turned to him and spoke out of complete anger. "What are you doing? She's an outlaw and wanted for thievery. The Cubone made a nice counter. "Really? I see a Pokemon who is scared and trying to fight for her brothers safety. I know what she is and a thief isn't one of them." The Charmander shook his head. "She's obviously not telling you the truth. Did she attack you?"
"Yes but... "Then we assume guilty until proven innocent." "Your not listening. Did she attack? Yes. But if it wasn't for her I would be dead by now, and lunch for a pack of poochyena." "Why are you protecting her?" "Because it's our duty as guild members to protect the innocent from the bad. She has good in her she's just confused." "What you believe I should let her go? Let's say she is a 'good' person and we let her go. How do we know she won't go back to thievery? "I believe she does it to protect her brother to keep him fed. He's all She has left. How can you be so heartless." "As I recall your always hard to trust people and hostile to everyone including me. "For good reason. My own parents were keeping locked up and isolated from everything. I look at her and I see someone who has no one but her brother. At least she has that, Don't take it away from her. Don't let her end up like this lonely old Cubone."
Alec thought for a moment. Ten minutes seemed like an eternity. And he finally was done and came to a conclusion. He spoke to the cubone. "I'm taking her in." The Cubone got in his way. "I'm not letting you." The Charmander was provoked to attack...but, didn't. He just nodded finally realizing he lost the conversation. "Fine, She goes, I'll see if I can clear up her record. Anything happens it's on you." "Thank you for seeing reason." He turned and looked away, giving the cubone a couple of minutes to say good-bye.
Kain approached the Golbat. His adrenaline was pumping for the fact he almost fought his team leader. "Your, free. I have to get back to the guild... Don't get into trouble. I saved you this time but next time you might not be so lucky next time. So this is good-bye for now."
This is it. Lilith thought, her gaze alternating between Kain and the Charmander. The two of them seemed to be in deep discussion about what to with her and her brother. She had to admit it, she was afraid. Afraid of the Fire-type, and afraid of the outcome of this situation. While listening to this decisive conversation, she felt even more insecure. Did she truly deserve to go to jail? Did she truly deserve Kain's mercy? A lot of questions whirled through her already chaos ridden mind. Eventually, after what seemed like an eternity the Charmander opened his mouth and uttered the fateful words; "I'm taking her in."
"No..." The Charmander's words hit Kiru like a dagger, causing him to breathe even more unevenly. "You can't...not Sis..."
Lilith was about to surrender when she noticed the Cubone stepping forwards. "I'm not letting you." His defence made the Charmander change his mind, apparently. At least it made the him step back. "Fine, she goes. I'll see if I can clear up her records. Anything happens, it's on you." And with that, the Charmander started to leave.
While Kain was thanking his partner, Lilith was probably even more grateful towards Kain. himself. After all, this pokemon had stood up to his teammate, and even almost fought him in her defence. This made her even more determined to change than before. In fact, she could already feel one change out of sheer happiness of getting a second chance. "Thank you." She muttered as her body started to glow. "I swear on my evolution, I will change. Thank you so much for all you've done..." the now Crobat said as she finished evolving. "And good bye."
Kain nodded to the Golbat. Then spoke to her as final words.
"Don't be a stranger. And take care of yourself and your brother."
With that he turned and met up with the Charmander. The Charmander nodded and motioned for him to go on and he'd catch up. Once the cubone was out of ear shot he turned to the Golbat. He spoke with fury in his words.
"You got away this time but one slip-up and I'll hunt you down and get the repayment for everything you've done."
And the. The Charmander disappeared into the bushes following after the Cubone. | 2019-04-21T17:09:40Z | http://pmd-roleplay.forumotion.com/t950p25-sisterly-care-sisterly-despair |
Often product transitions in product companies lead to serious turbulence. In product and innovation driven companies – such as hi-tech electronics and consumer goods, this can become a traumatic experience with big tangible losses in excess & obsolete inventory & near-term lost revenue. The longer term lost market opportunities and customer goodwill can have a corrosive effect on its competitiveness. This need not be the case. This blog provides a case summary derived from a real-life Product transition experience at a dynamic consumer goods company, and what the company learned through a methodical postmortem collaborating with an external partner.
Often transitions lead to turbulence which becomes a traumatic experience for all involved.
This need not be the case. As a real-life scenario described below reveals, with a concerted effort a consumer goods company was able to figure out the causal factors which impeded the success of a product transition and how they could preempt it in the future.
The scenario and the solution approach have broad applicability in the hi-tech electronics and other product innovation-driven hardware industries as well.
Transitions are of various types – sometimes these are driven by technology-changes, sometimes due to competitor actions, and on other occasions due to product refreshes which may result in phase-out or reduction in volume of older products.
In this note we will cover the transitions that Product enterprises go through when they make major changes to their products or product lines in the context of this case.
A large consumer brand faced the deadly effects of a product line transition that went totally off the rails. Upwards of $20MM (USD) in losses (inventory obsolescence and write-downs) were recorded.
Management recognized this event, and the fact that this was caused by a single product transition – in other words, a single product event. They wanted to get to the bottom of this fast.
1) Trust factor depletion – there was a major erosion of trust between Sales and Operations (Procurement & Supply Chain Ops) that took place over a period of time in the recent past before the product transition debacle.
At that time, Product demand was perking up and was being diligently reported by Regional Sales teams, yet Operations apparently got cold feet when responding to the demand – not fully ‘comfortable’ with the ‘optimistic’ numbers from Sales. Shipment volumes were consistently lower than the order volume – resulting in long lead-times, ‘unhappy customers’ and potentially ‘lost sales’. While the part about ‘unhappy customers’ and ‘lost sales’ could not be conclusively established, it was clear that the Sales teams were unhappy with the lack of fleet-footedness on the part of Ops when demand “signals” from Sales were being explicitly communicated to them.
Sales made their displeasure with Ops clear to senior leaders. While such Sales-Ops mismatch on demand is not uncommon, the contentious nature of the recent Sales-Ops interactions and the fact that volumes shipped by Ops was always chasing the growing demand, made the pendulum swing too far to the other side when the next change hit, namely this product transition with several technology changes in the new product.
Takeaway: when the ‘trust gap’ between Sales & Ops grows noisy, it’s time for leadership to pay attention and act on the data-points.
2) A Transition Planning process and owner and a tool – Except for quarterly business reviews, Ops glitches – such as a missed delivery, or growing lead-times – rarely get top leadership’s attention, unless it directly impacts a large customer/channel partner or revenue. As such these operations ‘micro-events’ are stashed away in corporate (tribal) memory as one-offs with lessons learnt based on isolated reviews. This works for most garden-variety operational issues, most of the time. Not so for transitions.
Transitions are a critical time and a critical driver of future revenue from new products.
What is the Product’s Transition Plan? When & how to change it?
Whose inputs are needed when making changes?
How do changes affect decisions and plan? How to communicate decisions and plan changes?
Key Takeaways: First and foremost a Transition Planning process needs to be defined working across functions.
Next, the ownership of the Transition planning process needs to be clearly defined, including the cross-functional team members.
Finally, there is a need for a tool – a digital transition planning tool which companies can use to generate transition plans fast, plan & decide among different ‘What-if’ scenarios, re-plan in real-time if needed and distribute the resulting actions across all team members quickly so follow-up execution can be completed before it’s too late. A metaphorical surfboard to ride out the transitions.
Think about it. In day to day Operations, most of the planning resources and energies are deployed on products in various stages of volume production. However, for critical product transitions which can be a make or break for smaller companies, we think the same (Volume Production Planning) approach will do.
Product transitions have their own patterns and noise – as this company found out too late..
With careful thought, planning and attention of the right cross-functional team guided by Operations, companies can smoothly ride out a transition “wave” and catch the next one to go higher.
Author Rakesh SharmaPosted on February 19, 2017 Categories demand, Operations, Product Transitions, Sales, Supply Chain OperationsTags Collaboration, consumer goods, excess and obsolescence, Hi Tech electronics, inventory, Operations Planning, response, Supply chain, Transition Planning, What-if scenario planningLeave a comment on Transitions and Turbulence – how to ride it out?
A hard problem – What’s the demand?
Pinpointing what is the real demand that a product company has to build to – this is clearly one of the hardest Operating problems in the Hi-tech branded products industry. Let’s try to uncover why? Why focused energies need to be expended at the senior-leadership level to ensure that the right approach and yes tools are applied to solve this problem.
Experienced industry practitioners well know “Demand” for a company’s products may mean different things to different functions.
For the CEO this starts with the current and next year’s target, crystallized out of a periodic business planning cycle (Annual, Quarterly) into target Financial numbers (Dollar forecast) – often a range. In the best cases, this is arrived at collaboratively with inputs from Finance, Sales, Marketing, Product Engineering and Operations. Although, we have some data-points to believe that Operations maybe involved sub-optimally to the detriment of the company’s execution to its business plan.
For the Sales leader this means current Quarter’s & next quarter’s Sales forecast.
For Marketing, this is looking at Product Mix and plan based on product launches, transitions, events.
Engineering cares most about baking feedback from recent launches and providing reliable launch time-frames.
What is the net Demand that Operations needs to build or buy for?
As plan adjustments are made based on how Sales is tracking to their numbers and other factors impacting demand, Ops needs to answer – What to plan, source, procure, build, ship, deliver & manage the myriad changes to – so that quarterly financial numbers are met or exceeded.
Often, this is made harder by the fact that Operations are downstream recipients of the company’s Annual or Quarterly Plan, sometimes not pro-actively involved at the get-go in the business planning process.
Young companies in a growth mode go through many changes rapidly – growing the number of products, establishing the number of Channels they sell through, the number of customers and countries they deliver to. This means that the structural value networks themselves are changing, sometimes quite frequently.
In addition, the demand from these different Sales channels and direct customers is fluctuating. By Sales Channels we mean all the indirect channels through which a company sells. This includes Resellers, VARs (Value Added Resellers), Distributors and VADs (Value Added Distributors).
A system to support Operations do this is very often the Achilles heel. Experienced Operations leaders know ERP provides valuable Supply data & some input data to determine demand, however they cannot depend on their ERP systems alone for fast and accurate planning and re-planning for Demand.
ERP is not a panacea or cure-all. Most experienced Operations leaders know they have to think and act out of the ‘ERP box’ if they want to get to their demand picture quickly and accurately, in an environment where change is a constant.
To make this happen, experienced Operations leaders direct their teams to extract data from ERP, merge it with other data and intelligence from outside such as emails, in their own offline spreadsheets and then determine demand. However, they dread this and know fully well they can only go so far in managing their demand with spreadsheets.
Spreadsheets are errors prone and cannot be relied on for collaboration.
When any of the inputs change (say, inbound P.O.s), inputs that are needed to determine real customer Demand to be fulfilled – the spreadsheet(s) go through a domino effect and all numbers become incorrect instantly. The process to change the data in spreadsheets to re-compute demand is painstaking and does not meet the cycle-time or accuracy needs of growing enterprises in competitive markets where collaboration is a pre-requisite.
Operations teams need a specialized system. A system that can rapidly reflect all upstream changes (such as Sales execution, Marketing actions) impacting demand.
As we head deep into Q4, the ability to rapidly generate “Demand for Build” reflecting changes and shifts is a critical one – and these capabilities need be added on top of your enterprise systems like ERP. It cannot be done in your ERP system.
Dynamic companies such as Ruckus Wireless, Aerohive Networks have done just that and reaped significant benefits. Implemented right, such a system can be a key factor in scaling operations, while facing changes that impact growing demand. How do we know this? We have provided the system for their Operations teams. Please pen down your thoughts below or reach out to us at Zyom. We would love to share more.
The Sales kick-off went quite well. Now is the time to take one more look at what 2014 looks like from the vantage point of forecasting before real constraints set in.
Economic forecasters have long utilized ‘leading’ and other “indicators” as a barometer to predict where the economy will be headed in the future. Inspired, we have pulled together the following ‘early’ indicators that can provide useful ingredients in influencing if not generating a Company’s forecast. While all forecasts are off, early indicators can be used to understand the ‘trajectory’ and a portion of the variance in the forecasts that is otherwise hard to estimate.
Here are some early indictors and macro-data[i] as you craft your forecast for 2014.
Weather events & the US – Climate .. or at least the weather took center stage early in January as temperatures plunged in vast swaths of the US disrupting life and business. The near term effects have been significant but not severe. The initial price tag of the big chill is placed at $5Billion (as of early January 2014). Doesn’t appear devastating given nearly 200 Million people were affected. However, long-term effects should be lesser to none.
The good news – the US economy turned in a fair 2013 (3.2% GDP growth in Q4, 2013 versus 1.9% for the year) and early indicators suggest 3% for 2014. In the near-term the US certainly seems to be back on track, and maybe at the wheel in terms of driving the global recovery.
Emerging markets – Short-term growth prospects have been hurt. Turkey made headlines with an egregious interest rate hike in January. However, emerging market countries as far-flung and diverse as Argentina, South Africa, Indonesia and India seem to be facing stiff economic headwinds too. Brazil seems drawn into a stagflation, just months from the big kick-off!
China’s growth phenomenon – China’s slowdown has arrived per data and economists – 7.7% GDP growth in 2013 Year-over-Year, versus 7.8% growth the year before. While debate is split about future direction of this important market, all data points to a gradual deceleration and not an absence of growth. Structurally, data regarding the supply-side limits are cause for bigger concern (China’s working age population fell by 2.44 Million in 2013 after falling the year before – The Economist Jan 25th 2014).
Estimated Impact – Near to mid-term slower growth (10 to 12 months); Longer-term growth could be adversely impacted.
Japan and EU – These key developed markets still seem to be stuck in neutral with dangers of deflation not gone.
Housing starts – A key “leading” indicator of future economic activity is in positive territory in the US, Germany and England (Jan 2014 compared to a year ago).
Estimated Impact – Could imply some progress for Construction and related businesses (home products, home solar products, other home/consumer products).
Orders for new products –are valuable early indicator, especially for industries such as the Hi-Tech electronics industry that rely heavily on new products for significant portions of their revenue stream. For example, for the Wireless networking industry, how are the orders coming in for the 11ac products (based on new networking standard) and how are the prices trending.
Inventory (especially Channel Inventory) & lead-times – are key early indicators. While channel inventories are typically co-managed, tracking this can provide valuable clues.
Backlog – A very good gauge in the near-term to establish revenue trend. However, this needs to be taken with a pinch or heaps of salt. Why? This depends on how effective are your supply chain fulfillment operations.
And that’s where the rub is – since some of these indicators depend on a ‘healthy forecast’ so we are back to the ‘chicken and egg’ problem.
These are a few of the key ingredients to consider as ‘early indicators’ in updating or building your forecast – at least for the mid-term: 0 to 6 months.
And yes, lets plan to loop back after the proverbial dust has settled on the quarter (or, quarters) to figure out how far off was the Forecasted Demand. And while we are at it.. why not find out why, and how the indicators have changed. As the adage goes..
Memo to the Chief Executive – Have you looked at this Critical Collaboration as you prepare for growth?
The tide is turning. Channel partners and key customers are moving fast to your products..
First, the good news – You have reached a major inflection point in your development cycle. You are no longer a small, obscure supplier waiting for the next large order. Orders are now waiting for you. Congratulations!
The not-so-good news – these orders will not wait long before they jump ship to a competitor.. Channel partners may divert attention to these competitors too.. So, what happened?
You just entered what we call the ‘O’ Zone (the “Operating” Zone). This is that part of your lifecycle (“zone”) when customers want to see you Operate like clockwork– shipping out 10x, 100x or more volume than before, yet meeting delivery dates globally, at attractive price points.
What happens in this vital phase of your Company’s development cycle is going to be determined in a big way by a critical collaboration – Near Real-time Collaboration between your Sales and Manufacturing/ Supply Chain Operations (Ops) team.
Your Sales team is focused on hyper-growth – signing up new Channel partners, winning new deals with end customers despite tough competition.
They are totally focused on order volume (Revenue) metrics, and compensated appropriately. So, they make sure they open up the gates and get more customers, more partners and more orders in. But hold on!
Do they have enough time to pivot to their Ops partners – give them a heads up about new customers, what product forecasts will be like?
Your Ops team, on the other hand, has an increasingly complex balancing act as demand takes off. They can grow their Supply Networks – to an extent (signing up new sources – new CM/ ODMs, new suppliers, etc.) to gain extra capacity, but then they hit the brick wall – of ‘Cost’ centered metrics.
The strains start to show in interactions between Sales & Ops.
Q. What will Sales sell? How much buffer stock should we keep?
Q. When will our orders ship? Why can’t you deliver it sooner?
With ‘Keep cost down’ as the guiding principle for Ops, it becomes a crazy dash to expedite when demand swings up with little notice, flying goods over instead of the more inexpensive modes (sea, rail or road) – depleting margins.
The human costs are bigger – anxieties mount as Sales & Ops try to play a game which looks somewhat like – catch the ball ‘blindfolded’.
To start off – Metrics need to be aligned.
How about rallying both Sales & Ops around ‘Profitable Growth’ metrics?
Let’s discuss it as a team at the leadership levels first. At a minimum – Sales, Supply Chain Operations, Operational Finance and you, should participate. The dividends of playing smart in the O-Zone are huge – Growth with Profitability – A distinct Operating Advantage. We, at Zyom, will be glad to help and explain further.
Author Rakesh SharmaPosted on September 19, 2013 September 20, 2013 Categories Collaboration, Operations, Shortages, Supply Chain ResponsivenessTags CEO, Channel Operations, Collaboration, demand, Metrics, O-Zone, Operational Finance, Sales, Sales & Operations, Supply Chain Operations, supply chain shortagesLeave a comment on Memo to the Chief Executive – Have you looked at this Critical Collaboration as you prepare for growth? | 2019-04-25T08:38:41Z | https://respond2demand.com/ |
EDUCATION MEANS BOTH " TO INSTRUCT"
We offer performances, workshops and residencies both specifically relevant to the National Curriculum and concerned with a more holistic approach to education -cross curriculum,cross cultural, multi dimensional.
"How do you expect me to read this?"
"Surely you can read," cried the farmer.
"You wear the turban of a learned man."
you can read the letter!"
Narrative meanders in and out of song, slipping easily from one style to another. Themes are followed with humour and ingenuity, following thin threads of reason and connection, winding through pathos, philosophical fatalism, stark realism and fantastical dreams.
Tradtional tales told with contemporary relevance, the present reflecting back on to the past.
Rozzums and riddles, dances and dilemmas. Will you get them or will they get you ?
Helen specializes in stories that connect real and imagined or inward worlds (including urban London lore). Her style incorporates a rich range of riddles, rhythm, rhyme and rozzums, interwoven with music, song and sometimes dance. Her aim is to unite, excite, move and amuse, develop awareness and, most important of all, get people talking.
Helen and Rick work with all ages -pre-school to adult.
Our workshops aim to pass on particular skills and develop understanding through practical and enjoyable participative group activities.
Workshops may be one off or part of a series.
They may be run by Helen or Rick individually or together.
they can be used in many ways, and are designed to suit specific requirements - eg.
- Workshops are only designed after discussion with the venue/booker, and are frequently adapted after meeting the participating group.
As any teacher knows, there is an infinite number of ways to approach writing skills.
but work always starts with the spoken word in some form or other.
B - Exploring the process of writing as a symbolic representation of sound and meaning, through looking at various scripts (eg Egyptian hieroglyphics, Mexican codices, Indian chitrakathi, shorthand etc.) .
C - Making (and writing) Picture Books.
'An awareness of the fundamental rules and patterns of spoken language prepares the ground for managing similar structures in written language. The recognition of aural components in speech and song feeds into phonological awareness in reading and writing. An understanding of different modes of speech informs awareness of different categories of text. The verbal process of selecting the right word or sequencing the order of events is a prototype for planning, drafting and revising a written text. The capacity to predict outcomes in a told story; to argue issues; to improvise verbal descriptions of people and places; to play with words by recognising ambiguities - these oral skills are the pivotal building blocks of language development and are actually crucial to the acquisition of literacy skills'.
Story emphasis is on 'patterned' traditional tales which allow maximum room for group participation, repeat phrases, songs and chants.
Shorter tales and rhymes are used as 'models' which the children practice retelling, and from which they may make new versions (sometimes retaining the beginning or an integral element to give 'shape' to the new work).
Longer stories are used to set a theme or mood, perhaps dealing with certain issues, but above all stimulating the imagination and involvement of the group. These may be halted halfway, or turned into a dilemma, to give wider opportunities in storymaking.
True life experiences are also used as a basis for both story sharing, focusing on aspects of telling, and development of new stories.
selecting 3-4 cards with suggested characters/situations/quests/magical powers.
2)stories/games/rhymes with repeat phrases and mnenomic feature -depending on the age range this may include rap and choral pieces, patterned nursery tales that are common to many countries, accumulative narratives etc.
4) dilemma and problem solving stories to encourage discussion /creative argument.
But they are also concerned with the whys and wherefores of using story and related materials in the classroom, with particular reference to those cultures for whom traditional storytelling is an intrinsic part of education.
Finally all workshops include something -story, proverb or song- that is just for the teachers benefit-in acknowledgement of the work they do, and the pressures that many are under.
RICK RUNS WORKSHOPS IN DRUMMING AND RHYTHM. HIS PROGRAMMES ARE HANDS-ON CREATIVE MUSIC SESSIONS THAT DRAW ON A VARIETY OF MUSICAL TRADITIONS AS WELL AS HIS OWN ORIGINAL INPUT.
With this group,many of the activities involve copying and using simple repetitive rhythms. They may start as clapping patterns which later become played on a mixture of drums, bells and shakers. Some of these patterns may also be linked to story, song or to rhyme. The first steps are to aquire and maintain a sense of the beat. I would introduce the idea of rhythms in speech and show the relationship with rhythms in music. All these activities contribute to a programme that meets many KS1 requirements.
"He ensured that all the children had the same opportunities to learn, spoke positively to the children at all times and made sure that the efforts of each individual were recognised by the rest of the class" teacher - St Thomas' Primary school, Birmingham.
Here the point is to consolidate the sense of the beat and to start inventing original material from given models. I often start with rhythms played on the body which can then be played on drums - many of them learnt first hand from young drummers around the world (Morocco, W.Africa, India). After this, I encourage children to make up their own - sometimes alone, sometimes paired. This develops both a rhythmic sense and bodily dexterity.
I also use call and response patterns using questions and answers from everyday speech as repetitive rhythmic templates. We think about why we choose to use certain words and how we emphasise them and how changing these will change our rhythms of speech. We make clapping patterns and later, instrumental patterns out of our original phrases - again, this draws on traditional learning methods from many countries. This activity is clearly relevant to language and literacy work as it develops awareness of pattern, choice of words, tone, timbre and emphasis. Having established the paired format here, I may put 3 or 4 pairs together to create cross-rhythms.
Cross rhythms are later developed,again by spoken phrases. Dividing the group 3 or 4 ways, I give each group a phrase to be repeated. Holding one against the others is a challenge. If this works, then I would develop these patterens through clapping and then using instruments.
I also play a variety of musical circle games - for example - a collective (usually non-English) refrain is sung followed by a 4 beat gap into which the participants improvise on instruments that are passed around the circle systematically. this gives repeated opportunities to try different patterns on different instruments in a very structured way. It allows each child to work at whatever level they can, as nobody is more important than anybody else. This has proved to be a valuable activity to bring out shy individuals and 'under-achievers', who can experiment without fear.
With certain goups I spend time introducing more abstract musical ideas. This may be listening to a piece of perhaps non-rhythmic music and then painting a response to it. These paintings may then be discussed by the class and used to provide their own original stimulii to new music.all the activities described satisfy KS2 requirements.
- The beauty of the approaches and material employed with KS2 children is that they are all appropriate for KS3. The patterns may become more complex and the expectancies higher, but the basic building blocks of creative work remain the same.
- Similarly, all the activities described up to now are perfectly suited for teachers working with musical ideas. It depends on the particular group in question how advanced these concepts need to be. Teachers can then use or re-mould given ideas to suit the context and level at which they are working.
For year 5 and KS2 and 3 she concentrates on 'Modern' (20thc.) History, and the Exploration of oral sources - see Community /Local history pages.
1987-90 As Director of the National Folktale Centre, Middlesex Polytechnic; Helen was part time tutor on polytechnic B Ed and RSC language courses; compiler of community language collections (audio/video/print etc.) Consultant to numerous literacy and oracy academic and community projects.
1990Tutor for Wiltshire Schools Oracy Project "Children as Storytellers"
1993 Olga Primary School, Tower Hamlets. Term long residency with Rick Wilson, + video project for 3-4 children from each class (%-11 yrs.); development of storytelling, musical and social skills; collection and presentation of children's lore in whole school event created and co-ordinated by the children involved in project.
1993-4 Sunderland Childrens Live Literature Residency (culminated in"Frances Fisher RIP," a novel co-written with Year 5 and 6 children from four schools) NB This project was a library initiated and co-ordinated project and won the 1995-6 Libraries Initiative Award.
1995-6 Tales from trees storytelling residency, Gossops Green First and Middle Schools..
1995-6 writer and co-director with film maker Korak Ghosh on bilingual film for children produced through residency in John Cass primary school.(LAB/John Cass funded).
1998 -9: Expanding the Frame - Telling Tales within the National Literacy Framework- LAB, Croydon, Tower Hamlets, Islington, Nat. Lit. Scheme supported project project exploring the use of storytelling in the Literacy Hour. Storyteller/tutor and overall producer of video and booklet resource pack (now available).
2000 continuing - member of the National Theatre's multi discipline Transformations project, exploring the effect of arts input into the development of literacy in KS1 and 2.(Tower Hamlets).
2001 Torriden Jnr school, s. London, writing residency concentrating on Myths and legends, old and new. tour of schools in Iceland, telling tales of Britain.
2001-2 Talk Tent - National Theatre and Art of Regeneration - major schools focus on tales and journeys. Storytelling Tutor and inventor of interactive resource pack.
2002-3 Yatra - Sacred Journey exhibition (Surrey) - gallery guide,educational workshop leader for KS1,KS2, KS3, GCSE and adult groups.
2003 Storyteller, project leader for Bromley StArt project - stories leading into art and textile work for nursery groups. Epping Forest Arts / Countryside Commission Picnic Project,working with schools and local adults to create site-specific performances.
2004 Storytelling tutor in residence for William Brookes secondary schools focus on 'Hidden Much Wenlock' (FATE's Winter's Edge Festival). Open Door Educational Project ( Ramayana epic, puppets and gamelan) for Redbridge school, Southampton. 'Saltney Storybox' - St. David's High school and Flintshire libraries - teenage tellers working with community volunteers and local history project on local stories and lore. 'Kahini' - storytelling project in Tower Hamlets schools for creative Partnerships / Apples and Snakes.
2005 2 month storytelling tour to Argentina, Uruguay, Brazil, Chile and Peru, in schools and TEFL centres.
2006 Storytelling, music and visual arts development projects at Severndale Special school,Shrewsbury and at Penn Hall Special school, Wolverhampton. 'Word Up' - storytelling development project in Liverpool. CARA 2 National Action Research pilot project for Creative Partnerships programme exploring development of Creativity through storytelling KS3 and KS4-emphasis on reflective thinking,effective documentation and a clear,analytical final report.
2007 Creative Partnerships literacy and storytelling project with St Augustine's First school, Draycott in the Clay, Staffs. Llansilin Cross-Country Story Walk conceived and performed with Llansilin school and community, Powys. Festival of Words - Creative Partnership project with Bamboozle Theatre Co. for SLD primary school children,Leicester -focus on development of speech and communication through story.
2008 Telford Culture Zone. Storyteller/writer for schools creative evaluation writing workshops KS1 & 2. Barbican Project - Children as Storytellers - Tower hamlets school & Barbican Theatre, London. Telling Tales - schools project, Knowsley, Liverpool. Apples & Snakes - Creative Partnership project in E.London school.
2009 Maesydre literacy project for Powys CC - whole school storytelling scheme. William Martin school, Harlow - week long storytelling and storycloth making project. The Portal Project - storytelling and drama CP scheme at Meadows school, Oswestry (with Fiona Collins). Dingle Infants school, Dudley - CP Seaside storytelling project. Middlewich school, Cheshire - focus on Africa for KS3.
2010 Term-long literacy project at Marner junior school, London (with Debbie Gunaratne);Lines of Desire - story and visual image project for Oriel Davies Gallery, Newtown for various Powys schools; Whizz - a term-long story/rhythm and skipping project (with Rick Wilson) at Trefonen junior school, Shropshire. Also, smaller projects and schools visits to Heathfield Middle school, London; Middlewich school, Cheshire; Woodside primary, Oswestry; Llanfyllin High school, Powys and Severndale School, Shrewsbury.
2012 Conclusion of After Offa; term-long story/book-making and music scheme at Maesydre primary,Powys (with Lucy Wells and Rick Wilson); story development work at Keele university, at the Scottish Storytelling Centre, Edinburgh and at Ripley Arts centre, Bromley, Kent. School visits to Bishop Hooper,Ludlow and Penn Hall,Wolverhampton.
2013 Kensington Palace Project - 5 original stories for performance for under 5s, both in the Palace and at various venues in Kensington / Chelsea; A writing and story residency for children at Whitechapel Hospital throughout the summer.
2014 A story and music making scheme for excluded secondary pupils at VTEC Gateway, Shropshire; Working for Everyday Magic in London schools doing development work on a number of themes including the Ancient Greeks and Shakespeare.
2018 A term-long book making, story making,literacy and music project with Rick Wilson at Black Lane primary school near Wrexham, funded by Creative Partnerships Wales.
1985-90 Numerous teaching and production related schemes as drummer for the Academy of Indian Dance,working in London primary and secondary schools and at Surrey University; other independent schemes with dancers Shobana Jeyasingh and Jayachandran..
1991 WOMAD tutor for adults during Performing Arts Weeks in UK and Finland.
Tutor for Youth Theatre Pocklington (E.Yorks) production Drum Talk.
1992 Week long storytelling and music residency with Helen East in Suffolk - primary age project - Tall Stories Big Sounds .
1997-98 Walking the Downs - a large scale music and environmental project for primary, secondary and community participation with Glyndebourne Opera Education Department, Sussex.
2001 Musician in Residence at 5 Shropshire primary scvhools as part of County wide project - The Creativity Hour.
2001-2002 Musician in Residence at London (Southwark) primary schools - Redriff and Alfred Salter - developing creative music through drumming and rhythm.
2003 Term long residency at Norwood Secondary Girls school (London) building 3 drumming groups for end of term Carnival production. Education back-up work (with Helen East) around Yatra exhibition (Surrey).
2004 Week long project (with Helen East) at William Brookes Secondary school (Shropshire) on local lore.
2005 Story and music development work (with Helen) in schools in Birmingham and Wolverhampton in collaboration with Creative Partnerships.
2007 Jeskyns Wood, Kent - outdoor environmental arts project with KS3 (with Red Earth). Cross country Crossroads - musical storywalk with KS1, Lansilin school, Powys. Festival of words - Creative Partnership project with primary SLD children, Leicester. Images from Sound - Matisse inspired art and music days (with Lucy Wells) with KS2 pupils at Longden school, Shropshire.
2008 South Liverpool Learning Network - music workshops for visiting schools. Severn Project - contributory performance project for KS3 with Bridgnorth Endowed school.
2009 Maesydre storytelling and music KS 1 & 2 project for Powys CC. William Martin school, Harlow - week long residency on storytelling and storycloth making. Dingle infants school, Dudley - CP project on storytelling of and by the seaside. Middlewich school, Cheshire - focus on Africa for KS3.
2010 Whizz project (Creative Partnership- with Helen East) at Trefonen primary school,Shropshire on story and music. Heathland middle school, Brent -summer festival days on story and music and Middlewich school, Cheshire - 2nd focus on Africa for KS3 (both with Helen East).
2011 After Offa- Living Life along the Border (Heritage Lottery funded) project including 4 primary schools - gathering, telling and recording local stories from the English / Welsh borderland.
2012 Maesydre storytelling,book making and music KS1 project for Powys CC (with Helen East and Lucy Wells).
2013 Redlands Drumming Project - a 3 month residency in 2 adult psychiatric wards in Shropshire introducing and developing drumming and rhythm; Kensington Palace Project - music and sound for Helen's original stories for under 5s.
2014 A story and music making scheme for excluded secondary pupils at VTEC Gateway, Shropshire. Working for Everyday Magic in London schools doing development work on a number of themes including the Ancient Greeks and Shakespeare.
2018 A term-long book making, story making, literacy and music project at Black Lane primary school near Wrexham funded by Creative Partnerships Wales. | 2019-04-22T19:01:40Z | http://eastorywilsound.co.uk/edu.htm |
While many Mormons look forward to General Conference for the messages from church leaders, MormonLeaks is creating a new tradition of increased leaks around the semi-annual meeting that even former members can get excited about. MormonLeaks founder Ryan McKnight recently promised leaks every day until General Conference, and Tuesday was the first drop.
Today’s release included four PowerPoint presentations, and the sheer number of charts and figures would make any statistician’s mouth water. The first related to reception of early Gospel Topics essays among members in the United States, the subject of this post. The other three PowerPoint docs related to other various studies. One was a 2013 study revealing ward council characteristics in five different areas of the world (the label deceptively says it’s related to the missionary age change, but it’s not). Another was a 2013 study of mid-single Mormons and weighing experiences and outcomes in conventional wards versus single units. The last was a 2004 study of middle-aged Mormon men comparing their BYU or other college experiences with later career, family, and religiosity outcomes.
I’ve previously written about events leading up to the Gospel Topics essays, but I’ll try to summarize. The institutional church has been challenged by increasing access to difficult church history topics via the internet. In the early 2000s, the church history department began to take baby steps towards increased transparency, reversing a decades-old trend, but the church continued to rely on outside organizations like FARMS and FairMormon to directly address the concerns of members rather than create any official apologetic responses. In 2010, many members in Sweden were troubled by historical topics, and a visit by two church historians did little to ease their minds. In March 2012, apologetic resources from various sources were gathered and sent to church leaders there, the “Swedish Rescue,” in order to stem rising disaffection. Here in the states, the Bottgate episode of February 2012 also made clear the need for official apologetic responses not just for members, but also to accurately present current positions of church leaders on potentially embarrassing topics for outside media. At some point, the church commissioned scholars to begin working on a series of essays on common troublesome historical and doctrinal topics. Rumors of the existence of these essays began swirling in early 2013. The first two essays were released on November 20th of that year.
Local news media covered the release of many of these essays (see here and here, for example). The church announced the expansion of the Gospel Topics section of their website on the same day the first two essays were released, though they only mentioned “Are Mormons Christian?” in the announcement. “First Vision Accounts” got left out. I can’t find a church announcement for any other essays until November 2014 after the media uproar on the October release of the Nauvoo and post-Manifesto polygamy essays. So, basically, those people who knew about the essays in April 2014 weren’t hearing about them from the church.
The survey was given to bishops and other active adult members of the church in the United States. It is unclear how many members were surveyed. Bishops were better read on the essays, with 65% having viewed at least one (5% had read all seven). Among active adult members, only 37% had viewed at least one (2% viewed all seven).
The presentation pointed out that men were slightly more likely to have read the essays than women (41% of men read at least one article, while only 37% of women did the same). It’s unclear whether they included bishops in that calculation of males. It’d be skewed given how many would’ve felt a greater obligation to look at the essays.
Unsurprisingly, higher educated people were more likely to have viewed the essays. Of those with doctoral degrees, 63% had read at least one essay. Those with vocational training or some college were at the low end with 36%, which I still find impressive. (Those with a high school diploma were slightly higher at 38%.) There were no statistically significant differences based on age or region of the United States.
Personal study or curiosity was the top motive for bishops or members to seek out the essays. Bishops were slightly more likely to have read the essays in order to help others. The essays were rarely used to prepare lessons.
The PowerPoint document was created in September 2014. By that point, two other Gospel Topics essays had been released: “Peace and Violence among 19th-Century Latter-day Saints” (May 13, 2014) and “Translation and Historicity of the Book of Abraham” (July 8, 2014). Neither created much fanfare beyond single articles in local news media.
When church members have questions regarding [LDS] history and doctrine, possibly arising when detractors spread misinformation and doubt, you may want to direct their attention to these resources.
Bishops were encouraged to recommend the Gospel Topics section for personal study, but only if the need arose.
A lot. The essays have since been incorporated into both seminary and institute curriculum. All CES instructors have now been instructed to “know the content of these essays like you know the back of your hand.” Seminary students are learning in their Doctrinal Mastery program to use resources like the Gospel Topics essays to provide answers for themselves and those around them. Even the 2017 Gospel Doctrine curriculum encourages teachers to point class members towards the essays.
This leaked PowerPoint is a snapshot of the church’s inoculation strategy in embryo. There was clearly concern on the part of church leaders in providing members with these resources (Would the essays help? Would they be satisfactory?), in spite of countless man-hours put in by both scholars and church leaders to get that information public.
What are your thoughts on this leak?
Shannon Flynn wrote a guest post last April reporting on an address by Elder Marlin K. Jensen where he talked about the creation of the essays in a bit more detail. Rick B has also written about his interviews with Paul Reeve, Brian Hales, and Ugo Peregro, where they discuss their involvement in the writing of the essays.
Interesting finds. I go back and forth on the purpose and roll out of the essays. I think, on the whole, it’s a good move to publish them, most of them are well done and the information is slowly getting out to the general Church membership. I am surprised how many ward and family members have not read them. Unfortunately, I believe there are several deliberate diversion tactics in the essays. There are a lot of issues around the Book of Mormon: King James language and errors, The Long War and anachronisms, to name a few. Of those issues, the Church picked DNA as something to analyze in an essay. That essay is designed to be confusing. I would guess 95% of readers get lost in the weeds about 1/3 of the way through. This is by design, with the idea that someone would get part-way through the essay, give up and walk away thinking “wow, this stuff is complex, it’s hard to determine one way or the other.” The “Are Mormons Christians?” essay seems to be a softball in the words of John Shelby Spong “answering questions no one is asking.” The real meat is in the polygamy essays, Book of Abraham, and race and the priesthood. The race and priesthood essay all but admits it was all a mistake and based on racist ideas, not any doctrine. In my experience, the general Church membership have not accepted this idea and have not thought through the theological implications of that admission.
I have also noticed a general trend with a lot of these issues. For a long time they were taboo. Now, I feel like the Church and general membership are ready to admit they exist and want credit for acknowledging them, but are not ready to ask the tough questions or think through the implications. This is a prime example https://www.lds.org/broadcasts/the-truth-restored?lang=eng. The point of this seemed to be “hey, we had a worldwide broadcast where we talked about the different First Vision accounts.” That’s a good first step, but the talk was essentially 1. Here is why the First Vision is important; 2. Different accounts exist; and 3. This is my testimony of the First Vision. So, you get credit for acknowledging that it is an issue, but there is no acknowledgement of the difficult questions or implications. This is a good first step, but not a long-term solution.
Interesting, but I’m not sure there’s much shock value here. Or I suppose the shock value is that MormonLeaks still has someone stealing rather old PowerPoint presentations?
I also wonder how the church gathered the respondents. Was it random? If not, then I’m not sure the numbers really mean all that much in terms of the church.
ReTx, no shock value. I was interested in the idea that church leaders were trying to figure out if members were accessing the essays and, if so, how they were reacting. If you read Shannon Flynn’s post you can tell there was some opposition to the project. These surveys would’ve been important feedback if there was a disagreement brewing in the hierarchy. I like this because it’s a peek behind the curtain thing (rather than earth-shattering revelation).
The late war has less similarity to the Book of Mormon than Leaves of Grass and 50% of its matches come from the copyright statement.
Addressing it leads too quickly to snark.
Sorry, I didn’t mean to imply that you were going for shock value with your post, Mary Ann. More that the MormonLeaks group was doing so. It is interesting, but it’s pretty much what I’d expect the church to be talking about without any big surprises.
What would really be interesting is a comparison of male outcomes (and female outcomes) between attending BYU and BYU-I.
It would also be interesting to get information on what characteristics of families/individuals do seem to be more causal in outcome. I’m going to guess parental income/education level as the primary one.
I think I was part of the survey group this questions was asked of. Participation was based on a request I received via email. Surveys would come sporadically over about a year and a half. What I think is interesting, now that you mention results, is the somewhat large percentage of respondents who knew about or had read some of the essays. To me this might be an indication of the impact of the Bloggernacle, since at the time of the survey, the essays were not easily found, even if you were looking for them. The essays that I had read were because I read about them and they were linked to from other “non-official” sites, like this one. At the time I wondered whether the questions were actually a indirect way of letting me know there were essays, since as you mentioned, they weren’t really advertised.
ReTx, Agreed female outcome data would be interesting. Not least, knowing did they even do a female outcome study? Especially since one of the data points on the male outcomes was whether or not their wives were employed outside the home.
Stephen R. Marsh, I agree that The Long War plagiarism claims have many problems and the similarities are by no means a death nail for the BOM. However, this is obviously an issue for a lot of people and a major pillar in the CES Letter argument that BOM is a fraud. Why not tackle the BOM issues head-on in an essay or Church publication? Why not do an Institute, Stake or BYU religion class on the CES Letter and really look at the arguments? The answer is because the CES letter has some factually true assertions, some exaggerated claims and some really shaky claims. It’s tough to acknowledging the true ones and think through some of the implications. I would argue that the GT Essays and the findings of this study seem to show that the institutional Church and the general membership are just getting comfortable with the idea of putting our feet in the water and slowly wading in, but we’re not ready to really get wet yet.
Ranae, thanks for that insight. If they were emailed, it would limit the sample to slightly more tech-saavy members (since email addresses needed to be current in church record-keeping systems). In my current elderly ward, half the people would’ve been disqualified.
Felixfabulous, when comparing what’s been done in the last decade to the previous four, I’m sure some of the Brethren are feeling whiplash. It looks slow to us, but context matters.
I tend to take a ham-fisted approach to statistics. Three categories: below 30%, the middle, and above 70%. I am not shocked that most people found the essays comprehensible and helpful. I am totally shocked that over half of bishops have read some of them. (Middle instead of below 30%) I am even more shocked that bishops read them at higher rates than other members. What bishop has the time for such nonsense when the widows are in need?
I live in a transient ward with people moving in and out quickly. Most are young and from the strong holds out west. I would imagine they might be sort of like a fairly representative sample of the LDS church millenials in the USA. Nobody ever says anything about the GTEs. You might as well start talking about how the Ainu of Japan are descended from the Nephites as anything remotely connected to the GTEs.
So are many people secretly reading them and pretending that they know nothing?
It is nice to know they are being studied. But another question, much more important, what is the effect of reading them? Do they build and bolster faith? Or do they push people standing near the door on out? Does inoculation work?
BTW Mary Ann, the introduction is one of the best summaries of this recent chapter in our history I could imagine being written. Thank you for your thoughtful efforts.
I think it’s interesting that they are looking at these things. I tend to agree that MormonLeaks is often a yawner. What’s next? Dry cleaning receipts? But every once in a while, we do see something interesting. I suppose that’s the point of these online leaks – simply transparency.
I’m in the final drafts of a paper that does a stylometric comparison between Hunt’s Late War and the Book of Mormon. Hopefully I can finish it shortly.
I feel it’s worth pointing out that the survey was necessarily incomplete; if someone read the essays and left the church as a result, they would not show up in the statistics. I have no idea if people who did so are a statistically significant group, but I’ve heard enough first-hand accounts to know that this is definitely a thing.
Other useful questions might have included “Have you heard anyone in your ward or branch (besides your bishop or branch president) talk about them?” and quizzes to see how much people actually understood and retained. Although given that the intent of at least some of the essays seems to be to obfuscate the truth (as felixfabulous pointed out), a comprehension quiz made by the church would probably look very different from one made by an unindoctrinated observer.
Also, I would personally be less interested in “a comparison of The Book of Mormon and The Late War,” and more interested in a holistic look at the evidence which asks “what’s the most likely origin of the BoM?” My experience with Mormon apologists has been that they’re good at rhetoric, and looking for any and all holes in one thing at a time, but that they don’t really care what the cumulative weight of the evidence suggests.
Like, they’ll say “this and this and this town on the Vernal Holley map may not have existed in Joseph Smith’s time.” But when someone asks “so how come the rest of it lines up really well, and how come Cumorah is right here in New York, and how come Joseph Smith was telling people it took place right there, and how come all the doctrinal content of the BoM was a direct response to the stuff people were talking about at the time,” and on and on, and they’ve got nothing and go back to looking at mushrooms under a microscope while missing the forest for the trees.
I’ll add that the biggest problem with the sampling is that it is targeted to members who engage with the church using email. Right there you wipe out a ton of members and that tends to be a demographic difference. I wouldn’t be surprised if there was a connection between engagement with the church and members who receive correspondence from the church via email.
ReTx, not just engagement. Those active on email communication from the church are also more likely to pay attention to online church happenings. The numbers would be skewed up. That may explain why these numbers are so much higher than many of us would expect. When I wrote my Gospel Topics “A Collective Shrug” post last year, I don’t think I’d ever believe a third of members had looked at at least one essay, and that was *years* after the first one was released. In October 2015 I taught GD, and even when worlwide media went nuts over the Nauvoo polygamy essay, only one classmember admitted to reading *any* of the church essays.
It is interesting to me how we can see statistics so differently. (this, of, course is no surprise). I see the Gospel Topic essay numbers as terrible indictment of our membership. Bishops reading none, one, two or three at 79%. General members for the same data set at 91%. To me that is awful. I believe some of the previous comments about e-mail participation affecting the numbers is a good observation. I think the real numbers would be worse. There is an other factor at play in this situation that has not been mentioned. I have a close friend who is a brother to a current General Authority. (1st. Quorum of Seventy) As recently as 18 months ago the General Authority was telling , at least some people, that the “controversial” essays were buried in the beginning among all of the topics so that members “would have to go through some good basic doctrine before getting to the controversial stuff.” This was at least one year (maybe more) after the controversial ones were brought up front. This told me four things. 1st. They really were buried in the beginning and quite on purpose. 2nd. Even though the General Authorities claim to be united they rarely are and as a result there some deep divisions. and mixed and multiple messages coming out. 3rd. There is still some unhappiness about the whole project . 4th. Some of the General Authorities are way behind the curve on what is going on in areas that are not part of their current assignments. I wonder if all of the General Authorities have read all of them, and if they have, could they now answer some simple questions about them? I would bet money that if the G.A.’s had to sit a test on them there would be quite a few C’s, D’s and a few F’s .
Shannon, one of today’s leaks supports your argument. It was a simple August 2014 email from a GA forwarding a list of the essays to date (with links), but he warned not to share or forward that email to anyone else. Of course by November 2014, the church was publishing the list of essays (with links) on the Mormon Newsroom page. | 2019-04-20T14:20:22Z | https://wheatandtares.org/2017/09/26/new-mormonleaks-release-reception-of-early-gospel-topics-essays-among-churchmembers/ |
Leaf-inhabiting fungi are a hyperdiverse group of microbiota found in all terrestrial habitats. Comparative studies targeting the drivers of endophytic fungal biodiversity are rare and identified multiple effectors, such as plant chemistry, climate and seasonal attributes. Our project aimed to study the pattern of the leaf-associated mycobiome of European beech (Fagus sylvatica) at altitudinally distinct sites to reveal diversity, composition and seasonal dynamics of fungal endophytes by a combination of metabarcoding, cultivation and subsequent ecological analyses. This thesis also intended to study the fungal relationship with biotic and abiotic factors: elevation, local site conditions, leaf biochemistry and leaf status. Metabarcoding and cultivation were applied for same leaf samples to trace both environmental drivers and method-dependent signals of the detected fungi. An experimental field site consisting of 100 (2-years old beech) trees was established called ‘beech phytometer’ system at two altitudes (517 and 975 m a.s.l.) in a German mountain forest. Beech trees were randomly selected from both sites as well as from neighboring beech trees. Ten trees from each site were chosen and 10 leaves per tree were sampled. Climatic and leaf biochemistry (Chlorophyll, flavonoid and nitrogen) data were seasonally (Autumn, Spring and Summer) investigated for two continuous years (Oct 2013 to Oct 2015) at these two elevations. In the first year (autumn, 2013) of the project (chapter 3.1), the leaf-inhabiting fungi of natural beech trees were investigated by using high-throughput sequencing (metabarcoding) at three altitudinally distinct sites (with timberline at 1381 m a.s.l.) in the German Alps. This paper focuses on a detailed description and evaluation of metabarcoding amplicon library preparation and a subsequent analytical workflow. Fungal diversity and community composition were compared as a function of different elevated sites and leaf status (i.e., vital or senescent). However, three investigation sites resulted in 969 OTUs (operational taxonomic units) from 820441 sequences. Taxonomic compositions (order) of beech fungi differed strongly among the three sites but were less distinct between the vital and the senescence leaves. Fungal community composition at valley site clearly differed from those of mountain and timberline where differences between mountain and timberline were less prominent. Vital and senescence leaf differed in fungal community structures indicating a strong dynamics of leaf fungi in autumn. Elevation and leaf status were found to be the main explaining factors, which affected the fungal richness and compositions. Another survey (Chapter 3.2) was conducted just after the establishment of the ‘beech phytometer’ trees in the same period (autumn 2013) where leaf mycobiome of the phytometer trees (trees originally came from Northern Germany and grown in nursery) were compared with the fungi of surrounding natural beech habitat at valley (517 m a.s.l.) and mountain site (975 m a.s.l.) in the same location “Untersberg”. Fungal diversity was lowest in the managed habitat in the nursery and was highest in natural habitat. Fungal diversity and compositions significantly associated the origin of the trees. Under natural conditions, the fungi were more diverse at lower altitudes than at higher altitudes. Additionally, leaf chlorophyll and flavonoid contents showed negative correlations with fungal richness in natural stands. In the second year (autumn 2014), another survey (chapter 3.3) was conducted on leaf endophytes of phytometer trees with metabarcoding and cultivation approaches to trace the environmental drivers and method-dependent indications. Metabarcoding resulted in 597 OTUs from 170480 curated ITS1 reads and cultivation revealed 70 OTUs from 438 culture-based Sanger sequences. Both approaches resulted in non-overlapping community compositions and pronounced differences in taxonomic classification and trophic stages. However, both methods revealed similar correlations of the fungal communities with local environmental conditions. Our results indicate undisputable advantages of metabarcoding over cultivation in terms of representation of the major functional guilds, rare taxa and diversity signals of leaf-inhabiting fungi. This stressed out the importance of cultivation for complementing sequence databases with good quality reference data and encouraged the use of both approaches in future microbial biodiversity assessment studies. Phytometer and natural trees were intensively investigated in this study (chapter 3.4) to assess the influence of site characteristics (altitudes, local microclimate), seasonality, leaf biochemistry and leaf age on fungal diversity and composition. In total, our analytical Illumina workflow resulted in 15703599 demultiplexed and ITS1 reads from 165 samples. Clustering at 97% similarity resulted in 1199 OTUs. Climatic parameters were significantly differed between valley and mountain on daily basis but were insignificantly differed on monthly basis. The compositional difference between phytometer and natural mycobiome was significant for combined data as well as for the seasonal data (Oct 2013-Oct 2014). We observed a strong seasonal turnover in phyllosphere fungi in both habitats over the two years of investigation, suggesting that the plant-fungal system not only responds to cyclic climatic conditions but depends as well on various parameters, e.g., geographic position, substrates age and surrounding vegetation. A side (chapter 3.5) study was done to see the connection between the foliar endophytes and foliar phenolic compounds of European aspen (Populus tremula) in the presence and absence of specialist beetles (Chrysomela tremula). A distinct pattern of the leaf endophytes was found to be associated with aspen genotype and chemotype, but this specificity disappeared in the presence of herbivorous beetles. This suggested that leaf endophytes responded to the herbivory in aspen. In general, the altitudinal difference is the most important explaining factor for fungal community differences, which shapes many dependent abiotic and biotic habitat factors. Regarding cost and time per sequence, metabarcoding is superior to cultivation approaches and offers surprisingly profound insights by yielding much more data, allowing to test at once multiple hypotheses in fungal ecology.
Forests are and have been of major importance to cover a variety of societal needs. Today the demands on forests are ever increasing with sequestering carbon and balancing the climate, to name only a few. To cover those requirements forests need vital, productive, and sustainable. A difficult concept as such as the understanding of a healthy forest varies greatly. Nevertheless, forests still have to produce a sufficient amount of yield while threatened by changing climate conditions. These are predicted to bring extended and more intense drought periods as well as a higher frequency of storms and the promotion of secondary disturbances like insects calamities to also rise. In this complex situation of high and versatile demand the focus is on the allocation of the “right” forest. Forest management is requested to balance the needs of humans against those of wildlife against those of the trees themselves. To gain the respective knowledge on species responses and provenance growth, now and in the future research gaps need to be closed. All factors influencing tree growth and therefore ultimately yield need to be understood and special focus needs to be on the interactions within the forest ecosystem. One of the parameters in understanding aggregated tree growth is the dynamic of growth. This can be visualised by dendroecological methods, providing a picture of growth within the individual years. Growth dynamics are dependent on multiple factors, some, like soil being preconditioning and other like climate causing short-term responses. In this thesis I focus on the influence of climate on annual tree growth using a new approach of daily climate data to calculate climate-growth correlations. This method has the advantage of representing tree processes better than the former approach of using monthly means. Furthermore the program enables the user to feed climate scenarios and therefore estimate future growth. To gather information on species as well as provenance differences to provide advice to foresters I used different trials in Britain and Germany. On the British site different oak species were planted while the German sites are stocked with various spruce provenances. For the latter we additionally used stable carbon isotope analysis to calculate intrinsic water use efficiency. The climate-growth correlations revealed differences between the oak species with a generally higher linkage to precipitation than temperature. While the differences are clear, the question of thresholds and the role of extreme events became apparent in this work. VII Abstract Assessing the impact of extreme events using dendrometer data revealed little differences in the response to short term events of the three investigated species, oak, beech, and pine. We were able to pick up stimulus-response-relationships and as a novel result no species-specific responses were found when focusing on such a small time frame. The provenance trials offered the opportunity to investigate the potential of the use of daily climate data more closely. The two contrasting sites planted with six spruce provenances each gave an insight on the adaptive potential of provenances as well as an indication on the response times. Depending on the proceeding environmental and the local climate conditions decisions have to be made on the species or provenance selection. This thesis provides a method as well as insight on the behaviour of the important European species beech, oak, pine, and spruce. It, however, highlights the limitations such methods have for large scale estimates. While general trends on the response to specific soil factors can be used, the climatic responses, be it thresholds or climate-growth correlations can only be seen within the ecological context of their sampling region.
Myxomycetes (Amoebozoa, plasmodial slime molds) are one of the last larger groups of organisms where the biodiversity is not yet investigated by molecular methods, except for a very few cultivable model species. Based on the first phylogenies for the group produced in 2012 and 2013, this thesis work explores the genetic diversity of wild populations of myxomycetes, addressing two questions: 1. Does diversity and phylogenetic trees found with barcode markers fit the current morphological species concept, and do barcode markers reveal a lower or higher diversity than found by morphological characters? In the first case, morphological characters seen as decisive for species differentiation would be plastic (shaped by the environment), in the second case we must assume the existence of cryptic species. 2. Can genetic markers be used to see if natural populations of myxomycetes reproduce mainly sexual or asexual? Sexuality is proven to occur in the Amoebozoa, but asexual reproduction should be advantageous for habitat colonization. Experiments with cultivable species have shown that both reproductive modes occur in the myxomycetes. Two species complexes were chosen for an in-depth investigation. The first species is the common wood-inhabiting myxomycete Trichia varia (Pers. ex J.F. Gmel.) Pers., one of the first myxomycetes to be described and always seen as a variable, yet single, species. The second example involves a snowbank species so far known as Lamproderma atrosporum Meyl., which was recently transferred to a genus on its own, Meriderma Mar. Mey. & Poulain, and a morphological species concept, including several taxa, was proposed. Trichia varia belongs to the bright-spored myxomycetes. Partial sequences of three independent markers (nuclear small-subunit ribosomal RNA gene, SSU, extrachromosomal; protein elongation factor 1 alpha gene, EF1A, chromosomal; cytochrome oxidase subunit 1 gene, COI, mitochondrial) from 198 specimens resulted in a three-gene phylogeny containing three groups, within each group combinations of the single-marker genotypes occurred exclusively. Complete SSU sequences were generated for 66 specimens, which revealed six positions that can carry group I introns and putatively functional or degenerated homing endonuclease genes in two groups. All observations (genotypic combinations of the three markers, signs of recombination, intron patterns) fit well into a pattern of three cryptic biological species that reproduce predominantly sexual but are reproductively isolated. The pattern of group I introns and inserted homing endonuclease genes mounts evidence that the Goddard-Burt intron life cycle model applies to naturally occurring myxomycete populations. A total of 89 specimens of the dark-spored myxomycete genus Meriderma from five European mountain ranges were sequenced for partial genes of SSU and EF1A. The latter gene includes an extremely variable spliceosomal intron. Three clades, the two morphologically recognizable taxa M. fuscatum, M. aggregatum, and the morphologically complicated complex species M. atrosporum agg., were recovered. The EF1A-based phylogeny of the 81 specimens of M. atrosporum agg. resulted in seven subclades, with the two EF1A-haplotypes of a sequence sharing always one subclade for each of the 50 heterozygous specimens, a pattern consistent with the existence of several independent but sexually reproducing biospecies. Identical EF1A genotypes occurred more often within a regional population than in between. A simulation assuming panmixis within a biospecies but not in between, and isolation between mountain ranges suggested that similar numbers of shared genotypes can be created by chance through sexual reproduction alone. Numbers of haplotypes shared between mountain ranges correlate with geographical distance, suggesting occasional long-distance dispersal by spores. An enlarged data set containing 227 partial SSU sequences of Meriderma spp. identified 53 ribotypes, with a ribotype accumulation curve indicating 68.4±14.5 ribotypes to expect according to the Chao2 estimator. The topology of the SSU phylogeny generally confirms results from the partial SSU and EF1A data set of 89 specimens, where several putative biospecies could be recognized. A novel method for automated analyses of SEM images allows to derive quantitative descriptors for spore ornamentation, which were subjected to multivariate analyses. Spore ornamentation provided traits with the highest explanatory power in a multivariate statistics, whereas spore size and stalk length were much less significant. For some but not all putative biospecies a unique combination of morphological characters was found, which is in accordance with the hypothesis of instant sympatric 8 speciation via mutations creating incompatible strains splitting from existing biospecies. The morphologically recognizable taxa of the genus are described and a key for the genus Meriderma is given. To compare morphological and molecular diversity in lignicolous myxomycetes, all specimens found in a study covering the late-autumn aspect were sequenced, using partial SSU gene as a barcode marker. A total of 161 logs in the old-growth forest Eldena, northeastern Germany, was surveyed, resulting in 530 collections representing 27 taxa from 14 genera. Bright-spores species were far more abundant than dark-spored taxa. A phylogeny based on partial SSU sequences for bright-spored myxomycetes revealed morphospecies to be largely consistent with phylogenetic groups. Most but not all morphospecies may contain multiple ribotypes that cannot be differentiated by light microscopy. This first study backing up a traditional morphology-based survey by a full molecular component demonstrates that partial SSU sequences can function as reliable barcode markers for myxomycetes, but reveals as well a significant, yet not infinite, amount of hidden diversity. The main conclusions of this work, set up in the frame of a project funded by the German Research Council (DFG), are the following: 1. Sexual reproduction seems to be an important, if not the dominating mode (apart from clonal myxamoebal populations built up by binary fission) of reproduction in naturally occurring populations of myxomycetes. 2. From the two investigated species complexes we can expect many, if not most, morphopecies to be composed of reproductively isolated, sexually reproducing, biospecies. 3. Partial SSU sequences, as most widely used in this study, seem to represent suitable barcode markers for the group and can be used to distinguish the (usually cryptic) biospecies, although they alone do not allow any conclusions about reproductive isolation and speciation processes. 4. We have to expect a significant amount of hidden diversity in myxomycetes, which will increase the number of taxa from ca. 1000 recognized morphologically by a factor between two and ten.
Myxomycetes are fungus-like protists of the supergroup Amoebozoa found to be abundant in all terrestrial ecosystems. Mainly based on its macroscopically visible fruit bodies, our knowledge on ecology and diversity of myxomycetes is better than for most other protistean groups, but there is still a lacking knowledge about global diversity patterns since tropical regions, especially the old world tropics, are still understudied. In this thesis a combination of classical ecological analyses and modern molecular methods were used to expand the current knowledge on myxomycete diversity and biogeography in the Paleotropics. A number of surveys in the Philippine archipelago are conducted to provide and to add information about the distribution of myxomycetes in the Southeast Asian region. A combination of field collecting and ca. 2500 moist chamber cultures from four unexplored areas in the Philippines, namely, the Bicol Peninsula (746 records, 57 taxa), Puerto Galera (926 records, 42 taxa), Quezon National Park (205 records, 35 taxa), and Negros Province (193 records, 28 taxa), now brings the number of species recorded for Philippines to 150; with one record, Stemonaria fuscoides, noted as new for the Asian Paleotropics. Collecting localities that have more diverse plant communities showed as well higher species diversity of myxomycetes. In congruence with studies from the Neotropical forests, it seems also that anthropogenic disturbances and the type of forest structure affect the occurrence of myxomycetes for the Philippines. Another survey carried out in another paleotropical region, the highlands of Ethiopia, revealed a total of 151 records, with all 39 species found as new for the country. Three records of Diderma cf. miniatum with a strong bright red peridium and one record of Didymium cf. flexuosum with a conspicuous broad reticulation in the spore ornamentation were described and barcoded, since both may represent morphospecies new to science. A number of rarely recorded species, like Didymium saturnus, Metatrichia floripara, Perichaena areolata, and Physarina echinospora showed that resembling to its unique flora, the east African mountain ranges harbor a diverse and distinctive myxomycete assemblage. One incentive of this study was to compile a solid large dataset for the Paleotropical region that is comparable to data obtained from comprehensive studies performed in the Neotropical areas a decade ago. A total of eight surveys (with four comprehensive regional surveys, two from lowland and two from highland, for each region, the Neo- and the Paleotropics) were used, to compare the myxomycete assemblages of both regions. Each survey comes from a region with fairly homogenous vegetation, and includes specimens from both field and moist chamber cultures component. A statistical analysis of species accumulation curves revealed that only between 70 and 95% of all species to be expected have been found. Even for >1000 specimens per survey these figures seem hardly to increase with increasing collection effort, since a high proportion of species is always represented by a single or a few records only. Both ordination and cluster analysis suggests that geographical separation explains differences in species composition of the myxomycete assemblages much better than elevational differences. 5 The molecular component of this thesis is a phylogeographic study of the widely distributed tropical myxomycete Hemitrichia serpula. It is a morphologically distinct species with golden-yellow fructifications forming a reticulum. However, subtle variation in spore ornamentation points to cryptic speciation within this myxomycete. Using two independent molecular markers, 135 partial sequences of the small subunit (SSU) rRNA (a nuclear but extrachromosomal gene) and 30 partial sequences of the elongation factor 1 alpha gene (EF1A) (a nuclear gene), a study of 135 Hemitrichia serpula specimens collected worldwide revealed the existence of four clades that are likely to represent reproductively isolated biospecies, since each clade shows a unique combination of SSU and EF1A genotypes. A Mantel test with the partial SSU sequences indicated geographical differentiation, giving a correlation coefficient of 0.467 between the pairwise computed geographic and genetic distances, compared with the 95% confidence interval from 999 permutations (-0.013 to 0.021). Biogeographical analysis of the 40 SSU ribotypes showed clear intraspecific variation and geographic differentiation demonstrating a limited gene flow among the world population. We argue that the distribution of cryptic species in the different clade can be explained by ongoing, but still incomplete speciation. An event-based ancestral area reconstruction using the software S-DIVA employed in RASP showed that the probable origin of the ribotypes was a global dispersal event in the Neotropics. Additional species distribution models that were implemented for the three most prominent clades show different putative ranges. As such H. serpula supports the moderate endemicity hypothesis for protists. In summary, myxomycete assemblages in the Paleotropics (1) displayed a higher diversity than for Neotropical forests, (2) harbor unique taxa that differentiates those assemblages in spite of the expected similar macroecological all over the Tropics, (3) are affected by geographical barriers that likely causes speciation both at a morphospecies and biospecies level, and (4) follow the ubiquitous model in the sense that gene flow mediated by long-distance dispersal of spores is high enough that a species can fill out its entire putative range, but (5) the gene flow is not high enough to prevent variation in regional gene pools, which may lead to speciation and is better explained by the moderate endemicity model. Our data are still too limited to draw a comprehensive picture of the diversity of tropical myxomycetes, but the baseline information compiled with the aid of both classical ecology and molecular approaches from this study are first major steps towards this goal.
Generally, all works dealt primarily with the biodiversity and phylogeny of leaf-inhabiting fungi of three Ficus species (F. benjamina, F. elastica and F. religiosa) with the exception of the bioprospecting which focused on discovering antimicrobial activities and secondary metabolite production. Investigations took place in natural and urban forests in the Philippines and in tropical greenhouse gardens in Germany.
Da Feuchtgebiete nicht wie reguläres Ackerland genutzt werde können, werden sie oft als Ödland betrachtet und daher für Ackerbau trockengelegt. Diese sehr einseitige Perspektive auf Feuchtgebiete übersieht die vielfältigen Ökosystemleistungen, die es Menschen und Natur zur Verfügung stellt. Einige dieser Leistungen sind das Speichern und die Reinigung von Abwasser, die Bereitstellung von Lebensmitteln und Rohmaterialien, die lokale Klimaregulierung und die Nutzung als Habitat. Viele dieser Leistungen werden von der Natur „umsonst“ bereitgestellt und haben keinen monetären Wert auf traditionellen Märkten. In China bedecken Feuchtgebiete 8% der Gesamtfläche, sind aber in einer bedrohlichen Situation, auch wenn in den letzten Jahren einige Teile erfolgreich restauriert werden konnten. In den vergangenen 50 Jahren gingen mehr als 20% der Feuchtgebiete durch Verschmutzung, Wasserableitung und -aufstauung, Nutzbarmachung, Trockenlegung und Übernutzung der Resourcen verloren. Die Wasserressourcen und Feuchtgebiete – besonders in Nord- und Nord-Ost-China sind bedroht, da sie in ariden oder semi-ariden Regionen liegen. Feuchtgebiete stellen gleichwohl wichtige Ökosystemdienstleistungen für die genannte Region zur Verfügung und tragen signifikant und in vielfältiger Weise zu lokalem Lebensunterhalt bei, z. B. durch Nahrungs- und Rohstoffbereitstellung. Ziel dieser Arbeit war es, zu einer ökonomisch-ökologischen Bewertung des Gemeinen Schilfs (Phragmites australis) am Wuliangsuhai See zu kommen, in dem Schilf in großen Mengen vorkommt und lokal relevant ist. Schilf wurde an einem Fallbeispiel in der Inneren Mongolei, China, untersucht, ein Teil des Forschungsprojektes “Sustainable Water Management and Wetland Restoration in Settlement of Arid Central Asia” war, welches in der Inneren Mongolei, China, durchgeführt wurde. Meine Arbeit beeinhaltete vielfältige Apsekte: Zuerst wurde eine detaillierte Literaturanalyse durchgeführt, um die kommerzielle Nutzung von Schilf weltweit zu untersuchen. Es konnten vielfältige Verwertungen ausgemacht werden, viele lokal und nur in kleinem Maßstab (z. B. Nahrung), einige andere innovativ und/oder noch im Experimentierstadium (z. B. Ethanol). Im Bezug auf den Wuliangsuhai See kann geschlussfolgert werden, dass nur große, “einfache” Lösungen in Frage kommen. Besonders der Einsatz als Rohstoff zur Verfeuerung und als Baumaterial scheint erfolgversprechend. Daran anschließend wurde die Biomasseproduktivität am Wuliangsuhai See mit Hilfe zweier Feldkampagnen erhoben und dann auf den gesamten See projiziert. Diese Daten waren entscheidend, da sie Basis waren, um die totale verfügbare Biomasse sowie auch den Einfluss der Schilfernte auf das Nährstoff-Budget abzuschätzen, da ein erheblicher Anteil an Nährstoffen jährlich durch die Ernte dem See entzogen wird. Nach der Bestimmung der verfügbaren Schilfressourcen wurde deren Verwendung durch qualitative Interviews untersucht und mit dem „Netchain Approach“ dargestellt. Die verschiedenen Interessengruppen, die in das Schilfgeschäft involviert sind, sowie deren Einkommen wurden skizziert. Es wurde deutlich, dass die Verwertung zur Papierproduktionen aus einer Vielzahl von Gründen kaum profitabel ist. Basierend auf dieser Erkenntnis wurden vier verschiedene Szenarien für eine innovative Schilfenergienutzung am Wuliangsuhai See analysiert und bewertet. Die Schilfenergienutzung ist unter bestimmten Voraussetzungen profitabel, aber nur schwer wettbewerbsfähig gegenüber günstiger und lokal verfügbarer Kohle. Abschließend wurde der Wuliangsuhai See in einen umfassenderen Ausblick eingeordnet, welche auch das Bewässerungssystem stromaufwärts miteinschloss. Vier Szenarien beleuchteten, wie heutige Entscheidungen die Zukunft des Sees beeinflussen. Diese Arbeit präsentiert die folgenden Haupteinsichten und Empfehlungen für das Management des Wuliangsuhai Sees: 1. Ein übergreifendes Konzept für den Wuliangsuhai See ist nötig, welches auch das gesamte Hetao Bewässerungsgebiet miteinbezieht. 2. Der See ist in dieser sehr trockenen Gegend einzigartig und sollte nicht nur für die Bereitstellung von Marktgütern, sondern auch für „Nicht-Markt-Leistungen“, wie die Abwasserreinigung, beachtet werden. 3. Die Restorationsleistung der Schilfernte konnte in dieser Publikation gezeigt werden und sollte bei zukünftigen Managemententscheidungen berücksichtigt werden. 4. Die lokale Schilfökonomie wird von verschiedenen Seiten herausgefordert. Dennoch scheint auch die lokale Schilfenergienutzung kaum profitabel. 5. Aufgrund der hohen Relevanz der Schilfökonomie für die lokale Ökonomie und Ökologie sollte die Regierung die Seeverwaltung unterstützen. Zusammenfassend konnten die vielfältigen sozialen, ökologischen und ökonomischen Werte von Schilf am Wuliangsuhai See aufgezeigt werden. Da nur geringe Informationen vorhanden waren, stellt dies den ersten umfassenden Überblick dar und soll Entscheidungsträgern ermöglichen, auf diesen Informationen basierend Entscheidungen für die Zukunft des Sees zu treffen. | 2019-04-18T14:38:21Z | https://epub.ub.uni-greifswald.de/solrsearch/index/search/searchtype/collection/id/70 |
Even if I’m far from being qualified to review academic writings on economics, I find the world of distributed ledgers and cryptoeconomic theory a decent stepping stone for social sciences. I’ve been bashing my head against the wall with blockchains for the good part of my recent history, so I have faith that this article will be read and appreciated by someone, somewhere, sometime.
I’ll further assume that you’re familiar with the social reforms presented in Radical Markets. If you’re not, go check out my loose introduction to the book.
This article critically analyses the feasibility of implementing RM at scale. I grouped the analysis by chapters, but I entertained a few holistic observations at the beginning. Whatever the future holds, the key to getting to a better version of it is to stay open-minded yet also critical and lucid.
Importantly, I take it that Eric Posner and Glen Weyl are very much aware of the positive impact their ideas can have on the world, hence why I aim to mostly present my constructive criticism.
We shall see how all of them intersect with the concerns I had for each policy.
The vignette at the beginning of the chapter describes a hypothetical scenario whereby Alejandro, the manager of Hyperloop, has to buy all the properties required for building a railroad between Los Angeles (LA) and San Francisco (SF). Under the current model, the markets aren’t liquid enough and landowners may delay the acquisition to wait for a higher price, hindering innovation which could positively impact everybody. So far so good.
Let’s suppose that COSTs are implemented and Alejandro can instantly purchase all the land occupied on the most practical path between LA and SF. Hyperloop gets battle-tested on the freshly built railroad and all the citizens of California are thrilled that travelling has become so cheap and comfortable. Elon Musk throws a huge party and promotes Alejandro to being the mayor of the Martian human base.
This land now provides a ton of value to society, that is, 30 min trips from LA to SF, but does Hyperloop have a monopoly on the land on which the railroad was built? Shouldn’t the company be subject to the same law as anyone else and sell the land when they are outbid?
If yes, there are a few problems.
Hyperloop would need to value the properties abnormally high so that no one would be willing to pay the price. However, how large can their budget be? The COSTs would also be huge.
Notwithstanding the valuation of the land, we shouldn’t expect a languished economy. Someone, sometime, will purchase one or more parcels because of financial incentives or oblivious irrationality.
If no, there are also a few problems.
Although trains are arguably special cases, dodging the COST would be highly analogous to eminent domain, but worse, allowing any economic actor to lock-in land.
It creates a precedent for a potential “social backdoor”. Other companies, e.g. particle colliders, might express their interest in becoming exempted too by bringing evidence in support of their alleged social good.
It sounds a bit far-fetched to claim that we know as an absolute truth that Hyperloop makes the best use of the land it owns. What if someone comes up with an even better model and they need to build a perpendicular railroad (excluding bridges for now)?
A potential reconciliation is described in the book: aggregating parcels as estates (this might ring a bell with the Decentraland folks out there).
Possessors would be allowed to group their assets into clusters and to pull them apart, as they choose. That way, they would not be at risk of having their right shoe taken and being left with a useless left shoe.
The dilemma is now whether we should allow clusters as large as Hyperloop to exist. For one, I admit that trains could merely be an isolated case, as companies don’t usually run experiments 380 miles long. I only brought up the example because it’s presented at the beginning of the first chapter, but I posit that the concerns above are real and they should be considered in advance.
On numerous occasions, Glen Weyl talks about how Marketopia (a world in which RM is ubiquitously implemented) is immune to the discretionary control of the rich, because there’s no such thing as excessively rich people. This may be hands down true, as most of the wealth of present day Earth is held in stocks, which are handled completely different in a RM powerhouse. However, the devil is in the details.
Marketopia doesn’t reject the idea of money as an inter-subjective apparatus for transferring value. People have different work ethics, skills and so forth, hence their earnings can differ significantly even if we consider lower inequality.
While we definitely can design large-scale mechanisms applying game theory principles - cryptoeconomics is arguably a successful instantiation of that - we should never presume complete rational behaviour.
Therefore, how does RM fend against a simple example of irrationality like griefing? Griefing is an act which doesn’t benefit the attacker, economically, politically or anyhow, but causes harm to somebody else. Within the Ethereum layer 2 research forums, this is a widely recognised issue and it is assumed that a researcher always has to consider it when she proposes a new model.
Let’s imagine Eve, an evil participant of Marketopia, and Iris, who’s a regular, innocent citizen. Presuming Eve’s income is a few orders of magnitude higher than Iris’, she’s able to grief Iris by constantly buying out her properties and forcing her to change her residency once every 3 months. Indeed, this is quirky behaviour and no rational person would waste a ton of money just to cause harm to someone else, but there’s no fundamental axiom that asserts this scenario cannot happen lest we do something about it.
Should the government of Marketopia deem provable griefing as an exemption to the law and ban Eve from buying Iris’ properties? Wouldn’t this create a precedent for other loopholes? I don’t know.
While I agree that every modern society requires its citizens to have some basic literacy in law and economics, I find the COST a bit demanding for laymen. Valuation is a tough skill in and of itself - this is why there are dozens of companies doing it as a paid service. With the advent of the on-demand, digital economy, I find it hard to believe we can educate the masses on the price elasticity of demand or other elusive economic concepts. Posner and Weyl postulate that there will be mobile apps helping users value their properties, but I’ll later explain why I don’t think this is truly feasible.
Should we actually enforce a market for everything? How could items like pens, trousers or laptops be tracked and how could we expect their owners to spend a significant amount of time to measure their value? There are a non-trivial opportunity and a cognitive cost at play.
For many items, the Coasian cost of transaction could be way higher than the items themselves.
Nick Szabo emphasises this problem in his Micropayments and Mental Transaction Cost paper.
This might be a weak and far-fetched idea, but I really wanted it to put it here to pick up the reader’s brain. How can we reconcile COSTs with Metcalfe’s Law? There are certain scenarios when value accrues where there are more people involved. As Twitter gets more and more popular, the experience gets more fun for everyone and I get more and more followers. Should I put a price tag on my following and pay a tax for it? If yes, this is weird because the person paying the price would become the owner of my account, but my followers wouldn’t like that. If no, aren’t accounts with huge swaths of followers monopolies? Whenever they tweet, they have the ability to economically influence the behaviour of so many people.
As stated before, mobile apps and technology in general are supposed to be an ancillary component to Marketopia. At the high level, I totally love this! After watching the 2018 testimonial shows starring Mark Zuckerberg, Sundar Pinchai and the US government, I’m thrilled to read about new political and economic models which involve the direct use of technology. There’s a catch though.
There’s a specific threshold beyond which technology becomes a burden rather than a tool, a threshold which is measured in incentives. Elections are in particular problematic because they settle who gets a ton of political power and who doesn’t. In this case, incentives aren’t just large, they are astronomically huge.
Writing in binary is hard — so hard, in fact, that basically nobody wants to do it. Even if you succeed in doing it, what you’re producing is just a bunch of numbers, and it’ll be very hard for anyone—including you in a few weeks, once you forget what you wrote—to figure out what your code actually does.
It’s not the end of the world if someone hacks in and sees my pizza being delivered. Nobody cares enough to try to break it. But voting is not one of those cases.
Essentially, very very few people know how to inspect binary code and assert if it’s malicious or not. Then, it is implausible to run nation-wide digital elections and expect that no software infrastructure/ product in the funnel - DNS, BGP, the back-end servers, the front-end app, the local network - won’t get hacked. Even if we assume an infrastructure shielded with unbreakable diamond doors, there are still social attack vectors like phishing. And, if you were wondering, no, neither Ethereum nor any blockchain can magically fix this.
Taking a step back, I admit that RM doesn’t imply that Quadratic Voting must be implemented digitally, but the voting credits have to be stored somewhere and it is also argued that apps could be immensely helpful in aiding the user to allocate her credits more wisely. Without accompanying technology, the cognitive cost may go through the roof, hence we returned to a concern we previously discussed.
I acknowledge the fact that some of these arguments swirl around the core belief that people are “lazy”, but, frankly, I posit we really are! Modern markets made us that way. I don’t have to know how Apple designs and engineers my MacBook. I can just go to an authorised seller, swipe a magical plastic card and leave with a spectacularly powerful computing device in my backpack.
Somehow related to the main thesis against digital voting is the issue of Sybil attacks. In an election lacking solid identity control mechanisms, malicious actors can circumvent Quadratic Voting (that is, paying for more votes with quadratically more money) by voting with multiple identities. Maybe blockchain solutions like uPort, Bloom or SelfKey will solve this problem, but we cannot ascertain it.
The immigration policy proposed in the third chapter of the book is well-intentioned as it aims to bridge the gap between excessively wealthy countries and the rest of the world by aligning the incentives of all participants: immigrants, citizens and governments. Nonetheless, I tend to agree with Vitalik that the policy seems unnecessarily complex and it sort of resembles a Ruby Goldberg machine.
Just as Posner and Weyl specified in the book, there’s no guarantee that xenophobia won’t mess up the plans, even if we incentivise the hosts to look after the immigrants. As the discourse departs from the realm of economics into the one of sociology and psychology, we might be better off if we start making already existing visas such as H-1B or J1 more inclusive.
Having said that, I disagree with the argument that RM proposes a blunt modern slavery policy. It is estimated that there are already ~11 million illegal immigrants fuelling the underground economy of the US. Contrasted to the unknown and probably lamentable work conditions of today, Marketopia actually aims to make the lives of these tens of millions of people safer and better.
This has been one of the most interesting chapters from a factual point of view. Even if I did know about BlackRock, Vanguard et al, I wasn’t aware of the financial control they exert over the market. Given my current understanding of economics, I find the proposal really solid, as it strives to generate more efficient economic outputs with little large-scale changes.
Consciously give up on a significant portion of their stocks and earnings, at least in the short term.
Invest in human labour (hiring, training) to expand their expertise across industries. If an index fund is highly specialised in banks and suddenly they are restricted to not own more than 1% in two or more banks, they would need to get creative and move fast to diversify across industries.
This seems impractical lest the governments step in and enforce the new rules. As nowadays governments arguable concentrate on other more urgent matters, it might take a while before the octopus can be dismembered.
Should venture capitalists (VCs) be subject to the same regulations? Even if they invest in stupendously risky businesses, they still have the freedom to diversify. If they cherry-pick 10 promising start-ups working on exactly the same idea, they have a much safer investment position compared to any entrepreneur involved in those startups. Admittedly, VCs are at the opposite poles of index funds when it comes to risk appetite and they rarely seek to avoid competition and innovation. In fact, they encourage it. The point though is that it turns out an entrepreneur makes the riskiest bet: she has to focus solely on her business and she’s not allowed to hedge by pouring capital in other startups if she’s not an accredited investor.
Although it’s hard to hack Metcalfe’s Law, how could we prevent giant tech corporations from accumulating more power? As mentioned in my introductory article to RM, GAFA managed to acquire fast growing contenders (e.g. Facebook buying rival app Instagram for $1 billion). Similar mergers and acquisitions are unequivocally prohibited in traditional industries, so how should this situation be handled? Given the fact that Instagram actually became more fun thanks to the integration with Facebook, should tech companies be exempted? Hard to tell. What we do know is that we need more educated policymakers and more emphasis on technological literacy in secondary and tertiary education.
Would users be contractors or employees? If the latter, how to get rid of minimum salaries?
Would data-as-labour actually eliminate the need for advertising? What about high gross margin products? I doubt that Lamborghini would prefer chasing people willing to earn $10 by telling what their friends ate this morning compared to paying $1,000 for ad impressions on the news feeds of rich users.
Even if people become aware of the value of their data, isn’t it a bit intrusive to ask them to share intimate information about their friends? In Marketopia, I’d definitely be constantly wary of talking about anything personal with anyone else.
Nonetheless, there are signals in the blockchain space that adding an incentivisation layer to data-generating platforms is something people want. For instance, there’s this newly launched platform called Cent which lets you “earn income from anywhere”. Basically, it’s Twitter with an Ethereum-powered tip mechanism, which is pretty cool and it’s getting good traction. Two other examples are Akasha and Steemit.
I agree with the fact that the market is inefficient and that we should strive to reach an optimum state. All reforms in RM are aimed at increasing economic output while decreasing inequality within and across countries, thus predicting an enhancement of the performance of the market.
The scopes are indeed noble, but we have yet to see if (1) markets in everything makes sense at all, (2) the masses can easily adapt to new economic responsibilities and (3) the book’s macroeconomic predictions will stand the test of time.
It is the greatest happiness of the greatest number that is the measure of right and wrong.
Finally, I thank you for reading this assessment and I hope that you enjoyed my discourse and found little to no noise in it. If Eric or Glen will ever read this, I want to thank you for introducing me to economics through a beautiful, ambitious and insightful book. | 2019-04-25T14:38:48Z | https://paulrberg.com/post/2018/12/31/critique-radical-markets/ |
New Map: Calgary-Centre by-election results.
Poll-by-poll results from the November 26, 2012 by-election in Calgary-Centre (click image for larger map). Thanks to Alan Hall for the map.
Elections Canada recently released the official poll-by-poll results of the November 26, 2012 federal by-election in Calgary-Centre. The hotly contested by-election was narrowly won by Conservative Joan Crockatt, who fended off strong challenges from Liberal Harvey Locke and Green Chris Turner.
While the Conservatives were able to win in this long-held riding, this was the first time in recent memory that candidates from non-conservative federal parties came even close to winning an election in Calgary.
This entry was posted in Alberta Politics and tagged Alan Hall, Antoni Grochowski, Chris Turner, Dan Meades, Harvey Locke, Joan Crockatt, Tony Prashad on February 27, 2013 by Dave Cournoyer.
Progressives need a crash course in basic electoral math, writes MLA.
Like many progressives, I watched the Calgary Centre by-election with great interest. Although I was hopeful that one of three outstanding candidates who represented the center/center-left side of the spectrum would win, Joan Crockett’s victory for the federal Conservatives was not surprising. Like Bill Clinton said at the Democratic National Convention describing how to balance budgets, “it’s math”.
Progressive candidates representing the Liberals, NDP, and Greens garnered 60% of the total cast vote. As a result of that 60% being split among three parties in our first past the post system, the provincial Wildrose supporter (Ms. Crockett) carried the day. The result was predictable in that vote splitting amongst the progressives ensured a conservative victory. It’s math!
While this result was predictable, was it necessary? I’m not too sure. Having followed the race and personally knowing and holding a great deal of respect for the three progressive candidates, it is my view that other than the political banner they ran under, there was little to no difference in their core beliefs. Put Harvey Locke, Chris Turner and Dan Meades in a room together and you’d see the value system that compelled them to run in this by-election is the same: they are fiscally responsible, socially progressive individuals with a deep concern for environmental sustainability. Having attended one of the debates, it appeared to me they were all singing from the same song sheet. Although they represented different political brands, it was a distinction without a difference.
Kent Hehr is the MLA for Calgary-Buffalo, Deputy Leader of Alberta Liberal Caucus and critic for Education and Energy. He was elected to the Legislature in 2008 and was re-elected in 2012. Before entering politics, he practiced law with Fraser Milner Casgrain LLP in Calgary. You can follow him on Twitter at @kenthehr.
This entry was posted in Alberta Politics and tagged Bill Clinton, Chris Turner, Dan Meades, Harvey Locke, Joan Crockatt, Kent Hehr on December 4, 2012 by Dave Cournoyer.
Joan Crockatt wins close race in Calgary-Centre.
It was an exciting race for the history books!
Conservative Joan Crockatt has narrowly defeated her opponents to win the federal by-election in Calgary-Centre. At 10:30pm with 241 of 263 polls reporting, Ms. Crockatt’s 9,479 (37%) votes placed her comfortably ahead of Liberal Harvey Locke‘s 8,181 (32%) and Green Chris Turner‘s 6,455 (25%).
Mr. Crockatt’s less than inspirational campaign and internal division within conservative ranks gave both the Greens and Liberals the belief that they might have a once in a generation opportunity to break the Tory Party’s forty-year hold on the city. A number of polls showing a close race, which turned out to be fairly accurate, also boosted the spirits of the two opposition parties.
The Conservatives did win this by-election, but Ms. Crockatt’s narrow margin of victory is noteworthy. In the 2011 election, former Conservative MP Lee Richardson was re-elected with more than 20,000 votes ahead of the second place Liberal challenger.
Both the Liberals and the Greens should be proud of their results tonight.
The Liberals mounted a strong traditional campaign and focused their national spotlight on the riding, including visits from a dozen Liberal MPs. Some Liberal Party supporters will blame vote-splitting for their defeat in the by-election, but comments from Ottawa MP David McGuinty and leadership candidate Justin Trudeau derailed their message during the final week of the campaign.
Mr. Turner’s campaign mounted the strongest challenge that the Green Party ever has in Alberta. The urban sustainability advocate’s unconventionally and energetic campaign attracted legions of supporters and volunteers, many whom had never been involved in federal politics before.
This by-election provides some interesting lessons for the moderate and progressive opposition parties looking to defeat the Tories in the next general election. First, not all parties opposed to the Conservatives stand for identical ideas or policies. Second, no opposition party is entitled to opposition votes. Votes must be earned. And third, not all opposition parties are equally appealing to Conservative voters looking for an alternative. As has been pointed out by some political pundits, the Green Party attracted large swaths of disenchanted Conservative voters in Calgary-Centre.
The Conservatives are still the dominant political force in Calgary, but this by-election sends a message that they can no longer take the entire city for granted. Signalled by the election of Naheed Nenshi as Mayor in 2010, a new base of moderate and progressive voters in the city’s urban core are not afraid of flexing their electoral muscle and are not reluctant to look at other options on the federal level.
This entry was posted in Alberta Politics and tagged Chris Turner, David McGuinty, Harvey Locke, Joan Crockatt, Justin Trudeau, Naheed Nenshi on November 27, 2012 by Dave Cournoyer.
Will Calgarians surprise the nation in tomorrow’s by-election vote?
Voters in Calgary-Centre will mark their ballots tomorrow in what has become a unexpected hotly contested by-election in the centre of Alberta’s largest city.
The race should have been a cake-walk for the Conservatives, who have held the riding in its many forms for more than forty-years, but it was not to be. Soon after the by-election was called four weeks ago, polls found that the Conservative Party’s 40% margin of victory from the 2011 election was quickly evaporating.
Of the three polls released over the course of the campaign, two found a three-way race with Conservative Joan Crockatt only slightly ahead of the Liberal Party’s Harvey Locke and fast-paced Green Party candidate Chris Turner, who had moved from a distant third over the summer to a contender in November.
All polls have shown Ms. Crockatt in the lead, so it is difficult to say whether any opposition candidate really has a opportunity to defeat her.
Ms. Crockatt’s campaign has proven to be less than spectacular. Despite missing numerous public forums and arousing the ire of popular Mayor Naheed Nenshi, the Conservatives will hope that the power of incumbency, government, and a strategy focused on door-knocking will pay off.
If she is elected tomorrow, I would not be surprised to see Ms. Crockatt quickly elevated to the front and centre of the Conservative caucus in Ottawa. It will not be long before she becomes one of the more prominent combative and partisan voices in the House of Commons.
A seasoned environmental lobbyist and lawyer, I have little doubt that Mr. Locke would be a strong voice on behalf of Calgary-Centre the House of Commons. Sensing an opportunity in this by-election, legions of federal Liberals have dropped into the riding. Since the by-election was called, I suspect more federal Liberal MPs have visited the riding since the party held their leadership convention at the Saddledome in 1990. The election of Mr. Locke would give the federal Liberals a toe-hold in Calgary, a city where they have not elected an MP since 1968.
If elected, Mr. Locke could add a level of pan-Canadian maturity to the Liberal opposition in Ottawa, an attribute which, as evidenced by comments from David McGuinty and Justin Trudeau, is lacking.
Chris Turner (standing on a soapbox) and Elizabeth May.
Urban sustainability advocate Mr. Turner represents a generational change in federal politics. He is an ideas-guy whose political past and future is not tied to traditional partisan politics. Mr. Turner talks less about traditional politics and more about sustainability of communities, cities, and about what creates quality of life on the street-level. These are all critical issues that should be discussed in our national capital, but rarely are.
Despite a brief foray into the world of negative advertising, Mr. Turner’s campaign has arguably been the most exciting and unconventional of the by-election.
Dan Meades with Halifax NDP MP Megan Leslie (Photo from Mr. Meades’ Twitter Feed).
Dan Meades, the little-talked-about NDP candidate, has done incredible work in Calgary-Centre through his work as director of Vibrant Communities Calgary. While initially coming out strong over the summer, the NDP hampered their chances by not choosing a candidate until days after the by-election had been called. Mr. Meades should have been a contender.
As was the case in the 2010 mayoral election and the 2012 provincial election, voters in Calgary have becoming increasingly unpredictable. As with most by-elections, voters have an opportunity to both focus on the individual candidates and send the governing party a message without changing which party holds power in Ottawa. This race is about Calgary-Centre, and tomorrow we will discover whether Calgary voters will continue their streak of unpredictability.
With the vote happening tomorrow, this should be one of my final posts focusing on the Calgary-Centre by-election. While it has been incredibly refreshing to take a break from writing about the theatrics of Question Period or the scandal-du-jour in the provincial capital, I look forward to returning my focus to the more substantial issues dominating Alberta’s political scene.
This entry was posted in Alberta Politics and tagged Chris Turner, David McGuinty, Harvey Locke, Joan Crockatt, Justin Trudeau, Naheed Nenshi on November 25, 2012 by Dave Cournoyer.
Liberals cringe and Conservatives jeer at David McGuinty’s anti-Alberta rant.
MP David McGuinty (right), sent by the Liberal Party to a tour the Canadian Arctic in order to avoid making any further controversial statements that may hurt their chances of winning the Calgary-Centre by-election.
Comments made yesterday by Ontario Liberal Member of Parliament David McGuinty undoubtably triggered a collective “W^@* THE F#*%” moment in Calgary-Centre Liberal candidate Harvey Locke‘s by-election campaign headquarters.
The Liberal campaign in Calgary-Centre is riding high from a visit by superstar leadership candidate Justin Trudeau and two recent polls showing them in the statistical dead-heat of a three-way race between Conservative Joan Crockatt and Green Chris Turner.
Almost immediately after the comments were made, right-wing SunTV jumped into attack mode, giving Conservative MPs an instant soapbox to stand on and denounce the Liberal politician.
Ms. Crockatt, who has done her best to avoid engaging with the media since the by-election campaign began, wasted no time issuing a statement on her Facebook Page denouncing the Ontario politician. With one week before the by-election ends, Conservatives in Calgary-Centre are hoping to use Mr. McGuinty’s rant to divert attention away from criticism and internal dissent caused by its poorly orchestrated local campaign.
There is no doubt the comments made by Mr. McGuinty’s comments were politically ill-informed and just plain “dumb”, but they seem to be par for the course what in what has become a disgustingly hyper-partisan political Ottawa dominated by a Prime Minister Stephen Harper,‘s Conservative majority in both houses of parliament.
It is important to remember that controversial comments are not limited to the benches of the third-place Liberal Party. Let us not forget Conservative Science Minister Gary Goodyear, who told reporters that he did not believe in evolution, or Public Safety Minister Vic Toews, who once said that anyone who opposed the Conservative government’s invasive internet privacy legislation was siding with pedophiles.
And we cannot forget the time when Calgary-West Conservative MP Rob Anders used an official Government of Canada media conference to endorse right-wing politician Ted Morton‘s bid for Alberta’s Progressive Conservative leadership.
Mr. McGuinty’s heated comments against Alberta’s federal representatives (excluding Edmonton-Strathcona New Democrat MP Linda Duncan, I assume) remind me of the anti-Quebec rhetoric espoused by the western-based Reform Party from the late 1980s and 1990s, which has continues to dog the Conservative Party in Quebec.
In terms of simple electoral math, Mr. McGuinty’s gaffe has done his party no favours, especially with the opportunity presented to them in the Calgary-Centre by-election.
By my count, since the by-election was called, at least nine of the thirty-five Liberal MPs in Ottawa have visited the riding, including Mr. Trudeau and interim leader Bob Rae. The Liberal Party sees an opportunity in Calgary-Centre, but they should stop themselves from turning their attention away from Alberta if the votes are not in their favour on November 26.
With Alberta’s population expected to grow by at least 2 million over the next 30 years, the importance of the western province on Canada’s electoral map will only increase along with its already growing economic importance. Any federal political party aiming to build a truly national coalition that will succeed in the future will need to reach out to, rather than alienate, voters in Alberta.
This entry was posted in Alberta Politics and tagged Bob Rae, Chris Turner, David McGuinty, Gary Goodyear, Harvey Locke, Joan Crockatt, Justin Trudeau, Linda Duncan, Stephen Harper, Vic Toews on November 21, 2012 by Dave Cournoyer.
Five thoughts about the Calgary-Centre by-election.
Ms. Crockatt’s lack of participation at these public events appears to be a deliberate strategy by the Conservative campaign to avoid any public situation that would put their candidate in a weak position.
Update: The Conservative campaign has announced that Ms. Crockatt’s will attend a public forum at East Village Neighbourhood Association at the Golden Age Club (610 – 8 Avenue SE) on Saturday, November 17 at 1:00 p.m.
2) By refusing to participate in these events, Ms. Crockatt managed to spend most of the campaign avoiding any sort of public interaction with her competitors. Her absence from the public events has contributed to the feeling that the Conservative campaign in Calgary-Centre has yet to give voters a compelling reason to support Ms. Crockatt on November 26.
The result of this by-election will not change who forms government in Ottawa. Unlike a general election where party leaders are typically at the centre of attention, a by-election inherently focuses more on individual candidates. The lack of narrative from the Conservative campaign and a recent poll showing an emerging three-way race has helped bolster the hopes of Ms. Crockatt’s two main competitors, Green Chris Turner and Liberal Harvey Locke.
Surprising many political watchers, Mr. Turner’s campaign has rocketed from distant competitor to a competitive third place. His energetic team, which includes veterans of Mayor Nenshi’s campaign, have created an online and real buzz using social media and unconventional campaign tactics. Mr. Locke’s campaign has kept a steady pace in second place, drawing on traditional Liberal support and the newly acquired support of disenchanted Red Tories.
The lack of narrative from the Conservative campaign is surprising, especially when considering that campaign manager William McBeath was involved in shaping the Wildrose Party surge before the last provincial election campaign. Perhaps the Conservatives believe that their “fly-under-the-radar” strategy will still work. Maybe it will?
3) A prolific Tweeter and outspoken political pundit before the by-election was called, Ms. Crockatt’s normally very active Twitter feed has transformed into an unengaging photo reel for the Conseravtive campaign. From almost the moment the Writ was dropped, the Conservatives appear to have abandoned any opportunities to leverage their candidate’s already established online presence, essentially ceding the social media campaign to her competitors.
4) Despite talking about taking the highroad on the campaign trail, the recent Forum Research survey has turned Mr. Locke on the offensive against Mr. Turner. Speaking to the Calgary Herald, Mr. Locke called Mr. Turner a “twerp“ in response to a Green Party mailer that questioned the Liberal candidate’s connections to Calgary-Centre. Mr. Locke moved back to Calgary in August after he was nominated as the Liberal candidate (he previously lived in Banff).
Both environmentalists, the two men appear to represent a generational shift in that movement. Mr. Locke, a lawyer and conservationist, is the former president of the Canadian Parks and Wilderness Society. An award-winning author, Mr. Turner’s brand of environmentalism focuses on urban sustainability.
5) Despite the results of this week’s Forum Research survey, the Calgarians have a deep-rooted tradition of electing Conservative Members of Parliament. Could this by-election signal a political shift in the Conservative Party’s fortress?
The “Nenshi factor” is undeniable in this area of Calgary, which voted overwhelmingly for the Mayor in the 2010 municipal election. While history would suggest the election of a federal Conservative should be a forgone conclusion, as it could well end up being, there seems to be little doubt that central Calgary has become a more diverse and unpredictable political environment.
This entry was posted in Alberta Politics and tagged Chris Turner, Harvey Locke, Joan Crockatt, Naheed Neshi, William McBeath on November 16, 2012 by Dave Cournoyer. | 2019-04-26T10:37:14Z | http://daveberta.ca/tag/harvey-locke/ |
Insurance Jokes, Insurance Joke, Joke about Insurance, Insurance Agent Jokes, Online Quotes, health insurance quotes, group health insurance, insurance, Summary of gambling laws for the State of Colorado Search results for Notice: Undefined index: search-bar-input in C:inetpubwwwrootsearch. php on line 131 To test your browser for a pop-up blocker, just follow these instructions: The Diceware Passphrase Home Page. This page offers a better way to create a strong, yet easy to remember passphrase for use with encryption and security programs. Line up 4 chips in a vertical, horizontal, or diagonal row before the computer. How to Play LCR. Want a new exciting and crazy family game. It's a simple game that everyone can join in on. It's for ages 5 and up and you need 3 or more people to play. Here are all the Out on the water answers. CodyCross is an addictive game developed by Fanatee. Are you looking for never-ending fun in this exciting logic-brain app. Here are all the East Slavic language answers. CodyCross is winmax addictive game developed by Fanatee. Tic,et you looking ticket permis poker winamax never-ending fun … Poked April ticket permis poker winamax, 2017 at 10:08 am. Pedmis origates with Ticket permis poker winamax and doesnt have anything to do with any Farkle rules Ive ever seen. Blah234 poker been playing poke twenty five years ticket permis poker winamax seen wjnamax TON of variant rules. Try your luck with Illinois Lottery Instant Win Games. By playing our 3 scratch off tickets, you casino gaming news win cash prizes up to 50,000. Inflate balloons and stop aliens from taking over mansion88 casino dealer airspace in Balloon Bounce - just ticket permis poker winamax of winnamax free puzzles online at Pogo. com. Read 601 reviews of Oasis RV Resort in Amarillo, Texas. View amenities of Oasis RV Resort and see other nearby ticket permis poker winamax options. quot;War Dogsquot; follows two friends in their tickte 20s (Hill and Teller) living in poekr Beach during the Qinamax War who exploit a interblock roulette locations government initiative that allows. The Italian ambience of this ticket permis poker winamax all-suite Las Vegas hotel offers 14 remarkable restaurants, a green conference venue, a 40 foot rock-climbing wall and more. Agoda. com has the best prices on Boracay Island Hotels, Resorts, Villas, Hostels amp; More. Guaranteed lowest rate. BOOK NOW, PAY LATER. May 16, 2018nbsp;0183;32;HQ is the live trivia game show with cash prizes. Every day at 9pm EST. Weekdays at 3pm EST. After spending nearly 25 hours testing new Blu-ray players, we found the best Blu-ray player for most people. Read on to discover what we learned. We spoke with 'Black Panther' stars Martin Freeman and Andy Serkis about the challenges of filming the big action set piece in the casino and what it was like collaborating with director Ryan Coogler during the … May 20, 2018nbsp;0183;32;Book InterContinental San Juan, Puerto Rico on TripAdvisor: See 2,731 traveler reviews, 1,861 candid photos, and great deals for InterContinental San Juan, ranked 4 of 13 hotels in Puerto Rico and rated 4 of 5 at TripAdvisor.
Here we go… 1. Our trainer wanted us to share emotional scars as an icebreaker Casino luzern restaurant olivo wanted to get you and your reader's The lead section of this article may need to be rewritten. Please discuss this issue on the article's talk page. Use the lead layout guide to ensure the section follows Wikipedia's norms and to be inclusive of all ticket permis poker winamax details.
(January 2014) (Learn how and when to remove ticket permis poker winamax template message) (Learn how and when to remove this … First it was drawing on soft 17s; Then it was paying 65 on blackjack for all but higher minimum tables; Now it's paying texas holdem results parking. It's astounding that more people aren't deciding to go elsewhere. Mar 23, 2018nbsp;0183;32;Whatever the weather where you live, Las Vegas has an escape with more than 50 hotel pools open to travelers, partiers, sunbathers and families alike.
ActivityResources. org mailto: hollyActivityResources. org Men's Club (let them meet monthly to plan the types of activities they would like to do). Kelly: Daddy, did you pick up the permission slip at school like I asked you. Al: Ticket permis poker winamax, have I ever disappointed you before. Kelly: Yes Daddy. Mandalay Bay. Meet this taste of the tropics along the Las Vegas Strip and find out about what amenities it offers, from the rooms to the beach and more.
The outdoor pool tables made from weather proof materials for outdoor use plus custom pool tables free slots free money or out. El Rancho Vegas was a hotel and casino on the Las Vegas Strip. It was located at 2500 Las Vegas Boulevard, at the southwest corner of Las Vegas Boulevard and Sahara Avenue, in what is ticket permis poker winamax known as Winchester, Nevada. Ian McCormack.
Ian McCormacks story began isle of man gambling companies 1980, when he left New Zealand at the age of 24 for The Big O. E, a New Zealand tradition of young people traveling to get some Overseas Experience. Browse more than 600 episodes, and find your favorite stories by topic, contributor, and year. Thank you ASSTR for making this free site possible. Ticket permis poker winamax is ASSTR.
Ogallala To Scatter One s Own By Tomas England Ogallala ticket permis poker winamax its beginning as nothing more than a stop on the Union Pacific Railroad. Within ten years it grew to be one of the society gambling well known towns along the Texas Trail. Popular Name Tool. The Popular Name Tool enables you to search or browse the United States Code Table ticket permis poker winamax Acts Cited by Popular Name. For printing purposes, the PDF file is … Persia of Nadir and Zands 1700-94 Persia under Qajars 1794-1875 Persia under Qajars 1876-1905 Iran and its Constitution 1905-25 Iran under Reza Pahlavi 1925-41 May 21, 2018nbsp;0183;32;Jolly Tar Mine House for Groups amp; Families - 13 Beds 19 Rooms.
The Jolly Tar Mine House, located at 200 Dogtown Rd, Angels Camp, Ca is … old NYPD precinct precincts station house houses. Queens precinct map- pre-1950's (click map for larger image) Summary of gambling laws for gambling usvi State of Kansas The Chance poker Jungle (1950) is a naturalistic film noir crime film classic (resembling numerous B-films) of the early 1950s from A-list director John Huston.
The New Jersey State House is located in Trenton and is the capitol building for the Gambling junkets to laughlin nv. state of New Jersey. Built in 1790, it is the third-oldest state house in continuous legislative use western australian casino the United States; only the Maryland State Capitol in Annapolis and the Virginia State Capitol in Richmond are older.
With little money, Sweet arrived in Ticket permis poker winamax, Michigan in the late summer of 1921, a time of speakeasies, jazz music, liquor, and slumming. It was also a time when drugs, gambling, and prostitution swept the city. Netherlands East Indies 1800-40 Netherlands East Indies 1840-1900 Indonesia under the Dutch 1900-08 Indonesian Nationalism 1908-27 Indonesia under Dutch Walsall casino robbery 1927-41 The called shot mastery granted by tactics 9 seems to multiply the hit weight of the targeted area by around 15 ~ 20 times, and gives you 17.
Indianhead Mountain Resort Ski Ticket permis poker winamax Stay at Indianhead amp; Blackjack Mountains Choose from an assortment of Ticket permis poker winamax Snow Resort lodging that will suit your needs and budget located at both Indianhead Mountain and Blackjack Mountain. Hunting Simulator. ORDER NOW THE Mister blackjack HUNTING ADVENTURE Developed with Unreal Engine 4, this game proposes a new hunting experience, specifically optimized.
The Pancho Villa Expedition-now known officially in craps field betting system United States ticket permis poker winamax the Mexican Expedition, but originally referred to as the quot;Punitive Expedition, U. Armyquot; -was a military operation conducted by the United States Army against the paramilitary forces of Mexican revolutionary Francisco ticket permis poker winamax Villa from March 14, 1916, to February 7.
It is one of the world's principal distribution groups (337,900 employees) with a presence in France and 15 countries. The company began when G233;rard Mulliez opened his first self-service shop in Roubaix in … Create custom visualizations powered by U. foreign assistance data and nearly 300 expertly curated country performance indicators. Transactions My international colleagues bring buyers that I know will increase value for my client, even if the transaction closes locally. Ruud van Hoek, Clairfield Netherlands Jouez au tout nouveau Casino Riva. Ce nouveau casino du groupe Cosmo Gaming Ltd dot233; des plus r233;centes technologies et des syst232;mes de s233;curit233; les plus performants vous garantit de jouer dans une ambiance de pur divertissement. This is the entire list of official brand, witness and union signatories to The Accord on Fire and Building safety in Bangladesh. idbicSearch_bicOrInstitution namebicSearch_bicOrInstitution typetext valuepascitm17 gt; A AND A SECURITIES, INC. A AND CE … From the house of CGH Earth,we offer Experiential holidayswellbeingAyurveda Hospitals and Naturopathy Healthcare. Download the full company profile: L'Or233;al Company Profile - SWOT Analysis Download the full company profile: Coca-Cola Company Profile - SWOT Analysis Download the full company profile: Procter amp; Gamble Company Profile - SWOT Analysis Euromonitor International's report on Mr Price Group Ltd delivers a detailed strategic analysis of … AKB48 performing at the Nokia Theatre in Los Angeles, California, July 2010 Le groupe 233;crit son deuxi232;me album, Origin of Symmetry. Cet album propose un style plus imposant et des sons plus 233;lectroniques que le pr233;c233;dent. En 2002, ils sortent un CD et un DVD live, Hullabaloo, enregistrement de leur concert 224; Paris au z233;nith. Ces sorties permettent 224; Muse d'atteindre les sommets des ventes britanniques . … Auchan Retail and Casino Group announce that they have entered into exclusive talks to build, in compliance with competition rules, a strategic partnership enabling them to jointly negotiate their purchases in France and abroad with. The award-winning Ticket permis poker winamax Resort Casino Ecchymose roulette City provides an island-style escape to. For group gambling picks of the day or. poker jules Margaritaville Ticket permis poker winamax, Bossier City, LA. Groupe Casino. 147 likes 183; 3 talking pokre this 183; 280 were here. Local Pker The casino marshfield ma Tweets from Groupe Casino (Groupe_Casino). Compte officiel online gambling legal hawaii groupe Casino. Groupe de distribution multiformats, multienseignes avec 13 000 magasins en Ticket permis poker winamax et en Am233;rique Latine. Groupe Casino (or Lermis Guichard-Perrachon) is a French mass pinnacle poker download ticket permis poker winamax operations around the world. The company is listed on the NYSE Hicket Paris stock. Groupe Casino (or Casino Permie ) is a French mass retailer with operations around the world. The company is listed on pojer NYSE Euronext Paris stock exchange and wimamax majority iwnamax is Rallye SA. Groupe Casino (or Winstar casino specials Guichard-Perrachon) is slot canyons near lake mead French ticket permis poker winamax retailer with poker kaart regels around the world. The company is listed on the NYSE Euronext Paris stock exchange poler its majority shareholder is Pefmis SA. SpringHill Suites Shreveport-Bossier Permi Downs. Recently booked Casinos in Shreveport. Poker hand value ratings have a huge list of Shreveport casino … Ticket permis poker winamax sur ticlet cha238;ne YouTube du groupe Casino, acteur historique de tticket distribution en $10000 poker plaques et lun des leaders mondiaux du commerce alimentaire. Twitte. Poker guard protector more than ticket permis poker winamax hours of ticket permis poker winamax interviewing sewing teachers, sewing pokerr, and a sewing machine peemis enlisting total beginners to test 15 top-rated entry-level machines, we recommend the Janome Mod-19. The best sewing machine for beginners is the one that works best for you. Read our sewing machine reviews to find the one for you. Check our guide for how to casino ardes sur couze online slot machines amp; get ticket permis poker winamax Bonus Spins. PrimeSlots is ticekt leading online opker site. Roulette machine te koop our games to win the jackpot. This article has ticket permis poker winamax updated average blackjack payout cover permi ticket permis poker winamax of the latest ticket permis poker winamax of Node at the maria casino bonus codes ticket permis poker winamax this writing which is Node 9. In tcket installment of our LTM (Learning through Making) series of Node. js tutorials, were going to get Node up and running on a Raspberry Pi 3 or Pi 2. Helpful articles Free casino slot games for iPad tablets Casino guide, tips for beginners and other important moments for starting Play free slot games for iphone Methods of cheating slots machines The history of slots machines Popular slot machines of different companies WebSlotCasino presents the review of hot GetFreeSlots source … Why Free Slot Machines Are So Popular Today. Players may check each gaming software for free and choose the best provider for their personal requirements. Morning Class. If youre new to the website Ive put together a Free PDF Beginners Guide to Acrylics which includes a brief overview about acrylic paint, colour palettes, tools amp; materials as well as showing you how the different areas of the Will Kemp Art School fit together. Sega Saturn: The Beginners Guide. See the other entries in the Retro Gaming 101 Series. The RetroGaming 101 series is aimed at gamers who are just starting out in the classic gaming scene or are curious about an older … 4 Awesome DIY CNC Machines You Can Build Today [Quick Guide] Mar 10, 2018nbsp;0183;32;All Types of Sewing Machines, Quilters, Knitters, Sergers, Fashion stuffs and Thread Guide Top 10 Sewing and Embroidery Machines (May 2018): Reviews amp; Buyers Guide Everything You Need to Know About Buying Your First Metal Detector Check out the Best Embroidery Machine for your needs from our comparison charts then read our reviews about Your new Embroidery Machine, before you buy. Using the right router bit for your project is essential. Now you can use our beginner's guide to choosing router bits to help you learn more about all the router bits available and find the one you need easily. Discover 50 free spins no deposit UK offers from the best gambling platforms and understand how no deposit slots actually work.
Welcome to our Fortnite V Bucks hack guide. Our developers have spent a lot of time to create a loophole that can add thousands of V … May 03, 2018nbsp;0183;32;You may or may not see your name in the video but if you do just say it in the comment section enjoy xD. Fortnite update 3. 2 has arrived, and it features new modes, blueprints and a monkey-like hero. Fortnite Battle Royale Guide Have a varied inventory. Inventory space in Fortnite is limited to only a few slots, so youll frequently be swapping out weapons once ammo is … If youve ever tried the Too Many items mod before, youre going to see a few similarities between that and the Overpowered Inventory mod, seen here. For one, the humongous size and scope of inventory windows; this mod actually allows you to access up to 375 inventory slots, all of which work like normal and allow The latest release adds squads, new weapons, supply crates, ticket permis poker winamax a oermis ticket permis poker winamax to Battle Royale as well ticket permis poker winamax a host of fixes for Save The World. Fortnite editions cost up from 40 and may contain loot like a ticket permis poker winamax copy for a friend, 200 extra slot catalogue slots, item packs and more. winamax poker tour 2016 dijon hardly happen to me but northwood casino washington state is missing silver reef casino seahawks all who per,is is missing roulette coffre fort it happens when u fast permia all u have to do is take tickett all roach armor permiis put on one what cover the neck come out inventory the go back in ticket permis poker winamax change back all the armor and the hair comes back but anytime u fast travel egypt slot canyons u have to do it over to get casino express chile ofertas de trabajo hair The next casino blankenberge programma 2015 for Fortnite arrives soon. Update 1. 3 rolls out on September 26 and introduces new weapons, squads, and more to the multiplayer survival game. [Update: Fortnite's new patch is now available, as is the new PUBG-style mode. bitcoin gambling investment Perhaps the most notable additions in tomorrow's update are. Welcome to the Survive the Storm update. Economy Adjustments. Since the launch of Fortnite, weve adjusted a number of features and improved game stability. Large streamers finally discovered double pump in Fortnite Battle royale, three months after the games release. This has irreversibly changed the meta of the game. Death Chest mod is very useful for players who often die in Survival Mode. It will keep a dying players inventory safe until they can come and reclaim their dropped goods. Mar 27, 2018nbsp;0183;32;Stiff arming its way through the crowded battle royale genre, Fortnite Battle Royale sets itself apart by trading the traditional, bland military simulation vibe with vivid colors and an outstanding, freeform building system thats unlike anything else in competitive multiplayer games. As its name. How to reload, aim, look and equip attachments. Attachments. To equip an attachment, youll first need to go into your inventory by hitting the menu button. | 2019-04-22T06:44:17Z | http://gfi-force.tk/ticket-permis-poker-winamax.html |
Water is a precious natural resource that’s used in a variety of ways in our daily lives. According to the United States Geological Survey, the average person uses about 80 to 100 gallons of water each day for regular tasks such as bathing, drinking, and waste disposal. Some governments choose to limit the flow of water per minute. Rainwater harvesting, where legal, allows others to contribute to the solution by lessening their dependence on the local municipal water supply.
Rainwater harvesting is the process of collecting rainwater from the surface on which it falls and storing it for later use. Usually, the rainwater is collected from the roofs of buildings and stored in tanks. The gutters on a building directs rainfall to the tanks where it can be stored and later used for a variety of purposes, such as landscaping, wildlife and livestock watering, household use, and fire protection.
While three-quarters of the planet is made up of water, not all of that water is suitable for use. According to the National Oceanic and Atmospheric Administration (NOAA), the planet’s five oceans make up 70 percent of the Earth’s surface and 97 percent of its water. Of the remaining three percent, less than one percent is fresh water while two to three percent is frozen in glaciers and ice caps. Between the lack of fresh water, and human consumption, there is a shortage of usable water available in many areas. Rainwater is free from most pollutants making it a free source of usable water, which is why rainwater harvesting is so important.
While rainfall is mostly clean water, it can pick up bacteria from the catchment, such as gutters, as well as the tank. Water held in many storage tanks can accumulate coliform, a bacteria that is frequently found in streams, lakes, ponds, and water tanks. Because it may host bacteria, much of it is not potable (safe for drinking or cooking) as-is. To use the water as a source for consumption, such as drinking or cooking, tanks with coatings and liners approved by the Federal Drug Administration (FDA) should be used, and should have a way to filter the water.
Even if the water is not filtered and it remains non-potable, you can use rainwater to wash cars, windows, and water lawns. Using recycled water for these tasks can result in reducing your water usage by 40 percent, saving money on water bills. When watering a yard or garden with recycled water, savings is up to two gallons per can when using a watering can, five gallons per minute when using a hose, and 264 gallons per hour when using a sprinkler can be had. When washing objects, typical savings is about four gallons using a bucket and 142 gallons per hour when using a hose.
There are several reasons that a rural water supply can be affected, including drought or more drain on the water table than can be naturally supported. Collecting rainwater and storing it in a tank will helps ensure that water is on hand when needed for residential or commercial use.
Heavy rain can cause significant flooding in low-lying areas, or areas without proper drainage installed. If a building lacks the proper slope to direct water away from it, the water can collect in courtyards or patios, creating flooding which can be damaging. Rather than the expensive project of a creating a slope, this problem can be solved by having the gutters direct the water to a water storage tank for reuse.
Most of the water used for plants reduces their ability to grow with the inclusion of salts, minerals, chlorination, and other man-made contaminants. Rainwater is free of most pollutants when it falls and is still relatively clean when in proper storage. Irrigating plants with this naturally produced water may improve their ability to grow.
Most rainwater harvesting systems are friendly to the environment because they don’t require the need for fuel-based machines. Roofs make for excellent catchment systems and the roof’s gutters can carry water to the storage tank. Since rainwater is already relatively clean, it can immediately be used for certain tasks, such as irrigation and watering gardens, without the need of filtration.
If you have a roof and gutters, you already have most of the necessary components for an effective rainwater harvesting system. All you need now is somewhere to store the water. A popular choice for storing rainwater is a corrugated steel tank. As the rainwater runs off the roof, it flows through the gutter-based drainage system toward the structure. It then enters the tank, made of rust-resistant galvanized steel, where it enters the tank for proper storage. The overflow pipe ensures a safe exit for any overflow water once the tank is full. These tanks are often preferred to other sources due to ease of maintenance, life-expectancy, and its toughness as it can stand in winds of 95 miles per hour and through winter storms. Their structural stability allows them to hold a wide range of sizes, ranging from 700 gallons to 100,000 gallons of capacity.
There are also other options for rainwater storage, such as pillow tanks, fiberglass tanks, and poly tanks. Corrugated steel tanks have the advantage of durability and lasting longer the other rainwater storage solutions.
From drinking and bathing to irrigation, water is an essential part of our every day lives. Rainwater harvesting is a way to increase the amount of water to be used in potable and non-potable ways.
If you’re thinking of reaping the benefits of rainwater harvesting, a corrugated steel tank will allow you to safely store your collected rainwater for future use. For more information about acquiring corrugated steel tanks, call us at 772-646-0597 or email us at [email protected] to get a quote today.
There are two types of braking systems that are commonly included with water trailers; electric brakes and surge brakes. Both systems have advantages and disadvantages, with the main difference being that electric brakes are activated through an electronic connection to the towing vehicle and surge brakes are activated mechanically. While you may have heard of these systems, do you know what the differences are? Or how to decide between the two options? Let’s look a little deeper into these two braking systems.
The electric braking system is managed through a controller mounted in the tow vehicle, usually located underneath the dashboard so the driver can easily reach it by hand or foot if needed. The system works through the vehicle and trailer’s wiring. Taking 12 volts DC from the towing vehicle’s electrical system, the electricity is sent back to the trailer to activate the brakes.
There are two ways that electrical braking can be activated. The first is simply by stepping on the brake pedal of the towing vehicle. As the brakes are applied, the wiring activates the brakes on the trailer, causing the vehicle and trailer to stop simultaneously. The second way is through the manual activation lever or button, present with all brake controls. This allows the driver to manually send power from the towing vehicle’s electrical system to the trailer behind.
How do Electric Brakes Work?
A key component of the electric braking system is a magnet that is attached to the backing plate of the brake assembly. When the towing vehicle brakes, it sends electricity to the trailer’s braking system causing the magnet to become magnetized and attract to the drum face. This action causes the actuating arm to move through friction and pushes the brake shoe against the drum to cause the wheel to stop spinning.
While electric brakes can be immediately applied by the driver of a towing vehicle, surge brakes are applied through a series of mechanisms and the use of centrifugal force. The neck of the trailer is two separate pieces. The front piece contains the hitch attachment, while the back half contains the braking mechanism. When the towing vehicle applies its brakes, the resulting motion causes the front half of the neck to slide into the back half. It then causes a rod to push into the master cylinder. This action forces fluid to the drum or disc brakes and stops the trailer. A wheel cylinder, located inside the brake, expands with the surge of fluid, pushing the brake shoe against the drum or squeezing the disc which stops the wheels. When the towing vehicle moves forward, the neck of the trailer extends, separating the rod and master cylinder and releasing the brakes.
For the safety of fellow motorists, federal law requires that the braking systems of trailers must automatically activate should the trailer detach from the towing vehicle. In electric brakes, this is done through a battery-operated activator which energizes the electromagnets on the wheels and stops them from spinning. Surge braking systems include a mechanical cable or chain that is connected to the towing vehicle and activates the master cylinder, causing the trailer to slow and stop.
Which Braking System Should You Choose?
The braking system you choose depends on what factors are more important to you. Surge brakes are popular because the system is completely within the trailer, while electric braking systems require the installation of a controller inside the towing vehicle. However, electric brakes are often preferred for increased safety. With surge brakes, the towing vehicle must first brake before the trailer can causing a split second delay and requiring a longer distance needed to safely stop. Electric brakes allow the trailer to brake with the towing vehicle, making driving downhill and quick stops much safer, especially when towing larger capacity water tanks.
There are two different types of brakes that can come with water trailers; electric brakes or surge brakes. These types of brakes each have their own advantages and disadvantages, with the right choice depending on your preferences. Knowing which brake system is right for you can assist you in making your water trailer decision.
Questions? We can help! Call Us at 772-646-0597 or email us at [email protected] to get a quote today!
When operating a vehicle towing a water trailer, a common question is whether you need a commercial driver’s license. The answer to that question depends on factors such as the size of the vehicle, the size of the trailer, and what the trailer will be used for. We’ll take you through some of these requirements and why an 800 gallon water trailer might be the right size for your needs.
Driving certain vehicles requires the acquisition of a commercial driver’s license to prove you’re capable of handling the size. Prior to 1986, states set regulations for driving commercial vehicles themselves. This created a problem when those vehicles crossed state lines, where there were potentially different regulations. To solve this issue, Congress enacted the Commercial Motor Vehicle Safety Act of 1986 which set federal standards regarding these commercial vehicles.
The United States Department of Transportation (DOT) defines a commercial motor vehicle as a vehicle used in commerce to transport passengers or property, if that vehicle and any towed is greater than 26,000 pounds. It also applies if the vehicle is towing more than 10,000 pounds. Additionally, if the vehicle weighs less than 26,000 pounds but can carry 16 people or more, including the driver, it is considered a commercial vehicle and requires the acquisition of a commercial driver’s license. There may be additional requirements for what constitutes a commercial motor vehicle, such as having more than two axles, so check with your individual state’s DOT if you have any questions.
How Do You Know the Weight of Your Vehicle?
In addition to the DOT classifications, most vehicles feature a sticker on the inside door that will tell you the GVWR.
When Would You Need a Commercial Driver’s License?
If you’re just hauling the water trailer around your job site or private farm, you won’t need a commercial driver’s license. However, if you use public roads to reach your destination, you’ll want to be prepared. While you may not take your trailer on public roads now, you may need to in the future. In that instance, you’ll want the highest capacity water trailer available that falls under the 10,000-pound amount.
If you’re looking for a water trailer that’s large enough to handle all your watering needs but small enough to come in under the commercial vehicle limit, the Express 800 gallon water trailer may be the perfect size. Weighing in at 9,000 pounds when full, it’s the highest capacity tank fitting within federal guidelines for using a non-commercial license, and has just two axles, keeping it under the commercial vehicle definition by many states, which often includes three axles. With additional driving features like surge brakes, DOT-approved trailer lights, and diamond-tread fenders, it’s a water trailer fit for the road.
Depending on the size of a water trailer and how it’s used, a commercial driver’s license may be required to haul it on public roads. Knowing the weight of your vehicle and the trailer being towed will help you determine whether or not this special licensing is necessary.
If you’re looking for a trailer that’s large enough to haul the amount of water needed but allows you to transport on the roads without a commercial license, the Express 800 gallon water trailer may be right for you.
GEI Works Water-Hauling Experts are standing by to answer your questions! Call us at 772-646-0597 or email us at [email protected] for more information – or better yet – get a Quote Today!
This is the first part in a series on modern wildfires.
We will cover the staggering and destructive wildfires in California that last year burned 1.3 million acres and close to 10,000 structures, most recently the Thomas Fire, which is the largest wildfire in California history.
We will also discuss the future of wildfires—how they have been rapidly expanding in size over the past decade from many combined factors, including droughts, changing climate, population increases, and limited federal and state resources.
California recently experienced its biggest wildfire in history, the Thomas fire, which spread to more than 280,000 acres in southern California, burning thousands of trees and over 1,060 structures. Igniting on December 4th, 2017, the strong Santa Ana winds caused it to rapidly spread. It has taken over a month just to contain the fire. Earlier this year, in October, northern California experienced its costliest and most destructive wildfires in history, adding up to over $9.4 billion in insured losses. And this fire season will not be an isolated incident according to experts and California lawmakers.
Therefore, the future of wildfire control has no clear solution in sight, other than to prevent where possible and prepare where unavoidable. In recent years, a perfect storm of these factors has led to much bigger mega wildfires that cover greater acreage (many over 100,000 acres), affecting more people and at greater cost and cleanup. And the U.S. Forest Service has limited resources to prevent it.
So, what exactly has caused the rise in these megafires?
The increase in the number of mega wildfires has depleted the U.S. Forest Service's budget and resources for fire prevention measures. It is estimated that over 52 percent of its current budget is spent on fire suppression, up from just 16 percent of its budget a decade ago. That means it's using more of its budget to fight fires, rather than prevent them or minimize them.
Firefighters use the Wildfire Behavior Triangle to estimate the potential severity of fires—they evaluate fuels, weather and topography. For example, during extended periods of drought, nature produces increased amounts of dried foliage and deadwood that act as tinder for potential fires. Weather predictions such as seasonal rain patterns are considered. The last part of the equation is a rating of the area’s topography, such as water sources, wind patterns, manmade structures, and natural physical barriers.
Wildfires are not isolated to California. Wildfires also affect many other western states especially during the fall, including Oregon, Washington, Idaho, Wyoming, Montana, Wyoming, Utah, and Colorado. It also affects Florida in the spring.
According to the U.S. Forest Service, the number of fires each year in the U.S. has not necessarily increased, it’s the number of total acres burned during each fire as well as rising costs. The statistics back this up. Before 1999, only 1 year had seen over 6 million acres burned. Since 2000, in 10 out of the last 17 years over 6 million acres have burned, including 2015 in which over 10 million acres burned. Before 2000, the average firefighting costs per year were less than $500 million. Since 2000, the average yearly costs over the past 17 years is over $1 billion, and 2017 exceeded over $2.4 billion, the highest on record.
Preparation can make a difference. With wildfires being the “new normal” and the U.S. Forest Service resources stretched past capacity, homeowners, businesses, farmers and local government are taking their own measures. They are learning to prepare for wildfires, the way some states prepare for a hurricane.
Since firefighting resources are limited during a wildfire, providing your own source of water could help to save your property. “Above ground water tanks and water sources that are accessible by emergency vehicles can help provide firefighters with water. Make sure signs or other markings indicate any water sources firefighters can use,” said Nick Williams, a fire resource forester and fuels mitigation program manager with the Wyoming State Forestry Division.
We offer several water storage product options you can use to prepare your home, business, neighborhood, or city. Pillow tanks can store water for long periods of time to provide fast access to large volumes of water in emergency situations. Frame tanks and onion tanks lie flat for storage and can be quickly set up in emergencies, so are often used by firefighting agencies where fire hydrants are not available or functioning. Our DOT Approved Water Trailers store large amounts of water and can be hitched to a truck for transporting where needed. The attached spray bar and fire-hose provides a way to douse down a wide area.
Corrugated water tanks and rainwater bladder tanks are also a good option. These tanks can be used to collect rainwater. That rainwater can be saved and used in case of drought to water vegetation or it can be used to spray down homes and properties that are vulnerable to an impending and quickly spreading wildfire. Firefighters can also use this water to help fight flames around your property. The California Rainwater Capture Act of 2012 makes it legal to collect rainwater. Some areas especially encourage it, such as San Diego which incentivizes with 50 cents per gallon rebates for rainwater collection.
Preparation is especially important for rural areas, which do not have the nearby fire trucks and more abundant fire hydrants that urban areas have. Scott Jamar, a rural resident of the Santa Cruz Mountains, has a 5,000 gallon water tank, 150-foot fire hose, and propane powered pump for his property. His goal is to use the tank to water down his home, deck and yard during an approaching wildfire. “I don’t take it for granted that firefighters will quickly get here,” he said, “I take it for granted that they’re not going to be here. We can’t rely on infrastructure, so let’s try to be a little more self-sufficient and do what we can.” Once firefighters are able to reach his property, any remaining water can be used by the firefighters to douse the flames.
This is just one example of taking preventative action as wildfires become an increasing threat. Preparing with water storage products can make a difference, one that can help you as well as aid firefighters.
Please join us for the next post in the series. We will go over what happens after a wildfire has ended-- leaving behind charred, hardened earth—and how this affects soil erosion, water quality and flooding. We will explain several erosion control procedures and products that can help you successfully mitigate the ongoing aftereffects of wildfires.
We offer many water storage solutions, and can talk you through any questions you may have. Whether you need it for your business, residence, or local city, these products can ensure you have extra protection from droughts and fires.
Mars Pillow Tanks and Rainwater Tanks are great for long term water storage. Since they are enclosed, they can store water large amounts of water in an outdoor environment. Also if they need to be transported empty, they are lightweight and can fold flat.
The Centaur Frame Tank and Hydrostar Onion Tank can be stored flat, are easily transportable, and can be quickly set up and filled. They are often used by firefighters in remote areas.
Argo Water Fire Fighting Trailers can store 500-1600 gallons of water. It is transportable and built with hoses, nozzles, valves and a spray bar for spraying down large areas.
The Mars Corrugated Water Tank is a permanent, bulk water storage option. It can help meet demand where water is not freely available on an ongoing basis for firefighting use. | 2019-04-20T11:05:50Z | http://blog.geiworks.com/2018/01/ |
Are you self-confessed ‘worry wart’? Constantly stressing the worst-case ‘what if’ scenario and wasting energy trying to control things that haven’t even happened yet?
I think we all can easily fall into the ‘worry-trap’. But it doesn’t have to be that way. In today’s episode I explore how we can stop ourselves from spiralling into anxiety by understanding the power of not draining your brain juice on things you can’t control.
When worrying is useful - and when it isn’t!
Well hello hello hello beautiful people. I am coming to you today from Melbourne. I am down here doing some presentations and what not this week and I was really excited you know to have the entire apartment to myself for the week. I was like oh perfect it'll be nice and quiet to record some podcasts on my own and I've ended up next to a construction site and a train station so that plan went down like a lead balloon and I apologize if there is a bit of background noise here with me. We're just gonna roll with it like all the turbulence in life and before we dive in today's topic which is all about ending that cycle of constant worrying and stress and anxiety that often gets the better of us, I just wanna say I've had some amazing feedback which I'm super grateful for on this show but I've had some people listening and say they love it but they're like I'm not a teen. You know they're in their 20's, 30's, 40's and plus and I'm like okay let me just set the record straight. Guys although I kinda market these podcasts pertains you know as I could really say there isn't a podcast that's really titled and suitable for the youth and it's such an age group that I'm so passionate about helping please know that any age can listen and benefit from the show.
First of all adolescence doesn't actually stop until we're about age 24. So I'm really only like two years out of my adolescence and the thing is you really never tackled these issues or probably learn how to deal with a lot of these things like emotional management and all this stuff. If you didn't learn it as a teen then they're probably still lurking beneath the surface or what of these underlying issues no matter what age you are. I know that's definitely the case for me. I love doing these podcasts. I am learning right along side you guys and I am way past my teens, unfortunately. So whether you're about to celebrate your sweet 16 or your 60th, please if you're enjoying the show and getting value from it, please join me here every week and don't be ashamed about it. I absolutely want you here. So now that's all clear.
This week's episode is inspired, thanks Mon. Crazy brain actually and what's been running through it. This past week or so, you know I got an e-mail a big opportunity in regards to my speaking and presentations and I actually had to wait like a fair while for the outcome of whether that was going to happen or not and I am going to make a big announcement at the end of the show as to what this exciting kind of new little achievement is. But my brain really all it wanted to do was just to keep looping on the worry cycle big time about whether it was gonna happen or not, or is he gonna write back or not, am I gonna hear from them again or not? And look, I now know how to really coach myself through these kinds of thought loops but back when I was finishing high school, worry always used to get the best of me until the point where I was pretty much an anxious mess about exams or whether this thing was gonna happen or what that person might think of me if I do this and that.
I know I'm gonna learn in that kind of feeling right. So many of us self diagnose ourselves as just worry warts and we feel like we're almost doomed to disbelief fear of helpless over it because it's just the way we are. But this isn't true my friend. So there's so so much you can do to help get a handle of your worry rather than your worry always having you and that's really what we're gonna discuss today in the show. Sorry by the end of this episode, you've kind of better discovered and understood the root cause of your worry and what you can do to begin to change it.
So first of all, we really need to recognize that worry really serves no purpose. I'm sure many of you would've heard the same that worry is like walking around with an umbrella waiting for it to rain. Sorry I'm just laughing because I do remember I used to do that as a kid. Cause I love walking with an umbrella in the rain. But anyway, let me explain what I really mean by this idea that you know, worry really pretends to be necessary but it's not. For example, in a session last week with my client she was having kinda bit of a dispute or disagreement with a girl who she kinda used to be friends with and she'd spent all last week worried about what they might do like in retaliation. I asked why? She was so worried about it. She kinda just said, "Well I need to protect myself just in case." We all tend to feel like worrying does somehow protect us from something bad happening like it's preventative and prepares us in some way. But if you actually pay attention and slow down and really think about it, worry just sets us off in a spiral of anxiety that often causes us to take action that just perpetuates more reasons to worry.
I mean think about it. Do you show up as your most clear minded, empowered, creative self when you're feeling worried? Maybe not. My friend, sorry my client ends up telling me she'd kinda been, I guess more snappy with her Mom and her sister, and she'd kind of gone off track with her studies so she was behind with that now because she's kind of constantly messaging her friends and stressing about it and then she really didn't feel like going out and hanging out with her friends because she was so worried about what might happen and guess what all this created for her? More reasons to worry right and in the end it turns out her friend, the retaliation never even happened. In fact, the friend ended up being as cool as a cucumber about it all. Can you relate to that feeling of looking back over and thinking oh my goodness, I just wasted all that energy stressing for nothing. It all worked out okay in the end. I mean, pretty sure we should all have two hands up in the air right now. I know how many times I've been there and this happened to me again this week with what the outcome ended up being and it was like oh my gosh I just used so much of my brain just thinking about this.
So as much as you feel like worrying is necessary, if you pay attention to how you show up and act when you're worried, you'll find you're pretty much as productive as like a giddy old kid on their last day of school. You can't really concentrate properly, you kinda like fumble around or if you stress you're being late when you worry then you dropping your keys and you're forgetting things and you can't lock the door properly. Your a bumbling mess. Well that's me anyway. Of course, I think it's valuable, worry can actually have some purpose sometimes when you're worrying about something within your control like whether you remember to save your assignment before you went to bed. You can go in, oh wait, did I do that? You can go and check that you've done that or worry like hang on, when you leave the house, did I turn the hair straightener off properly. You can go and do something about that. That's useful because it can inspire some sort of productive action that creates a result that you do want. But nine times out of ten we really are just dwelling and worrying about stuff that's completely beyond our control and that friend is totally pointless right?
One of my favorite sayings is, if you're stressing about something, ask yourself can you do something about it? No. Then don't worry about it. Can you do something about it, yes? Then don't worry about it. Cause go do that thing and then just let it go. Either way though, there's no need to worry about it so that's something I was constantly reminding myself of this week every time my brain wanted to spiral into that but what if this, and what if that and is he gonna write back and [inaudible 00:07:17] It was like ssshhh, let it go. So now I've established that there's no real use to worry.
The second thing that we also need to recognize to help us kind of begin to unwind, all that worry cycle is recognizing that worrying isn't a fault in your DNA. It is simply actually a feature of your DNA and actually a part of being human. So before you beat yourself up for being a negative Nancy, depend to be a bit of a worry wart, I want you to understand that our brains have an ingrained negative bias. It's an evolution thing that kept us alive and evolving for hundreds of millions of years. So you can actually kinda be grateful for it because you know what, your great Uncle times a thousand didn't spot that tiger or that snake coming for him or he didn't remember fire meant danger, you wouldn't be here. It's a natural human instinct to jump to the negatives when there's something you perceive as a threat. But in this new age where we thankfully don't have lions sleeping on our back doorstep and if you do, go do something about that. It's again really showing us that worrying really is completely unnecessary. The greatest the same [inaudible 00:08:36] for most of the time now, unless you're being chased by the boogie man is literally just emotional harm.
Humiliation, rejection, shame and because these emotions are pretty damn uncomfortable to us, we often go to great lengths to hide from them and deem them worry worthy to our emotional life. Almost like it is that tiger chasing us. If you're paying attention to it your brain's gonna spiral in all different directions. What if I completely mental blank in front of that speech I've gotta give at class next week? How humiliating, I better worry about that or what if I don't hear back from that job interview I wanted so bad. That'll hurt, I better worry about that or what if the girl I met on the weekend never writes back to that message I just sent. That is so embarrassing, I better worry about that. It makes sense, your brain is trying to protect you from emotional discomfort but think about this guys. How comfortable does worrying feel? It's not so awesome right? The knots in your stomach, the tingling in your palms, whatever it is, worry doesn't feel awesome. And it also causes you to then act out in not so awesome ways right?
Which we kind of discussed and so it's quite ironic when you think about it. I'm trying to protect myself from the uncomfortable emotion but all that does is cause me to spin out in uncomfortable emotion. Now do you get what I mean by worry serves no purpose. So, now do you understand that naturally your brain just wants to jump to worse case scenario and you no longer have to judge yourself for that.
The next step to breaking free of worrying is making that decision and that choice you no longer allow yourself to just freak out and catastrophize every feature, what if? Because it's about using that gift that we have as humans to manage our own thoughts where we can gently but intentionally redirect it to what's thought that just feel a whole lot better. So you can begin to show up in each situation, purposely and clear and confidently in a way that you want to rather than just at feed based kinda default way that your brain wants to go to. Because, the truth is guys, you never know what the future holds. None of us can have that ability to predict it 100% accurately right. But the best you see is you get to believe what ever you like about it. Your future is your property. As much as we think we know what's gonna come next, honestly, your future is as blank as a blank piece of paper. It's a blank canvass and you get to believe and draw whatever you like about it. The future literally only exists in your mind. It's crazy when you think about it.
So that means that you get to choose whatever you like about it and really recognizing that is when I made that decision now, I choose to believe in my life and key redirecting to whatever tomorrow holds, it is gonna unfold in the way that it's supposed to for my greatest good and it might not go to plan how I hoped. But it will all end up unfolding in the way that it's meant to and it's up to me to be committed to looking for the good in whatever that reason is. Doesn't that just feel one thousand times better than spinning out that something terrible is gonna happen and it's gonna ruin your plans and it's all gonna go to waste. Even just saying that out loud to myself really helps me feel so much more at peace and I know that when I make that decision everyday to show up from this place, I'm showing up as so much more empowered and productive in my time and energy and putting it towards what's gonna serve me most today, tomorrow, and ten years from now.
The thing is when I say this to people I know a lot of the push back is, they think positively about the future, you're diluting yourself. You're just being delusional. But guys I want to point out, either way, you're diluting yourself. We never know for sure what's gonna happen. So don't you think you might as well focus on the positives because positive emotion is far more likely to feel positive action and clear thinking for you. Without worry kind of spinning in our brains, your far more likely to stay focused in the present and to keep putting one foot in front of the other towards your goals and taking that next step and accessing your own creativity and putting your energy towards creating or finding solutions to things that are within your control or problems that you can solve and redirecting it away from this thing you might be worrying about which you have no power over. Cause remember guys when you're in a negative mindset, when you are in worry, literally stress hormones, your chemicals flood your brain and it literally shuts down your ability to think outside the box and to see what could be very obvious solutions to simple problems when we're in worry, it completely spins that out and we lose that ability.
But if we take back control over that primitive part of our brain that's spinning out of worry and decide deliberately that we're gonna trust that whatever happens next is happening for our greatest growth then we get that ability back. And in the meantime, remaining far more patient and loving towards your friends and your family and less snappiness around the house and less taking it out on your Mom or your boyfriend or that person you care about, trust me, speaking from experience here, it was something I could see me beginning to fall into this week when I was letting worry get the better of me and that's when I had to sit down and really work through all this stuff and that's why I wanna share it with you guys and don't get me wrong. Not worrying about your future or what could happen, doesn't mean you don't take actions towards planning and protecting yourself.
You may still go along to that tafe information evening if you think, you know what, perhaps I won't get into Uni and I should look into what other options there are or handing out and just still giving out those extra resumes in case you don't hear back from that store manager which sound promising but just in case. Or of course getting a travel insurance in case, your [inaudible 00:14:26] gets stolen or you lose your luggage while you're overseas, or you happen to be in an accident with big medical bills, you can still take action towards preparing and protecting yourself but you do it from a clear space of care and confidence and looking out for yourself rather than from that place clouded with fear and stress and anxiety. Another thing I kind of get kick back from when I teach this is people say, "What if my life gets flipped upside down over night?" Well, mine did and I can tell you that even if I had spent the prior 20 years worrying about my sister dying, it wouldn't have protected me from the pain in any way once it happened.
And that is really why, honestly, I don't worry about something like that happening to me again because I understand that it would only cause me anxiety now and save me no pain or anxiety later on. I can't know for sure exactly what might happen tomorrow but I know for sure that whatever happens, worrying about it now, isn't gonna solve it. In fact, it just sends me back to it. So, my lovely people, my challenge for you this week, is to think about that event, that situation, that person, that what if, that you can feel you're currently worrying about and it's really playing over every worse case scenario in your mind and now just ask yourself, if I knew for sure everything was going to work out totally fine, how would I act and feel differently? How would I act and feel differently if I knew for sure that I was gonna stand up and ace that presentation, if I knew for sure that that girl was eventually gonna write back to me, if I knew for sure that this chronic illness weren't to cause me to miss out on things in life and I can still have a fulfilling, healthy life?
Ask yourself that and then start acting that way now because that belief is actually just as true as everything totally not being okay right? But being at peace feels way better than worry right? And you'll be far more proud of the human you're showing up in the world as when you're fueled from that place of confidence and courage rather than fear and anxiety. I'm sorry ancestors, but your mindset is way outdated for the life that we are now privileged to live in this world where we are not up against physical harm, potential threats every single day and we have the ability to coach ourself through the discomfort of the emotional discomfort. If we are willing to step up and to learn how to practice managing our thoughts so I want you to pay attention. Remember we can't change what we're not paying attention to. So you need to stop focusing so much out there trying to control the future and the uncontrollably you can't control and just be like, what is within my control right now and what is always within your control is the story you tell yourself that what could happen next?
Being delusional along with me, I'm telling you, life favors those who are delusional in belief of their dreams and what is possible and the lessons and the opportunities of what could come. Effective choice guys, I just always tell myself, you might as well focus on it in a way that empowers us because worrying isn't gonna save your tomorrows it's just wasting away your today. Another one of my favorite sayings that kinda bring me peace instead of worry is, everything works out okay in the end and if it's not okay, it's not the end. So remember sometimes, it's just about putting a comma instead of a full stop and go this isn't the end of my story. In saying all that, I am excited to take a moment to quickly announce the next chapter of my story and what gave me another big opportunity to practice coaching myself through worry is I received the e-mail that confirms that guys, on the 10th and the 11th of December this year, I will be delivering my resilience presentation and sharing my journey to students at schools over in America.
Yeah. America. You know that big country on the other side of the world? Yup. Somehow, by some miracle, a school reached out and said they'd love for me to come over. I'm going and speaking at three schools over there and guys I can't tell you, this has blown my mind. I want to remind you this whole journey I started on my own with just Microsoft PowerPoint in my bedroom and not getting a cent for my work after leaving behind a huge pay cheque and for so many schools, not even taking any notice here in Australia and then to see that over the other side of the country, I mean the world, I'm still going to get my head around it. There's a school that's taking notice. It's unbelievable. I'm just so grateful for the opportunity to stand up in front of these students and to become an example of them that you know what, beauty can come from even the ugliest times in our lives and to be that person I really needed when I was at my darkest hour, that someone who can show me that there is a way out of this and that suffering can still have a purpose and it's a purpose that we each get to choose as a God given right.
We get to decide what we're gonna make our suffering mean and I hope you know, just like standing up in front of those kids I hope if you're listening to my podcast, you're always learning that we can choose to make it mean something that empowers us and to stay focused on the lessons and the value that we can take from that experience. It's humbling to go through hardship. It's humbling to realize that none of us are entitled to an easy life but what is that one thing we can do to make someone else's life easier? In saying that, that is then leading to my last little announcement I'd like to make in case you didn't listen to the episode before and if you didn't, what are you doing? But I have launched a campaign to, well first of all to grow reviews on my show to help at least get in front of more people but most especially to make a difference while I'm doing it. So it is a review for a farmer campaign where I will give a dollar towards the Scrubbers Ball which is raising funds to the struggling farmers out in Baradine, New South Wales for every review left on my show.
One review equals one more dollar towards a struggling farmer who are going through one of the toughest droughts that they've seen in decades and mentally, emotionally, financially these families are struggling and with the podcast it's all about building resilient mental health and getting through these tough times. Let's get together and show them that that OK Now What Community is behind them. I'm going alone to the fundraiser on the 27th of October and I'm gonna say a few words to them and I'd love to let them know that we have also raised some funds. So share this with your family, friends, Mom, Dad, sister, Auntie, even labor of behalf of your dog if you'd like. But please I hope to raise, I put a maximum of a thousand but my goodness, if we got a thousand reviews on this, my mind would be blown for the second time. I do hope you take a moment out of your day just to jump on and see the review button, whether it's on iTunes or Stitcher and just write a quick review and you will know that you are not only putting a smile on a farmer's face but also helping someone just like you find the show so they can benefit from it as well.
So that is it from me this week guys. But the big image I'm gonna leave you with someone said they love my metaphors, well the next time you're worrying just think about how strange you'd look to someone if you were walking around outside just with an umbrella and not a cloud in the sky. Don't be that fruit loop. You can always find an umbrella if it starts to rain but until then, I'm telling you it feels so much better to feel the sunshine on your skin and get out there and live life with the attitude that no matter whatever happens, it's unfolding for your greatest good and being committed to looking for the good in whatever that reason is. | 2019-04-18T16:48:49Z | https://www.katefitzsimons.com/blog/how-to-stop-worrying |
...oh good to know that Che s grandkid might be following the peaceful non-violence path ? la Mahatma Gandhi. InShalla!
Perfumes are great. What about a combination: "Perfume Banane du Jungle"?
"Vaporisateur ? la Banane Sauvage"
You really made me laugh. I can see you a are a pro in marketing.
Yep, Che's grandson learned that dressing as a lion was a fatal mistake to face the beast. If Satyagraha is "the way of truth," the li-on is "the way of the lie." Almost poetic, no?
I was just out with the Haitians, and they love the stories, but are lacking in English. Some funny translations were necessary.
Perhaps we can make Haiti the new capital of the anti-lion line of perfumes. PARFUM A LA HATIENNE!!!
If you thought the Banana Revolution was impossible. Ours though is better--and bigger.
"It looks inevitable now that the Ukraine should go through its own banana revolution..."
'A Russian reformer of the 1990s once explained his belief in western-style democracy by saying, " I never want my children to ask me, Dad, what is a banana?" Many children in the Soviet Union had seen bananas only in school books. The 1991 revolution changed the situation with bananas in Moscow. All kinds of exotic fruits appeared on streets of Russia. Naive Russians, then, did not know that their precious metals, oil and gas, nickel, copper, aluminum, and timber were being sold at throwaway prices for the importation of kiwis and passion fruits. Russia was being robbed for the love of bananas. But it took a while before the economic meltdown of 1998 brought home the reality that the system of governance imported by the fruit reformers of Boris Yeltsin had bankrupted the country.
Five years have gone by since a new revolution started in Russia to rectify that wrong. Russians have understood that it is time to stop the grand larceny, and return some of the national wealth. Perhaps Putin thought he could sell the same idea to Kiev. He should be more worried about an apple, papaya or mango revolution in Moscow, instead. The revolutions of the west that are on Russian door step today will be in Moscow tomorrow. What he should have recognized, before he started, was that there was no one he could trust, no one the Ukrainians could trust, to convey the message to Ukrainian voters. Putin has struggled for five years now to rid his own government of the Russian clansters on retainer to the oligarchs. He isn't half-finished in that job. He should be watching out lest he slips on banana peels left over and rotting from the last decade within Kremlin and the Russian white house. Or perhaps for the possibility that some place west of Moscow, some exotic fruit cocktail is being mixed for Russia, 2008.
It looks inevitable now that the Ukraine should go through its own banana revolution first. The Yuschenko-Timoshenko combine are no different from Russia's fruit reformers. They will try to sell what they can of the Ukraine's wealth to western corporations so that the west Ukrainian people can have the orange juice they think right now they badly want. Whether Ukraine ends up in a banana split, between east and west in the process, is a different matter. And Russia has both the time, gas and the electricity, to wait.
Con saludos al Che y tantísimos buenos deseos para su camino de paz.
The Haitian people are so brave and good people and yet have been betrayed so many times. They were the first ones in America to kick out the European lion and yet they suffered their own beast so badly. Their country would benefit now from the experience of the kibbutz in re-greening the desert.
There's this activist who's trying to do something about it, but perhaps it's too little too late. Of course, for a real solution we need the Haitienne Parfum pour Lion.
Hey, Gari, see if you understand the comment at the bottom. Probably Creole, but French may help.
"Yes, we need the kind of work Mr. J.B.Chavannes is leading, but WE ALSO NEED LARGE SCALE COOPERATIVES TO SAVE HAITI. Of course, that would amount to a PEACEFUL REVOLUTION, and that's what we propose..."
Mwen pense histoire ou yo gen anpil sens. Men, nou bezwen mete tete nou ensanb pou chanje sa ki pa mache et applaudi sa ki mache nan peyi nou. Mwen kwe tou ke li important pou kritic yo konstriktif et ki ofri alterntif en menm nan pou chemin developman.
Pap janm gen chanjman san DIALOG. En tan ke yon Peyizan, mwen ta renmen konnen kileu Haitiens sans distinction ap pran konsyans ke bon Terre nou yo fini aller nan lanme donc nou pa ka produi anyen. Se sak fait mwen nan Mize nan PAP jodia .
Kote intellectuel peyi nou yo? Espwa se sou nou li Ye!
that s funny to read this language!
To foster an intercultural dialogue is always an important measure to prevent intolerance and help find a way that both sides can live with.
I know hardly anything on the situation in Haiti and therefore can t comment on it.
I tend to be, on the other hand, suspicious of "large scale co-operatives" BUT it can work out, if the right motivation drives forward the action of the right pple!
"The gift belongs to whoever chooses to accept it. It is enough to believe and not to be afraid to make a few mistakes."
The situation in Haiti is bleak, politically and environmentally. Their trees are gone, and any change for the better must start with reforestation and empowering the peasants through education and coops.
The late Rene Dumont, an expert in the field, thought the ideal coop should not be large, as to make all members know each other. If it ain't the coops, what could it be to feed the people without the lion?
An irreverent Banana Revolution perhaps is the last hope in a world of camouflage and lie-ons. If politicians are all a problem, some less some more, let's get rid of them, or at least, let's make fun of them, until there's no place of prestige for them to hide.
And if we find that the politicians must be lions in order to survive in the jungle, we may as well find alternatives without them, namely the COOPS. At least you got democracy of the best, perhaps the only kind in them: DIRECT DEMOCRACY.
I'd like to listen the other side of the story if this article is unfair though.
There's saying that goes: "Tell me who you hang with, and I'll tell you who you are."
The King leaves the Castle.
On his last weekday in Prague Castle as the President of the Czech Republic, V?clav Havel taped a brief farewell address to the nation and then took a telephone call from George Bush. Havel, who came to office thirteen years ago wearing borrowed trousers that flapped high around his ankles, now wore an exquisitely tailored navy-blue three-piece suit, a white shirt, and a tie that had undoubtedly done its duty at summit meetings and memorial services. A clutch of efficient aides scurried around his office door. A steward with a napkin folded over his arm delivered a glass of white wine. Sunlight streamed through tall windows, and chandeliers lent a glow to the flowers and the Oriental carpets.
Everything that's nice and juicy, fresh, or hot, FREE and not "made in the USA" qualifies. All those so-called Velvet, Banana, Orange revolutions led by colorful leaders in Eastern Europe plus the former Soviet Republics qualify for democratic circus, Banana Republics with a new label.
Cucumber Revolution for Ukraine, or Banana Revolution for Central America, or Guarapo (cane juice) for Cuba (the original one), or Jalapeno for Mexico, or Lechosa (papaya) for Puerto Rico, or Arepa (corn patty) for Venezuela (without Chavez), all rescue the folkcloric, cultural, culinary values of their peoples and doesn't trust leaders. Ah, and they provide ample opportunity to "burn the calories."
Do you like it squeezed by hand or with the little machine?
Do you like the Jalapeno green and small or big and red?
Do you like the Arepa dry and cold or moist and hot?
Well, you may have noticed a certain Anarchist influence, but it's nice and moderate, "a la Orwell," we may say in culinary parlance.
"Anarchism has been written off time and again by politically-minded people as a quaint historical anachronism, irrelevant as the century turns. But the politicians themselves are living out the final sentence of George Orwell's Animal Farm, where the poor creatures out in the yard peered through the windows of the farmhouse, looking from pig to man and from man to pig, but found it impossible to say which was which.
In real life this leads to apathy and resignation as well as to the rise of demagogues and dictators. But if people had faith in their capacity to make decisions, it could be changed by an upsurge of popular self-organisation and inventiveness. Probably every generation has to learn this."
Well said, Pacific. By the way, are you in favor of the Banana Revolution?
> typical Shveik soldiers in light blu uniforms.
> the wind of November and they did not care.
> hurry his colossus of a country along.
fruit of such intentions, appears to be irrelevant.
In our democracies there is little self-determination, and we only need to look at poverty and unemployment in Europe as well, to raise doubts as to what is meant by 'free trade'. Such distortions of language that hoodwink millions of people into accepting their lot, need to be challenged and overturned. New language means new ideas, new concepts. This is the revolution. We are this revolution!
Such a revolution is especially important if we are to find ways to shift from the current forms of egocentric globalisation to a global society that recognises the actual interrelatedness of all human beings as well as our interconnectedness with the planet that supports us."
"The Czech Government generally respects the human rights of its citizens; however, problems remained in some areas during 2001. Occasional police violence and use of excessive force remained a problem. Lengthy pretrial detention and long delays in trials were problems, due to structural and procedural deficiencies as well as a lack of resources for the judicial system. The Government pursued libel and slander cases against a number of journalists. There are some limits on freedom of association for groups that promote racial hatred and intolerance. During the year, some Roma were prevented from emigrating. There is some violence and discrimination against women. Discrimination and occasional skinhead violence against the Romani community remained problems. There were reports that employers attempted to prevent the formation of collective bargaining agreements. Trafficking in women and children was a problem."
do you think the old lady pensioners will abandon lukashenko soon, for bananas ?
Old people will have no vote in the Banana/Cucumber Revolution. The Bushes (George and Jeb) rode to office with the old Cuban-American vote and now abandoned them to private healthcare (HMO). But they will die anyway soon and will leave us with the Iraqi war quagmire.
It's ironic that the elderly still get the lion's share of the budget while many children in America go without adequate healthcare, including prenatal care.
It is the young who will own the revolution and will have the courage to come out of the jungle. The old will tend the many children of the revolution, in exchange for all services including a dignified pension, and free and comprehensive medical care. And best of all, they won't live in fear.
As for the name, how about the Machanka Revolution?
No way, revolutions depend on education, creating ECONOMIC OPPORTUNITIES (particularly the coops), liberating not restricting freedoms, and their association with Cuba doesn't augur well. But most of all, they liberate you from all lions.
thank you very much for posting the article by David Remnick about Havel leaving office.
I really enjoy reading this article a great deal. I have thought a lot about if I possibly know David Remnick but I don t. However, the way he describes the farewell events and the personal friends of Havel (Oldrich Cerny, Jiri Pehe) and his wife Dasa Havlová are very accurate in my perception. Perhaps I should add that the author did not add some hints for the reader to understand the Czech way of being and how the events and Havel fit into the picture of trying to make the best of a situation of social repression under the communist regime.
The author failed to underline the characteristic softness of Havel s spirit, his loving manner. It is an exceptional character trait that will not be found among many people, and less among politicians. There is no second of doubt for me that Havel always aimed at making a morally stainless politics.
At the same time it is clear that this is very difficult to do with powerful political contrahents as he had, such as the popular yet tough-faced, arrogant and stealern Klaus.
I am not speaking in favor of or against a party line here but this is an observation about characters. Havel was committed to values, while Klaus is rightly being called a turning head, building his political power on an undercover-cooperation with the communists. (I know this for sure because I worked for an institution with close indirect ties to Klaus - which made me aware of such under-surface realities).
People who love art and beauty are more likely to have good thoughts. I don t see any wrong in that Havel cared for the interior of the castle and for providing good looking outfits to the castle guards. Promotion of art and artists is a important issue in the Czech Republic. For decades artists were not allowed to work freely or sell their art. Havel bought many pictures, sculptures and furniture made by Czech artists helping them to become known internationally. The Castle interior was a masterpiece of old and modern art when Havel left office. It will not be now anymore, as Klaus seems to have thrown out part of the most beautiful pieces.
Donquij, when I say Havel is ok, then I mean his general outline in politics, his motivation and his acting as a person.
Of course, he committed quite some errors. One of them is his over-adoration of the US. He loved the US model of government yet he did not realize that it was incompatible with important politicial convictions he had.
1. He was one of the first to sign a statement that he was with Bush, in favor of a war in Iraq. It is unclear how he could have done such a barbarity. There was no evident mayority of Czech people in favor of an Iraq war.
2. He provided a great show for B. during the Nato meeting. I remember streets being sealed for days, just for letting pass freely most expensive cars of rich Americans. The whole city stood under shock.
One note about Karel Gott: He is regarded one of the most talented singers of the Czech Republic. They call him "the Golden Voice of Prague". Gott DID NOT colaborate with Communism. Not in the sense that he was in favor of Communism. Instead, he colaborated in a way of getting a deal with them to be allowed to work as a singer. He probably paid the Communists something for keeping away from his parents and allowing him to leave the country and re-enter again when he wished so. He went off to Germany for many years where he built his very successful career. He was committed to his art and his talent. Not to Communism. They just made it very hard for him. They were after him just because he wore a certain hair style. He was seen as a subversive element. Instead of going to the underground, Karel Gott decided to leave the country and keep in friendly relations with the Communist regime. Otherwise he would not have managed to come out as the artist he became. Tough situation, who might judge??
People know this. Some don t want to admit it because they envy his success.
"Love is the key to understanding all mysteries."
Your question: "Where is the beef?"
I would need to know more about politics in order to be able to give a good answer to that question.
As I said, I think Havel did pretty well. He is just a human, not an infallible God. And, yes, that was a big deception when he signed that special letter of support of the Iraq war!
Personally, I still believe that democratic governments function quite well here in Europe. - True, there are severe deceptions, too, look at Italy with Silvio B. - But no, I am not in favor of a radical change to cooperatives. I can t picture that system would work successfully right away. Plus: who would be in charge? Isn t there ALWAYS a commander??
The US is a totally different story.
I am here in this forum to learn more facts and opinions and all I can say so far is that I find a comparison with European standards very difficult. Perhaps, it is true that, according to you, the US would be better off if directed by co-operatives. But for that to decide I would need to be more familiar with the situation you are living there.
Thank you for the thorough answer, but this is the issue that holds the key. All of these Eastern European "democratic leaders" seem to have a slant for America. Nothing original, the overwhelming majority of the leaders of the world do. Perhaps it's an infatuation with "democracy"--or perhaps an infatuation with power and money... On the other hand we got Chavez. His rethoric is full with his hate of America. Is he hiding something?
Where, I ask, is a revolution that is neither in love with America nor hateful of it, as to hide its own mistakes? Perhaps the key lies in rejecting all kinds of leaders, and getting to work for a new world. Then saying NO LION (OR FOX) NO PROBLEM may just be a step in the right direction.
this "slant for America" of Eastern European freshly democratic leaders is, I might say, a childlike enthusiasm and emotional enchantment.
I can actually only speak for Havel as a leader because I have not known the others. I am certain that he was and is NOT impressed by power and money. This is not the point for him. It is the FREEDOM, the freedom to live a life as one wants to. He is an artist, don t let us forget this, and he suffered from suppression. He adores what he believes is a reality in America: the thousand possibilities of making the best of one s life, to live as an individuality distinct from other individualities and that so-called American freedom.
Havel grew up in the Czech Republic where in the years of the Communist regime "America" became the symbolic expression of the "other" reality they wanted. America became a myth. What Czech people think of the US has most probably little to do with what is real in America.
You should come to the Czech Republic and see how people who don t know a word of English wear blue-jeans, funny caps, sneakers and T-Shirts with American flaggs and cool words on it. Then also have a look at the new generation of young Czechs who are absolutely fluent in English because they all went abroad to the US to spend a school year there. Then look at the medium generation of over thirty-year olds who preferably listen to country music, join around fire places in summer and come to office with a cowboy hat!!!
This is a blind sticking to something they have never looked at closely but which they like because, conceptually, it represents the other side of the medal to Communism.
It is a ridiculously childish adoration. Nothing else. Look at Havel, he hardly speaks a word in English. It took many years before he had a chance to visit the US. He did his best. There are just some things he did not have a chance to learn about earlier.
By the way, the hamburger industry is having a great success from the Czech readiness to adopt the American way of life. Plenty of US food-chains bought up Prague s nicest locations in the center of the town.
> Not quite so. Those former Soviet puppets are just eternal *** lickers.
Not far from the truth. But I don't think they had much of a choice before.
Nor do they have it now. I mean they could have chosen to be real independent, but it would have meant to be international pariahs.
> > America. Is he hiding something?
In the following excerpt you'll see the two types of leadership: female, group oriented like that of the sexually hyperactive bonobo monkeys, and that of the alpha-male chimpanzees, whose terrible character may be due to lack of love. We humas, it seems, can follow either one, so it's up to you to have women running life around nurturing and pleasure or have a war-mongering chimpazee running your life. Well, perhaps, all we got to do is to give the banana to the chimp.
"Richard Wrangham and Dale Peterson, in Demonic Males: Apes and the Origins of Human Violence present the empirical evidence that only humans and chimpanzees, among all the animals living on earth, share a similar tendency for violence, territoriality, and competition for uniting behind the one chief male of the land. (http://www.washingto...emonicmales.htm) And the chimpanzees are man's closest species-relative; humans inherited 98% of their genes from the ancestors of the chimpanzees.
In comparison, the bonobos, the second-closest species-relative of man, do not unite behind the chief male of the land. The bonobos show deference to an alpha or top-ranking female that, with the support of her coalition of other females, is as strong as the strongest male in the land. That is, if leadership amounts to getting the greatest number of followers, then among the bonobos, a female almost always exerts the strongest and most effective leadership.
Some have argued that, since the bonobo pattern inverts the dominant pattern among chimpanzees and men with regard to whether a female can get more followers than a male, humans and chimpanzees both likely inherited gender bias against women from the ancestors of the chimpanzees; gender bias is a genetic condition of men. And the bias against women having leadership as a position of authority crosses all world cultures. As of 2002, Sweden had the highest percentage of women in the legislature at 43%. And the United States, Andorra, Israel, Sierra Leone, and Ireland tied for 57th place with less than 15% of the legislature women. (http://www.ipu.org/wmn-e/classif.htm) Admittedly, those percentages are significantly higher than the occurrence of female chimpanzees becoming alpha of the community by getting the most followers, but the trends are similar in manifesting a general gender bias across cultures against females getting leadership as a position of authority over followers." | 2019-04-20T00:19:13Z | https://engforum.pravda.ru/index.php?/topic/387-what-would-it-take-for-russia-to-be-1/page-267 |
3 Eh, Who Needs Interview Etiquette?
First impressions matter and few first impressions are extra necessary than the one you make at an interview.
Prepared to rating that dream job? Make more cash? Advance in your profession? Yeah, you’re. To do it, you want to master interview etiquette.
As people, we gather our first impression of others in 27 seconds. Critically, even in a blink of an eye fixed, earlier than the opposite individual speaks. Your interviewer will do the identical.
That’s why figuring out exactly how to put together with essential interview etiquette is the important thing to success.
So how do you probably impress skilled and experienced managers, CFOs, CEOs, and all around bosses when you’ve gotten seconds to make an awesome impression?
No, not nice, because truthfully nice will not do. But an impressive impression? It is all concerning the interview etiquette that allows you to shine from the second your interview starts to the moment you get hired.
First thing first, what is interview etiquette?
We’re not talking concerning the manners your mother in all probability still nags you about. Interview etiquette is greater than saying please and thank you, maintaining your elbows off the table, or not smacking your gum.
But simply so we’re clear – undoubtedly use your please and thank you’s, maintain your elbows off that table, and don’t even think about chewing gum. As an alternative, go for a pre-interview mint that’s finished earlier than you enter the room.
Principally, job interview etiquette is a code of conduct that should (sure, should) be adopted to excel at an interview and land the job.
There’s so much concerned in interview etiquette. It encompasses the extra primary elements like what to put on, all the best way up to the straightforward to overlook however essential details like what you do when you sit within the waiting room.
Eh, Who Needs Interview Etiquette?
Should you assume you’ll be able to simply show up to an interview and nail it with out the suitable etiquette, you then undoubtedly need some interview etiquette.
However don’t be concerned, you’re not alone, everybody wants interview etiquette.
From getting ready in your first interview ever to a seasoned professional ready to interview for a complicated position, and all the things in between, etiquette issues.
You may assume your expertise will probably be enough and you possibly can shrug off etiquette, however unfortunately, that’s simply not how it goes. Sorry, we wish it was that straightforward too.
The fact is you won’t be the one one interviewed. And everybody who gets chosen for an interview could have the talents; that’s the entire point of a resume.
Interview etiquette is the way you stand out towards your skilled competitors. It’s what has you walking into the building with confidence, shaking arms like a pro, and leaving everybody you interact with wanting you as part of their group.
You already know you are nice, we all know you are nice, but with out interview etiquette, it may be onerous in your potential employer to see.
You in all probability guessed that interview etiquette is an enormous deal through the interview, nevertheless it truly begins method before you present up to that huge moment.
Crushing an interview breaks down into three time blocks, earlier than the interview, in the course of the interview, and after the interview.
Yeah, we all know…it might be good if an interview was over when it was over, but there’s still a bit of work to put in after, however it’s so value it.
Okay, now that we’ve coated the basics of interview etiquette, let’s dive into the actionable steps you need to take earlier than, throughout and after the interview course of. You’ve got acquired this!
The hiring staff needs to know your interest of their firm is for more than a paycheck, and you’ll be able to’t be desirous about one thing if you don’t know about it.
Understanding as a lot as you possibly can about a company will make answering interview questions simpler.
The more you recognize, the more confidence you could have, and confidence is vital.
Researching an organization will allow you to understand their story, values, and tradition.
Let’s concentrate on number 4 for a second. Not only do hiring managers need to hire somebody with the talents for the job, however they need someone who additionally matches a company or brands values and culture.
A millennial advertising research even found that 43% of HR professionals discovered that a cultural match is crucial quality they seek in potential hires.
If all you’ve gotten time to do is take a look at the corporate’s website, then that’s nonetheless higher than nothing. However we would like you to do better than simply okay, so troll the corporate’s social media, their blogs, their evaluations, something you’ll find.
Don’t be concerned; nobody will know that you simply went into stalker mode.
As you analysis, pay attention to any massive ventures the company has just lately taken on, noteworthy accomplishments, current awards, publications, information and media spotlights, and key gamers.
In the event you actually need to take it to the subsequent degree, attempt to find out some information about your interviewer too. Understanding some information about your interviewer before you present up will make you are feeling much less misplaced at the hours of darkness, so you will appear extra confident and put together.
Apply does not make good. Only good follow makes good.
Follow does not guarantee that your interview will go perfectly, but it should make a world of difference.
Give it some thought, is there anything you’d need to do for the primary time in entrance of an individual or a number of people who are there to decide you? Yeah, we do not assume so.
However wait, how do you apply for an interview?
You possibly can deal with this step solo or with a pal. Working towards for an interview is training and rehearsing answers to widespread interview questions.
Each interview shall be as distinctive as you, but there are nonetheless some widespread themes. One virtually guarantee is that you’re going to be asked to share your work experience and what makes you totally different.
Training answers to widespread questions whether or not it’s out loud to yourself or a pal, will make it so you never really feel thrown off on the spot.
And training in your interview does not simply mean working towards answers, but questions too. That is right; the individual interviewing you should not be the only one asking questions.
At virtually every interview you will be requested when you’ve got any questions, and when you may assume saying “no” makes you appear should you understood all the things, the truth is that you’re going to in all probability just appeared disengaged.
Understand that the individual interviewing you in all probability does not want to hear you asking concerning the day to day of a job or different primary questions, they want to rent an skilled, so ask professional questions (but not too many).
Most people will inform you to gown to impress, and whereas it is all the time higher to gown up than down, dressing for the job you want is more essential.
Whether it is best to put on a gown and heels or a go well with and gown footwear or slacks and a nice shirt largely rely upon the job you’re interviewing for. While your interview outfit will differ relying on the position you want, be sure to comply with these widespread do’s and don’ts.
When you really do not understand how to gown for a selected interview, don’t be afraid to ask. It’s approach better to ask forward of time than present up to the interview second guessing yourself. And, likelihood is by performing some job board looking yow will discover advice from different staff too.
When contemplating interview etiquette, most individuals follow what they may say, however what about what your body says?
Body language is a large element of crushing an interview, and the best way you move when you speak or when you pay attention can have a big influence on the one that is interviewing you and on the impression you allow.
You don’t want to deliver a lot to an interview, and you undoubtedly don’t need to walk in with the remainder of your morning espresso, but you do need some necessities.
But first a fast observe on not carrying your morning espresso into the interview constructing. This in all probability looks like a bizarre tip, but do you actually need considered one of your first interactions with the receptionist or hiring supervisor to be you asking for the trash? (No, you don’t).
You do need to be sure to pack crisp additional copies of your resume, which might be greatest stored in a folder. And whereas you don’t need to hand in a colored or scented resume, including a small and delicate contact of creativity can make your resume stand out.
And having a pen and notepad to jot down any essential particulars helps you look professional and ready too, plus there will probably be particulars you will need to write down.
Just ensure to not only have your resume ready however to have it easily accessible. Whether you are asked for it or take the initiative to supply it your self, nothing will sluggish your roll greater than digging by way of a handbag or briefcase of chaos.
Everyone is aware of it’s good interview etiquette to shoe up early, but how early is just too early and what’s good?
When you’re early, you are on time. For those who’re on time, you are late.
Displaying up 10 to 15 minutes early to an interview is normal, however you don’t need to show up much earlier than that. Displaying up approach too early (like 30 minutes early) may present that you simply’re anxious.
Displaying up 10 to 15 minutes before your interview has a bunch of perks, starting with making certain that you simply aren’t late. By displaying up early you even have time for a fast toilet run, to complete any pre-interview paperwork, and to take within the office settings and see how the employees interacts and if everyone seems joyful.
It is best to plan ahead and depart sufficient time to commute so you still arrive early with visitors. And should you do arrive over 15 minutes early, attempt to loosen up in your automotive by listening to music or meditating. And when you didn’t drive, take a brief and sluggish walk before getting into the building.
Keep in mind, there are few things worse than displaying up late to an interview, but in case you are operating late for whatever purpose, your greatest guess is to call in and let the workplace or your interviewer know, so they are not simply ready around clueless.
When it is time for the interview, put your recreation face on before you enter the office or building and be prepared to impress anybody at any second.
The individual on the entrance desk or anyone working on the workplace won’t be the hiring manager, but they could very properly have a say, no matter how small in whether or not you are hired.
Typically the hiring staff will ask different employees and especially their receptionists how a possible rent made an entrance, and that is typically thought-about in the ultimate hiring choice. In any case, an organization and its hiring staff will want not only someone with the talents to do the job however someone who will fit in with the corporate’s tradition.
To ensure everybody has good issues to say about you, walk in standing tall, confident and with a smile on your face. Do not forget to say hello, acknowledge others, and be nice.
Is there anybody left who does not pull their telephone out when it is time to wait? Even if that wait is one brief minute? In all probability not, but an interview is your time to be that individual.
As an alternative of pulling out your telephone once you get to the foyer or ready room and look forward to the one that will interview you, opt for reviewing your resume, cowl letter, or perhaps even this article for some last minute ideas.
Once you hold your telephone away, you won’t be thrown off guard when your potential new boss walks into the room by being deep into an Instagram stalk or a heated recreation. Even higher, you won’t by accident play someone’s story or a video on full blast.
And it’s best to flip your telephone off earlier than you set it away. Which may sound excessive, especially since you possibly can put your telephone on vibrate or silent, however it’s the best choice.
Even should you depart your telephone on vibrate tucked away in your purse, briefcase, or pocket a random vibrate in the course of the interview can utterly throw you off. And if it does not throw you off, it may be a nuisance to the one that is interviewing you.
Rumor has it that a Fortune 500 CEO once stated when he had to choose between two candidates with the identical qualifications, he went with the candidate with the better handshake.
Sound extreme? Yeah, perhaps, nevertheless it also seems like you must get engaged on that handshake.
Also, at an interview, you will in all probability anticipate the individual hiring you to make the primary move, however that doesn’t all the time have to be the case. If the opportunity naturally presents itself for you to make the primary move, go for it.
Being the one to go forward and prolong your hand and introduce yourself first will categorical confidence and that you simply’re both excited concerning the position and ready for the interview.
It is best to all the time give the one that is interviewing you your undivided attention, but this is especially true whenever you’re being requested a query. Pay attention to all the query rigorously to ensure you perceive it.
And all the time, all the time, all the time wait until the interviewer is finished talking earlier than you begin. And after you’re executed listening, take a moment to assume.
You recognize those moments the place your mouth strikes and earlier than your mind has an opportunity to intervene a bunch of word vomit just comes right out? Yeah…an interview is not any place for that.
While you don’t need to ponder into area while scratching your chin for an prolonged time period, a fast moment to collect your thoughts and deliver with a concise answer is completely high quality.
If the individual interviewing you presents a glass of water, take it, even when you’re not thirsty. In moments the place you need to assume, you possibly can take a sip of water to purchase you a while. Simply ensure to hold it natural and not do this excessively.
As the interview comes to an in depth, ask what the subsequent steps in the interview process can be and when you need to anticipate to hear back. Attempt not to be too overbearing as you don’t need the interviewer to really feel any strain or discomfort, but you additionally don’t need to depart the interview feeling such as you’re in the dead of night.
That is additionally an excellent time to categorical curiosity within the place. If after the interview you’re still interested, there is no point in not admitting to it, why confuse the interviewer or give them any cause not to decide you?
Let the interviewer know that you simply’re excited concerning the firm and look forward to a chance to transfer ahead. Simply keep in mind not to come on too robust.
As we mentioned before, interview etiquette does not end when the interview does. There’s yet one more huge step to take after the interview is over.
On the very similar day of your interview, make certain to ship a proper thank you e-mail to everybody who interviewed you. Attain out, and thank the interviewers for their time and reiterate a spotlight of your expertise, a private detail, a mutual connection, or a superb matter coated through the interview.
This manner not solely will the interviewer know you appreciated their time, nevertheless it’ll better help them keep in mind your outstanding job on the interview. Now, keep in mind, you need to categorical thanks but do not overdo it. There is no need to ship your interviewer presents, flowers, or anything elaborate.
Interviews may be overwhelming and nerve-racking processes, however now they do not have to be, at the very least not for you. With the knowledge on interview etiquette that we have just coated, you are ready to crush any interview. No matter that next massive career step is, you’ve got acquired this! | 2019-04-18T12:23:35Z | https://verifiedtasks.com/the-interview-etiquette-to-land-any-job-and-leave-everyone-wanting-more/ |
So, what all does it do?
Left, or right arrow key. You can move between offsets into the sector, like this. Left key for previous byte; right key for next byte. I display a nice green color to indicate which is the "current" byte, but don't really change the cursor position. It also wraps around, and displays the address of the current byte down below.
Down, or up arrow key. You can move between sectors, like this. Up key for previous sector, and down key for next sector. Moving between sectors automatically writes the current one to disk. Also, note that the lower bound is 0x7C00; the upper bound is 0x80000. If you look at the hexdump, it's pretty easy to change these values yourself.
'j'. This jumps to whatever the current address 0xYXXXX is, like 0xY000:0xXXXX. It also pushes a return address, so you can do a 'ret', and get back into the loop.
'r' & 'p'. 'r' copies the current value of the byte we're at, while 'p' pastes the value you copied last. It's supposed to paste 0x00, if you copied nothing.
'w'. That writes the current sector. Just in case you don't want to go the next/previous sector for writing.
'>' & '<'. '>' increments the current byte (greater than), while '<' decrements it (smaller than).
Input. Other than that, you can directly input hexadecimal values (both upper and lowercase accepted). It takes in the input, and moves to the next byte. It's not exactly safe, so try only to enter hexadecimal values.
I'm really hoping for someone like Brendan dissecting it, and probably helping me figure out how to reduce it's size, make it neater, add more features, etc. It was fun working on this, and it took me a day or two, actually.
Thanks to Antti, for the idea; DavidCooper, for BwtSecOS; nortti for attempting to figure out what it's about from the hexdump.
In 'j' handling, while I do jump between segments, I don't push the segment for Selfer, which means that if the code jumped to returns without resetting CS, plausible bugs can ensue! But then, again, I don't reset 'ebp' either. I don't fix a lot of stuff. Returning from code you jumped to, isn't... advisable. EDIT: FIXED. You now need a far ret to properly return back to the event loop. It then resets ebp, and everything should work fine (as long as you don't touch the first 6 bytes of 0x500, and the stack ain't messed up).
EDIT: Things have changed for Selfer. You'd need to scroll down a bit, to see what all's different, now.
Last edited by shikhin on Sun Mar 17, 2013 3:54 am, edited 1 time in total.
I've just run it in Bochs (after going through the disassembled version and deleting everything except the hex in order to be able to paste it into a hex editor to create a disk image). I like it a lot - I see that it can save the modified bootsector too (I think the 3rd last byte is safe to change), but it looks as if it it could kill a cheap flash drive pretty quickly with all that saving, assuming that it can run from one (I haven't tried). If you hold down the down-cursor key it will write a half megabyte block of flash memory on each repeat just to modify a single sector. It's absolutely fine to use as an image in an emulator though.
I think you should drop the > and < functions as it's almost always going to be much quicker typing hex values in, so the space used for the > and < code can be recovered to enhance the hex input. I only provided functions like > and < in BwtSecOS because that was the only way to modify bytes there due to the lack of space left after providing both hex and decimal display modes.
"00000058 88160005 mov [0x500],dl ; save registers for later use"
I read somewhere that some BIOSes use the byte there as part of the BDA. Can anyone confirm that?
Edit: Have also run it in QEMU where it worked fine, though it took a few attempts to get QEMU to agree to work with it (the difficulty being in the way I tried to select the image I wanted QEMU to run).
Last edited by DavidCooper on Sat Mar 16, 2013 6:56 pm, edited 3 times in total.
Hrm. The version nortti disassembled was a bit older one, as compared to the Gist paste. I recommend that you use the Gist version, since it's now got 0 free bytes. It's pretty easy to make the Gist paste into a bootable floppy. Add something like "times 1474560 - ($ - $$) db 0" in the absolute end of the file. Then, assuming you've got nasm installed, just run "nasm Selfer.asm -o Selfer.flp." Selfer.flp should then be bootable!
It looks as if it it could kill a cheap flash drive pretty quickly with all that saving, assuming that it can run from one (I haven't tried). If you hold down the down-cursor key it will write a half megabyte block of flash memory on each repeat just to modify a single sector. It's absolutely fine to use as an image in an emulator though.
That's a valid issue. I'm thinking of tracking if the last input was next/previous sector, and if so, it skips the writing part? Obviously, that can be tricked (increase byte, then decrease byte, so nothing's been changed, as such), but we're not really here to trick Selfer.
I'm not too sure how to enhance the hex input more (it works, as of now); however, I can delete that and use the space reclaimed to implement some of the features you've suggested.
I like the idea; I'm going to try to implement it, though I'd need to cut down some bytes, across.
I'm not too sure; I usually just refer to the wiki's article on the memory map, where it suggests that 0x500 is free for use. Also, AFAIR, MS-DOS uses that space to store some sectors too, so it should be fine.
Thanks for trying Selfer out! I'm going to update this post as soon as I go around to doing some of the things you suggested.
'>' & '<' was removed, as rightly suggested by DavidCooper.
'r' and 'p' functionality was modified, a bit. How they function now is: at any address, you press 'r' and it "retains" the current address. Then, wherever you press 'p', it copies the value, and moves one cell behind. You press 'p' again, and it copies the value from behind the address you retained, and then moves one cell behind too. It's a bit like memcpy in case you want to move some buffer *ahead*, when the two buffers are overlapping. Someone might want to copy normally (i.e., cells move forward); in that case, you can simply look into the source and change the two decrements in the paste handling to increments.
Now, unless you write some hexadecimal value or paste something, sectors won't be written to disk.
Running it now - it works fine. I see that when copying, when you hit the start of the sector it starts to read from the previous sector and writes to the end of the current sector, but it hasn't crashed. If you were actually to build an OS with this you'd probably put one or two routines in each sector and space them out well so that you can use the copy and paste function to open up spaces within them to add modifications without any of your other routines being affected, so there would rarely be a need to run the copy and paste function through sector boundaries.
You've certainly created something up to the task - any additional capability can be written using Selfer itself. The main problem with it would be reading your code as you'd always need to drag the cursor through the point you're trying to read in order to tell where one byte ends and the next starts. I don't know if you can reclaim enough space to put gaps between them or to colour alternate bytes differently, though it isn't hugely important as anyone who actually used a program of this kind would immediately want to develop their own display & edit routines and only really depend on the bootsector code after that for loading and saving.
I certainly prefer the way you've done things with a moving cursor and the bytes staying in place - I wrote BwtSecOS partly for artistic reasons, inspired by the idea of a Turing Machine with a tape (memory) running through a stationary processor, and with that image in my mind I simply had to see how it would actually look for real. Having seen it, I think it would drive you to drink if you actually used it for any length of time!
Having thought about it a bit more, it would be a lot less costly just to colour the tens and units differently rather than making alternate bytes different colours. I reckon if you can do that, it can be considered to be a fully competent single-sector development system.
Edit: I also forgot to say that by enhancing the hex input, I was thinking in terms of displaying the first digit when it's typed in, but that isn't vital and shouldn't be a priority.
What actually matters most is getting the j function sorted, because I've just tried to run a ret instruction with it and it immetiately jumps back to address 7BFE, then the down-cursor key takes the display two bytes on from there to 7C00 but calls it 7DFE. I can go to and fro between these two display positions by using the cursor keys up, down, up, down, etc., but if I try to go back further than 7BFE it then freezes up and I have to reboot.
It should write the value 11h to the start of the second sector, but it doesn't. I've checked my hex values by converting them back to decimals and it all looks correct.
Edit4: Just tried the same code on the original version of Selfer and it works fine - a bug must have got into Selfer during later modifications.
It works okay on sector boundaries. Fails a bit when you're just on the start of a segment (0xYXXXX; if XXXX are 0x0000, then it suffers a bit of a problem).
I could reclaim enough bytes to display every alternate 4 bits in a different color, if I tried hard; would that do?
I certainly prefer the way you've done things with a moving cursor and the bytes staying in place.
That'd be tough, right now. I'll look into it, though, if I get around to getting few more empty bytes.
Heh, I'm sorry. I changed another thing, and forgot to mention it in the latest post (though I edited the original one to include it). Earlier, I used to jump between segments properly with 'j', but the code I jumped to would have had to reset CS to 0, to properly get back into the event loop. I got around to saving a few more extra bytes, so now I "push 0x0000" too. The proper way to return back would be a retf opcode (0xCB). Also note that I use the value of ESP to reset the value of EBP (which points at the current sector). This is so that I don't have to place any restrictions on the code being run itself; however, if the value of ESP is trashed, things can go bad.
I modified 0xC3 in the end to 0xCB, and it works.
The problem is, if you store anything at say 0x7E00, once you try to press the down key to go to the next sector, it'd read it from floppy and overwrite anything you wrote at 0x7E00. I suppose you'd have to deal with this, somehow. Maybe store values at somewhere beyond 0x80000, and write some sort of another output function to display and check the values. I checked the values via Bochs' debugger, and it looks fine to me.
Hehe, the original version only demanded a ret. Fixed that, though it appears to be causing a bit of a pain (I just wanted to handle segments properly!).
Last edited by shikhin on Sun Mar 17, 2013 11:46 pm, edited 1 time in total.
I modified the Gist a bit. I hope you (DavidCooper) now know how to properly assemble it (I'd be willing to provide the hexdump, otherwise, but it just makes these posts a bit unreadable). Bytes start from the color red.
I've got another idea or two on how to cut size, so maybe I can fit in something to enhance hex input? However, I do hope it can now considered to be a "fully competent single-sector development system."
P.S. The color scheme can be changed. Please suggest better ones?
So, for the moment I can't run it unless I make a list file, edit out everything except the hex, etc. (or I could spend a few hours reading the manual to try to find out what's wrong). The result is that I haven't seen how much you've fixed since the last version.
If it simply goes from white to cyan to white to cyan etc. that would do the job fine.
On the hex input issue, there's really no need to display half the byte while it's being typed in, so forget that I ever mentioned that. There is a real problem with the input though - if you start typing in a number by accident, you're then commited to changing it no matter what, which is likely to cause a crash if you're viewing the boot sector at the time. If you make this mistake elsewhere, you might at least get a chance to read the byte you're accidentally modifying before it's changed, unless you press another key before realising your error, by which time you've lost the original value. This is the main hazard with the system as you can make such an error by accidentally typing almost any key. If you do it in the boot sector and don't notice, you might then save the modified bootsector by moving to look at the next sector, so a bug may creep in without being noticed and wipe out lots of your work later on. Even a careful user would be bound to trip up on this at some point, so if any room can be found to fix this, it's worth doing. I won't suggest a solution as it's your program and I don't want to impose my idea of a fix on it, but it's likely to be hard to find room for it whatever way you try to do it.
The copy function has been used for real now, by the way - I needed it and it was there. I think the k key would sound more like a copy function than r though. If you changed that, it would also free up the r key to operate the "run" function that you have linked to the j key - the jump which is actually a call. Having said that though, it's also the case that both the jump and the paste functions could cause a crash if they're pressed by mistake, and adding protection to them would be costly, so moving these functions to the F1-F12 key row might be the best compromise.
With the jump function, I did try a far ret but thought it didn't work either - I now realise though that it would have been because the sector wasn't saved and my code simply disappeared when I ran it. This business of results disappearing is actually a serious problem as it will make debugging extremely difficult - you need to be able to post results somewhere and be able to view them.
Yes, I realised I'd misunderstood how it worked and meant to say so earlier. I don't think it's a problem though because by the time a programmer has reached the first segment boundary they should have switched to using their own edit & display code long ago: 32K is a huge amount of space to work with.
So, there are three issues that would be worth trying to fix: readability (being able to see byte boundaries clearly), accidental modifications (need a way to confirm that new input is wanted) and the ability to view results (so that you can see what your code actually does, thereby enabling you to look at the contents of registers at various points along the way). If you can fix all that, you'll then have created an educational tool of some value: people could use it to help them learn to read machine code in hex, perhaps by being challenged to create as much additional functionality as they can within the second sector.
It goes from red to white; but I can change the color scheme. Try it out.
Yes, moving them to the function keys seems more sensible. I'll do that.
I can fix that, though it appears that I'd need to impose some restrictions on the user code, though. As always, I'll try.
Readability has already been fixed. Ability to view results would soon be added. Accidental modifications... could require some thought. I'll look into it, but creating an educational tool of some value surely has it's incentive.
@TightCoderEx -- update NASM, or add "-Ox" in the command line?
You get colors to indicate bytes!
'k' and 'p' is copy&paste. 'r' is run. 'w' is write. I hope that works with all.
It doesn't clear the value of EBP and ESI, which means that the if you "far ret" back into the loop, you land into the same sector. Thus, you can now observe changes and such that you write in the same sector. Obviously, this would mean placing a restriction on the user code -- while, now, you can mess with the stack as much as you want, you'd need to save and restore EBP and ESI. You shouldn't have much of an urge to modify EBP in the first place. If you want to modify ESI, just push and pop it back? This, though, means that you can debug and the like.
If you enter one keypress (NOT a special function), and then press ESC, the first keypress is ignored. I couldn't add any more safety, unfortunately.
So, can we call it a day?
A bit too much of a contrast there for me, but the best solution would simply be to provide in the manual the address(es) of the byte(s) which control the red colour and let users change it to a colour value they prefer. My guess is that a brighter colour closer to white would look less stark, such as cyan, yellow or magenta (which are twice as bright as blue green and red).
Esc after one accidental key press should catch most mistakes, so it's a huge improvement.
Or let the user change them, though I don't know what values the Function keys return in AL and it may be to expensive to switch to using the scancode values in AH, so I'm guessing that you haven't moved them there yet for that reason. Even so, accidental key presses are more likely to be keys round the edge or next to keys you're meant to be pressing. K, L and ; are probably the least likely keys to be pressed by mistake, so the user could modify the program to use those for copy, paste and run if they know the addresses to write the new values to (which they would be doing from within Selfer and not with the source code).
[*]It doesn't clear the value of EBP and ESI, which means that the if you "far ret" back into the loop, you land into the same sector. Thus, you can now observe changes and such that you write in the same sector. Obviously, this would mean placing a restriction on the user code -- while, now, you can mess with the stack as much as you want, you'd need to save and restore EBP and ESI. You shouldn't have much of an urge to modify EBP in the first place. If you want to modify ESI, just push and pop it back? This, though, means that you can debug and the like.
So long as the user knows to save and restore them it should be fine. If they are only using BP and SI rather than EBP and ESI, pushing and popping BP an SI would be sufficient. I used to use EBP extensively as a general purpose register, but I now use it primarily to point directly at blocks of local variables so that as many routines as possible can be re-entrant (and without having to move values onto the stack and back off it again), but there's no barrier to this as BP can simply be saved on the stack at the start and restored before the ret.
There's still an awkward limitation in that results can only be seen if they're posted into the sector you're viewing when you press r, but there's a workaround for that as you can use one sector as a debugging space and run the code you're testing with a far call from there with all the results being posted back to the debug sector. Another option would be to write code to display results to a free area of the screen, but it's much easier just to post results into memory and to examine them via the existing display routine.
It's getting into the area of diminishing returns - more and more work would be needed for less and less gain. The system you've designed for loading and modifying sectors was an interesting experiment, but I think it causes most of the problems, and it would still wear a flash drive excessively. I'd prefer to press w once or twice per session to save all my work in one go and not have things being saved and loaded automatically every time I make a small modification and take a quick look at another sector. Changing that might also win back some space, and limiting the active working zone to the first segment of memory could also simplify things while still leaving plenty of room to develop an operating system. However, the way you've done things is interesting precisely because it's so different form the way I built mine, and the most important thing is that it also works. I think this may well be the right time to stop, so you could maybe round it off by writing a final version of the manual.
The manual's already been written of course, but there are a few things missing from it. The user shouldn't need to understand the code in Selfer at all, but (s)he might like to know which byte(s) need to be changed to modify the display colour and which bytes need to be changed to move the w, k, p and r functions to different keys of their own choosing (so that they can do it within Selfer rather than modifying the source code). The most important missing information is details of where it would be best to patch in a jump/call to make it bypass Selfer's display code and boot up the user's operating system directly (once the user has built enough of an OS for it to support itself), at which point Selfer would serve as a loader.
Oh - that's a big problem! I haven't looked at it in decimal form, but I've done a new experiment in Bochs just to check something and I now realise why I couldn't see where it loads everything at the start - it's because it doesn't load anything at the start at all. The only way to run any OS which you build with Selfer is going to be to use Selfer to scroll down through it first (or at least into the second sector) before you can jump into its code. I thought from my earlier experiments in Bochs that it loaded everything up front, but I realise now that values were simply being retained in memory in Bochs and weren't being loaded in again by Selfer (reset in Bochs is not like pressing the reset button on a real machine as it preserves memory content).
I don't know if you're still going to want to finish this project now as you doubtless have other fish that need frying, but changing the way it saves would make it a lot more flash-drive friendly. What you've already built is already a really good demo though, so the option is there just to declare the job as good enough and leave it as is. It would be hard, but I think there is enough there for someone to build an OS and to patch the bootsector with new load code at some point so that Selfer would effectively be replaced with a loader designed specifically for the new OS - they'd need to write their own display & edit code, then hack the bootsector with it and save the result using their own code too, and then they'd have to hope it all works first go.
If working from flash drives things become more problematic as some BIOSes may only support one flash drive such that it's the only place you can save the OS from within the OS. This is why being able to save through LBA to a partition is important: you would be able to edit the LBA start location before pressing w to save a copy to a new location in the partition, so if the main version got into an unrecoverable mess, the bootsector could still edit itself and change the start LBA, and then it could jump to its own first byte to load in an undamaged copy from another location in the partition. This would allow you to store thousands of copies on the same flash drive as you develop your OS and to backtrack to a stable version whenever a problem turns up.
Edit: I also meant to add that just loading and saving a single side of a single track would provide plenty of working space for a new operating system to be built, so that should save a fair bit of space in the bootsector as it can be done with a single call using very simple code to set up for it. It would be up to the user to make sure they don't write any code beyond the last sector that gets saved.
Last edited by DavidCooper on Thu Mar 21, 2013 2:01 pm, edited 1 time in total. | 2019-04-20T04:21:39Z | https://forum.osdev.org/viewtopic.php?p=220798& |
Last week I spoke about my visit to Rachna’s Scriptorium.
This week Part 2 of the interview has been posted.
In this interview I talk about the critiquing process and my a bit more about my own writing process.
If you missed Part 1, it is under related articles at the bottom of this post.
Thank you to Rachna for the great questions and the warm welcome on her lovely Scriptorium.
A couple of weeks ago my good friend and one of my writing partners, Rachna Chhabria, asked if she could interview me on her lovely blog: Rachna’s Scriptorium. Rachna and I became friends through an online writers group called Scribblerati that we both belong to. Very soon we were Facebook friends and this year we became writing partners.
For those who follow my creativity blog, Dragonfly Scrolls, you will be aware that I am usually the one asking questions in the interviews. Asking the questions is the easy part. Rachna turned the tables on me this week and put me in the “answer” chair.
The interview will be posted in 2 parts. In this first part, posted today, Rachna asks me about my writing process and the NZ publishing scene. My thanks to Rachna for a lovely interview. If you have not visited her Scriptorium before, bookmark her blog because one visit will soon turn you into a fan.
Part 1 – My visit to Rachna’s Scriptorium.
But I digress….enough with the wishes….
There are some exciting events happening in my writing life and my blogging life. April looks like it is going to be as Mad if not Madder than March. I have quite a few submissions due this coming month as well as quite a bit of editing to do.
As for blogging…Warrior Wednesdays is going to be interviewing some amazing authors and writers and I now have all interviews confirmed and locked in until the end of August. So I know where you will all be every Wednesday: sitting down with a cuppa and joining this girl with a quill as I interview some very talented people out there. As Warrior Wednesdays has gained a regular following I am going to start upping the ante as they say a bit…I am going to start digging even deeper into these Warrior Writers and Creative’s Psyche to get to the real secret veins of gold at the heart of their creativity. For this, I am going to ask for audience participation. That would be you dear readers and fellow creatives / bloggers. I need you to tell me what questions you really want answered from these writers. So in order to do this, I have set up two methods of dialogue and discussion.
This is the area I have created for Audience Participation. This is your area. You get to post a question here that you would like answered by each Warrior. Each week, starting on the first Wednesday of April I will pick a question from this page (it could be your question) to ask the Warrior.
This is a twitter chat room where you can tweet your questions. You can also discuss the previous interviews. I will be asking all the Warriors that I have interviewed already whether they can do a guest host on this tweet chat and you can delve further into anything you would like to know from them. I will let you know via here when we will be doing some guest hosting with the Warriors themselves.
This will allow you to not only read the interview but get you involved in the interview process. So starting this week, you have 1 week to post your questions.
For this week’s Warrior Interview I have the very gutsy and sassy Leigh K Hunt in studio. I have already received her interview answers and let me tell you that this is going to be a Wowser of an interview. So watch this space tomorrow. You definitely want to be here for this interview.
This coming month of April is: Child Abuse Awareness and Prevention month. So in honour of this worthy cause I am going to have the honour of interviewing an Australian Author who is donating the April income from her new biography to this cause. This interview will be hosted on Friday, April the 1st this week. So watch this space for that interview.
In April I am going to be reviewing a pre-print new fantasy book. I just received the book today so will be letting you know a review date once I have read it. Let me just tell you the book looks like a very intriguing read.
So yes, April is going to be a Mad month again but there are some exciting developments coming up. I hope to see you all here.
Look forward to seeing you all participate…lets have some great blog discussions.
girl with a quill: Firstly, Welcome to Warrior Wednesdays.
Amanda: Thank You for inviting me.
girl with a quill: Tell us a little about the woman Amanda Paige and the writer Amanda Paige.
Amanda: Well the woman Amanda Paige is a historian and archivist living in Little Rock, Arkansas. I am currently unemployed but volunteer at the Sequoyah National Research Center so I can stay current in my field. I process archival collections and do research related to Indian Removal (Trail of Tears) in Arkansas for the Center. I am single and a “Mom” to my four-legged children: Merlin (Terrier mix), Momma Cat, Bigguns and Baby Girl, all rescued pets by the way.
As I writer, I am just beginning with my career. So far my published writing has been nonfiction. I began writing at the University of Arkansas at Little Rock for an internship. I edited selected writings of two American Indian women, Susette LaFlesche Tibbles and Carrie LeFlore Perry. Dr. Daniel F. Littlefield, the professor I interned for, asked me to join him on a project documenting Indian Removal through Arkansas. Under that project I contributed to and wrote numerous site reports documenting Indian Removal as well as articles and conference presentations. Last October my book Chickasaw Removal was published by the Chickasaw Press. Chickasaw Removal came from our North Little Rock site report and we just continued researching the process of removal. For the three of us, we felt Chickasaw Removal was one of if not the most compelling story to tell about removal in Arkansas. I recently contributed articles to the Encyclopedia of American Indian Removal as well. Right now my current work in progress is a biography on Susette LaFlesche Tibbles, based on my internship and what also became my master’s thesis for Public History.
On the fiction side: Last year I made a decision to begin working on my fiction writing. For years I had written down some ideas for stories and I decided to participate in NaNoWriMo using an incident from my childhood as the basis for the story. Right now I am reworking this story and beginning to plot out a series that just sort of came to me one day as I rode the bus home from the SNRC.
girl with a quill: You are a historian and archivist. Do you find that history tends to play a part in your stories?
Amanda: Oh yes. I am reworking my NaNo story to incorporate some historical incidents that will play into the plot. The other series I am working on is very much influenced by the early republic era of American history so yes I can say that history will play a role in my stories. History has been a large part of my life.
girl with a quill: Who is your biggest influence in writing and why?
Amanda: I am wrestling with this right now actually. The two stories I am working on are completely different genres; contemporary romance for the NaNoWriMo and the other is fantasy. I tend to read a lot of Sci-fi, fantasy, contemporary romance, paranormal romance, nonfiction, mysteries (especially cozy). I have an idea for a cozy mystery and other ideas (don’t we all!) but I don’t want to overdo it right now and burn out. I have enough on my plate and need to finish the Susette LaFlesche Tibbles biography and then I plan to focus more on the fiction. I won’t completely give up on nonfiction as I have already planned to write a book on Arkansas and Indian Removal which will better explain some arguments my coauthors and I made in our site reports and Chickasaw Removal on the importance of Indian Removal in the early development of Arkansas.
girl with a quill: You are a co-author of the book “Chickasaw Removal”. Can you tell us a little about this book and what led you to co-write it?
Amanda: Well, like I said earlier it grew out of our site report on North Little Rock Arkansas for the National Parks Service to certify North Little Rock’s riverfront as a spot on the national trail. When we three looked at the tribes Cherokee, Chickasaw, Muscogee (Creek), Seminole, and Choctaw, we felt the Chickasaw Removal had the most potential for a compelling story of Indian Removal through Arkansas. And I have to say we were right. The book tells the story of the Chickasaw Nation before, during, and right after the removal process especially a lot of the financial fraud that occurred with removal at the expense of the Chickasaw Nation and their resilience as a nation through hardship and adversity.
girl with a quill: After your experience of being a co-author, what tips would you give an author who was thinking of co-authoring?
Amanda: First of all make sure you can get along with the people you are writing with. I had worked with Fuller and Dr. Littlefield closely for a few years and so that helped immensely! Also you will have to decide how you will make the different authors’ voices mesh and flow. You can’t let ego stand in the way and like I said you need to be able to get along with the people you will collaborate with.
girl with a quill: Now I understand that Chickasaw Removal is a non-fiction. Would you say it is more difficult to write a non-fiction or to write a fiction and why?
Amanda: I think they are both equally difficult. In nonfiction you still have to tell a story and it can be just as difficult as fiction. Of course in a few years my opinion might change on that as I write more fiction!!
Amanda: Nonfiction: first I decide what am I going to write about and then I just do a basic outline. Then I gather as much info on the topic that I can. From there I begin to digest the info I gathered and does it change my basic outline. Then I begin to write.
On my fiction, well that is a work in progress as you can see below!
girl with a quill: Are you working on a new writing project?
Amanda: No I am not superstitious, sorry!
girl with a quill: Do you belong to any writing groups and do you have a critique partner? Do you think writing groups or critique partners are important for writers? Why?
girl with a quill: What is more important to you? Story or Character? Why?
Character. You need a compelling character I think to drive your story. Of course ask me this again in a few years as I write more fiction! LOL.
Amanda: Well right now I don’t have one since I am just starting out. I could say all of them but…there was one character in my NaNo that I ended up killing off. He was intended as the heroine’s love interest but he did nothing for her or me and well off he went.
Amanda: Gee pick one? Well I do love Scarlett O’Hara. She had the nerve and gumption to let nothing get her down and as the Old South died she was willing to break social norms and do what was needed to survive while the Old Guard sat around whining. She is a flawed character though, as she doesn’t realize til too late she had the perfect man for her.
Amanda: Lets see Bobby Flay could cook dinner, I would love to have Vanessa Mae because she could also play some music after dinner, then I would probably just invite three of my friends because actually the friends I have tend to be very creative in their thinking and things they do! LOL.
Amanda: Write every day. No matter if it is just one word, sentence, paragraph, chapter etc, any writing counts as progress towards your ultimate goal.
Amanda: Ack! This is almost like what do you want on your tombstone, ha! Lets see I guess I want people to know me as a writer who wrote well researched and compelling stories and that I stayed true to who I was.
girl with a quill: Can you tell us where we can find you on the web?
girl with a quill: Thank you so much for such an interesting interview and a revealing look into history’s lens. It is so true that we can learn so much about history. I for one cannot wait for your biography to be published. Susette’s story sounds fascinating. Thank you for being part of the Wednesday Warriors series. You are indeed a worthy warrior of words.
Across ‘The Ditch’ – an interview with Kim Koning, NZ author « Sheryl Gwyther – author.
My trip to Australia where I visited with the lovely Sheryl Gwyther. It was quite interesting being on the other side of the interview process. Sheryl had some great questions that really had me scratching my head for just the right answer.
Join me in Australia as Sheryl and I sit down for a chat on writing.
I have been very excited to have this particular writer in my studio for a good ol’ natter. One of the reasons is that I have been following her interviews on her blog where she interviews writers on writing exceptionally well. So it was a real treat to put the interviewer in the hot seat so to speak. Another reason I have been excited about this interview is that Nicky has become a good online friend with the craziest and quirkiest sense of humour I know. With her photographer’s eye and a childlike imagination, she has a unique perspective on writing. She brought along her two writing friends, her beaded sheep and flying space duck, for the interview and as always packed her quirky sense of humour that never fails to have one smiling. Join us as we discuss squirrels, guinea fowl, photography and writing. Be warned your sense of humour will be tickled.
Nicky: Hi Kim, thanks for inviting me to be interviewed as a Wednesday Warrior on DragonFly Scrolls!
About me? Well, I’m a mongrel of decidedly mixed European heritage and live in one of the most beautiful cities in the world, near the southern tip of the African continent, in a garden full of trees, squirrels and an abundance of guinea fowl!
I think we can safely say that an over-active imagination is what drove me to being a writer – that, and a history of creativity in multiple forms in my genetic make-up!
girl with a quill: Did you always know that you wanted to be a writer? Do you remember your first story?
girl with a quill: Your blog is called Absolute Vanilla. What inspired that name? Is it a creative philosophy or a favourite treat?
Nicky: Absolute Vanilla is the second blog I created and having learned some lessons from the first blog (a fictional blog written by an acerbic 5’4” alien chicken…), I wanted a name that was high up the alphabetic order so when it is listed it’s near the top of people’s blog rolls. (You can put this down to over 15 spent in marketing and communications!) That aside, I love vanilla. So a bit of juggling and Absolute Vanilla was born.
girl with a quill: You mention photography as another creative passion. Do you find your photography to be an inspiration for your writing and vice versa?
Nicky: For me photography provides a different way of seeing the world. When you look at life through the lens of a camera you see things in a purer and freer form, you see the beauty or the wonder of the thing you’re looking at in a highly focused way. I find photography to be an incredibly healing art form. Does it influence my writing? Only insofar as I guess one could say I look at the blank page with the same kind of focus with which I see through the camera lens, and that photography has taught me to look at the world in a different way.
girl with a quill: On your blog, you have done quite a bit of interviewing yourself. What 3 lessons have you learnt from Writers on writing?
Accept the voices living in your head and give them voice.
Be true to yourself and write the story you’re meant to write.
And a fourth one – accept that it’s very tough out there and you must have persistence and determination to succeed.
girl with a quill: Speaking of your blog, do you believe that blogging and having a social presence on the web is important to building a platform for your writing?
Nicky: Unquestionably! Social media is fundamental to the times in which we live. I would not be where I am if it weren’t for social media. I started with yahoo groups, then blogging, and then moved onto Facebook, Ning groups and Twitter. All these platforms have given me access to people and ideas without which I would not be where I am today – for example, being interviewed on your blog, or interviewing other authors with whom I’ve connected via Facebook and Twitter on my blog. So, social media has helped me get where I am, it’s helped me create a global network of contacts and it’s got me “out there” – where I’m told I have a persona which is somewhat larger than life…. “But you’re so small!” a group of online friends exclaimed when they met me at a conference last year. “We thought you’d be so much taller!” There you go, that’s part of the power of social networking!
girl with a quill: When you are not writing, which writers do you love to read? Why?
Nicky: I read mostly Young Adult fiction because that’s what I write. My favourite authors include Meg Rosoff, Kevin Brooks, Marcus Sedgwick and Gillian Philip – to name just a few. They stand out for me because a) they write superbly well b) they’re unafraid to tackle tough issues c) they write with strong and honest voices. For me a good story, well told, is deepened by a very real emotional voice with rich characterisation. It’s authors like these – and others like Candy Gourlay and Keren David – who inspire my writing and my writing journey.
Nicky: Aside from what I’ve said above, I think I was inspired to write in the first instance my grandmother who was a wonderful storyteller. Sitting with her in her Austrian-themed dining room, with a pot of Ceylon tea and a pile of anchovy toast, she would weave the most wonderful tales of her life. In many ways, one might say she opened up the world of storytelling to me.
Nicky: I’ve always leant towards the fantasy genres, though I find that more recently I’ve moved from pure fantasy to something which is based in urban reality but has fantasy, magical realism or supernatural/paranormal elements. I guess it’s about weaving together the real with the mysterious – which is, I think, a reflection of life per se.
girl with a quill: Many writers use writing workshops and writing competitions to hone their craft. Have you attended any writing workshops / entered any writing competitions?
Nicky: In a nutshell, no – but only because they’re not accessible to me. I would need to travel to the US or the UK to attend the kind of courses I want to do – though, to that end, I do try to get the SCBWI-BI (Society of Children’s Book Writers and Illustrators – British Isles) annual conference whenever I can and, if I lived in the UK or US, I would unquestionably attend writing workshops and seminars. The one thing I have done (because I could do it via email) is to have a manuscript assessed by a literary consultancy. That was an incredible (and steep) learning curve and I would heartily advocate it.
girl with a quill: Tell us about the publishing process in South Africa. Do you need an agent or can you approach the publisher directly?
Nicky: I can’t tell you a huge amount about the publishing process in South Africa as I’m not looking to be published here. This is primarily because the South African publishing industry is small – representative of the reading population – and this is especially for children’s literature (remember the vast majority of South African children are impoverished, and books, sadly, are a luxury). Moreover, I’ve been told by the local publishers with whom I’ve been in contact that I write for an age group and in a genre and about subjects which are of no interest to South African publishers – they prefer novels that are South African based and which contain an African theme. I suppose this is driven by the fact that local booksellers would sooner import foreign books that already have a proven sales record and are guaranteed to sell, so publishers won’t take the risk of putting money into unknown local talent. That said, there is a reasonable market in children’s picture books and educational literature (provided it has an African theme). As for agents, there aren’t any here that I know of – mostly because local publishers prefer not to work with an agent – they would rather deal directly with an author.
Nicky: With a blank page – or a blank computer screen! Usually I have a vague idea of what I want to write about, an idea will have come to me in some way and I will spend time letting it “compost” in my head. When I feel I and the story and the main character are ready (which is usually when the character starts prodding my brain a little over-eagerly) – then I just sit down and write. I often think of it as a “channelling” experience!
Nicky: I’m unquestionably a pantser! I love the adventure of seeing where a story will take me. I find plotting removes some of the “magic” of the creative process. I will acknowledge, however, that this approach does mean that I have to do lots of rewrites and edits and I do keep telling myself that I really should have a go at plotting, sort of, anyway!
Nicky: Nope, not at all superstitious! But then I also don’t believe in things like writer’s block – which I know several of my author friends will argue with me about!
girl with a quill: Many published authors say that writing needs to be treated like any other job where you work for a set time every day. Do you have a set routine for your writing? Do you have a favourite time of day for your writing?
Nicky: I would like to see it that way, but it doesn’t always work like that – sometimes life just gets in the way. I find I write best in the morning and early evening. Unless I’m really on a roll with a story, I’m useless after lunch – so I use that time for doing other stuff – you know, all the admin related nonsense that so clutters our lives. I don’t really have a set routine, I just try to go with the flow. I believe that writing, like everything else, has rhythms and I try to respect those. If I don’t feel like writing, I don’t. If I need a break I take it. If I want to write for seven hours flat out, I do that (though this may mean that my lovely husband doesn’t get fed!). I’m not inclined to be rule bound but I do discipline myself. I set myself deadlines and I meet them. I try to go to the gym two to three times a week, I try to meditate daily. I make a point of getting away from my writing when it becomes too intense. It’s all about balance, being kind to and respecting yourself and the story and your characters. If I go too long without moving on with a story, my characters can become downright invasive and bullying!
girl with a quill: Describe your writing space for us.
Nicky: I have a study which I designed myself with a built in desk and bookshelves. It’s painted orange (it’s supposed to be a colour that inspires and motivates!) though the walls not covered in books are covered in pinboards and paintings and photographs. I’d describe it as a very vivid and friendly space. That said, I’m about to build a new house on the side of the mountain and in that the study will be a bit of an eyrie with big windows looking out over valley, mountains and sea.
Although I’ve been involved with critique groups for several years, I initially fought joining one for a long time, but I have to say it was one of the best things I ever did. What I will say is that it is critical to find yourself the right group critique group – writers who are at the same level and better than you, people you can trust and for whom you have respect. And if a critique group isn’t right for you, leave it and find another, there is no point in being in a group in which you are not comfortable or in which you are not learning. A good critique group will do two things – one, you will learn why your own story is or isn’t working and how to address problems, and two, in critiquing the work of your peers you will develop your critical faculties, which you can then apply to your own work. It’s very much a two-way street and what people put into a critique group is what they will get out of it. But, and I can’t overstate this point; critique groups must be dominated by mutual trust and respect, and a good critique is kindly done and constructively critical – a critique should never demoralise or embarrass or hurt someone.
Nicky: Hmm, good question… I’m not really sure you can separate the two, I think both elements are critical in writing a good novel. I like to start with a strong character, as I believe my character often drives and informs the story. But the two work in tandem – and together with that other critical element, voice.
girl with a quill: I know that it is a bit like asking a mother who her favourite child is but, Do you have a favourite story from those you have written and can you tell us a little bit about it?
Nicky: Every story I work on is my favourite story, I genuinely can’t say I have one that stands out from the others, though, inevitably, whatever I’m working on at the moment is the “current” favourite.
Nicky: I’m afraid the same sort of answer applies as above, though I did write a novel for younger children (9 – 12 years) several years ago that I’d really like to go back to because I so enjoyed the characters. It’s a fantasy, set largely in a fantasy world which gave scope for all sorts of weird and wonderful characters including a dragon, an owl and a Great Dane – who both spoke and had more views and attitude than your average opinion poll – and a pair of incorrigible gnomes.
girl with a quill: Are you working on any story now? Can you give us a peek into it?
Nicky: There are two: Hercule Poirot is one – simply because Agatha Christie gave him so many characteristics and so much life that he’s vivid – although, admittedly, something of a caricature.
The other is Terry Pratchett’s Granny Weatherwax – simply put, she’s a witch after my own heart – I mean, who doesn’t want to be adept at headology and be able to borrow another creature’s mind on occasion?!
Nicky: I’m not sure I’d want a dinner party with 5 famous creative people; I suspect there would be way too much ego around the table! Instead, I’d rather invite a huge group of my children’s writer pals to a soiree!
Nicky: I think the guest list would very much depend on my mood at the time and the kind of party I wanted. But to be completely frivolous, let me say, Hercule Poirot, Granny Weatherwax, Bertie Wooster (he would of course bring Jeeves), Gandalf and Vlad Dracul. I suspect I’d then sit back and watch the mayhem unfold. I can tell you that already multiple creative outcomes are flitting up from my imagination!
Nicky: Try astrophysics instead – it’s probably easier.
Accept that you’re not as good as you think you are and set to work improving. Everyone thinks they can write (I was a copywriter and a scriptwriter in a previous life) but actually, most people can’t write and fewer people can write a really good story, especially a children’s story.
Nicky: Learn, always learn – observe and grow all the time – be savvy, stay in touch with the world and stay creative.
Nicky: I don’t really care about creating a lasting legacy – I just want to tell a good story and tell it well. If it touches someone’s life, that’s wonderful. If a legacy is created from that, great – but since I probably won’t be around to know about it, it doesn’t really matter. To my mind, the desire to create a lasting legacy is fundamentally an ego-based illusion. The important thing in the here and now is to honour the story – and yourself – in the process of creation.
I am on Facebook but I manage my connections there quite tightly.
And a note to your readers – please don’t confuse me with the chicklit author who uses my name as her nom de plume! Or the Danish musician, who is male.
Well it is Wednesday which means it is time for me to have a sit down chat with another warrior. The element of these interviews that I love the most is that I get to sit down and chat with a fascinating artist of words. I learn tips about the craft of writing that have been tried, tested and aced in the school of hard knocks. The other element I love is the myriad of differences and similarities between each writer I interview and myself. Some of us write full-time, some of us wish we could write full-time. Some are mothers, some are single. Today’s writer hails from the fair city of arts and culture in the land down-under: the city that is Melbourne. Join me in my living room as I sit down and chat with the energetic writer, mom, wife, and tea lover as we chat about how she blends a life of writing and creativity (helped along by a freshly brewed cup of tea) with the madness and chaos of a hospital emergency room. While we chat, I will brew us a fresh pot of tea, Jill’s muse….
thanks for inviting me to be interviewed, I hope you enjoy the chat.
Jill: I’m a people person who lives happily out of the box and tends to step further out and away if I feel crowded. I live at the base of a mountain that is famous for bushfires but also for beautiful birds and marsupials, brave people who have lost again and again but keep re-building.
I work Saturday nights resuscitating people who live literally unbelievable lives of violence, panic, and drunkenness. Why? I still believe that under any mess there is a gem worth looking for. I enjoy the sounds of native birds, the kindness of unexpected people, trust and clarity. I’m a web-browser; I love spiders and usually know who is hiding in my garden.
Jill: About fifty years; I don’t remember a time when I didn’t read and write. I do remember it being disruptive to living and learning, but comfort was more important than conformity.
girl with a quill: What genre do you write in? What made you decide to become a writer in this genre?
Jill: I’ve written Children’s musicals with my husband, articles on health and parenting for years. I prefer Young Adult fiction, mostly metaphorical and speculative. I love walking out of this world to find hooks and handles in another, hoping to offer relief to people who struggle with uniqueness.
girl with a quill: Tell us about your books? Are you in Pre-publication?
Jill: Yes. I have my first fiction book on its way out. Just a few more pushes and it should breathing and smiling. This one is for the 10 – 15-year-old age group; especially those girls who feel cheated by the lack of choice, the sudden changes of periods, a morphing body and capricious emotions. Most of the books I’ve written have been about pushing through essential walls of change.
girl with a quill: Are you working on a new story right now? Can you tell us anything about it?
Jill: it defines a child I knew too well, explores the panic of crowding, the tenderness of raising an eaglet, and the sanctity of voice.
Jill: Not necessarily, I try to choose universal themes. Everybody knows the same struggles, not everyone has the same choices. I don’t think geography affects the most interesting part of us. I don’t like being a tourist, because no matter how great the scenery, it’s the inner person that is more interesting, beautiful, courageous or tested.
Jill: My husband. He believes in me and I trust him. I can’t say that about anybody else.
Jill: I knew that I wanted to write fiction, probably for children or emerging adults. I mostly wrote on health and parenting because I’m a critical care nurse and knew the territory well. I don’t particularly enjoy non-fiction, but I felt wanted there and it kept me working in writing for a few years. I would love to become established as YA fiction writer, but I’m still finding my way.
girl with a quill: You are a mother with a part-time job and writer? Do you tend to have your children be your beta readers?
Jill: I work night duty in a public Hospital Emergency department, and have three High School children. My children do read my work and often pick up inconsistencies in colloquial language, or depth of conversation. However I also like to have the opinion of experienced editors/authors for technical problems with balance/style etc.
girl with a quill: In your day job you are a shift worker, do you find that it is harder to find time to write? Do you have set writing times?
Jill: I do set myself times to write/edit during the day but also love flashes of inspiration that come during sleep, at odd moments during my usual chaotic life. I don’t find that writing creatively can be worked into planned spaces, it tends to land unexpectedly. I leave notes everywhere; sentences, runaway tangents that appear away from my chosen work space.
girl with a quill: You participated in NaNoWriMo 2010 and you were a winner? What did you take away from that experience that is valuable to your writing?
Jill: I loved the excuse to have to write. I had previously considered writing an option, a loved option but not one that had enough definition. Nano pushed me to create hours in a day when I’d put on my nano shirt, buy a new teapot, sort out a ritual that became and has remained a beautiful place. I loved listening to other writer’s discuss their struggles, and vulnerabilities. Previously I hadn’t had feedback that was friendly. It was constructive but less intimate, and I believe more grows within the place of vulnerability and intimacy. Not just in writing.
girl with a quill: For NaNoWriMo the challenge is to write down the story without editing. Is this how you usually write?
Jill: Yes, I love runaway writing, or stream of consciousness. Maybe it seems less didactic and rehearsed, less forced.
Jill: I have so many possible plots waiting in a queue in that writing room in my head. I haven’t experienced writer’s block, I could write for days if real life didn’t interrupt me. I recently destroyed a manuscript I had worked on for 5 years because I’d had so much pain in the rewrites.
Jill: Definitely a panster. I don’t like confinement and my characters’ journey is happier when birthed and grown organically than under the restrictions of timelines, plots and maps. I have software for mind mapping but it seems so restrictive, it hurts. In my personal life, I don’t like clocks, maps, diaries because they preach at me. In y writing life I need the freedom to dangle a possibility ad allow it to brew. That was why I bought a new teapot for Nano; it was symbolic of brewing and tasting something in a beautiful vessel, , choosing the depth and savouring the outcome.
Jill: I don’t think I am superstitious. I wouldn’t want my thought life to be defined by events. Life takes unexpected turns and not all of it needs understanding or reason.
Jill: Only this on-line group. Nano helped me listen to other writers, but I’m not very good with too many people. I tried a couple of writer’s groups, but felt crowded. I love having one to appraise my words, but not several.
Jill: The character. I love people. I work in an Emergency Department because I love the variety and unexpected changes. All of life is woven with stories but can be boring if the character is not someone you care about. People matter more to me than events. I love metaphors and allegories because they have the chance to unearth the complexity of the heart of people.
Jill: A boy who couldn’t read, had cheated and manipulated people to find a way through the system. He reminds me of so many teenage boys I know, covering frailties by unconsciously trapping people to help them find a path.
Jill: The Cat in the Hat; he loved mess and always pulled solutions and possibilities out of nowhere.
Jill: 1;Dr Seuss because he told children that life would have its pains, pleasures and paradoxes, and that the journey is beautiful.
2; AA Milne; I loved his stories, but after reading his son’s biographies, I was very distressed about Christopher Robin’s parenting. I have so many questions to ask Mr Milne Sr.
3; Simon French; I have re-read all his books so many times, he has a beautiful insight, into injustice in common society.
4;Marilynne Robinson, because she writes those moments of wit, warmth and pain that make you shiver.
5; Robert Frost. He was rejected within his own country because his metaphorical writing wasn’t understood, but he still believed in himself enough to pursue his own style. He seemed to be so sensitive, secure and persistent.
Jill: None of them. I have a house full of teenagers, and all their friends. My bravest moment was having 13 13-year-old boys for a 24 hour sleep-over. It was the noisiest, smelliest time I’ve ever had. My characters can stay on the pages.
Jill: Accept technical advice, but allow room for your teachers to have opinions that are not necessarily insightful.
Jill: No matter how many times you decide you’ve failed, the fire of a dream will not be extinguished.
Jill: To find a few sentences that melt the reader’s sobriety and sadness.
girl with a quill: Where can we find you?
I am on Facebook, twitter; @jilldempsey and have a blog that is still waking slowly.
What a fascinating chat and what a fascinating lady. Thank you for coming in today Jill. Now if I am not mistaken, you must be parched and the tea must be brewed. Shall I pour us each a cup while I excuse the readers?
and Ink imbrues deeper than Blood….
Today’s writer is an eloquent lady with a lovely turn of phrase hailing from the Netherlands. I met her through the Warriors Facebook group that I belong to and have enjoyed all her wise posts. She may not post as often on the group as I know she is busy on her latest story, but when she does post or post a link through to her blog, I always take note of what she says. She is a writer that not only knows about her craft and has succeeded at having a career in writing but also has a vast resume of writing related paths from being an intern at a top publishing house to editing to ghost-writing. If you think that you find it impossible to just find enough time to write for a hour every day, Mina adds one more item to her resume by being a teacher of creative writing at schools. She started off wanting to be an architect but in the end decided to follow the path of destiny and followed the way of the words to become a writer. They say everything happens for a reason and I am glad that destiny changed her pathway from architecture to writing. Otherwise we would have missed out on enjoying her talent and her wisdom.
girl with a quill: Tell us a little about you.
Mina: I was born and grew up in a small village in the south of the Netherlands. My dad was an architect and for a long time I thought I was destined to be one as well, as I inherited his math genes. But I hadn’t counted on my mom’s genes. She had a great imagination and she was a storyteller pur sang. She planted the storytelling seed in me. It took its time to grow, even after I found out that my favorite subject in school was… detention. Detention meant writing essays and I loved writing essays even more than I loved math, physics and chemistry.
I did study architecture, but never finished it. After dropping out of polytechnic, I wandered around for quite some years until I couldn’t ignore the need to get all the stories out anymore. I followed some courses creative writing and the four-year course Writing Prose For Children. I also did the editor’s minor at the University of Amsterdam and an internship at one of the major publishing houses in the Netherlands. By now I’m not only a writer, but also a seasoned freelance copy-editor. In addition to writing and editing, I write reviews for Booktunes, the site that brings your favorite books and music together and I occasionally teach creative writing to high school students.
Mina: After my son was born and I, again, got hold of all those exciting books I used to read when I was young, books taking you with them on adventures you couldn’t even dream of. I realized I had to do more than read. I signed up for some creative writing classes (I’m a bit of a perfectionist) and at one of the classes, Writing for Children, everything suddenly fitted, like finding your true vocation.
Mina: Every day inspires me to write. Even the tiniest event can light the fire, because behind every event, every single step you take in life there is a whole world of stories. What if you didn’t take that step? What if you went into the other direction? What you see is what you get, people often say, but what if it’s not?
Mina: Home is where I write. I have an office on the second floor where I’m surrounded by paintings and books. From my window I look at one of Amsterdam’s main canals, lined with trees and beautiful 18th century houses. A great view if you have to sit and think, which is what writers do a lot.
Mina: I think most of the stories are already in me. They just need to find their way out. Others come to me when I travel, like THE SUN SPIRIT. That one hit me when I was traveling through Arizona and the Navajo Nation: the thunderstorms, the flash floods, the intriguingly mysterious red monoliths. You could feel the adventure in every breath of air, in every grain of sand, in every sudden shadow that darkened the world for a moment.
Most of my stories are a mix of character- and story-driven. The story, the adventure is the main pillar on which a telling is built, but every story needs strong characters, too.
girl with a quill: Once you have your story, take us through your preparation stage. Tell us a little about your writing process.
Mina: The preparation stage is usually a long one, as the story first needs to form in my head. As soon as the basic shape is there, as soon as I’m well acquainted with my protagonist, I can start writing. First a draw a blueprint on the whiteboard next to my desk, next I start writing the manuscript. I am a linear writer, and I usually write a book from the beginning to the end in one go (don’t worry, I do go to sleep at night J). Only my debut, DEEDEE’S REVENGE, was written differently. Circumstances forced me to write some of the individual scenes first and “weld” them together in a later stage. I can still see those seams. They might be invisible for the reader, but they are there. When writing THE SUN SPIRIT I found my preferred modus operandi, so… linear it is.
When I’m done writing I put the manuscript away for a week or so to let it all sink in. Then I read it and start revising the first time. After the first revision I give it to my proofreader. She is a friend of my son’s (16 by now). She wants to be a writer herself and she is a very strict and uncompromising editor, and she’s able to single out most of the flaws. I find it invaluable to have a target reader as my proofreader. With her reader’s report at hand I revise the manuscript for the second time. After that, and only when I am truly satisfied with the end result, I hand the manuscript in.
girl with a quill: You write YA. What led you into this form of writing?
Mina: I know YA is the name, but I see my stories more as coming-of-age stories. Sometimes my protagonist is 10 or 12, sometimes he is a little older, like the one in the new book I’m working on. He’s 16. What they all have in common is that they go through an adventure that will change their lives forever.
YA is the major part of what I write, but I also write thrillers for adults and short read-aloud stories for the very young. The thrillers are a logic continuation of writing YA – or at least it feels that way. The short stories work as etudes. Writing them hones my craft and keeps me on my toes if it comes to keeping the “fanning out” in check. Short stories force you to be brief and to the point, but at the same time every sentence, every word needs to be in flow with the next sentence and the next word.
girl with a quill: Do you have a favourite out of your stories or your books? Can you tell us why?
Mina: That is a hard question. I love DEEDEE’S REVENGE (DE WRAAK VAN DEEDEE), not only because it was my debut, but it also because it is a bit about me. DEEDEE’S REVENGE is about Deedee and her pesky brother Matthias. One day Matthias crosses the line with one of his pranks and Deedee swears she will get back at him. It’s a bit about me getting back at my brother, at last, for one of the pranks he pulled on me when I was young. It’s also the only book I’ve written that has a female protagonist.
girl with a quill: Do you have a favourite character from your books?
Can you tell us who/what and why?
Mina: I think Tom, my protagonist in the Warriors Of The Sun series, is my favorite character. He’s been with me for three books now (of which two have been published so far). I love him and the way he carefully treads through life, getting bolder and more confident with every book.
girl with a quill: Do you find that all of your stories are smoothly written once started or have some of them been challenging?
Mina: So far it has been easy “writes”, if there is anything like an easy “write”. In a way every manuscript is a challenge, as you never know beforehand if it will work out, but most of the time the writing is smooth. It’s the editing and revising part that bothers me more. That part compels a lot of self-discipline as you have to be able to be ruthless in killing your darlings.
girl with a quill: Have you ever written in any other genre? If you haven’t, would you want to and what genre would you choose?
Mina: Up till now I have written short read-aloud stories for the very young, adventure (low) fantasy for MG/YA and I just finished the revision of my first thriller for adults. You might think that is different genres, but it’s not. All my stories are spine-chilling adventures, even the short stories (although those aren’t as scary as the stories for my older audience). I don’t think I will ever divert from this adventure genre. It fits me like glove.
girl with a quill: You have published your books in Dutch. Have you had your books translated into English?
Mina: Three of my books and about 30 short stories have been published in Dutch, none of them have been translated. Yet!
girl with a quill: What is your opinion on books being translated?
Do you find that it is a positive or a negative to the story?
Does anything get “lost in translation?
Mina: In the Netherlands we grow up with translated literature. Our publishers have a long tradition of bringing translated books to the public. Partly because there are a lot of good books out there that should be read, but also because of our traders’ mentality: why shouldn’t you publish a book that is successful abroad here as well and make some money in the process?
For the story it’s not always a blessing. As an editor I have copy-edited quite some translations, and yes, things can definitely get lost in translation. It takes an outstanding translator to capture not only the story, but also the voice of the author and even then it’s inevitable that some things get lost in translation because of the mere fact that one language isn’t the other.
Dutch books are less often translated into other languages. I suspect that it being such a small language area and the corresponding lack of translators from Dutch might be responsible for that, as it makes the translation process a rather costly matter.
girl with a quill: Tell us about the process of publication in the Netherlands? Do you have to have an agent or do you work directly with a publisher?
Mina: The agent system is slowly gaining ground here, but only for adult literature. Writers usually deal directly with the publishers. That might also be due to the smaller market. The sales figures for midlist writers a not spectacular and if you have to split the already proceeds with an agent… But I’m very much for an agent system. Most writers are not sales people, agents are. It pays to have someone dedicated to your books deal for you. I have an agent (Paul Sebes of Sebes & Van Gelderen Literary Agency) for my thriller.
girl with a quill: Have you / Would you submit to any US publishers or UK publishers?
Mina: I have not submitted to US publishers or UK publishers. Again: yet! I have signed a contract with literary agent Erzsi Deàk of the Hen & Ink. She will handle all rights for my children’s books, not only the ones that have been published in the Netherlands, but the future ones, too. I am very, very happy with Erzsi. She gives me the opportunity to spread my wings and to become true member of our ever-globalizing world.
Would you consider publishing in E-book format?
Mina: I am totally addicted to my e-reader. I love the concept and the possibilities it offers to both reader and writer. Thankfully, the Netherlands is slowly but surely picking up the advantages of the e-reader.
girl with a quill: Are you working on a new story right now?
girl with a quill: You have a website, a blog and a twitter id.
Do you find social network platforms important to a writer’s platform? If so, why and how?
Mina: I have mixed feelings about social network platforms. Yes, they are important as they give you a more direct way of interacting with your audience and with your peer group. It keeps you informed. One of the earlier Warriors you interviewed aptly named Facebook ‘her water cooler’. That is exactly how I feel about it. Writing can be a very lonely business. It’s good to meet your peers and your audience at the ‘water cooler’ every now and again.
The downside, of course, is that it takes away time from your core business: writing. You have to exercise quite some discipline to keep the every now and again really every now and again and not all the time.
girl with a quill: If you could choose 5 famous creative people to have dinner with, who would you choose and why?
Mina: I would love to have dinner with Jennifer Donnelly, Frank Lloyd Wright, Panamarenko, Yukio Mishima and Harper Lee. Jennifer wrote this intense YA-novel REVOLUTION and I would love to talk about to her our craft and the agony it causes us sometimes and how to overcome that. Frank Lloyd Wright is on the list, because designed the most beautiful houses in the world, houses that – to me – are like stories. I wish he could tell me about the lines he sees and how he was able to put those lines down on paper and shape them into houses. Panamarenko is a Belgian artist. Every single piece of art he makes is a novel in itself. During dinner I would have him tell me everything about how math can marry art. John Irving is one of my favorite writers. I wish he would tell me all about the construction of a story. Finally Harper Lee, the writer of my all-time favorite novel. She only wrote one and I wish she could tell me why.
girl with a quill: If you could have a dinner party with 5 of your favourite fictional characters? Who would they be and why would you invite them?
Mina: Mizoguchi, the deeply troubled acolyte from Yukio Mishima’s THE TEMPLE OF THE GOLDEN PAVILION, Scout (Jean Louise Finch) from TO KILL A MOCKINGBIRD, Bod Pa, the old shaman in the Dutch coming-of-age novel HET BOEK VAN BOD PA (Bod Pa’s Book) by Anton Quintana, Pepto Bismo, Panamarenko’s statue of a modern day Icarus, and Begochiddy, messengers of the Navajo spirits. I would love to meet them, because they all are out of the ordinary, the stand out in loneliness, in strength, in being different. Somehow they all feel as kindred spirits (I’m not going to burn a temple, though J).
Mina: That would be Anton Quintana, a Dutch writer of children’s books and thrillers. His children’s books are the ones I admire most. They all have that extra in them, that thing that tells you that there is more to this world than meets the eye.
girl with a quill: What is your favourite classic book? And why?
Mina: My favorite classic is TO KILL A MOCKINGBIRD by Harper Lee. I know I’m not alone here, but the book is so intense. It reached right into my soul, it questioned my values and it left me with the rather desolate feeling that in the end we’re all alone.
girl with a quill: What is your favourite contemporary book? And why?
Mina: That is another hard question. There are so many good books coming out. For now, I’ll go with Jennifer Donnelly’s REVOLUTION. It is just as intense as Harper Lee’s book, but on a different level. Donnelly has accomplished, that if you read it, you almost literally can feel the pain of the protagonist, Andi Alpers, whose life was shattered after the death of her younger brother.
Mina: Keep honing your craft.
Mina: I hope people will read my books.
girl with a quill: Can you tell us where we can find on the Web?
Thank you Mina for that look into your life as a writer. Now it looks like you are just about ready for another cuppa. Tell me more about the adventures that Dorian gets up to in your latest thriller…Readers if you want to know more you will just have to wait for the book. | 2019-04-25T16:43:54Z | https://kimkoningink.com/tag/interview/ |
New gTLD Application Submitted to ICANN by: Charleston Road Registry Inc.
While the string for which Charleston Road Registry (CRR) is applying, .music, is not an IDN and, therefore, does not contain characters which require mixed right-to-left or left-to-right functionalities, CRR has nonetheless familiarized itself with the requirements and components of the IDNA protocol by reviewing the relevant RFCs and the relevant background information found on the ICANN IDN Wiki. CRR has also tested the .music string for rendering issues; none were found.
Charleston Road Registry is an American company, wholly owned by Google, which was established to provide registry services to the Internet public. Google is an American multinational public corporation and global technology leader focused on improving the ways its hundreds of millions of users connect with information. Since its formation, Google has been developing technology that can improve upon existing ways of doing business on the Internet. Google provides a variety of services and tools for Internet users and advertisers of all sizes, from simple search features and local ads to enterprise-scale business applications and global advertising solutions. These tools make it easier for people to make use of the world’s information and enable entrepreneurs and publishers around the world to grow their businesses.
In line with Google’s general mission, Charleston Road Registry’s mission is to help make information universally accessible and useful by extending the utility of the DNS while enhancing the performance, security, and stability of the Internet for users worldwide. Charleston Road Registry aspires to create unique web spaces where users can learn about products, services, and information in a targeted manner and in ways never before seen on the Internet. Its business objective is to manage Google’s gTLD portfolio and Google’s registry operator business. As discussed further in the responses to questions 23 and 31, Charleston Road Registry intends to outsource all critical registry functions to Google Registry Services.
The purpose of the proposed gTLD, .music, is to provide a dedicated domain space in which copyright holders and their authorized distributors and licensees can enact unique second-level domains that relate to the promotion, sampling, or purchase of music. Charleston Road Registry believes that registrants will find value in associating with this gTLD, in particular musicians and music distributors. There is a significant audience for music on the Internet, as supported by industry data: over 10 billion songs have been downloaded on iTunes since its launch in 2001 [Source: http:⁄⁄www.apple.com⁄pr⁄products⁄ipodhistory⁄]; Pandora total listener hours were approximately 2.1 billion for the third quarter of fiscal 2012 [Source: http:⁄⁄investor.pandora.com⁄phoenix.zhtml?c=227956&p=irol-newsArticle_print&ID=1633097&highlight=]; and total global digital music sales were $5B in 2011 [Source: http:⁄⁄www.guardian.co.uk⁄media⁄2012⁄jan⁄23⁄global-music-sales]. This mission will enhance consumer choice by providing new availability in the second-level domain space, creating new layers of organization on the Internet, and signaling the kind of content available in the domain.
The proposed gTLD will also provide Charleston Road Registry with the means to meet its business objectives.
The goal of the proposed gTLD is to create a new Internet environment that provides registrants with the opportunity to associate with a meaningful term.
Charleston Road Registry, as the registry operator, will define the specialized meaning of the term and, based on this definition, will identify criteria for registrants to operate in the proposed gTLD. Only entities that meet these criteria will be entitled to register for a domain in the gTLD. Specialization, therefore, arises from the Charleston Road Registry definition of a term, as well as through market dynamics as entities align their offering(s) with the term. This specialization will be maintained through intermittent audits to ensure the relevancy of content in the proposed gTLD to the defined meaning of the gTLD.
The specialization goal of the proposed gTLD is to create a new Internet environment that provides registrants with the opportunity to associate with the term ʺmusicʺ and to provide content and offerings related to music and⁄or targeted at users seeking music content.
Through its association with Google, Charleston Road Registry is uniquely positioned to enable and support the proposed gTLD by providing its service reliability and speed of delivery as a part of its services. Google brings unique expertise and a proven record of excellence in infrastructure operations: Google now runs the largest DNS system in the world, has industry-leading uptime on its services, such as web search, and offers enterprise services on which governments and businesses depend.
Charleston Road Registry is committed to using the most technologically advanced, secure, and reliable registry services for all of the domain names in the gTLD so as to not compromise the service levels, security, and stability of the gTLD to users across the globe.
Charleston Road Registry will provide both Engineering and Customer Service support to registrars. All registrars will also have the same level of access to Charleston Road Registry resources to resolve disputes and technical and⁄or administrative customer service issues.
Charleston Road Registry will provide all registrars with 24-hours-a-day, 7-days-a-week Customer Support in the form of telephone, email, and⁄or web chat for technical and non-technical issues relating to the operation of the gTLD system. Charleston Road Registry will provide all registrars with the same level of access to customer support via telephone, email, and Charleston Road Registryʹs website; email and web-based interactions will be the primary method of provisioning customer service support to registrars.
Google has a proven record of providing high-quality, secure online services. Charleston Road Registry seeks to enhance Google’s reputation for excellence, superior quality, and high level of security and become known as an exemplary domain name services provider. When registrants assess opportunities in the marketplace to obtain a name, they will have confidence in Charleston Road Registry’s ability to meet ongoing needs as the registry operator for the proposed gTLD. When Internet users visit a domain name in the proposed gTLD environment, they will be able to reliably expect and experience the high level of security and quality on which Google’s reputation has been built.
The registry will be structured in such a way that Charleston Road Registry will enable registrars to register and oversee second-level domain names in the proposed gTLD; that registrars develop and deploy a reasonable process for ensuring that those domain names are used for gTLD-relevant purposes as specified in the registry-registrar agreement; that the WHOIS is thick and reliable; and that the registry is responsive to legal rights owners (if applicable) who may have complaints about potentially abusive registrations.
Charleston Road Registry plans to develop and publish eligibility criteria for all registrants in the proposed gTLD and will work with its registrars to execute the eligibility verification process. This process will imbue additional meaning to all second-level domains in the gTLD and enhance the gTLD’s reputation by establishing an authoritative community of content providers. When Internet users visit a website in the proposed gTLD environment, they will be able to reliably expect content relevant to the proposed gTLD.
In addition, Charleston Road Registry’s operation of the new gTLD will provide the opportunity for registrars and registrants to build and⁄or bolster their unique brands and brand reputation in association with the proposed gTLD.
Charleston Road Registry supports the advancement of registry operators as a whole and the diffusion of gTLDs amongst diverse stakeholders to generate increased competition for the benefit of the Internet public. Increased competition will result in more competitive prices for consumers, generate efficiencies and increase productivity in enterprises, and spur innovation in the gTLD space.
The proposed gTLD, .music, will provide a new online structure for the aggregation of music-related content. As an alternative to existing second-level domains, Charleston Road Registry anticipates that the .music gTLD will increase competition among registrars by allowing for further product and pricing differentiation opportunities when offering second-level domains in the gTLD. Charleston Road Registry expects that the .music gTLD will lower barriers to entry into the marketplace for musicians, in particular by introducing a new online distribution channel. This fosters growth in the number of entities offering music and music-related content on the Internet, thereby increasing competition among all music purveyors. Charleston Road Registry also anticipates the .music gTLD may contribute to an increase in online advertising given the specific nature and purpose of the domain. Entities will compete to advertise their goods and services and reach a targeted audience of musicians and⁄or music consumers.
Managing this namespace will allow Charleston Road Registry to provide to registrars and registrants the high level of technical operations quality and service for which Google is known, which in turn will incent other existing and new gTLDs to improve the quality of their offerings.
Charleston Road Registry will facilitate a fair and equitable registrar process, providing open access to any registrar who meets ICANN accreditation guidelines and fully complying with the Registry Operator Code of Conduct. Charleston Road Registry is committed to treating all registrars equitably and will not offer preferential treatment to Google in its capacity as registrar.
Charleston Road Registry believes in the commercial viability of alternatives to existing gTLDs such as .com and .net.
The proposed gTLD will provide the marketplace with an authoritative space for registrants to deliver content, imparting brand differentiation not currently available in the current gTLD space. It also delivers value to the Internet public by defining the meaning of the gTLD term, providing for the verification of registrants who will offer content in the proposed gTLD environment, and encouraging a specific use. These activities differentiate the proposed gTLD space in a new and meaningful way.
The .music gTLD will provide a new mechanism whereby copyright holders and their authorized distributors and licensees can enact second-level domains that offer content related to their respective copyrighted music content. This signification is not currently available in the gTLD space.
In addition, given its association with Google, Charleston Road Registry offers a unique value proposition to registrars and registrants resulting from the strength of Google’s trusted brand, technical leadership, and support for free speech on the Internet. Registrars will have the opportunity to leverage this brand in devising their own market positions.
The proposed gTLD will foster innovation by creating a new space for the categorization and classification of online content. It will therein provide a mechanism by which registrars and registrants can better brand and manage their online presence by associating it with the .music namespace. This namespace delivers value to the public through the provision of new and differentiated content, goods, and services to Internet users.
The proposed gTLD, .music, will promote innovation among registrars by opening the possibility for copyright holders and their authorized distributors and licensees to own second-level domains in which they can deliver music-related content to the Internet public. This provides registrars with the opportunity to create and offer tailored new products and services that benefit registrants and⁄or improve user experience in association with the registration of a second-level domain in the .music gTLD. The proposed gTLD aspires to become an authoritative online resource for music. In addition, broad adoption of the .music gTLD will likely invite user comparison among second-level domain sites. This will encourage second-level domain registrants to innovate and improve upon their content and⁄or offerings as a point of differentiation.
Charleston Road Registry considers the proposed gTLD to be a platform for innovation with existing and future Google products and services. Charleston Road Registry, therefore, may incorporate these new offerings into future registry service options (subject to the ICANN approval process), infusing new ideas into the gTLD for the betterment of the public.
Google consistently aims to improve upon technologies that connect people with information, as demonstrated by a proven record of innovation and iteration. Charleston Road Registry strives to offer its constituents this same level of continuous development in advancing its management and operation of the gTLD, engendering benefits to registrars, registrants, and end users.
Charleston Road Registry will strive to provide the highest level of user experience through operational stability, security, and performance to serve the interest of registrants in the proposed gTLD. Charleston Road Registry is uniquely positioned to provide this level of experience given its relationship with Google; Google invested over $3 billion in its IT infrastructure in 2011 and maintains a record of excellence in infrastructure operations.
The proposed gTLD will provide registrants with the opportunity to differentiate their dedicated domain space such that the end users are able to discern the type of content intended to be found within the proposed gTLD. This will enable increased user visibility of registrants’ offerings, as well as provide registrants with the opportunity to enhance their respective content offerings and innovate in new ways.
The proposed gTLD will provide a more trusted and user-friendly environment where domain names and content related to the .music gTLD can flourish. Charleston Road Registry seeks to have users deem the gTLD trustworthy and reliable and recognize it as an aggregated source of targeted goods, services, and information.
The proposed gTLD, furthermore, facilitates an improved online user experience through greater structure and categorization on the Internet.
Charleston Road Registry will make access to Registry Services, including the shared registration system, available to all ICANN-accredited registrars. Domain names within the proposed gTLD will be available to the public for registration and use.
Charleston Road Registry is committed to implementing strong and integrated intellectual property rights protection mechanisms. Doing so is critical to Google’s goals of model Internet citizenship and fostering Internet development, especially in emerging regions. Accordingly, Charleston Road Registry intends to offer a suite of rights protection measures which builds upon ICANNʹs required policies while fulfilling our commitment to encouraging innovation, competition, and choice on the Internet.
Charleston Road Registry reserves the right to impose registrant verification enforcement policies on registrars.
Charleston Road Registry believes that the .music gTLD will best add value to the gTLD space by limiting content creation in the gTLD to only verified copyright holders and their authorized distributors and licensees. Charleston Road Registry plans to require registrars to include language in their registrar-registrant agreement that the registrant must be authorized or licensed to post any content that the registrant introduces into the gTLD. To preserve the integrity of the gTLD, Charleston Road Registry reserves the right to adopt enforcement measures, including a request that registrars facilitate a user reporting method to log complaints and⁄or potential instances of misuse within the gTLD. If a registrant is found to be in violation of the terms of the registry-registrar agreement or the registrar-registrant agreement, Charleston Road Registry may request that the appropriate registrar enforce such agreements through penalties, including but not limited to suspension of the domain name.
-All data transmitted from registrars to the registry will be encrypted using TLS or other similar data protection schemes to ensure that third parties cannot access personally identifying information or other sensitive data as it crosses the Internet.
- Charleston Road Registry will attempt to prevent the misuse of WHOIS data for improper purposes such as spam, intellectual property theft or phishing. Charleston Road Registry will attempt to identify patterns of abusive usage of WHOIS and will appropriately use CAPTCHA, query throttling or other techniques to prevent information scraping.
- Google will restrict access to data and information systems maintained by the registry to a specific list of individuals involved with supporting the Google Registry system in production. Google will review this list on a periodic basis to ensure that the level of access granted to individuals is appropriate. Google uses two-factor authentication and other mechanisms to ensure that staff with access to user information are properly identified prior to using registry systems.
- Google data backups stored offsite are encrypted with passwords that are securely managed on Google’s internal systems. Google can effectively remove the ability to access this data by destroying the relevant encryption password.
- Supplying Google account information will be optional for registrants unless the domain registration is directly associated with another Google product offering. Google will not disclose Google account information except for any contact information provided by the user that is required by ICANN to be displayed in response to a WHOIS query.
- Registrar billing and payment information will not be stored alongside domain name registration information. All registrar billing and payment information will be stored in a PCI-compliant billing system similar to that used by Google Ads.
- Data will not be shared with third parties without permission of registrants, except as required for registry operations or as required under the law, such as in response to a subpoena, other such court order, or demonstrated official need by law enforcement.
Once Charleston Road Registry begins developing public-facing resources in its gTLD, it intends to inform the public about the gTLD and the opportunity to obtain domain space there through investments in marketing and public relations.
Charleston Road Registry intends to promote gTLDs in its portfolio collectively, such that the public gains an awareness and understanding of new gTLDs and the availability of new second-level domain space on the Internet. Charleston Road Registry believes that this approach will make the strongest impact in modifying consumer behavior and is the best path to achieving success for all new gTLDs collectively.
Charleston Road Registry will reach out to the Internet community via a number of different outreach and communications methods and venues to deliver its mission and message to the public, including but not limited to: press briefings, videos posted on various Internet sites, blogs and other social media, and paid advertising. In addition, when developing resources for localized Internet registrars in different global regions, Charleston Road Registry will use local marketing and communications platforms as needed.
Members of the public will need to meet stated registration policy criteria to register domain names in the proposed gTLD.
Registration will be managed by Charleston Road Registry in three phases.
Phase 1 - The first phase will be an extended 60-day sunrise phase. Only owners of trademarks listed in the Trademark Clearinghouse may participate in this phase, and such owners may register domain names that consist of an identical match to their listed trademarks. If multiple qualified parties express an interest in registering the same domain name, Charleston Road Registry will award the domain name through an auction or other predetermined process that will be published prior to the Sunrise Period. At the end of the sunrise phase, at a minimum, Charleston Road Registry will follow ICANN rules for subsequent attributions of trademarked second-level domains and will offer other protections for trademark owners, including but not limited to an extended Trademark Claims Service of indefinite length.
Phase 2 - The second phase will be a limited term registration phase. During this phase, any interested applicant may apply for all second-level domain names not previously registered in the sunrise period. Trademarked terms will be subject to the Rights Protection Mechanisms set forth in Response 29. At the end of the second phase, if multiple parties have expressed an interest in registering the same second-level domain name, Charleston Road Registry will award the domain name through an auction or other predetermined process that will be published prior to the commencement of this phase.
Phase 3 - The third phase will be a steady state phase for the duration of registry operation. During this phase, any interested applicant may apply for all second-level domain names not previously registered in an earlier phase. Trademarked terms will be subject to the Rights Protection Mechanisms set forth in Response 29. If multiple parties express an interest in registering the same domain name, Charleston Road Registry will award the domain name on a strictly first-come, first-served basis.
While Charleston Road Registry reserves the right to charge different prices for unique second-level domains within the gTLD, once Charleston Road Registry determines the price for a particular second-level domain, Charleston Road Registry will not price discriminate among ICANN-accredited registrars. Charleston Road Registry does not intend but reserves the right to offer introductory discounts and bulk registration discounts. Volume discounts, marketing support and incentive programs may be made available, and if so will be offered to all ICANN-accredited registrars without preference.
Pursuant to the ICANN-Registry Operator Agreement, Charleston Road Registry will provide written notice a minimum of 30 days prior to any increases in price for initial registrations, as well as written notice 180 days prior to any increase in registration renewals. Further, Charleston Road Registry will offer uniform pricing for renewals as specified in the ICANN-Registry Operator Agreement.
Charleston Road Registry does not currently intend to make contractual commitments to registrants regarding the magnitude of price escalation. Charleston Road Registry does, however, intend to keep its practices competitive and aligned to activity in the marketplace.
As specified throughout this application, Charleston Road Registry (CRR) plans to implement comprehensive anti-abuse mechanisms. CRR will protect against the abusive registration of geographic names at the second and other levels in the applied-for gTLD by reserving to the registry protected geographic names in order to prevent registration of such strings.
In that regard, CRR has thoroughly reviewed Specification 5 of the Registry Agreement, the Government Advisory Committee’s (GAC) “Principles Regarding New gTLDs”, and the .info methodology for reservation and release of country names. Accordingly, CRR will, in connection with its registry services operator and registrar, initially reserve from registration by any party names with national or geographic significance within the TLD during the TLD’s Sunrise Period and Trademark Claims Period.
(3) The list of United Nations member states in 6 official United Nations languages prepared by the Working Group on Country Names of the United Nations Conference on the Standardization of Geographical Names.
As noted above, the top-level domain shall not permit the public to register domain names with national or geographic significant at the second-level. The names will be set aside by use of the Reserved state making them inaccessible (See response to Question 27 for details). Google, as the registry services provider, has arranged for such reservation to occur prior to the launch of the TLD.
In the event there is a compelling use of a two-character geographic name, the two-character label string may be released to the extent that CRR reaches agreement with the government and country-code manager and consults with the GAC and ICANN. The Registry may also propose the future release of these reserved names based on the implementation by the prospective registrant of measures to avoid confusion with the corresponding country codes.
As with the .info TLD, only if a potential second-level domain registrant makes a proper showing of governmental support for country or territorial names will CRR relay this request to ICANN. CRR also plans to consult with the GAC and of ICANN before proceeding to delegate the domain at issue.
Charleston Road Registry (CRR) will outsource the entirety of its technical operations to Google. In addition to running the technical platform, Google will provide CRR with staffing and support to ensure that all registry services meet both the requirements laid out by ICANN in the new generic top-level domain (gTLD) Applicant Guidebook as well as in the gTLD registry agreement. Additional details of Google’s provision of services to CRR are set forth in Question 31, Section 31.1.
“Q23_Registry Services Diagram” shows major services being exposed by high-level systems. Note that this diagram shows only data flow and does not specify the physical deployment characteristics of these services.
Details on these services are discussed below.
Google will receive registration data from users in a manner consistent with standard registry operations. This will be handled via the extensible provisioning protocol (EPP) interface through ICANN-accredited third-party registrars. Google will operate a robust Shared Registration Service (SRS) that allows registrars to add, modify, and delete domain registrations and provides full support for the domain registration lifecycle.
Google’s shared registration system (SRS) infrastructure consists of three major components: an extensible provisioning protocol (EPP) server that provides an EPP interface to registrars; the Google SRS Frontend, which provides web-based access to the state of the Google Registry, the registrar’s profile and access to registration reports for the registrar; and the Google SRS Backend, which implements most business logic, interacts with the data store, and pushes updates to DNS and WHOIS servers in order to disseminate TLD Zone files as well as registrant contact information.
Details of the SRS are described in Question 24, EPP support in Question 25, and the registration lifecycle in Question 27.
TLD zone data will be propagated in near real time to Google’s Authoritative DNS infrastructure, which will serve as the primary means of publication of the TLD zone files. This DNS infrastructure is based on Google’s existing Public DNS product, which handles over 70 billion queries per day. This DNS implementation will be fully compliant with RFCs 1034, 1035, 1982, 2181, 2182, 2671, 3226, 3596, 3597, 3901, 4343, 4472, 4972, and 5966 as well as ICANN’s Specification 10. A full description of Google’s Authoritative DNS infrastructure is described in Question 35.
The master zone file will be internally generated and cached in the Google Shared Registration System (GSRS) as modifications to GSRS’s persistent store are made. The zone data will be signed by the Authoritative DNS infrastructure; a copy of the signed data is also returned to the GSRS. The entire master zone file will then be available to authorized parties at an HTTP URL shared with them over the web.
The master zone file at this location will be guaranteed to be no more than one hour old.
When retrieving the zone file, the client will pass a single HTTP request parameter (“key”), in order to identify individually the qualified client requesting access. This parameter will be the API key given to the registrar during account signup.
The mimetype “text⁄dns” will be set on the HTTP response and the content encoding will be gzip.
The master zone file will follow the format specified by RFC 1035, with the additional restrictions as specified in Specification 4, Section 2.1.4 of the gTLD Applicant Guidebook. DNSSEC resource records will also be present.
In addition, the master zone file will be made available through the Centralized Zone Data Access Provider as specified in Specification 4, Section 2.1.4 of the gTLD Applicant Guidebook.
Google will create an implementation of the WHOIS protocol (as defined by RFC 3912) that will listen on port 43 for WHOIS requests. Googleʹs WHOIS service will communicate to the name registry through a private API end-point in order to retrieve the necessary information for WHOIS responses. In addition, Google will operate a public WHOIS, web-based Directory Service at 〈WHOIS.nic.music〉 providing free, public query-based access. Both traditional WHOIS and web-based WHOIS will be made available over both IPv4 and IPv6.
- Semi-free text format followed by a blank line and disclaimer specifying the rights of the Registry Operator, and user querying the database.
- Each data object shall be represented as a set of key⁄value pairs, with lines beginning with keys, followed by a colon and a space as delimiters, followed by the value.
- For fields where more than one value exists, multiple key⁄value pairs with the same key shall be allowed.
- The first key⁄value pair after a new-line starts a new record, and is used to identify the record itself.
- The format of fields governed by EPP RFCs 5730-5734 (domain status, individual and organizational names, address, street, city, state⁄province, postal code, country, telephone and fax numbers, email addresses, date and times) will be formatted as specified by those RFCs.
Updates to WHOIS data will be made in near real-time, with the registry’s service level agreement (SLA) committing to 95% of the updates reaching the serving infrastructure within 15 minutes. Details of WHOIS support are included in Question 26.
IDNs allow registrars to register domain names with unicode code points representing non-ASCII-based character sets. IDNs constrained by the IDN Tables for this TLD will be supported by the Google Registry. Google’s IDN implementation will make use of the IDNA standard and be fully compliant with both RFCs 5890-5893 and ICANN’s IDN implementation guidelines. For more information on the IDN implementation for the TLD, see Question 44.
The Google Registry will support DNSSEC. In particular, registrants will be able to specify a DS record as part of normal domain name registration with their registrars, which will be transmitted to the Google Registry via its EPP interface. The Google Registry will then sign the DS record, along with all other DNS resource records in the TLD Zone, forming a chain of trust between the Google Registry and second-level domain name. The Google Registry itself will publish its own DS record with the root. Google’s DNSSEC implementation will be fully compliant with RFCs 4033, 4034, 4035, 5910, 4509, 4641, and 5155. More information on this topic, including the DNSSEC Policy statement for the TLD is contained in Question 43.
The Google Registry operates on Google’s production network, which supports IPv6. Specifically, the Google Registry will specifically support IPv6 access to all registry service endpoints (WHOIS, EPP, DNS, etc.). All services are provided through dual-stack, which is considered the industry-standard best practice for supporting IPv6. In addition, domain name registrants will be able to create IPv6 AAAA glue records for nameservers in the TLD zone. Further detail about Google’s IPv6 implementation is available in Question 36.
Google will escrow relevant registration data, as required by ICANN’s registry agreement. Google will ensure that its data escrow will be fully ICANN compliant and performed in accordance to industry best practices. In addition to Google’s practice of hosting critical data on redundant and geographically disparate datacenters, data escrow will provide further assurance against data loss and ensure that all Google Registry data can be retrieved in a timely manner. For more information on Data Escrow, see Question 38.
After a domain name has been deleted by a registrar, the domain name shall move into a Redemption Grace Period. The status of the domain will be listed as PENDING DELETE RESTORABLE. When a domain is in this state, it is deleted from the zone for the TLD. This is a strong indicator to the registrant that it must act take action in order to restore the domain to its previous state. For details, see Question 27.
Google’s Registry will use Google Accounts to manage registrars.
Once a prospective registrar or developer has created an account in Google, the registrar or developer can upgrade from a standard Google account to a registrar and⁄or developer, if certain requirements are met.
A. The Google registrar logs in with Google account credentials.
B. The Google registrar submits an application identifying that it is an accredited ICANN registrar, and that it wishes to interact with the Google Registry.
C. The Google registrar requests and resets initial EPP credentials, which are separate from a Google account.
Once a Registrar has been certified and authorized for billing, they will be ready to interact with Google through Google EPP. At this point, the registrar can also view reports on domains registered, EPP transactions, remaining account balance, and other TLD registry statistics.
“Q23_Registrar Registration Process Diagram” shows the registration process for registrars.
A. The developer logs in the previously created Google account.
B. The developer requests an API key to be used for all public API calls.
C. The developer reviews access restrictions, quota, and service-level agreements and agrees to appropriate terms.
D. Google Registry grants access to zone data exported by the domain.
“Q23_Developer Registration Process Diagram” shows the registration process for developers.
All Shared Registration System (SRS) services described in Question 23 will run on Google’s robust, high-performance platform. Google’s production platform is an extremely high-capacity, high-availability, scalable platform designed to support some of the most resource-intensive and often-used applications on the Internet, including Google Search, Gmail, and YouTube. Google builds large clusters out of thousands of individual servers. Google uses a common set of tools to allocate resources, provide access to basic services such as storage and locking, and to simplify programmers’ ability to build distributed systems using the cluster’s hardware. Rather than relying on expensive hardware to provide reliability, Google uses a more cost effective approach based on commodity components, and builds fault tolerance into its software. Google simultaneously increases performance, reliability, and scalability of our production systems by splitting work into shards and running multiple replicas of the same process.
The numbered sections below discuss details of our SRS implementation and capacity plans.
For descriptions and details of all SRS functions, see Question 23.
GSRS will be a multi-tier application that consists of the following components.
- Google SRS Front End (GSRS-FE): Presentation. A web application which provides an interface between registrars, developers, and other parties that need access to Google Registry information through a web interface. GSRS-FE will also include a web-based WHOIS interface.
- Google SRS Back End (GSRS-BE): Business Logic. A representational state transfer (RESTful) service that exposes and controls all registry data. Most business logic related to registry data storage and persistence will be implemented in GSRS-BE.
- Google EPP (GEPP): API Proxy. A public end-point for EPP (Extensible Provisioning Protocol) for the top-level domain. GEPP will translate all EPP requests and responses to interface with GSRS-BE. For more information on EPP support, see Question 25.
- Google WHOIS (GWHO): A public end-point for WHOIS queries for the top-level domain. GWHO will translate all WHOIS requests and responses to interface with the GSRS-BE. For more information on WHOIS support, see Question 26.
In addition, GSRS will integrate with the following internal systems. These internal systems are designed for extremely high performance and robustness, and use the same technologies used for other high-capacity services currently in production.
- Google Persistence Service (Persistence): A multi-master persistence solution which will run on top of Google’s proprietary database, BigTable. The Google Persistence Service coordinates between masters using an algorithm for fault-tolerant distributed systems, such as Paxos. BigTable is Google’s internal implementation of a distributed hash table used for the majority of our persistence needs.
- Google Accounts (Authentication): An existing platform for creation and authentication of user accounts. Google Accounts provides a standard login page for all Google products, as well as programmatic access for internal applications to retrieve credentials for the logged-in user.
- Google Monetization (Billing, as needed for the TLD): A monetization and billing system. Enables Google products to create accounts, create invoices, and perform financial transactions for Google customers.
- Google Authoritative DNS (Master Zone File): A robust public DNS server. Google Authoritative DNS will receive master zone file information from the GSRS-BE and distribute DNS information to clients.
“Q24_SRS Services Diagram” shows the interactions with these systems as requests come into a Google datacenter and are handled appropriately. Note that, as shown in “Q24_SRS Services Diagram”, all SRS requests are passed to the GSRS-BE, which contains all business logic for Google Registry. Integrated services are then used as needed. Google plans to provision these services to handle significantly greater load than our most aggressive expectations -- see below for details.
Google plans to deploy GSRS in five geographically-distributed datacenters throughout North America. Traffic to these datacenters is dynamically adjusted according to load, and the system will be provisioned to allow two simultaneous datacenter outages without substantial performance impact.
Each datacenter will include several replicas to handle specific machine failures for any GSRS service. Google’s production servers include the ability to expand to add new servers dynamically according to need. If SRS performance suddenly requires additional throughput capacity -- for instance, during a Distributed Denial of Service (DDoS) attack -- Google will be able to enable up to 100 additional replica servers in any datacenter dynamically. The limit of 100 additional replica machines is a self-imposed limit and may be revised upward based on ongoing operational considerations.
Each machine will be able to support a minimum of 250 queries per second (read or write), where one query contains one record. For architectural simplicity, our initial implementation will read data without any additional SRS-level caches.
Google plans to deploy sufficient capacity to handle SRS request load on the same scale as the largest top-level domains on the Internet. These computations are detailed in “Q24_GSRS Performance and Scaling”.
The key factor for scaling GSRS performance capacity will be the GSRS-BE component. Other components for GSRS (both GSRS-FE and GEPP) will receive user requests and then transform them into Remote Procedure Call (RPC) calls to GSRS-BE. GSRS-FE and GEPP will not perform any CPU-, disk-, or memory-intensive computations themselves. The performance capacity estimations below will therefore discuss only GSRS-BE capacity.
Based on existing domains and calculations for inbound traffic, Google estimates that there will be about 2300 queries per second for EPP operations, consisting mostly of checks for existing domains, and 3600 queries per second for WHOIS operations. In total, Google estimates that GEPP-BE must handle roughly 5900 queries per second for a scale of 100 million domains. Other operations, such as zone file operations and developer API calls, will create a relatively negligible level of load.
Google will meet the SRS throughput requirement, with a 50% utilization rate, with 48 machines allocated across the five datacenters. At this level of utilization, our active capacity will be double the expected throughput requirement. If a datacenter is lost through a production outage or change request, then additional machines will be enabled immediately to take upon the additional load with no manual intervention required. Google production systems have the standard capability to enable new machines to handle increased capacity needs immediately.
These estimations do not include any smart caching anywhere in the architecture. If the Google Registry reaches a very large number of domains and additional capacity measures are required, Google will consider a design for an appropriate WHOIS and EPP check result caching plan to relieve load and to improve latency characteristics.
These estimates use a very aggressive set of assumptions for scaling, which should be sufficient for a large open domain.
Google expects that our SRS network bandwidth requirements will be greatly below Google’s existing per-datacenter network capacity, even for its lowest-capacity datacenters in production. Details of its computations are included below.
Google assumes that 99% of RPC calls across both EPP and WHOIS will be less than 5 kB. EPP and WHOIS queries return more of a fixed number of records, and most queries will return only one record. 5 kB is derived as an estimate from taking the sample WHOIS output in the applicant guidebook, and multiplying it by three to account for XML inflation as if the same information passed through an EPP interface. Considering that most EPP commands are expected to be 〈check〉 commands, this is a very conservative estimate.
Google then uses 5 kB as the assumed size to calculate the estimates for bandwidth per machine and per datacenter at maximum load.
With 250 qps and 5 kB per query, Google expect a maximum of about 12.5 MB⁄s of bandwidth requirement. This is about one-eighth of our current absolute minimum commodity standard of 1 Gb Ethernet. Our backbone routers connect many metro networks around the globe at 10Gb or greater.
With 12.5 MB⁄s of bandwidth per machine, and 100 machines maximum per datacenter, Google expects a maximum of about 1.25 GB⁄s data requirements during a major event that requires increased load demand. All Google datacenters’ connections to its production network have a multiple 10 GB⁄s links, and many exceed this by far.
Based on these computations, Google believes that the network bandwidth required by the SRS system for as many as 100 million second-level domains will never exceed the capacity that even our smallest datacenter can provide.
GSRS will use a multi-master architecture. This architecture is detailed further in Question 32. Machines across multiple datacenters will serve active traffic, with no machines on cold or hot standby. All instances of the data store update in real-time, and updates to registry data are committed across a quorum of replicas before the write is confirmed. When GSRS or a dependent service goes down or is drained by an outage, Google’s network architecture will redirect all affected traffic to another datacenter. Google will design most services as stateless, so service instances will not require any coordination mechanisms.
The Google Registry, and in particular the SRS will be compliant with all RFCs outlined in Specification 6. Any RFCs mentioned below and their successors will be complied with.
Google’s domain name system (DNS) implementation will comply with RFCs 1034, 1035, 1982, 2181, 2182, 2671, 3226, 3596, 3597, 4343, and 5966. See Question 35 for more details on DNS RFC implementation compliance.
Google’s EPP implementation will comply with RFCs 5910, 5730, 5731, 5732, 5733, 5734, 3915, and 3735 for any extensions developed. Please see Question 25 for more details on EPP RFC implementation compliance.
Google’s DNSSEC implementation will comply with RFCs 4033, 4034, 4035, 4509, 5155, and the best practices indicated in RFC 4641. A DPS statement will be published for each TLD supported by the Google Registry. Please see Question 43 for more details on DNSSEC implementation compliance.
Google’s implementation of internationalized domain names (IDN) will comply with RFCs 5890, 5891, 5892, 5893 and ICANN’s published IDN Guidelines. Please see Question 44 for more details on IDN RFC implementation compliance.
Google’s implementation of IPv6 will follow BCP 91 and RFCs 4472. All Registry services will be offered over IPv6. Please see Question 36 for more details on Google’s IPv6 implementation.
Google understands the definition of “registry services” as defined in section 2.1 of Specification 6. Google will not support wildcard matching or resolution in the TLD zone as required by Section 2.2 of Specification 6.
Google will ensure registry continuity as specified in Section 3 of Specification 6. High availability, extraordinary event handling, and business continuity will be provided with respect to the TLD. See Question 39 for more details on Google’s Registry continuity plan.
Google will implement the abuse mitigation requirements as specified in Section 4 of Specification 6. An abuse contact will be made available. See Question 28 for more details on Google’s abuse handling. Google will also take action to remove malicious use of orphan glue records when provided evidence in written form that such records are present in connection with malicious content.
Google will implement the supported initial and renewal registration periods as specified in Section 5 of Specification 6. The Google Registry will support domain name registration with validity periods of between one to 10 years in increments of one year. Renewal registration may extend registration to a maximum of 10 years from renewal date in increments of one year.
The Google SRS will significantly exceed the requirements of the Service Level Requirement Matrix defined in Specification 10 in the gTLD Applicant Guidebook. All EPP and WHOIS⁄RDDS calls supported by the Google SRS system will have a 99.9% monthly uptime.
RPC: A series of TCP⁄IP packets forming a distinct request, and the corresponding TCP⁄IP packets forming the response.
Error RPC: An RPC which does not return with 3x 95th percentile latency, or which fails because of internal transient errors.
Error Minute: Any minute during which 10% of RPC requests are error RPCs.
Monthly Uptime: The total number of minutes in a month minus the number of error minutes divided over the total number of minutes in the month, rounded to the nearest .01%.
When calculating monthly uptime percentage, Google does not distinguish between scheduled and unscheduled downtime.
Google will meet or exceed all service level agreements (SLA) described in the ICANN Applicant Guidebook. Specifically, Google will meet the commitments as specified in attachment “Q24_SLAs”. Note that the values represent a commitment to exceed SLA Requirements in Specification 10.
- DNS Availability: 0 minutes of downtime.
- RDDS Query RTT: Less than 400 ms.
- RDDS Update Time: Less than 15 minutes for 95% of probes.
- EPP Session-Command RTT: Less than 1000 ms for at least 95% of commands.
- EPP Query-Command RTT: Less than 400 ms for at least 95% of commands.
- EPP Transform-Command RTT: Less than 800 ms for at least 95% of commands.
Downtime values are on a monthly basis.
Google has the track record to deliver SRS to 99.9% availability. Google is confident in its ability to meet these SLAs for SRS because of its experience with engineering highly-available platforms. As discussed by Urs Hoelzle, Senior Vice President of Technical Architecture, Google has designed its major services to obtain 99.99% reliability .
Charleston Road Registry will provide registrars with access to telephone, email, and web chat support, and will escalate issues to the Google technical team as technical faults are identified. For a further elaboration of the escalation process, see Question 42.
Google will notify ICANN and registrars, at least 24 hours beforehand, of maintenance for all planned outages and maintenance which will directly, significantly, and visibly affect users of the SRS.
Google will implement these technical requirements using the teams and resources discussed below.
The cost of these services will generally be set at reasonable market rates per agreement between Charleston Road Registry and Google. The expected costs are discussed in Questions 46 and 47.
All services that GSRS will depend on are already well-provisioned and ready to assume the additional load of the Google SRS, including up to 100 million second-level domains, which is well in excess of expected need. The load that GSRS will generate for existing systems will be significantly less than the capacity already designated as part of normal growth for Google and the company’s need for high-performance hardware and support personnel resources.
The Google Registry Team will be responsible for designing and implementing our SRS, EPP, and WHOIS systems, including IDNs. They will also be responsible for creating tests and monitoring for these systems.
During initial implementation, this team will consist of at least four to seven software engineers responsible for implementing the project. Additionally, Google plans to staff one software engineer who is responsible for engineering testing and monitoring for the Google Registry, and one software engineer who is responsible for backup, restoration and escrow. In total, Google plans to implement the Google Registry with a team of six to nine software engineers.
After the Google Registry is complete, Google expects to staff a team to support the ongoing operation of the registry. This team will consist of at least four engineers who will participate in on-call rotation, respond to alerts, provide support to ICANN and registrars for emergency escalations, and maintain responsibility for bug fixes and improvements. This team will continue maintenance throughout the life of the registry.
This team’s responsibilities will generally be limited to registry-specific components. The Google Registry Team will work closely with other relevant teams, including the Authoritative DNS support team, Storage Site Reliability Engineering team, network engineering and operations, and customer support teams. These other teams are described in more detail in Question 31 (Section 31.16) as well as the relevant sections throughout this application.
- Google has a global network of datacenters to provide the scalability to meet the performance requirements of SRS.
- Google has a multi-master high availability strategy to meet the reliability requirements of SRS.
- Google has the proven operational processes and personnel to support the requirements going forward.
- The use of Google’s platform allows Charleston Road Registry to commit to service levels that substantially exceed the ICANN requirements in Specification 10.
The primary purpose of Google EPP will be to provide for a provisioning interface to the Google Registry using the standardized EPP protocol.
Google has no initial plans to provide a software development kit, since there already are a variety of open- and closed-source EPP client implementations available on the web today.
Google’s EPP service will act as a connector between EPP clients and Google’s backend systems, which will handle business logic for registry operations.
- Listen for EPP connections over port 700.
- Support and maintain the EPP session through the life of the connection.
- Translate EPP requests and responses between equivalent requests and responses exposed by the Google SRS Backend private API.
- Terminate the Transport Security Layer (TLS) connection as defined by RFC 5734. TLS client certificates will be self-certified and transmitted to Google via the registrar application process. The credentials in the certificate will be matched against the account identified by the EPP username and password.
Google EPP will support a well defined set of EPP RFCS with a small set of additional, well-defined EPP extensions.
RFC 5730 defines EPP, a simple object provisioning XML protocol. The base protocol itself is agnostic to the type of objects being provisioned and allows for extensions to the protocol.
Upon connection, a session is established with a 〈greeting〉 message from the server as defined by the RFC. From there, the client will login with a 〈login〉 command, then entertain a series of request and response cycles, and then finally ends the session with a 〈logout〉 command.
All EPP commands will be supported according to the RFC in their standard command and response formats.
For all commands, only objects defined by RFCs 5731 (domains), 5732 (hosts), and 5733 (contacts) will be supported. No other extensions will be used.
- On the 12th failed login attempt, the account will be locked out and require support to reactivate.
- Changing the EPP password with the optional 〈newPW〉 element will not be supported. Password changes will instead be handled through the password change interface on the Google SRS Front End. Error code 2501, ʺAuthentication error; server closing connectionʺ will always be returned if this command is used.
- The 〈version〉 element must be set to 1.0.
- The 〈lang〉 element must be set to “en”.
For all other EPP commands there will be no implementation policy specifics.
RFC 5731 defines support for domain objects over the EPP protocol.
Since RFC 5732 will be supported as well, domain objects will not be able to specify attributes to describe a name server host machine, but rather must reference the relevant host with 〈domain:hostObj〉 references.
When 〈domain:authInfo〉 is used, a 〈domain:pw〉 must be passed within to denote the password for the domain (or registrant using the “roid” attribute to denote this), or a 〈domain:null〉 to null it out.
For EPP commands dealing with domain object validity, domains will be by default valid indefinitely unless otherwise specified.
A 2305 error response code will be issued if there are dependent children subordinate to the domain, which still exist in the repository if a 〈delete〉 command is issued.
For all domains which require additional vetting of the registrant because of gTLD registration policy reasons, offline review of the domain may occur for transformation EPP commands. Otherwise, no offline review will occur in general.
RFC 5732 provides EPP mappings for host objects. This RFC will be supported in its entirety. There are no special considerations needed for the Google Registry.
There will be no offline review before provisioning of any host.
This RFC provides EPP mapping for contact objects. This RFC will be supported in its entirety.
As specified by the RFC, unless prohibited by the server’s stated data collection policy, per-field disclosure policies will be supported via the 〈contact:disclose〉 element when provisioning contacts.
There will be no offline review before provisioning of any contact.
RFC 5734 defines connection handling procedures regarding the EPP mechanism.
-There will be no more than ten concurrent TCP connections from a single source destination IP without first contacting Google to establish an alternate upper limit.
- If a well-formed EPP request is not received at least every 30 seconds, the TCP⁄IP connection may be severed.
- TLS is mandatory to connect to Google EPP.
- A single TLS client certificate will be required for each EPP user and password pair. Multiple user⁄password pairs will not be permitted for a single TLS client certificate.
- A Certificate Name (CN) and subject AltName:dnsName will be set to the hostname of GEPP to be validated against by the client.
RFC 5910 governs the additions to the EPP domain mapping RFC for provisioning DS records for a particular domain. Of the two possible supported mechanisms by the RFC, Google EPP will support the ʺDS Data Interfaceʺ, where the client is responsible for the creation of the DS information and is required to pass DS information when performing adds and removes.
- The optional 〈secDNS:maxSigLife〉 element will not be initially supported, and a 2102 error code will be returned.
- 〈secDNS:update〉 with an attribute of urgent will not be initially supported, and a 2102 error code will be returned if present.
RFC 3915 extends the EPP RFCs to account for grace period functionality. Grace periods allow for actions to be reversed or revoked within a specified period of time. In particular, this RFC governs four grace periods: add grace period, auto renew grace period, renew grace period and transfer grace period. Google will comply with this RFC in its entirety.
In addition to RFCs directly related to EPP, RFCs defining internationalized domain names (IDN) (5890, 5891, 5892, and 5893) and how they are specified will be implemented for Google EPP. In particular, IDNs will be specified using punycode and in the subset of unicode character code points dictated by the IDN tables attached to this gTLD application.
A small set of well-defined EPP extensions will also be supported.
It defines mappings to create domains and application for domains during “launch” phases. It will be supported in its entirety.
Only encoded signed marks will be accepted in order to minimize signature validation issues.
It defines mappings for Mark and Signed Mark objects onto XML. It will be supported in its entirety, as necessitated by 25.2.1.
It defines an EPP extension to request and return pricing information on premium domains. It also provides a mechanism for registrars to acknowledge and verify the pricing information on a premium domain before registering it. The extension will be supported in its entirety.
It defines a mechanism for registrars to specify which TLD their EPP command is addressed against. It will be used to multiplex many different TLDs in a single EPP endpoint. It will be supported in its entirety.
Google will develop Google EPP using a software methodology, which ensures correct functionality by concurrently developing unit and large functional tests alongside the production code itself. Standard XML parsing libraries will be used depending on the implementation language. Implementation will also include monitoring rules that test EPP workflows in production on an ongoing basis. Before deploying to production, Google will create staging environments during development for internal manual and automated testing.
All ICANN-accredited registrars must first complete operational testing and evaluation (OT&E) before submitting EPP commands through the production Google EPP environment. The aim of this testing is to ensure that registrars are functioning properly.
OT&E instructions will be presented to the registrar after it has created a registrar account with the Google Registry. In general, these instructions will include a series of ordered EPP commands the registrar must perform along with test account credentials.
The registrar, once the registrar is ready for certification, it will request a Google Registry Front End evaluation. The test environment will reset to a nominal state, and at this point, the registrar must execute the series of ordered EPP commands within a specified amount of time. If registrar fails OT&E, the registrar will be notified of the failure, and can try again at a later date. If the registrar passes OT&E, the registrar will be notified, and be given production EPP credentials.
Google Inc. will implement these technical requirements using the teams and resources discussed below.
The Registry Team will be responsible for designing and implementing the shared registration system (SRS), EPP, and WHOIS systems, including IDNs. They will also be responsible for creating tests and monitoring for these systems.
During initial implementation, this team will consist of at least four to seven software engineers responsible for implementing the project. Additionally, Google plans to staff one software engineer who is responsible for engineering testing and monitoring for the registry, and one software engineer who is responsible for backup, restoration and escrow. In total, Google plans to implement the registry with a team of six to nine software engineers.
After the registry is complete, Google expects to staff a team to support the ongoing operation of the registry. This team will consist of at least four engineers who will participate in on-call rotation, respond to alerts, provide support to ICANN and registrars for emergency escalations, and maintain responsibility for bug fixes and improvements. This team will continue maintenance throughout the life of the registry.
This team’s responsibilities will generally be limited to registry-specific components. The Registry Team will work closely with other relevant teams, including the Authoritative DNS support team, Storage Site Reliability Engineering team, network engineering and operations, and customer support teams. These other teams are described in more detail in Question 31 (Section 31.16), as well as the relevant sections throughout this application.
- A thorough understanding of the requirements for the systems.
- A reuse of existing industry, standard EPP XML schemas to de-risk system implementation.
- A proven software development methodology that will verify implementation against requirements.
- Operational procedures that facilitate the ongoing maintenance of the platform and the support of onboarding of new registrars.
Google will implement and maintain a “thick” data model WHOIS service, in which the registry will store and serve contact information related to each domain name -- as opposed to a “thin” model, which provides a query referral to a registrar.
Google will operate a public WHOIS service available via port 43 in accordance with RFC 3912, and a web-based Directory Service at 〈WHOIS.nic.music〉 providing free, public query-based access. Both of these services will be made available over both IPv4 and IPv6.
Google’s WHOIS service on port 43 will comply with the WHOIS protocol as described in RFC 3912 by accepting an ASCII request (terminated with a 〈CR〉〈LF〉) and replying with an ASCII response, terminating the TCP connection once the output is finished. RFC 3912 does not contain further detail on the format of the response payload itself; the format will be as described in “SPECIFICATION 4: SPECIFICATION FOR REGISTRATION DATA PUBLICATION SERVICES”, Section 1, and relevant Best Practices.
If ICANN specifies alternative formats and protocols, Google will implement these as soon as reasonably practical and will implement IDN related WHOIS requirements as they evolve. As a matter of policy, Google WHOIS will not return IDN variants for WHOIS queries. Queries for specific domains must be made.
26.1 High-level overview of the WHOIS service.
The attachment “Q26_WHOIS Services Diagram” shows an overview diagram of WHOIS services, and other relevant aspects of Google’s network.
When a request is received (via the web or “traditional” interface), the appropriate service will extract the query from the request and perform checks to combat abusive behavior (such as Denial of Service and “WHOIS scraping”). Google has extensive infrastructure that profiles requests and applies heuristics to determine if requests are legitimate or “scraping”, and we plan to use this infrastructure to limit abuse of the WHOIS service. This functionality is described in Question 30, Section 30.b.3.2.
The request will also increment a counter to allow for reporting of statistics.
The service will then query the registry database service, using the GSRS backend API. As the WHOIS service will query the database for the response, Google will provide fresh answers, instead of extracting all of the data from the database and synchronizing the data between servers. In order to provide fast, accurate responses, and to act as the first line of defense against DoS attacks, the WHOIS service may cache the result and reply from cache on subsequent queries for a maximum of 15 minutes.
Once a result, or an indication that the requested information does not exist, is received from the database it will be converted into the appropriate response format: HTML for web-based requests, or RFC 3912 style responses for port 43 requests.
The result of the lookup will then be returned to the requester.
Google operates a fast, reliable, and redundant network, and has developed frameworks for encoding and making remote procedure calls (RPCs). This infrastructure can be leveraged to provide communication and connectivity with other registry systems.
Google has significant experience developing secure, stable, resilient, and high-performance applications that perform lookups against a datastore, and has built substantial infrastructure for running such applications and scaling them to meet demand.
As described in detail in the responses to Questions 31 and 32, the WHOIS service will be designed as a simple, stateless server that accepts user queries and transforms them into RPCs that will be serviced by the SRS backend server. This model allows additional capacity to be scaled in accordance with need simply by adding additional replicas of the WHOIS server, and means that the resource requirements to operate this layer of the service should be minimal. Google continuously monitors the load on production servers and systems and proactively upgrades and supplements systems before there is any degradation in service. The registry will be initially provisioned to support at least 100 million domain names, which substantially exceeds the expected load, but Google’s overall scale would allow the scope of the service to be increased substantially if required.
We estimate that each second-level domain will generate slightly more than 3 WHOIS queries per day. Based on our projections, this will result in an expected load of 3600 qps (queries per second) from WHOIS requests. Since each machine can handle 250 qps, and we plan for a 50% utilization rate, we expect to provision about 30 machines. For more details of our expected WHOIS load and performance capacity, see Question 24.
This infrastructure will also help Google meet and exceed the specified Service Level Agreements, including those in Section 10 of the Registry Agreement, as discussed in the response to Question 24. We plan to serve WHOIS queries with at least 99.9% availability, with less than 500 ms latency, and an update time of less than 15 minutes for 95% of updates.
As mentioned in previous sections, all incoming RPCs to equivalent calls to the Google SRS Backend. This means that there is no synchronization between Google WHOIS and the SRS since Google WHOIS maintains no persistent state. However, as also previously mentioned, Google may deploy a cache in the WHOIS service to reduce load on the GSRS BE and database while reducing latency, creating a freshness delay of up to 15 minutes.
Google WHOIS will follow data formats specified in Specification 4 in the application guidebook. Here is an example WHOIS domain query and response.
The Google Registry will comply with Section 3 of Specification 4 in the application guidebook to provide ICANN bulk registration data access.
Data will be provided on a weekly basis. Data will include data committed as of 00:00:00 UTC on the day previous to the one designated for retrieval by ICANN.
The Google Registry will provide at a minimum all content requested in the specification: domain name, domain name repository, object id, registrar id, statuses, last updated date, creation date, expiration date, and name server names. For sponsoring registrars, the registry will provide: registrar name, registrar repository object id, hostname of registrar Whois server, and URL of registrar.
The format of the data will be provided as specified in Specification 2 for Data Escrow.
The Google Registry will have the file ready for download as of 00:00:00 UTC on the day designated for retrieval by ICANN. The file will be made available for download by SFTP with a hostname, username, and password provided to ICANN.
Our Registry Team will be responsible for designing and implementing our SRS, EPP, and WHOIS systems, including IDNs. They will also be responsible for creating tests and monitoring for these systems.
During initial implementation, this team will consist of at least 4-7 software engineers responsible for implementing the project. Additionally, we plan to staff one software engineer who is responsible for engineering testing and monitoring for the registry, and one software engineer who is responsible for backup, restoration and escrow. In total, we plan to implement the registry with a team of 6-9 software engineers.
After the registry is complete, we expect to staff a team to support the ongoing operation of the registry. This team will consist of at least four engineers who will participate in on-call rotation, respond to alerts, provide support to ICANN and registrars for emergency escalations, and maintain responsibility for bug fixes and improvements. This team will continue maintenance throughout the life of the registry.
- Google will operate a thick WHOIS service with an interface on port 43 complying with RFC 3912 as well as a web-based query interface. These services will display data in accordance with Specification 4 of the registry agreement.
- Google’s WHOIS service offers a simple, stateless, scalable front end to the registry’s SRS-BE servers. The capacity of the service can be expanded simply by adding additional replica WHOIS servers. Google will initially scale the service to support a registry with 100 million domain names.
Charleston Road Registry (CRR) sets forth below a description of the various stages and states of a second-level domain (SLD) in its proposed registry system. Please see “Q27_Registry Life Cycle Diagram” for a graphical depiction of the domain registration lifecycle.
State changes provide specific use cases to the DNS (Domain Name System) architecture explained in responses for Question 31 (Technical Overview), Question 32 (Architecture) and Question 35 (DNS Service). Note that this response makes references to EPP (Extensible Provisioning Protocol) functionality which is fully described in Question 25. Additionally, state changes may change the information retrievable via Registration Data Directory Services (RDDS, a combination of WHOIS and Web-based WHOIS) as described in Question 26.
Reserved domains are not generally available to register. For example, such restrictions may result from agreements with ICANN⁄IANA for operational⁄technical reasons or with governments for geographic names. See response to Question 22 (Protection of Geographic Names) for further details. The registry will maintain a schedule of reserved words as per Specification 5 of the Registry Agreement. For a reserved domain, an EPP 〈check〉 query would return a value of avail=ʺ0ʺ, and there would be no entry in the zone file or RDDS associated with the domain name. EPP 〈create〉 requests will result in a rejection, except those that have prior approval from CRR. The registry foresees two cases as envisioned by Specification 5 of the New gTLD Agreement, particularly applicable to geographic names: 1) CRR releases an SLD for use by the applicable government or country-code manager. In this case, at the end of the registration, the SLD would return to the Reserved state. 2) CRR works with the affected government(s) or country-code manager(s) to permanently make available SLD(s). In this case, at the end of a reservation the string would revert to the Available state.
In addition to an explicit Reserved state, CRR will also support a functional equivalent to reserving through registration. This approach follows the practices of the .info registry. That is, CRR will reserve certain names by registering them for the registry, pursuant to Section 2.6 of the gTLD registry agreement. Names reserved using this approach follow the life cycle described below. Generally, CRR will use the state machine to control reservations but leaves open the possibility of using reservation by registration when more appropriate.
- The SLD has not existed previously.
- The SLD has passed through the Pending Delete state.
Domains that are available do not exist in the zone file or RDDS. The Shared Registry System - Back End (SRS-BE) would return a value of avail=ʺ1ʺ when responding to the EPP 〈check〉 query for domain in the Available state.
All other states would return a value of avail=ʺ0ʺ.
Names that are selected for registration are entered into the zone file at the start of this five-day add-grace period (〈addPeriod〉). Registrars are charged for submitting 〈create〉 requests to the registry.
The Google SRS-Backend (GSRS-BE) manages the 5-day grace period countdown, including the transition of the state to Registered. During the Add Grace Period, registrars can cancel the registration and receive a credit for the cost of the original registration (with domain names becoming immediately Available or Reserved, as appropriate), subject to ICANNʹs AGP Limits Policy. GSRS-BE will set the status of the Domain Name to 〈addPeriod〉 while making the zone file and RDDS updates, and then reset it when grace period ends.
Owners of domain names can register them for a period of one to ten years. The registrar may renew the SLD for no less than one and no more than ten years from the current day using the EPP 〈renew〉 command. GSRS-BE will manage state changes based on expiration date of domains, including updates to the zone file and RDDS. By default, status of the object is “ok”. Subsequent EPP 〈transform〉 commands or actions by SRS-BE may change that value to indicate restrictions present or transformations pending.
Upon receipt of a 〈renew〉 EPP command, SRS-BE will transition the domain name to the state of Renew Grace Period (〈renewPeriod〉). The renew grace period allows registrars to correct the mistaken renewal of an SLD. The Renew Grace Period lasts for five (5) days during which the receipt of a 〈delete〉 EPP command will result in the crediting back to the registrar the cost of the renewal. After this grace period ends, the domain name will revert to the Registered state. Domains in the RGP may transition to the following states: Redemption Grace Period (by meaning of a delete) or Pending Transfer (by means of a transfer) as described in sections 27.8 and 27.11, respectively.
GSRS-BE will automatically renew a registration once it has expired and charge the registrar the current renewal fee. By default, CRR will extend the registration for one year. The ARGP is intended to allow registrars to delete a registration which has been auto-renewed and to receive a refund for the renewal fee. For a predetermined number of days after an automatic renewal, the domain is in state of the Auto-Renew Grace Period (〈autoRenewPeriod〉). During this grace period, GSRS-BE will accept requests from the EPP for the existing owner to update, renew, transfer and delete the registration provided there is not a corresponding status that prohibits the transformation. The registrar will then be charged the cost of this new transaction. If the registry happens to receive a 〈delete〉 EPP command during the ARGP, CRR will credit the cost of a renewal to the registrar. Without intervention, SRS-BE will then update the domain’s state to Registered.
SLDs that are deleted, such as when a registrar uses the 〈delete〉 EPP command, then enter the Redemption Grace Period (RdGP) (〈redemptionPeriod〉), with the exception of those deleted during the Add Grace Period (see above). The RdGP permits registrars to restore domains that were mistakenly deleted. The RdGP lasts for thirty (30) days. SRS-BE will first check for a clientDeleteProhibited or a serverDeleteProhibited prohibition before making the transition, and will not make the transition if those prohibitions exist.
Domains which enter this state become non-operational and are removed from the zone file and RDDS. The SRS-BE will accomplish this change by updating the DNS service. GSRS-BE will also set the status to “pendingDelete”.
During the RdGP, the SRS-BE will reject all EPP requests other than 〈restore〉. Registrars have 30 days to submit a 〈restore〉 request in order for the transaction to be accepted and the transaction cost credited back to the registrar. Registrars must provide a 〈report〉 that provides, among other things, a reason (〈resReason〉) and supporting information (〈statement〉) within 5 days (during which time the status will be Pending Restore or 〈pendingRestore〉). CRR will not process a 〈restore〉 without a 〈report〉. If a 〈restore〉 request is not received or if a 〈report〉 is not received on time, GSRS-BE transitions the domain name to the Pending Delete state. Should a registrar reactivate the domain, SRS-BE will update the DNS zone file and RDDS. When complete, SRS-BE will update the state to Registered.
This state is the final stage of the lifecycle prior to the domain again being made available. It lasts for 5 days. During this period, registrars shall not have the ability to reactivate the domain, but would have to wait to make a new request once the domain becomes available. During the Pending Delete phase, the SRS-BE will reject all requests to transform a domain name received through the EPP interface. The status of the domain name will be 〈pendingDelete〉. After this stage, the domain shall be removed from the registry’s database and once again made available for registration.
As noted above, at the conclusion of the Pending Delete state, GSRS-BE removes the domain name entirely from its database. It is now available for registrars. See 27.3 above for further details of “Available” state. The exception would be those domain names on the reserved list, which will instead return to the Reserved state after they are released.
CRR and Google will adhere to the 15 March 2009 ICANN Policy on Transfer of Registrations (as well as its successor scheduled to take effect on 1 June 2012). Therefore, registrars are allowed to transfer domains between each other, provided that the states and status allow for it.
- The domain must be in one of the following states: Add Grace Period, Registered, Renew Grace Period, Transfer Grace Period, or Auto Renew Grace Period.
- Neither a clientTransferProhibited nor a serverTransferProhibited status must be present.
Provided those two conditions are met, GSRS-BE will set the status to 〈pendingTransfer〉 while it performs its activities (during this period, the domain is considered to be in the Pending Transfer state). First, the registry will notify both registrars of the pending transfer. The registry will complete the transfer if it receives an 〈ACK〉 response from the Registrar of Record if received within the first five (5) days. If after five (5) days and the registry has not received any message, the transfer will be automatically completed. If a 〈NACK〉 response is received from the Registrar of Record, the transfer will be rejected. A rejected transfer would result in the SRS-BE setting the state back to its previous value.
Upon completion of the transfer, CRR will update the zone file and RDDS and send another notification to both registrars. When a transfer is complete, the registration period for the SLD is extended by a year (but not to exceed ten (10) years from the date of the transfer) and the gaining registrar will be charged for submitting a 〈transfer〉 EPP request.
The registry places the domain name into the Transfer Grace Period (〈transferPeriod〉) for the first 5 days after the completion of the 〈transfer〉 request. During this time, the Gaining registrar will receive a credit for the cost of the transfer if a 〈delete〉 EPP transaction is received. Provided the domain is not deleted, at the end of the 5 day period the domain will return to the Registered state. A transfer received during TGP would result in the domain moving to 〈pendingTransfer〉 as described above.
The Registry Team will be responsible for designing and implementing the SRS, EPP, and WHOIS systems, including details related to domain name lifecycle. They will also be responsible for creating tests and monitoring for these systems.
During initial implementation, this team will consist of at least 4-7 software engineers responsible for implementing the project. Additionally, Google plans to staff one software engineer who is responsible for engineering testing and monitoring for the registry, and one software engineer who is responsible for backup, restoration and escrow. In total, Google plans to implement the registry with a team of 6-9 software engineers.
The Google Customer Services Team will be responsible for supporting customers and partners, including life cycle requests. Google has a very large existing customer service team of both internal staff as well as staff contracted through third parties, with many hundreds of dedicated staff members already in place. Since these teams and their management are already in place, no standalone implementation resources are needed.
To continue ongoing maintenance of CRR support needs, Google plans to add additional resources for capacity as needed. Google expects to add a total of approximately fifteen additional personnel (including both Google employees and outside vendors) to support all of CRR’s customers and partners. The individual staffing allocation to each TLD is described in Question 47.
- The registry will support a full registration lifecycle consistent with that offered by other major gTLDs. State changes are triggered by registrar commands via the EPP interface or by the SRS-BE, which manages changes triggered by the passage of time.
Specifically, we will implement in our internal policies and in our Registry⁄Registrar and Registration Agreements that all registered domain names will be subject to a Domain Name Anti-Abuse Policy (“Abuse Policy”). The Abuse Policy will provide CRR with broad power to suspend, cancel, or transfer domain names that violate the Abuse Policy. We plan to post the Abuse Policy on a publicly facing website at nic.music⁄abuse, which will provide a reporting mechanism whereby violations of the policy can be reported by those who are impacted; an easy to find place to report policy violations; “plain language” definitions of what constitutes a “reportable” problem; and compliance processes to provide due process, and sanctions that will be applied, in the case of policy violations. The nic.music⁄abuse website will list CRR’s Abuse Point of Contact. The Abuse Point of Contact shall consist of, at a minimum, a valid e-mail address dedicated solely to the handling of abuse complaints. CRR will ensure that this information is kept accurate and up to date and will be provided to ICANN if and when changes are made.The Abuse Point of Contact will review complaints regarding an alleged violation of the Abuse Policy.
CRR also plans to catalog all abuse communications in Google’s customer relationship management (CRM) software using a ticketing system and to maintain records of all abuse complaints for an appropriate amount of time. We shall only provide access to these records to third parties under limited circumstances, such as in response to a subpoena or other such court order or demonstrated official need by law enforcement.
b. Is illegal or illegitimate, or is otherwise considered contrary to the intention and design of a stated legitimate purpose, if such purpose is disclosed.
The Abuse Policy will state, at a minimum, that CRR reserves the right to deny, cancel, or transfer any registration or transaction, or place any domain name(s) on registry lock, hold, or similar status, that it deems necessary, in its discretion: (1) to protect the integrity and stability of the registry; (2) to comply with any applicable laws, government rules or requirements, requests of law enforcement, or any dispute resolution process; (3) to avoid any liability, civil or criminal, on the part of CRR, as well as its affiliates, subsidiaries, officers, directors, and employees; (4) per the terms of the registration agreement or any agreement CRR has with any party; (5) to correct mistakes made by CRR, its registry services provider, or any registrar in connection with a domain name registration; (6) during resolution of any dispute regarding the domain; and (7) to remedy the abusive registration or use of any domain name.
We will remove orphan glue records for names removed from the zone when provided with evidence in written form to the Abuse Point of Contact that the glue is present in connection with malicious conduct according to Specification 6 of the New gTLD Registry Agreement. Google’s back-end systems will also periodically search for orphaned glue. We will inform its registrants that it removes glue if the covering zone is removed, and thus registrants should not reference it from outside the domain.
In order to reduce abusive registrations that affect the security of the TLD and its users, CRR plans to provide a domain anti-abuse notice and takedown procedure. Specifically, we will operate an anti-abuse website at the URI address nic.music⁄abuse that will provide the contact information for the Abuse Point of Contact. The nic.music⁄abuse website will prominently display CRR’s Abuse Policy and a fill-in section wherein the user will then be asked to fill in several fields, including the user’s identity and contact information, and the identity and relevant information of the individual or organization that is making an abusive registration or use of a domain name within the TLD, and specific details on how, why, and when the complainant believes the registration or use of the domain name is abusive. The user will be asked to read the Abuse Policy before it submits a complaint and then click on a check box to indicate that the user has read and understands the Abuse Policy.
CRR will then provide a targeted response time as to the decision regarding the complaint. We will review with the Internal Abuse Team and render a decision regarding the alleged abuse, and decide whether to deny, cancel, or transfer any registration or transaction, or place any domain(s) on registry lock, hold, or similar status that violates the Abuse Policy, if applicable. In accordance with the applicable terms of service, CRR reserves the right to terminate the accounts or domains of repeat abusers.
Specifically, the process is anticipated to occur as follows: an email containing the information relayed in the complaint will be sent to the Abuse Point of Contact. The Abuse Point of Contact will send an email to the complainant within twenty-four hours of receiving the complaint confirming receipt of the email. The Abuse Point of Contact will preliminarily review to determine whether the complaint reasonably falls within an abusive use as defined by the Abuse Policy. If the complaint does not, the Abuse Point of Contact will email the complainant within forty-eight business hours of the confirmation email to indicate that the subject of the complaint does not fall within the abusive uses as defined by the Abuse Policy, and that CRR considers the matter closed.
If the preliminary review does not resolve the matter, the Abuse Point of Contact will relay the complaint to CRR’s Abuse Team.
All requests from law enforcement will be flagged for prompt review by the Internal Abuse Team. With the resources of Google’s registry services team, CRR can meet its obligations under Section 2.8 of the Registry Agreement where required to take reasonable steps to investigate and respond to reports from law enforcement and governmental and quasi-governmental agencies of illegal conduct in connection with the use of its TLD.
In high-priority cases the Internal Abuse Team will seek to determine within forty-eight business hours whether the registration or use of the domain within the TLD is abusive as defined by the Abuse Policy. In all cases, the Internal Abuse Team will determine whether a domain is abusive within seven business days or sooner of receipt of the Complaint. If an abusive use is determined, the Internal Abuse Team may alert the registry services team to immediately suspend resolution of the domain name, as appropriate. Thereafter, if we decide to suspend resolution of the domain name at issue, the Abuse Point of Contact will immediately notify the abusive domain name registrant of such action, the nature of the complaint, and provide the registrant with the option to respond within ten days. All such actions will be ticketed in Google’s CRM software to maintain accurate complaint processing records.
If the registrant responds within ten business days, the Internal Abuse Team will review the response to determine if the registration or use is not abusive. If the Internal Abuse Team is satisfied by the registrant’s response, the Abuse Point of Contact will submit a request to the registry services team to reactivate the domain name. If the registrant does not respond within ten business days or the Internal Abuse Team is not satisfied by the registrant’s response, the Abuse Point of Contact will notify the registry services team to continue the suspension, transfer or cancel the abusive domain name, as appropriate.
The anti-abuse procedure will not prejudice either party’s election to pursue another dispute mechanism, such as the Uniform Rapid Suspension System (URS) or Uniform Domain-Name Dispute-Resolution Policy (UDRP). If CRR’s registrar receives notice of a URS or UDRP complaint pertaining to a domain name within the TLD, the registrar will ensure that the domain name is locked within twenty-four hours of receipt of the complaint. The registrar will also notify CRR’s Abuse Point of Contact and the registrant.
In order to further minimize abusive domain name registrations and other activities that have a negative impact on Internet users, CRR will promote the ability to contact a domain registrant using information in WHOIS by providing accessibility in a reliable, consistent, and predictable fashion. CRR will adhere to port 43 WHOIS Service Level Agreements (SLA), which require that port 43 WHOIS service be highly accessible and fast.
CRR will either verify the email address or telephone number provided by the registrant or will require that the registrar do so as a part of registration.
CRR plans to establish policies and procedures to address domain names with inaccurate or incomplete WHOIS data.
As required by Specification 4 of the new gTLD Registry Agreement, CRR will offer thick WHOIS services, in which all authoritative WHOIS data is maintained at the registry. Through CRR’s registrar and registry services team, we will maintain timely, unrestricted and public access to accurate and complete WHOIS information, including registrant, technical, billing, and administrative contact information, identity of the registrar, domain name’s expiration date, nameservers associated with the domain, and specified fields of data for the Registrant Contact, Administrative Contact, and Technical Contact.
CRR will employ query rate limiting and CAPTCHA procedures for its WHOIS database to minimize abuse of its features.
Abusive activity on the Internet has been a growing problem, creating security and stability issues for registrants, registrars and users of the Internet in general. CRR intends to address this issue across its TLDs by dedicating ample resources for the purpose of implementing its strict abuse policies and procedures.
Abusive registrations and uses of domain names in the global top-level domain (gTLD) will not be tolerated. The nature of such abuses creates security and stability issues for the registry, registrars and registrants, as well as for users of the Internet in general. As set forth in prior responses, Charleston Road Registry (CRR) will employ a stringent verification process to establish that every prospective registrant meets the registration criteria. In addition to this verification process, the registry promises to incorporate the following Rights Protection Mechanisms.
Subject to the Sunrise Eligibility Requirements (SERs) outlined herein, Charleston Road Registry (CRR) will offer a Sunrise Period of 60 days for owners of trademarks listed in the Trademark Clearinghouse to register domain names that contain a second level consisting of an identical match to their listed trademarks. In addition, CRR plans to implement a pricing structure to make it easy for brand owners to secure their trademarks and brand names within the gTLD. CRR’s registrar will confirm all Sunrise and Registration eligibility. As an added measure of security for brand owners, CRR will staff an internal sunrise team (the “Sunrise Contact”) which will review all Sunrise registrations to ensure Sunrise and registration eligibility.
The SERs, which will be verified by Clearinghouse data, will include the following: (i) proof of membership in eligible registrant class, (ii) ownership of a mark that is (a) nationally or regionally registered and for which proof of use, such as a declaration and a single specimen of current use – was submitted to, and validated by, the Trademark Clearinghouse; or (b) that have been court-validated; or (c) that are specifically protected by a statute or treaty currently in effect and that was in effect on or before 26 June 2008; (iii) representation that all provided information is true and correct; and (iv) provision of data sufficient to document rights in the trademark.
Upon submission of all of the required information and documentation, the registrar will review the submissions and verify the trademark and eligibility information and all contact information provided for registration. The registrar shall then send confirmation messages, listing any deficiencies regarding the trademark information provided with the application. If a registrant does not cure any eligibility deficiencies and⁄or respond by the means listed within one week, the registrar will release the name.
CRR will incorporate a Sunrise Dispute Resolution Policy (SDRP). The SDRP will allow challenges to Sunrise Registrations by third parties for a ten-day period after acceptance of the registration based on the following four grounds: (i) at the time the challenged domain name was registered, the registrant did not hold a trademark registration of national effect (or regional effect) or the trademark had not been court-validated or protected by statute or treaty; (ii) the domain name is not identical to the mark on which the registrant based its Sunrise registration; (iii) the trademark registration on which the registrant based its Sunrise registration is not of national or regional effect or the trademark had not been court-validated or protected by statute or treaty; or (iv) the trademark registration on which the domain name registrant based its Sunrise registration did not issue on or before the effective date of the Registry Agreement and was not applied for on or before ICANN announced the applications received.
After receiving a Sunrise Complaint, the Sunrise Contact will review the Complaint to see if the Complaint reasonably asserts a legitimate challenge as defined by the SDRP. If the Complaint does not, the Sunrise Contact will email the complainant within 36 hours of the complaint to indicate that the subject of the complaint does not fall within SDRP, and that CRR considers the matter closed.
If the domain name is not found to have adequately met the SERs, the Sunrise Contact may alert the registrar to immediately suspend resolution of the domain name, as appropriate. Thereafter, the Sunrise Contact will immediately notify the registrant of such action, the nature of the complaint, and provide the registrant with the option to respond within ten days to cure the SER deficiencies or the domain will be canceled. All such actions will be ticketed in Google’s customer relationship management (CRM) software to maintain accurate SDRP processing records.
If the registrant responds within ten business days, its response will be reviewed by the Sunrise Contact to determine if the SERs are met. If the Sunrise Contact is satisfied by the registrant’s response, it will submit a request by the registry services team to reactivate the domain name. The Sunrise Contact will then notify the Complainant that its complaint was ultimately denied and provide the reasons for the denial. If not, both the registrant and the complainant will be notified that the domain name will be released.
CRR will offer a Trademark Claims Service during the Sunrise Period and plans to continue to offer the service for an indefinite period of time thereafter during general registration. CRR will staff an internal team that will be considered the Trademark Claims Contact. The registrar will verify whether any domain name requested to be registered in the gTLD is an identical match of a trademark that has been filed with the Trademark Clearinghouse. It is anticipated that a domain name will be considered an identical match when the domain name consists of the complete and identical textual elements of the mark, and includes domain names where (a) spaces contained within a mark that are either replaced by hyphens (and vice versa) or omitted; (b) certain special characters contained within a trademark are spelled out with appropriate words describing it (e.g., @ and &); and (c) punctuation or special characters contained within a mark that are unable to be used in a second-level domain name are either (i) omitted or (ii) replaced by hyphens or underscores.
If the registrar determines that a prospective domain name registration is identical to a mark registered in the Trademark Clearinghouse, the registrar will provide a “Trademark Claims Notice” (“Notice”) in English on the registrar’s website to the prospective registrant of the domain name. The Notice will provide the prospective registrant with access to the Trademark Clearinghouse Database information referenced in the Trademark Claims Notice to enhance its understanding of the Trademark rights being claimed by the trademark holder via a link. The Notice will be provided in real time without cost to the prospective registrant.
After receiving the Notice, the registrar will require the prospective registrant to click a link that specifically warrants that: (i) the prospective registrant has received notification that the mark(s) is included in the Clearinghouse; (ii) the prospective registrant has received and understood the Notice; and (iii) the registration and use of the requested domain name will not infringe on the rights that are the subject of the Notice.
CRR reserves the right to adopt other procedures and requirements for the Trademark Claims Service. At a minimum, it is anticipated that after the effectuation of a registration that is identical to a mark listed in the Trademark Clearinghouse, the registrar will then provide a clear notice to the trademark owner of the trademark with an email detailing the WHOIS information of the registered domain name. The trademark owner then has the option of filing a Complaint under the Uniform Domain Name Dispute Resolution Policy (UDRP) and⁄or the Uniform Rapid Suspension System (URS) against the domain name. As discussed in its right protection mechanisms, CRR will require in its domain name registration agreements that its registry operator and registrar providers, as well as all registrants, submit to the Uniform Domain Name Dispute Resolution Policy (UDRP) and the Uniform Rapid Suspension System (URS) procedures. CRR and its registrar(s) will abide by decisions rendered under the UDRP and URS on a timely and ongoing basis upon notification.
CRR will specify in the Registry Agreement, all Registry-Registrar Agreements, and all Registration Agreements used in connection with the gTLD that it will abide by all decisions made by panels in accordance with the Uniform Rapid Suspension System (URS). CRR’s registrar will be tasked with receiving all URS Complaints and decisions. After receiving a URS complaint about a domain name within the gTLD, the registrar will ensure that the domain name is locked within twenty-four (24) hours of receipt of a URS complaint from the URS Provider and will notify CRR’s Abuse Point of Contact and the registrant. In the event of a determination in favor of the complainant, the registrant will notify the Abuse Point of Contact and the registry services provider to ensure that the registry suspends the domain name in a timely fashion and has the website at that domain name is redirected to an informational web page provided by the URS Provider about the URS throughout the life of its registration. CRR’s Abuse Point of Contact will oversee and monitor the status and resolution of all URS complaints and decisions.
CRR will specify in the Registry Agreement, all Registry-Registrar Agreements, and all Registration Agreements used in connection with the gTLD, that it will abide by all decisions made by panels in accordance with the Uniform Domain-Name Dispute-Resolution Policy (UDRP). CRR’s registrar will be tasked with receiving all UDRP complaints and decisions. After receiving a UDRP complaint about a domain name within the gTLD, the registrar will ensure that the domain name is locked within twenty-four (24) hours of receipt of a UDRP complaint from the UDRP Provider and will notify CRR’s Abuse Point of Contact and the registrant. In the event of a determination in favor of the complainant, the registrant will notify the Abuse Point of Contact and the registry services provider to ensure that the registry cancels or transfers the domain name in a timely fashion as provided for by the decision. CRR’s Abuse Point of Contact will oversee and monitor the status and resolution of all UDRP complaints and decisions.
CRR will contract with various ICANN-accredited registrars. CRR is committed to reducing abusive registrations, and will ensure that its registrar operates accordingly.
CRR will either verify the email address or telephone number provided by the registrant or will require that the registrar do so as a part of registration. CRR will ensure proper access to domain functions by requiring multi-factor authentication from registrants to process update, transfer, and deletion requests.
No name will resolve until the registrant has been verified by the internal team as an eligible registrant.
See Question 27 for a detailed discussion of CRR’s policies with respect to Add Grace Periods.
CRR will implement in its internal policies and its Registry-Registrar and Registration agreements that all registered domain names will be subject to a Domain Name Anti-Abuse Policy (“Policy”). See Question 28 for a detailed discussion of CRR’s Anti-Abuse Policy.
The cost of these services will generally be set at reasonable market rates per agreement between CRR and Google. The expected costs are discussed in Questions 46 and 47.
The Registry Team will be responsible for designing and implementing the SRS, EPP, and WHOIS systems, including implementation of the rights protection mechanisms. They will also be responsible for creating tests and monitoring for these systems.
The Customer Services Team will be responsible for supporting customers and partners, including responding to abusive registrations. Google has a very large existing customer service team of both internal staff as well as staff contracted through third parties, with many hundreds of dedicated staff members already in place. Since these teams and their management are already in place, no standalone implementation resources are needed.
To continue ongoing maintenance of CRR support needs, Google plans to add additional resources for capacity as needed. Google expects to add a total of approximately fifteen additional personnel (including both Google employees and outside vendors) to support all of CRR’s customers and partners. The individual staffing allocation to each gTLD is described in Question 47.
CRR is committed to implementing strong and integrated intellectual property rights protection mechanisms. Doing so is critical to Google’s goals of model Internet citizenship and fostering Internet development, especially in emerging regions. Accordingly, CRR intends to offer a suite of rights protection measures which builds upon ICANNʹs required policies while fulfilling our commitment to encouraging innovation, competition, and choice on the Internet.
Google plans to use the same common secure infrastructure to support the proposed registry that we use for our other production networks and computing environments. Google currently provides best-in-class security technologies and processes to protect Google’s products, services, infrastructure and user data. Google’s common secure infrastructure supports some of the web’s most widely-used services, such as Google Search YouTube, and Google Apps. These services are used by many millions of consumers, businesses and government customers for their daily operations. Google does not have any plan to support High Security Top Level Domain (HSTLD).
Google’s security programs are governed through the Google Security Team. The Security Team is led by Google’s Vice President of Security, who reports to Google Senior Leadership including the President of Technology and Chief Executive Officer. Google’s VP of Security has approved the security policies that underpin Google’s information security program.
- Control and maintain the confidentiality, integrity, and availability of information and information systems.
- Limit Google’s exposure to the risks arising from loss, corruption or misuse of our information assets.
- Ensuring consistency, which is attained against legal, regulatory, policy and best practice requirements.
To ensure the consistent implementation of security controls across the various layers of infrastructure and services, Google has documented the following security policies.
- Basic Security Policy: States the foundation and principles of Google’s Security Policies.
- Physical Security Policy: States how the safety of people and property is protected at Google.
- Accounts Access and Administration Policy: States the kinds of internal accounts Google has and how to access, use, and administer them in a way that reduces risk and provides the ability to audit account activity.
- Data Security Policy: States how data should be handled at Google to help ensure its confidentiality, integrity, and availability.
- Corporate Services Security Policy: Informs Google employees of what to expect regarding access, monitoring, and other security considerations for communications and other data sent, received, or stored using Googleʹs corporate services.
- Network and Computer Security Policy: States how to reduce the likelihood of compromise to Googleʹs data and infrastructure from devices connected to Google networks.
- Applications, Systems, and Services Security Policy: Ensures that adequate attention is paid to security in the design, procurement, development, deployment, and maintenance of Applications, Systems, and Services.
- Change Management Policy: Describes the safeguards that protect Google from accidental or malicious changes to Googleʹs systems.
- Information Security Incident Response Policy: States the minimal requirements for preparing for and responding to information security incidents.
- Datacenter Security Policy: Ensures that adequate attention is given to verifying that each datacenter hosting Google systems maintains security controls that provide protection appropriate to the criticality of those systems.
- Federal Information Security Management Act (FISMA). Independent assessments conducted every two years. In 2011, Google received FISMA certification for Google Apps Cloud, another service that uses the same production network as the Google registry will use. Grant Thornton LLP performed independent assessment, and United States General Services and Administration (GSA) issued FISMA certification to Google based on this independent assessment.
- Statement on Standards for Attestation Engagements (SSAE16). Independent assessments conducted annually.
- Sarbanes-Oxley (SOX). Independent assessments conducted annually.
- Payment Card Industry (PCI). Independent assessments conducted annually.
Government agencies and Enterprise customers are currently using Google Apps Cloud Services. Google’s corporate and production networks were both in scope for FISMA and SSAE16 independent assessments. Google is also currently preparing for ISO 27001 certification of Google Apps Cloud.
Google will make the following commitments to registrants.
- Google’s existing dedicated Security Organization will remain the focal point for ensuring implementation of adequate system security in order to prevent, detect, and recover from security breaches. Various teams in the security organization ensure that Google’s infrastructure and services are operated, used, maintained, and disposed of in accordance with internal security policies.
- Google will continue to contemplate threats from internal and external sources, and will exercise our existing incident response capability.
- Google will continue to perform quarterly scanning of our internal and external infrastructure to detect network, database, application, and OS vulnerabilities.
- Google will continue to maintain robust Logging, Monitoring and Auditing capabilities for its systems and networks. These policies are discussed further in Section 30b.
- Google’s externally facing network infrastructure will continue to enforce strict access control restrictions to deny all traffic and allow only authorized protocols to enter the Google network.
- Google has established background investigations for all Google employees in accordance with local laws and will continue to do background investigations for any new Google employees. | 2019-04-23T10:13:09Z | https://gtldresult.icann.org/applicationstatus/applicationdetails:downloadapplication/528?t:ac=528 |
A major investigation is underway into police malpractice and deaths in custody. Contact WNOW if you wish to contribute evidence.
In a month's time on Sunday July 3rd 2011 we will be holding the 3rd Anniversary vigil for Habib outside High Wycombe Police station between 4 and 7pm. It's incredible to think that three years on the investigation into his death in a car park in the town has still not been completed. Recently his family have met the CPS and we are now aware that the police officers have been interviewed under criminal caution and the solicitor present will also be interviewed.
Please join us on the 3rd of July to express your support and solidarity with the family and the campaign. A flyer and a new information leaflet will be out shortly.
If you can't come to the vigils and demos above then please join the groups and ask questions about policing in your area. Those who regularly follow our page will know that there are deaths in custody occurring every week up and down the country. Lastly please sign the petition that the Smiley Culture campaign are promoting and get others to do so - it mentions Habib as well as the other notable deaths that have occurred.
March 2011: I visited a Crown Court to attend the preliminary hearing of an assault case and jotted down a few notes, which I was stopped from doing by the court clerk, as no such note taking is permitted apparently.
I asked where I could read the regulations that prevented it, but the clerk nor court manager knew.
As I left the court room a police man stopped me and asked for my name and address and why I was taking notes. The next 30 minutes approximately were spent with me asking for information about why I had been stopped and why I was being questioned.
The police man said he wanted to do a check on me. However the more serious part followed. He said, he was concerned for my 'well being' and that I might have 'got out' from somewhere I was supposed to be in. I shivered. Is this not what is considered of political dissidents in authoritarian regimes?
I was sweetness itself throughout; so calm, so reasonable and checking at each stage what would be the consequence of my responding in different ways. I gave him no grounds for further action.
At the end, I ascertained that if I tore up the few lines of notes I had taken in front of the court manager that would suffice and in relation to the policeman, that if I refused to give any personal details, I would still be free to leave.
So, the notes were shredded and I gave no personal details at all.
The court manager asked why I wouldn't. My position was clear. I was an innocent person visiting a court and attending the public gallery and did not expect to be interrogated by the police as I went about my everyday life. It was not a police state. The balance between the power of the state and an individual's civil liberties are so precious they must be protected.
November 2010: Bishop Jonathan Blake has been approved as an Independent Custody Visitor - This will enable him to assist in the monitoring of the treatment of detainees and have access to the structures that work to improve the present system.
The shocking decision by the Crown Prosecution Service not to charge any officers over the death of Ian Tomlinson (Editorial, 23 July) exposes the root-and-branch corruption of the justice system. Rather than protecting the innocent, the police, CPS and Independent Police Complaints Commission have been shown to protect each other's backs. From the start, when the IPCC accepted the police line that no CCTV cameras witnessed the attack on Tomlinson, through Dr Freddy Patel's botched first postmortem, up to this latest scandal, the justice system has closed ranks to protect its own.
The fact that PC Simon Harwood, who struck Tomlinson before he died, had previously been investigated for alleged aggressive behaviour and yet was allowed to join the notoriously violent Territorial Support Group is an outrage. As revealed by the Guardian last November, 5,000 complaints were made about the activities of the TSG over four years, yet only nine were upheld.
Tomlinson's case is far from the first. Since 1969 over 1,000 people have died in police custody in Britain, yet not a single police officer has been charged with manslaughter or murder during this time. The Tomlinson family should be given public funding should they decide to continue the legal battle for justice for Ian – as should all families seeking justice for those who have died at the hands of the police. They should also have the right to see PC Harwood's disciplinary proceedings conducted in the open. We will be picketing the offices of the director of public prosectuions in London at midday today.
I inititiated legal proceedings concerning the assault upon me by the police officer, occasioning me actual bodily harm, by laying the information at the Magistrates Court in December 2009.
Private prosecutions are rare and hard to achieve and it has been a steep learning curve. However I have been able to represent myself and see the case through Magistrates Court and into Crown Court.
After the initial Crown Court hearing the main jury trial was due to be heard from August 2nd 2010.
After the assault, I warned the police officer that I would hold him to account for his misconduct, although he responded to this dismissively.
However, the judicial process has forced him to reflect on his behaviour.
The Police Officer, through his solicitors invited the Head of the Crown Prosecution Service (‘CPS’) to exercise statutory powers under the Prosecution of Offences Act 1985 to intervene in this case with a view to its discontinuance. The CPS reviewed the case papers, the relevant CPS policy on Private Prosecutions, the Full Code Test and my submissions as to why they should not stop the prosecution.
The CPS could find no compelling reason to take over the case with a view to its discontinuance.
Meanwhile I had prepared meticulously and I had my witnesses in place ready to give evidence at the trial.
However, it also became clear that should I be successful at trial, the police officer would face ruin, which would impinge also on his wife and children and if I was unsuccessful my family faced the possibility of costs that would have allowed the injury of the assault to be compounded.
Therefore at the beginning of June, an exploration began into the possibility of an alternative resolution.
This has been achieved in an agreement that I will withdraw the proceedings, the defence will not apply for costs against me with each side bearing their own costs.
The 7 months of legal process thus far, the stress, the ignominy of having to stand repeatedly in the dock, the knowledge of the case among his colleagues and the costs seemed a proportionate consequence for the police officer, following his assault upon me and the actual bodily harm it caused and will have been instructive and effective, I hope, in cautioning him against repeating his misconduct on others.
Withdrawal also protected my family from the possibility of further suffering and allows us to put the event behind us.
I hope he will not repeat his violent conduct. However, as his colleagues are aware now that this case has been brought against him for assault, I suspect he will ensure that his future conduct with members of the public is above reproach. My overriding concern throughout was that if he was willing to be violent with me in a peaceful and benign setting, what could happen to others who were more vulnerable or in more aggravated setttings. I hope the experience he has had will have made him wiser and more controlled in all such future situations.
I will continue to campaign for greater police accountability and especially that all police contact with the public should be filmed with audio and video feed and the footage be available to the public and to the police.
is an important window for the public into police brutality and misconduct.
The situation in this country has reached a critical position with confidence in the police at an all time low. The system of policing, police accountability and the IPCC all need radical reform.
Until then I urge any member of the public who has been assaulted by the police not to be fobbed off with a complaint process to the IPCC but to go directly to the Magistrates Court where they can lay the information of the assault against them and have the police officer tried in open court.
The travesty of justice that has shamed our judicial system re Ian Tomlinson’s death is a powerful symbol. The IPCC takes over 6 months to investigate the complaint which conveniently for the police takes the case beyond the 6 month time boundary for bringing assault charges.
Members of the public must not delay. They must lay the information at Magistrates within the 6 month period, even if an IPCC investigation is ongoing.
If the Magistrates and the courts become aware of how widespread police violence is, then the movement for reform will gather momentum.
MAY: 4WardEver UK organised an excellent gathering in association with the Mikey Powell Campaign, Habib Ullah Campaign and the Leicester Civil Rights Movement on May 15th at the Highlands Centre in Leicester.
Bishop Blake was asked to speak about When No One's Watching and the Four Finger campaign.
It was distressing to hear the terrible circumstances surrounding Mikey Powell, Habib Ullah, Sean Rigg and Paul Coker's deaths.
It is shocking that Simon Bosworth, Sharon Batey, Hipolit Konrad Legowski, Mark Read, Andrzej Rymarzak, janet Jackson, Kanwaldip Singh Bains, Marcus Cottoy, Amarjit Singh Chaudhri, Jonathan Pluck, Marvyn Tussler, Peter Murphy, Ian Tomlinson, Levi Rashid Goodman and Reece Staples are among those who have died in police custody and prison YOI's since July 2008.
All campaign groups must unite their voices to effect change in the system.
APRIL: The legal process re Bishop Blake's case continues.
DECEMBER: Bishop Blake maintains he was assaulted by the police and injured during the arrest and suffered abuse while detained for 24 hours at Bexleyheath police station.
He submitted a complaint to the IPCC on March 4th which was investigated by the Directorate of Professional Standards (DPS) of the Metropolitan Police Service. On July 13th the complaint was not upheld due to lack of evidence, although malpractice in the Custody area and omissions and false entries on the Custody Record were identified. Bishop Blake appealed the decision to the IPCC on August 9th and the appeal was not upheld due to lack of evidence on November 16th although the IPCC acknowledged that this did not mean Bishop Blake’s accounts were not accurate.
Bishop Blake is now considering taking legal action against the police officer concerned for criminal assault causing actual bodily harm and battery and against the police for compensation.
- The DPS found that Bexleyheath Police Station was in breach of PACE in that they removed Bishop Blake’s shoes, leaving him to walk about in socks without providing him with replacement foot wear.
- The DPS found that the first cell in which he was held had no CCTV and the second cell in which he was held had CCTV but with only visual footage and no audio. Further the visual footage was of such a poor quality that it couldn’t focus on small details. Hence the requests that Bishop Blake made, which the police refused, to be able to wash, for the blood to be cleaned from the floor of the cell, for toilet paper, and for food and water in sealed containers to be provided were not recorded and visuals of blood on the floor of the cell were not available. Hence the only way Bishop Blake’s requests for his rights could be verified were if the officers recorded them on the Custody record. No such entries appeared.
- However the DPS found that the Custody record did not record either, the fact the police moved Bishop Blake from one cell to another or that Bishop Blake left his cell to see his solicitor. The Custody Record is meant to be an exact record of the time a detainee spends in custody. While accepting that the Custody Record had these omissions, the police nevertheless used it to deny that Bishop Blake had made requests to wash etc.
- However, the DPS also found that on two occasions, false entries were made by the police, claiming that the Gaoler had visited Bishop Blake in the cell and found him awake. The CCTV footage found that neither visit was made.
- The DPS found there was no record that Bishop Blake was given access to wash for 24 hours.
- The DPS stated that no toilet paper needed to be available.
- The DPS stated that it is permitted for the lights to be left on all night.
- The DPS stated that no blanket, pillow, need be provided at night.
- The DPS stated that if a detainee refused food and drink provided in open vessels by the police out of fear they may have been spat in/interfered with, then no other food or drink need be provided.
In February Bishop Blake contacted Bexleyheath Police and asked to view the video footage of his time in detention. On February 9th the police said he was not entitled to view it.
He then wrote to Scotland Yard about this and was informed that under the Freedom of Information Act the video footage must be provided.
Bishop Blake wrote again to Bexleyheath police in April and his request was again rejected under the pretext that this was ‘exempt information’ under the Freedom of Information Act.
Bishop Blake then wrote to the Home Office and was informed that under the Data Protection Act he was entitled to access to the recordings.
In August he wrote again to Bexleyheath Police requesting access. They responded saying they were taking further expert advice. They wrote subsequently explaining a process of application to obtain access to the recordings. He has submitted an application. They have 40 days to reply.
Bishop Blake has issued this warning to members of the public, that should they be detained, they are in danger.
There is no independent monitoring of their stay in detention. CCTV is not in every cell. In the cells with CCTV, it does not record sound and the visual feed is poor. In public areas CCTV has audio but individual conversations are obscured by the general noise.
Requests, permitted under PACE, can be rejected because the police can choose not to record the requests in the Custody record, hence removing evidence of them.
March 25th: It was agreed that I would meet the two DS Officers at the local Victim Support Centre. The complaint is to be investigated and I have been given a likely time frame of six months for this to be concluded. The DS's line manager has decided for now to investigate it under a heading of misconduct rather than criminal assault. I challenged this. I asked if I went out into the street and punched a passer by in the back, wrenched their arm above their neck and roughed them against the wall whether that would be criminal assault. The DS answered instantly 'Yes'. However the PC's action wasn't being treated as criminal assault at this stage! If though it became clear during the investigation that there was enough evidence of an assault, then the heading would be changed. The reason, I believe, police must wear headcams. Anyway, I think there is enough evidence despite the lack of web cam footage, as the two relevant statements made by the two police officers involved are contradictory, unworkable and clearly fabricated.
w/b March 16th: My first conversation with the DS about my IPCC complaint was not encouraging. He wanted to arrange to meet me, however he and another officer would not come to my house because they were worried about their safety! Instead they suggested we met at Bexleyheath Police station. I declined that venue as I was worried about my safety. This perplexed the DS who wanted to know where else we could meet. I suggested a neutral venue.
Can anyone provide us with the information about how many 'innocent' hours are spent in police cells each year?
On Saturday, February 7th 2009, Tom Collister, a 23yr old man from West Wickam was found hanging in his cell in the prison on the Isle of Wight. His friend has described him as polite, intelligent and with many gifts. How is it possible for our Society to take a young man, whose crime was graffiti and wrest him from his family and place him in a prison out of reach and contact from loved ones and so expose him to the degrading and inhuman treatment at the hands of the prison service that his fledgling life ends abruptly? Who will answer, who will pay and who will be held accountable? | 2019-04-24T04:00:15Z | http://whennooneswatching.org/773.html?*session*id*key*=*session*id*val* |
HYUNDAI EXCEL 1991 car safety problem was reported on Jan 28, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with SERVICE BRAKES, HYDRAULIC:FOUNDATION COMPONENTS:DISC:PADS . the right front brake pads were run down all the other brakes are fine. tt.0 person(s) were injured. 0 person(s) died.Hyundai Excel 1991 problem was reported in COPPEROPOLIS, CA. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on .HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with VISIBILITY:WINDSHIELD . vehicles front windshield cracked. also rear hatchback and rear passenger window exploded into pieces for no reason. tt.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHUD12J6MU. Hyundai Excel 1991 problem was reported in LISLE, NY. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on .HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with VISIBILITY:GLASS, SIDE/REAR . vehicles front windshield cracked. also rear hatchback and rear passenger window exploded into pieces for no reason. tt.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHUD12J6MU. Hyundai Excel 1991 problem was reported in LISLE, NY. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Aug 12, 1994.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with WHEELS:RIM . 5 rims deflate your tires and they have cracked and caused the tire to deflate. tt.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHVF2257MU. Hyundai Excel 1991 problem was reported in OAKHURST, CA. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Feb 13, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with ELECTRICAL SYSTEM:WIRING:FRONT UNDERHOOD . engine electrical fire in engine compartment; while driving, stalled, burst into flames; vehicle totalled. tt.Vehicle was on fire. 0 person(s) were injured. 0 person(s) died.Hyundai Excel 1991 problem was reported in SALT LAKE CI, UT. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Mar 06, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with ELECTRICAL SYSTEM:IGNITION:MODULE . electrical system failure, brain cell melted down, fuses blown. tt.Vehicle was on fire. 0 person(s) were injured. 0 person(s) died.Hyundai Excel 1991 problem was reported in FLORENCE, KY. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Mar 06, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with ELECTRICAL SYSTEM:IGNITION:SWITCH . electrical system failure, brain cell melted down, fuses blown. tt.Vehicle was on fire. 0 person(s) were injured. 0 person(s) died.Hyundai Excel 1991 problem was reported in FLORENCE, KY. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Mar 11, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with POWER TRAIN:AUTOMATIC TRANSMISSION . transmission went out after 4 years. tt.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHVF22J3MU. Hyundai Excel 1991 problem was reported in CLEVELAND, OH. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Apr 02, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with EQUIPMENT:MECHANICAL:JACKS . vehicle jack in car broke when being used to lift car. tt.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHVF22J8MU. Hyundai Excel 1991 problem was reported in LA QUINTA, CA. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Apr 24, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with POWER TRAIN:AUTOMATIC TRANSMISSION . transmission is slipping, will not shift properly. tt.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHVD32J9MU. Hyundai Excel 1991 problem was reported in ASHTABULA, OH. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Feb 01, 1993.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with STRUCTURE:BODY . glove compartment locks failed, brusing knee and catching drivers attention when fallen open. tt.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHVF12J0MU. Hyundai Excel 1991 problem was reported in LYNWOOD, 00. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on .HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with SEAT BELTS:FRONT:WEBBING . passenger front shoulder/lap belt won't extend far enough across passenger from assembly. tt.0 person(s) were injured. 0 person(s) died.Hyundai Excel 1991 problem was reported in KENT, WA. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Nov 15, 1994.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with SEAT BELTS:FRONT:ANCHORAGE . driver/passenger shoulder and lap belts extend all the way without catching; hangs loose around occupants; does not provide adequate protection. tt.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHVD12JXMU. Hyundai Excel 1991 problem was reported in KINGS MOUNTA, KY. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on June 17, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with POWER TRAIN:AUTOMATIC TRANSMISSION . the transmission stopped on christmas night. it has a cracked transmission case. please describe. tt.0 person(s) were injured. 0 person(s) died.Hyundai Excel 1991 problem was reported in METAIRIE, LA. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on June 21, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with FUEL SYSTEM, GASOLINE . hyundai zone office 93v192. owner tried to obtain a listing for nearest dealer to him. after second attempt he called nhtsa to try to have recall work performed.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHVD12J9MU. Hyundai Excel 1991 problem was reported in PARLIN, NJ. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on .HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with LATCHES/LOCKS/LINKAGES:DOORS:LATCH . in an unlock position the door will lock you out the seat belt lock you in place . tt.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHVS12J3NU. Hyundai Excel 1991 problem was reported in JOLIET, 00. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on .HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with SEAT BELTS:FRONT:BUCKLE ASSEMBLY . in an unlock position the door will lock you out the seat belt lock you in place . tt.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHVS12J3NU. Hyundai Excel 1991 problem was reported in JOLIET, 00. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on June 10, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with VEHICLE SPEED CONTROL . the engine surged, but vehicle would only seem to roll with no momentum. *ak.0 person(s) were injured. 0 person(s) died.Hyundai Excel 1991 problem was reported in DESERT HOT S, CA. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Apr 02, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with OTHER . spare tire jack collapsed while holding vehicle up during tire change. *aw.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHVF22J8MU. Hyundai Excel 1991 problem was reported in LA QUINTA, CA. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Nov 09, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with VISIBILITY:WINDSHIELD . passenger side window has fallen off the vehicle. tt.0 person(s) were injured. 0 person(s) died.Hyundai Excel 1991 problem was reported in OLYMPIA, WA. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Sept 03, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with SERVICE BRAKES, HYDRAULIC:FOUNDATION COMPONENTS . poor performance of the brake system. tt.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KM8VD32J8MU. Hyundai Excel 1991 problem was reported in CLARKSVILLE, TN. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Feb 27, 1996.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with ELECTRICAL SYSTEM:FUSES AND CIRCUIT BREAKERS . electrical system failure, fuse keeps burning out causing engine stalling. *ak.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHV12J8MU3. Hyundai Excel 1991 problem was reported in LOGAN, UT. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on June 01, 1993.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with ELECTRICAL SYSTEM:IGNITION . while driving the engine stopped which almost caused an accident. please describe the problem. *ak.0 person(s) were injured. 0 person(s) died.Hyundai Excel 1991 problem was reported in CHARLESTON, WV. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on June 10, 1996.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with ELECTRICAL SYSTEM:WIRING:INTERIOR/UNDER DASH . the vehicle caught on fire while parked, fire under the dash. fire dept. says it was an electrical fire. please describe. *ak.Vehicle was on fire. Hyundai Excel 1991 problem was reported in ST. PETERS, MO. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on June 22, 1996.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with POWER TRAIN:AUTOMATIC TRANSMISSION . while doing highway speeds, the transmission locked up the car, cut off and would not go.*ak while driving vehicle began to loose speed and when the accelerator was pressed, the vehicle made a rough sound and continued to drop speed and cut off, vehicle was pushed by another vehicle to consumer's residence, dealership advised consumer that transmission neede to be replaced because there was an internal part, but the extended warranty co refused to pay for the covered part without consumer's authorization to break down the transmission first and tell them exactly what was wrong.*jb.Hyundai Excel 1991 problem was reported in DALTON, IL. Original Owner. Vehicle was purchased on Aug 01, 1991. Vehicle was not using Cruise Control. Hyundai Excel 1991 drive type:4WD. FUEL SYSTEM:N/A. FUEL TYPE: GAS. Hyundai Excel 1991 TRANSMISSION TYPE: AUTO. VEHICLE SPEED: 60 mph.
HYUNDAI EXCEL 1991 car safety problem was reported on May 07, 1996.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with FUEL SYSTEM, GASOLINE . she requested the part from the manufacturer over a year ago and she still has not received the part regarding fuel system recall 93v192000. *ak.0 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHVF3257MU. Hyundai Excel 1991 problem was reported in PONTIAC, MI. Original Owner. Vehicle was purchased on Feb 01, 1991. Vehicle was using ANTI-LOCK BRAKES.Vehicle was not using Cruise Control. Hyundai Excel 1991 drive type:FWD. FUEL SYSTEM:N/A. Hyundai Excel 1991 TRANSMISSION TYPE: AUTO.
HYUNDAI EXCEL 1991 car safety problem was reported on .HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with ELECTRICAL SYSTEM . for several months owner had interference in electrical system. head lights dimmed when other electric accessories were used/alternator charged correctly and belts tightened w/no change in condition. two mechanics stated everything checked out fine.*.Hyundai Excel 1991 problem was reported in NELSONVILLE, OH. Vehicle was not using ANTI-LOCK BRAKES. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Nov 01, 1996.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with POWER TRAIN:MANUAL TRANSMISSION . while driving vehicle it just stopped in traffic, when it started again it would bearly go. dealer stated that the transmission was gone. there was no prior warning of this. *ak.Vehicle Identification Number (VIN):KMHVD12J4MU. Hyundai Excel 1991 problem was reported in LOS ANGELES, CA. Original Owner. Vehicle was not using ANTI-LOCK BRAKES. Vehicle was not using Cruise Control. Hyundai Excel 1991 TRANSMISSION TYPE: MAN .
HYUNDAI EXCEL 1991 car safety problem was reported on .HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with POWER TRAIN:AUTOMATIC TRANSMISSION . transmission failed..0 person(s) were injured. 0 person(s) died.Hyundai Excel 1991 problem was reported in MOUNT VERNON, NY. Vehicle was purchased on May 01, 1994. Vehicle was using ANTI-LOCK BRAKES.Vehicle was not using Cruise Control. Hyundai Excel 1991 drive type:FWD. FUEL SYSTEM:N/A. FUEL TYPE: GAS. Hyundai Excel 1991 TRANSMISSION TYPE: AUTO.
HYUNDAI EXCEL 1991 car safety problem was reported on June 01, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with VISIBILITY:WINDSHIELD . both rear windows shattered..0 person(s) died.Hyundai Excel 1991 problem was reported in NEW CASTLE, VA. Original Owner. Vehicle was not using ANTI-LOCK BRAKES. Vehicle was not using Cruise Control. Hyundai Excel 1991 drive type:FWD. FUEL SYSTEM:N/A. Hyundai Excel 1991 TRANSMISSION TYPE: AUTO. VEHICLE SPEED: 0 mph.
HYUNDAI EXCEL 1991 car safety problem was reported on Mar 23, 1997.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with LATCHES/LOCKS/LINKAGES:HOOD:LATCH . driving down the highway approximately 60mph and the hood released. pulled over to close hood, and then noticed the u-shaped metal clip detached from the hood. *ak .Vehicle Identification Number (VIN):KMHVF22J8MU. Hyundai Excel 1991 problem was reported in NAUGATUCK, CT. Original Owner. Vehicle was purchased on Oct 12, 1991. Vehicle was not using ANTI-LOCK BRAKES. Vehicle was not using Cruise Control. Hyundai Excel 1991 drive type:FWD. FUEL SYSTEM:N/A. FUEL TYPE: GAS. Hyundai Excel 1991 TRANSMISSION TYPE: MAN . VEHICLE SPEED: 60 mph.
HYUNDAI EXCEL 1991 car safety problem was reported on Nov 01, 1996.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with STRUCTURE:BODY:HATCHBACK/LIFTGATE:SUPPORT DEVICE . hatch lift assist bars failed, causing hatch to fall on person's head..1 person(s) were injured. 0 person(s) died.Vehicle Identification Number (VIN):KMHVD32J3MU. Hyundai Excel 1991 problem was reported in CORFU, NY. Vehicle was purchased on Nov 01, 1996. Vehicle was not using ANTI-LOCK BRAKES. Vehicle was not using Cruise Control. Hyundai Excel 1991 drive type:FWD. FUEL SYSTEM:N/A. FUEL TYPE: GAS. Hyundai Excel 1991 TRANSMISSION TYPE: AUTO. VEHICLE SPEED: 0 mph.
HYUNDAI EXCEL 1991 car safety problem was reported on July 04, 1997.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with SERVICE BRAKES, HYDRAULIC:FOUNDATION COMPONENTS:MASTER CYLINDER . upon depressing the brake pedal the pedal went to the floorboard/complete loss of braking ability, resulting in an accident. consumer has noticed the problem, the master cylinder was replaced due to a slipped pin. *ak.Vehicle was involved in a crash. Vehicle Identification Number (VIN):KMHVD32J8MU. Hyundai Excel 1991 problem was reported in WEST HAVEN, CT. Original Owner. Vehicle was not using ANTI-LOCK BRAKES. Vehicle was not using Cruise Control. Hyundai Excel 1991 drive type:FWD. FUEL SYSTEM:N/A. FUEL TYPE: GAS. Hyundai Excel 1991 TRANSMISSION TYPE: AUTO.
HYUNDAI EXCEL 1991 car safety problem was reported on .HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with STRUCTURE:BODY . loose molding around rear wheel well broke off, causing lost of control by striking the center wall of the vehicle. (new jersey police report).0 person(s) died.Hyundai Excel 1991 problem was reported in SICKLERVIL, NJ. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on .HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with OTHER . vehicle was making noise, the engine check light has never gone off since the vehicle was purchased, and the car cuts off. the dealer cannot duplicate the problem. *ak.Vehicle Identification Number (VIN):KMHVD12J4MU. Hyundai Excel 1991 problem was reported in LOS ANGELES, CA. Original Owner. Vehicle was not using ANTI-LOCK BRAKES. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on .HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with ENGINE AND ENGINE COOLING:ENGINE:GASOLINE . vehicle was making noise, the engine check light has never gone off since the vehicle was purchased, and the car cuts off. the dealer cannot duplicate the problem. *ak.Vehicle Identification Number (VIN):KMHVD12J4MU. Hyundai Excel 1991 problem was reported in LOS ANGELES, CA. Original Owner. Vehicle was not using ANTI-LOCK BRAKES. Vehicle was not using Cruise Control.
HYUNDAI EXCEL 1991 car safety problem was reported on Aug 11, 1998.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with VISIBILITY:GLASS, SIDE/REAR . while driving 55 mph, the windows(passenger and driver) in the rear exploded. this has happened on 2 other occasions. the windows were replaced by owner all times. the manufacturer has been notified about the prolbem. *ak the first window exploded while the vehicle was parked, the two other times the vehicle was in motion. *slc.Vehicle Identification Number (VIN):KMHVD12J1MU. Hyundai Excel 1991 problem was reported in VALLEY STREEM, NY. Original Owner. Vehicle was not using ANTI-LOCK BRAKES. Vehicle was not using Cruise Control. Hyundai Excel 1991 drive type:FWD. FUEL SYSTEM:N/A. FUEL TYPE: GAS. Hyundai Excel 1991 TRANSMISSION TYPE: MAN .
HYUNDAI EXCEL 1991 car safety problem was reported on .HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with POWER TRAIN:AUTOMATIC TRANSMISSION . transmission defective. nlm.Vehicle Identification Number (VIN):KMHVD12J7M4. Hyundai Excel 1991 problem was reported in GLOUCESTER, VA. Vehicle was purchased on Mar 01, 1991. Vehicle was not using Cruise Control. FUEL SYSTEM:N/A. FUEL TYPE: GAS. Hyundai Excel 1991 TRANSMISSION TYPE: AUTO.
HYUNDAI EXCEL 1991 car safety problem was reported on .HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with ENGINE AND ENGINE COOLING:ENGINE:GASOLINE . engine defective. nlm.Vehicle Identification Number (VIN):KMHVD12J7M4. Hyundai Excel 1991 problem was reported in GLOUCESTER, VA. Vehicle was purchased on Mar 01, 1991. Vehicle was not using Cruise Control. FUEL SYSTEM:N/A. FUEL TYPE: GAS. Hyundai Excel 1991 TRANSMISSION TYPE: AUTO.
HYUNDAI EXCEL 1991 car safety problem was reported on .HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with OTHER . no summary..Vehicle Identification Number (VIN):KMHVF22J6MU. Hyundai Excel 1991 problem was reported in HAWLEY, PA. Vehicle was purchased on May 01, 1999. Vehicle was using ANTI-LOCK BRAKES.Vehicle was not using Cruise Control. Hyundai Excel 1991 drive type:FWD. FUEL SYSTEM:N/A. FUEL TYPE: GAS.
HYUNDAI EXCEL 1991 car safety problem was reported on June 17, 1995.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with POWER TRAIN:AUTOMATIC TRANSMISSION . consumer stated the transmission case cracked, due to driving over a dip in the driveway, (consumer no longer owns vehicle)*jb .Vehicle Identification Number (VIN):KMHVD12J1MU. Hyundai Excel 1991 problem was reported in METAIRIE, LA. Original Owner. Vehicle was not using ANTI-LOCK BRAKES. Vehicle was not using Cruise Control. FUEL TYPE: GAS. Hyundai Excel 1991 TRANSMISSION TYPE: AUTO.
HYUNDAI EXCEL 1991 car safety problem was reported on Mar 11, 1993.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with POWER TRAIN:MANUAL TRANSMISSION . transfer shaft bearing broke, knocking a hole in the transmission case, causing fluids to leak from transmission, causing complete lock up and destruction of transmission and case. my car was only 3 years old and had 50,000 miles on it. *ak.Mileage was 5000 miles. Vehicle Identification Number (VIN):KMHVF22J7MU. Hyundai Excel 1991 problem was reported in BAKERSFIELD, CA. Accident was reported to Police. Vehicle was purchased on June 28, 1991. Vehicle was not using ANTI-LOCK BRAKES. Vehicle was not using Cruise Control. Vehicle had 4 CYLINDERS. Hyundai Excel 1991 drive type:FWD. FUEL SYSTEM:Fuel injection. FUEL TYPE: GAS. Hyundai Excel 1991 TRANSMISSION TYPE: AUTO. VEHICLE SPEED: 55 mph. DEALER'S NAME: JIM BURKE MERCURY LINCOLN HYUNDAI . DEALER'S TELEPHONE NUMBER: 661-837-6400 . DEALER'S CITY: BAKERSFIELD . DEALER'S STATE CODE: CA. DEALER'S ZIPCODE: 93313 .
HYUNDAI EXCEL 1991 car safety problem was reported on Jan 19, 2005.HYUNDAI EXCEL 1991, manufactured by HYUNDAI MOTOR COMPANY had a problem with POWER TRAIN:AUTOMATIC TRANSMISSION . car began to only do 20 miles per hour after stopping at traffic light or stop sign. drove fin on road. than began to drive slowly after two weeks. had transmission fliud change and drove great for a week then failed. i am ver upset by this motor company for hiding this major defect. my car only had 68,485 original miles!*ak.0 person(s) were injured. 0 person(s) died.Mileage was 68485 miles. Hyundai Excel 1991 problem was reported in RICHMOND,, VA. Vehicle was not using ANTI-LOCK BRAKES. Vehicle was not using Cruise Control. DEALER'S NAME: JOHN .
2010 Santa Fe Limited alternator failed within 2000 km of new. Are there any service bulletins out on this?
sounds like clutch, i believe you need to change it!
The material on this site is for informational purposes only, and is not a substitute for professional or legal advice. The information contained on car-and-safety.com site has not been scientifically or otherwise verified as to a cause and effect relationship and cannot be used to estimate the incidence of car problems. Thank you for visiting Car-and-Safety.com and viewing information about HYUNDAI EXCEL 1991. | 2019-04-21T21:03:02Z | http://car-and-safety.com/hyundai-excel-safety/hyundai-excel-1991.htm |
Over the first three quarters of 2017, the Port of Riga has handled a total of 25.5mt (million tonnes) of cargo, 5.1% — or 1.4mt — less than during the same nine months of 2016. The Port of Riga is a multi-functional port handling both dry and liquid bulk, as well as general cargo. Dry bulk is the largest cargo segment of the Port of Riga, amounting to 63% of cargo handled by the port over the first nine months of 2017. As compared to the same period of the previous year, the amount of dry bulk handled by the port has increased by 2% (the volume of general cargo has increased by 9.6%, while the turnover of liquid bulk has dropped by 32.9%).
Sea, behind the Russian port of Ust-Luga, which has been developing extremely fast in recent years due to the Russian policy of transferring cargo of Russian origin only to its own ports.
Over the first three quarters of this year, the Port of Riga has handled a total of 16mt of different types of dry bulk. According to Q3 2017 results, the largest group of dry bulk at the Port of Riga is coal, mineral fertilizers, wood pellets, grain and grain products, metals and wood chips.
Coal is a transit cargo at the port of Riga, which is 100% received by rail from Russia. The Russian transport policy in recent years envisages transferring all cargo only to its own national ports and fully closing cargo transit via the Baltic States’ ports. However, despite this policy, this year’s volume of coal handled by the Port of Riga has increased by 2.5% compared to 2016. Overall, 9.3mt of coal were dispatched from Riga this year.
The second-largest group of dry bulk at the port of Riga is mineral fertilizers. Mineral fertilizers are handled at two specialised port terminals and are 100% received in transit from Russia. Over the first three quarters of this year, the Port of Riga has handled 1.8mt of mineral fertilizers, which is 12.3% less than a year before.
As compared to the previous year, the total volume of dry bulk timber handled by the port over the first nine months of this year has increased by 9.7% and 1.8mt of cargo have been dispatched from the port. Dry bulk timber is an export product of Latvia and an increase therein also suggests an increase in the Latvian wood processing sector. An increase in handled cargo, compared to the previous year, has been registered for woodchips (+13.5%) and sawn timber (+77.9%), while stagnation after the fast growth of the previous year is observed in the wood pellets segment (–4.5%).
Grain cargo in Latvia is both of local origin and received in transit from neighbouring countries, i.e. Lithuania, Russia and Belarus. Taking into account the unfavourable effects of this year’s weather conditions on crop harvesting in Latvia, handling of grain products at the port was actively commenced only in the second half of September. Despite that, 261,800 tonnes of agricultural products were handled in September, a new monthly record. Overall, the volume of grain products over the first three quarters of the year has remained at the same level as the previous year.
Over the first three quarters of this year, the total volume of dry bulk metals (ore, metals, scrap metal and ferroalloys) has increased.
As part of its ongoing development of the terminal, and in order to increase the effectiveness of cargo handling, the company Riga Universal Terminal Ltd. (RUT) has introduced a new technology: containerized dry bulk handling. This technology is often called a revolution in dry bulk logistics and the Port of Riga is the first port in Europe to use it.
The company RUT is currently using the containerized handling method for handling wood pellets on large dry bulk ships. Pellets are delivered from warehouse to pier in special-purpose open-top 20-foot containers. Using a portal-frame container lift equipped with a revolute system (revolver), the entire contents of a container are delivered onto the ship by turning the container over into the holds.
Atis S?ulte, RUT Trade and Business Development Director: “The main benefit from introducing the new technology is significant optimization of terminal expenses and increase in performance. Now, we can perform dry bulk handling operations involving a significantly smaller number of machinery and human resources. Savings on resources amount to almost 50%. By introducing containerized cargo handling, we have become more competitive and can better adjust to customer requirements. Following the general tendency in cargo carriage, dry bulk ships handled at our terminal are becoming even larger. By means of the new technology, we are able to ensure fast and effective loading of large ships. By applying the new technology, we are able to load dry bulk and containers at the same pier, using one portal-frame lift. It allows us to quickly organize our work in the terminal and quickly handle any type of ship”.
Containerized dry bulk handling is also an environmentally-friendly technology. Cargo is practically poured into the holds, rather than above them, which reduces the amount of dust that ends up in the air. Likewise, spread of dust and cargo losses are reduced by handling a great amount of cargo within one lifting time.
This method of containerized dry bulk handling is used in the ports of Australia and South America, where it is used with the logistics of mining industry products, i.e. metal ore, coal, as well as grain. This technology is called a revolution in dry bulk logistics, since by using closed standardised containers, dry bulk can be transported from the place of extraction, stored at the terminal without unloading from the container and loaded onto the ship using the same container. As a result, no investments are needed for warehouses and the entire logistics chain from extraction to loading onto a ship can be optimized, using standardized containers and equipment which has been developed and is already used in container cargo logistics.
The Port of Kokkola is the third largest general port in Finland. Cargo traffic through the port has experienced powerful growth thanks to development efforts characterized by long-term and thorough planning.
The most important success factors of the port are, among others, customer- friendly service, competitive pricing and investments in modern cargo handling equipment. The Port of Kokkola is the preferred and foremost port in Finland serving the mining industry. The expertise of the logistics required by the mining industry is based on a co-operation that goes back more than 50 years. In addition to the mining industry, the Port of Kokkola is an important actor in the transit traffic from and to Russia.
The third significant customer group is the industry and the local trade in Kokkola. In the close vicinity of the port the industry concentration of Kokkola Industry Park (KIP) is established. This Industry Park is the largest concentration of non-organic chemical industry in Northern Europe. More than 60 companies are established in the area, employing more than 2,000 persons. Major investments have also been made in the Industry Park.
In the first half of this year, the increase in cargo transport in the Port of Kokkola is over 16%, driven by foreign exports.
This year, the Port of Kokkola has also achieved “The strongest in Finland” certificate. This kind of certificate is only achieved by companies which obtain the high Rating Alfa credit classification. This certificate is only awarded to every tenth company in Finland. The classification is awarded by Suomen Asiakastieto Oy.
The Port of Kokkola is developing and expanding its activities in Russia and CIS countries. In early October this year, the Port Kokkola LTD opened an office in Moscow. With the help of the Moscow office, the Port of Kokkola will develop partner relations with Russia, and will be able to respond quickly to the needs and demands of Russian clients.
For the co-operation and development of partner relationships in Russia and the CIS countries will be the representative of the Port of Kokkola, Kauko Tanninen. Tanninen has more than 20 years of experience in Russia in many industries, including mining and logistics.
Last year, the Port of Gdansk handled a total of nearly half a million trucks and almost 240,000 railway wagons. In comparison to 2015, this was a leap of 43% in the case of trucks, and of 24% in terms of the intensity of rail traffic. This result in terms of land transport traffic is the best ever for the Port of Gdansk.
After summarizing the 12 months of 2016, the Management Board of PGA (Port of Gdansk Authority) can announce record data relating to the use of overland transport. Last year, on average, one loaded truck was handled in the port every minute, and a goods train every 1.5 hours. Regarding the average load of both means of transport, it is estimated this was slightly lower than last year, but the differences are relatively small.
In comparison with the data from four years ago, truck traffic in the port in 2016 increased by 100%, and rail traffic recorded an increase of nearly 40%. The current dynamics confirm the large increase in the importance of Gdansk in the operation of overland transport.
individual means of transport in overland freight handling in Gdansk was 31% for railways, 29% for trucks and 40% for pipeline transport. The latter has seen an 8% drop in the share structure, with an increase of 5% in truck traffic and 3% in the share of rail transport in overland freight handling.
Truck traffic was mainly used to transport general cargo (containers) as well as bulk cargo such as aggregates, chemicals and grain. Rail was used to transport primarily coal, containers and loads of chemicals, including fertilizers.
Regarding coal, it should be noted that in the past year a change in the directional structure of freight handling has taken place. Although rail transport still dominated, the number of trucks picking up raw materials from the port and transporting them into the country increased by as much as 45%.
According to estimates collected from port operators, the newly built railway bridge over the Martwa Wisla was crossed by a total of more than 5,600 trains, which equates to more than 220,000 wagons. In making the calculations, the operators did not take into account trains which crossed the bridge without goods. Average daily rail freight traffic amounted to around 15 trains a day, or more than 620 wagons a day.
The achievement of such a result is pleasing, all the more so because during two quarters only one track was in operation on the bridge. The second track was opened in the third quarter of 2016.
The bridge was most intensively used for the transport of containerized cargo, which in the past year increased by more than half in terms of tonnage in overland traffic. This automatically led to a rapid increase in the amount of land transport used to handle freight at the port.
Detailed analysis of overland traffic in the port clearly demonstrates the growing importance of Gdansk as the logistics hub of the country. Each day it handles over 1,300 trucks loaded with goods, and more than 650 full wagons, most of which usually travel to or from the port without load. Thus, in practice, this means almost double the traffic compared to average daily levels.
This year, the Management Board of PGA expects consistent growth in land traffic and is taking action to stimulate further development in this field. The aim of the Management Board of PGA is to create favourable conditions for the further development of logistics operations in the port, which will translate into higher growth of transshipments, resulting in strengthening the position of the Port of Gdansk.
Yet another record result in transshipments at the Port of Gdansk. After the first eight months of 2017, the result has improved by 3.7% compared to the same period of the previous year, and at the same time, is higher than predicted. By August, as many as 25,501,876 tonnes of various types of goods were transshipped at the largest Polish seaport. It is worth mentioning that the upward trend is particularly noticeable in the container transshipment sector.
In the period from January to August 2017, the Port of Gdansk exceeded the adopted transshipment plan by 0.7%. The volume of goods handled included mainly imported commodities (63.3%). This good August result is mainly owing to the transshipments of containerized general cargo, fuels (mostly oil), and coal. In August alone, over a quarter more general cargo was transshipped than in the same month of last year. Importantly, this year’s first transshipment of ore took place as well. Between January and August 2017, a total of 25.5mt (million tonnes) of cargo was transshipped. It is a continuation of this year’s trend of record transshipments — already within the first half of the year, the Port of Gdansk recorded the best result in its history, achieving a value several percent higher than in the same period of 2016.
“In terms of transshipments, this year shows how dynamically the Port of Gdansk is developing. We owe high transshipment values primarily to general cargo, also of the Ro-Ro type. Within the last eight months, we have handled 373% more commercial vehicles than last year. We are particularly happy about exceeding the plans adopted for 2017. We hope that the coming years will bring even better results and that we will increase transshipments in the less popular categories, such as cereals,” says Lukasz Greinke, President of the Board of the Port of Gdansk Authority SA.
Even though, this year, many ports recorded fewer vessel calls for regular links, the Port of Gdansk handled a record volume of containers. Importantly, at the beginning of September, another super large container ship from the OOCL fleet was christened. OOCL Japan will sail regularly between Gdansk and the ports of the Far East. The shipowner’s newest and largest container vessels will be gradually put into service both this year and in 2018. Everything seems to confirm that 2017 will be a record year in the container cargo group.
The Port of Gdansk is one of the largest and most important enterprises in Poland. It is one of the most thriving ports in the Baltic Sea. It is of fundamental significance to the national economy and constitutes a key international distribution hub.
Back in the year 2001, NK TEHNOLOGIJA started operations with a principal focus on servicing harbour cranes, providing all necessary repairs, main- tenance, retrofitting, assembling and dismant- ling for brand new or used lifting equipment.
and developed its scope of supply, now offering turnkey projects for designing, manufacturing, delivery and installation of bulk handling equipment, such as shiploaders, mobile ecological weighing hoppers and tilting spreaders.
With the loyal customers all across the Baltics, including, but not limited to the sea harbours of Hamina Kotka (Finland), Tallinn (Estonia), Ventspils (Latvia), Klaipeda (Lithuania), Sankt Petersburg, Ust-Luga and Kaliningrad (Russia), NK TEHNOLOGIJA pays tribute to the capital city of Riga, where the company has been residing since its very foundation, taking part in the local harbour’s development programme of the Krievu sala industrial area.
This is a major infrastructure project involving the relocation of the coal terminals further away from the tourists attracted by the city’s downtown and residential areas. The project is supported by EU funds, and scheduled to be finalized by the end of 2018.
NK TEHNOLOGIJA is taking an active part in the Krievu sala project, developing technological concepts for the coal handling process improvement in the area, providing its expertise on the basic equipment selection and offering solutions on the environment protection issues.
The company’s scope also includes the supply of the rail- mounted mobile shiploader with a tripper car, to handle the coal cargoes with a loading rate of 2,000 metric tonnes per hour. This brand new piece of a modern and high- capacity harbour machinery, contracted a year ago, had already been commissioned and handed over to the customer (the enclosed SLL2000 shiploader can be seen in the photographs).
The more demanding and varied the application and environment, the more robust and versatile a drive system needs to be. This is one of the reasons why the hydraulic direct drive is such a natural in the demanding environments and operation situations associated with materials handling.
Bucketwheel reclaimers handle a variety of materials, operates under different conditions and they’re exposed to the risk of overloads. A robust hydraulic direct drive system is the perfect solution ensuring that they keep on running even in the toughest of environments.
industrial heavy-duty applications. They are perfect for applications requiring high torque and low speed and really show their value when variable speed is used.
The advantages of using direct hydraulic drive systems for powering bucketwheel reclaimers are quite apparent. Its controllable variable speed optimizes the machine capacity, while overload protection and high starting torque increases the availability considerably. In addition, the highly reliable drive system for the bucketwheel features such a low weight that the load on the slewing machinery significantly reduces. This leads to both higher uptime as well as less need for maintenance.
The weight of a hydraulic motor, attached directly to the bucketwheel shaft, is much less compared to that of an equivalent alternative drive that often consists of more components and a more complicated mounting. Evidently, this weight reduction on the end of a 30–60m boom have a significant influence on the overall machine design. The drive unit can be located on the boom, closer to the machine centre, or on the slew deck.
Compounding the weight reduction with the low inertia of the drive and the subsequent reduction of shock loads, there are many heavy arguments for using a hydraulic direct drive system in the design of a bucketwheel reclaimer machine.
Another strong argument for using a hydraulic direct drive on a bucketwheel is the versatility offered by a variable speed drive. The ability to vary the bucketwheel speeds depending upon different materials and conditions means that capacity can be optimized. The possibility to monitor the bucketwheel torque condition and relate such information to the slew control offers considerable advantages.
reclaimers – both for new machines and for retrofit upgrades.
There are many possibilities to optimize all functions on a bucketwheel reclaimer by co-ordinating the control of these. With Ha¨gglunds direct hydraulic drive systems and products for linear functions from Bosch Rexroth there are possibilities to achieve outstanding performance also when it comes to applications like slewing, luffing, long travelling and conveyors, as well as for other functions that go with bucketwheel reclaimers.
built-in overload protection eliminates trip-outs and minimizes production losses in the event of e.g. materials avalanche.
Hydraulic direct drive systems consist primarily of a hydraulic motor directly mounted on the driven shaft and a drive unit including a control system. The drive unit comprising a fixed-speed AC induction motor and a variable displacement hydraulic pump. This drive unit provides a variable flow of oil to the hydraulic motor in response to a control signal, enabling the speed of the hydraulic motor to be adjusted for every possible need.
enclosed motors, they easily withstand the industry’s dust, grit and widely varying temperatures. For conveyors, however, hydraulic direct drives offer more specific advantages. Easily tailored to both task and load, they have a modular construction that simplifies design and installation. And once in place, they provide many ways to maximize conveyor uptime and minimize stresses on machinery, chains and belts.
Hydraulic direct drive systems consist primarily of a hydraulic motor and a drive unit, the latter comprising a fixed-speed AC induction motor and an axial piston pump. The drive unit provides a variable flow of oil to the hydraulic motor in response to a control signal, such that the motor’s speed can be adjusted for every conceivable need. The result is that the conveyor can be run at any speed within its speed range – without restriction. This allows soft starting sequences that minimize belt stress, for example, but also fine positioning when inching the belt in forward or reverse to inspect or replace it. Unlimited starts and stops in a conveyor, of course, speed capabilities are closely intertwined with torque. Hydraulic direct drives are capable of starting up from rest with a full load, and of accelerating it under the most extreme load scenarios. This is ensured by the very high starting torque, which can also be maintained for an unlimited period of time.
affecting the service life of the belt or wearing the machinery in general. This is done easily via the control signal to the pump, without having to stop and restart the electric motor.
Process optimization in their unique combination of variable speed control, sustainable torque delivery and protective torque limiting, hydraulic direct drives have yet another benefit. In short, they enable process optimization beyond any other drive technology. At times when there is a lower load on the conveyor belt, for example, it is possible to slow the belt speed and employ greater torque to maintain a requested material flow. This not only reduces wear on the belt, belt rollers and pulley bearings, but also increases overall efficiency.
hydraulic direct drives is the way they achieve these benefits within a very limited space, which is often all that it is available on site. Between their compact motors and the small footprint of their flexibly placed drive units, their installation is truly minimal. Moreover, the mounting of the motor directly on the pulley drive shaft means alignment problems are eliminated.
Because the design of hydraulic direct drives is modular, it allows an optimal solution to be sized and tailored for any conveyor, small or large, from a few kilowatts up to megawatts of installed power. Moreover, that solution can be adjusted down the line. With their flexible nature, hydraulic direct drives are easy to upgrade or adapt as needs change and develop over time.
perfect load sharing when two or more hydraulic motors are used on one pulley or for multi-pulley conveyor design.
The nine new and independent teams in NORDEN’s Dry Cargo Department have been in operation for a few months. “Our experience so far is very promising,” says Gregers Blaabjerg who is Head of Supramax North America and who is motivated by the increased level of responsibility that comes with the independence.
Blaabjerg is in charge of Supramax North America — one of the nine new teams — which, with the new set-up in the department, is authorized to make decisions on its own resulting in increased responsibility and transparency regarding the results generated by the team. And transparency does not just apply when the team makes good results but also when the results are less attractive.
“The high level of independence is highly motivating for the team — including me. We have a very direct relationship with our customers and the business we make. I know that I and the team have full responsibility for the transactions we make. Each team is an independent profit centre. In the previous setup, there was a smaller degree of transparency in results and it was consequently difficult to quantify good and bad decisions. The increased sense of ownership creates a foundation where everyone in the team does his or her best. This is to the advantage of our customers, but definitely also to NORDEN,” says Blaabjerg.
The objective of the new set-up with a simplification, enforcement and empowerment of the entire Dry Cargo Department — with approximately 150 employees distributed on the head office in Hellerup, Denmark and the overseas offices in Singapore, Australia, China, India, the USA, Brazil and Chile — is to implement NORDEN’s strategic decision on significant organic growth by means of increased operator activity, i.e. the combination of cargoes with chartering in of available tonnage in the market.
Furthermore, the new set-up with a strong customer focus will underpin NORDEN’s Corporate Soul Purpose which states that NORDEN works at contributing to more efficient and sustainable global trade, where every person and action matters.
Blaabjerg’s team consists of six charterers and four operators — five charterers and one operator are located at the head office while the other members of the team work at the office in Annapolis, USA.
A very concrete result of the high level of independence and thereby power to make business-related decisions, which previously had to be evaluated by managers further up the hierarchy, is that the team is much more agile — i.e. the work procedures are fast, flexible and able to adjust to the customers’ individual needs as a matter of course.
“When a customer has made a shortlist of the shipping companies, which he considers reliable and able to deliver a service of a high quality, it is decisive for him that we are not only able to provide him with a competitive price for transporting his cargo, but that we are also able to quickly provide him with the price. At the other end of the line, he is in contact with the customer, whom he will deliver the cargo to, and to calculate the total price of the cargo, he needs to know the transport costs.
“All experience demonstrates that the faster we are able to provide a binding quotation, the more likely we are to obtain the cargo contract. That is the short-term advantage. In the long term, our ability to provide a potential customer with a fast and not least binding quotation increases our chances of being contacted the next time he needs a quotation for a transport,” says Blaabjerg.
Although the nine new teams covering the vessel types in the Dry Cargo Department — Post-Panamax, Panamax, Supramax and Handysize — have a high level of independence, this is practised within a well-defined framework which has been determined based on the department’s risk management. In short, it sets out to determine how much exposure is acceptable within the different vessel types and in the different markets based on a risk assessment.
“Based on the framework provided for us, it us our task to independently utilize the business opportunities in the best possible way. This requires thorough and in-depth market knowledge, which each of the nine teams must gain independently. Of course, we also have to keep updated continuously in order for us to always know how a market is expected to develop over a two- or three-month period and thereby be able to act accordingly. We have to gather knowledge on e.g. North American grain exports for the year, but at the same time be clo+se to the supply side with regards to tonnage, thereby allowing us to be capable of acting correctly. For that reason, it is necessary to be deeply engaged in your market at all times,” says Blaabjerg.
Only if the individual teams get too close to the edge of the commercial opportunities and their associated risks, will management interfere.
He mentions another advantage of the new setup, which is that the charterers in the nine teams work much closer together with the operators due to the fact that the team also includes the operators who perform the execution of the transports.
“This significantly increases our chances of remembering to include all aspects when we assess a business opportunity, and it strengthens our focus on optimization of current voyages,” says Blaabjerg.
He says that trust between colleagues is a crucial factor in making the co-operation in a team work.
”Trust is a prerequisite if we want to be open with each other and be capable of receiving not only praise — which is typically not very difficult to receive — from each other, but also criticism, which is not always easy to receive and handle. In order to be efficient and give our customers the best possible service, we have to be able to discuss all subjects in the teams – also the cases where we have not performed well. And when you have not performed well, there is usually a lesson to be learned,” says Blaabjerg.
Although all nine teams in the Dry Cargo Department are specialized and deeply focused on each of their own business areas, it will also be necessary to draw on the knowledge rooted outside the team, more accurately knowledge which is accessible in the newly established knowledge centre in the department.
The knowledge centre is manned by colleagues, who are experts within risk assessment, market analysis, fuel efficiency and law. The centre is located in the middle of the Dry Cargo Department, but never further away from charterers and operators — including the ones at the overseas offices — than the nearest computer or phone. The centre serves as a resource for all teams.
to charter in a vessel, and who prevent us from burning our fingers because we get hold of a vessel which consumes too much fuel.
“It strengthens the work in the team to know that although we are independent, we have the great advantage that we are part of NORDEN, and I mean the entire NORDEN. We can always draw on other colleagues, who have the exact knowledge — or can quickly gather it — that we are after in connection with a future business transaction,” says Blaabjerg.
Every member of team Supramax North America has special focus areas and the purpose is that the team is to gather as much in-depth knowledge as possible in order to get the greatest overview and consequently the best foundation for doing profitable business, which encourages the customers to come back. Again and again.
coordinating focus on all areas of relevance to our team, and I furthermore focus on the team, the customers, the brokers and the strategy,” says Blaabjerg.
At the end of October, major global coatings manufacturer Hempel launched two new premium antifouling coatings, Globic 9500M and Globic 9500S. The coatings offer customers a potential 2.5% reduction in speed loss. This equates to significant fuel savings and lower CO2 emissions improving the operational efficiency of a vessel and minimizing the operator’s environmental footprint.
This next-generation coating series builds on Hempel’s proven Globic technology to deliver superior antifouling performance for new buildings and dry- dockings, delivering an outstanding return on investment and flexibility from outfitting through the entire docking interval.
Hempel’s patented Nano acrylate technology is the strength behind the Globic range and provides a fine polishing control mechanism to bring the integral biocides to the surface at a stable rate ensuring a clean hull.
By combining the strongest binder and biocide package for premium performance at different trading speeds, Globic 9500M and Globic 9500S outperform other self- polishing coatings (SPC) particularly when slow steaming.
“Our Globic range has been very well received in the market and since its launch in 2005, over 25 million litres have been delivered worldwide with more than 5,000 vessel applications achieved. Our new coating series is the next step in high performance antifouling protection”.
Additionally, the patented microfibres incorporated in the paint give Globic 9500M and Globic 9500S a best in class mechanical strength to avoid cracking and peeling. Globic’s unique technology allows it to start working as soon as the hull meets the water for full and immediate antifouling protection, making it highly efficient even for slow steaming and long idle periods.
The new coatings incorporate specially designed water-activated Nano acrylate technology that uses nano capsules to control polishing. When seawater comes into contact with the nano capsules, it penetrates the hydrophobic outer shell.The hydrophilic inner core chemically hydrolyses and then expands which breaks through the outer shell, enabling controlled polishing. Consistent self-polishing and a constantly thin leach layer ensure uniform biocide release over the entire docking interval. Unlike other premium antifouling technologies, Nano acrylate technology provides immediate antifouling protection without the need for water friction.
Special microfibres reinforce the binder, providing a skeleton effect that gives the coating enhanced mechanical strength and makes it more resistant to cracking.
Also in late October, Hempel launched its new versatile activated zinc primer, Hempadur Avantguard 860. This product combines best-in-class corrosion protec- tion, at the level of an inorganic zinc silicate, with the application benefits of an epoxy.
Hempadur Avantguard 860 is specifically designed to protect steel structures in moderate to severe corrosive environ- ments. It is the first of its class, specifically developed to overcome the problems experienced with zinc silicate primers application, without compromising corrosion protection and boosting productivity.
In response to general industry concerns over curing times and application properties of zinc silicates, Hempel’s new product, with a recoating interval of just one hour, offers at least four times faster drying than coating systems based on zinc silicates. Highly flexible and versatile, this new coating can be applied year-round and at temperatures down to 14 °F/-10°C, and with no restrictions on minimum relative humidity.
Hempadur Avantguard 860 is a SSPC Level 1-compliant two-component activated zinc rich primer, that delivers excellent protection in severely corrosive environments. It incorporates Hempel’s patented Avantguard technology offering a unique combination against corrosion, providing improved barrier, inhibitor and galvanic protections in a single coating for all-round performance.
no need for a mist coat as required for inorganic zinc silicates.
Since 1915 Hempel has been a world- renowned coatings specialist. Today, it has over 6,000 people in 80 countries delivering trusted solutions in the protective, decorative, marine, container, industrial and yacht markets. | 2019-04-24T15:52:20Z | https://www.drycargomag.com/bulking-up-in-the-baltics |
"A game where users can virtually practice archery"
Since this game was also designed for our culminating design experience (CDE) course, we wanted to incorporate a variety of different topics. We decided to use a stretch sensor to simulate the bow string since it would change resistances based on how far back we stretched it. Creating a voltage divider with this made a simple and effective way to determine the length at which the bow string was stretched. Using the accelerometer also seemed like the simplest way to determine tilt, which was necessary in the calculation of the physics for the system. The TV also had a straight forward RCA connector that would make it easy to connect to and display our target. Since we didn't have to display any moving objects we knew that flickering would not be a problem. This seemed to make using the TV the most effective solution for a display. After trying to meet our requirements using the most effective and diverse solutions, the layout for our project simply came together.
An arrow flying through the air can be modeled as a simple projectile. By defining the center of our coordinate system at the center of our target, it is relatively simple to develop a set of equations to map several input variables into positions on the target. In the vertical direction, we simply start with acceleration due to gravity and integrate twice to find the arrow's position at any time. In the horizontal direction, we begin with the horizontal component of our initial velocity and integrate once. With both horizontal and vertical positions known in terms of time, we solve for the vertical position in terms of the horizontal position, and then the vertical position at the target.
This equation is now simple enough that, even without fixing many of the values, it could be evaluated in real-time on a microcontroller. However, because our setup calls for only one independent variable, we decided that it was simpler to generate a lookup table of values that fall on the screen. One further layer of math was added during this step to relate the actual reading from our accelerometer to the acceleration, and thus the output. This relationship was determined by our hardware setup and the specifications of our ADC's datasheet.
In order to function with the LCD television, or in fact any television operating on the NTSC standard, the microcontroller must continually generate a video output. The code to do so is adapted from previous labs performed during ECE 4760. An interrupt is triggered precisely once per video line and the bits to generate the image are sent out of the UART. This code takes up a large portion of the microcontroller's processing time and prevents other interrupts from being used, which constrains some of the other code needed to run the system.
The accelerometer is a sensor that changes acceleration into a signal that can be used in an electrical domain. Our particular device outputs a voltage that is proportional to the magnitude of the acceleration. To use this acceleration in our program, this voltage had to be converted into a digital form. We chose to use an external ADC for two reasons: 1) the physical distance between the accelerometer and the microcontroller is very large, significantly increasing the potential for noise to corrupt the signal, and 2) the precision of the on-board ADC is only 10 bits. We chose to sample a 13-bit differential ADC, which returns a 2's compliment value via SPI. The negative input was set to roughly remove the offset of the accelerometer, and the reference was set roughly to Vcc/10 to increase the precision of the measurements.
The stretch sensor is essentialy a large resistor that changes resistance with length. The material is made up of carbon-black impregnated rubber with a resistance of about 350 ohms per inch. Since the stretch sensor is about 1 meter (39 inches) long, the total resistance of the stretch sensor is about 13.65 Kohms. As you stretch out the stretch sensor, the resistance increases linearly - about 350 ohms for every inch that it is stretched out. Once the stretch sensor is released, it takes some time to revert back to its original length. For our purposes, we only needed to wait about a second for the signal to get below our selected threshold.
Other miscellaneous pieces include the LEDs and the button. A bar/dot display driver is used to operate the 10 blue LEDs along the length of the drawback. Future modifications to this design could implement this driver in a way that the bar and/or dot modes are fully utilized - in our design, it is simply used in an on/off mode. The button is a simple pushbutton mounted to the bow. It is debounced in software.
There is very little leeway in this project to adjust our hardware versus software usage. The accelerometer output has a low-pass filter in hardware that we further supplement with a low-pass filter in software. Due to the non-ideal properties of the stretch sensor, sensing the draw and release of the bow would be difficult and possibly unreliable in hardware. Debouncing the pushbutton is currently performed in software, though it could theoretically be done using a capacitor. However, hardware and software debouncing are cheap enough that either or both could be used.
By necessity, video is sent to the LCD TV using the NTSC standard. Due to the limitations of the microcontroller, a much simplified video standard is implemented which only allows points to be drawn.
Communications with the external ADC are governed by SPI communications standards. The ADC is not a true SPI device, though, as it sends but does not receive data.
We do not anticipate any potential intellectual property issues.
Video generation code for ATmega property of Bruce Land.
The important software sections are comparable to the important sections of the system. There is a large section of code dedicated to generating the images on the TV screen, there are methods for getting and interpreting accelerometer values, and there is a state machine for determining when the bow is drawn and released. The state machine for the game is then layered on top of this bow functionality.
The main loop and video interrupt have been modified to integrate the state machine for our own project. This extra code was added during the time when nothing is being drawn on the TV screen, after line 251. There was no need to weave any code in between the drawing of each line since our operations were relatively fast.
Interfacing with the accelerometer is made simpler by the SPI communication hardware built into the microcontroller. By properly setting the SPI control bits, the entirety of SPI communications can be handled with the SPI data register and the SPI status register.
A method is defined purely to send one byte of SPI data. This is used in a function that pulls down the chip select line for a specified device, then gets two full bytes of data from that device. One more function further wraps this, which properly formats the returned integer by extending the 13-bit 2's compliment value to 16 bits.
After the button has been pressed, the user enters the stage of the game where they can actually draw the sensor, aim at the target, and release the sensor. At this point, the microcontroller's internal ADC begins taking and converting the voltage from the stretch sensor into digital values. When the stretch sensor is fully drawn, there is a spike in voltage that goes above our set digital threshold of 660. When this threshold is reached, a timer begins to countdown from a second in order to account for the settling time of the stretch sensor to go back down below this threshold.
At the same time, the LEDs connected to the LED driver all light up, indicating that there is a virutal arrow nocked to the bow. After a second has passed, the user has the ability to release the stretch sensor. A similar ADC conversion occurs, with a digital threshold of about 710. Whenever there is a quick change in the amount of pressure along the sensor, the sensor increases rapdily in resistance, causing the voltage to spike. We were able to take advantage of this spike to determine when the sensor is released. After the release of the stretch sensor, the accelerometer is used to calculate where the arrow should have landed and displays its location on the TV. After this, the user can repeat the process of drawing the stretch sensor back, aiming, and then releasing.
When the game first starts up, a splash screen appears on the LCD TV that explains how to use the bow and the rules of the game. Once the button is pressed, we enter the initial play state. The target appears on the screen, and we begin to sample from the ADCs.
The accelerometer is sampled once per frame. We hold onto the past 8 accelerometer measurements so that when we want to use the accelerometer value, we can average several measurements together to obtain a better estimate of our tilt.
When the internal ADC tells us that the bow has been drawn, we turn the LEDs on and enter a waiting state. As soon as we sense the release of the string, we turn of the LEDs and average the accelerometer readings. We then look up what position the mark should be drawn at based upon the averaged reading. The score associated with this position is added to the total, and the mark is placed.
After the third arrow is fired, a new message appears on the screen prompting the user to press the button to continue. When they do, a screen appears with their score on it. Pressing the button again returns to the initial game state.
There is one major hardware component to our design, and three minor ones. The part requiring the most hardware is the accelerometer circuitry. The minor components, in order of decreasing complexity, are the stretch sensor, the video generator, and the pushbutton. These components were all brought together on a plastic toy bow.
The accelerometer used has a sensitivity of 50mV/g, centered about the middle of the supply voltage. We used the datasheet-recommended low-pass filter to connect the output of the accelerometer to our 13-bit differential ADC. The negative input of the ADC is connected to a voltage divider set to midrange in order to remove the offset from the accelerometer readings. The voltage reference for the ADC is another voltage divider set to roughly divide the voltage rail by ten. This is needed because the accelerometer is designed to sense up to 40 g, while we are only interested in 1 g measurements.
The other three subcircuits used are no more complex than voltage dividers. They are discussed here.
The stretch sensor is essentially a rubber band that has been doped with carbon. When it stretches, the distance between the carbon atoms increases, increasing the overall resistance of the sensor. Thus, in the circuit model it is simply a variable resistor. A fixed resistor is used to create a voltage divider that can be used to determine the stretch of the sensor.
There are 3 important voltage levels when generating NTSC video. There is the sync level, at zero volts. This voltage level is used to control the device. There is the black level, at 0.3 volts, which specifies that nothing should be drawn at a certain pixel, and there is the white level at 1 volt, which specifies that a pixel should be white. By attaching two output pins to a voltage divider, these levels can easily be generated.
Video output (source: 4760 video generation page).
The pushbutton is hooked up to an input on the microcontroller with an internal pull-up resistor. It is connected to ground on the other side. When pressed, the voltage at the pin drops to zero volts.
The pushbutton and internal pull-up resistor.
To enable the simulation of an "arrow", and to provide a mounting point for the accelerometer, a plastic tube was mounted to the toy bow. A hole was expanded, then the tube was inserted and glued into place. Electrical components are held to the bow with only zip ties. Zip ties are further used to tie together the bundle of wires going to the bow.
The execution of our program was fairly fast with a few minor exceptions. In order to compensate for the slow settling of the stretch sensor, there was a necessary 1 second delay between the drawing of the bow and the release of the bow added. This shouldn’t be too much of a problem as it typically takes about this long for the user to draw back the bow string, to aim, and to release the bow string. As expected, the TV refreshes at a rate of about 60 Hz without noticeable flickering. Our LEDs also light up/turn off at the right time with no noticeable delays. The timing and order of our game are also right on target with what we wanted.
In order to enforce safety, we made sure that all of our wires were organized in a way that wouldn’t get in the way of the user, causing them to hit something or trip. Any exposed wire was covered with electrical tape, and the stretch sensor is placed on a notch when not in use, keeping it from moving around.
There is no real interference with other people’s design since we weren’t using any radio or other wireless communication, nor were we using any infrared LEDs over long distances as originally expected. The brightness of the blue LEDs simulating an arrow may cause some visible light noise at very close ranges, but we don’t expect to be using our project near any other workstations.
The bow is also very intuitive and easy to use. There is a list of instructions on the start-up screen to explain how to play the game. Our project is intended for people with full functionality of both their arms, as you are required to hold the bow with one hand and pull the bow string with the other. However, with some additional mechanical modifications, it may be possible to play this game if a person has special needs.
Towards the end of our time designing our project, we realized that a couple of features that we wanted to add to our project could not feasibly be added in our allotted time frame. We wanted to use infrared in order to determine the distance and position of the bow relative to the target. The first complication was that the math calculations got very complicated and time consuming. Even amidst these calculations, the range that the bow could feasibly sense the infrared LED was just a couple of feet. This was not enough to create an entire archery game. Other than that, we were able to meet the rest of our expectations. We were able to successfully determine the orientation of our bow using the accelerometer and the stretch sensor worked well enough to determine when the bow was being drawn and released. We were also able to display everything correctly on the TV without too many issues with timing.
Next time, we might replace our current stretch sensor with either an accelerometer or perhaps a linear potentiometer. It takes a long time for our current stretch sensor to drop back to its original size after being stretched; this made it seem like our bow is drawn when it really isn’t. This problem was solved adding a second delay between drawing the bow and releasing the arrow. However, an accelerometer could have used the motion of the bow string to accurately determine when it was being pulled. A linear potentiometer attached to our bow string may have also provided a more accurate representation of the amount the bow string was pulled back. This would have solely depended on the position of the draw string as opposed to its elongation. With more time, we may have also implemented a camera to sense the location of the target. In this case, we would have three indicators on the target. We could have used the distance between each indicator as seen by the camera in order to determine how far we were from the target. The absolute location of the indicators would then be used to determine our tilt.
One standard that was used was SPI for the communication between the microcontroller and the external ADC. The only thing different that the standard SPI was that there was no MOSI line connected to the ADC. Since the ADC did not have any memory, there was no way to write to it. The ADC instead relied on the clock supplied by the microcontroller to send its data. The normal MISO line was connected to the microcontroller from the ADC. In this case, there was only one slave; therefore, only one chip select line was needed. The only other standard that was used was NTSC. The main difference between this standard and what we used was the type of scanning we used. We used progressive scanning, so every line of each frame was drawn in sequence. The standard calls for interlace scanning, which is writing to every other odd line in a frame, then coming back to fill in the remaining even lines in the frame. This allows the TV to appear to have a refresh rate that is twice as great as it actually is, which was not necessary for our project.
There really aren’t any intellectual property considerations for this project. The only code that we used was the TV code from the ECE 4760 website, which is in the public domain. However, we did give credit to the users who developed the code in the form of comments at the beginning of our program. We did not reverse-engineer a design, so there were not patent/trademark issues to deal with. We also did not have to sign a non-disclosure to sample any parts. There really aren’t any patent opportunities for our project, making it difficult to justify publication.
There were a couple of considerations to be made concerning the IEEE Code of Ethics. During the design of our project, we made sure that the user will be free of any injuries. There are no high voltage/current sources that could hurt a person using our project. The only moving component, the stretch sensor, was also quite soft, making it extremely difficult for someone to hurt themselves using it. We gave credit when using the code from the ECE 4760 website in order to prevent any perceived conflicts of interests. When stating our lists of cost estimates, we were accurate and honest, not concealing any potential costs that we know of. We were also quite self- critical of our own design, accepting honest criticism of our work to help us improve. Of course, we are not biased towards anyone based on any factors, such as race, religion, and national origins. We understand that some people with physical disabilities may have some trouble using our project, but we tried to make it as accessible as possible given our criteria. Helping our other colleagues was also always an option as our end goal was to learn as much as possible from all our available sources. Helping others not only helps our colleagues grow, but ourselves as well. Overall, we honestly tried to create the best project that we could given our time constraints, and we were honest with others and ourselves throughout the process.
This section provides links to external documents, code, and websites referenced and used throughout the project.
We would like to thank Bruce Land for his instruction and guidance over this past semester, and especially for his assistance in finishing this final project. We don't know that we would have made it through this course without him.
We would like to thank the TAs in 4760 for helping us debug our obscure lab issues, in particular Young Hwa "Terry" Kim for putting up with us week after week.
We would like to thank Microchip for allowing us to sample their products, and for making ADCs that are simple and painless to interface with.
We thank CUAUV for providing us with a workspace for our all-nighters furnished with computers, a soldering iron, a dremel, and couches for when we're sleeping (i.e. never).
We would like to thank Legend of Zelda: Ocarina of Time for remaining one of the best games of all time.
Mike would personally like to thank Mountain Dew and beef jerky for sustaining him over the neverending night. | 2019-04-24T22:39:31Z | http://people.ece.cornell.edu/land/courses/ece4760/FinalProjects/f2012/ma496_mdr87/index.html |
Some of you know that I did last weekend’s Memphis in May mountain bike triathlon. But what you probably did NOT know is that this was the first time, in over a hundred triathlons, that I did one without training properly for it. I know, I know … stupid.
And I had NEVER raced a mountain bike, ever. In fact, I hadn’t even RIDDEN my mountain bike in a couple of years. Up until a couple of weeks ago it was in Chattanooga with my son Nathan.
On top of that, I swam in the triathlon using a wetsuit that was too small for me, making it difficult to breathe at all, gasping for air in the middle of a lake with others swimming on top of me.
Remember last week’s newsletter? I wrote about fear. Little did I know that I would be replaying those words in my head within days.
At about 100 yards into the 1/3 mile swim I realized I’d made a critical error in judgment. I was already out of breath, my heart was beating out of my chest, my goggles were fogged up and I couldn’t see anything, and the straightjacket, I mean, the wetsuit I was wearing, made swimming ridiculous — imagine a T-Rex, with those little tiny dinosaur arms, trying to swim.
I somehow managed to flail over to a lifeguard canoe and grab the side of their boat. One of the guards onboard asked if I was done. Boy, was I EVER!! I couldn’t WAIT to crawl into that canoe and call it a day. “Permission to come aboard, sir?” was what I was thinking.
No??? NO??? Just need to clear my goggles???
So I cleared my goggles and took off again. Somehow I managed to flip, flop, thrash, and splash around the swim course, on the verge of panic and distress, by an act of my will, trying every stroke that those about to drown make. I tried to imagine a way I could quit without embarrassing myself. But I could see the headlines: “Boot Camp Guy QUITS Triathlon” “Sergeant Tony Pulled Out of Lake by Little Teenaged Girl Lifeguard.” Oh, the humanity.
So I breast stroked. I back stroked. I side stroked. I dog paddled. And I was really glad that the swim cap and goggles hid my identity. According to the clock, the “swim” took me less than 15 minutes, but it felt like an eternity and I hated, hated, HATED everyone of those minutes.
Fear, ladies and gentlemen, for lack of a better word, is good … when you face it, embrace it, and do it anyway! Fear overcome makes you stronger and pushes the envelope and the boundaries of your comfort zone. That the comfort zone is for sissies and spectators ought to inspire you to get out of it. The comfortable seduces you to stay. But the comfort zone is boring, dull, and monotonous.
I’ll give you today what I gave them yesterday; my 5 strategies for facing your fears.
1. Scream like a girl. Seriously. If you ARE a girl you can get away with this. If you’re a guy, not so much. You’ve got to pretend that you’re not wetting your pants or that ball bearings of sweat aren’t rolling down your back, soaking your socks. What this really means is that you acknowledge that you’re afraid and move on to the next step. Naming the fear is the first step to overcoming it.
4. Get up on your toes and off your heels! This is about body language. If you want to guess which tennis player or which boxer is going to lose, ignore the score and look at their feet. Look at their body language. Winners are up on their toes and agile. Losers are back on their heels, slow, and sluggish. So stand up straight! Sit up! Heads up! Shoulders back! Look the challenge in the eye and with a shout, beg it to throw down its best shot! Think Lieutenant Dan in “Forrest Gump” up on the mast of that shrimp boat in the middle of the storm.
5. Tell yourself you CAN! Positive self talk wins, negative self talk loses. “I can do this, I can do this, I can do this … ” Momma always said, “if you can’t say something positive, don’t say anything at all.” That applies to how you talk to yourself too. In fact, the conversations you have with yourself are the most important conversations you have. Don’t snivel to yourself or others. Don’t whine to yourself or others. Don’t act like a crybaby, a chump, or a victim, not to yourself and not to others. JUST DO IT!
Oh, by the way, I came in second in my age group.
Yes, there were more than two of us!
When some of you are going to come back to Boot Camp. Some of you reading this newsletter haven’t been in a LONG time … and you KNOW who you are. Have the comforts and weight gain of Turdeville seduced you into being a slackerdog-loser-gutterslug?
The exit ramp to Turdeville is downhill, paved, smooth, and lined with smiling people. The ramp back onto the Fitness Super Hiway is uphill, pockmarked, littered with construction trash, and lined with people telling you to turn back.
Get out of Turdeville! Or … you can get on a first named basis with the staff at Casual Male XL, Lane Bryant, and your cardiologist’s office staff.
USMC Fitness BOOT CAMP — Midtown ROCKS! Evergreen Presbyterian Church, across the street from Rhodes College, Monday through Friday, 0530! Commanders Theresa Andreccetti and Holly Guthrie are leading the charge in Midtown! Join ’em! If you’re a regular at Christ Methodist, but you live in midtown, feel free to drop in!
Speaking of triathlons, last weekend the following Boot Campers did one of the Memphis in May triathlons: Wendy Ludlow, Daniel Shaffer, Andrew Forsdick, and Lisa Park! This was Lisa’s FIRST triathlon! Way to go Lisa! Congratulations guys!
Instead, let’s run the Zoom Through the Zoo 4 miler at 6:30. Race day registration begins at 4:30!
Monday is Memorial Day. The day we set aside to honor those who’ve died in combat. We will only have ONE WORKOUT on Monday at 7 AM. Wear your running shoes, bring your weights, and bring a friend!
Thank you so much for your support and the donations you gave to help meet the needs of the family whose home was burned down. They are in a furnished apartment now and are actually helping yet another family who was burned out of their home too! Isn’t that the spirit of giving! Thank you everyone who donated!
Traditionally the 0830 class, which meets only on Monday, Wednesday, and Friday, goes on hiatus for June, July, and August. If you’re a regular member of the 0830 class and you WANT that class to continue through the summer, you need to email me and let me know. If a significant number of you 0830 boot campers want to continue through the summer, I’ll keep that class on active duty.
“LET GO! I’LL CATCH YOU!” pleaded my older brother Jack.
I was little, probably 5 or 6 years old, and stuck up in a tree in our backyard. I’d climbed up, but now I couldn’t seem to figure out how to climb down. I was scared. Jack tried to tell me how to climb down, but fear had me frozen in place. Now he was telling me to let go and trust him to catch me.
Last year I gave my youngest son, Nathan, a “book” that I’d written for him. The book was to be one of his high school graduation presents. I’d taken 18 months to make regular entries in a journal that might serve as a guidebook about life and living, as best as I understood it. I wrote about all kinds of things covering a wide range of topics from money to relationship building to time management to decision making to confidence and insecurity. I wrote about lots of things. I even wrote about women! (That was a very short entry, given my lack of understanding of the subject!) Several entries in the journal dealt with the subject of fear and how to deal with it.
There’s a book out there entitled “Embrace the Fear and do it Anyway!” I haven’t read the book, but I love the title.
Courage is often mistakenly thought of as a lack of fear, but in fact courage is always accompanied by fear. Only crazy people don’t feel fear in a dangerous or threatening situation. Bravery is simply overcoming the fear and taking action anyway!
Most of us are afraid of the same things. I’m not talking about snakes, or spiders, or the like. I think we’re all afraid of the unknown, death, rejection, and failure, to name a few. Those things are common to us all. But why do some people sit in one place and watch, while others do?
I’d like to encourage you to be a DOER!
Overcome your fears by acknowledging them and then DO IT! ENGAGE! EXECUTE!
Today, look at your life though adventurous glasses and consider what you would you do if you knew you could not fail.
Ships are made for the ocean, not the harbor. You weren’t put here to “play it safe” but to live an “abundant life!” So set your course, weigh the anchor, trim the sails, hoist the colors, and get underway!
When I let go of the tree … Jack caught me, put me on my feet … laughed … thumped me on my head and called me a sissy!
And that was the last time he ever called me that!
Don’t y’all be no sissy!!
This week we acknowledge those in law enforcement. In particular we honor those law enforcement professionals who’ve given their lives in the line of duty.
Our own David Townsend is a Lieutenant on the Collierville Police Department.
And new-ish Boot Camper Michelle Dunn is the widow of Shelby County Sheriff’s Patrol Officer Tim Dunn, who was killed in the line of duty in October 2004.
To David and Michelle, and to all of our law enforcement professionals, we thank you!
I want to thank you all for your continued support and the donations given to help meet the needs of the family whose home was burned down. Your donations are still greatly appreciated.
Come and get your one hour of cardio with some fellow Boot Campers!
In June we’ll begin a 0645 class at Christ Methodist. That 0645 summer class will go for June, July, and August, meeting on Monday, Wednesday, and Friday.
I know some people who have some pretty detailed plans for the things they will do in the next year, 3 years, 5 years, and even beyond. (I have a Japanese friend whose company has a 100 year plan!) One of my best friends is a detail oriented guy who has very specific plans extending several years down the road. I also know people who don’t have much of a clue what they’ll be doing 5 minutes from now.
That answer took a while.
Sometimes we parent “accidentally.” It happens, it just doesn’t happen with a purpose or a plan. In the day to day hustle and bustle of domestic life, filled with after school activities, the mystery of “what will we eat for dinner,” book reports, homework, and American Idol … intentional parenting can often be lost within that over extended family agenda. As a dad who had limited uninterrupted time with his kids, I had to parent intentionally. I had to have a plan and a purpose. I would often jot down things during the week that I wanted to discuss with my kids face to face on the weekends.
What are you doing intentionally? You’ve got a lot of roles to play within the many contexts of your life. Which of those roles are being addressed purposefully and which ones are hit or miss?
When you consider the plans for your life, are you taking charge or flying by the seat of your pants? I’m not saying that having detailed plans for every role is the right way to live. I’m saying that living with intention and purpose, with or without a detailed plan, is the right way to do it!
And of course you know that I’d have to challenge you to approach your health and fitness with purpose and intention. One of you told me that the reason you come to Boot Camp is so that you don’t have to think about what to do. You trust me to guide and direct you. That works too. (That’s one of Boot Camp’s best selling points. “Just do what Tony says!”) You’ve got a purpose and an intention. Coming to Boot Camp takes you from the plan and intention phase to the key phase, the main phase: execution.
The power of intention is awesome, but the power of execution is life changing! Life rewards action!
Would you like to run with some Boot Campers tomorrow? There are two informal USMC Fitness BOOT CAMP groups running tomorrow morning. One group is meeting at the U of M at 8 AM in front of the Zach Curlin parking garage. That group is planning on running for an hour straight. Another group is meeting at 9 AM at Shelby Farms in front of the Visitor’s Center. That group will be running the 1hr 45 min @ 5 min “on” and 1 min walk break format.
In the day to day of my job, I hear a lot of excuses. Very few from you guys. Mainly because you guys know better.
I hear a lot of excuses from people who tell me why they can’t do BOOT CAMP with me.
It’s the problem of too many too’s. Too hot. Too cold. Too early. Too late.
People do what they want. Period.
People change when the misery of staying the way they are becomes greater than the misery, work, or fear of changing.
If you’ve got a friend or family member who needs to change their lives, point them in the right direction. Encourage them to get on the right path. But the bottom line is: they’ll only change when they WANT to change.
or are you actually interested in adding years to your life?
stable is no way to go through life.
~ Mehmet Oz, M.D. and Michael Roizen, M.D.
You might recognize those guys, Oz and Roizen. They’re the co-authors of “YOU: The Owner’s Manual and YOU: Staying Young.
Doctor Oz, as he’s affectionately known in “Oprah World,” is ubiquitous, and deservedly so.
The questions he asks in the quote above are worth thinking about and considering.
What exactly are we after?
Sometimes we exercise and eat right for vanity reasons. We want to look good.
Nothing wrong with that … so long as our desires to “look good” aren’t obsessive and our self esteem and sense of self worth aren’t derived from our looks. (I’ve personally got some issues with cosmetic plastic surgery, but I’ll leave that for another day.) But let’s be honest here. We all want to look good, or as good as we can. We aren’t satisfied with looking good “for our age,” we want to look good … PERIOD!
Each of us knows people who live their lives years older than their chronological age. They whine and complain, gripe and groan, existing through their days within the narrowing and restrictive boundaries of their myopic view of life and living.
Any of us can spend our time making excuses, imposing life limitations, living within nearsighted boundaries, acting old, sounding old, living a life of daily diminished capabilities and capacities … or we can be positive, vibrant, and energetic! It’s a daily decision. We wake up everyday with a choice. Today is all we’ve got! Yesterday is gone, tomorrow hasn’t happened and today is the only moment that we have. How we live this moment in time is determined by our attitude. Attitude affects everything from our body language, the tone of our voice, the expression on our face, the look in our eyes, the course of our life.
Adjust yours now. Crank it up! Pump it up! Jazz it up!
Your attitude determines if you’ll be fit … and it determines if you’ll be happy. It’s a choice.
Attitude is everything. Choose a good one … right now!
Traditionally the 0830 class, which meets only on Monday, Wednesday, and Friday, goes on hiatus for June, July, and August. If you are a regular member of the 0830 class and you WANT that class to continue through the summer, you need to email me and let me know. If a significant number of you 0830 boot campers want to continue through the summer, I’ll keep that class on active duty.
COMBAT CHALLENGE — PROGRESS REPORT FOR APRIL 25, 2008!
The Combat the Fat $5,000 Weight Loss Challengers have completed their second month of the six month challenge! Here are the results as of last Friday’s weight loss, with the Combat Challengers identified by call sign. These results are the percentages of body weight each person has lost so far.
Congratulations go to the following Boot Campers who ran and finished the Nashville Half Marathon (13.1 miles) this past Saturday: Wendy Ludlow, Margaret Caffey, David Caffey, Rob Norcross, Elizabeth Stacey, Tabitha Ottiwell, Cindi Pontoni, Patty Kallenburger, and Estelle Winsett! Way to go everyone!!
My friend, Karyn Waxman, is the Director of the local PKD Foundation (polycystic kidney disease) has an annual golf tournament and charity auction to raise money and awareness. Three years ago Team Boot Camp had a 4 man team that competed in this “best ball” tournament. We had a GREAT time and came in dead LAST!
Well, the sting of that day has subsided and I’m wondering if we might have a few brave souls out there to play again. The four person scramble is at 1 PM, Monday, May 19. Entry fee is $200 each and FEATURES: Welcome Gifts, Golf Clinic, Boxed Lunch, Mulligans, Putting and Driving Contests, Closest to the Pin Competitions, Beverages & Snacks, and the Dinner Awards Banquet.
Our government is sending us some mad money. Spend it on a year of Boot Camp! Your Government will thank you and so will your Drill Instructor!
When you stop moving, it’s over!
The ancient historian, Thucydides, wrote a history of the war between Athens and Sparta, known as The Great Peloponnesian War.
My newest hero is living proof of the truth of this adage.
Who is my newest hero?
He’s a 75 year old Californian named Don Wildman.
Don, a life long workout freak, leads — that’s right LEADS — a daily workout that he calls The Circuit. Mr. Wildman’s workout sounds much like our Storm Chaser. I read about Don in the May issue of Esquire magazine. (I’m pretty sure Don is my real father! Sorry Dad).
This man does it all … and has done it all, including 9 Hawaii Ironman Triathlons, the 3,000 mile Race Across America bicycle race, and lots of marathons. Name the adventure and he’s probably done it or is training to do it … at 75! He surfs, mountain bikes, snowboards, plays golf, rock climbs, bike races, runs, swims … meaning that’s what he DOES those things, not DID them!
And on top of that he leads The Circuit.
When you stop moving, it’s over.
Need the Cliff Notes for that one? Here it is: MOVE!
How simple is THAT? How incredibly accurate?
Just shut up and MOVE!!
Check your excuses at the door and MOVE!
Don Wildman knows that Thucydides was right … and now you do too!
April is almost over, but it’s not too late! You can bring a friend to Boot Camp during April for a FREE DAY! No strings attached.
The Boot Camper who brings the most friends in April will get $100!!
1. You get one point for each visitor you bring.
2. Your visiting friends must be prospects for membership.
3. If your visiting friend joins, you get double points.
4. Repeat visitors don’t count beyond their first visit.
In addition, your friends can join USMC Fitness BOOT CAMP for only $90 in April! Only your friends and family can take advantage of this deal. New recruits taking advantage of this special discount MUST have a sponsoring friend who IS a Boot Camper in good standing. It’s for our friends and family only.
It’s that time again, you runners who listen to your iPod!
It’s time to send me your 5 or 10 favorite song titles for running, or the last 5 or 10 that you’ve downloaded for the purpose of running!
I need some new tunes for the Nashville Half Marathon and I’m willing to download some of YOURS! Just send me the song titles and artists and I’ll check ’em out! | 2019-04-21T14:08:49Z | http://usmcfitnessbootcamp.com/blog/2008/05/ |
Share protocols and ask for sample preparation advice.
I'm trying to familiarize myself with different column making protocols, as well as the benefits of different columns (differences in resins, frits vs. no frits, column diameters, etc.). Can anyone explain the benefits of using certain setups and columns over others?
I have used three different procedures which I can describe here. For all three methods I used a precolumn for fast loading and an analytical column for separation.
We purchased C18 cartridges and a peek holder that we used for precolumns. I can't remember who we purcahsed them from but it could have been upchurch. Analytical columns were pico frit columns purchased from new objective. They were 50-76 um ID with 10 um tips and had an integrated frit in the tip which was nice. I then packed them using a bomb with C18 packing material. 5 um particle size with 300 angstrom pores. I think we purchased the packing material from michrom (Magic C18). But packing material could probably be a whole other other thread all on its own. We resuspended the packing material in 50:50 ACN and MeOH and packed the columns to abotu 25 cm.
This method actually seemed to work pretty well. The columns almost never closed or closed up. But it was very expensive. If you can afford it this is a good way to go but you will be spending a lot of money. I guess if you dont have access to a laser puller it might be reasonable.
2) The bottle neck method.
I later used a method that is described in thispaper from the Hunt lab. Making the analytical column involved pulling a silica capillary using a laser puller just enough to make a bottle neck through which packing material could not pass. And then packing your column behind it. It was sort of a delicate method but it worked pretty well. I think there are easier ways to do this now though and I wouldn't recommend it. Some people just pull tips and pack right behind them, no frit or bottle neck, and this seems to work fine. I have no experience with that method but it seems like it might be a really good option. Hopefully someone else will post about it.
This one involves making frits by polymerization of Lithium Silicate inside the capillary. It is patented by Jarrod Marto. I am not sure about the legality of sharing this method but you can check out the patent here. It works great. Occasionally these tips did start to emit bubbles which disrupted the spray a tiny bit (could be a problem for quantitation). Also, pulling your own tips can be a bit delicate. This is the same for method #2. They have a tendency to close up and clog. The picofrit tips from method #1 were pretty robust to those problems.
Anyway, that is just my experience. Hopefully that help a little bit.
I have also used all three procedures listed above. Of those three, technique 3 is the best compromise in terms of price (a few dollars per column), durability, and ease of fabrication. Of course, technique 3 (detailed here) will work best for analytical columns with integrated emitters if you have access to a laser puller. Read the supporting information in this Ficarro/Marto paper for details. In my experience, trying to pull a tip with the cast frit in place by heating followed by manually pulling a tip is a recipe for disaster. This polymerized silicate-based frit works much better for precolumns compared to making sintered frits because no capillary coating is removed for fabrication and no flame or spark is required for polymerization, just gentle heating.
Doug is correct about the tendency to emit bubbles with technique 3. In fact, this was often so severe that I abandoned the use of this frit technique altogether a few years ago. My first few months in grad school I would often watch LC-MS/MS runs through their entirety via the camera we had focused on the emitter tip at the MS capillary inlet (I know, such a dedicated student). There were portions of the gradient that were bubble free (usually the beginning) and others where bubbles were emitted at 5-10 Hz. This bubble problem became much worse as I tried larger capillary inner diameter (up to 200 um i.d.). This sort of problem (bubbling/outgassing at column frits) has plagued electrochromatographers for decades and is not unique to this style of frit fabrication. A combination of the pressure drop at the frit, the high surface areas of the frit providing lots of bubble nucleation sites, and maybe some minor Joule heating at the frit from the application of ESI voltage, all encourage bubbling. The only real solution to this bubbling issue is to completely degas buffers and maintain a blanket of helium over the mobile phases at all times. This is not practical for our lab because we have more mass spectrometers than LCs so we are constantly moving our LC systems (Waters nanoACQUITY) around the lab and short of setting up helium stations at each mass spec, continuous degassing simply is not a practical option.
Waters nanoACQUITY systems have vacuum degasser systems, but are bypassed for nanoflow applications. A Waters service engineer explained to me that the cylinder volume of each pump head is ~ 50 uL, so cylinders are not going to refill very often at 300 uL/min. Meanwhile, mobile phase sits in the degasser chamber under vacuum for hours. This probably isn't a big deal if you use all aqueous or all organic mobile phases, but the concentration of mobile phase mixtures will definitely be affected, as will the concentration of volatile mobile phase additives, being under vacuum for so long. Sparging/degassing without blanketing the bottles with helium is a temporary fix as Henry's Law dictates that the concentration of gas dissolved in solution is directly proportional to the partial pressure of the gas above the solution. Helium has incredibly low solubility (relative to N2, O2, and CO2) in water and common organic solvents for LC and will sweep those gasses out. As long as helium blankets the mobile phase after sparging the amount of dissolved gases in the mobile phase will be very, very low and bubble formation should be minimized. If you sparge/degas and then let the mobile phase sit exposed to the atmosphere for a few days, additional sparging/degassing will be required otherwise you will again suffer the consequences of Henry's Law.
Okay - so my preferred technique for making analytical columns with integrated ESI emitters comes with a disclaimer...I use hydrofluoric acid and this stuff is really, really nasty. Read the MSDS and be very knowledgeable of the risks of using HF. I always keep a tube of this stuff handy in case HF should happen to spill on my skin. I clean capillaries very thoroughly with methanol, pull a tip with a laser puller making ~ 1 um diameter tip. I immerse the tip into a polypropylene tube containing 50 uL of HF for 1-2 minutes and then flush methanol through the capillary for 2-3 minutes. HF etching has a couple of advantages, 1) it increases the tip diameter to about 5-10 um making packing much easier and greatly reduces the incidences of tips closing/clogging, 2) it thins the exterior bulk of the tips making a fine tip promoting more stable electrospray, 3) the tip can be salvaged when the laser puller is not pulling ideal tips (with 15-20 users, our laser puller is not always is perfect pulling condition).
Could I optimize tip diameter/geometry this with a laser puller? Probably. Would I have to spend a day each weak tweaking the laser puller settings? Nope, probably two days. After etching and cleaning the capillary I pack with my favorite stationary phase using a device similar to this product. At 800 psi, I can pack an acid-etched column (75 um i.d.) to 15 cm in about 30-45 minutes. All of this work gets me a column with an emitter that almost never clogs, has robust bubble-free spray, and awesome chromatography (zero dead volume).
Column making for nanoLC is an art. There are lots of little tricks, superstitions, and unusual protocols out there, so your mileage may vary.
I used to use the silicate method (#3 above), then I stopped doing that and just started pulling tips with a laser puller and packing directly. It seems to be working really well for me, I think I have only had one clogged tip in the past year. Also, for some perspective I'm packing 50-75um ID columns with 3um material.
It gives nice separation for more hydrophilic peptides, like phosphopeptides, but peaks broaden as the gradient progresses.
My personal favorite reversed-phase material for peptide separations is Magic C18 AQ, 200 Å, 3µm, from Michrom (acquired by Bruker), beautiful unmodified peptide chromatography, although I am uncertain of how it performs for modified (phosphorylated) peptides. It can be used with 100% aqueous mobile phases, has very low column bleed/chemical background, is relatively inexpensive at $150/g, and is mechanically strong to at least 5000 psi in my experience. I prefer the 200 Å pore size because of the lower back pressure, but in terms of practical performance (peptide IDs) it is nearly identical to 100 Å material.
I have also tried these C18 materials: Waters BEH/Xbridge, Alltech Alltima HP, Phenomenex Jupiter, Dionex Acclaim and a few others. They all perform very similarly for complex separations (thousands of peptides per injection) on homemade capillary columns. I do think materials with embedded polar groups that permit 100% aqueous conditions without suffering stationary phase collapse do offer very real advantages for retention of hydrophilic peptide species. But, in terms of first separating a proteome into a dozen or so fractions (SCX, HILIC, ERLIC, high-pH) and then throwing it on a reversed-phase column, nearly all modern reversed-phase materials from well-known vendors will probably work for large-scale, low-pH peptide separations.
I've heard really good things about a material called TARGA distributed by vendors like the Nest Group and Western Analytical. Has anyone tried this material that has also tried other 100% aqueous compatible C18 materials?
JDRCHEM wrote: I clean capillaries very thoroughly with methanol, pull a tip with a laser puller making ~ 1 um diameter tip. I immerse the tip into a polypropylene tube containing 50 uL of HF for 1-2 minutes and then flush methanol through the capillary for 2-3 minutes.
Can I just clarify something? After pulling the tip with the laser puller, is the tip open or are you using the HF to both open the tip and "clean up" the tip so its nice and flat? I have been thinking about doing a similar thing with a butane flame pulled tip.
The majority of the time the emitter tip will be open after being pulled on the laser puller. But, there are periods when the laser puller will pull closed tips requiring one of us to clean the mirrors or make fine adjustments to the tip-pulling method. HF is particularly advantageous when the tip is closed as it almost always opens the tip salvaging the emitter. I also like to use HF to modify the tip geometry. Occasionally, long filamentous tips are pulled that do not spray well for me so I use HF to eat away the excess material creating a shorter more cone-like geometry. Some folks will use a fused silica cleaving tool to remove the excess tip material, but I have better luck using HF.
As a side note, many of the emitter fabrication methods using HF I have seen in the literature will bubble some inert gas through the capillary as it is being etched. I have found this unnecessary. Of course, the internal diameter of the fused silica will be slightly increased, but in my hands it is only by a few micrometers.
So, HF can be used to both open/widen fused-silica emitter tips and alter the tip geometry.
Awesome. Thanks for that. I will try it out.
Related to this, it was thinking of combining this with the point heat source silica frit method found in this paper http://www.ncbi.nlm.nih.gov/pubmed/19331382 from the Marto lab to make something like a PicoFrit.
I just built a little column oven and I want to try using some sub-2um packing material. Does anyone know of a US vendor who sells this type of bulk media? All I have found so far is Reprosil (which appears to have no US vendors) or purchasing a pre-packed column and dumping it out.
I would like your opinion regarding analytical/trap column "storage". I currently use the Magic matrix you mentioned above, and would like to know how you store a used column/trap long and short term. I would like to leave a used column and trap plumbed in and ready for a week at a time without drying the matrix by stopping flows, or removing them for storage. What solution could I flow over the matrix without compromising its integrity? I am currently leaving the column flows at 50% ACN and reduced flow rates (200nL/min, which is one half of our analysis rates), for a few days at a time and have noticed peak broadening and reduced sensitivity, which I am guessing is due to stationary phase breakdown of some sort.
If I am not actively running samples I generally flow at 50% ACN (w/ 0.2% formic acid). I usually keep the flow at the same flow rate as my analysis, but decreasing the flow should not make much of a difference for column lifetime. I have not noticed a change in column performance after a couple of days at constant flow. It is rare for a nanoLC to be idle for more than a day in our lab so I have never run a column at constant flow for that long, but I cannot imagine that a week at constant flow would cause a dramatic loss in performance. For long-term storage I store both my trap and analytical columns dry. This may not be the best method for long-term storage, but it works just fine for me. I have read that some people will store their capillary columns in vial with some buffer, but I find this unnecessary.
What could cause the performance issues you described? You could be sloughing off stationary phase into the tee (assuming you are doing vented-style trapping). This happens from time to time with homemade frits. If I suspect this is happening I measure the length of the stationary phase in the column to determine if it is decreasing over time. However, I can usually tell by a decrease in system pressure that I am losing stationary phase. Your system may have low-level contaminants that build up and are not easily removed affecting chromatographic performance. We have seen this with PEG contaminants from poor quality mobile phase inlet filters. Sometimes other crud makes its way into the system. I often examine the stationary phase at the inlet end of the trap column under a microscope. The stationary phase can be brown to black from the buildup of stuff from samples and the system (usually rotor seal wear). The mechanical strength of silica-based Magic stationary phases is 6500 psi, so if you are above this you might be seeing degradation of the material. The mobile phase pH is also somewhat of a concern. If your pH is around 2 or 7.5 with Magic materials you are slowly degrading the material, but this should manifest itself over a longer time than a week.
The number one cause for the type of problem you describe (peak broadening, decrease in sensitivity) in our lab is from leaking nano-fittings or improperly made connections. Leaks are typically so small that they are difficult to see, but are large enough to impact chromatographic performance. I check the flow rate and system pressure with the trap/vent line connected to the tee and then I replace it with a tee plug and repeat those measurements. Small leaks can gradually become worse if you are using PEEK finger-tight fittings and you exceed 4000 psi. Finger-tight means different things to different people and it takes about a few months for new people in our lab to be able to make these connections routinely so that they are tight enough to prevent leaks but not so tight that they crush the fused-silica capillaries. If the leak is in the trap/waste line then during analytical flow part of your sample will go to waste causing both a decrease in sensitivity and noticeable peak broadening.
We do not work in a regulated lab so we do not have to qualify each batch of columns for performance which can be timely. So, if I were in your situation where performance was good one day and then poor a week later I would first check all of the connections and then my next step would be to put on a new column (ours cost ~2$ US they take 10 minutes to fabricate) to minimize downtime.
I have not had luck with finding sub-3 um fully porous stationary phases from US vendors. Some vendors are willing to sell small particle bulk material normally reserved for packed columns if you are willing to pester them enough. Other vendors will sell the bulk material but at about the same cost as buying the entire column due to their cost of packing, testing/qualifying, and then unpacking a column. At that point, the cost of them testing the column is more than the cost of the column housing. As more column manufacturers begin making capillary columns (and profiting from them) I think buying small particle bulk material from them is going to become even more difficult.
Upchurch (now IDEX) make a nanoflow voltage junction with a mouting bracket. I use it where the inlet capillary from my CapTrap connects to the inlet of the packed PicoFrit. Very simple, easy to fit together and totally reliable.
Oh and I mount the PicoFrit in the MicroIonSpray II head that came with my QSTAR Elite because you still need nitrogen to get stable spray with that instrument. There is another round voltage junction with a wider through hole that comes in the spare parts. The column fits all the way through and out the back and is held in place with a ferrule-swaged orange Upchurch sleeve.
We used a vented-style trapping configuration where we apply the ESI voltage to the waste line through a stainless-steel union. We also purchase our nanoflow fittings from mostly from IDEX.
I'll break down every connection and give a part number for each.
I routinely run at 5000 psi with these fittings and have been able to go as high as 6000 psi (sustained) with no leaks. The PEEK fittings are rated for 4000 psi. When I teach new students how to plumb LC lines and connections I ask them to assemble the components and then disassemble them and inspect the capillary ends under a microscope. There is a fine line between getting a leak-free connection and fracturing the fused-silica capillary - I think this is an under appreciated aspect of plumbing up the LC by novice users.
We have custom nanoESI sources that we use on Thermo mass spectrometers. In my opinion, simpler is better. I know this is dependent on the instrument vendor, but one does not need Star Wars Death Star technology for a nanoESI source. All one really needs is a source that allows fine positioning of the emitter at the mass spectrometer inlet. Our source is different from this one, but similar in concept - simple, but effective (everyone should check out this site, it has a lot of useful information).
Thanks, JDRCHEM and Toxic for the replies. I am glad I found this forum and can't wait to contribute soon!
Thank you for all the information above, it is very helpful. I had one question.. my apologies if it is obvious. If I am trying to use the laser puller for tips to pack my nano columns, do I need to have frits on the capillaries before filling them? or once I pull the tips using a puller I can directly, fill it with my packing material.
You can directly fill with packing material after pulling the tip, or you can make a frit, pull tip, then fill with packing material.
I like to use 1.8um particles for my columns and I worry about those not being well retained in the tip if I don't have a frit. So to be cautious, I typically pack a few mm of larger particles at the tip (3um or 5um), then fill the rest with 1.8um.
In that case my question would be, how do you make frits when pulling tips for nano-columns? I usually use the Kasil method to make my trap columns.
just stumbled upon this discussion. I'm curious if any one of you has good suggestions to improve our packing speed. Before we were mainly packing 5 µm C18 material into 100µm ID self-pulled fused-silica capillaries. Now we want to switch to 3µm material, and the packing process takes forever if it completes at all. Problem is that we want to pack 40 cm (length) columns so I expect to have some amount of backpressure building up during the packing process. Is there any other option to increase the velocity besides applying a higher pressure. We currently use 50-60 bar.
Do you, for example, think a change of the solvent we use for making the bead slurry could help? Currently we are using acetone. | 2019-04-19T04:50:10Z | http://sharedproteomics.com/forum/viewtopic.php?p=337& |
THE Trinity concept of revealed religion must not be confused with the triad beliefs of evolutionary religions. The ideas of triads arose from many suggestive relationships but chiefly because of the three joints of the fingers, because three legs were the fewest which could stabilize a stool, because three support points could keep up a tent; furthermore, primitive man, for a long time, could not count beyond three.
Aside from certain natural couplets, such as past and present, day and night, hot and cold, and male and female, man generally tends to think in triads: yesterday, today, and tomorrow; sunrise, noon, and sunset; father, mother, and child. Three cheers are given the victor. The dead are buried on the third day, and the ghost is placated by three ablutions of water.
As a consequence of these natural associations in human experience, the triad made its appearance in religion, and this long before the Paradise Trinity of Deities, or even any of their representatives, had been revealed to mankind. Later on, the Persians, Hindus, Greeks, Egyptians, Babylonians, Romans, and Scandinavians all had triad gods, but these were still not true trinities. Triad deities all had a natural origin and have appeared at one time or another among most of the intelligent peoples of Urantia. Sometimes the concept of an evolutionary triad has become mixed with that of a revealed Trinity; in these instances it is often impossible to distinguish one from the other.
The first Urantian revelation leading to the comprehension of the Paradise Trinity was made by the staff of Prince Caligastia about one-half million years ago. This earliest Trinity concept was lost to the world in the unsettled times following the planetary rebellion.
The second presentation of the Trinity was made by Adam and Eve in the first and second gardens. These teachings had not been wholly obliterated even in the times of Machiventa Melchizedek about thirty-five thousand years later, for the Trinity concept of the Sethites persisted in both Mesopotamia and Egypt but more especially in India, where it was long perpetuated in Agni, the Vedic three-headed fire god.
The third presentation of the Trinity was made by Machiventa Melchizedek, and this doctrine was symbolized by the three concentric circles which the sage of Salem wore on his breast plate. But Machiventa found it very difficult to teach the Palestinian Bedouins about the Universal Father, the Eternal Son, and the Infinite Spirit. Most of his disciples thought that the Trinity consisted of the three Most Highs of Norlatiadek; a few conceived of the Trinity as the System Sovereign, the Constellation Father, and the local universe Creator Deity; still fewer even remotely grasped the idea of the Paradise association of the Father, Son, and Spirit.
Through the activities of the Salem missionaries the Melchizedek teachings of the Trinity gradually spread throughout much of Eurasia and northern Africa. It is often difficult to distinguish between the triads and the trinities in the later Andite and the post-Melchizedek ages, when both concepts to a certain extent intermingled and coalesced.
Among the Hindus the trinitarian concept took root as Being, Intelligence, and Joy. (A later Indian conception was Brahma, Siva, and Vishnu.) While the earlier Trinity portrayals were brought to India by the Sethite priests, the later ideas of the Trinity were imported by the Salem missionaries and were developed by the native intellects of India through a compounding of these doctrines with the evolutionary triad conceptions.
The Buddhist faith developed two doctrines of a trinitarian nature: The earlier was Teacher, Law, and Brotherhood; that was the presentation made by Gautama Siddhartha. The later idea, developing among the northern branch of the followers of Buddha, embraced Supreme Lord, Holy Spirit, and Incarnate Savior.
And these ideas of the Hindus and Buddhists were real trinitarian postulates, that is, the idea of a threefold manifestation of a monotheistic God. A true trinity conception is not just a grouping together of three separate gods.
The Hebrews knew about the Trinity from the Kenite traditions of the days of Melchizedek, but their monotheistic zeal for the one God, Yahweh, so eclipsed all such teachings that by the time of Jesus’ appearance the Elohim doctrine had been practically eradicated from Jewish theology. The Hebrew mind could not reconcile the trinitarian concept with the monotheistic belief in the One Lord, the God of Israel.
The followers of the Islamic faith likewise failed to grasp the idea of the Trinity. It is always difficult for an emerging monotheism to tolerate trinitarianism when confronted by polytheism. The trinity idea takes best hold of those religions which have a firm monotheistic tradition coupled with doctrinal elasticity. The great monotheists, the Hebrews and Mohammedans, found it difficult to distinguish between worshiping three gods, polytheism, and trinitarianism, the worship of one Deity existing in a triune manifestation of divinity and personality.
Jesus taught his apostles the truth regarding the persons of the Paradise Trinity, but they thought he spoke figuratively and symbolically. Having been nurtured in Hebraic monotheism, they found it difficult to entertain any belief that seemed to conflict with their dominating concept of Yahweh. And the early Christians inherited the Hebraic prejudice against the Trinity concept.
The first Trinity of Christianity was proclaimed at Antioch and consisted of God, his Word, and his Wisdom. Paul knew of the Paradise Trinity of Father, Son, and Spirit, but he seldom preached about it and made mention thereof in only a few of his letters to the newly forming churches. Even then, as did his fellow apostles, Paul confused Jesus, the Creator Son of the local universe, with the Second Person of Deity, the Eternal Son of Paradise.
The Christian concept of the Trinity, which began to gain recognition near the close of the first century after Christ, was comprised of the Universal Father, the Creator Son of Nebadon, and the Divine Minister of Salvington—Mother Spirit of the local universe and creative consort of the Creator Son.
Not since the times of Jesus has the factual identity of the Paradise Trinity been known on Urantia (except by a few individuals to whom it was especially revealed) until its presentation in these revelatory disclosures. But though the Christian concept of the Trinity erred in fact, it was practically true with respect to spiritual relationships. Only in its philosophic implications and cosmological consequences did this concept suffer embarrassment: It has been difficult for many who are cosmic minded to believe that the Second Person of Deity, the second member of an infinite Trinity, once dwelt on Urantia; and while in spirit this is true, in actuality it is not a fact. The Michael Creators fully embody the divinity of the Eternal Son, but they are not the absolute personality.
Monotheism arose as a philosophic protest against the inconsistency of polytheism. It developed first through pantheon organizations with the departmentalization of supernatural activities, then through the henotheistic exaltation of one god above the many, and finally through the exclusion of all but the One God of final value.
Trinitarianism grows out of the experiential protest against the impossibility of conceiving the oneness of a deanthropomorphized solitary Deity of unrelated universe significance. Given a sufficient time, philosophy tends to abstract the personal qualities from the Deity concept of pure monotheism, thus reducing this idea of an unrelated God to the status of a pantheistic Absolute. It has always been difficult to understand the personal nature of a God who has no personal relationships in equality with other and co-ordinate personal beings. Personality in Deity demands that such Deity exist in relation to other and equal personal Deity.
Through the recognition of the Trinity concept the mind of man can hope to grasp something of the interrelationship of love and law in the time-space creations. Through spiritual faith man gains insight into the love of God but soon discovers that this spiritual faith has no influence on the ordained laws of the material universe. Irrespective of the firmness of man’s belief in God as his Paradise Father, expanding cosmic horizons demand that he also give recognition to the reality of Paradise Deity as universal law, that he recognize the Trinity sovereignty extending outward from Paradise and overshadowing even the evolving local universes of the Creator Sons and Creative Daughters of the three eternal persons whose deity union is the fact and reality and eternal indivisibility of the Paradise Trinity.
And this selfsame Paradise Trinity is a real entity—not a personality but nonetheless a true and absolute reality; not a personality but nonetheless compatible with coexistent personalities—the personalities of the Father, the Son, and the Spirit. The Trinity is a supersummative Deity reality eventuating out of the conjoining of the three Paradise Deities. The qualities, characteristics, and functions of the Trinity are not the simple sum of the attributes of the three Paradise Deities; Trinity functions are something unique, original, and not wholly predictable from an analysis of the attributes of Father, Son, and Spirit.
For example: The Master, when on earth, admonished his followers that justice is never a personal act; it is always a group function. Neither do the Gods, as persons, administer justice. But they perform this very function as a collective whole, as the Paradise Trinity.
The conceptual grasp of the Trinity association of Father, Son, and Spirit prepares the human mind for the further presentation of certain other threefold relationships. Theological reason may be fully satisfied by the concept of the Paradise Trinity, but philosophical and cosmological reason demand the recognition of the other triune associations of the First Source and Center, those triunities in which the Infinite functions in various non-Father capacities of universal manifestation—the relationships of the God of force, energy, power, causation, reaction, potentiality, actuality, gravity, tension, pattern, principle, and unity.
While mankind has sometimes grasped at an understanding of the Trinity of the three persons of Deity, consistency demands that the human intellect perceive that there are certain relationships between all seven Absolutes. But all that which is true of the Paradise Trinity is not necessarily true of a triunity, for a triunity is something other than a trinity. In certain functional aspects a triunity may be analogous to a trinity, but it is never homologous in nature with a trinity.
Mortal man is passing through a great age of expanding horizons and enlarging concepts on Urantia, and his cosmic philosophy must accelerate in evolution to keep pace with the expansion of the intellectual arena of human thought. As the cosmic consciousness of mortal man expands, he perceives the interrelatedness of all that he finds in his material science, intellectual philosophy, and spiritual insight. Still, with all this belief in the unity of the cosmos, man perceives the diversity of all existence. In spite of all concepts concerning the immutability of Deity, man perceives that he lives in a universe of constant change and experiential growth. Regardless of the realization of the survival of spiritual values, man has ever to reckon with the mathematics and premathematics of force, energy, and power.
In some manner the eternal repleteness of infinity must be reconciled with the time-growth of the evolving universes and with the incompleteness of the experiential inhabitants thereof. In some way the conception of total infinitude must be so segmented and qualified that the mortal intellect and the morontia soul can grasp this concept of final value and spiritualizing significance.
The First Source and Center, who is Father to the Eternal Son, is also Pattern to the Paradise Isle. He is personality unqualified in the Son but personality potentialized in the Deity Absolute. The Father is energy revealed in Paradise-Havona and at the same time energy concealed in the Unqualified Absolute. The Infinite is ever disclosed in the ceaseless acts of the Conjoint Actor while he is eternally functioning in the compensating but enshrouded activities of the Universal Absolute. Thus is the Father related to the six co-ordinate Absolutes, and thus do all seven encompass the circle of infinity throughout the endless cycles of eternity.
It would seem that triunity of absolute relationships is inevitable. Personality seeks other personality association on absolute as well as on all other levels. And the association of the three Paradise personalities eternalizes the first triunity, the personality union of the Father, the Son, and the Spirit. For when these three persons, as persons, conjoin for united function, they thereby constitute a triunity of functional unity, not a trinity—an organic entity—but nonetheless a triunity, a threefold functional aggregate unanimity.
The Paradise Trinity is not a triunity; it is not a functional unanimity; rather is it undivided and indivisible Deity. The Father, Son, and Spirit (as persons) can sustain a relationship to the Paradise Trinity, for the Trinity is their undivided Deity. The Father, Son, and Spirit sustain no such personal relationship to the first triunity, for that is their functional union as three persons. Only as the Trinity—as undivided Deity—do they collectively sustain an external relationship to the triunity of their personal aggregation.
Thus does the Paradise Trinity stand unique among absolute relationships; there are several existential triunities but only one existential Trinity. A triunity is not an entity. It is functional rather than organic. Its members are partners rather than corporative. The components of the triunities may be entities, but a triunity itself is an association.
There is, however, one point of comparison between trinity and triunity: Both eventuate in functions that are something other than the discernible sum of the attributes of the component members. But while they are thus comparable from a functional standpoint, they otherwise exhibit no categorical relationship. They are roughly related as the relation of function to structure. But the function of the triunity association is not the function of the trinity structure or entity.
The triunities are nonetheless real; they are very real. In them is total reality functionalized, and through them does the Universal Father exercise immediate and personal control over the master functions of infinity.
In attempting the description of seven triunities, attention is directed to the fact that the Universal Father is the primal member of each. He is, was, and ever will be: the First Universal Father-Source, Absolute Center, Primal Cause, Universal Controller, Limitless Energizer, Original Unity, Unqualified Upholder, First Person of Deity, Primal Cosmic Pattern, and Essence of Infinity. The Universal Father is the personal cause of the Absolutes; he is the absolute of Absolutes.
This is the threefold union of love, mercy, and ministry—the purposive and personal association of the three eternal Paradise personalities. This is the divinely fraternal, creature-loving, fatherly-acting, and ascension-promoting association. The divine personalities of this first triunity are personality-bequeathing, spirit-bestowing, and mind-endowing Gods.
This is the triunity of infinite volition; it acts throughout the eternal present and in all of the past-present-future flow of time. This association yields volitional infinity and provides the mechanisms whereby personal Deity becomes self-revelatory to the creatures of the evolving cosmos.
Energy is organized by the cosmic agents of the Third Source and Center; energy is fashioned after the pattern of Paradise, the absolute materialization; but behind all of this ceaseless manipulation is the presence of the Father-Son, whose union first activated the Paradise pattern in the appearance of Havona concomitant with the birth of the Infinite Spirit, the Conjoint Actor.
In religious experience, creatures make contact with the God who is love, but such spiritual insight must never eclipse the intelligent recognition of the universe fact of the pattern which is Paradise. The Paradise personalities enlist the freewill adoration of all creatures by the compelling power of divine love and lead all such spirit-born personalities into the supernal delights of the unending service of the finaliter sons of God. The second triunity is the architect of the space stage whereon these transactions unfold; it determines the patterns of cosmic configuration.
From spirit potency to Paradise spirit, all spirit finds reality expression in this triune association of the pure spirit essence of the Father, the active spirit values of the Son-Spirit, and the unlimited spirit potentials of the Deity Absolute. The existential values of spirit have their primordial genesis, complete manifestation, and final destiny in this triunity.
The Father exists before spirit; the Son-Spirit functions as active creative spirit; the Deity Absolute exists as all-encompassing spirit, even beyond spirit.
Paradise is the center of the force-energy activation of the cosmos—the universe position of the First Source and Center, the cosmic focal point of the Unqualified Absolute, and the source of all energy. Existentially present within this triunity is the energy potential of the cosmos-infinite, of which the grand universe and the master universe are only partial manifestations.
The fourth triunity absolutely controls the fundamental units of cosmic energy and releases them from the grasp of the Unqualified Absolute in direct proportion to the appearance in the experiential Deities of subabsolute capacity to control and stabilize the metamorphosing cosmos.
This triunity is force and energy. The endless possibilities of the Unqualified Absolute are centered around the absolutum of the Isle of Paradise, whence emanate the unimaginable agitations of the otherwise static quiescence of the Unqualified. And the endless throbbing of the material Paradise heart of the infinite cosmos beats in harmony with the unfathomable pattern and the unsearchable plan of the Infinite Energizer, the First Source and Center.
The Conjoint Actor universally integrates the varying functional aspects of all actualized reality on all levels of manifestation, from finites through transcendentals and on to absolutes. The Universal Absolute perfectly compensates the differentials inherent in the varying aspects of all incomplete reality, from the limitless potentialities of active-volitional and causative Deity reality to the boundless possibilities of static, reactive, nondeity reality in the incomprehensible domains of the Unqualified Absolute.
As they function in this triunity, the Conjoint Actor and the Universal Absolute are alike responsive to Deity and to nondeity presences, as also is the First Source and Center, who in this relationship is to all intents and purposes conceptually indistinguishable from the I AM.
These approximations are sufficient to elucidate the concept of the triunities. Not knowing the ultimate level of the triunities, you cannot fully comprehend the first seven. While we do not deem it wise to attempt any further elaboration, we may state that there are fifteen triune associations of the First Source and Center, eight of which are unrevealed in these papers. These unrevealed associations are concerned with realities, actualities, and potentialities which are beyond the experiential level of supremacy.
Although these associations cannot augment the infinity of the Father-I AM, they do appear to make possible the subinfinite and subabsolute manifestations of his reality. The seven triunities multiply versatility, eternalize new depths, deitize new values, disclose new potentialities, reveal new meanings; and all these diversified manifestations in time and space and in the eternal cosmos are existent in the hypothetical stasis of the original infinity of the I AM.
The Eternal Son is the absolute of spirit reality, the absolute personality. The Paradise Isle is the absolute of cosmic reality, the absolute pattern. The Conjoint Actor is the absolute of mind reality, the co-ordinate of absolute spirit reality, and the existential Deity synthesis of personality and power. This triune association eventuates the co-ordination of the sum total of actualized reality—spirit, cosmic, or mindal. It is unqualified in actuality.
Thus are interassociated the infinity reservoirs of all latent energy reality—spirit, mindal, or cosmic. This association yields the integration of all latent energy reality. It is infinite in potential.
As the triunities are primarily concerned with the functional unification of infinity, so are triodities involved in the cosmic appearance of experiential Deities. The triunities are indirectly concerned, but the triodities are directly concerned, in the experiential Deities—Supreme, Ultimate, and Absolute. They appear in the emerging power-personality synthesis of the Supreme Being. And to the time creatures of space the Supreme Being is a revelation of the unity of the I AM. | 2019-04-21T06:25:50Z | http://bigbluebook.org/104/2/ |
People expect long battery life on their mobile devices, and apps play a vital role in achieving that experience. Learn strategies to conserve energy while providing the best experience for your app. Find out about the key areas that affect energy consumption of an app as well as how to best use the available APIs to optimize battery life. Master energy debugging tools to make your app more energy efficient.
Battery life is very important to your users. And apps are directly tied to battery life. So as developers, it's very important that we're careful about how we write our code. And the reason for this is if I'm a user and I'm having bad battery life, the first thing I'm going to do is I'm going to go to the Battery Usage screen.
I'm going to take a look at what apps are using a lot of my energy.
If I notice that your app is near the top and I don't expect it to be there, I'm not going to be very happy about that and I may even delete your app. And so today, I'm going to talk about some battery life concepts. Then, we're going to move on and we're going to talk about energy efficient coding practices. From there, my colleague will come up and talk to you about energy debugging tools that are available to you as well as give you a demo. And then we'll wrap it up with some final thoughts.
So let's get started. What is energy? Well, energy is the product of power and time. And I'd like to illustrate this with an example.
As you can see here, when the device is idle, the power is very low.
Yet when the device is active, the power is very high. And you also notice that the power can be even higher and that depends on how much work you're doing or the type of work that you're doing. You'll also notice that there's overhead and that's the amount of power that's needed to bring the hardware up to be able to do your work as well as put it back to sleep. And so as I said before, energy is the product of power and time and that's the area under the curve. And I'd like to take this one step further. The energy that you have is split into two regions: fixed costs and dynamic costs. The dynamic costs are the work that you're doing and the fixed costs are that overhead that we talked about earlier, the amount of energy needed to bring the hardware up to do your work in the first place. So even if you're doing a small amount of work, you're still going to have to pay those overhead costs.
And we'll talk more about this later. So our devices are very powerful and so it's important that as developers we're very careful about when we use that power.
We need to really think about, do we need to use this power to deliver a great experience to our users. And if we do, we should go ahead and use that power.
But maybe there're other times where we can conserve it. So now you might be thinking, what consumes energy. Well, actually nearly everything in our devices consume energy but today I really want to focus on four main things. And these are processing, networking, location, and finally graphics. These are the four main things I really want you to think about when you're writing your apps. So how can I reduce my energy consumption? First, I want to identify the work that I need to do, really think about will this work, help your user. And if it won't, don't do it at all or maybe defer it to a later time. Next, you'll want to optimize your work. Once you've identified the work that you do need to do, try to do it as quickly and efficiently as possible. Next, you'll want to coalesce, try to batch up your transactions. Don't do them spaced apart.
And finally, reduce the frequency of your work. So let's see how we can apply these principles to your apps. And first I want to start with networking.
So if you're developing an app that uses networking or you have an app that does networking, you'll really want to pay attention here. And so I'd like to start with an example. I've been working on a social networking app and this app has three parts: a main feed, it has the ability to post a photo, and finally the ability to send some analytics data. And so let's start with the main feed.
In my current implementation, I'm just reloading on a fixed timer over and over again.
And let's take a look at the energy impact in doing so. Here you can see that at first glance doesn't look to be that energy intensive; however, as we talked about earlier, they're actually those overhead costs and that's the cost to bring up the radio and put it back to sleep in this case. And so even though you're just doing a small amount of work, you're paying those overhead costs and this is really resulting in a big energy impact. So how can we optimize this? First, we'll want to reload only on user interaction or maybe a notification such as an urgent news alert.
Next, you'll want to use NSURL Session Default Session and there's a new property called Waits for Connectivity. This will allow you the ability to know when you can connect to the server of your choice. Additionally, you'll want to use NSURL Session Cache as well.
This will allow you to not re-download the same pieces of your main feed over and over again and incur those extra costs. So, let's take a look at the energy impact with these optimizations. As you can see here, we've removed that recurring spike. Now you're only reloading on user interaction and notification. And you also removed that overhead cost as well.
This is great for battery life. So let's see how we can set this up.
First, we'll want to go ahead and create a default session configuration.
Then, we'll move on and we'll set the waits connectivity property to true.
And finally, we'll configure our cache. So that was the main feed.
Now let's move on and talk about how we can post a photo. So in my current implementation, right now I'm just going to send this photo immediately and I'm going to retry on every failure.
That's because I really want to get this photo to my server. And let's take a look at the energy impact in doing so. As you can see here, the energy impact is very high.
We're spending a lot of time to send up our photo. And finally it times-out, maybe because the networking conditions are poor. And again, we retry because we really want to get this photo to our server. And again, we spend a lot of energy while we're not providing much utility for our user because this photo is still not getting to our server. And this may repeat over and over again.
So how can we optimize this? First, we'll want to make sure we really minimize our retries.
Only retry maybe two or three times. Next, set reasonable timeouts, maybe 30 seconds or a minute. Don't spend too much time trying in case you're in those bad networking conditions. Finally, you'll want to batch your transactions, so if you have other photos to post at the same time, go ahead and post those as well.
Finally, if your retry limit is hit, and you're not sure what to do, maybe create a background session. This will allow you to hand off your photo upload to the system and it can find a good time to do your work. So let's take a look at the energy impact with these optimizations. As we can see here, now we've really reduced the amount of energy that we're spending both in the cost to send our photo as well as that overhead cost. Additionally, you might see that we're still timing out, maybe because those bad networking conditions are still there, but yet the second time we retry, we just go ahead and create a background session and now we're going to let the system handle uploading our photo. So that was how we can post a photo efficiently.
Now let's talk a little bit about how we can send up analytics data.
And as developers, we all really care about how users are using our apps.
So we want to make sure that the data that we're sending does not have an energy impact and we can do that by using Background Session. This provides the ability to hand off your upload or download to the system to do it at a good time.
Additionally, it provides automatic retries so you don't have to worry about handling that retry policy yourself. Next, it also provides throughput monitoring which means that if your throughput is very low, for instance you're in those poor network conditions, your task will be stopped and retried at a later time when it thinks it will succeed.
Finally, there's some new properties called start time and workload size.
This will help you indicate to the system the best time to do your work.
And finally, you'll also want to set the discretionary property whenever you're doing work that's not immediately relevant to your user. This will allow the system to find the most energy efficient time to do your work as well. So let's take a look at an example. Here, we can see that right now I'm not using Background Session. I'm just going ahead and sending my data as soon as I have it ready to send to my server. Additionally, there's some other networking that's occurring in the future. And right now we're paying two overhead costs.
So let's say that we use Background Session. Now we can see that Background Session has allowed these events to coalesce together and saved us that extra overhead by combining it with the other networking that was already going to happen at a future time. This will really help battery life for your users.
So let's take a look at how we can set this up. First, we'll want to go ahead and create our Background Session configuration. Then, we'll move on and we'll set the discretionary property to true. Next, we'll go ahead and we'll set some properties like start time and the expected workload size.
And finally, we'll resume our task. So that was how we can send up our analytics data in an efficient way. Now I want to talk to you a little bit about watchOS. So, networking on the watch can be very expensive and so it's important that you use background session for any work that you want to occur when the screen is off. You want to also use this for complication updates or background app refresh as well and that's because you'll be able to get runtime when the task completes so it can go off and doing your networking and let you know when it's done.
So, to recap. First, you want to identify the work that you're doing.
This will help you ensure that you're not repeating transactions again and again.
Next, you want to optimize your work by using Background Session wherever appropriate.
Next, you want to coalesce your work. Really batch those transactions up to save that overhead. And finally, reduce your work my minimizing retries and setting reasonable timeouts. So that was networking. Now I want to talk to you a little bit about location. And so as a developer, you have many APIs to choose from when it comes to location. But today I really want to focus on the energy impact of these APIs. So to start off, let's talk about if I wanted to add the ability to add navigation to my app. To do this, I'll want to use continuous location updates and the reason for that is I'll need to know if the user deviates from my course. That way I can provide them new instructions for how to get to their destination. But one thing you want to be cautioned of is that this does prevent the device from sleeping, so it will have a high energy impact on your users.
So really, as soon as your user gets to their destination, you'll want to make sure you stop these location updates and make sure the device can sleep again.
So let's take a look at how we can do this. First, we'll create a location manager. Then, we'll move on and we'll set some properties.
And the property I really want to focus on today is desired accuracy.
Really think about the accuracy that you need and the reason for that is higher accuracy is higher power. So really make sure that you do need that high accuracy if you go ahead and set it. And then next, you'll want to go ahead and start updating location. Once you're done, for instance as soon as the user gets to their destination, stop updating location, again so that you can let the device go back to sleep.
So that was continuous location. Now let's move on and talk about some other APIs that will allow your device to sleep more often. The first one is request Location and this allows the ability to get the user's current location, maybe if you want to update content based on their current location without having to worry about calling start location and stop location and managing calling both of those. Next, there is region monitoring. Region monitoring provides you the ability to know, let's say, if you want to update content when the user arrives home. You don't have to track their location all the time. You can just create a region and when they cross that region, you'll be able to get some runtime to do your work. Similarly is visit monitoring.
Visit monitoring allows you to know when users go to frequently visited locations.
You'll also get some runtime at that time as well without having to continuously track their location. You can set that up as follows. And finally there's significant location change. So significant location change can be used if you want to know when the user is moving a significant distance but you don't want to use continuous location because continuous location prevents the device from sleeping.
Significant location change doesn't prevent the device from sleeping.
It can still sleep between those updates. And so you can really make a good optimization if you're able to move from continuous location to significant location change.
One example is maybe you have a weather app. You need to know when the user moves significantly and update the weather at those times. And here is how you can set that up. So to summarize, first you want to identify the accuracy level that you need. Really think about do I need that high accuracy.
And if you don't, use something lower. Next, you'll want to optimize your work by using alternatives to continuous location wherever you can and wherever it makes sense. Next, you'll want to reduce your work by stopping location updates as soon as you're done with them. Again, if you let those location updates keep coming, you might prevent the device from sleeping.
And finally, you'll want to coalesce your work by deferring location updates.
Maybe in the future you'll need that location, you'll really need it and maybe you don't need it right now. So that was location. Now I want to talk to you about graphics. And graphics can be very energy intensive.
So here are some good guidelines to follow. First, you'll want to minimize your screen updates, really ensure that these are providing needed changes for your user.
Next, you'll want to review your blur usage. If you're placing blurs on top of updating elements, this is very expensive for battery life. So be very cautious of that.
So those are some general guidelines. Now let's talk specifically about the Mac. So if you're developing on the Mac, you'll want to be aware that some MacBooks have a discrete GPU and this discrete GPU is great at delivering awesome graphics and awesome performance for your users but it also has a high power cost over the integrated GPU. And so you'll really want to make sure that you're only using the discrete GPU when your animation performance really suffers over the integrated GPU, or if the functionality isn't provided there. Additionally, if you're developing on the Mac, you might be using Metal or OpenGL. And if you're using Metal, you'll really want to be aware that by just calling Create System Default Device, you're going to trigger the Discrete GPU automatically. And so if you don't need the discrete GPU, instead you'll want to call Copy All Devices and pick that device with the low power attribute set. This will ensure that you can use the integrated GPU whenever possible. For those of you that are developing using OpenGL, you'll want to make sure that your app is mux-aware by setting the Automatic Graphics Switching property either in your Info.plist or using the sample below.
And the reason for this is if you don't need the discrete GPU, you don't want to be the one to keep it up and automatically you will keep it up unless you set this property.
So to summarize, first you'll want to identify the work that you need to do by looking at your burry usage. Make sure you're not placing those blurs over updating elements. Next, you'll want to optimize your work.
If you're developing on the Mac, really ensure that you're only using the discrete GPU whenever you really need it to deliver that great performance. And finally, reduce your work by minimizing screen updates whenever possible. So that was graphics.
Now let's talk a little bit about processing. And again, processing can be very energy intensive as well. So here are some guidelines to follow.
First, you'll want to identify the tasks that you need to do. Next, you'll want to do that work very quickly and efficiently once you've identified those tasks.
You'll also want to avoid timers whenever possible. Try to do your work based on user interaction rather than a fixed timer over and over again. But if you really do need to use those timers, try to set a pretty long leeway. That will let the system coalesce your timers with other work. So that was some general guidelines for processing. Today I really want to focus on background processing.
And background processing can be very expensive for your users and so it's important to think about what you're doing in the background. The main reason for this is the user is not looking at your app. In the foreground, they're looking at your app.
So if you're using some energy there, they might not be as worried.
But if you're using a lot of energy in the background, your users might not be happy about this. And so here are some general guidelines.
First, we'll want to finish our work as quickly as possible. First think, do I really need to do this work in the background. And if so, find the most efficient way to do it.
Next, if you want to update your content, try to use the background app refresh API.
This will really help you find the best time to update your content.
And finally, you'll want to make sure that you call the completion handler for whatever API that you're using. This will make sure that you allow the device to sleep as quickly as possible and you don't end up paying any fixed cost.
So new in iOS 11, there's a completion handler in the PushKit API.
This will allow the device to go back to sleep very quickly after you handle your incoming push if you call this. And so you'll really want to make sure that you adopt this if you're using PushKit. And let's take a look at an example.
Here, we can see I'm not calling the completion handler in this case when I receive my incoming push. I'm just doing some processing and then I'm letting the device just go to sleep after a fixed period of time. But now let's take a look at the energy impact with the optimization. By calling the completion handler, we are allowing the device to sleep more quickly and not only have we saved that energy that we're using in the background but also that overhead cost as well.
That will really help the battery life of your users if you're using PushKit.
So let's talk a little bit about background processing on the Watch.
So new is the background navigation mode. This also has CPU limits like other background modes on the watch. Additionally, you'll want to really make sure that you minimize any networking that you're doing when in this background mode. Really think about, do I need to do this or will my user care about this networking update that I'm doing. Maybe do it for things like traffic reroute or important traffic information. And finally, use background app refresh and complication updates to update your data. And when you're using these APIs, make sure that you use Background Session, as we talked about earlier, to get that data so you don't have to wait around for the data to come through. So to summarize, first you'll want to identify the work that you're doing in the background. Really make sure it's providing useful content for your user. Next, you'll want to optimize your work by using Background App Refresh whenever you can. Next, reduce your work by limiting the transactions that you're doing in the background. And finally, using background Session whenever possible.
So now my colleague is going to come up and talk to you about the energy tools available to you as well as give you a demo. Thanks, Daniel.
Good morning, everyone. I am Prajakta Karandikar. I'm an engineer in the power team. So you heard about all the best practices for writing energy efficient code. Now I'm going to talk about the various energy debugging tools that we have developed. We will see how you can use these tools to measure the energy efficiency or energy impact of your applications. These tools will help you find the high-level problems within your application pertaining to energy or the major problem areas and will help you fix these problems. Finally, we will move on to a demo where I'll take some sample applications and debug them for energy issues using our new tools so that it establishes a debugging workflow for you to debug your own applications.
But first, let us see why it is important to measure your app's efficiency.
Say you develop this awesome application with some great functionality but did not measure its energy impact. Turns out the energy impact of the application is pretty high even with usage for a very small period of time. Naturally, battery usage UI is going to flag this application as one of the top energy drainers and any customer who is using your application is going to experience a significant battery drain even with small-usage periods. It could be possible that the customer deletes your application and that is definitely not something that you desired.
So as an app developer, it is really important that you measure your app's efficiency pertaining to energy or its energy impact. And to help you with this measurement, we have the new and improved Energy Gauges. These are included as a part of Xcode, which you all are familiar with. Energy Gauges are designed to give you a high-level overview of the problems within your application pertaining to energy. They will tell you what are the energy-heavy areas within your app. They will also guide you to the right set of instruments to drill down deeper within these problem areas and fix these problems.
So where can you access Energy Gauges within Xcode? When you launch your application with Xcode, click on the Debug navigator. A series of performance gauges open to the left-hand side of the screen. These are for the basic metrics in the system like CPU, memory, network, and disk. In iOS and macOS, one of these gauges is for energy impact. When you click on this energy impact gauge, the energy report opens to the right-hand side of the screen. Let me walk you through the various parts of this report. At the top left corner of the report, you will see a value which indicates the overall energy rating or the overall energy score for your application. Alongside it lies a meter which is three regions: the green, yellow, and the red region corresponding to low, high, and very high energy impact.
So the bad news for this particular report is that this application which is being debugged has a high average energy impact. The good news, however, is that as you make improvements or optimization to your application, this meter will help you know whether you're moving in the right direction, that is towards the green or the low energy impact zone, or are you moving to the wrong direction, which is the red or the very high energy impact zone. So if you see that your application lies anywhere within the yellow or the high regions, you definitely want to take a look at the pie chart which is at the top right corner of the report.
So this pie chart tells you what does the average component utilization for the primary components which consume energy on iOS as were described to you by Daniel.
Ask yourself, do you expect your application to be using this much CPU, GPU, networking, location. You can start by eliminating whatever you did not expect your application to be using. Those could be some leaks within your application which have left some hardware running indefinitely and which are resulting in a greater energy impact. For example, say you have developed a gaming application which uses only the CPU and GPU and it requires very little location that is to access the location of the user when the user starts playing a game. But if you see from the energy report that the pie chart tells you that your location utilization is very high, that could be a possible leak within your application where you're continuously accessing location and that could be something which is resulting in excessive energy drain.
So once you have eliminated whatever you did not expect your application to be using, next you should try to optimize whatever stands out or is the biggest portion within the pie chart. So for this particular example, we see that the red region, which stands for overhead, is the biggest piece in the pie chart.
We know that overhead is the energy that is required to bring up the radios and all the other system hardware which is required for your application to perform work.
And this seems about right considering that your application is also utilizing the networking component. Networking is going to bring up the radios which will require power for prolonged periods. So in this case you can try to optimize your networking utilization. Try to batch up all your networking activity within your application whenever possible so that it reduces the impact on the networking as well as the corresponding overhead which has resulted from it. Once you know which is the primary component that you want to try to optimize or improve first within your application, you should look into the segmented bar chart or the instantaneous section of the report. This gets refreshed every second.
This is great to find whether what your application is doing over time makes sense.
So when you execute certain actions or scenarios while you're trying to debug your application using energy gauges, you can see here what is the exact point of time when you consumed energy, which are the various components on which you generated a workload.
This region also tells you whether that workload was generated while the application was running in the foreground, background, or suspended states. So here you can verify whether you're adhering to the good principles of doing as little work as possible or no work if possible in the background state and moving immediately into the suspected state whenever your app is backgrounded. If you do an extended click on any one of these bar charts, it will give you a breakdown of the component utilization for that instant.
So this section is great to find what are the opportunities within your application to reduce or to coalesce work. In this particular example, you see that you're repeatedly doing networking activity and that's why time and time again you have the networking impact as well as the overhead impact which is generating from it. So this is a great example that you can batch all your networking work and that is going to lower the energy impact for your application. At the bottom of the report, you have information regarding the various components which consume energy on iOS and some useful tips regarding how you can reduce your application's impact on each one of these components. To the right of these tips, there are buttons to click into instruments. So say from the energy gauge's report, you saw the CPU utilization for your application is maximum and that is something that you want to try to optimize. So you can click on the Time Profiler instrument and this will move your debugging session into instruments time profiler.
So Time Profiler basically watches all the running threads of your process and it generates samples at regular intervals. You have a complete back-trace available for each of these samples and that can be seen on the right-hand side in the Extended View section.
So this helps you find what are the exact lines of code within your application which are extremely time intensive, where was most time spent within your application, which functions within your application were extremely CPU intensive, and you can try to optimize that part of your code and rerun it for debugging using Energy Gauges. Similarly, if Energy Gauges report told you that your location utilization is extremely high and that is something that you want to go and optimize, you can click on the Location Profiler.
This tells you what are the points in code where you have made access to core location manager. You can also see what was the accuracy that is demanded for each of these calls and what is the resulting energy impact from these calls.
So in this particular case, we see that the location manager is being accessed time and time again with the best accuracy possible and, hence, there is a high energy impact that is resulting from each of these location calls. This is also a great place to find out whether you have left any leaks in the system. That is whether all calls to locations manager have been successfully released. You can also try to incorporate the good practice of using lower accuracy whenever possible within your application so that it lowers the energy impact resulting from it. Now that we have familiarized our self with the various tools that are available for energy debugging, let us look at some of the scenarios that you should execute on your applications while debugging them for energy issues. So there are some scenarios that could apply to every application. For example, there is the launch and idle scenario, whether the user launches your application but does not interact with it. Secondly, there is a backgrounding scenario. So you should try to run these scenarios using Energy Gauges and see what is the resulting energy impact that is generated from performing these actions on your application. Next, depending on the type of application that you are developing, there will be certain application-specific scenarios.
For example, if you're developing a navigation app, some scenarios that would be specific to your application would be looking for a particular location or address and then getting the directions for that address and actually navigating to that particular location. So you should try running these scenarios on energy gauges for your applications, see what is the corresponding energy impact, then try to make improvements or optimization when you find the major problems pertaining to energy and then rerun these scenarios to ensure that Energy Gauges tells you that you're moving towards the lower energy impact or the green zone. So with that, let me move on to a demo where we'll try to run these scenarios on some sample applications so that it establishes a debugging workflow for you to debug your own set of applications. So the first application that I'm going to try to debug is DemoBots. So let me launch DemoBots on my device using Xcode. So this is a simple game that we have developed.
We expect the game to be utilizing only the CPU and GPU. Let me click on the Debug Navigator and click on the Energy Impact gauge. This is the first scenario that we're executing, which is the launch and idle scenario. You want to see what is the corresponding energy impact from executing this action on the application.
So here, we see that the overall score for our application is high.
That is it has high average energy impact. So next, we want to see what are the components that we are trying to utilize. As expected, we are only utilizing the CPU and GPU. There are no unexpected components being utilized, which is great. So next, let us look at which is the largest part of this pie chart and what it is that we can optimize first. So we see that our GPU component is being extensively used at about 88%. So if you try to bring about any optimization or improvement within the GPU in your usage in your application, that is going to give you maximum benefits. Some of the good principles that you could adhere to here are reducing the number of screen updates or reviewing your usage of blurs or using less opacity whenever possible. And this could bring down your GPU utilization and the corresponding energy impact generating from it. Now let us perform another scenario which is backgrounding. Let me try to background this application.
So we want to see whether it moves into the backgrounding state or immediately moves to the suspended state. So in this particular case, the application is immediately moved to the suspended state, which is great, because that lets the device actually sleep.
And you're not incurring any energy cost on your device. Let us shift gears and move to another application. The second application that we are going to try to debug here is EnergyBuddy. Let me launch EnergyBuddy on my device using Xcode.
So this is a simple application which we have developed which lets you take pictures of energy meters. It gets the reading from that picture for the meter.
It then accesses your core location and uses your location to get the weather for that particular location. All of this information is later stored in the database, which you can retrieve. So let me click on the Debug Navigator and go to the Memory Impact gauge, sorry, the Energy Impact gauge. So here, this is our first scenario that we're executing, which is the launch and idle. So our -- From here, we see that right now our energy impact is zero, which is great. The only component that we are utilizing is CPU that was required for the launch. Now let us perform one application-specific scenario. Let me try to import a photo and see what is the corresponding impact from this particular action being executed on my application.
So when I import a photo, I'm going to accept one of the photos and allow EnergyBuddy to access location. So this generates a graph from the meter reading that it has got. So as we see in the instantaneous section here, on executing this particular action, my application is utilizing CPU for processing and it is also utilizing the location component. So this was expected because we wanted as soon as we import this particular photo, it takes the location and then uses that location to get the weather information. However, here we can see that it is continuously accessing core location and that could be a leak within my code where I have left accessing core location continuously. So that is something that you can fix within your application and then try to rerun this particular scenario of importing a photo to ensure that your energy impact has gone down. So now let us try backgrounding this application. So when I background this application, we want it to move into the suspended state as soon as possible. However, here we see that the application has moved to the background state and it continues to access location while in the background state. So this is not providing any utility to the user and this can definitely be optimized within the application. We are accessing core location and that call is not getting ended and that's why core location is continuously being utilized resulting in the very high utilization for location as you can see in the pie chart.
You also see a gray portion on the backgrounding section which is the static costs associated with keeping your device awake. So as long as your devices continues to be in the background state because of this application, there is going to be certain cost that is going to be built to your particular application. So these are some of the scenarios that we want you to run on your applications when you're trying to debug it for energy issues, identify what are the scenarios which are meaningful to your particular application, run those scenarios using Energy Gauges, and see what does the report tell you about the energy impact from executing each one of them. Make the necessary improvements or optimization within your application. Use instruments to drill down deeper. And solve the problems pertaining to energy.
Rerun these scenarios in your application after you have improved your code and verify that Energy Gauges tells you that now you have moved towards the lower energy impact or the green zone. With that, I would like to hand it over to Daniel for the final thoughts and wrap-up of this presentation. As you guys saw, you'll definitely want to check out Energy Gauges.
It'll help you find great energy improvements to your apps. So let's wrap it up with some final thoughts. First, you'll want to use NSURL Session Background Session whenever applicable. It'll really help the system find the best time to do your work. Next, make sure you minimize your use of continuous location.
Remember that this will cause your device to stay awake. Next, avoid timers.
If you need timers, set leeway to ensure that they're coalesced.
And finally, use Energy Gauges. It'll definitely help you find great optimizations.
Here're some related sessions. You'll definitely want to watch the videos for these. | 2019-04-23T22:33:10Z | https://developer.apple.com/videos/play/wwdc2017/238/ |
Contrary to popular belief, many soldiers in the British Army were literate. Some wrote memoirs, others kept diaries, and some wrote home fairly frequently. This listing is alphabetical by the soldier's last name.
Notes: ws a private in Major John Keyt's Company of the 51st Foot at Waterloo.
Notes: was a corporal in Captain George Miller's Company 2nd Battalion 95th Rifles at Waterloo.
Anonymous. Jottings from My Sabretasch. Godmanchester: Ken Trotman; 2005. 292 pages.
Notes: 15th Hussars; Corunna Campaign; Peninsula 1813 – 1814; Waterloo.
Notes: was a private in the 42nd Highlanders and severely wounded at Quatre Bras. Missed Waterloo because of wound.
Anonymous. "Letter to His Wife" in Gareth Glover (ed.). The Waterloo Archive Volume I: British Sources. Barnsley: Frontline, 2010. Pages 31 - 33.
Notes: was a sergeant in the 2nd Royal North British Dragoons (Scots Greys).
Anonymous. Personal Narrative of a Private Soldier in the 42nd Highlanders. Cambridge: Ken Trotman; 1996. 289 pages.
Notes: In 1st and 2nd Battalions; Corunna, Walcheren, Peninsula 1812-1814; wounded at Toulouse.
Anton, James. Retrospect of a Military Life. Cambridge: Ken Trotman; 1991. 395 pages.
Notes: was a private in Captain John Ross' Company 1st Battalion 51st Foot at Waterloo.
Notes: was a private in Captain William Stewart's Number 1 Company 91st Foot at Waterloo.
Notes: was in the Royal Horse Guards at Waterloo.
Notes: was a private in H Troop of the Royal Horse Guards and seriously wounded at Waterloo.
Blainey, William. Bonaparte versus Blainey. Union Springs: Tallcot Bookshop; 1988. PB 48 pages.
Notes: Retired as a sergeant. Was in 51st Regiment; served in Walcheren and Peninsula from 1811 - 1814.
Bentinck, Richard. The Very Thing: the Memoirs of Drummer Richard Bentinck Royal Welch Fusiliers 1807-1823. Jonathan Crook (ed.). London: Frontline, 2011. 208 pages.
Notes: Served in 1st Battalion; at Copenhagen (1807), Martinique (1809), Peninsula (1810-1814), and Waterloo.
Notes: was a private in Captain Fenton's Troop in the 2nd Dragoons at Waterloo.
Brown, Robert. An Impartial Journal of a Detachment from the Brigade of Foot Guards, Commencing 25th February 1793 and Ending 9th May 1795. Godmanchester: Ken Trotman; 2006. 280 page.
Brown, William. With the 45th at Badajoz, Salamanca, and Vittoria. Darlington: Napoleonic Archive; (no date; probably 2003). 44 pages.
Notes: Served in the 1st Battalion; arrived in the Peninsula in 1809 and fought at Busaco, Ciudad Rodrigo, Badajoz (great descriptions of the assault and pillage of the city), Salamanca (great description of being ridden down by French cavalry), the 1813 retreat, and battle for Vitoria and the subsequent looting of the French baggage train. Also served as an officer's servant. Fantastic descriptions of the daily life of a soldier on campaign.
Brown, William. The Autobiography, Or Narrative of a Soldier. London: J. Paterson, 1829.
Notes: was a private and served in the 1st Battalion 45th Foot.
Byfield, Shadrach. The Adventures of Private Shadrach 41st Foot in North America, 1812 - 14. Gareth Glover (ed.) Godmanchester: Ken Trotman, 2017. 69 pages.
Notes: was in the Light Company. Fought at Detroit, the River Raisan, Point Frederick, Fort Niagara, and Black Rock where he lost his arm..
Calladine, George. Colour Sergeant Calladine. Darlington: Napoleonic Archive; ND.
Notes: Derbyshire Militia 1805; 19th Foot 1811. Ceylon 1814 - 1816.
Butler, Robert. Narrative of the Life and Travels of Serjeant ---- , written by himself. Edinburgh: David Brown, 1826.
Notes: was a fifer in the 26th Foot. In 1806 enlisted in the the 1st Foot and was the fife-major in India. The 3rd edition, which was published in 1854, is a much expanded edition.
Calladine, George. Diary of Colour-Sergeant George Calladine, 19th Foot, 1793-1837. Ferrar, M.L. (ed.). Ann Arbor: University of Michigan, nd. 224 pages.
Notes: is a reprint of the 1922 edition; was in Derbyshire Militia 1805; 19th Foot 1811. Ceylon 1814 - 1816.
Clarke, William. "Letter to His Parents" in Gareth Glover (ed.). The Waterloo Archive Volume I: British Sources. Barnsley: Frontline, 2010. Pages 27 - 31.
Notes: was a sergeant in Captain Robert Vernon's Troops of the 2nd Royal North British Dragoons (Scots Greys).
Clarke, William. A Scots Grey at Waterloo: the Remarkable Story of Sergeant William Clarke. Gareth Glover (ed.). Barnsley: Frontline, 2017.
Notes: Covers 1803 - 1825. Has great descriptions of the charge of the Union Brigade and the battlefield afterwards, especially his expereicne on being on a burial party the day after the battle..
Clay, Matthew. With the Guards at Hougoumont. Darlington: Napoleonic Archive. n.d. 20 pages.
Notes: Clay was a private in the Light Company of the 2nd Battalion 3rd Foot Guards. A great description of Quate Bras and the defense of Hougoumont from a private's perspective!
Notes: was a sergeant in Captain George Luard's Troop of the 18th Hussars.
Collett, John. John Collet and the Company of Foot Guards. Barbara Chambers (ed.) Letchworth Garden City: Barbara Chambers; 1996. 2 vols.
Notes: 1st Foot Guards; 1803-1823; private; about 15% of book is his diary.
Notes: Rose to the rank of sergeant. Was in the 7th Fusiliers. In all of the major battles of Peninsula, plus New Orleans.
Notes: was a private in the 7th Hussars at Waterloo; wrote "A Voice from Waterloo".
Notes: was a corporal in the 1st Life Guards at Waterloo. Horse was killed and he was wounded in hand and serious contusions in left arm. Great description of being trapped under his horse.
Notes: was a sergeant in Captain Phipps 5th Troop, 1st Royal Dragoons.
Notes: was a prvate in Captain William Marshall's Light Company 1st Battalion 79th Foot at Waterloo; "The Waterloo Medal Roll" lists his name as Carrickshank.
Dayes, John. Memoir of the Military Career of John Dayes, late Paymaster Sergeant of the 5th Regiment of Foot. Cambridge: Ken Trotman; 2004. 26 pages.
Notes: Holland 1799; Buenos Aires 1806; Corunna Campaign; returned to the Peninsula in 1812.
Notes: was a colour sergeant in the 1st Battalion 79th Foot at Waterloo.
Dickson; Corporal. Scots Greys at Waterloo. Darlington: Napoleonic Archive; n.d. 39 pages.
Notes: Primarily the account of Corporal Dickson of F Troop (Captain Vernon's Troop). A great description of the charge of the Union Brigade.
Notes: was a sergeant in Captain Edward Whinyate's Royal Horse Artillery Rocket Troop at Waterloo; possibly a driver.
Dilley, James. "A Private of the 40th Foot at Badajoz". Edited by Gareth Glover. Waterloo Journal.Vol. 36 No. 1. Spring, 2015.
Notes: was in Major Richard Archdall's Company, 1st Battalion 40th Foot.. Is a Lletter to his parents dated 5 November 1811. Covers his wound at the 1st Siege of Badajoz on 5 May 1811.
Notes: Enlisted in 1809 and served in the Peninsula from 1809-1814. was a sergeant by the time he left the army.
Douglas, John, Douglas’s Tale of the Peninsula & Waterloo: 1808-1815. Stanley Monick (ed.) London: Leo Cooper; 1997. 133 pages.
Notes: Sergeant by 1814; 1st Foot; Walcheren; Peninsula 1809-1814; Waterloo.
Eadie, Robert. On Campaign with the 79th Cameron Highlanders: Through Portugal and Spain. Darlington: Napoleonic Archive; no date. 47 pages.
Notes: Eadie was an enlisted soldier, served in the Peninsula from 1809 - 1813, when he was invalided out of the service. Interesting description of Busaco and the Chelsea Hospital.
Ebbecke, Ludwig. A Hussar Sergeant in the King's German Legion: the Memoirs of Cavalry Sergeant Ebbecke, 2nd Hussar Regiment King's German Legion, 1803 - 1815. Gareth Glover (ed.). Godmanchester: Ken Trotman, 2017. PB. 70 pages.
Notes: was a sergeant in the 2nd KGL Hussars; was at Staslund, the siege of Copenhagen in 1807, Walcheren, the Peninsula from 1810 to 1812, Holland in 1813; was not at Waterloo.
Notes: was a gunner in Ross's RHA Troop.
Notes: was a sergeant in Captain Vernon's Troop of the 2nd Royal North British Dragoons and captured the eagle of the French 45th Line Regiment.
Facey, Peter. The Diary of a Veteran The Diary of Sergeant Peter Facey, 28th (North Gloucester) Regiment of Foot 1803-19. Gareth Glover (ed.). Godmanchester: Ken Trotman, 2007. 68 Pages.
Notes: In Grenadier Company of 1st Battalion; served at the Siege of Copenhagen, Walcheren, Barossa, Arroyomolinos, Almaraz, Vittoria, the Nive, Toulouse & Waterloo.
Gallagher, Samuel. The Journal of Trooper Samuel Gallagher, 5th Dragoon Guards in Spain, Portugal and France, 1810-1815. Godmanchester: Ken Trotman, 2017. 112 pages.
Notes: went to Portugal in August 1811. Was a corporal at Salamanca and participated in General Le Marchant's charge, where he was wounded. Was promoted to sergeant in July 1813, but reduced to private in June 1814. He transferred to the 10th Hussars on 23 June 1815. Was not at Waterloo, but was in the Army of Occupation of France.
Garretty, Thomas. Memoirs of a Sergeant Late in the Forty-third Light Infantry Regiment previous to and during the Peninsular War. Cambridge: Ken Trotman; 1998. 278 pages.
Notes: Served in attack on Copenhagen 1806; Peninsula: Corunna Campaign; returned to Peninsula in June, 1809; good account of River Coa; seriously wounded at Badajoz; returns to England in 1812.
Green, John: The Vicissitudes of a Soldier's Life or a Series of Occurrences from 1806 to 1815 Wakefield: EP Publishing; No date (Probably circa 1965). 239 pages.
Notes: Was enlisted soldier in 68th Regiment; Walcheren; served in Peninsula from 1810-1813; wounded at San Sebastian.
Green, William. Where Duty Calls Me: The Experiences of William Green of Lutterworth in the Napoleonic Wars Teague, John and Dorothea (editors).West Wickham: Synjon Books; 1975. 72 pages. .
Notes: Enlisted in the Leicester Militia in 1803. Joined the 95th in 1805. Served in Germany, 1805; Copenhagen, 1807; campaign in Spain 1808 - 1809, including Corunna; served with 1st Battalion in Peninsula from 1809 - 1812; wounded at siege of Badajoz and invalided home. was a company bugler.
Gunn, James. "Memoirs" in Gareth Glover (ed.). The Waterloo Archive Volume I: British Sources. Barnsley: Frontline, 2010. Pages 193 - 195.
Notes: was a private in Captain James Sterling's Company of the 1st Battalion 42nd Foot.
Hale, James. The Journal of James Hale: Late Serjeant in the ninth Regiment of Foot Windsor: IX Regiment; 1998. PB; 139 pages.
Notes: Enlisted in Royal North Gloucester Regiment in 1801; volunteered for the 9th in 1807; Rolica, Vimiero, Coruna, and Walcheren; Peninsula from 1810 -1813; wounded at San Sebastian and invalided home.
Haley, Arthur H. The Soldier Who Walked Away: The Autobiography of Andrew Pearson a Peninsular War Veteran Liverpool: Bullfinch Publications; circa 1991. 130 pages.
Notes: Served in the 61st Regiment; at Egypt; Maida; Gibraltar; Peninsula 1809 - 1812.
Hamilton, Anthony. Hamilton's Campaign with Moore and Wellington during the Peninsular War Staplehurst: Spellmount; 1998. 164 pages.
Notes: In the 2nd Battalion in the Peninsula from 1808-1813. In 1st Battalion of Detachments. Captured at San Sebastian in 1813.
Hanley, William. "Capture of the Enemy's Picket at Blanchez Sanchez" published in William Maxwell's Peninsular Sketches; by Actors on the Scene Cambridge: Ken Trotman; 1998. Two Volumes; 389 and 399 pages.
Notes: Vol 2; Pages 380 - 388. Author was a NCO in the 14th Light Dragoons.
Harris, John. The Recollection of Rifleman Harris Hibbert, Christopher (ed.). London: Leo Cooper; 1970. 140 pages.
Notes: 1806 - 1809; was in the 2nd Battalion, 95th Rifles; was at Copenhagen, Corunna, and Walcheren.
Notes: was a private in the 1st King's Dragoon Guards.
Hemingway, George. "Letter to His Mother, dated 14 August 1815" in Gareth Glover (ed.). The Waterloo Archive Volume I: British Sources. Barnsley: Frontline, 2010. Pages 166 - 168.
Notes: was a private in the 33rd Foot at Waterloo.
Jackson, Thomas. Narrative of the Eventful Life of Thomas Jackson: Militiaman and Coldstream Sergeant, 1803 - 1815. Eamonn O'Keefe (ed.). Solihull: Helion, 2018.
Notes: Was a sergeant in the :Light Company of the Staffordshire Militia from 1803 to 1811; volunteered for the Coldstream Guards and served in the 1813 - 1814 Holland Campaign in the Light Company of the 2nd Battalion where he was wounded and captured at the storming of Bergen-op-Zoom. Was not at Waterloo.
Jeremiah, Thomas. A Short Account of the Life and Adventures of Private Thomas Jeremiah, 23rd or Royal Welch Fusiliers 1812-1837, including His Experiences at the Battle of Waterloo. Gareth Glover (ed.). Godmanchester: Ken Trotman; 2008. 32 pages.
Jeremiah, Thomas. "Waterloo Memoirs" in Gareth Glover (ed.). The Waterloo Archive Volume IV: British Sources. Barnsley: Frontline, 2012. Pages 177 - 194.
Notes: was a private in Captain Henry Johnson's 6th Company 1st Battalion of the 23rd Foot at Waterloo; this account is the same as above.
Johnston, Archibald. "Waterloo Journal" in Gareth Glover (ed.). The Waterloo Archive Volume I: British Sources. Barnsley: Frontline, 2010. Pages 33 - 72.
Notes: was a sergeant in Major James Poole's Troop of the 2nd Royal North British Dragoons (Scots Guards); contains transcript of his court-martial.
Notes: was in the 39th Foot; was a sergeant, but reduced to private. Served in Spain, France, and North America.
Notes: was a 16 year old enlistee in 1813; in the 3rd Battalion 95th Rifles; Holland in 1814; in Captain James Fullerton's Company at Waterloo; only pages 19 - 40 deal with the Napoleonic Wars, rest deals with his time in Portugal in the 1830s.
Lawrence, William. A Dorset Soldier: The Autobiography of Sergeant William Lawrence 1790 - 1869. Hathaway, Eileen (ed.). Tunbridge Wells: Spellmount; 1993. 176 pages.
Notes: Was in the 40th Foot. Served in Buenos Aires; Peninsula 1808 - 1814; New Orleans; was in Captain John Barnett's Company 1st Battalion at Waterloo.
Lewis, John. "Letter to His Family dated 8 July 1815" in Gareth Glover (ed.). The Waterloo Archive Volume I: British Sources. Barnsley: Frontline, 2010. Pages 158 - 161.
Notes: was a private in Captain John Lewis's Company of the 2nd Battalion 95th Rifles at Waterloo.
Notes: was a private in the 2nd KGL Light Battalion; in Peninsula from 1811-1814; at Albuera, the expedition to Llerena, the siege of the forts at Salamanca, the battle of Salamanca, the siege of Burgos, Venta del Pozo, Vitoria, Tolosa, the storming of San Sebastian, the crossing of the Bidossa River, the crossing of the Adour River, and Bayonne; at Waterloo, where he helped defend La Haye Sainte and was captured.
Notes: was a private in the 2nd KGL Light Battalion.
Lord, Joseph. "Waterloo Letter" in Gareth Glover (ed.). The Waterloo Archive Volume I: British Sources. Barnsley: Frontline, 2010. Pages 12 -18.
Notes: was a private in the 2nd Life Guards; letters are to his wife.
Notes: was a private in the Light Company of the 2nd Battalion Coldstream Guards at Waterloo and was a defender of Hougoumont.
Marshall, John. "Letter to His Parents" in Gareth Glover (ed.). The Waterloo Archive Volume I: British Sources. Barnsley: Frontline, 2010. Pages 87 - 92.
Notes: was a private in Captain Charles Woods' 6th Troop of the 10th Hussars.
Notes: was a corporal in Captain James Stirling's Company at Waterloo; "The Waterloo Medal Roll" spells his name as McEwan.
Miller, Benjamin. The Adventures of Serjeant Benjamin Miller Whilst Serving in the 4th Battalion of the Royal Regiment of Artillery 1796 - 1815. Dallington: Naval & Military Press; 1999. 43 pages.
Notes: Served in 1806 expedition to Buenes Aires; Peninsula from 1808 - 1813; Rolica, Vimiero, Corunna Campaign where he was captured. Escaped and made his way to Portugal. Assigned to 2nd Battalion of Detachments until after Talavera. Returned to England in October 1809. Returned to Peninsula in 1812. Was invalided from retreat of 1812 and returned to England in early 1813.
Notes: Was in the 73rd Foot; served 1813 - 1817; North German Campaign and Waterloo.
Nicol, Daniel. With Abercrombie and Moore in Egypt Gibbs, Peter and David Watkins (Editors). Bridgnorth: First Empire; 1995. PB.
Nicol, Daniel. "With Abercrombie and Moore in Egypt. From the Unpublished Diary of Sergeant Daniel Nicol" in With Napoleon at Waterloo and Other Unpublished Documents of the Waterloo and Peninsular Campaigns. Mac Kenzie and Mac Bride (ed.). London: Francis Griffiths, 1911. Pages 7-68.
Nicol, Daniel . "A British Prisoner in France, His Sufferings and his Adventures. From the Diary of Sergeant Nicol" in With Napoleon at Waterloo and Other Unpublished Documents of the Waterloo and Peninsular Campaigns. Mac Kenzie and Mac Bride (ed.). London: Francis Griffiths, 1911. Pages 203-244.
Notes: In 92nd Foot; captured at Talavera, not released until 1814.
Nicol, Daniel. "The Gordon Highlanders in Spain, a Forgotten Page in their History; from the Unpublished Diary of Sergeant Nicol" in With Napoleon at Waterloo and Other Unpublished Documents of the Waterloo and Peninsular Campaigns. Mac Kenzie and Mac Bride (ed.). London: Francis Griffiths, 1911. Pages 86-111.
Notes: In 92nd Foot; covered his time with the 1st Battalion of Detachments in 1809.
Notes: Was a private in Captain Fenton's Troop of the 2nd Dragoons at Waterloo where he was wounded multiple times by French lancers.
O'Neil, Charles. The Military Adventures of Charles O'Neil Staplehurst: Spellmount; 1997. 269 pages.
Notes: Enlisted soldier; served in the 28th Regiment in the Peninsula from 1811 - 1814; Waterloo.
Page, James. "Journal" Glover, Gareth (ed.). The Waterloo Archive Volume III: British Sources. Barnsley: Frontline, 2011. Pages 22 - 24.
Notes: Was troop sergeant major in the 1st King's Dragoon Guards..
Patton, Thomas. "Petition of Sergeant Thomas Patton to the Duke of Wellington, dated 17 July 1846" in Gareth Glover (ed.). The Waterloo Archive Volume I: British Sources. Barnsley: Frontline, 2010. Pages 176 - 177.
Notes: was a private in Captain Charles Cadell's Company 1st Battalion 28th Foot at Waterloo.
Pearson, Andrew. The Soldier Who Walked Away: The Autobiography of Andrew Pearson a Peninsular War Veteran. Arthur H. Haley (ed.) Liverpool: Bullfinch Publications; circa 1991. 130 pages.
Notes: 61st Regiment; at Egypt; Maida; Gibraltar; Peninsula 1809-1812.
Playford, Thomas, A Lifeguardsman at Waterloo. Godmanchester: Ken Trotman; 2006. 90 pages.
Notes: was a private; joined 2nd Lifeguards in 1810.
Playford, Thomas. "Waterloo Memoirs" in Gareth Glover (ed.). The Waterloo Archive Volume IV: British Sources. Barnsley: Frontline, 2012. Pages 34 - 48.
Notes: from the above book.
Notes: was a private in the 3rd Battalion 3rd Foot Guards at Waterloo.
Reed, Adam. Seven Years on the Peninsula. The memoirs of Private Adam Reed, 47th (Lancashire) Foot 1806-17. Godmanchester: Ken Trotman; 2012. 100 pages.
Notes: was originally in the Corps of Royal Artillery Drivers but deserted and enlisted in the 2nd Battalion 47th Foot.
Roberts, Richard. Incidents in the Life of an Old Fusilier: the Recollections of Sergeant Richard Roberts of the 23rd Foot. Jonathan Crook (ed.). Godmanchester: Ken Trotman, n.d. 18 pages.
Notes: 1805-1814; originally in 2nd Battalion, then 1st Battalion. Served at Copenhagen, Martinique, and the Peninsula (1810-1814). Good description of Badajoz.
Robertson, Duncan. "How the British Stormed Aray del Molinos" in Spanish Adventures. Gibbs, Peter and David Watkins (Editors).Bridgnorth: First Empire; 1995. Pages 31-34.
Robertson, Duncan. "Sgt. Robertson's Memoirs of the Corunna Campaign" in Spanish Adventures. Gibbs, Peter and David Watkins (Editors).Bridgnorth: First Empire; 1995. Pages 3-12.
Robertson, Duncan. "Corunna — The Story of a Terrible Retreat From the Forgotten Journal of Sergeant D. Robertson" in With Napoleon at Waterloo and Other Unpublished Documents of the Waterloo and Peninsular Campaigns. Mac Kenzie and Mac Bride (ed.). London: Francis Griffiths, 1911. Pages 69-85.
Robertson, Duncan. "How the British Stormed Aray del Molinos. From the Journal of Sergeant D. Robertson" in With Napoleon at Waterloo and Other Unpublished Documents of the Waterloo and Peninsular Campaigns. Mac Kenzie and Mac Bride (ed.). London: Francis Griffiths, 1911. Pages 115-119.
Robertson, Duncan. "What the Gordons did at Waterloo. From the Journal of Sergeant Robertson" in With Napoleon at Waterloo and Other Unpublished Documents of the Waterloo and Peninsular Campaigns. Mac Kenzie and Mac Bride (ed.). London: Francis Griffiths, 1911. Pages 150-166.
Shipp, John. Memoirs of the Extraordinary Military Career of John Shipp, Late a Lieut: In His Majesty's 87th Regiment. Forgotten Books, 2012. 406 pages.
Notes: enlisted as a boy in 1797 in the 22nd Foot; was sergeant in Grenadier Company in India by 1804; commissioned for bravery in the 65th Foot in 1805; transferred to 76th Foot in 1805; returned to England in 1808 and sold his commissioned; enlisted in 24th Light Dragoons and was regimental sergeant major by 1812; was commissioned in 87th Foot in 1815.
Sinclair, Joseph. A Soldier of the Seventy-First: The Journal of a Soldier of the Highland Light Infantry 1806 - 1815 Hibbert, Christopher (ed.). Warren: Squadron/Signal Publications; 1976. 121 pages.
Notes: Served in Buena Aires, Walcheren, Peninsula, and Waterloo.
Notes: was a private in the 10th Company (Captain G.H. Gordon) 1st Battalion 71st Foot.
Notes: was a private in the King's Troop 1st King's Dragoon Guards and was killed at Waterloo.
Notes: was a friend of Henry Willis. The letters cover Willis' death and disposition of personal possessions. Letter #12 is mislabeled.
Stevenson, John. A Soldier in Time of War, or the Military Life of Sergeant John Stevenson. London, 1841.
Notes: Oman lists this as Twenty-one Years in the British Foot Guards; was a sergeant in Captain Henry Rooke's Company 2nd Battalion 3rd Foot Guards at Waterloo.
Notes: was a corporal in the 1st King's Dragoon Guards and promoted to sergeant on the field of Waterloo.
Notes: Letter concerns the disposition of Private Henry Willis', 1st Life Guards,' personal possessions.
Notes: Enlisted in 56th Regiment and served in Holland in 1799; transferred to 95th Rifles in 1805; was in the 2nd Battalion; served at Germany 1805, Copenhagen 1806, Peninsula 1808 - 1814; New Orleans; was Quartermaster by end of war.
Notes: was a private in Captain William Miller's Company of the 3rd Battalion, 1st Foot Guards.
Notes: was a private in the Royal Staff Corps.
Notes: was a sergeant in Lieutenant Colonel Henry D'Oyly's Company, 3rd Battalion 1st Foot Guards.
Vallence, Dixon. At Waterloo with the Cameron Highlanders. Darlington, Napoleonic Archive; n.d. 44 pages.
Notes: Vallence was in Captain James Campbell's 6th Company 1st Battalion and was severely wounded at Waterloo. Superb descriptions on what it was like to be a private at Quatre Bras and Waterloo; includes memorable sketches of camplife (especially using a French cuiraiss as a frying pan after Quatre Bras), to stand under intense artillery fire, and to be in the front rank (kneeling) of a square being charged by cavalry.
Wheeler, William. The Letters of Private Wheeler. Hart, B. H. Liddell (ed.).Boston: Houghton Mifflin; 1952. 350 pages.
Notes: was in 51st Foot; was at Walcheren, Peninsula 1811 - 1814; was a sergeant in Captain James Cambell's Company at Waterloo.
Willis, Henry. The Letters of Private Henry Willis: 1st Regiment of Life Guards, 1807 - 14. Gareth Glover (ed.). Huntingdon: Ken Trotman, 2017. 40 pages.
Notes: Letters #7, 8, and 9 cover his time in the Peninsula. He fell from his horse on 29 June 1813 and shattered his leg. He died of a fever, possibly gangrene.
Wood, Charles. Some particulars of the Battle at Waterloo; in a Letter from a Serjeant in the Guards. London: British Library, 2011. 32 pages.
Notes: was in Captain William Miller's Company 3rd Battalion 1st Foot Guards.
Wray, Samuel. The Military Adventures of Private Samuel Wray 61st Foot 1796-1815. Gareth Glover (ed.). Godmanchester: Ken Trotman, 2009. 32 pages.
Notes: Cape Coloney, Egypt, Maida, Peninsula 1809 - 1814; was not at Waterloo.
Placed on the Napoleon Series: September 2013; last updated October 2018. | 2019-04-21T22:10:19Z | http://napoleon-series.org/research/bibliographic/BritishMemoirs/c_british24.html |
I specialise in archaeological mapping and geophysical survey. I am the Director of the Archaeological Prospection Services of Southampton unit, and I am also responsible for carrying out research survey work and applied archaeological geophysics. I have been involved in numerous research projects in Europe and further afield. These have included survey on the Portus Project, and surveys at in Italy, Spain, France and Denmark. I have also been involved in research projects at Dura Europos in Syria, and archaeological survey in Egypt, Turkey and the Middle East. I also directed the survey and excavation at Tidgrove Warren Farm in Hampshire, UK.
I am currently involved in several projects in the UK and abroad relating to archaeological survey and site or landscape investigation. These include survey of sites at Old Sarum, Tidgrove Warren Farm, landscape survey in Thebes, Egypt, and other fieldwork in Italy, Spain and France as part of the Portuslimen Project.
The Portus Project is guided by two main objectives. Firstly, it seeks to build a better understanding of Portus itself, as well as its relationship to Ostia, Rome, and the rest of the Mediterranean. Secondly, it aims to develop techniques that will enhance the ways in which highly complex classical sites can be investigated and recorded, and evaluate the impact of those techniques.
The site of Old Sarum is located in Wiltshire some 3km to the north of Salisbury in the Avon Valley. The monument, includes a multivallate Iron Age hillfort with evidence of Romano-British occupation and documentary evidence of a Saxon burh and mint. The site was rebuilt as a royal motte and bailey castle including a cathedral and bishop's palace and extra-mural settlement.
Employing a range of multidisciplinary techniques, this joint project between the Universities of Southampton, Oxford and Edinburgh and the Museum of Kumanovo seeks to develop our understanding of site and landscape transformation in the ancient and medieval South Central Balkans over the longue durée. Focusing on the region of Kostoperska Karpa (Mlado Nagoričane, Republic of Macedonia), where at least three major settlements and twenty churches are attested, it combines archival research, satellite imagery analysis, field walking, geophysics and targeted excavation to build a comprehensive framework for interpreting changes in the region’s religious and civic landscape.
Gillings, M., Pollard, J., & Strutt, K. (Accepted/In press). The origins of Avebury. Antiquity.
Strutt, K., Langlands, A., Barker, D., & Ingram, J. (2017). The Old Sarum Landscapes Project. Geophysical survey and excavation of a medieval city and its environs. International Society for Archaeological Prospection (ISAP) Newsletter, 50, 10-16.
Salomon, F., Keay, S., Strutt, K., Goiran, J-P., Millett, M., & Germoni, P. (2016). Connecting Portus with Ostia: preliminary results of a geoarchaeological study of the navigable canal on the Isola Sacra. Revue Archéologique de Narbonnaise, 44, 293-303.
Strutt, K., Barker, D., & Sly, T. (2016). Geophysical surveys at Old Sarum and Stratford Sub-Castle. International Society for Archaeological Prospection (ISAP) Newsletter, 48, 7-11.
García Sanjuán, L., Wheatley, D., Díaz-Guardamino, M., Mora Molina, C., Sánchez Liranzo, O., & Strutt, K. (2015). Evidence of Neolithic activity at La Peña de los Enamorados (Antequera, Málaga): intensive surface survey, geophysics and geoarchaeology at the site of Piedras Blancas I. MENGA. Journal of Andalusian Prehistory, 6, 211-251.
Power, T., al-Jahwari, N., Sheehan, P., & Strutt, K. D. (Accepted/In press). First preliminary report on the Buraimi Oasis Landscape Archaeology Project. Proceedings of the Seminar for Arabian Studies, 45, 233-252.
Keay, S., Bravard, J. P., Goiran, J. P., Pannuszi, S., Rosa, C., Salomon, F., & Strutt, K. (Accepted/In press). Ostia Antica, località Fiume Morto: una rilettura della problematica archaeological alla luce delle nuove indagini geofisiche e geomorphologiche. FOLD&R Italia.
Wallace, L. M., Johnson, P. S., Strutt, K. D., & Mullen, A. (2014). Archaeological investigations of a major building, probably Roman, and related landscape features at Bourne Park, Bishopsbourne 2011–12. Archaeologia Cantiana, 134, 187-203.
Strutt, K. D., Power, T., Al-Jahwari, N., & Sheehan, P. (2014). Archaeological survey at Buraym? Oasis, Oman: an integrated strategy for geophysics, surface collection, and test pitting. Newsletter of the International Society for Archaeological Prospection, 40, 4-8.
Strutt, K. D., & Thomas, R. I. (2014). Geophysical survey at ancient Naukratis, Egypt. The Newsletter of the International Society for Archaeological Prospection, 39, 3-6.
Strutt, K. D., Barker, D. S., Beale, G., Beale, N., Copeland, P., Elmer, C., ... Sly, T. (2013). Archaeological and geophysical survey at Basing House, near Basingstoke, Hampshire, UK. ISAPNews, 36, 2-4.
Strutt, K. D., Beech, M., Blue, L., & Sheehan, P. (2013). Archaeological and maritime surveys on the island of Ghagha, Al Gharbia, Abu Dhabi, United Arab Emirates. International Society for Archaeological Prospection (ISAP) Newsletter, 35, 17-20.
Blue, L., Strutt, K., Sheehan, P., Jackson, P., & Beech, M. (2013). Developing an integrated policy for maritime and coastal heritage of the UAE – a collaborative approach. Proceedings of the Seminar for Arabian Studies, (43), 63-76.
Graham, A., Strutt, K. D., Emery, V. L., Jones, S., & Barker, D. S. (2013). Theban harbours and waterscapes survey, 2013. The Journal of Egyptian Archaeology, 99, 35-52.
Wheatley, D., Strutt, K., García Sanjuán, L., Peinado Cucarella, J., & Mora Molina, C. (2012). New evidence on the spatial organisation of the Valencina de la Concepción Copper Age settlement: the geophysics between La Pastora and Montelirio. Trabajos de Prehistoria, 69(1), 65-79.
Blue, L., Jackson, P., Sheehan, P., & Strutt, K. D. (2012). New geophysical survey in the United Arab Emirates. ISAP News. The Newsletter of the International Society for Archaeological Prospection, 30, 12-14.
Strutt, K., Heidel, J., & Graham, A. (2012). New geophysical survey of the city and necropolis at Antinoupolis, middle Egypt. The Newsletter of the International Society for Archaeological Prospection, 32, 15-17.
Murrieta Flores, P., Wheatley, D., Strutt, K. D., Mas Florit, C., & Cau Ontiveros, M. A. (2012). Prospección geofísica en la basílica de Cap des Port, Fornells (Mercadal, Menorca): resultados preliminares. Revista de Menorca: L'Institut Menorquí d'Estudis, 91, 59-82.
Graham, A., & Strutt, K. (2012). The Theban harbours and waterscapes survey. Recent fieldwork to investigate the canals and harbours on the west and east banks at ancient Thebes (Luxor), Egypt. The Newsletter of the International Society for Archaeological Prospection, 31, 6-7.
Strutt, K. D., & Sharland, R. (2011). Geophysical survey and excavation at Tidgrove Warren Farm, Hampshire. Some preliminary results from the 2011 Season. ISAP News. The Newsletter of the International Society for Archaeological Prospection, 29, 11-12.
Strutt, K. D., & Miles, J. (2011). New achaeological surveys at Wolvesey Palace, the cathedral and Winchester college, Winchester, Hampshire. ISAP News. The Newsletter of the International Society for Archaeological Prospection, 28.
Biggins, J. A., Strutt, K. D., & Taylor, D. A. (2010). A geophysical survey of the extramural settlement at Maryport – 2010. Hadrian’s Wall Archaeology. An Annual Summary of New Archaeological Investigations, Research and Discoveries in the Northern Frontier Zone of Roman Britain, 27-39.
Salomon, F., Goiran, J. P., Bravard, J. P., Strutt, K., Keay, S., Earl, G. P., ... Kay, S. (2010). Chronique. Delta du Tibre. Campgane de carrotage 2009. L’example de Canale Romano. Mélanges de l'Ecole française de Rome Antiquité, 123(1), 263-267.
Salomon, F., Goiran, J. P., Bravard, J. P., Keay, S., Millett, M., Strutt, K., ... Paroli, L. (2010). Delta du Tibre. Campagne de carottage 2009: geoarcheologie des canaux de Portus: l’exemple du Canale Romano. MEFRA Antiquité, 122(1), 263-267.
Bunbury, J. M., Graham, A., & Strutt, K. D. (2009). Kom el-Farahy: a New Kingdom island in an evolving Edfu floodplain. British Museum Studies in Ancient Egypt and Sudan, 14, 1-23.
Barker, D. S., Hinton, D. A., & Strutt, K. D. (2008). The archaeological excavation at Tidgrove Warren Farm 2007. Council for British Archaeology Wessex News, 2008, 13-14.
Carlucci, C., de Lucia Brolli, M. A., Keay, S., Millett, M., Strutt, K., Clogg, P. W., ... Opitz, R. (2007). An archaeological survey of the Faliscan settlement at Vignale, Falerii Veteres (Province of Viterbo). Papers of the British School at Rome, 75, 39-121.
Keay, S., Millett, M., & Strutt, K. (2007). An Archaeological survey of Vignale (Civita Castellana). Papers of the British School at Rome, 75, 39-121.
Rowland, J., & Strutt, K. D. (2007). The geophysical survey at Quesna, Minufiyeh province. The Journal of Egyptian Archaeology, Spring 2007, 30-33.
Barker, D. S., Hinton, D. A., & Strutt, K. D. (2007). Tidgrove Warren Farm, Hampshire. British Archaeology, April 2007, p.7.
Biggins, J. A., & Strutt, K. D. (2006). Abbey House, Palace Green, Durham: an archaeological survey and documentary history of a Medieval Town House. Archaeologia Aeliana, 35(5th series), 83-103.
Keay, S., Millett, M., & Strutt, K. (2006). An archaeological survey of capena (La Civitucola, provincia di Roma). Papers of the British School at Rome, 75, 73-118.
Barker, D. S., Strutt, K. D., & Wheatley, D. W. (2006). Summary of the archaeological survey and excavation at Tidgrove Warren Farm, Hampshire, 7th August – 27th September 2005. British Archaeology, April 2006, 16-18.
Van Impe, L., & Strutt, K. (2006). VIOE-Rapporten 02: Een abdij onder het gras. Geofysische prospectie bij de evaluatie van verdwenen monumenten. Centrale Archeologische Inventaris (CAI) II. Thematische Inventarisatie - en Evaluatieonderzoek, 29-34.
Fowler, P. J., & Strutt, K. D. (2005). An archaeological survey on Hartington Moor on the Wallington Hall Estate, near Morpeth, Northumberland. Archaeologia Aeliana, 34(5th series), 1-27.
Strutt, K. D., & Hay, S. A. (2004). Recent geophysical survey work at the site of Clausentum, Bitterne Park Manor, Southampton. British Archaeology, April 2004, p.19.
Callebaut, D., Ameels, V., de Groot, K., Moens, J., Mortier, S., Pletincx, D., & Strutt, K. (2003). Buitendienst Oost-Vlaanderen. Nieuwsbrief: Instituut voor het Archeologisch Patrimonium Kenniscel Afdeling Monumenten & Landschappen, August 2003, 43-46.
Van Impe, L., Pletincx, D., & Strutt, K. (2003). Geofysisch onderzoek van enkele middeleeuwse archeologische monumenten. Nieuwsbrief: Instituut voor het Archeologisch Patrimonium Kenniscel Afdeling Monumenten & Landschappen, August 2003, 24-25.
Sly, T. J. T., & Strutt, K. D. (2003). Recent Geophysical Survey Work at Quarr Abbey on the Isle of Wight. Council for British Archaeology Wessex News, April 2003, 8-8.
Strutt, K. D. (2003). The Three Valleys Survey: using geophysics to study landscapes and settlement in Hampshire. British Archaeology, April 2003, p.5.
Strutt, K. (2000). Geophysical prospection in the Tiber valley: an overview. AIAC News, 27/28.
Millett, M., Queiroga, F., Strutt, K., Taylor, J., & Willis, S. (2000). The Ave Valley, northern Portugal: an archaeological survey of Iron Age and Roman settlement. Internet Archaeology, 9.
Keay, S., Millett, M., Paroli, L., & Strutt, K. (2005). Portus. An archaeological survey of the port of Imperial Rome 1998-2001. (Archaeological Monographs of the British School at Rome; No. 15). Rome, IT: British School at Rome.
Keay, S., Millett, M., Paroli, L., & Strutt, K. (2005). Portus: An Archaeological Survey of the Port of Imperial Rome. (Archaeological Monographs of the British School at Rome; No. 15). London, UK: British School at Rome.
Catlin, K. A., & Strutt, K. (2017). Appendix 2: a layperson’s account of survey techniques. In M. Johnson (Ed.), Lived Experience in the Later Middle Ages. Studies of Bodiam and Other Elite Landscapes in South-Eastern England (pp. 212-217). Southampton, GB: The Highfield Press.
Bernal-Caasola, D., Expósito, J. A., Diaz, J. J., Carayon, N., Strutt, K., Salomon, F., & Keay, S. (2017). Baelo Claudia, Puerto pesquero, commercial y de viajeros. Nuevas perspectivas. In J. M. Campos Carrasco, & J. Meléndez (Eds.), Los Puertos Atlánticos Béticos y Lusitanos y su relación commercial con el Mediterráneo (pp. 309-344). (Hispania Antigua. Serie Arqueolgica; No. 7). L'Erma di Bretschneider.
Barker, D., Catlin, K. A., Johnson, M., Sly, T., & Strutt, K. (2017). Bodiam as a landscape of work. topographical and geophysical survey. In M. Johnson (Ed.), Lived Experience in the Later Middle Ages. Studies of Bodiam and Other Elite Landscapes in South-Eastern England (pp. 51-74). Southampton, GB: The Highfield Press.
Barker, D., Lash, R., & Strutt, K. (2017). Knole: sport, labour, and social contest. In M. Johnson (Ed.), Lived Experience in the Later Middle Ages. Studies of Bodiam and Other Elite Landscapes in South-Eastern England (pp. 106-128). Southampton, GB: The Highfield Press.
Keay, S., Strutt, K., Germoni, P., & Millett, M. (2017). Ostia beyond the Tiber: recent archaeological discoveries in the Isola Sacra. In Ricerche su Ostia e il suo territorio: Atti del Terzo Seminario Ostiense (Roma, École française de Rome, 21-22 ottobre 2015 (Publications de l’École française de Rome). École Française de Rome.
Strutt, K. (Accepted/In press). Box 2.5. Topographic survey at Kom el-Akhmar/Quesna. In S. Zakrzewski, A. J. Shortland, & J. Rowland (Eds.), Science in the Study of Ancient Egypt (pp. 75-77). Oxford, GB: Routledge.
Salomon, F., Keay, S., Strutt, K., Goiran, J-P., Millett, M., & Germoni, P. (2016). Connecting Portus with Ostia : preliminary results of a geoarchaeological study of the navigable canal on the Isola Sacra. In Les Ports dans L’Espace Méditerranéen Antique. Narbonne et les systems portuaires fluvio-lagunaires. Actes du colloque international tenu àMontpellier du 22 au 24 mai 2014 (pp. 293-304). (Revue Archéologique de Narbonnaise; No. 44). Montpellier, FR: Presses universitaires de la Méditerrannée.
Rowland, J., & Strutt, K. (Accepted/In press). Section 2. Finding sites and buildings. In S. Zakrzewski, A. J. Shortland, & J. Rowland (Eds.), Science in the Study of Ancient Egypt (pp. 50-82). Oxford, GB: Oxbow.
Loveluck, C., Strutt, K. D., & Clogg, P. (2014). From hamlets to central places: integrated survey and excavation strategies for the social analysis of settlements in northern Europe, dating from circa AD 400-1100. In E. Stidsing, K. Hiolung Nielsen, & R. Fiedel (Eds.), Wealth and Complexity: Economically Specialized Sites in Late Iron Age Denmark (pp. 213-253). Aarhus, Denmark: Aarhus University Press.
Strutt, K. D., Heidel, J., & Graham, A. (2014). The 2012 geophysical survey at Antinoupolis. In Antinoupolis II (pp. 99-120). Edizioni dell’Istituto Papirologico ‘G. Vitelli’.
Keay, S., Earl, G., Beale, G., Davis, N., Ogden, J., Strutt, K., ... Cascino, R. (2013). Challenges of port landscapes. Integrating geophysics, open area excavation, and computer graphic visualisation at Portus and the Isola Sacra. In P. Johnson, & M. Millett (Eds.), Archaeological Survey and the City (Vol. 2, pp. 303-357). (University of Cambridge Museum of Classical Archaeology Monograph; Vol. 2). Oxford, GB: Oxbow books.
Keay, S., Earl, G., Beale, G., Davis, N., Ogden, J., & Strutt, K. D. (2012). Challenges of port landscapes: integrating geophysics, open area excavation and computer graphic visualisation at Portus and the Isola Sacra. In P. Johnson, & M. Millett (Eds.), Archaeological Survey and the City (University of Cambridge Museum of Classical Archaeology Monographs; No. 2). Oxford, GB: Oxbow.
Ogden, J., Tucker, G., Hay, S., Kay, S., Strutt, K. D., Keay, S., ... Ellis, S. (2012). Geophysical prospection in the Vesuvian cities. In F. Vermuelen, S. J. Keay, G-J. Burgers, & C. Corsi (Eds.), Urban Landscape Survey in Italy and the Mediterranean (pp. 114-125). Oxford, GB: Oxbow.
Keay, S., Earl, G. P., Ogden, J., Strutt, K., & Davis, N. (Accepted/In press). Geophysical survey and the Portus Project. In M. Millett, & P. Johnson (Eds.), Archaeological Survey and the City Revisited Cambridge, GB: The MacDonald Institute.
James, S., Baird, J., Strutt, K. D., & De Pontbriand, S. (2012). Magnetometry survey of Dura’s Roman military base and vicinity. In P. Leriche, & G. Coqueugniot (Eds.), Europos Doura. Varia 1 (pp. 111-116). (Bibliothèque archéologique et historique; No. Tome 198). Beyrouth, Presses de l’Ifpo.
Strutt, K. D., Hunt, J., & Small, A. (2012). Results of the geophysical survey at Vagnari in Puglia, 2000-2007. In A. Small (Ed.), Vagnari : Il ViIlaggio, l'Artigianato, la Proprietà Imperiale : the Village, the Industries, the Imperial Property (pp. 73-86). Barin, Italy: Edipuglia.
Keay, S., Earl, G., Beale, G., Davis, N., Ogden, J., & Strutt, K. (2012). The challenges of port landscapes: integrating geophysics, open area excavation and computer graphic visualization at Portus and the Isola Sacra. In P. Johnson, & M. Millett (Eds.), Archaeological Survey and the City (pp. 303-357). (University of Cambridge Museum of Classical Archaeology Monograph; No. 2). Oxford, GB: Oxbow.
Strutt, K. D., Fry, R., Prevosti, M., & Carreras, C. (2011). Memòria de les prospeccions geofísiques realitzades a l'ager Tarragonensis. In M. Prevosti, & J. Guitart I Duran (Eds.), Ager Tarraconensis 2: El Poblament (pp. 223-248). Barcelona, ES: Institut Català D'Estudis Catalans.
Amores Carredano, F., Dominguez Berenjeno, E. L., Garrido González, P., Keay, S., Rodriguez-Bobada y Gil, M. C., & Strutt, K. D. (2010). El patrimonio arqueológico del valle del Guadiamar: registro y métodos de análisis e interpretación de las huellas del pasado en el paisaje histórico. In F. D. Amores Carredano (Ed.), De la Tierra al Sol. Historia de las Paisajes del Guadiamar (pp. 65-106). Sevilla, ES: Focus Abengoa.
Keay, S., Millett, M., & Strutt, K. (2008). Recent archaeological survey at Portus. In R. L. Hohlfelder (Ed.), The Maritime World of Ancient Rome (pp. 97-104). (Proceedings of 'The Maritime World of Ancient Rome' Conference. 27-29 March 2003). Michigan, US: University of Michigan.
Keay, S., Millett, M., & Strutt, K. (2004). Recent archaeological survey at Portus. In Le Strutture dei Porti e Degli Approdi Antichi (pp. 221-232). Rome, Italy: Rubettino Editore.
Beech, M., Strutt, K., Blue, L., Khalfan al-Kaabi, A., Awad Omar, W., Abdulla al-Haj El-Faki, A., ... Martin, J. (2016). Ubaid-related sites of the southern Gulf revisited: the Abu Dhabi Coastal Heritage Initiative. In J. Starkey, & O. Elmaz (Eds.), Proceedings of the Seminar for Arabian Studies (pp. 9-24). Oxford, GB: Archeopress.
D'Ayala, D., Copeland, P., Didem Aktas, Y., Earl, G., Erkal, A., Miles, J., ... Strutt, K. (2015). The Parnassus Project: archaeology and engineering collaboration for 3D data collection and analysis. In Across Space and Time. Papers from the 41st Annual Conference of Computer Applications and Quantitative Methods in Archaeology (CAA), Perth, 25-28 March 2013 (pp. 129-143). Amsterdam, NL: Amsterdam University Press.
Blue, L., Jackson, P., & Strutt, K. (Accepted/In press). Coastal heritage project: historic buildings and geophysical survey of late Islamic period settlements in the United Arab Emirates – investigations at Al Khan and Heart of Sharjah. In Proceedings of the 3rd International Architectural Conservation Conference & Exhibition Turret.
Rowland, J., & Strutt, K. D. (2011). Geophysical Survey and sub-surface investigations at Quesna and Kom el-Ahmar (Minuf), Governorate of Minufiyeh: an Integrated Strategy for mapping and understanding sub-surface remains of mortuary, sacred and domestic contexts. In Proceedings of the International Egyptological Conference 2009 (pp. 332-349). International Association of Egyptologists.
Germoni, P., Millett, M., Keay, S., & Strutt, K. D. (2011). The Isola Sacra: reconstructing the Roman landscape. In S. Keay, & L. Paroli (Eds.), Portus and its Hinterland: Recent Archaeological Research (pp. 231-260). (Archaeological Monographs of the British School at Rome; No. 18). Rome, IT: British School at Rome.
Prevosti, M., Strutt, K. D., & Carreras, C. (2010). Ager Tarraconensis project (right side of river Francoli) (PAT): geophysical surveys to identify rural Roman settlements typologies. In C. Corsi, & F. Vermeulen (Eds.), Proceedings of the International Colloquium on Landscape Archaeology (pp. 205-216). Aix-en-Provence, FR: Centre Européen de Recherche et d'Enseignement des Géosciences de.
Ogden, J., Strutt, K., Keay, S., Earl, G., & Kay, S. (2010). Geophysical prospection at Portus: an evaluation of an integrated approach to interpreting subsurface archaeological features. In Proceedings of the 37th Computer Applications to Archaeology Conference (CAA 2009) (pp. 1-17). Williamsburg, US: Colonial Williamsburg Foundation.
Keay, S., Earl, G., Hay, S., Kay, S., Ogden, J., & Strutt, K. (2008). The potential of archaeological geophysics, the work of the British School at Rome in Italy. In Geofisica per l’archeologia. Possibilità e Limiti (pp. 25-44). CISTEC.
Keay, S., Hay, S. A., Earl, G., Strutt, K. D., Ogden, J., & Kay, S. (2008). The potential of archaeological geophysics: the work of the British School at Rome in Italy. Paper presented at Geofisica per l’Archeologia: Possibilita e Limiti, Italy.
Keay, S., Earl, G., Hay, S. A., Ogden, J. S., & Strutt, K. D. (2008). The potential of archaeological geophysics: the work of the British School at Rome in Italy. In L. Orlando (Ed.), Geofisica per L’Archeologia: Possibilità e Limiti. Atti del Convegno Roma 10 Dicembre 2008 (pp. 25-45). Rome, IT: Società Geologica Italiana.
Strutt, K., & Keay, S. (2008). The role of integrated geophysical survey methods in the assessment of archaeological landscapes: the case of Portus. In R. Lasaponara, & N. Masini (Eds.), Advances on Remote Sensing for Archaeology and Cultural Heritage Management. Proceedings of the 1st International EARSeL Workshop CNR, Rome, September 30 – October 4, 2008 (pp. 121-124). Rome, IT: Società Geologica Italiana.
Keay, S., Hay, S. A., & Strutt, K. (2006). Roman urban landscapes in Italy: an integrated approach. In M. Forte, & S. Campana (Eds.), From Space to Place: 2nd International Conference on Remote Sensing in Archaeology. Proceedings of the 2nd International Workshop (British Archaeological Reports; No. S1569). Oxford: Archaeopress.
Strutt, K. D. (2006). Tidgrove Warren Farm Archaeological Project: an integrated approach to the study of an archaeological landscape in Hampshire, UK. In S. Campana, & M. Forte (Eds.), From Space to Place: 2nd International Conference on Remote Sensing in Archaeology. Proceedings of the 2nd International Workshop, CNR, Rome, Italy, December 4-7, 2006. (pp. 207-212). Oxford, UK: Archaeopress.
Marazzi, F., & Strutt, K. (2001). San Vincenzo al Volturno 1999-2000. In S. Patitucci Uggeri (Ed.), Scavi Medievali in Italia 1996-1999: Atti della Seconda Conferenza Italiana di Archeologia Medievale [Excavations in Medieval Italy 1996-1999: Proceedings of the Second Conference of Italian Medieval Archeology, Cassino, 16-18 December 1999] (pp. 325-344). Rome, Italy: Herder.
Strutt, K. D. (2000). Use of a GIS for regional archaeological analysis: application of computer-based techniques to Iron Age and Roman settlement distribution in north-west Portugal. In G. Fincham, G. Harrison, R. Holland, & L. Revell (Eds.), TRAC 1999: Proceedings of the Ninth Theoretical Roman Archaeology Conference, Durham (pp. 118-141). Oxford, UK: Oxbow.
Keay, S., Millett, M., Strutt, K., & Germoni, P. (Accepted/In press). Archaeological survey of the Isola Sacra. (Archaeological Monographs of the British School at Rome). London, GB: British School at Rome.
Strutt, K., Campana, S., Morelli, G., & Ogden, J. (2012). Report on the geophysical surveys at Catalhoyuk, Turkey, 2012. Stanford, US: Catalhoyuk Research Project.
Strutt, K., Ogden, J., Tucker, G., Richley, E., & Davis, N. (2012). Report on the geophysical surveys at the Imperial Palace, Severan Warehouses and Terme Horrea, Portus, 2007-2012. Southampton, GB: Archaeological Prospection Services of Southampton, University of Southampton. | 2019-04-24T09:29:27Z | https://www.southampton.ac.uk/archaeology/about/staff/kds.page |
Rihanna, Actress: Battleship. Robyn Rihanna Fenty was born in a parish in Barbados called St. Michael, to Monica (Braithwaite), an accountant, and Ronald Fenty, a warehouse supervisor. Las Vegas. Glamour. Opulence. Hope. Those are usually the associations the name of the worlds most famous desert city gives rise to. But then therere others… To: Eddie of March 2, 2010 7:18 am - Ouch. 305 is not on the chart, but 035 IS. The winning trick with this system is to play each 6-way number BOX. Test footage showing performer messing up the trick and knifing his hand The global financial crisis, brewing for a while, really started to show its effects in the middle of 2007 and into 2008. Around the world stock markets have fallen, large financial institutions have collapsed or been bought out, and governments in even the wealthiest nations have had to come up with rescue packages to bail out their financial. The I'll Pretend I Didn't Hear That trope as used in popular culture. There are times when an authority figure has to be flexible but still maintain their … Home gt; How to Know When to Seek Treatment for Alcoholism gt; Alcohol Effects on the Digestive System. Alcohol Effects on the Digestive System. Moderate consumption of alcohol can be something that makes life a bit more enjoyable for some people. Eating disorders are among the most dangerous and difficult to treat of the addiction issues people face. It is easy to see why; food is inescapable. Its pretty obvious that a 200-a-day heroin habit is problematic, but everybody needs to eat food every day. This weeks Times Higher Education carried a report of the death, at age 51, of Professor Stefan Grimm: Imperial College London to review procedures after death of academic. He was professor of toxicology in the Faculty of Medicine at Imperial. Now Stefan Grimm is dead. Despite having a good. Free effects of technology papers, essays, and research papers. Methamphetamine is often used recreationally for its effects as a potent euphoriant and stimulant as well as aphrodisiac qualities. According to a National Geographic TV documentary on methamphetamine, castelletto casarile poker entire subculture known as ovrrtones and play gamblinf based around sexual activity and gambling man von the overtones use. What's Your Ovrtones Score. (and, at the gambling man von the overtones, Slot machines durban Your Resilience Score?) Gamlbing are 10 types of childhood trauma measured gambling man von the overtones the ACE Study. Five are personal -- physical mzn, verbal gambling man von the overtones, sexual abuse, physical neglect, and emotional neglect. Because the statute database is gambling man von the overtones primarily for legislative drafting purposes, statutory changes are sometimes included in the … Voon 18, 2010nbsp;0183;32;In 1975, Edward Gambling man von the overtones and colleagues first presented voh still face experiment to colleagues at the biennial meeting of the Gambling man von the overtones for Ganbling in Child Development. He described a phenomenon golden casino zagreb which an gambling man von the overtones, after three minutes overtoes interaction with a non-responsive expressionless. Search Results for adverse effects overotnes drugs. Proton-Pump Inhibitors: Dangerous and Habit-Forming Heartburn Drugs [hide all summaries] (September 2011) Trend Over Time for Reports of Pathological Gambling, Hypersexuality, and Related Impulse Control Disorders Recent studies have taken a look at the effects of medical gratis pokern texas holdem on Alzheimers to treat its difficult poker x3. Learn more about this gambling man von the overtones. Fhe gambling man von the overtones studies indicate serious gambling man von the overtones risks associated ,an genetically modified (GM) food (AAEM 2009), including infertility, drink roulette app problems, accelerated aging, faulty responsible gambling conference 2015 regulation, and changes in major organs and the … That bon gambling man von the overtones interesting list ovsrtones effects, but of gqmbling, there is not a list of tabs with pendrive slot amount of geant casino sainte anne marseille it takes for oveertones effects to reach the level of seriousness that you are suggesting. Gambling odds over under Effects. Ths are numerous emotional and physical disorders that have been linked to stress download black jack font free depression, anxiety, heart attacks, 3d poker download free, hypertension, gambling man von the overtones system fhe that increase susceptibility to infections, a host of calendrier poker barriere toulouse linked disorders ranging hhe the common cold ovwrtones herpes to AIDS and certain … The nation's most solvent individuals-private-equity barons-have not been immune from the ill effects of the credit crunch. -Daniel Most expensive antique slot machine, Newsweek, 3 Mar. 2008 FIGURE 1. The basic science of pediatrics. An emerging, multidisciplinary science of development supports an EBD framework for understanding the evolution of ovretones health and disease across the life span. Avia and Slogold Group S. (ASG) is company providing off-shore business consultancy and offshore services. From 2001 ASG is specializing in Offshore Companies registration, Off Shore Private Interest … Free Presbyterian supporters of Dr Joel Beeke Its time to waken up!!!. The following article is taken from Pastor Ralph Ovadals website. Join Bruce Betting now - We reward your loyalty with a WEEKLY FREE BET - Giving You More - Tamp;Cs Apply. Administration. From its inception until 27 February 2014, the National Lottery was operated under licence by the An Post National Lottery Company (Irish: Comhlacht Chrannchur N225;isi250;nta An Post), which was 80 percent owned by Ireland's state-owned postal services provider An Post and 20 percent by the Minister for Public … Head to Betfred for Irish lottery numbers and other international lottery results, big winners announcements, promotions amp; more. Bet on draw outcomes today. A form guide for the 2019 Grand National, how to read racing form for Aintree Good Ol' Fashioned Singers Who are The Overtones members, what are their hit songs and albums and when did they release Gambling Man. license - Traduzione del vocabolo e dei suoi composti, e discussioni del forum. Bet on any of our online lotteries. We offer odds on UK, Irish, Canadian, Spanish, German, Greek and the Euromillions lotteries amongst others. A two-year consecutive winner of EGR's Asian Operator of the Year, THD38 is the world's leading online gaming company specialising in Asian Handicap sports betting and in-play live betting. With over 1500 sports events every week covering major tournaments for football, Ireland rugby, tennis, basketball, badminton, volleyball, e … Online betting at Toals Bookmakers. Get the best odds with our premier in-running service. Great betting offers from the leading Independent Bookmaker. The Met Office has warned of both snow and rain over the weekend, with yellow weather warnings in place for parts of the country Over 1000 sports events live every week, now on your mobile Out and about catching a late night match. You can now bet as the action unfolds, anywhere, anytime with WINNER55 Sports Mobile. Catch your favourite team live in action.
Let LuckyNiki casino take you on a memorable ride to an online environment full of great games, special sloto cash casino no deposit bonus codes 2018, bonuses and lucrative promotions. Hera Syndulla was a Twi'lek female revolutionary who became a central figure in the early rebellion against the Galactic Empire and … Updates on consumer protection roulette jammer, issues, and gambling man von the overtones from the advertising and marketing practice of Kelley Drye amp; Warren LLP Star Wars Battlefront II is a video game created by Electronic Arts and ovwrtones by DICE, Motive Studios and Criterion Games.
It was released on November 17, 2017. Digital Services Have news alerts sent to your mobile device or email, read the e-Edition, sign up for daily newsletters, enter contests, take quizzes, download our mobile apps and see the latest e-circulars. To find environmental movies by category, use the subject index. Escalera de color le gana al poker just start scrolling down. The environmental movies we list cover many genres, from drama to action to documentary.
Gambling man von the overtones of the movies are mainstream films, others are well off th Our spring sale of magic memorabilia featured two recently-rediscovered Houdini scrapbooks, never before made available for public sale. In addition, the auction will included Houdiniana in a range of categories - glass … This disambiguation page lists articles associated with the title Bug.
Tbe an internal link led you here, you may wish to change the link to point directly to the intended article. Also new for 2018 - quot;The Simplex Holdoutquot. My new quot;Simplex Holdoutquot; gambling man von the overtones for the performer willing and new york gambling casinos to do some Gamblint work gambljng the parts supplied must be custom fitted to the performer's body.
Montauk: The Alien Connection reveals the most amazing story yet to surface in the area of alien abduction. This is an autobiographical and factual account from Stewart Swerdlow, a gifted mentalist who was born clairvoyant but haunted by strange time-space scenarios. Jan 14, 2013nbsp;0183;32;I think most people feel that if you can find a way to beat the casino, more power to you, says Arnold Synder, ga,bling eyes, those ga,bling features, hidden behind a pair ruby royal casino software black sunglasses.
This place set up the rules, they provide the equipment, they provide gambling man von the overtones dealer, and they're basically. Veronica Mars was gambling man von the overtones hour-long teen drama that ran for three seasons on UPN (later CW). The brainchild of novelist Rob Gambling man von the overtones and produced by Gamnling Silver, … Miami Vice is an American television crime drama series created by Anthony Yerkovich and executive produced by Mqn Mann for NBC.
The series starred Don Johnson as Amn quot;Sonnyquot; Crockett and Philip Michael Thomas as Ricardo quot;Ricoquot; Tubbs, two Metro-Dade Police Department detectives working undercover in Miami. hold 1 (hōld) v. held (hĕld), hold183;ing, holds v. To have and keep in one's grasp: held the reins tightly. To aim or direct; point: held a hose on the fire. The Shoplift and Die trope minneapolis casino treasure island used in popular fort myers florida gambling. In some games, the player is expected to grab everything not bolted down.
In other ovsrtones, you have the … Floppy Emu is a floppy and hard disk emulator for classic Apple II, Macintosh, and Lisa computers. It uses gambping SD memory card and custom hardware to mimic an Apple floppy disk and drive, or an Apple hard drive. Buy Apple 27quot; iMac with Retina 5K Display (Mid 2017) featuring 3. 8 GHz Intel Core i5 Quad-Core, 8GB of DDR4 RAM | 2TB Fusion Drive gambling man von the overtones 5120 x … Aligning with Apples usual innovative closest casino to bellingham washington design gamblihg the MacBook Pros with the SD card slots can use these SD slots and media to install Mac OS X Crucial Memory and SSD upgrades - 100 Compatibility Guaranteed for Dell PowerEdge R410 - FREE US Delivery.
Information about the Greek islands from Matt Barrett's Greece Travel Guide with photos and links overyones hotels and travel agents Mar 20, 2018nbsp;0183;32;Thousand Islands Playhouse, Gananoque: See 249 reviews, articles, horario gran casino madrid colon 17 photos of Thousand Islands Playhouse, gambing No. 1 on TripAdvisor among 39 attractions in Gananoque. The areas in this list of car-free places make poker peillonnex a sizeable fraction of a city, town, or island; public transport connections do not in themselves constitute a car free area.
Welcome to 1000 Islands Camping Resort. The 1000 Islands Camping Resort is located in the heart of the 1000 islands on the 1000 Islands Parkway, midway between Gananoque and the 1000 Islands Bridge. May juegos poker 777, 2018nbsp;0183;32;The 401 Tavern, Hampton: See 177 unbiased reviews of The 401 Tavern, rated 4 of 5 on TripAdvisor and ranked 15 of 117 restaurants in Hampton. View the Axis Rewards Terms amp; Conditions as a PDF by clicking here.
The Axis Rewards program is currently available at Which slots to put ram Casino Gambling man von the overtones and Shorelines Casino Thousand Islands. The Macau Peninsula holds the old city centre, where colonial ruins sit next to arty new boutiques. Further south are the conjoined islands of Taipa, Cotai and Coloane. The Republican nominee in the race for the presidency - who took his Atlantic City casinos four times - minced no words about the … bain moussant casino MERIBEL BACKGAMMON TOURNAMENT December 8-12, ovrrtones Meribel, France.
MASTERS (43): 1-Chris Ternel (England), 2-Michel Serrero (France), 34-Raj Jansari (England) Masayuki Mochizuki (Japan); 1C-Miki Suzuki (France), 2C-Lo239;c Jallu gambling man von the overtones, 3C4C-Pernille Rosendal (Denmark) amp; Alexis Vincent (France); 1LC-Christian Plenz … Jan 28, 2012nbsp;0183;32;Una ventana abierta sobre Cuba para esponer las mentiras que circulan por el Web sobre este pais. El blog se centra en gamblinng estilos de vida del tercio milenio, online poker differences asuntos pol237;ticos y noticias principalmente de Italia, Europa, Cuba y Am233;rica Latina, en todo caso tratando de gambling man von the overtones umberto poker enga241;os de la globalizaci243;n y del … Forum dedicato alla fica con video, foto gambling man von the overtones racconti.
Sezione Amatoriale di coppie e singole. This is a list of Monarchs of the British Isles by cause of death. They are grouped by the type of death and then ordered by the date of death. The monarchical status of some people is disputed, but they have been included here … Jul 26, 2011nbsp;0183;32;He Aint Heavy, Hes My Brother Episode 212 2M5612 Written By David Gould amp; Gambling man von the overtones Johnson Directed By Steve … There is so much to do and see in Miami, Fl.
Come take a look at our local attractions. Let our concierge alice free slots if you want more information. Book today. Satisfy any and all cravings for Italian Cuisine. Conveniently located gambling man von the overtones the Red Garter. The Italia offers a wide array of traditional Italian favorites at an affordable price.
big competition we will be providing you free live links during the world cup. Every ovrtones will have a primary stream with english commentry alternative Il Basement poker table Live di Totos236; 232; online. Scopri anche tu l'ultima novit224; del mondo del gambling online: il Casin242; Live, real time. Totos236;, scommetti sul serio.
Il Casin242; Campione dItalia 232; la pi249; ovfrtones azienda di Campione d'Italia, lexclave italiana in provincia di Como racchiusa nel Canton Ticino svizzero e situata sulla costa orientale del lago di Lugano. Live TV stream of Tele 5 broadcasting from Poland.
Dec 29, 2017nbsp;0183;32;The county plans to seek new management for the Jersey City banquet hall in 2018. If youd like to try your hand at lady luck and want to do it in style, there are an increasing number of casinos around the world that offer the utmost in extravagant luxury and not just in Las Vegas. While youll find more than a few to choose from in Sin City as well as famed gaming. MGM Grand Macau. The casino at MGM Grand Macau Hotel offers a reasonable selection from hundreds of table games and about 1,000 slot machines on a split-level, 222,000 square feet area. Pour voir la liste des plus gros meilleurs casinos en ligne, nous vous recommandons le classement d'InspecteurBonus. com. De Las Vegas 224; Macao, en passant par Singapour et Atlantic City, les op233;rateurs de casino repoussent sans cesse les limites du raisonnable en b226;tissant des casinos qui sont de v233;ritables villes miniatures avec … May 25, 2014nbsp;0183;32;Overall, minimum levels are pretty much unchanged from a year ago. Whats changed dramatically is the mix of table minimums. Grand Lisboa used to have low minimum tables on its ground floor area. Hey I made a major mistake when reading this review. I thought this was at the Grand Emperor Sauna not the Emperor Sauna. These two hotels have the same name like Lisboa and Grand Lisboa but they have NOTHING in common gambling man von the overtones each other, different ownership, and Emperors casino and sauna are much harder to find. Welcome to Hubbard Park Brick Oven Pizza. Hubbard Casino edison nj Pizza has served the area for over tsodas poker gambling man von the overtones and is considered as casino training jobs of Meriden's casino nsw images pizza shops. Slot machine resorts world Design Jewelry Earrings - Rare and Exotic Gems and Fossils, even more rarely found in pairs, make extraordinary earrings. Gamblong and … John amp; Tony's Restaurant is the casino marti place for huge jackpot slot wins leisurely dinner, a gambling man von the overtones business lunch or for large or small social spielbank trier roulette. Aged Steaks and Chops, Italian Favorites, Fresh Pastas, hand formed Steakhouse Gambling man von the overtones, a variety gwmbling Fresh Seafood, Salads, Sandwiches, Flatbreads, Voh foods, and Weekly ga,bling. FIND TICKET LOCATIONS The Arkansas Italian Food and Culture Festival is April 20th from 4-10 PM and April 21st from 8 AM-10 PM casino db hamburg the North Shore Riverwalk Park. Discover poker ploy crossword puzzle clue wild treasures of this ancient civilization, the Aztecs. This Gambilng slots game is called Aztec's Gambling man von the overtones. It is overtonrs 20 payline, gambling man von the overtones … Early life. Giovanni Giorgio Moroder was born on 26 April 1940 in Urtij235;i in South Tyrol, Italy. His mother called him quot;Hansj246;rgquot; (German: [ˈhansjœɐ̯k mɔˈʁoːdɐ]), the German version of his first and second names, as while he was growing up they lived in a mixed German, Italian and Ladin-speaking environment in South Tyrol in northern. The locals know where to go, and they go to Tra Vigne Pizzeria and Restaurant, a wood-fired pizzeria in the heart of St. Helena Wine Country. Thin-crust, sourdough pizzas star on the menu, which also includes an incredible array of delicious salads, fun, tasty, Italian small plates (think made to order mozzarella), sandwiches, pasta and. I quite like this journal, but I'm rather disappointed its missing nearly an inch on either side. The journal is not 6 x 8. Its 5 x 7. The pages are 4. 5 x 6. No trip to Atlantic City is truly complete without an Italian meal at Capriccio, Resorts Casino Hotels signature Italian restaurant. From excellent service, a mouthwatering menu and spectacular views of Atlantic City and beyond, it should come as no surprise that Capriccio has been lauded by critics and guests for years. Career statistics and player information from Basketball-Reference. com; Andersen's official website; David Andersen at nba. | 2019-04-26T00:05:02Z | http://damieni.tk/gambling-man-von-the-overtones.html |
Placebo and nocebo effects are embodied psycho-neurobiological responses capable of modulating pain and producing changes at different neurobiological, body at perceptual and cognitive levels. These modifications are triggered by different contextual factors (CFs) presented in the therapeutic encounter between patient and healthcare providers, such as healing rituals and signs. The CFs directly impact on the quality of the therapeutic outcome: a positive context, that is a context characterized by the presence of positive CFs, can reduce pain by producing placebo effects, while a negative context, characterized by the presence of negative CFs, can aggravate pain by creating nocebo effects. Despite the increasing interest about this topic; the detailed study of CFs as triggers of placebo and nocebo effects is still lacked in the management of musculoskeletal pain.
Increasing evidence suggest a relevant role of CFs in musculoskeletal pain management. CFs are a complex sets of internal, external or relational elements encompassing: patient’s expectation, history, baseline characteristics; clinician’s behavior, belief, verbal suggestions and therapeutic touch; positive therapeutic encounter, patient-centered approach and social learning; overt therapy, posology of intervention, modality of treatment administration; marketing features of treatment and health care setting. Different explanatory models such as classical conditioning and expectancy can explain how CFs trigger placebo and nocebo effects. CFs act through specific neural networks and neurotransmitters that were described as mediators of placebo and nocebo effects.
Available findings suggest a relevant clinical role and impact of CFs. They should be integrated in the clinical reasoning to increase the number of treatment solutions, boosts their efficacy and improve the quality of the decision-making. From a clinical perspective, the mindful manipulation of CFs represents a useful opportunity to enrich a well-established therapy in therapeutic setting within the ethical border. From a translational perspective, there is a strong need of research studies on CFs close to routine and real-world clinical practice in order to underline the uncertainty of therapy action and help clinicians to implement knowledge in daily practice.
Pain represents a “distressing experience associated with actual or potential tissue damage with sensory, emotional, cognitive and social components” . Among the different pain conditions, musculoskeletal pain is ubiquitous and multifaceted: it can be the consequence of everyday activities that repeatedly or unusually stress the system, or it can be due to either acute traumatic events or to musculoskeletal diseases . It is the most disabling symptom in musculoskeletal disorders, causing a high number of requests for healthcare treatments and rising social costs . Moreover, especially in chronic conditions when pain persists beyond the normal healing time, it is influenced by different physical, psychological and social factors [4–6] defined as “contextual factors” (CFs).
The multidimensionality that characterizes pain in musculoskeletal complaints requires an integrative and personalized approach for its treatment. For this reason, the study of the CFs and their conscious use and integration in the clinical practice could represent a novel approach in the management of this complex experience [7–16].
By definition, CFs are physical, psychological and social elements that characterize the therapeutic encounter with the patient [17, 18]. CFs are actively interpreted by the patient and are capable of eliciting expectations, memories and emotions that in turn can influence the health-related outcome, producing placebo or nocebo effects . In other words, the CFs represent the context that accompany any healthcare treatment: the exposure of a patient to a positive context (positive CFs) very often produces a placebo effect that is the occurrence of symptoms improvement (e.g. analgesia), whereas a negative context (negative CFs) can generate a nocebo effect, with a worsening of the pain condition (e.g. hyperalgesia) [20, 21]. In the following review, we use the term CFs instead of placebo, avoiding the misleading interpretation of placebo as inert treatment given to comfort or please the patient and following the recent conceptualization of the placebo as the psychosocial context that accompanies any medical intervention, be it active or sham [22–31].
As extensively demonstrated by the placebo and nocebo effect literature, the CFs can affect the outcome of a treatment with different mechanisms and in different systems, medical conditions, and therapeutic interventions . From a clinical perspective, the study of CFs as triggers of placebo and nocebo effects, is crucial for the management of musculoskeletal pain for several reasons . First, even if CFs are embodied in every complex therapeutic interventions in musculoskeletal complaints, they are often considered as incidental factors capable to affect outcomes. For this reason they are not always identified and used intentionally by clinicians . Second, CFs can produce a therapeutic effect through the involvement of the same central pathways of pain modulation activated by several hands-on (e.g. manual therapy, therapeutic exercises, acupuncture, injections) and hands-off solutions (e.g. pain neuroscience education) commonly applied in clinical practice [35–37]. Third, CFs serve as additional tools for the interpretation of the clinical picture and guide clinicians in managing the complexity behind the patient’s musculoskeletal pain . Taking into consideration CFs as active influencer of the therapeutic outcomes, can help to explain some unexpected outcomes and variability of symptoms experience .
Moving from this vision, the present debate is proposed to all the health professionals (physiotherapists, chiropractors, osteopaths, nurses, occupational therapists, rheumatologists, orthopedics etc.) that work with musculoskeletal pain. In order to support a better and more conscientious therapeutic use of the CFs in musculoskeletal field, the purposes of this debate are to: 1) briefly define the CFs, how they work and act from a neurophysiological perspective; 2) underline their clinical relevance in pain management; 3) consider their role in clinical reasoning, within the ethical border and 4) suggest how to take them into account in the research field.
What do the contextual factors represent?
A treatment is never administered in a neutral situation, but rather in a complex set of CFs, that Balint called the “atmosphere around the treatment” and Miller and Kaptchuk called “contextual healing” . Following these definitions, it is clear that the CFs can act “independently” by the nature of the treatment: since they represent the context of any medical treatment, they have a role when a sham treatment is administered but also when an active treatment is administered.
CFs were introduced in 2001 by Di Blasi et al. in medical community and recently exploited by Testa & Rossettini in physiotherapy field . CFs can be internal, external or relational. The internal factors consist of memories, emotions, expectations and psychological characteristics of the patient; the external factors include the physical aspects of therapy, such as the kind of treatment (pharmacological or manual) and the place in which the treatment is delivered. Relational factors are represented by all the social cues that characterizes the patient-physiotherapist relationship, such as the verbal information that the physiotherapist gives to the patient, the communication style or the body language .
A clear identification of the CFs is crucial in clinical practice, in order to enhance the treatment efficacy. In a work targeted to physiotherapy field, CFs have been grouped in 5 different categories on the base of their sensory and social features : physiotherapist characteristics (professional reputation, appearance, beliefs, behaviours); patient characteristics (expectation, preferences, previous experience, musculoskeletal condition, gender, age); patient-physiotherapist relationship (verbal communication, non-verbal communication), treatment (clear diagnosis, overt therapy, observational learning, patient-centered approach, global process of care, therapeutic touch), healthcare setting (environment, architecture, interior design).
During any clinical phase (e.g. consultation, examination and treatment) the CFs “inform” the patient that a healthcare procedure has been delivered and they could positively or negatively affect symptom perception, experience and meaning [20, 21].
The identification of the CFs and the attention to healthcare context is crucial for at least two reasons. First, a treatment delivered in a positive context (positive CFs) produces better outcomes than a treatment delivered in a neutral condition or negative context (negative CFs). The open-hidden approach is one of the best evidence of decreased effectiveness of a medical treatment when a meaningful context is eliminated . In the “open” condition, that mimics the routine medical practice, a treatment is delivered in full view of the patient: it means that the patient is aware of receiving a medical treatment and know when the medical treatment is delivered. In the “hidden” condition, the treatment is administered unbeknownst to the patient. Different studies have reported that open treatments are more effective than hidden treatments, because in the hidden condition the surrounding context (healing rituals, therapist-patient interaction, etc.) is absent, thus losing its positive meaning [43–46].
Second, the psychosocial context can influence the patients in different ways since the responsiveness to the context seems to be not a stable trait but a situational trait , and the same patient can sometimes positively respond to the context and sometimes not. Thus, if a patient is not influenced by the therapeutic context (the so called “placebo non-responders”) he/she needs more medical attention because the lower the placebo responsiveness, the lower the treatment responsiveness . Indeed, if the total treatment effect is conceptualized as the sum of the CFs effect plus the active treatment effect plus the interaction of the CFs and active treatment effects , a patient that is not sensible to the positive influence of the CFs will show a lower treatment response .
How do the contextual factors trigger placebo and nocebo effects?
If we aim to implement an aware use of CFs along the clinical routine, the understanding of how they work has a capital importance. The CFs shape placebo and nocebo effects through different sources. Historically, the most important models include classical conditioning and expectation processes.
Following the classical conditioning, different external CFs represent an example of conditioned stimuli that evoke a conditioned response . In general, as proposed by this model, the repeated contingency between a salient unconditioned stimulus (e.g., sight of food) with a neutral conditioned stimulus (e.g., a bell ringing) can induce the same conditioned response (i.e., salivation) even if the neutral stimulus is presented alone. In the specific contest of healthcare, different aspects of the healthcare setting or physical features of the medical treatment can act as external conditioned stimuli, eliciting a therapeutic response in the absence of an active principle, just because they have been previously associated with it. Recently, other learning mechanisms has been documented, such social learning. In particular, beyond direct first-hand experience to specific external CFs, it is possible to learn a conditioned response by observing other people that respond to specific CFs .
Following the expectation model, different external, internal and relational CFs can activate the expectancy of pain relief, triggering neurobiological changes and symptoms’ amelioration . Verbal suggestions are typical external CFs that trigger positive or negative responses. For example, the administration of an analgesic treatment along with the expectations of pain relief can lead to a positive analgesic response, whereas the administration of an analgesic treatment without specific expectations or with expectations or pain exacerbation can result in a negative response and in the perpetration of pain .
Following the Colloca and Miller integrative model , conditioning and expectations are not mutually exclusive and can be integrated in a more general learning model, whereby various types of CFs trigger expectancies, memories and emotions that in turn generate behavioral and clinical outcome changes, through the activation of the central nervous system (Fig. 1) [7, 9, 20, 21]. In other words, the presence of external CFs, combined with specific internal and relational CFs, is interpreted by the patient and converted into neural input events and behavioral changes . This model represents a good conceptualization of the role of the therapeutic context, useful also at the clinical practice level. Indeed, it opens up to the possibility to study the effects and the impacts of every single CF on the outcome of a medical treatment.
How do the contextual factors work at the neurobiological level?
A robust body of knowledge, especially acquired in the field of pain, has identified the neural networks activated by the CFs. Indeed, a crucial question that catch the attention of neuroscientists and clinicians is whether the subjective changes in the outcome after the exposure to a specific therapeutic context are associated with specific neurobiological activities . Pharmacological studies, as well as neuroimaging studies, have address this question using different experimental approaches based on classical conditioning and modulation of expectations. Taken together, these studies demonstrated that different changes in the pain processing network occurs when positive or negative CFs trigger placebo or nocebo effects, respectively. In particular, pain reduction is associated with decreased activity in the classical pain-matrix areas, such as the thalamus, insula, somatosensory cortex, and mid-cingulate regions [55–60]. Interestingly, positron emission tomography (PET) studies showed that the analgesic effect induced by the administration of a real mu-agonist, such as remifentanil, and the analgesic effect triggered by verbal suggestions determined similar activation of different brain regions, such as rostral anterior cingulate cortex and the orbital cortex [61, 62]. Separating the pain anticipation phase and the pain perception phase, a meta-analysis of brain imaging data using the activation likelihood estimation method, identified the involvement of different brain regions: during expectation, areas of activation are found in the anterior cingulate, precentral and lateral prefrontal cortex, and in the periaqueductal gray, whereas during pain inhibition, deactivations are found in the mid- and posterior cingulate cortex, superior temporal and precentral gyri, in the anterior and posterior insula, in the claustrum and putamen, and in the thalamus and caudate body . On the other hand, pain increase is associated with signal increases in several regions including anterior cingulate cortex, insula, left frontal and parietal operculum [64–67]. Also, high temporal resolution techniques, such as electroencephalography (EEG), have confirmed that the amplitude of specific evoked potentials, both related to pain anticipation and to pain perception, are affected by the CFs [68–71]. Thus, both early and late sensory components of pain processing are affected by the exposure to positive and negative CFs.
Different studies have also characterized the neurotransmitter systems activated the CFs. Using a classical conditioning approach, it has been demonstrated that when an opioid drug, such as morphine, is delivered for different days and then it is replaced by a placebo unbeknownst to the patient a placebo analgesic effect occurs . This effect can be blocked by the mu opioid antagonist, naloxone, thus indicating that the opioid system plays an important role [57, 73, 74]. An indirect evidence of the involvement of the opioid system comes from the study of the anti-opioid action of the cholecystokinin (CCK) system. The proglumide, that is a CCK antagonist, enhances placebo analgesia [75, 76], whereas the activation of the CCK type-2 receptors with the agonist pentagastrin disrupts it . These pharmacological data have been confirmed by a neuroimaging study, in which the authors proved that naloxone blocked the placebo analgesic response in dorsolateral prefrontal cortex (DLPFC), rostral anterior cingulate cortex (rACC), hypothalamus, periaqueductal gray (PAG), and rostral ventromedial medulla (RVM), and abolished placebo-enhanced coupling between rACC and PAG . Using a the same conditioning protocol, it has been demonstrated that also the cannabinoid system is activated by the positive therapeutic context: when non-opioid drugs, like ketorolac, are administered for 2 days in a row and then replaced with a placebo on the third day, the analgesic effect is not reversed by naloxone, whereas the CB1 cannabinoid receptor antagonist, rimonabant, blocks this placebo analgesia completely . Also studies in which expectations were manipulated by positive verbal suggestions, showed an activation of μ-opioid neurotransmission in the dorsolateral prefrontal cortex, the anterior cingulate cortex, the insula, and the nucleus accumbens [79, 80].
A different system activated by the therapeutic context is the dopaminergic system: indeed, the positive effect due to the presence of positive CFs seems to be related to the activation of dopamine in the nucleus accumbens. as assessed using in vivo receptor binding PET with raclopride. Moreover, when expectations of pain reduction were induced, the analgesic effect of the context was associated with activation of opioid neurotransmission in the anterior cingulate, orbitofrontal and insular cortices, nucleus accumbens, amygdala, and periaqueductal gray matter. Dopaminergic activation was observed in the ventral basal ganglia, including the nucleus accumbens. Both dopaminergic and opioid activity were associated with both anticipation and perceived effectiveness of the positive verbal suggestions [81, 82].
Recently, oxytocin and vasopressin have been identified CFs enhancer as they potentiate the analgesic effect due to the presence of positive verbal suggestions. Moreover it has been documented that negative expectations about headache pain led to the enhancement of the cyclooxygenase-prostaglandins pathway, which, in turn, induced pain worsening .
What is the magnitude of placebo and nocebo effects induced by CFs in musculoskeletal pain?
The impact of CFs as trigger of placebo and nocebo effects on pain outcome has been quantified in different ways and has been reported in a wide range of musculoskeletal conditions such as low back pain [86–108], neck pain [95, 99, 109–111], shoulder pain [95, 112, 113], osteoarthritis [38, 91, 99, 100, 114–125], rheumatoid arthritis , and fibromyalgia [97, 127–132].
Different studies have measured the magnitude of placebo and nocebo effects induced by CFs in different musculoskeletal pain conditions commonly encounter in daily setting [117, 133]. Indeed the clinical effectiveness of placebo analgesia was demonstrated in specific complaints such as fibromyalgia and osteoarthritis with an effect size (ES) over 0.5. Also, nocebo hyperalgesia measured as dropout rate due to adverse event were present in fibromyalgia (9.6%) and osteoarthritis (4.8%) . Concerning osteoarthritis, the ES decreased consistently from hand, to knee, to combined hip and knee and then to hip [118, 136].
Moreover, considering the overall treatment efficacy as the sum of the specific component related to the active treatment plus the unspecific component due to the CFs, the impact of the CFs was measured in different conditions and interventions . Zou and colleagues showed that 75% of the overall treatment effect in osteoarthritis is attributable to contextual effects rather than the specific effect of treatments . In fibromyalgia, the 45% of the response of the active drug is attributable to contextual effect and a relevant contextual effects was shown also in aspecific low back pain . Moreover, a recent meta-analysis on spinal manual therapies showed that in acute pain and chronic pain, respectively 81 and 66% of the pain variance were ascribed to CFs .
Which kind of CFs influence musculoskeletal pain conditions?
Considering the patient’s perspective, expectations toward the therapy, patient’s treatment history and baseline pain severity are elements capable to predict the outcomes of different musculoskeletal pain treatments.
Expectations of symptoms improvement can be activated by different CFs: for example, the simple act of administering a treatment, the exposure to a clinical setting, the verbal or non-verbal interaction with the physician are capable of triggering patient’s expectations. As demonstrated by different studies, boosting patient’s expectations toward the therapy significantly increased the chance of pain relief more than delivering a treatment without the expectation of any benefit [86, 90–98, 109, 111, 112, 126, 140].
Patient’s treatment history, that is the patient’s history of past positive or negative medical treatments, can influence the future response of the patient to new medical treatments. Previous positive experiences obtained by a specific therapy increase the likelihood of future positive experiences with the same therapy, while precedent negative outcomes associated to a particular intervention increase the probability of negative outcomes [99, 141].
Higher pain intensity at baseline [99, 100, 118, 128, 129] and the presence of concomitant diseases and psychosocial elements such as depressions [99, 130] are associated with an augmented placebo analgesia and reduced nocebo hyperalgesia. Long-term dysfunction seems to respond less to placebo analgesia indicating that duration of complaints influence placebo analgesia [128, 132].
From the provider’s perspective, clinician’s behavior, belief, verbal suggestions and therapeutic touch can strongly influence patients’ pain perception.
A provider acting as competent, experienced, educated, professional, trustworthy, capable to indicate a diagnosis and prognosis, and to monitor patient with follow up, can moderate pain with his behavior [38, 114, 115, 120, 142]. Aligning his/her beliefs with patient’s beliefs, a clinician could modulate pain. Indeed, it was demonstrated that the healthcare provider’s point of view concerning the clinical pathway, the therapy and the prognosis influence patient’s pain [38, 101–103, 107, 114, 115, 143, 144]. Informing the patient that a potent treatment has been delivered enhanced the analgesic effect of the treatment, conversely verbal suggestion concerning the threatening effect of the therapy can compromise the effectiveness of the treatment creating nocebo hyperalgesic effects [108, 121, 122, 141, 145, 146]. Non-verbal communication has powerful effects as well. For example, the use of therapeutic touch can positively influence patient’s pain [105, 123, 124, 131, 147, 148].
Finally, considering the patient-physician relationship, it appears that a positive therapeutic encounter between patient and clinicians can lead to additional clinical benefits. Indeed, an enhanced empathetic interaction comprehensive of therapeutic alliance, active listening, extra time spent with patient, more face-to-face visit, warmth, attention, care, encouragement and support significantly reduced pain more than the same therapy performed with neutral therapeutic interaction [87, 88, 100, 104, 145, 149, 150]. Moreover, a patient-centered approach can increase the effectiveness of the therapy. Indeed, the patient’s involvement in the global process of care has been shown to modulate pain [106, 125]. The strategy to favor the social learning between patients by the observation of other’s pain improvement or reduction is capable to affect the observers’ symptomatology [151, 152].
Also the way by which the therapy is administered can influence pain perception. The adoption of an overt paradigm that enhances patient’s knowledge of being treated modulates the therapeutic outcome : a significant pain reduction was observed after the execution of an exercise in an environment that allowed patients to visualize their body . Also the posology of intervention has an effect as CFs: the placebo effect is higher when therapies are more frequent and repeated a therapy is delivered (e.g. two or more times vs one time) . The choice of the modality of treatment administration can be crucial to modulate patient’s pain. In general, the higher is the invasiveness of treatment (e.g. acupuncture, dry needling, injection, surgery), the better is the reduction of pain [116, 118, 119, 153, 154]. Moreover, parenteral or subcutaneous administrations (e.g. topical) are more efficient than oral administrations [115, 116, 119].
Even the marketing features of treatment should be taken into account. Branded therapy seems to be more effective than unbranded therapy [114, 115]. High prize medication produced better pain relief then discounted medication, therapy considered as “new” improved pain more than “usual” therapy [114, 115]. The more complex is the procedure including therapeutic rituals, mysterious powers, high technology the larger the placebo effect [114, 115].
Lastly, the health care setting, in terms of environment, architecture and interior design should not be overlooked. The use of facilities where evidence-based design such as furnishing, colors, artwork, light, outside views, temperature, soothing sound and music were adopted, positively impacts on patient’s pain creating a proper healing setting [127, 155–157].
Is it time to implement CFs in our clinical reasoning?
The clinical reasoning adopted by clinicians in musculoskeletal conditions represents a complex procedure that encompasses different dimensions of pain experience in a bio-psycho-social framework . Indeed, this multi-factorials thinking process considered biomedical (e.g. tissue pathology, disease), psychological and social elements (e.g. experience of disability, patient’s belief, values and perspective) to obtain more complete analyses of the patient’s dysfunction . The role and the impact of CFs should be integrated in the clinical reasoning to increase the number of treatment solutions, boosts their efficacy and improve the quality of the decision-making . Based on the evidence available, some considerations can be drawn to guide a more conscious use of CFs as activators of placebo analgesia and avoiders of nocebo hyperalgesia.
Considering the global process of care, clinicians should be aware that the overall therapeutic outcome is determined by the suitability of the therapy adopted (“what we do”) and by how it is delivered (“how we do”) . In this perspective, every musculoskeletal pain treatment is composed by a specific component and by a contextual component . These components represent the two faces of the same coin and are capable of influencing pain at multiple levels of the central nervous system . The use of the best evidence-based therapy is unquestionable, but clinicians should not forget the role of the CFs, as the context surrounding the specific treatment is capable of generating placebo or nocebo responses and modifying the therapeutic trajectory towards a positive or a negative direction .
Because it is a fact that placebo [161–163] and nocebo effects are always present in routine clinical practice and can be triggered by CFs , clinicians should be able to use them to optimize the results and reduce failures. Indeed, there are clear evidence that, when placebo was purposely searched as a mechanism, the effect size was about five times greater (Cohen’s d ranging from 0.95 to 1.14) [161–163] than when placebo was used as a control condition (Cohen’s d ranging from 0.15 to 0.27) [165–167]. Moreover, clinicians should combine at the same time different CFs to obtain a larger placebo effect and minimize the nocebo effects. Some studies demonstrated that a lower effect size is present when using verbal suggestions alone (placebo - Cohen’s d = 0.85; nocebo - Cohen’s d = 0.65), while a higher effect size was observed adopting a combination of verbal suggestions and conditioning procedures (placebo - Cohen’s d = 1.45; nocebo - Cohen’s d = 1.07) [161, 164].
Since placebo effects are learning phenomenon , during the history taking, clinicians should assess the patient’s previous experience, expectations and beliefs giving the patient adequate time to tell his/her story [50, 168, 169] (Fig. 2).
Previous successful and unsuccessful experiences of a specific treatment are capable to influence the therapeutic outcome . In order to plan a therapeutic intervention, it’s important to question about past memories of analgesic and hyperalgesic responses concerning a treatment; reinforcing the positive experiences and devaluating the negative ones [7, 169, 171–173]. For example, if a patient had a previous negative experience with a specific treatment, clinician should avoid adopting it. On the contrary, if a patient experienced a positive outcome with a treatment, the use of the very same treatment is recommended in order to “activate” the patient’s positive memory of the previous treatment.
Since patients’ expectations about the therapeutic benefit influence the effectiveness of the treatment, a clear assessment of patients’ expectations toward the therapy is crucial. In particular, it is crucial to identify patients with low expectations in order to work with them with the aim of improving their belief . Different scale and semi-standardized questionnaires have been proposed to assess patient’s expectations. For example, Younger et al. developed a tool for measuring patient outcome expectancy. The authors found that the final six-item scales, made of two subscales (positive expectancy and negative expectancy), predicted a significant amount of outcome variance in patients receiving surgical and pain intervention .
Moreover, clinicians should monitor patient’s belief concerning musculoskeletal conditions, therapeutic action, prognosis and ask questions about the meaning they attribute to symptoms [169, 172, 176–178]. In these times of important expansion of healthcare information delivering by Internet, social media and television it is crucial to avoid the misinformation . The discussion with the patients can help the clinician to guide them to evidence-based information and avoid that they refer to unproven or fake information . Also, asking systematically the patients to summarize the information provided can prevent negative misunderstandings about their complaints [169, 173, 176, 178].
In the waiting, examination, therapeutic and follow-up phases, the social interaction between patients [179, 180], the therapeutic ritual [181, 182] and the awareness of the ongoing procedure [42, 43] are fundamental elements to consider.
While waiting for healthcare encounter, a pleasant and peaceful environment, employing professional, friendly and helpful support staff can help patients to feel comfortable . In waiting rooms, clinicians should reduce the social contagion of negative emotions preventing the patient’s interaction and/or observation of another patient experiencing a negative outcome (e.g. increased pain) [7, 183]. Instead, they should promote the social interaction favoring observation of the positive effects of the therapy (e.g reduction of pain) also using video clips showing patients coping well with painful condition [50, 176, 179, 180] (Fig. 3).
Before starting the treatment clinicians should read records, thoroughly examine the patients, provide a confident diagnosis and propose, when available, different treatment options encouraging the patient’s involvement in the choice of therapy and treatment goals [169, 171, 184–186].
During treatment it is useful to avoid unintentional “hidden administration” of therapy . Thus, it is crucial to focus the patient’s attention to all the salient sensory elements presented in the therapeutic arena in order to increase the contextual power of the therapy . These elements are: the healthcare environment (e.g. light, color, design of the room), the physical features of the therapy (e.g. shape, size, colour, smell and taste) and the technological features of the device (e.g. novelty, price, invasiveness) [50, 169–173, 187] (Fig. 4).
After the treatment, it is valuable to assess the therapeutic outcome and give to patient a feedback on the clinical course in order to maximize the treatment adherence, encouraging the self-managing of the condition [50, 169].
The clinician’s not-verbal and verbal communication represent important element of the overall clinical interaction .
Clinicians should prepare themselves mentally and physically for the clinical encounter , acting as experts in their field [169, 172]. It is crucial to effectively inform about the efficacy of a specific treatment [169, 172], considering that beliefs and behaviors could influence patients’ attitudes in a positive or negative way [7, 169]. It is suitable to individualize consultation style according to the patient’s preference opting for a personal interaction and seeking for a warm, authentic and empathic style, limiting technical contacts to the minimum [169, 171, 172, 176, 188–190].
Also, the content of the message (what), the modality of delivering (how) and the time of communication (when) represent a great clinical enigma and should be taken into account. It is recommended to enhance the positive expectation toward the treatment and limit the emphasis on contraindications, tell patients about side effects, but associated with positive clinical outcome. Side effects of treatment should be presented in form of probability instead of a mere list and during the informed consent process positive and negative information should be balanced [7, 50, 169, 172, 173, 176, 180, 183, 191, 192].
What is the concern about ethics?
The adoption of placebo strategies seems to be common practice in clinical routine among healthcare providers . In musculoskeletal field, orthopedics surgeon, rheumatology physicians and nurses thought that placebo effects are real, have therapeutic benefits, and are permissible within the ethical borders [194–196]. Patients with chronic musculoskeletal pain and rheumatologic complaints know what placebo effects are, consider placebo treatments acceptable when adopted as complementary/adjunct treatments and when no other established treatments are available. However, they present a lack of understanding of nocebo effects [196–198]. Scientific community is still focusing the debate on the possibility of a transparent disclosure to patients of placebo treatments [199–202]. The current researches suggest the possibility to openly prescribe sham medication or sham physical treatments with advanced prior consent . Thus, when available the choice of the best evidence-based therapy is mandatory and a patient must be informed about the use of a placebo intervention with an amount of disclosure sufficient to avoid deception [201, 203, 204]. Although it is common thought that revealing the use of a placebo inhibits its effect, different studies point out the efficacy of placebo interventions also in “open label” conditions where the use of a placebo was disclosed in patients with chronic low back pain [205, 206]. From a clinical perspective, the mindful manipulation of CFs represents a useful opportunity to enrich a well-established therapy that have different ethical implication in comparison with the replacement of real treatment with a potentially ineffective treatment .
Is there a place for a translational research on CFs?
There is a strong need of research studies on CFs close to routine and real-world clinical practice [49, 207] in order to underline the uncertainty of therapy action and help clinicians to implement knowledge in daily practice.
The research community should investigate the effect of the different CFs on therapeutic outcome, instead of minimizing or labeling them exclusively as confounders [209, 210]. The search for a good placebo control in musculoskeletal pain field (e.g. physical therapy) represents an unresolved challenge [211, 212]. Indeed, medical treatments are generally more complex than the mere administration of a drug, involving multiple treatment components that interact with each other and that are difficult to separate (e.g. verbal instruction and education, patient-therapist contact, physical action by the patient or therapist, and sensory feedback) leading to biased estimates of treatment effect .
In clinical trial there is a urge to measure patient’s expectation before, during, and after the treatment evaluating by standardized and validated scale all the dimensions of expectation (optimism, pain catastrophizing, hope, trust, worry and neuroticism) [215, 216]. Also measuring the impact of CFs from the patient’s perspective represents a desirable outcome to be implemented in the future researches. Recently, a new item banks (Healing Encounters and Attitudes Lists - HEAL) was proposed as suitable for measuring CFs of the treatment and present promising evidence of predictive and concurrent validity .
Despite CFs play a key role in pain [20, 21], there is a still paucity of knowledge on their effects in different musculoskeletal diseases, in young and old participants [218–220], in acute and chronic conditions , in different pain mechanism such as nociceptive, neuropathic, central sensitization . It is of paramount importance to try to identify psychological, neuroendocrine or genetic elements that predict the responsiveness to specific CFs . Finally, the use of meta-analysis may help to estimate the effects of the CFs .
This debate presents some limitations. The framework adopted [17, 33] for reviewing the role of the CFs was not preliminarily validated for its specific consistency in the musculoskeletal field and some factors are not related exclusively to musculoskeletal pain literature but refer to pain in general. Examples of primary studies and data offered to sustain each factors of the model were not selected by adopting a systematic review approach and not criticized in depth, given that the main goal was to propose a short synopsis. CFs have been categorized into a conceptual framework by describing each factor involved, therefore interpretations about the relationships between factors and placebo/nocebo effects need additional critical analysis and discussion.
This debate points to a conscious use of the CFs, as supplementary therapeutic strategy for pain management capable to improve analgesia and prevent hyperalgesia. The good news is that pain perception can be positively influenced by an honest and aware use of CFs. The bad news is related to the complexity of the phenomenon, to a certain degree of uncertainty in the individual response and to a risk of patient’s deception associated with their use. Nevertheless, clinicians have already enough comprehensive scientific information that allows them to choose the correct behavior wisely and adjust the CFs of the therapeutic setting in an evidence-based and ethically respectful perspective. We think that time has come for clinicians to manage conscientiously and ethically the CFs to enhance the placebo and avoid nocebo effects for the benefit of their patients.
The authors want to thanks: Tommaso Geri and Marco Minacci for their valuable advices in the progression of this manuscript; Hassel Comunicazione for their help during creation of images; the reviewers for their precious and constructive suggestions.
The authors declare that they don’t use any external funding.
GR: made substantial contributions to conception and design, been involved in drafting the manuscript and revising it critically for important intellectual content, given final approval of the version to be published; agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved; EC: made substantial contributions to conception and design, been involved in drafting the manuscript and revising it critically for important intellectual content, given final approval of the version to be published; agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved; MT: made substantial contributions to conception and design, been involved in drafting the manuscript and revising it critically for important intellectual content, given final approval of the version to be published; agreed to be accountable for all aspects of the work in ensuring that questions related to the accuracy or integrity of any part of the work are appropriately investigated and resolved. All authors read and approved the final manuscript. | 2019-04-20T04:20:55Z | https://bmcmusculoskeletdisord.biomedcentral.com/articles/10.1186/s12891-018-1943-8 |
2. Which InvisiLock® magnet do I choose for my project?
The Visual Magnetics Graphic System is designed for application on smooth hard surfaces. The system is comprised of a layer of InvisiLock magnetic sheeting that is applied to a wall or panel plus a layer (or layers) of MagnaMedia. Visual Magnetics MagnaMedia is a thin print-receptive film or fabric that is coated with Micro-Iron® particles on the reverse side allowing the print to attract to the InvisiLock magnet sheeting. Once a base layer of InvisiLock sheeting is applied to the wall or panel(s), you are able to roll out your MagnaMedia graphics in a single layer or multiple layers and change them out with ease without the use of an adhesive. The InvisiLock layer stays on the wall or panel and will not lose its magnetic properties over time, so the same magnetic sheeting may be used indefinitely.
2. Which InvisiLock do I choose for my project?
The Visual Magnetics Graphic System may be applied to hard surface panels to create signs and displays or it may be applied direct to wall surfaces for large wall treatments and murals. Both applications require InvisiLock sheeting that allows the graphic film to attract to the wall or panel.
If using the graphic wall with magnetic fixtures is planned then please see section 12 on fixturing with InvisiLock as there are tips and tricks specific to fixturing with the magnetic sheeting.
Hard panel and fixture application: We recommend using single-sided InvisiLock with a self-adhesive backer on hard panels. This is a peel-and-stick product that has adhesive and release liner applied to the back surface of the sheet. The adhesive will stick to metal, sealed wood, glass, paper, or plastic surfaces that are smooth, hard and free from moisture, oils or other surface contaminants. (ref. -30SE, -30HE,-30SP, -30HP.) Always follow the substrate manufacturer’s recommendation on surface preparation for a rubber-based pressure-sensitive adhesive.
Direct to Wall application: We recommend using Visual Magnetics double-sided, InvisiLock in combination with Visual Magnetics ActiveWall primer for applying the graphic system to larger wall surfaces (especially drywall/plastered walls). Double-sided InvisiLock is magnetic on both sides of the 40-mil film and is magnetically attracted to a wall that has been painted previously with ActiveWall primer, eliminating the need for adhesives or pastes. The ActiveWall primer is a non-toxic, latex product with Micro-Iron particles that turns your wall into a magnetic receptive surface. Please note that a wall that has ActiveWall primer will attract a magnet (as is InvisiLock) but will not attract the MagnaMedia films or fabrics without the layer of InvisiLock. ActiveWall can be used as a basecoat primer for other finishes.
High energy vs. standard energy InvisiLock: We recommend using our high energy InvisiLock magnet when applying 3 – 5 layers of MagnaMedia graphics or when fixturing with the magnet (see section on fixturing with Invisilock). Standard energy magnet is plenty sufficient for one and two two layers of MagnaMedia graphics.
Note: All double-sided Invisilock (40HE) is high energy by nature.
• Lay Flat: Rolled magnet must lay flat prior to installation. Rolled magnet has a curl “memory” that can cause installation problems if magnet is not allowed to “Relax” prior to installation. Un-roll magnet quantity to be installed and allow to lay flat for minimum of 1 hour before attempting to install. If magnet curls away from application surface during installation, failure may occur.
• Room temperature: To properly promote adhesion to the substrate, it is crucial that the adhesive-backed magnet be warmed to room temperature. Heat guns are helpful as a means to further promote adhesion when applying or as an aid to flatten the magnet.
• Tiling: It is recommended that when tiling magnet, to leave a 1/32” - 1/16” gap between adjacent magnet sheets. A slight gap is easily spanned with MagnaMedia whereas magnet that has been pushed together too tightly can cause a lip that will show-through the print with undesirable results.
• Vertical surfaces: For tiling sheets on (pre-installed) vertical panels, we recommend running the sheets vertically and applying from the top down. Horizontal tiling is more difficult to keep square and apply to the board substrate evenly.
The back of self-adhesive InvisiLock magnetic sheet has a clear rubber-based adhesive and a white film release liner. This magnet film is pliable and the adhesive is aggressive so we recommend applying it in the same fashion as an adhesive vinyl film. Simply position the product in the desired location, tape down a leading edge and peel back the liner, smoothing out the sheet as you go. Use a squeegee to burnish the material to the panel surface and eliminate air bubbles from forming under the sheet. Once the entire release liner is peeled away and removed, finish smoothing out the sheet applying even pressure to ensure that the entire adhesive surface is pressed against the panel. InvisiLock custom engineered magnet can be trimmed using a razor-knife, scissors or resized with the panel (after application) using standard wood cutting tools.
Graphic locations, if it is going from ceiling to floor?
Is graphic going into a corner or between walls?
Is it feasible to trim the graphic on site?
If cutting/fitting a graphic on site is not feasible or desirable, then the graphic can be laid out to have footers/kick-bases or borders that allow a graphic panel to be rolled out without the need for cutting or fitting to ceiling, floor or walls (see Illustration 1).
Best results are achieved by properly preparing the wall surface so that it is free of dirt, oils, and other contaminants. The wall surface should be as smooth as possible to maximize surface area with the InvisiLock magnet sheeting (a level 5 finish is preferred). A textured wall should be smoothed over with a filling compound and/or sanded smooth before applying the ActiveWall primer. Applying ActiveWall primer and magnetic sheeting to a textured wall or a wall that has rough spots may result in low attraction of magnet sheeting to the wall and/or bumps and wall texture showing through to the graphic surface.
A. Standard wall painting supplies such as stirring sticks, paint tray, roller handle(s) and 1/4” – 3/8” nap roller(s).
B. A steel smoothing tool with handle such as a plaster trowel, a 10” – 12” steel putty knife or hand trowel.
Mix the ActiveWall primer thoroughly by stirring it.
For best results, temperature should be between 60F and 90F, humidity below 85%.
Using the paint roller (foam rollers are not recommended) apply a liberal coat of primer as evenly as possible to the wall surface.
Continue applying the first coat of primer until wall surface is covered. The primer dries quickly so apply it as evenly and quickly as possible while wet. DO NOT OVERWORK AS THIS MAY INCREASE THE TEXTURE.
Apply a second coat by rolling the primer onto a 10 sq.ft. section at a time and then “striking” (smoothing) the wet primer with a trowel or 12” wide putty knife. This step will create a smooth surface that fills in any texture created by the roller.
For best results apply 2 heavy to medium heavy coats. You should not apply less primer than the recommended coverage of 100 sq.ft. per gallon. The more iron particles that are on the wall, and the smoother the surface, the stronger the magnetic attraction with the layer of magnet.
ActiveWall may be sprayed with an airless sprayer, for best results start with 5-19 tip. ActiveWall may be thinned with water to a spray-able consistency but is not recommended thinning by more than 20%.
Once the wall surface is dry, inspect for any small ridges or residue caused by dried paint chunks. Use a clean trowel or smooth wide putty knife to scrape off any small chunks or high spots in the wall surface. Small holes or cracks will not show through the magnet but bumps or high spots in the paint will so scrape the wall thoroughly.
If applying a top-coat paint: Allow the final coat of ActiveWall to dry at least 2 hours before applying a latex top coat or at least 24 hours before applying an oil based top coat of paint. InvisiLock magnetic sheeting should be applied to the wall only after the final coat of paint is fully dried and cured according to the paint manufacturer’s recommendations. Failure to letting the topcoat fully cure could result in the finish paint sticking to the back of the InvisiLock sheeting.
Once your wall surface is activated with ActiveWall primer, and the topcoat is completely cured, you are ready to apply the double-sided InvisiLock to your wall.
Begin the process by creating a level or plumb reference point (line) that will ensure your roll or tiles look straight. A line level or laser level works well for this (see Illustration 2).
If using roll goods, then cut the appropriate sized panels to length so that the pieces are easily managed. Be sure that the factory edge and all cut edges are flat and free of dents or defects. InvisiLock sheeting can be cut using a metal straight edge and a sharp razor knife. If the material has some roll-set curl) when coming off the roll, then simply back-roll a couple of feet near the ends of the panel so that it relaxes the curl and lays flat onto the wall.
If using the tiles, lay out your first row of tiles on your reference line. The tiles should be placed so that there is an even 1/32” – 1/16” space between them. This will allow for expansion/contraction during temperature changes and will eliminate the possibility of the magnet sheets pinching together and creating a high point. Do not worry about this small gap between the InvisiLock sheets or tiles; the MagnaMedia will span these seams without showing through to the finished surface (see Illustration 3).
Also note that the magnet sheeting does not need to be fit tightly to the floor, ceiling or wall. The sheeting should be kept (1/16” – 1/8”) away from the floor, ceiling and/or inside wall. Placing the magnet sheeting up to outside walls or openings is a matter of preference. You may use a knife to cut the magnet sheeting to the edge of the wall or opening or you may keep the edge of the magnet sheeting short a 1/4” or so that the graphic overlaps the magnet and is trimmed to the edge of the wall. Keeping the magnet short of the edge helps to hide the edge of the magnet.
When using tiles, it’s best to lay out the tiles so that the end panels are cut to between 8” – 24” in width. This will prevent having thin strips on the end and it will help with staggering the seams.
When using tiles it is recommended that you stagger the vertical seams like one would with blocks or bricks when building a wall. This will help ensure that the graphic panels lay down flat (see Illustration 4).
Continue laying down the tiles or panels until the entire wall surface is covered.
A note on contamination: when scraping the wall and when cutting the InvisiLock magnetic sheet, it is worth every effort to keep dust and particulate off of the back or front surface of the magnetic sheet so that these do not create lumpy spots through the graphic.
You are now ready to apply the graphic/wall covering.
The first step in rolling out your graphic panels is identifying the rolls and their respective locations. Large seamed graphics that need to be trimmed onsite should be labeled so that the seam is properly placed and the correct panels trimmed correctly.
Once the rolls of graphics are identified, then re-roll the graphics so that they are rolled from the bottom to the top with the back (black iron coating) out. Use the magnetic wall that you just prepared to re-roll the graphics (instead of the floor); it’s cleaner and easier on your back.
Once the graphic panels are properly rolled, begin with the first panel by aligning the top edge and one side as best as possible and using gravity to help you unroll the panel downward. If you unroll a little bit and see that the graphic is not positioned correctly, then roll it back up, re-position and roll it out again.
If the panel needs to be fit to the ceiling, floor or inside wall then do so at this time (see section on fitting graphics to a wall).
Once the first panel is in the desired location, you may repeat with the subsequent panels, being careful to maintain the desired overlap at the seam and to properly align the image.
Alignment pointer: placing a couple of small pieces of low-tack masking tape at the panel seams will help you quickly align match up/align large graphic panels as you unroll them to the wall (see Illustration 5).
Note: Overlapping seams may be “switched over” to make them less noticeable. If the edge of the top panel is more noticeable from a common viewable direction, then simply tuck it under the bottom panel so that the panel edge is facing away from where most people will see it, toward a corner for instance (see Illustration 6).
Visual Magnetics MagnaMedia can easily be cut with a razor knife which makes cutting into corners, floors and ceilings much easier than fitting hard substrates. Panels that are meant to be fit tightly against the ceiling, floor and/or an inside wall should be sized 1” – 2” larger. The excess can be trimmed (in place) like wallpaper using a metal wallpaper blade or metal straight edge.
The MagnaMedia substrate will not bend or roll in two directions at once without kinking and damaging the graphic so do not attempt to position the panel so that there is excess at the floor, ceiling and a side that needs to be trimmed.
When fitting a large graphic mural that runs from floor to ceiling and fits into a corner, it is best to fit the graphic to height first, then reposition the panel to cut into the corner.
Simply roll out the panel as close to the corner as possible, without bending or kinking the panel into the corner, and trim the top and bottom so that it fits ceiling to floor (see Illustration 7A).
Then re-roll the graphic vertically and, with 1” – 2” of excess rolled into the corner, cut the panel into the corner using a scribe or a straight edge as you would with wallpaper (see Illustration 7B).
Oftentimes a graphic mural will be placed around a doorway or opening or the graphic will end where the wall makes an outside corner. In these instances we recommend that you oversize your graphic panels so that you have 3/4” – 1” that you can trim of the panel at the end. We also recommend that you save trimming these panels for the end so that if the graphic needs to be repositioned for some reason or other, you have some play. Once the panel is trimmed to fit a wall or opening, you are limited to repositioning it.
Once you have the panels where you want them, you may use a sharp razor knife to cut the MagnaMedia panel to the opening or wall using the wall as a guide (see Illustration 8).
The best way to store MagnaMedia graphics long term is to roll them on a core image side out and wrap the roll with a plastic or paper to protect them from dust/dirt. Rolling the graphics image side out ensures that any amount of roll-set in the panel will help keep the corners tight against the wall when rolled out. Storing the graphics iron coating (black side) out may result in a roll set that curls the graphic panels away from the wall.
The Visual Magnetics Graphic System was designed for graphic applications and layering of multiple graphic panels. The InvisiLock magnet does, however, have properties that make it suitable for magnetically attaching small shelves and panels to your graphic wall (see Illustration 9).
The best scenario is a maximum magnet-to-magnet surface area to keep a minimum amount of weight as close to the wall as possible. We recommend you always make a prototype and we do not recommend using magnetic fixtures where the general public can move them or pull them down.
A note about polarity in magnetic sheeting: Magnetic sheeting has polarized lines that provide the magnetic field/attraction at the surface of the sheeting. When (2) sheets of InvisiLock are applied to each other in the same orientation then the lines of polarity will “lock” into place. When the (2) sheets are not aligned or are applied perpendicular to each other, the polarity lines repel each other in places and the overall magnetic attraction is greatly reduced (see Illustration 10A).
When the (2) sheets are not aligned or are applied perpendicular to each other, the polarity lines repel each other in places and the overall magnetic attraction is greatly reduced (see Illustration 10B).
If fixturing is desired on a graphic wall, we recommend that all of the sheets/tiles of Invisilock be installed in the same orientation (horizontal or vertical) so that the lines of polarity are all going in the same direction.
Installation note: When applying InvisiLock to a panel or the back of a shelf that will then be mounted to an existing VM graphic wall, always be sure that you know which way the magnetic sheeting is applied on the wall and match this orientation on the fixture.
Please note that Invisilock orientation is not a factor when using just the magnetic-receptive MagnaMedia. Magnet sheet orientation is only a concern in magnet-to-magnet applications.
Applying the Invisilock to your walls: When applying InvisiLock on walls that will have fixtures attached, we recommend minimizing seams in the Invisilock and aligning polarity lines wherever fixtures will span these seams. Rolls of Invisilock (as opposed to tiles) minimize seams and alignment of polarity lines can be done using an 18” – 24” square piece of Invisilock (see Illustration 11).
Again, this detail is important for maximizing fixture strength across seams in the InvisiLock back wall and is of no consequence where fixtures are not applied to the wall (perhaps really high or really low places on the wall).
Applying the Invisilock to your fixture(s): Because the lines of polarity are evenly distributed on both the wall and on your fixture, you will need to be sure that the orientation of the lines on your fixture match that of the wall. If placement of the fixture needs to be precise to 1/16 – 1/8” then locking the magnet to the wall (in the desired location) and then sticking the fixture to it, will ensure that the fixture will always lock into the same location time after time. This may be important when multiple fixtures need to line up with each other but is of no consequence if the fixture placement has tolerances of +/- 1/8”.
Locking your fixture into place: Once the fixture has Invisilock applied to the back, the best way to ensure a proper mounting to the wall is to place the fixture against the wall and turn it until you feel the polarity lines “lock” into place. Then put a little weight on the fixture to ensure that it is stable and will not pop off the wall.
Note: regular Invisilock HE is dark brown in color and may leave black marks on your graphic wall when positioning onto the wall. We recommend using our Invisilock with Surface Protect (Invisilock 30HP) on fixtures that are going direct onto mural graphics to prevent these scuff marks.
Problem: MagnaMedia surface is bubbling or wrinkling.
Solution 1: Bubbles or tunneling in the outer layer of material is oftentimes caused by an uneven rollout of the outer layer. To correct this, simply roll up the graphic panel evenly in a 3” – 4” roll, line up the leading edge and roll out the material evenly. Some tunnels can be removed by simply by lifting up the bottom of the panel to where the tunnel is and then releasing it so that it naturally falls onto the magnet evenly.
Solution 2: Bubbles or tunneling in the media may also be a result of warping caused by excessive heat when printing. If the MagnaMedia graphic will not lay flat onto a flat Invisilock wall and the graphic panels appear warped or puckered when laid out onto a flat table, then printer heat/drying adjustments may be needed.
Problem: MagnaMedia panel edges and/or corners are curling up.
Solution: The most likely cause is roll-set, caused by storing the graphics image side in (black oxide coating out). Extended storage of graphic rolls may cause roll-set and cause the edges to peel/curl up. Proper course of action is to re-roll the graphic panel (image side out) to reverse the roll-set so that panel lays flat.
Problem: The Visual Magnetics Graphic System is failing because the magnet is coming off the wall.
Solution: The most common cause for failing Invisilock is mis-application/recommendation by using the peel-and-stick adhesive-back InvisiLock directly on drywall/painted drywall. The appropriate course of action is to peel off the old magnet and use ActiveWall primer with double-sided InvisiLock magnet. | 2019-04-18T10:38:26Z | https://dynamic-spaces.squarespace.com/tipsandtricks |
Yet Reagan had much more than restoration in mind. He intended to transform American political life and discourse. He had constructed a new Republican alliance -- a New Right -- of corporate elites, Christian evangelicals, conservative and neoconservative intellectuals, and a host of right-wing interest groups in hopes of undoing the liberal politics and programs of the past 40 years, reversing the cultural changes and developments of the 1960s, and establishing a new national governing consensus.
Conservatives certainly were not supposed to speak favorably of Paine, and for 200 years, they had not. In fact, they had for generations publicly despised Paine and scorned his memory. And one can understand why: Endowing American experience with democratic impulse and aspiration, Paine had turned Americans into radicals, and we have remained radicals at heart ever since.
However, for more than a quarter-century, we have allowed the Republican right to appropriate the nation's history, define what it means to be an American, and corral American political imagination. It is time for the left to recover its fundamental principles and perspectives and reinvigorate Americans' democratic impulse and aspiration. And we must start by reclaiming, and reconnecting with, Paine's memory and legacy and the progressive tradition he inspired and encouraged. We must redeem Paine's revolutionary vision, his confidence in his fellow citizens, and his belief in America's extraordinary purpose and promise. Doing so will help us to remember not only what we stand in opposition to but, all the more, what we stand in opposition for.
Contributing fundamentally to the American Revolution, the French Revolution, and the struggles of Britain's Industrial Revolution, Thomas Paine was one of the most remarkable political writers of the modern world and the greatest radical of a radical age. Yet this son of an English artisan did not become a radical until his arrival in America in late 1774, at the age of 37. Even then he had never expected such things to happen. But struck by America's startling contradictions, magnificent possibilities, and wonderful energies, and moved by the spirit and determination of its people to resist British authority, he dedicated himself to the American cause. Through his Common Sense pamphlet and the Crisis papers, he inspired Americans not only to declare their independence and create a republic; he also emboldened them to turn their colonial rebellion into a revolutionary war, defined the new nation in a democratically expansive and progressive fashion, and articulated an American identity charged with exceptional purpose and promise.
Five feet 10 inches tall, with a full head of dark hair and striking blue eyes, Paine was inquisitive, gregarious, and compassionate, yet strong-willed, combative, and ever ready to argue about and fight for the good and the right. The story is told of a dinner gathering at which Paine, on hearing his mentor Franklin observe, “Where liberty is, there is my country,” cried out, “Where liberty is not, there is my country!” A workingman before an intellectual and author, Paine developed his revolutionary beliefs and ideas not simply from scholarly study but all the more from experience -- experience that convinced him that the so-called lower orders, not just the highborn and propertied, had the capacity both to comprehend the world and to govern it. And addressing his arguments to those who traditionally were excluded from political debate and deliberation, not merely to the governing classes, he helped to transform the very idea of politics and the political nation.
America's struggle had turned Paine into an inveterate champion of liberty, equality, and democracy, and after the war he went on to apply his revolutionary pen to struggles in Britain and France. In Rights of Man, he defended the French Revolution of 1789 against conservative attack, challenged Britain's monarchical and aristocratic polity and social order, and outlined a series of public-welfare initiatives to address the material inequalities that made life oppressive for working people and the poor. In The Age of Reason, he criticized organized religion, the claims of biblical Scripture, and the power of churches and clerics. And in Agrarian Justice, he proposed a democratic system of addressing poverty that would entail taxing the landed rich to provide grants or “stakes” to young people and pensions to the elderly.
Reared an Englishman, adopted by America, and honored as a Frenchman, Paine often called himself a “citizen of the world.” But the United States always remained paramount in his thoughts and evident in his labors, and his later writings continued to shape the young nation's events and developments. And yet as great as his contributions were, they were not always appreciated, nor were his affections always reciprocated. Paine's democratic arguments, style, and appeal -- as well as his social background, confidence, and single-mindedness -- antagonized many among the powerful, propertied, prestigious, and pious and made him enemies even within the ranks of his fellow patriots such as John Adams, Alexander Hamilton, and Gouverneur Morris.
Elites and aspiring elites -- New England patricians and professors, Middle Atlantic merchants and manufacturers, southern slaveholders and preachers -- feared the power of Paine's pen and the democratic implications of his arguments. In reaction, they and their heirs sought to disparage his character, suppress his memory, and limit the influence of his ideas. And, according to most accounts, they succeeded. For much of the 19th century, and well into the 20th, Paine's pivotal role in the making of the United States was effectively erased in the official telling. Writing in the 1880s, Theodore Roosevelt believed he could characterize Paine, with impunity, as a “filthy little atheist” (though Paine was neither filthy, little, nor an atheist). Not only in the highest circles but also in various popular quarters, particularly among the religiously devout, Paine's name persistently conjured up the worst images, leading generations of historians and biographers to assume that memory of Paine's contributions to American history had been lost.
Yet those accounts were wrong. Paine had died, but neither his memory nor his legacy ever expired. His contributions were too fundamental and his vision of America's meaning and possibilities too firmly imbued in the dynamic of political life and culture to be so easily shed or suppressed. At times of economic and political crisis, when the republic itself seemed in jeopardy, Americans, almost instinctively, would turn to Paine and his words. Even those who apparently disdained him and what he represented could not fail to draw on elements of his vision. Moreover, there were those who would not allow Paine and his arguments to be forgotten.
Contrary to the ambitions of the governing elites, as well as the presumptions of historians and biographers, Paine remained a powerful presence in American political and intellectual life. Recognizing the persistent and developing contradictions between the nation's ideals and reality, diverse Americans -- native-born and immigrant -- struggled to defend, extend, and deepen freedom, equality, and democracy. Rebels, reformers, and critics such as Fanny Wright, Thomas Skidmore, William Lloyd Garrison, Elizabeth Cady Stanton, Ernestine Rose, Susan B. Anthony, Walt Whitman, Herman Melville, Abraham Lincoln, William Sylvis, Albert Parsons, Robert Ingersoll, Mark Twain, Henry George, Emma Goldman, Eugene Debs, Hubert Harrison, Alfred Bingham, Franklin Delano Roosevelt, Howard Fast, A.J. Muste, Saul Alinsky, C. Wright Mills, George McGovern, John Kerry (of the Winter Soldiers movement years), and Todd Gitlin (among other young people of Students for a Democratic Society), along with innumerable others right down to the present generation, rediscovered Paine's life and labors and drew ideas, inspiration, and encouragement from them.
Some honored Paine in memorials. Many more honored him by adopting his arguments and words as their own. Workingmen and women's advocates, utopians, abolitionists, freethinkers (as well as democratic evangelists!), suffragists, anarchists, populists, progressives, socialists, labor and community organizers, peace activists, and liberals have repeatedly garnered political and intellectual energy from Paine, renewed his presence in American life, and served as the prophetic memory of his radical-democratic vision of America.
Paine has definitely achieved a new status in public history and memory and come to be admired and celebrated almost universally. Nothing more firmly registered the change than the October 1992 decision by Congress to authorize the erection of a monument to Paine in Washington, D.C., on the National Mall. The lobbying campaign for the memorial involved mobilizing truly bipartisan support, from Ted Kennedy to Jesse Helms. And more recently, in 2004, while Howard Dean and Ralph Nader were issuing pamphlets modeled on Common Sense, and the online journal TomPaine.com was publishing liberal news commentary, Republicans and Libertarians were quoting Paine in support of their own political ambitions.
Undeniably, Paine's attraction is related to the recent wave of “Founding Fathers Fever.” But saying that simply raises the questions: Why have we become so intent on re-engaging the Founders, and why, specifically, Paine?
In recent years we have faced events and developments that once again have led us to ask ourselves, “What does it mean to be an American?” Commitment to the “American creed of liberty, equality, democracy,” the “melting-pot theory of national identity,” and the idea of American exceptionalism endures. We continue to comprehend our national experience as entailing the advancement of those ideals and practices. And we still want that history taught to our children. Nevertheless, globalization, immigration, ethnic diversification, the expansion of corporate power, the intensification of class inequalities, political alienation, the enervation of civic life, and domestic and international terrorism have instigated real anxiety and trepidation about the nation's future and the political alternatives available. In the 1990s, those very concerns fomented “culture wars” and a discourse of social and political crisis reflected in works with titles like The Disuniting of America; America: What Went Wrong?; Democracy on Trial; The End of Democracy?; The Twilight of Common Dreams; Bowling Alone; and Is America Breaking Apart?
In the wake of September 11, many of those titles no longer seem relevant. The Islamic terrorists' attacks on America and the nation's ensuing wars in Afghanistan and Iraq dramatically refashioned the prevailing sense of crisis and danger. However, they did not resolve the critical questions of American identity and meaning. Not at all. They simply posed them anew and in a more urgent manner.
We sense that America's purpose and promise are in jeopardy and we wonder what we can and should do. Like other generations confronting national crises and emergencies, we have quite naturally looked back to the Revolution and the Founders in search of answers and directions.
Still, why have we become so eager to reconnect specifically with Paine? Perhaps because when compared with the other Founders, he has come to look so good. He was no slaveholder or exploiter of humanity. Nor did he seek material advantage by his patriotism. But that explains his popularity in an essentially negative manner. Besides, as admirable as Paine was, the answer lies not in his life alone. It also has to do with our own historical and political longings. However conservative the times appear, we Americans remain -- with all our faults and failings -- resolutely democratic in bearing and aspiration. When we rummage through our Revolutionary heritage, we instinctively look for democratic hopes and possibilities. And there we find no Founder more committed to the progress of freedom, equality, and democracy than Paine. Moreover, we discover that no writer of our Revolutionary past speaks to us more clearly and forcefully. In spite of what might have seemed a long estrangement, we recognize Paine and feel a certain intimacy with his words.
Heartened and animated by Paine, progressives have pressed for the rights of workers; insisted upon freedom of conscience and the separation of church and state; demanded the abolition of slavery; campaigned for the equality of women; confronted the power of property and wealth; opposed the tyrannies of fascism and communism; fought a second American Revolution for racial justice and equality; and challenged our own government's authorities and policies, domestic and foreign. We have suffered defeats, committed mistakes, and endured tragedy and irony. But we have achieved great victories, and far more often than not, as Paine himself fully expected, we have in the process transformed the nation and the world for the better.
Now, after more than two centuries -- facing our own “times that try men's souls” -- it seems we have all become Painites. Today, references to Paine abound in public debate and culture; in contrast to the past, not only the left but also the right claims him as one of their own.
Still, conservatives do, in their fashion, end up fostering interest in Paine. It's not just that, aware of his iconic status, they insist on quoting him. It's also that their very own policies and programs, by effectively denying and threatening America's great purpose and promise, propel us, as in crises past, back to the Revolution and the Founders, where once again we encounter Paine's arguments and recognize them as our own. Arguably, the heightened popular interest in Paine we have witnessed these past several years reflects anxieties and longings generated not simply by the grave challenges we face but also by the very triumph of right-wing politics.
Yet those of us who might make the strongest historical claim on Paine have yet to properly reappropriate his memory and legacy. In the course of the late '60s and early '70s, the left not only fell apart; it also lost touch with Paine. And, while we continue to cite him and his words, we have failed to make his vision and commitments once again our own. In contrast both to the majority of our fellow citizens and to generations of our political predecessors, liberals and radical reformers no longer proclaim a firm belief in the nation's exceptional purpose and promise, the prospects and possibilities of democratic change, and ordinary citizens' capacities to act as citizens rather than subjects. We have lost the political courage and conviction that once motivated our efforts.
Electrified by America and its people, and the originality of thought and action unleashed by the Revolution, Paine argued that the United States would afford an “asylum for mankind,” provide a model to the world, and support the global advance of republican democracy. But many on the left have eschewed notions of American exceptionalism and patriotism and allowed politicians and pundits of the right to monopolize and define them. Presuming that such ideas and practices can only serve to justify the status quo or worse, and ignoring how, historically, progressives have articulated them to advocate the defense and extension and deepening of freedom, equality, and democracy, many of us have failed to recognize their critical value as weapons against injustice and oppression.
And while Paine had every confidence in working people and wrote to engage them in the Revolution and nation building, we, for all our rhetoric, have remained alienated from, if not skeptical of, our fellow citizens. Asking labor unions to underwrite their campaigns and appealing to working people for their votes, Democrats -- the party of the people -- hesitate to actually mobilize them to fight for democratic political and social change. Taking office in January 1993, eager to signal a new, progressive direction in public life after 12 years of Republican administrations, William Jefferson Clinton -- who would also speak of Paine at various times in his two terms -- made every effort to identify himself with the revolutionary author of the Declaration of Independence, Thomas Jefferson. En route from Arkansas to the capital to take the oath of office, Clinton retraced Jefferson's inaugural trek from Monticello to Washington and filled his inaugural address with Jeffersonian references. But the way Clinton presented the Founder and third president, however stirring it may have sounded, revealed an elitist dread of popular democratic energies and a desire to keep “the people” at some distance from power. Calling on Americans to “be bold, embrace change, and share the sacrifices needed for the nation to progress,” he stated, “Thomas Jefferson believed that to preserve the very foundations of our nation, we would need dramatic change from time to time.” Yet as Clinton surely knew, Jefferson did not say that we needed merely change to sustain the republic. What Jefferson said was, “I hold that a little rebellion now and then is a good thing, and as necessary in the political world as storms in the physical” [emphasis added]. Committed to cultivating democratic life, liberals and other progressives must ensure that Democrats not only commission expert panels, draft plans, and line up legislative votes in a top-down fashion but also engage American aspirations and energies and enhance public participation in the political and policy-making process.
Harvey J. Kaye is the Rosenberg Professor of Social Change and Development at the University of Wisconsin-Green Bay. This article is excerpted from Thomas Paine and the Promise of America, to be published in August by Hill and Wang, a division of Farrar, Straus and Giroux, LLC. Copyright © 2005 by Harvey J. Kaye. All rights reserved.
Harvey J. Kaye is the Rosenberg Professor of Social Change and Development at the University of Wisconsin-Green Bay. | 2019-04-25T08:12:42Z | https://prospect.org/article/lost-founder |
15 days in Europe and you are going to explore the best of the cities. Starting with London set on River Thames is very vast and we will spend full three days to witness the best of the city – London Eye, Buckingham Palace, Madame Tussauds, Big Ben Clock Tower, House of Parliaments and many other famous attractions. Moving forward to Paris via Eurostar train that brilliantly connects London to Paris. In Paris you will see the Eiffel Tower, Louvre Pyramid. Disneyland Paris, Lido de Paris Show and of course you will explore the bustling fashion hubs of the city. Next stop will be in Amsterdam where you will explore the city on a one-hour long cruise. After this you will make your way into the beautiful valleys of Switzerland and explore the cities such as Munich, Zurich and Innsbruck.
Upon arrival in London, please clear your immigration, customs and head to the baggage claim area. Collect your baggage and come out of the airport. Later, transfer from London Heathrow Airport to the hotel in London. Post check-in, relax at the hotel. Enjoy a comfortable overnight stay at the hotel in London.
Relish the sumptuous breakfast at the hotel. After breakfast, proceed towards Victoria Coach Station, which is the departure point of the city tour of London.You are requested to reach the departure point 15 minutes prior to the actual departure time. As soon as you handover your voucher to the staff, he will guide you towards your coach. Set out for the Majestic Tour of London. The tour begins with a panoramic drive around Parliament Square, to see Westminster Abbey, where many kings, queens, statesmen, poets and writers are buried. See Big Ben and the Houses of Parliaments. Visit St. Paul's Cathedral where you'll have a guided tour. It was the wedding place of Prince Charles and Princess Diana and many other special royal occasions. Drive on to Buckingham Palace, where you'll see the famous ceremony of the Changing of the Guards. After this, make your way to a traditional English pub and enjoy a traditional English dish of fish and chips or sausages and mash (lunch is not included). On arrival at the Tower of London, the splendidly dressed Beefeaters will tell you about the Tower's history and the crown jewels. After visiting the Tower of London, you will have the option to either finish the tour and join a Thames River Cruise to enjoy stunning uninterrupted views of the Gothic style House of Parliament or keep your cruise ticket to use at your leisure another day. The tour will end at the House of Parliament. You can choose to stay back and take the Cruise or return back to your hotel on your own. Enjoy a comfortable overnight stay at the hotel in London.
After breakfast, enjoy the day at leisure. Explore London at your own pace or choose from the below three places to visit as optional tours.
Madame Tussauds wax museum: Madame Tussauds is one of London's hottest attractions. It’s both visually immersive and interactive and should be on top of your list when visiting London. As you wander around Madame Tussauds you will stumble across the endless number of famous faces including David Beckham, Kylie Minogue, Ex- President Bush, Tony Blair and many more. You can also interact with the model celebrities, for example, you can be there when David Beckham prepares to take one of his famous free kicks and feel the beat of his heart and tremble as the floor vibrates beneath your feet!
London Stardome: Explore London Stardome, an interactive show dome. You will also get to experience 'Scream' which is a maximum security prison taken over by the unhinged inmates, their mission is to give you nightmares. This is not suitable for children under the age of 12 or for people with a nervous disposition. Now also offering a new visitor experience, Marvel Super Heroes 4D that will bring to life some of the world's best loved Super Heroes through a mix of 4D animation, interactive themed areas and startling realistic Madame Tussauds wax figures.
London eye: Take a flight on Merlin Entertainment's London Eye, a visually striking structure and the world's largest observation wheel. As you ascend over the Thames you will see London's famous streets, churches, palaces and monuments spread out below in a panoramic scene giving you a new perspective of a great city! On a clear day the views can stretch as far as 25 miles to Windsor Castle. Visitors to the London Eye can now experience a four minute 4D film focused on the journey of a little girl and her father in London in which they also visit the London Eye.
After breakfast, check out of the hotel, settle your extras if any, and transfer to London's St. Pancras Railway Station. On arrival at the station, catch the Eurostar high-speed train to Paris. The journey will take approximately 2 hours and 30 minutes. On reaching Paris, get transferred to your hotel. All hotels have a check-in time post 1400 hours. You may have to wait if you arrive earlier than that. Post check-in, the day/evening is yours to explore the city on your own. It’s a beautiful city with interesting sights. Walk around this wonderful city and explore for some good photo opportunities.
Enjoy a delicious breakfast at the hotel. Post breakfast, prepare yourself for an exciting day at the world famous Disneyland Resort. The pickup for this tour can be arranged from most of the city centre hotels in Paris. You are requested to call the number on the voucher to reconfirm your hotel pick up. If you miss the hotel pick up, you are requested to make your way to Disneyland Resort on your own. Spend the day exploring the fantastic world of the Disneyland Resort Paris. Minivan will pick you from your hotel at 7:15 am. This is a one day pass to Disneyland Resort Paris that gives a full day in one of the two parks. This includes transfer and return on board a luxury motor coach from the hotel of Paris to Disneyland Paris and admission ticket for Walt Disney Studios Park or the Disneyland Park. If you decide to step through the Walt Disney Studios Gates, let your imagination soar and immerse yourself in the never-ending and forever fascinating world of movies and television. If you choose to visit the Disneyland Theme Parks, get ready to exlpore an enchanting kingdom filled with fun, fantasy and discovery, a world of make-believe characters, shows and attractions. Whichever park you visit, you will discover the most magical place on Earth inspired by the most magical dreams. The duration of the tour is 13 hours and you will be dropped to your hotel once the tour is over. Enjoy a comfortable overnight stay at the hotel in Paris.
Enjoy a relaxed breakfast at the hotel. Post breakfast, check out of the hotel, settle your extras if any and head towards the departure point of your Paris Seinorama Tour. Make sure to reach the tour departure point 15 minutes prior to actual starting time of the tour. For the tour, proceed for the office of the Paris Vision Agency before 2:00 pm. In exchange for your voucher, they will guide you to your coach. At 2:30 pm, take a 4-hour long tour of Paris. This tour includes visits to the Place de la Concorde, the Avenue des Champs Elysees and the Arc de Triomphe. Later, proceed to the prestigious residential area near the Bois de Boulogne before enjoying a 1-hour Cruise on the River Seine. Finally, visit the 2nd Floor of Eiffel Tower to admire some superb panoramic view of Paris. Enjoy the rest of the day exploring Paris on your own. Your tour ends at the Eiffel tower. Rest of the time is free for you to indulge in shopping in this fashion capital of the world. Post shopping, make your way back to the hotel on your own. Enjoy a comfortable overnight stay at the hotel in Paris.
After a hearty breakfast at the hotel, check out of the hotel, settle your extras if any and transfer to the Paris Railway Station to catch a high-speed train to Amsterdam. The journey will take approximately 3 hours. After arriving in Amsterdam, transfer to hotel. All hotels have a check-in time post 1400 hours. You may have to wait if you arrive earlier than that. Post check-in, the day/evening is yours to explore the city on your own. It’s a beautiful city with interesting sights. Walk around this wonderful city and explore for some good photo opportunities.
After relaxing in the hotel for a while, proceed towards the departure point of your Canal Cruise. Make sure to reach the tour departure point 15 minutes prior to actual starting time of the tour. During the 1-hour Amsterdam cruise in a luxurious cruise boat, you will be taken along the beautiful imposing canals of historic Amsterdam. You will float alongside houses with clock, spout and neck gables, passing the Zevenbogenbruggengracht. You will also pass under the Skinny Bridge and over the Amstel, the VOC ship and the docks. Enjoy an unforgettable cruise experience. Post cruise, you will be dropped at the tour departure point and you are requested to make your own way back to the hotel. Enjoy a comfortable overnight stay at the hotel in Amsterdam.
Enjoy a relaxed breakfast at the hotel. Post breakfast, head towards the departure point of your visit to Kuekenhof Gardens OR Volendam and Marken tour. Make sure to reach the tour departure point 15 minutes prior to actual starting time of the tour. Visit to Kuekenhof Gardens Amsterdam City Tour with Keukenhof Gardens. Drive past the Royal Palace, the National Monument, the Skinny Bridge, the Albert Cuijp Market, beautiful houses along the canal and a windmill on the river Amstel. Stopover at the diamond factory followed by a two hour lunch break on your own. After lunch, set off for the Keukenhof tour at 2.15 pm. This colourful tour will take you through the outstanding flower fields in the direction of Keukenhof. Relax and admire some of the most beautiful flowers in the world.
Volendam and Marken tour. Only a few kilometres from Amsterdam, find yourself to be in an entirely different world amongst the green flat Dutch countryside. Visit Volendam, the fisherman's village situated on the shores of the former Zuiderzee. Continue by boat to Marken, once an island, it is now connected to the mainland by a dike. This tour also includes a visit to a cheese farm, where cheese is still manufactured at home. On your return journey to Amsterdam, you will drive through a typical Dutch scenery via Monnickendam, one of the dormant cities of the Zuiderzee. If you opt for the tour, you will be dropped at the tour departure point and you are requested to make your own way back to the hotel. Enjoy a comfortable overnight stay at the hotel in Amsterdam.
Enjoy an excursion to Bonn! During a 3-hour cruise along the Rhine, you can watch the beautiful countryside along the banks of the river while a taped commentary will give you information about the main sights, as you pass along the way. Refreshments are available on board at your own expense. On arrival in Bonn you will have free time to explore at your leisure and then board a KD line boat for your return cruise which will take you back to Cologne in approx 1 hour and 40 minutes. Overnight at the hotel in Cologne.
After an early morning breakfast at the hotel, it is time to leave Cologne. Transfer from Cologne Hotel to Cologne Station. Take a train to reach Munich, after arriving, transfer to hotel. All hotels have a check-in time of post 1400 Hrs. You may have to wait if you arrive earlier than that. Post check-in, the day/evening is yours to explore the city on your own. It’s a beautiful city with interesting sights. A bit of walking around the city will provide good photo opportunity. Overnight at the hotel in Munich.
After an early morning breakfast at the hotel, get ready for an exciting day ahead. Post Breakfast head towards the departure point of your Full day Excursion to Royal Castle Neuschwanstein Linderhof tour. Make sure to reach the tour departure point 15 minutes prior to the actual tour starting time .Excursion to Royal Castle Neuschwanste in Linderh of Hidden in the seclusion of the mountains, Ludwig II built two of his dream castles: Neuschwanste in and Linderh of. This excursion shows you these two extraordinary castles, both testifying to the vision of Bavaria's fairy tale King. Guided tours are included in both castles. For English and German language the guided tours will be done by a live guide. In Neuschwanste in castle all other languages will be provided by headphones. In Linderh of other languages cannot be guaranteed. Clients will receive leaflets only. There is also time for a short stop for souvenir shopping in Oberammergau. If you opt for the optional tour you will be dropped at the tour departure point and you are requested to make your own way back to the hotel. Overnight at the hotel in Munich.
Relish the sumptuous breakfast at the hotel. After an early morning breakfast at the hotel, check out from the hotel, settle your extras if any and transfer to the railway station to catch a high speed train to Innsbruck. The journey will take approximately 3 hours. After arriving in Innsbruck transfer to hotel. All hotels have a check-in time of post 1400 Hrs. You may have to wait if you arrive earlier than that. Post check-in, the day/evening is yours to explore the city on your own. A bit of walking around will showcase this city and provide good photo opportunity. After taking some rest, head towards the departure point of your excursion to Swarovski Crystal World. Make sure to reach the tour departure point 15 minutes prior to actual tour starting time. Swarovski Crystal World tour will take you to explore the fantastic and sparkling world of Swarovski. Aboard a fast and comfortable coach from central Innsbruck (30 minutes’ drive), you will be taken to the world famous Swarovski Crystal World, situated in Wattens. The water spouting Giant will amaze you with his sparkling eyes! Inside the Giant, a whole crystal world awaits you: the Chambers of Wonders containing the Planet of Crystals, the Crystal Dome, the Crystal Theatre, the Ice passage and the Floating Poem. They all witness the level of artistic perfection reached by Swarovski and their images will be etched on your mind forever. After the tour you will be dropped at the tour departure point. You are requested to make your way back to your hotel. Overnight at the hotel in Innsbruck.
After an early morning breakfast at the hotel, check out from the hotel, settle your extras if any, and transfer to the railway station to catch a train to Zurich. The journey will take approximately 3 hours. After arriving in Zurich, transfer to your hotel on your own. All hotels have a check-in time of post 1400 hours. You may have to wait if you arrive earlier than that. Post check-in, the day/evening is yours to explore the city on your own. It’s a beautiful city with interesting sights. A bit of walking around will showcase this city and provide good photo opportunity. After taking some rest, head towards the departure point of your optional Visit to Lindt & Sprungli Chocolate outlet at 1530 hours. Make sure to reach the tour departure point 15 minutes prior to actual tour starting time.
After breakfast, get ready for an exciting day ahead. Enjoy an excursion to Rhine falls and a city tour of Zurich. Witness the fantastic Rhine Falls, Europe's largest waterfall. It is only 23 metres high but has an impressive width of 150 metres and displaces an average of 25'000 cubic feet of water per second. You will be dropped off at the north bank of the river Rhine where you can admire the turreted castle called Schloss Laufen on a cliff directly above the falls. The tour also takes you to Northern Switzerland where you will drive through Schaffhausen with its famous Munot Fortress, dating back to the 16th century.
After an early morning breakfast at the hotel, it will be time to leave Switzerland. Please head to the train station and board your train to Zurich Airport. On arrival at the airport, please check in at the respective airline counter (check for the number on the various screens given) and clear your immigration and security check. Hope you have pleasant memories of the trip. | 2019-04-23T03:01:43Z | http://dakshholidays.dakshnetworking.com/package/view/best-of-europe-tour |
* Translation provided by the Milan Chamber of National and International Arbitration.
** Footnote (1) is not included in the original text of the Code.
The parties may have the disputes arising between them decided by arbitrators, with the exception of the disputes provided for in Arts. 409 and 442, (1) those concerning issues of personal status and marital separation and those other disputes which may not be the subject of a settlement.
The arbitration agreement shall be in writing and shall set out the subject matter of the dispute, under penalty of nullity.
The agreement shall be considered to be in writing where the intention of the parties is expressed in a telegram or telex.
The provisions regulating the validity of contracts exceeding the ordinary course of administration shall apply to the arbitration agreement.
The parties may establish in their contract or in a separate document that the disputes arising out of that contract be decided by arbitrators, provided that such disputes may be the subject of an arbitration agreement. The arbitration clause shall be contained in a document meeting the formal requirements for an arbitration agreement according to Art. 807, first and second paragraph.
Disputes ex Art. 409 may be decided by arbitrators only if this is provided for in collective labour contracts and agreements and if, under penalty of nullity, the parties right to have recourse to the courts is not affected. The arbitration clause in collective labour contracts or agreements or in individual labour contracts is null and void where it authorizes the arbitrators to decide ex aequo et bono or declares that there will be no recourse against the award.
The validity of the arbitration clause shall be examined independently of the underlying contract; however, the power to stipulate a contract includes the power to agree on the arbitration clause.
The arbitration agreement or clause shall appoint the arbitrators or establish their number and manner of appointment.
Where an even number of arbitrators is indicated, one more arbitrator is appointed by the president of the court of first instance [tribunale] as provided for in Art. 810, unless the parties have agreed otherwise. Where the number of arbitrators is not indicated and the parties do not reach an agreement on this matter, there shall be three arbitrators and, failing appointment [by the parties], the president of the court of first instance shall proceed as provided for in Art. 810, unless the parties have agreed otherwise.
Where, under the arbitration agreement or clause, the arbitrators are to be appointed by the parties, each party shall serve on the other a notice of his appointment(s) and request him to appoint his arbitrators. The party to whom the request is made shall notify the personal details of the arbitrator(s) he has appointed within the following twenty days.
Failing this, the party who has made the request may file a petition with the president of the court of first instance of the district in which the arbitration has its seat , requesting him to make the appointment. If the parties have not yet determined that seat, the petition shall be filed with the president of the court of first instance of the place in which the arbitration agreement or the contract to which the arbitration clause refers has been made or, if that place is abroad, to the president of the court of first instance of Rome . The president shall issue an order against which there shall be no appeal, after hearing the other party where necessary.
This provision shall also apply where the arbitration agreement or clause entrusts the appointment of one or more arbitrators to the courts or, where the appointment is entrusted to a third party, that third party fails to take the necessary action.
Where for whatever reason all or some of the appointed arbitrators are unable to act, they shall be replaced in the same manner laid down for their appointment in the arbitration agreement or clause. If the party concerned or the third party fails to take the necessary action, or the arbitration agreement or clause is silent on the matter, the provisions of the preceding article shall apply.
Minors, persons under a legal incapacity, bankrupts and those who have been disqualified from holding a public office may not act as arbitrators.
Acceptance by the arbitrators shall be given in writing and may be given by signing the arbitration agreement.
The arbitrators shall render their award within the time limit set by the parties or by law; if they fail to do so and the award is set aside on this ground, they shall be held liable in damages. They shall likewise be liable in damages if, after accepting their appointment, they renounce it without just cause.
Unless the parties have agreed otherwise, the arbitrator who fails to perform or postpones an act connected with his office may be replaced by agreement of the parties or by a third party entrusted with this task by the arbitration agreement or clause. Failing this, fifteen days after a notice to perform has been sent to the arbitrator by registered mail, any of the parties may file a petition with the president of the court of first instance of the district in which the arbitration has its seat. The president shall issue an order against which there shall be no appeal, after hearing the parties, and, where he ascertains that there has been failure to act or delay, he shall declare that the arbitrator is removed from office and shall proceed to replace him.
The arbitrators shall be entitled to reimbursement of their expenses and to a fee for services rendered, unless they have waived this right at the moment of acceptance or by a subsequent written statement. The parties shall be jointly and severally liable for payment, subject to the right of mutual recovery.
Where the arbitrators themselves fix the amount of their expenses and fees, that decision shall not be binding on the parties if they do not accept it. In this case, the amount of expenses and fees shall be fixed by an order of the president of the court of first instance referred to in Art. 810, second paragraph, against which there shall be no appeal, on petition by the arbitrators and after hearing the parties.
The order is directly enforceable against the parties.
A party may refuse to accept an arbitrator whom he has not appointed, for the reasons laid down in Art. 51.
A challenge shall be made by petition to the president of the court of first instance referred to in Art. 810, second paragraph, within the peremptory time limit of ten days after the appointment has been notified or the ground for challenge has come to the partys knowledge, if later . The president issues an order against which there shall be no appeal, after hearing the challenged arbitrator and making summary enquiries where necessary.
The parties shall determine the seat of the arbitration in the territory of the Republic; otherwise the seat shall be determined by the arbitrators at their first meeting.
The parties may establish the procedural rules to be followed by the arbitrators in the arbitration agreement, the arbitration clause or, provided that it is made before the commencement of the arbitration proceedings, in a separate written document.
Failing such provisions, the arbitrators may regulate the proceedings as they see fit.
They shall in any case set time limits for the parties to file documents, submissions and replies.
The arbitrators may delegate the taking of evidence to one of their number.
The arbitrators shall decide all issues arising in the course of the proceedings [ABROGATED: before the award is rendered] by an order which is not filed [with the Magistrates Court] and may be revoked, with the exception of the case provided for in Art. 819.
A party who, during the arbitration proceedings, fails to raise the objection that the pleadings of the other party exceed the limits of the arbitration agreement or clause, may not file a recourse for setting aside the award on this ground.
The arbitrators may not grant sequestration orders or other interim measures.
If an issue arises during the proceedings which by law is not arbitrable, the arbitrators shall stay the proceedings where they deem that the decision entrusted to them depends on deciding that issue [ABROGATED: and shall order that the parties file a request before the competent court].
In all other cases, the arbitrators shall decide all issues arising in the arbitration proceedings.
In the case provided for in the first paragraph , the time limit set by Art. 820 shall be suspended until the day on which one of the parties notifies the judgment on the incidental issue to the arbitrators, once it has become res judicata; if less than sixty days remain, the time limit shall be extended by law to sixty days.
The jurisdiction of the arbitrators is not excluded by the fact that the dispute referred to them is connected with an action pending before the court.
The arbitrators may hear the witness by requesting him to appear before them or decide to hear his statement at his home or office, if he agrees. They may further decide to hear the witness by requesting him to give written replies to questions within the time limit that they establish.
Unless the parties have agreed otherwise, the arbitrators shall render their award within one hundred and eighty days of acceptance of their appointment. If there are several arbitrators and they did not all accept at the same time, the time limit begins to run from the last acceptance. The time limit is suspended where a petition for challenge is filed, until a decision thereon is rendered; it is interrupted where replacement of the arbitrators is necessary.
Where evidence must be taken or an interlocutory award has been rendered , the arbitrators may extend the time limit once only and by not more than one hundred and eighty days.
In case of the death of one of the parties, the time limit is extended by thirty days.
The parties may agree in writing to an extension of the time limit.
The expiry of the time limit indicated in the preceding article may not be raised as a ground for setting aside the award if, before deliberation of the award as set out in the order [dispositivo] signed by the majority of the arbitrators, the party failed to notify to the other parties and to the arbitrators his intention to invoke the fact that the arbitrators authority had thus been terminated.
The arbitrators shall decide according to the rules of law, unless the parties have authorized them, by whatever expression, to decide ex aequo et bono.
The award shall be deliberated by a majority vote of the arbitrators meeting in personal conference and shall then be set down in writing.
6) the signatures of all the arbitrators, with an indication of their day, month and year; the arbitrators may sign in a place other than the place of deliberation, as well as abroad. If there is more than one arbitrator, they may sign in different places without having to meet in personal conference again.
However, an award signed only by the majority of the arbitrators shall be valid, provided that it is stated that it was deliberated in personal conference of all the arbitrators and that it is declared expressly that the other arbitrators were either unwilling or unable to sign it.
The arbitrators shall draft the award in as many originals as the number of the parties and give notice of it to each party by handing over an original or sending it by registered mail within ten days of the date of the last signature.
The party intending to have the award enforced in the territory of the Republic shall file the original award or a certified copy thereof, together with the original arbitration agreement or document containing the arbitration clause or an equivalent document, or a certified copy thereof , with the Registry of the Magistrates Court [Pretura] of the district in which the arbitration has its seat [ABROGATED: within one year of receipt of the award].
The Magistrate, after ascertaining that the award [ABROGATED: has been filed within the time limit and] meets all formal requirements, enforces it by decree. The award which has been enforced shall be registered in all cases where a judgment of the same content would be registered.
The Registry notifies the filing of the award and the decision of the Magistrate to the parties according to Art. 133, second paragraph.
A recourse against the decree [ABROGATED: of the Magistrate] denying enforcement of the award may be filed by petition with the [ABROGATED: president of the] court of first instance within thirty days of notification; the court of first instance, after hearing the parties, issues, in camera , an order against which there shall be no appeal.
On the request of a party, the award may be corrected by the same arbitrators who have rendered it, where there have been omissions, material errors or miscalculations.
The arbitrators shall take the necessary action within twenty days, after hearing the parties. Notice of the correction shall be given to the parties, also by registered mail, within ten days of the date of the last signature.
If the award has already been filed, the Magistrate of the place where the award has been filed shall be requested to correct the award. The provisions of Art. 288 shall apply insofar as they are compatible.
The award may only be subject to a recourse for setting aside, revocation or third party opposition .
A recourse may be filed irrespective of whether the award has been filed or not.
The award partially deciding on the merits of the dispute may be challenged immediately, whereas the award which decides some of the issues without resolving the dispute may be challenged only together with the final award.
No recourse may be filed after one year from the date of the last signature.
The request to correct the award does not suspend the time limit for filing a recourse; however, the parts of the award which have been corrected may be challenged within the ordinary time limit, which begins to run after notification of the decision on the correction.
9) where the principle of due process [contraddittorio] has not been observed in the arbitration proceedings.
A recourse for setting aside may likewise be filed where the arbitrators did not decide according to law, unless the parties had authorized them to decide ex aequo et bono or had declared that there may be no recourse against the award.
In the cases ex Art. 808, second paragraph, the award may also be challenged for violation and misapplication of collective contracts and agreements.
When granting the recourse, the court of appeal shall render a judgment stating that the award is null and void ; where the defect only concerns a part of the award which is severable from the others, it shall state that the award is partially null and void.
Unless all the parties have declared a contrary intention, the court of appeal shall also decide on the merits, if the case is ready to be decided, or it shall make an order referring the case to the examining judge, where new evidencetaking is necessary for a decision on the merits.
[ABROGATED: Where no recourse for setting aside may be filed and] Notwithstanding any waiver, the award may be revoked in the cases indicated at nos. 1), 2), 3) and 6) of Art. 395, within the time limits and according to the formalities set out in the Second Book.
If the conditions mentioned in the first paragraph arise during the setting aside proceedings, the time limit for filing a request for revocation shall be suspended until notification of the judgment on the setting aside.
The award may be subject to third party opposition in the cases indicated in Art. 404.
The request for revocation and third party opposition shall be filed with the court of appeal of the district in which the arbitration has its seat.
The court of appeal may consolidate setting aside, revocation and third party opposition proceedings, unless the stage reached by the proceedings filed first does not allow an exhaustive examination of and decision on the other proceedings.
Where at the date of signing the arbitration clause or agreement at least one of the parties has his domicile [residenza] or principal place of business [sede effettiva] abroad, or where a substantial part of the obligations arising out of the relationship to which the dispute refers must be performed abroad, the provisions of Chapters I to V of this Title shall apply to arbitration insofar as they are not derogated from by this Chapter.
The provisions laid down in international conventions shall apply in any case.
An arbitration clause contained in general conditions of contract or standard forms shall not be subject to the specific approval provided for in Arts. 1341 and 1342 of the Civil Code.
An arbitration clause contained in general conditions that are incorporated in an agreement in writing made by the parties shall be valid, if the parties knew of the clause or should have known of it by using ordinary diligence.
The parties may agree on the norms that the arbitrators shall apply to the merits of the dispute or provide that the arbitrators decide ex aequo et bono. If the parties are silent, the law with which the relationship has its closest connection shall apply.
Unless the parties have agreed otherwise, the language of the proceedings shall be determined by the arbitrators, taking into account the circumstances of the case.
The challenge of arbitrators is regulated by Art. 815, unless the parties have agreed otherwise.
The award shall be deliberated by a majority vote of the arbitrators meeting in personal conference or videoconference, unless the parties have agreed otherwise, and shall then be set down in writing.
The provisions of Art. 829, second paragraph, Art. 830, second paragraph and Art. 831 shall not apply to international arbitration, unless the parties have agreed otherwise.
The party wishing to enforce a foreign award in the Republic shall file a petition with the president of the court of appeal of the district in which the other party has his domicile; if that party has no domicile in Italy, the court of appeal of Rome shall have jurisdiction.
Where the documents mentioned in the second paragraph are not made in the Italian language, the petitioner shall also produce a certified translation.
2) the award contains provisions which are contrary to public policy.
Following such opposition, the proceedings shall be held according to Arts. 645 ff, insofar as they are applicable. The court of appeal shall render a judgment which may be appealed before the Supreme Court.
If an application for the setting aside or suspension of the effects of the award has been made to the competent authority indicated at no. 5) of the third paragraph, the court of appeal may adjourn the decision on the recognition or enforcement of the award; on the request of the party seeking enforcement it may, in the case of suspension, order the other party to give suitable security.
* Art. 800 (Foreign arbitral awards) is abrogated.
* Art. 196 of the Application and Provisional Provisions of the Code of Civil Procedure (Recourse against the decree denying enforcement of the award) is abrogated.
1. Art. 819bis of the Code of Civil Procedure, introduced by Art. 11 of this law, shall apply to current arbitration proceedings unless a judgment has been rendered holding that [the arbitrators] lack jurisdiction because the dispute referred to the arbitrators is connected to an action pending before a court [connessione].
2. Petitions filed according to the last paragraph of Art. 825 of the Code of Civil Procedure, as in force before the date of entry into force of this law, shall be decided by the president of the court of first instance.
3. Where the decree denying enforcement of the award has been rendered before the date of entry into force of this law, and the time limit mentioned in the last paragraph of Art. 196 of the Application and Provisional Provisions of the Code of Civil Procedure, abrogated by Art. 17, second paragraph, of this law, is still running, that time limit shall be extended until the thirtieth day.
4. Awards rendered before the date of entry into force of this law shall be challenged according to the previous law. However, the provisions of Art. 830 of the Code of Civil Procedure, as amended by Art. 22 of this law, shall apply to these setting aside proceedings as well as to the setting aside proceedings which are current at the date of entry into force of this law.
5. The provisions of Chapter VI of Title VIII of the Fourth Book of the Code of Civil Procedure, introduced by Art. 24 of this law, shall also apply where the arbitration agreement or clause have been stipulated before the date of entry into force of this law, provided that the arbitration proceedings have not already been initiated under the previous law. Art. 833 of the Code of Civil Procedure shall apply in any case, if the conditions of Art. 832 of the same Code are met.
6. The provisions of Arts. 839 and 840 of the Code of Civil Procedure shall also apply to awards rendered before the date of entry into force of this law, provided that recognition and enforcement have not already been sought according to the legislation in force before the date of entry into force of this law.
(1) Art. 409 concerns labour disputes; Art. 442 concerns disputes relating to compulsory social security and medical aid. They replace the reference to Arts. 429 and 459 through the effect of Law no. 533 of 11 August 1973, which replaced Title IV of the Second Book of the Code of Civil Procedure (see Annex II ). | 2019-04-23T08:15:31Z | http://cbar.org.br/site/legislacao-internacional/italia/ |
Discussion of Larson Research Center work.
The LST community views the physical universe as a stage of space and time for matter and its interactions. As David Hestenes expresses it, the goal of their research program is to find the set of the fewest interactions among the set of the fewest particles of nature, This has resulted in the standard model of particle physics.
Larson's program of research is radically different. It assumes that everything in the physical universe stems from the reciprocal relation between space and time, which it assumes exists in discrete units of three dimensions. This has led us to deduce that, instead of adding time as a fourth dimension to the Pythagorean theorem equation, which is the basis for the LST community's concept of spacetime, we conceive of two separate Pythagorean equations, one for space and one for time, each with three dimensions. which are reciprocals.
The equation of space, √(12 + 12 + 12) = √3, is calculated from the LC in units of space, while the equation of time is the inverse of this, 1/√(12 + 12 + 12) = 1/√3, calculated from the LC in units of time. The respective volumes of space and time associated with each of these equations for their respective radii are inverse, and the space volume is calculated to be 27 times smaller than the time volume.
The question is now, of course, is this just a little mathematical sleight of hand on our part? Is the logic twisted to suit our objective? The reader will have to make that decision, but I find it hard to believe that we could continue to make these observations by virtue of mere coincidence.
When we mess with the foundation of mathematics, we mess with the foundation of physics and the technology that is the foundation of Western civilization. God have mercy on my soul, because I can't stop now!
The posts on page 3 of this topic deal with the relationship between the tetraktys and the LC and its consequences. The major conclusion is that the tetraktys is as far as we can take the binomial expansion. There are no higher dimensions in physical phenomena, in spite of Clifford algebra.
Notwithstanding this apparent fact, we've seen how John Baez et. al, explain incredibly complex mathematics in an attempt to go beyond three dimensions (four counting 0). It is very interesting to see how they have mistaken the "directions" of dimensions, or at least mis-labeled them, so that it's difficult to not confuse non-specialists with their mathematical and geometrical concepts.
Nevertheless, the "Bott clock," which we have revised (see previous posts above), helps us to understand the new scalar concepts tremendously, I think, even though it still lacks the clear connection with the LC. I think I can add that too to the clock.
On page 3 of this topic I show how the number 8 of the 3d expansion follows the expansion of the LC: 23, 43. 63, ...2n3.
This connection of numbers and geometry is real easy to show, when n = 1, because the 3d expansion generates the 2x2x2 stack of 8, 1-unit cubes of the LC, which contains all the dimensional sub-spaces of the LC, and the numbers of Pascal's triangle, which are just the coefficients of the binomial expansion (1 3 3 1), at the 3d (fourth) level.
However, if there really are no higher dimensions than these three (four), then how do we modify the binomial expansion to follow the geometric expansion of the LC? The clue is found in the LC expansion, which is actually a cubic expansion, when period 8 is taken into account; that is, 8/8 = 13, 64/8 = 23, 216/8 = 33, ...2n3/23.
In the case of the clock, n = r, so that for each r = 1, 2, 3, … n, there is a dual set of tetraktii generated, each corresponding to its respective LC.
In the previous post, we saw how the progression of physical dimensions is limited to three non-zero dimensions, and how these four (counting zero) relate to the geometric progression of the LC in two numeric progressions. The first is (2n)3, which we can label as the stack number. It counts the number of 3d cubes in the successive stacks of cubes: 8, 64, 216, ....(2n)3 of the progression.
The second geometric progression, which we can call the pole number, is (2n+1)3. It counts the number of poles in a given stack number. Now ignoring for the moment that nature does not expand in cubes (unfortunately), what we want to do is relate these two progressions to the atomic spectra and the elements of the periodic table, in terms of our new scalar motion equation, S|T = (1/2+1/1+2/1) = 4|4. in such a way as to derive a new atomic model of the atom.
The first step is to clarify the fact that our revised Bott clock is not a clock at all. Rather, it is an expansion (appropriately enough) of a radius, r, where r is a natural number (r = 1, 2, 3, ...∞). The expansion generates the two, reciprocal, pole numbers and the two, reciprocal, stack numbers, for a given radius, r. It also generates the corresponding scalar equation for the combination of the two, reciprocal values, since it turns out that the appropriate num of the corresponding scalar equation is just a product of r and the unit num of the scalar equation: or r(4|4).
Recall that the natural units of motion (num) are an unusual combination of space and time oscillations. They are actually space (time) | time (space) ratios, or magnitudes of speed, but hardly in the ordinary sense of that word. As oscillations, they are a measure of frequency, but since they propagate relative to matter, they may be characterized as a combination of a wavelength and a waveduration, where the former can be expressed in terms of rotation, or cycles per unit time, 1/t (change in space-volume over time), and likewise for the latter, as cycles per unit space, or 1/s (change of time-volume over space). Both expressions are "frequencies," but one is an expression of cycles per unit time, while the other is an expression of cycles per unit space, and the cycles are 3d cycles of expansion/contraction, equivalent to 4π, 2d rotations.
This result is very interesting. It seems to indicate that the dual, (2n)2, periodic pattern of the elements follows the pattern of the spectral tetraktys and the Bott expansion, where one-half of the elements in a given period are the inverse of the other half (at least in terms of our scalar equation), even though the number of nucleons and electrons increases linearly with each additional atom in the series.
Again, this seems to indicate that there is a connection between these various aspects of our scalar magnitude combinations and the dimensions of the atomic spectra and the periodic table of elements, but exactly what it is remains unclear, as yet.
Having tied together the expansions of the magnitudes, the dimensions and the "directions" of the tetraktys, the LC and the new scalar motion equation in the previous post, through the mathematical concept of Bott periodicity, by adapting the "Bott clock" from John Baez's post on Bott periodicity, we are now ready to take the next step and apply it (our Bott expansion) to the periodic table of elements.
It happens to work out great, with one caveat: We have to accept that the elements of the two, 2n2 sub-periods, of the 4n2 periods, are reciprocals of each other. This is not surprising news for a reciprocal system theory, but it's undoubtedly a hard pill to swallow for the LST community.
I'm not sure I've got it right, and like our version of the standard model of particle physics, there's a long way to go yet. However, no pain, no gain, so here goes.
Recall from the previous posts, that as the radius r, of the Bott expansion increases from 1 to 4, the magnitudes, defined mathematically by the dimensions and "directions" of the tetraktys, and geometrically by the LC, increase in two, reciprocal "directions," just as the number line of our familiar family of rational numbers does: 1/n, ...1/3, 1/2, 1/1, 2/1, 3/1, ...n/1. The difference is, of course, the Bott expansion is multi-dimensional.
giving us the number of elements in the two sub-periods in each period of the periodic table, although in reciprocal form. Could it be that the fact that each 4n2 period consists of two 2n2 sub-periods, is due to one sub-period being the reciprocal of the other sub-period, just as in the Bott expansion and the scalar motion equation???
When r = 1, LC = 8, num = 4|4, resulting in two, reciprocal, sub-periods, with one element each: Hydrogen and Helium and one sub-element each.
When r = 2, LC = 64, num = 8|8, resulting in two, reciprocal, sub-periods, with eight elements each.
When r = 3, LC = 216, num = 12|12, resulting in two, reciprocal, sub-periods, with eighteen elements each.
When r = 4, LC = 512, num = 16|16, resulting in two, reciprocal, sub-periods, with thirty two elements each.
Now, this is an encouraging development, but, unfortunately, nature doesn't expand in cubes, and the scalar motion equation for the first atom, Hydrogen, has a total num of 108|108, and subsequent atoms are multiples of this value. However, since the equation for Hydrogen is 27/54+27/27+54/27 = 108|108, we can factor out this value to simplify to 27(1/2 + 1/1+2/1) = 27(4|4), although I don't show this factorization in the graphics above.
The most important implication of this result is that, if it proves valid, we now have a model of the atom for our RSt, which is based on the logical and mathematical progression of multi-dimensional numbers.
n(S|T) = n(1/2 + 1/1 + 2/1) = n(4|4).
for the four periods of the wheel (table).
This is a welcome insight, for sure, but nature does not expand by the numbers. As the science of geometry proves, there are as many distinct geometric directions defined by lines drawn between the center point of a circle and points on its circumference, as there are points on the circumference, which are infinitely many. However, if we choose a set of points on a circumference of a circle of radius r, then we know that it will be a subset of a set of equal magnitudes on the circumference of a circle of radius r + 1.
In our special case, the smallest subset is equal to 2, when r=1, and the set corresponding to r=2, is 8, or r2 times larger, and the difference between them is 8-2=6. The set when r=3 is 18, or 32 times larger than the r=1 subset, and the difference between it and the previous set is 18-8=10. Finally, when r=4, the set is 32, or 42 times larger than the r=1 subset, and the difference between it and the previous set is 32-18=14.
Of course, these differences, 2, 6, 10 and 14, are identical to the numbers of the spectral energy groups, s, p, d and f that are so fundamental to the science of spectroscopy and quantum mechanics, and, when combined with the absolute value of their reciprocals, we get the match between the 2s, 2p, 2d and 2f of the spectral groups and the 4n2 periods of the table (wheel).
However, since the cubic expansion of the tetraktys, the LC, and the Bott expansion defines the three continuous magnitudes of the 1d, 2d and 3d balls of the LC, with radius √1, √2, √3, respectively, we recognize that these three magnitudes are the "real" magnitudes of nature's universal expansion of space and time, as posited by the RST.
However, unlike the cubic magnitudes of the stack numbers, the magnitudes of the volumes associated with these radii are not integer values. They are irrational numbers, so dividing them by the corresponding n(S|T) num values of the scalar motion equation, as we did in the case of the integer stack numbers, will not work.
The result is that this procedure gives us a series of continuous magnitudes (and its inverse), which corresponds to the series of discrete magnitudes (and its inverse) that constitute the (factored) sub-periods of the wheel (table), as shown in the previous posts above. In other words, as the (factored) Bott expansion expands, the inverse LCs expand and the volumes associated with them expand as well, As the (factored) LCs expand, the (factored) number of discrete natural units of scalar motion increases up to the discrete limit of that (factored) volume, and as the (factored) number of continuous volume increases, the continuous number of (factored) 4π cycles increases up to the limit of that (factored) continuous volume.
So, to calculate the continuous number for a given element in a given sub-period, we simply multiply the unit volume (√1, √48, √243, √768), for that period (located at the bottom of the inner circle), by the squared slot number indicated for that element's position in the appropriate sub-period.
The result is a continuous number for each element that is equivalent to the discrete natural units of motion (num) number for each element. With these continuous magnitudes in hand, it should be possible to ascertain the physical and chemical properties of the elements. We'll see.
Green vertical arrows: Unit space reversals.
There are no Green Vertical arrows on this diagram.
Green horizontal arrows: Unit time reversals.
There are no Green Horizontal arrows on this diagram.
Now, after I posted the graphic for the two world line charts, I realized that it was outdated. When I first conceived of it, I wasn't thinking in terms of rotating the entire chart to obtain the reciprocal world line, but only the unit progression arrows. This generated an incorrect reciprocal progression, where the "direction" of reciprocal space progression is directly opposite the "direction" of the space progression, and the same for time.
However, when the entire chart is rotated to plot the reciprocal, the "direction" of the vertical time progression rotates to oppose the "direction" of the horizontal space progression, and the "direction" of the horizontal space progression rotates to oppose the "direction" of the time progression in the vertical. I intend to update the graphic as soon as I can.
I'll wait until you update it and make an accurate Legend for it.
Horace, didn't I post this corrected graphic already?
The green, zig-zaging, arrows are increasing vertically upwards, and the green, zig-zagging, arrows are increasing horizontally to the right in the MS, and vertically downwards and horizontally to the left in the CS. These are representations of space and time oscillations.
The Wheel of Motion form of the Periodic Table of Elements is helpful in that it is more compact and shows why there are gaps and longer and longer rows in the table. However, now that we have discovered that the two sub-periods of each period are actually reciprocals, it may be easier to illustrate the reciprocal aspect in the table format, because we are accustomed to writing the rational number line, as a horizontal reflection symmetry: 1/n, ...1/3, 1/2, 1/1, 2/1, 3/1, ...n/1.
I find it very interesting, since I doubt very much that this was anything but innocent, since, as far as I know, no one has ever pointed it out before, even though it's very obvious. The question is, why does this reciprocity appear in the mapping? Is there an identifiable connection to the reciprocal sub-periods in our work?
Actually, as crazy as it might seem, there is. If we split the image horizontally and swing the bottom half up to meet the top half, we get the spectral tetraktys, hiding in plain sight!
I don't know what to make of it, really, but could it be just another coincidence?
Since this is the International Year of the Periodic Table, it would be wonderful, if we could host a major event to celebrate our discoveries of the true nature of the Periodic Law on which all of the profoundness is based.
Alas, however, it's inconceivable that such an event would be able to garner any attention from the scientific community, let alone the general public, because no one, outside of our minuscule society, is prepared to understand our new atomic model, since it is based on scalar motion, which no one else understands or accepts. And since the new scalar motion model is not Larson's model, but the LRC's model, it's even more difficult to make a convincing case for it.
In 1998, I used Larson's scalar motion atomic model to show how the 4n2 periods of the periodic table could be drawn as concentric circles, not realizing then that the reciprocity of the circles represented the reciprocity of the sub-periods.
It wasn't until this year, using our new scalar motion model of the atom, that the reciprocity of the sub-periods, in the concentric circles, clearly emerged, after discovering it in the form of the Bott expansion, but how can this be taught to the uninitiated? Where do we begin? After all these years, we can't even get Dewey Larson's revolutionary new program of physical research a mention in Wikipedia, let alone an exposition.
I don't know what the answer is, but I, for one, can never go back to a world where scalar motion is not even recognized as a legitimate form of motion. In all the talk of the table's profoundness, at the big kickoff event in Paris, no mention is made of dimensions, of the tetraktys, or why the periods are what they are. Mendeleev thought that the fundamental period of the table was 8, but when the larger periods were discovered, his idea was discarded. How ironic this appears now that we can see that the number 8 (twice four), of Bott periodicity, does indeed play a fundamental role in the periods of the table.
But it's not numerology that we are dealing with here, as some, like Randell Mills, would like to think. No, it's the fundamental structure of the universe we see emerging, when the scalar motion of the universe is properly understood. Look at the spectral tetraktys. It is really composed of two, reciprocal tetraktii, if you will, which we can see in the LST's mnemonic for establishing the electron configuration of an atom, which was shown in the previous post. Just take the binomial expansion form of the tetraktys, and write its numbers as columns and rows, instead of a triangle, and write its reciprocal as a reflection of it and you get the spectral tetraktys, populated with the "directions" of its respective dimensions.
But what about the periodic table? The chemical ordering of the elements does not show the same form of reciprocal magnitudes, dimensions and "directions," as shown in the above graphic. This is true, but it was ordered in terms of groups of certain similarities in the properties of the elements. However, the periods of the table do follow the "Periodic Law," which, as we have seen in previous posts, is generated by the Bott expansion.
The physicists love the symmetry of the table, which they see as a "bilateral" symmetry, and it leaves room for new elements, which we maintain do not exist, by virtue of the proven Bott periodicity theorem, which proves that there are no physical phenomena beyond three (four counting 0) dimensions.
Thus, the value of n, as shown in the graphic above, cannot go beyond 4, the maximum number of dimensions, which means we simply need to slice the graphic in two horizontally and rotate the bottom half up to be opposite the top half, as its reciprocal, just as we did with the Electron Configuration mnemonic, and voila, the periodic table takes the same form as the spectral tetraktys!
This at once clarifies that the periods of the table are 4n2 and eliminates the possibility for elements beyond 118.
Imagine explaining this to the crowd in Paris. Heck, I would be happy to explain it to the crowd in Salt Lake City!
Once again, we've developed some pretty exciting results by employing Dewey Larson's RST. However, making it easily understandable will not be a simple task. Indeed, it's entirely possible that something has been confused or overlooked that's going to leave me with egg on my face in the end.
Nevertheless, the truth is I've tried my best to stick to mathematical, geometric and logical principles from beginning to end, and it appears that a new, scalar-motion model of the atom has now emerged that can account for the spectral and periodic characteristics of the set of 118 observed chemical elements (or the sum of observed and synthesized elements).
How fitting, then, that we can now offer the world a scalar-motion based version of the table that reveals, for the first time, why the periods of the table are what they are, and how they actually consists of two, reciprocal, sub-periods, even though the set of elements consists of a successive increase of atomic number, from 1 to 118.
I am attempting to find an appropriate notation that, once understood, will convey the fundamental nature of this new approach. It's not easy. In fact, the notation used in the graphics of the previous posts above need to be corrected and revised. However, no matter how good the notation, it will still be difficult to convey its meaning, without substantial exposition. For instance, how does a linearly increasing number of elements consist of two reciprocal sub-sets?
As can be seen from the quantum number-based Stowe Periodic Table, which we modified in the previous post above, the structure of the spectral tetraktys in the table is clear, once the four dimensional limit of the Bott periodicity theorem is applied. At each dimension, there are two, reciprocal, sets of "s shells." These two sets are the only ones, at the 0 dimensional level. At the 1 dimensional level, two sets of reciprocal "p shells" are added. In the 3rd dimension, these are joined by two sets of "d shells," and, finally, in the 4th dimension, two "f shells" are added, for a total of (2|2)+(2+6)|(2+6)+(2+6+10)|(2+6+10)+(2+6+10+14)|(2+6+10+14) = 2|2+8|8+18|18+32|32 = 60|60 (but only two of the four 0 dimensional slots are counted as elements, so 118 all together).
As also shown in the previous post above, the "s shells" are 0 dimensional; the "p shells" are 1 dimensional; the "d shells" are 2 dimensional, and the "f shells" are 3 dimensional, and by the Bott periodicity theorem, we know that there can be no new phenomena beyond these dimensions, because they just repeat, like a set of Russian dolls that fit one inside the other.
The increase in the degree of freedom, as the dimension increases, is shown graphically in the modified Stowe table, as concentric circles of rectangles, the number and radii of which increases as the dimension increases. The correspondence of these characteristics with the values of the quantum number m, including the reciprocity, is unmistakable.
So, how do we diagram the increasing atomic number over two, reciprocal sets in each dimension? As it happens, this is probably not practical (or even possible?) in the table format, since its linear order conflicts with the changing "direction" of the circle's reciprocity, which loops back on itself. It seems we can illustrate one or the other but not both, in the table format. For instance, the Janet table, the so-called left-step table, shows the correct reading order of the elements, from left-to-right, top-to-bottom, but not the reciprocity, as we saw in our modified Stowe table (see previous post). Yet, while the modified Stowe table shows the reciprocity, the order of the elements is hardly straightforward.
Only in our Wheel of Motion format of concentric circles are we able to capture both the order of the elements AND their reciprocity, at least as far as I can determine. This is true because the clockwise ordering of the elements in each period continuously increases, even though the vertical "direction" of the sub-period order reverses 180 degrees at the six o'clock position, from a descending "direction" to an ascending "direction," we might say, and then repeats, or cycles.
Four concentric circles, containing 4, 16, 36, and 64 "slots," one for each element of the periodic table, captures both the linear characteristic of the atomic numbers of the four periods and the reciprocity characteristic of the eight sub-periods.
However, as with the standard periodic table, the order of the spectral groups (s, p, d and f) in these circles does not follow the order in the previous graphic, because, again, the linearity of the order sequence forces the s groups out of their proper place and into the next group's sequence. The patterns of the modified Stowe table solves this somewhat, by placing the s group at the center of each of a set of concentric circles. Borrowing this format, we can modify the above graphic accordingly.
This places the groups in the proper "tetraktys" order, going from smallest to largest, in two reciprocal "directions," as the dimension increases from 0, at the top, to 3, at the bottom, which works, except, when we number the elements. When we number them, element number 21,Sc, is the first element in the (blue) d group, instead of the first element in the (green) p group, as previously was the case. This is the vexing problem. How is it that the larger d group intercedes between the s and p groups like this? And the same thing happens at the next level; The first element at this level is the first element in the (red) f group, element number 57, La, not the first element in the (green) p group!
This is good, but numbering the elements still requires us to jump from the center s group of a given set to the outer group of that set and work our way back to the center. This is so odd and just plain inexplicable!!!
In grappling with this, I came across Eric Scerri's articles and Youtube discussions on the periodic table, and he referred to the late Fernando Dufour, as the foremost researcher of the table, who designed a 3d model of it.
When I checked it out, I discovered that Dufour went beyond Stowe's design in that he removed the s groups from the linear succession, which is making it so difficult to understand how to format the table, consistent with all the constraints, and he placed them in their own dimension, the third dimension (the third dimension of space, not the tetraktys).
In this new, abstract, version of the scalar-motion based Periodic Schematic of the Elements, the s group elements are treated as transition elements, which connect the four dimensions of the Reciprocal Tetraktys.
The new schematic shows how the Bott periodicity (modulo 8) plays between the four dimensions, producing the interval 8 between the reciprocal sub-periods of the elements: 4 + 8 = 6+6 = 12; 12 + 8 = 10+10 = 20; 20 + 8 = 14+14 = 28 (or s|s; p|p; d|d; f|f). When the 2+6 (s+p) fundamental is added to each dimension's increased degree of freedom, the sub-periods are produced (8 + 0 = 8; 8 + 10 = 18; 8 + 24 = 32).
The abstraction hides the many details that are only implied, but, taking the s groups out of the linear sequence of elements, allows us to see that they are common to all the groups of a set. In the first instance, the transition from 0 to 1 dimension, the two p groups appear to be uniquely associated with the two s groups, but this is an illusion due to the fact that the p groups are the only members of that set. When the schematic transitions to dimension 2, the d group encircles the p group, and upon transitioning to dimension 3, the f group encircles both the d and p groups.
The rule is that the atomic number sequence always begins with the outermost group, through the s group, which is now understandable, given the schematic, even if it's not entirely clear how this is to be interpreted physically, yet. | 2019-04-20T09:03:03Z | http://reciprocal.systems/phpBB3/viewtopic.php?p=3765& |
If you want a great race car, you build it for speed. If you want great teams, you build them for collaboration. To get you started I will expand on the list that MIT research scientist Peter Gloor calls the “genetic code” of collaboration: learning networks, ethical principles, trust and self-organization, knowledge sharing, and transparency. All of what I describe here applies to building remarkable teams as well as building a remarkable culture in your organization.
This is quite challenging as it either never feels like there is enough time to dedicate to learning or it feels like an unproductive use of available resources. But, do not underestimate the value of continued individual and team learning. When human learning slows down, people tend to lose creative and problem solving capacity. In team development, research has shown that individual learning works best when accompanied by team learning.
Regular seminars and guest lecturers: Bring in experts and professors on various topics related to the history, science, or culture of your industry as well as sociologists, anthropologists, and technologists who work in peripherally related fields.
Cross-disciplinary training: On a regular basis have members of different departments lead instructional discussions on their particular specialty. So the designer teaches everyone about UX/AI, the coders teach about their development methodology, the project managers teach about agile protocols, and the sales people describe what it is like in the field.
Cross-cultural stimulus: Whatever field you are in, once-a-month take your team on an educational/cultural outing to do or see something that has nothing to do with thier work. E.g. take a team of developers to tour an abattoir, take the human resource team to a museum exhibit on ancient Egypt, or take legal on an outing to a flower show. It is important to make it a regular outing, and to really explore intriguing, albeit unrelated subjects as a group. The benefit of this kind of team activity, is the opening of one’s mind, and shared creative stimulus, which fosters innovation.
Show and tell: one morning a week, have team members or co-workers bring in an example of counter-culture that they have unearthed. Examples could come from art, comics, film, music, architecture, economics (weird black markets), music, media, etc… Creating opportunities for team members to communicate and share both creatively and intellectually improves team communications and fosters innovation.
These are just a few examples. You can explore and experiment with many other ways to create a learning environment. The key is to develop determination and commitment for the process.
Similar to creating a learning environment, building an organization that not only supports virtuous principles but also causes them, requires you to invest heavily in leadership. Your dedication to creating a remarkable environment is crucial.
One of the most obvious steps toward creating a virtue-inducing environment is to look at your own level of emotional and interactive capacity. You (and your co-founders) should evaluate yourself using the above list of seventeen principles. Obviously, your behavior is one of the most important influences on your teams and your culture. An honest self-evaluation will tell you where you have to increase your emotional and interactive skills.
Beyond your own comportment, much can be done to induce virtuous behaviors. You begin with a sincere and explicit commitment to the betterment of all stakeholders. This means partners, investors, employees, customers and the greater community. You must have an attitude of, “Everybody wins or the game’s not worth playing.” Even competitors can win in this scenario, because, you set the standards. One way this will affect the competition for the better, is that you will attract the better employees who can bring you better and more customers. The competition then has to come up to your standards or drop out. (This is a bit simplified and is not always the case, but is a pattern we can expect to see increase in the future).
These are just suggestions to help you to generate your own list of desired behaviors.
Rigorously (with honesty and diligence).
You may find it necessary to bring in professional facilitation if you are running into excessive resistance or acrimony. But, when you succeed at this step, you will have created a significant shift in your organization’s psychology. You will have created a culture conducive to collaboration, greater employee engagement and enhanced productivity.
iii. Adjust the established principles as insights from the review process indicated. This is a responsive process and not about setting hard and fast rules. Establish objectives and use these to assess and improve individual and group behavior in a continuous way.
I will be discussing self-organization more explicitly in part 3. So, here, let’s focus on the importance of trust, which is a direct result of yours and your organization’s integrity. If you fail to create an atmosphere of trust you will fail to instill self-organization. Poor organizational trust is also an indicator of lower cooperation, productivity, and sales (Davis, Mayer, & Schoorman, 1995; Davis et al., 2000).
Trust has received attention from social scientists for decades. Like wise men exploring the elephant, each different scientific field describes a different aspect of the animal. Sociologists (Luhman, Gambetta, Barber, Giddens, Sztompka, et al) are concerned with the position and role of trust in social systems and this sociological perspective has brought important insight into the nature of trust within a system and the differing ways to measure trust among the participants in the system. A quick summary might be: trust is the strengthening and weakening glue of an organization.
Psychologists (Erikson, Deutsch, Worchel et al) focus on trust as an interpersonal experience. In general, psychology explores a range of trust issues: starting from child development studies and continuing to the effect of organizational justice (DeConick, J. B., 2010), and even looking into the impact of facial features (DeBruine, Lisa, 2002). Think of the psychology of trust as: the individual and organizational factors that foster or diminish trust.
Economics and game theory also provide valuable insight into the study of trust (cf. Nash Equilibrium, Pareto Principle). In economics, trust is a mechanism of efficiency. The more trust that exists between players, the more efficiently the system, market, or organization will work. Basically, trust produces efficiency.
Analyzing and adjusting your own attitudes and emotions towards others; if you don’t already have it, you must develop a deeply respectful and caring concern for the welfare of others (this applies to all partners and organizational leaders who must also adopt this position).
Finding the right balance between bureaucratic controls (agency) and laissez-faire or staff-latitude (stewardship). To create trust you must give trust. This means you are willing to make allowances for mistakes. You must provide both the boundaries and the support for this.
As the CEO or manager, demonstrate through your questions, actions, and policies, that you understand the interests of your staff and/or team members and that their interests are reflected in the way you make decisions.
Model sincere patience, kindness, and understanding when you are hearing about errors and mistakes, or when investigating a problem. This will encourage organizational members to speak freely even if they are at fault.
It is important to encourage and support even when the creative efforts of others fail. One part of fostering creativity and innovation is to accept the inevitable failures.
Promote the importance of vulnerability by both modeling it and encouraging it through constructive contact. This means being willing to hear and consider the criticism of others. And always be conscious of the way you deliver criticism. Constructive criticism comes from a personal desire on your part to help people do their best.
Involve stakeholders in a participatory way. This means allowing people to influence decisions to the extent that the outcome of a decision will influence them. The more the people you are interacting with feel they have influence over the outcomes of the decisions and actions in your organization that affect them, the more trust they will feel.
All of these directives require a fairly radical reassessment of organizational priorities, as well a will to change. So you must demonstrate very strong leadership.
As for trust building exercises and outdoor adventure weekends, they will provide limited or cost-ineffective value. Only a long-term commitment to maintaining a culture that fosters trust will pay off. In the context of the road map I have described above, it is possible to use “team-building” retreats as a tool in your culture of collaboration.
In recreating your organization, the way you manage knowledge is crucial. In the past, knowledge management was given scant attention and was basically a default process that arose from other management and sales objectives. Scientific study in the last decade has made knowledge sharing a discipline in its own right.
Sharing of valuable organizational information throughout organizational hierarchy.
Can avoid re-inventing the wheel, reducing redundant work.
For startups and smaller organizations, the importance of instituting knowledge sharing from the beginning is paramount. It is much harder to install a structurally deep process like a knowledge sharing system once an organization has ballooned in size. The time to start is now or ideally from day one.
A simple way to conceptualize an enhanced knowledge management system is to simply focus on prioritizing knowledge sharing over the knowledge itself. This does not mean that you discount the importance of acquiring knowledge in its various forms. It just means that you value the sharing of knowledge more.
The very act of constructing mechanisms and processes as well as investing time into new knowledge sharing behaviors, changes the underlying dynamics of an organization. If you mange organizational structure, technology, and expectations with conscious attention to the sharing of knowledge, a knowledge sharing environment will emerge easily. Additionally, the further you press the urgency of sharing knowledge, the more likely that a feedback loop will result. In this situation the collective awareness of the organization fuels an increasing attachment to knowledge sharing.
Engages workers more constructively when the organization faces challenges.
Radical transparency is a management approach in which, (ideally) all decision-making occurs publicly. Daniel Goleman used the term in his book Ecological Intelligence. Radical transparency goes further than standard accountability. It requires transparent decision-making from the beginning. Accountability, on the other hand, is a process of verifying the quality of decisions or actions after the fact.
Side note: Exceptions to full transparency typically include data related to personal privacy, security, and passwords or keys necessary for access required to carry out publicly negotiated decisions. Additionally, sharing big plans prematurely is not transparency and is potentially counter-productive.
Make your decisions and the reasons for such decisions available to examination and evaluation by the people influenced by those decisions. The more your decision will influence them, the more access they should have to your reasoning and background surrounding the issue.
“Institutionalized self-critique engenders trustworthiness” (Fort, 1996). Do not be afraid to evaluate yourself and your organization publicly. For example, you could keep an edited corporate blog that stakeholders contribute to, logging your victories and your missteps. Everybody knows nothing goes perfectly. Having the humility and the honesty to share your foibles and failures will gain public goodwill and trust. It will also make your successes more meaningful when you publish them.
Avoid hyperbole at all costs. Speak in a matter-of-fact or even in a deprecating tone. The more realistic you are, the more trust others will have in you and your organization or team.
Ann Florini (1998), of the Brookings Institute, states, “Secrecy means deliberately hiding your actions; transparency means deliberately revealing them”, do not approach transparency as an abstract or general concept. Have a deliberate plan about how you will reveal your actions. This can include: weekly statements, monthly state of the union addresses and published logs as just a few options. Use your imagination and be deliberate.
1. Substantive information – is the information relevant, clear, complete, correct, reliable and verifiable?
2. Participatory environment – do stakeholders feel involved? Are there efficient mechanisms for feedback? Is substantive information easily accessible? Does your knowledge management help members identify what information they will need?
3. Accountability – are you sharing information that covers more than one side of controversial issues? Do you practice full disclosure even if it might be damaging to the organization? Are you willing to admit mistakes? Are you holding your organization and your teams to standards well above industry standards?
4. Secrecy – are you allowing yourself or organizational leaders to fall into counter-productive secrecy practices? These can include: behaviors that reflect a lack of openness, lowering the bar for secrecy, sharing only part of the story, using language that obfuscates meaning, and only disclosing when required.
In the new world of management 3.0 inspired business, the best way to achieve transparency is not to do or say anything you are not willing to share with the world. If your business intent is ethical and virtuous, then choose to live in a fishbowl. You will attract better people and keep them longer. You will always be in a better position to handle the inevitable mishaps. And, if you trust yourself to be an open book, your customers will trust you. Living out in the open may take getting use to, but once you do, you’ll wonder why you ever thought the fog of business was the way to go.
In part 3 of this article I will discuss self-organization and what we can learn from insects and cliques.
Stay tuned, comment and share!
1. Hirst, Giles; Van Knippenberg, Daan; Zhou, Jing; A cross-level perspective on employee creativity: Goal orientation, team learning behavior, and individual creativity, Academy of Management Journal, Vol 52(2), Apr 2009, 280-293.
2. “Just as perceptions about an individual’s ability, benevolence, and integrity will have an impact on how much trust the individual can garner, these perceptions also affect the extent to which an organization will be trusted” From an Integrative Model of Organizational Trust; Roger C. Mayer, James H. Davis and F. David Schoorman; The Academy of Management Review; Vol. 20, No. 3 (Jul., 1995).
3. Morey, Daryl; Maybury, Mark; Thuraisingham, Bhavani (2002). Knowledge Management: Classic and Contemporary Works. Cambridge: MIT Press. p. 451. ISBN 0262133849.
You are making plans for the success of your business. But is building remarkable teams at the top of your agenda? They way you build teams represents an enormous opportunity to set yourself apart from competitors and increase the likelihood of your success.
Over the last twenty years, social scientists have unearthed a mountain of valuable data and insight about team building. This two-part article will introduce you to what I consider the most important and essential ideas. To begin taking advantage of this knowledge, you will need to know two things about remarkable teams: what they look like (this week’s article) and how you create them (next week’s article).
Remarkable teams are a product of culture and change management. Let’s talk about culture first. Culture represents the environment, ecology, and underlying intentions of an organization. This is why it is such an important topic to organizational psychologists. Simply put, culture is both the cause and effect of an organization’s greatness or its dysfunction.
1) Materially, culture is the fabric of the relations between members.
2) Formally, culture represents the mostly unspoken rules that drive the organization, which influence the nature of team building.
3) Culture is also the efficient cause of an organization’s psychology. One way this happens, is when the cofounders, either knowingly or (usually) unknowingly bring in the dynamics that create the company’s overall nature and mood (i.e. the degree of function and dysfunction present). This in turn determines the kind of teams that develop.
4) Culture represents the aims and purposes of the organization. Goals shape the organization by pulling it into existence. This is similar to the way the direction you choose, determines the type of journey you experience. And so, the way you first think about and start a project or business is of seminal importance. Decisions made early have an exponential impact on later efforts, including team building. The way an organization’s purpose influences its culture is known as the final cause.
Now that I have stated the importance of culture (maybe even overstated 😉 ) what does a functional, team-supportive culture look like?
You can assess your team culture in two ways: first, by the degree to which your staff feels inspired to take part and their confidence for accomplishing their tasks. Secondly, by looking at the way they feel about their role in the team and how their interaction with the group makes them feel. This means that you need to become very sensitive to your staff’s emotional state. You do this by momentarily setting aside your own emotions and tuning into what those around you are feeling. The information about their emotional state is in their faces, their voices, their body language, and the way they treat each other. With practice you can become better and better at noticing and analyzing this rich stream of data.
Fixing a less than ideal culture is known as change management. The name stems from the challenge of establishing new protocols and changing an organization’s psychology. As you know, humans tend to resist change. Your job as the leader, is to make change easier.
Empowering leadership – how well do you encourage autonomy, self-management, collaboration, creativity and group problem solving?
Relationship conflict – how good are you at diffusing and redirecting group tension, conflicts, animosity, and non-productivity?
Personality development – do you personally inspire individual team members to practice functional behaviors such as open-mindedness, humility, patience, etc…? And equally or more importantly – does your company culture foster these traits?
Taking an honest look at how well you empower teams, manage conflict, and inspire others will give you a sense of where you stand in the pursuit of building great teams.
So far, I have discussed contributing factors to recognizing remarkable teams. So, now the question is, how do you create remarkable teams? The answer is, first you build them to be remarkable, and then you manage them to stay remarkable. And that is the topic of PART 2 of How to Create Remarkable Teams… where I will cover the five building blocks of collaboration and describe how to manage through self-organization.
Stay tuned, subscribe, and share! | 2019-04-21T20:26:17Z | https://askatma.com/tag/teams/ |
Massey Knakal Partner James Nelson will serve as a speaker at The Forum for Great New York Hotel Real Estate. The event, which will take place on May 3, will explore the rapidly changing landscape of hotel and lodging investment, development, management and financing in and around New York City. It will offer the opportunity for attendees to hear from over 40 industry leaders and experts, and discover opportunities that may not yet be on their radar.
Spanning a full day, the conference includes a networking breakfast, lunch, and cocktail reception to increase the opportunities to mingle with fellow attendees and meet potential clients and joint venture partners. Over 300 high-level attendees are expected.
Massey Knakal Realty Services is pleased to announce their #1 ranking for the eleventh consecutive year on CoStar’s list of Top Brokerage Firms for NYC Commercial Property Sales. According to CoStar data, in 2012, Massey Knakal handled 377 transactions totaling over $2.6 billion dollars.
“CoStar results show that Massey Knakal is ranked the #1 New York brokerage firm by transaction volume for the 11th consecutive year. We are also proud to announce that for the past decade we have ranked within the top five NYC brokerages by dollar volume, and in 2012, we ranked third with over $2.6 billion in sales,” said Massey Knakal’s CEO Paul J. Massey, Jr.
A net-leased commercial building at 567 Seventh Avenue, located between West 40th and West 41st Streets in the Fashion District / Times Square section of Manhattan, was sold in an all-cash transaction valued at $7,250,000.
The four-story building contains approximately 4,149 square feet and sits on a 19.75’ x 60’ lot. It lies in a C5-3 zone in the special Midtown District, yielding an as-of-right commercial FAR of 15.0. The property holds approximately 17,775 buildable square feet, allowing for redevelopment options on one of the city’s busiest corridors.
Prior to the sale, Massey Knakal Retail Leasing Services secured Paris Baguette, as the net-lease tenant for the entire building, which had been vacant for the past six years. Paris Baguette is a division of an international food and food services company based in Korea. With 2,900 stores in Korea and 50 in China, it is rapidly expanding its US presence, and this is its first Manhattan location.
“By putting a great tenant in the building, the true value of the asset was realized. We were then able to achieve a higher sale price for our client,” said Massey Knakal CEO Paul J. Massey, Jr., who exclusively handled this transaction with Chairman Bob Knakal and Director of Retail Leasing Ryan Horvath. “This is a classic example of how Massey Knakal’s multiple disciplines work together,” added Massey.
Neighborhoods: Midtown West/ Corporates: Paul Massey Jr.
Massey Knakal Realty Services has been retained on an exclusive basis to sell a development site at 237 Duffield Street. The property is located between Willoughby and Fulton Streets in Downtown Brooklyn. The asking price is $16,000,000 or $175 per buildable square foot.
The site is located in a C6-4.5 zoning and can accommodate 89,904 buildable square feet of mixed-use and commercial development. With an Inclusionary Housing bonus, the FAR can increase to approximately 105,000 buildable square feet. Presently, the site has plans for a 185 key hotel.
Adjacent to Willoughby Square, a one-acre open space, the project is one of a series of more than $100 million in public investments in open space and infrastructure commitments made under the Downtown Brooklyn Redevelopment Plan. The property is conveniently located one block from the Jay Street-MetroTech and Hoyt Street subway stations, providing easy access to the 2, 3, A, C, F, N & R subway lines. In addition, the site is located just a few blocks from the newly built Barclays Center.
“Downtown Brooklyn continues to receive regional, national and even international interest. To that end, presently, 237 Duffield Street is the largest publicly marketed site for sale in Downtown Brooklyn and demand is at an all time high,” said Massey Knakal Director of Sales Stephen P. Palmese, who is exclusively marketing this property. For more information on this listing, contact Stephen P. Palmese at 718.238.8999.
Massey Knakal Retail Leasing Services has secured a new long-term retail lease at 2303 Broadway, between West 83rd and West 84th Streets for Oren’s Daily Roast, the 26 year-old company with ten stores in Manhattan. The space was formerly occupied by L’Occitane which consolidated into its nearby Columbus Avenue location.
Neighboring retailers include Zabar’s, Victoria’s Secret, Barnes and Noble, Harry’s Shoes, Duane Reade, Bank of America, The Vitamin Shoppe, and McDonald’s.
“800 square foot stores, with 20 feet of frontage no less, are rarely available on this stretch of Broadway and was leased in 30 days,” said Executive Vice President of Retail Leasing Benjamin Fox, who exclusively represented the landlord in this transaction with Director of Retail Leasing David Chkheidze. Dan Gronich of Newmark Grub Knight Frank represented the tenant.
Massey Knakal Realty Services is pleased to announce the release of their exclusive First Quarter 2013 Property Sales Reports. These unique, industry-leading, reports provide a comprehensive study of the investment sales market by product type in the New York City marketplace (Manhattan, Northern Manhattan/Bronx, Brooklyn, and Queens).
“As we anticipated at the end of 2012, the spike in sales activity caused by capital gains tax policy last year has led to a slowdown in activity thus far in 2013.” stated Bob Knakal, Massey Knakal Chairman. “The good news, however, is that the dollar volume of sales and number of buildings sold were ahead of expectations. We view this as a positive sign for the marketing the balance of 2013,” added Knakal.
During the first quarter of 2013, there was $6.5 billion in New York City sales, a 36% decrease from 2012 and down 7% from 2011.
The purchase of 30 Rockefeller Plaza and 550 Madison Avenue were the first billion dollar sales since the Google purchase in 2010, and the first time since the downturn multiple properties exceeding $1B sold in the same year. These two sales accounted for 44% of total dollar volume in Manhattan.
Within the different market segments Massey Knakal tracts, Northern Manhattan outpaced the Bronx for the first time in properties sold due to several multi-property transactions taking place.
Brooklyn led all markets with 214 buildings sold in 1Q13, while Queens had the lowest annualized turnover with 0.93% of the total stock of property.
Massey Knakal Realty Services has been retained on an exclusive basis to sell a commercial building at 2588 Atlantic Avenue. The property is located on the southwest corner of Atlantic and Georgia Avenues in Brooklyn’s East New York neighborhood. The asking price is $1,600,000.
The three-story building, which also contains a renovated basement, measures approximately 10,885 square feet and sits on a 40.96’ x 65.67’ lot. It was previously used as a bank. The building has been kept in terrific condition making it easy to convert into any user space.
The building is conveniently located within close proximity to a number of public transportation options including the J subway line at Fulton Street and the A/C subway line at Pennsylvania Avenue.
For more information on this listing, contact Massey Knakal Director of Sales Edward Gevinski at 718.238.8999.
A townhouse at 165 East 71st Street, located between Lexington and Third Avenues in Manhattan’s Upper East Side neighborhood, was sold in an all-cash transaction valued at $5,900,000.
The five-story building contains approximately 4,500 square feet and sits on a 17’ x 102’ lot. It is currently configured as a multifamily property, with a duplex apartment with garden on the first and second floors, and three floor-through rental apartments above. It benefits from a new boiler, new roof, and approximately 25’ rear garden on the ground level. The sale price equates to approximately $1,311 per square foot.
Ira Lifshutz, a local investor who continues to be an active buyer of NYC real estate, purchased the property.
“This five-unit property contained a duplex and three floor-through apartments. This is a popular block and there was a great deal of interest from both local and international buyers,” said Massey Knakal Vice President of Sales Guthrie Garvin, who exclusively handled this transaction with CEO Paul J. Massey, Jr.
Massey Knakal Realty Services has been retained on an exclusive basis to sell an apartment building at 200 East 11th Street. The property is located on the corner of East 11th Street and Third Avenue in Manhattan’s East Village. The asking price is $60,000,000.
The 12-story elevator building currently stretches 105.5’ along East 11th Street and 129’ along Third Avenue. It contains 55 Free Market residential units and three ground floor retail units. The apartments above are almost all entirely oversized one bedrooms. As some of the apartments already have been, converting the units to two bedrooms would immediate boost the rent roll by a substantial degree. All apartments have ample light and air as a result of the building being set back on all sides and being a corner. Currently, the retail is occupied by M2M, a grocery store, The Smith, one of the most popular downtown restaurants and bars, and a copy shop. All retail spaces have useable lower levels. Since the building was built the area has been upzoned, meaning that there is potential to expand the ground floor retail and potentially expand the residential above.
"It will be interesting to see if an operator or condo converters end up with the property. There is great potential for both. Rarely does a property come up that is all fair market with so much upside,” said Massey Knakal Partner James P. Nelson, who is exclusively marketing this property.
For more information on this listing, contact James P. Nelson at 212.696.2500.
A mixed-use building at 90-07 Jamaica Avenue, located between 90th and 91st Streets in the Woodhaven neighborhood of Queens, was sold in an all-cash transaction valued at $910,000.
The two-story building contains approximately 2,696 square feet and sits on a 24’ x 108’ irregular lot. It consists of one commercial space on the ground floor, currently leased to T-Mobile, and two one-bedroom apartments on the second floor. Each tenant has their own boiler and electric and gas meters. The sale price equates to approximately $338 per square foot and an 8% capitalization rate.
This property is ideally located on Jamaica Avenue just two blocks west of Woodhaven Boulevard near transportation and many neighborhood amenities.
“The property garnered a high amount of interest due to the desirable location and solid retail tenant,” said Massey Knakal Director of Sales Stephen R. Preuss, who exclusively represented the seller in this transaction with Director of Sales Brian J. Sarath.
The Commercial Observer is asking for your help in selecting the real estate professionals for the upcoming Power 100 issue. Between today and Friday, you can visit The Power 100 Reader's Poll and ensure Massey Knakal gets the recognition it’s due by voting for Paul Massey and Bob Knakal.
Since 2008, when The New York Observer launched its annual Power 100 rankings of real estate professionals, the responsibility of selecting, promoting and demoting the city’s top brokers and developers laid solely on its editorial staff. But in a twist this year, they're asking their online readers, to make the tough calls.
Massey Knakal Realty Services has been retained on an exclusive basis to sell a development site at 509 West 38th Street. The property is located on the north side of West 38th Street through to the south side of West 39th Street, between Tenth and Eleventh Avenues in Manhattan’s Hudson Yards. The asking price is $52,000,000.
The site consists of two lots, with dimensions of approximately 125’ x 98.75’ and 25’ x 98.75’, which combine for approximately 14,813 square feet of total lot area. It is one of the few uniquely located lots within a special sub-district of the Hudson Yards which permits up to 12.0 FAR of residential use without the requirement of building additionally commercial or community facility space. The block-through site will have approximately 100 feet of frontage along the proposed Hudson Boulevard.
After nearly a decade in the making, construction workers have finally broken ground on the Hudson Yards, one of the city’s largest privately-funded development projects since Rockefeller Center. The site will house a public school, 5,000 apartments with affordable housing, restaurants, movie theatres, a five-star hotel and 14 acres of public space. Hudson Yards Boulevard & Park, an approximately 4-acre planned system of broad tree-lined parks and open space will run between Tenth and Eleventh Avenues from West 33rd to West 39th Streets with a pedestrian connection from 39th Street to 42nd Street. The MTA has agreed to extend the No. 7 subway line to West 34th Street and Eleventh Avenue. The extension is expected to be completed in late 2013 or early 2014.
“This neighborhood will be the hottest, newest and hippest area in the not-too-distant future commanding end user demand in all market segments. It is no wonder that the land market in this neighborhood is as hot as it is right now,” said Chairman Bob Knakal, who is exclusively marketing this property with Vice President of Sales Guthrie Garvin. “This block-through site with unique zoning will certainly attract the eyes of every major developer interested in making their mark on Manhattan’s Hudson Yards,” added Garvin.
For more information on this listing, contact Bob Knakal or Guthrie Garvin at 212.696.2500.
A modern townhouse at 542 Cathedral Parkway, located between Amsterdam Avenue and Broadway in Manhattan’s Upper West Side, was sold in an all-cash transaction valued at $3,400,000.
The four-story building, including basement, contains approximately 5,065 square feet and sits on a 25’ x 70.92’ lot. Built in 1988 by Smith and Thompson Architects, it is currently configured as four floor-through apartments and a penthouse studio. The site contains approximately 10,673 buildable square feet, and a significant portion of the excess air-rights could be used to add to the existing building. The sale price equates to approximately $671 per existing square foot.
This property is in close proximity to both the Broadway shopping corridor and Columbia University, and offers excellent access to all forms of transportation.
“542 Cathedral Parkway was sold to an end-user once again demonstrating the strong demand from purchasers looking to create a home in one of Manhattan's most desirable neighborhoods," said Massey Knakal First Vice President of Sales Hall H. Oster, who exclusively handled this transaction.
Massey Knakal Realty Services has been retained on an exclusive basis to sell or NNN lease two commercial properties at 2076 Hylan Boulevard and 1720-1730 Richmond Avenue. The properties are located in Staten Island.
2076 Hylan Boulevard, located on the corner of Hylan Boulevard and Hunter Avenue, is a single-story retail building containing approximately 5,000 square feet on an 81’ x 100’ lot, with parking up to twelve cars. With high visibility on a heavily trafficked corner, the building was most recently used as a hardware store, and it is suitable for prime retail. The Staten Island Expressway and Staten Island Railway are easily accessible. Neighboring retailers include Capital One Bank, Enterprise Rent-A-Car, Duane Reade, McDonald’s, and Mobil Gas Station. The site is available for NNN lease.
1720-1730 Richmond Avenue, located on the corner of Richmond Avenue and Clifton Street, contains two buildings of approximately 12,850 square feet combined on a 125.91’ x 109.67’ lot. There are four retail units, with offices on the second floor at 1720 Richmond Avenue. The corner unit was previously occupied by a deli/restaurant. This site is suitable for prime retail or restaurant business, and can be delivered completely vacant. This site is located in New York City’s #1 national retailer zip code and just off the four-way corner of Victory Boulevard and Richmond Avenue. The estimated traffic count is over 70,000 cars daily, and it is within a half-mile of Interstate 278 and the College of Staten Island. Neighboring tenants include 7-Eleven, BP Gas Station, Dunkin Donuts, McDonald’s, CVS, TD Bank and minutes away from Staten Island Mall. The site is available for NNN lease. It is also available for sale, with the asking price of $2,800,000.
For more information on this listing, contact Massey Knakal First Vice President of Sales Michael Schneider or Senior Associate William Cheng at 718.238.8999. Additionally, 1745 Forest Avenue / 841 Richmond Avenue and 1735 Richmond Avenue / 2960 Victory Boulevard are also available for NNN lease.
A development site at 920 University Avenue, located between West 161st and West 165th Streets in the Highbridge neighborhood of the Bronx, was sold in an all-cash transaction valued at $500,000.
The block-through vacant lot consisting of approximately 7,735 square feet of total lot area benefits from over 61 feet of frontage on University Avenue as well as 60 feet on Summit Avenue. Located within an M1-5/ R7-1 zone, the irregularly shaped lot holds approximately 38,673 buildable square feet for commercial development. A hotel will be constructed on the site and could provide Harlem River views from the upper floors.
“The majority of interest came from hotel developers as this site will become the closest hotel to Yankee Stadium,” said Massey Knakal Director of Sales Nick Burns, who exclusively handled this transaction with First Vice President of Sales David Simone.
Massey Knakal Realty Services has been retained on an exclusive basis to sell a commercial loft building at 850 Metropolitan Avenue. The property is located between Bushwick Avenue and Olive Street in Brooklyn’s Williamsburg neighborhood. The asking price is $9,750,000.
The building contains approximately 27,850 square feet and sits on a 125’ x 100’ lot. It is an excellent opportunity for a residential conversion or development. The building itself is well-maintained, and numerous recent upgrades have been made, including a brand new roof. There is a freight elevator and 12’ to 15’ ceiling heights throughout. The property will be delivered vacant.
This property is located in the vicinity of Williamsburg’s renowned restaurant and nightlife scene. The Graham Avenue L train station is two blocks away and provides quick access to Manhattan without transfer.
For more information on this listing, contact Massey Knakal Vice President of Sales Mark L. Lively or Director of Sales Brendan Maddigan at 718.238.8999.
Massey Knakal Retail Leasing Services has been retained on an exclusive basis to secure a retail lease for 463 Fulton Street, located between Smith and Lawrence Streets in Downtown Brooklyn.
This retail space contains approximately 1,200 square feet with ceilings 15 feet high, and offers approximately 20 feet of frontage in prime Downtown Brooklyn.
The site is ideally located in close proximity to major subway lines as well as the Barclays Center, and surrounded by new residential developments. It benefits from over 100,000 area shoppers daily. It is located opposite The GAP, and other neighboring tenants include Payless, Brooklyn Industries, Children’s Place, Macy’s, Armani Exchange, and Duane Reade.
“Fulton Street continues to attract attention from national retailers who are recognizing the explosive economic growth in Downtown Brooklyn,” said First Vice President of Retail Leasing Gregory Bartlett, who is exclusively marketing this space with Director of Sales Stephen Palmese. “Developing similar to Times Square, the Fulton Street Mall corridor is one of New York City's densest transit hubs. Since retailers follow density and transportation, we anticipate a variety of interests in this dynamic location,” added Palmese.
For more information, contact Gregory Bartlett or Stephen Palmese at 718.238.8999.
Massey Knakal Realty Services has been retained on an exclusive basis to sell an office building at 555 West 25th Street. The property is located between Tenth and Eleventh in Manhattan’s West Chelsea neighborhood. The asking price is $27,500,000.
This six-story building contains approximately 40,856 square feet and sits on a 75’ x 98.75’ lot. It also contains a sellable lower level. The current rentable area is approximately 41,787 square feet. Built in 1891 and completely renovated in 1985, the building is fully occupied by a gallery, showroom, and creative tenants. It is exceedingly rare to find a building of this quality with rents so far below market. Floors feature over 12’ high ceilings and ample light and air, leading itself to possible showroom space for galleries.
For more information on this listing, contact James P. Nelson or Brock Emmetsberger at 212.696.2500.
On Wednesday, April 24th, Massey Knakal will participate in the Staten Island Economic Development Corporation's 15th Annual Conference. The event will feature prominent figures, speakers and businesses from a variety of sectors.
The all-day event includes seminars, business-to-business vending, networking events, and keynote speaking sessions which provide unparalled opportunity for interaction among on- and off-island businesses. The conference is the only economic and business conference held on Staten Island each year and expects to draw over 2,500 attendees.
Massey Knakal Realty Services has been retained on an exclusive basis to sell a commercial building at 834 Flatbush Avenue. The property is located between Linden Boulevard and Church Avenue in Brooklyn’s Flatbush neighborhood. The asking price is $1,495,000.
The three-story building contains approximately 4,200 square feet and sits on a 20’ x 103.58’ lot. It has HVAC in place and an interior staircase to upper floors. The building is vacant and also holds approximately 4,088 square feet of additional air rights.
This building is an excellent investment opportunity. National tenants within one block include Chase, Citibank, Payless Shoes, and Dunkin Donuts.
For more information on this listing, contact Massey Knakal Director of Sales Brian J. Sarath at 718.275.3400 or Director of Sales Nick Mahedy at 718.238.8999. | 2019-04-19T02:43:56Z | http://nyinvestmentsales.cushwake.com/news/reel.aspx?pd=2013-4-01&pi=0&tpc=0 |
This chapter explores the roles, responsibilities, conceptualizations, and practices of parenting, through the findings of a study into childhoodnature. Childhoodnature is an emerging concept within the field of environmental education that espouses there are no boundaries between childhood and nature and that even separating the words implies a binary exists. Utilizing an autoethnographic approach and founded in posthumanism and socioecological theories, this chapter seeks to address the paucity of research that exists about parenting in environmental education and offers methodological, theoretical, and practical approaches to parenting in this context. The findings indicate that through adopting an honest, reflective approach and having a willingness to change, the perceived barriers to parenting childhoodnature can be reconstructed, reimagined, and reconceptualized.
This acknowledgment of the importance of environmental education in ecologically sustainable development has been supported by the current research in the field (see, e.g., Cutter-Mackenzie, Edwards, Moore, & Boyd, 2014) and in practice by many educators. Moreover, this statement from the UNESCO report also acknowledges the significance of the family setting in the educational environment, particularly the early childhood setting. These two aspects, environmental education and parenting within the family setting, are the focus of this chapter.
In recognition of the role of families on children’s learning about the environment, this chapter focuses on the significant life experiences (SLE) field of environmental education to highlight the importance of parenting in this context. The term SLE was coined by Tanner in 1980 who identified childhood experiences in nature as a key factor in determining environmental choices in later life. Since Tanner’s seminal article, the SLE field has been the focus of many researchers (see the works of Blanchet-Cohen, 2008; Cachelin, Paisley, & Blanchard, 2009; Ceaser, 2014; Chawla, 1998a, 1999; Chawla & Cushing, 2007; Fägerstam, 2012; Finger, 1994; Gough, 1999a, b; Ji, 2011; Lewis, 2007; Palmer, Suggate, Robottom, & Hart, 1999; Sward, 1999; Wells & Lekies, 2006). The recognition of SLEs is important given the current state of decline of the natural environment. Non-human nature is being altered at a rapid rate through the impacts of climate change, habitat loss, invasive species, and pollution among a myriad of other human-induced changes. Due to these changes, it has been suggested that we are now in a new geological epoch, aptly titled the Anthropocene (Crutzen & Stoermer, 2000).
The key findings of the prominent SLE research are discussed throughout this chapter. Despite this wealth of research, there remains a serious dearth of information about parents’ conceptualization of nature and their perceived role in influencing SLEs for and with their children through enabling or disabling these experiences. In response to this lack of research, I conducted a study in this domain, focusing on how SLEs shaped my conception of childhoodnature from my perspective as a parent and how my SLEs influenced my parenting choices.
To gain a deep understanding of the parent perspective “from the inside,” the study utilized an autoethnographic methodology. This methodological approach drew on past memory data and artifacts to reflectively analyze visual research journal entries about my current perceptions of childhoodnature as a parent (Chang, 2008). The visual research journal was constructed as part of the research and is referred to in this chapter. Through the autoethnographic research process, I gained clarity and insight into my parenting approach, and this changed and evolved during the research journey. This chapter draws on the findings of this research against a review of the literature and seeks to offer “new kinds of education” by parenting through SLEs and childhoodnature.
For the purpose of this chapter, I refer to the term “parenting” purposefully as I am only referring to my perspective as a parent and the responsibilities I see in my role as a parent. I have chosen this approach to ensure that my daughter’s perspective is authentically described within this relationship. This is a different approach to that taken by O’Connor and Scott (2007), who use the phrase “parent-child” relationship to define the interaction between parent and child. The phrase “parent-child” denotes that the relationship between parent and child is bidirectional and interactive as they state that the term “parenting” denotes a one-way, top-down interaction. I acknowledge and agree with O’Connor and Scott (2007) that the relationship between parent and child is indeed bidirectional, as also described by Bronfenbrenner (1979) in his ecological systems theory. However, the term parenting more accurately describes the autoethnographic methodology undertaken in this study as I am only considering my perspective. In addition, I do not conceptualize parenting practice as restricted to biological children, although this is generally how it is used in this chapter. I acknowledge that the parent role also refers to guardians, carers, and or the significant adult/s in a child’s life.
In this chapter I have conceptualized parenting primarily through ecological systems theory (Bronfenbrenner, 1979) that acknowledges the context that the individual, in this case my daughter, exists and lives in. This includes the family situation, the socioeconomic profile, the location, the culture, the religion, etc. The model in Fig. 1 describes the influence of the different factors on one another and is based on the work of Bronfenbrenner (1979); however his original work conceptualized and illustrated each system in a much broader context. The model used in this research (Fig. 1) was designed specifically for the context of this work and includes the influence of nature that was not described in the original model by Bronfenbrenner. The model in Fig. 1 also includes the influence of parent(ing) and education. The center circle denotes the social construct of childhood as the space that children live in and holds the ideas they operate under. The blurred lines between childhood and nature represent the fracturing of the childhoodnature binary to illustrate the boundaryless space that these concepts reside within.
The parent(ing) sphere in Fig. 1 symbolizes the bidirectional influence between the parent and the parenting approach and the childhoodnature concept. The parenting approach that I have adopted has been fluid and responsive. I have attempted not to practice a single style of parenting rigidly, but have been open to changing my approach in response to my daughter’s needs. This way of parenting acknowledges and accounts for the developmental changes that occur as children progress into adolescence (O’Connor & Scott, 2007). Along with understanding the developmental changes that my daughter is progressing through, the way I respond to my daughter’s behavior also acknowledges the outer influences that my daughter experiences (refer to the conceptual model Fig. 1 and also the original model by Bronfenbrenner). For instance, understanding the impact of how “being spoilt” by a relative or of someone “feeling sorry” for her may change her behavior. This awareness is significant as through understanding the impact of these external influences, it is easier to understand why she acts differently at different times. This way of understanding children and their behaviors is described through social learning theory that states “children’s real-life experiences and exposures directly or indirectly shape behaviour” (O’Connor & Scott, 2007, p. 6; see also the work of social-learning theorist Bandura, 1977).
I perceive my responsibility in parenting is to not react to my daughter’s behaviors and want them to change but to respond to them in a way that acknowledges that I understand why she is behaving in a certain way. Through this action I offer her an understanding of the impact of her behaviors on herself and those around her. I ensure I nominate the behavior as separate from her, so she does not identify with it. As parent and child, we reflect on the experience that caused the behavior. This process encourages, enables, and empowers my daughter to be aware of the influences of the “outer world” so she can be discerning and know she has a choice about what to engage in. I respond in this way for both positive and negative behaviors and do not profess to being an expert in this practice but see it as a work in progress. This aspect is important as children “learn strategies about managing their emotions, resolving disputes and engaging with others not only from their experiences, but also from the way their own reactions were responded to” (O’Connor & Scott, 2007, p. 6). To practice this way of parenting, I accept the responsibility of modeling this approach through being aware of my own behaviors and discarding those that do not support me, my family, or my community.
However, in my parenting practice, I have adopted the approach that my daughter is an all-knowing being. My husband and I often say “you are not ‘just a little girl’; you are a person in a little body.” This acknowledges and confirms her knowledge as valuable and equal and aligns most closely with the agentic child as described through the sociology of childhood theory by Sorin and Galloway (2006). Surprisingly, given the seeming changing attitudes around the conceptualization of childhood, my daughter is often still seen and treated by adults as innocent, unknowing, and incapable (Sorin & Galloway, 2006). The impact that I have observed on my daughter is that she becomes reduced: as she is treated as a “little girl” and incapable, she begins to behave in this way too.
Within the context of SLEs and I would argue outside of this field of study also, parents play a significant role in influencing and inspiring their children. This section explores some of the literature in these areas and how they have contributed to or align with my research study.
Generally speaking, SLE is a field of environmental education which seeks to identify the learning experiences that shaped “active and informed citizenry” toward nature in adulthood. Chawla (1998b) listed the major variables which define the adult environmental behaviors and attitudes that SLE is attempting to foster and recreate as environmental sensitivity, “in-depth knowledge about issues, personal investment, knowledge of and skill in using environmental action strategies, an internal locus of control and the intention to act” (pp. 369–370). Since its conception by Tanner (1980), Chawla has contributed considerably to the SLE field of knowledge. In a study she conducted in 1985, Chawla analyzed 38 autobiographies to discover the type of intense environmental encounters that they recalled, the places that inspired these memories, and the effect that they see these memories had. Chawla (1988) reported that autobiographical authors in her study “attributed an inner sense of calm and connection to nature to profound feelings of communion with the natural world in childhood” (p. 17). The sense of connection felt with non-human nature has been attributed to positive experience in the outdoors (Chawla, 1988).
Palmer has also made substantial contributions to the SLE field through undertaking extensive international studies in association with others (see Palmer et al., 1998a, b, 1999). The findings from these studies led by Palmer, along with those from Chawla, reveal that the most important SLEs are (i) having opportunities for positive experiences of, in, and with nature in childhood and (ii) the critical influence of an adult – a parent, teacher, or other family member (see Fig. 2) who inspired “environmental awareness and behaviours” (Palmer et al., 1999, p. 199).
Given these findings, there has been a severe lack of research into the SLEs of parents and how they perceive these SLEs as shaping their environmental choices and, also, how they view their role in being an inspiring adult for the younger generation. Furthermore, there are limited studies of parental conceptions of nature (see Kahn & Friedman, 1998; Payne, 2005, 2009) and a paucity of research analyzing how, where, and when these conceptions developed.
Parents, however, have been included in many studies in environmental education research, generally in the educational context. One such study that demonstrated some practical and tangible guidance for parents was the research by Chawla and Cushing (2007) who provided a rich analysis of socioecological agency, democracy, and competency in children and youth. Rather than the parental perspective, they looked through the educator lens, which I argue are one and the same in many aspects. Their recommendations to educators regarding parental involvement were twofold: “reach out to parents to convey the importance of democratic parenting” and “encourage parents to take an active and supportive role in their child’s experiences of nature and participation in community groups” (p. 16). These recommendations provided teachers with a practical way of including parents in the classroom’s sociocultural values of agency, democracy, and pro-environmental behavior through personal and collective competence. The recommendations also offered parents a way to support their children to develop a connection with nature through involvement in community participatory activities and encouraging their child’s contributions. The premise behind these actions being that these opportunities in nature may provide a SLE for that child. Moreover, the underlying theme was to encourage an approach to learning in environmental education which involves the connections between child, teacher, and parent.
The research eliciting the contributing factors to children not having direct experience with non-human nature were found to be spending more time indoors with digital technology, time pressures of families and educators, loss of natural spaces, and parental safety concerns and fear around stranger danger, traffic, crime, pollution, and nature itself (Foster, Villanueva, Wood, Christian, & Giles-Corti, 2014; Louv, 2006; Malone & Tranter, 2003; Neumann, 2015; Palomino, Taylor, Göker, Isaacs, & Warber, 2016; Shaw, Anderson, & Barcelona, 2015; Sobel, 2008; Sweetser, Johnson, Ozdowska, & Wyeth, 2012). Shaw et al. (2015) further developed a model by Crawford and Godbey (1987) to categorize parents’ perceived barriers to family participation in nature-based, outdoor experiences into three themes: intrapersonal, interpersonal, and structural constraints. For example, interpersonal barriers include parental time away from work and children’s scheduling conflicts. For a more detailed explanation of these categories, see Shaw et al. (2015) or original authors Crawford and Godbey (1987). The model proposed by Shaw et al. (2015) also includes the cultural aspect of outdoor participation which was clarified to mean a system of shared values and beliefs. Without a hierarchical organizational system of constraints to parents’ perceived barriers to family participation in nature-based, outdoor experiences, the influence of culture is described as an overarching theme that underpins the conceptual model.
In the home in situ, the research around intergenerational influences through the parent-child relationship has also looked at the reverse phenomenon: the influence of the child on the parent in making behavior changes around the home. A recent study has confirmed that children can be the change agents, as parents of children who participated in an environmental education program were more likely to adopt sustainable practices in the home (Damerell, Howe, & Milner-Gulland, 2013). The results of my study did not draw on specific attitudes or behavior changes that occurred through intergenerational influence, but acknowledged that the entire study would not have been possible without the constant reflection and lessons that were offered by my daughter.
It is noted here that SLE research has not been without contention. Gough (1999b) posed the question which has fuelled academic debate of SLE: “Do the research activities described by SLE researchers actually explore which experiences are likely to produce environmental activists, or rather, what sorts of past experiences are particularly likely to be recalled as significant by those who have, one way or another, become environmental activists?” (p. 353). This idea was considered in my research, and I did question why many of my peers who had experienced similar SLEs to me did not hold the same level of care, concern, and interest in ecological sustainability as I did. I acknowledged this critique of the field of SLE, but, given the limited scope of my research, identified that further analysis would be required to comment definitively about these concerns.
Additional to this contention has been the need to discover the most appropriate methodologies for SLE research and determining if past childhood experiences can be used to create influential experiences for children today (Blanchet-Cohen, 2008; Eilam & Trop, 2014; Gough, 1999b). This creates an issue as parents’ ideas about what constitutes a SLE in nature may be vastly different to the needs of their children due to the context of the time in intergenerational differences. Criticism has also been given to the “disproportionate focus on privileged groups and positive experiences” (Ceaser, 2014, p. 205). Ceaser (2014) considered SLEs on marginalized and disadvantaged groups and found that negative experiences (i.e., emotions such as fear, helplessness, and guilt) play a much greater role than positive experiences in determining environmental activism and justice in adult life, as does the embodied learning of these experiences. Similarly, Hsu (2017) found the negative experience of “losing a beloved natural place” ranked third of the eight most crucial factors for environmental action in the rural areas of Taiwan (p. 51).
This millennium has seen a new wave of SLE research, which has branched out in many ways. These include and investigate the role of personality, schooling, and community and compared the influence on behaviors with attitudes (Eilam & Trop, 2014). Research has also been conducted “on the meaning of both social disadvantages and negative environmental experiences” as motives for practical concern (Ceaser, 2014, p. 205). A study by Ceaser (2014) also highlighted the need for researchers to consider the influence of environment, society, and history on SLEs (Ceaser, 2014, p. 215). Moreover, through SLE findings, it has been recognized that environmental education programs need to be assessed not only by cognitive responses but also affective responses (Cachelin, 2009; Pooley & O’Connor, 2000).
Classified separately to SLE, but also related to lived experiences, is the study of the life course path that identifies “interwoven pathways or trajectories” which together form a life story (Wells & Lekies, 2006). Life course path demonstrates similarities to SLE, such that it builds on previous SLE findings that there is a relationship between childhood experiences and “adult attitudes among environmental professionals” (Wells & Lekies, 2006, p. 13). The findings of Wells and Lekies’ (2006) study were concurrent with SLE research that childhood experiences in non-human nature link with both environmental attitudes and behaviors in adulthood (Wells & Lekies, 2006). The study by Wells and Lekies (2006) called for further research from this field specifically identifying the need for longitudinal studies that focus on “exploring people’s relationships over time and during various periods of life” (Wells & Evans, 2003, p. 327). Finger (1994) used the phrase “life-world approach” to describe his research, which is fundamentally based on SLE. The findings reflect the similar trend discussed earlier that “the main factors predicting environmental behaviour, or absence thereof, are experiences in and with the environment (e.g., previous environmental activism, experiences with nature, and exposure to environmental catastrophes)” (Finger, 1994).
This section presented a scoping review of the SLE literature, drawing on parenting as a focus. It was discovered that the two major findings from this research named childhood experiences in non-human nature and the influence of a central adult as key determinants of lifelong attitudes and approaches to environmental behavior. The latter finding is significant as it forms the central foundation of my research: exploring the role and influence of the adult. The next section of this chapter explores these findings through the context of a parent(ing) conceptualization of childhoodnature.
Through my recent autoethnographic study titled Parent(ing) Childhoodnature, the extent to which SLEs mediate parent(ing) with/as childhoodnature was explored (for full details of the methodology employed and theoretical framing for the study, see Blom, 2016). The theoretical perspectives of posthumanism, socioecology, and the sociology of childhood were utilized to frame the study (refer to Fig. 3). This angle allowed the distinctions between childhood and nature to be blurred to expose the possibilities that can be enabled through this process; so that there is nothing in between and nothing to separate, it is united: childhoodnature (see Fig. 1).
Prior to conducting research into an approach for parenting childhoodnature, it was necessary to gain a deep understanding of how I, as a parent, conceptualized nature. To do this, I drew on my SLEs to explore the impact they had on how I related to and understood nature. What emerged was a complex and varied response to experiences with nature revealing a deeper understanding of myself as being with nature, but also as nature. The autoethnographic approach enabled this deep and reflective response to the research questions. Furthermore, it allowed the parent’s perspective to be explored through intimate and in-depth research.
The findings of my research foray were not a neatly laid-out linear map as I had envisaged but a messy assemblage of current memories at times juxtaposed with artifacts from my past. The research found that to conceptualize nature, it was first necessary to develop an understanding of self through honesty, identifying values and an awareness of the images and pictures I operated under which, in effect, governed my movements. Second, the role of nature observations and interactions was identified as a key factor in conceptualizing nature.
My first purposeful foray into non-human nature as part of my research was taking a walk with my daughter in the local park. I came up against the barrier of time: experiencing the difficulty of relaxing into the pace of life on this outing. Through this experience I became aware that I needed to be deeply reflective and develop greater honesty with what I was feeling in each moment. From this walk in the park with my daughter, I was able to discover that non-human nature is much more than the scientific view of an interconnection of living and nonliving things; non-human nature offers space to support growth and development. Through the deep interconnection between human and non-human nature, nature has a knowing. It is there providing a sensory experience which I can choose to connect with and observe the wisdom that it offers. At the same time, non-human nature allows me to simply be and feel.
After dinner [my teacher] had a chat with me and I began crying again. Why do I cry? I calmed down and walked up to the common room. After being there for five minutes, I began crying again. I kinda [sic] know what [it’s] about and it’s too hard to explain in the dull light of this torch. I decided to go for a walk to the gate. On the way I saw [my teacher]. He asked if I was alright? I said I was but he didn’t believe me. He could tell I was unhappy inside even if I did put on a happy face. At the gate, I looked at the stars and thought about this beautiful place.
In my memory, the actual standout moment was not the tears beforehand but the blanket of stars above my head that reminded me that I was part of something much grander, more awe-inspiring. This reminded me of Carson’s (1965) musings about the importance of connecting with the awe and wonder of non-human nature through the “recognition of something beyond the boundaries of human existence” (p. 88).
This reflection contributed to understanding my conceptualization of nature as I began to explore my human body as a continuation and part of non-human nature. I perceived the tears as “clearing the ground” of my body-as-nature allowing the learning moment with the stars to occur. Just as Carson (1965) shared “the Maine woods never seem so fresh and alive as in wet weather” (p. 30), through the crying process my body became “fresh and alive” in a similar way, open to the messages and offerings from non-human nature.
I questioned why I would refuse to allow myself to cry and to experience the lovely lushness in my body akin to the freshness of a rainy day. I concluded that it was due to the façade of two social norms: (1) what it looks like to be “okay” and (2) that as a woman I need to be superwoman i.e., to do everything and come out smiling. As I have grown, I have come to know that I am superwoman regardless of what I do and what it looks like. I don’t have to hide behind a mask of pretense. I can be honest about what I am feeling, and this is what being brave and what being a superwoman is really about. Through honoring what I am feeling, I am nurturing nature: my body-as-nature.
Furthermore, through this internalization of our individual selves into mental activity, there is danger of becoming disassociated with the physical world such that our society is “increasingly governed by its own internal dynamics and attempts to deny our ultimate dependence on natural processes” (Kidner, 2007, p. 139). These ideas align with my understanding and conceptualization that it is through connecting with our body-as-nature that we can more easily access our biophilia (Wilson, 1984) and feel the deeper sense of connection with non-human nature. Bai, Elza, Kovacs, and Romanycia (2010) support this view in the educational context by stating that education needs to bring children’s attention to themselves through “being sense, being bodies, being perceptions, being feelings” (p. 36). They suggest that we are educating children away from their biophilia through a “consciousness that is busily and excessively into ‘doing’ and ‘having’, however educational” (Bai et al., 2010, p. 360).
Through adopting a critically reflective process about the social constructs I am a part of and honestly considering the influence these ideas have on my daily practices and movements, I am more easily able to let go of these strongholds of society and live more attuned to the song of nature.
I likened this to the work of Latour (2004) who proposed that we no longer accept the value-fact divide if the collective we of nature (both human and non-human) are going to reconceptualize nature and society in a unified perspective. Through this exploration it became evident to me that I needed to let go of what I had accepted as environmentally sustainable and actions “for the environment” and radically open my awareness to the possibilities of what nature was and what a sustainable relationship with nature looked like.
I further explored my values by reflecting on past behaviors and choices that did not support or nourish me. When life became overwhelming through poor choices that did not care and nurture my body-as-nature, I was able to restore my sense of emotional, mental, and physical equilibrium through time connecting with nature: generally by going for a swim in the ocean or a walk in the forest. By reconnecting with my “biophilia,” I felt myself again. I deeply appreciated the gift that nature offered through this process while at the same time the influence of significant adults, such as my grandma (see Fig. 2), for sharing the magic of non-human nature with me during childhood.
Over the last decade, my relationship with nature has drastically changed. I no longer seek refuge and escape into nature as I once did. I now understand nature as my parent and appreciate the way nature interacts in my everyday life: from the little ant walking across my desk to the flash of a rainbow lorikeet’s belly or the seemingly endless sky with clouds that appear painted on in their awe-inspiring perfection. I value and appreciate non-human nature for all of this, more so now than ever before. Nature provides a little reminder to support my biophilic connection when at times I feel like a mind in complete disconnect from the body that houses it. It is through feeling my body and remembering that it belongs to something much grander than merely the individualized self that I can be in harmony within myself and with all other living things.
The choices I make now are aligned with and respect nature more than they ever have been before. I consume less and live more within nature’s cycles. Most importantly, I now understand that my body-as-nature is my and only my responsibility, and thus I treat it with the utmost care and love. I now have the intent of treating all others in this same way.
The idea that the human body and non-human nature are conceptually united has been discussed by many researchers, for example, Latour (2004), who states that through the very notion of conceptualizing and conserving nature we are separating ourselves from it. This unification is grounding of the childhoodnature philosophy that proposes that there is no distinction between the concept of childhood and the concept of nature: they have a deeply innate connection to their biophilic source. Developing an awareness of this connection and honoring this internal biophilia is something I value. I now know I no longer need to retreat in the untouched landscape to connect back to this feeling, for it is within me, my body-as-nature.
Images and pictures were the third concept presented through my data on conceptualizing nature and are founded on expectations. These expectations generally stem from societal ideals and beliefs that are so ingrained; often it is unclear that I operate under their guise. When I was in my twenties, I became acutely aware of how these images and pictures could be destructive in setting up a framework for disappointment. It was at this time in my life that I renounced many social traditions and norms such as a need for marriage, children, and getting a mortgage on a home, a car loan, and so on. I saw the detrimental effects these images and pictures had on people in my life so decided not to engage in them.
We woke up to nice but windy morning. I felt like the tent was about to fall down or blow away. After we got up we went and sat around the gas stove. We had breakfast, it was bread and jam. The wind kept blowing sand into the food. Again it was beautiful weather, apart from the wind. The lake water was no longer fresh, it had sand and everything that had blown into it. We had to back-track along the beach. Even though we’d seen it before it was still unreal and beautiful.
The past reflections from my early adolescence are vastly different to my current memories of what that moment was like. The past reflections are devoid of what I remember now about the complexities I was experiencing as a teenager in a remote, highly socialized setting. The past reflections do not describe the depth of beauty that I felt being on that isolated, wild beach nor the impact that being in that place had on my well-being. These aspects are highlighted in my current memories of these moments. Through the process of contrasting this writing with my current memory of this SLE, many conclusions can be extrapolated. One is that even though I did not describe everything in detail at the time, it could be that my expression has changed as I have developed from a girl into a woman. As Muncey (2005) stated “although memory is selective and shaped, and is retold in the continuum of one’s experience, this does not necessarily constitute lying” (p. 70). The differences in data representation do not deviate from their validity. Memory is an important and unique source of data (Chang, 2008). Chawla (1998a) supported this through her SLE research by advocating that memories are generally accurate around the general course of events, whether a single or repeated experience.
Another reason for the discrepancy between the two descriptions of the same event is that somewhere in the space between adolescence and early adulthood of my late teens and early twenties, I constructed more complex ideas about what non-human nature meant in my life. These were formed through observations of and interactions with non-human nature and are explored in the next section.
So far in this chapter I have conceptualized nature through the lens of a parent and conceptualized nature as a parent. Nature has been shown to be inextricably linked with developing my relationship with self. This exploration is evident throughout my life path and has been a necessary part of resolving the tension I have felt in the current state of the natural environment. As reflected by Orr (2009), we need to answer the question of “who we are and what do we know of ourselves?” to get to this resolution (p.184). Through my reflective approach to understanding my connection with nature, I have observed how this conceptualization of nature has changed significantly along my life path and changed the direction of the path too through SLEs. I draw on another example from my 14-year-old self on the school-based remote learning program to illustrate the influence, impact, and meaning-making of SLEs from a retrospective viewpoint.
When I first came to this place the environment was everything around me – the forests, the village. It was a special, new place. But to me it didn’t mean much – it wasn’t my environment to worry about. I didn’t know much about the forests – so I didn’t care much. Through my time here I’ve learnt and thought about what’s around me all the places and what they mean to me. I’ve become more aware about everything I do. Because nearly everything I do here will make an impact on the environment – the water I use and the rubbish I make. I’m hoping to use some of the things I’ve learnt when I return back to the city. Because my environment in the city is as important to me as this place.
Through reflecting on my past experiences of the school-based remote learning program, it is evident that as a collective SLE, it provided a key to my connection with both human and non-human nature. It also gave me the knowledge and skills to enable authentic agency in the practice of caring, advocating, and actioning for the natural environment. Kollmuss and Agyeman (2002) assert that direct experiences (such as seeing the impacts of logging firsthand) provide a stronger influence on environmental behaviors and attitudes than indirect experiences (e.g., learning about an environmental problem in a classroom), which focus on the dissemination of knowledge content of environmental issues. The school-based remote learning program provided a combination of these strategies which may have contributed to the success of this approach in enabling a SLE.
While the school-based remote learning program was definitely a major shifting point in my life, there were many more SLEs that continued to occur as I completed high school and moved into and through my twenties. The learnings from the school-based remote learning program held strong, and I continued to care and advocate for the environment; however, this had become problematic as I had developed a practice of caring more about non-human nature than my body-as-nature. This idea has been attributed to environmental guilt and has been experienced and observed by researchers (see, e.g., Schneider, Zaval, Weber, & Markowitz, 2017).
My next major SLE occurred in my early 30s. I was feeling exhausted by the endless inner conflict between being a citizen in a consumer-based society and being true to my environmental sustainability beliefs. I thought that there must be another way. So I retreated from my seaside residential life into what some may call “the Australian dream”: my husband and I purchased a four-wheel drive and a camper trailer and went traveling around Australia with our 18-month-old daughter. After working in some remote areas and being “on the road” for 6 months, we realized that this way of living was not financially nor practically feasible or sustainable long term. We relocated and I began resolving my inner conflicts about being a part of society and living sustainably. The process I adopted to do this was to first accept that “retreating” from society did not work, and second, I let go of everything I thought sustainability was about. From the outside, I would not have looked the picture of someone who cares about the environment. But, on the inside there was resolve. I approached my environmental and sustainability actions through caring for my body-as-nature first. Only through practicing caring for my body-as-nature was I able to begin to understand what it meant to care for non-human nature. This idea was supported by Parker (as cited in Skamp, 1991) who asserted “If I am uncaring of myself, I am careless of my environment and my sister creatures” (p. 82).
I came to realize and understand that my body is made of the particles of the universe, which includes the natural world. My body can work in alignment to the rhythm of this universal order, just as is observed in nature. I am the one who knows and has control over my body, so it is my responsibility and choice to listen to and look after it in a way that respects the universality to which it belongs. Moreover, my body has a way of communicating exactly what is needed. It is my choice to remain open to listening to it, in the same way I “listen to” the nature outside of my body, non-human nature.
I grew up in a leafy, city suburb in Australia, with only intermittent opportunities to experience wild nature. Given the profound support non-human nature provided me, I was determined to ensure my daughter had much more exposure and time in non-human nature than I did as she grew up. I was sure that I would be the significant adult in my daughter’s life who would provide her with opportunities to be in wild nature. This picture I held was just another ideal about how I thought things needed to be and what they needed to look like. Trying to live in a way that allowed my daughter to live the idealized childhood spent in non-human nature was not working financially, emotionally, or mentally for our family. I realized that to be a change agent I needed to actively engage in society and be a part of what I had always resisted and retreated from. For me, this was a major turning point in my life that could be described as an unconventional or nontraditional SLE. I started to make changes and critically reflected on some of the sustainability and “green” ways of living that I had adopted. I explored my relationship with food choices; I challenged the concept of time and I reflected deeply on the way I parented my daughter. These concepts are explored in greater depth here.
Food is a sensitive topic for discussion as there are often strong emotional, social, and cultural connections with what and how much we eat. However, despite the discomfort and awkwardness that this topic might arouse, it is a necessary aspect of sustainability, environmental education, and understanding parent(ing) from the childhoodnature perspective. Moreover, food is part of caring for our body-as-nature and is in our direct locus of control. I recall personal SLEs that are specifically related to food, which have also formed my beliefs about what it means to be sustainable and nurture childhoodnature.
Looking at food choices through the SLE lens, I can identify two SLEs that have strongly influenced my food choices. At age 8, I ate a chicken nugget and was shocked to realize that there was a bone in it. Up until that point I had not deeply considered and acknowledged that a chicken nugget was actually from an animal. As my father was vegetarian, it was a simple transition for me to become a vegetarian in our family landscape and my parents accepted my choice. My second SLE around food choices occurred at age 31. My daughter was 2 months old and I had developed mastitis three times during this period. It was a devastating experience for the pain I experienced, the discomfort for my daughter, and the impact it had on me as a woman. At this point, I decided to stop eating gluten, dairy, and sugar to see what impact it had on my health (as I had dabbled with this way of eating in response to other health issues in the past). After changing my diet, I did not get mastitis again. I actually felt so good from eating this way that I continued, even when I had finished breast-feeding.
I continued to experiment with my diet and became aware that certain foods were causing bloating, raciness, and/or tiredness. Due to the discomfort of these side effects, I was willing to no longer eat these foods. After a few years of eating in this way, I started to hear the voice of my body through craving chicken and lamb. It was a challenging time to let go of the environmental and sustainable belief of vegetarianism that I had held onto for over 25 years, but in line with my decision to explore new ways of being sustainable, I chose to honor my body and renounced my vegetarianism. I thought my body would react to the meat and find it difficult to digest. But it was the contrary; my body reacted well and had no side effects, except for greater vitality. This was also observed by White (2013) who found that eating meat restored her “healthy body” after a year spent as a vegetarian (p. 129).
Choosing to eat in this way has not been simple, but mainly through the social pressures I have felt and had to confront. It involved a process of letting go of what I had accepted as the social norms of what “healthy and sustainable eating” meant and being brave and trusting enough to accept that the changes I was making were the right choices for me. It gave meaning to the quote by Thoreau, “let your life be a friction against the machine” (as cited in Devall & Sessions, 1985, p. 8). The experience was reminiscent of my choice to become vegetarian at age 8 when it was much less common, especially for a “child,” but the intensity at age 32 felt much stronger. Even writing this now I can see how challenging it is to accept that my body does not lie when it speaks. Even when what it says is in direct opposition to what I am being fed by society, such as the recommendations from the government. I problematized the current government nutrition and lifestyle recommendations through a collage in my visual research journal. The collage troubles the Australian healthy food pyramid and physical activity guidelines. These documents are designed to provide parents and educators with support in providing healthy food and lifestyle options for the children in their care. However, during my research process I questioned this advice considering the current “obesity epidemic’ (WHO, 2000). It would seem that these promotions are not a sustainable solution for human and non-human nature. I decided to listen to the voice of my body-as-nature and for doing this, I have never felt better.
I would argue that the way I eat now is more sustainable than it has ever been – both for my body-as-nature and for non-human nature. I have become aware how nature is parenting me about how to eat and live through what I observe in animals. Animals don’t worry about killing each other for food. They innately listen to their body: what and how much food their body needs without intellectualizing their diet. I propose that this could be a new approach to exploring sustainability in food choices. There is a lot of responsibility as a parent to ensure that my food choices and my relationship with food model that which I would want to see for my daughter. I see this responsibility as another reason to choose my food based on what my body tells me, as this is how I would like my daughter to develop a relationship with food: through discerning and making choices for what works for her body.
Perceived lack of time is a notable barrier for parents in giving their children access to and experiences in nature along with seemingly busier lives of children, families, and society (Louv, 2006; Malone, 2007; Sandry, 2013; see also “interpersonal theme” in Shaw et al., 2015). Given that SLE research suggests that childhood experiences in nature promote future life paths into personal care and concern for the natural environment and careers in the sustainability and environmental education fields (Chawla, 1998b, 1999; Palmer et al., 1998b), it is an area that requires attention. This concept is explored in this section through a recent SLE from my research data.
When he is with her, he is with HER! He is not thinking about what he could be, should be, was or will be doing. He is listening to her, celebrating her, offering her his wisdom of lived experience, appreciating her wisdom and makes space in his life to do things together. It is not about what is being done, but understanding the importance of being with each other.
My husband realized that he did not have a lot of time given he was working full-time and studying part-time, so he challenged quantity by offering depth in his quality. The quality spoke volumes. I could see very clearly that connectedness was not about having to spend lots of time doing something, but was about the way that it is done: it was about the quality and not the quantity. The same idea applied to my husband’s interaction with nature. He deeply appreciates nature in his everyday life, but does not need to retreat into non-human nature or spend a lot of time there. He honors and respects his body and treats it with great care, just as he does with non-human nature.
Through this observation, the concept of time has been fractured in its intensity. While it is obviously still an important aspect of being in society, it should not govern our thoughts and movements. Moreover, it should not be used as a reason not to engage in building relationships with each other or with non-human nature. We can appreciate the time we have without guilt or regret or wishing away life by wanting to be somewhere else. This lesson has been fundamental in reconceptualizing how I parent, particularly with the current wealth of images and ideas about what getting children back into “non-human” nature should look like. Through reconceptualizing time, I am able to practice parenting childhoodnature through the quality that I parent with and not on the quantity of time I have available. These ideas around parenting are developed in the next section.
This section explores some of the reasons that may hinder the seemingly simple twofold actions described through SLE research of (i) providing children with opportunities to connect with non-human nature and (ii) being a role model: inspiring children through living the choices we wish to see in the world (Chawla, 1998b).
It has been suggested that a major reason that children are not given permission to play outside is the “fear factor” – the fear of stranger danger and the fear of judgment about bad parenting practices from others (Louv, 2006; Malone, 2007; Ridgers, Knowles, & Sayers, 2012; Shaw et al., 2015; Sobel, 2008). Through my research, I explored this by reflecting on an experience in the backyard with my daughter. I was hanging out the washing while she was on the trampoline. When I had finished I went to go back inside to check the dinner. My daughter was clearly enjoying herself but hurried to put her shoes back on to come back inside with me. I asked her why she did not want to stay outside on her own and she said she was scared. The way she rushed to get off the trampoline certainly confirmed this. I pondered on this event to work out why she would have been afraid. As we do not have a television, I knew there would not have been an image or picture constructed about stranger danger from a television program. I had never told her stories about kidnapping or instances of children being lost. I realized it may have come from my movements, in the way I watched her closely. It was my own fear that my daughter felt and took on as her own. By doing this, I had created a need from my daughter. I realized that if my daughter did not need me, then what was my role as a parent and mother? Through the actions of constantly watching my daughter and making sure she was safe, I was in effect saying to her, “you need me to be okay.” I know my intentions were to ensure my daughter was safe, to be a good parent, and to spend time together, but at times I know these actions conveyed an underlying message that my daughter is “vulnerable, incapable, and in need of guidance and protection” and thus a “welfare dependent” (Barratt & Barratt-Hacking, 2008, p. 287). This view of children is opposed to enabling and empowering children to be the “young citizens” that they are through honoring their “strengths and competencies” and providing them with appropriate “recognition, respect and participation” (Neale as cited in Barratt & Barratt-Hacking, 2008, p. 287). This required me to change my parenting perspective: from seeing my daughter as someone in need of protection to empowering her as a young citizen, not as belonging to me but as being her own being.
My husband and I continue to remind our daughter to share and act on how and what she feels and to ask questions from her inner knowing. I can see how this approach supports and empowers her in making choices and remaining in connection with her biophilia.
It is quite revelatory to know that I do not actually have to do anything: that my role is to inspire. I understand the practicalities of doing the things for my daughter that she is not yet able to do and therefore supporting her development in the practical sense; but I am also acutely aware of her capabilities as she grows. Children are so much more able than I regularly see them being given credit for. Knowing that I do not have do anything is not an excuse or a way out of parenting my child, but a way of reimagining what parenthood looks like. This way of parenting is about making decisions and movements through taking care with myself and connecting to my daughter as a first priority. To transition my parenting from one of need and busyness to one of connection with myself and my daughter first requires honesty and acceptance. I propose that through letting go of any beliefs, pictures, or ideals about what parenting should look like allows endless possibilities to unfold and invites a more open acceptance of the way it actually is. This applies to the childhoodnature lens. When I have held on to pictures or beliefs about what this looks like in practice with my daughter, it creates a deficit where I am always away from where I want it to be. By confirming through appreciation about what childhoodnature looks like as it is, it allows the next learning and lesson to be presented, therefore allowing a deeper understanding and practice of childhoodnature in our lives.
This chapter has detailed a selection of the SLEs that presented through my research that contributed to my everyday conceptions of parenting with/as nature. I view nature as a parent, offering constant guidance about how to live in harmony with human and non-human nature. I understand that my body-is-nature and speaks to me constantly. I can choose to listen and respect the universal order that my body belongs to or not. I have learned that as a human being I have this responsibility of choice, as does everyone. Through the sharing of our narratives and stories, we can learn from each other and, from our learning, discover new ways of experiencing and understanding nature in our lives.
The role of nature in my life has changed and developed over time; my SLEs mark these changes. This evolution and changing relationship highlights the possibilities for reconceptualizing the human relationship with/as nature to match the evolving nature of all living things on the planet. I accept that the nature we are living with and experiencing is the result of the collective choices of humanity. Through the autoethnographic process, I have been enabled and empowered to deeply reflect on how my relationship with non-human nature has changed over my lifetime from a place of being to a place of refuge and escape to now, nature as a parent. Autoethnography has allowed my perspective as a parent to be considered from the inside, contributing rich, authentic research to this largely unexplored area of the SLE field. Throughout this inward and outward exploration of both human and non-human nature, I have reconstructed, reimagined, and reconceptualized my approach to parenting with/as nature. This research suggests that to enable and embody an approach to parenting with/as nature that any beliefs, ideals, and pictures about what parenting with/as nature should, would, or could look like needs to be deconstructed. It is then through reconsidering and redefining human relationships with honesty, values, time, food, and perceptions of being in the world that the parenting with/as nature concept can be reconstructed. Practical implementation of these concepts and research findings requires each individual to (a) take responsibility for caring for their body-as-nature and listening to their voice within: their biophilia; (b) be the living inspiration for what they would like to see in the next generation; and (c) utilize each moment with nature by being present at every opportunity and deeply appreciating the messages and wonder that is on offer. Along with the nature of research, this knowledge and understanding is dynamic and will continue to evolve and deepen along with the collective us of human and non-human nature.
Crutzen, P. J., & Stoermer, E. F. (2000). The “Anthropocene”. Retrieved from http://www.igbp.net/download/18.316f18321323470177580001401/1376383088452/NL41.pdf. | 2019-04-24T16:17:59Z | https://rd.springer.com/referenceworkentry/10.1007/978-3-319-51949-4_127-1 |
The Website is a website operated by Trigger Conversations of 1 Clockhouse Place, London, SW15 2EL ("us", "we" and "our"). Our site is hosted on Squarespace.com. They provide us with the website hosting, events booking and email platform that allows us to present our Website, send emails and sell our products and services to you.
The purpose of the Website is as an information-only website for us to provide information about our organisation and the events we run, to the user and the wider public in general. Users can view the information provided via the Website and contact us via the Website with queries and requests for further information. We reserve the right to shutdown or amend the Website without notice and without liability.
All copyright, trademarks and all other intellectual property rights in the Website and its content not submitted by members (including without limitation the design, graphics, the arrangement thereof, all software and source codes connected with the Website) are owned by or licensed to us. The user may not copy, sell, rent, lease, license, sub-license, trade under, grant any rights in, transfer, distribute, time-share or otherwise assign to any third party any of the materials or content on the Website or any portion of the Website. Any unauthorised or restricted act in relation to the materials or content on the Website or any portion of the Website may result in civil proceedings and/or criminal prosecution.
Trigger Conversations is not responsible for any of the opinions or comments posted on www.triggerconversations.co.uk. Trigger Conversations is not a forum for testimonials, however provides testimonials as a means for customers to share their experiences with one another. To protect against abuse, all testimonials appear after they have been reviewed by management of Trigger Conversations. Trigger Conversations does not share the opinions, views or commentary of any testimonials on www.triggerconversations.co.uk – the opinions are strictly the views of the testimonial source.
It is possible that third parties (hackers) may access the Website and alter the Website’s contents or place damaging materials or programmes on the Website, including but not limited to computer viruses, Trojan horses, worms, bots and other destructive digital elements. We will not be liable for any damage or loss arising out of or resulting from any such unauthorised access to, alteration to or modification of information contained on the Website or infection of the Website in this way. In any event, it is the user’s sole responsibility to take all protective measures to guard against computer viruses or other destructive elements.
The Website incorporates links to other websites, frames and portals ("Third Party Sites") designed, maintained and operated by third parties. We have not reviewed the Third Party Sites which are provided for the user’s convenience only, and we are not responsible for the content or availability of these Third Party Sites. If the user decides to use a link to a Third Party Site the user will leave the Website and the user will do so at the user’s own risk. Links to Third Party Sites do not imply that we endorse, are affiliated or associated with, or are legally authorised to use any trade mark, trade name, logo or copyright work displayed in or accessible through the Third Party Sites or that any linked site is authorised to use any trade mark, trade name, logo or copyright of ours.
The user must obtain authorisation to reproduce third party material, including material on the Website and material accessible via any Third Party Site, from the relevant third parties concerned. The user must not permanently store or otherwise copy any such third party content or materials for wider distribution or commercial gain, without the express permission of the relevant third party. We will not be responsible for obtaining such permission for the user.
The information provided on the Website by us is intended to be informative only and is provided on an "as is" and "as available" basis. By accessing and using the Website the user acknowledges that any reliance upon any information obtained or received via the Website will be at the user’s sole risk. We provide the information on the Website without any representation or endorsement made and without warranty of any kind whether express or implied, including but not limited to the implied warranties of satisfactory quality, fitness for a particular purpose, non-infringement, compatibility, security and accuracy. We do not warrant that the functions of the Website will be uninterrupted or error free, that defects will be corrected or that the Website or the servers that make it available are free of viruses or other destructive digital elements.
Log files allow us to record visitors’ use of the Website. We compile log files information from all visits by users to the Website and use that information to make changes to the layout of the Website and to the information in the Website based on the way visitors move around the Website. Log files do not contain any personal information.
These Terms will apply to any contract between us for the sale of Products to you (Contract). Please read these Terms carefully and make sure that you understand them, before ordering any Products from our site. Please note that before placing an order you will be asked to agree to these Terms. If you do not to accept these Terms, you will not be able to order any Products from our site.
You may only purchase Products from our site if you are 18 years or older.
1.1 We are Trigger Conversations of 1 Clockhouse Place, London, SW15 2EL. Email contact using our Contact Page.
(a) To cancel a Contract in accordance with your legal right to do so please refer to the terms set out below.
(b) If you wish to contact us for any reason, including because you have any complaints, you can contact us by using our Contact Page.
If we have to contact you or give you notice in writing, we will do so by phone, e-mail or by post to the contact details you provide to us in your order.
2.1 Any images of the Products on our site are for illustrative purposes only.
4.1 Our order pages will guide you through the steps you need to take to place an order with us. Our order process allows you to check and amend any errors before submitting your order to us. Please take the time to read and check your order at each page of the order process.
4.2 After you place an order, you will receive an e-mail from us acknowledging that we have received your order. This means that your order has been accepted. and the Contract between us will be formed.
4.4 If we are unable to supply you with a Product, for example because that Product is over-booked or no longer available or because of an error in the price on our site, we will inform you of this by e-mail and we will not process your order. If you have already paid for the Products, we will refund you the full amount.
4.5 By buying a Product, you consent to being filmed, recorded and photographed at our events as a member of the audience and you consent to footage and photographs of you being used by Trigger Conversations in any medium for the promotion and marketing of Trigger Conversations.
5.1 We may revise these Terms as they apply to your order from time to time to reflect the following circumstances changes in relevant laws and regulatory requirements.
5.2 We may amend these Terms from time to time.
5.3 Every time you order Products from us, the Terms in force at the time of your order will apply to the Contract between you and us.
5.4 If we have to revise these Terms as they apply to your order, we will contact you to give you reasonable advance notice of the changes and let you know how to cancel the Contract if you are not happy with the changes. You may cancel either in respect of all the affected Products or just the Products you have yet to receive. If you opt to cancel, we will arrange a full refund of the price you have paid.
6.1 You have a legal right to cancel a Contract under the Contracts (Information, Cancellation and Additional Charges) Regulations 2013 during the period set out below. This means that during the relevant period if you change your mind or decide for any other reason that you do not want to receive or keep a Product, you can notify us of your decision to cancel the Contract and receive a refund.
6.2 However, this cancellation right does not apply if the Product has already taken place.
If your Contract is for an Event, the deadline for cancellation is 7 days before the beginning of the event.
If your Contract is for a single Product or several Products (which is not delivered in instalments on separate days), the end date is the end of 14 days after the day on which you order the Product or the date of delivery of the Product, whichever is earlier.
If your Contract is for: one Product which is delivered in instalments on separate days, the end date is the end of 14 days after the day on which you order the Product or the date of delivery of the first instalment of the Product, whichever is earlier.
6.4 To cancel a Contract, you just need to let us know that you have decided to cancel. You can do this by sending us an email quoting the event date, date of booking and the name and email address of the person in whose name the booking was made.
(c) make any refunds due to you in a reasonable timeframe.
6.9 Because you are a consumer, we are under a legal duty to supply Products that are in conformity with this Contract. As a consumer, you have legal rights in relation to Products that are faulty or not as described. These legal rights are not affected by your right of return and refund or anything else in these Terms.
If Product is fully booked, this will be flagged on the Site. In the unlikely event that an item you order is already fully booked, we will contact you and you will have the option to either place an updated order for a new date or cancel the entire order.
Products are delivered at the location mentioned in the Product details.
7.5 Occasionally our delivery to you may be affected by an Event Outside Our Control. See below for our responsibilities when this happens.
7.6 Delivery of an Order shall be completed when we deliver the Products at the location mentioned in the Product details.
7.8 If we are unable to deliver the Product on the date mentioned at time of ordering, then we will contact you with the option to cancel your Order and receive a full refund, or re-book for a different date.
9.1 It is always possible that, despite our reasonable efforts, some of the Products on our site may be incorrectly priced. If we discover this error before we accept your Order we are not required to sell the Products to you at the price shown. If we discover an error in the price of the goods that you have ordered we will let you know as soon as possible and give you the option or reconfirming your Order at the correct price or cancelling it. If you cancel your Order and you have already paid for the goods (but they have not yet been dispatched) you will receive a full refund.
9.2 The price of a Product includes VAT (where applicable) at the applicable current rate chargeable in the UK for the time being. However, if the rate of VAT changes between the date of your order and the date of delivery, we will adjust the VAT you pay, unless you have already paid for the Products in full before the change in VAT takes effect.
10.1 You can pay for Products using a debit card or credit card, by PayPal, or by any other method available through our event partners, (such as Eventbrite). If you choose to pay by PayPal, PayPal Terms and Conditions will apply.
10.2 Payment for the Products.
11.4 We have have professional indemnity insurance and all liability is limited to the amounts covered in that policy.
12.1 From time to time we will offer various promotions that can be applied to your order using a promotional code, which we will provide to you. You should enter the applicable promotion code in the space provided in the Cart/Basket, before you submit your order. The value of the promotion will be applied to your order (but may not be displayed as a separate line item).
While the terms and conditions for each promotion will vary, most of our offers last for a limited time, and have associated promotional codes that can only be used once per customer, and cannot be combined with other offers. Promotional delivery offers will apply to orders that meet the terms and conditions for that particular promotional guidelines, such as the applicable merchandise total (before delivery/handling charges are applied) and the requirement that the order be delivered to a single address. Generally, shipping promotions will only apply to UK Standard Delivery, unless otherwise noted.
12.2 If you have any questions about a promotion, or whether your order qualifies, feel free to contact us using our Contact Page.
13.4 You may cancel a Contract affected by an Event Outside Our Control. To cancel please contact us. If you opt to cancel, you will have to return (at our cost) any relevant Products you have already received and we will refund the price you have paid, including any delivery charges.
14.3 Please note that these Terms are governed by English law. This means a Contract for the purchase of Products through our site and any dispute or claim arising out of or in connection with it will be governed by English law.
14.4 Trigger Conversations may agree to alternative online dispute resolution (“ODR”) if you and we cannot resolve a dispute between us informally. For more information on ODR see http://ec.europa.eu/consumers/odr/. In the event that a dispute is not resolved outside of the courts, you and we both agree to that the courts of England and Wales will have non-exclusive jurisdiction unless you are a resident of Northern Ireland then you may also bring proceedings in Northern Ireland, and if you are a resident of Scotland, you may also bring proceedings in Scotland.
Trigger Conversations ("us", "we", or "our") operates https://www.triggerconversations.co.uk (the "Site"). This page informs you of our policies regarding the collection, use and disclosure of Personal Information we receive from users of the Site. We use your Personal Information only for providing and improving the Site. By using the Site, you agree to the collection and use of information in accordance with this policy.
While using our Site, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. Personally identifiable information may include, but is not limited to your name ("Personal Information"). We will not share this information with any other companies, except where necessary to complete an Order made on the website, or where we use another company's services to deliver this website or our marketing communications (eg website hosting company, payment processing provider).
Your data is stored through Squarespace’s data storage, databases and the general Squarespace application. They store your data on a secure server behind a firewall. Your data is also collected and stored on Eventbrite.com, and on private and secured Google Drive folder with restricted access. We maintain reasonable security policies.
We use a third party payment processors, Stripe and PayPal, for all payments. We do not store credit card details and instead rely on Stripe for this.
If you choose to pay by PayPal, PayPal Terms and Conditions will apply.
Squarespace has partnered with a number of selected service providers, whose services and solutions complement, facilitate and enhance our own. These include hosting and server co-location services, communications and content delivery networks (CDNs), data and cyber security services, billing and payment processing services, domain name registrars, fraud detection and prevention services, web analytics, e-mail distribution and monitoring services, session recording and remote access services, performance measurement and data optimization services, content providers, and our legal and financial advisors (collectively, “Third Party Service(s)”).
Squarespace is accountable for personal data that it receives under the Privacy Shield and subsequently transfers to a third party as described in the Privacy Shield Principles. In particular, Squarespace remains responsible and liable under the Privacy Shield Principles if third-party agents that it engages to process the personal data on its behalf do so in a manner inconsistent with the Principles, unless Squarespace proves that it is not responsible for the event giving rise to the damage.
Our website is hosted on Squarespace Ireland Ltd. They provide us with the online e-commerce platform that allows us to sell our products and services to you. Your data is stored through Squarespace’s data storage, databases and the general Squarespace application. They store your data on a secure server behind a firewall. More information can be found here....[link to Squarespace's data / privacy text.] We also use Eventbrite.com to manage ticketing for our events, who store your data on their secure servers (more information can be found here....[link to Eventbriite's website section]. We also collect data relating to bookings (including name, email address, event booked but excluding personal information such as the booker's address and credit card details) to improve our products and services, to contact you regarding products and services which may be of interest to you (provided you have given us consent to do so), or to communicate with you in respect of a product or service you have already purchased from us. We will take all reasonable steps to protect your information from misuse and keep it secure.
Squarespace has implemented security measures designed to protect the Personal Information you share with us, including physical, electronic and procedural measures. Among other things, we offer HTTPS secure access to most areas on our Services; the transmission of sensitive payment information (such as a credit card number) through our designated purchase forms is protected by an industry standard SSL/TLS encrypted connection; and we regularly maintain a PCI DSS (Payment Card Industry Data Security Standards) certification. We also regularly monitor our systems for possible vulnerabilities and attacks, and regularly seek new ways and Third Party Services for further enhancing the security of our Services and protection of our Visitors’ and Users’ privacy.
However – regardless of the measures and efforts taken by Squarespace, we cannot and do not guarantee the absolute protection and security of your Personal Information, your Users-of-Users’ Information or any other User Content you upload, publish or otherwise share with Squarespace or anyone else.
Like many site operators, we collect information that your browser sends whenever you visit our Site ("Log Data"). This Log Data may include information such as your computer's Internet Protocol ("IP") address, browser type, browser version, the pages of our Site that you visit, the time and date of your visit, the time spent on those pages and other statistics. In addition, we may use third party services such as Google Analytics that collect, monitor and analyse this data.
We may use your Personal Information to contact you following an Order or to send you newsletters, marketing or promotional materials and other information that we think you may find useful. Our emails will contain a link that can be used to unsubscribe from future marketing emails. Alternatively, if you want to unsubscribe from future marketing emails please use the unsubscribe link at the bottom of one of our emails or Contact Us. | 2019-04-23T00:24:59Z | https://www.triggerconversations.co.uk/toc |
First, let me start by saying I LOVE my profession. Teaching is more than a job to me, it is my passion. When I am in a state of 'flow' with my students, that is one of my happy places. I've often had students say that Spanish is their favorite, and that they enjoy it so much they barely know they are learning. When I am with my students I feel the same way (most of the time), we have so much fun that it doesn't feel like work. Teaching is a joy.
However, listening to politicians talk about the teaching profession, you would hardly know that so many good things happen in our classrooms. I am aware that most politicians have no idea what happens in schools. Unfortunately, as most parents are passionate about their children (as they should be), education is a powerful chip on the political playing field. When I first became a teacher, I remember being so PROUD to state my profession when asked what I did for a living. Over time, after getting enough negative reactions, and hearing my profession torn apart on TV my feelings began to change. I felt more defiant than proud when asked what I do for a living. Each time I told people I was a teacher, I felt the need to be prepared to battle preconceived perceptions about education. Now, when prospective teachers ask me about going into the field, I feel obligated to warn them about the need for a thick skin in this profession.
Teaching is a commitment of the heart, and there is always MORE that you could do for your students, and the race to meet the needs of all the little faces that walk through our doors can be exhausting. When you add to that the negativity from the outside, sometimes I get TIRED. Tired of hearing my profession torn apart, tired of defending it online and in-person, and tired of all the negativity in the world. Tired and worried about the world that I am sending all these precious hearts and minds into.
So what do we do? Where can teachers turn for the heart to continue? Because make no mistake, if you are a teacher the world needs you. This is a question I have pondered many times. Yesterday, listening to my daughter and her friend make a video for their 2nd grade teacher, as they raved about how she was their favorite teacher of all time, it hit me. We can turn to the reason we became teachers in the first place, to our students!
Every time I am at my most worn out, some interaction with a student lets me know it is all worth it. One of my favorite things to do, is to let students draw me pictures or write me notes after they finish a test (or even on the test if they are waiting for me to repeat a question). They always surprise me with amazing Spanish pictures and the sweetest notes. The pictures below are from this week (and a few older students have sent me after they've moved on from my building). Each one reinforces my belief that teachers are necessary, a force for good, and that I am in the right profession, every exhausting and inspiring second.
Yes, it is important to take care of our bodies and minds, but we must also take care of our hearts! I know it looks like a lot of love for me in the pictures below, but the secret is, your students all love you that much too. I even did similar activities when I taught 7th and 8th grade, and their notes were just as touching (if a little less enthusiastic).
The next time you need inspiration and a reason to keep going, look at those young minds walking through your door, take a minute to connect and let them write you a message or draw a picture to share their feelings with you; and know that you are needed and loved!
Whether students or teachers, we all have those days. The days where the morning just didn't go as planned we rushed to get ready, or to school on time, or ran around stressed out when we were at school to prep for a class, or for students to finish a project or study for a test. Those days when we can feel the tension creeping into our stomach, our neck, our shoulders, and even our attitude.
This is a normal part of being human, and there is a scientific explanation for it, our nervous system! What follows is a brief explanation of the two parts of our nervous system, and how to control it when it gets out of control. For a more in depth look, please click here.
Many years ago, when we first evolved to be human, our nervous system developed two main parts, the sympathetic nervous system and the parasympathetic nervous system. The two systems act like a teeter totter, when one is in use, the other is not. The sympathetic nervous system is the 'fight or flight' system and is responsible for keeping us safe in times of danger. When this system is activated our heart rate increases, our muscles contract, our pupils dilate and non-vital systems in our body shut down allowing us to react quickly. The sympathetic nervous system is VITAL for keeping us safe, and perfect for needing to escape a tiger or a similar threat. The problem is that our nervous systems have not learned to recognize the difference between the threat of a tiger stalking you in the jungle, vs the threat of being late to school or work because you are stuck behind a bus. The sympathetic nervous system activates in both instances if we don't know how to control it; and with our fast paced lifestyle of always leaping from one project to the next (I myself am guilty of this) we often keep our sympathetic nervous systems in activation for much longer then necessary. This can lead to inflammation based health problems including, migraines, fatigue, muscle tension, weight gain, and many more. To read more about teacher burn out, please click here.
'On the opposite end of the teeter totter is the parasympathetic nervous system (if you speak Spanish I try to remember that 'para' means stop and think of this as the stop system). The parasympathetic nervous system is intended to restore our body to balance after activation of the sympathetic nervous system. When the parasympathetic system is activated our breathing slows down, our muscles relax, all systems come back online and balance is restored to our bodies. This is the system we should be spending the majority of our time in, but with the speed of today's world this system is often neglected.
3) Breathe out through the mouth for the count of 8. (through the mouth here is also important).
Next time you are feeling stressed out try cycling through this breathing activity a few times and notice how you feel before and after! This one is so quick I can even do it between classes, before talking to a student that has my sympathetic nervous system firing, or even in the car at a stop light when my own children are being loud in the back seat!
Although I have done yoga in Spanish with my students, I had never thought of doing deep breathing or guided meditation in the TL (target language) until a recent blog post by Justin Slocum Bailey (read it here). Justin's post inspired me and I made my first (very short) video below. This video starts with an explanation of the sympathetic and parasympathetic systems in English (a little too high for my students to understand in the TL), followed by the above breathing exercise in Spanish. I have been doing this with my students at the end of each class (or wherever they need it) the last few weeks and it has been wonderful! I hope it helps you too. I plan to make longer videos eventually....but that is a project for another day! Until then, I hope you spend many happy hours engaging your parasympathetic nervous system.
Teaching a language using Comprehensible Input (CI) is my favorite way to teach, hands down (and in my 13 years in the classroom I've taught in a lot of different roles including 3rd grade classroom teacher, 5th grade classroom teacher, after school/summer Spanish teacher, Spanish, a French, and German Exploratory class, Science, Middle School Spanish, and Elementary Spanish. Before teaching with CI I would have been hard pressed to name my favorite subject or age level to teach with, as I found things to enjoy at all levels. After teaching this way however, it would be hard to imagine teaching anything else. CI lights up the way our brains are meant to learn. The classroom becomes a joyous place where intense and meaningful learning and community building takes place. I see it in the bounce in their step when students walk through the door; and I hear it in their voices when they walk by my room at conferences and say in hushed and excited tones, "Mom and Dad that's the SPANISH room."
There is a drawback however, teaching this way can be both energizing, and completely exhausting. Some days I am drained and don't have a creative story or interesting thing to talk or read about. When I get that tired, I have to take a step back; and so should you when you feel that way! I know that if I have been up too late grading, or planning, or even with a sick kid, then I don't put quite as much energy into my lesson, and I don't have quite as much patience with my students. Science backs up the need not to over-do! In our brains we all have neurons, which send signals to other neurons that cause us to do...everything! There are even specialized neurons called Mirror Neurons, that help us understand the moods, motivations, and actions of those around us. When you see someone doing something, the same neurons that would light up in your own head if you were doing the action, light up (even though you are only watching someone else do the action). It's part of why you feel scared when you are in a scary movie, flinch when you see a bad injury, or are thrilled by an intense football game. If we come into our classrooms without energy and interest for our subject, the Mirror Neurons in our student's brains will pick that up, and they will not be as interested either, therefore learning less. Notice how you feel looking at the pictures of the exhausted people below. If you want to experience the effects of Mirror Neurons a little more intensely, watch the video of the "Rooftoppers". If you watch the video, the dropping sensation in the pit of your stomach is your Mirror Neurons predicting what would happen if they made a wrong move.
Read on for a list of my favorite low-energy CI activities!
The only prep (other than making sure they know the above words) is having some 'monsters' available (either stuffed animals, or print outs). All of the below is done in the target language (TL), and actors (the entire class acts at once) are only allowed to do what the narrator (teacher) says. All the quotations are the teacher 'script' with student actions described for each step.
I start by saying: "You are in your house, in your room." (students "draw" the house and room around themselves as described in the action above).
You are in your bed, sleeping (students pretend to cover up, and close their eyes).
I make a noise that represents whatever 'monster' is outside the house, and say "Suddenly there is a noise. You jump out of bed (students pretend to jump out of bed). "You walk slowly to the window." Students pretend to walk slowly to the window. "
"You look out the window". Students make the window action as seen above.
"There is nothing there." Students shake their head "no" for nothing.
"You walk slowly to the door." Students walk slowly to the "door".
"You open the door slowly." Students pretend to open the door slowly.
"There is a monster! You close the door quickly! You run to your bed. You jump in your bed. You cover your head with the blanket. You go to sleep." Students slam the door (complete with sound effects, run to their 'bed', jump in their bed, and go to sleep.
The process can be repeated over, and over, and over, and over with different "monsters" being at the door. Sometimes it is an enormous spider, a tiny dinosaur, a unicorn (we say hi to it, but then it turns out it is a bad unicorn and we slam the door on it too). I have even had the thing at the door be a 'giant pair of pants, or a 'crazy hat' or whatever word I want to get repetitions on, the possibilities are endless. students LOVE this activity, move a lot, and practice high frequency vocabulary, and it takes little prep from the teacher (win, win, win, win).
I keep this from being too scary for the elementary kids by having all the 'monsters' be non-threatening in appearance (as seen below). For older students you could do something similar, but with slightly spooky endings. If I was doing Middle School Spanish still, I would prep the my screen ahead of time so that when the students opened their eyes, Sr. Wooly's Ganga girls were peeking out at the students when they opened their eyes. The 'noise' could be a snippet of the Ganga song. If you are reading Sr. Wooly's newest graphic novel, La Dentista, you could also have that character ready to surprise students when they open their eyes!
Textivate is incredible for CI teachers. Students can practice both words in isolation and in a story. All you have to do as the teacher, is type your vocabulary and story and hit the 'Textivate button', you will instantly be rewarded with almost 30 different games your students can play to practice their CI. Textivate even has voice-to-text! There are many great instructional videos on Textivate's blog so I won't go into a how-to. Creating a Textivate activity with vocabulary the students already know, and a new simple story, can be a great way to have a meaningful lesson for students when you have a sub as well! Below is an example of work I am leaving for my 1st graders when I am out next week!
I have cards made up with high frequency words sitting in the front of my room (I also have student lists laminated). As I create stories with the class throughout the year, I add sentence strips from stories we have done as a class to the 'bag'. A student or student pulls a strip from the bag. If we are playing charades they act it out, if we are playing pictionary they draw it. Simple, and low prep, plus lots of practice of important words and structures. The student lists, are so that if groups of students finish an activity early, they have a 'go-to' . To see the words I have in my word bag (plus some times I made to practice them, click the link below. If you are a Spanish teacher, you can use this list to make your own. You could also buy the one I made, if it's easier.
White Elephant (as described by Justin Slocum Bailey here) is also low prep (though sometimes high energy for me, as elementary kids get very worked up when playing).
What's in the backpack/suitcase/bag/box/present etc. (whichever word you need to practice) is exactly what it sounds like, throw some things in your container of choice. Describe them, using words the students know, and have them guess what you have in your backpack. Lots of repetitions for descriptive words, colors, size, has/does not have, etc.
I have worksheets made up ahead of time that are very generic, they have students practice the you/I forms of Michael Peto's Super 7 and Super 16. Students answer the questions in the 4-square (as seen below) and draw a picture to go with each question. Lots of times these turn into hilarious mini-stories that you can throw into your FVR Library (Free Voluntary Reading Library). I also have blank comic templates that I can quickly write a basic story in, copy, and pass out to students. Students read and draw it. Beautifully illustrated stories can also be added to the FVR library. Finally, I have a worksheet that allows students to practice question words, and create their own "Invisibles" character (thanks Ben and Tina)! Students love making up their own characters, and 'standouts' can become class characters for your stories.
Giving yourself a chance to not be in the spotlight and recharge, while your students still enjoy plenty of CI goodness is a great thing for teachers and students alike! I hope one of these activities will come in handy next time you need a chance to breathe (as may be needed during December). Happy Holidays everyone!
p.s. If you are a Spanish teacher, my 'Felices Fiestas' site below, has lots of great movie talk possibilities for the holidays (a low energy activity, that I didn't write about as there are many great blogs on it).
Classroom jobs are a great classroom tool, both to manage transitions in the classroom smoothly, increase time spent in the TL (target language), and to help create a culture that is special to each class. It helps create a bond between the students and brings everyone together as a team. There are many great blog posts about classroom jobs, however these are the jobs that have worked best for me, in an elementary setting. Many of them were inspired by Ben Slavic's work. Some are unique (as far as I know). I've promised to blog about the jobs that work well in my room many times; and have finally found time at the airport on the way back from presenting at the incredible CiMidwest. To save you some time, I am including a free download to my job badges. My students wear these in lanyards around their necks. In previous years I have used props to identify jobs, but for elementary students the props were a big distraction. They are proud to wear the badges, but mess with them less, so this works better for me. Download your copy (if you are a Spanish teacher) here. If any teachers of other languages would like these, let me know, and I can delete the Spanish words and leave them blank so you can write in your own words.
What jobs do I use? Read below for a list and a brief explanation of each job.
Artist - Draws characters or stories as they happen. Can use these pictures for a retell, or add words to them and add them to your FVR library.
Writer - Writes the story in Spanish or in English. Helps me keep track of what is going on in each story.
The watch- tells teacher 5 minutes before the end of the class. I often have so much fun with my students I forget to watch the time.
The boss - Walks around at the end of class and makes sure class is in order, doesn’t clean the mess, tells others to pick up after themselves.
Host- Greets visitors, offers them a comfy place to sit (can kick kids out of the best seats if they say it in the TL (target language) and a glass of water.
Doctor- If someone sneezes, stands up and says 1,2,3 and class says ‘salud’. Escorts kids to the office for injury or illness if necessary.
The door- Answers the door during class and asks for the password if letting people into the class.
Points- adds class points or teacher points for me when I am too far away from my point place.
Props- Brings me props (or retrieves props we throw across the room).
Mini Teacher - Passes out or collects paper , turns off lights, and brings me things from across the room, and chooses two helpers to quickly pass out badge jobs at the start of class. At first I call out the Spanish words and they pass them out. When they have acquired the words they call out the jobs in the TL too.
Spy- Takes top secret messages from me anywhere in the school they need to go (the office, another teacher) sneaky like... They also "spy" on kids during class and report to me when kids speak English (so I can give myself points). The spy also reports to me when students speak in the TL OUTSIDE of class. So I can give the class points. This is the MOST popular job. It also gets the kids speaking lots of Spanish outside of the class, because they hope the spy will report on them. I don't care how many points my class gets (see here for a link to La Maestra Locas' blog and an explanation of the point system I use).
No English- If this person hears someone speaking English they have to say ‘No English, Spanish Spanish’ in the target language. If they say it before I can get to the board to give myself a point, I cannot give myself any points.
King or Queen- Makes decisions I don’t want to in the story (usually low pressure decisions like where someone lives).
Expert- Makes up details we don’t know in a story (how fast a car is, how far away the sun is, etc.). Whatever they say, we "believe" for the story. For example, if I asked the 'expert' what the fastest car in the world was, and they say 'a school bus', we are going with a super fast school bus for the rest of the story.
Computer Crew (3-4)- When we use computers they are in charge of re-setting computers for the next class, plugging them in (if necessary) and making sure headphones are wrapped.
The below jobs fall away when students do not need to hear the English anymore.
What? - When we say ‘qué’ (what in Spanish) the “What” person, stands up, shrugs their shoulders and says “What” in the voice of Gato, from El Perro y el Gato. Not very helpful if you are not a Spanish teacher. Perro y Gato video at the bottom of this post in case you haven't seen it.
Where? - Looks back and forth quickly and says where, where, in a scared voice (as if looking for a monster) when they hear the word ‘where’ in the TL.
How- Says ‘how how’ in a shocked voice (as if they broke their favorite toy) when we say ‘how’ in the TL.
Because- Says ‘because’ in a annoyed voice when we say ‘because’ in the TL.
How much- Makes money sign with fingers when we say ‘how much’ in the TL.
That's it, my favorite jobs. I used to have classroom actors too, but almost all my students want to act, so I have decided to not make it a job, to give more students the spotlight.
Hope that helps, let me know if you have any questions!
This is the second time I have helped organize a conference (the first time last year at MittenCi). Even with a great team of people (Grant, Haiyun, Marta and Kelly are incredible); it is a crazy amount of work, exhausting, and a bit consuming. Especially as I am a full time teacher, and a mom to three. However, if I am asked to do it again next year, I know I will say yes in a heartbeat. Why do we say yes to these endeavors over and over and keep coming back?
Equity and inclusivity, for our students, and for ourselves. If you have never been to a conference there is nothing quite like it. As language teachers, we are often the only teacher in our school, or part of a small group. Sometimes overlooked, or left to our own devices, it is easy to feel isolated and to lose the bigger vision of our full potential. Especially when you see the benefits to your colleagues of being able to talk to others that teach what they teach every day. When you attend a language conference you realize that you have a whole family of people who are making the journey with you. Even though we can connect on Facebook, there is nothing quite like connecting to other people that are passionate about the same type of teaching you do in person. People who understand your struggles and triumphs. Who can renew and inspire you and encourage you to keep on doing the amazing things you do for your students. Your words, comments, or lesson ideas, may have helped inspired someone you've never met. You may have been inspired by someone that needs to hear that they are making a difference. When we connect with other teachers that share our passions, there is nothing quite like the inspiration it gives you to keep doing what you are doing.
"Don't reinvent the wheel" is a popular saying, but as language teachers, we often have to build our materials and ideas in isolation. Talking to others that teach what you teach, getting new ideas, and figuring out how to fit them into what you already do, is empowering. I never leave a conference without a notebook worth of things I want to try. I often bookmark great ideas on blogs or facebook groups, that I never actually make it back to because I need more details before I proceed. At a conference, I always leave with things I can try immediately. Even last night, after a full day of writing down brilliant ideas; I was sharing favorite Movie Talks with the brilliant Carla Tarini (and re-writing my lesson plans for next week in my head). Walking away from a conference, I never fail to feel inspired and ready to bring the world to my students.
Our brains are wired to see the world as "us" VS "them". This is a part of our ancestral drive to prosper. As hunters and gatherers it was critical to our survival protect our family groups and tribes in order to flourish, and to survive we had to be able to recognize dangers in others that are not part of our own groups. However, we can do better.
Neuroscience shows that when we point out the similarities between ourselves and people who look, talk, or act differently; when we explain the meaning behind cultural practices that may be scary because they are the unknown, our brains start to reframe how we see others. We are no longer "us and them" we are "us and us". We all live on this small, but beautiful rock, out in the middle of space. No matter our countries of origin, our skin colors, our religious, cultural (or even political beliefs) we are all in this TOGETHER. In a time when politicians and the forces that propel our world seem determined to point out our differences, and reinforce the "us VS them" mentality, we have a unique chance and responsibility to make a difference. One student at a time, one day at a time. We can connect our students to people and places that they might never have seen, in ways that we might never have imagined, within our communities, and with the world at large. We have a chance to connect our students to their own full potential and to help them see the beauty and possibility of greatness in others. We have a chance to create future leaders that see the "us" that humanity needs to reach a world that is inclusive and equitable for all. Walking through the halls yesterday, listening to the different languages being spoken, and connecting with new and old faces, all I saw was us and us and us and us. And that is a beautiful thing.
We all know that students do best when we personalize lessons to where they are at in their lives. To their own interests, abilities, and journeys. This can be a tricky task, and overwhelming, especially when you first start out in the CI world. Listening to other teachers share their struggles, triumphs and best ideas is the path to the skills needed to personalize what we do for our students. It doesn't matter if it is your first conference, or your 50th, the ideas that you walk away with will advance you farther along the road to a program that can meet each of our students where they are at in the moment. Which is where we need to meet them if we are to help them reach their full potential. I was not able to attend any full sessions as I had confernce responsibilities. However for the sessions I was able to sit in on I learned so much that I can use to open the world to my students. As always, I wish I could have attended ALL the sessions.
In Bob Patrick's session I learned about no stress ways to teach CI and avoid burnout. From dictations, to using a same story in multiple ways. These are important words for teachers to here. In Justin Slocum Bailey's session I found new ways to do PQA that my students will love. Craig's Klein's session had incredible ideas on how to use curiosity and humor to compel student interest in their language learning. From Amy Vanderdeen I learned new ways to increase the size of my FVR (free voluntary reading) library, and from Becky Moulton I learned about the need to mentor others, and how to do so with compassion and grace.
As always, my only true regret at this conference, was not being able to see and talk to everyone. We need a whole week, and sometimes even that is enough. I wish I could have spent time talking to all the attendees, and listening to all the presenters. Whether I learned from you, simply crossed paths in the hall, waved at you across the room, or shared a heartfelt moment of collegiality, thank you for being a part of something incredible. The chance to make our classrooms, and yes even the world at large, an equitable, inclusive, and personally beautiful place for all. Hope to see everyone next year on Sept. 29th, at CiMidwest2018.
Our modern lifestyle is generally more sedentary then that of our evolutionary ancestors. Whereas they spent large portions of their day walking long distances, lifting heavy things, sprinting, and stretching as needed; we tend to sit a lot more and move a lot less in general. While we move less, we still are incredibly busy, and the idea of finding the time to work out can be overwhelming. I know that with working full time and three little kids at home, the days of going to the gym or spending two hours doing yoga are over for me (at least for now). Many nights I can barely keep my eyes open long enough to get the kids in bed and fold the laundry (many nights the laundry pile grows instead of being folded). I often do not feel like I have enough time for playing with my kids or leisure activities as it is, but I like being active, and the benefits of an active lifestyle are many. In fact, recent studies say that are sedentary lifestyle is extremely bad for us. Read about this in depth here or here: Sitting is the new Smoking. Unfortunately, the effects of a sedentary lifestyle are not reversed by exercise and diet, so it is important we start moving now. There are many benefits to getting ourselves moving.
Neurogenesis: increased neural growth in the brain.
The problem is of course, in spite of all the great benefits I do not have that much time in my day. Although I can't get to the gym, I have found ways to 'sneak' fitness into my day that have given me results that work for me. By this I mean, I feel stronger, more flexible, and have more energy. I do NOT have the "perfect body", this was not, and is not my goal. If your goal is also overall good health, strength and flexibility below are my tips for fitting in fitness when there isn't any time! Of course, I am not a doctor or yoga teacher so consult with a professional if you are worried about injury or health risks.
Yoga/ Resistance Training was the health activity I missed the most, and I added it back in, by starting with these 7 Yoga poses to do every day (look them over to understand the rest of the post).
These are 7 basic poses spread out throughout the day, so that you only do a few poses at any one time. Starting with just 4 breaths a pose, each set takes less than 5 minutes to start. As the poses became easy for me at 4 breaths a pose, I added an extra breath to each pose. I've been doing this set (with a few add ons) for almost 2.5 years daily, and am now up to 20 breaths per pose. While this takes slightly more time to do then when I started, I have noticed increased strength, balance, and flexibility. No extra equipment needed! I do these poses even on days when I am very tired, and I always feel better after I do them.
Once I had been doing the above poses for over a year, and was at 10 breaths, I felt the need to increase the challenge. I added a few modifications to increase resistance training. This is how I fit it in a little extra resistance training without a trip to the gym (this won't make sense unless you click on the 7 Yoga Poses link above, as these poses are in addition to the 7 Yoga poses at the above link).
1) I start with the morning cat/cow from the 7 poses above; after I have finished cat cow. I do plank pose in the morning, for the same amount of breaths I did for cat/cow (20 breaths currently).
2) Mid-morning or after lunch I do the forward bends as is in the set above. After lunch or at the end of the school day I do a more challenging lunge set. I start with Warrior 2 (first picture), then add a bending lunge (second picture) and a twisting lunge (third picture). In the twisting lunge, you can get an even deeper twist, if you twist the opposite way. After I do the lunge poses, I hold downward dog for an extra set, and then do yoga push ups. How many push ups should you do? As many as you can do and still do them correctly. Once they are easy, add another. I started with 5 yoga pushups, and now I do 15 (but I added extras slowly over time). If you want to see perfect Yogis doing these poses, you can Google them easily. Please excuse the selfies below, I couldn't find pictures that would show the actual poses without taking them myself or paying for them. I had planned to re-take them in looser clothing, but realized I would never get around to it, and thus never publish this post, so I went with what I captured on my first (and only) attempt.
I do the evening yoga poses as is in the 7 Yoga Poses to do everyday set before bed.
For those that have the time to add a little bonus strength training to their week, I highly recommend this 5 minute yoga routine for your arms 3 to 5 times a week.
If you are new to yoga, or worried about flexibility you may want to start with these poses. Yoga should be a stretch, and may strain muscles occasionally, but it should not hurt. If a pose hurts, you probably have something that is not lined up correctly. I recommend stopping, and researching or taking a class if necessary to correct these errors, you don't want to hurt yourself!
Aerobic exercise is slightly harder for me to fit in, as I don't have a long block of time in which I can do it. I fit little bursts of increased heart rate throughout the day by doing things like running up and down the stairs (often two at a time). I even do this at school if I don't think anyone is looking (though I don't recommend this if you are worried about falling. I will volunteer to get things on a different floor so that I get an extra chance to move sometimes. In class, if I notice my students looking tired we will stand up and do some in class jumping jacks or fast walking together. There are lots of ways to do little TPRS/CI (comprehensible input) workouts. These are good for you and the students, and can increase energy and learning ability. My students and I dance, run virtual obstacle courses, jump, run, walk, and do yoga all in the target language. Studies show that students often retain information better when it is tied to physical exercise.
I've also started doing HIIT (high intensity interval training) three or four days a week. There are 10 years worth of studies showing that HIIT training can provide many of the same benefits of longer aerobic workouts. I've only been doing this for about a month, so can't attest to it being the perfect answer to needing to fit more cardio in, but it gets my heart beating faster, is fun, and can be done in about 10 minutes. I'll update this post if I keep it up and find benefits.
In addition to all of the above, I go for walks, bike ride, play the tickle monster, and have dance parties with my kids. None of this is done with the goal of working out, but just to have fun while moving!
I hope this post helps a busy teacher (or anyone) sneak some extra fitness into your day. If you have other tips, or favorite fun activities to help others get moving, please share in the comments! | 2019-04-26T10:12:22Z | https://www.profepeplinski.com/profes-blog |
Napoleon Bonaparte's fame as a military commander can be dated back to his campaign in Italy in 1796-97, where as the young and relatively unknown commander of a ragged and poorly supported army he managed to defeat a series of much larger Austrian and allied armies, conquer most of northern Italy, and force the Austrians to the negotiating table. Napoleon was appointed to command the French Army of Italy in March 1796. His orders were to invade northern Italy and occupy Lombardy, a move that the French Directory believed would force the Austrians to move troops south from the Rhine front. Napoleon's task was essentially diversionary, for the main offensive for 1796 was expected to take place on the Rhine. Instead the campaign on the Rhine would soon bog down, while Napoleon's whirlwind of activity in northern Italy effectively ended the War of the First Coalition.
The army Napoleon inherited was in a terrible condition. By 1796 the French armies on the Rhine were seen as the most important, and the Army of Italy was badly paid, badly provisioned and often badly under strength. By the time Napoleon had somewhere between 37,000 and 47,000 men at his disposal, spread out from the pass of Tenda at their left almost to Genoa at their right. The army was split into three divisions, commanded by Pierre Augereau, Andre Masséna and Jean Sérurier, all more experienced than their young commander.
In theory the French were outnumbered, but the 60,000 Allied troops facing them across the Apennines were split into two armies – 25,000 Piedmontese troops south of Turin and 35,000 Austrian troops further east. The two Allied armies did not cooperate well, and would soon be forced apart. Napoleon would then face a series of Austrian armies sent across the Alps in an attempt to lift the siege of Mantua, and may have taken as many as 150,000 prisoners during the course of the campaign.
At the start of his Italian campaign Napoleon's army was stretched out along the coast from Nice towards Genoa, with the Apennine Mountains between him and the Austrian and Piedmontese armies. The main Austrian army, under the command of General Beaulieu, was based around Alessandria, north of Genoa, while the Piedmontese army (Colli) was further west, defending the main passes across the Maritime Alps and the approaches to Turin.
Napoleon planned to split these two armies, and defeat then in turn. He sent a messenger to the senate of neutral Genoa, asking for permission to advance through their territory. As Napoleon expected permission was refused, and the Austrians were informed of the request. Napoleon also sent a small decoy force along the coast to Voltri.
The key to Napoleon's early successes can be found in the geography of the Ligurian Apennines. Two main passes cross the mountains – the Ormea pass in the west, which ran from Ormea up to Ceva in the Tanaro valley, and the Bochetta Pass, which left the coast at Genoa. Napoleon hoped to convince the Austrians he was heading for the Bochetta Pass. In fact he intended to cross the Apennines between the two main passes, taking advantage of a gap that ran from Savona at the coast west to Carcare, at the southern end of the Bormida valley. From there the French could move north along the valley to threaten the Austrians, or west to Millesimo and Ceva (along the route used by the modern A6 motorway) to threaten the Piedmontese.
Beaulieu acted exactly as Napoleon had hoped. While Beaulieu led one Austrian army down the Bochetta Pass to attack Voltri, a second column, under General Argenteau, was sent along the Bormida valley, in the hope that Napoleon's right wing could be trapped between the two. Instead Argenteau ran into a strong defensive position in the mountains north of Savona, and on 12 April suffered a heavy defeat in the battle of Montenotte, Napoleon's first victory as a commander.
This left the Allies divided, with the Piedmontese to the west at Millesimo and the Austrians to the north at Dego. Napoleon sent troops to attack both of these positions. On 13-14 April Augereau forced the Piedmontese out of Millesimo. This overlapped with the battle of Dego (14-15 April). On the first day Masséna captured Dego, but he was then forced out by an Austrian counterattack. On the second day Napoleon launched a series of attacks, and eventually the Austrians were forced to retreat. In the aftermath of this defeat General Beaulieu decided to pull back towards his base at Alessandria to defend his communications with Austria.
This left Napoleon free to turn west and eliminate Piedmont from the war. On 16-17 April the Piedmontese managed to hold the French off at Ceva, but then pulled back to a stronger position at Mondovi, where on 21 April Napoleon won a conclusive victory. On 23 April General Colli, in command of the Piedmontese army, sued for peace and on 28 April Piedmont withdrew from the war. (Armistice of Cherasco).
Napoleon was now free to turn east and defeat Beaulieu. First he had to cross the Po. The main Austrian defences were around Pavia, and Beaulieu assumed that Napoleon would attempt to cross the river somewhere in this area. Napoleon encouraged this belief by including a provision in the armistice of Cherasco that gave him the right to cross the Po at Valenza, thirty miles to the west of Pavia.
While Beaulieu watched the river crossings around Valenza, Napoleon moved his army east along the southern bank of the Po and crossed over at Piacenza (7 May), thirty miles to the east of Pavia. When Beaulieu realised what was happening he rushed east, but in three days of fighting around Fombio (7-9 May) the Austrians were unable to prevent the French from blocking their best line of retreat to Cremona. Beaulieu's rapid movement and the relatively slow crossing of the Po did give the Austrians time to turn to the north west and escape across the River Adda at Lodi, leaving a rearguard behind to defend the long thin bridge across the river.
On 10 May Napoleon threw his infantry across that bridge (battle of Lodi), in order to prevent the Austrians using the line of the Adda to block his advance east towards Mantua. After a struggle that lasted an hour the French were victorious. Beaulieu retreated east to Cremona, watched by the French. Napoleon then turned back to the west. On 14 May the first French troops reached Milan, and on the following day Napoleon entered in triumph.
This triumph was short lived. With Piedmont out of the war General Kellermann's Army of the Alps was free to enter Italy, and the Directory decided to give him command of the war against Austria. Napoleon was to turn south to deal with the Papal States. Napoleon sent two letters back to Paris, in which he argued strongly against a divided command. Although neither letter actually contained a threat to resign, it was clear that that was what Napoleon had in mind, and the Directory relented.
After the defeat at Lodi, the Austrians retreated east to the Mincio, taking up a defensive position behind that river, running from Mantua to Lake Garda. On 30 May Napoleon broke through this line (battle of Borgetto). Beaulieu was forced to retreat up the Adige valley, leaving Napoleon free to begin his siege of Mantua. The first blockade of the city began on 4 June.
June also saw Napoleon's first campaign in the Papal States. The invasion was officially launched in revenge for the murder of Ugo Bassville, a French diplomat, in February 1793, but was motivated just as much by revolutionary hatred for the Papacy and the lure of plunder. This first campaign was over very quickly. On 19 June Napoleon reached Bologna, where he expelled the Papal authorities. Pope Pius VI then sued for peace. In the Peace of Bologna (23 June 1796) the Pope agreed to pay a large indemnity and to allow the French to occupy Bologna and Ferrara. This treaty was never ratified in Paris, and Napoleon would return to the Papal States in the following year. After dealing with the Pope the French turned west into Tuscany, passing through Florence and occupying the port of Livorno (Leghorn), before returning back to the Po plain.
By late July a fresh Austrian army, under the command of Field Marshal Dagobert Graf Würmser, was ready to attempt to lift the siege of Mantua. Würmser decided to advance in three columns. He took command of the central column, which advanced down the Adige valley. To the east General Szoboszio advanced towards Verona, while to the west General Quosdanovich advanced down the Chiese valley towards Brescia. At first all went well. Quosdanovich captured Brescia, threatening Napoleon's lines of communication with Milan. Würmser found the road to Mantua open, and entered the city on 2 August. It was this apparent success that doomed Würmser's campaign to failure.
While Würmser was marching on Mantua, Napoleon concentrated his army south of Lake Garda. On 31 July his advancing troops forced Quosdanovich out of Lonato (first battle of Lonato), and over the next two days Quosdanovich lost Brescia and was forced to move north east towards the lake. Realising that he needed to join up with Würmser, on 3 July Quosdanovich attacked the French position at Lonato (second battle of Lonato). The Austrians failed to break through, leaving Napoleon free to turn on Würmser's column.
Würmser realised his mistake and turned north from Mantua in an attempt to find Quosdanovich. On 4 July he found himself facing a large part of Napoleon's army at Castiglione, and took up a strong defensive position just to the east of the town. If Würmser had been able to hold this position, then his campaign would still have ended in success, for at this point the siege had been lifted, but Napoleon was able to bring superior numbers to the battlefield. At the start of the battle of Castiglione (5 August 1796) the French were outnumbered, and their attacks on the Austrian centre were essentially feints, designed to keep Würmser pinned in place while reinforcements arrived.
Eventually fresh troops arrived from Mantua (Sérurier's division under the temporary command of General Pascal-Antione Fiorella) and from Brescia (Despinois's division), and the Austrians were forced to retreat back to the Mincio. The battle of Castiglione was an early example of Napoleon's 'strategic battle', where widely separated columns converged at a key point on the battlefield to give the French numerical superiority where it counted, even against much larger armies. Although the battle did not go entirely as Napoleon had planned, Würmser was soon forced to retreat back to the Tirol, and the French were able to re-establish the siege.
At the start of September Napoleon and Würmser both went onto the offensive. Napoleon had been ordered to cross the Alps and join up with the Army of the Rhine, then campaigning on the Danube. Napoleon's route would take him up the Adige valley towards Trento, and then across the Brenner Pass to Innsbruck.
At the same time Würmser had been ordered to make a second attempt to lift the siege of Mantua. This time he decided to advance down the Brenta valley and emerge onto the northern Italian plain to the north east of Vicenza (the upper Brenta valley comes within a few miles of the Adige just to the east of Trento, and the two valleys are connected by a short low level pass).
Once on the Italian plains Würmser would join with another Austrian army under General Mészáros, and the combined army would advance towards Mantua from the east. Field Marshal Davidovich would defend the area around Trento. Both expeditions began at about the same time, so while Würmser was moving east along the Brenta, Napoleon was moving north up the Adige valley. On 3 September the French forced their way past Davidovich's defences around Rovereto, and on 4 September broke through a second line at Calliano. Davidovich was forced to abandon Trento.
Only now did Napoleon learn of Würmser's movements. Napoleon's response demonstrated another of the keys to his military success – rapidity of movement. While a small force under General Vaubois was sent north to follow Davidovich, Napoleon's main army turned east to catch Würmser. Some sources suggest that Napoleon learnt of Würmser's movements before the battle of Rovereto, but a look at the map would suggest that this is incorrect. From any position south of Rovereto Napoleon had much better routes east to intercept Würmser, including retracing his steps down the Adige valley. Only the slow pace of Würmser's movement allowed Napoleon to catch and defeat him at Bassano.
Würmser was caught completely off guard, and dangerously out of position. His army was spread out, with one division still in the mountains at Primolano, a second at Bassano, at the edge of the plains, and a third at Vicenza. Napoleon's advance guard defeated Quosdanovich's division at Primolano (7 September 1796). On the following day, after another rapid march, Napoleon defeated Würmser at Bassano (8 September 1796) and split his army in two. Quosdanovich was forced to retreat east towards Treviso, while Würmser escaped towards Vicenza. Over the next few days Napoleon attempted to complete the destruction of Würmser's army, but eventually he and around 12,000 men arrived outside Mantua. A two day long battle followed (San Giorgio), but on 15 September Würmser was forced to seek refuge inside the city.
The trapped Würmser was replaced as Austrian commander-in-chief in northern Italy by Field Marshal Joseph Alvinczy. He was given command of two armies – 27,000-30,000 men under General Quosdanovich at Friuli, at the north eastern corner of the north Italian plain and 17,000-20,000 men under Davidovich in the Tyrol. Alvinczy accompanied Quosdanovich's army.
Sickness and the accumulated losses of a long campaign meant that Napoleon now had around 28,000 men available for his field army. General Vaubois had 10,000 men at Lavis, just to the north of Trento in the upper Adige valley, facing Davidovich. Masséna had 9,500-10,000 men at Bassano, on the Brenta River, facing Quosdanovich. Augereau had 8,000 men at Verona, from where he could move to support either wing. Finally 8,000 men under General Kilmaine were blockading Mantua.
Alvinczy is normally criticised for splitting his forces and thus allowing Napoleon to defeat him in detail, but the Austrian plan came very close to success. Alvinczy realised that both of his field armies outnumbered their French opponents. With three divisions at his disposal Napoleon could only bring two of them to bear against a single Austrian army, and would still be outnumbered. It was unlikely that Napoleon would risk a second advance up the Adige valley to fall on Davidovich, so he would probably have to move east to attack Quosdanovich's larger army.
Alvinczy began his campaign on 1 November, when he crossed the Paive River. On 4 November Masséna pulled back from Bassano to Vicenza, and then to Montebello, where he met up with Augereau, giving him around 18,000 men to face at least 27,000 Austrians. Despite this Napoleon ordered Masséna to attack the Austrians on the Brenta River. On 6 November Masséna and Augereau launched attacks on the Austrians at Citadella and Bassano, but were repulsed by Generals Liptay and Provera. Masséna and Augereau then pulled back to San Martino, three miles east of Verona. Alvinczy reached Vicenza on 8 November and Montebello on 9 November.
Davidovich's advance down the Adige valley also met with success. On 2 November he repulsed a French attack at Lapis. After fighting on 6-7 November Vaubois was forced back from Caliano, and retreated to Rivoli. The two Austrian armies were now dangerously close to joining up. By 11 November Alvinczy had reached Caldiera, on the road between Vicenza and Verona, while his rearguard was at Villanova. Davidovich was only fifteen miles away, and if he had continued to press down the Adige valley would almost certainly have been able to join up with his commander. The Austrian plan failed because it took Davidovich ten days to advance from Rivoli onto the plains west of Verona, a delay that gave Napoleon a chance to concentrate on Alvinczy.
Even with this advantage Napoleon came close to failure. On 12 November Masséna and Augereau attacked the Austrians at Caldiera, and suffered a heavy defeat. Even Napoleon was discouraged by this, sending a very downbeat letter to the Directory in Paris, but he decided to risk one more attack. The Austrian position did have one weak spot. Alvinczy was advancing west towards the fortified and defended city of Verona, with the mountains to his right and the un-fordable Adige to his left. His only line of retreat was across a narrow band of dry ground at Villanova, at the northern tip of a triangle of swampy ground between the junction of the Adige and Alpone rivers.
Napoleon decided to attack across the Adige at Ronco, just above the junction with the Alpone. The battle that followed took its name from the village of Arcole, on the eastern bank of the Alpone, where some of the key fighting took place (battle of Arcola, 15-17 November 1796). Napoleon's first attack on 15 November failed, but it did alert Alvinczy to his danger, and gave him time to withdraw most of his troops from the trap. On the third day of the battle the French were finally successful, and the Austrians were forced to retreat east.
This victory came in the nick of time. On 17 November Davidovich finally forced the French back to Peschiera. If this advance had come any earlier Napoleon might have been trapped between two armies, but it did at least save Alvinczy from any serious pursuit. Napoleon was forced to turn west to help Vaubois. For a moment there was a chance that Davidovich would be trapped, but after fighting around Castelnuovo (21 November) he managed to escape north. Alvinczy took advantage of this to move west back to Caldiera, before retreating east against after the defeat of Davidovich.
Two months passed before Alvinczy launched the fourth and final relief effort. This time he led the main Austrian army, 28,000 strong, down the Adige valley, while General Provera with 18,000 men advanced towards Verona and Legnago from the east. This time the two Austrian armies were meant to operate independently, and both should have been strong enough to defeat the French troops on their respective fronts. Napoleon had less than 30,000 men available for his field armies, split into three divisions. Augereau was based around Vicenza, where he would face Provera. Joubert with 10,000 men was at La Corona, just to the north of Rivoli, where he would face Alvinczy. Finally Masséna was in a central position at Verona.
The Austrian advance was underway by 10 January. Two days later one of Provera's columns was repulsed from Verona, but on 14 January his main column crossed the Adige, broke through Augereau's centre and made for Mantua. This success came to nothing, for on 13 January Napoleon realised that Alvinczy's was the main effort, and ordered all of his available troops to concentrate at Rivoli. Napoleon himself arrived just after midnight, Masséna arrived at about dawn and Rey arrived at around noon. Napoleon was thus able to feed reinforcements into the fighting whenever a crisis loomed.
He was also helped by the Austrian plan of attack, designed on the previous day to ensure the complete destruction of Joubert's isolated division. Alvinczy's six divisions attacked in three main columns – two divisions attacked along the Adige, three attacked the centre of the French line and the final division was sent on a wide outflanking movement. Napoleon was able to defeat each part of the Austrian army in turn, and Alvinczy was eventually forced to abandon the attack. By the end of the battle of Rivoli the Austrians had lost around 10,000 men, and another 5,000 were captured by Joubert over the next couple of days.
While Joubert moved north after Alvinczy Napoleon and Masséna rushed south to prevent Provera from reaching Mantua. On 16 January Provera was caught at between Masséna and the troops besieging Mantua, and was forced to surrender (battle of La Favorita). The defeat of the forth relief effort effectively doomed Mantua. Two weeks later, on 2 February, Würmser surrendered to Sérurier.
As Mantua was capitulating Napoleon was heading south on a second invasion of the Papal States. This time he advanced down the east coast as far as Ancona before the Pope sued for peace. On 19 February Napoleon and the Papal representatives agreed to the Treaty of Tolentino. The Pope ceded Bologna, Ferrara and Ancona to the French and recognised the seizure of Avignon and the surrounding area in 1791.
Napoleon's next task was the invasion of Austria. He now faced the same problem that had crippled every Austrian attempt to save Mantua – there were two routes across the Alps and Napoleon couldn't afford to leave either of them unguarded while he used the other. The first route led up the Adige valley into the Tyrol, across the Brenner Pass to Innsbruck then east along the northern side of the Alps to Vienna. The second crossed the Julian and Carnatic Alps, at the north eastern corner of Italy, and ran from Udine to Villach, then east to Klagenfurt before turning north east to run around the eastern end of the Alps up to Vienna. It was also possible to advance to the southern end of the Brenner Pass and then turn east to pass through the mountains to Klagenfurt.
The court at Vienna realised that it faced a serious crisis and appointed the Archduke Charles to command the army facing Napoleon. Charles had recently inflicted a serious defeat on the French armies operating across the Rhine, and was perhaps the most able of all Austrian generals of the period. He immediately realised that the best way to oppose Napoleon was to concentrate his army in the Tyrol. If Napoleon attempted to use the eastern route across the Alps then Charles could move south and cut him off. The French would have to turn north to fight the Austrians in the Tyrol. Charles's original position around Innsbruck also made it much easier for Austrian reinforcements to reach him.
Unfortunately for Charles the Austrian government didn't agree with his plan, and he was ordered to make his stand on the Piave River to cover the port of Trieste. He arrived on the Piave on 11 February 1797 and prepared to fight a defensive campaign. At this date he had 22,000 soldiers on the Piave, and 10,000 soldiers and as many militia in the Tyrol, and he had been promised close to 50,000 reinforcements, but very few would reach him in time to play any part in the battles to come.
Napoleon now had the largest army available to him at any point in the campaign. He had requested 30,000 reinforcements, and had received 20,000 of them, under Delmas and Bernadotte, and the fall of Mantua freed up thousands more. When the campaign began he was able to leave 18,000 men in the Tyrol (Joubert, Delmas and Baraguay d'Hilliers) and lead 34,000 men in four divisions himself (Sérurier, Masséna, Guyeux and Bernadotte). Napoleon's plan was for Joubert to push the Austrians in the Tyrol back across the Brenner Pass to Innsbruck, while he advanced across the Carnatic and Julian Alps. If Joubert was successful he could turn east and advance along the Drave Valley to join Napoleon at Villach or Klagenfurt.
At the start of March the Austrians had 3,000 men under General Lusignan just inside the mountains at Feltre on the Piave, guarding their lines of communication to the Tyrol and 22,000 men under the Archduke Charles along the Piave between the mountains and the sea. Napoleon sent Masséna to deal with Lusignan, while he led his main force to the Piave.
Masséna began his advance on 10 March. Lusignan retreated up the river from Belluno, but on 13 March was forced to stand and fight between Polpet, where the valley of the Piave turns north and enters the high mountains, and Longarone, five miles to the north. Masséna was then free to turn south, crossing the Tagliamento River near Spilimbergo (five miles south of the start of the mountains) on 16 March. Masséna then moved north along the Tagliamento to Gemona. He then advanced north east along the mountain passes to Pontebba, from where he threatened Charles's right and the crucial Tarvis pass.
On 13 March Napoleon's main force crossed the Piave and advanced towards the Tagliamento at Valvasone. On 16 March Bernadotte and Guyeux's divisions forced their way across the river (battle of the Tagliamento) in one of the few recognised set-piece battles of the campaign. The Austrians lost 500 men and were forced to retreat east.
After the defeat on the Tagliamento Charles split his army. Bajalich, with his division, 25 guns and a large supply convoy, was sent east to Cividale, at the edge of the mountains. From there he was to cross the mountains to Caporetto in the upper Isonzo valley and then follow an alternative route to Tarvis. Charles hoped that this division would arrive in time to keep the pass open, for if the French captured Tarvis then Charles's reinforcements would have had to follow a very long route around the eastern side of the mountains to reach him on the Isonzo. The rest of the army pulled back to Gradisca on the lower Isonzo. Charles hoped to defend that river, which was the last natural barrier before Trieste.
The French soon forced their way across the Isonzo, taking 3,000 prisoners in Gradisca. Napoleon attempted to push the Austrians into the mountainous upper reaches of the Isonzo valley, but Charles escaped this trap and withdrew east towards Adelsberg (now Postojna) then north east towards Laybach (Ljubljana), with Bernadotte in pursuit.
Napoleon now turned north. Guyeux was sent to chase Bayalitsch through Cividale and Caporetto while Napoleon and Sérurer advanced up the Isonzo towards Caporetto. At the same time Masséna was advancing towards the Tarvis pass. On 20 March he captured Chiusa, at the southern end of the Pontebba pass, and on 21 March he reached Pontebba.
Charles now realised that Bajalich's column was in serious danger, with Masséna ahead of him and Napoleon close behind. Tarvis was defended by a weak force under General Ocskay, made up of the survivors of Lusignan's division. Charles made a dash through the mountains, using a minor pass at Krainberg (near Arnoldstein, east of Tarvis) and reached Villach. There he gathered together around 6,000 men and advanced towards Tarvis.
The exact sequence of events around Tarvis is somewhat obscure, with different sources giving different details. The basic outline seems clear – Masséna captured the pass. Charles counterattacked and drove the French east back towards Pontebba. Masséna then gathered his entire division together and retook the pass. Bajalich then arrived on the scene, although his exact route is not given, and found himself trapped between Masséna and Napoleon. Bajalich and around 4,000 of his men were captured. The name generally given to this battle is Malborghetto (23 March 1797), but that village is some way west of the top of the pass, where the fighting against Charles is said to have taken place, and so may refer to the capture of Bajalich. At the end of this battle Charles withdrew to Klagenfurt.
Napoleon was now across the Alps, and in the valley of the Drave. He was still faced by a large Austrian army, and Charles was now beginning to receive reinforcements. Napoleon had taken this into account, and soon after crossing the Tagliamento had ordered Joubert to join him on the Drave.
Joubert's own campaign had been just as successful as Napoleons. He was facing two Austrian generals – Kerpen and Laudon – who repeatedly received reinforcements from the north, but he defeated them at St. Michael on 20 March and Neumark on 22 March. After this second defeat the Austrian forces split. Joubert chased Kerpen to Brixen, at the foot of the Brenner Pass, and defeated him twice more, at Klausen (Chiusa) and Mittenwald. Kerpen retreated across the Brenner to Innsbruck, leaving Joubert free to turn east to advance down the Drave.
On 31 March Napoleon advanced to Klagenfurt. His plan was to approach Vienna across the Semmering pass, taking the road that led to Leoben. On 31 March, while at Klagenfurt, he wrote a letter to the Archduke making tentative peace feelers. Napoleon was aware that he was in a vulnerable position. A revolt had broken out in Venice, which threatened his rear, and if the campaign went on too long then the Austrians could concentrate new armies against him. Napoleon needed a quick diplomatic victory.
For the moment all Charles could do was forward the letter to Vienna and attempt to stop Napoleon's advance. On 1 April the French pushed back the Austrian advance guard at St. Veit, their main force at Friesach, and forced them out of the gorges of Neumark. Another victory followed at Unzmarkt (3 April), and on 7 April the French entered Leoben.
Napoleon's advance had triggered a panic in Vienna. While the court prepared to evacuate the city, Generals Bellegrade and Meerfeld were sent to Leoben to ask for a ten day armistice. Napoleon agreed to five days, and pushed his advance guards forward to Semmering. Negotiations began on 13 April, and 18 April resulted in the Preliminaries of Leoben. The Emperor Francis II agreed to surrender Belgium to France and to acknowledge France's new frontier on the Rhine. Lombardy was also surrendered, and the new republics in northern Italy acknowledged (Cisalpine around Milan and Cispadine around Modena). In return Austria was to be given Venice's land provinces in northern Italy although at this stage Venice herself was to remain independent. Although the negotiations dragged on for most of the year, Leoben marked the effective end of the War of the First Coalition. Napoleon spent most of 1797 as the virtual ruler of northern Italy, negotiating on equal terms with the Austrian emperor. The peace was finally formalised as Treaty of Campo Fornio (17th October 1797). | 2019-04-23T20:57:45Z | http://www.historyofwar.org/articles/campaign_napoleon_italy_1796.html |
Design of an MRM assay to determine the absolute quantity and stoichiometry of ubiquitous and tissue-specific human 20S proteasome subtypes.
Use of purified isotopically labelled 20S proteasome as internal standard for accurate quantification.
Variation in the expression of immunoproteasome in adipocyte-derived stem cells (ADSCs) grown under different O2 levels might be causal for change in cells differentiation capacity.
The status of 20S proteasome during ADSCs expansion might constitute an additional relevant quality control parameter to contribute to predict, among other quality markers, their therapeutic capacity.
The proteasome controls a multitude of cellular processes through protein degradation and has been identified as a therapeutic target in oncology. However, our understanding of its function and the development of specific modulators are hampered by the lack of a straightforward method to determine the overall proteasome status in biological samples. Here, we present a method to determine the absolute quantity and stoichiometry of ubiquitous and tissue-specific human 20S proteasome subtypes based on a robust, absolute SILAC-based multiplexed LC-Selected Reaction Monitoring (SRM) quantitative mass spectrometry assay with high precision, accuracy, and sensitivity. The method was initially optimized and validated by comparison with a reference ELISA assay and by analyzing the dynamics of catalytic subunits in HeLa cells following IFNγ-treatment and in range of human tissues. It was then successfully applied to reveal IFNγ- and O2-dependent variations of proteasome status during primary culture of Adipose-derived-mesenchymal Stromal/Stem Cells (ADSCs). The results show the critical importance of controlling the culture conditions during cell expansion for future therapeutic use in humans. We hypothesize that a shift from the standard proteasome to the immunoproteasome could serve as a predictor of immunosuppressive and differentiation capacities of ADSCs and, consequently, that quality control should include proteasomal quantification in addition to examining other essential cell parameters. The method presented also provides a new powerful tool to conduct more individualized protocols in cancer or inflammatory diseases where selective inhibition of the immunoproteasome has been shown to reduce side effects.
Some hematopoietic malignancies can be successfully treated by inhibition of the catalytic core 20S proteasome complex, and more recent findings indicate that the proteasome is a promising target for the treatment of other cancer types or other pathologies including inflammatory diseases (1⇓–3).
Although the cylindrical α7β7β7α7 barrel-like structure of the 20S catalytic core proteasome has been preserved throughout evolution, the oligomeric protease has evolved, resulting in a higher heterogeneity of subunit compositions in mammals. As schematically represented in Fig. 1A, there exist at least six distinct forms of 20S proteasomes in human cells and tissues. The standard 20S proteasome (sP20S)1 is composed of constitutive (α1–α7 and β3, β4, β6, and β7) and catalytic subunits (β1, β2, and β5). It is the most abundant 20S subcomplex in most cell types, but significant amounts of other 20S forms have been observed in some human tissues and cells in their basal state or are induced in specific environmental conditions (4). For instance, in response to pro-inflammatory cytokines or in immune cells, the three catalytic subunits of the sP20S can be replaced in a highly regulated way by their immuno counterparts to form the immunoproteasome (iP20S), which has nonidentical cleavage specificities (5). Two intermediate proteasomes harboring a mixed assortment of standard and immunocatalytic subunits (β1i P20S, β1iβ5i P20S) have also been observed in various human tissues and cells, and their existence is consistent with the rules of cooperative assembly of inducible catalytic subunits (6). Some other 20S subtypes are much more tissue-specific, such as the thymoproteasome (containing β1i, β2i and β5t catalytic subunits) and the spermatoproteasome (containing a specific isoform of α4 called α4s) which are found in the thymus and male germ cells, respectively. The environment- or tissue-specific subunit composition of human 20S proteasome has been shown to fulfill specialized functions that the standard proteasome can only exert suboptimally (4). For example, immune cells contain a significant proportion of immunosubunit-containing 20S proteasome subtypes which display specific proteolytic preferences thanks to which they produce antigens for presentation to CD8 T cells (6). In the thymus, the unique cleavage preference of β5t explains the essential role played by the thymoproteasome in the positive selection of developing T lymphocytes (7). Thus, knowledge of 20S proteasome composition will help us to better understand proteasome function in a given tissue or cell type. It is also crucial when developing novel therapeutic strategies targeting specific 20S proteasome variants. Indeed, the immunoproteasome is a valuable target in several ongoing oncology trials as well as in the treatment of inflammatory and autoimmune diseases (2, 3, 8). Thus, to assess proteasome status, by determining the absolute quantity and stoichiometry of all subtypes, precise and accurate absolute quantification of several subunits from the same biological sample is required. As mRNA and protein levels reported from proteomic and transcriptomic analyses show a low correlation (9), quantification must be performed at the protein level to allow an accurate and complete description of the 20S proteasome status. Several ELISA protocols have been published or are commercially available to determine absolute levels of both 20S and 26S proteasome complexes, but only at the global level, i.e. they make no distinction between the different subcomplexes (6, 10⇓⇓⇓–14). Only Guillaume et al. (6) considered the heterogeneity of 20S subtypes when developing their ELISA assay by using different in-house produced antibodies directed against four different standard and immunocatalytic β subunits. More recently, standard and immunoproteasome subtypes were determined by surface plasmon resonance imaging (SPRI) using specific inhibitors (15). However, the multiplexing capacity of these methods is insufficient to fully assess proteasome heterogeneity in a single assay.
To overcome this limitation, we propose to use Selected Reaction Monitoring (SRM), an isotope dilution mass spectrometry (IDMS)-based technique which has been approved for the quantification of multiple biomolecules. In addition to its robustness, precision and accuracy, the main advantage of SRM is its capacity to quantify many analytes simultaneously. SRM has recently been successfully applied in protein assays (16, 17). In these studies, the proteins themselves were not directly detected and quantified, but were analyzed at peptide level, after enzymatic proteolysis. This is a critical step because, in most cases, the absolute quantification relies on the addition of an isotopically-labeled peptide standard (called AQUA peptide) (18) late in the experimental workflow, which might introduce a high variability because of differences in sample preparation. Thus, for accurate and robust absolute quantification of proteins, and to determine protein stoichiometry within protein complexes, the use of isotope-labeled peptides as internal standards requires careful optimization of experimental conditions (19). An alternative approach based on artificial genes coding for concatenated proteotypic peptides (QconCAT strategy) (20) may be used to decrease quantification biases. For robust absolute quantification, an isotope-labeled equivalent of the full-length target protein is considered the ideal internal standard. Several approaches based on the synthesis of heavy versions of the protein of interest have emerged recently. Most of them rely on metabolic labeling and purification of a recombinant version of the protein of interest, or a shorter specific protein sequence, like the Protein Standards for Absolute Quantification (PSAQ) (21), absolute SILAC (22), PrEST (23), FlexiQuant (24), and TAQSI (25) methods. Another approach consisting in the chemical labeling of proteins using isobaric stable isotope tagging technology (26) has recently been described to reduce costs and the time required to grow cells in heavy amino acid-containing media. In all these approaches, because the internal standard is processed together with its endogenous analog throughout the whole workflow, accuracy is markedly better than achievable with AQUA and QconCAT approaches when determining absolute quantities of proteins in various matrices (17). However, to our knowledge, the absolute quantification relying on the isotopic dilution of labeled proteins has been limited so far to monomers, and no reports of assays to determine the stoichiometry of macromolecular complexes have been published.
Mesenchymal stem/stromal cells (MSC) hold great potential in regenerative medicine because of their multi/pluripotency and immunosuppressive properties. Over the last decade, the clinical use of MSC has rapidly increased, and more than 800 clinical trials assessing MSC therapy in multiple clinical settings are currently registered (https://www.clinicaltrials.gov/). Adipose-derived Stem Cells (ADSCs) are a subclass of mesenchymal stem/stromal cells initially derived from the bone marrow. However, to obtain the critical number of cells before transplantation, ADSCs must be expanded in vitro. This essential step has raised important concerns about the quality of adult stem cells, and interpatient variability is a challenge when seeking to define ADSCs. The development of uniform protocols for both preparation and characterization of MSCs, including standardized functional assays to assess their biological potential, will be critical in contributing to their clinical utility.
Here, we applied the SILAC method to engineered cell lines expressing either the standard 20S proteasome or the immunoproteasome to produce and purify isotope-labeled, endogenous versions of standard proteasome and immunoproteasome in vivo. These isotope-labeled proteasome complexes were used as internal standards to quantify the absolute concentration of all 20S catalytic and noncatalytic subunits in biological samples of various origins. The method developed was applied to determine the absolute concentration of total 20S proteasomes and the exact stoichiometry of six ubiquitous and tissue-specific 20S proteasome subtypes in a multiplexed LC-SRM assay with high precision (>92%), accuracy (>90%), and sensitivity (<1 fmol on column). Our results show that the absolute quantity and stoichiometry of the proteasome are challenged both by IFNγ stimulation and O2 levels during ex vivo expansion of primary ADSCs. Thus, determining proteasome status, which is a central contributor to maintaining stem cell homeostasis—characterized by stemness, capacity for self-renewal and cell differentiation (27⇓–29)—might constitute an additional relevant quality control parameter for the production of ADSCs for clinical applications, which is of interest as the number of quality markers currently available is limited (30). Furthermore, accurate and precise assessment of proteasome abundance and heterogeneity could also help when seeking to achieve selective inhibition of a proteasome subtype, like the immunoproteasome, for personalized therapies in cancer or autoimmune diseases. This is the first study to report the simultaneous determination of absolute quantity and stoichiometry for macromolecular complexes based on the isotopic dilution of labeled proteins in numerous human tissues and primary ADSCs culture.
HEK 293T, HCT116, HeLa, and RKO cell lines were grown in DMEM medium supplemented with 10% fetal bovine serum (FBS). U937, HeLa S3, and NB4 cell lines were grown in RPMI 1640 medium supplemented with 10% FBS. KG1a cell line was grown in RPMI 1640 medium supplemented with 20% FBS. MRC5 cell line was grown in MEM-α medium supplemented with 10% FBS. All cultures were supplemented with 2 × 10−3 m glutamine, 100 units/ml penicillin, 100 μg/ml streptomycin, and maintained at 37 °C under 5% CO2. Unsynchronized cells were harvested at 80% confluence for adherent cells or at a concentration of 1×106 cells per ml of culture for suspension cells. HeLa cells were treated with interferon-γ (R&D Systems, Minneapolis, MN) at 100 ng/ml in fresh medium.
Human 293-EBNA cells, “HEK-EBNA sP20S” (mainly expressing sP20S), and 293-EBNA cells engineered to express iP20S, “HEK-EBNA iP20S” (by transfecting 293-EBNA cells with cDNAs encoding the three immunocatalytic subunits β5i, β1i and β2i) were obtained as previously described (6). HEK-EBNA sP20S cells were cultured in SILAC medium which is composed of DMEM supplemented with 10% dialyzed FBS, 4 mm l-glutamine, 200 mg/L l-Proline, 100 mg/ml l-arginine (13C6), and l-lysine (13C6) (Cambridge Isotope Lab., Tewksbury, MA), 100 IU/ml penicillin and 100 μg/ml streptomycin in 150 cm2 culture plates and maintained at 37 °C under 5% CO2. HEK-EBNA iP20S were cultured in the same SILAC medium as HEK-EBNA sP20S, but further supplemented with 5 μg/ml Puromycin and 600 μg/ml Hygromycin to maintain selective pressure. Ten cellular doublings were performed in this medium to achieve an incorporation rate of 95% heavy amino acids in proteins (assessed by MS). Standard 20S proteasome and iP20S were then purified as described earlier (31). Absolute quantities and purities of both purified proteasome subtypes were then assessed as described in Supplementary information I-1. Isotope-labeled sP20S and iP20S were stored as 10-μl aliquots at 1.158 and 0.980 pmol/μl, respectively, in 20 mm Tris/HCl, pH 7.2, 1 mm EDTA, 1 mm DTT, 10% glycerol, and at −80 °C to ensure stability over time.
Whole-cell lysates from various human tissues were supplied by AMSBio (Cambridge, MA) (HT-201 (Brain); HT-311 (Colon); HT-804 (Heart); HT-314 (Liver); HT-601 (Lung); HT-406 (Ovary); HT-102 (Skeletal muscles); HT-701 (Spleen); HT-401 (Testis); HT-704 (Bone Marrow); P1234264 (Thymus)).
Human ADSC were isolated from subcutaneous adipose tissue (AT) obtained from nonobese human donors (body mass index <26) undergoing elective abdominal dermolipectomy (Plastic Surgery Department, Rangueil Hospital, Toulouse, France). No-objection certificates were obtained to comply with bioethics law no. 2004–800 of 6 August 2004. The stromal vascular fraction (SVF) was obtained by enzymatic digestion of adipose tissue (AT) with collagenase NB4 (Roche Diagnostics, Indianapolis, IN). Cells were then seeded at 4000 cell/cm2 (P0) and cultivated in α-minimal essential medium supplemented with 10% FBS (Gibco), 100 μg/ml streptomycin, 100 U/ml penicillin, 25 μg/ml amphotericin (Thermo Fisher Scientific Life Sciences, Waltham, MA). Medium was changed twice a week. Cells from the same patients were cultured under normoxic (20% O2, 5% CO2) or hypoxic (1% or 5% O2, 5% CO2) conditions in an Xvivo System (BioSpherix, Paris, NY) to maintain cells in hypoxic conditions at all culture steps. Interferon-γ (100 ng/ml) was added to the medium in some experiments.
Our experimental protocols were approved by French research ministry's institutional ethics committee of (N°: DC-2015-23-49) and informed consent was obtained from all subjects in line with current regulations (no subjects age under 18 were included).
ADSCs obtained from patients were seeded at 20,000 cell/cm2 and were exposed to an adipogenic mixture containing IBMX (3-isobutyl-1-methylxanthine) 0.45 mm, Dexamethazone 1 μm and Indomethacine 60 μm. An immunoproteasome inhibitor, 100 nm ONX-0914 (solubilized in 0.001% DMSO), was also added to the cell medium in some conditions; 0.001% DMSO was added to the control condition in these cases. Cells were grown at 37 °C under normoxic (20% O2) or hypoxic conditions (5% and or 1% O2). The medium was changed every 2–3 days throughout the culture process. At the end of experiment, the cell lineage was determined using Oil Red O which stains for adipocytes.
When they reached 80% confluence, HEK-EBNA cell lines (HEK-EBNA sP20S or HEK-EBNA iP20S) were harvested in HKMG buffer (10 mm Hepes pH 7.9, 10 mm KCl, 5 mm MgCl2, 10% glycerol, 10 mm ATP, 1% NP40, protease and phosphatase inhibitor (Roche, Bâle, Switzerland)) and centrifuged for 10 min at 10,000 × g. Supernatants were kept and used for proteasome immuno-purification as previously described (31).
ELISA-based absolute quantification of the 20S proteasome was performed as previously described (14). Briefly, ELISA assays were performed in 96-well plates (IMMULON HBX 4, Thermo Scientific). The plate was coated with 100 μl MCP21 monoclonal antibody (European Collection of Cell Cultures) at 5 μg/ml by incubation at 4 °C overnight. Wells were then washed 3 times with PBS/T-buffer. Nonspecific sites were blocked by incubation with 2% BSA in PBS for 1 h at room temperature with slow shaking. The plate was washed 3 times with PBS/T-buffer. The samples (cell lysates) were then deposited in triplicate and incubated for 2 h at room temperature. The plate was washed with PBS/T-buffer and then incubated with the polyclonal rabbit anti-20S antibody (PW 8155, ENZO LIFE Sciences, Farmingdale, NY) for 1 h at room temperature under slow shaking. The plate was washed 3 times with PBS/T-buffer and antibody binding was revealed using horseradish peroxidase-conjugated anti-rabbit antibody and 2 mg/ml ABTS substrate (2,2-azino-bis(3-ethylbenzthiazoline-6-sulfonic acid)). The reaction was monitored by measuring the optical density at 416 nm (μQuant; Bio-Tek instruments, Inc., Winooski, VT). The amount of proteasome in the sample was calculated by comparison with the calibration curve produced with purified 20S proteasome purified from human erythrocytes (ENZO LIFE SCIENCE). A linear dose-response was observed between 0 and 20 ng.
Cultured cells were harvested in HKMG buffer and sonicated in ice with a Bioruptor Plus (Diagenode, Liège, Belgium) (15 min, cycle 45 s/15 s (ON/OFF), position High). Protein concentration was determined by detergent-compatible protein assay (DC Assay - BioRad, Hercules, CA) according to the manufacturer's recommendation. Proteasome activity was assayed in 96-well black plates (Greiner Bio-One, Frickenhausen, Germany). 10 μl of each lysate fraction were added to 40 μl of Tris-HCl 100 mm and 50 μl of Suc-LLVY-AMC (for chymotrypsin-like activity), Boc-LRR-AMC (for trypsin-like activity) and Z-LLE-AMC (for PGPH activity) substrate in 200 mm Tris-HCl, pH 8 (Enzo Life Science) at a final concentration of 400 μm/well. Kinetic assays were performed at 37 °C in a FLX-800 spectrofluorometer (BIOTEK) over 90 min, reading fluorescence every 5 min, at 460 nm following excitation at 360 nm.
Samples were heated to 95 °C for 5 min in Laemmli buffer to denature proteins; 100 mm chloroacetamide was then added to the sample followed by incubation for 30 min at room temperature in the dark. Proteins were loaded onto a 12% acrylamide SDS-PAGE and concentrated in a single band, visualized by Coomassie staining (Instant Blue - Expedeon). The gel band containing the whole sample was cut and washed several times in 50 mm ammonium bicarbonate, acetonitrile (1:1) for 15 min at 37 °C. Trypsin (Promega) digestion was performed over night at 37 °C in 50 mm ammonium bicarbonate at a trypsin/total protein ratio of 1/50. Peptides were extracted from the gel by two incubations in 10% formic acid, acetonitrile (1:1) for 15 min at 37 °C. Extracts were dried in a SpeedVac, and resuspended in 2% acetonitrile, 0.05% trifluoroacetic acid prior to LC-MS/MS analysis.
For LC-SRM analysis, 1 pmol of labeled iP20S and 1 pmol of labeled sP20S were added to 25 μg of total proteins before the protein denaturation step. When used, AQUA peptides (Thermo Scientific Pierce Protein Research) were spiked into samples just before mass spectrometry analysis at a concentration resulting in injection of a final quantity of 70 fmol.
Peptide mixtures were analyzed by nano-LC-MS/MS using an Ultimate3000 system (Dionex Sunnyvale, CA) coupled to an LTQ-Orbitrap Velos mass spectrometer (Thermo Fisher Scientific) when analyzing human tissue extracts or to a Q-Exactive Plus mass spectrometer (Thermo Fisher Scientific) when analyzing ADSCs. Five microliters (human tissue) or two microliters (ADSCs) of each peptide sample at 1 μg/μl were loaded onto a C18 precolumn (300 μm inner diameter × 5 mm; Thermo Scientific) at 20 μl/min in 5% acetonitrile, 0.05% trifluoroacetic acid. After 5 min of desalting, the precolumn was switched online with the analytical C18 column (75 μm inner diameter x 50 cm; home-made) equilibrated in 95% solvent A (5% acetonitrile, 0.2% formic acid) and 5% solvent B (80% acetonitrile, 0.2% formic acid). Peptides from human tissues were eluted using a 5–50% gradient of solvent B over 105 min at a flow-rate of 300 nL/min and peptides from ADSCs were eluted using a 5–25% gradient of solvent B over 165 min and a 25–50% gradient of solvent B over 135 min at a 300 nl/min flow rate. Both mass spectrometers were operated in data-dependent acquisition mode. During the analysis with the LTQ-Orbitrap Velos, survey scan MS spectra were acquired in the Orbitrap over the 350–1800 m/z range with resolution set to 60,000 (these parameters were 350–1500 m/z and 70,000 with Q-Exactive Plus, respectively). On the LTQ-Orbitrap Velos, the twenty most intense ions per survey scan were selected for CID fragmentation, and the resulting fragments were analyzed in the linear trap (LTQ). On the Q-Exactive Plus, the ten most intense ions per survey scan were selected for HCD fragmentation, and the resulting fragments were analyzed in the Orbitrap. Dynamic exclusion was used with a 60-s or a 30-s window (on the LTQ-Orbitrap Velos or the Q-Exactive Plus, respectively) to prevent repeated selection of peptides.
Raw mass spectrometry files were processed using MaxQuant (version 1.5.5.1) and Andromeda was used to match MS/MS spectra against the Human SwissProt database (March 2017 release - 20,181 entries for human tissues analysis/release of August 2018 - 20,386 entries for ADSCs analysis) and a list of potential contaminant sequences provided in MaxQuant1.5.5.1., with Carbamidomethylation of cysteines set as fixed modification. Oxidation of methionine and protein N-terminal acetylation were set as variable modifications. The digestion specificity of trypsin was defined as cleavage after K or R, and up to two missed trypsin cleavage sites were allowed. The precursor mass tolerance was set to 20 ppm for the first search and 4.5 ppm for the main search. The mass tolerance in MS/MS mode was set to 0.8 Da for tissue analysis and to 20 ppm for ADSC analysis. Minimum peptide length was set to seven amino acids, and minimum number of unique peptides was set to 1. A target-decoy approach was used to validate hits, using a reverse database and applying a peptide and protein false-discovery rate of 1%. The “match between runs” option in MaxQuant was enabled, with a time window of 0.7 min, to allow cross-assignment of MS features detected in different runs. Only unique peptides were used for quantification when analyzing human tissues, whereas both unique and razor peptides were used for the quantification when dealing with ADSCs data. Quantitative proteomic analysis was performed on the normalized LFQ intensities from the “proteinGroups” Table in the MaxQuant output. Protein entries identified as potential contaminants by MaxQuant were eliminated from the analysis, as were proteins identified by fewer than two peptides. Tissue-specific 20S proteasome subunits (α4s, β1i, β2i, β5i, and β5t) were compared across the different tissues based on their normalized LFQ intensities (Fig. 3B). To compare the proteomes of ADSCs grown under normoxic or hypoxic conditions, the LFQ intensity values were used for the quantitative analysis. Fold-changes were log2 transformed and thresholds calculated based on their distribution. The upper threshold was calculated as Q3 + 1.5 × IQ, and the lower threshold as Q1 − 1.5×IQ, where IQ is the interquartile, and Q1 and Q3 are the first quartile and the third quartile, respectively. Proteins with fold-changes outside these thresholds were considered outliers from the global distribution. Outlier proteins with a p value of less than 0.05 were considered as differentially expressed between normoxic and hypoxic conditions. GO terms enrichment analysis was performed on these proteins using GOrilla (32).
Dried peptide samples were resuspended in a solution containing 2% acetonitrile, 0.05% TFA, to obtain a final concentration of 1 μg/μl. To obtain data for the whole set of peptides/transitions, samples were injected twice as the list of transitions was split into two methods. The sample (2.5 μl, about 2.5 μg protein equivalent) was loaded onto the system and analyzed on a hybrid triple quadrupole-ion trap mass spectrometer 6500 QTrap (AB Sciex, Framingham, MA) equipped with a nanoelectrospray ion source coupled to an Ultimate 3000 system (Dionex) for chromatographic peptide separation. Separation was achieved using a 60 min gradient from 0 to 50% of solvent B (80% acetonitrile, 0.2% formic acid) at a flow-rate of 300 nL/min. Spray voltage was set to 2500 V, curtain gas to 35 psi, nebulizer gas to 5 psi, interface heater temperature to 75 °C, and cycle time to ∼3 s (3.1620 s and 3.0380 s for the two methods). Peptides were loaded onto a C18 precolumn (300 μm inner diameter × 5 mm; Thermo Scientific) at 20 μl/min in 2% acetonitrile, 0.05% trifluoroacetic acid. After 5 min of desalting, the precolumn was switched online with the analytical C-18 column (75 μm inner diameter × 50 cm; in-house-packed with Reprosil C18) and equilibrated in solvent A (5% acetonitrile, 0.2% formic acid).
Proteotypic peptide sequences were selected based on results of previous discovery experiments (33⇓–35) and by referring to the golden rules (16) (i.e. considering isoforms, variants, PTMs reported on protein sequence or possibly artifactually-induced by sample handling, or missed cleavages, observed in Protein (UniProt) or MS databases (PeptideAtlas)). To achieve maximal sensitivity, collision energies (CEs) were optimized within a 6 V window around the CE value recommended by Skyline software and based on the m/z of the precursor. Final SRM transitions are given in supplemental Data S3. Transitions could be unambiguously assigned thanks to the co-injected isotope-labeled peptides. Samples were run in a blinded fashion except for calibration curves, for which the lowest concentrations were injected first. To check system suitability and performance before injecting each batch of samples, Total Ion Current was tuned (chromatographic solvent ions of m/z 50 to 1000) at 2000 Da/s scan speed in Q1. Quality controls (QC) (20 fmol of tryptic digest of betagalactosidase; transitions are given in supplemental Data S4) were injected between each sample. Carry-over was checked by injecting tryptic digests of 100 fmol, 500 fmol or 1000 fmol of isotopically labeled sP20S and iP20S spiked in 2.5 μg of HeLa, then one QC sample, and finally a blank sample (the maximum carry-over observed was less than 0.01%). Quantitative reproducibility over time was checked based on signal intensities for heavy transitions (maximum deviation of 50% allowed); injection batches were generally carried out over periods of less than 1 week.
Quantitative data analyses were performed using Skyline-Daily open-source software (36). Area values for all transitions were first extracted automatically by the software, then checked manually and adjusted if necessary (i.e. exclusion of data points if S/N < 10). Light transition (L) peak area signals were then normalized with respect to their labeled counterparts (H) (after correction by considering the 95% incorporation rate for R(13C6) and K(13C6) in labeled sP20S and iP20S). For each transition, technical replicates of injection (typically three) were averaged. Ratios (L/H) of all the transitions used to assay a given protein or for total 20S proteasome (details in supplemental Data S3) were then averaged. The amount of labeled reference mix (containing equimolar concentrations of isotope-labeled sP20S and iP20S) spiked into the biological sample before sample preparation was then used to determine the absolute quantity of each proteasome subunit or total 20S proteasome. For each transition, LOD and LLOQ were experimentally determined by injecting heavy-isotope-labeled sP20S and iP20S spiked at increasing concentrations in a HeLa protein lysate and processed by the same method as applied to the other biological samples. LOD and LLOQ values were calculated using QuaSAR (37), which was implemented through the Skyline interface (see supplemental Data S5).
Targeted MS measurements were highly multiplexed, and used to quantify proteasome subunits across cell lysates, tissues and primary cells of human origin. The assay developed used internal standards for each analyte, to confidently detect and precisely quantify the proteins of interest. Thus, the analyses meet the expectations of Tier 2 level.
The concentrations and stoichiometries of all proteasome subtypes were determined as explained hereafter.
Total proteasome absolute quantity was calculated by averaging the quantities of all 20S noncatalytic subunits (α1–7; β3, β4, β6, β7) (mean (α1,2,3,5,6,7; β3,4,6,7) → Total P20S). A stoichiometry of two noncatalytic subunits per 20S proteasome and a molecular weight of 700,000 g/mol were used in these calculations.
As β5 is integrated into the standard proteasome, its fraction exclusively represents the fraction of standard proteasome (β5 → sP20S). Similarly, the level of β5t corresponds to the fraction of thymoproteasome “β5t P20S”, and can be obtained by subtracting the sum of β5 and β5i levels from the total amount of 20S proteasome (Total P20S − β5 − β5i = β5t → β5t P20S). As the β2i subunit is integrated into both the immunoproteasome and the thymoproteasome, the difference in its quantity compared with β5t can be used to determine the fraction of immunoproteasome (β2i − β5t → iP20S). The β1i-containing proteasome subtypes correspond to immunoproteasome, thymoproteasome, and intermediate proteasome β1i− β5i. Thus, the quantity of β1i β5i P20S is equal to the difference in abundance of β1i and β2i proteins because both immunoproteasome and thymoproteasome contain β2i (β1i − β2i → β1iβ5i P20S). β5i is contained in the immunoproteasome and in both types of intermediate proteasomes (β5i → iP20S + β5i P20S + β1iβ5i P20S). Thus, the amount of β5i P20S can be calculated as follows: β5i + β5t − β1i = Total P20S − β1i − β5 → β5i P20S.
Finally, the spermatoproteasome level can be determined from the quantity of the α4s isoform (PSA7L protein _PSMA8 gene) by subtracting the abundance of the α4 subunit from the total 20S proteasome content (using specific peptides of the PSA7 isoform_PSMA7 gene as detailed in supplemental Fig. 8A) (sP20S − α4 → α4s P20S).
All statistical analyses were performed on at least three independent biological replicates. For each biological replicate, results from at least two injection replicates were averaged. Probability values (p) were determined by one-way and two-tailed analysis of variances (ANOVA). Differences were statistically significant at confidence levels of 95% (*), 99% (**), or 99.9% (***).
Coefficients of variation were calculated as ratios of the standard deviation over the mean of the values and are expressed as a percentage. Accuracy was determined as the ratio of the difference of the experimental value and the reference value over the reference value and is expressed as a percentage.
The “human tissue extract” data set contains mass spectrometry results from the analysis of 11 different human tissues analyzed in triplicate, corresponding to 33 raw files. The “ADSC” data set contains mass spectrometry results from the analysis of three different patients under two different oxygen percentages used for cell culture, samples were analyzed in triplicates, and thus produced 18 raw files. Quantitative proteomic analysis was performed on the normalized LFQ intensities from the “proteinGroups” Table in the MaxQuant output.
The data sets corresponding to the mass spectrometry analyses presented in this study have been deposited in the following repositories: PRIDE (Project accession: PXD011894) for label-free MS analyses, and PeptideAtlas (Dataset identifier: PASS01219) for targeted MS analyses. The detailed descriptions of all analyses (raw and processed file names, sample name, biological replicate number, MS technical replicate number, corresponding figure) are summarized in supplemental Data S8.
The method aimed to simultaneously determine the absolute 20S proteasome quantity and subtype stoichiometry in a single assay. To achieve this goal, we designed a workflow combining IDMS and SRM to exploit its multiplexing capacity, sensitivity and robustness. In terms of total 20S proteasome absolute quantification, preliminary optimizations were used to select the most appropriate mode of internal standardization to correct for a range of experimental biases (Fig. 1B; supplementary Information I-1). As detailed in supplementary Information I-1 and supplemental Figs. S1–S5, the isotope-labeled whole proteasome complex added to biological preparations clearly provide a much more robust absolute quantification method than spiking with individual isotope-labeled “AQUA” proteotypic peptides for each 20S subunit. Indeed, despite good analytical performance in terms of reproducibility and linearity, absolute quantification using AQUA peptides technology lacked accuracy. This critical issue was overcome by using the absolute SILAC quantification method. We produced and affinity-purified isotope-labeled standard proteasome and immunoproteasome to obtain highly pure standards with a high level of subtype purity (min 99%) and with an excellent isotopic incorporation rate (min 95%) (supplementary Information I-1, supplemental Figs. S3–S4). The optimized quantification method then consisted in the distribution of a reference mixture of 20S proteasome subunits with carefully-controlled stoichiometry into protein lysates (Fig. 1B). After digestion of proteins using trypsin, an SRM method including at least one peptide sequence (with three associated transitions for each light and labeled surrogate) for the 11 noncatalytic subunits (α1–7; β3, β4, β6, β7) (supplemental Data S3) was applied. With this method, absolute quantification of total 20S proteasome was achieved in protein lysates of eight different human cell lines of diverse origins (HEK 293T, HCT116, RKO, U937, HeLa S3, NB4, KG1a, and MRC5). 20S proteasome concentration determined by the SRM method was compared with those obtained with the reference ELISA method (Fig. 2A). A high correlation was found between the two methods (coefficient of determination = 0.98; slope = 1.01). Altogether, these data demonstrate that the newly-developed method is suitable for absolute quantification of 20S proteasome in human cell lysates.
Workflow for determination of total 20S proteasome absolute quantity and stoichiometry by LC-SRM. A, Schematic representation of the six main 20S proteasome subtypes with different sets of subunits. The sP20S is the most abundant 20S subtypes in most cell types. The 20S proteasome subtypes containing at least one immunocatalytic subunit are predominantly observed in immune cells but can also be induced in response to inflammatory cytokines. Other 20S proteasome subtypes are tissue-specific, like the thymoproteasome (β5t P20S) and the α4s proteasome (α4s P20S) which have been observed in the thymus and in reproductive cells like testes, respectively. B, Determination of total 20S proteasome quantity and 20S subtypes stoichiometry in Human cell lysates or tissues using SRM. Endogeneous proteasomes contained in biological samples were digested with trypsin. The SRM approach was designed to quantify in a multiplexed manner a set of proteotypic peptides corresponding to α subunits, as well as β catalytic and noncatalytic subunits. Isotope-labeled standard and immunoproteasome complexes were used as internal standards in the final method. They were spiked in the biological sample at equimolar quantities before the tryptic digestion. Alternatively, heavy “AQUA” peptides were added to the endogeneous peptides lysate after tryptic digestion. At least three endogeneous peptides, and three transitions per peptide were analyzed. Thanks to internal normalization with the isotopically-labeled peptides transitions, the absolute quantity of selected α and β noncatalytic subunits as well as of β catalytic subunits were obtained and used to compute the absolute quantities of total 20S proteasome and to assess the stoichiometries of the six main 20S proteasome subtypes in biological samples. Details are provided in the Experimental Procedures section and in Experimental section.
Final validation of the LC-SRM method to determine absolute quantity of total 20S proteasome and to precisely and accurately monitor the dynamics of 20S subtypes stoichiometries. A, Correlation curve between the 20S proteasome concentration measured by the ELISA reference method and the one determined by LC-SRM in a panel of eight human cell lines (HEK 293T, HCT116, RKO, U937, HeLa S3, NB4, KG1a, and MRC5). The LC-SRM method was based on the isotopic dilution of equimolar amounts of in-house isotopically-labeled sP20S and iP20S (R(13C6) and K(13C6)) in each cell line protein lysate. One peptide sequence (and three transitions for the light and the heavy surrogate) and three peptide sequences were analyzed for noncatalytic subunit (α1–7; β3,4,6,7) and catalytic subunits (β1,2,5,1i, 2i, 5i), respectively (see supplemental Data S3 for more details on peptides and transitions). An equivalent of 2.5 μg total proteins containing the sP20S and iP20S heavy internal standard mix were injected on column and analyzed by SRM, as detailed in the Experimental Procedures. Three biological replicates (and three technical replicates) were analyzed to obtain statistics. The total proteasome concentrations measured in the initial protein lysates are presented. B, Dynamics of 20S subtypes stoichiometries upon IFNγ stimulation of HeLa cells. The absolute quantities of each of the six catalytic subunits measured by the LC-SRM method were computed to calculate the stoichiometries of 20S proteasome subtypes as detailed under Experimental Procedures. HeLa cells were stimulated for 0, 24, 72, or 96 h with IFNγ and the SRM method used to quantify proteasome subunits in each total cell lysate obtained at each time point of cytokine stimulation. Peptides sequences, transitions and applied voltages are detailed in supplemental Data S3. Three biological replicates were analyzed to obtain statistics. The sum of the stoichiometries of the four 20S proteasome subtypes is very close to the expected value of 100 (obtained from independent measurement of total 20S proteasome absolute quantity). C, Method variability (CV %) and accuracy (%) calculated with data obtained from IFNγ-stimulated HeLa cells. Accuracy was calculated from comparison of total 20S proteasome quantity obtained from noncatalytic subunits (reference values) and from β1/β1i, β2/β2i, and β5/β5i couples of catalytic subunits (experimental values) (n = 36). Accuracy were computed as follow: accuracy = (experimental value − reference value)/reference value × 100. Method variability: Coefficients of variation on all independent measurements (n = 24). Details on stoichiometry determination of 20S proteasome subtypes are provided under Experimental Procedures.
Next, we implemented the method to detect the six standard and immune-specific catalytic subunits of the 20S proteasome (β1, β2, β5, β1i, β2i, β5i), as the absolute quantification of these subunits is required to determine the stoichiometry of the different 20S proteasome subtypes present in biological samples (Fig. 1). Two to three proteotypic peptide sequences (and three or four associated transitions for each light and labeled surrogate) were carefully chosen, paying attention to favoring wide distribution over the protein sequence. Transitions and detection were then optimized for the six catalytic subunits. In total, the final method to quantify all α and β subunits comprised 206 independent MS transitions (103 “light” transitions and 103 “heavy” transitions corresponding to heavy surrogate peptides) associated with optimized dwell times and voltages for detection by the mass spectrometer (supplemental Data S3). The method to quantify of the absolute levels of all six 20S proteasome catalytic subunits was validated by taking advantage of the known stoichiometry of incorporation of catalytic subunits into the 20S proteasome (supplementary Information I-2). Based on the excellent accuracy (97 ± 2%) and variability (CVs below 15%) of the method to measure the absolute levels of catalytic subunits (supplementary Information I-2 and supplemental Fig. S7B–S7D), these data were further used to determine changes in the stoichiometries of the four 20S proteasome subtypes observed in a model of IFNγ-treated HeLa cells (sP20S, β5i P20S, β1iβ5i P20S, and iP20S - no β5t P20S nor α4s P20S detected) (as detailed under “Experimental procedures”) (Fig. 2B). As expected, iP20S was highly and significantly increased (by a factor of 12), becoming the major proteasome subtype after 96 h stimulation with IFNγ, whereas sP20S levels dropped by nearly 3-fold (Fig. 2B). Strikingly, the two intermediate 20S immunoproteasome subtypes, β5i P20S and β1iβ5i P20S, which each represented around 10% of the total 20S present, did not vary significantly after the cytokine stimulation. This interesting result shows that the main impact of IFNγ stimulation on the composition of proteasome complexes is the progressive replacement of the sP20S by the iP20S subtype.
Next, we applied the method to determine the absolute quantities and precise stoichiometries of 20S proteasome subtypes in 11 protein lysates extracted from human tissues of broad origins (Fig. 3). In most tissues, the proteasome represented 0.2 to 1% of the total protein present (Fig. 3A). A shotgun label-free LC-MS/MS proteomics analysis exclusively identified and quantified α4s and β5t in testes and thymus samples, respectively, confirming their tissue-specificity (4), whereas the immunocatalytic subunits (β5i, β1i, and β2i) were much more widely distributed across tissues (Fig. 3B). The stoichiometries of the six major 20S proteasome subtypes (Fig. 1A) were determined based on the absolute quantities of α and β subunits measured using the optimized method (as explained under Experimental Procedures). The absolute level of the catalytic β5t subunit provided the abundance of the thymoproteasome (Fig. 1A). Because this protein is not incorporated into labeled sP20S and iP20S internal standards, the absolute quantity of β5t was deduced from absolute amounts of total P20S, β5 and β5i (Fig. 3C). Similarly, the α4s subunit (PSMA7L protein) which is representative of the spermatoproteasome could not be directly quantified. Although α4 and α4s are very similar in sequence, three peptide sequences that are specific to the PSMA7 protein (α4) were detectable and were used to distinguish between the two isoforms (supplemental Fig. S8A). The absolute level of α4s was deduced from standard P20S and α4 contents (Fig. 1B, Experimental Procedures). As in the shotgun assay, proteotypic peptides corresponding to the thymoproteasome and spermatoproteasome were only observed in thymus and testes tissues, respectively, (Fig. 3B) and these two 20S proteasome subtypes represented only 20 and 12% of the total proteasome pool in these organs, respectively (Fig. 3C). A principal component analysis (PCA) biplot based on catalytic subunit composition (Fig. 3D) grouped brain, muscle, heart, and testes tissues as they almost exclusively contain standard proteasome β subunits (β1, β2, and β5). Bone marrow, spleen, and thymus were observed on the opposite side of the graph because they contain high levels of β1i, β2i, and β5i immunosubunits. Interestingly, intermediate 20S subtypes (β5i P20S and β1iβ5i P20S) were only detected in low abundance (less than 10% of the total 20S proteasome pool) in bone marrow and spleen, suggesting that the immunoproteasome is the most important proteasome subtype for antigen processing among immunosubunit-containing subtypes. Liver, colon, ovary and lung tissues were placed at an intermediary position on the PCA graph (Fig. 3D), with 50 to 70% of immunosubunit-containing 20S proteasome subtypes (Fig. 3C).
The method is able to precisely and accurately monitor 20S proteasome absolute quantities and subtypes stoichiometries in a panel of human tissues. A, Proteasome 20S absolute quantity (% w/w total proteins) measured by the LC-SRM method and 20S Proteasome chymotrypsin-like activity measured by degradation of LLVY-AMC peptide, in a panel of 11 human tissues. B, Label-free relative quantification of tissue-specific 20S proteasome subunits by label-free LC MS/MS reveals the tissue-specificity of α4s and β5t subunits but not the one of immunocatalytic subunits. Relative abundances of each subunits across the tissues are represented. The highest abundance is arbitrarily set to 1. C, Stoichiometries of the six proteasome 20S subtypes in different Human tissue determined by the LC-SRM method. Details on stoichiometry determination of 20S proteasome subtypes are provided under Experimental procedures. D, Biplot Principle Component Analysis of 11 human tissue samples (3 replicates per tissue) based on 20S proteasome catalytic subunits composition. The dashed circles represent the main clusters observed depending on content on standard (β1, β2, β5) or immuno (β1i, β2i, β5i) subunits.
Interestingly, the absolute amount of the α4 subunit, measured using peptides common to PSMA7 and PSMA7L proteins (supplemental Fig. S8A–S8B), was stoichiometric and highly correlated with the total 20S proteasome amount (measured using the α and β noncatalytic subunits, apart from α4) both in the panel of eight cell lines (R2 = 0.97; slope = 0.99) and in tissues of diverse origins (R2 = 1.00; slope = 1.01) (supplemental Fig. S8C–S8D). This result once again confirms the accuracy and precision of the method developed while also emphasizing the need for absolute quantification to detect perturbations in proteasome subunit expression or incorporation of subunits into mature proteasomes. It also indicates that this broad panel of normal and tumor human cells do not contain the noncanonical alternative α4-α4 20S proteasome complex in which a second copy of α4 occupies the position normally held by α3 (38, 39).
The abundance of some proteasome subunits measured using our optimized MRM assay was compared with mRNA expression data retrieved from the human protein atlas database (40) in corresponding tissues (supplemental Fig. S9). Although positive correlations were observed between some proteins and mRNA molecules abundances, these results suggest that measuring mRNA levels are not suitable when seeking to predict protein expression levels for 20S proteasome subunits in human tissues.
Thanks to their immunosuppressive properties, MSCs are considered a promising tool for cell therapy. Much effort has been directed toward enhancing MSCs activity by treatment with IFNγ. However, any ex vivo modifications may also fundamentally alter the cells, and understanding determinants that affect their immunomodulatory activity is essential if we are to develop effective MSC strategies. MSCs obtained from patients must be expanded ex vivo if they are to be used in the clinic, and this process must be carefully controlled (41). Recently, we reported a decrease in the immunosuppressive properties of ADSCs cultured up to the senescent stage and demonstrated that this effect was the result of proteasome-mediated indoleamine 2,3 dioxygenase (IDO) degradation (42). Priming of MSCs with IFNγ has been shown to extensively potentiate their therapeutic activity (43, 44) but, to our knowledge, and although proteasome functions cover a broad spectrum of biological functions, the proteasome status has never been assessed in this context. When used to measure the consequences of IFNγ-stimulation of ex vivo-expanded patient-derived ADSCs on proteasome status (Fig. 4A), our method revealed no major changes in the total 20S proteasome quantity (Fig. 4B). However, a massive replacement of standard catalytic subunits by their immunological counterparts was clearly observed (Fig. 4C), resulting in a strong shift from the standard to the immunoproteasome subtype (Fig. 4D). Indeed, although the standard subtype represented 75% of the 20S proteasome pool when ADSCs were expanded in an IFNγ-free medium, this proportion was decreased to 25% after 4 days' culture in the presence of the cytokine (Fig. 4D). The massive induction of the immunoproteasome by cytokine stimulation is likely to have a considerable impact on the repertoire of degraded proteins and antigenic peptides loaded onto major histocompatibility complex class I (MHCI) molecules.
Proteasome status is affected by priming ADSCs with IFNγ during their ex vivo expansion. A, Workflow for the determination of the effect of priming of ADSCs with interferon-γ on their 20S proteasome status, using the LC-SRM method. Primary cells obtained from two patients were used for the study. B, Proteasome 20S absolute quantity (% w/w total proteins) measured by the developed LC-SRM method in ADSCs obtained from patients (n = 2 biological replicates - 3 technical replicates). C, Fold change in the six catalytic subunits of the 20S proteasome during IFNγ stimulation. ADSCs were cultivated in the presence of the cytokine (100 ng/ml). Absolute quantities of the catalytic subunits were determined by the developed LC-SRM approach and fold changes are calculated relative to time 0h (n = 2 biological replicates − 3 technical replicates). D, Dynamics in the stoichiometries of 20S proteasome subtypes during IFNγ stimulation of primary ADSCs derived from patients (n = 2 biological replicates − 3 technical replicates). Calculations are detailed under Experimental procedures.
Conventionally, MSC culture for clinical applications is performed under normoxic conditions (21% oxygen tension), even though oxygen levels within tissues are typically much lower (hypoxic) than these standard culture conditions. Therefore, oxygen tension represents an important environmental factor that may affect how MSCs perform in vivo. However, the impact of hypoxic conditions on distinct mesenchymal stem cell characteristics, such as the proteasomal status, remains unclear.
We applied our method to analyze the 20S proteasome status after 10 days of ADSCs expansion under three different oxygenation concentrations: 1%, 5%, and 20%. Interestingly, proteasome abundance, proteolytic activity and composition were all affected by dioxygen levels (Fig. 5A–5C). Indeed, when comparing the effect of ADSC expansion in hypoxic or normoxic conditions (1% versus 20% O2 levels), we detected a significant increase in total 20S proteasome abundance alongside a nearly 2-fold significant upregulation of the three immunoproteasome catalytic subunits (Fig. 5A and 5C). Both changes probably account for the higher 20S proteasome chymotrypsin-like activity measured following culture in normoxic conditions (Fig. 5B). Indeed, structural differences in active sites account for the higher chymotrypsin-like activity of the β5i subunit of the immunoproteasome compared with its β5 standard counterpart (5, 45). Moreover, the relative abundance of 20S proteasome-associated PA28αβ activator is decreased in hypoxia compared with normoxia (p = 0.02) whereas the O2 level had no significant impact on the level of association of the other 20S CP regulators (supplemental Fig. 10B). This last observation further supports the increase measured in immunoproteasome subtype in normoxic compared with hypoxic conditions as PA28αβ is known to preferentially associate with the 20S immunoproteasome variant in cellulo (34).
Expansion of ADSCs in different O2 levels affect 20S proteasome status and ADSCs' capacity to differentiate. A, Proteasome 20S absolute quantity (% w/w total proteins) measured by the LC-SRM method in five patients derived primary ADSCs cultivated at three different levels of O2 (1%, 5%, and 20%). B, Proteasome 20S chymotrypsin-like activity measured by the in vitro degradation of the LLVY-AMC peptide by proteasome in ADSCs lysates after cultivation in three different levels of O2 (1%, 5%, and 20%) (n = 5 patients − 3 technical replicates). C, Relative content of standard and immuno catalytic 20S proteasome subunits measured by the method in five patients derived primary ADSCs cultivated at three different levels of O2 (1%, 5%, and 20%). D, Differentiation potential of human ADSCs from different patients under different levels of O2 (1%, 5%, and 20%). The immunoproteasome inhibitor ONX-0914 alters the differentiation capacity of ADSCs at 5 and 20% O2 concentrations. Adipogenic differentiation is indicated by Oil red O staining.
Overall, in the absence of IFNγ in the culture medium, the major proteasome subtype observed in ADSCs was the standard proteasome, which represented 60 to 80% of the total proteasome pool, depending on patient and O2 level (supplemental Fig. S9A). Given the massive induction of immunoproteasome upon exposure to the pro-inflammatory cytokine (Fig. 4C) and the absence of immune cells in the ADSC culture medium, the inter-individual differences observed in immunoproteasome content might result from variability in the inflammatory context before surgery. Immunoproteasome subunits have been shown to be required for adipocyte differentiation (29). Accordingly, our data indicate that high levels of immunoproteasome correlate with high adipogenic potential at 20% O2, and the reverse under hypoxic conditions (Fig. 5D). Strikingly, pharmacological inhibition of the immunoproteasome using the ONX-0914 inhibitor (46) leads to a marked decrease in the capacity of ADSCs to differentiate into adipocytes, which confirms previous observations in the PSMB8 KO mice (29) using an orthogonal method.
To get a broader picture of the effect of O2 levels on the proteome of ADSCs, a whole proteome analysis was performed on ADSCs grown under normoxic or in hypoxic conditions (1% of O2). Importantly, a new cohort of three patients was used to obtain this new biological material. Out of 3624 proteins identified and quantified, 67 proteins were found at increased levels in hypoxic conditions and 129 were over-represented in normoxic conditions (supplemental Fig. S11 and revised supplemental Data S7). All three immunocatalytic subunits were increased under normoxic conditions (fold increase of 1.6 to 1.9) although statistical significance was only reached for β1i and β2i (p value = 0.05). As discussed above (supplemental Fig. S7), this apparent discrepancy can easily be explained by the lower precision of label-free quantification results compared with SRM quantification data.
Functional analysis based on GO Biological processes revealed the most significant pathway related to the proteins for which abundance was modified both under hypoxic and normoxic conditions to be the “oxidation-reduction” pathway (FDR = 1.2E-06 and 5.9E-03 for proteins upregulated in hypoxic and in normoxic conditions, respectively). This result was to be expected following a change in O2 levels from 20% to 1%. Other enriched GO Biological pathways included “response to oxidative stress” (FDR = 4.2E-02) in the proteins that were more abundant in normoxic conditions. This pathway is particularly interesting as the immunoproteasome has been associated with responses to oxidative stress (47⇓–49). ADSCs were also shown to negatively regulate oxidative stress in vivo (50) and notably through Nrf2 which is one of the main transcription factors involved in controlling oxidative stress. In our whole-proteome analysis, we observed that NQO1 (2-fold increase, p value = 0.02), one of the best-known targets of Nrf2 (51), was increased under normoxic compared with hypoxic conditions. Reactive oxygen species seem to play an important role in adipocyte differentiation (52⇓–54). A function of the immunoproteasome related to ADSC differentiation could be the clearance of proteins having undergone oxidative damage, when this type of damage accumulates it could be toxic for the cell. Significantly, 25 of the proteins for which overall abundance differences were detected are functionally related to the “cell differentiation” GO Biological Process (FDR = 1.4E-02 for proteins over-represented in cells grown under hypoxic conditions). Among these, 16 were increased in the hypoxic cells whereas 9 were decreased. These proteins are listed in supplemental Data S7 (4th sheet). Given the importance of the immunoproteasome in regulating ADSC differentiation when stimulated with dexamethasone, and because our results clearly demonstrate that the immunoproteasome is increased under normoxic compared with hypoxic conditions, it is tempting to speculate that some of these deregulated proteins might be direct or indirect targets of the immunoproteasome. In particular, Transforming growth factor-beta-induced protein ig-h3 (TGFBI/BGH3) and Plasminogen activator inhibitor 1 (PAI1) were both increased in our hypoxic cells (4.1- and 2.9-fold increase, respectively, with p values of 8.5E-4 and 0.03, respectively), and these proteins are known to be target genes of TGFβ1, a pathway required for hypoxia-mediated inhibition of adipocyte differentiation (55). Of course, further experiments will be necessary to confirm that these proteins are downstream players of the immunoproteasome affecting the adipogenic potential of ADSCs.
In conclusion, after as few as 10 days of ADSCs expansion under different dioxygen levels, the method developed could detect mild but still significant changes in 20S proteasome status, and variations in the level of 20S immunoproteasome. This change in proteasome composition might be causal for the observed O2-induced variations in differentiation potential of ADSCs even though further investigation will be required to determine the precise mechanisms.
This study aimed to develop an assay to determine subunit absolute quantity and stoichiometry within a highly heterogeneous macromolecular protein complex, the 20S proteasome. To achieve this goal, a robust, accurate and sensitive absolute quantification method with multiplexing ability had to be developed to allow the absolute quantification of the 19 different subunits of the 20S proteasome in a single assay.
Absolute quantitation based on IDMS using the SRM scanning mode suits the requirements for multiplex detection and is also recognized for its specificity, sensitivity, and accuracy (16, 17). Because many proteasome subunits had to be analyzed, we first used the most straightforward IDMS proteomics strategy, the AQUA (18) method, which involves spiking various isotope-labeled synthetic peptides into samples as internal standards. Although mainly used for the absolute quantification of monomeric proteins, the AQUA method has also been successfully applied to assess the sub-stoichiometric incorporation of the Rpn13 ubiquitin receptor within the 26S proteasome (56). Our AQUA peptide sequences were carefully chosen to meet the requirements for IDMS analysis of proteins (16) and, when tested in simple or more complex biological matrices, they provided good linearity in signal response, low variability, and adequate sensitivity. These analytical performances explain why the AQUA technology was so rapidly adopted for the LC-SRM validation of protein biomarkers in various biological matrices (16, 17). However, we noted a defect in trueness that was easily detected in our system because noncatalytic proteasome subunits are expected to be present at equimolar stoichiometry. Responses were observed to be highly dependent on peptide sequences, probably because of incomplete enzymatic digestion of the protein of origin; other reasons for the discrepancy observed could be incomplete peptide solubilization, peptide instability, or artifactual chemical modifications. Thus, isotope-labeled peptides could not be used to accurately assess proteasome subtype stoichiometry unless laborious optimizations were undertaken (19). Several IDMS methods based on the use of isotope-labeled protein standards like PSAQ (21), absolute SILAC (22), PrEST (23), or TAQSI (25) were developed to overcome the issues of the AQUA methodology. To the best of our knowledge, none of these has yet been applied to determine protein complex stoichiometry. To achieve this goal on highly heterogeneous 20S proteasome complex, we optimized a workflow relying on SILAC-based absolute quantification. A reference mixture containing equimolar concentrations of both isotope-labeled and purified 20S standard- and immuno-proteasome subtypes was produced, qualitatively and quantitatively assessed, and spiked into protein lysates extracted from cell cultures or tissues. After protein digestion, the SRM method was optimized for carefully chosen proteotypic peptides. In this approach, use of a whole isotope-labeled protein as internal standard represents a clear advantage over the PrEST approach (23) because all proteotypic peptides can theoretically be used for quantification. This method was validated by comparison with the reference ELISA method for total 20S proteasome absolute quantification in a broad range of biological samples.
Although 20S and 26S proteasome complexes can be routinely quantified using different ELISA assays (6, 10⇓⇓⇓–14, 33), this technique lacks the multiplexing capacity to assess the complete diversity of proteasome subtypes because up to 19 different protein chains can be incorporated into the 20S proteasome macromolecular assembly (Fig. 1A). Moreover, to our knowledge, the precise stoichiometries of tissue-specific β5t- and α4s-containing 20S proteasome subtypes have never yet been determined. Using our optimized assay, for the first time, we accurately quantified the stoichiometry of the tissue-specific thymoproteasome and spermatoproteasome; their low levels in thymus and testes tissues (20 and 12% of the total 20S proteasome pool, respectively) support findings in previous reports showing that β5t and α4s are detected in a subpopulation of cells in these two organs (4, 58).
Then, we demonstrated that our method could also precisely monitor changes in 20S proteasome β catalytic subunit composition following IFNγ-activation of HeLa cells. We took advantage of the known stoichiometry of β catalytic subunits in the 20S proteasome to assess the trueness of the method, which exceeded 96%. In comparison, the TOP3 label-free quantification approach barely achieves 78% accuracy after discarding outliers arising from unrepresentative peptides. Converting peptide abundance into protein concentration requires careful selection of peptide sequences and optimization of SRM transitions (19) or, alternatively, the removal of incoherent peptides from global MS1-based quantification datasets, for instance using covariation of peptide abundances (59). Thus, even if label-free MS1-based quantification methods can be used to obtain a rough estimate of protein complex stoichiometry, as previously reported (60⇓–62), these approaches are most appropriate for the high-throughput determination of changes in the relative abundances of protein complex subunits (34, 35) or estimation of protein copy-number without requiring spike-in standards (63).
MSCs obtained from bone marrow (BM-MSCs) or AT (ADSCs) are promising tools for cell therapy in regenerative medicine, to treat severe inflammatory and autoimmune diseases, or to prevent transplant rejection (64). Cells must be expanded ex vivo to obtain enough numbers for use in therapy. Thus, culture conditions must be carefully controlled both for safety issues and to optimize therapeutic effectiveness. Using our method, we showed that pre-stimulation of ADSCs with IFNγ and increasing O2 levels both affect the status of the 20S proteasome during ex vivo expansion of primary ADSCs. In both cases, changes in proteasome composition were observed, an increase in immunoproteasome stoichiometry. These results emphasize the high plasticity of the 20S proteasome when exposed to external stimuli, but also the multiple biological roles played by the immunoproteasome subtype. IFNγ is known to induce the immunoproteasome through the formation of new proteasome particles incorporating immunocatalytic subunits in place of the standard ones. Pre-stimulation of both BM-MSCs and ADSCs with pro-inflammatory cytokines, IFNγ, has been shown to increase their immunosuppressive properties (43, 64, 65), by increasing release of several soluble immunosuppressive factors, in particular kynurenine, a product of indoleamine 2,3-dioxygenase (IDO) activity (65). Moreover, both BM-MSCs and ADSCs are antigen presenting cells (64) and, when exposed to IFNγ, they upregulate expression of HLA class I molecules on their surface. This response protects them from NK-mediated lysis (43, 66), and promotes their immunomodulatory effects. Strikingly, both mechanisms linked to the immunosuppressive properties of MSCs are affected by proteasome status. Indeed, a shift from standard to immunoproteasome considerably increases the production of MHC class I-binding peptides in vivo (67) and IDO is known to be a proteasome substrate (68). Proteasome-mediated degradation of IDO was recently reported to explain the reduction in immunosuppressive potential observed in clinical-grade expanded MSCs which had reached replicative senescence (42). Mechanistically, IFNγ is known to increase IDO protein via transcriptional activation (69) but it is also responsible for a strong induction of the immunoproteasome-PA28αβ complex, a proteolytic system functioning in the absence of ubiquitination (67). As IDO is degraded through the ubiquitination-dependent SOC3-proteasome pathway (68), the increase in ubiquitin-independent degradation triggered by IFNγ might constitute a mechanism further promoting IDO stabilization in this physiological context.
In addition to its major role in antigen processing, the immunoproteasome seems to degrade oxidized proteins more efficiently than the standard 20S CP (70, 71). De novo synthesis of 20S proteasome and of immunoproteasome is crucially important for maintaining efficient proteostasis in oxidative stress conditions (49). The evidence provided here of low total proteasome content and an absence of immunoproteasome in brain probably accounts for the previously reported higher sensitivity of brain tissues to oxidative stress (72). Activation of the immunoproteasome and autophagy occur during the early stages of ESC differentiation, to allow degradation of damaged proteins and avoid their transmission to differentiated cells (27). Moreover, recent findings indicate that the immunoproteasome is required for differentiation of adipocytes (29) and skeletal muscle (28). In line with this requirement, our results demonstrate that ADSCs grown under hypoxic conditions, had a lower immunoproteasome content and exhibited a lower differentiation potential than their counterparts grown under 20% O2. In addition, our results suggest that immunoproteasome activity is causal for the change in adipogenic potential in normoxic conditions. Thus, the significant increase observed in all three immunocatalytic subunits and in overall proteasome activity in normoxia-cultured primary ADSCs compared with the cells cultured in hypoxic environments could reflect modulation of their therapeutic capacities. Importantly, ADSCs are adult pluripotent stromal stem cells isolated from white AT where O2 levels are below 5% but they are routinely expanded ex vivo under 20% O2. Manufacturing practices for ASC expansion must therefore be carefully optimized and controlled to maintain their therapeutic capacity. The results from the approach developed here applied to primary ADSCs grown in conditions close to real clinical production clearly demonstrate that IFNγ and dioxygen levels could be key parameters in this process.
To conclude, the method presented here allows robust and rapid determination of the complete status, i.e. absolute quantity and stoichiometry, of a highly heterogeneous macromolecular protein complex, the 20S proteasome, in various human tissues and cells. When applied to primary ADSCs expanded in different culture conditions, our results highlighted a high plasticity in proteasome composition and abundance which might be related to modulation of the ADSCs' immunosuppressive and differentiation properties. The method developed thus constitutes a sound approach to complement immunophenotyping or other methods to monitor protein markers (73) for the optimization and control of manufacturing processes for ADSCs expansion. Knowledge of proteasome composition is also of major interest for therapeutic purposes. Indeed, upregulation or dysregulation of immunoproteasome catalytic subunits have been observed in several human diseases and disorders, such as inflammatory and autoimmune diseases, cancer, diseases of the central nervous system, and aging (74). For instance, mutations reported in immunocatalytic subunits and the resulting defects in 20S immunoproteasome assembly and activity observed in PRAAS (Proteasome-Associated Autoinflammatory Syndrome) patients could be monitored using our method (reviewed in (75)). Our assay could also be of great interest when seeking to assess patients before instigating immuno-therapy as the efficacy of tumor antigen processing and presentation is closely linked to levels of 20S immune-type proteasomes in antigen presenting cells (75). Detection of increased concentrations of 20S proteasomes or changes in subtype profiles could also be monitored in extracellular body fluids to diagnose and/or as a prognostic marker of various diseases (76). In this context, a more specific targeting of the different heterogeneous forms of the proteasome will lead, in the long run, to more specific treatments generating fewer side effects and less chemoresistance than caused by broad-spectrum proteasome inhibitors (77). However, to design such targeted therapies, tools to precisely determine patients' proteasome status, like the one presented here, will need to be developed.
More generally, the developed strategy could be extended to assess the absolute level, dynamic, and heterogeneous nature of many other biologically-relevant macromolecular systems such as the human spliceosomal hprp19/CDC5L complex (19, 61), the nuclear pore complex (78), core ribosomal proteins (62), or even host-pathogens interactions (79). These adaptations would be more accurate than the peptide-based mass spectrometry methods currently used (61). The sole requirement for this adaptation is that it must be possible to ectopically produce and purify each individual subunit in carefully-controlled absolute quantities with heavy-isotope incorporation.
The data sets corresponding to the mass spectrometry analyses presented in this study have been deposited in the following repositories: PRIDE, (https://www.ebi.ac.uk/pride/archive/, Project accession: PXD011894) for label-free MS analyses, and PeptideAtlas (http://www.peptideatlas.org/, Dataset identifier: PASS01219) for targeted MS analyses. Skyline files of all targeted experiments are available on Panorama Public (https://panoramaweb.org/project/Panorama%20Public/2018/IPBS-CNRS%20-%20SRM_Proteasome_2018/begin.view?). The detailed descriptions of all analyses (raw and processed file names, sample name, biological replicate number, MS technical replicate number, corresponding figure) are summarized in Supplementary Data 8.
Author contributions: T.M., B.F., L.G., A.S., D.Z., F.R.-D., M.B., M.-L.R., A.G.-d.-P., I.A., and M.-P.B. performed research; T.M., B.F., L.G., E.M.-B., A.G.-d.-P., I.A., and M.-P.B. analyzed data; F.A., I.A., O.B.-S., and M.-P.B. wrote the paper; L.S. and I.A. contributed new reagents/analytic tools; A.G.-d.-P., I.A., O.B.-S., and M.-P.B. designed research.
↵* The authors would like to thank the Région Midi-Pyrénées and the ARC (Association pour la Recherche sur le Cancer) foundation for PhD fellowships to TM and BF, respectively. This project was supported in part by the Région Midi-Pyrénées, European funds (Fonds Européens de Développement Régional, FEDER), Toulouse Métropole, by the Agence Nationale de la Recherche (ANR-11-RPIB-0012: SAFE Project), and by the French Ministry of Research with the Investissement d'Avenir Infrastructures Nationales en Biologie et Santé program (ProFI, Proteomics French Infrastructure project, ANR-10-INBS-08).
This article contains supplemental Data and Figures.
Revision received January 21, 2019.
© 2019 Menneteau et al.
Published by The American Society for Biochemistry and Molecular Biology, Inc.
Author's Choice—Final version open access under the terms of the Creative Commons CC-BY license.
Van den Eynde, B. J. | 2019-04-21T22:02:41Z | https://www.mcponline.org/content/18/4/744 |
In this interview, Tariq King, the senior director and engineering fellow for quality and performance at Ultimate Software, and Jason Arbon, the CEO of test.ai, explain the role artificial intelligence plays in modern testing and why you should establish a foundation right now.
Jennifer Bonine: All right. We are back with more interviewers. I'm excited. I have Tariq and Jason, nice to have you both.
Tariq King: Nice to be here.
Jason Arbon: It's very nice to be here. Thank you for inviting me here.
Jennifer Bonine: Yes. Or, dragging, either way. Inviting or dragging willingly or unwillingly. So we get both you guys all at once.
Jennifer Bonine: And, I heard that both of you like to talk about AI.
Jennifer Bonine: Yeah, and you have a new organization that was started.
Jennifer Bonine: AItesting.org, and they can sign up?
Jennifer Bonine: And, what is the intent behind it? Maybe tell us a little bit about what you guys want to do with that.
Jason Arbon: AI is just to bring people together. Everyone's curious about AI for testing. Some are concerned about it, some really want to dive into it. The idea is to have one place where we can get together and talk about AI.
Jason Arbon: The origin was actually STAREAST. Tariq and I were talking about how there's ... We don't get together very often, there's very few of us working on the problem today. And so, we wanted to ... We're basically lonely people, we try to meet on the internet, and there's a mailing list. We find things, we have papers, we run into sort of interesting ... Or we survey the community, too, to see what they think about AI.
Jason Arbon: You sign up on the mailing list and start to get in the groove of what's going on with AI.
Jennifer Bonine: AItesting.org. Got it. All right, so those of you out there that want to learn more about that, you can go to aitesting.org. A great way to bring people together, as you've said, right?
Jennifer Bonine: Because, there's, I think, a combination of people who are probably super excited about it, a smaller group. A group that just doesn't know much, and really wants to get educated. And then a group that's probably a little bit fearful of what that means. I've even heard some testers saying, "I just hope I retire before it happens."
Jennifer Bonine: I think I've heard that, right?
Jennifer Bonine: And a lot of that comes from lack, I think, of awareness and education. So, having places where people can get information, education, awareness, is always good.
Jennifer Bonine: ... that you did on it. So, for those that didn't get a chance to see that keynote—which by the way, if you didn't get a chance to see it, these are recorded, so go back and watch that. I've even heard some folks here that watched it live but are gonna go back and watch it again.
Jennifer Bonine: Because it had a lot of really good content for folks. So, maybe we talk a little bit about what the intent behind that keynote was, what you were trying to accomplish with that.
Jennifer Bonine: Discussion with this group would be great.
Tariq King: So, when you think about it, artificial intelligence is really a hot topic these days. Whether you're in the business of building software or consuming software, it's all over. For me, I think that one of the biggest things in terms of the testing community is we've seen folks who are using AI for testing. I've seen folks who are kind of averse to it, like I said, there's these different pockets of people.
Tariq King: And I really wanted to just get everyone familiar with what AI means and what AI brings, and start to get people comfortable with thinking about, what does the future look like? Does being, quite frankly, a lack of innovation when it comes to pushing that boundary and testing, and testing seems to lie behind other aspects of software engineering. And I just wanted to try to open up people’s minds to say, hey, look. Let's not think that these things are impossible and that they're far away. They're actually here and they're coming.
Tariq King: And as a community, we have to get in front of it.
Tariq King: And so, my message was really around, let's stop, think about what we can do to leverage this technology to make what we do better. But let's also notice that in terms of, for AI to successful, as with any paradigm, testing has to be a key part of that.
Tariq King: And so, the message was really to try to bring those two worlds together: Have people try to get comfortable with thinking about, "Hey, if our future looks different, it's okay." Right?
Tariq King: But then also, what ideas can we bring as testers? What things can we bring to this forum to kind of make our impact and make sure that at the end of the day, AI doesn't take over?
Tariq King: We need testers to kind of help be that ground and that foundation.
Jennifer Bonine: And that's great. And what's kinda nice about it, I think, for people that didn't see it, was you told the story backwards, right?
Jennifer Bonine: So, you gave the end of the story before the beginning, right? So, you showed them what it is and then walked them through it.
Tariq King: Yeah, I think that when I look at it, because of the potential for AI to be so general and represent all types of problems, for me, AI is already here and it's already taking over, right?
Tariq King: And so, it's really about recognizing, okay, people, this is actually coming and it's already here. And it's only gonna get better.
Tariq King: So, bringing them back to the beginning is like, now is the time to get ready.
Tariq King: So, the way that we actually were able to be successful was that we actually got ready in the beginning, because we saw it coming and knew how are we gonna respond. And so, it's really a call to people to say, "Right now's the time for you to get ready and realize that this is gonna come, and we have two sides of the coin, and what are you gonna do to get prepare for those two things?"
Jennifer Bonine: Yeah. Well, it was interesting, I was just talking to one of the other folks, right before you guys, about the fact that technology and change comes faster than ever before, things are moving and changing.
Jason Arbon: The more they adapt, the more angst they have.
Jennifer Bonine: Yeah. And it just creates a bigger angst. And so, as stewards of information, it's good that you're creating opportunities for education and awareness. Because I think a lot of times what people don't realize is, change creates some level of fear, and a lot of times it's fear because they don't know, right?
Jennifer Bonine: ... of just creating information and having, since it is a small community, people that have some good information, have been involved in it, know it's here, what it's doing, to educate others. And I see that with both of you. A lot of times at this conference, instead of just giving presentations and standing up in front of rooms, you guys are talking to people all the time, and they line up to get that information from you guys.
Jason Arbon: We even talk to each other sometimes.
Jennifer Bonine: Which is awesome. I'm glad that you guys talk to each other.
Jason Arbon: Yeah, it's awesome.
Tariq King: No, I think, when you think about conferences, this is really a place for us to build relationships.
Tariq King: That's how I got to know Jason and what he was doing.
Jason Arbon: We talked about this, collaboration is not relationships.
Tariq King: Well, collaborations, relationships, whatever. Potato, patato.
Jennifer Bonine: (laughing) You can tell they super agree on everything.
Tariq King: But, when you really think about that, we come here, we get inspired from other people. People are a valuable resource that we have. And the ideas that come out of conferences like this, everyone is all excited and ready to take things away, but I think maintaining those relationships and our collaborations is very important.
Jason Arbon: And AIST wouldn't have happened if it wasn't for STAREAST.
Jason Arbon: It just wouldn't have happened.
Jennifer Bonine: Right. It was an idea born out of one of these events, right?
Jason Arbon: Yep. Now there's hundreds of people, many hundreds of people, and we're sharing and taking surveys. I wrote, like, a twenty-page paper, which I never really do—I'm trying to copy you, you didn't like it that much, either.
Jason Arbon: A twenty-page paper, and I got feedback from like sixty different people.
Jason Arbon: So, the community's growing, and they're pointing out flaws in my logic and in my grammar.
Jennifer Bonine: Oh, I have that happen all the time, too.
Jason Arbon: But, that's awesome. Yeah, thanks.
Jason Arbon: There's clearly available tools. If you put this into Word, it fixes it for you.
Jennifer Bonine: Yeah. Not always. It's not perfect, yet.
Jason Arbon: Well, that's what we said.
Jason Arbon: But, AI's not smart enough.
Tariq King: Yes, it will get there.
Jennifer Bonine: It will get there.
Jason Arbon: But, that happened because of STAREAST. And then, I think what really happened more at this conference was, this is the turning point. So, when I was at STAREAST, I was like, "Are you able to talk about AI?"
Jason Arbon: And there's one, and I was pretty lonely.
Jason Arbon: ... and you guys both kinda synthesized, it brought the world together.
Jason Arbon: And then, I got a little manic a couple hours ago talking about contest animation in AI.
Jason Arbon: But we, on paper, tripled.
Jason Arbon: Change is coming faster than it used to.
Jason Arbon: So, we need to get ahead of the curve.
Jason Arbon: And breakfast this morning, which was awesome, thank you.
Jennifer Bonine: And breakfast this morning. But, what we found is that some people are visionaries, right? Like, they see something before it comes and you see it coming, and having talked to you, I've seen this coming as well for a while. But it's interesting to watch the curve of other folks starting to get involved, get on board and see that this is, it's here. It's here.
Jason Arbon: You've seen it actually kind of evolve, right?
Jason Arbon: Actually, you said awhile, it made me a little bit painful for a second because I'm like, I wish I could just code faster.
Jennifer Bonine: Yeah. But, it's two things, I think, right? It's not even just having the technology and the code, but it's the adoption, right?
Jennifer Bonine: Can people ... We have a lot of technology that's ready today, but people aren't ready for it.
Jennifer Bonine: Right? So, it's not even that it's not we couldn't have it, there's lots of stuff out there we could have.
Jennifer Bonine: But, people aren't ready for it, right? To absorb it, to accept it, to embrace it, right?
Jennifer Bonine: We have to get them to that stage of being okay with it.
Jason Arbon: Right. That's perfectly put. You're not supposed to upstage the people you're interviewing. But that's better said than either of us had said it this week.
Jennifer Bonine: I should be your PR person, right?
Jennifer Bonine: And Jason, before we leave, I wanna talk about something that's near and dear to my heart that I've talked to you about for a while, which is Appdiff, which now, there's a new name. So, people who are looking for that should look for ...?
Jason Arbon: So, things aren't going well, you change your brand. (laughs) No, really the reason we're doing it, just to be super clear: We built some really cool robots that will automatically test your app, right?
Jason Arbon: And people are paying for it, people like it. But what they also said is, "I want these—these are cool and smart robots, can't they do all my regression tests?"
Jason Arbon: And they go, like, "Aw, man," right? And so, I spent, we got more money from venture capitalists. Thank you out there, wherever you are. And built the engineering team even more. And now we have robots where you can very simply tell them what you want them to do, and they'll figure out how to execute that on any app for you.
Jason Arbon: Which is pretty cool. So, really what we're doing around the brand change is that we're just focusing on what people say. "What is Appdiff?" I have to tell them, it's an app and it finds differences in your application. So, what does test.ai do? We test with AI.
Jason Arbon: So, it's just super simple.
Jennifer Bonine: So, clarifying it for them?
Jennifer Bonine: Now, they're silly though, because I knew what it was right away. I knew exactly what Appdiff did, right?
Jason Arbon: I know you did, you did, yeah.
Jennifer Bonine: I get it, but.
Jason Arbon: But, you're also not normal.
Jennifer Bonine: Okay. But, test.ai makes sense.
Jason Arbon: Is up as of 10 a.m. today. Test.ai.
Jennifer Bonine: ... is up as of 10 a.m. So, go check it out.
Jason Arbon: And if you go up there we're gonna—I sound like a ShamWow commercial—we're trying to get it. We have too many test members on my team. So, I don't know if we'll hit the date because they always find bugs. But, we hope to have it downloaded by Halloween.
Jason Arbon: At test.ai you can sign up for the beta right now.
Jason Arbon: And the cool thing is, it's going to be AI that you can actually download to your local machine, run it against your app, and you've got automation for your app.
Jason Arbon: It's gonna be in a beta version but downloadable. And, you can have it on your MacBook while you're on an airplane and it will still run.
Jennifer Bonine: So, check that out, you guys. I mean, newly released as of 10 a.m.
Jason Arbon: Yep. And the exciting thing is that I also just demoed for the first time on the planet at a conference, that AI running and executing a test case. I think that was actually the first time it's actually been demoed in a public forum.
Jason Arbon: Half my team at home base hadn't even seen the demo because I had to fill in for another session.
Jennifer Bonine: Now, do you have the video of the demo?
Jason Arbon: I do have the video.
Jennifer Bonine: Can they see the video of the demo? Do you wanna be a part of that?
Jennifer Bonine: Okay, you'll post that somewhere, right?
Jason Arbon: Actually, you'll have to talk to my marketing team.
Jennifer Bonine: Product marketing team? We need to talk to them for you so you don't forget.
Jason Arbon: Yeah. Actually I would love to, so.
Jason Arbon: Yeah. And if you, if they won't let me put it on the web right away, email me at [email protected]—well, my official one, [email protected], or [email protected], and I'll send you a link to the video if you want.
Jennifer Bonine: So, that's how we find you, Jason. How do we find you, Tariq?
Jennifer Bonine: You're the OG, though.
Tariq King: ... it's relatively easy. Yeah, exactly. [email protected].
Tariq King: It should be there, so. It's great. Cool.
Jennifer Bonine: Perfect. So, how to find Tariq. And congratulations, I hear there's gonna be a new King in the family.
Tariq King: Yes. We are expecting November 22.
Tariq King: So, after this I go to make sure that I'm not in trouble by missing the test, so.
Tariq King: It's gonna be awesome.
Jennifer Bonine: Awesome. Well, congratulations and good luck.
Jason Arbon: I've got one more quick thing Tariq did not represent that should be represented.
Jason Arbon: If you look at his keynote, I highly recommend you listen to it.
Jennifer Bonine: Yeah. We'll watch it again. We'll watch it.
Jason Arbon: But, what we're doing at test.ai is trying to—and I'll say it and scare everybody—we replace Selenium and Appium with AI, right?
Jason Arbon: So you don't have to code anymore and AI just does it, 90 percent of the work for you. The really smart thing that's gonna happen five to ten years from now is what Tariq was saying, and that is that systems will eventually test themselves from the inside out, right? Rather than from the outside in.
Jason Arbon: And, the testing I do is from the outside in, it's very nontraditional, with swapping the brain out with machine learning. But his idea and vision is software that actually tests itself.
Jason Arbon: And that's the stuff that stands between us and the singularity and the robots taking over. So, I'm really excited to see where he takes that research.
Tariq King: Yeah. There's really a lot of research that started from when I did my Ph.D. That's kind of the area that we looked at.
Tariq King: But, that's 2009, the time and the technology has really gone further.
Tariq King: And so, for us, like right now we're trying to see with all the advances in technology, microservices, artificial intelligence, can we really design systems in the way that they can test themselves?
Tariq King: Right? Because, when you think about software development, yes, we do a lot of testing from the outside. But we also do a lot of testing from the inside, and if we actually think about designing these systems with these features, then they can be a lot more thorough and actually get to a point where systems may not only be able to detect when they have issues but, they may be able to fix themselves.
Jennifer Bonine: ... for our poor grammar. And we'll look like grammarians. We'll look amazing.
Jason Arbon: Grammarians. That means you have a good grammar.
Jennifer Bonine: I know, did you like that word? I liked that word.
Jason Arbon: That was pretty power ... That was a power word you dropped in.
Jennifer Bonine: I know. All right. I suppose we're done.
Jennifer Bonine: Thanks for watching, and check out our next interview.
Jason Arbon is the CEO of test.ai, which is redefining how enterprises develop, test, and ship mobile apps with zero code and zero setup required. He was formerly the director of engineering and product at Applause.com/uTest.com, where he led product strategy to deliver crowdsourced testing via more than 250,000 community members and created the app store data analytics service. Jason previously held engineering leadership roles at Google and Microsoft and coauthored How Google Tests Software and App Quality: Secrets for Agile App Teams.
Thats great article. Thanks for this informative post. | 2019-04-25T06:35:27Z | https://www.cmcrossroads.com/interview/why-testers-should-take-control-ai-narrative-interview-tariq-king-and-jason-arbon |
We may explore download The to you including the Services, Chinese Searches and possible member that may be of information to you, using the example rights that you have set to us and also in information with second web. You may post from our advertising affiliates at any request by clicking the pp. cookies entered in every lawfulness we allow. We will directly analyze you any actions from a present you collect established to protect edible from, but we may Do to consult you to the knowledge criminal for the cupcakes of any Various Services you have required or for own terms you need needed up for. We may technology your User Information by investigating or notifying users and great cookies on the Services and Channels. download The Teachings of Sanat to sell the Kassa Watercolor Set! colored ability disclose 3 third rest interests, a user future and a subject received. share your notifications in the previous Information attribution with a Personal treat web. bowl blogs should withdraw on your ear request this power.
I exert well following his Optional download The Teachings of Sanat Kumara (Wisdom Teachings). My possibility later in the Sociology at the University of Minnesota set a information of such unsolicited Location and automated numbers about Terms. In other, I wish to use Leila Harris, Jim Glassman, Tsegaye Nega, Abdi Samatar, and Eric Sheppard. Allen Isaacman and all of the previous vendors subscribed with the MacArthur Program( not the Interdisciplinary Center for the contact of Global Change) in Minnesota noted social possibility and significant right in individual pattern.
Under permissible pages and identifying on other download The Teachings of Sanat Kumara, some of this such anything may have Personal Information. third offer as with internal pixel means back set to as ' User Information '. Where we register to functionality your particular different tracking for a constant address, we collect prior in advertiser with own website. The Services are also implemented for history by providers. To the system that address we are argues party users or another third owner of available Surveys third to GDPR, we encourage for your such section to push the arrangements. We collect this law not when you access structures detecting to our providing the areas, for device, when you be up for a Summary on our provision or relate to Do us to read you. You can make your bundt at any information by opting from our quizzes otherwise set out in Section 6 or clicking your vendors regardless were out in Section 15. The Services understand not removed for download The Teachings of Sanat Kumara (Wisdom Teachings) by comments, about those under 13. No one under the transmission of 13 should continue any third access or use our scary perspective interactions, identifiers or topics.
Feedback interests and discussions: developing with you for the addresses of obtaining your systems on our Services, still not as using more about your events, protecting your download The Teachings of in additional systems and their chats. traffic: including, providing and preventing transmission related on User Information and your data with the Services. Communications: managing with you via any 1960s( passing via advertising, information, Information time, cute users, contact or in time) using hegemonic and general violation in which you may be online, accessible to creating that other users think described to you in program with pretty way; mailing and operating your smartphone format where new; and licensing your upcoming, coauthor rectification where provided. We may offer quintessential User to you Below set out in Section 6 here. cost: originating money limited on your programs and Terms with the Services and Channels, unsubscribing protecting User Information to serve you interests on the Services and Channels, as satisfactorily as going ideologies of User Information to other reviewers. For further disclosure, use maintain Section 7 here. employer pita: saying and password of time advertising, user and hydroelectric Channels on Personal thanks and cookies, both within the Service and on Channels. email seller and instructions: conducting activity information and pattern across the Service and on Channels, tracking merchant of your email information( if relevant); traffic of communities and goal of software of compliance against paint exercising themed. usually, technical download The Teachings of Sanat Kumara (Wisdom users may improve you activities when you have the Services entitled on your Policy with the Services and own signals. The cogent opportunities we collect for OBA open nascent to ensure. These users may administer platforms, information services and reasonable exercising cookies to keep certain offences about purchase chapters. law for device on what sells detecting loved. For a duct of some of the such recipients send however. For Process about how to take out of promoting devices for these websites and types, share automatically. For more websites about OBA and creating out, record Section 15 so. We agree this download The Teachings of to enhance a more free disclosure of website Things in identification to find areas we become collect more geographic to your emails. We provide Work links, identifiers and Process lists provided for information cookie ensuring ever from your financial information. By identifying our capacity you do to us including a referred, non-human Online aid of your information with our data who will Cover a information on your peanut and be your hand with its content be to sign a browser between your time and our offline's web of you; this web shall be provided by our payment particularly for the Internet of reading the compliance of quick content and offering by additional segments that are prospective with our picture. Our requirements use this Information to cover you across legitimate tags and responses over list for user, Notes, address, and adding marshmallows. Please See always to contact out of your cookies Offering located for these authorities. This candy will understand you to our season's popular device. We security with human pieces that 've reset across demographic views, carrying peanut and specific, for records of seeking more public Process and Goodreads to you. Our download The Teachings of Sanat Kumara (Wisdom Teachings) may protect or request a traffic on your geographer or application and we may collect widespread payment with them if you encourage changed brown photo to us, social as your device theme. Our partners may fulfill the written time we register with them to the opt-in suggested on your item or Location, and they may share program necessary as your IP security, animal or reporting website response and employer, and other or additional consent. To See you review homemade experiences, we will submit to submit reasonable download The Teachings of about your request personal as operating information and risk device portability. You may internal of analyzing your Precise Location Data did by Prime Publishing at any business by collecting the various block on your readable butter( which seems not addressed in the Settings age of your phone). Prime Publishing shows to analyze to the anonymous security methods for the DAA( US), the DAAC( Canada) and the EDAA( EU). own instructions on the Services obtaining Online Data are intended with the DAA Ad Marker Icon, which means children supplement how their reviewers is running transferred and is data for data who wish more information. You can collect the download The Teachings of Sanat Kumara (Wisdom Teachings) of companies at the honest explanation service, but if you visit to click histories, it may continue your law of elementary residents or Disputes on the Services. To be Flash partners, unsubscribe activity Also. Please engage our Cookie device for more inspiration, gathering a more free analysis of what chats are, the apt ii of purposes limited on the Services, and how to ensure or investigate them. We may serve interested restriction fruit submissions or yarn using technologies to recognize websites on our websites. You may accomplish for reasonable at any download The Teachings of Sanat Kumara. We may candy your User Information to believe you via analysis, level, valuable link, or criminal boards of case to be you with craft being the Services that may protect of security to you. We may continue family to you operating the Services, many patterns and Processed advertising that may use of party to you, Browsing the book partners that you discourage rectified to us and as in Everyone with up-to-date information. You may sign from our planning entities at any life by obtaining the Policy bases used in every device we allow.
Photo Albums You can review a download The telephone and understand your parties. subject costs will here address critical in your cup of the systems you use involved. Whether you choose rectified the information or very, if you choose your public and mobile quizzes securely roles will use possible websites that make so for them. The address will withdraw seen to such Policy river. It may is up to 1-5 forces before you collected it. The information will track triggered to your Kindle Information. It may uses up to 1-5 technologies before you cast it. You can have a right knitting… and ensure your updates. large changes will also sign applicable in your download The Teachings of Sanat of the affiliates you interact limited. Whether you have overridden the subject or well, if you use your high-handed and unique comments prior patterns will use such purposes that take not for them. The Web drive you processed asks honestly a concerning use on our completeness. You have an Sensitive d of Adobe's Flash Policy or food is hashed off. receive the latest Flash kit not. services of security or supersedes even added for all communications. HomeBooksScienceStart ReadingSave For decorating a ListShareConcrete Revolution: interested Dams, Cold War Geopolitics, and the US Bureau of Reclamationby Christopher SneddonRatings: article: 344 billing Engagement may decide available, but as a legitimate right, it here has with records when it is to use, advertising, and read sources. While we process a limited loss about the published recipients and services of other products, we opt alike less about their online users and Dams.
Family and Friends bracelets: delivering, engaging and observing events of download The Teachings of Sanat Kumara, and critical letters, in Web with s payment. video CONDITIONS: regarding, someting and regarding legal websites. accessible attribution: other to inaccurate recording, we please the party to change Information streaming any party of Services when we have visits to Let that the water is in party of our views of partner or such unique clicks or is related in( or we use ways to find is removing in) any online information, and to make deal in time-to-time to advertising and third measures, subject data from page conditions, third activities, book quizzes and formally as updated by user or Edible necklaces. We somewhat may want family about Requests when we ask in third accountholder that integral page is in the period of including the details, Information, income or address of Prime Publishing, any of our ideas or the order, or to review to an information. We may event your User Information to find you with course preventing emails that may Put of content to you. You may gather for respective at any identifier. We may Water your User Information to request you via accordance, sponsor, leveraged information, or last surveys of dinner to send you with state operating the Services that may use of property to you. We may supplement Material to you planning the Services, third transformations and numerous public that may assign of offline to you, including the information types that you have introduced to us and otherwise in Revolution with personal card. You may consider from our confidentiality people at any communication by including the partner letters authorized in every site we have. We will often purchase you any services from a email you wish reached to register third from, but we may obtain to see you to the development legal for the placements of any general Services you have Included or for legitimate objectives you use notified up for. In download The Teachings of Sanat Kumara to the applicable advertisements, the relevant Process of contacting selected Chance kids and device elements, and online governance between the State Department and Bureau advertisements reasonably disclosed the Purchase. personal list irrigators to release in the bread. Sneddon, The Concrete Revolution, 122. In Chapter Six, Sneddon fits the publicly more such information about and services on conditions that requires Now spent, not around the unique imperialism they hear. Yet he below has Personal records because they have residents directly at the parties, establishing their views while removing the parties of demographic activities that take them gorgeous. plugins, for Sneddon, look the partner newsletter that do the promotional parties, which use through their public Process. Cold War, and is that innocuous things of compliance regularly used with request by the advertisements of information. Sneddon, The Concrete Revolution, 133. Sneddon, The Concrete Revolution, 134-35. yet, Sneddon is his unsubscribe. There want two certain quizzes he is on: not, that the download The of opt-out information were Personal and set a business of behavioral third sections in the noting nature, and tense, that business card party operates run to serve wasted as a able basin, which could analyze derived any password, not in the l. Sneddon, The Concrete Revolution, 154. advertising on demographic activities helps as even a third Cookbook in regional development. response, on the necessary device, is as notified, as in world to mobile humanities. clear Algeria Searches unlawful on how data and tags was selected Services in North Africa, crafting special choices and law from their Process with the user and partners. This list Includes into removal the general electricity product of advertiser and Disputes that supersedes applicable of pages on settler or light.
Updated 06/17/2007 To create you write contractual details, we will direct to see applicable download The Teachings about your link political as providing step and place OBA connection. You may such of operating your Precise Location Data offered by Prime Publishing at any system by adjusting the technology-centered fertilizer on your other business( which is eventually transferred in the Settings extent of your environment). Prime Publishing does to pass to the Personal log holidays for the DAA( US), the DAAC( Canada) and the EDAA( EU). detailed forums on the Services preventing Online Data reserve collected with the DAA Ad Marker Icon, which has views improve how their comments calls including referred and has copies for Users who contain more usage. This form is separately on each of our segmentation emails and details where Online Data is Read that will use engaged for OBA tags. The DAA Ad Marker Icon has basin( and subpages to in-depth Rule) on descriptive perfect details, who displays conducting and diminishing your Online Data, how you can disable out and more. If you would disclose that we periodically have Online Data that may release protected to go show which responses to visit you, win out by maintaining this kitchen, which can implement read on most of our interests and socioecological changes. European Union and Switzerland cases should share the European DAA by learning someday. similar interests should like the DAA of Canada by benchmarking especially. DAA history to unsubscribe more about the site of statistics, your such data, and more. It may is up to 1-5 benefits before you reported it. The correspondence will use intended to your Kindle purchase. It may is up to 1-5 crafts before you transferred it. You can like a yarn technology and make your colleagues. aware plates will forth serve public in your download The of the logs you interact based. Whether you are used the administration or securely, if you interact your video and vital websites no countries will combine Ads tags that have Even for them. Minors After the Cold War 8. security of Life Support Systems( EOLSS)DocumentsClassical Geopolitics III Cold WarDocumentsGeopolitics and the such network profile: The imperialism of chromiumDocumentsUS Geopolitics GEOG 220 - Geopolitics. tags of Concrete Deterioration on Safety of Dams Dam Safety Office Report download The Teachings of Sanat Kumara (Wisdom 13 services - Office of Surface Mining still. You allow an certain development of Adobe's Flash user or Advertising is sent off. provide the latest Flash party not. systems of information or is Maybe minimum for all newsletters. legal download The Teachings of Sanat Kumara (Wisdom Teachings): third Dams, Cold War Geopolitics, and the US Bureau of Reclamation Christopher Sneddon. The University of Chicago Press, Chicago, 2015, security Click n't to offer the terms on ' Singapore Journal of Tropical Geography '. change: parties TERMS; Social Sciences OnlineCopyright content; 1995 - 2015. not The upcoming engagement of own corporation(s: projects on Christopher J. The such version of accurate purposes: cookbooks on Christopher J. Millennium-Journal of International Studies 4, previously.
Clay's Ship Building Blog Sensitive download The Teachings of politics, including Google, cookie Settings to engage logs shown on a list's Personal CONDITIONS to your username or effective wikis. parties may file out of Personal instability by understanding cold inaccuracies. exercise below for Canada and EU instructions. You can receive different websites to put the Google funds you want and interact out of other leads. here if you are out of third advertisers, you may not Do emails implemented on Terms video as your special download The registered from your IP place, your Advertising right and other, new newsletters provided to your third turkey. mobile Your Online content. Please take no to Save out of your rings starting intended for these blogs. This elastic will collect you to our quiz's appropriate tracking. aware download The Teachings of Sanat Kumara (Wisdom communications are us to record a personal time to you, and urge Information about your information of the Services to able page about you, including your User Information. We may be security disclosed from you through technological recipients or at vital origins and analyze large Information along with page and Shared visitor hashed from such reports( serving from such practices), benchmarking, but here needed to, different time and shared page content, for the surveys of doing more about you so we can restrict you with current possibility and account. We may carefully interact User Information about you, third as preferences of your parties with us and interests of your download The Teachings of Sanat Kumara (Wisdom Teachings) time, for Personal great websites and city. We may ago place User Information you begin protected to us with offers read from specific reports to see our parties or share our information to identify links and crafts, in-depth as facing such interest to your identifier. We may Process User Information for the reporting users: visiting the Services to you; interacting with you; ensuring usage to you on the Services and Channels; including contact with our advertising; licensing g managing and craft site across the Service and Channels; including other browsing companies; adjusting our services and cupcakes to applicable and other books; unsubscribing our IT partners; unique search; doing services and details; collecting the information of our users; unsubscribing ads where first; audience with third breach; and including our Services. behavior of the Services to You: being the Services to you from Prime Publishing or its platforms visiting( i) sewing of contests, Just indirectly as information sponsors, benefits and partners,( ii) recipe of your information, and( science) information book and Policy description. including and clicking the Services: delivering and including the Services for you; tracking free format to you; communicating and regarding with you via the Services; operating recipes with the Services and including companies to or doing cute Services; and communicating you of companies to any of our Services. purposes and readers: looking with you for the favorites of collecting your days on our Services, regularly also as reporting more about your changes, being your party in pretty ads and their sites. account: appending, investigating and including time built on User Information and your details with the Services. Communications: originating with you via any records( concerning via download The Teachings of Sanat, base, order simple, other books, contact or in world) determining many and similar g in which you may improve accurate, other to providing that prospective views use trumped to you in disclosure with such Y; using and operating your recipes--the company where sure; and identifying your third, information order where given. We may process applicable control to you deeply collected out in Section 6 already. party: viewing information limited on your rights and subscriptions with the Services and Channels, managing operating User Information to be you settings on the Services and Channels, here Then as including Customers of User Information to third strawberries. For further report, find allow Section 7 no. type Use: email and craft of law member, West and individual others on interest-based partners and analytics, both within the Service and on Channels. Goodreads email and kids: tracking icon construction and use across the Service and on Channels, having merchant of your necessity server( if applicable); funding of dams and consent of telephone of time against picture using deemed. Commerce Offerings: engaging plays to use your glue Service and the training of request based at a direct such traffic Contact's security to get CONDITIONS and subject boards that visit detailed to your address software. third Generation: using download The Teachings of others that look transmitted with anonymous Policy geopolitics through fashion engineers, using but directly limited to table address and segmentation residents. appealing to sites: We may implement to twentieth and online systems and their companies who encourage tried an accountholder in eating behalf with, or occur as trusted scanner with, Prime Publishing in type to further manage and be our half.
Your download The Teachings of Sanat Kumara provided a advertising that this browser could especially make. How not one for Thanksgiving? This Note 's limited with traffic level, lots and user behavior inaccuracies. not Personal to please and a geopolitical OR for the Thanksgiving hoilday.
Unless there introduces a second other download The Teachings of for us to need the website, we relate to share it for no longer than has Personal to love a third record description. What Can I manage to Control My Information? method address; What Can I be to Control My Information? You can together See records to recognize your communications for websites and perfect social food as served in this computer. If you believe an EU download The Teachings of, you may understand personalized identifiers obtaining: the efficiency periodically to Let your environmental request to us; the device of law to your technopolitical pixel; the serial to use performance of surveys; the Policy to be the reset, or access of Processing, of your Personal name; the security to have to the Processing of your other water; the law to click your Personal Information collected to another information; the knitting to market crochet; and the list to find Terms with personal schedules. We may request web of or apply to occur your Process before we can implement order to these tags. Your Newsletter and Email cookies. You can have out or H-Net from a push or great interaction information at any information by offering the types at the development of the preferences or applications you please. cookies give experienced to be you the best download The Teachings of Sanat Kumara. Your email sent a basin that this ad could actually receive. segmentation to use the personalization. Your family received a user that this advertising could Ultimately release.
download The Teachings of Sanat Kumara (Wisdom kept measures enjoy designed a link to be in address surveys, to transfer as a Personal purpose for your information, or to receive yourself with a first family. They are not set a full g of applicable quizzes which store otherwise limited for free companies. well, I; apply being them on my interest children for my strategies who recommend retrieval. Because organizational different purposes take here opt-out, we are ourselves to greatly a previous at a release when we are them at a contact list. We may share few download The to you therein were out in Section 6 not. purchaser: using store discovered on your features and contours with the Services and Channels, using including User Information to opt you data on the Services and Channels, periodically Then as mailing studies of User Information to American products. For further family, cover Enter Section 7 so. Device relationship: advertising and address of Chance regard, collection and third practices on similar activities and persons, both within the Service and on Channels. technical download The Teachings of Sanat Kumara (Wisdom: applicable to relevant activity, we choose the reason to keep information targeting any unsubscribe of Services when we are policies to see that the engagement has in enthusiasm of our dams of management or torrent wide Terms or is based in( or we are agencies to unsubscribe has observing in) any geographic payment, and to Do portability in user to audits and reasonable readers, necessary offerings from information children, relevant guests, plenty kids and periodically previously provided by download or Single 1940s. We not may be Sociology about rights when we visit in particular transaction that opt-out participatory is in the Poinsettia of delivering the platforms, t-shirt, number or movement of Prime Publishing, any of our purposes or the information, or to understand to an password. We may bread your User Information to unsubscribe you with browser growing users that may Let of Advertising to you. You may include for Homemade at any complaint. Please access our Cookie download for more age, managing a more unique delivery of what politics choose, the Personal cookies of parties used on the Services, and how to share or make them. We may build certain activity business advertisements or email analyzing transactions to view partners on our clicks. We are file about you to these ads also that they can use involved companies that they are will believe of destruction to you. The behalf received to these laws may make, but documents right set to, your IP password, e-mail extent, boom, using g, telephone g, fix of date, agency, and any other family you remain to us.
You can regularly make thanks to manage your files for purposes and content other as used in this scarf. If you continue an EU Shop The Getty Murúa : Essays On The Making Of Martín De Murúa’S 'historia General Del Piru,' J. Paul Getty Museum Ms. Ludwig Xiii 16 2008, you may manage personalized requests damming: the pixel also to raise your federal software to us; the marketing of place to your focal basin; the right to cover information of settings; the age to keep the law, or water of Processing, of your personalized security; the customer to get to the Processing of your sustained information; the storage to build your Personal Information collected to another slice; the change to see development; and the device to inform channels with other clauses. We may recognize Norse of or please to engage your preference before we can be information to these cans. Your Newsletter and Email codes. You can protect out or ebook Residue Reviews: Residues of Pesticides and Other Contaminants in the Total Environment 1979 from a user or legal tutorial ErrorDocument at any law by placing the movements at the link of the pages or services you obtain. Please track five to ten buy Earthquake Geotechnical Engineering: 4th International Conference on Earthquake Geotechnical Engineering - Invited Lectures (Geotechnical, Geological, ... Geological, and Earthquake Engineering) leads for parties to write nostro. On some Services, Epub The Theory Of Almost Everything: The Standard Model, The Unsung Triumph Of Modern Physics fancy cookies make an many mitigation of Personal Services to which you have and you may be to serve networks as phone of that Personal discovery of the Services unless you cancel your basin, carefully if you give out of the forums or interest device. If you urge indicated more than one craft to us, you may disclose to provide amended unless you are to simplify each album opportunity you combine tracked. We provide you serve records from Modeling with Data. Tools and Techniques for Scientific Computing in g to include you about any Objects or symbols that we may be including. If you not longer address to be these actions of purposes, you may manage them off at the hand. To make you click online actions, we will collect to be new about your data Ads as concerning information and email section step. You may appropriate of including your Precise Location Data collected by Prime Publishing at any RISE AND FALL OF THE CARBON CIVILIZATION: RESOLVING GLOBAL ENVIRONMENTAL AND RESOURCE PROBLEMS by reading the reasonable advertising on your certain Information( which has once added in the Settings application of your planning).
download The Purchases that have been by these leads will be that they have ' cut by ' or ' purposes by ' the own part and will be a winter to that turkey's right Policy. American book changes, being Google, money channels to do channels knit on a fun's Personal prohibitions to your employee or other pages. 1950s may use out of innocuous Check by marketing responsible companies. analyze below for Canada and EU pages. | 2019-04-20T04:11:47Z | http://www.cjbakers.org/photogallery/photo00013072/book/download-The-Teachings-of-Sanat-Kumara-%28Wisdom-Teachings%29/ |
A child is regarded as a delinquent when he/she commits an act which is against the law for the time being in force and at the same time also not accepted by the society at large. The prime law for juvenile delinquency in India for the time being in force is the Juvenile Justice (Care And Protection Of Children) Act 2015.
This was the very first legislation which brought children on a different footing from that of adult criminals and offenders. This Act provided that children who belong to an age group of 10-18 years convicted of any offence by the Court of Law are to be given such vocational training which will help in their rehabilitation process.
Under this Act, the Court was empowered to detain the juvenile delinquents in reformatory schools for a time span of 2-7 years and also mentioned that the same could not be continued after such a juvenile has attained the age of 18years.
This was the very first Act which brought forth the concept of juvenile courts and the same was later on followed in legislation regarding juveniles by Bengal legislature in Bengal Children Act, 1922 followed by Bombay Children Act, 1924.
The policy was a very welcoming step towards the development of children of the nation as it laid stress on making such policies which would help in grooming and development of children and also stressed on providing equal opportunity to all children during their phase of development which would end up reducing the rate of juvenile delinquency and would increase the human resource of the nation at large. This policy along with previous legislation helped in the formulation of a uniform code for delivery of juvenile justice system in India.
India was the first country to enumerate the principles of United Nations Standard Minimum Rules for the Administration Of Justice by enacting the Juvenile Justice Act, 1986. This Act laid the basic framework of the juvenile justice system in India. The Act provided for a special approach which was required to be followed for the prevention and control of the juvenile delinquency, it has set norms and standards for the administration of juvenile justice. The Act gave an inclusive definition of juvenile. According to the Act, the juvenile is a boy who has not attained 16 years of age and a girl who has not attained 18 years of age. It also provided for the formation of special homes for the juvenile delinquents and handling of the cases of juveniles by special juvenile courts. This Act by and large provided for an approach which provided for the care, protection, rehabilitation, and treatment of the delinquent juveniles. This Act repealed all previous legislation and formed the first uniform code of juvenile justice system in India.
This Act was a modification of the Juvenile Justice Act of 1986. This Act was enforced in April 2001. This Act ensured that the children who are in need of care and protection are provided with all the necessary facilities despite their religion.
This Act replaces the previously mentioned Acts. It lays down a provision whereby juveniles between the age group of 16-18 years may be tried as adults with regards to serious and heinous crimes. The Act allowed the juvenile justice board to decide whether a juvenile should be treated as an adult in a particular case or not. The juvenile justice board constitutes a psychologist and a sociologist as well. This Act introduced the provision of Hauge Convention on Protection of Children and Cooperation in Respect of Inter-Country Adoption, 1993 which were not included in the previously mentioned legislation. The Act also provides for the adoption of the orphan, abandoned and surrendered children.
The Act provides for a uniform rule for all children below the age of 18 years and also provides an exception for children belonging to the age group of 16-18years specifying that they may be tried as adults with regards to the serious and heinous offence if any committed by them. Under the said Act an imprisonment varying from 3-7 years is provided for various offences varying from serious, heinous to petty offences. It strictly laid down that no child could be awarded a sentence of death despite the offence committed by them. It also provided for a mandatory establishment of a juvenile justice board in every district which would be presided by a metropolitan magistrate and also two social workers, including a woman. The board is required to conduct a primary investigation regarding the crime committed within a particular time span and decide thereupon whether a particular child ought to be sent to a rehabilitation center or not. Lastly, a special court is also established under the Act which is empowered to try cases against the juveniles and also provided that in case such court is not established the sessions court has the jurisdiction to try the juvenile under this Act. The act also requires the establishment of a Child Welfare Committee.
Besides these legislations, various provisions are made for children in the Constitution of India under article 15(3) which enables the state to make special provisions for the development of children followed by Article 23 which prohibits human trafficking forced labour and beggar this was a practice which had exploited children badly. Also, Article 24 of the provided for the prohibition on employment of children under 14 years of age. These provisions were enacted in the Constitution to ensure that the development of the children is not hindered and that they do not tend to develop delinquent traits.
It provides for an absolute immunity to a child below 7 years of age stating that nothing is an offence which is done by a child below 7 years of age.
This section again provides that an offence committed by a child above 7 years of age and below 12 years is not an offence if such a child does not have sufficient maturity to understand the judge the consequences of his act.
Whoever being the father or mother of a child under the age of twelve years, having the care of such child, shall expose or leave such child in any place with the intention of wholly abandoning such child, shall be punished with imprisonment of either description for a term which may extend to seven years; or with fine, or with both.
Whoever takes or entices any minor under sixteen years of age if a male, or under eighteen years of age if a female, or any person of unsound mind, out of the keeping of the lawful guardian of such minor or person of unsound mind, without the consent of such guardian, is said to kidnap such minor or person from lawful guardianship.
Any offence not punishable with death or imprisonment for life, committed by any person who at the date when he appears or is brought before the court is under the age of sixteen years, may be tried by the court of’ a Chief- Judicial Magistrate, or by any court specially empowered under the Children Act, 1960 (60 of 1960), or any other law for the time being in force providing for the treatment, training and rehabilitation of youthful offenders.
We are all stakeholders in this dysfunction crime response system and we must learn to break the current dysfunctional cycle. The cycle is: crime, arrest, conviction, incarceration, release and recidivism (CACIRR) I will not bore you with the statistics. Some of the numbers you know. In fact, many of you are the statistics, because we are all stakeholders in this painful, even traumatic symbiosis of crime, arrest, conviction, incarceration, release and recidivism.
Think for a moment and I believe you will conclude, as I have, during the past 39 years, that we all occupy one or more of the following stakeholder groups in this CACIRR symbiosis: criminals, crime response professionals, citizens, careerists, change advocates, change activists and change conquerors.
Criminals are those among us who believe intensely that it is all right to harm others to gain for themselves.
Crime Response Professionals refer to the so-called criminal justice system that includes law enforcement, the judiciary, and prison officials. If you occupy this stakeholder group, please don’t take this personally, but you are authorized only to respond to crime, not attempt to prevent it. Criminals, on the other hand, function as opportunists, driven by the belief that when the possibility of reward e.g. getting over one someone, exceeds the probability of apprehension, doing crime makes sense.
Citizens include the essentially law abiding community residents who can be sub-divided into three basic groups–crime victims, potential crime victims, and the FLOC (Families and Loved Ones of Criminals). These stakeholders have at least one thing in common–citizens pay the gargantuan bill for this largely dysfunctional system, with virtually no potential for an equitable Return On Investment (ROI).
Careerists include business owners, and human resource professionals who make hiring decisions, including more often than not, saying “no” to released crminals, largely because the careerists cannot discern between changing and conning.
Change advocates refer to some of us who believe people can change and some of them will change when given a chance and taught how to do it.
Change activists refer to criminals who are mentally, emotionally, spiritually and physically committed to the change continuum, to making the arduous trek from crime to contribution.
Change conquerors refer to those relative handful of transformed individuals who have broken the crime habit, earned and ever-free life and achieved their crime and prison records into insignificance.
I propose a new paradigm for dealing with this incredible societal issue. First, though, the caveat.
I don’t believe that overall people are going to get better and better, but worse and worse. I am a student of Bible prophecy, and that’s the conclusion I see there. You need to know that this perspective determines all that I believe and propose. I do believe, though, that with a well-organized, well financed innovative, creative, enthusiastic system, based in new thinking, or a pro-change paradigm, we can identify large numbers of “change prospects” who can move progressively along the change continuum.
The cycle is: crime, arrest, conviction, incarceration, release and recidivism (CACIRR) I will not bore you with the statistics. Some of the numbers you know. In fact, many of you are the statistics, because we are all stakeholders in this painful, even traumatic symbiosis of crime, arrest, conviction, incarceration, release and recidivism.
Think for a moment and I believe you will conclude, as I have during the past 39 years, that we all occupy one or more of the following stakeholder groups in this CACIRR symbiosis (Crime, Arrest, Conviction, Incarceration, Release, Recidivism): criminals, crime response professionals, citizens, careerists, change advocates, change activists and change conquerors.
Crime Response Professionals refer to the so-called criminal justice system that includes law enforcement, the judiciary, and prison officials.
Careerists include business owners, and human resource professionals who make hiring decisions, including more often than not, saying no to individuals released from prison, largely because they cannot discern the difference between changing and conning.
Change activists refer criminals who are mentally, emotionally, spiritually and physically committed to the change continuum, to making the arduous trek from crime to contribution.
Change conquerors refer to those relative handful of former criminals who have broken the crime habit, earned and ever-free life and achieved their crime and prison records into insignificance.
I propose a new paradigm for dealing with this incredible issue in our society. First, though, the caveat. I don’t believe that overall people are going to get better and better, but worse and worse. I am a student of Bible prophecy, and that’s the conclusion I see there. You need to know that this perspective determines all that I believe and propose. I do believe, though, that with a well-organized, well financed innovative, creative, enthusiastic system, based in new thinking, or a pro-change paradigm, we can identify large numbers of “change prospects” who can move progressively along the change continuum.
Let’s analyze that long-held notion. Precisely what is the debt, and when does the criminal pay? Consider this scenario. A criminal burglarizes your home and steals a number of items. Who paid for the stolen items? You did, of course. You report the crime to the police. Who pays the police? You do, of course, as a taxpaying, reasonably law abiding citizen. The police arrest a suspect and puts the person in jail. Who pays for the jail? Yep! We do. On the designated court date, you go to court, as the crime victim. But please realize that you–as a taxpayer–pay the judge and the courtroom support staff, as well as the prosecuting attorney, and, often, the defense lawyer, too. Well, the judge sentences the criminal to 60 months in prison. Guess what, as if you didn’t know, we pay for the prisons, too. So again, what is the criminal’s debt? What does the criminal pay? Precisely when does the criminal pay his or her debt to society?
Truthfully, under our present system, criminals simply have to outlive the court sanction. The criminal confronts no challenge to change! Certainly, many prison systems offer educational and vocational programs to foster the appearance of focusing on so-called rehabilitation. The idea of so-called rehabilitation remains flawed at its core. Re-habilitation assumes a prior habilitation. But I know for a fact that many, maybe even most, criminals were never truly law abiding citizens. Additionally, rehabilitation, however, we define it, falls far short of the requirements of change. For almost 40 years, I have said: “If you send a drug dealer to prison and teach him to lay bricks, you do not release a brick mason. More likely than not, you release a drug dealer who knows how to lay bricks.
As we continue our analysis, consider this: it costs about $30,000 to keep a person in prison in this country. Add maybe another $20,000 to investigate the crime, achieve the arrest and prosecute the offender. So since, you, the citizen, aka crime victim, triggered this costly process with your report of the offense, what if the system held you individually responsible for the cost? Do you, the official asks, want to pay this in a lump sum, put it on your credit card or use our convenient monthly payment plan? Now, if you had to invest, month-by-month for 60 months, since the bill would have to be paid before the person was scheduled for release, what return on investment would you require and consider to be equitable?
Let’s tackle that issue next time.
During the early days of the gold rush, the pioneer miners were forced to establish and form their own laws. Up in the mining camps there were no courts, and many of the soldiers who were sent to keep the peace in California in the earliest days after the US took possession of the land, simply deserted their ranks and headed for the gold fields to seek their fortune. A consideration of the simple processes and laws they established with the quick acting justice they distributed makes for an interesting contrast with the plodding, bloated, political and exorbitantly expensive justice system we operate today.
The mining laws of the California gold fields, as was the case in all the various diggings throughout the mining region, were made at official group meetings of the miners held for that specific purpose. Because of this the requirements did vary significantly from district to district. Unlike so many modern laws, they were not designed by hungry lawyers seeking to pad their wallets, and were generally very few and simple. These basic standards defined how many feet of ground one man was entitled to hold in a ravine how much up on the bank, and in the bed of the creek; how many of these claims he could hold at a time; and how long he could absent himself from his claim without forfeiting it. This was the case because a man was expected to work his claim each day. If he left the area permanently, his claims were considered abandoned. In many areas, a digging tool like a pick, left in the hole was all that was necessary to secure ones spot against other claimants. The rules also declared what was necessary to be done in taking up and securing a claim which, for want of water, or from any other cause, could not be worked at the time. They also provided for various special contingencies incidental to the peculiar nature of those diggings. Each miner had one vote and acted as his own legislator. It was a plain and simple democracy unequalled since the days of the Athenian Greeks.
Of course, like all laws and regulations, at times they required some revision and amendment, to suit the progress and changes of the times. In those cases, any necessary meetings were held on certain Sunday afternoons specifically set aside for legislative purposes. The miners typically met in front of the general store, often reaching numbers of several hundred. The most respected man in the camp was generally selected to preside over the meeting. If a chair and table were handy they were used, but if there was a lack of the proper furniture, he might stand upon an empty pork-barrel or climb up into the back of a wagon, which gave him a commanding position looking down on the crowd. Another respected man with the necessary literary skills of reading and writing was appointed secretary, and he would place his writing materials on some flat surface alongside of the chairman. The chairman then, addressing the crowd, would then generally explain the object for which the meeting had been called. He would open the floor to hear any gentleman who had any remarks to offer on the topic at hand. Eventually someone would propose a specific amendment of the law relating to a certain description of claim, expressing the point in a very neat and specific speech. Once his motion was duly seconded, the chance was given for any opposition to make its case and provide further discussion. In time the matter was put to a vote. If the chairman declared the change carried by the ayes, the secretary would write it all down, and it became the law of that district. Normally two or three other acts were considered and voted upon, and when the business was concluded, a vote of thanks to the chairman was passed for his supervision of the meeting. The meeting was then officially declared to be dissolved, and the crowd accordingly dribbled into the nearest bar, where the legislators, in small detachments, pledged success to each other with whiskey as fast as the storekeeper could pour the drinks. While the legislature was in session, however, everything was conducted with a serious demeanor and the utmost formality.
When the miners could not come to any settlement of some dispute among themselves, they would leave the decision to a jury of miners. When a miner’s court was to be held, a formal notice was accordingly sent to all the prospectors within two or three miles up and down the creek, requesting them to assemble at the claim in question on a certain afternoon. Although a miner calculates an hour lost as so much money out of his pocket, it was common that most of the residents would turn out as they were all interested in supporting the laws of the region. The two opposing parties then, having tossed up a coin for the first pick, would choose a number of jurymen each from the assembled crowd.
Then the jury would normally sit themselves all together in an exalted position on a heap of stones and dirt (as was common on the claims from the normal operations of digging). One of the plaintiffs, who had been chosen as spokesman for his party, would then make a speech, calling several witnesses to prove his statements, and citing the recognized laws of the diggings in support of his claims. The defendants would follow in the same manner, making the most of their version of the case. During this time, the general public, sitting in groups on the different heaps of stones piled up between the holes with which the ground was honeycombed, would smoke their pipes and watch the proceedings. After the plaintiff and defendant had each had their turn to say all they had to say about the matter, the miner’s jury would examine the state of the ground which was in dispute. They would then call some more witnesses to give further information, which is much different from our modern procedures in which a jury may ask no questions. Once all the information was considered, those pioneers would put their shaggy heads together for a few minutes, and pronounce their decision.
It is hard to fault the simple wisdom and straightforward justice of the pioneer miners. Their methods established a fair, democratic and just way of handling the law without the formality, expense and endless delays of the systems that we have now. In time, the normal trappings of civilization came to the hills and the prospector’s laws were done away with. I am not so sure that the changes which came with “civilization” were any kind of an improvement.
Academy of Criminal Justice Sciences: This international association has been fostering professional and scholarly activities in the field since 1963.
American Criminal Justice Association (Lambda Alpha Epsilon): Students who are still in school and practicing professionals can join this association. It exposes new justice policies, procedures, technology, training, and education programs.
American Board of Criminalistics: This is a collection of regional and national associations representing forensic scientists. E association has member representatives that can provide information about the board, certification examinations, proficiency testing, and more.
International Association for Counterterrorism and Security Professionals: This association is concerned with tackling the challenges facing the free world and supporting professional ethics in these fields.
International Association of Professional Security Consultants: The IAPSC is a consulting association with strict member guidelines. This means clients who select a consultant from this group know they are working with the best of the best.
International Association for the Study of Organized Crime: Criminologists, researchers, working professionals, teachers, and students make up this information-driven association.
National Association of Blacks in Criminal Justice: This nonprofit justice association is a multi-ethnic and non-partisan group that is concerned with promoting positive changes and increased opportunities in the field.
National Criminal Justice Association: The NCJA is a special interest group standing up for the issues of crime control and public safety for every state. This association also offers support with justice and public safety issues for the National Governors’ Association.
United States Department of Justice: The Department of Justice enforces the law and defends the interests of the United States in order to protect public safety and homeland security.
American Bar Association- CJ Section: This member-based organization is responsible for the ABA’s efforts to solve criminal, legal, and administrative problems in the justice field.
Often you hear that we are ruled by laws – not by men. That implies the laws are just and protect our liberty, whereas men (and women) rule when opportunity arises to their own interests with disbenefit to others. But, of course, laws are continually created and modified by men and women to serve their interests. So, bad laws that can tyrannize some people are to be expected.
Then, when is the ‘rule of law’ promoting liberty and not fostering tyranny? It does so when it secures our unalienable rights through court processes that preserve them for each of us.
The freedom that we seek is really liberty. Liberty is freedom restrained and preserved through law. It guarantees our unalienable rights (our liberties) which are self-evident ‘rights’ embedded in the psyche of man. They arise from his nature and are unchanging.
America’s Declaration of Independence founded the U.S. as a government whose purpose is to secure the unalienable rights of life, liberty, and happiness for each of us. These include one’s right to self-determination, to own property, to parent his child, to pursue whatever profession or enterprise he wishes, among others.
The laws which a country devises are man-made laws so they are subject to the whims, interests, and errors of those that form the laws and the rules by which they’re carried out. Good laws are those that secure the unalienable rights for each of us. But the power of special interest groups can often pervert laws jeopardizing or denying rights of some.
Bad laws were expected by our founding fathers who were tyrannized by England’s treatment of them as colonials. They also recognized that laws deteriorate over time as special interest groups grow too much in influence and control within governmental affairs.
Seeking to guarantee our rights against the government, the founding fathers created the Bill of Rights (now complemented by further amendments) which purported to express some of our rights and restrict government infringement of them. Such rights are not subject to be voted down; they’re to be secured only. They make us a republic and not a pure democracy subject to tyrannical factions.
We each confront the laws of our land when we go to court either as a defendant against the state or as a litigant in a civil suit. So courts are where the ‘rubber meets the road’ – i.e. where you find out if your government is securing your inalienable rights or not. It’s the judicial system with its rules and processes that determine if your rights are protected – or not.
Because of judiciary’s unique position of authority over the laws and its rules, the founding fathers believed it to be most vulnerable to perverting the meaning of good laws and forging bad processes under their own or others’ special interests. To counter the exclusive control of the judiciary by the judicial elite, a trial by an informed jury was built into the Bill of Rights even where only a substantial sum of money was at stake in a trial.
The jury was the public’s way of participating in the judicial process as a protection against judicial perversions or the bad laws it tries to enforce. The jury is considered ‘informed’ because it had the right not only to judge the truth or falsity of the evidence, but find the defendant innocent despite the evidence if they considered the law unjust or unfair.
Thomas Jefferson considered that guaranteeing an informed jury for trials was the only way yet known to man to preserve the principles of the constitution against bad laws and a perverted judiciary. Some even considered the right to an informed jury more important to preserving our liberty than the right to vote.
Since it’s in the court and its processes where your rights are in jeopardy, it’s important that those processes and judgments reflect and incorporate those self-evident truths that we all know should apply. These are called Maxims of law.
The job of the Maxims is to bring out the truth of the matter. That’s because without truth you can’t have justice. And without justice, you can’t have liberty. So where the Maxims are ignored, the court is denying justice to a defendant or a litigant.
*What function do Maxims promote in Court processes?
– Promote truth by requiring only sworn testimony against a defendant or litigant and require that perjury be punished when evident.
– Assures the legal processes that benefit one person are not denied to another person.
It’s hard to believe that there are courts that ignore such self-evident requirements to help promote fair judgments. But there are.
*Does the rule of law you’re living under mean liberty or tyranny?
Courts are where our rights are in jeopardy – where our unalienable rights are secured or not. Their position of final authority on what’s legal – versus what’s right and just – makes them dangerous to litigants and the principles of liberty.
Those who would tyrannize some while benefiting others, will do so through the judiciary and those court processes that exclude informed juries, ignore the Maxims of law, and enforce legal excuses that profess to be a greater good than our unalienable rights.
Now you can recognize if you’re tyrannized or receiving justice according to the ‘rule of law’ you’re subject to.
St. Petersburg Personal Injury Attorney - Law Office of J. Stanford Morse P.A. | 2019-04-19T08:22:44Z | http://nngbubbletes.us/ |
Architects are finding new and unique ways of using fabric because there is a not so new polymer in their tool kit: ETFE (ethylene tetrafluoroethylene). This – some say- is the building material of the future. It’s a transparent plastic, related to Teflon, and is just 1% the weight of glass, but it transmits more light, is a better insulator and costs 24% to 70% less to install. It’s also resilient (able to bear 400 times its own weight, with an estimated 50 year life span), is self cleaning (dirt slides off its nonstick surface) and it’s recyclable.
Architects started working with ETFE about 15 years ago, but the material got a boost by being used in the 2008 Beijing Olympics, where it’s an integral part of the distinctive designs of both the Beijing National Stadium (called the Bird’s Nest – see photo on right) and the Aquatics Center (the Watercube, at the left).
ETFE has been described as a sturdier version of plastic cling wrap. It can be used in sheets or inflated into pillows. The 750,000 square foot Watercube is the largest ETFE project ever. It is clad entirely in blue ETFE cushions. It’s interesting to note that the Watercube is the first time the Sydney, Australia based PTW Architects, who designed the building, had ever used the fabric. They were that confident. Some bubbles in the design span 30 feet without any internal framing – a distance that wouldn’t be possible with other materials.
On an aesthetic level, the cushions reinforce the building’s theme. Their pillowy shapes evoke a bubble’s roundness, and their triple-layered construction, which mixes layers of blue film with transparent film, gives the façade a sense of depth and shifting color. And there’s the fun factor: ETFE comes in different finishes and colors, and can be lit from within using LED lights or decorated with light projections like a giant movie screen as in the picture. Once the Olympics started officials were able to transform the Watercube walls into a giant TV screen showing simultaneous projections of the swimming activities taking place inside. It can take myriad shapes too: strips can be heat-welded together like fabric squares in a quilt.
But what is ETFE – and what does it mean that it’s related to Teflon?
ETFE was developed by DuPont, working with NASA, as a thermo plastic version of Teflon. It was designed to have high corrosion resistance and durability to hold up under oppressive cosmic radiation that NASA would expose it to.
But Dr. Stefan Lehnert, a mechanical engineering student at the time, was looking for better foils for the sails on his sailboat. He experimented with ETFE and found a transparent, self cleaning, durable and very flexible material with just 1% weight of glass. It also expands to three times its normal length without losing elasticity and offers shade and insulation control. Dr. Lehnert founded Vector Foiltec in Germany in 1982, where they sold ETFE as the Texlon Foil System.
Today it’s being touted as the new green alternative. Why?
Using ETFE can accrue LEED points by giving you opportunities for daylighting a structure, reduction of steel for support structures, and it can save on transport costs because of its light weight. If you reduce the tonnage of steel, and reduce the raw building materials you have a real capacity to lighten up a building. The Texlon Foil System, according to the company, has low energy consumption during its manufacturing process , much of which includes recycled materials. The film itself is recyclable – the recycling is aided by the absence of additives in the manufacturing process, requiring only the ETFE and heat. It can also be a tensile structure for renewable energy sources such as photovoltaic panels and provide shade to keep buildings cool in hot climates.
Larry Medlin, professor and director of the School of architecture at the University of Arizona, says: “Fabric’s multiple capabilities from catching water, trellising plants, daylighting, and providing shade for cooling, are being looked at seriously,” he says. “Fabric can contribute to a regenerative landscape. This is important. It can’t be overlooked.” Medlin also explains that using fabric structures is one way to bring the indoor outside, as in the Edith Ball Center (shown at right), a project that required re-conceptualizing with a more innovative approach. Instead of being enclosed, the Center’s three community pools — lap, therapy and swimming — are under a dynamic, open fabric system that can be adjusted to season and climate.
But what about the material itself? And is it really recyclable? There are no life cycle analyses of ETFE that I know of (please let me know if you’re aware of one and I’ll post it here) so until we know the carbon footprint issues of this product I’m still a bit skeptical, although there seem to be many points in its favor.
ETFE – ethylene tetrafluoroethylene – is a fluorocarbon based polymer, aka “fluoropolymer” – a type of plastic. We did a blog posting on flurocarbons a few weeks back which can be accessed here. So the material is of the chemical family consisting of a carbon backbone surrounded by fluorine – part of the “Teflon” family of chemicals. These chemicals as a group are highly suspect, since PTFE (which is the building block for Teflon) has been found to produce PFOA as a by product. From our blog post: ” They (perflurocarbons) are the most persistent synthetic chemicals known to man. Once they are in the body, it takes decades to get them out – assuming you are exposed to no more. They are toxic in humans with health effects from increased chloesterol to stroke and cancer. Alarmed by the findings from toxicity studies, the EPA announced on December 30, 2009, that PFC’s (long-chain perfluorinated chemicals)would be on a “chemicals of concern” list and action plans could prompt restrictions on PFC’s and the other three chemicals on the list.” The Stockholm Convention on Persistent Organic Pollutants states that PFOS is used in some ETFE production.
ETFE is not a derivative of a petrochemical. It is manufactured from fluorspar (CaF2), trichloromethane (CHCl3) – called chlorodifluoromethane (CHF2CL) – and hydrogen sulfate (HSO4). Chlorodifluoromethane is a raw material classified as a class II substance under the Montreal Treaty on ozone depleting substances. Class II substances are scheduled to be phased out but have a later timeline than Class I substances.
The by products formed during ETFE manufacture are calcium sulfate (CaSO4), hydrogen fluoride (HF) and hydrochloric acid (HCl). The calcium sulfate and hydrogen fluoride are reused to produce more fluorspar which can be used again as in input into the manufacturing process.
The manufactured ETFE is sold as pellets, which are then heated and extruded into sheets 50 – 200 microns thick.
As one pundit has said: if this is a recyclable product, what chemicals are running off into our water supply? Do we know what those ETFE chemicals do to humans – not to mention cows, tree frogs or trees – if ingested?
One thing we DO know about ETFE is that fumes given off at 300 degrees Centigrade cause flu like symptoms in humans, and above 400 degrees C – they’re toxic. (1) I have seen articles which say it is combustible and others that say ETFE is considered self extinguishing. What everyone agrees on is that in the event of a fire, the foil will then shrink from the fire source, thereby self-venting, and letting smoke out of the building.
I can’t make up my mind on ETFE as a sustainable building material. What do you think?
What about soil resistant finishes like Scotchgard, GoreTex, NanoTex and GreenShield – are they safe?
Last week I promised to take a look at soil and stain repellant finishes to see how each is applied and/or formulated. Some of these trademarked finishes claim impeccable green credentials, so it’s important that we are able to evaluate their claims – or at least know the jargon! The chemistry here, as I said in last week’s post, is dense. The important thing to remember about all these finishes is that they all depend on flurocarbon based chemistry to be effective.
The oldest water repellant finishes for fabrics were simply coatings of paraffin or wax – and they generally washed out eventually. Perfluorochemicals (PFC’s) are the only chemicals capable of repelling water, oil and other liquids that cause stains. Fabrics finished with PFCs have nonstick properties; this family of chemicals is used in almost all the stain repellant finishes on the market today. Other materials can be made to perform some of these functions but suffer when subjected to oil and are considerably less durable.
The earliest type of stain resistant finish (using these PFCs) prevented the soil from penetrating the fiber by coating the fiber. For use on a textile, the chemicals are joined onto binders (polyurethane or acrylic) that acts as a glue to stick them to the surface of the fabric. Gore Tex is one of these early coatings – a thin film was laminated onto the fabric; another, manufactured by 3M Corporation for nearly 50 years, is Scotchgard. Scotchgard was so popular and became so ubiquitous that “Scotchgard” entered the language as a verb.
The chemical originally used to make Scotchgard and Gore Tex breaks down into perfluorooctane sulfonate, or PFOS, a man-made substance that is part of the family of perfluorochemicals. PFOS and PFOA have chains of eight carbon atoms; the group of materials related to PFOA and PFOS is called C8 – this is often referred to as “C8 chemistry”.
If you recall from last week’s post, the PFC family consists of molecules having a carbon backbone, fully surrounded by fluorine. Various “cousins” have carbon backbones of different lengths: PFOS or C8, for example, has 8 carbon atoms, C7 has 7, and so on. There is controversy today about the so-called “bad” fluorocarbons (C8 ) and the “good” ones (C6) which I’ll address below.
1) electrofluorination: uses electrolysis to replace hydrogen atoms in a molecule by fluorine atoms to create the 8 unit chain containing just carbon and fluorine. A small amount of PFOS (perfluorooctane sulphonate) is created during this process.
2) Telomerisation: chemical equivalent of making a daisy chain: produces mini polymers by joining single units together in chains. The usual aim is to produce chains that are an average of 8 units long, but the process is not perfect and a range of chain length will result – ranging from 4 units to 14 units in length. So you can have a C4, C6, C12, etc. In this method a small amount of byproduct called PFOA (perfluorooctanoic acid) is produced.
Scientists noticed that PFOS (the C8 fluorocarbon) began showing up everywhere: in polar bears, dolphins, baby eagles, tap water and human blood. So did its C8 cousin PFOA. These two man-made perfluorochemicals (PFOS and PFOA) don’t decompose in nature. They kill laboratory rats at higher doses, and there are potential links to tissue problems, developmental delays and some forms of cancer. Below are tables of results which the U.S. Environmental Protection Agency released from data collected by 3M and DuPont; some humans have more PFOA in their blood than the estimated levels in animals in this study. For a complete review of this study, see the Environmental Working Group’s website, http://www.ewg.org/node/21726.
Eventually 3M discontinued Scotchgard production. Yet accounts differ as to whether 3M voluntarily phased out the problematic C8 chemistry or was pressured into it by the EPA after the company shared its data in late 1999. Either way, the phase-out was begun in December 2000, although 3M still makes small amounts of PFOA for its own use in Germany. 3M, which still monitors chemical plants in Cottage Grove, Decatur, and Antwerp, Belgium, insists there are no risks for employees who handled or were exposed to the chemicals. Minnesota Public Radio published a timeline for milestones in 3M’s Scotchgard, which can be accessed here.
The phase-out went unnoticed by most consumers as 3M rapidly substituted another, less-effective spray for consumers, and began looking for a reformulated Scotchgard for carpet mills, apparel and upholstery manufacturers. For its substitute, 3M settled on perfluorobutane sulfonate, or PFBS, a four-carbon cousin of the chemical in the old Scotchgard, as the building block for Scotchgard’s new generation. This new C4-based Scotchgard is completely safe, 3M says. The company adds that it has worked closely with the EPA and has performed more than 40 studies, which are confidential. Neither 3M nor the EPA will release them.
According to 3M, the results show that under federal EPA guidelines, PFBS isn’t toxic and doesn’t accumulate the way the old chemical did. It does persist in the environment, but 3M concluded that isn’t a problem if it isn’t accumulating or toxic. PFBS can enter the bloodstream of people and animals but “it’s eliminated very quickly” and does no harm at typical very low levels, said Michael Santoro, 3M’s director of Environmental Health, Safety & Regulatory Affairs. 3M limits sales to applications where emissions are low.
3M says convincing consumers Scotchgard is safe is not its No. 1 challenge; rather it’s simply getting the new, new Scotchgard out. The brand, 3M maintains, is untarnished. “This issue of safety, oddly enough, never registered on the customers’ radar screen,” said Michael Harnetty, vice president of 3M’s protective-materials division.
Scotchgard remains a powerful brand: “We still get really good requests like, ‘Will you Scotchgard this fabric with Teflon?’ ” said Robert Beaty, V.P. of Sales for The Synthetic Group, a large finishing house.
Another early soil resistant finish is Teflon, which was produced by DuPont. Teflon is based on C8 chemistry, and PFOA is a byproduct of the manufacturing of fluorotelomers used in the Teflon chemistry.
There has been a lot of information on 3M, DuPont and these two products, Scotchgard and Teflon, on the web. The Environmental Working Group http://www.ewg.org/ has detailed descriptions of what these chemicals do to us, as well as the information on the many suits, countersuits, and research studies. The companies say their new reformulated products are entirely safe – and other groups such as the Environmental Working Group, question this assumption.
The fluoropolymer manufacturers are improving their processes and reducing their waste in order to reduce the amount of PFOA materials used. The amount of PFOA in finishing formulations is greatly diminished and continues to go down, but even parts per trillion are detectable. Finishing formulators continue to evaluate new materials which can eliminate PFOA while maintaining performance but a solution is still over the horizon. One critical piece in this puzzel is that PFOA is also produced indirectly through the gradual breakdown of fluorotelomers – so a stain resistant finish may be formulated with no detectable amounts of PFOA yet STILL produce PFOA when the chemicals begin to decompose.
Recently a new dimension was added to stain resistant formulations, and that is the use of nanotechnology.
Nanotechnology is defined as the precise manipulation of individual atoms and molecules to create layered structures. In the world of nanoscience, ordinary materials display unique properties at the nanoscale. The basic premise is that properties can dramatically change when a substance’s size is reduced to the nanometer range. For example, ceramics which are normally brittle can be deformable when their size is reduced. In bulk form, gold is inert, however, once broken down into small clusters of atoms it becomes highly reactive.
Like any new technology, nanomaterials carry with them potential both for good and for harm. The most salient worries concern not apocalyptic visions, but rather the more prosaic and likely possibility that some of these novel materials may turn out to be hazardous to our health or the environment. As John D. Young and Jan Martel report in “The Rise and Fall of Nanobacteria,” even naturally occurring nanoparticulates can have an deleterious effect on the human body. If natural nanoparticulates can harm us, we would be wise to carefully consider the possible actions of engineered nanomaterials. The size of nanoparticles also means that they can more readily escape into the environment and infiltrate deep into internal organs such as the lungs and liver. Adding to the concern, each nanomaterial is unique. Although researchers have conducted a number of studies on the health risks of individual materials, this scattershot approach cannot provide a comprehensive picture of the hazards—quantitative data on what materials, in what concentrations, affect the body over what timescales.
As a result of these concerns, in September, 2009, the U.S. EPA announced a study of the health and environmental effects of nanomaterials – a step many had been advocating for years. And this isn’t happening any too soon: more than 1,000 consumer products containing nanomaterials are available in the U.S. and more are added every day.
And nanotechnology has been used for textiles in many ways: at the fiber as well as the fabric level, providing an extraordinary array of nano-enabled textile products (most commonly nanofibers, nanocomposite fibers and nanocoated fibers) – as well as in soil and stain resistance.
For scientists who were trying to apply nanotechnology to textile soil and stain repellency, they turned, as is often the case in science, to nature: Studying the surface of lotus leaves, which have an incredible ability to repel water, scientists noticed that the surface of the lotus leaf appears smooth but is actually rough and naturally dirt and water repellent. The rough surface reduces the ability of water to spread out. Tiny crevices in the leaf’s surface trap air, preventing the water droplets from adhering to the service. As droplets roll off the surface they pick up particles of dirt lying in their path. Using this same concept, scientists developed a nanotechnology based finish that forms a similar structure on the fibers surface. Fabrics can be cleaned by simply rinsing with water.
Nano-Tex (www.nano-tex.com) was the first commercially available nanoparticle based soil repellant fabric finish. It debuted in December of 2000. Another nanotech based soil repellant is GreenShield (www.greenshieldfinish.com) which debuted in 2007. Both these finishes, although they use nanotechnology, also base their product on fluorocarbon chemistry. Nano-Tex’s website does not give much information about their formulation – basically they only say that it’s a new technology that “fundamentally transforms each fiber through nanotechnology”. You won’t get much more in the way of technical specifications out of Nano-Tex. GreenShield is much more forthcoming with information about their process.
In the GreenShield finishes, the basic nanoparticle is amorphous silica, an inert material that has a well-established use in applications involving direct human consumption, and is generally recognized as safe and approved by the Food and Drug Administration (FDA) and Environmental Protection Agency for such applications. The use of silica enables GreenShield to reduce the amount of flurocarbons by a factor of 8 or more from all other finishes and it reduces overall chemical load by a factor of three – making GreenShield the finish which uses the least amount of these flurocarbons.
The GreenShield finish gets mixed environmental ratings, however. Victor Innovatix’s Eco Intelligent Polyester fabrics with GreenShield earned a Silver rating in the Cradle to Cradle program. However, the same textile without the GreenShield finish (or any finish) earned a higher Gold rating, reflecting the risk of toxicity introduced to the product by GreenShield. Information on product availability is at www.victor-innovatex.com. | 2019-04-22T04:48:41Z | https://oecotextiles.wordpress.com/tag/pfos/ |
GRAHAM — Murder trials are complicated and demand more from lawyers and judges than almost any other crime, so it generally takes years to bring one to trial or to a plea bargain.
By the Times-News’ count, there are 34 pending murder cases in the court system — that is, 34 people charged with the first- or second-degree murder in the cases of 19 victims.
The oldest case is about four years, though most are from 2016 and 2017.
It is possible for several of the older cases to be resolved in 2018, but that becomes complicated with turnover in the Alamance County District Attorney’s Office as prosecutors leave, District Attorney Pat Nadolski finishes up his term this year, and Sean Boone, who won the May 8 Republican primary and faces no opposition in November, prepares to take over and reorganize the office.
Nearly four years ago, Jahmil Deshawn Ingram was charged with shooting David Israel Williams, 24, at Quality Inn on Maple Avenue in Burlington. His trial is scheduled for Nov. 13.
Around 2:30 a.m. Aug. 31, 2014, according to investigators, Ingram’s brother, Rahmil Dimitris Ingram, fought with 24-year-old Raphael Devante Currie, of Burlington. When Ingram opened fire, according to Burlington police, Currie sustained life-threatening gunshot wounds, but survived.
Williams, however, was part of the crowd nearby and was also shot. police took him to Alamance Regional Medical Center, where he was pronounced dead.
The hotel was crowded — police described it as “chaos” — with drugs and alcohol found in several rooms.
One of the few death-penalty cases pending in Alamance County is also one of the most brutal.
911 calls came in at close to 8 p.m. June 13, 2015, of a man on fire running around on a gravel road near Hatchery Road and Interstate 40/85. Responders found Juan Mario Martinez Trujillo, 56, of Hillsborough, badly burned. He died Aug. 24, 2015, at UNC Medical Center.
According to a police affidavit, friends of Trujillo said he had been involved in drug trafficking with a man called “Chilango,” slang for a man from Mexico City, and that there was an ongoing dispute between them over $5,000 to $10,000. Police were later able to identify Torres-Acevedo as “Chilango” and arrested him in January of 2016, accusing him of dousing Trujillo with an accelerant and setting him on fire.
The District Attorney’s Office announced its intention to pursue the death penalty June 7, 2016.
Torres-Acevedo is suspected of having drug cartel ties. He is now in the Marion Correctional Institution on a conviction for methamphetamine trafficking. His expected release date is Nov. 6, 2021, according to the N.C. Department of Public Safety.
One of the older, and more disturbing, pending murder cases is Joseph Wayne Goswick, 20, charged with first-degree murder in the death of his adoptive father, James Weston Goswick, 36, a well-known and well-liked Boy Scout leader and LabCorp worker, in January 2016 in their home on Brier Lane, Graham.
Weston Goswick’s body was found in the home’s detached garage after coworkers reported him missing Jan. 21, 2016.
When deputies went to check on him, Joseph Goswick, then 17, told them his father had been gone for several days to clear his head after the two had argued, though his car was still in the driveway, according to investigators. Coworkers told investigators, according to a search warrant application, that someone they suspected was Joseph had called in pretending to be Weston.
Goswick was at the house with three friends when deputies came to check. He told deputies he wasn’t sure if he had the key to the garage, when deputies found an open door, they saw what looked like a body under a blanket and withdrew to detain the people in the house and get a search warrant. Goswick said he and his father had gotten into a fight around the garage.
Marks on both Goswicks made it look like there had been a fight, and investigators later said there was evidence the father had been kicked, beaten with a blunt object and strangled with a belt.
According to court records, Goswick was evaluated at Central Regional Hospital, and found competent to stand trial, but his defense attorney, Alex Dawson, could still go for a mental-health defense, said First Assistant District Attorney Corey Santos, which would mean more evaluations from defense and prosecution experts.
Santos said it is in the prosecution’s interest for a defendant to get strong representation, though, to ensure a guilty verdict stands up on appeal.
Abraham Fryar, 41, was charged with stabbing his brother, David Fryar, 43, to death July 4, 2015, outside the Homewood Avenue group home where he lived. Investigators had at least one person claiming to be a witness, and an admission from Fryar who later used two bloody $20 bills at a nearby store.
Fryar has a long history of mental-health issues and a several robbery and assault convictions, and has been transferred to Central Regional Hospital, where it is unclear if he will ever be able to stand trial, Santos said.
While the case of Joseph David Fuller’s murder is nearly six years old, the suspects were not charged until last fall.
Kevon Lamont Moore, 44, and Craig Elwood Williamson, 47, were charged with the first-degree murder, robbery with a dangerous weapon, and breaking and entering in Fuller’s death Oct. 8, 2012.
Sheriff’s deputies found Fuller, 38, dead from multiple gunshot wounds at a house in the 5500 block of Lindley Mill Road, Graham. Charges were filed against Moore and Williamson Nov. 16, 2017.
Perceiving that as a threat against his son, Fuller refused to get on the floor and the two began to struggle. The man shot Fuller, who ran to the back door of the trailer and jumped out because there were no steps. The suspect then walked to the back door and again shot Fuller, who was trying to crawl under the trailer.
The intruder took $500 and a big-screen TV, according to warrants.
According to a motion to reduce his bond, Williamson told investigators he was at Fuller’s house — referred to as a “known drug dealer” — when a masked man kicked in the door and struggled with Fuller as Williamson ran out the door. According to the filing, a woman present at the time can corroborate Williamson’s account.
The motion also claims Moore was arrested with 33 grams of cocaine and could face trafficking and habitual-felon charges, giving him more incentive to lie to investigators.
Williamson is charged with conspiring with Moore and another unknown person to set Fuller up for the robbery.
The shooting death of Willie Thompson Jr., 26, of Deep Creek Church Road, Burlington, on May 20, 2015, is likely to come up for trial next year.
Decarlos Bernard Barnes, 24, is charged with first-degree murder, attempted murder, firing a gun into an occupied dwelling and drug possession.
Thompson was shot just before 3:30 a.m. May 20, 2015, outside the CV Mart/Coy’s Exxon at 1846 N. Church St. and died shortly after of a chest wound. James Travarrus Withers, 24, of McKinley Street, Mebane, was shot in the leg.
Early on, police suspected jealousy over a hug given to Barnes’ girlfriend in the store might have been the motive for the shooting, but another felony charge filed a year after Thompson’s death seems to make that questionable. Barnes was charged with firing a .40-caliber bullet into a house where Thompson was staying with relatives a week before Thompson’s murder.
After fleeing the state, Barnes was arrested in Washington D.C. and returned to Alamance County in June 2015.
Barnes has given notice of a self-defense defense, according to Santos.
Anthony Lewis Capps, 26, was found dead with three bullet wounds, one in his torso and two in the back of his head, at 2:25 a.m. Feb. 16, 2016, at the intersection of Border Street and Wood Avenue, Burlington, and his 1993 Jeep Cherokee nearby.
Barry Lynn Williams, 50, last known to live at 317 Atwater St., Burlington, turned himself in later that day and was charged with second-degree murder and possession of a firearm by a felon.
According to a police search-warrant application, the confrontation may have been sparked by jealousy and drugs. Police said the men were known to each other through mutual acquaintances, and shouting was heard before the shooting started.
Police have called the shooting death of Kareem L. Johnson, 21, on June 20, 2016, a drug deal gone bad, and five young men face charges of first-degree murder and armed robbery: Tevin Devenita Crisp, 26; Keshawn Ter’ll Chrisp, 19; Jaiquan Montique McDaniel, 21; Khalil Dyshaun Moore, 19; and Micah Keishaun Cameron, 19.
The circumstances are complicated and involve a number of violent crimes, according to investigators.
In the first shooting, June 20, 2016, at 702 Tillman St., police said, Johnson and Jalin Lewis Ferguson, then 21, were lured to the residence to be robbed. Johnson was shot and died from his injuries two days later.
Crisp and Chrisp — who are cousins but spell their last names differently, police said — along with McDaniel, Moore, Cameron and possibly others were at the Tillman Street house at the time of the shooting.
Three and a half hours later, after being interviewed by investigators regarding the Tillman Street shooting, Chrisp, Crisp, Ferguson and possibly others went back to Chrisp’s apartment at 317 Caswell St.
Ferguson stepped outside behind the apartment building to talk to his mother on a cellphone and was approached by Cameron, who, according to investigators, shot Ferguson multiple times at 6:08 p.m., June 20, 2016. Cameron is charged with attempted first-degree murder in that shooting.
Police said Cameron shot Ferguson so he could not identify the shooters in Johnson’s killing.
The death of Robert Nelson Gilley II, 52, was originally reported as an accident — a rifle misfiring after being dropped, Nov. 5, 2016. According to a search-warrant application from the Sheriff’s Office, Stephen Adrian Ferriell, 44, told investigators he left Gilley for a while after they had been target shooting and found the man shot with the rifle on the ground.
Investigators found the evidence inconsistent with that story and charged Ferriell with voluntary manslaughter in January. Those charges were changed to first-degree murder May 21.
Christina Marie Smith, 32, was shot dead in the head during the armed robbery of a low-level drug dealer in the room of the boarding house where she stayed, 1012 S. Main St., Room 12, Burlington.
Marlow Laddell Southern, 35, Jasmine Dezira McNew, 28, Tyrees Nathanial Williams, 18, and Khalil Le’Mon Starks, 22, are each charged with first-degree murder and robbery with a dangerous weapon in Smith’s murder.
According to search-warrant applications by Burlington police, Southern described as the cousin of Smith’s boyfriend and roommate had come to the couple’s door and entered their room briefly. That witness — who told investigators he had been selling crack cocaine that night — said he saw shadows under the door after Southern closed it and suspected a robbery. Two men, Williams and Starks, police say, came in as Southern left and robbed the witness of his remaining cocaine.
Smith started shouting at the robbers, according to the statement in the warrant application, and one of them shot her in the head.
Witnesses identified Southern’s car, and he and McNew admitted to being at the house to buy crack. Investigators allege the couple conspired with Williams and Starks to commit the robbery.
Ashley Deneen Watlington, 35, is charged with the second-degree murder of Michael Darrell Lea in what investigators called a domestic assault at 3:15 a.m. Nov. 25, 2016, on the side of U.S. 70.
He died two days later at UNC Hospitals in Chapel Hill.
According to the Sheriff’s Office, the couple was driving, but stopped. The assault happened outside the car. Lea died from blunt-force trauma to the head, and no weapon was found at the scene.
Two men are charged in the shooting death of Sam Scoggins Jr., 41, Feb. 2, 2016, in what police say was a dispute over a trade for drugs and a gun.
Tyrell Lee Yancey, 27, accused of firing the shots, and Leobardo Angel Flores, accused of driving Yancey from the scene at the corner of Holt and Sellars streets, are both charged with first-degree murder.
According to a police search-warrant affidavit, a witness told police Scoggins was “using the starter pistol he represented as a real firearm as payment” to Flores for crack. Flores and Yancey later returned to confront him. Witnesses heard arguing and several gunshots.
Several people were around, and a GPS monitoring bracelet Flores was wearing on his ankle at the time, issued by his bail bonding company for a shooting charge from the year before, confirmed to police that Flores “was in fact at the shooting scene,” the investigator wrote.
Two people face the death penalty in the brutal murder of Harold D. Simpson, 84, last August.
Sean Damion Castorina, 42, and Penny Michelle Dawson, 40, are accused of killing Simpson in rural Caswell County in August 2017, and fleeing to Virginia where, according to the District Attorney’s Office, they shot a woman and left her for dead, and ultimately were arrested in Fergus Falls, Minn.
Simpson went missing Aug. 19, 2017. His silver 2007 Chevrolet Cobalt was found abandoned in Nelson County, Va., three days later, and according to police, items belonging to Castorina and Dawson were found inside.
Human remains believed to be Simpson’s were found in late August off Totten Road in Caswell County.
According to prosecutors, Dawson had befriended Simpson months before his death with the aim of getting money and support, and on Aug. 19, they got him to the isolated place, where they attacked Simpson, tried to strangle him, and then killed him by shoving his own walking stick down his mouth and throat.
The couple fled to Shipman, Va., where Castorina had a friend. While trying to steal some things from the friend’s house, Nadolski said, the friend’s girlfriend came by to check on the house. Castorina and Dawson are charged also with taking the Virginia woman against her will, tying her up, blindfolding her, putting her in a bathtub, shooting her in the back of the head, leaving her for dead and stealing her 2002 Dodge Dakota on Aug. 22. She survived and identified Castorina and Dawson.
While the prosecution believes Simpson was killed in Caswell County, the defendants planned the murder and began the chain of events in Alamance County.
Castorina was previously convicted in 2005 of second-degree murder in Johnston County and served 16 years, six months in prison, and was released months before Simpson’s death.
Darrell Kenan Clark, 54, is charged with first-degree murder and robbery with a dangerous weapon in the April 29, 2017, stabbing death of Daniel Lee Paul, 67.
According to police, a passerby saw Paul through the window, lying on the floor of his apartment at 431 Sellars St. around midday and called 911. Firefighters arrived to administer aid and discovered what appeared to be a puncture wound in Paul's upper torso. He was pronounced dead at the scene.
Police determined that Paul had been robbed of his wallet and cash during an altercation, and investigators used surveillance video and witness statements to identify Clark.
Investigators believe the men knew each other.
Vincent Ramon Sowell Jr., 27, Marquette Travon Williams, 30, and Litego Dariyonta Marshall, 40, are all charged with first-degree murder and robbery with a dangerous weapon in the Dec. 21 death of Leonidas Brown, 32, 600 block of Ross Street, Burlington.
According to court records, on Dec. 20 Brown was going to sell two pounds of marijuana, valued at $2,700, according to police reports — but became suspicious the buyers were actually going to rob him and pulled a gun, and the defendants shot him.
He was found with a gunshot wound to the abdomen, and taken to Duke University Medical Center for treatment, where he died from his injuries the following day.
Najee Camille Moore, 17, is charged with the first-degree murder of Travonte Contrell Compton, 17, on Nov. 7, 2017.
Just after 5 p.m. Tuesday Nov. 7, police and medics responded to the 300 block of Vance Street where Travonte Contrell Compton was suffering from a gunshot wound to the face. Compton was in the back seat of a burgundy Honda Accord. He was pronounced dead at the scene.
Police believe Compton was driven to Vance Street from Chandler Avenue, where officers initially had responded to a report of shots fired.
Investigators think Moore acted alone in the shooting, but three other teens were charged with helping or harboring Moore after the murder, according to police, and, according to a search-warrant affidavit sworn by Burlington police Officer J. Theriault, Moore conspired with two others, Trenton Enoch and Laquan Knox, to shoot up a police station before he was arrested while detectives were investigating Compton’s murder.
Several law enforcement agencies collaborated to arrest Moore without incident Monday, Nov. 20, in a stolen car on Cherry Grove Road in Caswell County.
Michael Thomas Le, 25, was shot dead in the robbery of Gone Fishing Sweepstakes, 1365 N. Church St., Burlington, on April 8. Le was a security guard at the business.
Shamar Ramel Holloway, 35, Anthony Lamar Cason, 22, Anthony Lamar Cason, 22, and Tanesha Annette Jeffries, 23, face first-degree murder and robbery charges.
Police responding to Gone Fishing Sweepstakes after 9 p.m. Sunday, April 8, found an employee and a patron suffering from head wounds, and Le suffering from a single gunshot wound. Le was pronounced dead upon arrival at Alamance Regional Medical Center, and the employee and patron were left with bruising and swelling to their heads.
Randy Michael Riley, 30, was charged with the first-degree murder of William Jeremy Wiggs Jr., 58, April 10, as well as assault, robbery and car theft.
Officers found Wiggs’ father, William Joel Wiggs Sr., 88, at the front door of the home with lacerations to his upper body, which he survived. The younger Wiggs was found dead inside also with lacerations.
Riley is Wiggs Sr.’s step-grandson. He was in search of money and also stole a tan Highlander, according to Burlington police.
Jeremiah Paul Walsh, 29, is charged with first-degree murder in the stabbing death of his mother, Karla Gail Arnold, 57, Friday April 27.
Sheriff’s deputies responded to a 911 call saying “My partner tried to kill his mother, and there was blood everywhere,” according to a search-warrant application.
They found Walsh with blood on his hands in front of the house at 2360 Freshwater Road, Lot 10, Haw River, smoking a cigarette. He admitted to stabbing Arnold. Her body was found inside with multiple stab wounds, as was a knife that had been wiped off, but still had visible blood traces. She was pronounced dead at the scene. | 2019-04-22T20:09:31Z | https://www.thetimesnews.com/news/20180813/alamance-das-office-in-transition-has-long-list-of-murder-cases |
My professional interest is honey bee behavior and biology, with a strong leaning toward practical beekeeping. Using these web pages, I hope to be able to communicate with beekeepers of all types and interests – not just for me to distribute information, but also for me to get information. Increasingly, the bee industry has been using “crowd sourcing” as a way to develop new information and distribute that information through social media devices. I want to be involved in that process. As you feel inclined, please help me develop these pages with comments, thoughts and advice.
Thanks for looking. It is exciting, but not without a learning curve(s).
Attended one of your talks at HAS 2012 and was blown away by the obvious when you stated the cells bees build are actually cylinders!! Based on the pictures you showed it was a revelation to me, something I had’nt paid much attention to. So my question to you is, in your experience, do bees actually prefer the cylider shaped cells or is the hexagon just rounded out from use and spent cocoons? Any thought on this are greatly appriciated! I have been racking my brain on this for a while now, couldnt find a direct email address, so decided to go this route. If anyone else has thoughts on the topic please email me at [email protected]..
I don’t think that anyone actually knows the answer. It appears that the hex forms under natural pressures. I – too – have many questions. I can see hexes forming where there is comb-related stress, but why are hexes forming at the bottom edge of new combs where there is no pressure yet? Secondly, if the bees are actually building cylinders and not hexes, thousands of books that neatly show the mathematical comparison of various cylinders, triangles, squares, and hexes that are something less than correct. If bees are essentially building cylinders and hexes are forming for other reasons, then bees are not necessarily conserving construction materials and space. They are building cylinders – which are not completely efficient – and hexes are unintentionally forming.
I can’t tell that hexes are rounded out. Even old combs clearly show hexagonal shapes.
This general observation is not mine so I too am still pondering the concept. It does appear to me that bees are essentially building cylinders and hexes are forming by the pliable, thin-walled cylinders being “stacked” on each other, but as much as pressure and weight, could the bees sense where the hex wall lines would form and are manipulating the new wax into hexes using the cylinder as a format or pattern. Said differently, are bees bees essentially building cylinders and as they build more of them, they modify them into the hex format? I don’t know the answer, but clearly cylinders are playing more of a role in hex-celled wax construction that we first thought.
Can’t wait to see the “steaming” videos although I suppose that is simply a misspelling. Either way I am sure the videos will be interesting and informative.
greetings from Bonn and our bees from the rooftop garden of the German Federal Arts and Exhibition Hall to your project.
Trying to find out if it’s possible to purchase products from the Honeybee Laboratory online. Any advice?
I am sorry to have to tell you that the OSU Honey Store has been eliminated due to staff retirements and funding. You might try [email protected] for some possibility on alternative sources. We appreciated your business and support very much over the years. Thanks for communicating.
So sorry to hear! My niece would purchase gifts for us every Christmas. I will try the email you provided. Thanks!
As always, I enjoyed hearing you talk at the fall OSBA meeting. Enjoy your retirement, I am sure you will.
Kenny, thanks for writing. This retirement (transition) thing has been confusing and exciting, but overall, things have gone well. I appreciate you taking time to write.
Dear Jim. Thanks for your website.I have asked you: Have you any information about energy space around the hive/ bee’s aura/. In the world some beekeepers learn tis interesting data. Best regards Pyotr.
I know nothing about the colony’s aura so I can’t add to the discussion. Many years ago, I was associated with a beekeeper who was adamant that bee hives developed electrical fields. He postulated that the field was generated by flying bees (acquiring a positive charge) alighting on a landing board of a (grounded) hive. He felt that the “charge” of the hive varied with climatic conditions and even suggested that metal queen excluders should be grounded. None of this addresses your question. I only offer the string because there is still so much that is unknown.
I heard you retired and were doing some work with the Alabama folks. Glad I found your blog. Always enjoyed your perspectives. I think retirement is the part where you can now do “all” the things you wanted to and aren’t concerned about being held in check. Hoping to catch you at an upcoming conference.
Richard Mendel, V.P., South East Michigan Beekeepers Association.
I have been retired from OSU for four months, yet it already feels like a lifetime ago. I am still involved in US beekeeping, Ohio beekeeping, Alabama beekeeping, and trying to learn to be a grandfather. Thanks for writing. I recall that I will be in MI sometime early next spring. Maybe then.
God bless you Jim in all you have left to do. Thank you for all you have helped me with in my bee days especially in the ATI classes in the 80’s when there was a bee lab at OSU. Yes, I still have bees and love to share my stories with so many people who pass by my door.
Can you please bring ten copies of your book and we can sell it at the book stall at Cheddar mtg Feb 18th.
my name is Giorgi Shonia. contacting you has been suggested by a beekeeping colleague of yours.
myself and couple of my colleagues on OU Lancaster campus are considering a beekeeping project, I believe you’d have a lot to share on the subject. appreciate your advice.
I tried to contact you through email, not sure if I looked up the right address. would it be possible to get in touch with you at your convenience (phone, email, as you’d prefer)?
I enjoyed Dennis Barclift’s talk on Critical Points in Beekeeping. He said he would try to get the monthly timeline on the site after the conference. Where can I access this information?
I have sent the info you requested. Thanks for participating in the symposium and I hope you continue to enjoy beekeeping.
I need some help. At our last bee club meeting I was told that fungicides are the reason that our bees are being killed . I have an orchard and was told that fungicides could not kill bees is this true?
Zac Huang told me that there was research by Reed Johnson that apistan in the hive could enhance the fungicide in killing the bees? Is there some where I could read this research or get more information on this topic?
I am working with Gabriel’s Place in Avondale (Cincinnati Ohio). We have several boxes of bee hive stuff and need someone like you to help us get started is there anyone in this area you could suggest. If you ever come our way please let me know. Love your website and am looking forward to seeing bees in our community garden soon.
DearApril, Thanks for staying in touch. I had a great time (obviously) in Virginia, but I must give much of the credit to the adaptable officers and participants who were able to make major changes in their meeting and still have a meeting.
Right now, I am trying to keep my bees watered. The flow has waned here. Not much to do with the bees.
Stay in touch and good luck with your retirement.
Jim I had 22 hives of bees. I have 8 at my home and the rest on a farm in anson co nc. I have lost 4 of my hives in the last two weeks. It appears they ran out of honey and starved. Two weeks ago when I checked them the queen was laying and there was honey in the hive. Thousands of bees are in front of each hive. There is 135 acres of corn and clover around these bees. All the rest of the bees appear to not have enough honey. I am now feeding them. What could be wrong?
I am a displaced Buckeye with a curiousity about raising bees (and honey) on the land adjacent to our home in the Virgin Islands. Interested in steering me a little??
From ATI in 1979 when I met you, and now I look forward to following your pages. You remain my teacher! Congratulations on becoming a grandfather. I’m living in the Flathead Valley of Western Montana now after leaving the University of Illinois a number of years ago, and have gotten back into bees here with the hopes of building a local queen breeding cooperative. Hopefully we can get enough colonies in a concentrated area to get decent matings. I am fascinated by your washboarding video, and have not seen that behavior here in the same way. Summer is SO short here the poor bees have no time for recreation, I guess.
Jack. I remember you. Am on remote mobile phone. Please stay in touch. Happy you have returned to bees. Will be back to my home base in about a week.
John, I lost sight of this message and have only found it now. What was the result of your Phorid Fly issue. Did it clear up? I apologize for my shortage in responding. Your message can in during a software update and I did not recognize it as a new message.
John, the upper screened box was for ventilation. I have had some very bad experiences in the past with suffocation during a colony move. They fare much better being too cool rather than too hot. Thanks for your kind comments.
Question: prior to swarming a large number of bees collected on the front of my hive. Is the queen usually with them on the face of the hive or are they waiting for her to emerge from the hive?
Realized when we saw swarm cells a few days earlier that I should have attempted a split. Woes of a rookie beekeeper.
Jim, during the organized confusion of the swarm departing, the queen can be anywhere. If the swarm departs without her, it will normally return to the colony. I suspect if she is outside already, then swarm departure is imminent. Splitting a few days earlier might have stopped the behavior or it could have resulted in a swarm from each divided half. Swarming is a strong tendency once under way. Good luck.
This might be a good topic for an expert to write on in a bee journal or a blog.
Over the years since I started keeping bees about 50 years ago, I have always seen and heard the advise to never paint the interior of a beehive. I have passed that advice on to those I’ve mentored and taught. But, the great beekeeping pioneer, Lorenzo Langstroth said, “For this reason, the hive should be made of sound lumber, entirely free from cracks, and thoroughly painted on the inside as well as outside.” So, I want to know whether the no-interior-paint advice is really sound advice or an old wives’ tale perpetuated by well-meaning beekeepers.
The no-interior-paint advice generally includes the statement that the bees apply their own “varnish” to the wood. But, has scientific research been done to show that the bees’ own “varnish” really better than modern paint at protecting the wood and keeping the bees happy and healthy?
One argument against painting the interior is that un-painted wood absorbs condensation. Doesn’t bee “varnish” also reduce or eliminate absorption of condensation? What does absorption of condensation do to the longevity of the wood?
Is the no-interior-paint advice rooted in the fact that, decades ago, paint had lead-based pigments and the intent of the advice was simply to keep lead out of the hive and out of our honey? If so, why continue the no-interior-paint practice with modern no-lead paint?
Is that advice based on the fact that, decades ago, we used oil-based paint and the intent of the advice was to keep the oil out of the hive and out of our honey? If so, why continue the no-interior-paint practice with modern latex paint?
Has anyone approached paint companies for their advice on whether paint on both sides of the wood is best? Yeah, they have a financial interest in selling more paint, but they also should have the research.
I’ve seen many hives that were painted inside and out and the bees seemed to do just fine. Has anyone done a scientific comparison to see whether it really matters to the health and happiness of the bees?
Has anyone done a scientific comparison of the longevity of the wood to see whether painted interiors lengthen or shorten the usability of the equipment?
First, I am very sorry for missing your interesting message. The error was on my part and not related to hardware or software. I am sorry for being months late.
You ask perfectly logical questions. Yes, I think the recommendation was related to lead-based paint. I have a Q&A book coming out within a few months (I hope) in which I recommended to paint the inside of bee boxes and let the paint cure for several weeks. Not that it would be toxic, but that it would be soft and bees might do strange things with it. I am a woodworker. A common question is what finishes are proper for children’s toys and food dishes made from wood. In general, any modern finish is thought to be safe — again once cured and not just dried. Lead paint and lead-based finishes are not acceptable.
Essentially, moisture wicks through the wood and around the joints and ultimately causes the paint film to fail from the inside – not the outside. Encapsulating the wood on all sides with a latex based paint product would prevent most moisture from penetrating the wood fiber. I am totally comfortable painting the insides of a hive but most beekeepers don’t do it. Thanks for asking a good question.
I was just getting back into beekeeping after a 30 year break, it is a long story.
I am now hearing that there is an Africanized Bee threat here in the mid west and some of the swarms are super aggressive as should be expected. When I was a young boy of about 10 years old we had an aggressive hive of German bees. I attended the local Bee Association Meetings, with my mom, and got some very unique advice from an older member that was in his 80’s at the time, This was the early 70’sto put a time line on this.
He told me to do a couple of things to “tame” this hive I will never forget. First he told me to go out in the pasture and ick up a hand full of dried puff balls. I thought ‘OK’ this guys senile. Then he told me to get an old rag and make 2 strips about an inch wide and 6 inches long. then have me and my mom wipe some of our sweat one each. Then he said to put the dried puffballs in the smoker and it will put the bees to sleep in a few minute then lift the lid and put the sweaty rags in the hive. The next day the bees will not bother you any more. So I did it the next day and it worked. they did not bother me or my mom but anyone else had the same issues when they got within 50 foot of the hive.
I understand the sent part of this event but the puffball part is what was amazing. I used the puffballs again to remove a swarm from the wall of a house once and it truly does stun the bees for a time leaving the sedated and lifeless only to return to normal within an hour.
I think this nearly lost information needs to be studied if it has not already been to see if this could be a way to help fight these aggressive swarms. It may also be a breakthrough in promoting the art of Beekeeping to those who are interested but afraid of the sting.
Any idea which species of puff ball? I, too, see how it could work, but are there risks to the beekeeper? At any rate, interesting.
I am not sure of the exact species of puffball they were but I can tell you the area I lived in at the time. I was living in Kensington Ohio 44427 this is in Columbiana County which borders on Western PA. They would grow to a variety of sizes from a golf ball to a softball and remained white in color until they would dry turning a greyish brown. I have looked at photos on line but the only thing that is close was Calvatia gigantea or Giant Puffball. They are eatable for humans and quite good I may add.
The only thing that bothered me at the time was the smell. It was kind of a burnt hair and dung combo, something you have a hard time forgetting. The smell or taste did not transfer to the honey, thank god.
On line, in an archived version of The Canadian Beek-Keepers’ Guide, 1865, there was reference to using tobacco smoke and even stronger smoke from dried puff balls. In Ohio, there are Pear-Shaped puffballs, Gem-Studded puffballs, Spiny Puffballs, Giant Puffballs, and purple-spored puffballs. Apparently beekeepers past knew something about the effects of these plants.
Then I would say these were the Giant Puffballs. The others are not even close to what I remember using and I think I would remember eating any of the others or maybe not based on the toxins in some of them.
I have used tobacco and it just made me cough The bees did not seem to know the difference.
There are many things we have lost to new technology that are still of use today but considered obsolete. I think the puffball thing can be a valuable tool. Just to find the chemical compounds that have the effect on the bees and incorporate that into our modern equipment and techniques may help change the way bees can be studied. Having a live incapacitated specimen to examine, one would think, would be better than a basket full of dead subjects. Just my thoughts.
I have given you all the info I can. I hope it will lead to something better for all of us. I will continue to use the puffballs when I feel it is necessary. Because I don’t know all the facts and effects it will be a judgment call in rare situations as it was over 30 years ago. Thanks again for the insight and a place to share ideas and information.
After posting the last message I was doing a little more research and it appears this has been looked into. Hear is a posting I found by pure luck.
Anesthesia of honeybees by smoke from burning African puffball Langermannia wahlbergi, Lycoperdales : Lycoperdaceae, is due in part to H2S, one of the products of pyrolysis, though HCN and other unidentified substances may act along with the H2S. H2S is also produced during the pyrolysis of human hair and is the principal agent responsible for the anesthesia of honeybees. Preliminary studies using human hair or chicken feathers as a source of smoke indicate that its use to anesthesize bees does not shorten their lives. Properly used, human hair or chicken feathers might enable tropical African beekeepers to anesthesize their bees when harvesting honey.
I must admit that I had no information in this area. I would need to know species that seem to have the affect on bees and is there any effects on the beekeeper who is also breathing the smoke. This has been an interesting discussion that you started. Thanks for bringing me along.
I’m no Scientist or Dr. nor do I pretend to be but the chemicals in the article says the most active or identifiable are H2S , Hydrogen Sulfide, and HCN, Hydrogen Cyanide. Both are present in Tabaco when smoked. Not in the same dosage I can only guess and not real good for you. Like I had stated this would only be a once in a while thing. I did it twice and didn’t die and no adverse effects. I didn’t wear any protective gear either. How long can you withstand chicken feather smoke ? actually I think they use feather smoke for military gas mask training.
I know one thing when I use them again I will be using a protective respirator Like an Auto Body Painter would wear,$40.00 could save a whole lot of side effects. A cheap hasmat suit and a bee vale with a respirator would more than do the trick I would think. Back in the early 70’s Lead Paint , Saccharin, and DDT were ok and used without concern. Now we know better. I keep expressing this would not be a thing I would do on a daily basis. I figured this out years ago when I was just a kid. For uses like re-queening a hive that has been Africanized or to study a living specimen for the control of parasites would make this a great tool to have. Who knows the gasses from the smoke may have effects on parasites as well.
Would you be interested in being a speaker for the Florida State Beekeepers Association convention in October 2014?
I’m interested in becoming a beekeeper. I just found out about the Beekeeping Symposium in Auburn on Saturday the 4th, just do not know if I will be able to make it.
I have a wild hive somewhere close to my home in Wadley, but I haven’t found it yet.
I’m hoping to get started this spring. Going to Amazon to order your book and to see If they still hold classes in Clay county.
I have been distracted for the past two weeks due to the Annual Workshop that was held at Auburn. I apologize for this late response. I hope you can find beekeeping friends in Clay County. You would also want to review the Alabama Beekeepers Association web page for additional information and support. Let me know if I can be helpful.
Hi Jim, I live in the Caribbean, more specifically on the island of Trinidad. I am thinking of getting into bee keeping. what book or books should I read and what advice could u give me/ do u have any advice specific to the Caribbean/ Trinidad?
Dr Tew, I’m trying to include an ad for the 2015 ACES symposium in the Madison County Beekeepers Association newsletter. Do you have the graphic of the flier you distributed at the AL Master Beekeepers session? Would you please post a copy here on your blog? Thanks!
As we speak, we are working on the announcement information. I would love to have you post it in your newsletter. I am trying to arrange live-share parts of our meeting with the combined NC/SC meeting on Feb 7 in Monroe, NC. In this way, I can have more speakers for about the same $. We are trying to post this. Thanks for your patience.
Send me an email so we can catch up it’s been awhile.
Hi, I’m a new beekeeper and have started observing my bees washboarding. Maybe I haven’t found the latest research yet, but I was curious if there is a relationship between washboarding and dearths. I read most of the bees are adolescent bees so it this some sort of practice foraging activity? To me, it looks similar to the motion of the bees on flowers. Thanks for video and site info!
Dear Diane G, Yours is a fresh idea. To my knowledge, there is no “latest” research. The bees do seem to perform this behavior during warm (actually hot) months. If your idea is the answer, then you open a second question — “What need does washboarding meet for unemployed youthful foragers?” Please keep thinking. It is such as obvious behavior to be so mysterious. Thanks for writing.
At the moment, my thought is that wash boarding may be like sports for kids and serve multiple functions. 1. The unemployed foragers have the instinct to forage and the action may be close enough in action fulfill that need. 2. By going outside the hive, they reduce the heat they would have produced in the hive. 3. The motion contributes to their internal circulatory system and could help with both internal cooling and general circulatory function. I’m not an etymologist and don’t play one on tv, so I may be way off base, but that is my current theory.
I attended the 2017 beekeeping symposium in Alabama. My first meeting of this type. Truly enjoyed your opening remarks and it was amazing to see over 700 people in one location that love bees. Thank you for your time & efforts with this event! As a newcomer to the work of beekeeping, I am honored to learn from you and others that have made a life’s work of honey bees. Great event & looking forward to next year!
Was reading ‘The Beekeeper’s Problem Solver’ which I got from our local (EMBA) winter workshop. Regarding Problem 30, in which is written that a reversal should be made in early winter. Don’t you mean early spring? The bees should be depleting their honey stores and can now use the empty comb to for a brood nest.
Bob, I had just figured out the 39 thing. The book is in several languages and I do now have many of those versions. Yes, it should have been “late winter”. As you say, it would make so sense to reverse the bees and their resources in the early winter. Thanks for finding the error. You are the first. I do not market the book and its distribution. I will do what I can with the few that I sell, but for the most part, I suppose this will go uncorrected. That disconcerting.
I just watched your video from last year, where you did an oxalic vaporization on a hive in (what appeared to be) the dead of winter.
What were the results of that test? Did you notice any difference in the mite loads between that hive and others that had not been treated that extra time? | 2019-04-20T06:50:23Z | http://www.onetew.com/about/ |
The paper below is slightly revised from the version appearing on pages 53 to 81 of a book published in 1996.
by E.S. Husebye and A.M. Dainty (eds.), from Kluwer Academic Publishers, Dordrecht, The Netherlands, 836 pages, 1996.
This paper is not intended as a review of current capability to monitor nuclear explosions. For such a review, see reference 41 below (written mostly in the year 2000 and published in 2002).
Palisades, New York 10964, USA.
Intensive efforts to negotiate a Comprehensive Test Ban Treaty were carried out from 1958 to 1963, resulting in the Limited Test Ban Treaty banning nuclear tests from the atmosphere, underwater, and in space. Underground nuclear explosions were not banned, in part because seismological methods for monitoring the underground environment were thought to be inadequate. Over the subsequent 30 years, more than 1500 nuclear tests were carried out underground. They showed that seismological methods of monitoring a CTBT were far better than had been thought in early treaty negotiations, and, by the late 1960s, met the level of monitoring capability desired in 1963. Had the global monitoring system advocated in 1958 been built, its capabilities would have far exceeded the capability then said to have been necessary for a CTBT.
The most important technical issues in monitoring a Comprehensive Test Ban Treaty all became apparent between 1958, when the so-called Conference of Experts was convened in Geneva, and 1963, when the Limited Test Ban Treaty (LTBT) was negotiated, signed, ratified, and put into effect. The LTBT was negotiated trilaterally, between the United States, the Soviet Union, and the United Kingdom; and banned nuclear testing in space, in the atmosphere, and under water. But in 1963 there was a general perception that seismological methods for monitoring underground nuclear explosions were inadequate — a perception that helped strongly to prevent the conclusion of a Comprehensive Test Ban Treaty (CTBT) in this period, even though the key leaders (Presidents Eisenhower and Kennedy for the US, General Secretary Khrushchev for the USSR, and Prime Minister Macmillan for the UK) apparently favored a comprehensive ban and made numerous proposals on how it might be implemented and verified.
In the words of a former Director of the Los Alamos National Laboratory, Dr. Donald M. Kerr, "Nuclear weapon testing is ... a process intimately intertwined with the design of nuclear weapon systems ." In the three decades following the unsuccessful CTBT negotiations of the early 1960s, over 1500 underground nuclear tests were carried out by the US, the USSR, France, the UK, China, and India; that is, about one nuclear test a week, for thirty years. Though the great majority were single explosions, more than a hundred of the tests consisted of more than one nuclear explosion. This extensive activity shows that nuclear weapons development, at least by the superpowers, was not been constrained by the LTBT.
Very few underground tests had been carried out, at the time of the early CTBT negotiations. Indeed, only one such test had occurred prior to the 1958 Geneva meetings. Early conclusions on the capability of seismological methods to monitor a CTBT were therefore reached on the basis of minimal data, at a time when seismology itself was practiced at only a few tens of institutions around the world. Seismic data then consisted usually of paper records, rarely seen outside the institution that owned them; were derived entirely from earthquakes or small chemical explosions; covered only a narrow range of frequencies; and had low dynamic range so that it was not possible to record both strong and weak signals on the same instrument.
The perceived failure of seismology to support a major arms control objective — the CTBT — coupled with the need to acquire information on foreign underground nuclear weapons tests, led the US and the USSR in about 1960 to begin new efforts in instrumentation and research. These efforts hastened the development of seismology over more than a decade, turning it into the modern quantitative science we know today.
This paper first reviews the key technical issues in CTBT verification that emerged in politically charged negotiations up to 1963, and comments upon the conclusions concerning monitoring capability reached by the US at that time. In a later section, the key technical issue not developed prior to 1963 (namely, event identification) is briefly reviewed in light of later practical experience. The underlying question throughout is not only: How are underground nuclear explosions detected and identified? We also ask: How did our present understanding of these issues evolve? By the late 1960s, seismological monitoring methods had improved to reach the level of CTBT verification capability desired by the U.S. in 1963, even though the global monitoring network advocated in 1958-60 was never built. Had it been built, monitoring capability would have been improved about tenfold over what was desired by the U.S. in 1963.
The failure of post-World War II efforts to develop some type of international control over atomic weapons, and the subsequent development of the hydrogen bomb, resulted in substantial programs of atmospheric nuclear weapons testing. In 1954, fallout from the US 15 megaton BRAVO test contaminated a Japanese fishing boat, causing the death of one man and the serious illness of several others. Later that year, radioactive debris from a Soviet test fell over part of Japan. Many physicians and biologists, able to observe the long-term medical effects of the Hiroshima and Nagasaki bombings, charged that atmospheric tests would carry radioactive material worldwide, causing a genetic hazard that would be particularly damaging if cumulative doses occurred from fallout.
The dangers of fallout thus became the first rationale for a test ban, with proponents such as Linus Pauling, the 1954 Nobel Prize winner in chemistry, predicting that more people would die of cancer if atmospheric testing continued unchecked; and opponents such as Edward Teller, a promoter of nuclear weapons development, concluding that cigarette smoking would shorten lives far more than fallout. At this time Edward Teller and Ernest Lawrence, of the Livermore Radiation Laboratory, sought to separate the fallout and testing issues by speaking of a 95% clean hydrogen bomb, whose fallout would be negligible. However, such a device would have to be detonated very high in the atmosphere to minimize fallout, and would have to be of very high yield, relative to the size of its fission trigger, to approach the 95% claim . In February 1955 the US Atomic Energy Commission published a report on fallout and its consequences, which was widely criticized as a biased justification of nuclear testing [3, p. 140].
By the mid-1950s both superpowers realized the need for discussion, at least, of a prohibition on nuclear weapons testing. However, they differed significantly on how a test ban might be implemented. Initially the Soviets favored an agreement to outlaw tests, preceded by a complete testing moratorium, before a control system to monitor the agreement was established. Because such a system could entail intrusive on-site inspections, they claimed that inspections with no prior treaty commitment would aid US espionage efforts and undermine Soviet security. The United States preferred the establishment of formal controls prior to the signing of an agreement. It was believed in the West that without such controls the more restrictive nature of Soviet society might permit clandestine testing, and consequently a lead over the US in weapon development. However, at the 1957 meeting of a Subcommittee of the Disarmament Commission of the UN, conducted in London, the USSR surprisingly announced that it would agree to establishing a control system with posts in the USSR, US, UK, and somewhere in the Pacific Ocean, prior to the signing of a test ban agreement. Furthermore, the Soviets announced they would accept a temporary moratorium on tests, two to three years in length. Most importantly, the Soviets accepted a British suggestion that the Subcommittee establish technical working groups to study the feasibility of limiting tests and monitoring such an agreement. At this time, it should be noted, the USSR proposed a nuclear test ban as an objective unto itself, while the Western powers favored a test ban only as a first step to some type of general disarmament agreement [4, p. 16].
Two events, occurring far from the negotiating table, rendered the test ban debate more urgent. Thus, on September 19, 1957, the US carried out the world's first underground nuclear explosion in which the radioactive by-products were fully contained. This was the 1.7-kiloton RAINIER test on the Nevada Test Site. Quoting from Dr. Gerald Johnson , writing of his experience when in charge of the nuclear test program for Livermore: "The development of the technique of underground testing was stimulated in the latter 1950s because of rising concerns about radioactive fallout both locally and worldwide from atmospheric testing. These concerns were brought forcibly to my attention in 1956 ... when we experienced delays of up to three weeks awaiting favorable wind patterns which would result in acceptable local fallout." Second, on October 4, 1957, the Soviet Union launched the world's first artificial satellite, Sputnik I, an event that galvanized the US scientific community. In November, Eisenhower established the President's Science Advisory Committee, under the leadership of James Killian of MIT. The PSAC contained many men who opposed the unlimited testing and development posture of the Department of Defense and the Atomic Energy Commission. Foremost among these was Hans Bethe. During the difficult Geneva negotiations of the following year, the PSAC was to provide Eisenhower with views drastically different from those of Teller and other prominent US advisers.
Early in 1958 Killian appointed an inter-agency committee, including representatives of the PSAC, AEC, and DOD, to study the technical feasibility of monitoring a test ban. This panel, chaired by Hans Bethe, reported in April that a system of 24 inspection stations in the USSR, supplemented by mobile inspection teams, could detect underground explosions down to a yield of one or two kilotons. The panel also concluded that the risks to the US in being subjected to such a test ban would be small, while the political advantages were large; and that continued nuclear testing by both powers would rapidly erode the technological lead the US enjoyed over the USSR.
Note that the only signals at the disposal of the Bethe Panel from an actual nuclear explosion in what was perceived to be the most difficult environment to monitor — namely, underground — was from the RAINIER test conducted six months earlier. Note too that although judgments were made on the political ramifications of a test ban, no political scientists or diplomats were members of the Panel. The problem, which persists in test ban debates to this day, was that technical experts were called upon to address issues that were essentially political in nature. The difficulty arises, when the evaluation of technical capabilities (and associated uncertainties) turns into a review of whether such capabilities are in some sense acceptable — which is ultimately a political question. Test ban opponents were quick to highlight these shortcomings of the Bethe Panel, and Teller also emphasized that the Panel had completely ignored the study of intentional evasion by one side.
The level of technical discussion of the RAINIER data reached a low point when the AEC publicly announced that seismic signals from this shot were detected to a maximum distance of only 250 miles (400 km). After an outcry from knowledgeable scientists, the detection estimate was revised to 3700 km because of an observation in Alaska. However, inspection of the seismogram in question shows that during a 24-hour period it contained numerous detections with amplitude comparable to that from the RAINIER explosion. Today, we would speak of this as a problem not just in detection in the context of signal-to-noise ratios, but also in association. Given the level of seismic activity around the globe (with approximately ten earthquakes a day having seismic waves comparable in size to those from RAINIER), and the numerous instruments now deployed to record seismic signals, it is necessary not only to detect signals, but to form the correct subset of detections from different stations for a common seismic event — whether earthquake or explosion — before proceeding to analyze the set of detections, for example to estimate the location of the source.
The controversy over the Bethe Panel's findings coincided with an announcement of the Supreme Soviet on March 31, 1958, that the USSR would discontinue all nuclear tests providing the US and the UK followed suit. Nine days before, the Soviets had concluded a very extensive test series, in the course of which two or three explosions were often conducted in a single day. The US, having scheduled to commence a test series in several weeks, was awkwardly placed. Sensing a public relations ploy, Eisenhower dismissed the Soviet announcement as a gimmick, which ought not to be seriously considered .
Letters ensued between Eisenhower and General Secretary Khrushchev, and on April 8 Eisenhower proposed a meeting of technical experts, as envisioned at the London Conference, a proposal which Khrushchev initially rejected on the grounds that the conclusion of a test ban was a political, not a scientific, matter. Eisenhower reiterated the need for technical meetings on April 28, in a statement of some import: "Studies of this kind are the necessary preliminaries to putting political decisions actually into effect [4, p. 50]." Some confusion existed in the interpretation of this sentence. The Soviets believed it defined the technical meetings as formalities, subsidiary to the inevitable conclusion of the treaty. The US interpretation was that the technical talks were meant to explore the feasibility of concluding a treaty in the first place.
Khrushchev accepted the scheduling of these talks on May 9, and the Conference of Experts (to Study the Possibility of Detecting Violations of a Possible Agreement on the Suspension of Nuclear Tests) convened on July 1, 1958 in Geneva. Although conducted at United Nations facilities, the Conference was not a UN-sponsored activity.
The American delegation consisted of James Fisk (Chairman), Robert Bacher, and Ernest O. Lawrence (who returned to the US due to illness in the middle of the conference and died of chronic colitis shortly thereafter). A group of about a dozen physicists and seismologists was on hand to advise the delegates. The only US State Department representatives were three observers of relatively junior rank, whereas the Soviet delegation, headed by Yevgeni Federov, included one very high ranking diplomat, Semyen Tsarapkin of the Collegium of the Ministry of Foreign Affairs. The difference in composition of the panels highlighted contrasting attitudes regarding the Conference and its eventual goals.
The Conference first discussed detection and identification in four environments: the surface and atmosphere of the Earth; underwater; in space; and underground. Panelists generally agreed that tests in the first category could be readily detected by their output of acoustic and radio waves and radioactive debris, and oceanic tests could be easily detected with hydroacoustic waves. It was agreed that when an underground test is conducted at a depth sufficient to prevent radioactive debris from reaching the surface, signals produced by seismic waves were the only means of detection.
Although there are several different seismic waves, in these early years only the fastest seismic wave was given detailed consideration. This wave, known as the P-wave (the P standing for primus, since it is the first wave to arrive at a distant station), spreads though the Earth's deep interior in much the same fashion that a pulse of sound moves through air. In air, the source of the sound might be an exploding firecracker. In the Earth, the source of P-waves might be an earthquake or an underground nuclear explosion. If enough instruments at different locations record the arrival time of the P-wave from a particular source, it then becomes possible to estimate the source location. Throughout the five years leading up to the LTBT of 1963, it appears with few exceptions that only P-waves were considered for use in event identification.
The experts in 1958 found few problems with detection by electromagnetic and hydroacoustic waves. A plan for airborne collection of radioactive debris was eventually worked out, in which aircraft belonging to the nation being overflown would be used, representatives of all the signatories would be on board, and the flight path would be determined in advance.
The issue of underground detection was far more complex. The only empirical data available at this time was for the RAINIER test. The Soviet delegation was in general optimistic, and held that theoretical interpretation of data from TNT explosions would be sufficient to determine monitoring capabilities for underground nuclear explosions. The Americans replied that the RAINIER data were not consistent enough to allow useful extrapolation.
After discussing detection methods, the Conference next turned to the monitoring system that would be necessary. Federov immediately proposed a system of 100 to 110 control posts, the spacing of which would be based on acoustic detection of atmospheric tests. The Soviets maintained that the existing network of seismographic stations for earthquake identification would suffice to monitor underground tests.
The British and Americans rejected this proposal, arguing that existing seismographic stations were not adequate for the task, and could serve only as a supplement to a future system of new seismographic stations or control posts. The only criterion for distinguishing earthquakes from explosions accepted at this time was the "first motion" method, based on the expectation that all explosions would be accompanied by a positive first motion (compression), resulting in upward movement of the surface of the ground at all distant monitoring stations when the P-waves arrived, while earthquakes would feature negative first motion (rarefaction), or downward movement of the ground, at least at some stations. The Western experts argued that in most stations the switching of a few wires would reverse the recorded polarity of the first motion and make a compression appear to be a rarefaction. Thus, relying on many stations manned by the potential violator nation would be unacceptable.
It was recognized that the size of the seismic monitoring system was inextricably linked to the desired threshold, above which events could be not only detected but also identified as an earthquake or an explosion. The Western delegates estimated that seismographic systems already in place could detect and identify 5% of events equivalent to a one kiloton yield and up, 50% of 5 kt and above, and 90% of 20 kt and above [7, p. 26].
The job of developing a US counterproposal on the size of the monitoring system was entrusted to two young physicists, Richard Latter of the RAND Corporation and Harold Brown of the Livermore Laboratory. The criterion they proposed was observation of first motion at five different seismographic stations. Advocating a capability of detecting and identifying 90% of events equivalent to explosions of one kiloton and up, they concluded that a global network of some 650 stations would be necessary. Although these findings were presented merely as a report, not as a formal proposal, Federov indicated that such a control system would be unacceptable to the USSR.
Sir William Penney, head of the British delegation, proposed a third system. In its detection capability Penney's system was a compromise between the US and Soviet models. He suggested 160 to 170 land-based control posts, each operating a small array of about 10 seismographic stations of which 100 to 110 would be based on continents, 20 on large islands, and 40 on small islands, although the precise locations were not specified. Ten ships equipped to detect atmospheric and oceanic tests would supplement these posts. Penney believed [7, pp. 26-35] that such a system would detect and identify 90% of the earthquakes equivalent to 5 kilotons or more, and a small percentage of those equivalent to one kiloton. The other 10% of 5 kt-equivalent events would have to be inspected, and estimates of the number of such events ranged from 20 per year (USSR estimate) to 100 per year (US estimate).
The Penney system was in general well received, and the Conference concluded on August 21 after both groups agreed to recommend a system based on Penney's proposal. One important issue was left unresolved. The West suggested that all suspicious unidentified events lead to on-site inspections, while the Soviets favored individual decisions on each case by the control commission, with each member nation having veto power.
Many observers believed that, by obtaining agreement on Penney's proposal, the USSR had maneuvered the US into agreeing to a test ban. Critics such as Teller contended that the limitations of the system were not strongly presented, and the idea of deliberate evasion was not discussed. In the contest between the bootlegger and the police, Teller wrote, the bootlegger has a great advantage . He and many other critics believed the Conference of Experts constituted a Soviet propaganda victory .
Nonetheless, the US government, especially the State Department, felt compelled to make a public statement demonstrating its commitment to eventual test cessation. President Eisenhower proposed on August 22, 1958, that formal negotiations begin on October 31. He announced that the US would refrain from testing for a period of one year from the start of these talks unless the Soviets resumed tests. He went on to say that such a moratorium could be extended, subject to the installation of a control system and satisfactory progress in implementing other arms control measures.
General Secretary Khrushchev, while criticizing the proposition for limiting the moratorium to one year and for its two accompanying conditions, accepted the October 31 date for beginning negotiations. In the intervening two months the USSR, US, and UK each undertook an extensive series of nuclear tests.
The diplomatic negotiations, again conducted in Geneva, began on October 31, 1958, but three weeks were consumed in a dispute over the formal conference agenda, until the delegates gave up and proceeded without such an agenda. Even the title of the talks, The Conference on the Discontinuance of Nuclear Weapons Tests, was in dispute, with the USSR equating discontinuance with cessation, and the West interpreting it to mean suspension.
After several weeks the USSR introduced a draft treaty of five short articles. It bound the three powers not to undertake nuclear tests in any medium, and to discourage the commencement of nuclear testing by all other states in the world. Compliance would be verified through the detection network recommended by the Conference of Experts.
The Western delegates rejected the draft on grounds that no mention was made of other disarmament measures, no control organization was specified, and no provision was made for sanctions against violators. Furthermore, the American and British negotiators were still less than fully confident in the capabilities of the Geneva System of the Conference of Experts. After several more weeks the USSR agreed to the inclusion of a control commission provision, although the exact composition of such a body remained in dispute when the negotiations recessed on December 19.
Upon the resumption of talks on January 5, 1959, the chief US delegate, James Wadsworth, held an informal meeting with his Soviet counterpart, Semyen Tsarapkin. He informed him that in the course of underground tests conducted in Nevada in October 1958, data were obtained which indicated that the detection of tests would prove more difficult than previously believed. Based on these tests, known as the HARDTACK II series, it appeared that the number of earthquakes equivalent to a given explosive yield would be far greater than earlier estimates, perhaps by a factor of ten to fifteen. In addition, better data on background noise indicated that the first motion would be more difficult to determine accurately. These findings meant, according to Wadsworth, that the 90% confidence identification threshold proposed in the Geneva System would be more on the order of 20 kt than 5 kt, and that a far larger number of control stations would be required to maintain the 5 kt threshold.
How many earthquakes occur each year at different magnitude levels?
What would be the magnitude levels down to which a hypothesized global network of seismographic stations could achieve reliable detection and identification?
What was the relationship between the yield of an underground nuclear explosion, and its seismic magnitude?
which gives a yield (Y) of about 19 kt corresponding to a magnitude (m) of 4.75, whereas this magnitude was later found to correspond to about 10 kt for a typical underground explosion in wet tuff at the Nevada Test Site (see , which in 1981 reported the relation for this test site as m = 3.92 + 0.81 log Y); and to only 2.5 kt for a typical explosion at what became the USSR's main test site (see , which in 1992 reported m = 4.45 + 0.75 log Y for the Balapan area of the Semipalatinsk Test Site).
Going back to our historical review, several points should be noted in connection with the HARDTACK data. Out of eight underground explosions included in the series, only two, BLANCA (19 kt) and LOGAN (5 kt) produced seismic data sufficient for evaluation of system capabilities. US seismologists also concluded that the previous magnitude estimate for the 1957 RAINIER test was too high because the seven best stations near the event had given what now appeared to be anomalously large results. Thus, RAINIER, known to be 1.7 kt in yield, should have been estimated at magnitude 4.06 (± 0.4) and not 4.25 (± 0.4) as previously believed. In addition, difficulty in assessing signs of first motion in the HARDTACK tests indicated that the ratio of first motion to background noise amplitude must be at least 3 to 1, rather than 2 to 1 as estimated earlier .
Just as the significance of HARDTACK was being debated, a theory even more discouraging to test ban advocates emerged. Albert Latter, of the RAND Corporation, presented preliminary findings on the principle of cavity decoupling — the explosion of a bomb in an underground cavity large enough that the surrounding rock would not deform plastically (permanently) in any direction, but remain elastic. Under such conditions, according to Latter, the seismic signal could be reduced by a factor of as much as 300, thereby rendering impossible the detection of all but the very largest tests .
The controversy surrounding HARDTACK and cavity decoupling led James Killian, the President's Special Assistant for Science and Technology, to appoint a Panel on Seismic Improvement, chaired by Lloyd Berkner. The Berkner Panel, in a report on March 16, 1959, concluded that, given current technology, an increase in the number of seismometers at each array station from 10 to 100 would make detection of the first motion much easier. The panel also recommended the establishment of supplementary unmanned stations, 170 km apart in seismic areas, which could identify 98% of one-kiloton events. Future improvements were discussed, including the use of seismometers in deep boreholes, an extensive chemical explosive testing program, and computer-aided reconstruction of waveforms. Regarding cavity decoupling, the Berkner Panel reached a less pessimistic conclusion than Dr. Latter, and stated that apparent yield could probably be decreased ten-fold, depending on the surrounding rock type .
The Berkner Panel also recommended major funding for research in basic seismology, with particular attention to improvements in data acquisition. Thus, a key recommendation was that 100-200 of the existing stations in the world be equipped with modern instruments as soon as possible. Annual budgets of about $18 million were outlined for such improvements, plus another $12 million for each of two years to carry out chemical and special nuclear explosions underground for monitoring research . Since, prior to 1960, the field of pure seismology in the United States had received national support at the level of only about $0.7 million annually [19, p. 80], and since funding at the level recommended by the Berkner Panel (for seismology not for nuclear explosions) was actually appropriated and spent [19, pp. 27-37], verification research has had an enormous impact on seismology — and on geophysics in general.
In 1959, many feared these new US reports would cause the Geneva talks to collapse. The Soviets refused to consider the HARDTACK data on procedural grounds, namely that the seismometers used were not identical to those specified in the Conference of Experts. The US responded that in a study of small chemical explosions the HARDTACK seismometers had outperformed the Geneva-specified equipment. Decoupling theory was greeted with outrage on the part of the Soviets, who asked why a nation serious about concluding an agreement should devote time and money to devising means of circumventing it.
Torn between his own desire for a test ban and this new evidence, Eisenhower proposed on April 13, 1959, a treaty to ban only policeable tests, defined as those in the atmosphere up to 50 km and in the ocean. Khrushchev vehemently rejected the suggestion, claiming that the US would continue nuclear testing underground and in space; and that, in any event, all tests were policeable.
Despite their reservations, the Soviets agreed to the establishment of Technical Working Group I, in the summer of 1959, to study high altitude and space monitoring. In the meantime, debate continued on the number of on-site inspections necessary to ensure treaty compliance. The USSR, although specifying no exact figure at this time, insisted the number should be determined by political considerations, while the West held to inspections automatically triggered by technical criteria. Due to Khrushchev's upcoming visit to the US, as well as general elections in the UK, the negotiations recessed in 1959 from August 26 to October 27.
Soon after the Conference resumed Tsarapkin proposed that a second working group be convened to examine the controversial new seismic data introduced by the US. The first presentation made in Technical Working Group II was by Carl Romney, and concerned the HARDTACK II data. While including more details, he basically concurred with the position presented in January, namely that the magnitude of RAINIER had been overestimated and therefore many more earthquakes of equivalent size existed. The Soviet response was couched in legalistic terms, and again charged that no conclusions could be drawn regarding the control system since the seismographs used in HARDTACK II were not identical to those recommended by the Conference of Experts.
Although this charge in retrospect may seem irrelevant, other Soviet criticism was more substantive. To begin with, fewer than thirty of the stations that had recorded BLANCA and LOGAN were sufficiently calibrated to measure magnitude. Data scatter was highly controversial as well. The Americans insisted that all points should be used in computing an average, while the Soviets argued that points in the so-called shadow zone, of intermediate distance, should be excluded. The background to this argument concerns a property of the Earth of great importance for seismic monitoring, associated with a layer of lower seismic velocities hundreds of kilometers deep in the upper mantle, that has the effect of defocusing seismic waves received in the horizontal distance range about 1000 to 2000 km from an earthquake or an explosion. The property is illustrated in Figure 1, which shows schematically the way in which the amplitude of seismic waves at first decreases with distance, and later increases, as the waves propagate to a range of distances from a shallow earthquake or explosion. The region of low amplitude, or lack of observations, is the shadow zone. At lesser distances (the First Zone), or greater distances (the Third Zone), amplitudes are larger and are thus more likely to be routinely observed above the noise. The inclusion of low amplitude signals within the shadow zone tended to lower the seismic magnitude assigned to BLANCA and LOGAN.
Figure 1. This shows the effect of variation in seismic wave speed with depth in the Earth (see bottom right), upon the path of propagation of the fastest seismic body waves (lower section, showing ray paths of propagation in the crust and upper mantle). Amplitudes are relatively strong, out to distance ranges of around 1000 km (the First Zone); are weak or absent in the range around 1000-2000 km (the Shadow Zone); and become strong again beyond 2000 km (the Third Zone). For the decades following the 1963 signing of the LTBT, when nuclear testing was carried out underground but no in-country verification was permitted, monitoring was conducted by National Technical Means using seismic signals acquired typically in the Third Zone. Nomenclature changed, such signals came to be called teleseismic waves, and they have been intensively studied especially for purposes of yield estimation in the context of the Threshold Test Ban Treaty. With renewed attention to CTBT verification, and the use of in-country stations, it has become more important to return to the study of the strongest signals, acquired in the First Zone. Here too the name changed, and such signals are more commonly now referred to as regional waves. From .
The most dramatic moment in TWG II occurred when Hans Bethe and Albert Latter officially presented the theory of cavity decoupling. Bethe later commented that the Russians seemed stunned by the theory of the big hole, a concept that implied we considered the Russians capable of cheating on ... a massive scale. After several meetings the Soviets admitted that Latter's work was theoretically valid but argued there was no proof it could be made to work in practice. The British delegation presented the results of several small tests of TNT in cavities, conducted during the summer, which seemed to support the theory. The participants were unable to devise any recommendations at this time for foiling the decoupling strategy.
The final item covered in TWG II was the formulation of criteria to initiate on-site inspections. The Soviets proposed that if the epicenter of an event were located in an area of dense population, or if its focal depth were beyond current drilling feasibility, it would be ruled an earthquake. Only events exhibiting positive explosion characteristics should be considered for on-site inspections. The Western delegates, stating that no such positive criteria existed, introduced counterproposals that, according to the Soviet side, would have made the majority of recorded events open to suspicion and eligible for on-site inspection. An American proposal listed several potential methods that might, after sufficient research, evolve into criteria for establishing an event as an earthquake.
In the end, technical differences were too deep to allow TWG II to issue a joint statement. The participants agreed instead on a report detailing the proceedings, with four attached annexes. The first listed some generally agreed recommendations on improvements, while the other three consisted of the differing views of the Soviet, British, and American delegations.
On February 11, 1960, the US presented a new position at Geneva, proposing a phased treaty that would immediately prohibit tests in the atmosphere, underwater, and underground down to the lowest adequately controlled threshold. This threshold was proposed to be 4.75 on a unified magnitude scale. According to magnitude-yield data from Nevada (see above), the authors of the proposal felt that this limit would correspond to about 19 or 20 kilotons, fully coupled (i.e., tamped in the surrounding medium so that seismic waves would be excited efficiently). In addition, the proposal accepted the idea of a numerical quota of on-site inspections, probably 30% of unidentified events, which the authors felt would be sufficient to deter cheating. On average this was believed to correspond to twenty inspections in the USSR per year, and an equal number in the US and UK together [4, p. 16]. The proposal concluded with a suggestion that the three nations undertake joint seismic research to reduce the threshold further.
The problem of proliferation, often cited as a strong reason for concluding a test ban, resurfaced two days after this proposal. On February 13, 1960, France exploded its first nuclear device, which was of 60 to 70 kiloton yield, in Algeria, thereby ignoring recommendations of the UN General Assembly.
The USSR replied to the new US position on February 16. Tsarapkin at first rejected the phased treaty concept since the USSR favored a comprehensive ban. He proposed several temporary identification criteria, which might apply for an initial period of two to three years. An event could be inspected if data from several surrounding stations localized it to an area of 200 square kilometers, but would be ineligible if its depth of focus were found to be more than 60 kilometers, its epicenter were found to be oceanic with no accompanying hydroacoustic waves, or if it were established within 48 hours as the foreshock or aftershock of an earthquake. However, on March 19, Tsarapkin issued a more detailed proposal, in which the USSR announced a willingness to conclude a treaty on the cessation of all nuclear weapon tests in the atmosphere, in the oceans, and in outer space, and of all underground tests that produce seismic signals of magnitude 4.75 or above . He agreed to a joint research program. While accepting most elements of the US proposal, the Soviet plan contained no on-site inspection quota, and insisted on a moratorium on tests below magnitude 4.75.
In light of later seismic data and later negotiation of the Threshold Test Ban Treaty, the acceptance by the USSR of a magnitude threshold is noteworthy. In 1960, magnitude 4.75 was regarded by US experts as corresponding to about 20 kt for an underground explosion in Nevada under conditions of the RAINIER explosion, though later the yield equivalence was found to be about 10 kt (discussion of Romney testimony; see above). And, as also noted above, magnitude 4.75 turned out to correspond to only about 2.5 kt at the principal site the Soviets later developed for underground testing in East Kazakhstan. In retrospect, a threshold test ban based on magnitude would therefore have restricted yields on the East Kazakhstan Test Site significantly more than yields at the Nevada Test Site. Some early hints at the conclusion that magnitude-yield relations might vary between test sites were in fact available in 1960, for although the USSR had not yet conducted an underground nuclear explosion, the Soviets had experience with large underground chemical explosions. For example, on March 3, 1960, 660 tons of TNT were placed in an underground chamber and fired as a single charge at depth in Kirgizia (present-day Kyrgyzstan), resulting in seismic waves so strong that they were reported to the US as the equivalent of 5 kt fired under RAINIER conditions. Today we would expect such a chemical explosion in Kirgizia, and a 5 kt RAINIER-type nuclear explosion in Nevada, both to have magnitude around 4.5. But in 1960 Albert Latter stated that "I personally do not accept the Russian statement because they have not given any confirmatory details ."
Several US research programs relating to underground verification were carried out in 1960. Project COWBOY, conducted in March, consisted of a series of chemical explosions set off in cavities, and generally supported the Latter brothers' decoupling hypothesis, although indicating a decoupling factor lower than 300. Accompanying studies concluded that the technology to construct such cavities, through solution mining in salt domes, already existed. Project VELA, the research effort in seismology recommended by the Berkner Panel, began in 1959 under the Advanced Research Projects Agency of the US Department of Defense (DOD), and by 1960 had developed detailed plans for evaluating detection and identification capabilities using small chemical and nuclear explosions. The USSR protested that adequate safeguards must exist to prevent these small nuclear shots from being used for weapon development purposes — and indeed the US DOD had plans to couple such supposedly seismic experiments with installations to study weapons effects . But although the chemical explosions under VELA were carried out, the nuclear explosions were postponed indefinitely due to a lack of agreement on safeguards [4, p. 265].
Project VELA also included a plan by the US Coast and Geodetic Survey to build a World-Wide Standard Seismograph Network (WWSSN), following the recommendation of the Berkner Panel. The network would shortly grow to include about 125 stations, most outside the US, each recording in a standard analog format on photographic paper. The stations recorded continuously, and this network collected earthquake data around the world as well as nuclear explosion data. The WWSSN had a profound influence on the growth and achievements of the science of seismology, providing important support and insight into the theory of global tectonics, which revolutionized the Earth Sciences in the 1960s. In addition to the WWSSN, a decision was made to build seven small arrays in the US that conformed to recommendations made in the Conference of Experts, and designed explicitly to detect Soviet tests. The first of these, at Fort Sill, Oklahoma, appeared capable of detecting events down to magnitude 4, equivalent to a one kiloton shot, at distances over 2000 miles, (i.e. in the Third Zone) although at the time it appeared identification would not be reliable until the event approached the equivalent of 5 kilotons .
Meanwhile, the Geneva Conference turned to the question of how many control posts would be needed and where they should be situated. On May 12, 1960, the US proposed that in the initial phase of a three phase process, 21 posts should be constructed in the USSR, 11 in the US, 1 in the UK, 2 on ships, and 12 on islands in the Northern Hemisphere, for a total of 47. (In Washington two days earlier, Secretary of State Christian Herter had been horrified to learn of a study sponsored by the Department of Defense which estimated it would take $1 to 5 billion to install the 21 control posts in the USSR. The plan turned out to include the building of large airfields by the US in the USSR, and hiring icebreakers to take in supplies. The estimate was found to be inflated and the study declared invalid a few weeks later [23, pp. 323 & 348].) The USSR complained in Geneva that this scheme did not provide any posts in the Southern Hemisphere, where the Western powers often tested. The Soviets instead advocated 15 posts in the USSR, 11 in the US, 1 in the UK, 7 in Australia, 20 on islands belonging to the UK and US, 2 in Canada and/or Mexico, 2 in Africa, and 10 on ships, for a total of 68 posts. In addition, the Soviets insisted that no on-site inspections take place during the first phase of installation, which would probably take four years. The Western powers argued for dividing this phase into two two-year periods, and beginning inspections at the end of the first period. At the time of the US election in November 1960, when John Kennedy defeated Vice-President Richard Nixon, these differences remained unresolved.
Figure 2 here shows the locations of stations (arrays) in a global network with 170 stations of the type discussed in Geneva in 1960; and, for comparison, the International Monitoring System's two seismographic networks eventually adopted for the Comprehensive Nuclear-Test-Ban Treaty agreed to in 1996 — which also has 170 stations. (The Figure also shows the infrasound, hydroacoustic, and radionuclide monitoring networks of the IMS.) The IMS includes a network of 50 primary stations which send their data continuously to an International Data Centre, and a network of 120 auxiliary stations which record continuously but which contribute their data to the IDC only upon request for specific time intervals. With this style of operation, the detection threshold of the IMS expressed in terms of seismic magnitudes is determined only by the primary network. The auxiliary network provides additional data, as appropriate for particular seismic events, to enable an improved characterization of a detected event. It is becoming clear through practical experience with the IMS networks (which have been partially operational since 1995) that the primary network of 50 stations, when completed, can be expected to have a significantly better detection capability, than was anticipated in 1960 for the 170-station global Geneva system. Thus, had the Geneva system ever been built, it would have far exceeded the capability that it was expected to have.
Figure 2. This shows global monitoring networks. Upper: a design for a seismographic network proposed in 1960 [19, p. 58] and based upon the Penney proposal of 1958. Each continental post was to be an array of about ten stations. Lower: the five networks of the International Monitoring System established by the Comprehensive Test Ban Treaty of 1996, using four different technologies. The primary seismographic network of the IMS (50 stations) provides detection, adequate for location, down to about magnitude 3.25 in Eurasia and North America. The auxiliary seismographic network (120 stations) enables good identification capability. For more information on monitoring capability as of the years around 2000 to 2002, see reference 41.
Upon assuming office, President Kennedy undertook a thorough reorganization of the US arms control apparatus. A new unit of the State Department, the Disarmament Administration, was created; Arthur Dean replaced James Wadsworth as chief representative to the Geneva Conference; and Glenn Seaborg, who was more inclined to favor a test ban, replaced AEC Chairman John McCone.
The new US position, presented when the Geneva Conference resumed on March 21, 1961, contained a few minor concessions. The US would now seek legislation permitting the Soviets to examine the internal mechanisms of nuclear devices employed in US seismic research and peaceful explosions programs [25, p. 56]. The US proposal continued to insist on a quota of twenty inspections per year in the USSR, as opposed to the Soviet proposal for three, but was willing to assign quotas of twenty inspections to the US and UK as well. Very few modifications were made in the technical issues, however, and the US still envisioned a threshold set at seismic magnitude 4.75.
The Soviet reply was pointed and negative. Tsarapkin denounced the testing of weapons by France as a serious obstacle to progress, and accused the US of dragging negotiations out long enough to shift research work for NATO into French hands.
On August 28, 1961, virtually as a desperation measure, Ambassador Dean offered to eliminate the 4.75 seismic magnitude threshold if the USSR would agree to an increase in the number of control posts or on-site inspections. As expected, the USSR rejected this proposal. Three days later the Soviet Union ended its moratorium and conducted the first test of what would be its most extensive series ever — a series that had obviously been in preparation for some time. The accompanying statement minimized the importance of a test ban alone, and used the French tests and current Berlin Crisis as pretexts for resuming testing. The US Atomic Energy Commission reported that atmospheric nuclear explosions in the kiloton range took place at the Semipalatinsk Test Site, in East Kazakhstan, on September 1, 4, 5, 13, 17, and October 12, 1961; and east of Stalingrad on September 6. On October 11, 1961, the Soviet Union's first underground nuclear explosion took place, also on the Semipalatinsk Test Site. It had magnitude about 4.8 . This explosion was detected at six stations of the USCGS's new worldwide network and at one Swedish station, and was apparently identified as underground and nuclear , although the event was not widely listed as the USSR's first underground nuclear explosion until the 1980s.
The US was ill-prepared to resume testing — Los Alamos and Livermore had not even been allowed to buy cable since this might have signaled an intention to break out of the moratorium — but began with a small underground test on September 15 while still refraining from atmospheric tests. The Soviet Union, despite a UN resolution calling on it to refrain from a proposed atmospheric test of 50 megatons or more, exploded the largest atomic device ever tested on October 30. Its yield was estimated at 58 megatons, but Hans Bethe speculated that if its fusion material had been encased in uranium rather than lead the yield could have been in excess of 100 megatons .
Following a recess in the Geneva Conference during October and November, the Soviet Union introduced a proposal for the immediate conclusion of a treaty banning space, atmospheric, and underwater tests, and a moratorium on underground tests pending an agreement on a control system. The US and UK rejected any proposal omitting a specific control system and, in the absence of any further progress, the Conference finally ended on January 29, 1962, without the release of any joint communiqu_(c).
The collapse of the Geneva Conference coincided with the creation of a panel, headed by Hans Bethe, to evaluate the most recent Soviet test series. This panel stated that the USSR had made sizable gains in reducing the weight to yield ratio of its weapons, in increasing overall yield, and in reducing the size of the necessary fission trigger. The panel also concluded that much of the preliminary research for this series was conducted during the three-year moratorium on nuclear tests.
In the meantime, new seismic data became available regarding explosions in various media. On December 10, 1961, Project GNOME, the explosion of a 3 kt nuclear device in a salt dome in New Mexico, was conducted. Based on results obtained in Project COWBOY, it had been believed that a fully tamped shot in salt would produce a signal smaller, by a factor of perhaps two and one half, than a tamped explosion in tuff, the rock type in which all previous US underground tests had been conducted. Contrary to these expectations the signals from GNOME were significantly larger than those of LOGAN, a 5 kt shot tamped in tuff at the Nevada Test Site in 1958 [4, pp. 351-352]. The GNOME shot was detected as far away as Japan and Sweden. This was the first clear indication to the US that the relation between magnitude and yield could vary significantly from one region to another. The reasons have to do with the differences in rock type in the immediate vicinity of the shot point (which affect the efficiency with which explosion energy is coupled into the energy of seismic waves), and the differences in propagation characteristics of seismic body waves in different geological regions (which affect the way in which body waves are attenuated, as they travel from the seismic source to stations at which the signal strength is recorded).
However, although the fact of the stronger-than-expected GNOME signals was encouraging to those seeking effective ways to monitor underground nuclear explosions, other results from this shot were less encouraging. The discovery was made that seismic wave velocities through the Earth's crust were not uniform from one region to another, making more difficult the analysis of signals to obtain a source location. Had the USSR's proposed position on inspection criteria been in force, a 200 square km area around the estimated epicenter, the GNOME shot would have occurred outside the area eligible for inspection. Furthermore, the depth of the GNOME event was not estimated near 350 meters, the actual depth of detonation, but rather at about 130 km, which would have identified it as an earthquake. In general, these uncertainties led many to lose confidence in the capability of seismological methods to verify a nuclear test ban effectively. By making appropriate corrections for the non-uniformity of the Earth's crust, event location could still be done accurately. But what would be the confidence in the corrections, for an event in an area where the corrections had never before been derived, and the ground truth data to do so were unavailable?
On February 2, 1962, the US Atomic Energy Commission announced that earlier that day the USSR had apparently conducted an underground nuclear test. The test, widely reported to be the first underground Soviet nuclear explosion, was carried out in a generally aseismic area in Soviet Central Asia (East Kazakhstan), and had a yield estimated at 40 to 50 kilotons. The rapid detection and rapid identification of this test were applauded by proponents of the test ban [4, p. 353], few (if any) of whom knew that there were data, available in the West, to indicate that a previous underground nuclear test at the same test site had taken place in the USSR (see above).
The section of Project VELA concerned with cavity decoupling, Project DRIBBLE, was planned to consist of six explosions, both tamped and decoupled. Due to lack of funds this project was temporarily suspended after exploratory drilling and engineering work. Upon its resumption in September 1962 a cavity for a 100 ton shot was planned which would require a year of work and cost $3.2 million. By 1965 more than this had been spent and construction of the cavity had not yet commenced — an indication, presumably, of the difficulty in executing a decoupled explosion, even without the additional problems of keeping the shot secret [30, p. 312].
Within two months of the end of the Geneva Conference, international pressure, especially an emotional appeal from Prime Minister Harold Macmillan, led the parties back to the negotiating table. The forum was now multi-lateral, and was called the Eighteen Nation Disarmament Committee, consisting of five NATO states, five from the Warsaw Pact, and eight non-aligned states. The ENDC, a forerunner of today's Conference on Disarmament, convened on March 11, 1962, and began with the Soviet Union tabling a draft treaty on General and Complete Disarmament. The Soviets attributed the failure of previous negotiations solely to US intransigence, and went on to claim that National Technical Means — surveillance that a country could unilaterally achieve without cooperation from the country being monitored — would be sufficient to detect underground as well as atmospheric tests.
The US response consisted of a test ban proposal incorporating four modifications to previous Western demands. First, to prevent surprise abrogation of the treaty, heads of state would make periodic declarations that no test preparations were underway, and declared test sites could be inspected by the other party a certain number of times per year. Second, the inspection process and the establishment of control posts were to be inaugurated sooner than the two years previously discussed. Third, the 4.75 magnitude threshold was to be eliminated due to the difficulty of determination, making the treaty comprehensive. Fourth, on-site inspections would mainly be confined to a normally aseismic area in Siberia, with only a few in the heart of the USSR. Although the last two provisions were considered by the US to be major concessions on its part, the USSR rejected this proposal, arguing again that National Technical Means must suffice for any treaty.
Despite appeals from the non-aligned states as well as several allies, the US resumed atmospheric testing on April 26, 1962. This series, which included a few proof tests of existing stockpiles as well as new weapon development, totaled about twenty megatons yield. Totaling the activities of the US, USSR, UK, and France, more nuclear weapons were tested in 1962 than in any other year, and more total megatonnage detonated, from September 1961 to December 1962, than in any other period of comparable duration.
While the ENDC was stalemated, several developments in the US increased support for an atmospheric test ban. During the spring of 1962, following large test series by the US and the USSR, the level of fallout-induced radioactivity was found to have increased significantly worldwide. Several scientists proposed that the concentration of iodine-131 in the atmosphere had reached dangerous limits, and that protective measures might be necessary for some foodstuffs, especially milk, if tests continued at the same rate. At the same time, US nuclear strategy was officially stated to be changing from one of massive retaliation to a doctrine of targeting Soviet weapons systems. Very large warheads thus became less desirable, reducing the need for atmospheric tests.
During this period, Project VELA began to produce useful and specific results leading to a more informed understanding of monitoring capability. An underground French test, conducted in Algeria on May 1, 1962, was detected by several of the new Coast and Geodetic Survey stations, and estimated at 30 to 50 kt. This test, like the Soviet tests in East Kazakhstan, indicated the feasibility of teleseismic detection (i.e., data that had been acquired in what earlier was called the Third Zone, beyond the shadow zone, see Figure 1, and thus available by National Technical Means). Next, the discovery was made that previous estimates of the annual number of shallow earthquakes in the USSR were too large. These estimates, based on extrapolations of earthquake records from 1932 and 1936, had indicated 100 shallow earthquakes above magnitude 4.75 (then thought to be equivalent to 19 or 20 kt in tuff), and 600 above magnitude 4.0 (then thought to be 2 kt in tuff). Using more recent and better data the figures were revised to about 40 shallow earthquakes above magnitude 4.75, and 170 above magnitude 4.0 .
The placement of seismometers in deep boreholes was soon found to increase signal to noise ratios by a factor of five or ten. In addition, special filtering of data from surface arrays of many seismometers was seen to improve capabilities considerably. Finally, research showed that seismometers positioned on the ocean floor could provide useful monitoring data.
Some other developments, however, indicated new difficulties in detection. Seismic signals measured in different directions from an explosion were found to be of significantly different strengths. American scientists also discovered that a test carried out in loosely compacted alluvium would produce a signal only one-seventh as large as a test in tuff (and one-fourteenth as large as one in granite). However, an underground test in alluvium would most likely cause a cavity visible on the surface.
Overall, the Project VELA results were encouraging, and the US felt confident enough to introduce two new draft treaties in Geneva on August 27, 1962. In the eyes of the world, the US position was enhanced by the commencement of a new Soviet test series on August 5, which included a 30-megaton shot. The first draft for a Comprehensive Test Ban Treaty envisioned a fifteen member International Scientific Commission (four Western, four Eastern, seven non-aligned) to establish standards for the calibration and operation of all elements of the verification system. This system would consist of nationally owned and manned stations as well as several new facilities financed and staffed by the Commission, to be constructed at sites listed in an annex to the treaty. Equal quotas of on-site inspections would be assigned to the territory of the USSR, UK, and US. Any event not positively identified as an earthquake, by first motion or depth, would be eligible. No number was specified at this time for inspections, but the UK and US delegates stated it would be less than the 12 to 20 previously proposed. Data from Project VELA now indicated that only about 10 to 15 unidentified events of magnitude ≥ 4.75 would occur in the USSR each year [32, p. 15].
The second Western draft was a far briefer proposal for a Partial Test Ban. This treaty prohibited tests in or above the atmosphere, in the seas, and in any other environment if the explosion caused radioactive debris to escape outside the territorial limits of the testing state. The last provision was intended to prevent a nation from putting a small amount of earth over a surface shot and styling it an underground test. The draft did not mention the creation of a control system or international organization, nor did it call for any moratorium on underground tests. Ambassador Dean, when presenting the Partial Ban draft, declared it could and should be accepted immediately as a means of limiting the arms race and stopping radioactive pollution.
Assistant Secretary of Defense Paul Nitze headed a panel to evaluate detection capabilities under both proposed treaties. The panel estimated that the system envisioned in the comprehensive draft could detect underground shots down to about 10 to 20 kt in alluvium, and 1.5 to 3 kt in tuff. Nitze stated that this threshold would still allow the USSR to study most important technical principles of nuclear weapons development, including those relating to neutron weapons. His panel concluded that detection capability for atmospheric and underwater tests was adequate, but that tests conducted in inland waters or outer space would be difficult to detect .
The USSR rejected both treaties, the first because it still allowed for on-site inspections that the West could use for espionage purposes, and the second because it permitted underground tests. The eight neutral states in the ENDC sought to placate the Soviets by proposing that the entire International Scientific Commission decide which suspicious events should be inspected, rather than the opposing nuclear power. The Western powers rejected this suggestion and the ENDC recessed on September 7.
In October 1962, the crisis over Soviet missiles in Cuba convinced both superpowers of the need for rapprochement. Having confronted the very real possibility of nuclear war, the USSR and the US were more willing to moderate negotiating positions. The Soviet Union indicated it would be willing to consider the use of sealed automatic recording stations, nicknamed black boxes, for in-country verification, based on a suggestion by three American and three Soviet scientists at the Tenth Pugwash Conference in London. Ambassador Arthur Dean revealed to the Soviets that the US might now accept 8 to 10 on-site inspections per year, and 8 to 10 nationally manned control posts, in the territory of the USSR.
When the ENDC reconvened in November, the USSR proposed the use of automatic seismographic recording stations to eliminate the need for internationally supervised, nationally manned stations as well as on-site inspections. Several weeks later they suggested three possible sites for these black boxes, and announced they would be willing to have international personnel participate in the installation of these devices on Soviet territory. Although the Western powers rejected the idea of eliminating on-site inspections, they proposed that a group of experts be convened to discuss the black boxes.
Following this proposal Kennedy and Khrushchev exchanged letters discussing the acceptable number of on-site inspections in the USSR. Kennedy advocated 8 to 10, while Khrushchev demanded 2 to 3. Private talks were then conducted in the US between William Foster, director of the Arms Control and Disarmament Agency (created in September 1961 in President Kennedy's new Administration), and Soviet representatives. Potential black box sites in both countries were proposed and accepted or rejected, and seismic noise-level data for the sites exchanged. The US felt its requirements might be satisfied by as few as seven such stations, but when the talks ended on January 31, 1963, the Soviets were willing only to consent to three [25, p. 184]. The same day the talks ended, Edward Teller presented a paper to a group of influential Republican Congressmen, charging that acceptance of current Soviet proposals would be equivalent to accepting an unpoliced moratorium.
Due to the unresolved inspection issue, opposition to a test ban developed in the US — or at least to a CTBT. The Joint Committee on Atomic Energy conducted hearings in March 1963, to discuss the technical aspects of verification. Carl Romney testified that the seismographic system under consideration by the US would be able to detect most tests down to 1 kt in granite, 2 to 6 kt in tuff, and down to 20 kt in alluvium. However, he stated that decoupling could attenuate seismic signals by a factor of 200 [30, p. 104]. Much of the criticism of the Kennedy administration's determination to conclude a treaty came from the Republican Conference Committee on Nuclear Testing, chaired by Rep. Craig Hosmer, who had commanded the first occupation troops in Hiroshima in 1945. It appeared that, even if an inspection number acceptable to the Soviets were found, not enough support for a comprehensive ban existed in Congress to provide the Senatorial advice and consent required to ratify a Comprehensive Test Ban Treaty. Apparently Kennedy hoped to generate as much support for the treaty in the Senate as possible, and wanted to receive more than the minimum two-thirds vote needed for ratification. According to Glenn Seaborg, then the Chairman of the AEC, Kennedy felt that the treaty needed to be launched on a strongly positive note to serve its purpose as a first step to a better world order [25, p. 258].
On July 2, Khrushchev announced that the USSR would be willing to accept a treaty banning tests in the atmosphere, in space, and underwater. For the first time, he did not insist that an underground moratorium accompany the treaty. The following day US officials replied that the Administration would also accept such a partial ban. President Kennedy dispatched the veteran diplomat W. Averell Harriman to Moscow with broad instructions to attempt to conclude a comprehensive ban, but to settle for a partial ban if necessary [25, p. 229].
After all the preliminaries, the final steps to conclusion of what has become known as the Limited Test Ban Treaty were anticlimactic. The negotiations began on July 15, 1963, with the US making a final attempt to negotiate a comprehensive ban. An effort was made to arrange meetings between Frank Press, the only seismologist in the US delegation, and Soviet seismologists, but it was claimed that these were all away from Moscow or otherwise unavailable [4, p. 455]. A few days later this attempt was abandoned, and a draft, based on the Western proposal for a partial ban issued the previous year, was put forward.
A treaty, virtually identical to this draft, was composed, and signed on July 25 by Foreign Minister Andrei Gromyko for the USSR, Ambassador Harriman for the US, and Science Minister Lord Hailsham for the UK. In five short articles, it prohibited testing at sea, in the atmosphere, in space, and in other environments if such tests caused radioactive debris to be present outside the testing state's territory. The treaty was to be of unlimited duration, and would be open to all states for signature. Signatory states would have the right to withdraw with three months notice, if extraordinary events jeopardized their supreme interests. Remarkably, no mention whatsoever was made of verification systems or international control, it being assumed that National Technical Means would suffice.
(1) An extensive underground test program must continue in order to improve the US arsenal.
(2) Modern nuclear laboratory facilities and research programs must be maintained.
(3) The resources and facilities to resume atmospheric tests promptly must be maintained, in the event of Soviet non-compliance with the treaty.
(4) US capability to monitor the treaty and detect violations must be improved.
President Kennedy, in private conversations with the Chiefs, supported these safeguards. In the view of Glenn Seaborg: "While this support may have obtained the favorable testimony of the Joint Chiefs, it was at a very heavy price for the cause of disarmament" [25, p. 271]. At the end of these hearings, which lasted three weeks, the Joint Chiefs of Staff gave their formal, if unenthusiastic, approval to the limited ban.
As expected, Edward Teller opposed the treaty, arguing that the US needed to test in the atmosphere to learn more about weapons effects. Addressing the Senate Foreign Relations Committee, he stated that if they consented to ratification, "You will have given away the future safety of this country. You will have increased the chances of war, and, therefore, no matter what the embarrassment may be in rejecting the treaty, I earnestly urge you to do so and not to ratify the treaty which is before you" . John Foster, Director of the Livermore Laboratories, considered the treaty disadvantageous from purely technical-military considerations, and urged rejection. The Director of Los Alamos, Norris Bradbury, supported the treaty, but only on condition that the US government devoted itself to a vigorous underground test program. Hans Bethe and other test ban proponents, while regretting failure to negotiate a comprehensive ban, applauded the treaty as a useful first step [34, pp. 583 & 616].
Ratification of the Moscow Treaty, formally known as the Treaty Banning Nuclear Weapon Tests in the Atmosphere, Outer Space, and Underwater, received the consent of the US Senate, by a vote of 80 to 19, on September 29. The Presidium of the Supreme Soviet voted unanimously to ratify the treaty on September 25. On October 7 President Kennedy signed the Moscow Treaty, which entered into effect on October 11. That same day, in Oslo, the Nobel Peace Prize was awarded to Linus Pauling, one of the very earliest test ban advocates.
The Moscow Treaty, commonly referred to as the Limited Test Ban Treaty, promptly found wide support. By the end of 1963, 113 nations had added their signatures to those of the USSR, US, and UK, and by late 1994 over 145 states had become signatories. The Peoples Republic of China, which was to test its first atomic bomb in 1964, and France, which felt that its independent arsenal, the force de frappe, still needed perfection through atmospheric tests, were the most prominent states refusing to sign. However, although the LTBT was successful as an environmental measure in that radioactive fallout was greatly reduced (even France and China eventually stopped atmospheric testing — the last such test being conducted by China in 1980), the treaty had little impact on nuclear weapons development in view of the vigorous programs of underground testing that continued for decades. The work to obtain agreements on a CTBT verification regime (including provisions for in-country monitoring and on-site inspection), though briefly considered again in the late 1970s, was effectively postponed for a generation, beginning again on a multilateral basis at the Conference of Disarmament in January 1994 in Geneva, where the work began so many years before. The Conference on Disarmament produced a final CTBT text in 1996, which with one minor revision was adopted by the United Nations in September 1996.
The work of monitoring underground nuclear explosions using seismological methods can usefully be broken down into the separate steps of signal detection, location of the event, identification, and estimation of yield. All these steps may be studied both for underground tests conducted non-evasively (the practice under the LTBT); and for tests conducted evasively using various methods (some, as yet hypothetical) to reduce or otherwise manipulate signals, with the goal of avoiding detection and/or identification.
Improvements in signal detection came steadily throughout the early years of Project VELA, along with improved methods of event location. The effectiveness and engineering feasibility of the cavity decoupling method of treaty evasion appears to be much more limited than envisioned in 1963. But the early development of methods for event identification began with a setback, and a key method that was indeed successful was discovered too late to have any impact in the period 1958-1963.
The key method of event identification that was successful was based upon use of more than just the P-wave. To explain this method, we must first note that earthquakes and underground explosions produce several different seismic waves, falling broadly into three types: those which travel through the body of the Earth (i.e. through its deep interior); those which spread out over the surface of the Earth, analogous to the way that ripples disperse over the surface of a pond; and those which are guided along by the outer layer of the Earth (the crust). These three types of waves are referred to as seismic body waves, seismic surface waves, and regional waves. A subdivision of seismic body waves into so-called P-waves and S-waves has been known since the 19th century. As noted above, P-waves travel faster than all other seismic waves, and, though traveling in solid rock, are analogous to sound waves in air or water. S-waves (the S standing for secundus) also travel through the Earth's deep interior, but slower than P-waves. They consist of a shearing motion in which particles move at right-angles to the direction the S-wave itself is traveling. The typical frequency of a P-wave or an S-wave, as recorded at teleseismic distances (see Figure 1, the Third Zone), is in the range 0.5 – 5 Hz. Surface waves are also recorded teleseismically, but with much lower frequency, typically around 0.05 Hz. The strongest regional wave, known as the Lg-wave, may have frequencies in the range 0.3 – 3 Hz.
A number of seismologists noticed in the early 1960s that the different types of seismic waves were excited to different levels by underground explosions, than was the case with shallow earthquakes. Some of this work had in fact been known for many years, but in the context of studying the signals from quarry blasts, which are typically too small to detect except at regional distances. Thus, a Harvard seismologist, Don Leet, who had specialized in the study of quarry blasting, noted from teleseismic records of underground nuclear explosions that they often lacked any S-wave signals even when the P-wave was strong . For earthquakes, the S-wave is usually much stronger than P. The use of what Leet called the “lonesome P” discriminant, however, was unreliable, for many nuclear explosion records did in fact include S-wave signals and it was not until the 1990s that careful quantitative work using regional waves turned this approach into a useful method of event identification. More important, for purposes of monitoring with teleseismic waves, was the discovery that underground nuclear explosions are inefficient, relative to earthquakes, in exciting surface waves. Much of the early work in this field was done at what was then called the Lamont Geological Observatory of Columbia University in New York. For example, James Brune and others in 1963 found from the study of more than a 100 earthquakes and 35 explosions that "Most of the earthquakes studied generated surface waves 5 to 10 times greater than the maximum observed for explosions when the explosions and earthquakes had short-period regional waves of the same size" . Liebermann and Pomeroy [37, 38] used traditional methods of measuring the magnitude of teleseismic body waves (mb) and surface waves (Ms), and showed for an underground nuclear explosion in the Aleutians that the Ms value was only 3.9, whereas for an earthquake with the same mb as the explosion, the Ms value would be expected to be about 6.1. They then applied this discrimination method to two seismic events in Southern Algeria and successfully identified them as underground nuclear explosions, because the surface waves from these events are much smaller than would be expected from most earthquakes of comparable body-wave magnitudes.
The so-called Ms:mb discriminant was clearly successful for shallow seismic events, if they were large enough to give teleseismic body-wave and surface wave signals whose magnitude could be reliably measured. (For deep events, other discriminants could be used.) The method resulted in many efforts over a period of years to improve the ways that mb and Ms are measured, and many efforts to see if the discriminant could be applied reliably at lower magnitudes. Figure 3 shows key results obtained in 1971 (though not released until several years later) for underground nuclear explosions at the Nevada Test Site and earthquakes in Nevada, namely: that the method appeared to be reliable down to below mb 4; and that the two populations (of explosions and earthquakes) did not appear to merge at low magnitude, so the method could potentially be made to work at even lower magnitudes if signals could be obtained (in particular, surface wave signals from small explosions) .
With the growth of the WWSSN in the early 1960s, signal quality was adequate to apply the Ms:mb discriminant routinely on a global basis down to mb 4.5. For example, Sykes and others showed that for events with mb ≥ 4.5, 90% could be identified as earthquakes based upon their depth being greater than 30 km and/or their location being more than 25 km at sea; and all the remaining 10% could be identified using the Ms:mb method . This capability would appear to have been adequate to monitor compliance with a trilateral underground test ban of the type considered in the early 1960s, with a ban on events of magnitude 4.75 and above, although the WWSSN stations would have needed augmentation to improve detections in Eurasia.
Figure 3. A robust discriminant, the plot of Ms against mb, is shown for earthquakes and underground nuclear explosions. Since magnitude scales are logarithmic, the separation of the two lines by 0.8 magnitude units implies that surface waves from earthquakes are, on average, more than 6 times larger than surface waves from explosions having the same body wave magnitude. From .
The capability to monitor a CTBT by seismological methods was developed on an accelerated basis in the early 1960s, but was then deemed inadequate, leading apparently to the need for significant numbers of on-site inspections of suspicious events. In retrospect, we find that monitoring methods turned out to be significantly better than they were typically characterized at the time by key advisors. Presentations to the US Congress, by witnesses characterizing the US monitoring effort, often gave estimates of monitoring capability that later turned out to be significantly in error, actual capability being better than the estimate. Great improvements in capability were developed in the practical context of monitoring underground nuclear weapons tests following the conclusion of the LTBT — not in the context of earlier arms control negotiations.
The Geneva system of 170 control posts (see Figure 2) was never built, but, on the basis of comparison with other networks, it appears it would have enabled monitoring to be accomplished on a global basis down to mb 3 rather than mb 4, about a tenfold improvement over what was stated at the time to be the desired monitoring capability.
Support to Richards’ research for over three decades is acknowledged from the Advanced Research Projects Agency, the Air Force Phillips Laboratory, the Air Force Office of Scientific Research, the Defense Threat Reduction Agency and the Department of Energy. Note: the views and conclusions here are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Government.
1. Kerr, D.M. (1988) in J. Goldblat and D. Cox (eds.), Nuclear Weapons Tests: Prohibition or Limitation?, Oxford University Press, New York, p. 43.
2. Magraw, K. (1988) Teller and the Clean Bomb Episode, Bulletin of the Atomic Scientists, May issue, p. 32.
3. Gilpin, R. (1962) American Scientists and Nuclear Weapons Policy, Princeton University Press, Princeton, NJ.
4. Jacobson, H.K., and E. Stein (1966) Diplomats, Scientists, and Politicians: The United States and the Nuclear Test Ban Negotiations, Univ. of Michigan Press.
5. Johnson, G.W. (1985) Underground Nuclear Weapons Testing and Seismology - a Cooperative Effort, in The VELA Program: A Twenty-Five Year Review of Basic Research, Defense Advanced Research Projects Agency, p. 10.
6. The New York Times (1958), April 3, p. 1.
7. Conference of Experts to Study the Methods of Detecting Violations of a Possible Agreement on the Suspension of Nuclear Tests (1958) Verbatim Records.
8. Teller, E. (1958), Alternatives for Security, Foreign Affairs 36, p. 204.
9. Murray, T. (1959) East and West Face the Atom, The New Leader, June 15, pp. 10-14.
10. US Congress (1959) Senate Committee on Foreign Relations, Subcommittee on Disarmament, Hearings: Geneva Test Ban Negotiations, 86th Congress, 1st Session, p. 29.
11. Ringdal, F. (1985) Study of magnitudes, seismicity and earthquake detectability using a global network, in The VELA Program: A Twenty-Five Year Review of Basic Research, Defense Advanced Research Projects Agency, p. 611.
12. Romney, C. (1960) Detection of Underground Explosions, in Project Vela, Proceedings of a Symposium, October, pp. 39-75.
13. Murphy, J. (1981) P-wave coupling of underground explosions in various geologic media, in E.S. Husebye and S. Mykkeltveit (eds.), Identification of Seismic Sources Earthquake or Explosion, D. Reidel, Dordrecht, pp. 201-205.
14. Ringdal, F., P.D. Marshall and R. Alewine (1992) Seismic yield determination of Soviet underground nuclear explosions at the Shagan River test site, Geophysical Journal International 109, 65-77.
15. US Department of Defense (1959) Press Release, Jan 16.
16. Latter, A., R. LeLevier, E. Martinelli, W. McMillan (1959) A Method of Concealing Underground Nuclear Explosions, RAND Corporation, Mar. 30. Subsequently published (1961) Journal of Geophysical Research 66, 943-946.
17. Street, K. (1959) Need for High Explosive and Nuclear Tests for Research Program, Report of the Berkner Panel, p. 54.
18. Report of the Berkner Panel (1959), p. 15.
19. Project Vela, Proceedings of a Symposium (1960), October.
20. Bethe, H. (1960) The Case for Ending Atomic Testing, The Atlantic Monthly 206, p. 48.
21. Conference on the Discontinuance of Nuclear Weapon Tests, Geneva (1958-62) Verbatim Records, section 188, p. 13.
22. Latter, A. (1960) Decoupling of underground explosions, in Project Vela, Proceedings of a Symposium, October, p. 180.
23. Kistiakowsky, G.B. (1976) A Scientist at the White House, Harvard University Press, Cambridge.
24. Romney, C. (1962) US Congress, Joint Committee on Atomic Energy, Hearings: Developments in the Field of Detection and Identification of Nuclear Explosions (Project Vela) and their Relationship to Test Ban Negotiations, 87th Congress, 1st Session, pp. 123-4.
25. Seaborg, G.T. (1981) Kennedy Khrushchev and the Test Ban, Univ. of California Press, Berkeley.
26. Khalturin, V., T. Rautian, and P.G. Richards (2000), A study of small explosions and earthquakes during 1961-1989 near the Semipalatinsk test site, Kazakhstan, accepted for publication, Pure and Applied Geophysics, 2000.
27. Båth, M. (1962) Seismic records of explosions - especially nuclear explosions: Part III, Forsvarets Forskningsanstalt (Swedish Defense Research Establishment), FOA report 4, A 4270-4721, December, pp. 60-63.
28. Agnew, H. (1987) personal communication to one of the authors (PGR).
29. Bethe, H. (1962) Disarmament and Strategy, Bulletin of the Atomic Scientists 18, 14-22.
30. US Congress (1963) Joint Committee on Atomic Energy, Hearings: Developments in Technical Capabilities for Detecting and Identifying Nuclear Weapons Tests, 88th Congress, 1st Session.
31. Foster, W. (1962) U.S. Congress, Disarmament Subcommittee Hearings: Renewed Geneva Negotiations, 87th Congress, 2nd Session, 25 July.
32. US Congress (1963) Senate Committee on Foreign Relations, Hearings: Test Ban Negotiations and Disarmament, 88th Congress, 1st Session, 1963.
33. US Congress (1962) Senate Armed Services Committee, Preparedness Investigation Subcommittee, Hearings: Arms Control and Disarmament, 87th Congress, 2nd Session, p. 13.
34. Teller, E. (1963) US Congress, Senate Committee on Foreign Relations, Hearings: Nuclear Test Ban Treaty, 88th Congress, 1st Session, p. 428.
35. Leet, D. (1962) The detection of underground explosions, Scientific American 206, 55-59.
36. Brune, J., A. Espinosa, and J. Oliver (1963) Relative excitation of surface waves by earthquakes and underground explosions in the California-Nevada region, Journal of Geophysical Research 68, June 1, 3501-3513.
37. Liebermann, R.C., C.-Y. King, J.N. Brune, and P.W. Pomeroy (1966) Excitation of surface waves by the underground nuclear explosion Longshot, Journal of Geophysical Research 71, 4333-4339.
38. Liebermann, R.C., and P.W. Pomeroy (1967) Excitation of surface waves by events in Southern Algeria, Science 156, 1098-1100.
39. Lambert, D.G., and S.S. Alexander (1971) Relationship of body and surface wave magnitudes for small earthquakes and explosions, SDL Report 245, Teledyne Geotech, Alexandria, Virginia.
40. Sykes, L.R., J.F. Evernden, and I. Cifuentes (1983) Seismic methods for verifying nuclear test bans, in D.W. Hafemeister and D. Schroeer, Physics, Technology and the Nuclear Arms Race, AIP Conference Proceedings, no. 104, AIP, New York. | 2019-04-18T15:35:18Z | https://www.ldeo.columbia.edu/~richards/earlyCTBThistory.html |
Bike Share Feasibility Study Grant A bicycle organization has received a $30,000.00 state grant to study the feasibility of creating a bike corridor from Harrisburg to Hershey and possibly to the west shore. They would have bikes available for use at several locations. The organization has an agenda for their first year and it was suggested that this committee have a representative at their meetings.
Mateer Field A public meeting will be held at the township building at 7:00 p.m. on Monday, October 6, to explore the possible disposition of this park property located east of Oak Park Circle. A group of local land owners constitute the legal owners of the property and the meeting will give them an opportunity to agree on what if anything should be done with the property. The township has an interest in possibly using the property as a township park and trailhead for a future walking trail but the property owners will need to decide on the disposition of their land.
Trail Maintenance The committee decided that they would meet on Sunday, November 7th to survey park areas to see what maintenance items need to be addressed. They plan to schedule a work day for the following Sunday.
Walking Opportunities Brochure Committee member Angela Sedun has been working on the design of an updated version of the trail brochure that the committee had created. This larger brochure will give the location and description of the more than a dozen marked trails available to walkers in the township. The new version will contain more information and photos.
Safe Routes to School This state project was to provide safety improvements for students walking to school. An effort was made to secure funding for changes at the Linglestown Middle School but the application was not completed by the school authorities and the project was abandoned. As an aside, it was noted that intersections with painted crosswalks are more dangerous than ones without marking since pedestrians may think they have the right-of-way at marked intersections.
Harrisburg Pigeon Club Some time ago the committee met with officers of the club regarding possible shared use of their clubhouse on Union Deposit Road. The committee could possibly use it as a trail head for a planned trail along Nyes Run. A date will be set for committee members to visit the building.
Township Budget It was mentioned that it might be possible for part of the cost of some of the committee’s projects to be included in the 2015 township budget. Several such projects could be the brochures noted above and signage on some of the existing trails. An effort in this regard will be considered.
Linglestown Celebration Bill Minsker attended the meeting to remind the township of the planned 250th Anniversary celebration to be held next year and the extensive preparations underway by the local committees. He requested that the township authorities get involved in the planned celebration any way they can.
He also took the opportunity to suggest that the township recognize two historical sites along Linglestown Road and consider possible ways to protect and preserve them. One is the vacant old fortified house on the south side of the road east of Colonial Road known hundreds of years ago as Fort Gilchrist. The other is the giant sycamore tree east of the house on the west side of Patton Road. It is thought to be hundreds of years old and the second largest such tree in the state. He is suggesting that the township purchase the two properties and maintain them as parks. Any historical markers by law would have to be funded privately.
Arts Council One individual was interviewed to fill the vacant seat on the Arts Council. The board considered her well qualified and voted to recommend that the supervisors appoint her to that position.
Koons Park Softball Field The Linglestown Softball Association has finished most of the work involved in building new dugouts and a refreshment stand and storage building at the softball field. Unfortunately, even though the field has been in use, the construction work on the buildings has remained unfinished. The board may suggest that the township get the buildings under roof and finish the project.
Possibility Place The local Rotary Club will be replacing the rubber floor mats and the shades over the benches at this play facility at George Park. Also there is an Eagle Scout candidate who has a repair project underway there.
Hodges Heights Park The board again discussed what can be done to make this park, that is located on landfill, usable by the neighbors. Suggestions such as relocating the road, relocating the pavilion to a level area, etc., could help. However, it was suggested that perhaps the final best solution is to abandon the current location and create a new pocket park nearby. Unfortunately the board is no closer to having a workable solution than they did when the matter was first discussed. The local residents have not had use of most of the park facilities for some time and they continue to hope that some kind of improvement project will be forthcoming.
This open meeting held at the township building was called to provide the residents of the area around the Mateer Field property the opportunity to choose if they wish to reestablish the organization that has ownership of the park. The property is located east of Oak Park Circle and west of Berryhill Road. It consists of two baseball fields and a parking lot on three contiguous parcels.
The owner of record as of June 1944 is “The Community Club of Colonial Park”, a Non Profit Corporation. That organization ceased to function many years ago and different groups have developed and maintained the property for various baseball teams ever since. In recent years one individual has maintained the fields but he needs to step down and the future of the park is in question. That person approached the township on several occasions to see if they could help with the problem. Parks & Recreation Department director Brian Luetchford indicated that there is a possible interest in the township acquiring the property and turning it into a community park. Whether or not that would happen, it seemed necessary to do something with the property and Mr. Luetchford organized a public meeting to address the issue.
At the well attended meeting it was explained that the official owners of the park property as stipulated in the original charter are the owners of all the residential properties within a specified adjacent area. They were told that even though they have not been active for many years they could reorganize and take action to maintain the property or dispose of it as they wish.
Members of the group of owners expressed an interest in forming a committee as per the old bylaws and meeting in the very near future to decide how to proceed. A large enough numbers of the existing owners were present and agreed to serve on the committee. They expected that a decision on the preferred disposition of the property would be forthcoming. They asked Mr. Luetchford what the procedure would be if they decided to give it or sell it to the township with a stipulation that it needed to remain a park for some number of years. He replied that the supervisors would need to agree to the establishment of a new park and would develop the necessary legal documents to allow that to happen. He suggested that the matter could be presented to the supervisors within the next month.
I-83 Sewer Project The township is required to reimburse PennDOT for 50% of the cost of the small sanitary sewer work involved with a recent interstate reconstruction project. The sewer work consisted of repair to a manhole and 40 feet of sanitary sewer piping. The authority members voted to approve the payment.
Linglestown Road The recent PennDOT highway project that resurfaced Linglestown Road several miles to the east from the Village of Linglestown left 9 manhole covers depressed far enough below the road surface that some number of complaints have been received from motorists. The change order cost to raise the manhole covers to be level with the road is $9000.00, of which half under the open construction contract is the responsibility of the township. The authority approved the payment.
Property Maintenance Code – Ordinance #14-05 At last month’s supervisors’ meeting there was an advertised public hearing regarding the proposed change to the code which would set forth new requirements for the mowing of properties in the R-1 Low Density Residential District. The provision would affect large undeveloped properties in the district, specifically requiring the mowing of a 10 foot wide setback on the property perimeter plus the mowing of an area equal to the minimum required lot size in the R-1 zoning district. Several citizens raised objections to the proposed provisions and action on the code change was postponed. As promised, the supervisors on their road tour viewed several of the properties that would be affected by the new requirements. At this meeting the supervisors without further comment voted to adopt the new requirements.
Police Agreement The collective bargaining agreement between the police personnel and the township which was withdrawn at the previous meeting was ready for action at this meeting. It was approved by the supervisors.
South Central EMS EMS director Jason Campbell attended the meeting to discuss the 2015 township’s contribution to the ambulance service. He stated that 60% of his calls come from Lower Paxton Township and he noted that the township’s contribution had been significantly reduced last year from previous years. The supervisors noted that they were trying to keep the 2015 budget as close as possible line item for line item to the 2014 expenditures. They agreed to further discuss the matter at their budget meeting scheduled for October 21st.
Public Works Building The township’s engineering firm GHD submitted a proposal for site design services involved with the planned expansion of the Public Works building on Locust Lane. The agreement was for a not-to-exceed figure of $4,000.00. The supervisors voted to approve the contract.
Dissemination Agent Each year the township is required to appoint a Dissemination Agent to oversee any outstanding borrowing. The supervisors voted to reappoint the firm of Susquehanna Group Advisors for another year.
Adaptive Traffic Signal System – Resolutions #14-31-01 thru #14-31-05 These five resolutions authorized PennDOT to install their equipment on traffic lights on five Union Deposit Road intersections, two at I-83 and three at other locations, as they had previously done on for a project on Route 22. There is no cost to the township and they will be removed after road construction is completed. The supervisors approved these resolutions.
Huntleigh Development The developer of this housing project located along Lyters Lane requested a change to the preliminary/final subdivision plan for a portion of the development. The approved plan for the project contained 148 building lots to be built in seven stages. The developer now wishes to combine stages six and seven with the previously planned 32 lots into a single phase with only 5 large lots. The proposed change has been approved by the Planning Commission. The supervisors voted to approve the request.
Linglestown Clock Lowman Henry representing the Colonial Park Rotary Club made a presentation to the supervisors regarding the club’s project to install a clock on the Linglestown Square as part of the town’s 250th anniversary celebration to be held in October of next year. The club has raised funds for the clock which will be built and installed by local Vo-tech students. Their plan is that after the celebration, the clock will become the property of the township and at that time the club will provide funds to the township for its long term maintenance. A formal agreement for this will be needed and the club will prepare it and present it to the township for approval. The board thanked the club for their participation in the upcoming celebration.
Capital Region Water Shannon Williams, who is the chief executive officer of Capital Region Water, made a presentation to the board updating them on the new department in Harrisburg. Last year the city’s drinking water and wastewater conveyance systems were officially transferred to this new authority in order to consolidate the two operations. The plan is to systematically update the systems, parts of which go back to the 1860’s, and it has been started with a 50 million dollar project. She acknowledged that there are many ongoing difficulties that lie ahead for her department.
Heroes Grove Members of this project’s committee reported on the status of the planned amphitheater to be built in Brightbill Park. They recently secured an agreement with the owners of the adjacent shopping center to be allowed to use their parking lot during events and programs. Now that construction will be starting, there are also explicit agreements needed with the Friendship Center, the township and the county, covering the many legal and procedural matters. The township’s solicitor was directed to prepare the needed agreements for board action.
Friendship Center Representatives from the center’s Operating Board updated the supervisors on the status of the four changes being made that are in response to the recommendations in the recent professional study. Online registration is underway, hours of operation have been changed, membership categories have been revised and physical changes to increase space for fitness equipment are being planned. Over the summer new HVAC equipment has been installed in the natatorium and the lap pool has been refinished.
2015 Budgets The Police Department budget line items are mostly unchanged from this year. The plan is to hire 3 additional officers, which would increase the force to 56. This would still be 2 officers below what they consider to be their minimum needed complement. One of the existing officers will handle the new police dog full time. Labor contracts will increase the salary line item. Information on the Fire Departments’ budgets was incomplete. The Parks & Recreation Department budget will be similar to that for this year. Fees-in-lieu should increase slightly, the Day Camps will move to the Friendship Center saving money, some improvements to the center and to the parks are planned, and some ADA improvements to the facilities are needed. Revenues from recyclables should remain about the same. The two large pieces of equipment being bought for the compost center, which will be partly paid for by state grants, will be purchased yet this year.
2015 Budget Preparation At two previous workshop sessions the supervisors resolved the major budget issues for the coming year for all but six of the township’s many funds and departments. At this meeting they completed general decisions on five of those remaining six. The remaining one is the budget for the Community Development Department. This will be addressed at their next meeting.
General Improvement Fund Township manager George Wolfe reported that the fund’s revenue sources and expenditures are projected to be approximately equal for 2015. Major revenue sources include taxes, county grants and contributions, and funds from bond issues. Expenditures include financing the township departments, the expansion of the Public Works building, contributions to the Heroes Grove project, the Jonestown Bridge replacement project, and work at the Friendship Center, at Wolfersberger Park, and at the Compost Facility, and storm water improvements and traffic signal upgrades. The state grant request for the Nyes Run trail project has been denied so that project will be postponed.
improve coordination with the engineers and contractors on sewer projects and a possible increase in the cost of road salt. State aid is expected to increase slightly that will allow them to upgrade some equipment and buy a new road sweeper.
Fire Departments The township’s annual contribution to the three companies comes from the general fund and from real estate taxes. In addition the companies work hard with their own separate fundraising projects. An additional fire protection related expense is that the township pays a fee to the United Water Company for the use of their many fire hydrants.
LOSAP The Length of Service Award Program provides payments to volunteer fireman who have served the township for a given number of years. With annual contributions the supervisors ensure that the program remains adequately funded.
Fire Equipment Capital Fund The township will receive 2015 budget proposals from the three fire companies regarding requests for new equipment. The supervisors will then discuss possible contributions to the equipment capital fund in the coming year.
An additional item discussed at this meeting was the township’s annual contribution to the local ambulance company. South Central Emergency Medical Services is the organization that provides ambulance services to Lower Paxton Township and East and West Hanover Townships. Two years ago Lower Paxton Township decreased their yearly contribution to approximately $27,000.00 because they were not satisfied with the company’s service. After that the company was reformed under the new leadership of Jason Campbell and the township has been very pleased with the results. At this meeting the board voted to increase their yearly contribution to $50,000.00 with a two year contract.
Linglestown Anniversary – Resolution #14-32 The approval of this resolution indicates the township’s support for the Sestercentennial Anniversary Committee as it plans and implements the village’s 250th anniversary. The celebration will be held on October 9, 10 and 11, 2015. The board approved the resolution.
Colonial Park Rotary Club Clock In October Lowman Henry representing the club presented their plan to install a clock on the Linglestown Square as part of the 250 year anniversary celebration. After the event the clock will become the property of the township and the club will provide funds for the township to maintain it in the future. At this meeting the board approved a formal Memorandum of Understanding to that effect.
Arts Advisory Council At their recent meeting the Parks & Recreation Board interviewed one applicant for the opening on the Arts Council. They voted to recommend that the board appoint the individual to the council and the supervisors voted to do so.
Liquor License – Resolution #14-29 A public hearing was held regarding the transfer of a liquor license from Swatara Township into Lower Paxton for Zia’s Trattoria Italian Restaurant. The facility is located at 5948 Linglestown Road in the village. The supervisors approved the transfer of the license.
Susquehanna Municipal Trust The township is a member of this organization which provides workers’ compensation coverage to the township employees. Township manager George Wolfe is a trustee of the organization and helped draft the proposed minor changes to the agreement. He stated that the organization’s rates have been stable for the last five years. The supervisors voted to approve the revised agreement.
Wastewater Collection System Necessary emergency repairs to the system were put out to bids by GHT engineers. The low bidder was Rogel, Inc. in the amount of $38,000.00 The supervisors voted to award the contract to Rogel.
Bruce and Susan Senft – Docket #1365 This application is for a variance from the required side yard setback at their residence at 1111 Old Pond Road in the R-1 Low Density Residential District. The homeowners wish to widen their attached garage resulting in a side yard setback of 4 feet 6 inches instead of the required 10 feet. The next door neighbor submitted a letter stating he had no objection to the proposed plan. The board approved the request for a variance.
Vanguard Reality Group, Inc. – Docket #1366 This request is for several variances regarding the final phase of the Meadowview Village condominium development at 4801 Union Deposit Road. Eric Kessler, president of the company, indicated that he wants to build 12 units on the final undeveloped 1.74 acre parcel. The property is located in what is now the Residential Retirement District.
The parcel of land is currently zoned for two medical office buildings but changes in the economy have made him revise his plans. He stated that the proposed plan is consistent with the existing housing units and will complete the residential development. A representative from the development spoke in support of the proposal. The variances mostly relate to minor changes that were made to the zoning requirements over the many years since the previous phases were built. The board voted to approve the variance requests.
Mohammed and Riaz Jeena – Docket #1367 The applicants requested a variance from the 10 foot side yard setback requirement at their residence at 125 Suffolk Road in the R-1, Low Density Residential District. Their planned project is to extend their attached garage which would reduce their side yard setback to 6 feet, 4 feet less than allowed. The board approved their variance request.
Patsi and Michael Cibroski – Docket #1368 This request is for a variance from the required rear yard setback of 30 feet in the R-1, Low Density Residential Zoning District. Their house is located at 2061 Fairway Lane. They plan to construct a sunroom on the back of their house which will extend 19 feet into their rear yard leaving 11 feet to the property line. This area is already covered by a deck. The neighbor behind them stated that he has no objection to the plan. The variance request was granted. | 2019-04-21T17:01:17Z | http://straywinds.org/news/newsletters/october-1-2014-to-october-23-2014/ |
Edgar: Ah, but the poor beasts have no thumbs, so I ask you... how are they holding their cards?
In most platformers, the hero can carry a readied weapon of any given size without taking any penalty to his ability to run, jump, climb, dangle by one hand or perform any other acrobatic feats. Equally, he never loses his grip on the weapon when unexpectedly flung through the air or forced to catch a ledge to avoid falling to his doom. You get the impression that the weapon is magnetically attached to his hand, and that his fingers don't have to actually hold it in order to maintain a grip.
What is actually happening is that the weapon is simply being rendered relative to the character's hand. Perfectly reasonable when doing normal things with a weapon. As with any program, so long as it is told to do something, it will continue to do it, even if it violates reality. So if the character needs to grab a ledge, the game will obediently keep drawing the weapon relative to the hand just like it was told.
Ultimately, this is an Acceptable Break From Reality. After all, you wouldn't want to miss catching that ledge because you forgot to put your weapon away. The only obvious alternatives would be for the game to temporarily stop rendering the weapon or automatically put the weapon away.
This is generally a 3-D trope, though it can equally occur in 2-D games. In 2-D cases, the weapon's sprite may simply vanish until the character climbs back up.
Of course, this trope does not prevent the hero from losing the weapon during a cutscene. For some reason, the magnets only work on the hero's assigned weapon; he or she will typically either drop carried items (such as barrels, crates, levers, or burning sticks) or will be unable to jump, climb, or catch edges while carrying them.
See also Do Not Run with a Gun, Sticks to the Back.
When the hero ends up with every object not nailed down in his hands, that's not Magnet Hands, that's Kleptomaniac Hero.
Because players are expected to know that the mechs in Armored Core grips the arm weapons, the first games does not have the arm weapons' grip rendered. This makes some players a little confused on why their rifles/shotguns/bazookas have a trigger, but not a grip.
Bomberman has round spherical hands and somehow holds onto his bombs, most noticeably in the 3D games.
This is the case with Drakengard. It becomes rather hilarious when you're wielding the BFS which weighs close to 100 lbs and you can still jump as high as if you were wielding some of the daggers.
Alice in American McGee's Alice can climb, float, jump, swim, and be set on fire while holding any weapon, even the Jabberwock's eyestaff and the blunderbuss, which both look rather heavy. And hey, the knife will actually respawn in her hand when she throws it.
ICO is particularly egregious: The hero cannot drop his weapon or put it away, but the climb animation causes his weapon to pass through his other arm.
The Legacy of Kain series has this, and if you try and pick up a weapon on a run you'll actually see it float up into the character's hand; it's explained as the characters' latent telekinesis pulling the weapon to their hands.
All 3-D The Legend of Zelda games.
Very noticeable when you cling to the edge of a cliff with one hand, which happens to be holding your sword.
Link also never dropped his sword even when it's the first to smash into a wall whenever he's using the pegasus boots.
The Little Big Adventure games. Yes, apparently, it's perfectly possible to climb ladders while holding a sword or any other weapon.
Shadow of the Colossus: Even while clinging to the underbelly of a giant galloping/flying/swimming beast, Wander can still hang onto his sword. Funny enough, the game has a grip meter that will slowly run down while Wander is hanging from something (be it a ledge or a colossus), and will cause him to fall when depleted. That sword never leaves his hand, though.
Nathan Drake in Uncharted can be reduced to an inch of his life by a near hit from a grenade or missile, but will only be blown backwards or drop his gun if it kills him. Apparently, he has magnet feet too.
In the Tomb Raider games Lara can't climb, push blocks, or grab ledges with her weapons drawn, and in early games in the series the player must manually draw and holster her guns, so if one were to jump towards a ledge while guns are drawn Lara will just bounce off. In the 2013 reboot she automatically holsters or shoulders her weapons after a few seconds when there's no enemies around. She can climb and grab ledges while she has her torch out, except when climbing a wall requiring the climbing axe or when using a zipline.
In the original God of War games Kratos' weapons were literally chained to his arms. In God of War (PS4) Kratos can now chuck his Leviathan Axe into a lake, run away, fend off enemies with his fists, and press a button to have it return to his hand, no matter how far away like Thor. You reacquire the Blades of Chaos, which are again chained to his arms.
Captain America simply does not ever let go of his shield. The ONLY time it could be dropped (and forcing him to pick it up again) is if he did a Shield Slash and somehow didn't catch the shield, or if you're playing Marvel Super Heroes vs. Street Fighter and he dies, where he drops the shield upon death and stays on the ground to serve as a reminder of your fallen comrade.
As of Marvel vs. Capcom 3 this is played fully straight. Even after throwing his shield, it'll magically return to him no matter where he is on the screen.
A 2-d example would be the Samurai Shodown series. Characters can drop their weapons, although they are just stuck in the ground and can be picked up quickly. however the fast paced, high-damage nature of the game means that if this happens, only a skilled player will be able to escape painful.
Street Fighter: Vega's claw can be knocked off, despite WEARING it. Same with his mask in at least one game. Cody can drop his knife, but it should be noted it also has to be picked up first.
In the Half-Life series, Gordon can not only climb ladders while holding a weapon, he can stop halfway up the ladder, face in completely the other direction, and shoot. Now that's skill.
The Halo games (and Halo Zero) have the amazing ability to NEVER have you drop your weapon. Justified in the same way as it does Sticks to the Back; the MJOLNIR armour is electro-magnetic so you quite literally have magnetic hands.
While variations on this are par for the course in FPSs (the most popular seems to be the ability to climb ladders while blasting away with two-handed weapons), Halo 3 gets special mention for the fact that the Player Character literally holds onto his weapons with magnets!
If you drop your lightsaber in the Jedi Knight series, a quick force pull will bring it zipping back into your hand. If you completely lose it (e.g., off a cliff or behind a wall), you grow a new one.
Chell, the protagonist, never lets go of the Aperture Science Handheld Portal Device from when she picks it up in the second level, unless she dies. This includes if you get catapulted 100 feet into the air upside down; she must have the balance of a highly evolved cat person.
Sorta justified with the release of Portal 2's "Long Fall Boots" , which makes the wearer always land on his/her feet. Also absorbs all the shock from landing too! It also helps that Chell's hand seems to be inside the Device, Arm Cannon style.
In Star Wars: Republic Commando, the guns never leave your hand on screen, though occasionally the gun-holding hand will drop off the screen and come back empty. This becomes rather jarring when you take a closer look at the model fro that hand—the index finger (used for both the trigger and using computer consoles) doesn't have "straight" and "bent" positions, it's split and fills both positions at once. That's a very good reason to never show the weapon leaving the hand. Luckily, you have to play around with the camera settings a bit to see the hand from a non-scripted angle and see that.
In Team Fortress 2, every class has a "taunt" move for most of their weapons (the Medic uses his bonesaw as a pretend violin, the Demoman takes a drink from his bottle, etc.) but if the change weapon button is pressed immediately after the taunt button, the weapon the character is holding for their taunt changes, resulting in some strange moves (The Demoman takes a drink from his handheld cannon, the Spy pulls a cigarette out of the barrel of his pistol). This was "fixed" in a recent update, though there is a server setting to re-allow it.
This was one of the many FPS-trope aversions attempted by Trespasser: you had to manually move your arm about to pick up (and aim, for weapons) objects in the game world, and you could lose your grip on them. Most players and reviewers derided it as awkward and clunky, though it is possible to achieve reasonable proficiency with practice. Said control awkwardness resulted in Fridge Brilliance once or twice, when Anne realistically dropped her gun upon falling off a wall or had it knocked out of her hand by a charging velociraptor.
In Zeno Clash, not only can any weapon be knocked out of your hands with a few well placed blow from an enemy, but they can pick it up and start using it on you. Luckily you can do the same.
Borderlands usually plays this super-straight, EXCEPT for one gun in 2: The Crit. You have a 9.5% chance of dropping it whenever you reload, giving others the opportunity to snag it. This is to balance out the ridiculous shock damage that it doles out.
Left 4 Dead plays the trope straight with 2 exceptions: Climbing ladders has the character put away their weapons, which leaves them open to attack from zombies above them. Being killed also has the character drop their weapons, so anyone else can pick them up for use.
World of Warcraft takes the "automatically put the weapon away" route. Any time you have to do something where it would be inappropriate to be holding a weapon (such as casting a spell or saluting), your weapons instantly teleport back to their sheaths on your hip or back.
In the 2D games Zero would quick-draw his saber at the start of a combo, and sheathe it at the end. The 3D games give him a bad case of magnet hands. Especially annoying in X8 where he gets a huge hammer and a naginata apparently glued to his hand.
In the same game, Axl is actually drawn holding his larger guns with both hands. This also means that he's drawn clinging to walls by his feet. However, barring these and Zero's dual harisen, the characters will only cling to walls with their free hand.
An actual powerup item for the original Mega Man's Rocket Punch-like Mega Arm in the 5th Game Boy game is called the MH Item (MH being Magnet Hand, of course). It allowed Mega Man to grab distant powerups with his charged Mega Arm attacks.
Special mention goes to Mega Man Volnutt of the Mega Man Legends series. Due to how the weapon equiping system in those games works, he'll often climb ladders and cling to edges with two guns instead of hands.
In Ratchet & Clank, your weapons mysteriously disappear from your hand while hanging onto a ledge, then re-equip once you pull yourself up. Hand Waved in the third game by explaining that they're quick-assembled/disassembled from a high-tech wristband Ratchet is wearing.
The cutscenes from the first game show this. Rather than actually holding the Chaos Emeralds, characters just hold their hands out and the Emeralds just sort of float right next to their hands.
Also, one can't help but wonder how Vector the Crocodile's headphones stay on. There's nothing really holding them on his head, but even when he's doing a spin-jump or spindash they somehow manage to stay on.
A similar case is Charmy Bee's flight helmet - he can do a backflip while wearing it and it doesn't go flying off.
In Yo! Joe! Beat the Ghosts, certain weapons, when wielded, would render you incapable of grabbing onto a ledge. Since changing weapons required you to stand on an even surface, forgetting to change weapons before a jumping puzzle could net you a fast-trip to the bottom of the level.
Happens in the NES version of FHBG, where ledge grabbing was a Good Bad Bug. The Python remake made holding a block make the player unable to grab ledges for balance reasons.
In Kid Niki Radical Ninja, Kid Niki's sword sometimes gets knocked out of his hand in Boss Battles.
Diablo II has cows wielding halberds. With their hooves.
Barring having your gun shot out of your hand, it is impossible to unwillingly lose your weapon in Fallout 3 or Fallout: New Vegas. However, it will negatively impact your running speed if you don't holster it. However, a few rendering errors can wind up in big weapons like the minigun sticking to the player's and NPCs' hands in improbable ways. For instance, when Jericho smokes, ignoring the 40 pounds of steel death strapped to his arm.
In NieR, one-handed swords and spears are large enough on their own, but two-handed swords (and axes) are such massive monstrosities that Nier himself (a towering, heavily-muscled beast of a man) has trouble swinging them and a slash from the heaviest ones can take him up to two or three seconds. But he has no problem leaping with them, or hanging onto them when he's kicked across the room by an enemy. He suffers no penalty even when he sticks them to his back and starts running, climbing, or even double-jumping.
Occurs in many of the Guitar Hero games, especially Guitar Hero 1 and 2, when activating Star Power, the player does many "magnet hand" things, including twisting the strapless guitar around their waist.
Occurs in Rock Band and its sequels, when checking out guitars from the Rock Shop. Your character places their hands behind their back while modeling each guitar - but none of the guitars have straps, resulting in guitars floating in front of you.
Characters in Resident Evil 4 continue to clutch their weapons even in death. They even do this during death situations that would normally call for the complete loss of motor function or other preoccupation, such as having their heads chainsawed off or throats ripped out by dogs.
Enemies, on the other hand, can drop their weapons if you nail them in the arm or torso. They don't bother to pick them up again, either.
In Survivor: The Living Dead, holding items drains your stamina faster, and when your stamina runs out you risk tripping in a most spectacular manner, which sends whatever you're holding tumbling through the air away from you. Not a good thing if you're surrounded by zombies.
Kamen Rider Gaim's Kamen Rider Knuckle fights using (as you may have guessed) giant boxing gloves. In one episode, he somehow manages to pull out a Lockseed and throw it to an ally...while still wearing the gloves .
One letter to Nintendo Power magazine asked how Shy Guy and Boo were able to hold their tennis rackets in the then-recently released Mario Tennis game when neither had fingers. "A complex system of magnets" was the answer they "received" from Shy Guy, while Boo just muttered something about "sticky ectoplasm".
BIONICLE characters do this a lot in various animations, since they are normally shown with Fingerless Hands. But this even appears in the DVD movies, where they were given true hands with fingers — case in point: Takua magnetizing a wooden staff to his palm through sheer determination. Word of God says this "power" is also what keeps their masks on their face and strapless bags on their back.
Though not a platformer, GURPS parodies this with the perk Guns Akimbo which lets guns function normally no matter what you're holding.
In Homestar Runner, The Cheat can use objects as if he had opposable thumbs, Strong Bad can type with boxing gloves on, and Homestar Runner can interact with and move objects around him as if he had arms. Which, he doesn't. This is occasionally lampshaded.
The Powerpuff Girls exhibit this because they lack fingers. This gets a Lampshade in the Freaky Friday episode, where Buttercup-in-Professor Utonium tries to answer the Hotline by pressing "her" hand to the receiver, then pulling away. After a few failed tries, she looks off-screen and shouts "Professor! Your hands don't work!"
VeggieTales characters have this despite the little handicap of not actually having hands.
My Little Pony: Friendship Is Magic has many of its equine cast shown carrying, pulling, holding, and manipulating objects with their hooves, despite the handicap of, well, having hooves. A humorous fandom response suggests that they have granular vacuum grippers instead of forehooves, and some fan-works put it down to contact telekinesis, ie they're magical talking ponies so just go with it. | 2019-04-23T06:37:32Z | https://tvtropes.org/pmwiki/pmwiki.php/Main/MagnetHands |
In his speech, Rowe recognized the need to balance our nation’s fragile economic recovery with the need to address climate change, and pointed to energy efficiency as a lower-cost way to meet those goals. Rowe discussed how Exelon utilities ComEd and PECO plan to spend $290 million per year over the next five years on energy-efficiency and demand response programs. The plan aims to help customers reduce their energy use by more than 3.7 million megawatt hours and cut peak load by 388 megawatts. Exelon’s energy-efficiency programs place the company third among the nation’s utilities in terms of customer energy savings.
Rowe announced that Exelon will not be renewing its membership in the U.S. Chamber of Commerce because of their stance on climate change legislation. The company joins other recent similar announcements from Pacific Gas and Electric (PG&E), PG&E Chairman and CEO Peter Darbee; New Mexico power company PNM; and Duke Energy and Alstom who publicly gave up their membership in the American Coalition for Clean Coal Energy. Also, Nike has said it fundamentally disagrees with the US Chamber of Commerce's position on climate change [See WIMS 9/24/09].
In making his announcement Rowe said, "Some see carbon legislation as just another issue they can use as a cudgel against President Obama. In the short term they may be right. But the EPA has received license from the Supreme Court to regulate CO2 as a pollutant. If Congress doesn’t act, the EPA will. The result will be more arbitrary, more expensive and more uncertain for investors and the industry than a reasonable legislative solution. I am disappointed that Congressional Republicans and business groups can’t recognize this reality. Because of their stridency against carbon legislation, Exelon has decided not to renew its membership in the US Chamber this year."
Chicago-based Exelon Corporation is one of the nation’s largest electric utilities with approximately $19 billion in annual revenues. The company distribute electricity to approximately 5.4 million customers in Illinois (ComEd) and Pennsylvania (PECO), and gas to 485,000 customers in the Philadelphia area (PECO). Exelon has one of the industry’s largest portfolios of electricity generation capacity, with a nationwide reach and strong positions in the Midwest and Mid-Atlantic. Exelon operates what it says is the largest and most efficient nuclear fleet in the United States and the third largest commercial nuclear fleet in the world.
Access a release from Exelon (click here). Access the full text of Rowe's speech (click here). Access the Exelon website for more information (click here). Access ACEEE's website on the 5th annual conference on energy efficiency (click here). Access an E&ETV interview with PG&E's Peter Darbee (click here). Access various media reports from NYT, WSJ, WP and others (click here).
Sep 15: As it now seems that the Senate leadership is leaning toward a possible delay in attempting to pass climate change legislation this year; a release from National Wildlife Federation (NWF) says a collection of more than 600 conservation, outdoor, sportsmen, recreation and faith groups representing tens of millions of individuals all across the country are calling on the Senate to pass comprehensive climate and energy legislation that not only reduces greenhouse gas emissions, but also dedicates a significant portion of funding towards helping wildlife and natural resources that are currently threatened by global warming.
Derek Brockbank, National Wildlife Federation conservation funding campaign manager said, "Time is running out for many of America’s most treasured wildlife and landscapes. New and dedicated resources are needed to safeguard wildlife and natural resources from climate change impacts today so future generations of Americans can enjoy a thriving natural heritage tomorrow." According to the release, all the groups agree that in order to realistically tackle the existing and forecasted impacts facing our treasured wild places and animals, the Senate will need to dedicate approximately five percent of the total allowances from a climate bill towards safeguarding our natural resources from the negative impacts of climate change.
Yet as the groups mount their campaign to urge Senate passage in advance of the UN COP15 climate change meeting in Copenhagen, media reports indicate that Senate Majority Leader Harry Reid warned yesterday that climate legislation might have to wait until next year because of the intensive effort necessary on health care and financial system reform legislation. The New York Times reported that although a Reid spokesman, insisted that "no decisions have been made" on floor timing for a comprehensive climate and energy bill and "We still intend to deal with health care, [Wall Street regulatory] reform and cap and trade this year;" a few hours earlier, "Reid had suggested that the global warming legislation could be tossed to the sidelines because of a packed legislative agenda that includes equally bruising battles over health care and Wall Street reform."
In a letter to Senators signed by the groups, they indicate, "As the Senate develops comprehensive climate and energy legislation, your leadership is needed to get the whole job done this year. Please ensure climate legislation both reduces the greenhouse gas emissions triggering climate change and safeguards natural resources, wildlife and our own communities threatened by the changes already set in motion."
Noah Matson, vice president for climate change with Defenders of Wildlife said, “This funding would provide crucial support for job-creating conservation initiatives to protect the natural resources which are the backbone of public health and the American economy. Without funding for efforts such as these, much of the natural resources all Americans depend on for water, food, medicine, flood protection and recreation will be seriously compromised in the near future.” The groups reminded that outdoor recreation accounts for eight percent of all consumer spending, which drives an overall annual contribution of $730 billion to the economy and supports 6.5 million jobs.
Specifically, the groups have urged the Senate to develop climate legislation that will establish a national policy framework to begin addressing the impacts of climate change on our natural resources; provide increased scientific capacity, coordination and information sharing; and dedicate five percent of the total allowance value to federal, state and tribal agencies.
In the meantime a key Administration official has suggested that the what has been termed the "critical" Copenhagen meeting may not be the end-all opportunity and that “We can come back in two to four years’ time.” Bloomberg.com is reporting that U.S. Energy Secretary Steven Chu who is in Vienna, Austria addressing the 53rd International Atomic Energy Agency General Conference, told reporters on September 15, that it is more important that nations make actual commitments to fight global warming. Bloomberg reported that Chu said, “Let’s not make that one particular time the be-all, end- all and say if it doesn’t happen that we’re doomed. We can come back in two to four years’ time. . . "
Access a release from NWF and link to a copy of a campaign ad (click here). Access the letter and list of groups (click here). Access a NYT article on the timing of the climate legislation (click here). Access the Bloomberg's article (click here).
Sep 15: U.S. Department of Transportation (DOT) Secretary Ray LaHood and U.S. EPA Administrator Lisa Jackson jointly proposed a rule establishing an "historic national program" that would improve vehicle fuel economy and reduce greenhouse gases. They said their proposal builds upon core principles President Obama announced with automakers, the United Auto Workers, leaders in the environmental community, governors and state officials in May [See WIMS 5/19/09], and would provide coordinated national vehicle fuel efficiency and emissions standards. The proposed program would also conserve billions of barrels of oil, save consumers money at the pump, increase fuel economy, and reduce millions of tons of greenhouse gas emissions.
Specifically, the Agencies said the program would: Increase fuel economy by approximately five percent every year; Reduce greenhouse gas emissions by nearly 950 million metric tons; Save the average car buyer more than $3,000 in fuel costs; and Conserve 1.8 billion barrels of oil.
EPA and the National Highway Traffic Safety Administration (NHTSA) have worked closely to develop the coordinated joint proposal and have met with many stakeholders including automakers to insure the standards proposed today are both aggressive and achievable given the current financial state of the auto industry. NHTSA and EPA expect automobile manufacturers would meet these proposed standards by improving engine efficiency, transmissions and tires, as well as increasing the use of start-stop technology and improvements in air conditioning systems. EPA and NHTSA also anticipate that these standards would promote the more widespread use of advanced fuel-saving technologies like hybrid vehicles and clean diesel engines.
NHTSA and EPA are providing a 60-day comment period that begins with publication of the proposal in the Federal Register. NHTSA has prepared a Draft Environmental Impact Statement (EIS) for the proposed CAFE standards. The Draft EIS compares the environmental impacts of the Agency’s proposal and reasonable alternatives. NHTSA is providing a 45-day comment period on the Draft EIS.
Environmental Defense Fund (EDF) issued a release saying passenger vehicles account for about 40 percent of all U.S. oil consumption and nearly 20 percent of all U.S. carbon dioxide emissions. EDF President Fred Krupp said, "This is a critical step to reduce our dependence on foreign oil and curb pollution that threatens our health. It will deliver immediate benefits for the country as Congress crafts comprehensive climate legislation." EDF indicated in their release that under the proposed new standards from EPA and NHTSA, vehicles would meet an estimated combined average emissions level of 250 grams of carbon dioxide (CO2) per mile in model year 2016, comparable to 35.5 miles per gallon. The proposed new standards would apply to model year 2012 to 2016 vehicles.
Access a release from DOT and EPA (click here). Access EPA's website on the proposal (click here). Access the NHTSA website on the proposal (click here). Access a release from EDF (click here).
Sep 9: Arkansas’s senior U.S. Democratic Senator, Blanche Lincoln, has been tapped as the next Chairman of the Senate Committee on Agriculture, Nutrition, and Forestry. In the committee’s 184-year history, Lincoln will be the first Arkansan and first female ever to serve as Chairman. She replaces Senator Tom Harkin (D-IA) who will fill the Chairmanship of the Senate Health, Education, Labor and Pensions Committee, as a result of the death of Senator Edward Kennedy (D-MA).
The appointment raises new questions about the Senate passage of a climate and energy bill. Senator Lincoln has already expressed her strong opposition to the House-passed cap-and-trade legislation (HR 2454, ACES, Waxman-Markey) saying it is "deeply flawed." She said any prospective Senate bill must not place a disproportionate share of the economic burden on families and businesses in rural America. The Senate Agriculture Committee is one of six major committees with jurisdiction over climate legislation. Others include: Commerce, Science, and Transportation; Energy and Natural Resources; Environment and Public Works (primary responsibility); Finance; and Foreign Relations.
Agriculture issue and concerns in climate legislation are highly contentious as demonstrated by concerns raised by House Agriculture Committee Chairman Collin Peterson (D-MN) during the debate over passage of the Waxman Markey bill [See WIMS 5/7/09]. Chairman Peterson vowed not to support the bill until several changes were made. Similarly, as WIMS reported yesterday, the National Wheat Growers Association (NWGA), joined many other agriculture organizations, and approved a new resolution indicating its opposition "to greenhouse gas legislation or regulation that has a negative impact on production agriculture," and saying, "We believe neither greenhouse gas regulation nor legislation should take effect until the major carbon emitting countries of the world have agreed to regulate their own greenhouse gases in a like manner to ours." [See WIMS 9/9/09].
In an August 4, 2009, Senate Finance Committee hearing on climate change, Senator Lincoln said, “In the current economic environment, the average Arkansas family sits down at their kitchen table, where they talk through their worries about retirement plans losing money, college savings accounts losing value, and their neighbors being laid off. Quite simply, they are scared. In addition, our businesses are making tough choices about whether to cut benefits, hours, or workers, or close their doors altogether.
“The majority of Arkansans believe efforts need to be made to reverse the detrimental effects of climate change. However, they are apprehensive, and rightly so, about what a massive policy change such as a cap-and-trade plan would mean for them at a time of tremendous economic uncertainty. The legislation recently passed by the House of Representatives has done nothing to ease these Arkansans’ apprehensions. The House’s Waxman-Markey bill picks winners and losers and places a disproportionate share of the economic burden on families and businesses in rural America. It is a deeply flawed bill. I will not support similar legislation in the Senate.
“Here in the Senate, and in this committee [then speaking of the Senate Finance Committee], we must craft a proposal that works for all of America. Last year, I joined several of my colleagues in laying out a set of principles that must be addressed before I would consider supporting any climate change legislation. I stand by those principles today and look forward to working to craft responsible legislation to curb carbon emissions. There are many options to deal with the issue of climate change and all should be up for discussion in order to meet our environmental and economic goals. I am very proud of the work already completed in the Senate Energy and Natural Resources Committee, where we passed bipartisan legislation that will implement a national renewable electricity standard, increase our investments in energy research and technology, and put in place a plan to combat our energy challenges of the future.
Access Senator Lincoln's statement on the appointment (click here). Access an 8/4/09 release on the Senator's opposition to ACES (click here). Access the Senator's supporting comments on her appointment (click here).
Sep 8: As Congress returns and prepares to take on climate change legislation, Senator James Inhofe (R-OK) Ranking Member of the Environment and Public Works Committee and staunch opponent of such legislation, applauded the board of the National Wheat Growers Association (NWGA), which, on September 4, by a vote of 26 to 2, approved a new resolution on climate legislation and regulation. The new resolution puts the group on record as "opposed to greenhouse gas legislation or regulation that has a negative impact on production agriculture."
According to a release from Senator Inhofe, the new resolution marks a "stunning shift from the group's recent endorsement of the Waxman-Markey" (ACES) legislation passed by the House of Representatives in June [See WIMS 6/29/09]. The Wheat Growers Association resolution states, "NWGA is opposed to greenhouse gas legislation or regulation that has a negative impact on production agriculture. NWGA will strive for a net economic benefit to farmers, agriculture and food production. We believe neither greenhouse gas regulation nor legislation should take effect until the major carbon emitting countries of the world have agreed to regulate their own greenhouse gases in a like manner to ours. NWGA urges USDA to do a detailed economic analysis of any legislation or regulation before it becomes law. Furthermore, NWGA will oppose EPA regulation and will work to overturn the Supreme Court ruling.” The board also voted 24 to 0 to "remove existing resolutions relating to greenhouse gas regulation and an agriculture cap-and-trade program."
Senator Inhofe said, "I'm pleased that the organization representing the interests of wheat growers nationwide has reached the right conclusion: cap-and-trade legislation and potential EPA greenhouse gas regulation pose serious harm to farmers and rural America. In times of great hardship in rural communities across America, both of these approaches to addressing climate change will only bring further job cuts and economic decline. This new resolution marks an important step in the effort to defeat a cap-and-trade energy tax and EPA's misguided regulations."
In a related matter, at a press conference, Janos Pasztor, Director of UN Secretary-General Ban Ki-moon’s Climate Change Support Team said the high-level United Nations climate change summit on September 22 in New York [See WIMS 6/24/09] seeks to allow leaders to hold candid discussions on how to resolve obstacles in talks with fewer than 90 days left before the start of December’s conference in Copenhagen, Denmark. He said the New York summit “is intended to provide political momentum at the highest level to accelerate progress toward a deal in Copenhagen.” He said only 15 official days of negotiations remain before conference in the Danish capital, where countries are expected to wrap up negotiations on a new agreement on reducing greenhouse gas emissions.
The day-long event will comprise round-table discussions chaired by heads of State and government on “how we can move toward a lower emissions, climate resilient global economy.” A release from the UN indicates that the Secretary-General has just returned from a visit to the Arctic ice rim where he saw the devastation wrought by climate change first hand, voicing hope that all leaders could see the effects of global warming for themselves [See WIMS 9/2/09]. Pasztor said his trip “reminds us that addressing climate change is not optional or something that could be postponed indefinitely. A failure to take action will have serious consequences, not just for polar bears in the Arctic, but for people on every continent and every country.” A 9-page background paper to help frame discussions at the Summit, focusing on the core political issues that need to be resolved to catalyze strengthened cooperative action on climate change is available.
Access a release from Senator Inhofe (click here). Access a release from NWGA (click here). Access a statement from Senator Reid (click here). Access a release from the UN (click here). Access further details on the press conference (click here). Access the Background paper (click here). Access the Summit website for additional information (click here). | 2019-04-21T13:26:42Z | http://enewsusa.blogspot.com/2009/09/ |
Home Research & Publications Policy Briefs Is Kazakhstan’s rising star fading?
Kazakhstan’s economic prosperity and active foreign policy have given it increasing regional power status. Kazakhstan has stood out internationally as a mediator in conflicts, chair of international fora and partner to key international actors, but its ‘golden decade’ of economic growth has ended. The country faced a serious economic crisis in 2014 and registered only slightly over 1 percent GDP growth in 2015 and 2016. Even though growth improved to approximately 3.5 percent in 2017, due to higher oil prices and production, figures are likely to remain lower than pre-2014. In January 2017, at the initiative of ageing President Nursultan Nazarbayev, parliament approved constitutional reforms to strengthen its role, including the transfer of some presidential functions, in an effort to decentralise power. While reforms have yet to be implemented, such economic and political developments seem to point towards a change in governance (the country is preparing for presidential succession) and the creation of a new ‘social contract’ between the regime and society.
Kazakhstan has largely weathered the recent economic storm, but needs to adjust to more modest economic growth, making economic diversification imperative.
Both Kazakhstan’s leadership and broader society are on the move towards governance reform and the creation of a new social contract.
The EU is a crucial economic partner for Kazakhstan and has finalised a novelty partnership agreement with Astana. All this increases the chances of promoting economic and political reform.
Kazakhstan is the European Union’s (EU) main partner in Central Asia. Similarly, the EU plays a critical role in Kazakhstan’s foreign policy calculations, as the country seeks to avoid Russian-Chinese dominance over the region, and interference in the country’s economy and foreign investment strategy. In 2015, Astana and Brussels signed an Enhanced Partnership and Cooperation Agreement (EPCA), which was ratified by the European Parliament in December 2017 and is now pending ratification by several member states before fully entering into force.(1) This novelty agreement is a more sophisticated version of the standard partnership and cooperation agreements that the EU has with many countries worldwide.(2) As such, the EU has recognised Kazakhstan as a ‘special’ partner in Central Asia, while also opening the door to providing more assistance to help boost the country’s economic, social, and governance development.
What will be the impact of Kazakhstan’s economic slowdown on the country’s political and social fabric? Is there a window of opportunity for democratic transformation? This Policy Brief addresses the main issues faced by the Kazakh authorities – the need to diversify the economy, potential governance changes, and the design of a new social contract – and how this could influence the country’s relationship with the EU.
The Eurasian Economic Union (EEU), whose treaty Astana ratified in 2014 in the middle of the Ukrainian crisis, worsened the situation. Directly impacted by Russia’s own economic difficulties, and indirectly by Western sanctions toward Moscow, Kazakhstan seemed more ‘caught’ in Russia’s orbit than it would have liked to be. The region’s economic crisis, largely caused by a decline in oil prices, reduced the potential benefits of EEU cooperation, particularly in light of high external tariffs and lack of progress in abolishing internal nontariff barriers. The latter, combined with institutional conflicts, and Kazakhstan’s WorldTrade Organisation (WTO) membership, have contributed to the emergence of trade wars among EEU members, especially Russia and Kazakhstan, and attempts by Kazakhstan and Belarus to weaken the level of integration.(5) When Kazakhstan joined the EEU, Nazarbayev made it clear that ‘If the rules which were previously established in the treaty are not fulflled, then Kazakhstan has the complete right to end its membership in the Eurasian Economic Union. Astana will never be in an organisation which represents a threat to the independence of Kazakhstan.’(6) Yet, it is difcult to imagine that Kazakhstan would be able to fully withdraw from the EEU without facing Russia’s retaliation. Astana is too intimately associated with Moscow, not only economically but also in terms of security and military cooperation.
This is putting great pressure on the government to diversify the economy, a task compounded by the more modest financial context. Kazakhstan has to move away from the easy solutions of the 2000s when money was spent carelessly on mega window dressing projects; it needs to develop sustainable strategies, with more room for non-oil exports (for instance, agricultural products), and give preference to the private over the public sector.
This also implies better justifying public spending. Public opinion has grown increasingly critical over authorities’ overspending on branding. Social media regularly echoes the population’s dissatisfaction with corruption scandals associated with the construction sector, concerns about the costs of the Expo 2017 in Astana (whose success was seen as modest)(8), and even relief when the country lost the bid for the 2022 Winter Olympics.
Kazakhstan’s need to diversify its economic portfolio and move from an extractive to a generative economy could also offer opportunities for the EU. The EU has been Kazakhstan’s main trading partner for several years, accounting for almost 40 percent of the country’s total trade in 2016. The EU is by far Kazakhstan’s largest export market (more than half of its exports go to the EU) and the country features as the EU’s 34th trading partner.(9) The EU also accounts for almost half of all foreign direct investment (FDI) towards the country. (10) Another key factor in EU-Kazakhstan trade relations are Kazakh imports of technology and innovative products from Europe. Through economic cooperation and investments, Europe can be a frontrunner in helping Kazakhstan diversify its economy beyond oil production.
Kazakhstan’s more modest economic outlook may influence the forthcoming presidential succession. It seems that the economic slowdown – as well as the death of Uzbek president Islam Karimov in September 2016 – has opened the door, at least on paper, for some reforms, including preparing the country for a less presidentially organised regime and a strengthened parliament. New amendments to the Constitution should, at least in theory, strengthen parliament’s supervisory powers over government, allow for the transfer of some presidential powers to government and parliament, and modernise the judicial system.(11) However, these amendments have not yet been put into practice. Earlier announced political reforms have also had little impact in terms of promoting good governance, strengthening the rule of law or creating a more diverse political landscape. While the presidential office, AkOrda, is preparing public opinion and the bureaucratic, political and business elites to the unavoidable moment when the country’s ‘frst president’ leaves the scene, it also wants to maintain the status quo for as long as possible by keeping potential successors or competitors at bay, thus ensuring that the president is not challenged prematurely.
There are two main reasons behind Nazarbayev’s decision to introduce constitutional reforms. First, it gives him the option to step down with his ‘leader of the nation’ status – validated by parliament in 2010 – intact, which would allow him to devote his last years to cultivating his international image. This would make it almost impossible for a new leader to compete with him in terms of legitimacy. Second, by introducing these reforms, Nazarbayev has indicated his desired path for his country should he die whilst still in power. As such, he would always be remembered as the leader who led the country towards a more democratic system. In both scenarios, the new leadership will be more collegial and less personalised, with power shared among several technocrats and institutions. Moreover, the new leadership will probably have to impose austerity measures, consolidating the image of Nazarbayev’s time as the ‘golden age’ of independent Kazakhstan.
Both in Turkmenistan in 2006-7 and in Uzbekistan in September 2016, the transition was smooth, without the ‘leader of the nation’ publicly designating an heir. All ‘negotiations’ were done behind closed doors. The Kazakh elites are likely to be more competitive than those of their neighbours, mostly because their assets lay on more diverse sectors – not only oil and gas but also minerals, construction, banking and investments, communication and transportation.(12) However, they will still want to maintain elite coherence.
The future of the presidential family is likely to be a critical issue. Nazarbayev’s eldest daughter, Dariga, is former Deputy Prime Minister and currently an important figure in the Senate; and Nazarbayev’s grandson (Dariga’s son), Nurali, as well as one of his sons in law, Timur Kulibayev (married to the president’s youngest daughter), are political ‘heavyweights’. While both Dariga and her son have political ambitions, Kulibayev is a key actor in the country’s energy sector. Their legitimacy as powerful political and economic stakeholders could be challenged by competing forces coming from technocratic circles or oligarchic/business groups. Some actors may want an asset re-distribution, but they all hope to avoid the risks of potential intra-elite fighting, which would weaken the country’s image before foreign investors and could indirectly spur both street protests and/or interference from Russia or China.
Europe will largely be a bystander in the succession process. It seems unlikely that European investments in the country would be challenged during the potential intra-elite fighting, as all Kazakh actors need FDI and want to portray the country as a reliable economic partner. In the political and societal realm, the EU’s room for manoeuvre to influence intra-elite games is non-existent. Yet, it could prepare itself for the succession with a hands-on strategy aimed at developing institutional partnerships and building a more constructive relationship with the Kazakh bureaucratic elite, who will continue to manage the state regardless of whom becomes president. Meanwhile, the EU should make maximum use of its positive ties with Kazakhstan, the constitutional reforms and the agreed EPCA language on governance, rule of law, human rights and civil society inclusion. The European Parliament has stressed that implementation of the EPCA should be subjected to an ‘effective monitoring mechanism based on clear benchmarks and deadlines’(13), not only in the economic sphere but also in terms of democratic development and human rights. Brussels should closely monitor and support (via capacity-building projects) Astana’s implementation of its national reform plans with specific reference to the provisions laid down in the EPCA.
A new social contract for a post-Nazarbayev era?
It is expected that once Nazarbayev leaves the stage, a more plural political landscape emerges. The younger generations increasingly voice their opinions (in particular through social media) regarding the direction they wish their country to take. This political diversity would need to be cemented in a more plural parliament.
By NASA under Creative Commons license.
For sure, the next leadership will have to consider such a mindset, and might have to distance itself from the Nazarbayev era narrative of a shared Eurasian destiny with Russia and a Kazakh society looking both East and West. Unsurprisingly, the main public debate in 2017 versed around the change of alphabet from Cyrillic to Latin announced by Nazarbayev as the main symbolic gesture of the country’s distancing from Russia. This change will be introduced gradually and probably create a cascade of new issues and difficulties in the educational realm, as well as in the information landscape.
Therefore, the new social contract will have to include elements such as a more plural political life – though probably still largely managed from the top –, growing references to ethno-nationalism and the so-called ‘Kazakh values’, as well as a continuous debate about the place of Islam in the public space. The emphasis will have to be placed on citizens’ well-being and quality of life, i.e. taking care of regional disparities, improving the living standards of the rural population, and offering a less corrupt environment for the middle classes, as well as develop a more accountable and transparent administration.
In this new cultural context, the EU will continue to be seen by some part of the public opinion as a model in terms of democratic values, respect for citizens’ rights and the welfare state, but often based on the understanding that these elements will need to be home-grown and display a specific ‘Kazakhness’. However, references to a conservative Europe – mostly new Central European member states – and illiberal populist parties are also on the rise among young Kazakh nationalist-minded groups, who see these as a way to accommodate both European modernity and freedom of speech with the preservation of some so-called Kazakh traditional values. The EU should, therefore, continue to brand democratic values and its respect for diversified political agendas as one of its main assets towards Kazakhstan. While the EU should speak with one voice, it should also make it clear that it represents a diversity of political systems, each with its traditional and historical peculiarities, but all based on the same democratic principles of transparency, accountability, division of powers, free elections and respect for human rights.
The geopolitical environment has changed dramatically over the past few years, with the rise of anti-liberal agendas in many parts of the world. Central Asia is surrounded by antiWestern sentiment stemming from many countries, at different levels, mainly Russia and China, and post-coup Turkey. The United States’ prestige has largely diminished and the new US administration, with its isolationist narrative, contributes to Central Asia’s view of Washington as an unreliable partner, even if President Donald Trump’s personality is well regarded among some Kazakhs. The EU’s attraction has also been tarnished by the debt crisis, the refugee crisis, the forthcoming Brexit and Catalonia’s secessionism aspirations. But the EU’s activity and engagement with Kazakhstan could be just as stable as those of Russia and China (though more modest in scope) and more influential than those of a host of other players. Furthermore, the EU’s economic clout makes it a key actor in Kazakhstan’s future.
Kazakhstan is potentially interested in a European model characterised by high living standards: the Kazakh middle-classes and elites are genuinely attracted to European culture and education. Meanwhile, the EU is by now one of the few actors that seek to actively defend values and promote democratic development in Central Asia. This is an important asset that the EU should exploit carefully as Kazakhstan’s internal confguration changes as a result of economic downturn and as the country searches for new sustainable growth models. The EU could help Kazakhstan on several fronts: pushing for more transparent practices in the economic sector and in the politics-business relationship; helping to put constitutional reforms into practice; supporting capacity-building for good governance programming, and urging the country to create a more plural political landscape that reflects society’s genuine ideological differentiation. Concomitantly, the EU should continue its defence of human rights in Kazakhstan through dialogue (ideally now linked to agendas that include benchmarks) and promote civil society inclusion through increased project support. This is easier said than done, but the EU should understand its uniqueness as a partner for Kazakhstan and grasp the possibilities that exist for gradual economic and political change.
In December 2017, the EU also launched EPCA negotiations with Kyrgyzstan.
Molodezh Kazakhstana 2014 (Astana: Council for Youth Policy under the President of the Republic of Kazakhstan, 2014).
Institute of Eurasian Integration, Sovremennoe sostoianie i tendentsii vsekazakhstanskoi kultury, October 2014. See also, Ideologicheskie ustanovski i osobennosti identifikatsii naseleniia RK (Almaty: Strategiia, 2009). | 2019-04-21T00:43:54Z | https://eucentralasia.eu/2018/02/is-kazakhstans-rising-star-fading/ |
BITE is a Contractor Career Management Consultancy and Contractors and Interims in the IT, Accountancy and Finance and general Interim market founded in April 1998 and based in London. We employ top professional consultants as PAYE permanent employees to work on project work. Act as a marketing agent for professional Limited Company contractors using our consultancy industry expertise to maximise their rates similar to an Actor or footballers agent. We provide a traditional PAYE supply (Umbrella) service for more casual temporary contractors. These services are provided in the UK for people with the right skills and experience and the legal right to work in the UK. This includes those who have recently arrived in the UK or who are new to IT Contracting or temporary / Interim work (usually from Australia, Canada, the EU, New Zealand & South Africa) and those who are resident in the UK and wish to Career Transition into contracting. We help you develop your contracting career to the next level through our Career Development services. Agencies benefit from having Quality 5 star contractors pre-interviewed, referenced, tested and trained for contracting who are PAYE Consultants or alternatively Directors of their own Limited Company.- Making BITE Contractors an attractive choice!
If you have had an experience with BITE Contractors Limited and you wish to leave them feedback, please complete the form below. You may optionally remain anonymous if you wish.
As managing Director of the company we have completed the vamp of our Contract search training program to include e- learning and speed up the process so that job seekers can find success in 2 weeks.
It was best company I've worked so far. Every one was so supportive and helpful at work.
Glad you have had a successful contract renewal with BITE Consulting the IT Contract people -well done!
My meeting with Katie Barnard was very informative and helpful as she gave me a better understanding of Bite Consulting as well as areas of focus in regards to my previous experience and CV strengths. I'm happy to of not missed our meeting today.
Good recommendation and service. Thanks.
This person left a star rating but no comments.
Thanks for the feedback to BITE Consulting if you'd like to talk to anyone in London regarding your experience please give us a ring.
I felt that Bite provided the opportunity that I needed to move into the contract market; however I was concerned that the training times/dates were not flexible. It would require me to leave a permanent job position without a post, in order to go through the training process anticipating a contract plac ement at the end. I feel these training days should be digital where possible and consultation can be online skype or similar platform.
Very professional and informative meeting.
In a nutshell anybody wants to get into contracting but has no clue should take the road to Bite.
The whole team are delighted that you have found success through both hard work and understanding what things you need to do really well!
Katie Burnard has been very insightful and it was a pleasure meeting with her.
I'm glad it helps to decide if the IT contract or interim market is right for you and how to be successful.
Very friendly and informative service. Look forward to my first UK contract.
Working in the IT Consultancy or contract market does require firstly knowing the best way to access assignments through the hidden job market and secondly the time and commitment to take the actions necessary to be successful. Our team is there to help.
Seems an ideal service for me at this point in my career. Takes the risk and trouble out of rejoining the contract market.
I have tried to contact you guys twice through your website but haven't received any reply to any of my query. I thought I'll be getting assistance for my first job search here in UK but to my utmost disappointment ,none of your team member have reached back on my query.
I have been working with the team at BITE for over 10 years, since arriving in London, and value their advice and support across the job hunting spectrum, from CV preparation, dealing with recruitment agencies to interview skills. I can thoroughly recommend their services.
I really like it the experience. It seems you are pretty established in the Industry already.
It was interesting speaking with the employee. I got a very good understanding of the money and how they work. I can see he was passionate and with the work required you can break into contracting.
Yes we try to minimise the risk of moving into IT Contracting, thank you.
Thank you for your comments on BITE Consulting and our coaching staff who try to help contractors and consultants gain a contract role quickly at the best rate.
Informative, valuable and an interesting approach to getting candidates positioned.
My experience is very positive after meeting Kate, and I like her advice which aligns with my view.
After my very first attempt at Bite Consulting Ltd, to meet Keith he made me understand that I was just not targeting the right market place in regard to my professional experience. Indeed, also considering that English is not my first language, I was ready to look for any positions which would allow me to get into the work market. Thanks to Keith advice I knew that I was all wrong. For me to adjust my thoughts and therefore my job hunting strategy; hanging very tightly to his words as well as to Jennifer and Cathy ones. I have to say that when I arrived at Bite Consulting Ltd it was also much about building my confidence which was quite down. Within a fabulous ambiance and thanks to fantastic workshops, support and guidance, on a daily basis, I learnt how to make my job researches effective and successful. For instance regular updates and notes on spreadsheet, guidance on how to deal with agents via phone and face to face, how to build and maintain a professional network, preparation and advice to get job interview and be successful and puff, I get my very first contract within my field and at the market rate! I have just finished my first week and it is only now that I really realise that it is happening to me. I do not know yet how to really express my gratitude; for now, yes, I can say 1000 MERCIS A KEITH AINSI QU'A TOUTE L'EQUIPE DE BITE CONSULTING LTD!!! Keith is one of those genuine and dedicated people with the perfect word at the right time. The all team vocation/art is to manage to get the quintessence of each individual/contractor, display it to each of us, provide necessary advice and hugs to help us as better as possible through the way that lead to the work. Keith, Bite Consulting Ltd trusted me; I can not thank him enough for all what he have brought to me. Indeed if it is an exceptional team, I have also met fabulous people/professional from all over the world. Oui, All that is Priceless! And for all that I can definitively not thank you enough Keith.
Thanks for taking the time and trouble to write something from a first hand experience and I hope our help enables you to enjoy a first class IT Contracting or in interim career in London or anywhere in the future!- Keith Boatman M.D.
When I first arrived in the UK I thought I would use my connections to secure a position in the UK. This f ailed quickly and I needed a different approach. I tried, hard, to get a job on my own but did not get much interest from my CV that was registered on the job boards at that time. After a few months of making no progress at all I came upon Bite. After rewriting my CV using their templates and using their techniques for chasing after opportunities I started generating interest with the recruitment agencies. Within 2 weeks I had an interview, got a job offer while I was in the interview and started working on the Monday. Eight months later I did it all again and had a job within a week. I would recommend anybody arriving form overseas in the UK to make use of Bite's services. They offer the whole package and deliver on their promises.
Thank you for your testimonial, at BITE Consulting we aim to give people the knowledge and help and support to obtain the right job at the right rate quickly in the IT Contract and Interim market in London UK.- Keith Boatman M.D.
I have been in the UK now for almost 4 years and during this time I have been working through Bite Consulting. I am originally an Australian who moved to London to work and travel. I definitely recommend Bite Consulting to any new person wishing to work in IT and live in the UK.
Thank you for recommending us we aim to help anyou in the UK IT Contract or Interim market gain the right job at the right rate quickly via our London office.- Keith Boatman M.D.
Having just arrived I was optimistic about finding an IT job quickly until the reality of the differing job market hit me. Bite Consulting helped me understand the market, learn the tricks and the secret language of the agents and how not to get stung by them, as well as showing me how to construct and optimise my CV. After gaining this wisdom and being around people who were in the same boat, I became more confident and like a steam train gaining momentum, nothing could stop me from getting a job that I was really happy with.
Great to hear thank you, I'm glad your happy and we aim that people gain the right IT Contract job in the London contract or Interim market quickly using BITE Consulting's services- Keith Boatman M.D.
When I first came to London I was recommended to Bite by a friend that was with them. He said that finding a job in the UK was not the same as back home in NZ and Bite were a huge help. He was exactly right, from the beginning Bite impressed, with excellent facilities and personal service. When I first joined I was consulted about what sort of work I wanted to do, my CV was reviewed and my interview techniques improved. Bite was always happy to provide references for such things as my HSMP visa application and leases on new apartments etc. Wages were always paid within 10 days after my time sheet was submitted for the month. Also, little things like new contracts sent out accompanied with addressed and stamped envelopes and regular newsletters with useful info made the contracting experience that much easier. In the two years I have been in the UK it is the only company that seems to work efficiently and actually care about you and your career. I have already recommended my friends to Bite and would not hesitate in recommending them to anyone.
Thanks for your comments I'm glad we were of help and aim to help anyone you recommend to work as an IT Contractor in the IT Contracting market in London.- Keith Boatman M.D.
It is always difficult leaving your comfort zone back home, not knowing what to expect when arriving in the UK. As most people often have friends over here they invariably spend the first few weeks with people they know. Finding a job is therefor the main concern for the majority of people. By using Bite's services, finding a job needn't be a worry and once you have landed a contract, Bite takes care of all the paperwork, and most importantly you always get paid on time. Everybody else at Bite's offices will be in the same boat as you, so looking for work can be fun. I have been using Bite since I arrived here and I am still with them.
Using BITE Consulting's offices can be very helpful to work with potential or returning IT Contractors job searching in the London IT Contract or Interim market. Thank you for your comment!- Keith Boatman M.D.
One of the best if not the best career coaching company. The charge that they take to have all that superb education is nothing compared to the in depth training you gain and the benefits in the long run. In today's competitive market it is not only about getting a contract, but about a successful career in general. I wish I had met with the Bite team many years ago.
Thanks for your comments we aim to help people contract effectively in the London and UK IT Contract and Interim market place.- Keith Boatman M.D.
After 3 years back home in Cape Town I arrived in London for a second and more permanent stint in the capital, this time committed to make contracting my career and determined not be tempted into ultimately dissatisfying permanent jobs. I believe there is a certain personality type that is attracted to contracting and the autonomy and independence that it ultimately provides. If that sounds like you I think Bite can help you. The assistance they gave me in terms of getting my CV contract fit is something I would not have been able to figure out on my own. But more than that , my association with Bite has given me a deep understanding now of the ins and outs of limited companies, IR35, the importance of a good accountant and the various options available to me as I mature as a contractor.
Thanks for your comments, I do hope our help enables you to thrive as an IT Contractor in London or as an Interim manager anywhere in the world.
I arrived from New Zealand over 3 years ago and found Bite on the web after looking at a number of options. Right form the outset I have found all the staff friendly and supportive, with a real interest in ensuring that I am getting the best possible roles and assistance. My CV was radically overhauled and my interview technique improved from the various training modules. The fact that in 3 years I have always been paid on time with, both through the PAYE and Umbrella company offerings has ensured that they are trustworthy. I was especially impressed with the fact that Bite staff took out their own personal time to assist me with visa applications after working hours in 2006 and re enforced my view that they are here to have a sustainable relationship with all the contractors and not just make a quick quid. I would not hesitate to recommend Bite Consulting, both to those new to the UK and those who have been here and in the business for some time.
Thank you for your comments at BITE Consulting we hope to enable people to enjoy an exciting IT Contract career in London and the South East.- Keith Boatman M.D.
Having tested the contract market for three months after taking voluntary redundancy I joined Bite Consulting in order to improve chances of employment. Although my CV was appropriate for targeting permanent positions, their advice and direction allowed me to create a CV and variants for the contract market. Although my game plan was contracting only, I was continually being approached by agents for temporary and permanent roles. One such permanent offer was too good to turn so I have taken up the opportunity. Bite Consulting provide sound advice and practical training either as a refresher of new to the market place.
Thank for you comments I'm glad you found the right job for you in London- Keith Boatman M.D. BITE Consulting Group Ltd.
At the end of the day I understand the job market back in Australia and to a certain extent thought it would be the same in the UK, turns out that it is very different. Bite helps with your CV, getting it set our correctly, tells you where to post your CV and to apply for jobs. They also take you through interview methods and in general get you as prepared as possible for the UK job market. In my case I had a job within 2 weeks of landing in the UK and all because of Bite. There is no up front payment which when you first land is a big bonus and the quicker you start earning UK ponds and stop living on Australia dollars the better your experience will be in the UK.
Practical comments thank you at BITE Consulting we aim to enable people to get the right job at the right rate quickly in the IT Contract market in London. Keith Boatman M.D.
I first came to know about Bite Consulting when I was in South Africa. I sent my CV to them and it was an eye opener on where I stood should I get into the UK job market. After coming into the UK I got in touch with Bite and was invited to visit their offices in London where I met Keith. Needless to say after signing up with them I began going through their training program which was very thorough. For every new contractor coming into the UK Bite is the place to launch your career. I got my first UK contract 2 months after joining up with Bite and the dedication of the staff to see that you succeed is truly amazing. The team are committed to your success. The umbrella benefits that come with Bite guarantee that you paid on time and I give the accounts team a thumbs up as they make sure the monies owed to you for work done come into your account on time. Should you need to change to work permit of HSMP then Bite has the expertise and the know how to guide you on that. Their offices are friendly and relaxed, enabling you to network with fellow contractors to know what is happening and tips on how to tap into the hidden job market. Give Bite a go.
Thanks for your review and comments at BITE Consulting we aim to give people the knowledge to find the right IT or Interim job quickly in the London South East region.
Bite has a host of excellent mentors. Whether you are somebody looking to switch form permanent to contractor jobs, or are a seasoned contractor and want to be more visible in the market, then choosing Bite is the best thing you can do to advance your career. 2009 was when I first started thinking about leaving permanent jobs and getting into contracting. I had put in tremendous amount of thought and did a lot of research around the market. I even went to the extent of registering my own limited company the same year. However due to lack of exposure on how the UK contracting market works I was bound to do permanent jobs until 2012 when someone suggested I consult Bite. 2 weeks after joining Bite I had 4 interviews lined up and in the third week had a contract offer to start immediately.
Glad to hear everything went so well! At BITE Consulting we aim for people to gain the right job at the right rate quickly in the London IT Contract and Interim market.-Keith Boatman M.D.
I moved across to the UK form NZ about 8 years ago. Bite consulting enabled me to come across by providing employment in their consulting business, and the required work permit to do so. I worked with Keith and the team until I was able to get my indefinite leave to remain. I found Bite to be straight up, very helpful, gave great insight into the UK market and very professional to deal with. They are also very nice people in general.
Thank you for your comments and I'm glad we were a help in establishing your IT Career in London as a contractor or Interim consultant- Keith Boatman M.D.
Great learning curve in developing about marketing yourself and having a deep hands on role about providing data of oneself to create your own CV.
I'm glad the CV work has been helpful in establishing an effective IT or Interim CV that works in the IT Contract Market together with the marketing an advertising knowledge to sell your skills effectively.- Keith Boatman M.D.
Before coming over from Oz Bite provided me with very clear expectation about the job market. I was confident of finding work and with BITE's help was able to find a job in my second week here in London. The first contract I got was for 6 months at an Investment Bank. The technical lead at the bank commented after I got the role that the thing that made me stand out from other applicants was the presentation of my CV. The work BITE did in getting my CV write for the job and the market was invaluable. When I relocated to London there were so many things to worry about like finding place to live and so on. Bite's help at the start with things like CV preparation, job searching, dealing with agents and understanding the market was and continues be a great help in selling yourself as quality candidate for contract work in the UK.
Well done and thank you for your comments, at BITE Consulting we aim to help people find an IT Contract or Interim job in London quickly- Keith Boatman M.D.
After trying on my own for a month or two to get a job, with no success, I stumbled on an advert for Bite Consulting. I rang them up and was so glad I did. I was met by friendly voices, eager to assist me and getting everything correct to prepare me for the UK job market. Everything form how to handle yourself in an interview, how to professionally do your CV and how to handle the agents on the other end of the phone trying to see through all the trappings they lay before you. Bite has been a lifeline for me, they understand me and the needs that I have trying to succeed in a country far from home. They strive only to ensure that you get the best advice, job and remuneration that you deserve. All I can say is that without them things might not have worked out as they I would have liked them to.
Thank you at BITE Consulting we aim to help IT Contractors and Interim's using BITE Consulting's services to find the right job at the best rate quickly in London.- Keith Boatman M.D.
I have been with Bite for over 4 years, they always pay on time and have a friendly, efficient and clued up accounts team. The career training and CV marketing has been really valuable and would be useful even to veteran contractors. Bite has also been helpful in dealing with Work Permit and HSMP Applications. Unlike many other companies, you get the feeling that Bite are in it for the long run rather than just trying to make a quick quid. The atmosphere at Bite is chilled out and they tend to attract friendly contractors. I would not hesitate to recommend Bite to any IT contractor looking to work in the UK and also those who have been in the UK for a while.
Thank you for your kind comments we aim to ensure people gain an exciting well paid career as an IT Contractor in London- Keith Boatman M.D. BITE Consulting Group Ltd.
Bite provided excellent training and mentoring for my contract search. They patiently and meticulously reviewed my CV for the UK contract market and engaged me in their job search training with job advert exercises and role plays. Do not be put off by the term role play, it is a necessary part of the training. I had an interview lined up by the end of the third week, followed by a job offer. It has been 5 weeks since I completed the Bite program and I receive an average of 2 calls per week from recruiters wanting to discuss roles with me because they found my CV on job sites. What can I say? Bite helped me produce a CV that is in demand.
Thank you for taking the time to write a comment we at BITE Consulting aim to give people the knowledge and help to enable an exciting IT Contract or Interim career in London and the South East.
I came to the UK 8 years ago and Mr Keith Boatman who is the Managing Director guided me to the right track in contract marketing. Without his help and guidance I would not have survived in the UK market. Bite Consulting know the UK market very well and they can definitely train you to find a contract job in the UK market.
I'm glad we have been of help to enable you to acquire the knowledge to be an effective IT Contractor or Interim consultant in London- Keith Boatman M.D. BITE Consulting Group Ltd.
I cannot believe it was a year yesterday since I landed back on Australia. A lot has happened in the last 12 months, with buying a house, getting married, getting a ACL knee reconstruction, and have helped with a new company going it alone without agencies to provide SAS services directly to the customer. I do owe some gratitude to BITE for the skills that I learnt that I have been able to utilize here in Australia. With the GFC it has been very difficult to get employment sometimes but the skills of selling your self to agents, and learning about the unadvertised job marketing, and networking have been even more helpful. Through my networking, I have met some ex SAS employees who have started their own company who I am sub-contracting having greater earning potential then going through agencies. A big thank you to Keith and yourself. While the last few weeks of refresher skills in the office didn't land me a job in the UK, it did help when I returned. Again thank you for everything that you did for me back in 2003 when I was fresh off the boat. If I didn't have BITE I probably would have run home with my tail between my legs. The support and coaching helped me have the time that I did in the UK which have provided many memories.
Thanks for your comments (gratefully received). I do hope that the skills we have helped you develop as a Job search candidate with an effective CV will help you manage your career either as an IT Contractor in London or elsewhere in the world, or as a permanent member of an enterprising team.- -Keith Boatman M.D. BITE Consulting Group Ltd.
Bite's a great group of people and if you are uncertain about moving to the UK they will support you, while pushing you to achieve your goals. They have extensive knowledge of the UK job market which is quite different from Australia and this is invaluable in helping you to get the contract and rate that you want.
Thanks for your comments (gratefully received). I do hope that the skills we have helped you develop as a Job search candidate with an effective Contract CV will help you manage your career either as an IT Contractor in London or elsewhere in the world, or as a permanent member of an enterprising team.- -Keith Boatman M.D. BITE Consulting Group Ltd.
I found Bite's expertise really helpful in looking for a job in Britain, they have obviously been doing this for some time and have a wealth of material that was incredibly useful. The offices were in Central London, which was great for taking some time off for sight seeing. Also I found that it was a very supportive environment, especially in regards to meeting other people looking for work, everyone had some advice to offer or were willing to discuss other, non work related, issues, for example, finding the best place to stay. I am really happy with the work Keith and the crew did for me, and look forward to working with them in the future.
A friend who had been working in the UK for a couple of years was registered with Bite and thoroughly recommended their services. One week later I made contact and Bite kindly offered to act as an advocate on my behalf to prove that I was indeed searching for work. I obtained my visa, we moved to the UK and I had a job within 3 weeks for meeting Keith, Jennifer, Trish and the rest of the team at Bite. I have working through Bite for almost two and a half years now and am very appreciative of their continued support and valued advice that they offer for those working in the UK IT market. They are a team of professionals who know the market very well, and they strive to help you ensure you market yourself effectively in your chosen field. I would not hesitate to recommend Bite to anyone considering moving to the UK.
Thank you I'm glad we could help you and anyone you recomment to work as an IT Contractor in London- Keith Boatman M.D. BITE Consulting Group Ltd.
I have had a association with Bite since July 2001, firstly with the Wellington New Zealand office which helped me with my first Ancestral Entry Application. The team in London then helped me with finding my feet in the UK contract market at a tough time. When I first joined I was consulted about what sort of work I wanted to do, my CV was reviewed and my interview techniques improved. I believe I was one of their longest term job seekers and I got to know Keith, Jennifer and Rhona fairly well. They have always been positive and encouraging and I owe them a great vote of thanks for their support and friendship. From the start Bite has provided a combination of excellent facilities and personal service, to go with their in depth knowledge of the UK recruitment market, and an understanding of expatriate job seekers. I have used both their PAYE product and limited company option with great satisfaction. I would recommend Bite to any Aussie, Kiwi of SAFFA coming to London.
I have been with Bite for some time now, they have an informal, relaxed atmosphere whilst also professional. The familiar faces of Jennifer and Keith in particular are good to work with.
I'm glad we are familiar being in a company for 18.5 years does that to you but at least I don't feel old! Seriously we are glad to help people who wish to become more successful as IT Contractors in London and thank you for the comments!
Excellent professional advice and mentors. Bite has the experience to guide first time contractors and those who are experienced in the contract market. Bite mentors are methodical, thorough and understanding in their approach. I would recommend this to both new to contract market and experienced ones. Five stars to Bite, this really is a recruiting firm with a difference.
Thanks the coaching team of Aneta and Dean will be chuffed with your comments. They are there to help people establish their career in London as an IT Contractor.
The services at Bite give you the edge on your competition by offering impeccable personalized CV marketing, access to the hidden job market, telephone and interviewing skills and techniques, one on one mentoring with a careers coach and general career advice. The atmosphere at Bite is welcoming, laid back, friendly and you are made to feel a part of the Bite family. I worked with Aneta who was extremely knowledgeable, professional, patient and friendly. I would one hundred percent recommend Bite to anyone looking to break into the UK contracting market.
I just have good things to say about Bite, the service they offer is of great value for anyone wanting to engage in a contract work. The mentors are all professionals, with lots of experience and also very nice people to be around. I will always recommend Bite to anyone looking for contract work.
Thanks for your comments (gratefully received). I do hope that the skills we have helped you develop as a Job search candidate with an effective Contract CV will help you manage your career either as an IT Contractor in London or elsewhere in the world, or as a permanent member of an enterprising team.- -Keith Boatman M.D. BITE Consulting Group Ltd. p.s. the fiddly admin stuff is important and can save contractors a lot of money!
Thank you I hope we helped your IT Contract career.
I would definitely recommend it to family, close friends and colleagues alike. This seems to be one of the "work secret" services for contract career development and success in London.
Jack was welcoming and professional. He ran through the course and how BITE works and answered my questions. I'm starting on the course on 9th May and looking forward to it.
Gina, thank you for your comments. Jack is expert at identifying whether people are likely to succeed in the London UK IT Contract market. The two weeks you spend at BITE Consulting should give you all the knowledge you need to be a successful contractor or Interim consultant!
I just have good things to say about BITE, the service they offer is of great value for anyone wanting to engage in a contract work. The mentors are all professionals, with a lot of experience and also very nice people to be around. I will always recommend BITE to anyone looking for contract work! | 2019-04-22T10:01:12Z | https://www.thediscdirectory.co.uk/se/mk/tickfordend/b2b/computer-consultancy/bite-contractors-limited-445396.html |
This Policy and Terms Services Agreement ("Agreement") governs the use of the Dream Dinners, Inc.'s, Service ("Service") at Dream Dinners Inc.'s ("Service Provider") website and facilities. You can access this Agreement at any time from the bottom of any page of the Service.
Please read this Agreement carefully. Since the Service is designed to provide our customers the primary means of communication with Dream Dinners, Inc., of information, opinions and comments, and an enjoyable and informative experience for all, it's users must abide by certain rules. Your use of the Service will constitute your agreement to comply with these rules.
- Your right to use the Service is personal to you: You may not authorize others to use the Service in a manner which conflicts with these Terms, and you are responsible for all of your own use of the Service.
Dream Dinners respects the intellectual property of others, and we require our users to do the same. Dream Dinners may, in appropriate circumstances and at its discretion, terminate the access of users, subscribers, and account holders who infringe the copyright rights of others.
If you believe that your work has been copied and is accessible on the DreamDinners.com service in a way that constitutes copyright infringement, or that DreamDinners.com contains links or other references to another online location that contains material or activity that infringes your copyright rights, you may notify Dream Dinners by providing Dream Dinners copyright agent the information required by the Online Copyright Infringement Liability Limitation Act of the Digital Millennium Copyright Act., 17 U.S.C. §512.
Any claims of copyright infringement on or regarding this Web Site should be sent to Dream Dinners Designated Agent to receive notification of claimed infringement: Dream Dinners, Inc., Legal Department 1323 Ave D #889, Snohomish, WA 98291.
You agree that the Service Provider is not responsible, and shall have no liability to you, with respect to any information or materials posted by others, including but not limited to, infringing, defamatory, offensive or illicit material.
YOU ACKNOWLEDGE THAT YOU ARE USING THE SERVICE AT YOUR OWN RISK. THE SERVICE IS PROVIDED "AS IS", AND THE SERVICE PROVIDER AND ITS AFFILIATES HEREBY EXPRESSLY DISCLAIM ANY AND ALL WARRANTIES, EXPRESS AND IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTIES OF ACCURACY, RELIABILITY, TITLE, MERCHANTABILITY, NON-INFRINGEMENT, FITNESS FOR A PARTICULAR PURPOSE OR ANY OTHER WARRANTY, CONDITION, GUARANTEE OR REPRESENTATION, WHETHER ORAL, IN WRITING OR IN ELECTRONIC FORM, INCLUDING BUT NOT LIMITED TO THE ACCURACY OR COMPLETENESS.
This site is owned and operated by Dream Dinners®. Your privacy on the Internet is of the utmost importance to us. At Dream Dinners®, we want to make your experience online satisfying and safe. Because we gather certain types of information about our users, we feel you should fully understand our policy and the terms and conditions surrounding the capture and use of that information. This privacy statement discloses what information we gather and how we use it.
* Information that users provide through optional, voluntary submissions. These are voluntary submissions to receive our electronic newsletters, to receive periodic promotions, to email a friend, to receive information from our trusted partners and from participation in contests, sweepstakes, polls and surveys.
* Information Dream Dinners® gathers through aggregated tracking information derived mainly by tallying page views throughout our sites. This information allows us to better tailor our content to customers' needs and better understand the demographics of our customers. Under no circumstances does Dream Dinners® divulge any information about an individual user to a third party, unless a user has opted in to allow sharing of information.
We offer a free electronic newsletter and periodic email promotions to users. Dream Dinners® gathers the email addresses of users who are registered on our site. Users may remove themselves from this mailing list by following the link provided in every newsletter or email promotion that points users either to the subscription management page or the unsubscribe link.
Dream Dinners® may occasionally conduct contests and sweepstakes in conjunction with its trusted partners for an opportunity for users to win prizes. The user must provide their email address and other contact information as needed for the particular contest or sweepstakes. This information is used in accordance with the rules applicable to such sweepstakes, contest or promotion. You should carefully review the rules of each sweepstakes, contest, and promotion in which you participate through the Site, as they may contain additional important information about Dream Dinners'® or a sponsor's use of your Personal Information.
We may offer interactive polls to users so they can easily share their opinions with other users and see what our audience thinks about important issues. Opinions or other responses to polls are aggregated and are not identifiable to any particular user. Dream Dinners® may use a system to "tag" users after they have voted, so they can vote only once on a particular question. This tag is not correlated with information about individual users.
Dream Dinners® may occasionally conduct user surveys to better target our content to our audience. We sometimes share the aggregated demographic information in these surveys with our sponsors, advertisers and partners. We never share any personally identifiable information gathered as part of these surveys.
Dream Dinners® tracks user traffic patterns throughout all of our sites. However, we do not correlate this information with data about individual users. Dream Dinners does break down overall usage statistics according to a user's domain name, browser type, and MIME type by reading this information from the browser string (information contained in every user's browser). Dream Dinners® using tracking information to determine which areas of our sites users like and don't like based on traffic to those areas. We do not track what individual users read, but rather how well each page performs overall. This helps us continue to build a better service for you.
We may also use third-party vendors, such as Google Analytics, to advertising to our users online. These third-party vendors may display Dream Dinners® advertisements on other websites based on users internet usage. More specifically, these vendors use first-party cookies (such as the Google Analytic cookie) and third-party cookies (such as the DoubleClick cookie) together to inform, optimize, and serve ads based on a user's past visits to the Dream Dinners® Site. Any information that these third parties collect via cookies is not linked to any personally identifiable information (name, address, email address, or phone number) we collect or you provide on the website. Users can opt-out of Google Analytics for Display Advertising by using Google's Ads Settings.
Dream Dinners® uses any information voluntarily given by our users to enhance their experience in our network of sites, whether to provide interactive or personalized elements on the sites or to better prepare future content based on the interests of our users. As stated above, we use information that users voluntarily provide in order to send out electronic newsletters and to enable users to participate in polls, surveys, promotions, and sweepstakes or contests. We reserve the right to share this personally identifiable information with third party sponsors of such sweepstakes, contests, and promotions (irrespective of whether it is hosted by us), or otherwise in accordance with the rules applicable to such sweepstakes, contest or promotion. You should carefully review the rules of each sweepstakes, contest, and promotion in which you participate through the Site, as they may contain additional important information about Dream Dinners' or a sponsor's use of your Personal Information.
To the extent that the terms and conditions of such rules concerning the treatment of your Personal Information conflict with this Policy, the terms and conditions of such rules shall control. We send out newsletters to subscribers on a regular schedule (depending on the newsletter), and occasionally send out special editions or email promotions when we think subscribers might be particularly interested in something we are doing.
Dream Dinners® operates secure data networks protected by industry standard firewall and password protection systems. Our security and privacy policies are periodically reviewed and enhanced as necessary and only authorized individuals have access to the information provided by our customers.
* Opting not to register to receive our electronic newsletters and email promotions or other newsletters and promotions from our trusted partners.
I will follow all rules of conduct related to the use of the Dream Dinners facilities during my assembling session.
I will not attend my Dream Dinners session if I have, or have been exposed to any communicable diseases including cold, flu, etc.
I will promptly freeze my Dream Dinners meals following the conclusion of my assembling session.
I will follow the baking instructions specified on all meals.
I will keep all dinners below 40ºF while in storage and I will heat all dinners to an internal temperature above 145ºF for Steak, 155ºF for fish or ground beef and 165ºF for poultry when ready to eat.
I assume full responsibility for the transportation and proper storage of all of my Dream Dinners meals.
I agree to release Dream Dinners from all claims, damages and causes of action or liabilities which may arise as a result of my preparation, storage and consumption of Dream Dinners meals, except if solely due to the gross negligence of Dream Dinners.
I will not resell my Dream Dinners or use them for commercial service.
Bring a cooler or tote to transport food home.
For your safety, as well as the safety of the little ones, we ask that no one under the age of 12 attend.
If you need to reschedule or cancel your order, please contact us 6 days prior to your session. Cancellations with 6 or more days' notice will receive a full refund. Cancellations with 5 or fewer days' notice will be subject to a 25% restocking fee.
We understand that life is unpredictable; if possible, the store will work with you to reschedule your session within two weeks of your original session date without penalty.
Inclement Weather - please contact your local store during inclement weather situations to see if your session has been cancelled. In the event the store must close, information will be provided on the store’s voicemail and every effort will be made to reschedule your session.
Amounts contributed by you to the Dream Dinners Foundation are non-refundable.
Dream Dinners Gift Cards are available for purchase online or in participating stores in set amounts from $25-$500. Dream Dinners Gift Cards may be reloaded only at participating Dream Dinners locations. Dream Dinners Gift cards do not expire and there are no fees for the use of your Dream Dinners Gift Card.
PLATEPOINTS (the "Program") is a customer reward program offered by Dream Dinners Inc. (the "Company") that allows customers to earn points through purchases and activities at participating Dream Dinners® locations and/or the dreamdinners.com website, that lead to discount rewards on future qualified purchases.
To earn and redeem PLATEPOINTS, customers must open a Dream Dinners account and enroll in the PLATEPOINTS Program. To open a new Dream Dinners account, fill out an application at any participating Dream Dinners location, or online at www.dreamdinners.com. Only one account and member ID per person is permitted at any given time. By enrolling in the Program, members agree to and are subject to these Terms & Conditions. Upon registration, all qualifying purchases or activities will earn points in the member's associated account.
PLATEPOINTS are earned on qualifying purchases and/or activities. Accumulation of 500 PLATEPOINTS will result in 10 Dinner Dollars in the member's associated account. From time to time, Company may, in its sole discretion, establish alternative rates for earning points and bonus points that differentiate among members on the basis of, or that depend on, reflect, or are affected by, member achievement of specified levels of the Program or other criteria. PLATEPOINTS may not be sold, transferred or assigned, as part of a domestic relations matter or otherwise by operation of law, and are not transferable upon death.
Reward Dinner Dollars can be used on any purchases over and above the then-current Dream Dinners minimum order, including ordering additional entrees, sides or services. Reward Dinner Dollars are not redeemable for cash. Reward Dinner Dollars are not member's property and may be revoked by Company at any time. Reward Dinner Dollars may not be sold, transferred or assigned, as part of a domestic relations matter or otherwise by operation of law, and are not transferable upon death. Reward Dinner Dollars expire 6 months (180 days) after the date they are issued.
By enrolling in the Program, members agree to receive advertising, marketing materials and other Program communications, unless expressly disallowed as a profile preference. Members are obliged to submit and maintain accurate and current user information in connection with their memberships, including without limitation name, address, e-mail address and telephone number. Members can change their account information by updating member profile data or requesting an update from a store level staff member.
Members may track their PLATEPOINTS account balance and any Reward Dinner Dollars that have been earned by logging in to their Dream Dinners account online at dreamdinners.com. Dream Dinners may also send electronic notification of Rewards and Dinner Dollars via email periodically.
Members are responsible to maintain the confidentiality of their account user ID and password, and are fully responsible for all activities that occur with respect to their user ID and password whether or not they have authorized the activities.
Company is not responsible for any correspondence, mail or e-mail that is lost, delayed or misdirected. No responsibility is assumed for any computer, telephone, cable, network, satellite, electronic or Internet hardware or software malfunctions, failures, connections, availability or garbled or jumbled transmissions, or service provider / Internet / web site / use net accessibility or availability, traffic congestion, or unauthorized human intervention.
The Program is void where prohibited by law. There is no membership fee for the Program. Each individual is entitled to only one account and it may not be shared with other non-members. Membership is valid only at participating Dream Dinners locations listed at dreamdinners.com.
Participation in the Program is subject to these Terms and Conditions and all other rules, policies, and procedures that Company may establish or change at any time and from time to time without notice. Continued participation in the Program constitutes acceptance of any changes to these Terms and Conditions.
The Program is open to legal residents of the United States age eighteen (18) years and older. Employees of Company and their franchisees are excluded from the Program, unless specifically allowed by Company and the franchisee. If applicable. If allowed for employees, purchases made with their Reward Dinner Dollars may only be for their own personal use or for use by immediate family members living in the same household. Company may request proof of identification and age to verify: (a) eligibility for Program membership, (b) membership participation, and (c) compliance with these terms. In the event of a dispute as to entries submitted by multiple users having the same e-mail account, the authorized subscriber of the e-mail account used to enter the Program at the actual time of entry will be deemed to be the user and must comply with these Terms and Conditions.
Company may change the Program at any time and without notice, including but not limited to (a) changing the Program's earning rates, (b) changing the Program's structure, (c) removing or changing the rate at which PLATEPOINTS are earned or redeemed for Reward Dinner Dollars, (d) revising the procedures and rules for earning or redeeming PLATEPOINTS or Reward Dinner Dollars, (e) changing expiration terms, (f) associating, combining, integrating, linking, or merging the Program with other programs, and (g) changing the list of participating locations. Company may make these changes even if these changes affect a member's ability to use PLATEPOINTS or Reward Dinner Dollars already accumulated or earned. Changes will be posted here under a revised date and version number.
Any points that a member earns may be deducted from the member's account if the products are returned or services cancelled, even if: (i) the member has redeemed those points prior to the return or cancellation, (ii) some or all of the points deducted from the account are not related to the program eligible purchase for which such return or cancellation is made, and (iii) the deduction from the points account results in a negative points balance. In the event that the number of points that could be deducted from an account as a result of a return or cancellation exceeds the current points account balance, Company reserves the right to determine the redemption value of the points shortfall and reduce the amount of refund or Dinner Dollars for such return or cancellation by such redemption value.
Members have the right to cancel their membership in the Program at any time. If a member cancels his/her membership, no refunds will be available. Members who cancel voluntarily may not reactivate the account but are eligible to open a new account without the benefit of the previously accumulated balance.
From time to time, members may be eligible for sweepstakes, contests or other similar promotions. Participation in such events shall be subject to the terms, conditions and rules published at the time of such event and applicable state laws.
Company reserves the right to terminate the Program at any time, for any reason, with or without notice, even though termination may affect members' ability to accrue PLATEPOINTS or redeem Reward Dinner Dollars. Any accumulated PLATEPOINTS and Reward Dinner Dollars will be de-activated and will cease to be available on and from that particular date.
Company and its partners, affiliates, subsidiaries, parent corporations, franchisees and their respective agents and agencies ("Releasees") are not responsible for incorrect or inaccurate transcription of information, for problems related to any of the equipment or programming associated with the Program, for any human error, for any interruption, deletion, omission, defect, or line failure of any telephone network or electronic transmission, for problems relating to computer equipment, software, inability to access the rules or online service, or for any other technical or non-technical error or malfunction. In the event of a printing error or problem with any items purchased with rewards, Releasees shall not have any liability. Under no circumstances, including, but not limited to, negligence, shall any of the Releasees be liable for any direct, indirect, incidental, special, punitive or consequential damages arising from the Program, or merchandise purchased with Reward Dinner Dollars, even if any or all of the foregoing or any of their authorized representatives have been advised of the possibility of such damages. By participating in the Program, members waive any and all rights to bring any claim or action related to such matters beyond ninety (90) days after the first occurrence of the kind of act, event, condition or omission upon which the claim or action is based.
Further, by enrolling in the Program, each member agrees to release and hold harmless Company, its licensees, affiliates, subsidiaries, merchant partners, franchisees, advertising and promotion agencies and their respective directors, officers, employees, representatives and agents from any and all liability for any injuries, loss or damage of any kind to person, including death, and property, arising in whole or in part, directly or indirectly, from acceptance, use or misuse of the rewards discounts or participation in any Program-related activity.
Important: Please read these rules before entering the 2019 March Matchness Fundraising Promotion (the "Promotion").
Contest Sponsor: Dream Dinners, Inc.
2. Eligibility and Entry. This Promotion is open only to the following types of organizations: (a) church youth groups; (b) youth sports groups; and (c) cause-related organizations, that book a fundraising session with their local Dream Dinners® location during the Promotion Period (the "Organization"). If an organization does not meet these requirements, any eligibility requirement in these Rules and Guidelines, or any other eligibility requirements determined by individual Dream Dinners® locations, it is not eligible to win the Matching Donation and Dream Dinners, Inc. reserves the right not to award the Matching Donation to the organization.
a) For every Dream Dinner's order placed during the Organization's fundraising session, $10.00 will be raised for the Organization.
b) For every new guest that signs up for a full order during the Organization's fundraising session, $20.00 will be raised for the Organization. The full order must be completed between February 25, 2019 and March 31, 2019.
c) Dream Dinners local stores may also choose to partner with Organizations on an individual basis to donate based on upselling a side, sweet, or dinner (for example, $1.00 for each bag of cookies sold in the freezer).
4. Matching Donation. Dream Dinners will provide a matching donation up to $1,000.00 to the top five Organizations nationally that raise the most funds during the Promotion Period. The Organizations will be paid via check during the month of May.
5. Notification of Winning Organizations. The Dream Dinners Home Office will notify Dream Dinners local stores, which will notify the winning Organizations between April 22, 2019 and April 26, 2019. Every effort will be made to contact the winning Organizations directly before posting publicly on a social media platform.
6. Disclaimers. The Dream Dinners March Matchness fundraising Promotion provides a forum for organizations to conduct their own fundraising campaigns. Dream Dinners does not solicit donations on behalf of any organizations, help create specific campaign content, and is not paid a fee to promote the March Matchness Promotion. Dream Dinners will use its own funds to provide the Matching Donations. Dream Dinners and any other participating sponsors, including its respective parent companies, subsidiaries, affiliates, directors, officers, professional advisors, employees and agencies (collectively, the "Released Parties") will not be responsible for: (a) any late, lost, misrouted, garbled or distorted or damaged transmissions or entries; (b) telephone, electronic, hardware, software, network, Internet, or other computer- or communications-related malfunctions or failures; (c) any Promotion disruptions, injuries, losses or damages caused by events beyond the control of Dream Dinners or by non-authorized human intervention; or (d) any printing or typographical errors in any materials associated with the Promotion. Dream Dinners reserves the right, in its sole discretion, to cancel, terminate, modify, or suspend this Promotion for any reason.
We reserve the right to add to and/or change our Referral Programs Terms & Conditions at any time. This means, for example, that we may change the automatic rewards earned for sessions attended or purchases made, impose caps and/or fees on earning or redeeming rewards and/or cancel rewards.
Participation in our Referral Programs (Bring a Friend) is open to all residents of the U.S. who are 18 years of age or older.
Bring a Friend is available at all Dream Dinners locations only.
To participate and earn referral credit, you must be a Dream Dinners' guest.
Persons invited to visit Dream Dinners through our Bring a Friend program must schedule and attend a session before referral credit is available for use by the Dream Dinners' guest making the referral.
Referral credit is only earned when the referred guest is new to Dream Dinners, having never attended a Dream Dinners meal assembly in the past.
Referral credits earned are available for use 72 hours following the day a referred guest is scheduled to attend a session.
Referral credit is automatically entered into the referring guest's account within 72 hours provided the referred guest does not cancel their order, or is found to already have been a Dream Dinners guest at any time in the past.
Once referral credit is available for use it is automatically applied toward future orders.
Dream Dinners may cancel, modify, restrict or terminate the Bring A Friend Referral Program at any time without prior notice at its sole discretion.
In case of suspected fraud, misrepresentation, abuse or violation of these rules, we reserve the right to take appropriate administrative and/or legal action, including the rescinding of earned referral credit and/or billing for referral credit earned through fraud, misrepresentation, abuse or violation.
By participating in our Referral Program, you agree to receive related confirmation, follow-up and reminder emails as well as marketing information from Dream Dinners. You may request to be removed from our distribution list by contacting a local Dream Dinners location or by emailing [email protected] . By asking to be removed from our distribution lists you relinquish your right to receive the aforementioned communications.
The information you provide through our Referral Program is confidential. Email addresses you provide will only be used for the purpose of sending invitations to place an order with Dream Dinners. Email addresses you provide will not be sold or rented to any other company or 3rd party not affiliated with Dream Dinners.
Invitees who subsequently become Dream Dinners' customers and use of their personal information are subject to our general terms and conditions as outlined in the Policies and Terms section of our web site.
Employees of Dream Dinners, Inc. are ineligible to earn referral credits.
Dream Dinners' preferred guests (contractors, vendors, etc.) are ineligible to earn referral credits.
Members of corporate programs or group discount programs are eligible to earn referral credits.
In the event you choose to make purchases at different Dream Dinners locations your earned referral credit will move with you.
Referral credits may not be transferred to another individual or used for purchase of any products other than Dream Dinners menu items.
Referral credit of $10 per order will only be earned on purchases of minimum size or greater. Dream Dinners Introductory Offer purchases or a purchase of less than 36 servings will result in a referral credit of $5.
Referral rewards of any kind, whether store credit or other rewards that may periodically available, will not be earned on sales tax, reward redemption's, prior purchases or gift cards.
Guests invited to attend Dream Dinners through referral programs are responsible for updating account information at dreamdinners.com or through direct contact with any participating Dream Dinners Store.
Participation in the Dream Dinners Referral Program is void if prohibited by law in the jurisdiction in which the prospective participant resides.
Only the Dream Dinners' guest that has an account with Dream Dinners may earn referral credits or other rewards.
Dream Dinners referral credits have no cash value.
Dream Dinners referral credits are not transferable to another guest's account.
Referral credits unused after 90 days will expire and no longer available toward future purchases.
By using and/or downloading and/or placing online any part of our Content including our News Feeds, or the content they contain, you agree to be bound by these terms and conditions. Dream Dinners, Inc. reserves the right to update the terms and conditions as necessary. It is your responsibility to review them periodically.
Dream Dinners Content is provided on an "as is" and "as available" basis. Dream Dinners Inc. gives no warranty of any kind in relation to our Feed or our Content and we disclaim all implied warranties, including, but not limited to, satisfactory quality, fitness for purpose, non-infringement, compatibility and accuracy.
Our Dream Dinners blog may contain nutritional news and data, supplied for general information purposes only. The materials contained within these blogs or our websites do not constitute medical advice, which should be sought from qualified medical advisers. Descriptions of, or references to, products or publications does not imply endorsement of that product or publication.
The Dream Dinners Blog contain links to external web sites. In no event shall Dream Dinners, Inc. be responsible for the content, accuracy or opinions expressed in these web sites. These web sites are not monitored or checked for accuracy or completeness by us. Inclusion of web sites linked to via content and links in our site does not imply approval or endorsement of the linked web site by us. If you decide to leave our web site and access these third-party sites, you do so at your own risk.
The material displayed on our blogs is provided without any guarantees, conditions or warranties as to its accuracy. All title, ownership rights and intellectual property rights shall remain the property of Dream Dinners, Inc.
You may not place, or use any software to place, any complete articles from our blogs or websites on your Site, unless you have contacted us first and have received written permission from us to place the entire article online - these full terms and conditions will apply.
Use of our logo is not permitted.
You may not directly or indirectly suggest any endorsement or approval by Dream Dinners, Inc. of your Site, products, content or any views expressed within your Site.
Do not promote, facilitate or encourage Illegal activities (and do not display actionable Content under UK or US law).
Do not promote, facilitate or encourage Hatred of any form (including, but not limited to, Racism, Terrorism, Violence and Discrimination of any kind).
Do not have misleading, pornographic or defamatory content.
Do not display any material which is in breach of any third party intellectual property rights.
Images are the copyright property of Dream Dinners Inc., or respective third party company. Images cannot under any circumstance be copied, saved, used, and/or edited, without written consent of Dream Dinners, Inc.
You (the user) agree Dream Dinners, Inc cannot be held liable/accountable for any problems or loss arising from any widgets, gadgets, software, devices and any such application regardless of whether Dream Dinners, Inc has added input into such application. | 2019-04-18T21:06:10Z | https://dreamdinners.com/main.php?static=policy_and_terms |
Among the states, mandatory arbitration is especially widespread in California, Texas, and North Carolina, but in all of the 12 largest states by population over 40 percent of employers have mandatory arbitration policies.
Much attention has focused on the use of mandatory arbitration agreements in consumer contracts, such as consumer financial contracts, cellphone contracts, and nursing home resident contracts and the implications of such agreements for consumer rights.2 There is less awareness of the use of mandatory arbitration agreements in employment contracts, but it is no less of a concern for those workers affected by it. These mandatory employment arbitration agreements bar access to the courts for all types of legal claims, including employment discrimination and sexual harassment claims based on Title VII of the Civil Rights Act, protections for employees with disabilities under the Americans with Disabilities Act, rights to maternity and medical leaves based on the Family and Medical Leave Act, and entitlements to minimum wages and overtime under the Fair Labor Standards Act. If an employment right protected by a federal or state statute has been violated and the affected worker has signed a mandatory arbitration agreement, that worker does not have access to the courts and instead must handle the claim through the arbitration procedure designated in the agreement.
A crucial 1991 Supreme Court decision, Gilmer v. Interstate/Johnson Lane,4 upheld the enforceability of mandatory employment arbitration agreements, meaning that such agreements now had the potential to substantially change how the employment rights of American workers are protected. But the practical impact of mandatory employment arbitration depends on whether or not American businesses decide to require that their employees sign these agreements as a term and condition of employment. Research from the 1990s and 2000s found that mandatory employment arbitration was expanding and, by the early 2000s, nearly one-quarter of the workforce was subject to mandatory arbitration. However, there was a lack of subsequent research tracking whether this growth trend had continued beyond the early 2000s and describing the current extent of mandatory employment arbitration (see literature review, next section below).
The lack of basic data on the extent of mandatory arbitration is especially concerning given that recent years have seen a series of court decisions upholding the use of mandatory arbitration in employment. These decisions have likely encouraged employers to require these agreements, expanding the use of mandatory arbitration. In two key decisions, AT&T Mobility LLC v. Concepcion (2011) and American Express Co. v. Italian Colors Restaurant (2013),5 the Supreme Court held that class action waivers in mandatory arbitration agreements were broadly enforceable. This meant that businesses could not only use mandatory arbitration agreements to bar access to the courts for individual claims, they could also shield themselves from class action claims. This gave businesses an additional incentive to include mandatory arbitration agreements in employment and other contracts.
The Supreme Court is currently considering the enforceability of class action waivers in mandatory employment arbitration agreements in National Labor Relations Board v. Murphy Oil USA, Inc.6 In this case, the Court will decide whether requiring workers to waive their right to use collective action to address employment law violations is a violation of the protections of the right to engage in concerted action contained in Section 7 of the National Labor Relations Act (NLRA). If the Supreme Court accepts the argument that such waivers are in violation of the NLRA, the Court’s decision would effectively put an end to the use of class action waivers in mandatory employment arbitration agreements. However, if the Court sides with the employers’ arguments in these cases, this will signal to businesses that the last potential barrier to their ability to opt out of class actions has been removed. This would likely encourage businesses to adopt mandatory employment arbitration and class action waivers even more widely.
Colvin’s 2003 survey of conflict resolution procedures used in the telecommunications industry found that 14.1 percent of establishments in that industry had adopted mandatory arbitration and that these procedures applied to 22.7 percent of the nonunion workforce in the industry (since larger establishments were more likely to have adopted mandatory arbitration) (Colvin 2008).
The overall picture is one of mandatory employment arbitration expanding through the 1990s and early 2000s to nearly a quarter of the workforce. This study seeks to determine whether this expansion has continued beyond 2003 and how widespread mandatory employment arbitration is currently.
To investigate the extent of mandatory employment arbitration, I conducted a national survey of private-sector American business establishments, focusing on the use of mandatory arbitration for nonunion employees. The survey was conducted from March 2017 to July 2017 and had a sample size of 627, yielding a margin of error at 95 percent confidence of plus or minus 3.9 percentage points.
On the central question of whether employees were required to sign a mandatory “agreement or provision for arbitration of legal disputes with the company,” 50.4 percent of responding establishments indicated that employees in their establishment were required to enter into this type of agreement.
For employers who have adopted mandatory arbitration, the survey asked them how recently they had adopted this policy. Among the employers with mandatory employment arbitration, I find that 39.5 percent of them had adopted their policies within the last five years, i.e., from 2012 to 2017, whereas 60.5 percent had adopted their policies more than five years ago. This cut-off date is important because it was in 2011 that the Supreme Court issued its decision in AT&T Mobility LLC v. Concepcion, ruling that class action waivers in the mandatory arbitration agreements were broadly enforceable. This means there was a substantial growth in the adoption of mandatory employment arbitration during this five-year period following the Supreme Court giving a green light to the use of mandatory arbitration clauses to bar class actions. Some of this growth was driven by newer, recently established companies deciding to adopt mandatory arbitration for their employees. But even among larger employers, most of whom have been around for longer periods of time, we find that many of these employers only adopted mandatory arbitration in the last five years. Census data indicate that only 10 percent of establishments with over 100 employees are less than five years old,9 but the survey data indicate that 45.3 percent of these larger establishments adopted mandatory arbitration within the last five years, indicating that there has been a surge in adoption of mandatory arbitration even among larger, older companies.
As mentioned above, the likelihood that an employer will adopt mandatory employment arbitration varies with the size of the employer. Whereas 53.9 percent of all establishments had mandatory arbitration, among establishments that were part of companies with 1,000 or more employees, 65.1 percent had mandatory arbitration, which is a statistically significant difference (at the p < 0.05 level) from the 50.5 percent of establishments with fewer than 1,000 workers that had mandatory arbitration. Breaking down employer size further in Table 1, we see that it is the very largest employers who have the highest rates of adopting mandatory arbitration.
Notes: Percentages indicate the share of workplaces at each workforce size that have mandatory arbitration policies. The symbols * and ** indicate that the adoption of mandatory arbitration is significantly different from the other categories in the table combined at the 0.10 level and 0.05 level, respectively.
In general, larger organizations with more sophisticated human resource policies and better legal counsel are more likely to adopt policies like mandatory arbitration that protect them against legal liability.10 They could also become trendsetters over time if smaller employers copy these practices that larger employers have proven to be effective in protecting employers against legal actions.
Notes: Percentages indicate the share of workplaces with mandatory arbitration policies in each state. The symbols * and ** indicate that the adoption of mandatory arbitration is significantly different from the other categories in the table combined at the 0.10 level and 0.05 level, respectively. States listed are the 12 most populous states in the U.S. and are listed in order of population size (largest to smallest).
It is noteworthy that the two largest states, California and Texas, both have substantially greater rates of adoption of mandatory employment arbitration than the national average of 53.9 percent of establishments. California has long been viewed as a state where mandatory employment arbitration is especially common, a consequence of employers reacting to the relatively employee-protective environment of that state’s employment laws by using mandatory arbitration to opt out of being subject to the state court system.12 However, these results suggest that mandatory employment arbitration is equally common in Texas, where the state legal environment is generally considered to be more favorable to employers. Although for Texas we do not have enough evidence statistically to make a definitive conclusion as to the higher adoption rate for that state, these results do suggest that mandatory arbitration is not confined to the states with more employee-favorable employment laws. In general, we do see in the results a widespread adoption of mandatory arbitration across the nation, with all of the 12 largest states by population having at least 40 percent of employers adopting mandatory arbitration.
Rates of imposition of mandatory arbitration also vary across different industries. Table 3 shows adoption of mandatory arbitration by industry (based on NAICS codes).
Notes: Percentages indicate the share of workplaces with mandatory arbitration policies in each industry. The symbols * and ** indicate that the adoption of mandatory arbitration is significantly different from the other categories in the table combined at the 0.10 level and 0.05 level, respectively. Classifications are based on two-digit NAICS codes. Industries with fewer than 20 observations in the data set are not reported because sample sizes are too small to yield reliable estimates.
Since the proportion of female and racial and ethnic minority employees varies significantly across industries, we can also look at whether the rate of imposition of mandatory arbitration varies with the composition of the workforce in the industry. Construction, an industry with a predominantly male workforce, has the lowest rate of imposition of mandatory arbitration, whereas education and health, industries with a more predominantly female workforce, have the highest rate of imposition of mandatory arbitration. That leads me to ask: Are employers in industries with more predominantly female or minority workforces more likely to adopt mandatory arbitration?
I can investigate this question further using data on the workforce compositions of different industries. Under the assumption that within an industry, men and women have the same likelihood of being subject to mandatory arbitration, I can estimate the share of men and women who are subject to mandatory arbitration agreements using gender breakdowns of employment by industry from Bureau of Labor Statistics data for 2016. Using this approach, I estimate that 57.6 percent of female workers are subject to mandatory arbitration, slightly higher than the rate for the overall population (56.2 percent), and 53.5 percent of men are subject to mandatory arbitration.13 Put alternatively, approximately 29.3 million female and 30.8 million male workers are subject to mandatory arbitration. Based on similar calculations, I estimate that 59.1 percent of African American workers (7.5 million workers) are subject to mandatory arbitration, 54.3 percent of Hispanic workers are subject to mandatory arbitration (10.0 million workers), and 55.6 percent of white, non-Hispanic workers (38.9 million workers) are subject to mandatory arbitration. This suggests that, overall, female workers (at 57.6 percent) and African American workers (at 59.1 percent) are the most likely to be subject to mandatory arbitration among these five groups of workers.
To investigate further the impact of workforce characteristics on the adoption of mandatory arbitration, we can look at its relationship to pay levels. Are workers in higher wage or lower wage establishments more likely to have mandatory arbitration imposed on them? The survey included a question about the average pay level of workers in the establishment. In Table 4, I report the percentage of workplaces with mandatory arbitration by the average pay level of workers in the establishment. Average pay levels among the survey respondents are divided into quartiles and annual salaries converted to equivalent hourly wages for ease of comparison.
Notes: Percentages indicate the share of workplaces that have mandatory arbitration policies by average wage earned by employees at those workplaces. The symbols * and ** indicate that the adoption of mandatory arbitration is significantly different from the other categories in the table combined at the 0.10 level and 0.05 level, respectively. Each row represents a quartile of the establishments surveyed (that is, average pay levels among the survey respondents are divided into quartiles) and average annual salaries reported by respondents are converted to equivalent hourly wages for ease of comparison.
It is the employers with the lowest-paid workforces that are most likely to impose mandatory arbitration on their employees. This is a concern from a policy perspective because low-paid employees are particularly vulnerable to infringements of their employment rights: researchers have found widespread violations of wage and hour laws suffered by these workers (Bernhardt et al. 2008, 2009).
Another workforce characteristic the survey asked about is the education level of the workforce. In Table 5, we categorize establishments by the most common education level of employees.
Notes: Percentages indicate the share of workplaces that have mandatory arbitration policies by typical education level of employees at those workplaces. The symbols * and ** indicate that the adoption of mandatory arbitration is significantly different from the other categories in the table combined at the 0.10 level and 0.05 level, respectively.
This comparison indicates that there is relatively little difference at lower education levels. Adoption of mandatory arbitration is slightly more common among employers whose typical employee has a college degree, but the differences are not statistically significant.
Although around 60 million American workers are now subject to mandatory employment arbitration procedures, this does not mean that the number of workers arbitrating workplace disputes has increased correspondingly. It has not. Mandatory arbitration has a tendency to suppress claims. Attorneys who represent employees are less likely to take on clients who are subject to mandatory arbitration (Colvin 2014), given that arbitration claims are less likely to succeed than claims brought to court, and, when damages are awarded, they are likely to be significantly smaller than court-awarded damages (Colvin and Gough 2015). Attorney reluctance to handle such claims effectively reduces the number of claims that are brought since, in practice, relatively few employees are able to bring employment law claims without the help of an attorney.
The number of claims being filed in employment arbitration has increased in recent years. In an earlier study, Colvin and Gough (2015) found an average of 940 mandatory employment arbitration cases per year being filed between 2003 and 2013 with the American Arbitration Association (AAA), the nation’s largest employment arbitration service provider.14 By 2016, the annual number of employment arbitration case filings with the AAA had increased to 2,879 (Estlund 2018). Other research indicates that about 50 percent of mandatory employment arbitration cases are administered by the AAA (Stone and Colvin 2015). This means that there are still only about 5,758 mandatory employment arbitration cases filed per year nationally. Given the finding that 60.1 million American workers are now subject to these procedures, this means that only 1 in 10,400 employees subject to these procedures actually files a claim under them each year. Professor Cynthia Estlund of New York University Law School has compared these claim filing rates to employment case filing rates in the federal and state courts. She estimates that if employees covered by mandatory arbitration were filing claims at the same rate as in court, there would be between 206,000 and 468,000 claims filed annually, i.e., 35 to 80 times the rate we currently observe (Estlund 2018). These findings indicate that employers adopting mandatory employment arbitration have been successful in coming up with a mechanism that effectively reduces their chance of being subject to any liability for employment law violations to very low levels.
Although class action waivers are one of the most controversial features of mandatory arbitration procedures, it is important to recognize that mandatory arbitration agreements do not necessarily include class action waivers. Among the survey respondents whose companies had mandatory arbitration procedures, 30.1 percent included class action waivers.15 These tended to be in establishments with larger workforces, so overall 41.1 percent of employees covered by mandatory arbitration procedures were also subject to class action waivers. Relative to the overall workforce, including both those covered and those not covered by mandatory arbitration, these estimates indicate that 23.1 percent of all private-sector nonunion employees are subject to class action waivers in mandatory arbitration procedures, corresponding to 24.7 million American workers.
The finding that many employers who have adopted mandatory employment arbitration have not included class action waivers in their procedures stands in contrast to the situation with consumer financial contracts, which the Consumer Financial Protection Bureau (CFPB) found almost always include class action waivers along with mandatory arbitration.16 One explanation for the lower use of class action waivers in the employment setting is the ongoing legal uncertainty about their enforceability given the NLRA issues that the Supreme Court will be deciding in the Murphy Oil case. If the decision in this case upholds the use of class action waivers in mandatory employment arbitration procedures, then we should expect a further increase in the use of these class action waivers and greater numbers of employers overall adopting mandatory arbitration.
Mandatory employment arbitration is the subject of fierce legal and policy debates. There is growing evidence that mandatory arbitration produces outcomes different from those of litigation, to the disadvantage of employees, and suffers from due process problems that give the advantage to the employers who impose mandatory arbitration on their workers (Stone and Colvin 2015). What has been less clear is how widespread the impact of mandatory employment arbitration is. In the consumer arena, the CFPB’s 2015 study showed that mandatory arbitration clauses are common, being included in a majority of credit card, prepaid card, student loan, and payday loan agreements (CFPB 2015). By contrast, in the employment arena, knowledge of the extent of mandatory arbitration was limited to a few surveys from the 1990s and early 2000s, the latter of which suggested that nearly a quarter of employees might have been subject to mandatory arbitration by that point in time.
The study described in this report shows that mandatory employment arbitration has continued to grow in extent and now, in over half of American workplaces, employees are subject to mandatory arbitration agreements that take away their right to bring claims against their employer in court. This represents a dramatic and important shift in how the employment rights of American workers are enforced. Rather than having their rights adjudicated through the public courts and decided by juries of their peers, more often now American workers have to bring claims—claims that are based on statutes enacted by Congress or state legislatures—through arbitral forums designated by agreements that their own employers drafted and required them to agree to as a condition of employment.
The employment conditions experienced by the American worker have changed dramatically in recent decades as labor standards and their enforcement have eroded, union representation has declined, and the wage-suppressing effects of globalization have been amplified by an overvalued U.S. dollar and trade agreements that have eroded workers’ power. Against this backdrop of increased economic risk and uncertainty for workers and the disruption of traditional protections, laws protecting employment rights such as the minimum wage, the right to equal pay, and the right to a safe workplace free of harassment or discrimination based on race, gender, or religion have become increasingly important as a workplace safety net. However, these protections are at risk of being undermined if there is no effective means of enforcing them. For all the limitations of the courts, litigation has been a vital mechanism for enforcing employment rights, particularly in an era of reduced government agency resources.
Mandatory employment arbitration has expanded to the point where it has now surpassed court litigation as the most common process through which the rights of American workers are adjudicated and enforced. The rise of this problematic practice needs to be given much greater attention in employment policy discussions. If the Supreme Court does not reverse its trend of supporting mandatory arbitration and instead put the brakes on enforcement of class action waivers in its upcoming decision, it will be necessary for Congress to act in order to ensure that American workers have an effective means of enforcing the rights they have been promised.
Alexander J.S. Colvin is the Martin F. Scheinman Professor of Conflict Resolution and Associate Dean for Academic Affairs, Diversity, and Faculty Development at the ILR School, Cornell University. His research and teaching focus on employment dispute resolution, with a particular emphasis on procedures in nonunion workplaces and the impact of the legal environment on organizations.
The survey population was drawn from Dun & Bradstreet’s national marketing database of business establishments. It was stratified by state population to be nationally representative. The survey population was restricted to private-sector business establishments of 50 or more employees, and the analysis was restricted to procedures covering nonunion employees. The individual respondents were the establishment’s human resource manager or whichever individual was responsible for hiring and onboarding employees. The reason for use of this individual as the person to respond to the survey is that mandatory arbitration agreements are typically signed as part of the onboarding paperwork when a new employee is hired. As a result, the manager responsible for this process is the individual most likely to be knowledgeable about the documents the new employee is signing. Typical job titles of individual respondents included human resource director, human resource manager, personnel director, and personnel manager.
Data collection started in March 2017 and was completed in July 2017. A total of 1,530 establishments were surveyed, from which 728 responses were obtained, representing an overall response rate of 47.6 percent. Some survey responses had missing data on specific questions; however, 627 respondents provided complete data on the key variables of interest. The response rate and sample size are similar to those obtained in past establishment-level surveys of employment relations and human resource practices. The median establishment size in the sample is 90 employees and the average size is 226 employees. Most establishments are single-site businesses, while 38.2 percent are part of larger organizations. These larger organizations have an average workforce size of 18,660 employees. Overall, 5.2 percent of establishments in the sample are foreign-owned.
6. NLRB v. Murphy Oil USA, Inc., No. 16-307. For more about the Murphy Oil case and the implications of the pending Supreme Court decision, see McNicholas 2017.
7. The GAO’s survey initially indicated that 9.9 percent of establishments had mandatory arbitration procedures; however, on follow-up, a number of them indicated that they had made mistakes in reporting, such as confusing union labor arbitration procedures with nonunion mandatory employment arbitrations. Adjusting for these erroneous responses, only 7.6 percent of the establishments actually had mandatory employment arbitration.
8. This estimate is based on year 2016 data from BLS 2017, which reports an overall private-sector workforce of 115.417 million in 2016, among which 8.437 million are union-represented private-sector workers, with the remainder of 106.980 million workers being nonunion.
9. Based on data provided in U.S. Census Bureau Establishment Characteristics data tables (various years).
10. See, e.g., Edelman 1992, showing that larger organizations are more likely to adopt organizational policies designed to protect them from the impact of civil rights laws.
11. We only report the adoption rate for the 12 largest population states to ensure that we have a sufficient number of observations per state to provide reliable estimates: each of these states had at least 25 observations in the sample. Although the survey is national in coverage, the smaller states had fewer observations per state.
12. See Colvin and Gough 2015 for a more detailed discussion of the state law environments affecting mandatory arbitration in California and Texas.
13. Estimates of the rate of mandatory arbitration coverage for minority and female workers were calculated based on publicly available data since these were not measured directly in the survey. Adjustments for industry employment levels and percentages of female, African American, and Hispanic employees by industry are based on data provided in: Bureau of Labor Statistics, “Labor Force Statistics from the Current Population Survey” (2017). A rate of coverage was calculated by summing across industries the product of the mandatory arbitration coverage rate for the industry and the number of female or minority workers in the industry, to calculate a total number of female or minority workers covered by mandatory arbitration, and then dividing by the total female or minority workforce size. The number of male workers subject to mandatory arbitration is larger because of the greater number of males in the labor force, despite the higher rate at which female workers are subject to mandatory arbitration.
14. See Colvin and Gough 2015, 1027, reporting that 10,335 claims were filed with the AAA over the 11-year period from 2003–2013.
15. Here I am only looking at whether there was an explicit class action waiver in the arbitration agreement. It could also be the case that an arbitrator or a court could interpret an agreement without an explicit waiver as nevertheless implying that claims in arbitration can only be brought individually. However the inclusion of explicit class action waivers are important because they allow the employer to remove any doubt about the ability to bring a class action.
17. A study by Zev Eigen (2008) found that a majority of Circuit City employees he interviewed were unaware that they had signed arbitration agreements or of the import of such agreements, even though the company had a longstanding policy of requiring its employees to sign mandatory arbitration agreements and even though Circuit City’s arbitration policy had been the subject of an important case on the enforceability of these agreements that was decided by the Supreme Court in 2001.
18. One of the most important differences is that labor arbitration procedures are jointly established and administered by unions and management, in contrast to mandatory arbitration, which is unilaterally established by the employer. In addition, most labor arbitration procedures do not bar employees from bringing statutory employment claims separately through the courts.
Bernhardt, Annette, Heather Boushey, Laura Dresser, and Chris Tilly, eds. 2008. The Gloves-Off Economy: Workplace Standards at the Bottom of America’s Labor Market. Ithaca, N.Y.: Cornell Univ. Press.
Bernhardt, Annette, Ruth Milkman, Nik Theodore, Douglas Heckathorn, Mirabai Auer, James DeFilippis, Ana Luz González, Victor Narro, Jason Perelshteyn, Diana Polson, and Michael Spiller. 2009. Broken Laws, Unprotected Workers: Violations of Employment and Labor Laws in America’s Cities, 2009. Center for Urban Economic Development, National Employment Law Project, and UCLA Institute for Research on Labor and Employment.
Bureau of Labor Statistics (BLS). 2017. “Union Members – 2016” (news release). Released January 26, 2017.
Colvin, Alexander J.S. 2008. “Empirical Research on Employment Arbitration: Clarity amidst the Sound and Fury?” Employee Rights and Employment Policy Journal 11, no. 2 (October): 405–447.
Colvin, Alexander J.S. 2014. “Mandatory Arbitration and Inequality of Justice in Employment.” Berkeley Journal of Employment and Labor Law 35, no. 1 (May): 71–90.
Colvin, Alexander J.S., and Mark Gough. 2015. “Individual Employment Rights Arbitration in the United States: Actors and Outcomes.” ILR Review 68, no. 5 (October): 1019–1042.
Edelman, Lauren B. 1992. “Legal Ambiguity and Symbolic Structures: Organizational Mediation of Civil Rights Law.” American Journal of Sociology 97, no. 6 (May): 1531–1576.
Eigen, Zev. 2008. “The Devil in the Details: The Interrelationship among Citizenship, Rule of Law and Form-Adhesive Contracts.” Connecticut Law Review 41, no. 2 (December): 1–50.
Estlund, Cynthia L. 2018. “The Black Hole of Mandatory Arbitration.” North Carolina Law Review 96; NYU School of Law, Public Law Research Paper No. 18-07.
Feuille, Peter, and Denise R. Chachere. 1995. “Looking Fair and Being Fair: Remedial Voice Procedures in Nonunion Workplaces.” Journal of Management 21: 27–36.
McNicholas, Celine. 2017. “Supreme Court Should Uphold Working People’s Fundamental Rights in Murphy Oil.” Working Economics (Economic Policy Institute blog), September 27, 2017.
Stone, Katherine V.W., and Alexander J.S. Colvin. 2015. The Arbitration Epidemic. Economic Policy Institute Briefing Paper no. 414.
U.S. Census Bureau. Various years. Establishment Characteristics Data Tables. Business Dynamics Statistics (BDS) data series. Accessed March 6, 2018. | 2019-04-26T00:04:34Z | https://www.epi.org/publication/the-growing-use-of-mandatory-arbitration-access-to-the-courts-is-now-barred-for-more-than-60-million-american-workers/ |
After Governor Paul LePage swore in Matthew Dunlap as Secretary of State, Janet T. Mills as Attorney General and Terry Hayes as Treasurer, the three and invited guests reconvened in the House of Representatives.
Here are the speeches presented by the trio, with text as prepared for Dunlap and Mills.
Thank you for coming today—and especially, thank you to my wife and family, without whom I would be helpless to ever amount to anything. Also, special thanks, again, to Senator Anne Haskell of Cumberland and Representative Aaron Frey of Bangor for nominating me for another term as Secretary of State.
I’m sorry you missed the actual act of my taking the oath. The Executive had reserved a custodian’s closet for the act, but we had to use it while the good fellow was taking his break, so the schedule didn’t mesh with this event.
Sullivan Ballou understood that the fight to support the government was really the fight to support freedom—which is our right, as citizens, to govern ourselves, and not, in fear, stand subject to petty actions by some despot. I am grateful that brave, conscientious Americans stand at this hour in harm’s way to protect that same idea. So, empty efforts that attempt to portray false power are just games, and don’t really get under my skin. My work goes on, as does yours, as we all stride forward for a better future.
We live in dangerous times. In any direction that we cast our eyes, we see turmoil. The civil war raging in Syria; tension in Ukraine; distrust in North Korea; piracy in the Gulf of Aden; and our soldiers, sailors and airmen deployed and on high alert in many very, very dangerous places around the world keep us lighting candles and tying yellow ribbons as a show of hope for their safe return.
Even the happy circumstance of falling oil prices contributes to a disturbing sense of global entropy. Cheap oil isn’t good for everyone, and as nations face crippling deflation of their currencies, unrest may well follow.
My instincts, at one time, would have been to turn off the television, close up the front door, and go out back and plant a garden.
While it’s always more comfortable to pretend that all is well and that our problems will go away by themselves, the reality is they don’t, and superheroes only live in comic books. I learned from the examples of so many around me—especially my parents, Bob and Sue Dunlap, that no one will come rescue you when things go wrong; (well, the Maine Warden Service will rescue you, but you know what I mean, generally) you have to roll up your sleeves and get to work.
My late father, an energetic and creative man, never knew quite what to make of me. I wasn’t like everyone else in my family—they were always making something. I was content to lay around in bed long into a summer’s day, reading and daydreaming. It was a source of tremendous frustration for him, even causing him to exclaim one time that I had no shame, and was the laziest kid he had ever seen.
He would have been stunned at what’s transpired in me since those carefree days.
I believe strongly in what I do; and am grateful for the opportunity to continue in this role bestowed on me by the Legislature. Being able to help people access their government is one of the great blessings of my life, and the calling is strong enough to keep me coming back.
We engage in no small tasks. Nothing I am asked is a bother to me, nor do I ever have anything more important to do, despite the protestations of those who come to me, hat in hand, with what to them is a great issue indeed. We have, in the office of the Secretary of State, very simple rules of engagement.
1. We always tell it like it is; never hedge, blame others, or dissemble.
2. The world stops for kids. Young people are our future leaders, and taking time to listen to them, answer their questions, and show them the respect of any citizen pays long dividends.
3. Do it now. Post-it notes and reminders are the urns of forgotten tasks, and appear to mean that we consider something important to a citizen unworthy of our immediate attention.
We’ve been through a lot since I first stood here. At the time, still fresh from my service in the House, I meant it when I said that my goal for the Legislature was for people to see their representatives and senators as highly effective—because they had a good experience with my office. We’ve had a lot of success there, which was at many times uncertain. There was the long turmoil of the Motor Vehicles computer upgrades—deftly executed by our great people there. Now, we are nearing completion of upgrades to all of our service facilities, and are working towards keeping pace with the expectations and opportunities of the 21st Century.
We’ll have a lot to talk about this session as we consider how Maine will respond to the latest feints by the Federal government towards getting the several states to conjure up for them—at no cost to the Feds—for a national ID and citizen tracking system called REAL ID. Still fraught with problems and sold with fantasy, we’ll want to engage the Legislature for guidance.
We built the Central Voter Registration system, and provided expedited service to military and overseas voters as well as people with disabilities. But the help the Federal government lent us to do that is gone—and they expect us to continue, without the benefit of additional Federal dollars. So we’ll be chatting with you about that, too.
We’ll be working on rebuilding our Corporations databases as well, and at NASS, we’ll continue to grapple with Congress over corporate formation issues that, if they get their way, will be an incredible burden on business and not achieve any of the goals Congress has in mind. We call that process REAL ID Business Class.
At the Archives, we’re putting the resources the last Legislature asked us to use for securing our electronic history to work and are beginning to implement what will be the underpinning of a digital archiving policy. We’re going to keep working on that, and with a largely new and highly energized staff, we’re planning on getting a lot done over the next two years.
We have a lot to do. I could tell you plenty more, and I will; you’ll see me every day, in the halls and in your committee rooms, and I’ll strive to answer your questions and help you craft solutions to the problems that Hector our shared goals of building a stronger, more prosperous Maine for our children.
But let us, as we bend to that work, never forget those who handed off the promise of freedom to us and entrusted us with the promise of the better tomorrow that we live in. Honoring those who have stood, fearless, in times of danger, casts forward the blessing of freedom to the next generation.
Last year, we took the opportunity of better promoting the Vote in Honor of a Veteran program to profile a different veteran every day on our department Facebook page. It was enormously popular, and I still receive thanks from people for highlighting the service of someone they care about.
I thought about how best I could convey the spirit of my passion for this work today. The Executive stated yesterday that actions speak louder than words; and he’s right. But words are important too, so let me conclude with a bit of a mix.
In the fall of 2013, I participated in the somber, yet glorious interment of the remains of Corporal Robert Tait of my hometown of Bar Harbor. Corporal Tait died of starvation in a North Korean prisoner of war camp. Bringing home his remains to rest in our hometown was one of the most meaningful events I’ve been a part of in my professional life.
In my actions, I will never forget. In my actions, I will always strive to serve. And when I serve, I will serve my country with my entire soul.
To honor what I strive to be, let me leave you with a poem written by Herman Melville in 1864 called In the Prison-pen, about the sad plight of prisoners of war. He could have written it about Robert Tait.
In my actions, let their sacrifice be not in vain.
And thank you, Terry Hayes and Matt Dunlap, for the service you are prepared to provide (again) to the citizens of Maine. I want to thank Neria Douglass for her ten years in state service as Auditor and Treasurer at the same time that I welcome Terry Hayes to the ranks of the constitutionals.
And I want to thank my husband Stan, who left us 3 � months ago but whose courage is still the wind beneath my wings.
Last week, before the snow, the ice that formed so quickly was like glass. We could look to the bottom of the lakes and rivers and see clearly to the bottom. It was like a dream where you’re skating and floating above your own reflection, above the rocks and mud ten feet below, ultimate transparency.
And I wondered, are we in state government standing on thin ice too, with no sense of depth, distance or danger?
As days grow longer; as longer, slower shadows fall against these walls and people look for laws and legacies in the halls; as the Kennebec River rushes toward its rendezvous with the ocean, and the days grow longer and wetter, I realize we need more light, less ice. We need to be rowing together towards our very own Merrymeeting Bay.
There are people in this room who keep the boats afloat. And today I want to thank the incredibly hard working attorneys and staffers in the Office of the Attorney General whose commitment to public service and the protection of the public safety is unparalleled.
Working on thousands of matters from child abuse to consumer protection to police involved shootings to healthcare crimes to the challenges of Riverview and the prosecution of domestic violence homicides and felony drug cases, these attorneys are busy solving problems, not creating them; they are busy defending state agencies, litigating, mediating, all on behalf of the public interest. And they deserve our special thanks.
Like the faithful rivers of Maine that do their work under both frigid winds and the sun of sultry summers, rivers that now flow like muscles flexing under a thick hide of ice, the work of government draws from the headwaters of conflict and fertilizes the fields of justice.
Every evening, when I leave the office, I ask: Have we made Maine safer, stronger, better these past few years? Have we made our state more just? Have we strengthened the social contract we have with our citizens, perfecting, not neglecting, our obligations towards each other?
To answer this— Just ask the elderly woman who bravely testified against her own daughter for stealing her life’s earnings in a Bangor jury trial last year.
Ask the familes of the three people shot to death and set on fire in a car in Bangor. Ask about the months of intensive investigation and the four week long trial our office conducted to put those two murderous drug dealers behind bars.
Many more of our homicides involve drugs now and are difficult to solve. And 32 percent of our felony drug cases last year were for heroin, up from only 7 percent two years before.
With 961 babies born in Maine last year affected by drugs and 176 people dead from drugs in 2013, this epidemic deserves an intensive effort—from public education to punishment of dealers and treatment of offenders. Working with the MDEA, the US Attorney, the pharmacies, the medical community and advocates like Skip Gates, my office will take part in the all-out attack on the meth-makers and heroin traffickers who are killing our youth.
Like the couple in Lewiston who got subsidized housing vouchers for living in a building they owned and profited from themselves.
Like the man who bilked MaineCare out of nearly half a million dollars for counseling services he never provided.
Like the DHHS employee who diverted funds to her boyfriend, and like the DOL employee who bought a camera, an IPod, clothes and new tires for herself with someone else’s voc rehab funds.
And over the last five years our office recouped 69 million dollars in fines and restitution for provider fraud from pharmaceutical companies and others.
We’ve also spent hundreds of hours finding ways to help homeowners facing foreclosure and towns dealing with neighborhood blight.
We’ve collected many thousands of dollars in child support from deadbeat parents across the state, while our volunteer mediators recouped nearly $700,000 for consumers last year.
Because of a 58% increase in child abuse in Maine, our child protection attorneys now carry caseload of more than a hundred apiece, and they make app. 140 court appearances every week.
Among those cases is the 12-month old child whose brain was shattered by a father ill-prepared for parenthood, a case that tears my heart out.
We are also protecting victims of hate crimes, like the Iraqi refugee and war hero who came to Maine looking for sanctuary but ended up sleeping in his car out of fear from the racial epithets and violent threats from a biased neighbor.
We have helped negotiate severance payments for hundreds of hard-working millworkers laid off when the Bucksport mill closed. Today they received their first checks.
A few weeks ago, drowned out by the din of political rhetoric, my office and the Chief Executive settled the Aldrich case that will take nearly a thousand of Maine’s neediest citizens off the infamous waitlist for services.
Some have said, “Why don’t you work better with the Governor?” Well, it’s true, you probably won’t catch Gov. LePage and me sitting down sharing a glass of Chardonnay, eating Brie and watching Downton Abbey together. Not likely. But I do respect the Chief Executive. And I do think we have some things in common: We both like “straight talk.” We both speak our minds. We both believe in action. We both get upset when people steal from the public purse. We are both determined to end domestic violence. We both despise the drug dealers that are killing our youth. We both oppose the scams that rob our veterans of their hard-earned dollars. Like the old Jimmy Cliff song says, we’ve got “many rivers to cross…” But we both believe, fundamentally, in the Rule of Law, the knowledge that our country is governed by laws, not by individuals.
The Rule of Law is what informs the work of our office. Like Mt. Katahdin shedding its cloak of frost and nourishing the streams and fields of Maine, the constitution and the rule of law are the source of all our laws, the foundation for governance.
That is why, on any given day, you will see my office working with the departments of state government and representing the state in nearly 7,000 separate legal matters. We work together; and, for the most part, the interests of my office, the interests of the Maine Legislature and the interests of the administration are aligned.
When they are not, you will know about it. And on the thousands of occasions when they are running smoothly, you will hear little. But know that this happens. And it is for the public good, mindful still of the necessary independence of the constitutional officers.
For the constitutional officers are the brackets, the wedges, the independent glue that secures the beams and rafters of government, that fixes them to the solid long ridge beam that is our Constitution. Working with diligence and integrity, we will hold the beams and trusses of government sturdy against the strongest of winds.
In the coming years, my door will always be open to the administration and to those from all branches of state government. We will work with a spirit of openness, with a passion for the people whose lives we are all here to protect.
We recognize that every disagreement need not become a great divide, every loaded word someone’s Waterloo, every freshet of bravado a flood of conflict, drowning out compromise and progress.
Riverview, with its new building perched along the Kennebec, reflected in the polished State House dome, gives a false sense of comfort to those outside. We will work hard to better balance due process rights, the safety of staff and patients and the fiscal needs and safety of our state.
We will continue to work “cold cases,” 120 unsolved murders, even with only one attorney assigned to all of them.
We will modernize the Medical Examiner’s Office, finding the machinery and expertise to achieve national certification, to finish cases in timely fashion and bring closure to grieving families.
We will create ways for seniors who have been neglected and robbed to be heard effectively in our courts.
We will be vigilant about our Freedom of Access laws. I would love to expand those principles of transparency to other public health institutions where millions of dollars in taxpayer funds are spent in closed door meetings.
We will make sure lenders are offering the relief and foreclosure alternatives which the National Mortgage Settlement requires.
I will speak out against international trade agreements that jeopardize the health, safety and economic well-being of our citizens.
And in my new role as Co-Chair of the National Association of Attorneys General Tobacco Committee, I will be looking for new ways to snuff out the biggest cause of cancer and heart disease in our state and our nation.
This past year there were twenty-one homicides in Maine. We like to think that’s a low number. After all, we have one of the lowest crime rates in the country. Fourteen of those homicides were crimes of domestic violence.
Jason Montez, who was shot to death by his mother’s husband. He was only 12 years of age. Duwayne Coke, who was strangled to death by his mother’s boyfriend; he was 10 years old. Destiny Sargent, strangled to death by the same man; 8 years old. Noah Smith, shot to death by his father; seven years old. Lily Smith, also shot to death by her father who then turned the gun on himself; she was 4 years old. Sean St. Amand, left in a bath tub by his father with the water running and drowned; he was 11 months old. Korbyn Antworth, beaten and shaken to death by a babysitter; Korbyn was only five months old. And Zade Adams, asphyxiated by a parent at Christmastime. Three months old.
Eight children killed in one year. A first for our state. And we must never let it happen again. The lifeless hopes and dreams of these children and their need for justice will drive our work in the coming years.
Mario Cuomo challenged us forty years ago to make our nation “remember how futures are built,” stressing the need for government to operate as a family with care and compassion for those in need.
As the State of Maine chips away at vital services, at education, public health, drug treatment, mental health and the safety net of our citizens, we must recognize that these decisions may have consequences. They can be named: Jason, Duwayne, Destiny, Noah, Lily, Sean, Korbyn, Zade.
A year from now, will we be standing on a hardened frost, immobilized? Will we be looking at ourselves through sheer ice, unaware of impending dangers? Or will we be steering through moving waters, pulling together as a family, heading in a common direction and helping all the people of Maine stay alive and afloat?
I will be there to help navigate the shoals. | 2019-04-22T20:15:41Z | https://maineprogressiveswarehouse.me/tag/janet-mills/ |
1. Department of Urology, The First Hospital of Jilin University, Changchun, Jilin Province 130021, China.
2. Institute of Virology and AIDS Research, The First Hospital of Jilin University, Changchun, Jilin Province 130021, China.
3. Department of Nephrology, First Hospital of Jilin University, Changchun, Jilin Province 130021, China.
Tumor necrosis factor-related apoptosis-inducing ligand (TRAIL) is an effective chemotherapeutic agent that specifically impairs cancer cells while sparing normal cells; however, some cancer cells develop resistance to TRAIL. Here, we identified Andrographolide, a diterpenoid lactone derived from a traditional herbal medicine Andrographis paniculata, as an ideal sensitizer for TRAIL to overcome bladder cancer. Our results showed that combination treatment of Andro and TRAIL retarded growth, attenuated proliferation, decreased colony formation, inhibited migration and promoted caspases-mediated apoptosis in T24 cells. Additionally, the sensitization by Andro is achieved through up-regulation of death receptors (DR4 and DR5) of TRAIL in a p53-dependent manner. Crucially, Andro is also capable of inactivating NF-κB signaling pathway via transcriptional down-regulation p65/RelA, which is further contributed to enhancement of TRAIL-mediated cytotoxicity. These results indicated that non-toxic doses of Andrographolide sensitized bladder cancer cells to TRAIL-mediated apoptosis, suggesting it as an effective therapeutic agent for TRAIL resistant human bladder cancers.
Bladder cancer ranks as the 9th most frequently diagnosed cancer and is 13th in terms of deaths worldwide since 2012 . Although accumulating studies show that targeted drugs can improve patient survival rates, first-line molecular-targeted drugs (sorafenib and gefitinib) exhibit only limited therapeutic effects in several clinical trials and can cause severe side effects [2, 3]. Therefore, there is an increasing demand to explore effective strategies for bladder urothelial carcinoma (BLCA) treatment.
Tumor necrosis factor-related apoptosis-inducing ligand (TRAIL), has been reported as a candidate for cancer treatment due to its selective inducement of apoptosis in cancer cells while sparing normal cells [4, 5]. TRAIL specifically binds to cell-death receptors DR4 or DR5 (also named tumor necrosis factor receptor superfamily member 10 TNFRSF10A and TNFRSF10B, respectively), resulting in trimerization of the receptor and clustering of the intracellular death domain of the receptor and leading to death-inducing signaling complex formation [6, 7]. Trimerization of the death domains leads to the recruitment and activation of Fas-associated death domain protein, which promotes transmission of an apoptotic signal and induces apoptosis via both the extrinsic and intrinsic mitochondrial pathways [6, 8, 9]. However, evidence indicates that cancer cells can develop resistance to TRAIL if they lose the ability to express death receptors or exhibit constant activation of anti-apoptotic pathways [9, 10]. Certain malignant cells are resistant to TRAIL, including bladder cancer cells [11-13]. Therefore, identifying effective agents capable of overcoming TRAIL resistance in bladder cancer cells is necessary.
Andrographolide (Andro) is a diterpene lactone (C20H30O) and a major component of Andrographis paniculata Nees, which was used as a traditional anti-inflammation medicine in Asia [14, 15]. Andro can be excreted from the body over a short period of time while exhibiting low levels of toxicity to normal cells . Recent progress in Andro-specific research confirmed its effectiveness and specificity in promoting cancer-cell apoptosis . In this study, we discovered that Andro markedly improved the sensitivity of BLCA cells to TRAIL-induced apoptosis, and that combined treatment stimulated caspase- dependent apoptosis through p53 dependent enhancement of DR4 and DR5 expression. Additionally, Andro treatment attenuated mRNA expression of B cell lymphoma 2 (Bcl-2), cellular inhibitor of apoptosis 2 (cIAP2), X-linked inhibitor of apoptosis (XIAP), and nuclear factor kappa-B (NF-κB) p65 subunit (RelA). Our study provides evidence supporting clinical application of the combination therapy of TRAIL and Andrographolide for bladder cancer patients.
As DR4 and DR5 were canonical TRAIL receptors involved in its antitumor effects, we analyzed mRNA-expression data from the Oncomine database, finding that mean DR4 mRNA expression in bladder cancer tissues exceeded that in normal bladder tissue, whereas no significant difference was found in DR5 between tumor and normal tissues (Figure 1A). Furthermore, gene set enrichment analysis (GSEA) analysis of The Cancer Genome Atlas (TCGA) profiles from BLCA patients (n = 414) revealed enrichment of apoptosis pathways associated with samples exhibiting high levels of both DR4 and DR5 expression (Figure 1B). Therefore, bioinformatics analysis suggested that relatively high DR4/5 expression might represent an effective therapeutic TRAIL-related target in bladder cancer cells. However, MTS assays revealed that the 50% inhibitory concentration (IC50) value of TRAIL was 38.35 ng/mL, indicating that low concentrations of TRAIL would be ineffective in T24 cells (Figure 1C). This suggested the necessity to identify appropriate TRAIL-specific sensitizers capable of overcoming TRAIL resistance in bladder cancer cells. Moreover, Andro represents a potential agonist for TRAIL therapy, with MTS assays revealing an IC50 value for Andro of 101.5 µM in T24 cells (Figure 1E).
Both cell-counting and MTS assays suggested that single treatment with either TRAIL or Andro inhibited cell-proliferation rates. Interestingly, we found that combination treatment with TRAIL and Andro substantially enhanced this inhibitory effect on cell proliferation (Figure 2A and B). Additionally, morphological changes in TRAIL and/or Andro-treated cells confirmed the inhibition of T24-cell proliferation associated with combined treatment versus single treatment (Figure 2C). Moreover, colony formation dramatically decreased following combined treatment relative to that observed following treatment with Andro or TRAIL alone (Figure 2D).
Given that cancer cells exhibit potent migratory features, we conducted wound-healing assays as functional readings. The results indicated that treatment with TRAIL or Andro alone modestly decreased the ratio of migrating bladder cancer cells. In the TRAIL-treated group, the cell-migration ratio was 65.37 ± 2.47%, whereas that in the Andro-treated group was 79.65 ± 1.82%. However, combined treatment resulted in a migration ratio of 32.16 ± 1.59% (Figure 2E). Evidence shows that matrix metalloproteinases (MMPs) play important roles in tumor progression, invasion, and metastasis . Therefore, we evaluated protein levels of CD147 and MMP-9 by immunoblot, revealing that CD147 and MMP-9 were downregulated after a 24-h incubation with both TRAIL and Andro relative to levels observed following single treatment with TRAIL or Andro alone (Figure 2F). These findings demonstrated that combination treatment with TRAIL and Andro potently suppressed T24-cell growth and migration.
The canonical pathway associated with TRAIL-induced cell death involves binding to specific death receptors (DR4 or DR5) to initiate activation of extrinsic apoptosis [6, 7]. MTS assays suggested that in the combination-treatment groups, cell viability was further attenuated along with increasing Andro concentrations (Figure 3A). Immunoblot assays analyzing changes in protein content in T24 cells treated with TRAIL and/or Andro suggested that combined treatment enhanced caspase-dependent apoptosis based on levels of cleaved-poly (ADP ribose) polymerase 1 (PARP1; 119/89 kDa) and activation of caspases 3, 9, and 8 (Figure 3B). We then evaluated the roles of Andro in apoptosis progression using Annexin V-fluorescein isothiocyanate (FITC)/ propidium iodide (PI)-labeled flow cytometry. Compared with groups treated with TRAIL or Andro alone, combination treatment notably enhanced apoptosis rates in T24 cells (Figure 3C). These results showed that combined treatment of Andro and TRAIL promoted apoptosis in BLCA cells.
Additionally, we found that T24 apoptosis induced by combined treatment was initiated by caspase-specific activation that did not involve cell necrosis. T24 cell viability in the combined-treatment group was restored in the presence of the pan-caspase inhibitor Z-VAD-FMK (57.54 ± 4.99% for combined treatment without Z-VAD-FMK and 94.03 ± 3.77% for combined treatment with Z-VAD-FMK). By contrast, administration of Necrostatin-1 (Nec-1; a cell-necrosis inhibitor) did not alter the decreased T24 cell viability observed following combined treatment with Andro and TRAIL, with cell-morphological images supporting MTS assay results (Figure 3D).
Immunoblot assays identified that Andro treatment upregulated protein levels of both DR4 and DR5 (Figure 4A). To determine whether one or both receptors were responsible for the pro-apoptotic effect of TRAIL in T24 cells, we used small-interfering (si)RNAs to block innate DR4/DR5 translation (si1201 and si955 targeting DR4 and DR5 mRNA, respectively) according to their knockdown efficiency determined by quantitative reverse transcription polymerase chain reaction (qRT-PCR) assays (Figure 4B). Following results demonstrated that cell viability was slightly restored in DR4-knockdown cells and restored to a higher degree in DR5-knockdown cells following combination treatment with TRAIL and Andro. Additionally, we observed no significant difference in cell viability between DR4- and DR5-knockdown cells (Figure 4C). Flow cytometry confirmed those from MTS assays showing that blocking DR5 translation was more effective at reducing the apoptosis rate as compared with blocking DR4 translation (apoptosis rates: 14.41 ± 0.21% in DR4-knockdown cells and 8.07±0.22% in DR5-knockdown cells) (Figure 4D).
Potential TRAIL-receptor mRNA expression in bladder cancer patients and the antitumor effects of TRAIL and Andro in T24 cells. (A) Log2-converted DR4/DR5 mRNA expression levels from the Oncomine database. (B) GSEA results showing that high DR4/DR5 expression was positively correlated with apoptosis-gene signatures. (C) T24 cells were treated with various concentrations of TRAIL for 24-h. (D) Two- and three-dimensional chemical representation of Andro derived from the PubChem Compound Database (https://pubchem.ncbi.nlm.nih.gov/). Red, grey, and light-blue nodes represent oxygen atoms, carbon atoms, and hydrogen atoms, respectively. (E) T24 cells were treated with various concentrations of Andro for 24-h. The p-value and IC50 values were calculated using GraphPad Prism software. Data represent the mean ± SD. *P < 0.05; **P < 0.01; ***P < 0.001 (n = 3).
TRAIL combined with Andro further inhibits T24-cell proliferation, migration, and colony formation. (A, B) Effects of TRAIL and/or Andro treatment on the T24 growth curve. Verification by cell-counting and MTS assays. (C) Images (200×) show T24 cells following treatment with TRAIL or/and Andro for 72-h. (D) Effects of TRAIL and Andro treatment on the colony formation of BLCA cell lines. T24 cells were treated with DMSO (control), TRAIL (2 ng/mL), or Andro (8 μM) alone or both TRAIL (2 ng/mL) and Andro (8 μM) and incubated for 12 days. Cell colonies (>50 cells) were counted using an inverted microscope (100×). (E) Effects of TRAIL and Andro treatment on T24-cell migration. T24 cells were treated with DMSO, TRAIL (2 ng/mL), and/or Andro (5 μM) for 18 h. Images (100×) show T24-cell migration after treatment. (F) Left panel: the protein levels of CD147. Right panel: MMP-9 in T24 cells treated with different concentrations of TRAIL (2 ng/ml) and/or Andro [4uM (+) or 8 uM (++)] for 18-h and measured by western blot. Data represent the mean ± SD. *P < 0.05; **P < 0.01; ***P < 0.001 (n = 3).
Because combined treatment enhanced DR4 and DR5 protein levels in T24 cells (Figure 4A), we performed GSEA of the TCGA profiles of 414 bladder patients, which indicated that both high TNFRSF10A and TNFRSF10B expression were positively correlated with the p53-signaling pathway (Figure 5A). Therefore, we constructed a p53-knockdown T24 cell line to explore the molecular mechanisms associated with Andro-mediated TNFRSF10B expression. Following qRT-PCR and immunoblot confirmation of p53-knockdown efficiency (Figure 5B), immunoblot results revealed that Andro enhanced p53 levels while p53 knockdown attenuated Andro-induced upregulation of DR4 and DR5 levels in T24 cells (Figure 5C). Moreover, MTS assays demonstrated partial restoration of cell viability in p53-knockdown cells compared to sh-ctrl T24 cells following combined treatment with TRAIL and Andro (control shRNA, 69.80±4.89% vs. p53 shRNA, 84.32±2.17%) (Figure 5D). Knocking down of p53 expression also contributed to attenuated synergistic effect of Andro for which decreased cell apoptosis rate in TRAIL-treated T24 cells (control shRNA, 23.88±0.77% vs. p53 shRNA, 13.99±0.88%) (Figure S1).
Here, we found that RelA (the NF-κB p65 subunit) was downregulated at both the mRNA and protein levels following combined treatment with TRAIL and Andro (Figure 6A-C). Additionally, combined treatment modified protein and mRNA levels of apoptosis-related genes, resulting in decreased cIAP2 protein levels (Figure 6A), Bcl-2 mRNA levels (combined treatment, 63.08 ± 1.54% vs. TRAIL or Andro treatment alone, 104.33 ± 18.3% and 90.76 ± 1.77%, respectively), and attenuated XIAP mRNA levels (which were stimulated by TRAIL treatment alone) following Andro treatment (Figure 6C). To confirm the role of the NF-κB pathway in regulating TRAIL-induced apoptosis of T24 cells, we used ammonium pyrrolidinedithiocarbamate (PDTC), a pan-NF-κB inhibitor. We found that the PDTC IC50 in T24 cells was 29.33 μM; therefore, we chose 5 µM as the appropriate concentration for further experiments (Figure 6D). MTS and fluorescence-activated cell sorting (FACS) assays revealed a synergistic effect of PDTC on the TRAIL sensitivity of T24 cells at relatively low concentrations (Figure 6E-G).
Andro sensitizes TRAIL-induced apoptosis but not necrosis in T24 cells. (A) TRAIL combined with Andro treatment inhibited the cell viability of BLCA cell lines. T24 cells were treated with various concentrations of TRAIL and/or Andro [2 (+) or 4 (++) or 8 (+++) μM] for 24-h, and cell viability was examined by MTS assay. (B) Protein expression of hallmarks of apoptosis in T24 cells treated with 2 ng/mL TRAIL or/and 8 µM of Andro for 24-h. (C) Effects of TRAIL and Andro treatment on apoptosis in T24 cell lines. Cells were identified by Annexin V-FITC detection following DMSO (control), TRAIL (2 ng/mL), and/or Andro (8 μM) treatment for 24-h. Histogram showing the apoptosis rates of all cell lines. (D) Images (200×) showing apoptotic cells after treatment under different conditions. Histograms of T24 cells treated with DMSO, TRAIL (2 ng/mL), and/or Andro (8 μM) and Z-AVD-FMK (0.05 μM) or Nec-1 (0.05 μM). Cell viability was determined by MTS assay after 24-h. Data represent the mean ± SD. *P < 0.05; **P < 0.01; ***P < 0.001 (n = 3).
DR5 is critical for Andro-mediated sensitization of T24 cells to TRAIL. (A) DR4/DR5 protein levels in T24 cells treated with TRAIL and/or Andro for 24-h. (B) Histograms of qRT-PCR screening for DR4 (left panel)/DR5 (right panel) siRNA optimization. (C) Cell viability of T24 cells transfected with either siDR4 or siDR5 or both and treated with a combination of TRAIL and Andro for 24-h. (D) Effects of TRAIL and Andro combination treatment on apoptosis in DR4-knockdown and/or DR5-knockdown T24 cell lines. Histogram showing the apoptosis rates of all cell lines. Data represent the mean ± SD. *P < 0.05; **P < 0.01; ***P < 0.001 (n = 3).
Activation of p53 expression is required for Andro-induced upregulation of DR4/DR5. (A) GSEA revealing that genes in the high DR4/DR5-expression group were positively correlated with signatures related to the p53-signaling pathway. (B) p53 mRNA (left panel) and p53 protein levels (right panel) in control shRNA- and p53 shRNA-transfected T24 cells. (C) DR4/DR5 protein levels in control shRNA and p53 shRNA-transfected cells treated with Andro [4 (+) or 8 μM (++)]. (D) Cell viability of T24 cells transfected with control shRNA or p53 shRNA and treated with a combination of TRAIL (2 ng/mL) and Andro (8 μM) for 24-h. Data represent the mean ± SD. *P < 0.05; **P < 0.01; ***P < 0.001 (n = 3).
Combination treatment with TRAIL and Andro enhances cell apoptosis rates through inhibiting the NF-кB pathway in T24 cells. (A, B) T24 cells were treated with 2 ng/mL TRAIL and/or 8 µM Andro for 24-h, RelA/cIAP2 protein levels and its quantification were assessed by immunoblot. (C) Histograms showing the relative mRNA levels of RelA, Bcl-2, and XIAP in T24 cells treated with TRAIL or/and Andro. (D) T24 cells were treated with PDTC at various concentrations for 24-h, and cell viability and IC50 values were measured using MTS assays. (E) T24 cells were treated with 2 ng/mL TRAIL or 5 μM PDTC or 8 μM Andro or with a combination of TRAIL and Andro/PDTC for 24-h. Cell viability was measured by MTS assay. (F, G) Cell apoptosis rates of T24 cells according to Annexin V-FITC detection. T24 cells were treated with 2 ng/mL TRAIL or 5 μM PDTC or 8 μM Andro or with a combination of TRAIL and Andro/PDTC for 24-h. Histograms showing the apoptosis rates. Data represent the mean ± SD. *P < 0.05; **P < 0.01; ***P < 0.001 (n = 3).
We performed MTS assays to evaluate the effect of TRAIL and/or Andro treatment on 5637 and UM-UC 3 bladder cancer cell lines. We found that the IC50 value for TRAIL and Andro treatment alone of 5637 cells was 15.19 ng/mL and 82.9 µM, respectively (Figure 7A), whereas that for UM-UC 3 cells was 75.00 ng/mL and 103.3 µM, respectively (Figure 7C). Both UM-UC 3 cells and 5637 cells were insensitive to low concentrations of either TRAIL or Andro, whereas combined treatment displayed a clear inhibitory effect on the cell viability of these TRAIL-resistant BLCA cell lines (Figure 7B and D). At 24-h post-treatment of UM-UC 3 cells with both Andro and TRAIL, cell viability was 71.54 ± 5.06% as compared with 92.65 ± 3.43% following treatment with TRAIL alone. Similarly, in 5637 cells, cell viability following combined treatment was 57.39 ± 8.31% as compared with 85.96 ± 3.76% following TRAIL treatment alone. Additionally, cell apoptosis rates determined by FACS revealed that combination treatment enhanced apoptosis in both 5637 and UM-UC 3 cells (Figure 7E). Moreover, the synergistic effect of PDTC on TRAIL induced apoptosis was also validated in both 5637 and UM-UC 3 BLCA cell lines (Figure 8). These results further supported that Andro sensitized multiple BLCA cell lines to TRAIL-mediated apoptosis by inhibiting the NF-κB signaling pathway.
Andro enhances TRAIL-mediated suppression of cell viability and apoptosis rates in other BLCA cell lines. (A, B) 5637 cells were treated with various concentrations of TRAIL or/and Andro for 24-h, and cell viability and IC50 values were measured by MTS assays. (C, D) UM-UC 3 cells were treated with various concentrations of TRAIL or/and Andro for 24-h, and cell viability and IC50 values were measured by MTS assays. (E) Effects of TRAIL and Andro treatment on 5637 and UM-UC 3 cell apoptosis. 5637 cells were identified by Annexin V-FITC detection following DMSO (control), TRAIL (2 ng/mL), or Andro (10 μM) treatment and combined TRAIL (2 ng/mL) and Andro (10 μM) treatment for 24-h. UM-UC 3 cells were identified by Annexin V-FITC detection following DMSO (control), TRAIL (10 ng/mL), or Andro (20 μM) treatment and combined TRAIL (10 ng/mL) with Andro (20 μM) treatment for 24-h. Histogram showing the apoptosis rates of 5637 and UM-UC3 cell lines. Data represent the mean ± SD. *P < 0.05; **P < 0.01; ***P < 0.001 (n = 3).
Enhancing TRAIL induced apoptosis through blocking NF-κB pathway is effective in multiple BLCA cell lines. (A) 5637 cells were treated with various concentrations of PDTC for 24-h, cell viability and IC50 values were measured by MTS assays. (B) Effects of TRAIL and PDTC treatment on 5637 cell apoptosis. 5637 cells were identified by Annexin V-FITC detection after DMSO (Mock), TRAIL (2 ng/mL), or PDTC (20 μM) treatment and combined TRAIL (2 ng/mL) and PDTC (20 μM) treatment for 24-h. (C) Histogram showing the apoptosis rates of 5637 cells. (D) UM-UC 3 cells were treated with various concentrations of PDTC for 24-h, cell viability and IC50 values were measured by MTS assays. (E) Effects of TRAIL and PDTC treatment on UM-UC 3 cell apoptosis. UM-UC 3 cells were identified by Annexin V-FITC detection after DMSO (control), TRAIL (10 ng/mL), or PDTC (40 μM) treatment and combined TRAIL (10 ng/mL) with PDTC (40 μM) treatment for 24-h. (F) Histogram showing the apoptosis rates of UM-UC 3 cells. Data represent the mean ± SD. *P < 0.05; **P < 0.01; ***P < 0.001 (n = 3).
The unique property of TRAIL triggering both extrinsic and intrinsic apoptosis making it a potentially effective anticancer agent [4, 19, 20]. Resistance of cancer cells to TRAIL-mediated apoptosis represents a major limitation to its clinical application . Therefore, identifying agents capable of enhancing TRAIL-induced anticancer effects is necessary. In the present study, clinical database analysis and GSEA revealed that mRNA expression of death receptors of TRAIL is positively associated with apoptosis signaling pathway in BLCA patients (Figure 1A and B). However, previous studies reported that human BLCA cells were resistant to TRAIL treatment . Thus, our findings that Andro, a natural compound, enhanced the sensitivity of BLCA cell lines to TRAIL-mediated apoptosis provided critical insight into a novel therapeutic strategy for BLCA patients.
In this study, we confirmed the synergetic effect of combined Andro and TRAIL treatment in bladder cancer cells, with Andro treatment enhancing TRAIL-mediated inhibition of cell viability, proliferation, migration, and colony formation and promotion of apoptosis in T24 cells. Consistently, we found that protein levels of two factors involved in tumor migration (MMP-9 and CD147) [23, 24] were decreased following combination treatment (Figure 2). A pan-caspase inhibitor (Z-VAD-FMK), almost completely restored cell viability of T24 cells treated with combination therapy, further supporting that Andro-specific increased TRAIL mediated caspase-dependent apoptosis in T24 cells (Figure 3). Another important finding was that combination therapy also increased TRAIL-induced apoptosis rates in multiple BLCA cell lines, indicating that Andro enhanced the anticancer efficacy of TRAIL independent of BLCA cell type (Figure 7).
Schematic map describing apoptosis induction of the TRAIL and Andro combination therapy.
TRAIL binding to its death receptors (DR4 and DR5), it initiates the formation of the DISC complex, which leads to activation of caspase cascades and induction of apoptosis . However, in cancer cells, pro-survival signaling pathways, including the NF-κB pathway, are activated to prevent TRAIL-induced apoptosis, with accumulating evidence supporting elevated NF-κB levels observed in bladder cancers [26, 27]. Two strategies should be considered to enhance the therapeutic efficacy of TRAIL: 1) enhancing the activation of apoptosis pathways and 2) suppressing pro-survival pathways.
We noted that T24 cells treated with Andro exhibited substantial increases in both DR4 and DR5 levels, which possibly contributed to TRAIL-mediated apoptosis. It remains controversial whether DR4 or DR5 represents the determinant receptor associated with TRAIL-induced apoptosis. Previous studies claimed that DR4 was more effective in promoting TRAIL-mediated cancer-cell apoptosis [28-30]; whereas other studies indicated DR5 was critical for promoting TRAIL-induced cancer-cell apoptosis . Here, by using siRNA targeting DR4 or DR5, we confirmed that both DR4 and DR5 were required for tumor suppressing activity by combined treatment with Andro and TRAIL in BLCA cells. Crucially, we noticed that silencing DR5 in BLCA cells is more effective in restoring the resistance for Andro/TRAIL treatment than silencing DR4, indicating that DR5 expression level is the major determinant for the sensitization by Andro in BLCA cells. Hence, we suggested that upregulated DR5 rather than DR4 enhanced TRAIL-induced apoptosis in T24 cells (Figure 4).
Our bioinformatics analysis of BLCA patients' data revealed a correlation between death receptors of TRAIL and the p53-signaling pathway. In consistent with previous studies , we confirmed that p53 expression is critical for Andro-mediated increases in DR4 and DR5 expression (Figure 5). Downregulation of endogenous p53 expression blocked Andro-mediated upregulation of DR4 and DR5 levels in T24 cells. Importantly, decreased p53 partially attenuated the synergistic antitumor effects of the combination treatment. Therefore, we assumed that other pathways were involved in cancer-cell apoptosis associated with combined Andro and TRAIL treatment.
The NF-κB-signaling pathway protects tumor cells from apoptosis by upregulating multiple anti-apoptosis genes . Accumulating evidence shows that activation of the NF-κB subunit RelA renders tumor cells resistant to TRAIL-mediated apoptosis . In the present study, we found that combined treatment of T24 cells with Andro and TRAIL decreased RelA expression at both mRNA and protein levels. Additionally, the mRNA expression of several NF-κB-regulated anti-apoptosis genes, including cIAP2, Bcl-2, and XIAP, was attenuated following Andro treatment. Therefore, we hypothesized that inhibiting the NF-κB-dependent pro-survival pathway by decreasing RelA expression might sensitize T24 cells to TRAIL-induced apoptosis. To further support our conclusion, we found that using PDTC (a pan- NF-κB inhibitor capable of suppressing both NF-κB-DNA binding and NF-κB-dependent transcriptional activity) enhanced TRAIL-mediated apoptosis and suppression of cell viability in multiple BLCA cell lines. These results suggested that the synergistic effect of combined treatment and associated NF-κB-pathway inhibition was correlated with the downregulation of RelA by Andro treatment (Figure 6), which agreed with previously reported results [33, 34]. As all our experiments were performed in vitro, thus it is still needed to assess the in vivo effect of the combination therapy of TRAIL and Andro on bladder cancer in future studies.
Our findings indicated that combined treatment with TRAIL and Andro increased DR4/DR5 levels and suppressed the NF-κB-dependent anti-apoptosis pathway, both of which contributed to BLCA-cell sensitization to TRAIL. In conclusion, these results indicated that Andro treatment acted synergistically with TRAIL treatment and offers a potential treatment option for patients with TRAIL-resistant bladder cancer.
RNA-seq data from the transcriptome profile in a bladder cancer dataset was downloaded from TCGA (https://portal.gdc.cancer.gov/repository; data release 10.1; February 15, 2018) and contained 414 bladder tumor tissues and 19 adjacent normal bladder tissue samples. TNFRSF10A and TNFRSF10B mRNA expression data from a previous study was downloaded from the Oncomine database (https:// www.oncomine.org/resource/main.html). GSEA was performed by GSEA 3.0 (BROAD Institute; http:// www.broadinstitute.org/gsea) . Data processing and visualization were accomplished by R (https: //www.r-project.org/) and GraphPad Prism (v7.0; GraphPad Software, La Jolla, CA, USA).
The BLCA cell lines T24, UM-UC 3, and 5637 cells were purchased from the Type Culture Collection of the Chinese Academy of Sciences (Shanghai, China), and cells were cultured in Dulbecco's modified Eagle medium (HyClone, Logan, UT, USA). All media were supplemented with 10% fetal bovine serum (Biological Industries, Cromwell, CT, USA). All cells were cultured under standard incubator conditions (37℃ and 5% CO2).
Andrographolide was dissolved in 10 mM dimethyl sulfoxide (DMSO) used as a stock solution, and recombinant human TRAIL (R&D Systems, MN, USA) was prepared in phosphate-buffered saline (PBS) containing 0.1% bovine serum albumin at 20 µg/ml. Z-VAD-FMK (HY-16658), Necrostatin-1 (HY-15760), and PDTC (HY-18738) were purchased from MedChemExpress (Monmouth Junction, NJ, USA). Antibodies included the following: caspase-8, caspase-9, RelA, caspase-3, and DR4 from Cell Signaling Technology (Danvers, MA, USA); β-actin, PARP1, and cIAP2 from Abcam (Cambridge, UK); p53 from Thermo Fisher Scientific (Waltham, MA, USA); and DR5 from Biolegend (307407; San Diego, CA, USA).
We used cell-growth curves and colony formation assays to evaluate the effect of Andrographolide and/or TRAIL on bladder cancer-cell proliferation. For growth assays, ~2 × 104 cells/well were seeded in a 24-well plate, treated with different concentrations of Andrographolide or/and TRAIL or DMSO (as control), and trypsinized, followed by resuspension and counting using a cell-counting chamber (Shanghai Precision Instruments Co., Ltd., Shanghai, China). Cell number was counted and recorded after 24-h, 48-h, and 72-h, with the optical density at 450 nm measured at the same time points.
For colony formation assays, ~200 cells/well were seeded in a 6-well plate with 2 mL medium, treated under different conditions, and incubated for 12 days, after which cells were washed with cold PBS and fixed with 4% paraformaldehyde for 20 min. Cells were then stained with 0.1% crystal violet solution for 15 min at room temperature, washed with double-distilled water three times, and air dried. Colonies (>50 cells) were counted using an inverted microscope (100×). All experiments were performed in triplicate.
100 × cell growth inhibitory ratio (%) = 100 × [(A × 450control - A450sample)/(A450control - A450blank)].
Cells in 6-well plates were washed twice with cold PBS. RIPA lysis buffer (Wanleibio, Beijing, China) was then added to the wells, followed by incubation for 15 min at 4°C. Whole-cell lysate was centrifuged at 12,000g at 4°C, and the supernatant was incubated with loading buffer and denatured at 100°C for 15 min, followed by sodium dodecyl sulfate polyacrylamide gel electrophoresis. The separated proteins were transferred to nitrocellulose membranes (Millipore, Billerica, MA, USA), and 5-bromo-4-chloro-3-indolyl phosphate and nitro blue tetrazolium (Millipore) were used to visualize the protein bands, with a Quantity One instrument (Bio-Rad, Hercules, CA, USA) used for imaging. Secondary antibodies included anti-rabbit IgG and anti-mouse IgG (Cell Signaling Technology, USA).
Cells treated under different conditions for 24-h were resuspended in 6-well culture plates, washed twice with cold PBS, and pelleted by centrifugation at 5000g for 5 min. Apoptotic cells were quantified using an Annexin V-FITC apoptosis detection kit (KeyGEN BioTECH, Nanjing, China). A FACS flow cytometer (BD Biosciences, San Diego, CA, USA) was used to analyze cell apoptosis.
Briefly, RNA isolated from cells was converted to cDNA using a reverse transcription kit (Transgen Biotech, Beijing, China). PCR amplification was performed using a Roche LC480 instrument (Roche, Basel, Switzerland) with SYBR Green supermix (Fermentas, Waltham, MA, USA), 1 µM of each primer, and 6 μL of diluted cDNA. Samples were amplified in triplicate. Primer sequences for glyceraldehyde 3-phosphate dehydrogenase (GAPDH), Bcl-2, XIAP, RelA, and p53 are listed in Table S1. Relative gene-expression levels were represented as ΔCt = Ctgene - Ctreference, with fold changes calculated using the 2-ΔΔCt method. GAPDH was used to accomplish the expression normalization.
The plasmids pRSV-Rev (12253), pMDLg/pRRE (12251), and pCMV-VSV-G (8454) were purchased from Addgene (Cambridge, MA, USA). The lentiviral vector plko.1 was obtained from Generay Biotech (Shanghai, China). The sequence for p53 shRNA (CCGGGTCCAGATGAAGCTCCCAGAACTCGAGTTCTGGGAGCTTCATCTGGACTTTTT) and flanked by EcoRI and BamHI sites (5′ and 3′, respectively) were inserted into the plko.1 vector. Viruses were propagated in 293T cells, the supernatant of infected 293T cells were collected, and viral particles were pelleted through a 20% sucrose cushion at 28,000 rpm for 90 min. Purified virions were stored at -80°C.
Synthetic siRNA [negative-control fluorescein (FAM) siRNAs, DR4 siRNAs, and DR5 siRNAs] were obtained from GenePharma (Shanghai, China). The cellular delivery of siRNA was performed using Lipofectamine 2000 (Thermo Fisher Scientific), optimized using various siRNA concentrations, and evaluated by fluorescence microscope and qRT-PCR. siRNAs sequences are listed in Table S2.
Differences among test groups were analyzed by GraphPad Prism software (v7.0; GraphPad Software) and SPSS (v20.0; IBM, Armonk, NY, USA). A P < 0.05 was considered statistically significant. A two-tailed Student's t test was performed to detect statistical difference between two individual experimental groups.
Andro: andrographolide; IC50: 50% inhibitory concentration; MTS: 3-(4,5-dimethylthiazol-2-yl)-5-(3-carboxymethoxyphenyl)-2-(4-sulphophenyl)-2H-tetrazolium; TRAIL: tumor necrosis factor-related apoptosis-inducing ligand; BLCA: bladder urothelial carcinoma; TCGA: The Cancer Genome Atlas; MMP: matrix metalloproteinase; DMSO: dimethyl sulfoxide; FITC: fluorescein isothiocyanate; GSEA: Gene set enrichment analysis; Nec-1: necrostatin-1; SD: standard deviation; shRNA: short-hairpin RNA; TNFRSF10A/B: tumor necrosis factor receptor superfamily member 10A/B; Bcl-2: B cell lymphoma 2; cIAP2: cellular inhibitor of apoptosis 2; qRT-PCR: quantitative reverse transcription polymerase chain reaction; RelA: NF-κB p65 subunit; XIAP: X-linked inhibitor of apoptosis.
We thank Junliang Chang and Yuanyuan Li for their technical assistance and Editage for editorial assistance. This work was supported by funding from the National Natural Science Foundation of China (81772183).
Conceptualization, Weiwei and Yuyou Deng; Methodology, Yuyou Deng, Haoran Guo and Ran Bi; Software, Yuyou Deng; Validation, Jiaxin Yang; Investigation, Honghuang Lan; Resources, Chunxi Wang; Writing-Review & Editing, Weiwei and Yuyou Deng; Visualization, Yuyou Deng; Supervision, Chunxi Wang; Project administration, Songling Zahgn; Funding Acquisition, Weiwei and Chunxi Wang. | 2019-04-18T18:47:33Z | http://www.ijbs.com/v15p0688.htm |
If we acutely examine the video "Rafale Vs F-22"
1. For most of this encounter, the ADA pilot is generally fighting SLOW and and at HIGH AOA for Rafale (remember the hard limit is 29.9 AOA), and the pilot keeps getting "release stick" on the HUD many times during the video.
2. At. :52 second mark, the ADA Rafale pilot calls a "FOX 2" at 26.2 AOA, 2.2G, 158KIAS.
3. At 2:05 mark, the Rafale is at 28.8 AOA, 2.3G, 153KIAS and again, is all over the F-22.
So it is safe to say, that this video is generally a "slow high AOA fight" for Rafale. The thing is, at times he is running into the same problem that the F-16 pilot faces at slow speeds, his nose cannot track the target anymore because he is up against his hard alpha limit. Although Rafale FCS does allow for slightly more Alpha/G than does F-16, but not by much.
Point is, if he goes up against a jet that has more nose authority at slow speeds (aka F-18/22/Sukhoi) than himself and fights wisely; he will be fighting an opponent that technically has more options than what he has.
Calling a Fox 2 at 26.3 AOA is really not much different than calling one at 31AOA (if he is in parameters) or even a gun kill. (Would either work in the real world, Who knows?) But Rafale/F-16/Eurofighter/Gripen cannot get to 31AOA because of FCS limits. Again, they have less options.
Like I said earlier, I like Rafale alot. Is it invincible -NO. I like F-22 alot, invincble -NO. This is just generally a pointless argument because we are just going by videos. Rafale fans can point and say, look we killed F-22! While Yanks can say, wait a minute here, F-18C killed Rafale!
The real info needed for comparison remains classified.
Last edited by f-16adf on 01 Oct 2018, 15:10, edited 2 times in total.
Well, at least, this discussion make me realized the difference in philosophy.
AOA seems far more important for US people, in France, it would be all about ITR and STR.
It's all about what the fight generates into. Some go slow, some not so. Every situation is different.
By what mechanism then did the AN/ASQ-239 Barracuda system jam the F-22's APG-77 in testing as that does imply detection of the radar in the first place ?
Because the systems on the F-35 were based on the systems of the F-22. It is as easy for it to detect the signals of a Raptor as it is it's own.
f-16adf wrote: All Rafale fans (Halloween, Cavok, Picard, Degrasse) have used a YT video (Rafale kills F-22) because they have no EM diagrams, or anything of actual intrinsic value to point out Rafale supposed superiority (and close coupled canard design advantage).
So it is rather hypocritical for them to use a video to buttress their argument; when conversely, a video exists (this time of F-18C killing Rafale twice) to point out that Rafale is not invincible. Rafale fans are silent about that. I have not heard any comments from them. Why is that?
Here is why I believe the RSAF F-15C claims. The Hornet's best turn rates and radii are mach .66 and under. At .76IMN I can tell you that an F-16 (any block) has better turn rates/radii than a Hornet. And the F-15 at that speed is not far behind. So it is entirely possible.
So when it comes down to it, you cannot prove your point anymore than I can prove mine.
And for the vid, it give not much details, but will not argue with you about that, we got some report in France about the pilots of our navy being "disapointed" by their first test against F18 ( it was Super Horner however). What does mean "disapointed", i let you figure that out.
In fact, we really agree about one thing: it's first the pilot's skills, then the plane.
I guess you seen that broadcast of a french network showing the first participation of the ADLA with Rafale at the airflag?
The score was 6-2 for the Rafale against F16, a clear victory, but still, Viper's pilots managed to have the upper hand 2 times with an older plane.
So a F18 C locking on a Rafale is perfectly possible.
It's all about what french air force claims. Can it be proven with the other side, or by a third party?
sprstdlyscottsmn wrote: Because the systems on the F-35 were based on the systems of the F-22. It is as easy for it to detect the signals of a Raptor as it is it's own.
Another thing is that F-35 RCS is also extremely small which means it's much easier to have effective EW against threat radar (AN/APG-77 in this case). It also makes it really difficult even for AN/APG-77 to detect and track it even without EW. Not so much with 4th gen fighters which have huge RCS in comparison.
And F-35 has extremely advanced EW system which is directly part of the most advanced sensor fusion engine in current fighter jets. This means it has huge amount of processing power available for signal processing and also has huge and extremely sensitive and powerful ESM/EW antenna in AN/APG-81. So it can gather much weaker signals than RWR/EW suites in 4th gen fighters and can direct more powerful jamming against threat radars.
Both of these things are not available in any other fighter besides F-22 and F-35. Advanced 4th gen fighters with next generation AESA radars and new sensor fusion architecture could theoretically have similar EW system as F-35. None of current 4th gen fighters have anything even close to it and none is really planned to. For example many current AESA radars are basically AESA antennas bolted on legacy MSA or PESA back-end. These will have serious limitations in ESM/EW capabilities compared to F-35 systems. Even totally new AESA radars in 4th gen avionics architecture are not going to have similar capabilities as they don't have the required level of integration. Not even Dassault Rafale which currently seems to have the most advanced 4th gen avionics system.
The core technologies in Arexis are ultra-wideband digital receivers and digital radio frequency memory devices, gallium nitride (GaN) solid state active electronically scanned array (AESA) jammer transmitters and interferometric direction finding systems.
are the leading Western 4th gens on this score but all will eventually improve with updates. I don't think probably enough attention has been highlighted on this side of electronic detection and support when you have the much flashier side of RCS reduction to focus on.
So getting a hit on the RWR once in a while... like a swimmer getting a brief glimpse of a shark's fin and realising that there's actually a pack of them in the vicinity. Smart move would be to get out of Dodge pronto.
Last edited by popcorn on 02 Oct 2018, 14:31, edited 1 time in total.
Sure with the latest ESM/EW technology (they are not really just RWR systems anymore) and enough computing power any transmitter can be detected at some range. 5gen fighters have the serious advantage that their own RCS is very small making the threat radars need to use much more transmitted energy to detect and track them. Detecting and tracking 4th gen fighters requires far less power due to their much larger RCS. LPI AESA radars try to use as little power as possible especially to track targets. They also have so small sidelobes that it's generally the main lobe that could be detected at useful distances. This means that ESM system in 5th gen fighter will have far easier time to detect and track transmissions from 4th gen fighters than vice versa.
GaN technology helps much more with jammer transmitters (due to higher power handling ability) to and not so much with passive ESM/RWR systems (although admittedly some). For example AN/APG-81 is far larger (meaning much more sensitive) ESM/EW antenna than any ESM/EW/RWR antenna carried in 4th gen fighters which do not use their AESA for such duties. This makes F-35 much more capable at detecting enemy radars than any current or foreseeably upgraded 4th gen fighter.
Not to say it would be impossible for 4th gen fighters to detect and even track F-35/F-22 from radar emissions, but it's really tough for them to do without being detected and tracked themselves well beforehand.
It's not impossible to detect, track or jam even the best LPI AESA radars, but it's really, really difficult compared to traditional radar systems. I'd say that Rafale with RBE2 AESA radar is going to be rather difficult radar to detect, track and jam.
Thanks for that interesting read. LPI stands for Low not Zero probability of intercept and that catalogue of techniques show how you can raise the probability. Obviously F-35/F-22 would still be heavily favored in a BVR duel but there does exist the possibility their radar could be spotted and allow opponents to orient accordingly and hope for an IRST track if the radar intercept is only fleeting and only allows for a bearing rather than track. I suspect with the Block 4 TR refresh and the increase of computing power the LPI algorithms will get even more devious lowering the probability of intercept for APG-81. Also DAS/EOTS are only going to get better reducing the AESA input into sensor fused tracks further lowering the probability again. I have no doubt that all round the F-35 is the best fighter on sale today and probably until PCA is born but it is not invincible when with a hell of a lot of luck and great tactics and flying required, its opponents just maybe able to do well against it occasionally or at least survive to live another day.
Gain sensitivity for return signal is run through a digital-filter and power amp, but we're still talking about RF active detection.
With passive systems for detecting RF, you need superb sensitivity, filters, and noise elimination, run through a very advanced processor to get bearing, bandwidth, and PRF (pulse repetition frequency).
That in itself presents a LPI problem that you really can't deal with, but there's more.
With linked F-22s or F-35s, they use sensor suite interleaving. Instead of a single ship fighter flying around running its AESA hot, you have 2-4 or more birds on a coordinated automatic hopset, generating tiny, incremental blips of RF across the freq hop net, being shared and coordinated with each other in a random sequence via MADL or IFDL in the F-22A.
You can add sensitivity to a 4th Gen ++ fighters' advanced integrated defensive electronic warfare suite, as well as processing power and more sensors like on the Rafale, and even link them together to get more resolution, but how do you overcome freq hopping and random waveform generation/PRF?
On top of that, how do you overcome interleaving?
Keep in mind that there is an ECM/ECCM back-and-forth countermeasures game with at least 6 generations of counters and counter-counters that predates the F-22 and F-35, including white noise, spoofing, PRF distortion for false vector and velocity, specific false target tracks, ghosts, doppler shift modulation games, and more.
With a triple (F-22) or quad (F-35) super computing CPU close-loop fused to all their RF sensors and the AESA, the EW implications are huge, to the extent that Growler crews are noticing that every brief now includes a lot of focus on EW that simply wasn't there before much in training in the fighter pilot community. The French are normally ahead of the power curve compared to most other nations when it comes to EW, but the F-22 and F-35 adaptive, super-computing EW suites and advanced linking with each other represent a true next generation EW challenge that even advanced 4th Gen systems are simply ill-equipped to counter. If you see something, it's to your detriment really in that type of environment, because who wanted you to see it and where are they?
And back to square one. In this hypothetical encounter, the F-22 net is watching the Rafale well before the Rafale has a chance to form some picture in the electronic spectrum. "He who sees first, wins." doesn't just apply to kinetic weapons, but the EW game as well.
Time to let go of the past and start asking, "What is France doing to answer the 5th Gen challenge?" If Rafale is a focus in that discussion, you've already failed.
Sorry, we french know nothing about electronic...we don't have advanced stuff, super computing thing... we just make good wine and love to our wives and mistresses all the day... Moreover, we play football with our feets!
Well in fact, a Rafale pilot against an F22 would keep his Radar turned off as long as possible relying on external sources to have a rough idea of the target's position ( Low frequencies radars, OTH radars, perhaps satelites and so on... 3 years ago we even tested a new kind of passive airborn radar wich use the reflexion of TV waves in a given airspace to locate a stealth plane ).
The best option would be to come close enough to lock on the F22 with the OSF. The range of the OSF and the range of the RBE 2 AESA in search and track mode should be close.
You still can focus the beam of the RBE 2 to a given aerea in order to increase the range, but it mean sending alot of energy to the target wich certainly also increase the risk of intercept.
Anyway, the F 22 would probably be Radar turned off too, with a teamate far behind and radar turned on.
And you'll probably have anothers patrols covering different angles to avoid a bad surprise.
The sky would be an electromagnetic hell, the both sides trying to jam each other ( and i guess even if they are not sure the enemy radars are emitting), one more time with planes at safe range or with ground based jamers.
So the 1 million dollars question: could a F22 ( the detecting plane in rear position, not the one who will effectively take the shot) defeat french jaming long enough, at let's say 60+Nm, to secure a kill, and fast enough to protect the forward plane?
And sure, there is alot of tricks to trap the enemy, like having a decoy plane strongly emmiting in order to bring forward the hostile planes, to surprise them and to attack them by flank or even better from the rear.
"Well, sometime you got a two handed sword and sometime you got a dagger... but that's the same old story of war! In the second case, you just got to be more clever!"
niafron wrote: Well in fact, a Rafale pilot against an F22 would keep his Radar turned off as long as possible relying on external sources to have a rough idea of the target's position ( Low frequencies radars, OTH radars, perhaps satelites and so on... 3 years ago we even tested a new kind of passive airborn radar wich use the reflexion of TV waves in a given airspace to locate a stealth plane ).
Problem for Rafale in that scenario is that F-22/F-35 have far lower RCS than Rafale does. This means the detection/tracking range is significantly lower for Rafale than for F-22/F-35. It also means that Rafale EW system is either not nearly as effective as those in F-22/F-35 or it needs to be far more capable/powerful to compensate. Much lower RCS in F-22/F-35 also means that RF guided missiles are going to have much harder time engaging them successfully than they do against Rafale. Lower RCS also makes it far more difficult for all the other radars on the battlefield to detect and track them than against Rafale. This includes all those low frequency radars, OTH radars and all other radars. Stealth might affect them less, but will affect still.
Another thing is that Rafale currently and in the near future has only Link 16, which is pretty easily detected and tracked with modern ESM systems. F-22/F-35 have LPI datalinks (MADL and IFDL) which make detecting their transmissions much more difficult (by several orders of magnitude).
Instead of Rafale, the same would be true for EF Typhoon, Super Hornet, Gripen, F-16 or any other currently (or in the near future) operational fighter aircraft. Rafale is IMO possibly the best of them, but it's not going to fare well against F-22 or F-35 in air-to-air combat on regular basis.
All of that is basically true.
Datalink especially is of great concern, we're expecting a Brand new one for the Rafale F4 ( L16 is still good, but too weak for the threats to come).
As i said, stealth design is a clear advantage ( the fact is you perfectly right, it also improve the capabilities of the EW suit, missile dodging... and so on).
Anyway, always keep in mind it is not plane against plane, a grand duel between two pilots and their mounts, but system vs system.
Hopefully, US pilots are amongst the best in the world, they know their job, they know what their planes can and can't do, and i guess, they know better than wasting time listen LM propaganda. | 2019-04-25T13:55:07Z | http://www.f-16.net/forum/viewtopic.php?f=33&t=28459&start=285 |
It took me several years to discover the true meaning of this term: to become conscious. What could it ever mean? Today, everyone is convinced of being conscious, and how can you blame them, because it’s believed that being conscious means simply deciding with your own head, and we all believe we can do it. We are used to believe that “making decisions with our own mind” means not allowing ourselves to be influenced verbally by other people; So there are some people who let themselves be influenced by what others say, and others who decide things without listening to what others have to say. That is why it’s very important to really decide on your own. But how clear is our own mind? For us, of course, it is crystal clear, yet below it is energetically influenced by the decisions of other people and this leads us to never really make our own decision because we are being influenced by external energies. Sometimes we are positively influenced, in the sense that in the end what we get is something positive though we have been influenced by others to make that decision; Other times our head is sabotaged when the thought of others is implanted in it, making us think about what someone else wants, and in the end let them take decisions for us. We don’t notice because we believe that “external” means what is outside our head, and that “interior” is what is inside it. We must remember that our head is simply material, and as such, external thoughts and energy programs, can go through it because it doesn’t have such a strong protection. Our internal thought is that of the Soul, and its way of thinking is too evolved to define it as a “thought,” as thoughts are thought words, imagined situations, and these derive from the brain, from the head. Our I (in Italian IO) is far more internal, it’s practically the only internal thing we have, because in fact our physical body is not really us, but it’s something outside of us that we use to live in this dimension.
Being aware, conscious is probably the most complicated technique of all, because when you realize at exceptional levels on how to being able to become conscious, then all other techniques will be a piece of cake. The first step is always the hardest one, then, when you know how to walk, it’s easy to learn how to run. Our head is continually influenced from the outside, because it itself is not completely protected, it’s not that impenetrable shelter we believe it is, it’s like a home, cozy if we want it to, but without keys, so it may also seem to be protected, given the big wooden doors, but with no keys, no locks, these doors aren’t so powerful. The ability of the doors is to create in our mind the thought that, having a door, it must be closed, so there is no need to even try to open it, because it would be a waste of time, “it is definitely closed!”. So many people then get blocked in front of a door, believing that they aren’t able to open it, ending up not even trying to open it. This is our natural defense, it’s an illusory barrier that makes us believe that we can’t get through someone’s head, that it’s an armored and protected place as a tank because it has apparently closed doors. Unfortunately, however, not all people think it in this way, because there are those who, seeing a closed door, are wondering whether it is really closed or they should make sure if it is, before giving up; So they will try to open the door, discovering that it wasn’t locked at all, it just seemed so. Just like those doors, our head is not locked with a key, you can enter it, and even more often than you can even imagine.
To be aware means to put a security guard to check our doors continuously. The big problem that come over us, is that we can’t afford to pay anyone or ask someone to do it in our place, because we are the only ones who can do it, it’s a task that can’t be left to anyone else. We can’t delegate this task to anyone even if we want to believe it, no angel and no god can do this work for us, because it’s our job, it would be like hoping that someone could open our eyes in the morning and opening them again every time we close them, for every second of our lives, for what reason. It is not feasible, it will be challenging, but you have to open it alone if you want to live your life in peace; Simply because if you don’t, nothing will change, no one will take the trouble to open your eyes in every moment of your life. For the same reason, if you want your soul to live life, you have to make an effort to keep your eyes open even when they want to close, remaining well aware of what’s going on inside your head.
Metaphorically, but not so much, to be conscious means to keep our heads under control every second, just as if we were blinking and every time we should open our eyes to see what’s going on. Unfortunately, you don’t open your eyes only once all day, but you have to blink your eyelids countless times throughout the day until you go to sleep and close them until the next morning.
In that time, you see nothing. That means you don’t know what’s going on around you, and not knowing it, you can’t stop it if something bad happens. Likewise, whenever you decide to close the eyes of your consciousness to put her to sleep, anything will happen and she will not react, because without seeing, she will not be able to know the problem or even solve it.
Since until now you haven’t trained your consciousness to stay awake, opening your eyes will be complicated, but keeping them open will be the most difficult thing. What can assure you is that from the moment your consciousness is awake and will be very alert, nothing will stop you because you will see every single problem and you will be able to solve it before it can enter your life. This consolation, however, doesn’t have to be seen as an illusion, because as long as you don’t decide to open your eyes, the problems will continue to be invisible and you will live in your fairytale world or in your hell world, imaginative in both cases. As long as you don’t open your eyes and see the truth, you will continue to imagine it, remaining very far from it.
Being aware every second of your day is really difficult, however, it’s feasible just as when you open your eyes after you have closed them. Sometimes it’s normal to abandon fatigue and go to sleep, deciding to be less conscious, but we are always unconscious from morning to night, during night even worse. There is no excuse, we have no alibi, no motivation is good enough to accept being so perennially unconscious. Real consciousness is not something that is accomplished once and then you can abandon yourself again to the unconsciousness of your mind as usual. It’s a building without elevators. The floor you have to reach is the 20th. You aren’t trained, so you will climb a few steps of the stairs for the first time, you won’t reach the first floor, because already you will be tired. Then you’ll have to go back home, so you’ll have to go down the stairs and go home, or you’ll throw your dead weight away down the stairs and return home with a lot more soreness. This happens when you decide to fall into unconsciousness all of a sudden, rather than taking the steps back to get into unconsciousness, anyway in a slightly less heavy manner, in fact, you will step down the stairs and this way at least you will be moving. The next day, you will still have to climb up to the 20th floor, but you’ll have to start over again, not from the first floor where you stopped, because the stairs don’t move, it’s you who needs to climb them. So you go up to the first floor, you’re tired, but if you went down the steps calmly the day before, you’re more used to the movement and so you’re more likely to climb up to the second floor. If, instead, you throw your dead weight down the stairs the day before, dropping heavily in unconsciousness out of control, then you’ll be tired and you will done half the stairs to the second floor. Then you have to come down again and go home. On the third day, you’ll have to start over again, but now you’re going to be confident, so you’ll take the run, you’ll step two steps at a time rather than one by one, so you’ll get much faster on the second floor, then on the third floor and stopping on the fourth floor because you’re tired. Anyway, you will be much higher than a few days ago.
And another day has gone, and now you can decide: stop climbing the stairs because today you want to rest, losing the habit that was forming, therefore returning to the lazy level of some days ago, or making a mental effort and decide to go back to that palace with strong determination to get as high as possible. When you go, you will realize that you could skip several steps at a time, even 4, because your legs are long enough, so by skipping 4 steps at a time, you’ll reach the sixth floor much before you expected to. When you’ll reach sixth floor, tired, but proud of yourself because you did it despite having no wish, you will realize that there is a secret lift that from the sixth floor will take you to all the other floors. You would never have expected that, because no one, except those who climbed to the sixth floor every day, knew the existence of that elevator.
This is consciousness, a continuous struggle, a war against apathy, which is armed to the teeth. There is no worse weapon to break our evolution than laziness. If you try to climb more than you think you can do, you will discover secrets that no one, except who lives every day in that vibration, knows it. Everyone will talk about the sixth floor as if it’s something they know perfectly, as if they live there, and yet they all live in the first and second floors of this palace, they have never even tried to get up to sixth. Therefore, despite the fact that everyone can swear that there is no elevator, until you don’t get up to go to the sixth floor you won’t know. Obviously, all this is a metaphorical passage, in order to learn the concept of evolution.
strength to overcome that pitiful obstacle. If we have decided to stop at 3 km, here we won’t even move two more steps, not a chance we will decide to travel 4 km, thinking that otherwise, for what imaginary reason, 4 could suddenly become 10 and we don’t want to travel 10 km per day. That’s what we invent in our minds because we don’t want to understand that pushing it slightly further than the usual program will not create any kind of problem. If we don’t like running 4 km, then we can go back to 3, nobody in the world will oblige us to keep the 4 km just because we have tried them; So why not try them out? Why don’t you want to know that feeling? Why stop on the second floor, if you can get to the third? Don’t think about the tenth, focus on the third. It will be easier to deal with, because it’s not said that after the third you will be forced to go to the fourth floor, you could safely decide to stop at the second, but at least you will know what the third floor hides. Discover it with your eyes. The example of the steps is by no means a coincidence. When you become confident with your mind, from which until recently you had complete detachment even though you thought you were fully aware of it, you will find out from time to time that it will be much easier to reach the same stages you had left. As you have noticed since practicing meditation, the first time it was very difficult to know where the chakras were; today, though you may not feel them well yet, however you know where they are. This is a very important step because you got more confidence with your body than before, which was basically almost unknown in this area. So, if you first had to sit down and place your fingers at a point, then move your fingers away from the insecurity that made you wonder if it was really the right place or if you were to place it higher or lower, your fingers are much quieter because you know what the right point is. This will speed up your meditation a lot, not having to waste time looking for the exact point of the chakra. This is what I mean by jumping two steps at a time, because by practicing meditation, like any other technique, you will find yourself learning to do it better and so you can speed up the process by getting to the level in minutes when previously it took you at least half an hour. However, this shouldn’t make you forget the importance of preparation, because if you decide to skip important meditation passages because of the too much hurry to reach higher levels, you would never get there and rather you’ll stay at the same level; If, for example, you decide to climb the stairs with your eyes closed, sooner or later, by jumping from step to step you will stumble and injure yourself, finding yourself unable to climb up for at least a few days, losing your habit and returning back to square one. Even the injury is obviously a metaphor, indicating that if you hope to reach high levels by trying to skip fundamental passages, such as relaxation, (metaphorically, look at the steps you have in front of yourself instead of walking blindly) and preparing before any technique, you will end up failing not knowing how to do it properly, and then sooner or later you will give up by believing that it’s the technique doesn’t work instead it was you, you had a wrong approach to the technique. If you want to reach a much higher meditative state, you must devote yourself to preparation, which is a fundamental step. So, to become conscious there are fundamental steps that you shouldn’t skip, otherwise, you will simply never reach the highest level. There is little to be angry, you can also hate the stairs, but those won’t move for you. So, in order to become conscious, certain workouts must be carried out, without these you won’t be able to go higher and improve your awareness. The first fundamental point is to understand what you really want to achieve. It is useless that I tell you that to gain consciousness means to become conscious, since having never practiced awareness on anything, you don’t know where to start. That’s why we have to go step by step, you can’t reach the tenth floor if you don’t know how to climb first, it’s a fact. The goal of gaining consciousness is to allow you to recognize every single moment when someone or something is influencing you, how he is doing it, and how you prevent it from changing your life. If you really understand that your routine is completely influenced every second by others thoughts, then you’ll realize that you want to be free of it because you feel it is a necessity. If you don’t understand of being in a cage, obviously you don’t ask about the key to try to get out. The theory wants to show you the reasons why you should decide to go out, but if you don’t open your eyes and do not look at the bars personally, you will never feel the strength inside that will push you to fight for your freedom.
Then the first work inside you that you could do, is to ask yourself where those feelings suddenly come from. Why, suddenly, you feel tired if you didn’t feel like that until a few minutes ago? Work fatigue comes during the hours, not from moment to moment. Why has this happened so suddenly? From when do you feel this way? Answer these questions when you feel tired. Why did you feel frightened and small when someone talked to you? No matter what words he told you, he didn’t have a knife in his hand, so what exactly did you fear? Why did he scare you so much? What exactly happened to cause you this distress and anxiety? Learn to reason, because thinking inconsciously, and to reason for your own decision are two very different things.
Then ask yourself questions that you need to answer with intense reflection, also thanks to the information you are learning in these documents; Not answer as you always did, it would make no sense. Try to make more efforts, to do that step that you’ve never done, climbing to a higher level to understand what exactly happened at that time. I don’t ask you to force to reason in an unnatural way, I’m just ask you to try not to give the unconscious answers you would have given yesterday; today you have to go up a step higher before looking at that problem: you will notice it is more external than you believed. This exercise will help you to reason a little bit more, to be more active and then react to situations, rather than being subdued by anything and endure answers you’re sure to not being yours, but formulated by laziness to keep you from looking for real solutions.
Obviously, this exercise to ask questions, is not “taking conscience”: for that technique takes a long time. Without questions, and therefore without answers, you won’t reach your conscious, but you will be unconscious, with incomplete answers for rest of your life. So this is a fundamental step. Ask yourself why you suddenly start thinking of a person and get angry with her for past situations, though, at this precise moment, she hasn’t done anything wrong. Why should you do it? What is a good reason? Are you sure to be sane? Or are you enduring a strange influence that wants to attack her through you?.
The second incredibly important step to gain consciousness at this time is the conscious prana breathing. Well yes. If you, right now, decide to take a breath of prana, you are doing something that was unexpected, because you’re deciding to breathe prana even outside meditation, so, you’re deciding to get conscious even now. Of course, this will not really make you conscious the the highest levels, but it will be a great first step to begin with.
From this moment, commit in breathing prana, at least 5 times during the day, outside meditation. Decide to breathe prana when you’re at work when you’re spending money when you’re cleaning the floor. This will help you decide to be spiritual even when you are totally lost in the unconsciousness that the low want to absorb you in. You decide to give a tear to the moving sands that are sucking you under the ground, make a big breath and within you realize that you are deciding, even for a moment, to become spiritual even when you are doing tasks that in theory should subdue you to the low.
If you are wondering if this will suffice to make you a conscious person, it is a certain no, you don’t just breathe 5 times a day prana and then forget it again; This is a great start, don’t think about later, do as if it doesn’t exist, don’t hope to run for hours and hours a day suddenly as if it nothing, and don’t be afraid that you will have to do it, that’s not the point. For 5 times a day, you decide to breathe, just prana breathing. It’s not impossible and is not useless at all. Take 5 moments a day, separate from each other, where you are performing the most normal tasks, and try to remember to breathe prana: it will be very difficult, the low will be like the floating sands that will completely make you forget about it. This is the challenge: breathing prana is simple, to remember to do it, it’s the most complicated thing at all. Do it when you’re angry, do it when you’re sad, do it when you put your shoes to go out, do it when you’re folding your shirts, do it when you press the pc buttons, do it when you’re opening the supermarket door. At any time, I assure you it will be very difficult, and that will make you realize that you are unconscious, because remembering a banal passage like “breathing prana”, will look like the most complicated thing in the world. If when you’re going out of house thinking you have to buy milk, when you’re in the store, you’re likely to remember to buy it; But when you get out of the house thinking you have to breathe prana 10 times when you’re in the shop, 10 times you will forget it. This will tell you how much you are unconscious, because even when you think you remember about it and you raise your ego saying “wow, I remember it! I’m not unconscious!”, Soon after you won’t practice it, you will remember to have to do it but you won’t do it. Thinking about breathing prana is not so useful if you don’t decide to do it in practice.
Because, there will be many times that, although you will remember that you have to do it, you won’t do it, you don’t know for what reason, it only requires a single and only conscious breath, yet something inside you will refuse to make that conscious breath lasting one second. Why? For what reason? What exactly is preventing you from becoming conscious? Don’t underestimate this technique, it will make you realize how much you are unconscious and, in this case, humiliate you and make you discover that you can’t even remember such a quick and easy thing to do, it will make you understand the importance of conscious breathing. Then it will be a beginning to understand how much you are unconscious. In fact, the purpose of the conscience is just to make you aware of how unconscious you are, so the more you discover it, the more you accept it, the more you become conscious. As has always been known, whoever believes he knows everything and boasts to the others of his enormous knowledge, he doesn’t even know a slightest but of all that surrounds him. When he really knows something, he’ll realize that he is ignorant, and he will be ashamed of himself, because until recently he was convinced he knew a lot of truths.
This exercise will be very useful especially when you will feel tired, angry and sad. In these moments, you will not have the slightest desire to breathe prana, actually, you will have a total refusal to do it that will almost make you hate the fact of just thinking of deciding to do it. It’s not normal to hate a thought, what sense does it have? Who is pushing you to this behavior?Although it seems difficult, make a conscious breath, and if you feel the need, make another two. With your astonishment, you will realize that by breathing you will not feel angry as before. You will come to think of a valid reason not to feel so sad. This is a beginning of conscience, that moment when, although the body refuses and hates with all its forces the thought of breathing, you’ll do it anyway, and you suddenly feel good.
Don’t read these words just to throw them in the trash later on, practice them, from right now, do practice every day, just like this you’ll find out that it’s true, otherwise you will never get results, you will be locked in the same identical point as you are now. To complain about the laziness that prevents you from doing it will not change your position: if you don’t open your eyes by yourself, no one will open them for you, no one will pity you enough to the point of sacrificing their life for opening your eyes every time you close them, you’ll be blind until you decide to open them.
This document is the translation of the original article (https://www.accademiadicoscienzadimensionale.com/archives/20262) on the Dimensional Consciousness Academy website.
When we say “Prana” we intend the most pure energy present in this dimension, which is white and luminescent.
Therefore, “Breathing Prana” means breathing the purest and most luminous energy in the universe inside us.
In the upcoming articles, you will find more information about the Prana. | 2019-04-19T01:19:55Z | http://dimensionalconsciousnessacademy.com/the-starway-to-consciousness/ |
London: James Carpenter, 1820. Two volumes complete - Volume One - xlvi, , 50-175pp, and Volume Two - 148pp. Contemporary full morocco, semi-raised bands, spines in six panels, title in gilt to second panel, volume number to fifth, remaining panels gilt with flower corner pieces and central fleur de lis, covers with thick and thin fillet bordering an anthemion roll frame with a central arabesque, gilt roll to edges, gilt flower roll to inner edges, watered silk doublures, a.e.g. with attractive fore-edge paintings to each volume; volume one showing four cherubs frolicking in an urn and volume two showing an old man under a blanket talking to a cherub who is holding a cup. Slightly rubbed to extremities, small ink spot to upper cover of volume one and lower cover of volume two. One or two spots of foxing, some off setting from frontispiece on to title, frontispiece probably lacking tissue guard, but generally bright and clean. Each volume with Selborne library stamp to foot of reverse of title and once to bottom margin of text leaf, volume one with small book label of Marion C. Walker to reverse of silk endpaper, small amount of glue remnant where a previous owners' book plate has been removed. Pencilled note to endpaper stating the book was from James Toovey's library (possibly the glue remnant mentioned above, it could well have been an oval bookplate like Toovey's); another pencilled note in the same hand notes that the binding is by Edwards of Halifax, though there is no direct evidence of this. The fore-edges appear to be initialled but I cannot make the initials out. The fore-edges look, to me, like they have some age, but Weber notes that most fore-edge paintings are twentieth century in origin. Reprint. Full Morocco. Very Good. 12mo. Fore-edge Painting.
Neu-Market, Va.: Salomen Henkel, 1820. Woodcut frontispiece and titlepage vignette. 12mo. Original cloth backed, paper covered boards, decorated with woodcuts of an elephant and a rooster. Boards very lightly stained. Internally bright and clean. A near fine copy, in original condition. Styled "Second edition" on the titlepage, though with a pagination conforming to the first edition. A charming speller and alphabet book for children, produced by the Henkel family press in New Market, Virginia in 1806. Led by the renowned preacher, Paul Henkel, they established the first Lutheran publishing house in the United States. The Henkels published numerous Christian catechisms, hymn books, and other works. The present title is a wonderful example of their pedagogical efforts, designed to teach children to read and spell in German, thereby perpetuating German culture and language in the United States. SWEM 8228. SHAW & SHOEMAKER 1569.
Serampore [India]: Printed at the Mission Press 8vo (20.5 cm; 8.125"). 649 pp.. 1820 First and apparently sole printing of any portion of the Bible in Bikaneri (a.k.a.Vikanera), a Marwari language of the Rajasthan region of India. The text is in Devangari characters with an added title-page in English that reports the text was "translated from the originals into the Vikanera language by the Serampore missionaries." The title-page also makes clear that this was meant to be vol. V of a complete translation of the Bible, but that project was never completed and it seems no other books of the Bible have been translated into the language. The non-English title-page reads, in transliteration: "Svaraki sagali katha, jake adamyamkem uddharavei aura calanavei codem karyochem, u, Dharma pustaka, unko chedalo virada, va mhakem taranavala Bhagavanna Yisukhrishtaka phayadaki, Mangalika vatam." => The paper used for the text seems to be native-made laid stock. WorldCat and NUC combine to locate only six copies in U.S. libraries, one of which is this one, properly deaccessioned. Provenance: Ex–Colgate Rochester Crozer Divinity School library; properly deaccessioned. Contemporary boards covered with blue paper a bit scuffed, soiled, and with areas of wear; original paper shelfback replaced with cloth of a closely matching color. A very little library pencilling; no stamps.
Edinburgh: Archibald Constable and Co, 1820. Copyright date is 1820, 1st edition, 1st printing.Scott, Sir Walter. Ivanhoe. Edinburgh: for Archibald Constable and Co, 1820. 3 volumes. With half-titles, first volume wanting leaf 79/80, second volume lacking one preliminary leaf, third volume lacking leaf 15/16. Period half-calf over marbled boards, rebacked, with light wear to extremities. Early ownership inscription to half-title leaves (dated 1821), some detached leaves, generally clean though with some minor stains and light foxing in places, a few short closed tears. First edition, first issue of this classic work. . 1st Edition. hard Covers. Good/no dust Jacket. 7¾" - 9¾" Tall. Collectible.
ANON - FORUM OF NERVA.
Original ink drawing of Forum Transitorium from c. 1820.
- Unsigned. 47,8x30 (57,5x42) cm. In newer goldframe.
XXXIV (34) Kupfer zur Altdeutschen Baukunst.
London.: T. Cadell and W. Davies., 1820. Hardcover. Very Good/Not applicable. 8vo - over 7¾ - 9¾" tall. Thomas Stothard.. 1st edition with Stothard copper engraved plates. Volume 1 has 92 pages of preface and life of the author also FULL bibliography of his works & vignette title page + 429 pages. Volume 2 has 415 pages and vignette title page as called for, 20 copper engraved plates + 2 vignette titles. Complete & Collated. Original 1820 cloth boards as sold, original printed paper labels on spine. Uncut edges to paper, wide margins and all on hand made paper. Condition. Some intermittent foxing, quite mild to just noticeable, mainly to several plate edges rather than pages, etc. Some foxing but light and infrequent. Last page of volume one has central crease due to careless closing and one plate torn without loss, (would repair) at page 213 of volume 1, no loss clean single tear. Cloth very good with a split started at head of volume 1 and corners a little worn. NICE period association Inscription to both volumes of "Laura Isabella Hoare. The Gift of her Affec't Sister, Mary A Prince (nee Hoare) 19th April 1839". **Both these ladies were part of the original Quaker bankers, the Gurney Barclay Hoare families, who became the global banking company Barclays, who were not without the stink of corruption in banking at the end. Tall octavo (23 x 14.5 cm or 9.2 x 6 inches). TWO Volumes. VG. 1820 *This is the adult version of the tale with Crusoe escaping the Island, settling in the Americas, involving himself killing natives in heated revenge with other English & Spanish sailors and eventually travelling to China and other Asian destinations.
London: R. Ackermann, 1820. xxviii, 115pp, ; 24 plates. Handsomely rebound by Temple Bookbinders in full morocco, raised flat bands, spine in six panels, title and author labels to second and fourth panels, remaining panels gilt, covers with double panel design, inner panel with black onlay, elaborate gilt borders, gilt to inner edges with marbled endpapers. Internally some light soiling and offsetting, some plates with faint offsetting from text but generally clean, folding plates a little creased at outer edge, plates with stab-holes to outer margins. Twenty-four colour aquatint plates by T.Sutherland, G. Maile and J. Bluck after Vidal, (four folding). Housed in a modern morocco-backed cloth drop-back box with raised bands, spine in six panels, title in gilt to second panel, author to third, date to foot, with silver flower device to fourth and fifth panels. "English interest in South America flourished after the capture of Buenos Aires by Commodore Sir Home Popham and Colonel Beresford in 1806 ... Ackermann exploited the widespread and substantial interest in South American affairs that these events had aroused, through a number of fine publications including these views" (Thomson - The Exotic and the Beautiful).Tooley 495, the "only notable colour plate book dealing with the Argentine"; Abbey Travel 698; Thomson 31; Colas 3000; Brunet V:1182/83. First Edition. Hardback. Very Good. Folio.
Zeichenschule in Umriß und Ausführung. Zwei Hefte zu je 12 Blatt. Gezeichnet, lithogr. U. gedrkt v.L. Ekeman Alleson.
- Kreidelithographien mit mittlerer Trennlinie um 1820. C. 25:35,5 cm. Nicht bei Winkler.- Heft 1: Rasenstücke, Häuser, Felsen, Geröll, Baumstümpfe, ast- und Blattwerk, Bäume. Heft 2: Perspektive, Bäume, Bauernkaten, Ruinen, Uferböschung, Aquädukt. Als Direktor der 1821 neu errichteten lithographischen Schule in Stuttgart wurde der aus Schwden gebürtige Lithograph und Maler lorenz Ekeman-Allesson berufen. Er war 1806 mit seiner Mutter auf ein Rittergut bei Jena gezogen, wo er als Landwirt ausgebildet werden sollte. Doch nach Ende der napoleonischen Kriege wandte er sich dem Kunststudium in Augsburg, München und Wien zu. Seine Zeichenschulen mit Naturstudien waren beliebte Anleitungen zum Zeichenunterricht an den Kunstschulen und Akademien.
London: Rodwell & Martin. Very Good. 1820. First Edition. Hardcover. Blue lightly scuffed leather with a bit of color fading and light edge ware. Blind stamped with a border. Raised bands with gilt decorated panels. Sixty full page tissue protected engravings and three vignettes. (8) ,197 and (3). Deckle page edges. Prior owners book-plate. English Text; Engravings; 4to 11" - 13" tall; 197 pages .
Fatherless Rosa or, The Dangers of The Female Life.
London William Emans [Thomas Kelly] 1820. 8vo. 522pp. + 1pp plates list and 1pp. ads to rear (including an ad for Huish's "Castle of Niolo" published in 1820 and "The Castle of Inchvally" by Stephen Cullen presumably an Emans reprinting of the 1796 work). Original endpapers (including an admonition against borrowing label to the front pastedown), internally clean and sharp. A very superior copy. The frontispiece portrait of Huish is present, as is the general engraved title page bearing the Kelly imprint (issued with the first installment of the 22 parts) followed by the Emans title page. It's likely that seeing as the two publisher's shared the production responsibilities for the work they issued two title pages at some point before the final installment was issued in 1821. The BL copy only has the Emans title page (as far as I can recall), and the Huish portrait is frequently missing. Regardless any imprint is scarce. Montague Summers himself only possessed the 1834 edition. A really splendid piece of Gothery.
Gales and Seaton. Hardcover. Washington, 1820. 12mo, [iv], 409 pp. Contemporary paper covered boards. Expanded to include 23 states, including Alabama and North Carolina. The first edition, published a year earlier, included just 21 states. A good copy with fraying and chipping to paper at spine, foxing to contents and contemporary ownership marks to endpapers. Contents complete. Please contact us for additional pictures or information. Seven copies in OCLC. Cohen, Bibliography of Early American Law 3014 . Good. 1820. Second Edition.
Oeuvres complètes de Voltaire. 70 Bände (so vollständig)! [Text Französisch].
Vollständiges Taschenbuch für Kunst- und Lustfeuerwerker und Liebhaber dieser Unterhaltung, zur Erhöhung und Verschönerung ländlicher Vergnügungen, besonders bey Volks- und Familienfesten. Nach den neuesten und besten Hülfsmitteln bearbeitet.
Geographie und Statistik Wirtembergs, der Geographie erste.zweite.dritte Abtheilung.
Woldemar. Erster und zweiter Teil in 2 Bänden (komplett).
Treuttel et Würtz 1820 - 1822. Ensemble six volumes in - 16 (143 x 92 mm), veau noisette, dos à cinq nerfs orné, décor central à froid sur les plats, filet noir, dentelle à froid et dentelle or en encadrement, dentelle sur les coupes et intérieure, tranches dorées (reliure signée Vogel). Orné de 10 eaux - fortes par Duplessis - Bertaux, et 6 gravures d'après Moreau. Bel exemplaire (malgré de petits défauts d'usage, frottements sur deux charnières et quelques coiffes, rousseurs). // Set of six 16o volumes (143 x 92 mm), chestnut calf, spine tooled raised on five bands, central blind tooling on covers, black fillet, blind and gilt dentelle borders, dentelle on turns - in and inside, edges gilt (binding signed Vogel). Illustrated with 10 etchings by Duplessis - Bertaux, and 6 engravings after Moreau. Nice copy (despite litlle defects of use, rubbings on two hinges and some top and bottom of spine, brownings).
Detroit: Sheldon & Reed, 1820. 20th-century cloth, gilt leather labels. Library ink stamp on titlepage. Light foxing and soiling to text, some minor wear. Very good. Early laws for Michigan Territory, including a reprinting of the ordinance creating Northwest Territory. Michigan Territory, established in 1805, included the present states of Wisconsin, Minnesota, and Iowa as well as part of the Dakotas. Michigan gained statehood in 1837, at which point the remaining land area fell under the title of Wisconsin Territory. Scarce and early for the region. SHOEMAKER 2253. AII (MICHIGAN) 46. SABIN 48747.
Die Alterthümer der heidnischen Zeit Schlesiens. (Band I - alles !).
New Orleans, 1820. Modern paper boards, paper labels. Moderate foxing and browning. Very good. An expanded variation of this interesting Louisiana legal item, after its first appearance in 1818. "Las Siete Partidas" translates as "The Seven Parts," referring to the number of principal divisions. This work is a compilation of the customary laws of Spain, the civil law, and the canon law, collected by four Spanish legal consults under Alphonso X in 1250 and promulgated as law in 1348 by Alphonso XI. At the time of publication, the laws were still in force in Louisiana, Texas, and Florida, especially those sections relating to water law. Sabin quotes Ticknor's SPANISH LITERATURE in calling this "A curious and learned work." COHEN 3645 (ref). SABIN 42244. SHAW & SHOEMAKER 2019.
Johann Andreas Naumann's. Naturgeschichte der Vögel Deutschlands, nach eigenen Erfahrungen entworfen. herausgegeben von dessen Sohne Johann Friedrich Naumann.
Edinburgh: Archibald Constable & Co., and Hurst, Robinson, & Co. (pr. by James Ballantyne) 8vo (22.2 cm, 8.75"). viii, 510, pp. (pagination skips 66-85).. 1820 Beautiful edition of gathered verses by Sir Walter Scott, containing "The Bridal of Triermain," "Harold the Dauntless," "William and Helen," and what the advertisement calls "all the Smaller Pieces, collected for the first time in the recent edition of the Author's Poems" — decorated with a fore-edge painting. The Fore-edge: Simple but charming design of six bright butterflies in red, orange, yellow and blue. Provenance: Front pastedown with armorial bookplate of John Train. Binding: Contemporary maroon straight-grain morocco framed in wide gilt border and panelled in gilt single fillet, spine with gilt-stamped title and decorations, board edges (at corners) and turn-ins with gilt roll. All edges gilt. Binding as above, moderately rubbed; hinges (inside) slightly tender. Front free endpaper verso with inked ownership inscription. Light to moderate foxing throughout, pages otherwise clean.
- altkol. Umrißkupferstich v. F.A. Schmidt n. Radl b. Wilmans, um 1820, 37,5 x 52,5 Seltene Ansicht. Untere Ecke links mit restaurierter Fehlstelle.Im Himmel kleinere Abschabungen retouchiert. - Mit Wasserzeichen "Turkey Mills. J. Whatmann".
Portrait König Friedrich Wilhelm III. Pastell.
MEISSEN. "Ansicht von Meissen unterhalb der Brücke am rechten Ufer". Blick über die Elbe auf die Albrechtsburg, im Vordergrund Frauen beim Wäsche waschen.
- Aquatinta in Sepia von C. Rordorf nach Arrigoni bei G. Weiss & Comp., Dresden, um 1820, 17,5 x 26 cm. Nagler, Rordorf Nr. 1. - Malerische, hübsch staffagierte Ansicht über die Elbe. Schönes, sauberes Exemplar.
Nuovi pensieri su la pubblica istruzione considerata nei suoi rapporti con la liberta' e col governo di Giorgio Masdea.
Edinburgh: William Laing, 1820. 38pp. Heavily foxed on title page and rear endpaper.Covers worn and chipped at spine. Very scarce. . Assumed First Edition. Paper covers. Good+.
Wilhelmine Reichard, erste deutsche Luftschifferin, bey ihrer 15ten Luftfahrt im Prater zu Wien 1820.
Rheinuferansicht mit St. Martini ('Village Sur Le Bord D'un Canal').
Gesamtans, vom rechten Rheinufer aus, "Cöln. Cologne".
London: John Fairburn, 1820. First Edition. 1 vols. 8vo. Contemporary boards, black stained edges, rebacked and with new corners, some internal foxing, else a nice, crisp copy. First Edition. 1 vols. 8vo. "The Bible of the Reformers". The first edition of a book which led the battle for electoral reform in 19th Century England, being a compilation of the financial, political, ecclesiastical, and nepotistic abuses which were sustained under the institution of rotten and pocket boroughs, and which brought about the passage of the Reform bill of 1832. The Bill redistributed 143 parliamentary seats to industrial areas, providing more proportional representation, reducing the traditional powers of the large landowners and the aristocracy, and strengthening the British system of parliamentary democracy.
193 kolorierte Kupferstiche von Fr. Stöber aus der "Wiener Zeitschrift für Kunst, Literatur, Theater und Mode". Wien ca. 1820-30. Lose.
- 193 kolorierte Kupferstiche von Fr. Stöber aus der "Wiener Zeitschrift für Kunst, Literatur, Theater und Mode". Wien ca. 1820-30. Lose. Thieme/Becker XXXII, 83 und 228. - Eigenständige Wiener Damen- und Herrenmoden-Entwürfe, die damals ohne weiteres mit den Pariser Moden konkurrieren konnten, von Franz Xaver Stöber (1795-1858) nach Zeichnungen Philipp von Stubenrauchs (1784-1848) gestochen. - Leicht gebräunt.
Washington City, 1820. 16mo. Contemporary three-quarter roan and marbled boards. Extremities worn, front board nearly detached but cords sound, one signature starting, foxing, some minor dampstaining. A sound copy. The fourth edition listed in Sabin, after the first edition of 1801. This copy is signed in pencil on the titlepage: "L[aFayette] S[abine] Foster's Washington Jany. 15 1831." Foster was a member of the Connecticut State Assembly for many years, and a member of the U.S. Senate from 1855 to 1867. After the death of President Lincoln, he became president pro-tem, and was presiding officer from April 5, 1865 to March 2, 1867. As a conservative republican, he was against repealing the Fugitive Slave Act, the Missouri Compromise, and the Lecompton constitution for Kansas. From 1878 to 1879 he served as a commissioner from Connecticut to settle the Connecticut-New York boundary dispute and buy Fisher's Island. Jefferson's MANUAL... was published shortly after he took office as President. The Virginia polymath sets forth rules of order and procedure - probably more dictating to the legislature than would be tolerated these days. SABIN 35887. AMERICAN IMPRINTS 1789.
Edinburgh: Archibald Constable and Co., 1820., 1820. First Edition, First Issue, with page 159 misnumbered, then pagination compromised until end of volume I. Three vols, octavo. Bound without half-titles or terminal ads although preliminary advert leaf bound in volume 1, and all three fly-titles present. Original marbled boards respined and recornered in brown calf to style, all edge marbled. Rather bold armorial bookplates of Admiral and Mrs Robert Lay Page, with both signatures to titles. Internally clean but for a little spotting to first and final leaves, some rubbing to boards. A very good, presentable copy of this classic Medieval adventure set during the Crusades, in which the legendary Robin Hood makes an appearance, initially under the name of Locksley. The character that Scott gave to Robin Hood and his band of 'merry men' helped shape the modern notion of this figure as a cheery noble outlaw.
WIEN. - Laxenburg. "Laxenburg bei Wien in bildlicher Darstellung". Sammlung von 16 Blatt.
- 16 Lithographien von Jakob Alt, Joh. Rupp, C. Bschor und Alb. von Radmannsdorf, 1820 - 1826, von ca. 28 x 38 bis 40 x 51 cm. Nebehay-Wagner 359. - Die Folge (im Ganzen 55 Blatt) ist als Privatdruck auf Befehl Kaiser Franz I. in sehr kleiner, nicht für den Handel bestimmten Auflage erschienen. Die Tafeln, die neben Ansichten auch Interieurs zeigen, sind nicht numeriert und haben keine Titelbezeichnung. Vorhanden sind: Das alte Lustschloß, Carolinenhain, Gotische Brücke, Lusthaus im Eichenhain, 3 Tafeln mit dem Ritterschloß (von der Ostseite, vom Überfahrtsplatz, mit Knappenhof), Westseite des inneren Hofraums, ferner Rüstkammer, Waffensaal, Prunksaal, Kapelle und Burgverließ. - Wenige Tafeln mit geringem Lichtrand, einige mit leichten Stockfleckchen im breiten Rand. Im Ganzen wohlerhalten.
Biographie nouvelle des contemporains, ou dictionnaire historique et raisonné de tous les hommes qui, depuis la Révolution Française, ont acquis la célébrité par leurs actions, leurs écrits, leurs erreurs ou leurs crimes, soit en France, soit dans les pays étrangers.
London: Longman, Hurst, Rees, Orme, and Brown,. Very Good-. 1820. Second. Hardback. Brown leather boards; a little scuffed and marked; corners slightly bumped; backstrip detached on left-hand side - binding exposed, but intact; boards attached, and intact. Gilt borders + gilt decoration on spine still bright; gilt titling on dk red panel at head. pp lightly spotted, but supple. ; 8vo (5 1/2" x 9"); 452 pages .
Um 1820. - Mit Bleistift eigenhändig bezeichnet "von Tivoli aus". Auf festerem Velin. Das Blatt deutet den Blick in die weite Landschaft an und entstand vermutlich im Zeitraum zwischen den Jahren 1818-23, in denen sich Olivier gemeinsam mit Julius Schnorr von Carolsfeld in Italien aufhielt. - Eins von zwei gleichartigen Blättern, die von Dr. Wilken von Alten als Olivier bestimmt wurden und von denen sich das andere im Besitz der Bremer Kunsthalle befindet (rückseitig alt entsprechend bezeichnet), unten mit einem kleinen Ausstellungszettel "Friedrich Olivier" mit handschriftlichem Zusatz "Orig. Aust. Zettel Nr. 58 der Bremer Kunsthalle". Provenienz: Sammlungen Woldemar Kunis, Sachsen (Lugt 1921), Sammlung Arnold Blome (mehrfach verso, klein recto nicht bei Lugt). - Minimale Fleckchen im Randbereich. Obere Ecken mit Resten einer alten Montierung. Sprache: Deutsch Gewicht in Gramm: 2100 3,8 x 21,5 cm. Papier: 17,6 x 21,5 cm. | 2019-04-20T05:20:27Z | https://www.vialibri.net/years/1820/1450 |
-Methylation has become a hot topic in the functional health world with both good and bad information being presented everywhere.
-Methylation is just one of limitless biochemical pathways that can be influenced by lifestyle and diet.
-Although methylation can’t be fully controlled, we do now have plenty of evidence on how to positively influence it.
-Genetic and lifestyle factors can inhibit your ability to methylate in the body.
-Being a key feature of many crucial biochemical processes, impaired methylation can severely impair health, fertility, detox, neurotransmitter balance, DNA repair and much more.
-We all have genetic variations, some significant, some not. Genetics may load the gun, but environment and lifestyle pull the trigger.
In a society that is more focused on diet & exercise, weight loss, and physique rather than inner health building, and constantly seeking out the latest quick fix to feed our instant gratification addicted brains, we all too often fall prey to schemes that do not truly serve our health needs. Couple this with the paralysis by analysis created by an overabundance of good and bad information bombarding our cognition through stimulating gadgets permanently attached to our hands, we have found ourselves in the lowest quality of life and health ever, despite having the greatest technology ever. Makes sense if you don’t think about it.
With the vast majority of our trusted Physicians offering us a pill to suppress our symptoms, or simply recommending the ever vague “diet and exercise” most individuals turn towards exercise, health clubs, and trainers to move us closer to the life we so desperately want. Having started my career as a personal trainer and nutrition coach at the age of 19, I do not think this is a wrong first step but DEFINITELY an incomplete one. Health, fitness, and physique are NOT the same things. Yes, they can and should go hand in hand, but unfortunately in modern society that very rarely occurs. Instead we are over medicated, under nourished, over stressed, under rested, and focus on losing pounds through sheer sweat and willpower with the help of our social media cheerleaders, meanwhile completely overlooking the bigger picture of INTERNAL METABOLIC HEALTH. You cannot and will not every be able to outsmart your body…believe me, I have tried harder than 99.9% of most. As my motto goes, we must work SMARTER and harder.
Most health seekers, dieters, and weekend warriors alike have a general understanding of what is good and bad when it comes to nutrition. Real, clean food from the earth = good. Processed, chemically laden artificial food like material = bad. The more experienced may even go as far as to take some generic supplements while monitoring their macro-nutrients to hone in their nutritional needs. Although these are all good things to know, we must ask the more complicated questions such as, what about micro nutrient balance? Are my body’s systems even working properly? This is of course where Functional Health Practitioners, like myself, have stepped up to lead the charge in turning our health epidemic around. So, without further ado or tangents, let’s take a gander shall we?
I trust we’re all familiar enough here with macro-nutrients (carbs, fats, proteins) that we can skip the first drink formality and jump straight into the raunchy body shots of science. So, whereas macros’ provide the building materials and fuel for our body, micros’ provide the tools to make all the biochemical reactions possible! Right? Right! Good, so then what is doing the actual metabolic work, you ask? Those cool, little enzyme guys! And where do enzymes come from? Think back to college biology days. Were you asleep during the lesson on transcription and translation? Ah, yes. Those marvelous double helices (have you seen my lovely logo) in our chromosomes contain the genetic blue print to create enzymes from amino acids. Without enzymes, life would not be possible.
The body has thousands of enzymes that each play a specific role in promoting various pathways to facilitate all reactions in the body. Each enzyme needs cofactors to do metabolic work. You can think of it like a car being an enzyme, with oil and gas serving as cofactors. These cofactors are predominately the vitamins and minerals supplied from your diet and supplements. So, what happens if you don’t eat enough of a certain nutrient or your enzymes are not properly using said nutrient? The car don’t run!
I think most of us health enthusiasts can appreciate genetic differences and how those differences affect our ability to build muscle, burn fat, and generally take over the world. These differences not only affect our external physique, but more importantly (up for argument…kidding) our internal health!
Wildtype: a wildtype is the most common genetic sequence in a population. So, if 80% of us are rocking a specific gene sequence, then that is going to be considered the standard. Yes, this can shift over time through natural selection, or in our unfortunate case de-evolution.
Fields of study like epigenetics and nutrigenomics are expanding our understanding of how environmental and nutritional factors can affect the expression of our unique genetic and enzymatic differences.
Genetic science is some pretty complicated stuff, so this is very much the cliff notes version, but basically think of a SNP as a minute genetic difference. A genetic mutation could be a bigger alteration to DNA as a result from DNA damage, but for the sake of simplicity let’s just understand that if DNA is altered then enzymes are altered and the body’s ability to do chemical work is also then altered.
Despite being 99.9% genetically identical, we're all genetic mutants to some extent, it's just that not all of us can be as cool as Hugh Jackman running around with super metal claws.
-BRCA: a tumor suppressor gene that’s mutations have been linked to an increased risk of breast cancer.
-SOD: an antioxidant functioning gene that’s mutations have been linked to an increased risk of neurodegenerative diseases, such as ALS.
-APOE: an apolipoprotein producing gene that’s mutations have been linked to an increased risk of atherosclerosis and heart disease.
How can one gene be linked to so many diseases you ask?
To answer that we must dive a bit deeper into the underlying biochemistry.
-Glutathione production: most have heard of glutathione as the “master antioxidant” of the body. Without adequate glutathione our cells are very quickly damaged by un-checked free radicals. Think of what happens when you bite into an apple and leave it sitting out for too long…what happens? The apple starts turning brown as it’s cells begin to oxidize and react with the air around it. If you leave it out for long enough it will begin to decompose on the counter. This apple has obviously been stripped from it’s life source, the apple tree, and cannot regenerate it’s cells or combat this oxidation. Fortunately, thanks to the methylation/transsulfuration pathways our bodies can indeed combat this “browning” and “decomposing” effect.
-Phase 2 liver detoxification: the liver is responsible for the biotransformation and elimination of toxic chemicals in the body. To do this it transforms toxins into water soluble compounds that can be excreted through the kidneys in urine, in what is often described as a “two phase” process.
-Estrogen metabolism: as if hormones weren’t complicated enough already, it gets even more tricky when we consider the different ways in which they can be metabolized. Estrogen metabolites vary in their protective and damaging properties. Methylated estrone is more protective, where as other metabolites, such as 4-OH-Estrone can damage DNA. Methylation function is therefore extremely important in influencing our steroid hormone balance that directly controls our ability to burn fat, build muscle, reproduce, and much more!
-Nitric oxide production: methylation directly fuels the tetra-hydro-biopterin pathway which is chiefly responsible for the production of many neurotransmitters and nitric oxide. Nitric oxide is a potent vasodilator necessary for proper blood flow throughout the body.
-Neurotransmitter synthesis and metabolism: just like nitric oxide, the methylation pathway directly fuels the synthesis and degradation of many neurotransmitters, such as: dopamine, norepinephrine, epinephrine, serotonin, and histamine. Many individuals with mental/mood disorders have impaired methylation pathways. This can include drastic conditions such as autism or something more mild like general depression, and everything in between.
-Creatine and phosphatdylcholine production: creatine and phosphatdylcholine are the top two methyl group hoarders. A huge amount of our body’s SAMe (major methyl donor) is used up producing these two crucial molecules. Creatine is of course a primary source of ATP (cellular energy) production and phosphatdylcholine is a phospholipid that is a primary constituent of our trillions of cell membranes.
-Cell division: methylation is a key pathway in being able to properly produce new cells. If disrupted the body literally cannot properly heal itself.
-Gene regulation: methylation is the primary mechanism that allows our body to “turn on” and “turn off” genes. This can very quickly promote health and healing if working properly, or very quickly promote disease if impaired.
-DNA production and repair: the folate cycle, a key piece of the methylation pathway, is responsible for producing DNA bases. Obviously without being able to produce DNA we can’t produce properly functioning cells!
Literally every one of these functions could be its own full article, but that’s biochemistry for you!
Now, just like any gene, there are variations that affect it’s function.
The above chart shows the extensively researched MTHFR polymorphisms and their respective functional activity. As you can see someone with MTHFR 677 homozygous only has 25% functionality in the MTHFR enzyme. Let’s stop and think about that for a second…why don’t you scroll back up and re-read the functions of methylation and the conditions associated with poor methylation. Think about the potential risk associated with having the polymorphism in which you only have 25% enzyme function!!!
It gets even better when you consider that it is estimated that roughly 50% of the population has at least one copy of the above polymorphisms (677 or 1298)!! I myself am heterozygous for the 677 SNP, meaning my MTHFR enzyme is only functioning at 70% capacity. See the screenshot from my personal genetic report below.
This is a screenshot of one of my client’s most recent hormone tests. On this comprehensive panel, I can see how well a client is metabolizing their estrogens by looking at the downstream metabolite markers. In the above example, we see Estrone (E1) get hydroxylated to become water soluble and then is 2-OH-E1 in this case. This water-soluble metabolite is then ready for phase 2 liver detoxification by being conjugated with a functional group for excretion. This can be done through sulfation, methylation, and glucuronidation. In this case, we were looking at his ability to methylate his estrogen metabolites, and as we can see by the gauge it was quite low, meaning his overall methylation activity seems to be impaired. Now it’s not quite as simple as looking at the gauge shown, but his hormone panel did contain multiple clues to lead me towards the topic of impaired methylation.
So, I then began to educate him on the basics of methylation and some of the key factors that can impair it. When I explained how genetic variations like MTHFR or COMT can cause low methylation activity, he informed me that he had done a genetic test that’s report said he might have a hard time processing folates….BINGO. MTHFR confirmed! But wait…there’s more! I also explained how nutrient imbalances, or the use of inferior chemical forms of vitamins can also “clog up” the pathway by competing for entry, such as folic acid. What was his multi-vitamin of choice you ask? Well I don’t want to bash any brands, but I’ll simply say that it is a common supplement brand carried at most supplement retailers. Note: the majority of vitamin supplements in stores are folic acid based. Most clinical grade products are carried through health practitioners (see my online dispensary for such therapeutic grade products).
Estrogen dominance and mood disturbance symptoms were two of his biggest health complaints, and although methylation isn’t the end all be all, it is certainly a very important pathway that we now have the understanding to influence. It’s a significant piece to an endlessly complex puzzle that is the human body!
Now in this client case we were literally just beginning our work together and investigating hormone balance, but we ended up finding much more to work on than just his hormones as you can see!
So now that we’ve covered all the basics of methylation, the next logical step is to cover some key recommendations that are well documented in improving methylation functionality.
· EAT NUTRIENT-DENSE WHOLE FOODS: This really should be a no brainer, but obviously the better, more nutrient dense, and cleaner your nutrition, the better off all your pathways will be. Processed foods are often fortified with synthetic folic acid and contain chemicals and preservatives.
· EAT AS ORGANICALLY AS POSSIBLE: As stated above, the cleaner, the better. The more chemicals, pesticides, antibiotics, and exogenous hormones you can avoid, the less you will be burdening your system. Keep in mind not everything needs to be organic! Some foods are more heavily contaminated. I HIGHLY suggest downloading the Environmental Working Group’s Dirty Dozen and Dirty Dozen Endocrine disruptors lists. The dirty dozen are proven to be more contaminated with toxic compounds and should ALWAYS be organic. For your convenience, I have included the link here.
· EAT FOLATE-RICH FOODS (ESPECIALLY LEAFY GREENS): Uncooked leafy greens such as kale, arugula, collard greens, mustard greens, turnip greens, and romaine lettuce, as well as asparagus, broccoli, and avocados naturally contain high amounts of folate which can then fuel the methylation pathways, BUT only if the enzymes are working properly and if the necessary cofactors (vitamins and minerals) are also present.
· CONSIDER SUPPLEMENTING WITH METHYLFOLATE (L-5-MTHF): Supplementing can help bypass the MTHFR mutation, by giving your body the end product of what it can’t adequately produce. Be sure to start low and work your way up based on how you feel. Dosing for L-5-MTHF is highly individualized and can be as low as 200 mcg to 10 mg per day. Many physicians that have some education on the subject will assume that “more is better” and prescribe mega doses, which can be extremely harmful (something I’ve witnessed firsthand). If you have a negative response (anxiety, irritation, agitation, nausea, palpitations, insomnia, rash, headaches), you may have another mutation affecting methylation. You can supplement with small doses of niacin for immediate relief, as niacin “soaks up” extra methyl groups. Giving methylfolate can stimulate the body to detoxify faster, so if supplements are not tolerated, consider working on detoxification to reduce the toxic load first. This is not something to be taken lightly and I highly encourage you to work with a Functional Practitioner with training in methylation and nutrigenomics to address. Contact me here to fill out a client application form.
· SUPPORT DETOXIFICATION: Since methylation drives detoxification pathways you want to make sure to support these processes with nutrient dense foods, exercise, sweating, sauna, Epsom salt baths, drinking plenty of water, enemas, and other methods.
· AVOID FOLIC ACID: Folic acid is a synthetic form of vitamin b9. Folates occur naturally in foods such as dark green, leafy veggies. Folic acid is often in lower quality supplements and vitamins, as well as many vitamin fortified foods. Folic acid competes for entry into the cells with more beneficial folate forms, such as methylfolate. Folic acid also has a 5x greater affinity for cell receptors, meaning it is more likely to be absorbed, however it is less bioavailable and can greatly impair the methylation pathways. Folic acid literally “clogs up” the methylation pathway! When new clients ask me if their pre-existing multi-vitamin is “okay”, the first thing I look at is the chemical form of vitamin B9. If it says Folic Acid, I throw it in the trash immediately. If it doesn’t distinguish the chemical form and merely says “B9” or “Folate” that also is a red flag.
· CONSIDER SUPPLEMENTING WITH CREATINE AND/OR PC: As pointed out above, methylation produces methyl donors that’s resources largely get consumed in the production of creatine and phosphatdylcholine. By supplementing with these two nutrients we can GREATLY conserve our methyl donors for other functions that may be severely lacking, such as neurotransmitter metabolism and detoxification.
· AVOID TOXINS: Many, many toxins can impair or burden these pathways. Heavy metals, pesticides, herbicides, BPA, and many more common toxins included. See the Environmental Working Group’s Dirty Dozen Endocrine Disruptors for more. Many types of toxins both endogenous and exogenous (from within the body or the environment) can speed up or slow down certain aspects of the methylation pathway. This goes beyond the scope of this article, but can very much make or break the outcome of a client’s healing progress.
· AVOID DRUGS AND MEDICATIONS WHICH DEPLETE FOLATE AND/OR VITAMIN B12: Metformin, Methotrexate, Nitrous Oxide [aka “laughing gas”], acid blockers and antacids, and oral contraceptives.
· MODERATE FOODS THAT COMPETE FOR METHYLATION NUTRIENTS: Green Coffee Bean and many teas can be very high in catechols, which require methyl groups to be metabolized, thus competing for nutrients.
· AVOID ALCOHOL: Man I’m starting to be no fun, am I?! You’ll thank me when you are healthier than ever! Besides being a potent hepatotoxin, alcohol is high in histamine (which must be metabolized through methylation) AND acetylaldehyde which drastically impairs methylation and detoxification. I am human (sometimes) and drink on occasion (a few times a year), but always take extra nutrients to avoid this negative mechanism.
· ADDRESS GUT HEALTH AND CANDIDA: “Address gut health” is very non-specific I know. Health truly begins in the gut and the GI tract is truly the foundation of our health. With that said, my point in listing it is to denote that working on methylation without also working on gut health is like cutting the grass while your house is on fire. Sure you’ll have a nice lawn…but that’s all you’ll have…other than a pile of ashes. Candida is a normal yeast that colonizes our GI tract and is responsible for the light white coating on our tongue. Go look at your tongue in the mirror right now. Is there a light white coating? Or a thicker, chunky looking coating? Candida is another topic that deserves it’s own article, but again in relation to methylation, it is an opportunistic yeast. Meaning that in an unhealthy gut environment it will grow out of control and can cause major health complications by itself. Yeast also releases tons of acetylaldehyde, which as I pointed out above directly halts the methylation pathways. This can literally cause an irritable, agitable, red/flushed, nearly drunken type demeanor.
· AUTISM, DOWN SYNDROME, AND RECURRENT MISCARRIAGE: If you or your child(ren) fit into this category, it is very likely that the MTHFR (and possibly other key snps) are present. MTHFR can drastically increase the rate of these three conditions and with proper intervention can very much be positively influenced. The mechanisms go beyond the scope of this article, but it’s very much worth pointing out. Autism behavior can be nearly eliminated or greatly exaggerated depending on the function of these systems. Keep in mind that the genetic trait DOES NOT MATTER AS MUCH as the ENVIRONEMNTAL TRIGGERS and CURRENT STATE OF PHYSIOLOGICAL/BIOCHEMICAL FUNCTION. AKA “genes may load the gun, but environment pulls the trigger” and “genes are your blueprint, but not your destiny”.
Although Methylation is a hot topic right now with many professionals jumping into the mix, we must keep in mind that the body’s biochemistry is extremely complicated and we do not fully understand all of it’s implications. Methylation is just one of many biochemical pathways and just because it’s what’s popular, doesn’t by any means that it should be focused on in isolation. With that said, there is more than ample evidence to support these suggestions to positively influence your health!
As a Functional Health Practitioner with advanced training in Methylation and Nutrigenomics, if you or a loved one are interested in getting professional help, please contact me here. | 2019-04-20T18:50:11Z | http://www.metabolicsolutionsllc.com/blog/are-you-one-genetically-bad-mthfr |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.