text
stringlengths
16k
189k
timestamp
stringlengths
20
20
url
stringlengths
15
841
GEMGOW is a platform for trading natural, authentic, unenhanced gemstones and precious metals. We encourage platform users to act in good faith and respect their partners. - post inaccurate, false data; post fraudulent data. Upon any of the above violations, the listing will be removed and the infringer’s account may be locked. By using the GG trading platform, you accept the User Agreement. GEMGOW DMCC, License No. 222825, registration No. DMCC65132, address: Unit No: 14, DMCC Business Centre, Level No 6, Jewellery & Gemplex 2, Dubai, United Arab Emirates (hereinafter the “Company”) shall publish this service agreement (hereinafter the “Public Offer”) on the website https://gemgow.com and GEMGOW mobile applications on the basis of iOS, Android, Windows mobile/ Windows Phone to provide means enabling individuals and legal entities to conclude deals on purchasing Goods and providing Services specified hereunder. Public Offer – public offer of the Company addressed to any individual and/or legal entity to conclude the agreement on conditions of this Public Offer including its Annexes, Company’s policies et cetera. Public offer shall be concluded between the User and the Company by means of registration on the Website https://gemgow.com. Accept – accepting of terms and conditions of this Public Offer by the User. The Company – GEMGOW DMCC, registered and acting under law of United Arab Emirates, represented by its Director Daniel Davidov acting on the basis of the Charter License No. 222825, registration No. DMCC65132, address: Unit No: 14, DMCC Business Centre, Level No 6, Jewellery & Gemplex 2, Dubai, United Arab Emirates. User – any legally capable individual or legal entity that accepted terms and conditions of this Public Offer to use services provided by the Company to sell and/or provide services related to natural gems. Website – the Internet website of the Company https://gemgow.com. Notion of the “Website” includes applications GEMGOW on the basis of iOS, Android, Windows mobile/Windows Phone, which are administered by authorized representatives of the Company and serve as a communication platform for placement of ads related exclusively to sale and provision of services related to natural gems and precious metals. In case the User is the legal entity, the Websites are used by authorized individual on behalf of the Company. Goods – natural gems and precious metals published by the User in the Ad on the Website to conclude deal with other Users on sale/purchase of goods hereinabove. Services – services including but not limited to gem-cutting, polishing, delivery services, which may be provided by the User after publishing particular ad on the Websites, or by the Company according to the User’s request. Account – personal account of the User by means of which the User administers ads on the Website. Personal data – information about an individual, which may be identified by means of the Website using. Publishing – activity of the User related to placing ads on the Website. Ad – materials including text, photos, videos and other objects related to Goods and Services, which the User intends to sell/provide to other Users of the Website. Applicable law - current legislation of country where the User sells Goods, or where the Goods shall be delivered, or where the Services shall be provided. User and Company shall be specified collectively as “Parties” of this Public Offer. In this Public Offer, notions used in noun save the same meaning in plural. Since the moment of registration on the Website, the User approves its legal capability and completely accepts terms of this Public Offer, without any restrictions and exceptions. The Company proposes the User services on publishing Ads including information about Goods and Services with purpose, including but not limited to further purchase of Goods and/or providing Services. All deals related to Goods and Services shall be concluded between Users directly. The Company is not a participant of deals between Users. The Company only represents communication platform for publishing Ads. The Company may remove materials published by the User in the Ad in case the Company reveals that the Ad is not related to includes but not limited to sale of Goods and providing Services in meaning of this Public Offer. The Users in their sole discretion agree conditions regarding delivery and payment for Goods/Services. The Company is not liable for delay/failure with payments and delivery the Users agreed concerning Goods published by Users on the Website. The User grants that gems, precious metals published by the User in the ad on the Website, are natural and really related to precious. In case the User publishes in Ads non-precious gems and metals, or posts non-precious gems and metals specifying them as genuine gems and precious metals, such User shall be banned on the Website without possibility to restore the Account, as well as without explaining cause of Company’s actions. Registered User has a right to publish Ads on the Website. Using of possibilities and services of the Website by the User means accepting obligations to follow rules, instructions related to the Website, as well as this Public Offer. The User grants that materials published by the User in Ads on the Website, as well as Services, do not contravene this Public Offer, quality standards, Applicable law and public moral. The User is liable for all actions related to using its email, phone number, password and other contact data used to enter the Website. The User is obliged to keep confidentiality of its password as well as not to disclose this password to third parties. In case the User provides the data hereinabove to third parties, the Company shall not bring liability to all circumstances occurred as a result of such providing. The User is obliged to modify data to enter the Website included but not limited to password, email immediately, in case the User has a background to suspect that data specified hereunder were disclosed and may be applied by third parties. The User is obliged to provide accurate and complete information about Goods and Services according to instructions published on the Website and this Public Offer. In case activity described by the User in the Ad requires license according to the Applicable law, the User shall provide scan copy of the license to the Company. Publishing the Goods on the Website, the User confirms its right and capability to sell published Goods or provide Service according to the Applicable law. The User is obliged to verify the information about Goods and/or Services published on the Website, and, in case of revealing incorrect information in ads placed by the User, the User shall correct the ad by means of publishing accurate information about Goods and/or Services. In case of impossibility to correct the information in the Ad, the User shall remove its ad with incorrect information or replace it with the new ad with correct and accurate data about Goods and/or Services. The Company has a right to replace, end or continue the term of Goods and/or Services demonstration because of technical circumstances under control or out of control of the Company. The Company has a right to terminate the demonstration of ads in case it violates this Public Offer and Applicable law. The Company may remove Ad and other content published by the User in case of request or demand of public authorities under Applicable law. • Publish ads in the rubric, which is not in accordance with the Ad’s content. • Publish ads where photo does not represent Goods/Services published by the User in the Ad. • The User is prohibited to publish stock photos or other download from the Internet. It is strictly prohibited to publish edited photos related to Goods and Services. • Publish Ads, which violate fair competition and contravene Applicable law. – Information that is contrary to Applicable law. – Publish only real, actual photo related to Good and/or Service. – Publish only real characteristics of Goods and Services, which correspond to characteristics of such Goods/Services. – Observe the rules of publishing ads, processing personal data and other provisions of this Public Offer and its Annexes. • If the User intends to pay for some services of Websites, description, value and other characteristics shall be available on the Website, the User shall use description of services and payment details provided by the Company on Websites publicly or sending the private message to the User through its account on Websites, according to the User’s request. • Request from the Company information regarding processing of Users’ personal data under the Personal Data Policy (Annex 1 to this Public Offer). In case of non-verifying the User’s identity by means of providing scan-copies of passport or driving license, the User’s account may be blocked for particular period of time but not exceeding thirty (30) calendar days. The Company shall not bring liability for such removing or blocking the User’s account. The User confirms its sole responsibility for the content of his posted ads, and also possesses all necessary rights, licenses, permissions to place information in Ads on the Website, including without limitation all patents, trademarks, trade secrets, copyrights, or has the corresponding the written consent, or authorization of all right holders of information, which is an object of intellectual property law. The User shall be responsible for the violation of intellectual property rights in accordance with Applicable law. The User shall bring liability under the Applicable law in case of non-providing the licanse or other authorization documents to the Company, if sale of Goods or provision of Services according to this Public Offer require such license or authorization document are required under the Applicable law. Publication of designedly unveracious information, i.e declaring Goods as genuine precious gem or metal when the Goods do not have these characteristics. Publication of stock, edited, downloaded from the Web photos related to Goods and Services. • include to the Ad references to resources, which include malicious elements. If the User’s content was deleted from the Website without the reinstating possibility, the Company also deletes all information published by the User on the Website. • Publication of information, which violates third party rights, on the Website. If the User’s records are deleted from the Site without recovery, the Company also deletes all information published by the User on the Website. • remove from the Website Ads and other content published by Users, which violate public moral. The Company’s decision to remove such content shall be final and not subject to appeal. • transfer the Website including all the information and personal data of its Users to its assignee. • contact the User by means of sending messages, telephone call, message to the email provided by the User on the Website as well as message to the User’s account through the Website. In case of performing activity contravening this Public Offer, Applicable law, public moral, the Company may block the User’s account for particular period of time or remove the User’s account from the Website permanently, without explanation of such removing. The Company shall not be liable for such removing. The Company may modify this Public Offer, as well as the Website services, or remove them, without any notifications and/or explanations to the User or liability for such remove. The Company shall do its best endeavor to perform the Company’s obligations under this Public Offer including but not limited to protection of personal data of its Users from third parties’ fraud or any other activity contravening Applicable law, permanent normal work of the Website. To maintain high quality of Website’s services, the Company may limit the number of active ads of the User and/or their size. In case the User paid for Services of the Company on Websites, and these services were not provided by the Company, the Company shall reimburse costs paid by the User for services for the period of time from when the User did not obtain services of the Website. The User undertakes to verify payment for Services to the Company by means of bank records, payment check or any other document recognized by Applicable law, which confirms payment performed by the User for Services, which were not provided. All objects available on the Website including but not limited to design elements, text, graphic pictures, illustrations, video, computer programs, apps, the Website’s program, code, music, sounds and other objects, as well as any other object published on the Website’s services (hereinafter the “Content”), is an object of the Company’s intellectual property rights. The Company grants the User a limited, nonexclusive, non-transferable license to view, download and print any publicly available content on the Website, or any other content on the Website the User has an access to, exclusively for the User’s lawful, non-competitive purposes. The User is prohibited to sublicense the licensed rights to third parties. The User retains all intellectual property rights to the content of the information posted in the Ad on the Website. The User grants the Company unlimited by term and territory, unlimited, non-exclusive right to use, publish, collect, display, copy, duplicate, reproduce, publicize the copyright, publications, photos, texts, databases and other materials owned by the User, as well as regarding the information provided to User, images and photographs on all known or unknown media. The User agrees that the text, photos, and other materials added to the ad can be used by the Company in the preparation of promotional materials, articles, reports, analyzes, etc., and used by the Company at its own discretion without the additional consent of the User, without payment of remuneration. The above rights are granted to the Company by the User free of charge without payment of remuneration. Content uploaded by the User contravenes rights, humiliates honor and dignity of other Users and/or third parties. Publication of other information prohibited to User under this Public Offer. The User’s Ad may by deleted for this reason because of claims of other Users or third parties. List of backgrounds to delete the User’s Ad by the Company is not limited to hereinabove. By registration on the Website, the User provides the Company with right to process the personal data. Collecting, processing and using of personal data of Users by the Company shall be regulated by Annex No. 1, which is an integral part of this Public Offer. Technical information such as IP-address of the User shall be performed in accordance with common rules of Internet-messages, as well as statistic aggregation, demographic information about the region where the User performed registration or concluded deal on the Website. This Public Offer shall enter into force since the accepting this Public Offer by the User and stays in force permanently. All disputes arising from this Public Offer Company and User shall try to resolve by means of negotiation and mediation. In case of impossibility to resolve such dispute by negotiation and mediation, it will be considered in Court order under the Applicable law. Dispute between the Company and Users shall be considered in court order according to the current legislation of United Arab Emirates. For any circumstances, the Company and the User shall do the best endeavor to resolve the dispute in ore-trial order by means of negotiation. By registration on the Website, the User provides the Company with right to process the personal data. Rules on processing Users’ personal data shall be specified in Annex 1 to this Public Offer. By using our website, you agree to use and store cookies on your device. You can browse our website without cookies, however, in that case some services otherwise available to you may be restricted. In addition to that, you can delete any cookie saved on your device at any chosen time. See guidelines on removing cookies in the manual for your browser or device.
2019-04-18T22:32:55Z
https://gemgow.com/en/categories/jade-rough
"It's like hell on earth data-wise," says Michael Atkin, a renowned data professional and managing director of the Enterprise Data Management (EDM) Council trade body, in reference to the fragmented nature of over-the-counter (OTC) derivatives and other global capital markets. The rising demand for data is being driven by a whole raft of new post-crash regulations such as the US Dodd-Frank rules and European Market Infrastructure Regulation (EMIR). These mean that the sell and buy side must store, report, consolidate and use data - often on a real-time basis - as never before. Better data quality, standardised utility-like platforms, efficiency and control are all required in this new environment. The capital and collateral requirements coming in under Basel III are also driving a need for more intra-day information and the reformed markets require more linkages to custodians and central counterparty clearing houses (CCPs). Still other regulations wait on the horizon, such as the EU'S Markets in Financial Instruments Directive (MiFID) II and its Market Abuse Directive (MAD) II, which is aiming to stop further Libor, FX and other such mis-selling scandals or rogue trading behaviour. Compliance, allied to monitoring for risk concentration and market abuse, are the key drivers for the data deluge. Banks, asset managers, brokers, infrastructure providers and all other types of market participants - even national regulators themselves as the recipients of all this reporting data - are required to respond to the call for centralised reporting, clearing and enhanced transparency, emanating from the post-crash Pittsburgh G20 meeting back in 2009. According to Michael Cooper, chief technology officer (CTO) at BT Radianz, there is almost exponential growth in data volumes, driven by regulators' concern to capture all data. "Both structured and unstructured data, which requires interpretation and often relates to social media and so-called 'big data' analytics, is being collected now for the prevention of market abuse and forensics investigations afterwards," he says. "Market changes are also driving the data deluge (i.e. more margin calls, etc)." Steve Colwill, director of Velocimetrics, a data analysis and benchmarking firm that offers real-time performance monitoring, rightly warns data should be seen as a competitive advantage in this new marketplace, adding that: "If data isn't clean, then it is just 'stuff'." Moreover, it isn't just transaction reporting duties under EMIR, Dodd Frank, or even the EU's wholesale Regulation on Energy Market Integrity and Transparency (REMIT) rules that are driving the data deluge. The market abuse and conduct agenda, Know Your Customer (KYC), counterparty, tax beneficiary and other such storage requirements also matter, alongside centralised clearing and other transactional duties. As Robert Powell, global head of compliance at Etrali warns: "EU rules, such as MAD II, cover all voice data and conversations, which need to be kept for surveillance purposes, regardless of where platform trades are executed or stored." Stephen McGoldrick, co-chair of the EMEA regulatory subcommittee at the FIX Trading Community standards body, and a director of market structure at Deutsche Bank, accepts there is a rising data demand. "Yes, there will be a data deluge (in the wake of all these regulations)," he says, "but it's something we'll just have to cope with. I'm confident we can." about it and get the efficiency benefit of better data." The requirement to get a grip on data was illustrated recently when even the Bank of England (BoE) hired a chief data officer (CDO) Hany Choueiri, ex-of HSBC, at the turn of the year. There could be no more explicit demonstration of the UK central bank's determination to be able to handle the vast amount of data flowing into it, and of the wider elevation of data as a crucial issue within the industry. "There is a data demand on us too as regulators," says Edwin Schooling Latter, head of Markets Infrastructure and Policy at the UK Financial Conduct Authority, on secondment from the BoE. "The FCA is investing more in technology because of it." At the 2015 FIX EMEA Trading Conference, Schooling Latter told Automated Trader his organisation "certainly plans to" handle all the huge volumes of data flowing into it. He is confident the time and money invested in people, process and technology at the FCA will see a smooth transition to the new transactional data reporting, surveillance and other post-crash obligations. Whether the same preparedness can be attributed to other, smaller national regulators is up for debate. Germany, France, the US and the UK will likely manage. "But there are 31 countries in the European Economic Area (EEA) and the likes of Iceland, Malta and Cyprus won't be able to invest in data handling capabilities," says Chris Pickles, of the Bloomberg Open Symbology Team. This may not matter if neighbours help out, and because their volumes are low, but it is a concern. According to Tom Riesack, managing principal at the Capco consultancy: "The first thing a major regulator needs to do is build up an analytical capacity to handle the data flows coming into it. This enables the regulator to make data-driven conclusions." Notably, the same logic applies to large banks. "Don't forget the consolidation challenge either," cautions Riesack, again focusing on regulators' data handling capabilities, though the point is equally valid for banks. "For instance, each EMIR derivative trade repository (TR) collects data in a different manner since the regime's inception in February 2014. Data is not yet being reconciled between TRs." There were bound to be teething problems as regulations such as EMIR came into being, but Schooling Latter is clear about what the UK regulator wants data for. "Our objective is transparency and monitoring market abuse. Those are the key FCA objectives," says Schooling Latter. One of the immediate causes of the data deluge was the start of TRs under EMIR in Europe in February 2014, covering derivatives, and before that Swap Data Repositories (SDRs), part of Dodd Frank Title VII in the US. (Swap Execution Facilities SEFs separately provide pre-trade bid/offer information on execution platforms). US players had to register as a swap dealer (SD) or major swap participant (MSP). The US Commodity Futures Trading Commission (CFTC) has led the way compliance-wise - too much so for some tastes - with rising complaints about a lack of regulatory coherence. They've been front-running the Securities and Exchange Commission's (SEC) own wider efforts, so perhaps the legal action from the International Swaps and Derivatives Association (ISDA) and other trade bodies specifically targeting its cross-border guidance in December 2013 was inevitable. In Europe, a handful of new TRs have been launched. Last year's initial wave of six approved by the European Securities and Markets Authority (ESMA) comprised: the UK-based ICE Trade Vault Europe Ltd (ICE TVEL); CME TR; the Regis-TR Iberclear/Clearstream joint venture; London Stock Exchange (LSE) UnaVista platform; Poland's KDPW; and the Depository Trust and Clearing Company (DTCC) repository. In the US many of the same repositories are present, having started out there. The leading US players, with more joining all the time, include: Intercontinental Exchange (ICE) Trade Vault US; the DTCC Data Repository; and CME SDR. Away from transactional obligations, data monitoring for intra-day purposes, plus data mining and tracking for market abuse, or post-event forensics, are all crucial elements in the rising data mix. The data demand will only grow as MiFID II, MAD II and other such regulations come into full force in 2017, impacting other non-derivative segments of the capital markets.All of the above repositories store OTC derivative trades in the hope that if the worst happens and there is another Lehman-style collapse unwinding the positions wouldn't be so nightmarish in the future. The repositories mean that a wave of data has been unleashed, with firms having to collate and store it. This data is passed on to the regulators as and when required. It remains stored for later investigation. "Meeting trade reporting requirements has been a big enough expense for many market participants," says Cian Ó Braonáin, global lead of Sapient Global Markets' regulatory reporting practice. "Despite sizable investments in internal systems, many banks are still grappling with data management challenges and inefficient trade reporting processes and governance. "Buy side firms, leaning on their executing broker or clearing member to handle reporting on their behalf, must also now demonstrate to regulators that they're validating the delegated reporting against their own records." The data burden is borne out by Tim Thornton, chief data officer, at Mitsubishi UFJ Fund Services. Commenting on the anniversary of EMIR TRs in February this year, he said: "Errors and mistakes during the reporting process are still common. Regulators have indicated they intend to clamp down on firms submitting inaccurate data, but fund managers have onerous reporting obligations, which mean processing significant quantities of data." The requirement under EMIR that financial institutions, including asset managers, clear their OTC derivative transactions through CCPs is likely to come into force in August 2015, he adds. "EMIR also imposes stringent risk mitigation procedures on firms' un-cleared OTC transactions including timely confirmation, dispute resolution, portfolio compression, daily valuation and recordkeeping. These rules are extra-territorial so firms must check to see if they're ensnared. The (new) deadline is fast approaching and fund managers must ensure they are well prepared to deal with these rules, or risk facing regulatory sanctions," said Thornton. Collaborative initiatives designed to deal with the data deluge hitting capital markets firms are proliferating. Financial utilities; vendor-sourced shared services in the cloud (if they're secure against hack attacks); and new data services are coming to market all the time. Data consolidation and much needed standardisation initiatives, are also on the rise. For example, in 2014, the old Bloomberg Global Identifier (BBGID) was rebranded as an open standard Financial Instrument Global Identifier (FIGI) and endorsed by the Object Management Group (OMG), a non-profit standards consortium. Bloomberg wants FIGI to become the definitive global non-proprietary system for identifying securities' instruments and firms. (See FIGIs at bottom). DTCC is another major player in this space. They are launching the Clarient Entity Hub centralised reference data and document utility, for instance, and separately, the DTCC-Euroclear Global Collateral joint venture to prepare for the coming market liquidity and collateral changes. Additionally, the DTCC Deriv/SERV subsidiary is still relevant because it targets post-trade processing of derivatives through the firm's Trade Information Warehouse (TIW); via its Global Trade Repository (GTR), which admittedly faces the hurdle of regional regulatory differences; and the Equity Cashflow Matching (ECM) engine. Harmonising domestic and international differences is a stated aim for the firm. According to DTCC Clarient's CEO, Matt Stauffer, the Hub is designed to address global financial market participants' increasing need for greater control and transparency in the entity data management process. "It was developed in response to evolving risk management and regulatory requirements, many of which require a greater level of rigour in the collection and oversight of this data than in the past," he says. These regulations include, but are not limited to, more robust global KYC processes, the Foreign Account Tax Compliance Act (FATCA), EMIR, Dodd-Frank, and other such rules, he adds. "There is a landscape of partnerships emerging as participants realise they can no longer serve all clients everywhere," says Sapient's Ó Braonáin. "Partnerships, whether defined on a one-to-one basis, as a 'utility', or a shared service, are helping to address weaknesses and gaps in business models, data, functional capability or geographic reach." Examples he points to include: BNY providing services to CME for Central Securities Depository (CSD); BNY with SIX for custodial services; Nasdaq NLX with LCH for cross margining; BNY with State Street and Eurex for listed/OTC clearing; etc." Collaborative undertakings such as these require shared data, standards and processing, plus mutual trust in each other's data quality, handing capabilities, security infrastructure and so on. A number of specifically data-focused initiatives that are more compliance driven, and not on a one-to-one basis, are also underway. Meanwhile, vendors are looking to serve the needs of smaller firms in the cloud. Larger players typically look to non-vendor aligned utilities or indeed each other for help. Depending upon what part of the data spectrum a capital market firm wants to address - compliance, risk concentration or market abuse - and upon the size of the firm, various solutions are on offer. Accenture, for instance, has launched a transaction processing aggregator platform which is aimed at FIs wanting to pool their back office processing to cut IT and compliance costs. Accenture Post-Trade Processing received approval from the FCA in April. The post-trade utility has been set up in collaboration with Broadridge to support settlement, books and records, asset servicing, operational management and control, real-time data access and administrative accounting. In the equities exchange arena for instance, Euronext outsourced its real-time monitoring and pricing of derivatives instruments to Horizon Software in April, abandoning its expensive old proprietary system. Horizon will henceforth carry out this activity and calculate and disseminate settlement prices on an intra-day basis.There is, of course, no shortage of solutions. Similarly, more than 40 clients are now using Trayport's online prototype REMIT reporting tool. Ancoa is also providing real-time market surveillance for the LedgerX exchange Bitcoin options trading platform, enabling them to detect and deal with potentially manipulative trading behaviours. Larger capital market firms, with bigger IT and human resources, are not so dependent on vendors to help them meet their data demands, and typically look to themselves or shared utilities organised by bodies such as FIX or SWIFT, in which they have a stake. They're not keen on vendor-based cloud solutions. Bigger FIs particularly prize trade body utilities when they operate in non-competitive areas such as tax or financial crime compliance reporting duties. JP Morgan has even launched its own algorithm to track any signs of market abuse among its own staff to identify rogue employees before they go astray, according to a Bloomberg report. Dozens of inputs, including whether workers skip compliance classes, violate personal trading rules or breach market-risk limits, will be fed into the algo pattern-spotting behavioural software. It is presently being tested in the trading business and will spread throughout the global investment-banking and asset-management divisions by 2016, a spokesman confirmed. It won't be easy to reform the capital markets, on both the sell and buy side, via utilities, vendors or in-house solutions, but the effort has begun. Surveillance, regulation and changed market circumstances are the key drivers and cause of the data deluge. The Bloomberg Open Symbology (BSYM) project is an attempt to introduce better instrument and corporate identification tags in a multi-asset trading and investment environment. The Object Management Group (OMG) non-profit standards consortium adopted the 12-character BSYM identifier as the basis for its Financial Instrument Global Identifier (FIGI) specification in September 2014. This is intended to encourage global adoption and make it easier to identify securities such as equities, fixed income, indices, derivatives, currency and structured instruments across various venues. "The EDM Council is also supporting it as an open standard," says Chris Pickles of the Bloomberg Open Symbology team. Other standards are of course available too. OMG hope its FIGI, which is essentially a rebranding of the old Bloomberg Global Identifier (BBGID), which the firm stopped charging for in 2009, will help introduce a standardised system for naming financial securities that is non-proprietary, offers broad coverage, and is free and universally available around the world without restrictive license terms and fees. As Pickles of the BSYM team tells it, International Securities Identification Numbers (ISINs), widely encouraged by the Association of National Numbering Agencies (ANNA) and used in the equity and bond markets, "haven't proved to be the common identifier standard that everyone hoped for". There are also so many other segmented identifiers out there - from differing Market Identifier Codes (MICs) for exchanges to Alternative Instrument Identifiers (Aii) for derivatives - that some standardisation is required, particularly with the BCBS 239 risk data aggregation and validity requirements in mind. "The FIGI could help to encourage the necessary linkages," says Pickles, who adds there are 225 million financial instruments across all asset classes - from loans, to swaps and so forth - at the moment. This is growing fast by five million a month, adding to the pressure to bring order to the system.
2019-04-25T08:49:11Z
http://static.automatedtrader.net/articles/feature/153959/the-data-deluge
Even though Pan American World Airways ceased operations on 4 December 1991, those of the flying staff who remained to the end continued flying in whatever assignment they could get. Some flew on Hajj charters; some went overseas to teach Korean pilots and others took any job so long as it involved flying. The possibility of ever joining together again as a team seemed like a remote possibility. However, the “Pan American Spirit” remained in the hearts of many Pan Amers and manifested itself in late 1993. With the breakup of the Soviet Union in 1990 was the breakup of its national airline, Aeroflot. The once behemoth was divided up among the newly independent republics who immediately set out to form their own national airlines. One airline was formed in the new Republic of Tajikistan, “Tajik Air”. Its fleet consisted largely of old Soviet TU-154s that were operated to points within the old Soviet Union. The idea of operating long-haul intercontinental flights was nothing more than a dream. Then something profound happened. A group of businessmen in London, England saw the potential of doing business in Tajikistan and formed the Tajikistan Development Agency, headquartered in London. The group came to a quick realization that there was a serious lack of air transportation between the UK (or anywhere in Europe) and Tajikistan. Then came an idea: Why not expand the operations of Tajik Air so that it can offer flights between London and Dushanbe, the capital of Tajikistan? Starting a new service in any market requires a great deal of research and planning. There must be a suitable aircraft. Government approvals must be in place. Airport access, slots (if required), ground handling services and airport facilities (check-in desks, etc) must be obtained. On the commercial side, the new service needs to be marketed, publicized and tickets sold. Other details include setting up the ticket and operations offices, arranging catering, publishing an In-Flight magazine and printing safety information cards, timetables, paper tickets, baggage tickets, promotional materials and stationary. For Tajik Air, however, there was one very important requirement missing: an operating base in London and sufficient infrastructure to crew and maintain an aircraft operating the long-haul route between Dushanbe and London. That presented a huge problem as the civil aviation structure of Tajikistan was completely inexperienced in intercontinental operations. Setting up a London base would seem impossible to achieve given the limited resources of Tajikistan. However, through the foresight and creativeness of a few airline experts in London, a unique solution to the problem was hatched: Establish a third-party UK management company to operate the route. After much discussion with Tajikistan’s civil aviation authority, a contract was signed and Tajik Air Limited was formed. It would build the the necessary infrastructure and operate flights to/from London on behalf of Tajik Air. The company would obtain and maintain the aircraft and crew, organize the marketing and selling of the flights and essentially operate the flights. This would be accomplished using Tajikistan’s Air Operator’s Certificate and Tajik Air’s call-sign and airline code. Tajikistan committed to funding the new service and also obtaining the required government permissions for the operation. How would this operation be viable and profitable? The route of primary interest to Tajik Air was the London (Heathrow) (“LHR”)-Dushanbe (“DYU”) sector. Operating that sector as an Origin-Destination route presented problems in that there was little, if any, traffic between the two points. The question was how to fill the aircraft? The answer: Offer service between LHR and points beyond DYU. The beyond points selected were Delhi, India (“DEL”) and Karachi, Pakistan (“KHI”). This was to be accomplished using rights under the Sixth Freedom of the Air, made possible by Tajik Air using Tajikistan’s Third and Fourth Freedom rights under agreements with the UK, India and Pakistan. DYU would be the “hub” for traffic between LHR and DEL/KHI. The schedule would work like this: Tajik Air departs from LHR with a planeload of passengers on a Fourth Freedom flight to DYU. Upon arrival in DYU, those few passengers destined for DYU disembark and the rest stay on board. The flight then departs DYU with a new flight number on a Third Freedom flight for DEL or KHI. Upon turning around in DEL/KHI, with a new planeload of passengers, the flight becomes a Fourth Freedom to DYU and from DYU, with another flight number, Third Freedom to LHR. By operating this schedule, Tajik Air could fill the seats of the aircraft, and compete in a highly competitive market by offering good service with low fares. The next question was what type of aircraft and this is where the spirit of Pan American first came on the scene: The selection of the Boeing 747SP for the operation. The aircraft acquired was first delivered to Pan American on May 11, 1979 registered as N540PA and named Clipper White Falcon. It was renamed Clipper Flying Arrow on August 1, 1979 and later renamed Clipper Star of the Union on January 1, 1980. One year later, on January 1, 1981, the aircraft became China Clipper. Once the 747SP was secured, a call went out for crews to operate it. This was the second instance of the Pan American spirit in the new operation: The selection of former Pan Am crews to operate the service. Because of the aircraft choice and their availability, it was decided to hire former pilots of Pan American. The decision was perfectly logical in that Pan Am pilots had many hours of experience in the 747SP – some had actually flown the aircraft when it was with Pan Am – had experience operating in the geographic area of the intended operation, and had the savvy and know-how in dealing with unexpected circumstances or conditions inherent in such an operation. It was the same for all the pilots who received “the call”. A chance to be an aviation pioneer was too great an opportunity to turn down. Once the group was assembled, refresher training began at the Pan Am International Flight Academy in Miami, Florida. Most of the Pan American pilots were over 60 years of age. While that would present a problem in the United States, it did not for Tajikistan. And as is well known, pilots over the age of 60 have a near zero accident rate. At the academy was a 747SP simulator and the pilots were put through training that brought them up to speed on changes to the aircraft, flight rules and also fined-tuned their instrument piloting skills. At the same time, flight attendants from Tajik Air were undergoing training for the 747SP. These flight attendants were supposedly the “cream of the crop” from Tajik Air but with experience limited to smaller aircraft such as the TU-154. While the pilots were progressing well in the refresher training, it was not the case for the flight attendants. “I had created a training program for the Tajik flight attendants and we started with the 747SP aircraft: the doors, how to arm, disarm, open and close in normal and emergency mode. The first day was spent studying the manual; the second day in the mock- up; the third day back in the classroom. But I soon realized it would take five days to learn the doors and it would take months to teach procedures. A flight academy employee who spoke Russian eventually acted as an interpreter, but it became painfully clear that this group would not be able to staff a 747SP. Although kind, interested and friendly, they were overwhelmed by the size of the 747SP. This problem was not only a concern to Crawford, but also to the pilots who were undergoing refresher training and who had observed the Tajik flight attendants first hand. A solution to the problem was needed, and after consultations with Tajik officials present, it was decided to hire some “real” flight attendants from the former Pan Am. Crawford, was in contact with a group of “experienced and adventurous” former colleagues, and very soon a lot of familiar faces began appearing at the Flight Academy. Training went into full swing for all concerned and soon it was finished. For the cabin crew, it was decided that two or three experienced Pan Am flight attendants would be assigned to each flight. The remaining cabin crew positions would be filled by the Tajik Air flight attendants as “trainees”. The goal, under the supervision and direction of the Pan Am crew, was the Tajik crew to become qualified on a 747SP. “Being on a flight crew is a wonderful thing. It is a team effort. Pan Am had always encouraged working as a team. That teamwork was designed to save lives. Although the duties of the cabin staff is the care of passengers, their real job is to save lives in an emergency. They operate the emergency equipment and are trained to get people out of the aircraft as quickly as possible. Good communication is essential. As a pilot, I always appreciated the job the flight attendants do and made sure they knew it”. “[At] almost any cookout in America, guests would pitch in to help with the food and drinks and have a party. Not so with the Tajiks. It became apparent that the concept of initiative did not exist in their culture. They would smile and do anything we asked of them but took no initiative. In an airplane emergency, this can be deadly so we proceeded to see what we could do about it. This was the first chance the pilots and cabin staff had the opportunity to talk in an informal setting. We encouraged them to help themselves and to pass things along to their fellow crew members. “We also found out why they didn’t talk to each other. They were all from Tajikistan but some were from various mountain tribes that were at odds with each other. Others were Russian, or Iranian or Tajik valley people. Apparently they had been chosen not because of their good English or flying experience but because they were related to government officials. This was also meant to be a representative group of the Tajik population. While I thought this was a very democratic move, I later learned this diversity was meant to make it less likely that a jealous faction would [cause problems with the operation]. With the training finished and the Tajiks fresh from their team-building experience, everyone began leaving Miami for London to start the operation. Captain Carr was asked to make the “acceptance flight” of Tajik Air’s Boeing 747SP. He accepted. Stay tuned for Part Two: The acceptance flight and applying the “Pan Am Experience” to the first flights of Tajik Air. Some new photographs have emerged about Tajik Air’s Boeing 747SP operation told in “The Story of Snow Leopard” previously posted on this blog site. The images illustrate the spirit of cooperation between the Tajiks and the ex-Pan Am crew who were enthusiastically and selflessly working to give Tajik Air a name for itself in Central Asia. Many thanks to Purser Gunilla Crawford for providing the photographs. The next series of images shows the level of meal service enjoyed by the First Class passengers on Snow Leopard. As the cabin crew were former Pan American World Airways pursers, the service replicated Pan Am’s iconic “Seven Cart” gourmet meals. This short-lived Boeing 747SP operation gave Tajik Civil Aviation an all too brief “shining moment” that for two short months gave Central Asia a glimpse of what could be done in commercial flight. It is gone for now, but the memories remain, thanks to the ex-Pan Am cabin crew and pilots who shared their photographs and memories to make “The Story of Snow Leopard” possible. The Story of Snow Leopard from the beginning was the story of a revolutionary idea that should have been hugely successful. Unfortunately the fates would not allow that and countless hours of devotion to a noble project went to waste. If there is blame, it is not worth dwelling on. Everyone wanted the right outcome. Unfortunately, it was not to be. Nevertheless, the London staff, pilots and cabin crew worked their mightiest to make this project work, using initiative and self-sacrifice to get over what eventually became an insurmountable problem. Once the regular schedule was established and operating, the flights still presented a challenge to everyone involved and it goes without saying they were up to it. The Pan Am culture in which the pilots and flight attendants grew up lent itself to innovation and decisiveness in dealing with the everyday issues they confronted while operating Snow Leopard. A case in point is the first trip of Captain Sherman Carr, who encountered his share of challenges during his first trip as Pilot-in-Command on Snow Leopard. Captain Carr, who flew the acceptance flight, arrived in London for his first revenue trip and met with the rest of the flight crews at his hotel who briefed him on the operation. He also learned that the flights for the next two months were full, “which was a relief to me as I was anxious for my new employers to succeed”. That evening, he reported with his crew to London’s Heathrow Airport for his trip to Delhi with a short stop in Dushanbe. While completing pre-flight, which included verifying the flight plan, the weather, the fuel load, the passenger load, weight and balance and reviewing the current Notice to Airmen, he learned that the flight was being handled by United Airlines Dispatch in Chicago. “I reported to the aircraft with my crew and was greeted warmly by the Tajik Air Station Manager and his wife. I briefed the flight service team about our flight time (6 1/2 hours to Dushanbe; 2 1/2 hours to Delhi) and conducted a review of emergency procedures. I checked with catering and baggage handling to ensure things were progressing for an on time departure. All was well. So far. The flight was finally cleared and took off for Dushanbe. For Captain Carr, it was “great to be flying again”. The route took Snow Leopard over Belgium, Germany, and Czechoslovakia and across the former Soviet Union. In the flight deck, the pilots were busy with position reports, weather updates and programming the way-points on the route into the Inertial Navigation Systems (INS) on the aircraft. This system directs the flight as it moves along its route. Connected to autopilot, it makes piloting the flight effortless. Except in the former Soviet Union. The flight, however, made good progress and was on its way for an on-time arrival. Then there was a problem: Fluid loss in one of the hydraulic systems that required an alternative procedure to lower the landing gear and made the nose wheel steering inoperative. This was “no big whoop” to Captain Carr. These were things pilots were trained to deal with. The landing in Dushanbe was routine and Captain Carr requested a tug to tow the aircraft to the gate. After examining the landing gear, the source of the leak was identified and capped. Repairs would be done in Delhi. The crew determined that the aircraft could continue to Delhi with the landing gear locked down adding about 45 minutes to the flight plan, arriving in Delhi a little late. Communications in Dushanbe, however, was quite primitive, and after several unsuccessful attempts by the operations office to contact London and Chicago, Captain Carr finally reached Chicago by HF frequency from the aircraft. He explained the situation and got his first taste of United Corporate Culture. “‘You can’t do that,’ said the United dispatcher in Chicago. ‘We don’t have any such procedure for gear down flights with passengers.’ I explained we had such procedures and that our operating certificate was based on using Pan Am manuals, flight procedures and techniques and the manuals permitted safe operation with the gear down. We had been doing it since the introduction of the first 747. I asked him: ‘Don’t you realize that every flight operates with the gear down at the beginning and end? We were just going to have it down longer.’ He said he didn’t care, he had checked with his bosses and if we attempted to fly with the gear down, they would repossess the aircraft. I had to give the bad news to the local Tajik Air people and two managers from London who were with us. We had to come up with plan B”. The next problem for Captain Carr was dealing with the passengers still on board going to Delhi. There were no hotels available to put them up overnight. Also, the aircraft heating and electricity was being powered by an on-board auxiliary power unit (APU) that used up fuel and there was no fuel available in Dushanbe. If the APU was kept running, there would not be enough fuel for the flight to Delhi. In addition, the airport was closing and airport personnel were going home. “The local Tajik Air managers came up with the idea of using one of their Tupolev 154s, which could carry our passengers but not their luggage. The Tupolev crew was called to the airport, their airplane readied, and I was told all we had to do was transfer our passengers to the other aircraft. I learned that wasn’t going to be so easy. “In London, the BBC had been reporting on the theft of airline baggage. Most of the passengers were Indian Nationals, many of whom carrying as many VCRs, portable TVs and other small appliances as their luggage would bear. When I told them that they would be continuing to Delhi on the Tupolev, but could not take their luggage, there was a near riot. A few began wagging their fingers in my face. I asked the Hindi speaking members of our crew to translate for me so there would be no misunderstanding. I explained there were no hotel rooms, that we had to shut down our aircraft and if they tried to stay, they would freeze to death. I told them we had made arrangements to get them to their destination and their luggage would be arriving the next morning. Their response was underwhelming. To emphasize our security arrangements, I had our guards come aboard the airplane and hold their Kalishnikov machine guns over their heads to show our passengers that their luggage would be well protected. These were not ordinary airport security guards but members of the élite Russian Spetsnaz. I was very glad to see them providing security. And having them behind me to back up my promise to protect the passengers luggage worked very well. Also, no one else wagged a finger in my face. After spending the night at a hotel in Dushanbe, Captain Carr and his crew returned to Dushanbe Airport to find a “pile of papers that truly impressed me” and that “United in Chicago. . .had come to the conclusion” that he was right and released the aircraft for a ferry flight to Delhi with gear down. “We boarded the airplane and took off. It was a beautiful day and even with the gear down the SP climbed easily to cross the Hindu Kush and surrounding peaks that rose to about 24,000 feet. We were enjoying the scenery as we cruised at 29,000 feet entering Pakistan. We made our position report to the Pakistan air controller who asked us to confirm our country of registration. No one could believe that Tajikistan had a 747. He asked us for our overflight permit number. Before take-off we had received our en-route clearance but no one had said anything about an overflight permit number. I hadn’t heard of this before and in my years of flying with Pan Am, had never been asked for one. The three of us in the cockpit began searching through the paper work. I began reading the controller numbers we found but they were not the number he wanted. He sounded very unhappy and eventually his supervisor radioed: ‘Tajik Air 801, you have entered Pakistani airspace illegally and are directed to land at Lahore Airport immediately.’ I explained that we were a ferry flight because of a mechanical difficulty and that it would be dangerous to divert and could not comply. He said: ‘You must land immediately.’ I again explained that I am using my authority as Captain for the safety of my aircraft and crew to proceed. We only had about 5 more minutes until we were out of Pakistan Airspace. I pushed the throttles up as much as I dared and we kept looking out both sides and hoped that if they scrambled fighters, that they would at least do one fly-by before shooting at us. We reached the Indian/Pakistan border and I thanked the Pakistan air controller for his ‘cooperation’. Pamir Mountains as seen from Snow Leopard. Captain Carr and his crew stayed in Delhi for a three day layover, during which Snow Leopard made a London-Karachi rotation through Dushanbe. When Snow Leopard returned to Delhi, he and his crew would take it back to London. At Delhi Airport, he learned that the weather in Dushanbe was “iffy”, adding the requirement of planning a fuel load so that they would be light enough to land in Dushanbe yet have enough to make it to London if they had to bypass Tajikistan. This was resolved by using a “re-dispatch” flight plan that provided for a fuel stop at an alternative airport if necessary. “We took off on schedule with a full load of passengers, fortunately none bound for Tajikistan, because as we approached Dushanbe, we learned that it was snowing heavily and the runway could not be cleared. We were then informed that we had to deviate north of Azerbaijan due to ‘military activities’. All I could think of was, ‘uh-oh, there goes our fuel and our on-time arrival in London’. The distance from Delhi to London is normally not a problem for a 747SP, but, because we had to limit the amount of fuel we could carry, we had the minimum amount to make it to London and now had to worry about using up our reserves. However, our calculations indicated that we would still have the proper amount of reserve fuel. “As we progressed west, the weather reports for London kept getting worse. We were advised by Maastricht Control,(Netherlands), that there were delays for aircraft inbound to Heathrow. We had now been airborne for almost nine hours and were getting close to the minimum fuel that would let us safely proceed to our alternate airport. We were told to enter the holding pattern at Lamborne, less than 20 miles from London’s Heathrow Airport. I knew it could take up to an hour or more to cover those last 20 miles. We were flying in ovals on a specific flight path at a specific altitude separated by 1000 feet from the aircraft above and below. We were still at 16,000 feet and since the approach normally is not begun until we have worked our way down through the “stack” to 8,000 feet I knew we were going to be doing this for a while and it was quite possible that we would reach our “bingo” fuel, the minimum amount left for us to proceed to our alternate airport. I excused myself and went aft for a stretch and briefed the senior purser that we might have to divert to Stansted Airport. “When I returned to the cockpit I was glad to see we had worked our way down to 12,000 feet. We had also been in continuous contact with our Flight Ops to check on Stansted weather. It was okay and the winds were favorable to get there. Nevertheless, I had to tell London Control that we could only make two more turns in the pattern and would then have to divert. At the very last moment, we had worked our way down and were cleared for an approach. The weather had gotten worse and we were faced with zero ceiling and zero visibility, called a ‘zero-zero landing’. “A 747 can make zero-zero landing if the aircraft and airport are properly equipped, which they were. We committed to making a zero-zero landing, requiring an instrument approach. The aircraft flies where you want it to go with just a caress of the controls. For this landing I decided to make a ‘coupled approach’, on the auto pilot. Even though the autopilot is flying the airplane, the pilot still must follow all the instruments as though flying manually and keep hands on the controls to override just in case. I let the autopilot make the actual touch down and apply the brakes. “One strange thing about a zero-zero landing is that after you land is when it gets dicey. The trick is to slow the aircraft and keep it on the runway that still can’t be seen. Fortunately, on the runway are ‘center line lights’ embedded in the concrete. But though they are very bright, in low visibility, one can only see a couple at a time and the trick is to run over them with the nose wheel. Otherwise, if one loses sight of the lights, there is no way to tell if the aircraft is to the right or left, other than instinct, until it runs off the runway. The flight attendants also had interesting experiences. Vince Rossi recalls making “care” packages from the inbound catering overages for the pilots laying over in Dushanbe. The flight attendants would also set up a buffet for the ground staff and soldiers there. It was a big event whenever Snow Leopard arrived at Dushanbe. According to Rossi, “in spite of the bitter winter cold, there were often people watching from the terminal and nearby the airport”. Soon, a cherry-picker appeared to take care of the tail, and it, too, was a small business that was paid directly for its services. One of the attractions of working for an international airline is the opportunity to visit countries all over the world and explore them during layovers. Layovers are necessary to ensure flight crew members are not “timed out” and are well rested for their next segment. Dushanbe was not considered a layover city, but there were times that a layover was necessary due to operational circumstances. For the most part, due to the political situation in Tajikistan, the flight attendants kindly declined the opportunity to sample Dushanbe. The pilots, however, did. Captain Carr’s first layover was the over-nighter, caused by the landing gear problem. This was his first experience in a former Soviet Republic. The next time Captain Carr visited Dushanbe, he had a chance to have a better view of Dushanbe. This was a city that was affected by the then ongoing civil war and things were quite unstable. The country was struggling and its economy was to say the least, precarious. “My next layover in Dushanbe gave me another jolt of realism. We made arrangements with the Station Manager to take a tour of the Dushanbe area. He was able to provide the same bus that took us to and from the hotel. We drove through some areas with some very grand government buildings with surprisingly attractive architecture. We stopped at a beautiful park with some magnificent statuary. It didn’t take us too long to realize though that something was wrong. No people on the streets. No cars on the roads. The only other humans we saw on our drive were local policemen who stopped our bus, asked for our identification, and extracted a small ‘toll’ for passing through their section of road. I don’t believe they received much else in the way of pay. We headed back to the area of our hotel and stopped at a ‘super market.’ It was quite a large store, larger than most in the U.S. but dramatically different. The shelves were all bare except for one corner of the store where a man dispensed potatoes into burlap bags with a shovel. This was the government store. We did finally find a ‘people’s market’ with fresh vegetables and other marketable foods and goods. We were able to buy some tasty snacks and food to carry us through the evening curfew. I also made my one big purchase of a local item that is my one souvenir of my Tajikistan experience. (left to right) Jim Lank, Sherman Carr and Earl Speirs. “On flights, we were all wearing our old Pan Am uniforms without the Pan Am insignia or hats. I thought it would be nice to have a hat with an emblem indicative of Tajikistan. I found the perfect thing on a peddlers cart. It was a pin-on gold medallion of a beautifully crafted snow leopard. I happily purchased it, stuck it on my beret, and it was my contribution to uniform design and a personal trademark thereafter. I took a little kidding at first but then all the other crew-members wanted one as well. “The next day, the Engineer, First Officer and I decided to walk over to explore another hotel that we had noticed not too far away. The hotel seemed very attractive from the outside. The lobby was very dark and deserted but after we rang a little bell on the main desk, a clerk eventually appeared. I asked if we could look around and see their rooms. ‘Da’. He pointed to a doorway with a flight of stairs. We went up and came to what appeared to be an airport style security check point with a walk-through metal detector and guards with Kalishnikov machine guns. After we got through we ran into a fellow on the upper landing that seemed to be an American. He asked if he could help us and I explained that we were looking for a better hotel and were hoping to see what the rooms were like here. He said: ‘Sure.’ He told us his name was Stan and we followed him into what appeared to be a suite of 10 or 12 rooms that had its own pantry and kitchen. He invited us to the suite’s lounge and offered chips, dip, and sodas. We explained that we were the crew for the new Tajik airline’s 747. As we were sitting in the lounge, I finally noticed a big emblem on the wall that read ‘U.S. Embassy’. I asked,’Is this the U. S. Embassy?’ ‘Yes.’ ‘Do you work here?’ ‘Yes.’ ‘What do you do?’ ‘I’m the Ambassador.’ Stan, the Ambassador, and his charming wife entertained us for the next hour or so as we swapped stories and local intelligence. I asked him about the information I had gotten about local war lords and border positions. He confirmed most of it. The border fighting that was supposedly 150 miles away was now only 80 miles from the city. He explained that he kept a C-130 Hercules airplane on standby 24 hours a day in case it became necessary to evacuate the embassy staff. The hotel where the U.S. Embassy was located. “That night, the aircraft we were scheduled to fly to Karachi and back overflew Dushanbe because of bad weather. The weather stayed bad and it overflew us again on the way back to London. We were stuck here for another 48 hours. My most immediate concern was to call my wife Mary because she was going to meet me in London. Since I obviously wasn’t going to be back in London in time to meet her, I put in the two-hour-to-wait call through Moscow and was relieved when I finally got through and told her to wait two days and come on the next Tajik Air flight out of London. She would then spend one day with me in Dushanbe and we would continue together to New Delhi, Agra and the Taj Mahal. As the flights continued it was quickly becoming clear that the operation was encountering some severe financial problems and getting the flight successfully off was becoming a day-to-day affair. In addition, there was a mechanical problem with one of the aircraft’s engines and it was taken out of service. Eventually Snow Leopard was repossessed by United Airlines. Gunilla Crawford and her crew were on the last rotation. They were in Delhi when the aircraft was repossessed. “We arrived in New Delhi on a regular flight, and checked in at the Sheraton where we stayed as Pan Am crew. A couple of days later as we are getting ready to take the inbound flight back to London, our Captain informed us that there is a delay. I believe the message read ‘buy more beer’ or something to that effect. “We sat by the pool and eventually it became clear that the plane had been impounded and our adventure probably over. It had lasted a little over 4 months. Our Station Manager was stuck with some 500-700 hundred passengers who had booked flights to London. He counted on the crew as pawns for money from London, as we could not leave and our crew visas would run out. We knew how to quietly go to the authorities and extend the visas without his knowledge. The Station Manager’s assistant was helpful. We did not want the hotel to know the dilemma, after all the company was to pay for our rooms. We asked Vince who was in London to fax an explanation to our situation, in Spanish, so the hotel would not find out. They didn’t and we got the information we wanted. Time to plan our ‘escape’. The crew wai ting in Delhi. Vince Rossi was in London at the time of the repossession of Snow Leopard. He wanted to provide as much information as possible to the Delhi crew without compromising them given the financial situation. He did this by sending information by fax, written in Spanish. In addition, there were Tajik flight attendants laying over in London. They were faced with a different problem. Who would have thought that a remote country in the former Soviet Union would have a Boeing 747 operation linking it with the West? It actually happened – and it could have continued but for fate. The timing was just not perfect for starting such an operation. The infrastructure within Tajikistan’s Civil Aviation Authority had not matured enough to take on the financial and political burden of a complex Sixth Freedom operation, requiring bilateral agreements not only with the United Kingdom, but with India and Pakistan as well. Thanks to the London management, the UK agreement and slots at Heathrow were secured. Unfortunately, the negotiations to secure the agreements with India were still incomplete when the operation started and that presented barriers and resultant revenue losses. Had the start of the operation been delayed until the negotiations were completed there might have been a different result. That will never be known. However, the Snow Leopard operation proved that it could be done, and for four short months, Snow Leopard proudly flew the skies between London, Dushanbe and Delhi/Karachi. The gold Snow Leopard medallion is still proudly mounted on Captain Carr’s beret. Writing this story would not have been possible without the contributions of those Pan Am pilots and flight attendants who were so willing to share their experiences. I would like to personally thank former Pan Am Captain Sherman Carr whose story about his experiences with Snow Leopard played a major part in this story (and the operation) and also former Pan Am Pursers Gunilla Crawford and Vince Rossi. I would also like to thank Ben Daneshmand with whom I worked in London and also for his recollections of the story he shared with me. Part Two: Crew Training and Acceptance Flight. The next step in getting Snow Leopard into operation was getting a crew together to fly the Boeing 747SP. Because of the aircraft selection and their availability, it was decided to hire former pilots of Pan American World Airways. The decision was perfectly logical in that Pan Am pilots had many hours of experience in the 747SP – some had actually flown the aircraft when it was with Pan Am – had experience operating in the geographic area of the intended operation, and had the savvy and know-how in dealing with unexpected circumstances or conditions that would be inherent in such an operation. Once the group was assembled, refresher training was arranged at the Pan Am International Flight Academy in Miami, Florida. The pilots were former Pan Amers and most were over 60 years of age. While that would present a problem in the United States, it did not for Tajikistan. And as is well known, pilots over the age of 60 have a near zero accident rate. At the academy was a 747SP simulator and the pilots were put through a rigorous training program that brought them up to speed on changes to the aircraft, flight rules and also fined-tuned their instrument piloting skills. At the same time, flight attendants from Tajik Air were undergoing training for the 747SP. These flight attendants were supposedly the “cream of the crop” from Tajik Air but with experience limited to smaller aircraft such as the TU-154 (an old 3-engine aircraft that looked remarkably like at Boeing 727). This problem was not only a concern to Purser Crawford, but also to the pilots who were undergoing refresher training at the same time and who had observed the Tajik flight attendants first hand. A solution to the problem was needed, and according to Captain Carr, after meeting with aviation officials from Tajikistan who were present, it was decided to hire some “real” flight attendants from the former Pan Am. Purser Crawford, was in contact with a group of “experienced and adventurous” former cabin crew colleagues, and very soon thereafter, a lot of familiar faces began appearing at the Pan Am Flight Academy. Training went into full swing for all concerned and soon it was finished. For the cabin crew, it was decided that two or three experienced Pan Am flight attendants would be assigned to each flight. The remaining cabin crew positions would be filled by the Tajik Air flight attendants as “trainees”. The goal, under the supervision and direction of the Pan Am crew, was the Tajik crew to become qualified to “staff and run” a 747SP flight. “Being on a flight crew is a wonderful thing. It is a team effort. Pan Am had always encouraged working as a team. That teamwork was designed to save lives. Although the duties of the cabin staff are the care and feeding of passengers, their real job is to save lives in an emergency. They operate the emergency equipment and are trained to get people out of the aircraft as quickly as possible. Good communication is essential. As a pilot, I have always appreciated and respected the job the flight attendants do and made sure they knew it”. “[At] almost any cookout in America, guests would pitch in to help with the food and drinks and have a party. Not so with the Tajiks. It became apparent that the concept of initiative did not exist in their culture. They would smile and do anything we asked of them but took no initiative. In an airplane emergency, this can be deadly so we proceeded to see what we could do about it. This was the first chance the pilots and cabin staff had the opportunity to talk in an informal setting. We encouraged them to help themselves and to pass things along to their fellow crewmembers. “We also started to find out why they didn’t talk to each other. They were all from Tajikistan but some were from various mountain tribes that were at odds with each other. Others were Russian, or Iranian or Tajik valley people. Apparently they had been chosen not because of their good English or flying experience but because they were related to government officials. This was also meant to be a representative group of the Tajik population. While I thought this was a very democratic move, I later learned this diversity was meant to make it less likely that a jealous faction would [cause problems with the operation]. With the training finished and the Tajiks fresh from their team-building experience, everyone began leaving Miami for London to start the operation. Captain Carr was asked to make the “acceptance flight” of Snow Leopard. He accepted. The acceptance flight is a critical part of the delivery process of an aircraft to an airline. Once the aircraft is accepted and delivered, anything that is discovered wrong with the aircraft becomes the responsibility of the airline. Inspections and the acceptance flight should ensure that this does not happen. Snow Leopard was flown to London by a United Airlines supervisory pilot and crew. Upon arrival, Captain Carr and his crew met the aircraft and began the task of inspecting the aircraft and its logs and maintenance records and carrying out the acceptance flight. The aircraft looked great with a fresh paint job with Tajik Air livery. Once everything was signed off, and the walk-around inspection complete, the aircraft was pronounced airworthy and Captain Carr and his crew boarded the aircraft to begin the flight. “I climbed into my seat in the cockpit. The United pilot looked really nervous and seemed a few shades deeper red than normal. He indicated his concern about all these people on board, and I said ‘kharasho’, took the clip board from him and signed as Pilot in Command. He looked relieved. I reminded him that United was still responsible for any maintenance items until I signed the aircraft acceptance form. The flight went smoothly, the aircraft was perfect and everyone enjoyed the tour of the English countryside as we put the airplane through its paces. We returned to Heathrow and I made my first landing in a real 747 in about a year and a half. As we came in on final approach, I realized that we had almost all the top brass aboard, the new crewmembers and a whole planeload of people who had never been on a 747 before. “If you’re are flying a 747 correctly, on speed and according to ‘the book’, it normally makes a very nice landing. Once in a while, when conditions are just right and you are very lucky, the touch down is so smooth that you don’t realize you are on the ground until the speedbrake handle comes up as it automatically reacts to a microswitch on the landing gear as the wheels touch ground. This was one of those landings. It was now time to get ready for operations. Ticket sales and crew scheduling were at the top of the agenda. This and stories about some memorable flights by Snow Leopard will be coming in Part Three of the Story of Snow Leopard. This is the story about an aircraft named Snow Leopard, which was a Boeing 747SP that was leased by Tajik Air, the national airline of the Republic of Tajikistan, then a newly independent former Soviet Republic located in Central Asia. The aircraft was operated exclusively on the international routes of Tajik Air and gave that airline a presence in London, UK, Delhi, India and Karachi, Pakistan. The operation was controlled and managed by a management company in London, Tajik Air Limited. This is what made this operation unique. What also made it unique was that Snow Leopard was crewed by former pilots and flight attendants of Pan American World Airways, the former great airline that ceased operations in December, 1991. The operation started with Snow Leopard’s departure from London for Dushanbe, Tajikistan in December 1993. It ended in February 1994 when the aircraft was repossessed by United Airlines, the aircraft’s owner and lessor. What happened during these three months are stories of adventure, bravery, comedy, intrigue, loyalty and teamwork. And they will be told in the following posts by those who were there, the pilots, flight attendants and the London management staff. As background, the Boeing 747SP is a modified version of the Boeing 747 which was designed for ultra-long-range flights. The “SP” stands for “Special Performance”. Compared with its predecessor, the 747-100, the 747SP retains its wide-body four-engine layout, along with its double-deck design, but has a shortened fuselage, larger vertical stabilizer, and simplified trailing edge flaps. The weight saved by the shortened fuselage permits longer range and increased speed relative to other 747 configurations. Known during development as the short-body 747SB, the 747SP was designed to meet a 1973 joint request from Pan Am and Iran Air, who were looking for a high-capacity airliner with sufficient range to cover Pan Am’s New York–Middle Eastern routes and Iran Air’s planned Tehran–New York route. The aircraft also was intended to provide Boeing with a mid-size wide-body airliner to compete with the DC-10 and L-1011. The 747SP first entered service with Pan Am in 1976. The aircraft was later acquired by VIP and government customers, but sales did not meet the expected 200 units, and production ultimately totaled 45 aircraft. While in service, the 747SP set several aeronautical performance records, including three record-setting round-the-world flights, two operated by Pan Am and the third by United. Snow Leopard, Manufacturer’s Serial Number 21649, Serial 373 was first delivered to Pan American World Airways on May 11, 1979 registered as N540PA and named Clipper White Falcon. It was renamed Clipper Flying Arrow on August 1, 1979 and later renamed Clipper Star of the Union on January 1, 1980. One year later, on January 1, 1981, the aircraft became China Clipper. After the aircraft was repossessed by United Airlines, it was bought by the Brunei Government and re-registered as V8-JBB. It was then bought by the Government of Bahrain on December 24, 1998 and registered as A9C-HMH (below, left). Today Snow Leopard is owned by the Las Vegas Sands Corporation, registered as VQ-BMS (below, right, photo by Wong Chi Lam). She is still in operation. For Tajik Air, however, there was one very important requirement missing: an operating base in London and sufficient infrastructure to crew and maintain a Boeing 747SP aircraft. That presented a huge problem as the civil aviation structure of Tajkistan was completely inexperienced in intercontinental operations. In fact, Tajik Air was created by the breaking-up of the Soviet Union and the then national carrier Aeroflot’s leaving of some old Russian-built aircraft (mostly TU-154s) for use by Tajik Air as the new national air carrier of Tajikistan. Setting up a London base would seem impossible to achieve given the limited resources of Tajikistan. However, through the foresight and creativeness of a few airline experts in London, the requirement was met. To establish the necessary infrastructure so that Tajik Air could operate flights to/from London, a third-party UK management company, Tajik Air Limited, was formed. Its purpose was to operate international flights on behalf of Tajik Air. The company would obtain and maintain the aircraft and crew, organize the marketing and selling of the flights and essentially operate the flights. This would be accomplished using Tajikistan’s Air Operator’s Certificate and Tajik Air’s call-sign and airline code. Tajikistan committed to funding the new service and also obtaining the required government permissions for the operation. How would this operation be viable and profitable? The route of primary interest to Tajik Air was the London (Heathrow) (“LHR”)-Dushanbe (“DYU”) sector. Operating that sector as an Origin-Destination route presented problems in that there was little, if any, traffic between the two points. The question was how to fill an aircraft with 260 seats? The answer: Offer service between LHR and points beyond DYU. This was to be accomplished using rights under the Sixth Freedom of the Air. In the case of Tajik Air, the Third and Fourth Freedoms were the operative. The former gives the “Home” (Tajikistan) country the rights to carry commercial traffic (passengers/cargo/mail, etc) to another country; the latter gives the “Home” country the rights to carry commercial traffic from that other country to home. These rights are generally agreed-to between the “Home” country and the other country in the form of a Bilateral Agreement or an Air Services Agreement. By using Third and Fourth Freedom rights, a Sixth Freedom operation can be created. It is similar to a hub operation with the home country being in the middle of the operation between two different countries. For Tajik Air, the beyond points selected were Delhi, India (“DEL”) and Karachi, Pakistan (“KHI”) due to the large number of Indians and Pakistanis living in the UK. The schedule would work like this: Tajik Air departs from LHR with a planeload of passengers on a Fourth Freedom flight to DYU. Upon arrival in DYU, those few passengers destined for DYU disembark and the rest stay on board. The flight then departs DYU with a new flight number on a Third Freedom flight for DEL or KHI. Upon turning around in DEL/KHI, with a new planeload of passengers, the flight becomes a Fourth Freedom to DYU and from DYU, with another flight number, Third Freedom to LHR. By operating this schedule, Tajik Air could fill the seats of Snow Leopard, and compete in a highly competitive market by offering good service with low fares. In order to operate this schedule, Bilateral or Air Services agreements were required for scheduled traffic between Tajikistan and India/Pakistan in addition to the UK. The published timetable shown below illustrates this operation. Baggage tags are also shown. The next steps in the launch of Tajik Air’s new service to London involved recruiting and training flight crews and taking delivery of the aircraft. This will be coming in Part Two of the Story of Snow Leopard.
2019-04-23T11:59:33Z
https://jpbtransconsulting.com/tag/dushanbe/
Dr JaneMaree Maher has degrees in Law and Arts (Hons) (University of Melbourne 1991) and gained her PhD in 1999 (La Trobe University). She is Senior Lecturer and Director of the Centre for Women’s Studies and Gender Research at Monash University. Her current research is focused on women’s employment, family life and work and new models of motherhood. She has recently published in these areas in Australian Feminist Studies, Work Employment and Society, and Journal of Sociology. Having a baby now goes well beyond the selection of a mate. Listen to a group of thirty-something would-be mothers and the conversation is far removed from the old notion of “falling pregnant”. These women don’t fall anywhere, they make informed decisions, there are supplements to take, tests to be had, results to be analysed (2004: 9). [Elizabeth Rourke] was not afraid of the pain. Having seen how too many deliveries had gone, she was mainly afraid of losing her ability to control what was done to her (Gawande, 2006: 59). Yet, pain is integral to childbirth, fear of childbirth pain is widespread if not universal and women’s experiences of pain have been central to the processes of childbirth medicalisation. In this article, I am interested to focus on the experience of pain in childbirth, and to explore how this pain might be re-articulated through feminist theories of embodiment and pain. I am drawn to this task by a sense that the persistent invocation of rational choice in childbirth discussions depends on forms of subjectivity that have been critiqued and challenged by feminist theorists as deeply inadequate. I am interested to consider whether an underlying fear that pain cannot easily co-exist with subjectivity underpins and shapes the focus on choice and control in childbirth discourses. Feminist scholars have long contested versions of subjectivity grounded in assumptions of the instrumentality of the body, where the mind is given preeminence and understood to act as sovereign over the body. They have argued that these hierarchised accounts of mind and body privilege models of masculine disembodied subjectivity and locate women as somehow lesser subjects due to their closer and more intricate relationship with matters of the flesh (Diprose 1994; Shildrick 1997). The birthing woman presents a particularly embedded version of this ‘feminine subjectivity’ since she materially challenges the concept of a distinct and disembodied subject. Her individuality cannot be easily established in the two-in-one corporeal entity of the birthing body, control over the body is problematic in the physical, medical and social terrains of birth and importantly here, questions of pain and consequent loss of ‘control’ haunt childbirth. In this article, I examine contemporary feminist thinking about pain beginning with Elaine Scarry’s (1985) account of pain as disassembling the self and moving towards Sara Ahmed’s (2002) argument that pain establishes boundaries of self and other. I consider Wendy Lee’s (2006) proposition that many of our accounts of pain rehearse the hierarchised Cartesian self and that this rehearsal shapes and delimits our understandings of subjectivity and pain. From these theorizations and intersections, I argue that rather than reducing subjectivity on the basis of ‘diminished’ access to rationality, pain can be understood as potentially constituitive of more complex forms of subjectivity. Relocating pain in birth may offer a way to rethink and resituate women’s subjectivity in relation to birthing. Elaine Scarry’s (1985) important examination of pain, The Body in Pain, locates pain as a crucial element of thinking embodiment. Scarry’s account of the impact of pain, of its unknowable and incommunicable character, its capacity to disassemble and destroy subjectivity, as well as its potential to remake, to which I return later, established new critical articulations of the relation between subjectivity and the experience of pain. Scarry argues that pain isolates the experiencing subject, since pain is radically private, creating distance between self and all others. Another’s pain cannot be felt or understood: it can only be expressed in metaphors such as ‘it cuts like a knife’. As well as isolating the self, Scarry argues that pain works to destroy subjectivity and capacity to communicate; pain ‘actively destroys [language], bringing about an immediate reversion to a state anterior to language, to the sounds and cries a human being makes before language is learned’ (1985: 4). Scarry’s account invokes the unknowable nature and the destroying power of pain and points to a reversion or retreat to a place before subjectivity, before language where sensation, unmediated, comprises the whole of the world. More recently, Valerie Fournier (2002) has suggested a crucial role for pain in the production of gendered embodiment. She draws on the array of social, cultural and religious discourses that link women to pain, including the pain of childbirth, and argues that these critical symbolic connections reveal the processes of gendering women as innately painful and violent. For Fournier, pain threatens the possibility of ‘making ... a self’ (Fournier 2002: 60). The production of female bodies and female subjectivities is through pain inflicted and inscribed on women’s bodies, through effacement and evisceration. Both Fournier and Scarry are suggesting that subjectivity may be reduced by the ‘ensnaring’ capacity of pain; pain engulfs and empties subjectivities; we become ‘nothing but a mass of hurting flesh’ (Fournier 2002: 63). These accounts of the disassembling and destroying effects of pain are helpful in understanding how pain, if it is integral to childbirth, might be understood as threatening women’s subjectivity in childbirth. Fournier goes further, specifically linking pain and agency, as she argues that the infliction of pain is crucial to the destruction of agency and subjectivity. In the infliction of pain, agency shifts, Fournier suggests, from the experiencing body to the weapon: ‘the process of making pain visible, of re-presenting pain, lifts pain away from the human and attaches its totality, certainty and incontestable reality to something else, to the weapon that inflicts the pain’ (2002: 67). In this formulation, not only is ‘pain … utterly private and subjective … and … [the ground for] a divide between sufferer and observer’ (Whelan, 2003: 464), it acts to remove power and agency from the experiencing subject. Lee concurs with Fournier that feminist attention must be focused on pain, gender and power as ‘women, especially women marginalized on account of account of ethnicity, culture or economy, remain exceptionally vulnerable to violent actions’ (2006: 277). But Lee is interested in reframing pain beyond the destruction of subjectivity and asks whether there might be applications of pain that work to produce rather than erase subjectivity. This possibility depends on eschewing the constraints of ‘a faint but nevertheless delimiting pulse … [of Cartesian dualism]’ (Lee 2006: 279) which undermines efforts to think beyond mind/body hierarchies and their associated political and social hierarchies. Lee argues that the infliction of pain does not involve erasure or the necessary transfer of agency – rather, pain inflicted in pursuit of power requires recognition, interpretation and understanding from the subjected body in order to take effect. Subjects are ‘not rendered mindless through the experience of pain, but rather quite mindful’ (Lee 2006: 282). Lee’s account has connections to Scarry’s iteration of pain as an embodied experience which draws out, rather than dissolves or destroys, consciousness and sentience; pain requires imagination and intention as the experience brings the body to mind in its ‘aversiveness and deprivation’ (Scarry, 1985: 165). This sense of necessary interpretation and engagement is present too in Rosalyn Diprose’s (1994) careful analysis of pain and its meaning for the biomedical body. Pain ‘tears … the fabric … of being-in-the-world’ (1994: 108) and introduces a ‘split between the self and the body, the self and the world, the self and the other’ (1994: 108). Rather than sundering mind and body, pain calls the body to consciousness, back from an ‘habitual engagement’ (1994: 108), where the body seems absent and instrumental. Lee and Diprose are proposing a more complex relationship between pain and subjectivity, where consciousness and attentiveness may be intensified rather than diminished through the experience of pain. While experiences of pain clearly disrupt conventional Cartesian forms of subjectivity (the mind understood as sovereign over the body) since the body is clearly present and potentially out of control, pain should not necessarily be understood as diminishing or destroying subjectivity. Instead, these accounts point to new possibilities for thinking subjectivity as emerging in and through the body in pain. The potential of pain as potentially constitutive rather than destructive of subjectivity is addressed by Sara Ahmed (2002), who argues pain shapes both the subjective and the social realms. Ahmed suggests that ‘pain involves the violation or transgression of the border between inside and outside, and it is through this transgression that I feel the border in the first place’ (2002: 21, emphasis in original). Although Ahmed recognizes the isolation and unknowability in pain, she argues ‘the affectivity of pain is crucial to the forming of the body as both a material and lived entity’ (2002: 19); pain is one of the experiences that allows and informs our relation to others and the world. It has potential to connect us to others as well as isolate us from them, to produce sociality as well as isolation, so ‘while the experience of pain may be solitary, it is never truly private’ (Ahmed 2002: 23) since pain invites the witness of others and draws on complex individual and social histories. Ahmed suggests that ‘the amount and quality of pain we feel is … determined by our previous experiences and how well we remember them, by our ability to understand the cause of pain and to grasp its consequences’ (2002: 18). Pain is not before or outside subjectivity as it requires the active ‘re-constitution of bodily space’ (2002: 19, emphasis in original) and involves ‘the transformation of sensation into judgment’ (2002: 19). Ahmed redraws the relation of pain and the material body and offers a different ground for thinking about pain and subjectivity. Like Lee, she pushes towards an account of pain that does not erase the experiencing subject, or the relational aspects of subjectivity. Ahmed argues for the potential pain has to draw us to our bodies and to others. The way we usually think about birth pain draws heavily, in my view, on the reductive, isolating and erasing power of pain; on the fear that pain will make us less than human by obliterating or dissolving subjectivity. Ahmed’s account offers a useful counterpoint as she draws out the ways in which pain establishes, rather than reduces, experience and subjectivity; she focuses on the communicative and connecting potential of pain. As Scarry suggests in the ‘making’ section of The Body in Pain, the experience of pain is a critical ground for generation, for imagining and transforming, for ‘modest acts of authoring, self-alteration and self-artifice’ (1985: 167). In the next section, I ask whether the productive potential of pain, as articulated in these feminist theorizations, can be usefully introduced to conceptions of subjectivity and pain in childbirth. Pain seizes me back to my body (Ahmed 2002: 21). The oft-quoted axiom that ‘women forget childbirth pain or they’d never do it again’ points to the unknowability and incommunicability of birthing pain. But childbirth pain, and the fear of it, is central to birthing. Pain certainly haunts birthing preparation especially in Western societies; as Jacqueline Wolf observes there is a ‘terror’ of ‘unbearable pain during labour’ (2002: 366), despite likely available reductions of unbearable pain due to analgesia and some forms of intervention. Birth pain has also, as Katherine Beckett carefully records (2005), has been central to medicalisation, changes in birth practices and to feminist activism dedicated to women’s birthing autonomy, since efforts to manage and control pain have generated many interventions and changed procedures. Most research into birthing suggests that women are afraid of the pain of childbirth (Fisher et al, 2006; Simkin, 2000; Wall, 2000), even with the opportunities for analgesia that currently exist. Patrick Wall presents results from pain questionnaires and says ‘evidently, the average reported pain of childbirth ranks high in human experience’ (2000: 84, see also Niven & Murphy-Black, 2000). In some ways, the ubiquity of childbirth pain may diminish attention to its meaning and salience. But, from Diprose (1994), this point of ‘callback’ when comfortable distinctions between body and mind are challenged though the experience of pain offers an important opportunity to consider the inadequacies of conventional accounts of subjectivity and embodiment, especially for women in childbirth. I consider that pain might be more fully explored and resituated as a ground for subjectivity, knowledge and authority in childbirth. Investigating the intersections of subjectivity, rationality and embodiment in childbirth has always presented significant challenges for feminists. Many of the discussions of control in birth focus on the movement of decision-making and authority between women, their partners and birth assistants of all types, often with adverse consequences for women (Beckett, 2005; Reiger and Dempsey, 2007). As Fox and Worts (1999) show, the critique of the medicalisation of childbirth by feminist scholars and activitists has been ‘compelling’ (1999: 327). Critical observers of contemporary childbirth (reflecting on the growth of medical technologies, interventions and socio-cultural expectations of safety and control) suggest that as women’s autonomy is compromised by medicalisation, possibilities of blaming and making women responsibility have intensified (see Crossley, 2007; Fox & Worts, 1999). There is a prevailing sense that modern forms of surveillance and technology produce decisions taken on the basis of information gathered independently of the birthing woman and that women’s subject status is consequently lessened in this context. Martin (2003) says ‘culturally, birth has become more real for those with the outsider gaze than those with the lived bodily experience of it’ (2003: 64). In this framing, women are no longer authoritative in their own births (Martin 2003, Akrich & Pasveer 2004; see also Wolf 2002 who suggests this shifting authority has a much longer history).The proposition that ‘women must wrest back control of their bodies from physicians, especially during pregnancy and birth reinforces the notion that positive birth outcomes are something women can control’ (Layne, 2003: 1888). This desire for control and authority is vitally important in birth choice, as feminist scholars and activists contend, but has implications for how we understand the relationship between subjectivity and birthing. Childbirth conflicts between medical practitioners, or social institutions more generally, and birthing women, who, as Layne (2003) observed, are bound to try to ‘take back’ their bodies seem to centre on who is in charge of this unruly entity. An emphasis on claims for control and choice invokes a particular form of Cartesian subjectivity where the instrumentality of the body is assumed. But feminist scholars have worked to undo this Cartesian myth of embodied subjectivity and many have suggested that in childbirth any lingering assumptions about the instrumentality of the body must be finally put aside. Does this collapse of sovereignty over the body in childbirth take us towards a place where subjectivity is dissolved, as is often assumed, or does it invite attention to new and complex subjectivities that may be produced in birthing? In my view attention to the particular embodied contexts of childbirth and women’s experiences point toward the latter option. Akrich and Pasveer (2004) examine the birthing narratives of seventy women and argue that embodiment in birthing emerges as a continuing process of negotiating and re-negotiating the relationship between embodied experience and a sense of self as “I”. As the body cannot be silenced or controlled in childbirth, birthing is an event that requires the continuous assembling, disassembling and reassembling of subject position and embodied experience. Akrich and Pasveer (2004) do not focus on one type of birth (vaginal, for example) but argue that all births (whether ‘natural’, ‘medicalised’, satisfactory or not) require on-going mediation by the birthing woman to construct and reconstruct her subjectivity in the intensely demanding physicality of birthing. Akrich and Pasveer argue that the ‘body-in-labour’ is an ‘emerging entity’ (2004: 66) which requires the attention and concentration of the birthing woman to produce. This study suggests that Diprose’s account of the ‘callback’ can be usefully applied here; birthing is a time when habitual assumptions about the mind/body relation cannot readily be maintained. Rather than producing a diminution in subjectivity, the findings of Akrich and Pasveer suggest that all birthing women need to respond, interpret and constitute the changing embodied experiences of childbirth, whatever the course of their labours and deliveries. Relationships between subject and other, subject and world, and understandings of the body as the locus of subjectivity are all emphasized and clearly in need of attention as women deliver. How might we think and understand the specific role and meaning of pain in the context of this need to actively produce subjectivity in birthing? The pain of childbirth often evokes ideas of reversion, of return to a primal place where the ‘natural’ order reasserts itself and pushes women back into the body, where sentience and sensation come to dominate the embodied subject. The intensity of childbirth pain is often located as the reason for the loss of subjectivity in the birthing woman as agency, intelligibility and authority are threatened. The pain of childbirth pushes a birthing woman into a non-rational space where she becomes other; ‘screaming, yelling, self-centered and demanding drugs’ (Martin, 2003: 54), not ‘feminine’ as Martin suggests but also somehow less than human. The fear of childbirth pain is the fear of the bifurcating and unruly body, which threatens to engulf and dissolve subjectivity. Reasserting choice and control is an important strategy for feminist scholars and activists, but it is a strategy that may accept the premise of the birthing body as a troubling materialization of a ‘less than’ subject, as pain seems to dissolve the woman’s hold on rationality. Scarry’s idea of pain as disassembling the self is particularly useful then for thinking about cultural meanings of pain in birth and the potential threats to subjectivity. For birthing women, this Cartesian model of subjectivity with an emphasis on self-possession and the instrumentality of the body is deeply problematic, since pain, occurring, expected, feared, will always render authority in birthing as provisional and open to collapse into the ensnaring and enslaving, labouring body. If pain threatens subjectivity, then turning away from pain offers a promise of holding onto subject status against the painful materiality of the birthing experience. As Rivera-Fuentes and Birke (2001) suggest in their dialogic account of pain and torture, linking ‘emotion and rationality inevitably gives rise to dissonance’ (2001: 654), since these states/affects are understood as distinct and as emerging from different hierarchically ordered locations. Femininity, emotion and embodiment, which childbirth pain intensifies, are always already at the base of such hierarchies. It is here that the productive constitution of pain suggested by feminist theorists such as Scarry and Ahmed can be usefully connected to the argument of Akrich and Pasveer that birthing, including pain as a defining element, requires active and ongoing reconstitution of embodied subjectivity. The intersection of these two ideas pushes us towards Scarry’s (1985) articulation of the dual important roles of pain. Pain can disassemble the subject, but pain drives experiencing subjects towards imagination and interpretation. In isolation, pain “intends” nothing; … it is suffered rather than willed or directed… Pain only becomes an intentional state once it is brought into relation with the objectifying power of the imagination; … pain will be transformed from a wholly passive and helpless occurrence into a self-modifying and, when most successful, self-eliminating one (Scarry, 1985: 164). Scarry argues for the transformative potential of pain as it is assumed/experienced by the subject. The integrity of the human subject is violated when the ‘body at work [is] separated from the objects of its work’ (1985: 170), when the opportunity to direct effort and exertion in pain is interrupted or disavowed. In this context, childbirth pain could only operate to violate the experiencing subject when it is not owned and authorized by that experiencing subject. This formulation of the constitutive potential of pain as it transformed through ‘work’ or labour of the experiencing subject brings together what Ahmed (2002) suggests about the meaning and impact of pain on the boundaries of self and other and what Akrich and Pasveer (2004) identify as one of the labours of birthing women as they reformulate their “I” throughout birthing. Pain here emerges as an experience which requires interpretation, imagination and transformation to produce and ground the embodied subject. Pain in childbirth may produce, rather than diminish subjectivity. It is through this movement out into the world that the extreme privacy of the occurrence (both pain and imagining are invisible to anyone outside the boundaries of the person’s body) begins to be shareable, that sentience becomes social and thus acquires its distinctly human form’ (Scarry, 1985: 170). Rather the acceding to the premise that pain cannot co-exist with subjectivity, that pain threatens subject status, and debating levels and forms of control over the birthing body in pain, Scarry’s account of pain as intrinsic to subjectivity reinforces the active production of self, subjectivity and experience in pain. For the birthing woman, the pain that is assumed, experienced and engaged, even when it is inflicted by medicalisation or in failures of care (Layne, 2003), is an integral part of her presence, experience and authority as the subject. This resituation of pain offers the opportunity to recognize the specificity of childbirth pain as a crucial aspect of women’s diverse birthing subjectivities. Scarry’s argument that pain is experienced in the mobilization of imagination offers a definition of ‘pain’ beyond the physical sensations of labour (contracting uterus, pressures on the spinal column). It allows us to understand the fear of pain, the experiences of complex and difficult decisions and the management of competing expectations as aspects of the ‘pain of childbirth’. It has long been recognized that ‘labour involves intense pain’ (Niven and Murphy-Black, 2000: 244), but as Ahmed (2002) and Lee (2006) suggest, the intensity and experience of any pain is variable, shaped by context and interpretation and the embodied history of the experiencing subject. The ‘pain of childbirth’ will be shaped by context of the individual birth, each woman’s experience of care and her embodied history; it will include labour pains, but also fears, conflict over decisions and associated social and cultural experiences. Every birthing woman is likely to experience some type of pain in childbirth, whatever type of delivery she has and that pain, its intensity, its elements and its meaning, will be fully known only to that woman. Pain is inherently subjective, as it emerges in the subject, in and through her specific experience of childbirth. A claim for a refigured form of subjectivity that engages childbirth pain and redraws the relation between pain, the body and the subject as necessarily productive might offer more opportunity for women to speak as authorities in their own birthing. As Ahmed (2002) suggested, pain is crucial in the constitution of the self, of the boundaries between self and others; pain can, as Scarry (1985) finally argues, make the self and the world as well as destroy it. Arguing that subjectivity can and should encompass pain moves us towards a fuller understanding of embodied subjectivity in general and it certainly produces a deeper understanding of agency, embodiment and subjectivity in childbirth. It offers potential for reclaiming women’s authority over their own birthing, since rather than a threat to the subject seeking control over the birthing body, pain may be a ground for claiming authority in that very birth process. I am not suggesting that ‘real labour’ must be painful in order that women can gain power through experiencing it (see Beckett (2005) for a critical evaluation of this notion). Nor am I suggesting that this is a privileged form of subjectivity for women. I am asking whether, if we understand the ‘pain of childbirth’ as encompassing the process of entering into birth, the fear of childbirth, the difficulty of decisions about birth as well as labour pains, we can then locate each woman as the authority, the authoring and knowing subject of her own birth, the only one that can know the extent and meaning of her pain, the only one that can speak in, and for, her birthing body. If pain is relocated as constituitive of birth experience, if pain is understood as encompassing all the complex, troubling and challenging aspects of birthing and asserted as an active process of interpretation and transformation, as the work of birthing, pain becomes a vital ground for knowledge and agency, rather than a potential threat. Rather than seeking control over the birthing body, as Scarry suggested, we look for ‘modest acts of self-authoring’ (1965: 187). And birthing women are the only possible authoring subjects in childbirth. The body of terror, the body in pain is never sealed off from the rest of the world [even though we might when terrorized or in pain, wish that it were] (Rivera-Fuentes & Birke 2002: 654). ..a precondition for agency and critical consciousness is a lived body open to an undetermined future (Diprose, 2009: 158). Pain, as Scarry suggested, can make and unmake the world; it simultaneously undoes the social and drives us toward the other; it can’t be truly communicated yet evokes visceral responses in others that demand action, response and engagement. Pain inflects expectations about and experiences of childbirth and pain is integral to the materialization of birthing body. It holds a central place in social, cultural and medical contests over childbirth. It is an ineluctable element of what Ruth Fletcher, following Mary O’Brien, describes as the ‘necessary sociality [of reproductive labour] and ... its integration of rational negotiation and biological process’ (2006: 31). Fletcher suggests that ‘most feminist analysis seeks to chart the various and changing ways in which reproductive practices are organized and limit or enhance women’s … and men’s … opportunities’ (2006: 28) and these opportunities are important to explore, enhance and support. Contemporary debates over childbirth ‘choices’, however, set the boundaries of the debate in the realm of the rational as the locus of power and agency, and the birthing body inevitably materialises as an entity over which control is sought. But these debates and discussions seem to disavow the affect of pain, and its meaning; they fail to acknowledge that all ‘choices’ and decisions are embedded in the pain of childbirth, and they assume a subject in pain as less than a subject. Childbirth pain emerges in the physical pain of labour, in the pain aroused through fear, in the pain that arises in making complex and difficult decisions; it is integral to all births, whatever their particular course. If we take seriously the place of pain in constituting subjects proposed by Scarry, Diprose, Ahmed and Lee, childbirth pain might be understood as producing a very different form of embodied subjectivity in birthing, where each woman is called back to re-negotiate embodiment and subjectivity anew. And in this re-negotiation, only she can have the authority to speak in and of the pain, the fear and the tumult, to produce the particular embodied subjectivity of her childbirth. Rather than viewing pain, as the potential diminishment of subjectivity, we valorize subjectivity in pain and resituate authority with the birthing woman alone. This will not resolve questions of control and conflict in childbirth, but it would allow pain to be a productive part of these conversations and contests. Ahmed, S. (2002) ‘The Contingency of Pain’, parallax 8 (1): 17-34. Akrich, M. & Pasveer, B. (2004) ‘Embodiment and Disembodiment in Childbirth Narratives’, Body & Society 10 (2-3): 63-84. Beckett, K. (2005) ‘Choosing Caesarean: Feminism and the politics of childbirth in the United States’, Feminist Theory 6(3): 251-275. Crossley, M. (2007) ‘Childbirth, complications and the Illusion of ‘Choice’’, Feminism and Psychology 17 (4): 543-563. Diprose, R. (1994) the bodies of women: ethics, embodiment and sexual difference. London & New York: Routledge. Fisher, C., Hauck, Y., & Fenwick, J. (2006) ‘How Social Context Impacts on Women's Fears of Childbirth: A Western Australian Example’, Social Science & Medicine 63(1): 64-75. Fournier, V. (2002) ‘Fleshing out Gender: Crafting Gender Identity on Women's Bodies’, Body & Society 8 (2): 55-77. Fox, B & Worts, D. (1999) ‘Revisiting the Critique of Medicalised Childbirth: A Contribution to the Sociology of Birth’, Gender & Society 13(3): 326-346. Gawande, A. (2006) ‘The Score: How childbirth went industrial’. The New Yorker, October 9: 59-67. Layne, L. (2003) ‘Unhappy endings: a feminist reappraisal of the women’s health movement from the vantage of pregnancy loss’, Social Science & Medicine 56: 1881-1891. Lee, W. (2006) ‘On the (im)materiality of violence: Subjects, bodies, and the experience of pain’, Feminist Theory 8(3): 277-295. Martin, K. (2003) ‘Giving Birth Like a Girl’, Gender & Society 17(1): 54-72. Niven, C. & Murphy-Black, T. (2000) ‘Memory for Labor Pain: A Review of the Literature’, Birth 27 (4): 244-253. Reiger, K. & Dempsey, R. (2006) ‘Performing birth in a culture of fear: an embodied crisis of late modernity’, Health Sociology Review 15: 364-373. Rivera-Fuentes, C. & Birke, L. (2001) ‘ Talking with/in pain Reflections on bodies under torture’, Women's Studies International Forum 24 (6): 653-668. Scarry, E. (1985). The Body in Pain: The Making and Unmaking of the World. Oxford University Press: New York & London. Searle, J. (1996) ‘Fearing the Worst-Why do pregnant women feel ‘at risk’?’,Australian & New Zealand Journal of Obstetrics 36(3): 279-286. Shildrick, M. (1997) Leaky Bodies and Boundaries: Feminism, postmodernism and (bio)ethics. London & New York: Routledge. Simkin, P. (2000) ‘Commentary: The Meaning of Labor Pain’, Birth 27 (4): 254-255. Wall, P. (2000) Pain: The Science of Suffering. New York: Columbia University Press. Whelan, E. (2003) ‘Putting Pain to Paper: Endometriosis and the Documentation of Suffering’, Health 7(4): 463-482. Wolf, J. (2002) ' “Mighty Glad to Gasp in the Gas”: Perceptions of Pain and the Traditional Timing of Obstetric Anaesthesia’, Health 6(3): 365-387.
2019-04-22T01:05:11Z
http://www.outskirts.arts.uwa.edu.au/volumes/volume-22/maher
Get Jeff Dunham Tickets Now, Hurry up and go to buy those tickets! Comedy was with human since the beginning of life on earth. But the term Comedy (in Greek kōmōidía) in its modern meaning signifies any work with the intention of being humorous and offering amusement and incites laughter. Comedies may appear in theater, movie, TV, or stand up shows. The modern term Comedy is quite different from Comic theatre that has its roots in ancient Greek. Among the categories of Comedy, there’s Satire, Parody, Screwball comedy, Black comedy, comedy of manners, Romantic comedy and other types. Back to 425 BC, a comic playwright named Aristophanes wrote over than 40 comedies, but only 11 of them survived and still being performed. For Aristotle, he defines Comedy as one of the original literary genres in addition to lyric poetry, epic poetry, and tragedy. Who of us doesn’t laugh? Every normal human being laughs and likes humor jokes and situations. Nowadays, Comedies are among the highly attended events for the entertainment they offer, thus Comedy tickets are among those to sell out swiftly. Of course, what might be funny for you mightn’t be for someone else and vice versa, depending on cultural background and age, for that there are different choices of comedies and every person goes to the events he finds himself in. We have a wide range of comedy tickets including all hot comedy events, and you can choose any of the events that would satisfy you and provoke your laughter. Get you cheap comedy tickets today and enjoy your attendance of any of the comedy events! Kevin Hart (born July 6, 1980) is an American actor and comedian, born and raised in Philadelphia, Pennsylvania. Micah S. Katt Williams (born September 2, 1971) is an American comedian. Jerome A. "Jerry" Seinfeld born April 29, 1954) is an American stand-up comedian, actor, writer. Daniel Dwight Tosh is an American stand-up comedian. He hosts the Comedy Central television show Tosh. Ronald "Ron" White is an American stand up comedian and actor who has had two Grammy Award-nominations. The Citi Performing Arts Center (formerly Wang Center for the Performing Arts) is located in Boston, Massachusetts, USA. Terry Wayne Fator born June 10, 1965 is a ventriloquist, impressionist, comedian, and singer from Dallas, Texas. Wilbur Theatre is a historic theater at 244-250 Tremont Street in Boston, Massachusetts. It is located in Boston's theatre district. New York is the most populous city in U.S & one of the most populous metropolitan areas ! At the time when you think of going to most important concerts for example Las Vegas Jerry Seinfeld, or others from the sort of Jerry Seinfeld, you have not to pay much attention to prices for the great delight secured when you attend.We are so pleased to give you assistance to book discounted Las Vegas Jerry Seinfeld September 23rd, 2018 tickets, and support you also be on time to Jerry Seinfeld most important concerts.Continue browsing this site if your intention is to find Las Vegas Jerry Seinfeld September 15th, 2018 tickets, or when you want to be on time to Jerry Seinfeld or any of the most important concerts whatever location they appear in. Following your arrival to our site, San Diego Trevor Noah 2019 tickets are only clicks away; regardless of where your home is in, be that in San Diego or any other location.Booking inexpensive San Diego Trevor Noah 2019 tickets will be simple as this singer's fans come from around the nation including San Diego, and because of of high demand tickets sell out quickly.You will probably find better than our site to reserve inexpensive Trevor Noah San Diego tickets even if live in San Diego, so don't be late to order your tickets. Along your Detroit Nick Offerman tickets trade, we will accompany you and assist you book VIP seats including for concerts that appear in Detroit or any other place.Booking discounted Detroit Nick Offerman December 13th tickets will be easy as this performer's fans come from around the nation including Detroit, and for the reason of of high demand tickets sell out swiftly.We cannot promise that Nick Offerman Detroit December 2017 tickets would be accessible or cheaper than now, especially as this performance's attendees come from many areas including Detroit and a lot other cities. The fans who have the habit of being on time to concert have the information that Bethel Adam Sandler tickets are going to be expensive and they hurry to book; so, if you are looking forward to attend, whatever city you are in Bethel, do not wait a lot.Like any concert attendee, you may want to go to Adam Sandler Bethel April 2019 concerts and the prices you come across are a little bit hefty, now you have come to the ideal place to purchase inexpensive tickets and attend all Bethel hottest concerts.Some concerts are famous for the hefty prices of their tickets taking in consideration Adam Sandler Bethel for instance; but don't worry, Ticketsreview.com is here to support you purchase inexpensive tickets even for Bethel hottest concerts. Prior to going to seek elsewhere, remember that Detroit Jim Gaffigan tickets in addition to tickets for Jim Gaffigan performances procured here are cheap than what you are going to stumble on in other sites.Tickets for Jim Gaffigan Detroit March 12th, 2019 performance might be attained in several other secondary ticket markets, but discount prices is what's difficult to stumble on; however, when you browse our site, you might profit of big reductions even on Jim Gaffigan tickets that are in most times pricey.Performances such as of Jim Gaffigan have always grabbed attention of concert admirers that's why ticket prices are hefty in these places, but as you arrived here, discounted tickets are waiting for including Detroit Jim Gaffigan 2019 tickets or tickets for any of the important performances. Any most important performance you may look forward to be on time to, for example Mike Epps Grand Prairie May 2019 performance or any performances appearing in Verizon Theatre at Grand Prairie, Ticketsreview.com can provide their low cost tickets.If you wait for a response why Grand Prairie Mike Epps tickets are pricy, especially those appearing in Verizon Theatre at Grand Prairie, it's due to to the big number of fans that attend such most important performances.You probably knew to have in mind that Mike Epps Grand Prairie tickets are in greatly purchased and they won't be available for long especially if interested in being on time to Verizon Theatre at Grand Prairie, but if you haven't yet known that, now you know it. The defy a concert attendee can meet in his search for Medford Tom Segura tickets is to come across cheap prices, but as you arrived on Ticketsreview, cheapest tickets are assured considering for Tom Segura and all most important performances.If you are a concert fan and couldn't to afford Medford Tom Segura tickets, this website is offering you an opportunity to purchase tickets and go to all most important performances considering Tom Segura performances and pay only cheap prices.Those who suppose that booking Medford Tom Segura tickets is easy are undoubtedly wrong because tickets for such most important performances considering Tom Segura performances that are by attended hordes of fans are pricy and sell out so fast. We offer tickets nearly for all most important concerts like Weird Al Yankovic Seattle, or concerts from the sort of Weird Al Yankovic, so you won't find better than our website to reserve your tickets.Without any doubt, what is important for those seeking Seattle Weird Al Yankovic 2018 tickets after seats location is the prices, so if you want to benefit from huge discounts considering on Weird Al Yankovic tickets, our site would be a perfect selection.If you wonder when Weird Al Yankovic Seattle concerts will be hosted in, or interest in the schedule of Weird Al Yankovic concerts, you are in the perfect website to have the information. We give support for concerts fans to quickly reach Ali Wong Chicago 2019 tickets and mainly pay cheap prices; further, low cost tickets for Ali Wong are attainable also.What's significant for a concerts admirer when having the intention to go to Ali Wong Chicago or any of the important performances such as Ali Wong is the price of tickets first, and then where the seats locate.If it happens that you are not sure if to go to Ali Wong Chicago performance or your aim is to be present at Ali Wong performance, you only browse the listings on our site and see which of the performances' dates might fit your plans. What fans in fact interest in, whatever location they locate taking in consideration in Las Vegas, when looking forward to be on time to Ron White Las Vegas performance is the prices they'll pay for tickets and after that the position of the seats.It's not plain to get cheap Ron White Las Vegas tickets, however fans that have much luck to arrive on Ticketsreview.com have the option to be on time to all major events taking in consideration those hosted in Las Vegas and any other city around the nation.You won't probably find better than Ticketsreview to get cheap Ron White Las Vegas tickets even if locate in Las Vegas, so don't be late to order your tickets. In case you never visited this site, then you have missed a golden chance to reserve discount Bill Maher Las Vegas tickets in addition to tickets for Bill Maher and more events.When it is related to the prices Bill Maher Las Vegas tickets or tickets for any major events that appear around the nation for example Bill Maher, no other secondary ticket market can be compared to our website.To be a concerts fan implies that you might have the aim to reserve Las Vegas Bill Maher tickets or have the intention to attend Bill Maher, so if this is the case you are invited to reserve on our pages. Don't feel any surprise if we declare that Phoenix DC Young Fly tickets we are offering are amongst the cheapest on the web, so either your home is in in Phoenix or any other city you can reserve right away.Forget searching all around the internet to come across the perfect place where to purchase discount DC Young Fly Phoenix tickets or where to secure a seat for Phoenix most important concerts as you have come to the ultimate website where to book them.Ordering discount Phoenix DC Young Fly March 15th, 2019 tickets won't be easy as this performer's fans come from around the nation taking in consideration Phoenix, and due to of high demand tickets sell out quickly. Prior to going to seek in another site, bear in mind that Midwest City Eddie Izzard tickets as well as tickets for Eddie Izzard performances procured here are cheap than what you will find in other websites.Some contentment attendees do not want to trust that Midwest City Eddie Izzard tickets are pricy and sell out swiftly, and if wait to the last moment to order tickets for such hot performances considering Eddie Izzard, you could either miss the event or pay high prices.Performances such as of Eddie Izzard have always drawn attention of concerts attendees for that reason ticket prices are high in these cities, but as you ended here, discount tickets are awaiting considering Midwest City Eddie Izzard 2019 tickets or tickets for any of the most important performances. The main gain of accessing Ticketsreview.com when searching for San Antonio Steve Martin tickets or tickets for any of the concerts considering those taking place in main showgrounds such as Majestic Theatre is the affordable prices we are providing.It is supposed from you to have the idea that Steve Martin San Antonio tickets are in in high demand and they will not be accessbile for long mainly if interested in being on time to Majestic Theatre, but if you haven't yet known that, now you keep this in mind.A lot of sites tell that they have low priced Steve Martin San Antonio tickets, but they in fact don't have affordable prices, mainly for some concerts taking place in Majestic Theatre, and that's not the case on this site at all. Don't miss this remarkable chance to attend Jo Koy Brea May 07th concerts and all hottest concerts that are going to stop at Brea as low priced tickets are available via our website.At Whatever times you have a question about Brea Jo Koy tickets or about tickets of any of the hottest concerts whatever city they are hosted in including in Brea, feel free to contact us.Some concerts are famous for the hefty prices of their tickets including Jo Koy Brea for example; but don't worry, Ticketsreview is here to help you book low priced tickets even for Brea hottest concerts. The major concern a concerts fan worry about is not where to stumble on Funny As Ish Comedy Tour Columbus tickets or tickets for some important performances such as Funny As Ish Comedy Tour, but the price he'll pay for those tickets.Don't believe if someone tells you that all online secondary ticket markets have expensive Columbus Funny As Ish Comedy Tour tickets, and you only explore concerts schedules yourself considering for some basic performances like Funny As Ish Comedy Tour and you'll find to what extent our prices are cheap.Please don't forget¸ bear in mind that Funny As Ish Comedy Tour Columbus tickets or tickets for some performances attended by huge number of fans such as Funny As Ish Comedy Tour will be will for long, so if you don't want to miss the performances, you only book book early. What makes David Sedaris Boise August 19th, 2018 tickets pricy is the huge number of fans that attend the concert particularly when taking place in some arenas for example Egyptian Theatre, so speed up to find a seat.To take a place in best seats when being on time to David Sedaris Boise concert is not something simply reached unless you pay high prices; however, being on Ticketsreview is a step in the way being on time to all major concerts for example those appearing in Egyptian Theatre and above all pay competitive prices.What makes Ticketsreview.com special is its capability to provide David Sedaris Boise tickets and it also gives the opportunity for concert fans from several places taking in consideration Egyptian Theatre attend major concerts and pay just competitive prices. When arrived here, any concert attendee whatever location he lives taking in consideration in San Diego and no matter what prices he might afford, he would order Sebastian Maniscalco San Diego tickets.What to profit of accessing our website when looking for San Diego Sebastian Maniscalco tickets is the discounted prices we are procuring for all important performances taking in consideration those that take place in San Diego or any other location.After booking tickets for San Diego Sebastian Maniscalco May 15th, 2019, if this is what you are looking for in, keep in mind that you can check for other performances that will be hosted in in San Diego, and enjoy your purchase on our website. To taste the joy of concert including those hosted in Huntington, there's a performance that is worth attendance, it's Huntington Jonathan Van Ness concert.Between the performances for which tickets sell out swiftly, Jonathan Van Ness Huntington, as it is attended by great numbers of of fans from around US including from Huntington, so rush to secure a seat.What's important when attending Huntington Jonathan Van Ness or any main performances of those appearing in Huntington is to park yourself in VIP seats, and more importantly, pay fair prices. Some pleasure enthusiasts don't want to trust that Mountain View Cast Of Impractical Jokers tickets are overpriced and sell out swiftly, and if wait to the last minutes to buy tickets for such hot concerts considering Cast Of Impractical Jokers, you could either miss the concert or pay high prices.Events for example of Cast Of Impractical Jokers have always grabbed attention of concert enthusiasts for that reason ticket prices are high in these places, but as you arrived here, cheap tickets are awaiting considering Mountain View Cast Of Impractical Jokers 2019 tickets or tickets for any of the important concerts.Those who imagine that booking Mountain View Cast Of Impractical Jokers tickets is simple are definitely wrong for the reason that tickets for such important concerts considering Cast Of Impractical Jokers concerts that are by attended legions of fans are overpriced and sell out swiftly.
2019-04-20T17:09:06Z
http://www.ticketsreview.com/comedy/
13. Stoppage, reduction or suspension of Grant-in-aid. 14. Reserve Fund of the School. 16. Plants and estimate for the proposed expenditure. 1. Short title, extent and commencement. - (1) These Rules may be called the Mizoram Aided School (Recurring and Non-Recurring Grants-in-Aid) Rules, 1990. (2) It shall extend to the whole of Mizoram. (3) It shall come into force on such date as the State Government may by notification in the Official Gazette appoint. (a) "Board" means the Board of School Education to which an institution is affiliated for the purpose of any public, examination conducted by the affiliating Board. (k) "Secretary" means Secretary of the Committee. (l) "Treasurer" means any one member of the Committee declared to hold the office by a voted resolution of the Committee. 4. Conditions for grants-in-aid. - (1) The institutions in Mizoram already receiving recurring deficit grants immediately preceding the introduction of these rules shall continue to receive the same; provided that the Managing Committee of these institutions re-adjust themselves to conform to the rules formulated herewith from the date of their introduction and are not deemed, at any time, to be grossly neglecting or infringing these rules or are found to be lacking in their ability to maintain a desirable standard of academic efficiency in their institutions, in which case the grants may be reduced to the level of ad hoc grants or withdrawn completely or suspended at the discretion of the Government. (a) In the event of genuine complaints received by Government through the S.D.E.O/D.E.O/Director of Education concerned or directly, about the bad character, poor and inefficient performance, negligence of duty and other undesirable activities of teachers and headmasters of Middle and High Schools which are of such nature as are harmful and detrimental to the progress and general interest of the school and as are violative of these rules, the Government, shall have power to take up the matter directly and make final decision in consultation with the Managing Committee of the School. (b) It shall not keep under its employment any staff member beyond the age of 60 (sixty) except with the specific approval of the Government. (c) The conditions pertaining to the minimum enrolment as laid down under this sub-rule may be relaxed by the Government in exceptional and deserving cases. (d) It must have been in existence for a minimum period of three (3) years running effectively on its own resources and/or on and ad hoc grant if received from the Government. (e) It shall ensure that no teacher under its employment takes more than two private tuitions in case of institutions up to the High School level with the prior approval of the District Education Officer. (h) It shall not add or terminate any section of a class without prior approval of the Director, not shall it enrol more than the number of forty students permitted in a section of any class in case of institutions up to Class X level without prior approval of the District Education Officer. (i) It shall not appoint any of its staff on a scale of pay and allowances higher than what may be applicable in case of his counterpart in the Government service not shall it allow any higher start of grant or any premature increment to any of its staff member except with the prior approval of the Government subject to the relaxation that in case of the appointment of a qualified serving person from another recognised institution. The Director will have power to allow the managing committee to appoint him on the pay he was actually drawing in the other recognised institution that was previously approved by the Director. (j) Before any institution is brought under deficit grant, the teaching staff already in position in the institution shall be subject to a screening process by a committee duly constituted for the purpose within the relevant provisions of these rules and the managing committee of the institution shall undertake to dispense with the services of such members of the teaching and ministerial staff as may be considered unsuitable for continuance in the institution after such circumstances in which case the Government's specific approval shall have to be obtained. (k) It shall not make appointment of any new teaching staff except from the panels prepared on the recommendation of selection committees duly constituted under these rules for making approved panels which shall remain in force for one year from the date of their formation or till the same gets exhausted, whichever is earlier. (a) It shall have managing committee duly constituted and approved by the Government. (b) It shall normally have its own building and lands, the ownership of which should be legally vested in its duly constituted managing committee, such land and buildings being considered adequate by the Department for effective education at the various levels for which it runs the institution ; provided that the Government may, in any deserving case, relax this condition and consider the desirability of making recurring grants to otherwise well-rum institutions accommodated in suitable rented building, pending construction of their own buildings. (c) Within two years from the date of publication of these Rules, the managing committee of the institution shall get itself registered under the Societies Registration (Extension to Mizoram) Act, 1977 (Mizoram Act 3 of 1977) or public trust constituted under any law for the time being in force, unless of course it is already registered under any of these. (e) It shall not start functioning without prior approval of the Department. (f) It shall not adversely after the enrolment of any institution of the same type within three kilometres of its location. (g) it shall follow courses, curricula, syllabi and text books for the various stages of education as prescribed by the authority competent to do so. i.e., Director for Classes I1 to VII, Officiating Board for Classes VIII to X. (j) It shall make adequate arrangement for class room accommodation, playfield and sanitation. (k) It shall take effective steps to promote discipline and orderly behaviour on the part of the students and the staff as also to maintain a high morale in the institution. Failure in this respect may result in suspension or withdrawal of the grant. (n) It shall promptly and accurately furnish such statistics, reports and information as may be called for by the Department or any other authorised officer. (o) It shall maintain full accounts of all its income and expenditure, the latter being supported by duly maintained acquittance rolls/vouchers. This must be annually audited by the competent persons/officers approved by the Director. The annual audit report shall be considered by the managing committee of the institution in a regular meeting soon after the submission of the report and the attested copies of the audit report and managing committee adopting the same shall be submitted to the Director with a copy to the District Education Officer. (p) It shall not employ any teaching and/or other allied staff having qualification less than what may be approved by the Government or Board. (q) It shall not normally levy tuition and other approved fees from the students at rates higher than those charged from their counterparts in a Government institution at equivalent levels; provided that such fees may be allowed to be raised by the Government in exceptional circumstances to limited higher extent on grounds considered valid by the Government; provided further that in addition to these approved fees the managing committee of an institution may levy a development/building construction fee from the parents/guardians of each student once a year up to the extent of two times the monthly tuition fee of his/her ward. A separate account shall be maintained for such collections and no amount from such collections shall be spent for repair/construction/reconstruction of the institution building without prior approval of the Director. (r) The managing committee shall have a constitution for running it smoothly and effectively and also rules for the transaction of its business duly approved by the Government and shall not make any amendment thereto without prior approval of the Government. (c) voluntary contributions by the parents or guardians for construction of any buildings for the school or its hostel. Note. - No aided school shall levy or collect any donation compulsorily from any student or his/her parent or guardian. 6. Approved expenditure. - (1) The approved expenditure of a school shall comprise of the salaries of the teachers and staff appointed with the approval of the Director or any other officer authorised by him in this behalf to the extent and according to the scales of pay as prescribed by the Government from time to time. (a) The number of the teachers in each subject will be determined in accordance with the provisions of the Government Ordinance or ordinance of the affiliating Board on the affiliation of the school as approved by the Government. (b) One Craft Teacher for High School and Middle School. (c) One Lower Division Clerk for High School. (e) One Chowkidar for High School and Middle School; provided that if the enrolment is below the number prescribed in Rule 4(3)(c) for consecutive three years, the Government shall not be bound to provide or sanction a separate post of Chowkidar. Even for those schools which fulfil the prescribed strength of enrolment, the Government may or may not sanction both the posts of peon and Chowkidar depending on the availability of fund. (3) (a) In case any member of the staff is sent for training course extending over a period of three months or more by the institution with the approval of the Director, expenditure on account of usual pay and allowances including admissible deputation allowances along with the expenditure on account of pay and allowances admissible in respect of qualified person actually appointed to officiate in the vacancy with the approval of the Director shall be computed as approved expenditure for calculation of grants. (b) Expenditure on account of any special allowances/special pay allowed to a member of the teaching staff for performance of any duties in addition to his normal duties; provided such allowances are given to the member after obtaining specific prior approval of the Director. (c) With effect from the date of taking an institution under grant-in-aid initial pay and allowances of all the members of the staff shall be fixed for the purpose of calculation of approved expenditure by taking into account basic salary actually earned by them and actually paid to them by the institutions before such dates. Thereafter regular annual increments shall be earned by them on due dates except when such increments are withheld and/or differed on valid grounds and the same shall be included in the calculation of approved expenditure. (d) The Grants-in-aid shall normally be continued from year to year and shall be payable in advance to the institutions in four quarterly instalments subject to its submission of attested copies of acquittance rolls in respect of the authorised staff actually employed and paid during the previous period of one quarter together with the attested copies of income earned by the institution during the same period. Before releasing any quarterly grant to an institution, the authority releasing the grant shall make such adjustment in respect of the quantum of the grant admissible for the quarter under consideration, as may have become necessary due to unforeseen circumstances. All such adjustments must be completed within one year at the latest after the quarter for which such adjustment has become necessary. Any adjustment not completed within this period shall be brought to the notice of the Director and shall be made only after obtaining specific approval of the Director for such adjustment. Notwithstanding anything contained in these Rules, the Government shall have power to relax the conditions in cases wherein it considers such action necessary to ensure faster development of areas or tribes belonging to the weaker sections. 9. Undertaking. - No grants-in-aid shall be given unless its managing committee gives an undertaking in writing by a formal resolution passed to the effect that it shall comply with the provisions of these rules and such instructions as may be issued from time to time by the Director will regard to grants-in-aid, and that the breach of any provision of these rules or any instruction issued by the Director in this behalf shall render such school liable to forfeiture of the grants-in-aid (Form G-II shall be used for the resolution for this purpose). (c) The grants-in-aid will be payable monthly on bills drawn in the prescribed form by the Secretary to the managing committee of the School and countersigned by the Director or any Officer authorised by him . Note. - Bills shall be supported by a statement of claims in Form G-III together with a statement of computation as at item 5 of Form G-II. 11. Register of Grants-in-aid Bills. - The countersigning authority shall maintain a "Register of Grants-in-aid Bills" incorporating necessary details in respect of each aided school. Note. - It shall be the responsibility of the managing committee to make good from its own funds the shortfall and the salaries of the staff which shall to no way be paid fees than what is due to them. (d) that one or more of the conditions for recognition of the school or for grant-in-aid has been violated. (2) The grant-in-aid school not be stopped, reduced or suspended except after giving the managing committee of the school a reasonable opportunity for showing cause against the proposed action. 14. Reserve Fund of the School. - (1) The School shall have a Reserve Fund of Rupees three thousand in respect of Middle School and rupees ten thousand in respect of High School or such as may be specified by the rules of the affiliating Board, whichever is higher. (2) The Reserve Fund shall be maintained in the name of the School and shall be deposited with any Nationalised Bank or the Post Office Savings Bank or any other Scheduled Bank as approved for the purpose by the Government, and shall be administered jointly by the Chairman and the Secretary of the managing committee of the School concerned. Normally, withdrawal of money out of this fund is not admissible. (i) For a High School, rupees two lakhs for institutional buildings rupees one lakh for staff quarter, rupees one lakh for play field and rupees forth thousand each for fencing and/or water reservoir. (ii) For a Middle School, rupees one lakh for institutional building, rupees sixty thousand for hostel building, rupees forty thousand for staff quarter, rupees fifty thousand for playfields, and rupees thirty thousand each for fencing and/or water reservoir. (j) The ceiling of grants-in-aid for any one of the purposes under sub-rule (2) of Rule 15 during one financial year shall not exceed Rs. 60,000 in respect of High School and Rs. 30,000 in respect of Middle School. 18. Provision of audit. - The accounts of the fund of the Mizoram Aided Schools (Recurring and Non-recurring Grants) shall be subject to audit by authorised Audit Officers of Accountant General and Examiner of State/Local Accounts. 19. Repeal and savings. - The Recurring Grants-in-Aid for General Maintenance Rules for the Educational Institution in Mizoram, 1975 and Non-Recurring Grants-in-Aid rules for the Recognised Educational Institutions in Mizoram, 1976 (as amended up to date) shall stand dissolved from the date the Mizoram Aided School (Recurring and Non-Recurring Grants-in-Aid) Rules, 1990 come into force. (2) Notwithstanding such repeal, any action done or taken under the rules so repealed shall be construed as validly done or taken under the corresponding provisions of these Rules. Provided that retirement of a member from the managing committee duly notified to the Director of any Officer authorised by him to this behalf will relieve him of any responsibility for any action of the managing committee taken after the date of his retirement. (b) The period up to which half yearly internal audit of the accounts arranged by the managing committee. Remarks explanatory of any notable difference between the (a) and (b); (c) and (d) and (e) above. 12. Land and Building. - (a) Whether the school has land of its own, if so the areas and location? (b) Whether the school is held at present in its own premises or rented premises? (c) Give brief particulars of accommodation available like number of room, area, etc. I/We certify that the above statement and particulars submitted are true and correct to the best of my/our knowledge and I/we/am/are authorised by the managing committee maintenance grants under the Rules relating to Maintenance Grants to Aided Schools approved by the Government and Undertaking strictly to abide by them. N.B. - 1. Separately sheets may be enclosed if required in furnishing particulars to any column duly signed by the applicants, if desired, with seal. 2. The application for maintenance grant should be submitted to the Director of School Education, Mizoram in duplicate.
2019-04-23T14:07:45Z
http://bareactslive.com/NER/NER113.HTM
Please read this Agreement carefully before accessing or using the Website. By accessing or using any part of the web site, you agree to become bound by the terms and conditions of this agreement. If you do not agree to all the terms and conditions of this agreement, then you may not access the Website or use any services. If these terms and conditions are considered an offer by Taylor-Cain, acceptance is expressly limited to these terms. The Website is available only to individuals who are at least 13 years old. Your taylor-cain.com Account and Site. If you create a blog/site on the Website, you are responsible for maintaining the security of your account and blog, and you are fully responsible for all activities that occur under the account and any other actions taken in connection with the blog. You must not describe or assign keywords to your blog in a misleading or unlawful manner, including in a manner intended to trade on the name or reputation of others, and Taylor-Cain may change or remove any description or keyword that it considers inappropriate or unlawful, or otherwise likely to cause Taylor-Cain liability. You must immediately notify Taylor-Cain of any unauthorized uses of your blog, your account or any other breaches of security. Taylor-Cain will not be liable for any acts or omissions by You, including any damages of any kind incurred as a result of such acts or omissions. you have, in the case of Content that includes computer code, accurately categorized and/or described the type, nature, uses and effects of the materials, whether requested to do so by Taylor-Cain or otherwise. By submitting Content to Taylor-Cain for inclusion on your Website, you grant Taylor-Cain a world-wide, royalty-free, and non-exclusive license to reproduce, modify, adapt and publish the Content solely for the purpose of displaying, distributing and promoting your blog. If you delete Content, Taylor-Cain will use reasonable efforts to remove it from the Website, but you acknowledge that caching or references to the Content may not be made immediately unavailable. Without limiting any of those representations or warranties, Taylor-Cain has the right (though not the obligation) to, in Taylor-Cain's sole discretion (i) refuse or remove any content that, in Taylor-Cain's reasonable opinion, violates any Taylor-Cain policy or is in any way harmful or objectionable, or (ii) terminate or deny access to and use of the Website to any individual or entity for any reason, in Taylor-Cain's sole discretion. Taylor-Cain will have no obligation to provide a refund of any amounts previously paid. By selecting a product or service, you agree to pay Taylor-Cain the one-time and/or monthly or annual subscription fees indicated (additional payment terms may be included in other communications). Subscription payments will be charged on a pre-pay basis on the day you sign up for an Upgrade and will cover the use of that service for a monthly or annual subscription period as indicated. Payments are not refundable. Unless you notify Taylor-Cain before the end of the applicable subscription period that you want to cancel a subscription, your subscription will automatically renew and you authorize us to collect the then-applicable annual or monthly subscription fee for such subscription (as well as any taxes) using any credit card or other payment mechanism we have on record for you. Upgrades can be canceled at any time by submitting your request to Taylor-Cain in writing. Fees; Payment. By signing up for a Services account you agree to pay Taylor-Cain the applicable setup fees and recurring fees. Applicable fees will be invoiced starting from the day your services are established and in advance of using such services. Taylor-Cain reserves the right to change the payment terms and fees upon thirty (30) days prior written notice to you. Services can be canceled by you at anytime on thirty (30) days written notice to Taylor-Cain. Support. If your service includes access to priority email support. "Email support" means the ability to make requests for technical support assistance by email at any time (with reasonable efforts by Taylor-Cain to respond within one business day) concerning the use of the VIP Services. "Priority" means that support takes priority over support for users of the standard or free taylor-cain.com services. All support will be provided in accordance with Taylor-Cain standard services practices, procedures and policies. Responsibility of Website Visitors. Taylor-Cain has not reviewed, and cannot review, all of the material, including computer software, posted to the Website, and cannot therefore be responsible for that material's content, use or effects. By operating the Website, Taylor-Cain does not represent or imply that it endorses the material there posted, or that it believes such material to be accurate, useful or non-harmful. You are responsible for taking precautions as necessary to protect yourself and your computer systems from viruses, worms, Trojan horses, and other harmful or destructive content. The Website may contain content that is offensive, indecent, or otherwise objectionable, as well as content containing technical inaccuracies, typographical mistakes, and other errors. The Website may also contain material that violates the privacy or publicity rights, or infringes the intellectual property and other proprietary rights, of third parties, or the downloading, copying or use of which is subject to additional terms and conditions, stated or unstated. Taylor-Cain disclaims any responsibility for any harm resulting from the use by visitors of the Website, or from any downloading by those visitors of content there posted. Content Posted on Other Websites. We have not reviewed, and cannot review, all of the material, including computer software, made available through the websites and webpages to which taylor-cain.com links, and that link to taylor-cain.com. Taylor-Cain does not have any control over those non-Taylor-Cain websites and webpages, and is not responsible for their contents or their use. By linking to a non-Taylor-Cain website or webpage, Taylor-Cain does not represent or imply that it endorses such website or webpage. You are responsible for taking precautions as necessary to protect yourself and your computer systems from viruses, worms, Trojan horses, and other harmful or destructive content. Taylor-Cain disclaims any responsibility for any harm resulting from your use of non-Taylor-Cain websites and webpages. Copyright Infringement and DMCA Policy. As Taylor-Cain asks others to respect its intellectual property rights, it respects the intellectual property rights of others. If you believe that material located on or linked to by taylor-cain.com violates your copyright, you are encouraged to notify Taylor-Cain in accordance with Taylor-Cain's Digital Millennium Copyright Act ("DMCA") Policy. Taylor-Cain will respond to all such notices, including as required or appropriate by removing the infringing material or disabling all links to the infringing material. Taylor-Cain will terminate a visitor's access to and use of the Website if, under appropriate circumstances, the visitor is determined to be a repeat infringer of the copyrights or other intellectual property rights of Taylor-Cain or others. In the case of such termination, Taylor-Cain will have no obligation to provide a refund of any amounts previously paid to Taylor-Cain. Intellectual Property. This Agreement does not transfer from Taylor-Cain to you any Taylor-Cain or third party intellectual property, and all right, title and interest in and to such property will remain (as between the parties) solely with Taylor-Cain. Taylor-Cain, taylor-cain.com, the taylor-cain.com logo, and all other trademarks, service marks, graphics and logos used in connection with taylor-cain.com, or the Website are trademarks or registered trademarks of Taylor-Cain or Taylor-Cain's licensors. Other trademarks, service marks, graphics and logos used in connection with the Website may be the trademarks of other third parties. Your use of the Website grants you no right or license to reproduce or otherwise use any Taylor-Cain or third-party trademarks. Advertisements. Taylor-Cain reserves the right to display advertisements on your blog unless you have purchased an ad-free account. Attribution. Taylor-Cain reserves the right to display attribution links such as 'Blog at taylor-cain.com,' theme author, and font attribution in your blog footer or toolbar. Changes. Taylor-Cain reserves the right, at its sole discretion, to modify or replace any part of this Agreement. It is your responsibility to check this Agreement periodically for changes. Your continued use of or access to the Website following the posting of any changes to this Agreement constitutes acceptance of those changes. Taylor-Cain may also, in the future, offer new services and/or features through the Website (including, the release of new tools and resources). Such new features and/or services shall be subject to the terms and conditions of this Agreement. Termination. Taylor-Cain may terminate your access to all or any part of the Website at any time, with or without cause, with or without notice, effective immediately. If you wish to terminate this Agreement or your taylor-cain.com account (if you have one), you may simply discontinue using the Website. Notwithstanding the foregoing, if you have a paid services account, such account can only be terminated by Taylor-Cain if you materially breach this Agreement and fail to cure such breach within thirty (30) days from Taylor-Cain's notice to you thereof; provided that, Taylor-Cain can terminate the Website immediately as part of a general shut down of our service. All provisions of this Agreement which by their nature should survive termination shall survive termination, including, without limitation, ownership provisions, warranty disclaimers, indemnity and limitations of liability. Disclaimer of Warranties. The Website is provided "as is". Taylor-Cain and its suppliers and licensors hereby disclaim all warranties of any kind, express or implied, including, without limitation, the warranties of merchantability, fitness for a particular purpose and non-infringement. Neither Taylor-Cain nor its suppliers and licensors, makes any warranty that the Website will be error free or that access thereto will be continuous or uninterrupted. You understand that you download from, or otherwise obtain content or services through, the Website at your own discretion and risk. Limitation of Liability. In no event will Taylor-Cain, or its suppliers or licensors, be liable with respect to any subject matter of this agreement under any contract, negligence, strict liability or other legal or equitable theory for: (i) any special, incidental or consequential damages; (ii) the cost of procurement for substitute products or services; (iii) for interruption of use or loss or corruption of data; or (iv) for any amounts that exceed the fees paid by you to Taylor-Cain under this agreement during the twelve (12) month period prior to the cause of action. Taylor-Cain shall have no liability for any failure or delay due to matters beyond their reasonable control. The foregoing shall not apply to the extent prohibited by applicable law. Indemnification. You agree to indemnify and hold harmless Taylor-Cain, its contractors, and its licensors, and their respective directors, officers, employees and agents from and against any and all claims and expenses, including attorneys' fees, arising out of your use of the Website, including but not limited to your violation of this Agreement. Miscellaneous. This Agreement constitutes the entire agreement between Taylor-Cain and you concerning the subject matter hereof, and they may only be modified by a written amendment signed by an authorized executive of Taylor-Cain, or by the posting by Taylor-Cain of a revised version. Except to the extent applicable law, if any, provides otherwise, this Agreement, any access to or use of the Website will be governed by the laws of the state of Colorado, U.S.A., excluding its conflict of law provisions, and the proper venue for any disputes arising out of or relating to any of the same will be the state and federal courts located in Jefferson County, Colorado. Except for claims for injunctive or equitable relief or claims regarding intellectual property rights (which may be brought in any competent court without the posting of a bond), any dispute arising under this Agreement shall be finally settled in accordance with the Comprehensive Arbitration Rules of the Judicial Arbitration and Mediation Service, Inc. ("JAMS") by three arbitrators appointed in accordance with such Rules. The arbitration shall take place in Golden, Colorado, in the English language and the arbitral decision may be enforced in any court. The prevailing party in any action or proceeding to enforce this Agreement shall be entitled to costs and attorneys' fees. If any part of this Agreement is held invalid or unenforceable, that part will be construed to reflect the parties' original intent, and the remaining portions will remain in full force and effect. A waiver by either party of any term or condition of this Agreement or any breach thereof, in any one instance, will not waive such term or condition or any subsequent breach thereof. You may assign your rights under this Agreement to any party that consents to, and agrees to be bound by, its terms and conditions; Taylor-Cain may assign its rights under this Agreement without condition. This Agreement will be binding upon and will inure to the benefit of the parties, their successors and permitted assigns. Taylor-Cain, Corp ("Taylor-Cain") operates taylor-cain.com and may operate other websites. It is Taylor-Cain's policy to respect your privacy regarding any information we may collect while operating our websites. Like most website operators, Taylor-Cain collects non-personally-identifying information of the sort that web browsers and servers typically make available, such as the browser type, language preference, referring site, and the date and time of each visitor request. Taylor-Cain's purpose in collecting non-personally identifying information is to better understand how Taylor-Cain's visitors use its website. From time to time, Taylor-Cain may release non-personally-identifying information in the aggregate, e.g., by publishing a report on trends in the usage of its website. Taylor-Cain also collects potentially personally-identifying information like Internet Protocol (IP) addresses for logged in users and for users leaving comments on taylor-cain.com blogs/sites. Taylor-Cain only discloses logged in user and commenter IP addresses under the same circumstances that it uses and discloses personally-identifying information as described below, except that commenter IP addresses and email addresses are visible and disclosed to the administrators of the blog/site where the comment was left. Certain visitors to Taylor-Cain's websites choose to interact with Taylor-Cain in ways that require Taylor-Cain to gather personally-identifying information. The amount and type of information that Taylor-Cain gathers depends on the nature of the interaction. For example, we ask visitors who sign up at taylor-cain.com to provide a username and email address. Those who engage in transactions with Taylor-Cain are asked to provide additional information, including as necessary the personal and financial information required to process those transactions. In each case, Taylor-Cain collects such information only insofar as is necessary or appropriate to fulfill the purpose of the visitor's interaction with Taylor-Cain. Taylor-Cain does not disclose personally-identifying information other than as described below. And visitors can always refuse to supply personally-identifying information, with the caveat that it may prevent them from engaging in certain website-related activities. Taylor-Cain may collect statistics about the behavior of visitors to its websites. Taylor-Cain may display this information publicly or provide it to others. However, Taylor-Cain does not disclose personally-identifying information other than as described below. Taylor-Cain discloses potentially personally-identifying and personally-identifying information only to those of its employees, contractors and affiliated organizations that (i) need to know that information in order to process it on Taylor-Cain's behalf or to provide services available at Taylor-Cain's websites, and (ii) that have agreed not to disclose it to others. Some of those employees, contractors and affiliated organizations may be located outside of your home country; by using Taylor-Cain's websites, you consent to the transfer of such information to them. Taylor-Cain will not rent or sell potentially personally-identifying and personally-identifying information to anyone. Other than to its employees, contractors and affiliated organizations, as described above, Taylor-Cain discloses potentially personally-identifying and personally-identifying information only in response to a subpoena, court order or other governmental request, or when Taylor-Cain believes in good faith that disclosure is reasonably necessary to protect the property or rights of Taylor-Cain, third parties or the public at large. If you are a registered user of an Taylor-Cain website and have supplied your email address, Taylor-Cain may occasionally send you an email to tell you about new features, solicit your feedback, or just keep you up to date with what's going on with Taylor-Cain and our products. If you send us a request (for example via email or via one of our feedback mechanisms), we reserve the right to publish it in order to help us clarify or respond to your request or to help us support other users. Taylor-Cain takes all measures reasonably necessary to protect against the unauthorized access, use, alteration or destruction of potentially personally-identifying and personally-identifying information. If Taylor-Cain, or substantially all of its assets, were acquired, or in the unlikely event that Taylor-Cain goes out of business or enters bankruptcy, user information would be one of the assets that is transferred or acquired by a third party. You acknowledge that such transfers may occur, and that any acquirer of Taylor-Cain may continue to use your personal information as set forth in this policy.
2019-04-22T10:02:50Z
https://www.taylor-cain.com/privacy-policy/
Recent posts From the editor: We are all Spartans Recently, I met up with a long-time friend and her son who is a junior. . . Faculty voice: Todd Lucas: Taking on the 'ick' factor Every year in the United States, colorectal cancer claims more lives. . . Student view: Don Nguyen: Bringing science to life Look around. You can’t see them, but they are there. Bacteria.. . . More Glimpses Glimpse: 'Finding our voices' A woman works on the installation of the MSU Museum exhibit,. . . Glimpse: Spring blooms Now that the temperatures have finally risen, crocuses and other early. . . Glimpse: Support and solidarity MSU students wrote messages in support of survivors. Teal prayer flags. . . Glimpse: Spring has sprung Finally! Spring is starting to show its colors on campus like these. . . Glimpse: Night light A classic MSU lantern illuminates Walter Adams Field at sunset on a. . . Glimpse: Living laboratory Students gather water samples from the Red Cedar River for a class. . . Glimpse: River views The sun shines above the Red Cedar River on a cold winter morning. Photo. . . Glimpse: Ice, ice, berries Winter continues to bring ice and snow to campus. Here, a layer of ice. . . Glimpse: Charting a path . . . Glimpse: Gubernatorial visit MSU Acting President Satish Udpa welcomes Gov. Gretchen Whitmer to. . . Glimpse: Frozen banks . . . Glimpse: New day, new year A student makes his way across the "sacred space" on campus near. . . Glimpse: Season's greetings A vibrant poinsettia tree adorns the greenhouse at the Plant and Soil. . . Glimpse: Holiday cheer Members of the Spartan Marching Band tuba section share some holiday. . . Glimpse: Winter light A traditional MSU lantern adds to the winter wonderland on campus. Photo. . . Glimpse: Snow globe The chilly Red Cedar River as viewed through the opening on the Beal. . . Glimpse: Snowy grad A December graduate takes advantage of the first snowfall of the season. . . Glimpse: Colorful path Students make their way to class in front of the Hannah Administration. . . Glimpse: Shadows of the night Ghostly shadows line the path in the Sacred Space near Linton Hall,. . . Glimpse: Tunnel of trees Students make their way to and from class along the Red Cedar River. . . Glimpse: Fall in love with campus Bright, beautiful fall colors have begun to show themselves on campus.. . . Glimpse: To and fro Walking, riding or boarding, students find a variety of ways to get to. . . Glimpse: Sky view New photos on Spartan Stadium match up perfectly with the clouds on a. . . Glimpse: Bridge walk Students make their way to class across the Wells Hall bridge on a. . . Glimpse: Never forget MSU student organizations painted The Rock in remembrance of the lives. . . Glimpse: UFest Students celebrate the start of the semester at UFest in the MSU Union. . . Glimpse: Moving in Students and volunteers fill carts during Move-In Day on Aug. 25, 2018.. . . Glimpse: Garden bridge Summer's beauty is on full display at MSU's 4-H Children's Gardens. The. . . Glimpse: Summer skies Clouds float over Beaumont Tower on a perfect summer day. Photo by. . . Glimpse: Flower power A student tour guide, in a coordinated backpack to match the scenery at. . . Glimpse: Tracking butterflies David Mota-Sanchez, assistant professor of entomology, with a monarch. . . Glimpse: Branch out One of MSU's 22,000 trees on campus stands in stark contrast to the. . . Glimpse: Summertime Blue skies and sunshine frame Morrill Plaza and Human Ecology Building. . . Glimpse: A more perfect union Flowers adorn the MSU Union on a summer day. Located in North. . . Glimpse: All the world's a stage Department of Theatre Summer Circle actors perform their version of. . . Glimpse: I scream We all scream for ice cream. Hot weather means a visit to the MSU Dairy. . . Glimpse: Standing tall Linton Hall, with it's trademark peak, on a bright spring morning. Built. . . Glimpse: Center court Blue skies frame the Jack Breslin Student Events Center, a venue for. . . Glimpse: Get your head in the game The Spartan helmet adorns the wall of the the Jack Breslin Student. . . Glimpse: A classic This classic spring view of The Spartan Statue never gets old. Photo by. . . Glimpse: Sparty secrets Recent graduate Nicole Niemiec lets the world in on her secret -- that. . . Glimpse: Heads up! Spring graduates toss their caps in the air near Beaumont Tower to. . . Glimpse: Gone fishing An angler tries his luck fishing for Steelhead in the Red Cedar River.. . . Glimpse: Has spring sprung? Spring blooms in the William J. Beal Botanical Garden are finally. . . Glimpse: Featured faculty Lalita Udpa (second from left), professor of electrical and computer. . . Glimpse: 360-degree lab Designed for multi-disciplinary use, MSU’s Digital Scholarship Lab. . . Glimpse: New equipment Mechanical engineering doctoral student Berk Can Duva (right) and his. . . Glimpse: Dog day afternoon MSU Libraries host "Therapy Dog Thursday" in the Main Library to give. . . Glimpse: Book return High-level flood waters surround the MSU Library book return on Red. . . Glimpse: Study hall Students work together to complete assignments and study. Photo by. . . Glimpse: Winter's path Despite the cold temperatures, a simple walk to class in the winter can. . . Glimpse: Never again Students support survivors and march for change from The Rock to the. . . Glimpse: Commemorating MLK Jr. Students, staff, faculty and community members brave frigid temperatures. . . Glimpse: Through the looking glass The Red Cedar River glimmers through detail on the Kalmazoo Bridge on a. . . Glimpse: Spartan snowglobe A student braves the elements near Eustace-Cole Hall on Dec. 13, 2017. . . Glimpse: Walking in a winter wonderland Students walk through the beautiful W. J. Beal Botanical Garden on a. . . Glimpse: Snowy path A student navigates his snowy walk near Beaumont Tower after the first. . . Glimpse: Autumnal whoosh The last few leaves from campus trees fly past the Eli and Edythe Broad. . . Glimpse: Neither snow nor rain... The Spartan Marching Band fought against snow flurries and sleet to. . . Glimpse: Sunlit path A student rides along the MSU bike path on a sunlit fall day. Photo by. . . Glimpse: Fall views A student walks among the vibrant hues of autumn near Beaumont Tower on. . . Glimpse: Drum line Members of the Spartan Marching Band percussion section march along the. . . Glimpse: Wicked Witch of the East (Lansing) A Wicked Witch gets into the Halloween spirit and takes a ride along the. . . Glimpse: Spartan pride The Spartan statue stands tall just west of Spartan Stadium on a. . . Glimpse: Spartans Will build bridges New artwork, based on a student's sketch, adorns the bridge behind the. . . Glimpse: SMB shadows The Spartan Marching Band rehearses on campus for their joint half-time. . . Glimpse: Study hour A new Spartan gets some studying in while enjoying a beautiful fall day. . . Glimpse: Up close and personal An MSU student examines a specimen under a microscope in her organismal. . . Glimpse: Garden stroll Two students take a break from classes to stroll through the W. J. Beal. . . Glimpse: Never forget MSU's Rock is painted to remember the victims of 9/11. Photo by Derrick. . . Glimpse: Spartan Spectacular Students check out the fireworks show at the end of the annual Fall. . . Glimpse: Movie night Students enjoy "Guardians of the Galaxy 2" during movie night at The. . . Glimpse: Spartan eclipse of the heart While the MSU campus did not experience a total eclipse, there were. . . Glimpse: Tomato, tomahto Alex Marx, a junior majoring in environmental studies and sustainability. . . Glimpse: Fountain of knowledge The fountain behind Old Horticulture gives movement to a beautiful. . . Glimpse: Summer school shadows Students in the Red Cedar Writing Project's Spartan Writing Camp, hosted. . . Glimpse: Summer skies A beautiful summer sky and a classic MSU lantern frame the MSU Student. . . Glimpse: Standing tall Linton Hall, the second oldest extant building on campus, stands tall on. . . Glimpse: #ResilientTree This campus white oak tree, which was dated at nearly 350 years old, was. . . Glimpse: Branded A well-branded Spartan walks on campus near the Brody complex on June. . . Glimpse: Dig into summer Students work at the Campus Archaeology Program Summer Field School dig. . . Glimpse: Garden shadows Vistiors to the Beal Botanical Garden enjoy a beautiful summer day on. . . Glimpse: Live a little more As Adele says, "Look up to the sky, not just the floor." A beautiful. . . Glimpse: Benched Visitors to the W. J. Beal Botanical Garden enjoy the view of the. . . Glimpse: Wells Hall reflections Students enjoy the spring weather while relaxing on the patio outside of. . . Glimpse: Shadow branches A thornless honey locust tree casts its morning shadow on the MSU Main. . . Glimpse: Reach for the clouds Recent graduates celebrate their accomplishments on the bridge near. . . Glimpse: So long, Sparty A recent graduate celebrates with Sparty. During last week's. . . Glimpse: Earthy frame A tree trunk frames a beautiful sunset scene at the MSU Farms on Earth. . . Glimpse: Touchdown, spring! Spring blossoms frame the Spartan helmet on the Spartan Stadium. . . Glimpse: Spring blooms Spring daffodils bloom near the W. J. Beal Botanical Garden on April 14,. . . Glimpse: Over the banks The Red Cedar flows over the banks onto the pathway leading into the. . . Glimpse: Good morning, Spartans A beautiful sun rises between the Morrill Hall of Agriculture and Kedzie. . . Glimpse: On the margins MSU's Orchesis Dance Company rehearses for "On the Margins." The. . . Glimpse: Spring in their steps Students jog past a bed of blossoming winter aconite flowers as spring. . . Glimpse: In like a lion A student walks near Linton Hall and braves the winter weather on his. . . Glimpse: Study time A dedicated student puts in some study time in the Plant and Soil. . . Glimpse: Best dressed Angie Wendelberger (far left) gives students some costume construction. . . Glimpse: Global perspective Students make their way through the MSU International Center, home to. . . Glimpse: Ray of sunshine The winter sun warms things up a bit as it peeks over the corner of. . . Glimpse: Reflections on winter Reflections in the Red Cedar River on a winter day paint a beautiful. . . Glimpse: Run, Spartans, run Members of the 2016-17 Michigan State University cross-country team head. . . Glimpse: Riding the Red Cedar A couple of kayakers brave the January temperatures to enjoy a ride. . . Glimpse: Winter thaw Rising temperatures and rain created a winter thaw on campus on Jan. 17,. . . Glimpse: Snow days A student walks across campus along West Circle Drive during the first. . . Glimpse: Shade of winter Shadows of trees are cast onto the side of the Eli and Edythe Broad Art. . . Glimpse: Closed for the winter Gates to the The W. J. Beal Botanical Garden near the Main Library are. . . Glimpse: Winter blanket The Spartan wears a winter blanket of snow while standing guard near. . . Glimpse: Holiday greenery The annual MSU Horticulture Gardens poinsettia tree provides some. . . Glimpse: Misty morning A morning mist rises in Sleepy Hollow, near the MSU Music Practice. . . Glimpse: Performance art Music students perform an impromptu concert of "Beethoven's Fifth. . . Glimpse: Reflections A student pauses for reflection on the banks of the Red Cedar on Nov.. . . Glimpse: Falling leaves Fall leaves cascade down on campus during a bright fall day. Photo by. . . Glimpse: Red Cedar research Students examine samples taken from the Red Cedar River on Oct. 11,. . . Glimpse: Shine on, Spartan The Spartan statue is illuminated by bright fall sunlight on Oct. 19,. . . Glimpse: River art One of four spots along the Red Cedar River displaying installations of. . . Glimpse: Don't fence me in An autumn sunset captures the beauty of the Spartan farms on Oct. 2,. . . Glimpse: Rainy days and Thursdays Even a rainy Thursday can't dampen the Spartan spirit of students as. . . Glimpse: Mother Nature Spectacular clouds roll over Beaumont Tower on Sept. 21, 2016. Photo by. . . Glimpse: Art class A class session takes advantage of a lovely September afternoon near. . . Glimpse: Spartan Remix Students participating in the Spartan Remix gather around The Rock. The. . . Glimpse: Movie night MSU students enjoy movie night under the stars on Adams Field, Aug. 29.. . . Glimpse: In tune Members of the Spartan Marching Band tuba section practice in Spartan. . . Glimpse: Day of Service Hundreds of MSU Residence Education and Housing Services staff members. . . Glimpse: Things are looking up A sculpture in front of the Fairchild Theatre points to the summer sky.. . . Glimpse: Perennially beautiful Visitors enjoy a quiet moment in the shade of the entrance pavillion of. . . Glimpse: Pokemon Go...Green Pokemon Go fever hits campus as everyone tries to catch 'em all. Photo. . . Glimpse: Healing gardens The summer sun shines on the MSU Radiology Healing Gardens near the MSU. . . Glimpse: Photobomb The Spartan helmet from atop the Spartan Stadium south scoreboard. . . Glimpse: Dazzling display A gorgeous burst of a sunset paints a beautiful picture across the. . . Glimpse: Under the tulip tree The summer sun shines through the leaves of a campus tulip tree. Photo. . . Glimpse: Setting sun The sun sets on a campus pasture. Photo by Kurt Stepnitz. . . Glimpse: Stadium view The Spartan Stadium scoreboard peeks around the summer foliage near the. . . Glimpse: Square scene A budding tree is seen in the square panes of the Main Library. The MSU. . . Glimpse: Climbing the walls Purple flowers and climbing ivy bring spring color to the IM Circle.. . . Glimpse: Seasonal reflections Trees in the W. J. Beal Botanical Garden are reflected in a pool on May. . . Glimpse: One giant leap Graduating seniors from the class of 2016 leap for joy as they prepare. . . Glimpse: Go Green! Go White! Go Forth! Students celebrate their upcoming graduation ceremonies at the Spartan. . . Glimpse: Influential Spartan Dr. Mona Hanna-Attisha, director of the Michigan State University and. . . Glimpse: Spring looks good on you Spring blooms begin to pop on trees outside of Linton Hall on April 11,. . . Glimpse: Early blooms After snow last week, spring blooms are finally starting to come out. . . Glimpse: Curtain calls Students from the China Conservatory of Music and the MSU College of. . . Glimpse: Spring study session A student takes advantage of the warmer weather on campus and gets some. . . Glimpse: #SpartanLove Two Spartans celebrate the first hint of spring near the Main Library on. . . Glimpse: Great Wall, Great Spartans Michigan State University College of Music students, who were visiting. . . Glimpse: Let the sunshine in An open window in Yakeley Residence Hall on March 7, 2016 welcomes a. . . Glimpse: Spartan sentry The Spartan stands guard over campus during a winter storm Feb. 25,. . . Glimpse: LookOut! and Dance The LookOut! Gallery at Snyder Phillips Hall became a dance space on. . . Glimpse: February Reflections A student is reflected in the windows of the north end of Spartan. . . Glimpse: Snowy commute Winter snow and cold temperatures have arrived on campus making getting. . . Glimpse: Just Ducky Ducks hang out on the Red Cedar River and enjoy a break in the winter. . . Glimpse: Deer Klara Kristalova's, Deer, stands watch of the Sculpture Garden at the. . . Glimpse: If Not Now, Then When? "If not now, then when? If not us, then who?" was the theme of the 2016. . . Glimpse: Snow Day A student walks on campus through the snow and cold on Jan. 12, 2016.. . . Glimpse: Reach Higher Students at MSU fall commencement ceremonies on Dec. 19, 2015. MSU. . . Glimpse: Fog lights A day-long and chilly fog throughout mid-Michigan creates a glow along. . . Glimpse: December lights A classic MSU lantern lights the way on a December night. The original. . . Glimpse: Illuminating science and culture Sunlight plays on the main staircase at the MSU Museum. The museum,. . . Glimpse: A colorful march The Spartan Marching Band performed “The Art of the March: Cues. . . Glimpse: Taps A member of the Spartan Marching Band plays "Taps" at a Veterans Day. . . Glimpse: The Beat Goes On The Spartan Marching Band endures heavy rainfall during the MSU-Indiana. . . Glimpse: Fall in Love With Campus Fall leaves make a dazzling display of color on West Circle Drive on. . . Glimpse: Fall never gets old The morning sun illuminates brilliant leaves near Olds Hall and the John. . . Glimpse: Take note An MSU vocal student auditions for a part in a collaborative opera. . . Glimpse: Capture the Flag The Spartan Marching Band enters the stadium tunnel just before the 2015. . . Glimpse: Leaving summer behind Summer breezes give way to autumn's leaves near the Brody Square dining. . . Glimpse: Banking on relaxation Students enjoy the beautiful fall weather while relaxing on the banks of. . . Glimpse: An eye on fall A student is framed by blooming black-eyed-susan flowers in front of. . . Glimpse: Step Up, Spartans An incoming student climbs the steps at the annual convocation ceremony. . . Glimpse: Campus is buzzing During Move-In Day on Aug. 30, President Lou Anna K. Simon visited the. . . Glimpse: Touchdown, MSU! President Lou Anna K. Simon shows great form as she catches a pass. . . Glimpse: Foliage Frames Summer foliage explodes in the sunshine in the courtyard of the. . . Glimpse: Amazon Queen MSU College of Osteopathic Medicine students board the Amazon Queen on. . . Glimpse: Global impact A child peeks at MSU photographer Kurt Stepnitz in the central highlands. . . Glimpse: New friends Chris Buller, MSU videographer, makes some new friends on location in. . . Glimpse: Summer quartet The MSU Dupere Quartet perform in the Beal Botanical Garden Musical. . . Glimpse: Summer exhibit A student walks by the Eli and Edythe Broad Art Museum. The museum will. . . Glimpse: Make way for ducklings A mother duck defends her ducklings beside a pond in the W. J. Beal. . . Glimpse: Campus Goes Green Summer campers and families alike enjoy MSU's lush greenery of W. J.. . . Glimpse: How to capture a squirrel A photographer captures a squirrel on the MSU campus. Photo by Derrick. . . Glimpse: On the banks of the Red Cedar Students relax and exercise along the banks of the Red Cedar River on. . . Glimpse: Afternoon ride A cyclist rides along the bike path by the Red Cedar River near the W.. . . Glimpse: Summer research A student examines a tree at the Kellogg Biological Station in Hickory. . . Glimpse: Sunset silhouette A midge perches on wild grass as the sun sets at the MSU Sheep Teaching. . . Glimpse: Reflections of Linton Hall Linton Hall is reflected in the stone horse trough and drinking-fountain. . . Glimpse: Teach the change A education graduate expresses her thoughts about teaching during. . . Glimpse: Reflections on nursing The Bott Building for Nursing Education and Research reflects clouds in. . . Glimpse: Beaumont blooms Spring blossoms frame the view of Beaumont Tower and the MSU Museum on. . . Glimpse: Spring blooms Spring blooms frame Spartans as they make their way to a reception for. . . Glimpse: Sticky science MSU forestry club students bottle up this year's supply of maple syrup,. . . Glimpse: Campus Ride Students board the CATA bus in front of the MSU Auditorium on March 30,. . . Glimpse: Fairchild confab Students have a discussion in the second floor walkway of Fairchild. . . Glimpse: Spartan silhouettes Students are silhouetted against the glass in the atrium of the Plant. . . Glimpse: Pining for research A tree in the Munn Pinetum are ribboned for pending research by Caleb. . . Glimpse: Concrete Beginnings Despite snow and freezing rain and even the gloom of night, the biggest. . . Glimpse: For whom the bell tolls A bell, crafted by the English company, Gillett & Johnston, in. . . Glimpse: Room with a view Students enter Mary Mayo Residence Hall on Feb. 17, 2015. Photo by. . . Glimpse: View from above Students in the atrium of the Biomedical Physical Sciences Building.. . . Glimpse: Winter's light A student exits the warmth of Williams Hall into the cold winter's eve. . . Glimpse: Linton glow The winter sun casts a dramatic glow on Linton Hall on Feb. 3, 2015, the. . . Glimpse: Eye on communications The Communication Arts and Sciences Building as viewed from the. . . Glimpse: Foggy view MSU's Beaumont Tower wears the shroud of a wintery fog, Jan. 14, 2015.. . . Glimpse: Through the clouds The sun peeks through cycling snow squalls on an MSU farm on Jan. 9,. . . Glimpse: Winter leaf After a relatively mild December, January has brought snow and frigid. . . Glimpse: Graduation silhouettes Graduates from the fall of 2014 semester are silhouetted against the. . . Glimpse: By the light of the moon Moonlight illuminates The Spartan statue on Dec. 4, 2014. Photo by. . . Glimpse: Room with a view Students are seen through the architectural detail in the atrium of. . . Glimpse: Flurry of reflections The first snowstorm of the season is captured in the architectural. . . Glimpse: Circle Drive Sunset A dazzling sunset lights up East and West Circle Drive on Nov. 10, 2014.. . . Glimpse: Bleeding green Students bleed green and give the gift of life at a blood drive in Brody. . . Glimpse: Spartan Fall Autumn leaves surround The Spartan statue on a cloudy day on Oct. 29,. . . Glimpse: Color path Students walk along the colorful fall path behind Owen and McDonel. . . Glimpse: The Course of Fall Autumn shows its color on the MSU West Forest Akers Golf Course. Forest. . . Glimpse: Pretty as a picture A student photographs the beauty of autumn's arrival along the Red Cedar. . . Glimpse: FRIB progress Work continues on the Facility for Rare Isotope Beams, a new national. . . Glimpse: Glow Green An emerald glow greets Spartans as they enter the west entrance of the. . . Glimpse: September Silhouette Beautiful September skies light up the "S" tree at the MSU farm at Jolly. . . Glimpse: Jumping into studies Students measure the Red Cedar River's velocity during a fall class.. . . Glimpse: September Sky A brilliant September sun rises over the MSU farms on Sept. 9, 2014.. . . Glimpse: Practice Makes Perfect The Spartan Marching Band Color Guard runs through a half-time. . . Glimpse: Linton Reflections Old Botany Hall's reflection in the door windows of Linton Hall's east. . . Glimpse: Just Because Ron Cichy, who is retiring after 26 years as director of The School of. . . Glimpse: Lunch Break A Spartan enjoys lunch in the courtyard behind the Computer Center on. . . Glimpse: Summer reflections Student workers tend to the plants in the Beal Botanical Garden on a. . . Glimpse: Fount of knowledge The fountain in Old Horticulture Garden is a campus destination for many. . . Glimpse: Rockin' it out at AOP Academic Orientation Program students gather for a photo at the Rock. . . Glimpse: Living Laboratory Caretakers of the William J. Beal Botanical Garden at work on July 9,. . . Glimpse: Petals and pedals Students bike past the MSU Bikes shop and rental station along the Red. . . Glimpse: Writing Circle Participants in the Spartan Writing Camp listen to a story before. . . Glimpse: Pollination detail A closeup of a section of MSU's Amorphophallus titanum, aka corpse. . . Glimpse: Geometric science A reflection of the Biochemistry Building makes shapes on the Biomedical. . . Glimpse: Room with a view The Wells Hall atrium viewed from the third floor on June 5, 2014.. . . Glimpse: Pretty as a picture MSU students Aja Harper and Damon Adams photograph spring blossoms in. . . Glimpse: Shaping up for summer A view of West Circle Drive from the MSU Union's south stairwell. Photo. . . Glimpse: On the banks A view of the Red Cedar River from the Hannah Administration Building on. . . Glimpse: Flower tower A Saucer Magnolia blossom frames the view of Beaumont Tower on May 9,. . . Glimpse: Go Forth! Graduates celebrate their accomplishments at commencement ceremonies at. . . Glimpse: Broad reflections Reflections during a concert at the Eli and Edythe Broad Art Museum. . . Glimpse: Finally sprung! . . . Glimpse: Winter's last laugh After a weekend of warm, spring weather, winter had one last laugh for. . . Glimpse: The keys to success A music performace student practices at the Residential College of Arts. . . Glimpse: Taste of spring A young calf takes a lick at the MSU Dairy Farm on March 31, 2014. Photo. . . Glimpse: Fashion Forward MSU student designer Maria Estrada (left) works on some last-minute. . . Glimpse: Future designs Backstage preparations are made during the Department of Art, Art. . . Glimpse: Winter paths A student walks on the paths near West Circle Drive on March 6, 2014.. . . Glimpse: Winter shadows Students in the second floor atrium of Wells Hall on Feb. 28, 2014.. . . Glimpse: Carnegie Hall performance The MSU Wind Symphony performs at Carnegie Hall in New York City on. . . Glimpse: Study walk MSU student Carson Tabiolo reads her Japanese language textbook en route. . . Glimpse: Cold winter, warm heart A heart made by footprints on the frozen Red Cedar River. Photo by. . . Glimpse: Linton shadows Snow-covered trees cast shadows onto Linton Hall during a rare moment of. . . Glimpse: Winter windows A student walks near the Natural Science Building (right) as viewed from. . . Glimpse: One of Nine Ernest Green, MSU alumnus and member of the Little Rock Nine, speaks to. . . Glimpse: Glowing research Black light shows areas of damage on composite material at MSU’s. . . Glimpse: Baby, it's cold outside A polar vortex swept down upon campus Jan. 5 transforming the landscape. . . Glimpse: Green and White A white blanket of snow covers the greenery outside of Olds Hall after. . . Glimpse: Smelling Roses The Spartan Statue is decked out in a jersey and roses to celebrate the. . . Glimpse: North Kedzie view MSU students from a geology and human environment class present their. . . Glimpse: Ornamental beauty Ornamental grass frames the view of East Circle Drive. Photo by Derrick. . . Glimpse: Frame of fall Autumn leaves and evergreens frame the view of Hannah Administration. . . Glimpse: Dusting of winter The first dusting of snow decorates the leaves at the MSU Main Library. . . Glimpse: 24 hours in Zambia An iPhone captures the start of the day in Lusaka, Zambia, as MSU. . . Glimpse: Haunted Aud The Department of Theatre presents the 5th Annual Haunted Aud at the MSU. . . Glimpse: Getting involved Members of the University Activities Board pose for a group photo. The. . . Glimpse: MSU, we love thy shadows Members of the media cast shadows on the field near Sparty at the. . . Glimpse: Fall colors The morning sun lights up the fall trees near Olds Hall. Photo by Lisa. . . Glimpse: Freshmen Abroad Freshmen show their Spartan spirit at the Meiji Shrine in Tokyo during. . . Glimpse: Musical shadows Musicians are silhouetted backstage during the College of Music’s. . . Glimpse: Spartan Superheroes Spartan Superheroes are everywhere being world changers and life savers,. . . Glimpse: Remembrance A visitor comes to reflect and remember at the MSU Alumni Chapel on. . . Glimpse: Spartan skies The skies over Spartan Stadium grow ominous at the season's opening game. . . Glimpse: Fall Sounds Listen carefully in the afternoons on campus and you'll hear it. Welcome. . . Glimpse: Dem Hall Echoes The echoes bouncing around these Dem Hall shadows mean that it's. . . Glimpse: MSU Shadows An iconic shadow is cast upon the summer sidewalk.. . . Glimpse: Healing war dogs MSU alumnus Maj. Kent Vince, (right), works on Tommy at a veterinary. . . Glimpse: Red Cedar waterworks Water connects all of us and keeps us kicking. Photo by Kurt Stepntiz. . . Glimpse: The art of science . . . Glimpse: It's in the details A look at detail on Agriculture Hall, which will be renamed the Justin. . . Glimpse: Sunrise over Spartan Land The summer sun rises over the green fields of the south campus farms.. . . Glimpse: Award-winning Spartans Light glints off the Michigan EMMY award picked up June 16 by Anthony. . . Glimpse: Artistic reflections Pretty much everything at the Broad Museum at MSU offers a new. . . Glimpse: Surplus Sparty What is your profession? Learn more about the MSU Surplus. . . Glimpse: Farm days Clouds above the farm at the MSU Lake City Research Center. Photo by. . . Glimpse: Stars and Stripes Clouds frame the Stars and Stripes in front of the Hannah Administration. . . Glimpse: Spring planting MSU plant pathologist Marty Chilvers sets a guideline while planting. . . Glimpse: Containment Something appears out of "Containment" in the sculpture garden at the. . . Glimpse: Spartans crossing MSU photographer Kurt Stepnitz gets the shot for a University. . . Glimpse: Spring grads at Beaumont Go Green! Go White! Go Forth! Spring grads pose for a traditional MSU. . . Glimpse: Finals week at Olds Hall A glimpse through an Olds Hall classroom window, smack dab in the middle. . .
2019-04-23T20:47:09Z
https://msutoday.msu.edu/360/2016/patriotic-hannah/
It wasn’t really a huge week in MMA business, but here are some of the bigger news items of the last few days. The bad luck continues for the UFC as they won’t be able to capitalize on the heated controversy that was Machida-Rua I, with an immediate rematch. CBS/Strikeforce have released a series of promo commercials in the past week in order to help build the fight. It’s expected that Massachussets will get the final seal of approval from the governor by the end of November. The bout has tentatively been rescheduled for UFC 108, but who’s to say when he’ll be back at 100%. Carwin also divulged that he’d been suffering from H1N1 early in the training camp. Using regression analysis across two variables, MMAPayout.com has predicted a buyrate of 398,000 for the event. Stratus Media Group, looking to diversify their holdings, acquired the organization. Time will tell whether they can effectively leverage their own experience to make the organization successful. Each judge has scored hundreds of MMA bouts, professional and amateur. They have met every requirement set forth by this country’s most influential athletic commissions, and each attends judging seminars regularly. Hamilton, Rosales and Peoples are more than qualified to score fights. On Saturday night, they had a very difficult one to score. Machida-Rua was a strategic, carefully contested bout. Several rounds could have gone either way. When the fight was over, all three judges scored it 48-47 for Machida (ESPN.com had Rua winning 48-47). The judges, however, weren’t totally in sync. They didn’t agree on how the champ won. Peoples and Rosales gave the first three rounds to Machida. However, Hamilton had the champ taking the middle rounds. Round 5 was the only one in which all three judges favored Rua. While most observers disagreed with the judges’ scorecards, they also didn’t see eye-to-eye on which rounds to give Rua. “I noticed that a lot of people on the Internet gave the first, second and third rounds to Machida,” Nevada State Athletic Commission Executive Director Keith Kizer told ESPN.com. “Almost everybody gave the fourth and fifth rounds to Rua. “There were also a lot of people who gave the first, second and third rounds to Rua. You could have went 50-45 for Rua or 48-47 for Machida and not have been wrong. Where a judge is seated at a particular time during the action must be taken into account. Judges have the best seats in the house, but they don’t always have a clear line of vision. The MMA community – perhaps more accurately, the MMA media – have in the last week done what they do best: sensationalize. Machida-Rua was a close fight, and different view points were bound to lead to different opinions and perceived outcomes. The MMA community needs to come to terms with the fact that mistakes are going to happen, controversy is going to ensue, and there just isn’t always going to be a right answer. All the promoters, fighters, and fans can do is continue to support the sport – whether MMA reaches the pinnacle of mainstream acceptance is in some respects very much out of their control. Regardless of your opinion on sensationalism within the MMA community, the issue of judging in MMA has yet again been raised. Should they change the scoring system? Is it a judge quality issue? Or might this simply be a part of the subjectivity inherent within the fight game? MMAPayout.com has advocated before that a new scoring system is probably in order – one that involves greater usage of 10-10 and 10-8 rounds – but that’s a very large undertaking. If MMA makes any alterations to the way matches are judged or officiated, they must be for the better, and they musn’t be done on a whim because a few fights stirred up some controversy. PROVIDENCE, R.I. — The House Corporations Committee has passed a bill that would prohibit driving while text-messaging. The bill, which already has passed the Senate, now goes to the full House for a vote. Supporters of the measure say drivers who were text-messaging have been responsible for several accidents, including some fatal crashes. Some committee members had concerns about how the police will be able to determine whether drivers were texting before a crash, but voted for the bill nonetheless. Text-messaging while driving is already banned in at least 10 states — including Connecticut — and the District of Columbia. The committee also passed a controversial bill that would allow mixed martial arts fighting in the state. The form of hand-to-hand competition combines wrestling, boxing and other fighting forms. The bill passed and word has finally made its way through MMA channels in the last day or so. A cursory reading of the bill shows it to be surprisingly well written. One aspect that I loved is that even though there’s a 10 point must system, it allows for rounds to be scored as draws. The bill’s passage is monumental because of Rhode Island’s strategic location as a halfway point between New York and Boston and it’s proximity to Connecticut. Add Providence’s reputation as a fight town (see Pazienza, Manfredo and more recently Andrade) as well as the fact that its a fun place to be in to it’s locational advantages , and there is serious potential for Rhode Island to be a major MMA staging ground. Episode 7 is the first time the household rating has dropped below 2.0 on the season, and the ratings without Kimbo, as expected, have been falling ever so slowly week by week. As was commented on via Twitter last night, it was surprising to see Lesnar-Carwin ads airing over the TUF 10 commercial slots. It was a slight oversight on the UFC/Spike’s part as they’ve only got three weeks to promote UFC 105, which is an integral event for them in terms of generating buzz for the organization through to the end of the year. It’s no surprise that Dana and the UFC are so upset with Rampage. The type of dislike that Rampage and Rashad have for one another comes off as very legitimate through the episodes, and the feeling probably was before the airing that they were sitting on a gold mine with both Kimbo and the coaches on one show. How much of this intensity will be forgotten by the casual fan, if and when Rampage gets back into the Octagon? There’s been so much speculation about who Kimbo is going to fight on the Finale, but given the circumstances might it be a good idea for them to bump him to the main card of 107 or 108? Does the UFC even consider such a move given what Dana has said about Kimbo in the past, how Kimbo has performed over the last couple of months on TUF, and all that has been said about his ground game in the wake of the reality series? There’s a trade-off there: integrity vs. short-term revenue. I’m not sure it’s such a good idea. If they want to continue to establish themselves as the best organization in the world, sticking to their word is crucial. Kimbo fighting on the main card of the Finale makes sense because it was essentially HIS show, but placing him on the main card of a PPV would be nothing other than a ratings grab. Interesting conversation nonetheless. Comments section below. As everyone surely knows by now, Brock Lesnar has been sick for over three weeks and was forced to pull out of his scheduled November 21 title defense against Shane Carwin at UFC 106. In the latest issue of the Wrestling Observer Newsletter (subscription required, and recommended), Dave Meltzer reports that Brian Stegeman, a Lesnar manager, says Lesnar has “been bothered by upper respiratory issues, a fever and extreme fatigue.” Stegeman goes on to say that Lesnar recently took a week off of training, hoping that would cure his ills, but that his health still did not improve. When news broke of Lesnar’s illness, there was almost immediate skepticism regarding whether he was ill at all, which was reinforced when the purportedly sick UFC heavyweight champion showed up as scheduled at a Minnesota Vikings football game. Some suggested that if Brock felt well enough to attend a football game, he was well enough to train for his scheduled November fight against Shane Carwin. I can tell you from personal experience that this is simply not true, not at all true. I hope and believe that Brock is merely suffering from a bad case of the flu, but reading Dave Meltzer’s report literally gave me goosebumps, taking me back to the winter of 1996, when I suffered the first attack of what I would learn (six long years later) was something known as fibromyalgia or chronic fatigue syndrome (I will refer to both simply as “CFS”; mine has been under control for more than five years). Anyway, there was an extended two-year period in which I couldn’t even lift weights at all, the CFS was so bad. And when I read that Brock is suffering respiratory problems along with extreme fatigue, and that it’s lasted over three weeks, it makes me worry, but then again I was raised by a very Jewish mother, and I have the worry gene. The thing I can state with certainty from experience is that Brock is suffering right now, and being the active person he is, I’m not just referring to a physical suffering. Being unable to train for a full month is psychologically devastating to someone as active as Lesnar. Be happy Brock is not fighting on November 21. (Except for all you haters who want to see Brock lose any way possible, even if he’s not nearly at his best. You know the type, the kind of fan who was begging the referee for a stand up five seconds before Brock was pulled off of Frank Mir at UFC 100). Moving the Lesnar fight gives UFC breathing room, as before this weekend, there seemed to be no back-up if Anderson Silva couldn’t fight on that show, as they didn’t figure on coming back with a light heavyweight title match that soon. The show in Las Vegas was figured to be headlined by Georges St. Pierre against an opponent to be determined, possibly the winner of the 11/14 match with Mike Swick vs. Paul Daley. Either of those opponents against St. Pierre on their own could be a tough draw, because as popular as St. Pierre is, nobody would give either much of a chance against him. But St. Pierre in a title defense on a show combined with either a Machida or Silva defense would pull in strong numbers. There is also the 2/21 show in Sydney, Australia that needs a main event (Yoshihiro Akiyama vs. Wanderlei Silva may be a good main event for Japan, but not for the UFC PPV audience, and is not planned as the main event). During the past week, Dana White said things were looking good regarding a show in April in Mexico City. While things probably won’t work out timing wise, there was talk this past week that if everything worked out perfectly, the main event they’d want for that first show would be Lesnar vs. Cain Velasquez. If Lesnar beats Carwin and comes out unscathed, that could be doable, but it would leave Antonio Rodrigo Nogueira, who up until this weekend was presumed to be the next heavyweight title challenger, waiting for the winner and needing a fight. The winter schedule really highlights the increasing difficulty the UFC is experiencing in booking main events. It’s become a delicate balancing act between booking solid headliners for international events in order to help expand the brand, but also saving solid headliners for the higher revenue domestic shows. A.) Limit themselves to one title fight per event in the hopes of saving a title fight for each show. B.) Accept that some, if not many, events are going to go without title events, and as a result their PPV numbers will be quite volatile. Ultimately, their decision will, or should be, rooted in the prospective payoff in either situation. Does doubling up on title fights in one event really add that much more to a PPV than a single title fight? By the same token, does a non-title fight draw close to what a title fight should? The propensity for injury – or extracurricular activity – to postpone fights within the UFC. If the organization uses two titles in one event, that means they’ve got three titles left for the next 2-3 months (4-5 events usually). An injury to another one of their title holders could really nix their plans (and it has, Lesnar and GSP are two examples). Top-end UFC contracts that do not incentivize fighting on any event. Fighters with PPV cuts have openly refused certain fights, because their share of the PPV would be less in an international market. Can the UFC PR and marketing teams cultivate a consistent strategy to generate significant interest in non-title fights such that holding them no longer becomes an issue for the organization? It’s been rumoured on Twitter and various other websites that Lesnar-Carwin and/or Machida-Rua II are being considered for UFC 108; a card that has effectively become the organization’s New Years event. While the postponement of UFC 106’s main event is more bad news for the UFC, things could have certainly been a lot worse for the organization. Lesnar could have waited until two weeks before the fight to announce that he was pulling out, and really left the organization in a promotional quandry. Worse still, he could have toughed it out and greatly diminished his chances of retaining the belt. Lesnar may ultimately lose anyway, but the UFC wants its biggest cash cow at his best on fight night. On the bright side, the UFC is now likely to have one, maybe two, main events for the New Years card, which is usually their biggest event every year – buyrate or otherwise. They’ve also got time to more heavily promote the rematch between Ortiz and Griffin for 106, which is the new main event of that card. A good strategy for the company might be to really leverage the appearance of Randy Couture on SpikeTV in the week prior to UFC 106. If the UFC’s PPV success is partially dependent upon momentum swings of casual fan interest, a great push of the UFC 105 card featuring Captain America could be enough to generate additional buzz and some “piggy-back” effect for the UFC 106 event to follow one week later. The success or failure of UFC 105 and its ability to generate a buzz for the return of Tito to the octagon will go a long way towards determining the success of the UFC’s 4th quarter of 2009. Mike Chiappetta of MMAFanhouse is reporting that the Massachusetts House of Representatives unanimously passed a bill supporting the legalization of mixed martial arts on Wednesday. Sanctioned mixed martial arts fights are one short step from becoming legal in Massachusetts after a bill on the sport sailed through the state’s House of Representatives in a 144-10 vote Wednesday afternoon. The state senate passed the bill 34-1 in July, leaving a signature from Gov. Deval Patrick as the only roadblock from passing it in to law. That is expected to be a formality. The UFC has all but promised to bring an event to the Bay State — specifically Boston — shortly after sanctioning; UFC President Dana White lived in the city for much of his youth and has spoken enthusiastically about staging an event there, even mentioning the possibility of using the fabled Fenway Park as a venue. Massachusetts, and more specifically Boston, is an important piece to the MMA puzzle, because it represents another strong sports and media hub to host and help spread acceptance of the sport. Mass is one of the three key regions within North America that remain unsanctioned for mixed martial arts – hopefully if and when Massachusetts comes on board, New York and Ontario won’t be far behind. Sherdog’s MMA Blog has the first look at EA Sport’s up-coming MMA video game, here. CBS recently announced that a first-look preview of the game will be featured during the broadcast of Fedor vs. Rogers on November 7th. Ben Henderson’s recent victory over Donald Cerrone to win the WEC interim Lightweight Title was a great moment in the career for Henderson and a great win for his sponsor, MTX Audio. During the fight, which is widely regarded as a fight of the year candidate; many noted the numerous logos worn by Cerrone. On the other hand, Henderson’s MTX Audio logos were clearly visible, unobstructed by any other competing logos. While most sponsors (e.g., Tapout) directly relate to MMA, MTX Audio’s main business is car audio. MMAPayout.com had the opportunity to ask Joe Trentacoste, Marketing Manager for MTX Audio, about its marketing strategy in MMA. JC: Why did MTX Audio get interested in MMA? MTX: MTX Audio got interested in MMA because the owner of our company, Loyd Ivey, and a lot of the employees at MTX were big fans of the sport. Loyd felt that MMA was something he’d like to get involved with and would be a great way to introduce the MTX brand to a passionate audience. Helping people accomplish their goals in a sport that you love was great and being able to tie in the brand made it a no-brainer and MTX hasn’t looked back since. JC: I understand you sponsor several MMA fighters in UFC/WEC? Who are they and how do you pick your fighters to sponsor? MTX: The MTX MMA Team supports Benson Henderson, Efrain Escudero, Ryan Kelly, Dale Hartt, Danny Martinez, and Edgar Garcia who are all veterans of the WEC or UFC but we do not limit our sponsorship to solely fighters in these big shows. We also support martial artists like Hillary Williams who recently won 3rd place in her first ever ADCC (Abu Dhabi Combat Club) appearance as a purple belt in Brazilian Jiu Jitsu. Support from MTX enabled her to travel the world and grapple with the best to prepare her for this competition. These are all MTX MMA Team fighters, but MTX also supports other fighters on occasion such as Shane Carwin who will be fighting Brock Lesnar at UFC 106, Clay Guida, Nate Diaz, Elliot Marshall, Joachim Hansen, Kaitlyn Young, and Thales Leites. Like MTX, which Loyd Ivey founded in his garage over thirty years ago, MTX MMA believes in helping up-and-coming fighters accomplish their dreams from the ground up by molding them into champions rather than “buying” a champion. We are lucky to work with a solid MMA management company that Loyd co-founded called Magnetic Marketing Associates. His partner, Jason Genet, works through direct contact with fighters around the world via our social networking site for MTX MMA, www.mtxmma.com. JC: Can you tell me the range of salary that your sponsored fighters make? MTX: We do not require that our fighters reach any sort of benchmarks in order to retain our support. We realize that the sport is exploding and there are a lot of fighters getting into the sport and that life happens and a fighter may have other commitments that come up that they need to attend to. We only ask that they hold themselves to a high standard and continue to work hard whether they have an upcoming fight or not. We ask that they represent our brand the way that they would want us to support them. JC: What is MTX Audio’s strategy in reaching out to MMA fans? Is there a certain audience you are trying to reach? Was this based on research or were you just MMA fans? MTX: Our strategy in reaching out to MMA fans is to not only generate interest in our brand but also to be a part of one of the coolest sports in the world. It is really our pleasure to be associated with the warriors that get into the cage or on the mat and put it all on the line every time. It is undeniable that MMA shares a similar demographic to car audio and we believe that like our fighters, MMA fans will come to know that our audio products, like our fighters, are built from the ground up. Unlike other brands, we aren’t a company that buys its products from a company overseas. We design, engineer, manufacture, service, and sell our own products. JC: How much public relations/publicity does MTX Audio get out of sponsoring MMA fighters? MTX: You can’t just put your logo on the shorts of a fighter on a UFC PPV and expect the MMA demographic to visit your website and buy your products. MMA is a lot like a brotherhood, you are either in it or you’re not. The ultimate goal is helping our fighters achieve their dreams. If we do everything we can to help, that’s all we can do, the rest is on the fighter. But so far, we’ve got a good record for helping that happen. The publicity comes naturally. There are times when our network of customers around the country invites our fighters to an event at their stores to sign autographs and meet with MMA fans from their city and our fighters are always happy to do this for us because they are good people and we have mutual appreciation for what each side is offering the other. JC: What is MTX Audio looking for when they sponsor a fighter? MTX: MTX looks for fighters that are dedicated and determined are willing to put the time in to become their best. We want to help people that have the skills to be a contender but just need that little extra help. They have to be extremely driven and know exactly what they want. JC: Is there an exclusivity of sponsorship? Are the fighters limited to wearing MTX Audio gear when they fight? MTX: We are generally exclusive with our fighters but we basically take each situation and address it individually based on the fighters’ needs. Of course we want to have as much branding on our fighters as possible but ultimately, its about supporting what is best for these fighters and when situations come up which are good for our fighters, we try to work out deals that can help them. We know that what’s good for our fighters is usually good for us too. JC: Can you share with us if the marketing strategy is working? MTX: We are in the third year of our affiliation with MMA. From a branding perspective, our sponsorships have been very successful. Millions of viewers have been exposed to the MTX Audio brand and logo during live and televised events. From the human perspective it has been extremely successful. In only three years we have helped three different fighters train to get to the UFC and helped two fighters become champions in the WEC. That is the most rewarding part, seeing these athletes realize their dreams and knowing that MTX Audio helped them get there. MMA fans are very loyal and very smart. We feel that by supporting the sport and being genuine in our efforts, the rest will come by itself. We love MMA just like our customers. MMA has become part of the MTX culture. For an MMA fighter, sponsorship is important to supplementing their income and allowing the fighter to focus on training full-time. Based on its passion for the sport, MTX Audio sponsors fighters. It has partnered with a marketing agency to work on the sponsorship deals so it is not like they entered into the sport blindly. It is interesting that MTX Audio decided to get into MMA due to its personal interests in the sport more so than its fit into a marketing plan. While it does make sense that males in their 20s and early 30s are a target market for a car audio manufacturer, it was not the primary reason. As discussed here, sponsors look for a return on its investment (ROI) when it puts its logo on a fighter’s shorts, shirt and hat. Most viewers will recall only 1 or 2 logos worn by the fighters. MTX Audio’s exclusive sponsorship of Henderson paid off. Not only did Henderson win the WEC’s interim Light Heavyweight title but the fight lasted the full 5 rounds allowing the visibility of the MTX Audio logos.
2019-04-19T06:19:33Z
http://mmapayout.com/2009/10/
Respiratory syncytial virus (RSV) is the leading respiratory viral pathogen in young children worldwide. RSV disease is associated with acute airway obstruction (AO), long-term airway hyperresponsiveness (AHR), and chronic lung inflammation. Using two different mouse strains, this study was designed to determine whether RSV disease patterns are host-dependent. C57BL/6 and BALB/c mice were inoculated with RSV and followed for 77 days. RSV loads were measured by plaque assay and polymerase chain reaction (PCR) in bronchoalveolar lavage (BAL) and whole lung samples; cytokines were measured in BAL samples. Lung inflammation was evaluated with a histopathologic score (HPS), and AO and AHR were determined by plethysmography. Viral load dynamics, histopathologic score (HPS), cytokine concentrations, AO and long-term AHR were similar in both strains of RSV-infected mice, although RSV-infected C57BL/6 mice developed significantly greater AO compared with RSV-infected BALB/c mice on day 5. PCR detected RSV RNA in BAL samples of RSV infected mice until day 42, and in whole lung samples through day 77. BAL concentrations of cytokines TNF-α, IFN-γ, and chemokines MIG, RANTES and MIP-1α were significantly elevated in both strains of RSV-infected mice compared with their respective controls. Viral load measured by PCR significantly correlated with disease severity on days 14 and 21. RSV-induced acute and chronic airway disease is independent of genetic background. Human respiratory syncytial virus (RSV) is classified in the genus Pneumovirus, subfamily Pneumovirinae, family Paramixoviridae; and is a major cause of lower respiratory tract infection (LRTI) in young children and the elderly . RSV LRTI is associated with increased risk of long-term recurrent wheezing [2–5], however, the pathogenesis of this relationship is not well understood. RSV LRTI elicits a host response including the release of inflammatory mediators and recruitment of different cell populations. The genetic variability of the host response might partially explain the different susceptibilities of individual patients to the acute and long-term effects of RSV infection, as suggested by the higher rates of RSV hospitalization among Native American and Alaskan Native children compared with other groups . Animal models facilitate the study of RSV-induced acute and long-term disease in a more controlled manner. Our laboratory has previously established a mouse model of RSV-induced acute and long-term airway disease . The present studies were designed to characterize the influence of mouse genetic background and the dynamics of viral replication on the chronic manifestations of RSV infection. The BALB/c mouse strain is one of the most commonly used for RSV experimental models, however, C57BL/6 mice frequently provide background for transgenic strains of mice. Therefore characterizing and establishing a comprehensive model of acute and long-term RSV disease in C57BL/6 is essential to further understanding the pathogenesis of RSV disease. RSV infection alone, without allergic pre-sensitization induced AO in both strains of mice as demonstrated by significantly increased enhanced pause (Penh) values compared with uninfected controls. Baseline Penh values increased transiently on day 1 after RSV inoculation in both strains, decreased by day 2, but continued to be significantly greater than in controls. Airway obstruction increased again and peaked on day 5, when C57BL/6 RSV-infected mice showed significantly higher Penh values than RSV-infected BALB/c mice (p < 0.001) (Figure 1). AO decreased thereafter during the first two weeks after RSV inoculation but remained significantly greater than the respective controls in both strains, for 21 days in BALB/c and 28 days in C57BL/6 mice (Figure 1 inset). RSV infection also induced AHR in both strains as evidenced by a greater difference between pre- and post-methacholine Penh values (delta Penh) compared with controls. Significantly increased AHR was persistently present for 42 days post-inoculation in BALB/c mice, while C57BL/6 mice showed significantly increased AHR for up to 28 days post-inoculation (Figure 2). Effect of RSV on airway obstruction (AO) in two mouse strains. BALB/c (△) and C57BL/6 (●) mice were inoculated with sterile 10% EMEM (control) and were compared with RSV A2 infected BALB/c (□) and C57BL/6 (◆) mice to evaluate differences in airway obstruction (AO), by measuring Penh via whole-body plethysmography. Penh values are presented as means ± SEM. Comparisons were made by t-test when data normally distributed, or by Mann-Whitney Rank sum test when data were not normally distributed. Airway Hyperresponsiveness (AHR) in BALB/c and C57BL/6 Mice. Data presented as Delta Penh values which is the difference between pre-and post methacholine Penh for each group of mice, in sham inoculated ( ) and RSV inoculated ( ) BALB/c mice, and sham inoculated ( ) and RSV inoculated ( ) C57BL/6 mice from days 14 to 77. Values represent the mean SEM from 10–30 mice per group. Data shown are the result of four separate experiments. p < 0.05, comparison by t-test when data normally distributed, or by Mann-Whitney Rank sum test when data were not normally distributed. RSV-inoculated C57BL/6 and BALB/c mice, compared with their controls, showed greater histopathologic scores (HPS) which peaked on day 5 after RSV inoculation (Figures 3, 4A–D). Although the acute inflammatory changes observed in both strains gradually declined, RSV-infected mice had significantly greater HPS than the sham-inoculated controls for up to 77 days post-inoculation (Figures 3, 4E and 4F). Comparison of acute and long-term histopathologic scores after RSV inoculation. BALB/c (△) and C57BL/6 (●) mice were inoculated with sterile 10% EMEM (control) and were compared with RSV A2 infected BALB/c (□) and C57BL/6 (◆) mice. Serial formalin fixed lung samples were obtained between day 0 (+2 hours) and day 77 after inoculation. HPS scores are represented as means ± SEM. p < .05, by t-test when data normally distributed, or by Mann-Whitney Rank sum test when data were not normally distributed. RSV induced histopathology. Lung specimens were harvested on days 5 and 77 from groups of C57BL/6 and BALB/c mice inoculated with sterile medium (control) or RSV. Sections from control C57BL/6 and BALB/c mice above (4A and 4B, respectively), show rare, scattered, small lymphocytic infiltrates on day 5 after inoculation with medium, similar to sections of control mice harvested 77 days after (not shown). Acute and chronic inflammatory infiltrates, surrounding airways and vessels are demonstrated in RSV-inoculated mice of both strains, on days 5 and 77 after inoculation (4C to F). BAL concentrations of TNF-α, IFN-γ, MIG, RANTES, and MIP-1α followed similar dynamics in both strains of mice during the acute phase of the infection (Figure 5A–E). Overall, there was a trend for greater BAL cytokine concentrations of IFN-γ, TNF-α, RANTES and MIP-1α in RSV-infected BALB/c mice compared with C57BL/6 mice. (Figure 5A–E). No significant differences were observed in BAL concentrations of IL-4 and IL-10 between controls and infected mice of both strains at any time point evaluated (data not shown). Cytokine and chemokine concentrations in bronchoalveolar lavage (BAL) samples after RSV inoculation. BAL samples were obtained from BALB/c (△) and C57BL/6 (●) mice inoculated with sterile 10% EMEM (control), and RSV A2 infected BALB/c (□) and C57BL/6 (◆) mice, to measure concentrations of pro-inflammatory cytokines (A) IFN-γ and (B)TNF-α; and the chemokines (C) RANTES, (D) MIP-1α, and (E) MIG. Values presented in means ± SEM pg/ml. p < .05, by t-test when data were normally distributed, or by Mann-Whitney Rank sum test when data were not normally distributed. On day 1 after RSV inoculation, RSV loads in BAL samples from both C57BL/6 and BALB/c mice were significantly greater than in controls by plaque assay (Figure 6). Compared with day 1, plaque assay RSV loads peaked on days 3–5 after inoculation in both strains representing active viral replication (p = 0.002 for day 1 vs days 3–5 in BALB/c mice; ANOVA), and were significantly greater in BALB/c than in C57BL/6 mice (Figure 7). BAL RSV loads declined below the limit of detection by day 7 and remained undetectable through day 77 post-inoculation. RSV loads in BAL samples measured by the plaque assay method. Groups of 4–16 BALB/c (△) and C57BL/6 (●) mice per group per time point were inoculated intranasally with sterile 10% EMEM (control), and were compared with RSV A2 infected BALB/c (□) and C57BL/6 (◆) mice. Viral load was determined by HEp-2 plaque assay in BAL samples. Data are presented as mean ± SEM Log10 PFU/ml of BAL. p < .05, by t-test when data normally distributed, or by Mann-Whitney Rank sum test when data were not normally distributed. RSV loads in RSV infected BALB/c mice BAL and lung supernatant samples measured by PCR vs. plaque assay. RSV loads measured by PCR in BAL samples (▽) remain positive up to 42 days after inoculation, while viral loads measured by plaque assay (□) become negative on day 7 post-inoculation (upper panel). Viral load measured in lung supernatants by the plaque assay also become undetectable by day 7 after inoculation, whereas RSV loads measured by PCR in lung supernatants remain detectable throughout all the time points evaluated (lower panel). All pair-wise multiple comparisons made by One-Way ANOVA. † p < 0.01 between D1 and D5 and *p < 0.05 comparing D1 with D3 and D5. To further characterize the dynamics of RSV infection, we used RLT-PCR in parallel with plaque assays, to measure RSV loads in both BAL samples and lung homogenate supernatants. These experiments were initially conducted in BALB/c mice. RSV loads measured by RLT-PCR and plaque assay in both BAL and lung supernatant samples peaked on days 3 to 5 after inoculation. Similar to plaque assay, RSV load by RLT-PCR also demonstrated a significant increase in viral copies between day 1 and days 3–5, likely demonstrating active replication (Figure 7). In contrast to RSV loads measured by plaque assay, which became undetectable by day 7 after inoculation (Figure 7, dashed-line plots), RSV loads measured by RLT-PCR remained positive for 42 days in BAL samples and throughout 77 days in lung supernatants (Figure 7, solid line plots). Additional experiments in both mouse strains demonstrated persistence of RSV RNA in lung supernatants for 77 days after inoculation (Figure 8) . Similar to the previous findings using plaque assays, RSV loads were greater in BALB/c than in C57BL/6 mice. Control mice of both strains had undetectable RSV load by RLT-PCR. Comparison of RSV loads measured by PCR in lung supernatants of BALB/c and C57BL/6 mice. Groups of 2–12 BALB/c (△) and C57BL/6 (●) mice per group per time point were inoculated intranasally with sterile 10% EMEM (control), and were compared with RSV A2 infected Balb/c (□) and C57Bl/6 (◆) mice. Viral load was determined by PCR to detect RSV N gene. Data are presented as mean ± SEM Log10 PFU/ml of BAL. p < .05, by t-test when data normally distributed, or by Mann-Whitney Rank sum test when data were not normally distributed. Correlations were determined during both the acute phase of the disease, day 5, and during the progression to the chronic phase on days 14, 21 and 77 after inoculation. During the acute phase in both mouse strains, airway obstruction (AO) peaked on day 5 and strongly correlated with histopathologic scores (HPS), BAL concentrations of RANTES, IFN-γ, MIP-1α and MIG, and RSV loads measured by both plaque assay in BAL samples and RLT-PCR in lung supernatants (Additional file 1). In BALB/c mice, AO also correlated with BAL TNF-α concentrations, RSV loads measured by plaque assay in BAL samples significantly correlated with those measured in lung supernatants by RLT-PCR in both C57BL/6 and BALB/c mice. In addition, there were significant correlations between airway hyperresponsiveness (AHR) and HPS on day 14 in both BALB/c (r = 0.99, P = 0.0005, n = 4), and C57BL/6 mice (r = 0.85, P = 0.01, n = 7). AHR and HPS also correlated significantly on day 77 in C57BL/6 mice (r = 0.95, P = 0.012, n = 5). In BALB/c mice alone, RSV loads measured by RLT-PCR correlated with AHR on day 14 (r = 0.69, P = 0.01, n = 12). RLT-PCR also correlated with AO on day 21 after RSV inoculation (r = 0. 71, P = 0.01, n = 12). Intranasal inoculation of RSV induced acute and chronic effects on the respiratory dynamics and inflammatory response in C57BL/6 mice, similar to those previously reported in BALB/c mice . The acute manifestations of RSV disease in C57BL/6 mice appeared similar but there were several differences compared with BALB/c mice. Acute airway obstruction was more severe and more prolonged in C57BL/6 than in BALB/c mice. BALB/c mice, however, demonstrated more severe histopathologic changes, greater viral loads, and BAL concentrations of most of the cytokines measured. It is known that RSV infection causes variable degree of disease severity in different mouse strains but there was no information on whether the different genetic backgrounds influence the long term outcome of RSV infection including chronic inflammation and persistent AO and AHR. The varied responses of these two mouse strains to different pathogens have been attributed in part to differences in their T helper (Th) lymphocyte response. Studies in mice infected with Leishmania showed that a Th2 skewed response caused more severe disease in BALB/c mice than in C57BL/6 mice that developed a Th1-dominant response . In some localized bacterial infections, however, the severity of disease was milder in BALB/c mice and was described as Th1 skewed . Indistinct Th responses were found in both mouse strains when infected with certain viruses . Hence, the differences in the immune response might not only depend on the genetic background of the host, but also on the site and the specific pathogen involved in the infectious process. Several groups have demonstrated AHR in C57BL/6 mice during the acute stages of RSV infection. [22–24]. However, so far, our study is the first to shed light on the dynamics of inflammatory infiltrates, airway dysfunction (AO and AHR), and inflammatory cytokines during the long-term phase of RSV-induced disease, up to 77 days after primary infection in both C57BL/6 and BALB/c mice. Researchers found that during RSV re-challenge following sensitization with different RSV proteins, mice developed a variable Th cytokine response [12–15] which was not exclusively dependent on the strain haplotype . Our experiments, conducted in mice with primary RSV infection, demonstrated that IFN-γ, a Th1 cytokine, was elevated after RSV infection in both strains. IFN-γ was increased in the respiratory tract of children with acute RSV infection [17, 18] and correlated with disease severity . In mice, IFN-γ also correlates with the development of RSV disease . Our studies demonstrate that RSV infection induces IFN-γ in both strains of mice and the magnitude of the response is not consistent with the traditional notion that BALB/c are Th-2 weighted and C57BL/6 are Th1-weighted. BALB/c mice showed greater IFN-γ response than C57BL/6 mice as previously shown by others . In our experiments IFN-γ demonstrated the greatest correlation with disease severity (Additional file 1). Like IFN-γ, the dynamics of TNF-α, RANTES, MIP-1α were comparable in both mouse strains. TNF-α has been linked to RSV disease severity . In our model, BAL concentrations of TNF-α peaked shortly after RSV infection and correlated with markers of disease severity in BALB/c mice (Additional file 1), and were significantly greater in BALB/c than in C57BL/6 mice (Figure 5). The CC chemokines, RANTES and MIP-1α, and the CXC chemokine MIG were also elevated in mice of both strains shortly after RSV inoculation. The biphasic production of RANTES, MIP-1α and MIG after RSV infection, with the second peak coinciding with the peak of viral replication and histological inflammation, has been previously described in BALB/c mice [7, 26] but not in C57BL/6 mice. Although MIP-1α has been detected in C57BL/6 mice , no previous studies demonstrated the production of RANTES in the respiratory tract of these mice after RSV infection. These two chemokines correlate with acute disease severity both in humans and in mice. [19, 28–30]. Increased production of MIG after RSV infection has been documented in vitro and by us in BALB/c mice. Others have linked MIG to persistent airway inflammation due to continuous chemotaxis of mononuclear cells . In the present study we demonstrate significant correlation between BAL MIG concentrations and AO, and viral load dynamics in both strains of mice. Taken together, these results indicate that RSV induces severe acute pulmonary disease in both strains of mice despite different genetic backgrounds. Although there are quantitative differences during the acute phase of the disease, there were no significant distinctions in the pattern of cytokine responses, lung inflammation or clinical manifestations of disease, and both strains developed long-term airway disease defined by chronic inflammatory infiltrates and abnormal AHR. These findings provide further experimental support to the link between RSV and chronic airway disease in humans. We believe that this is the first description of RSV-induced long-term pulmonary disease in C57BL/6 mice. The exact mechanism by which different inflammatory mediators participate in the pathogenesis of the acute RSV-induced disease process is not completely understood, and their potential role in determining the chronic consequences of RSV infection, such as AO, AHR and chronic inflammation is even less characterized. Studies in murine models and in humans have not demonstrated yet a direct relation between the acute inflammatory response to RSV and its chronic consequences in the respiratory tract pathology. Our studies demonstrated prolonged AO and persistent AHR in both mouse strains, long after any of the cytokines, potentially responsible for persistent inflammation that we measured, became undetectable in BAL samples. It is possible that the use of more sensitive methods, perhaps in specific compartments, will contribute to clarify the role of these molecules in the chronic respiratory function abnormalities induced by RSV. Until recently, it was suggested that initial RSV infection, although of short duration, was sufficient to elicit an exaggerated inflammatory response which would evolve into chronic inflammation and long-term airway abnormalities. An alternative, but not contradictory explanation for the development of chronic airway disease could be related to long-term antigenic stimulation. In this hypothesis, the presence of low level viral infection could represent a persistent stimulus responsible for the chronic inflammatory changes and the lasting pulmonary function abnormalities. The application of the RLT-PCR assay to this model demonstrated the persistence of RSV RNA in the respiratory tract for 11 weeks after inoculation in both strains of mice and was also associated with long-term pulmonary disease. RSV can persist and replicate in vitro [33–35]. The persistence of RSV genomic RNA sequences and viral antigens has been described in guinea pigs for several weeks after acute primary infection [36–38]. Bovine RSV infection in calves resulted in persistent detection of RSV N gene for several weeks . Miller et al. reported detection of G protein RNA by RLT-PCR in lungs of BALB/c mice up to day 12 after inoculation. . It appears unlikely for a RNA virus to persist without at least low-level replication in the host. This is supported by the studies by Schwarze et al., who found RSV genomic and messenger RNA in mouse lung homogenates for 100 days after inoculation, and were able to recover low titer virus in culture after treatment with anti-CD4 and anti-CD8 antibodies . Clinical studies have demonstrated that adults with stable COPD without acute exacerbation had RSV RNA detected by PCR in the upper respiratory tract . The persistence of RSV RNA in children has not been extensively studied. Post-mortem specimens of children who died of sudden infant death syndrome showed positive results by PCR targeting the RSV N gene in 27% of cases and in 18% of the controls. Since some children died during summer the authors suggested the possibility of viral persistence . The persistence of RSV in the respiratory tract of children and its potential contribution to the development and maintenance of AHR is a critical question that needs to be addressed. In summary, we provide evidence that RSV-induced acute and chronic airway disease is reproducible in two genetically distinct mouse strains. The long-term airway disease coincided with persistent detection of RSV genome in the respiratory tract. It is yet unclear whether the persistence of RSV RNA plays a role in the development of chronic airway disease. Further studies are needed to characterize the potential mechanisms that would allow viral persistence and its possible contribution to the pathogenesis of RSV-induced long-term pulmonary disease. Female, 7–8-week old pathogen-free C57BL/6 and BALB/c mice (Charles River Laboratories, Wilmington, MA) were maintained in filter top cages, and routinely monitored for other pathogens . After inoculation, all mice were kept under the same conditions and were provided identical care. Sentinel mice housed in the mouse storage room are routinely used for health surveillance. Sentinel mice had no detectable antibodies against mouse hepatitis virus, Sendai virus, pneumonia virus of mice, reo-3 virus, mouse encephalitis virus (GD-7), mouse rotavirus (EDIM), minute virus of mice, and Mycoplasma pulmonis; screening for pinworm and mites was also negative. This study was approved by the Institutional Animal Care and Use Committee at the University of Texas Southwestern Medical Center at Dallas. RSV A-2 strain was maintained in our laboratory as described . Results of plaque assays were reported in Log10 PFU/mL, with 1.7 Log10 PFU/mL being the lowest limit of detection. Mice were anesthetized using inhaled methoxyfluorane and intranasally inoculated with 107 PFU of RSV in 100 μl of 10% Eagle's minimal essential medium (EMEM) . Uninfected control animals were sham-inoculated with 100 μl of sterile 10% EMEM. Animals were allowed 30 seconds to aspirate the inoculum while held upright until fully recovered from the anesthesia. Unrestrained, whole-body plethysmography (Buxco Electronics, Inc. Sharon, CT) was used to measure the Enhanced Pause (Penh) to evaluate airway obstruction (AO) and airway hyperresponsiveness (AHR), as previously described [7, 43]. Briefly, mice were allowed to acclimate to the chamber, and then plethysmograph readings were recorded to establish baseline Penh values to determine AO. Next the mice were exposed to aerosolized methacholine (Sigma; 50 mg/ml) for 4 minutes; after exposure, plethysmograph readings were recorded again to determine AHR. Groups of infected and control mice were always evaluated in parallel at all time points during the entire study. Preliminary studies showed that normal C57BL/6 mice have greater baseline Penh values than normal BALB/c mice; therefore, groups of infected and control mice of each strain were evaluated in parallel during the entire study. Plethysmography was performed in the groups of mice to be sacrificed for sample collection at each time point, and in an additional group of mice that were followed throughout each experiment. A total of 4 independent experiments including 10–30 mice per group per time point were conducted. Mice were anesthetized with an intraperitoneal injection of 75 mg/kg of ketamine and 5 mg/kg of acepromazine before euthanasia by exsanguination. On average, 4–12 mice were sacrificed per group per time point. Bronchoalveolar lavage (BAL) specimens were obtained as described previously [7, 43] to measure cytokine concentrations and RSV loads. Histologic evaluation was performed in whole-lung specimens fixed with a 10% buffered formalin solution. Whole lung samples were also collected from another group of mice for determination of viral loads by plaque assay and by real-time polymerase chain reaction (RLT-PCR). Specimens were obtained on days 0 (within 2 hours of inoculation), 1, 3, 5, 8, 9, 12, 14, 21, 28, 42, and 77 post-inoculation. Formalin fixed lungs were paraffin embedded, sectioned and stained with hematoxylin and eosin. Histopathologic score (HPS) was determined by a pathologist, unaware of the infection status of the animals. Each section was graded on the basis of a cumulative score from 5 categories: (1) peribronchiolar and bronchial infiltrates, (2) bronchiolar and bronchial luminal exudates, (3) perivascular infiltrates, (4) the number of monocytes, and (5) parenchymal pneumonia. This HPS system assigns values from 0 to 21. This scoring system has been previously validated in RSV infection [7, 43]. Concentrations of TNF-α, IFN-γ, IL-4, IL-10, MIG, RANTES, and MIP-1α were measured in BAL specimens by ELISA (R&D Systems, Minneapolis, Minn.) for up to 14 days after inoculation. The lower limit of detection for each of these assays were: 120 pg/mL for TNF-α, 50 pg/mL for IFN-γ, 40 pg/mL for IL4, 16 pg/mL for IL-10, 16 pg/ mL for MIG, 200 pg/mL for RANTES and 60 pg/mL for MIP-1α. For statistical analysis, samples with optical density readings below the limit of the standard curve of the assay were assigned a value half that of the detection level. Plaque assay tissue culture was used to measure viral loads in BAL specimens and lung homogenate supernatants as previously described . Lung supernatant samples were prepared by placing whole lung specimens in 1 mL of 10% EMEM, on ice. Lungs were homogenized using sterile probes and a rotor tissue homogenizer (Omni International Inc., Marietta, GA). Lung supernatants were separated by centrifugation at 2000 g for 10 minutes at 4°C and 100 μL were used immediately for determination of viral loads by plaque assay; the remaining supernatant was frozen at -80°C for viral load measurements by RLT-PCR. In a subset of experiments, lung samples used for RLT-PCR were placed in 1.5 mL of RNA stabilization reagent (RNA later, Qiagen Inc., Valencia, CA) immediately after sample collection. Lung supernatants were then obtained by homogenization and centrifugation. The RLT-PCR viral load values measured using this method were similar to those obtained when no RNA later was used; therefore, all results of lung homogenate supernatants are presented together. One sample per mouse was evaluated as a single specimen. Quantitative RLT-PCR was used targeting the conserved region of the RSV N-gene. Forward (5'-AGA TCA ACT TCT GTC ATC CAG CAA) and reverse (5'-TTC TGC ACA TCA TAA TTA GGA GTA TCA AT) primers amplified an 85-bp region containing the 25-mer FAM-labeled probe (5'-CAC CAT CCA ACG GAG CAC AGG AGA T), as previously described . RSV RNA was extracted from 1 mL of lung supernatant samples using ion-exchange mini-columns (Qiagen RNeasy Mini Kit, Valencia, CA, USA) and cDNA was prepared by reverse transcription using 2.5 uM random hexamers for 10 min at 22°C, 30 min at 42°C and 5 min at 95°C. Real-time PCR was performed using a Perkin-Elmer /Applied Biosystems 7700 sequence detector (Foster City, CA) using 10 μl cDNA/ in a total volume of 50 μl master mix with the following run conditions: 1 cycle for 2 min at 50°C and 10 min at 95°C each, followed by 50 cycles for 15 seconds at 95°C and 60 seconds at 60°C. RSV A known concentrations were used to derive a standard curve. Standards and negative controls were run together with each PCR assay. The lower limit of detection of the assay was 10 viral copies/mL. T-test or Mann-Whitney Rank Sum test were used according to data distribution for comparisons between groups and the Spearman Rank Order test was used for correlations, as all the data taken together were not normally distributed, using the SigmaStat® (SPSS, Inc. Chicago, Illinois) software package. S.C.B. is supported in part by a Pediatric Infectious Disease Society Fellowship Award sponsored by GlaxoSmithKline Pharmaceuticals. A.M. was supported in part by the Pediatric Fellowship Award in Viral Respiratory Infectious Diseases supported by MedImmune Inc., at the Pediatric Academic Societies Annual Meeting. H.S.J. is supported in part by grants from the Children's Clinical Research Advisory Committee and the Children's Medical Center of Dallas Foundation and American Lung Association. Approved by the Institutional Animal Care and Use Committee at the University of Texas Southwestern Medical Center at Dallas. SCB study design, RSV infection, data analyses; AM BAL, formalin fixation, plethysmography; AMG histopathology and special staining; KDO real-time PCR; AMR and MFA plethysmography and BAL; OR data interpretation; HSJ project design, experimental analyses and interpretation.
2019-04-19T05:11:56Z
https://virologyj.biomedcentral.com/articles/10.1186/1743-422X-2-46
Here is a list of recent changes to benefits which you may need to be aware of. If you need any help or support with any of these changes, please contact us. 2018 (Awaiting date) Universal Credit Full Service – Severe Disability Premium – New Gateway Condition Following the government’s announcement that they intend to protect those who have already lost out, and will lose out financially due to the loss of the Severe Disability Premium, the government are introducing a new 'Gateway Condition' into the Universal Credit. December 2018 Tax Credits replaced - Moving on to Universal Credit Will be replaced by Universal Credit for working age. November 2018 State Pension Age Increase Women’s State Pension age to reach 65 by November 2018, will then increase for both men and women to reach 66 by 2020 i.e. entitlement to pension credit for both men and women is linked to the minimum qualifying age at which a women can receive state retirement pension. April 2018 Funeral expenses Changes made, to increase time limit for a claim to six months; shorten claim form for a childs funeral; disregard contributions from charitable funds and relatives. The claimant has been referred for a further Work Capability Assessment - in which case the work coach can suspend or reduce any work related requirements. The last decision on fitness for work was regarding a decision about Income-Related ESA or 'Old-Style' Contributory ESA^. And the work coach does have the discretion to suspend conditionality if it would be unreasonable to expect the claimant to comply with their work related requirements. ^The new rules will apply to those found fit or treated as fit for work under the UC Regulations or under the ESA Regulations 2013 ie for New-Style ESA, but not under ESA Regulations 2008 ie for Old-Style Contributory ESA or Income-Related ESA. Could cause some residents to receive a sanction if they fail to comply with their claimant commitment, and therefore causing them financial hardship. April 2018 New Time Limit For Providing Evidence Following Beneficial Change From 11 April 2018 where a claimant has a change in circumstances that would mean their UC will increase ie a beneficial change, they only have 14 days (rather than a month) to provide any required evidence. However as with the previous rules, the DWP can use their discretion to extend to a longer period if necessary. April 2018 Universal Credit Full Service - Surplus Earnings Rules The 'surplus earnings' rules - that apply only for claimants on UC under the Full / Digital service - were first set to take effect from 2016 but were delayed. The date these rules will come into effect has now been confirmed as 11 April 2018. - The Universal Credit ‘surplus earnings’ rules due to come into force from 11 April 2018 for certain high earners are both complex and confusing. - They only affect those claimants on the Full / Digital UC service. - From April 11th 2018, a Full / Digital UC claimant whose earnings are too high to entitle them to UC in a Monthly Assessment Period, will, in certain circumstances, have some of those earnings taken into account when they make a rapid reclaim for UC within six months. - Where more than six months pass after the Monthly Assessment Period where UC ended, then these regulations will not apply. - The level at which a claimant will be deemed to have 'Surplus Earnings' has been deliberately set at a high figure in order to limit the number of cases affected and to enable the DWP to test and learn from the new arrangements. However this will be reviewed in March 2019. - Any 'Surplus Earnings' a claimant is deemed to have is added to any other earning when working out whether or not they are entitled to UC when they make a rapid reclaim, and how much they are entitled to. - Those few claimants that are affected can only 'erode' their 'Surplus Earnings' by making repeated monthly claims until an award of UC is made - or six months is reached. But where the claimant's earnings remain high, they may be better deferring making a Rapid Reclaim to the first Monthly Assessment Period in which their earnings drop. - Only a small number of UC claimants will be affected during 2018/19. April 2018 Support Mortgage Interest New Regulations will take effect from 6th April 2018 that replace the existing support for mortgage/loan interest for owner-occupier housing and replace it with a system of loans. - Help for home owners with other housing costs (such as service charge and ground rent) will continue to be made as now. - The new rules affect both new and existing* claimants. - And they affect both working age and Pension Credit age claimants. The new loan system will apply to those claimants on the qualifying benefits that provide help with mortgage/loan interest ie Income Support, Income Based JSA, Income Related ESA, Universal Credit and Pension Credit who need and are entitled to help with their home ownership costs. - The loan can cover some loans for essential repairs and improvements as well as mortgages. - The loans are secured on the claimant's property as a 'second charge' (effectively a secured loan on top of the existing mortgage). - Loans are repayable on the sale (or transfer) of the property or on the claimant's death (or when the last member of a couple dies). - If there is insufficient equity when the loan is due to be repaid, whatever is available from the sale will be used to repay it and the rest is written off. - There is no 2 year limit for Income Based JSA claimants to receive help, as there is with the current support for home ownership costs. - And help with Sharia compliant mortgages will be extended (ie available to Universal Credit claimants) to Pension Credit claimants. - The amount the claimant is entitled to to help them pay their mortgage/loan interest will no longer be added to their applicable amount. Instead claimants on Income Support, Income Based JSA, Income Related ESA, Universal Credit and Pension Credit who have interest to pay on a mortgage/secured loan will be offered a loan. - Because of the different way the help is assessed some claimants may not be entitled to an income related top up (eg some claimants on Contributory JSA / ESA) and therefore passported onto help such as free prescriptions - although they may be entitled through a different route. What is the DWP loan? - The loan replaces the current system of help with home ownership mortgage interest/loan payments - often referred to as Support for Mortgage Interest (or SMI). - Instead the DWP will make an offer of a loan that will make ongoing payments to the relevant lender towards the qualifying interest on the claimant's mortgage and eligible home improvement loans. April 2018 Changes to DHP Rules For Claimants Living In 'Specified Accommodation and Temporary Accommodation From 11 April 2018, the Discretionary Financial Assistance Regulations 2001 are amended to allow a Local Authority to award a Discretionary Housing Payment to a Universal Credit claimant for any Monthly Assessment Period when the claimant would have been entitled to a Universal Credit Housing Costs Element, were it not for the fact that they were living in 'specified accommodation' or 'temporary accommodation', as defined by the Regulations. This means that even where for part of a Monthly Assessment Period the claimant might not have been getting Housing Benefit or a Housing Costs Element in their Universal Credit, so long as they require further financial assistance with their housing costs then they will be eligible throughout the period of that Monthly Assessment Period if they have been living in 'specified accommodation' or 'temporary accommodation', as defined by the Regulations. April 2018 Discretion For Extending And Shorten Assessment Period Where Claim Backdated - Universal Credit Full Service From 11 April 2018 the DWP will have the discretion to lengthen a Universal Credit claimant's first assessment period to more than one month, but they also have the discretion to allow a first assessment period that can be shorter than one month, to incorporate a backdate. This will only apply where the DWP consider that not doing so would be an administrative burden. At the moment if a request for backdating on a new claim for the Full Service of Universal Credit and the claim has not been decided within one month of the claim being made, the claim itself cannot be decided, and the claimant either has the 'choice' of waiting for the payment or withdrawing the backdate request. April 2018 Universal Credit - State Retirement Pension State retirement pension income is to be taken into account, net of any deductions, applied under overlapping benefit rules. April 2018 Universal Credit - Unearned income From 11th April 2018 Foreign State Pension Income and Pension Protection Fund periodic payments will be taken into account as unearned income in calculating the UC award. April 2018 Housing costs for 18 - 21 year olds (armed forces independent payment) Armed Forces Independent Payment has been added to the list of benefits that would exclude a claimant from the 'no housing costs element' rules under Full or Digital Universal Credit. April 2018 Universal Credit: Work Allowance From 9 April 2018 the work allowances will increase by 3% to £198 (for lower rate) and £409 (higher rate). April 2018 Housing Benefit From April 2018, claimants who were previously receiving Housing Benefit will receive a transitional payment (an extra two weeks support) when they move on to Universal Credit. This will be unrecoverable, is automatic, and received early in the first assessment period. April 2018 Universal Credit The Live Service Gateway conditions for new claims for families with more than two children will be extended until January 2019. April 2018 State Pension The basic State Pension will increase by 3% in April 2018 to £3.65 per week. The full State Pension will increase to £4.80 per week. £7.83 for those aged 25 and over. £7.38 for those aged 21 - 24. £5.90 for those aged 18 - 20. £4.20 for those under the age of 18. April 2018 Personal Allowance From April 2018, the Income Tax Personal Allowance will increase to £11,850. March 2018 Payment Exception Service Simple Payment Service will be replaced by Payment Exception Service on 29 March 2018. This is the new way for people who don't have a bank account to collect benefit or pension payments. It will still be paid via PayPoint but there are differences in the way the system will operate. February 2018 Universal Credit Abolishing waiting days - from February 2018, the DWP are removing the seven day waiting for new Universal Credit claimants. This will reduce the length of time that claimants might wait to receive their full payment. The Department for Work and Pensions (DWP) will be going through all existing cases to identify anyone who may be entitled to a higher rate of Personal Independence Payments (PIP) as a result of the judgement, which was handed down on 9 March 2017. It comes after the DWP decided not to challenge a court ruling, that said changes to PIP were unfair to people with mental health conditions. Ministers made changes to PIP in 2017, which limited the amount of support people with mental health conditions could receive. Anyone who is affected will be contacted by the DWP, and their payments will be backdates to the judgement. Changes to the criteria for activity 1 under the mobility component of PIP to reflect the challenges that may be faced by people with sensory difficulties if they experience disruptions to a journey. From 1 January 2018, the only people who will be able to make a new claim for Universal Credit will be those living in a Full Service area. Up until your area is transferred on to the Full Service of Universal Credit. January 2018 Universal Credit Increasing advances - From January 2018, Universal Credit claimants will be offered an advance of their payments of up to 100%, which is recoverable over 12 months (previously, claimants were entitled to an advance of up to 50% of their first month's payment and repayable over six months). December 2017 EEA Nationals protection The UK government reached an agreement with the EU to protect EU citizen's rights, which will enable them to continue to live as they do now after Brexit. It also covers family members. To secure their right, EU citizens will need to go through a simple digital application process which will confirm their status in the UK. December 2017 Universal Credit The Live Service of Universal Credit will no longer take new claims. If you are not in a Full Service area, claimants will be asked to claim legacy benefits and tax credits instead. We are waiting for the specific date, but we expect this to be in December 2017/January 2018. November 2017 Universal Credit The timetable for Universal Credit Full Service rollout has changed. Please see Universal Credit for more details. October 2017 Hardship payments Claimants who are homeless or have a long term mental impairment able to receive hardship payments (when sanctioned) without a waiting period. The government wants mixed age couples – where one person is of Pension Credit age and the other is younger – to claim Universal Credit. If living in a ‘Full’/Service area: can choose between claiming Universal Credit and claiming Pension Credit instead. This is because the government have not yet closed off Pension Credit to mixed aged couples. In August 2017, the DWP announce that there would be changed to the Regulations, which would come in to force September 2019. This means that, from September 2019, mixed aged couples will no longer be able to claim Pension Credit, and will have to claim Universal Credit. If either you or your partner are both under the qualifying age for Pension Credit, you will be expected to claim Universal Credit. July 2017 Pension Credit Minimum 2% Gilt rates removed - from Government Actuaries Department (GAD) tables for annuities. This sets the minimum notional income for untaken pension pots - as the Gilt rates have been below 2% for some time, this reduces the amount of notional income from untaken pensions for those over state pension age. April - September 2017 Childcare support The current entitlement of 15 hours of free childcare per week for working parents of three or four year olds will be doubled to 30 hours per week. April 2017 Jobseekers Allowance new ‘Youth Obligation’ to be introduced Unemployed 18-21 year olds who have been claiming Jobseekers Allowance for six months will have to either apply for training/ apprenticeships or attend a work placement, unless they are exempt (considered to be vulnerable). April 2017 Under occupation charge From April 2017, an extra bedroom can be awarded to disabled couples who cannot share a bedroom and to disabled children or non-dependents who need an overnight carer. April 2017 Carers allowance A carer can now earn up to £116 per week before their Carers Allowance is affected (it was previously £110 per week). April 2017 Universal Credit Families with three or more children will not be able to make a new claim for Universal Credit. They will be directed to claim Legacy Benefits instead, unless they have been in receipt of Universal Credit within the previous six months. A tax free lump sum of £2,500 if there are no children, or £3,500 if there are dependent children. Monthly tax free payment (Bereavement Support Allowance) for 18 months of £100 if there are no dependent children, or £350 per month if there are dependent children. April 2017 Parents to seek work Parents to seek work when the youngest child is three years old (it is currently five years old). April 2017 Universal Credit 'Youth Obligation' 18-21 year olds who have been claiming Universal Credit for six months will have to either apply for training or apprenticeships, or attend a work placement (unless they are exempt). April 2017 Pensions People planning their retirement will be able to withdraw up to £1,500 from their pension pots tax free to pay for financial advice. April 2017 Tax allowance Personal tax allowance has increased to £11,500 for 2017/18. £7.50 for those aged 25 and over. £7.05 for those aged 21 - 24. £5.60 for those aged 18 - 20. £4.05 for those under the age of 18. April 2017 Local Welfare Provision Community Care Grants and Crisis Loans for living expenses ended March 2013. A new scheme called Local Welfare Provision (LWP) is now in place, and will meet short term emergency support needs of vulnerable people. April 2017 Universal Credit The automatic entitlement to housing costs in Universal Credit for 18-21 year olds ends on 1 April 2017. April 2017 ESA New claimants placed in the work related activity group will receive the same rate of benefit as people on JSA, a cut of just over £29/week. Existing ESA claimants already getting the work related activity component included in an ESA award will continue to do so until they are found fit for work. April 2017 ESA Claimants making a new claim for ESA will no longer receive an extra component if they are found to have a limited capacity for work. Those who are in the Support Group will continue to receive the support component. Those on income-related ESA will still be 'passported' to their maximum Housing Benefit. April 2017 Universal Credit The Universal Credit taper will reduce from 65% to 63%. For every £1 earned after tax above an income threshold, a person receiving Universal Credit has their benefit award reduced by 63p and keeps 37p. April 2017 Universal Credit Universal Credit has removed the limited capability for work element. There is no new limited capacity for work element for claimants from April 2017, which is currently £126.11/month. April 2017 Universal Credit For new claimants, there will be no Higher Child Element for the first child if they are born after 6 April 2017 (the first child element is currently £277.08/month compared to subsequent child element of £231.67/month). April 2017 Housing Benefit When making a claim for Housing Benefit, only two child premiums will be included in the assessment where the claimant has a new child born after 1 April 2017 if there are already two child premiums included in the assessment. For families making a new claim for Housing Benefit after 1 April 2017, the number of child premiums is limited to two, regardless of how many dependent children are in the family, or where they were born. April 2017 Child support You will no longer receive support for a third or subsequent child - there will be no addition in Child Tax Credit, Universal Credit or Housing Benefit for a third child born after 5 April 2017. April 2017 ESA ESA claimants who work and earn between £20 and £120 per week will not have to relinquish their ESA claim or finish work after 52 weeks. Their work can continue. 2016 Universal Credit If you move homes, under current housing legislation you can potentially receive housing benefit for your new home and for the notice period for your previous home for up to four weeks. This does not exist when you're on Universal Credit. 2016 DLA Adults who are receiving Disability Living Allowance will continue to be reassessed for personal independence payments. 2016 Tax credits With the roll out of Universal Credit, it is intended that new claims for tax credits will be phased out. November 2016 Benefit cap Please see Benefits Cap for further details. July 2016 Universal Credit DWP has issued details of the rollout of Universal Credit Full Service. Please see Universal Credit for further details. July 2016 Pension Credit The time allowed to be abroad and still claim Pension Credit has been reduced to four weeks (it was 13 weeks). July 2016 Housing Benefit DWP have reduced the time period that someone can be claiming Housing Benefit whilst abroad to four weeks (it was 13 weeks). May 2016 Family Premium The government has removed Family Premium, which was an extra £17.45 given to people with children. April 2016 Jobseekers Allowance & Universal Credit Jobseeker support and conditionality; increased Jobcentre Plus support, weekly attendance at jobcentres in the first three months, Help to Work Programme, a new Work and Health Programme, spending on Access to Work will rise. April 2016 Freeze on Benefit Rates The rate of certain working age benefits, certain elements of tax credits and child benefits will be frozen at their 2015/16 levels for four years. April 2016 Pension Credit There will be no new claims for Saving Pension Credit, unless you've reached State Pension age before 6 April 2016. To qualify for the extra Savings Credit, you or your partner must be aged 65 or over. April 2016 State Pension State Pension age for women will match State Pension age for men (65) by November 2018. State Pension age will then increase to 66 from December 2018 to October 2020. State Pension age is due to rise to 67 between April 2034 and April 2026, and to 68 between April 2044 and April 2046. April 2016 State Pension State Pension is now a single payment. This will affect you if you reach State Pension age from 6 April 2016. You will receive the full State Pension (£155.65/week) if you have 35 years of National Insurance contributions. You will receive a pro rata amount if you have a minimum of 10 years of NI contributions. April 2016 Tax Credit The rate of debt recovery from Tax Credit overpayments will increase from 25% to 50% for households with an income of over £20,000 a year. HMRC can recover tax credit debts directly from a claimant's bank accounts. Only debts of £1,000 or more will be eligible for direct recovery action. April 2016 Universal Credit work allowance The work allowance in Universal Credit (the amount you can earn without your benefit being affected, has been reduced from April 2016. For disabled people and people with children, it is reduced to £192/month if you have housing costs and £397/month if you don't have housing costs. The work allowance has been completely removed for non-disabled, childless claimants, meaning your benefit is removed as soon as you start earning. April 2016 Housing Benefit Housing Benefit backdating will be reduced to a maximum of one month (it was previously six months). April 2016 Rent Housing associations will have to cut social housing rents by 1% each year for the next four years. April 2016 Universal Credit childcare support This has been increased. You can now claim up to 85% of your childcare costs, up to a monthly limit of £646 for one child or £1,108 for two or more children (it was 70%). April 2016 Tax Credit The disregard for increases in income is set at £2,500. The income disregard is a buffer zone, for when a family's income increases during the course of a year (without affecting their tax credit entitlement). April 2016 Personal tax allowance The personal tax allowance, which is the amount you can earn before paying income tax, will be increased from £10,600 to £11,000. It will be increased further to £12,500 by 2020. From thereafter it will automatically be set at the same level as 30 times the National Living Wage. April 2016 Mortgage interest waiting time From 1 April 2016, the waiting period for when you receive any payment will increase from 13 to 39 weeks for new claims. This means that, if you have a mortgage, you may financially struggle if your employment ceases to exist. October 2015 Personal Indepdence Payments (PIP) From October 2015, a managed switch of remaining working age Disability Living Allowance claimants who were under 65 as at 8 April 2015, begins across Great Britain. August 2015 Universal credit - waiting days Seven day waiting period on new claims, although there are exceptions. April 2015 Benefit cap New overall cap to be placed on Housing Benefit. October 2014 Jobseekers Allowance and Employment and Support Allowance waiting days From 27 October 2014, an extended waiting period at the start of a claim for Employment and Support Allowance or Jobseekers Allowance is being introduced. The new law will mean that no Employment and Support Allowance or Jobseekers Allowance would be paid for the first seven 'waiting days' instead of the present three days. June 2014 Child Maintenance Services The statutory child maintenance services work out child maintenance payments using a standard formula. The Government introduced application fees, collection fees and enforcement charges in 2014 for parents who use the Child Maintenance Service to collect and pass on payments. If you need to use the Child Maintenance Service, Child Maintenance Options can give you information and support that may help you avoid some fees or charges. The best way to avoid charging is to set up a family-based arrangement and not use the Child Maintenance Service at all. But if you and your child’s other parent can’t agree an arrangement between yourselves you may still be able to avoid having to pay any charges by choosing Direct Pay. May 2014 Carers Allowance Earnings limit increased to £102. April 2014 Working & child tax credit Required to make a Mandatory Reconsideration before any appeal can be lodged. April 2014 Jobseekers Allowance - new conditionality New conditionally includes, day one work search, English language requirement, quarterley work search interviews, weekly job search reviews/signing on. April 2014 Child tax credit Need to inform HMRC by the 31 August if a qualifying young person stays in education or comes off claim. April 2014 Income support - lone parents Increased conditionality once child reaches three years old. April 2014 Removal of access to Housing Benefit for EEA jobseekers If you have a right to reside as an European Economic Area (EEA) Jobseeker, you satisfy the right to reside requirement for Income-Based Jobseekers Allowance, however you must have some other right to reside to be entitled to receive Housing Benefit. March 2014 Minimum Earnings Threshold for EEA Nationals Migrants from the European Economic Area (EEA) who claim to have been in work or self-employed in order to gain access to a wider range of benefits will face a more robust test from 1 March 2014. Although guidance to decision makers advises that someone who is an EEA National is automatically a worker if s/he has been earning, on average, a threshold income for three months i.e. This is £150 a week – equivalent to working 24 hours a week at National Minimum Wage i.e. the figure is currently £157 per week. January 2014 Jobseekers eligibility From January 2014 there is a requirement to have been living for the past three months in the common travel area (the UK, Ireland, Channel Islands and the Isle of Man) in order to satisfy the habitual residence test for Income-Based Jobseekers Allowance. The Claimant Commitment outlines what job seeking actions a claimant must carry out while receiving Jobseeker’s Allowance (JSA). It emphasises the claimants’ responsibility to do all they can to look for work in return for the support they receive from the state. When someone makes a new claim for JSA or returns to JSA from the Work Programme they will attend an interview with a work coach. At the interview they will agree a personal plan outlining what the claimant will do as part of their Claimant Commitment to give themselves the best chance of finding work. This could include regular specific tasks and training opportunities. The Claimant Commitment is already in place for Universal Credit. April 2013 Council Tax reduction (Council Tax Support) Council Tax Reduction (Council Tax Support) replaced Council Tax Benefit in April 2013 i.e. help towards your Council Tax bill, most residents will now have to make a contribution towards their Council Tax bill, even those on means-tested benefits, the Council Tax Contribution varies from Council to Council from 8.5% to 25%, although most Councils exempt some pensioners from having to pay a contribution towards there Council Tax. April 2013 Universal Credit - minimum income floor Where someone who is gainfully self-employed, has been trading for 12 months and has a low income from that self-employment, the Universal Credit assessment will assume a minimum income for them - referred to as the minimum income floor. They will be treated as earning at least the minimum wage / living wage for someone of their age, for the number of hours the DWP expects them to work. April 2013 Penalties as alternatives to prosecution The Welfare Reform Act 2012 introduced tougher penalties for people who commit benefit fraud. Benefits can be reduced or stopped if a claimant, their partner or a family member is convicted of a benefit fraud offence or accepts an administrative penalty for such an offence. An administrative penalty is a financial penalty offered by DWP as an alternative to prosecution. The amount of penalty is 50% of the amount of the overpayment, subject to a minimum amount of £350 and a maximum amount of £2000 although can be admendments overpayment is below £350. April 2013 Measures to deal with fraud The government established a Fraud, Error and Debt Taskforce in 2010. This was to coordinate cross-government efforts to reduce the unacceptable losses to the taxpayer caused by fraud, error and non-payment of debt. The Department for Work and Pensions (DWP) and HM Revenue and Customs (HMRC) are working together to progressively reduce error, and ensure that the honest majority do not lose out at the hands of those who defraud the system. April -September 2013 The benefit cap Housing Benefit reduced if your applicable benefit income exceeds £350 singles and £500 for couples. April 2013 Housing Benefit - Under occupancy charge (Bedroom tax) Housing Benefit restricted to the number of bedrooms you are required based on your family composition. January 2013 Employment and Support Allowance Tightening up of some descriptors to make them more restrictive i.e. hospital stay, substantial, chemotherapy and radiotherapy all amended. January 2013 Child Benefit Tapered withdrawal of Child Benefit where an earner over £50,000 i.e. stops completely at £60,000. 3 December 2012 Employment & Support Allowance - Sanction Changes From the 3 December 2012 there will be a three-tier sanction for those in the Work-Related Activity Group, the sanction is open ended until the claimant re-engages followed by a 1, 2 or 4 benefit sanction. The weekly amount of the sanction also increases from the Work-Related Activity component of £28.15 a week to the standard allowance of £71.00 a week. October 2012 In-Work Credits & Job Grant Abolished for those moving from out of work benefits to in work benefits. October 2012 Jobseekers Allowance - Sanction Changes From 22 October 2012, there will be a three-tier fixed penalty sanction: Higher Level 13, 26 and 152 week sanction for 1, 2 and 3 offence within 52 weeks, Intermediate Level 4 and 13 weeks sanction, Lower Level 4 and 13 weeks sanction. October 2012 Civil Penalties Sometimes a person who has been overpaid a benefit, will have to pay an extra penalty on top of the overpaid amount, if the overpayment has not been caused by proven fraud a Civil Penalty of £50 can be added to an overpayment. HMRC continues to operate its own enforcement policy (from September 2012) in respect of Tax Credits, where residents unreasonably fail to report a change in their circumstances within the required period, a fixed penalty of £300 will be applied. May 2012 Abolition of Youth Contribution-Based Employment and Support Allowance At present, special arrangements apply which allow certain young people to qualify for contributory Employment and Support Allowance under the Employment and Support Allowance ‘youth’ provision, without having to satisfy the National Insurance contribution conditions which apply to all other claimants. Abolishing this concession from May 2012 puts those previously eligible for Employment and Support Allowance ‘youth’ on an equal footing with others who have to satisfy the relevant National Insurance conditions before they qualify for contributory Employment and Support Allowance, which will create a simpler system. Government intervention is necessary to ensure entitlement to contributory Employment and Support Allowance applies consistently to all customers. From May 2012, if your youngest child is aged five or over, or will become five that year, your Income Support may stop during that year. April 2012 Pension Credit Savings Credit reduced and frozen for four years to £18.54 (single) and £27.73 (couple), also threshold for qualifying increased by 8.4%. April 2012 Working Tax & Child Tax Credit New rule of disregarding an income drop of £2,500 and time limit for notifying changes of circumstances cut from three months to one month. April 2012 Child Tax Credit Family Element income threshold abolished, so will start to taper off straight after Child Tax Credit individual elements. April 2012 Working Tax Credit Couples with children must work at least 24 hours combined to qualify, with one working at least 16 hours. March 2012 Introduction of entitlement to work The introduction of entitlement to work as a condition of entitlement, for contributory Employment and Support Allowance, contribution based Jobseeker’s Allowance, Maternity Allowance and all Statutory Payments. The introduction of this condition of entitlement will ensure that people who have no entitlement to work in the UK have no legal entitlement to contributory based benefits and statutory payments. Removal of requirements for claimants to engage in certain activities and also provisions in relation to voluntary and mandatory rehabilitation plans where they are claiming Jobseekers Allowance or Employment and Support Allowance and are dependent on, or have a propensity to misuse, drugs. A new Additional Support programme which, on a voluntary basis, will provide integrated and personalised support for JSA and ESA claimants who are undergoing drug treatment. A Treatment Allowance, in place of their ESA or JSA, payable on a voluntary basis to the individual as long as they maintain their treatment and engage with the Additional Support programme. In addition, the Regulations will remove some of the normal conditions of entitlement for benefit in order to allow drug users the time and space to focus on their recovery. For example, this will mean that those on JSA will not be required to sign on or show that they are actively seeking work. Mandatory referral to Substance Related Assessments (SRAs) and a Treatment Awareness Programme with a specialist drug treatment provider for PDUs on JSA and ESA who are not already in treatment. The power for the criminal justice system to supply data to aid both the identification of PDUs not in treatment, and the take-up of in-treatment support for those who are. The power to refer to the mandatory SRAs where a Jobcentre Plus adviser has ‘reasonable grounds for suspicion that problem drug use is a barrier to work’. Should claimants in this group refuse to attend two successive SRAs they can be required to take one or more drugs tests. March 2012 State Pension Credit The Government has also announced that it is simplifying the process for claiming the carer addition in Pension Credit. Carers in receipt of a State Retirement Pension will be able to claim Pension Credit - and receive the additional Carers Premium in Pension Credit - without making a claim for Carer’s Allowance. March 2012 Industrial Injuries Benefit The Industrial Injuries Scheme provides non-contributory no-fault benefits for disablement because of an accident at work, or because of one of over 70 prescribed diseases known to be a risk from certain jobs. The scheme also covers people working on approved employment training schemes or courses. The benefits payable under the scheme are known as Industrial Injuries Scheme Benefits (IISB) i.e. there has been simplification changes under the Welfare Reform Act 2012. March 2012 Recovery of fines from benefits Magistrates courts can apply to the DWP for a fine, costs or compensation order to be deducted from your Income Support, Jobseekers Allowance, Employment and Support Allowance, Pension Credit or Universal Credit. September 2011 Educational Maintenance Allowance Abolished in England. April 2011 Guarantee Pension Credit Government has increased Guarantee Pension Credit to match the cash rises in basic State Retirement Pension. April 2011 State Retirement Pension 2007 legislation provided for the basic State Retirement Pension to be increased at least in line with average earnings i.e. from 2012 onwards the highest of the Consumer Price Index, average earnings or 2.5%. April 2011 State Pension age Accelerate speed of equalisation of pension age, with equal pension age to be achieved by November 2018. April 2011 Housing Benefit Local Housing Allowance maximum caps for 1 bed (£250), 2 bed (£290), 3 bed (£340) and 4 bed (£400), separate rate for 5 bedrooms (at any moment) scrapped. Non-Dependant Deductions large increase over next 3 years to make up ground since last increase 10 years ago. Local Housing Allowance rates will be set at 30th precentile of local private rent prices, not the 50th. Additional room in Local Housing Allowance if you require a Carer to come in and an additional room for a disabled child. April 2011 Tax credits Taper on income moves from 39% to 41% and disregarded increases in income falls from £25,000 to £10,000 basic and 30 hour element frozen for three years and a new category for workers aged 60+, childcare element reduced from 80% to 70%, income threshold for the family element reduced from £50,000 to £40,000 a year. April 2011 Maternity grant Restricted to the first child only. April 2011 Child Benefit Rates frozen for three years. April 2011 Working Age benefits Increases will be set by the Consumer Price Index instead of the Retail Price Index. March 2011 Employment and Support allowance Migration of existing claimants of Incapacity Benefit, Severe Disablement Allowance and Income Support (through sickness) begins. January 2011 Old 'sickness route' benefits No new linked claims for Incapacity Benefit, Severe Disablement Allowance or Income Support for sickness from 31 January 2011. Claimants no longer return to old rate but claim basic Employment and Support Allowance and face Work Capacility Assessment. Incapacity Benefit and Severe Disablement Allowance claimants can still claim Income Support and vice versa if they become eligible. Between October 2010 and Spring 2014, customers who receive Incapacity Benefit, Severe Disability Allowance and Income Support, paid on the grounds of illness or disability, will be assessed for Employment and Support Allowance. This will not affect people due to reach state pension age by 6 April 2014. It will not affect people already receiving Employment and Support Allowance.
2019-04-22T04:02:13Z
https://www.regenda.org.uk/benefit-changes
2019 is right around the corner. A new year means a new approach — especially for property searches. We’ve written about how the Canadian real estate market is in a state of flux. And that’s likely to continue in 2019. This means you need to evaluate the methods you’re using in your real estate business and look for a better way of working. If the last time you reviewed your property search technique was when interest rates were still 0.5%, read on. Traditional housing styles, like single-family detached homes, are still popular, but there are many non-traditional dwelling types rising in the ranks. Condos, row houses, multi-family living, and the like are becoming the new norm, especially in larger areas. Consider shifting your sales focus to include dwelling types you may not have thought about before. Large cities like Toronto and Vancouver are still popular but are also some of the least affordable areas of the country. More and more people are opting to live further away and commute in for work… or potentially not commute at all if they have the option of working remotely. Some people are leaving the GTA for homes in Niagara Falls, for instance. This may seem like a long trek, but if you only have to be in the office one or two days a week (or less) it may be worth it. Don’t be afraid to consider properties outside of your normal selling area and tell clients about opportunities they might not even have thought about. Another trend that’s been blowing up in 2018: friends buying homes together and multi-generational living. As homeownership becomes more expensive, some buyers are choosing to go in on real estate together rather than continuing to rent. This is happening across generations, from younger women buying a house together, to widows moving in together and hiring help rather than moving to an assisted care facility. Check out this story about these modern day Golden Girls: https://www.theloop.ca/watch/entertainment/fun/meet-the-real-life-canadian-golden-girls/5850964297001/5850860215001/the-social/. If a buyer is not finding anything in their price range, consider suggesting some outside-of-the-box living arrangements. A savvy property searcher doesn’t only look for dwellings that are already on the market. They put them on the market themselves. While it’s ideal when a client approaches you for help selling their home, you can also source homes to sell by using demographic reports. For instance, if you search in your selling area for neighbourhoods populated by older couples with no children, you might identify properties where homeowners are looking to downsize. If you find a neighbourhood popular with millennials, they may be considering starting a family soon and looking for more space. Demographics can tell you a lot about potential clients and help you discover leads before they are even on the market. Networking has always been one of the most important parts of a real estate professional’s job, and social media has made that easier than ever. Join neighbourhood groups, participate in discussions, and look for connections online. If you don’t have a social media presence already, start one. If you do have one, consider how you could be making better use of it. Social networking can help you find new leads and clients before they come to you. See a friend or neighbour who is thinking about starting a new business? Message them to chat about commercial space opportunities. Have an acquaintance welcoming a baby? You might consider sending a gift basket and asking if they are considering looking for more space. Are you using the most accurate, up-to-date property search technology available? It may be time to reassess the tools that you’re using for your searches. For instance, GeoWarehouse’s property data comes from the Province of Ontario Land Registration Information System (POLARIS). The information you receive is the most accurate you’ll find. Plus, it’s updated in real time, so you can trust that you’re receiving the latest numbers. If you’re serious about upgrading your property search techniques, consider switching to GeoWarehouse! Want to learn more about our tools? Call 1-866-237-5937 or visit www.geowarehouse.ca. A Parcel Register* is an important part of any real estate sales professional’s arsenal. With one search, you can find an incredible amount of information about a property. Legal property address. This is important for contracts. Legal homeowners. Sometimes other people are on title that aren’t disclosed to you. Registration and transfer history. This can identify real estate fraud and other issues. The dates, parties to and amounts of transfers and mortgage registrations. This can identify undischarged mortgages that can delay closings, higher mortgages than disclosed, and the like. Liens and charges on title. Other registrations that you may want to look into, like strange restrictive covenants and easements. If there is an instrument registered against the property, you can also take your investigation a step further and get an Instrument Image*. Some real estate sales professionals use Parcel Registers* only when something feels “off” about a deal. This is by no means a bad strategy — you need to trust your instincts, especially if you’ve been in business for a while. Even if nothing turns out to be untoward, it’s still vital that you do your due diligence. Other real estate sales professionals use Parcel Registers* for every deal, whether something feels off or not. This can also be a good strategy. After all, you know the costs of a bad deal going through or of having trailing liabilities. A Parcel Register* gives you an easy way to vet your clients and property information. At GeoWarehouse, our Parcel Registers* come from property data taken directly from, the Province of Ontario Land Registration Information System (POLARIS). You can trust this data is the most accurate information available. Want to dig deeper? Parcel Registers*, as well as Instrument Images* and many other documents, are available online through the GeoWarehouse eStore. For a limited time only, you could win a $500 Best Buy gift certificate when you order property reports from the NEW GeoWarehouse e-store! You get one contest entry for every property report purchased from the GeoWarehouse store. If you purchase a Parcel Register* you get two contest entries. The contest is on until August 31, 2018. In the GeoWarehouse store, you can access title search products from the Province of Ontario Electronic Land Registration Information System (POLARIS), MPAC reports, condo status certificates, property surveys, and more. The GeoWarehouse e-store is open to real estate sales professionals across Canada. To learn more about the e-store, check out our video here. Have questions? Our GeoWarehouse team is happy to help. Call 1-866-237-5937. Without a doubt, a Parcel Register* is many things, but it’s not a title search. It’s part of a title search and is one of the most informative and accurate information snapshots of registrations that exist against a property. Did you know that the Parcel Register* is the fastest, most accurate way to find out if there is enough equity to pay you? That’s an important factor in every real estate transaction, don’t you think? Are there other people on title to a property not disclosed to you? Are there challenges with equity or surprise information you and your client may not have known? Obtaining a Parcel Register* can help answer these questions. Also, if you want to know if there are any registered mortgages against a property, a Parcel Register* can tell you the lender, registration date, amount and value. Want to know if there are any registered liens? With a Parcel Register*, you can find out and get information on the registration date, amounts and the individual or company who registered it. This is powerful information for a real estate sales professional when trying to get the maximum amount of research available to help make informed real estate transactions. You can use it at any stage in the process – from listing to buying – but when your intuition suggests some more investigation, a Parcel Register* can help you make an informed deal. When you simply want to confirm something, a full property title search isn’t required. With a Parcel Register*, you can get the right information required without doing a full property title search. To learn more about how a Parcel Register* can benefit you, or want to find out how to order one, visit www.geowarehouse.ca today. Unfortunately, during the process of the real estate closing, it is not uncommon for things to come up that the real estate lawyer identifies – things that you likely wish you’d noticed far earlier in the process. Over the years, the role of a real estate sales professional has become far more onerous – some buyers even include in their offer that they expect perfect title – and so we continually strive to make things a little easier. How can you investigate the title of a property when traditionally it is the real estate lawyer’s role to perform a property title search? To better understand this is to better understand what’s involved in a property title search. When many think of a property title search they are actually thinking of the Parcel Register*. You can learn a lot about a property’s title before a deal even gets to the real estate lawyer simply by reviewing the Parcel Register*. Some things that emerge on the Parcel Register* could have caused a delay on your deal while other issues could cause your deal to come to a grinding halt! For example – a very common occurrence that causes delays on a closing are previously undischarged mortgages on title. This commonly occurs when the homeowner has paid off the mortgage but the lender failed to discharge it from the property’s title. While this can be resolved fairly simply once discovered, it can take a week or two to do so which can impact a closing. Learning of the existence of undischarged mortgages long before closing enables your client to take the required steps to resolve the issue and they will thank you for it. In truth, most homeowners are unaware and simply assume when a past mortgage was paid off that it was discharged. In other situations, a lien can emerge on title which can create a serious issue if the amount of the lien exceeds the value of the property, which is common with tax liens. Reviewing a Parcel Register* removes questions and ensures that you know as much about the title of the property that is the subject of the deal that you are working on. This leaves you closing more deals and appearing as the stealth professional you are to your client! Parcel Registers* are available through GeoWarehouse – and not just to real estate lawyers. Find out more by visiting www.geowarehouse.ca today. The biggest challenge you have to overcome is the unknown. It is the unknown that leads to snags on deals that result in closing day surprises that can make a deal extremely stressful for all involved. So how can we see what we can’t see? Before ironing out the how, we should first iron out the what. What can you look at that will help you to mitigate problems on deals and shine in front of your client? Most of what you will want to look for exists within a property’s title. Who owns the home? Have all of the legal homeowners signed onto your engagement? Is your client the legal homeowner? This information is critical. Is there enough equity to cover the closing costs? Have you checked (despite what the client is telling you) how many actual mortgages are registered on title? Is it possible that there are any liens? Have you validated the property’s legal description? Are there any nefarious transactions on title – strange transfers or discharges? You may be thinking that these are things that you leave to the real estate lawyer. Not so. Digging deeper is like digging for dollars. For every deal that turns up with an issue, you need to be able to resolve it. If it can’t be resolved, you can quickly move on to deals that will close. Knowing is step one in conquering sure challenges. As you know, when a real estate lawyer closes a deal they perform a full title search. What you may not know is that the information associated to aspects of a title search are available to you too! Real estate professionals often confuse the difference between a title search and a Parcel Register*. The confusion: many think that the Parcel Register* is actually a title search, which is why some think it is the lawyer’s responsibly to review the Parcel Register* and therefore beyond their means to access it themselves. Once again, this is not so. Is obtaining a Parcel Register* part of your professional, legal and ethical obligation as a real estate sales professional? Short answer: accessing the information contained in one arguably is. While it may not be listed as a requisite, it probably should be! Not only does digging deeper mean more dollars for you – it means more dollars for the real estate lawyer, mortgage broker, and mortgage lenders that follow you. It means going above and beyond the call of duty, forging stronger relationships and becoming known for the stellar job that you do. We challenge you: go the extra mile for your client, dig deeper, work on the deals that can and will close and realize the true financial potential that awaits you. Amongst other things, the Parcel Register* provides somewhat of a financial snapshot as it relates to the property. The Parcel Register* contains the most current information available which is why real estate lawyers rely upon it when certifying title. In Ontario, Teranet is the exclusive provider of land registry data and so real estate lawyers use a software called Teraview to request searches like a Parcel Register* and eventually electronically transfer title once the deal closes. Real estate lawyers are not the only real estate or legal professionals using Parcel Registers* in the course of their day-to-day activities. Mortgage brokers and real estate sales professionals have also begun to rely on the Parcel Register* as an integral part of the real estate closing process. Most real estate professionals and mortgage brokers alike are paid on a real estate deal, when the deal closes. Commissions and fees are deducted from the proceeds of sale. When a lien comes up on closing an immense amount of time is wasted: the real estate sales professional, mortgage broker, lender and real estate lawyer are all vested in the deal and at risk of losing. The sooner the Parcel Register* is requested, the better, because the earlier a lien is discovered in the process, the sooner it can be resolved. Your client may not even know that there is a lien – this is very common with tax liens. The presence of a lien doesn’t mean that the deal is over either. Though a closing date being missed because of one is inconvenient and in some cases expensive, a real estate sales professional can work with their client to resolve the issue before the 11th hour. Also, a lien that consumes all of the property equity and can’t be resolved means there is no equity to pay you! Working on a deal and want to request a lien search? Access the GeoWarehouse Store to obtain a Parcel Register* today. Title Search: Is this the Real Estate Sales Professional or Lawyer’s Responsibility? The grand debate – whose responsibility is what? On most real estate transactions there is a real estate sales professional, a mortgage agent/broker, a lender and a real estate lawyer. Each individual has distinct roles but there is some overlap in each. A property title search is a classic example of this overlap. Before we can explore this we first need to clear up what people mean when they say “title search”. A title search is in fact the function that the lawyer performs on closing that includes looking at the property’s transfer history, registrations, tax status, water status, survey and more… Lenders often require title insurance to protect the client from short comings in this regard as a result of a lawyer missing something. When you hear mortgage agents, real estate professionals and even banks referring to a title search they often are referring to the Parcel Register*. The Parcel Register* is an aspect of the title search that used to be most often performed by lawyers but in recent years have started being requested at earlier stages in a real estate deal by the real estate sales professional, mortgage agent or lender. The debate comes in because there is a cost associated to requesting a Parcel Register* and so whose responsibility is it to request one? Really it is not a question of responsibility – it’s a question of doing the best job for your client and due diligence to protect yourself by not wasting time on bad deals. A real estate sales professional should be looking at a Parcel Register* as part of their workflow while the lawyer should as their responsibility. The Parcel Register* will let you know immediately if you are dealing with the legal homeowner and also if there is enough home equity in the property to pay you – whether it is their home or a home being purchased. Obtaining a Parcel Register* shouldn’t be viewed as a hassle or someone else’s job when it is in fact an opportunity that only stands to benefit you. The upside here is that Parcel Registers* are easy to obtain online if you’re a GeoWarehouse customer – just add this to your regular due diligence process and you’re off to the races! Not a GeoWarehouse customer? What are you waiting for? Visit www.geowarehouse.ca today to find out more about all the great tools waiting for you.
2019-04-24T18:04:50Z
http://www.geowarehouseblog.ca/category/title-search/
The Hagerstown Suns are a Minor League Baseball team based in Hagerstown, Maryland, United States. The team, which plays in the South Atlantic League, is a Class A affiliate of the Washington Nationals. They play in Municipal Stadium, which was opened in 1930 and seats 4,600 fans. The team mascot is "Woolie", a giant Woolly Bear Caterpillar. Professional baseball has been played in Hagerstown since the late nineteenth century. The Hagerstown Lions played for one season in the independent Cumberland Valley League during 1896. The league began on June 19 and lasted until August 9, when it disbanded due to the disbandment of one of the teams, the Chambersburg Maroons, on August 7. The Lions finished the season in first place with a record of 26-12, three games ahead of Chambersburg. The Lions also dominated statistically, having the league leaders in runs (40 by Natty Nattress), hits (52 by William Graffius), wins by a pitcher (10 by Thomas Lipp), and winning percentage by a pitcher (.833 by Thomas Lipp, with a 10-2 record). Lipp and another Lion, John Gochnaur, were the first Hagerstown players to make it to the major leagues. In 1915, the class D Blue Ridge League was formed with its headquarters in Hagerstown. Hagerstown fielded a team for the next 16 seasons. Throughout this time, they won five pennants and donned four different names: the Blues, the Terriers, the Champs and the Hubs. Before the beginning of the 1931 season, the Blue Ridge League disbanded. The club was then affiliated with the class C Middle Atlantic League, but on June 28, 1931, the club moved to Parkersburg, West Virginia. The Hagerstown players with the most major league experience during this era were Mike Mowrey (13 major league seasons), Frankie Pytlak (12 major league seasons), and Babe Phelps (11 major league seasons). Professional baseball returned to Hagerstown in 1941 when Oren E. Sterling moved his Sunbury Indians franchise to town and became a Detroit Tigers affiliate. The newly named Hagerstown Owls (Oren, Win, Luck and Sterling) joined the Class B Interstate League. Gene Raney purchased the team from Sterling in 1950, and the renamed Hagerstown Braves became an affiliate of the Boston Braves. The team moved to the Piedmont League in 1953 and once again had a name and affiliation change. The new Washington Senators affiliate, the Hagerstown Packets, competed until the league disbanded after the 1955 season. Hagerstown was without a professional team until 1981 when Lou Eliopulos purchased the Rocky Mount Pines Class A Carolina League franchise and moved them north to Hagerstown. The team was a co-op affiliate during 1981, with coaches supplied by the Baltimore Orioles and players supplied by several major league clubs to include the Orioles, Chicago Cubs, Cleveland Indians, and Pittsburgh Pirates. The newly named Hagerstown Suns proceeded to win the Carolina League championship in their inaugural season by defeating the Peninsula Pilots. In 1982, the Suns began a long-term affiliation with the Baltimore Orioles. The 1982 Suns had a better record than the 1981 team, but did not reach the playoffs. For 1983, despite winning 84 games, the Suns finished 10.5 games behind the North Division champion Lynchburg Mets. The winner of the South Division was the Winston-Salem Red Sox, who won 10 games less than the Suns. Hagerstown also led the Carolina League in attendance during 1983 with 153,660 fans as compared to Durham's 142,370. They experienced their first losing season in franchise history in 1984, finishing 30 games behind the first place Lynchburg Mets. One reason may have been the fact the team had three different managers (John Hart, Len Johnston and Grady Little) during the season. In 1985, the Suns played an exhibition game with the parent club Baltimore Orioles. The Suns’ best overall record in franchise history and a return to the Carolina League Championship Series came in 1986. However, the Suns would lose the league championship to the Winston-Salem Spirits. The Suns would also make the playoffs in 1987, only to be eliminated in the first round by the eventual league champion Salem Buccaneers. Despite having the best overall record in the Carolina League North Division in 1988, the Suns did not make the playoffs. This occurred because the Suns did not win either the first or second half. The team that won the North Division Championship was the Lynchburg Red Sox, whose overall record was 11 games worse than the Suns. The Suns still hold several Carolina League one game individual and team records. Jim Palmer, shown here in 2009, is the Suns' only Hall of Fame member. In addition to the Carolina League records, the Suns also had many other individual distinctions during the Carolina League period. Matt Tyner and Ken Gerhart set the club record for season home runs with 31 in 1981 and 1983 respectively. 1983 was also the year Hall of Fame member Jim Palmer made a rehabilitation start for Hagerstown. Craig Worthington and Pete Stanicek were the standouts in 1986. Worthington set a Suns record with 105 runs batted in (RBIs) and would hit 15 home runs. He did this while maintaining a .300 batting average. Meanwhile, Stanicek batted .317 and set a Suns' record (later tied by Don Buford in 1988) by stealing 77 bases, only getting caught 17 times. One other noteworthy player for Suns' fans in 1986 was Mick Billmeyer, a local product from nearby Funkstown. He would play the entire 1986 season as the primary back-up to Suns catcher Jeff Tackett. The 1987 offense was led by Leo Gómez. He batted a league leading .326 with 19 home runs and 110 RBIs. Gomez also led the Carolina League in doubles with 38. The ace of the Suns' rotation in 1987 was Blaine Beatty. Beatty went 11-1 with a 2.52 earned run average (ERA) in 13 starts with the Suns before being promoted to AA Charlotte. He completed 4 of his starts and allowed just 81 hits in 100 innings. Beatty was also named the 1987 Carolina League Pitcher of the Year. In 1989, Hagerstown moved up to the Double-A Eastern League, taking over the Williamsport Bills franchise and again affiliating with the Orioles. (The Carolina League franchise would relocate just down Interstate 70 as the Frederick Keys, maintaining the Orioles' Class A affiliation.) Suns' fans would see some familiar faces as past players such as Leo Gómez, Pete Stanicek, Dave Bettendorf, Ken Dixon, and Brian Dubois returned. On offense, David Segui batted .324 with 1 homerun and 27 RBI's in 44 games in his second stint with Hagerstown after being promoted from Frederick. Leo Gómez would hit 18 home runs, a team leading total. Suns fans also saw the return of Steve Finley, who came back to Hagerstown via a rehabilitation assignment. In 11 games, Finley would bat .417 with 7 RBI's and 4 stolen bases. On the pitching side, Mike Linskey was the ace of the starting staff with 10 wins and a 2.81 ERA in 18 starts. Despite his dominance with the Suns, Linskey would never pitch in the major leagues. The Suns finished their first season in Double A 5 games under .500, and would finish fifth in the then eight team Eastern League. They narrowly missed the playoffs by 3 games and were 24.5 games back of the 1st place, and eventual league champion, Albany-Colonie Yankees. George H. W. Bush attended a Suns game as a sitting U.S. President in 1990. The Suns failed to make the Eastern League playoffs in 1990. While they fell short of that quest, the Suns still had one of their more interesting years. Jack Voigt would contribute mightily to the offense as he batted .256 with a team leading 12 homeruns and 70 RBI's. Scott Meadows led the team with 75 RBI's. Luis Mercedes batted a league leading .334. He also stole a team leading 38 bases. Three prominent Baltimore Orioles, Sam Horn, Brady Anderson, and Mike Devereaux, would make rehabilitation appearances. Anderson stood out the most among the group as he hit .382 in 9 games. The pitching staff was led by Anthony Telford, who went 10-2 with a 1.97 ERA in 13 starts for the Suns, completing 4 games. Another milestone in 1990 was the visit of George H. W. Bush to Municipal Stadium to attend a Hagerstown Suns baseball game. This visit was the first time a sitting President of the United States attended a minor league baseball game. After back to back losing seasons, the Suns returned to their winning ways in 1991, making their only Eastern League playoff appearance. They would finish in second place, only to lose to the eventual league champion Albany-Colonie Yankees in the first round. The offense got power from Paul Carey, who hit a team leading 12 home runs. The Sun's best all around hitter may have been first basemen Ken Shamberg, who hit .275 with 10 homeruns and a team best 82 RBI's in 114 games. Top prospect Arthur Rhodes led the pitching staff. Over the course of 19 starts, Rhodes would go 7-4 with a 2.70 ERA and strikeout 115 batters in 106.2 innings, while walking just 47. Rhodes also won the Eastern League Most Valuable Pitcher Award. He also made his Major League debut with the Orioles after being promoted directly from Hagerstown. Stacy Burdick was the leader in pitching wins 11, yet it was the last professional season that he pitched. Burdick went 29-17 combined between 3 stints with Hagerstown including time with the Carolina League franchise as well. Todd Stephen would lead the team in saves out of the bullpen with 17 and had a 2.12 ERA in 89 innings pitched. Much like the year before, Suns fans saw multiple rehabilitation assignments pass through as Kevin Hickey, Dave Johnson, Bob Milacki, Billy Ripken, and Glenn Davis each had stops in Hagerstown. All of this would add to what was by far the Suns best season in the AA Eastern League. The Suns also had their all-time highest attendance record, with 193,753 fans passing through the gate. The team fell short of its quest for the Eastern League playoffs in 1992. Mel Wearing led the team with only 5 homeruns. Scott Meadows would hit .317 in 45 games with the Suns; this would prove to be his final year with the Orioles organization. Manny Alexander, the Suns' shortstop, hit .259 and stole a team-leading 43 bases. He did this at the age of 21, young for AA baseball. The 1992 season would also complete a unique trifecta for the Suns. In this season, Don Buford would manage his son Damon. His other son, Don Jr., had played for the Suns in 1988 and 1989. Don Jr. tied the Suns record for stolen bases by a Suns with 77 in 1988 and would come back in 1989 to steal 30 more. Damon meanwhile, stole 41 bases in 1992 with the Suns. Damon would be the only one of the two sons to follow in his father's footsteps by playing in the major leagues. Finally, 1992 may be remembered because of the uncertainty that hung over the season. The Suns' and Keys' owners failed to claim an Eastern League expansion franchise for Bowie in 1993 (coinciding with the Florida Marlins' and Colorado Rockies' addition to the majors), they instead chose to move their existing franchise there as the Bowie BaySox. It also ended Hagerstown's relationship with the Baltimore Orioles, which dated back to 1981. Unlike when the Carolina League team had left a few years earlier, there was no guarantee that another team would return to Hagerstown. Hagerstown would not go without, though. Winston Blenckstone immediately relocated his Myrtle Beach Hurricanes franchise in the South Atlantic League to Hagerstown after the 1992 season and promptly renamed them the Suns. All of the changes would bring a competitive team to Hagerstown for the 1993 season. The offense got steady power production from Mike Coolbaugh, who led the team with 16 home runs. The best all-around hitter on the team proved to be D.J. Boston. Boston would hit .315 with 13 home runs and 93 runs batted in (RBI's). Those numbers were good enough to earn him league Most Valuable Player (MVP) honors. Two outfielders, Rickey Cradle and Jose Herrera, put together solid seasons at the plate for the Suns. Herrera hit .317 in 95 games, while Cradle belted 13 home runs. Brad Cornett led the team in earned run average (ERA), with a 2.40 mark, and also innings pitched, with 172.1. Silva went 12-4 with a 2.52 ERA in 142.2 innings. In that time frame, Silva struck out 161 batters. Overall, the Suns had a winning season in 1993. In 1994, the Suns reached the playoffs for the first time since 1991. On offense, the team was led by former first round draft choice Shannon Stewart. Stewart hit .324 with 4 home runs and 25 RBI's in an injury-shortened season. Tom Evans would return from the 1993 squad, hitting .273 with 13 home runs and 48 RBI's in 95 games. The power was supplied by Lorenzo Delacruz and Ryan Jones, who hit 19 and 18 home runs, respectively. Jones also had a team leading 72 RBI's. Edwin Hurtado went 11-2 with a 2.95 ERA in 33 games, 16 of which were starts. The bullpen was headlined by Steve Sinclair and Dave Sinnes. Sinclair appeared in 37 games out of the bullpen and picked up a total of 9 wins with 105 innings pitched. Sinclair only made one start for the Suns all year. Closer Sinnes tied for the South Atlantic League (SAL) lead with 37 saves. The Suns advanced to the league championship. However, the Savannah Cardinals beat the Suns to win their second straight championship. In 1995, veteran Jeff Ladd led was the home run leader on the team. Ladd hit 19 home runs in 95 games before a promotion to AA level Knoxville. This would turn out to be Ladd's last professional season. Bobby Llanos hit 17 home runs and produced a team leading 63 RBI's. The Suns got stable production behind the plate from Julio Mosquera. Mosquera hit .291 in 108 games for the team. Brian Smith would pitch his way to a 9-1 record in 47 games out of the bullpen and pick up 21 saves along the way. He also had 101 strikeouts in 104 innings. Doug Meiners proved to be the Suns' best starter of the season, as he went 8-4 with a 2.99 ERA in 18 starts. Another highlight from the starting staff was Tom Davey, who went 4-1 with a 3.38 ERA in 8 starts. 1996 was the Suns first losing year in the SAL. First basemen Mike Whitlock led the team in home runs (20) and RBIs (91) with a .252 batting average while drawing a franchise record 108 walks. He did this in 131 games at the age of 19, yet never played a game in the major leagues. Another player who displayed power was Craig Wilson. Wilson hit 11 home runs with 70 RBIs while maintaining a .261 batting average. Craig Stone returned from the 1995 squad, batting .310 with 10 home runs and 35 RBIs in 56 games. Mike Johnson won a staff leading 11 games and also had a team-leading total of 162.2 innings pitched. He made his major league debut a season later with the Baltimore Orioles. Tom Davey won 10 games and had a 3.87 ERA in 26 starts. In 1997 the offense was led by Luis Lopez, who put together one of the best individual years by a Sun ever. Lopez batted .358 with 11 home runs and 99 RBI's. These numbers would give him SAL MVP honors. The pitching staff was led by Clint Lawrence, who won a team-leading 13 games in 26 starts. One pitcher who had a bizarre season was starter Gary Glover. Glover posted a 3.73 ERA and threw a team leading 173.2 innings. He, along with John Bale, tied for the team lead in strikeouts with 155. Despite these advantages, his overall record was 6-17. Those 17 losses set a franchise record. The Suns finished in last place, 11 games behind first place Charleston (WV). In 1998 the offense got power from catcher-first basemen Bobby Cripps. Cripps hit 29 home runs and also led the Suns with 88 RBIs and threw out 47 percent of would be base stealers in 56 games behind the plate. Mike Young batted .282 with 16 home runs and 86 RBI's at second base. Two other future Major League All Stars on the Suns that year were Vernon Wells and César Izturis. Wells batted .285 with 11 home runs and 65 RBI's. Izturis meanwhile had a .262 average with a team leading 20 stolen bases. John Sneed would have one of the best seasons ever by a Suns pitcher, as he won a franchise record 16 games, while losing just 2, with a 2.56 ERA in 27 starts. He also collected 200 strikeouts in 161.1 innings pitched. Clayton Andrews returned from the 1997 squad and nearly matched Sneed's dominance. He went 10-7 with a 2.28 ERA and had 193 strikeouts in 162 innings pitched. The Suns closer was Jaron Seabury, who had a dominating 1.65 ERA in 45 games with 17 saves. The Suns won the first half division title and finished with the best record in the Northern Division. They made the playoffs and won in the first round, but did not advance to the championship because the league now had a three round playoff format featuring 8 out of 14 teams. In the second round, the Suns would lose to the eventual league champion Capital City Bombers. In 1999 Jay Gibbons was the best all-around hitter. In 71 games, Gibbons batted .305 with 16 home runs and 69 RBI's. Second basemen Jorge Nunez batted .268 with 14 home runs and 61 RBI's, while leading the team with 51 stolen bases. Outfielder Ryan Fleming hit an impressive .335 in 61 games. Tyler Thompson led the team with 17 homeruns and RBI's with 81. Pasqual Coco went 9-1 in 14 starts with a 2.21 ERA. Scott Cassidy would win a team leading 13 games in 27 starts in 170.2 innings. He struck out 178 batters, leading the team. The Suns bullpen got a strong season from closer Jarrod Kingrey. Kingrey had 27 saves and 69 strikeouts in 61 innings. The Suns made the playoffs by winning the first half division title and wound up with the best overall record in the SAL. They would be knocked out of the first round by their division rival, the Cape Fear Crocs. This was the last season that the SAL used a three division (North, Central, and South) format. The Suns had a losing season and did not make the playoffs in 2000. Reed Johnson hit .290 with 8 home runs and 70 RBIs in 95 games. Kevin Cash led the team in home runs with 10, while also contributing 27 RBIs in 59 games. He displayed great defense by throwing out 55 percent of potential base stealers. Shortstop Brandon Jackson led the team with a .312 batting average, while outfielder Shannon Carter stole a team leading 33 bases. Marcos Sandoval led the Suns with 163.2 innings pitched, while Travis Hubbel posted a 3.89 ERA in 19 starts. Matt Ford, a 19-year-old left-hander, went 5-3 with a 3.87 ERA in 18 games, 14 of which were starts. He struck out 86 batters in 83 innings with the team. Rob Hamman picked up 8 wins while pitching in 34 games, but only one of them was a start. The most unusual aspect of the season was the bench clearing brawl that occurred in July against the Columbus Red Stixx at Municipal Stadium. The Suns were losing when Reed Johnson was hit by a pitch that caused outfielder Auntwan Riggins to charge the pitcher from the dugout. The brawl led to so many ejections that Columbus was unable to field a full team and had to forfeit the game to the Suns. Officially, Hagerstown was declared the game's winner by a 9-1 score. 2001 brought on a lot of changes for the Hagerstown Suns. After eight seasons with the Toronto Blue Jays, the team switched its parent club to the San Francisco Giants. The team was also sold to Andy Rayburn. On the field, the Suns returned to their winning ways. The offense got power from Dan Trumble, who led the team with 26 home runs. Outfielder Jason Ellison put together a good season, as he batted .291 with a team leading 19 stolen bases in 130 games. Adam Shabala would post a solid .313 batting average in a span of 70 games. The pitching staff was the best that the Suns had since joining the South Atlantic League, as two pitchers won over 10 games. Boof Bonser tied the Suns' record for wins in a season with 16, while losing just 4 games. He also struck out 178 batters in 134 innings, earning him the South Atlantic League Pitcher of the Year. Another player with 10 plus wins was Jeff Clark. Clark would go 14-9 while posting a solid 3.65 Earned Run Average (ERA) in 27 games. The most impressive season for the Suns may have come out of the bullpen, as closer Jackson Markert put together a memorable year. Markert broke the Suns' save record by picking up 39 saves and posting a strong 2.82 ERA. His success was a big reason why the Suns advanced to the playoffs. After winning the Northern Division second half title, the Suns entered the playoffs, but come up short as Lexington swept them in two games. The Suns missed the playoffs in 2002, suffering a losing record. Tyler Von Schell led the Suns in home runs with 14. Julian Benavidez led the way in RBIs. Brandon Florence may have been the best all around hitter on the team with an batting average of .303, with 11 home runs and 63 RBIs in 109 games. On the pitching side, Anthony Pannone led the Suns with nine wins and led innings pitched with 168.2. Ryan Hannaman put together a nice season with a 2.80 ERA and 145 strikeouts in 131.2 innings. Suns' fans also saw a glimpse of what was to come with Francisco Liriano. Liriano would go 3-6, but had a 3.59 ERA and struck out 85 batters in 80 innings as an 18-year-old. The Suns finished 20.5 games back of the first place, and eventual league champions Hickory Crawdads. Mandalay Entertainment Group purchased the team from Andy Rayburn in 2002. While the team did not make the playoffs in 2003, they still managed to scrape together a winning season. The Suns' best power hitter in 2003 was Carlos Sosa, who led the team in both homeruns and RBI's with 10 and 63. Derin McMains hit a solid .289 in 54 games before he was promoted to High A San Jose. Brian Buscher would come to the Suns in the 2nd half and hit .275 in 54 games. The strength of the Suns in 2003 lied in their pitching staff, in which several pitchers had great seasons. Merkin Valdez went 9-5 with a 2.25 ERA in 26 starts. He also led the Suns in innings pitched with 156, and strikeouts with 166. Josh Habel led the team with 11 wins in 36 games, 16 of which were starts. Habel also managed to accumulate 127 strikeouts in 122 innings. Brian Stirm was also solid, as he went 8-5 with a 2.86 ERA in 17 games. Other noteworthy starters for the Suns in 2003 were Clay Hensley and Matt Cain. Hensley went 4-3 with 3.18 ERA in 12 starts before he was promoted to High A San Jose, but one start in particular was noteworthy. On May 3, 2003, Hensley threw the Suns’ only perfect game. He did this by retiring 21 consecutive batters in the second game of a double header against the Kannapolis Intimidators. Meanwhile, Matt Cain went 4-4 in 14 starts with the Suns, while posting a strong 2.55 ERA. He managed to strikeout 90 batters in just 74 innings. In the bullpen, Matt Palmer would have a great season as he went 5-0 with a 1.20 ERA and 25 saves. The Suns pitching staff in 2003 stands out among the best in franchise history. 2004 turned out to be one of the worst seasons for the Suns ever as they finished in last place in the South Atlantic League North Division, 34.5 games behind the eventual league champion Hickory Crawdads. In his short stay with the team, Nate Schierholtz proved to be the best hitter. He would bat .289 with 15 homeruns and 54 RBI's in just 59 games. Another productive hitter on the team that year was Travis Ishikawa. Ishikawa had exactly the same home run and RBI total as Schierholtz, with a .257 average in 97 games. Both players would be promoted to High A San Jose before the season's end. Designated hitter Jason Columbus led the team in RBI's with 87. The Suns' leader in wins was Juan Serrato, who compiled 8 wins in 26 games, 21 of which were starts. The Suns' best all around pitcher in 2004 was reliever Joe Bateman. Bateman went 7-5 with a 2.14 ERA in 36 games. He picked up 81 strikeouts in just 70 innings of work before he was promoted to AA Norwich. One pitcher of note in the Suns bullpen was Brian Wilson. Wilson's numbers in Hagerstown were not impressive, 2-5 with a 5.34 ERA in 23 games and 3 starts. However, Wilson's later major league performances earned him a spot in the Hagerstown Suns Hall of Fame. Hagerstown once again changed affiliates in 2005, a two-year stint with the New York Mets. Minor league baseball teams are known for their promotions, and the Suns had one consistent with the cold weather that Hagerstown has early in the baseball season. The Suns unveiled their "Eskimo Day" promotion including giving every fan a free ice cube and granting free admission to fans indigenous to Alaska, Canada or any place where Eskimos are part of the culture. There was also a special contest for fans at the ballpark: guessing how long it would take a bucket of ice to melt. On the field, the season began with seven game winning streak. On May 8, Hagerstown and Asheville combined for 35 runs in the Suns' 19–16 victory. Hagerstown broke a 16–16 tie with three runs in the 12th inning. The clubs set a South Atlantic League record with 20 extra-base hits, while the 41 hits–23 for Hagerstown—matched a league mark. Also in May, Hagerstown committed seven errors in a game against Delmarva. In June, the Suns qualified for the playoffs in dramatic fashion. Pitcher Gaby Hernandez's 115-pitch no-hitter in a 1–0 win over the West Virginia Power on June 19 set up a one-game playoff between the Suns and Lexington Legends on June 25 for the first-half crown. Both teams completed the first half regular schedule with 42–28 records. In the one game playoff, the Suns defeated the Legends, 9–4, with Hernandez again taking the mound and the win. The Suns slumped badly during the second half of the season, finishing last in the Northern Division. In September however, Hagerstown did manage to win the Northern Division by defeating the second half Northern Division champion Delmarva Shorebirds two games to one. The Suns were ultimately unsuccessful in their quest for the South Atlantic League championship, losing to the Kannapolis Intimidators three games to one. Overall, the Suns had a losing season in 2006, with a 58–82 record. The Suns' prowess in promotions was recognized with the award of the "Veeckie" Award from ESPN The Magazine for their "They even gave away the Kitchen Sink" kitchen sink giveaway promotion. The award, named after famous baseball promoter Bill Veeck, is given annually by the magazine to recognize the industry's top promotions each season. The Suns have received a "Veeckie" in three of the past five years. Previous winning promotions included the Guinness World Record for the Youngest Broadcaster ever (2002) and the Free Funeral Giveaway (2003), which was also selected as the Promotion of the Year by ESPN the Magazine and was named as one of the top five baseball promotions of all time by Sports Illustrated. The most noteworthy event on the field was an 8–7 loss at Lakewood, a 22-inning marathon that took nearly a week and a half to complete. The game began on April 26, but was called in the 17th due to league rules that state an inning cannot be started after 12:30 a.m. It was finally completed on May 6, taking 7 hours and 47 minutes. The 22 innings bested the previous 21 inning South Atlantic League record. In 2007 the Suns became a member of the Washington Nationals farm system. The Suns won few games as the talent-poor Nationals organization rapidly promoted Suns players with potential. Of four players selected for the South Atlantic League (SAL) All-Star Game (Leonard Davis, Cory VanAllen, Mike Daniel and Chris Marrero), none actually played because they had been promoted to the Advanced-A Potomac Nationals by the time the actual game occurred. In the promotions area, romance novelist Nora Roberts was honored with a Nora Roberts bobblehead on July 6. Roberts is a resident of Washington County, Maryland, where Hagerstown is located and has been honored by the Suns several times. There were two significant milestones for the Suns organization in 2008. The first occurred on May 30, when the number 50 was retired in honor of in honor of SAL President Emeritus John Henry Moss. Along with the number-retiring ceremony, the Suns honored Moss with a bronze plaque placed in Municipal Stadium, highlighting his 50 years of service to the SAL. 50 is only the third number retired by the Suns, the other two being 42 for Jackie Robinson and 24 for Willie Mays, who played his first minor league game in Hagerstown. The second milestone occurred on November 13 when Hagerstown native and Suns Director of Business Operations Carol Gehr was selected as the Rawlings Woman Executive of the Year. The Rawlings Award honors an outstanding woman executive from either Major League or Minor League Baseball. Gehr was with the club in many capacities over a 25-year career spanning six different ownership groups. A bright spot to an otherwise dismal season in 2009 was the performance of catcher Derek Norris. He led the SAL with a .413 on-base percentage and 90 walks while being named the SAL's Most Outstanding Major League Prospect. He also finished among the top five in the SAL in homers (23), extra-base hits (53), RBIs (84), runs (78) and slugging percentage (.513). He was selected as the designated hitter to the Class A Topps/MiLB All-Star Team, which includes both Advanced-A and A level leagues. On July 15, 2010, Hagerstown players Steve Souza and J.R. Higley were suspended for using performance-enhancing drugs. Each received 50-game suspensions after testing positive for methylphenidate and ritalinic acid, performance-enhancing substances in violation of the Minor League Drug Prevention and Treatment Program. Souza was a 2010 SAL All-Star. On the field, Eury Perez's four stolen bases in seven innings against Delmarva on August 19 was nominated as one of the Class A games of the year for 2010. Finally, a new ownership group with local ties, Hagerstown Baseball, LLC, purchased the Suns in September 2010 for a reported 6.7 million dollars from Mandalay Sports Entertainment. Mandalay used proceeds of the sale to purchase the Oklahoma City Redhawks AAA franchise. The new ownership group is led by Florida businessman and general manager of Polo Trace Country Club Bruce Quinn; Tony Dahbura, corporate vice president of Hub Labels in Hagerstown; Dr. Mitesh Kothari of Hagerstown; and Quinn's sister, Sheri. Bryce Harper playing for the South Atlantic League Suns in 2011. Two number one draft picks dominated the news for the Hagerstown Suns in 2011. Bryce Harper, the overall first pick in the 2010 Major League Baseball Rule 4 first year player draft, started the season with the Suns. Before he moved to the Double A Harrisburg Senators in mid-season, he played well enough to be selected for the SAL All-Star Game. Later in the season, the 2009 overall first pick, Stephen Strasburg, pitched at Hagerstown on a rehabilitation assignment. 2012 had a tragic beginning when Mitchell Akers, an 18-year-old high school senior who was working with the team, died on April 11. Sources within the league said he fell off the back of a John Deere Gator at Municipal Stadium and later died from his injuries. On the field, 2012 proved to be a banner year for Suns third baseman Matt Skole. He led the SAL in home runs (27), bases on balls (94), on base percentage (.438) and slugging percentage (.574). In addition, Skole was also elected as the Nationals Minor League Player of the Year and the SAL Player of the Year. The Suns made the divisional playoffs; however, they were swept by the defending SAL champion Greensboro Grasshoppers two games to none. In 2013, Hagerstown led the SAL in the offensive categories of runs scored (692), runs batted in (608) and on base percentage (.341). The Suns had several players named to the SAL Northern Division All-Star roster (Pedro Severino, Tony Renda, Brandon Miller, Dixon Anderson, Robert Benincasa, and Pedro Encarnacion), as well as coach Franklin Bravo and manager Tripp Keister. The Suns again qualified for the divisional playoffs as the SAL first half Northern Division champions. Improving over 2012, the Suns won the SAL Northern Division championship, defeating the West Virginia Power two games to one. However, in the league championship, the Suns fell to the Savannah Sand Gnats three games to one. Tony Renda was selected as the initial recipient of the Bob Boone award, granted to the Washington Nationals' minor league player "who best demonstrates the professionalism, leadership, loyalty, passion, selflessness, durability, determination and work ethic required to play the game the Washington Nationals way." Hagerstown began the 2014 season with a record of 31 wins and 8 losses, which was the highest winning percentage in the minor leagues. However, the team then went 13–18, finishing with a first half season record of 44–26. The Greensboro Grasshoppers shared the 44–26 record. However, because Greensboro defeated Hagerstown in three out of four games during the first half season, Greensboro was awarded the SAL Northern Division first half title. The second half season proved to be a repeat of the first half season. Once again, Greensboro and Hagerstown finished in a tie for first, this time with identical 43-27 records. The tie breaker system worked in the Suns' favor this time, because Hagerstown won five of seven games against Greensboro in the second half. Shining brightest among the Suns' everyday players in 2014 was SAL Most Valuable Player Wilmer Difo. The middle infielder led the SAL with 176 hits, placed second in the SAL with 49 stolen bases and was fourth in the SAL with 90 runs batted in. In addition, Difo was the recipient of the 2014 Bob Boone Award. Fellow SAL End of Season All-Star Rafael Bautista led the league with 69 steals. The pitching was also a team strength, led by Lucas Giolito who was honored as the league's top pitcher and top major league prospect. The Suns improved their playoff performance in 2014 over 2013, but it was still not enough to claim the John Henry Moss Cup, symbolic of the SAL championship. The Suns swept the Northern Division championship series two games to none over the Greensboro Grasshoppers, but lost the SAL championship series three games to two to the Asheville Tourists. The most unusual game of 2015 occurred on April 15 when the Suns won a 1-0 game against the West Virginia Power despite having no hits. The lone run in the game crossed the plate in the top of the first inning. The Suns loaded the bases after being issued two walks and one batter getting hit. With two outs, left fielder Jeff Gardner drew a walk to force home right fielder Narciso Mesa from third to score the only run of the game. This was the first Minor League no-hitter resulting in defeat in a full-season league since 2008. Overall, 2015 was a disappointing season for the Suns. They finished with an overall losing record, missing the playoffs for the first time since 2011. However, 2015 was good for first baseman Jose Marmolejos. He led the SAL in hits, doubles, runs batted in, and total bases in addition to being selected for the SAL End of Season All-Star Team. 2016 saw a return to postseason play for Hagerstown as the Suns won the first half Northern Division title by one half game over the Delmarva Shorebirds. In the Northern Division championship the Suns were swept 2-0 by the Lakewood Blueclaws. The Suns SAL End of Season All-Stars were Kevin Gutierrez (third base), Ian Sagdall (utility infielder) and Patrick Anderson (manager). In addition, Brandon Groomes was selected as the SAL Bat Person of the Year for the second year in a row. Discussions concerning the relocation of the Hagerstown Suns to Virginia began circulating in 2012. That year a letter from the Washington Nationals was sent to Suns majority owner Bruce Quinn stating that Hagerstown's 80-year-old Municipal Stadium was no longer up to Major League Baseball standards. This prompted the owner to begin looking for other options. Initially, Quinn began discussions with the Winchester Economic Development Authority to relocate the team to Winchester, Virginia, to begin play in 2014. The negotiations failed in part because of the refusal of the community to provide public funding for a new stadium. Not coincidentally, Suns fan attendance at home games fell to its lowest point in Suns history to that point, despite the team qualifying for the playoffs for the first time in seven years. In October 2013, the Suns formally applied to Minor League Baseball to relocate to Fredericksburg, Virginia for the 2015 season. The Suns and their partners, New Jersey-based Diamond Nation and a Fredericksburg-area automotive company, agreed to purchase a 38-acre stadium site inside the Fredericksburg city limits. The facility was initially planned to be ready for the start of the 2015 season at a cost of $29 million. However, in November 2014 Diamond Nation announced that it was terminating its option to purchase the Suns. A contributing factor in this decision was the increase in estimated cost to build the facility to $53 million. In 2015, Quinn entered into negotiations with Spotsylvania County, Virginia officials to move the Suns. Quinn proposed a 5,000-seat, $30 million stadium, with $28 million borrowed by the county and $2 million paid by the Suns, who would pay a rent of $175,000 annually. Minor league baseball had given Quinn until July 31 to complete the deal. With the deadline passed, the Suns will be in Hagerstown for the foreseeable future. The Hagerstown Suns Municipal Stadium boasts the honor of being one of the three oldest Minor League baseball stadiums in the country. From 1915–1929, Hagerstown's minor league teams played at Willow Lane Park, where Bester Elementary School is now located. When the city made the decision to build the school, the need for a new stadium was urgent. The Field and Athletic Association was created to find land and build a stadium. The organization struck a deal with the city, leasing a tract of land for 99 years at $1 per year. Municipal Stadium was quickly built on the land in a mere six weeks, just in time for the first home game on May 8, 1930. Since then, the stadium has undergone two major renovations. The first took place in 1981, when Minor League baseball returned to Hagerstown after a 26-year absence from the city. About $546,000 was put into the stadium overhaul, which included the installation of a public address system, stadium lights, underground electricity, and new seats and bleachers. In 1995, $500,000 worth of improvements to the stadium were made, such as the installation of new seats, and upgrading the VIP section to include cup holders. The Sunset Grille and bar area was also added at this time. The playing surface was renovated following the 2010 season. In addition, seating improvements and the installation of a state-of-the-art video board enhanced fans' experiences in 2011. In April 2014, Hagerstown and the Suns agreed to a two-season lease extension on Municipal Stadium for 2015 and 2016 which can be voided by mutual agreement. The Suns have an in-state rivalry with the Delmarva Shorebirds, an affiliate of the Baltimore Orioles. This particular rivalry is also fueled by the regional rivalry between the two parent clubs. Hagerstown Suns home games are broadcast online via streaming audio on the team's website. The voice of the Hagerstown Suns for home games in 2016 is Jordan Nicewarner. Away games are handled through the other team's media outlet. ↑ "30 Teams in 30 Days 1989". ↑ "30 Teams in 30 Days 1988". Hagerstown Suns Fan Club. Retrieved August 25, 2012. ↑ Encyclopedia of Minor League Baseball. Baseball America. 2007. p. 170. ↑ "Hagerstown Suns History". milb.com. Retrieved February 24, 2011. ↑ "Hagerstown Formally Voted Berth in Inter-State (Class B) League". The Morning Herald. Hagerstown, Maryland. February 7, 1941. ↑ "1981 Hagerstown Suns Statistics". Baseball-Reference.com. Retrieved 14 November 2014. ↑ Spadden, Zach. "Year of the Suns". Hagerstown Magazine: The Best of Life in Washington County and Beyond. RidgeRunner Publishing, LLC. Retrieved November 11, 2014. 1 2 3 "2016 Carolina League Media Guide and Record Book". ↑ "Hagerstown Suns 35: Honoring Your Tradition". Retrieved November 11, 2014. ↑ Encyclopedia of Minor League Baseball. Baseball America. 2007. p. 620. ↑ "1988 Carolina League Review". The Baseball Cube. Retrieved 13 November 2014. ↑ Wulf, Steve (August 15, 1983). "Biggest Bird In The Bushes". Sports Illustrated. Retrieved May 30, 2014. ↑ Spedden, Zach (September 5, 2010). "30 Teams in 30 Days: 1986". Hagerstown Suns Fan Club. Retrieved November 13, 2014. ↑ "30 Teams in 30 Days 1989". Hagerstown Suns Fan Club. Retrieved September 14, 2014. ↑ Goldberg, Stan (June 5, 2011). "History Lesson: Memories of Bush's visit to Grove Stadium". Frederick News-Post. Frederick, Maryland. Retrieved September 13, 2014. ↑ Morgan, Jon (June 24, 1992). "Bowie, Wilmington to get teams in minors shuffle". The Baltimore Sun. Retrieved May 4, 2014. ↑ Baker, Kent (September 16, 1992). "Single-A team moves to Hagerstown; Blue Jays affiliate fills city's void". The Baltimore Sun. Retrieved May 4, 2014. ↑ Encyclopedia of Minor League Baseball. Baseball America. 2007. p. 650. ↑ Encyclopedia of Minor League Baseball. Baseball America. 2007. p. 656. ↑ Spedden, Zach (September 15, 2010). "30 Teams in 30 Days: 1995". Hagerstown Suns Fan Club. Retrieved November 11, 2014. ↑ Spedden, Zach (September 16, 2010). "30 Teams in 30 Days: 1996". Hagerstown Suns Fan Club. Retrieved November 11, 2014. ↑ Encyclopedia of Minor League Baseball. Baseball America. 2007. p. 673. ↑ Spedden, Zach (September 18, 2010). "30 Teams in 30 Days: 1998". Hagerstown Suns Fan Club. Retrieved November 11, 2014. ↑ Spedden, Zach (September 19, 2010). "30 Teams in 30 Days: 1999". Hagerstown Suns Fan Club. Retrieved November 11, 2014. ↑ Spedden, Zach (September 20, 2010). "30 Teams in 30 Days: 1999". Hagerstown Suns Fan Club. Retrieved November 11, 2014. ↑ Greene, Julie (January 13, 2001). "New Suns owner has passion for baseball". The Herald-Mail. Hagerstown, Maryland. Retrieved September 25, 2014. ↑ Spedden, Zach (September 22, 2010). "30 Teams in 30 Days: 1981". Hagerstown Suns Fan Club. Retrieved September 25, 2014. ↑ Spedden, Zach (September 22, 2010). "30 Teams in 30 Days: 1982". Hagerstown Suns Fan Club. Retrieved September 25, 2014. ↑ Butki, Scott (December 6, 2002). "New Suns owner has passion for baseball". The Herald-Mail. Hagerstown, Maryland. Retrieved September 26, 2014. ↑ "Hensley Achieves Perfection". Baseball America. September 23, 2010. Retrieved September 25, 2014. ↑ Spedden, Zach (September 22, 2010). "30 Teams in 30 Days: 2003". Hagerstown Suns Fan Club. Retrieved September 25, 2014. ↑ Spedden, Zach (September 22, 2010). "30 Teams in 30 Days: 2004". Hagerstown Suns Fan Club. Retrieved September 25, 2014. ↑ Justic, Eric (September 28, 2005). "Flashback: April in the South Atlantic League". mlb.com. Retrieved May 6, 2014. ↑ Justic, Eric (September 29, 2005). "Flashback: May in the South Atlantic League". mlb.com. Retrieved May 6, 2014. ↑ "South Atlantic League Notebook for June 22, 2005". ↑ "Suns cap season with ESPN 'Veeckie' award". milb.com. September 19, 2006. Retrieved May 9, 2014. ↑ Storm, Stephanie (May 8, 2006). "South Atlantic League Notebook for the week ending May 6". milb.com. Retrieved May 9, 2014. ↑ "Davis joins Sally All-Stars". milb.com. June 26, 2007. Retrieved May 17, 2014. ↑ "Hagerstown celebrates Nora Roberts". milb.com. May 26, 2007. Retrieved May 17, 2014. ↑ "Suns release 2007 promotional schedule". milb.com. April 2, 2007. Retrieved May 17, 2014. ↑ "Suns to honor John Henry Moss". milb.com. May 29, 2008. Retrieved May 17, 2014. ↑ "Suns' Gehr is top Woman Executive of 2008". milb.com. November 13, 2008. Retrieved May 17, 2014. ↑ "Topps, MiLB name Class A All-Stars". milb.com. November 25, 2009. Retrieved May 18, 2014. ↑ "All-Star Souza banned for 50 games". milb.com. July 15, 2010. Retrieved May 18, 2014. ↑ "Cast your ballot for MiLB's Top Games". milb.com. October 25, 2010. Retrieved May 18, 2014. ↑ "Hagerstown Suns baseball team reportedly sold to investor group". Cumberland Times-News. Cumberland, Maryland. September 18, 2010. Retrieved May 18, 2014. ↑ Driver, David (June 21, 2011). "Duvall leads way at Sally All-Star Game". milb.com. Retrieved May 18, 2014. ↑ Marshall, Ashley (August 23, 2011). "Lamb outduels Strasburg for Hickory". milb.com. Retrieved May 18, 2014. ↑ Byler, Billy (April 14, 2012). "Hagerstown Suns worker dies in accident". The Augusta Chronicle. Augusta, Georgia. Retrieved May 22, 2014. ↑ "South Atlantic League 2012 Batting Leaders". ↑ Wagner, James (September 7, 2012). "Nationals minor leaguers of the year, Matt Skole and Nathan Karns, honored". The Washington Post. Retrieved May 19, 2014. ↑ "South Atlantic League 2012 Playoffs". Retrieved May 20, 2014. ↑ "South Atlantic League 2013 Team Batting". ↑ "It's Power vs. Contact for SAL All-Stars". ↑ "Nationals name OF Billy Burns & RHP Taylor Jordan Minor League Player and Pitcher of the Year". ↑ Emery, Mark (September 25, 2014). "Nats' top prospect Giolito visits Washington". milb.com. Retrieved September 27, 2014. ↑ Ballew, Bill (September 2, 2014). "South Atlantic League Playoff Preview". Minor League Baseball. Retrieved September 2, 2014. ↑ "2014 Playoffs". Minor League Baseball. Retrieved September 14, 2014. ↑ Pearlstein, Eli (April 15, 2015). "Suns split wild series with West Virginia". milb.com. Retrieved September 6, 2015. ↑ Baggerman, Mike (April 15, 2015). "Say what?: Power no-hit Suns and lose". milb.com. Retrieved September 6, 2015. ↑ Dykstra, Sam (September 1, 2015). "Moncada, Guillorme among SAL All-Stars". milb.com. Retrieved September 6, 2015. ↑ Wild, Danny (August 30, 2016). "Mundell, Keller take home top SAL honors". milb.com. Retrieved October 27, 2016. ↑ "SAL announces 2016 award winners". Minor League Baseball. Retrieved October 28, 2016. ↑ Lovelace, C.J. (August 9, 2012). "Looking doubtful Suns will move to Winchester". The Herald-Mail. Hagerstown, Maryland. Retrieved April 27, 2014. ↑ "South Atlantic League Attendance". MiLB.com. Minor League Baseball. ↑ Freehling, Bill (October 1, 2013). "Hagerstown Suns apply to relocate to Fredericksburg". Business Insider. Fredericksburg.com. Retrieved October 23, 2013. ↑ Shok, Holly (November 6, 2013). "Hagerstown City Council agrees to pay for upgrades to Municipal Stadium". The Herald-Mail. Hagerstown, Maryland. Retrieved April 6, 2014. ↑ Freehling, Bill (October 21, 2013). "Slavery museum gives up city land; stadium backers reach deal on Celebrate Virginia site". The News Desk. Fredericksburg.com. Retrieved October 23, 2013. ↑ Freehling, Bill (January 3, 2014). "Stadium groundbreaking planned for spring". The News Desk. Fredericksburg.com. Retrieved January 5, 2014. 1 2 Shok, Holly (April 23, 2014). "Hagerstown Suns agree to city's terms on two-year lease extension". The Herald-Mail. Hagerstown, Maryland. Retrieved April 26, 2014. ↑ Gould, Pamela (November 25, 2014). "Baseball deal out in city". Fredericksburg.com. Fredericksburg Free Lance-Star. Retrieved January 12, 2015. ↑ Gould, Pamela (December 2, 2014). "Fredericksburg moving on tax sale of stadium site". Fredericksburg.com. Fredericksburg Free Lance-Star. Retrieved January 17, 2015. ↑ Lovelace, C.J. (August 11, 2015). "Hagerstown Suns strike out again in proposed Virginia move". The Herald-Mail. Hagerstown, Maryland. Retrieved September 7, 2015. ↑ "History of Municipal Stadium". ↑ Pearlstein, Eli (April 4, 2013). "Suns lose opener to Delmarva 4-3". milb.com. Retrieved September 6, 2015.
2019-04-25T22:55:01Z
https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/Hagerstown_Suns.html
This article is about Diddy Kong's appearance in Super Smash Bros. Brawl. For other uses, see Diddy Kong. Diddy Kong (ディディーコング, Diddy Kong), commonly known as just Diddy, is a character for Super Smash Bros. Brawl. He is unique, distinct among the cast for his charm and gaiety. Unlike in most Donkey Kong games and Mario spin-offs, where Diddy Kong has a cartoonish voice, Brawl has him using a high-pitched chimpanzee-like voice. He is also the first playable character to be introduced from the Donkey Kong universe since the original game. He currently ranks 4th on the tier list (the highest-ranked of any Mario character including sub-series characters). This is mainly because of his ability to throw Banana Peels that give him great control of the ground and great setup and damage-racking potential (by attacking opponents that have slipped on them), as well as providing good defense, making them one of the best projectiles in the game, giving him a very strong control of the ground. Additionally, he has quick attack speed, good mobility, a solid down aerial meteor smash, good grab range, and powerful throws, which aid in his ability to control the stage. However, his primary recovery move, Rocketbarrel Boost, travels in a predictable fashion, is easily edgehogged, and can be stopped by stage lips. Additionally, his few KO moves, while fast and reliable when fresh, stale quickly and are largely dependent on his Banana Peels for a setup. Diddy Kong has excellent matchups, having only three slightly unfavorable, and has very strong tournament results. Diddy Kong is a quick, middleweight character. He is capable of wall clinging and crawling. Many of his attacks have good speed and have decent power to back them. His KO power is low due to his few KO moves and a general weakness in his smashes, which stale very quickly if he uses them too much for racking damage, which forces a reliance on meteor smashes for early KOs. Diddy also has two projectiles: his Peanut Popgun and Banana Peels. Peanut Popgun, while not particularly strong, is a decent mid-range move for racking up easy damage. In comparison, his Banana Peels, which have the property of tripping opponents, form a much more integral part of his metagame, as they combo well into his other moves, and allow him to setup KOs. The glide toss option provided by the Banana Peels is invaluable, as it allows Diddy to rapidly approach and retreat. If an opponent is tripped by a thrown Banana Peel, Diddy can follow up with another glide tossed Banana to continue the combo, and end with a down or forward smash for a KO. In conjunction with his quick dash attack, large grab range, and powerful throws, Bananas provide Diddy with excellent ground options and stage control. Banana Peels can also help him escape certain chaingrabs, such as King Dedede's, and certain grab releases. However, as Banana Peels are items, they can be used against Diddy even by opponents without reflectors. Diddy's other special moves Monkey Flip and Rocketbarrel Boost contributes to his above average recovery. Besides being a useful move to rack up damage, Monkey Flip can be used as a meteor smash if Diddy uses its grab option in midair (it can also be used as a sacrificial KO, but this is not useful because the meteor smash is much more reliable and safer); it also can be used to gain horizontal distance in tandem with Rocketbarrel Boost to make up for Diddy's poor air speed. Diddy will not be able to use Rocketbarrel Boost if he uses Monkey Flip's attack option in midair, but he will retain his midair jump. The former move provides great vertical distance if sufficiently charged, but it leaves Diddy vulnerable while charging, and he needs to charge to move left or right at all. Potential edgeguarders will still have to watch out for the meteor hitbox on the bottom of Rocketbarrel Boost, as well as the rocketbarrels themselves, which function as powerful explosive projectiles if the attack is interrupted after releasing the charge. Diddy's barrel jump can also improve his recovery, acting like a second midair jump while Rocketbarrel Boost can still be used. Diddy possesses a decent aerial game. His forward aerial has above average knockback and surprising range, making it a viable KO move and useful for edgeguarding, though it has the most landing lag out of all of his aerials. His back aerial, up aerial, and neutral aerial are all relatively fast, with the former being another decent option for edgeguarding and a very quick way to grab bananas in midair, though the latter is rarely used in competitive play. His down aerial is a solid meteor smash (similar to Wolf's down aerial) with some startup lag. In summary, Diddy Kong is a fast, medium-weight character with agile moves that combo well from his versatile Banana Peels. His KO power is poor, forcing a reliance on racking up a very large amount damage in order to KO, and he generally relies on his bananas to set up KOs. On counterpick stages, his Banana Peels are not as useful as on neutral stages, making it more difficult for a Diddy player to win a set if they do not win the first match. For a more detailed information regarding Diddy Kong's moveset and attack hitboxes, see this page. 3% Diddy Kong slaps forward twice, turns around to quickly kick the foe, and proceeds to repeatedly whip them with his tail. The first hit can set-up a grab if jab-cancelled or even a buffered down smash. 11% (fists), 9% (arms), 8% (body) Diddy Kong leans to the side and thrusts both of his arms forward in a double punch. This attack can be angled upwards or downwards. When angled up, it can KO at 161% from the center of Final Destination. 7% Diddy Kong swats in the air above him with a slap. This move can be used to juggle at low percents and can KO at 159%. 7% Diddy Kong, claps forward while crouching. Extremely useful for racking up damage at low percentages. 3% (hit 1), 2% (hit 2), 4% (hit 3) Diddy Kong performs a cartwheel from Donkey Kong Country. The first hit of the move spikes opponents, making it easier to land all three hits. 5% (hit 1), 13% (hit 2) Diddy Kong spins and punches forward, followed by a second punch. The first hit deals no knockback, which makes it easier to land the second hit. The second hit deals shield damage. KOs at 122% when uncharged and 79% when fully charged. 5% (hits 1-2), 6% (hit 3) Diddy Kong hops a little and does a sort of cartwheel, hitting three times with extremely low knockback (weakest up smash in the game in terms of knockback). Fills in combos, can rack up damage easily. 16% (front), 12% (back) Diddy Kong performs a sweeping kick. It has less knockback than his forward smash, but it's still his most reliable smash attack. KOs at 126% when uncharged and 85% when fully charged. 6% Diddy Kong does an aerial cartwheel similar to his dash attack. Can KO at around 170% if used near the upper blast line. 14% (clean), 11% (late) Diddy Kong kicks both feet forward while spinning, similar to Mario and Luigi's old forward aerial in Super Smash Bros.. KOs Mario at 142% from the center of Final Destination. 9% Diddy Kong thrusts his leg backward and spins it behind him. Good knockback, though it won't gain KO power until past 170%. 11% Diddy Kong does an overhead flip kick. Fairly fast with decent knockback, and it can KO at 162%. 12% Diddy Kong swings both arms downward in a double axe-handle punch. A strong meteor smash. — Diddy Kong grabs his opponent with both of his hands. 2% Diddy Kong headbutts his target, angled from the side of his body. 11% Diddy Kong tosses his opponent forwards. The throw is based on Diddy Kong's barrel toss animation from "Donkey Kong Country". 10% Diddy Kong tosses his opponent backward, very similar to his f-throw in that it is useful for getting opponents offstage. 4% (hit 1), 5% (throw) Diddy Kong throws his opponent up and handstand kicks them. 9% Diddy Kong performs a leapfrog-like manoeuvre and throws the opponent underneath him. Has fair backwards knockback. Has little utility and almost no follow-ups available. 6% Diddy Kong gets up and slaps both sides. 6% Diddy Kong gets up and kicks both sides. 5% Diddy Kong gets up and kicks both sides. 8% (tail base), 6% (tail tip) Diddy Kong quickly gets up and does a spinning tail slap. 10% Diddy Kong slowly gets up and sticks his left foot out. Peanut Popgun 3-18% Diddy Kong pulls out his peanut popgun and fires a peanut. Can be charged, but if charged for too long the popgun will explode, and will stun Diddy Kong for a second. Monkey Flip 14% (kick hip), 12% (kick knee), 10% (kick foot), 5% (grab attack hit 1), 5% (grab attack hit 2), 5% (jump attack hit 1), 5% (jump attack hit 2), 2% (release) Diddy Kong performs a sideways hop that has the potential to launch Diddy onto an opponent's face if timed correctly. Can perform a flying kick with another button press. Can also be used to gain some extra recovery distance. Rocketbarrel Boost 10% (launch clean), 8% (launch late), 1-3% (rocketbarrels), 18% (rocketbarrels explosion) Diddy Kong charges his rocketbarrels from Donkey Kong 64 in a powerful attack. Can potentially fly very far and very fast, but hitting a surface will make Diddy Kong lose his rocketbarrels and will fall helplessly. Diddy Kong will take 5% damage for hitting a surface. Banana Peel 4-6% (banana) Diddy Kong tosses a Banana Peel into the air to have it fall onto the ground. Opponents who touch the peel will slip and trip. Up to two banana peels can be thrown at a time. Rocketbarrel Barrage 8% (peanuts), 15% (peanuts explosion), 18% (contact), 20% (ending explosion) Diddy Kong flies around on his rocketbarrels, shooting peanuts everywhere. Puts Diddy Kong into a helpless state when ended in the air. Breaks out of a DK Barrel and claps his hands above him. Up taunt: Throws his hat into the air, which lands on his head. This is a reference to his from Donkey Kong Country, after he defeats a boss or wins in a Bonus Level. Side taunt: Does a playful fighter's stance and cackles threateningly showing his teeth. Down taunt: Claps his hands four times, changing feet as he does so. Scratches his rump and shakes his fur. Taps the ground and makes a short giggle. A peaceful flourish originating from Donkey Kong Country that played whenever a Kong defeated a boss or completed a Bonus Level. Up: Spins with his Rocket Barrels, then faces the screen, dancing with his hands on his head and chin. Left: Shoots the air with his Peanut Popguns, rolls towards the camera, and shoots at the camera. Right: Does a small dance, then holds still in a breakdance-like pose, clapping his feet together. Diddy Kong has very strong matchups against the entire cast. According to the SmashBoards Matchup Chart, he has the seventh higest unweighted and weighted rank. He is soft countered by three characters, has 6 even matchups, soft counters 15 characters, counters 9, and hard counters 2. Diddy's bananas let him dominate the neutral game, and allow him to rack up damage very quickly (because the bananas do 4% damage every time they are thrown and set up into many very damaging moves). His banana peels shut down ground based characters that lack the tools to fight the bananas, such as Pikachu and King Dedede. He has has powerful aerials that give him some air prowess and he is able to beat characters like Lucario this way. Diddy Kong has trouble from opposing campers, like Snake and Falco, as their grenades and lasers respectively shut down his neutral game. ADHD - One of the most nationally dominant players since Brawl's inception, famed as one of Mew2King and ZeRo's most difficult opponents. cyve - The best Diddy main and one of the best players in Europe. Felix - Although he rarely traveled, he became known for his 3rd place finish at MLG Raleigh 2010. Gnes - A nationally dominant player in his prime, won the largest-ever Brawl prize check and the largest in the entire Smash series at the time at MLG Dallas 2010 ($12,500). Luigi player - A top Diddy player in Europe. Nagahari - One of the best Diddy players in Japan. NinjaLink - Famed for being the first player to defeat Mew2King in a tournament set. Suinoko - One of the best Diddy players in Japan. Zinoto - A top Midwestern Diddy player with a 5th place finish at SKTAR 2, famed for his usage of banana infinites. Diddy Kong was initially a high tier character, ranked 11th on the first tier list (September 2008). However, Diddy Kong players such as NinjaLink and ADHD showed how powerful his Banana Peels were, utilizing them to create damage-racking combos, defense, and stage control, bringing Diddy Kong into the top tiers, with him rising to 7th on the second tier list (January 2009), 5th on the third (June 2009), then 3rd on the fourth and fifth lists before surpassing long-time #2 character Snake by the sixth tier list (July 2011). Though Olimar and the Ice Climbers have since surpassed him, he still remains at 4th place on the eighth (current) tier list, as of April 2013. When Donkey Kong has three Bullet Bills fired at him by the vehicle escaping with his banana hoard, Diddy Kong leaps from behind Donkey Kong and unleashes his Peanut Popguns onto the Bullet Bills, destroying them. He then joins Donkey Kong in pursuit of their stolen bananas. At one point, after getting their bananas, they encounter Bowser, who aims the Dark Cannon at the two. Donkey Kong, realizing what is about to happen, then Giant Punches Diddy Kong, sending him flying away and star KO'd (but he didn't turn into a trophy as Mario and Luigi did). Donkey Kong is shot instead and captured. Then, Diddy Kong comes out of a forest into The Lake. When he gets to the lake where a crashed Arwing is seen, Rayquaza comes out of the water and grabs Diddy Kong. Then Fox jumps out of the Arwing which is now on fire due to an attack from Rayquaza. Fox uses his Fox Illusion and Reflector to send Rayquaza back into the lake and save Diddy Kong. Fox then makes a hand signal for Diddy to come with him to fight Rayquaza until it faints. After Rayquaza's defeat, Fox begins to leave, but Diddy drags him along to help rescue DK. They battle a Shadow bug clone of Bowser, but upon defeating it, the real Bowser attacks them and Fox flees, dragging Diddy to safety. Diddy Kong in The Subspace Emissary. Later, Fox and Diddy get ambushed by Bowser again, who fires a shot at both of them from his Dark Cannon. Diddy is hit and cloned by Shadow bugs, while Fox dodges the shot. Falco arrives just in time and destroys the Dark Cannon, but Bowser gets away in his Koopa Clown Car while the Shadow bug Diddy grows several times its normal size. Fox revives Diddy, who is shocked at what has happened. Diddy Kong and the two Star Fox pilots then fight the Giant Shadow bug Diddy Kong Clone. After the fight, Diddy drags Falco along with him and Fox as they continue through the jungle. Eventually they see Donkey Kong's trophy on a ship in chains. Diddy is mad at this as he, Fox and Falco board the Great Fox. After, Diddy Kong is ejected out of Falco's Arwing and shoots peanuts at the Primids on the skiff that has DK's trophy on it. He lands on the skiff while Captain Falcon and Olimar jump to the aid of the little chimp. They revive Donkey, then the Kongs and Captains fight a horde of Primids on the little platform. After they have defeated them, Diddy and Donkey Kong do a little dance as Captain Falcon and Olimar watch. As Falco gives a thumbs-up to Diddy, Diddy waves "thank-you". The four then head into the Subspace Bomb Factory. Diddy, Olimar, Donkey Kong, and Captain Falcon then attempt to infiltrate the Bomb Factory where they fight their way through various armies of Primids, R.O.B. units, and other enemies, they reach where all the bombs are and where the Ancient Minister is standing in melancholy and coincidentally meeting Samus & Pikachu there, where they earlier entered the Bomb Factory another way. After meeting up with Samus and Pikachu, Diddy Kong tries to stop the R.O.B. Squad members who are setting off Subspace Bombs. He shrieks at R.O.B. to do something, but R.O.B. just slumps in sadness. Captain Falcon calls his Falcon Flyer to escape the doomed factory. They all pile into the ship while Meta Ridley appears. Diddy can be chosen to fight this boss. After Meta Ridley is defeated, Diddy helps the heroes as the continue their journey into Subspace. At the entrance to Subspace all the characters (except Wario, King Dedede, Bowser, Luigi, Ness, Ganondorf, Sonic and, to a lesser extent, Wolf, Toon Link and Jigglypuff) are all preparing to invade the subspace. After Ganondorf and Master Hand are defeated by Tabuu, Diddy and the rest of the heroes catch a glimpse of the evil power among them. In a single blow Tabuu defeats all of the characters and turned them into trophies. He is later revived by Kirby, Ness, King Dedede and Luigi and joins them to defeat Tabuu, with help from Sonic. After Tabuu's defeat, the World Of Trophies returns to its original place (except for The Isle Of The Ancients, the huge Subspace explosion combined by the huge number of Subspace Bombs has taken it beyond repair). These stickers can either only be used by Diddy, or by a select few who include him. Event 7: Diddy Kong Panic: The player controls Donkey Kong and must defeat 15 tiny Diddy Kongs on Mario Circuit. Event 9: The Monster Beneath the Earth: Ike must defeat two Diddy Kongs before the reaching the underground section of Castle Siege. Failing to do so makes the player also face a giant Donkey Kong. Event 20: All-Star Battle x1: Diddy Kong is one of the eight opponents fought in this event along with Wario, Meta Knight, Pit, Zero Suit Samus, Olimar, Lucas, and the Pokémon Trainer. Event 22: Monkeys Unite: The player controls Diddy Kong, who is aided by a giant Donkey Kong, and must defeat Sheik and Lucario on Rumble Falls. Co-Op Event 4: The DK Tag Calamity: Both Donkey Kong and Diddy Kong are tiny and must defeat one Donkey Kong and four Diddy Kongs on Mario Circuit. Diddy Kong's main and Final Smash trophies can be obtained by clearing Classic Mode and All-Star mode respectively with Diddy Kong. Donkey Kong's little buddy. He's famous for his quickness and his long tail. He usually plays second banana to DK, but he teamed up with his girlfriend, Dixie, to rescue DK when he got captured. He's spent some time playing music and competing in races, and he's also an expert at using barrels. Diddy Kong's Final Smash. Equipping his rocketbarrels and dual peanut popguns, Diddy can fly around attacking opponents in rapid-fire fashion. He can tilt the barrel jets left or right to control his flight and shoot peanuts straight down, too. This is a technique that tests one's ability to control both movement and attack direction. Diddy Kong, Captain Falcon, Ike, King Dedede and Olimar are the only characters who use a Final Smash in the Subspace Emissary (when he attacks the skiff carrying Donkey Kong's trophy after ejecting from Falco's Arwing). He is one of the few characters (the others being Pokémon Trainer, Ice Climbers and Jigglypuff) to have a "Defeated/No Contest" pose different from the traditional hand clapping. Instead, in a reference to his defeated pose from Donkey Kong Country, he removes his cap and shakes his head while scratching the back of his scalp. However, he has a "Defeated/No Contest" pose that has him clap for the winner in the next game. In the Subspace Emissary, the Giant False Diddy Kong uses his third costume (which resembles Dixie Kong), unlike the other false characters which have their neutral colors. In the Subspace Emissary, the peanut shells fired from the Peanut Popgun do not release edible peanuts upon breaking open unless the player shoots the peanuts at jet bursts of flame. Diddy Kong's voice borrows some sound clips from Ukiki in Super Mario 64. Diddy Kong, Samus, Fox, Pikachu and Lucas are the only characters in the Subspace Emissary to fight more than two bosses (excluding boss recreations in The Great Maze). Diddy Kong can be chosen to fight Rayquaza at The Lake, Meta Ridley at The Subspace Bomb Factory (Part II), and Tabuu in the final battle at Tabuu's Residence. Diddy Kong's inclusion marks the Donkey Kong universe the first sub-universe to introduce another playable character. Diddy Kong's page at Smash Bros DOJO!! This page was last edited on April 21, 2019, at 15:18.
2019-04-22T18:56:07Z
https://www.ssbwiki.com/Diddy_Kong_(SSBB)
SUBSTANCE: method for prediction of cryoglobulinemic vasculitis development in patients with chronic hepatitis C (CHC) is proposed. A sample of the patient's genomic DNA is obtained, polymorphisms are detected in the ITGB3 1565 T/C and PAI-I-675 5G/4G genes, followed by analysis of their combination. The risk of cryoglobulinemic vasculitis development is determined by the formula. EFFECT: invention allows to isolate a high-risk group for cryoglobulinemic vasculitis development among patients with CHC and to recommend intensive antiviral therapy for these patients. SUBSTANCE: invention refers to medicine, namely to a method for the prediction of developing occupational hyperkeratosis. Substance of the method consists in recovering DNA from peripheral venous blood lymphocytes, genotyping TP53 gene rs1625895 polymorphism by polymerase chain reaction with restriction enzyme digest analysis. Finding G/A genotype and A allele ensured predicting a risk of developing occupational hyperkeratosis. EFFECT: using the invention enables predicting developing occupational hyperkeratosis after the body has been exposed to occupational hazards. SUBSTANCE: invention relates to the field of medicine, namely to a method of diagnosing gestational diabetes mellitus in pregnant women, which includes carrying out a blood test in the morning on an empty stomach with the determination of the venous plasma glucose content. The essence of the method consists in the fact that if the level of venous plasma on an empty stomach is lower than 5.1 mmole/l, detection of diabetes risk factors: obesity with an initial, pre-pregnancy, excess body weight of more or equal 30 kg/m2, or diabetes mellitus of 2 type in the nearest relatives, or impairment of carbohydrate exchange in past medical history, or glycosoria, in pregnancy terms before 24 weeks, determination of capillary blood glucose is performed by continuous monitoring for 3 days. If registered are: one or several indices of the level of glucose in venous plasma blood on an empty stomach higher or equal to 5.1 mmole/l, but lower than 7.0 mmole/l, one hour after meal, index of the level of glucose in venous plasma higher or equal to 10 mmole/l, 2 hours after meal, index of the level of glucose in venous plasma higher or equal to 8.5 mmole/l gestational diabetes mellitus is diagnosed. EFFECT: application of the claimed method makes it possible to increase the efficiency of diagnostics of gestational diabetes mellitus in pregnant women. SUBSTANCE: diagnostic technique for the presence and stage of hepatic fibrosis accompanying chronic viral hepatitis C consists in determining the concentrations of gamma glutamine transferase, thrombocyte growth factor-β1, tissue inhibitor of metalloproteinases-1 and MMP-9/TIMP-2 complex in blood serum; the first stage involves calculating a probability of HCV-associated hepatic fibrosis (PPHF) by formula: PPHF=(ey/(1+ey))×100%, wherein y=-13.6+3.78·X1-0.1·X2 wherein X1 is a serum value of the prognostic factor MMP-9/TIMP-2, X2 is a serum value of the prognostic factor TIMP-1, ey is an exponential function. If PPHF>50%, the presence of HCV-associated fibrosis changes in the liver are predicted. At the second stage, a probability of the stage of the HCV-associated hepatic fibrosis (PSHF) is specified by formula: PSHF=(ey/(1+ey))×100%, wherein y=-12+0.134317·X1+0.527778·X2-0.05·X3, wherein X1 is a serum value of the prognostic factor MMP-9/TIMP-2, X2 is a serum value of the prognostic factor TGF-β1; X3 is a serum value of the prognostic factor of gamma glutamine transferase. If PSHF>50%, the presence of the pre-cirrhotic stage of fibrosis and hepatic cirrhosis accompanying chronic viral hepatitis C (F3-4 stage); PSHF<50% shows HCV-associated hepatic fibrosis of the primary stage (F0-2 stage). EFFECT: method is easy to use, accessible for practical medical facilities, non-invasive and safe for patients, efficient and takes no time; it is effective for screening of the pre-cirrhotic stage of fibrosis and hepatic cirrhosis. SUBSTANCE: invention relates to the field of biotechnology, namely, to obtaining inhibitors of adhesion and/or aggregation of platelets, and can be used in medicine. A polypeptide, used as a component of a pharmaceutical composition and in sets for screening of the inhibitors of platelet adhesion or aggregation, is obtained in a recombinant way with the application of a matrix of the salivary gland cDNA of Anopheles stephensi. EFFECT: invention makes it possible to obtain the polypeptide, possessing inhibiting activity with respect to platelet aggregation and/or inhibiting activity with respect to platelet adhesion. SUBSTANCE: invention relates to medicine, namely to dentistry, and can be used in diagnostics of dental caries by method of infrared spectroscopy. For this purpose sample of patient's saliva is preliminarily dries, dry residue is crushed and suspended in vaseline oil. IR-spectroscopy is carried out in spectrum area 1200-800 cm-1 and height of peaks of absorption bands with maximums 1070, 1017, 960, 860 cm-1 is determined. After that, values of four ratios of peak height with maximum at 1070 cm-1 to peak height with maximum 1017 cm-1, peak height with maximum at 1070 cm-1 to peak height with maximum 960 cm -1, peak height with maximum at 1070 cm-1 to peak height with maximum 860 cm -1, ratio of peak height with maximum at 1017 cm-1 to peak height with maximum 860 cm-1. Dental caries is diagnosed at the following values of ratios of peak heights 1070/1017, equal to 11.64±0.14, peak heights 1070/960, equal to 1.08±0.12, peak heights 1070/860, equal to 6.40±0.41, and peak heights 1017/860, equal to 4.15±0.44. EFFECT: invention provides self-descriptiveness of diagnostics and increases its accuracy. SUBSTANCE: method consists in production of cryostat sections of nerve, washing them in two portions of maleate buffer, incubation in incubation medium. Incubation is carried out for 30-60 minutes and incubation medium has the following composition: acetylcholine iodide 10 mg; 0.1 M Na-maleate buffer 2 ml; 0.1 M sodium citrate 4 ml; 0.03 M copper sulphate 4 ml; 0.005M potassium ferricianide 4 ml; medium pH constitutes from 7.4 to 7.6 and temperature is from 50 to 55°C. EFFECT: method by invention makes it possible to evaluate viability of peripheral nerves in short term, which is necessary during reconstructive-restoring and highly technological neurosurgical operations. SUBSTANCE: functional activity of neutrophilic granulocytes is studied by means of hemiluminiscent analysis, calculated is an index of formation of active forms of oxygen (IFAFO), representing the ratio of the area under the curve of luminol-dependent hemiluminiscence of the neutrophilic granulocytes, induced by a live bacterial suspension of staphylococcus aureus, to the time of achieving the maximum of luminol-dependent hemiluminiscence of the neutrophilic granulocytes, induced by the live bacterial suspension of staphylococcus aureus. If IFAFO value is higher than 100 o.u./s, sensitisation to staphylococcus aureus in patients with allergic rhinitis is diagnosed. EFFECT: application of the claimed method makes it possible to diagnose staphylococcal allergy in case of allergic rhinitis before beginning therapy and contributes to the optimal selection of the patients' treatment. SUBSTANCE: invention represents a method for determining a probability of preserving the myocardium following infarction by creating an admission examination-based data array of 7 peripheral blood parameters, 11 biochemical analysis parameters and 6 parameters of standard 12-lead electrocardiogram in 200 patients with the Q-myocardial infarction and 200 patients without the myocardial infarction. The parameters are stratified with respect to 7 intervals, wherein values related to the probability of preserving the myocardium following infarction are derived by calculating a ratio of the patients without myocardial infarction to all the patients with acute coronary syndrome. The probability is evaluated in a specific patient by analysing the above parameters, searching the respective intervals and values related to the probability of preserving the myocardium in the data array. Summing up the derived values enables calculating an integrated index, which is normalised, and a dimension from 0 to 100% is reduced. EFFECT: invention enables increasing the prediction accuracy of preserving the myocardium in the patients with acute coronary syndrome. SUBSTANCE: group of inventions refers to medicine, namely to immunology, and can be used in laboratory diagnostics, as a test system and a method for measuring interferon alpha (IFN-α) antiviral activity in human blood serum. The test system for measuring IFN-α activity in the human blood serum comprises diploid cells, a virus-containing fluid and standard human interferon-α (IFN-α). As the diploid cells, the test system comprises cells of the characterised line of the diploid cells - human M-20 fibroblasts at 20-33 passages cultured in the medium with added 10% fibrinolytically active plasma (FAP). As the virus, the system contains the A vesicular stomatitis virus (VSV) adapted to M-20 cells, the Indiana strain; the test system additionally contains a viral dye based on two fluorochromes - acriflavine and rhodamine C. The group of inventions also involves a method for measuring IFN-α activity in the human blood serum with the use of the developed system. EFFECT: using the given inventions enables the quantitative good-reproducible measurement of IFN-α activity in the examined blood serum sampled by the luminescent microscopy of the vital preparations coloured in a fluorochrome-based vital dye. SUBSTANCE: invention describes a diagnostic technique for infected pancreonecrosis with establishing the indications for a surgical intervention by examining a patient, wherein acetic, propionic, butyric and isovaleric acids are measured in the blood by gas chromatography, and if the acetic acid concentration is more than 0.11 mmole/l enables stating infected pancreonecrosis, and if the concentration of any of three acids: propionic more than 0.095 mmole/l, butyric more than 0.0035 mmole/l, isovaleric acid more than 0.0003 mmole/l enables stating infected pancreonecrosis with active development of an anaerobic infection requiring one of versions of the surgical intervention. EFFECT: invention enables providing the objective and accurate diagnosing of pancreonecrosis transformation into the stage of infection by using the qualitative parameters with no undesired side effects. SUBSTANCE: invention refers to medicine and biology, namely to a method for additional electron-dense contrast enhancement of acid groups of biomolecules accompanying the histochemical detection of sodium cations in pulmonary and tracheal cell and tissue ultrastructures. Substance of the method consists in fixing tissue slices, washing the surface in bidistilled water, placing into a diluted agent containing 4% osmium tetraoxide 1 ml and 2% potassium hexahydroantimonate 8 ml. The tissue slices are stained for 4 hours while stirring strongly and washed in bidistilled water. The tissue slices are further prepared by slicing thinner and dehydrated; the semi-thin and ultrathin slices are produced and studied by a transmission electron microscope, which is followed by computer processing to detect diffuse selective staining of the acid cell ultrastructures and intracellular substance. EFFECT: using the declared method enables the additional electron-dense contrast enhancement of the acid groups of biomolecules accompanying the histochemical detection of sodium cations in the pulmonary and tracheal cell and tissue ultrastructures. SUBSTANCE: preparation method of a dielectric specimen for investigation on a focused-beam electronic microscope of its micro- and nanostructure involves application of a current-carrying coating onto the specimen surface and provision of electrical contact of the specimen coating with the current-carrying object table. The current-carrying coating is applied by wetting of the specimen surface with a solution of hydrophilic non-evaporable non-flammable non-toxic current-carrying ionic liquid in the form of tetrachloroferrate of N-decylpyridinium in acetone and further drying of the specimen in the air till complete removal of a volatile component. EFFECT: prevention of accumulation of electrical charges on the surface of dielectric specimens. SUBSTANCE: sampling device contains a main pipeline, a sampling section joined with the main pipeline with a possibility of sampling with coverage of liquid flow cross section, a sampling tap and a manometer. The sampling tap is designed as housing and bushing which is rigidly joined with a handle, and in a starting position the bushing shuts a drain hole of the housing, and the handle can move together with the bushing, opening the drain hole of the housing in working position. The hollow cylinder with the central channel is installed in the main pipeline, and the hollow cylinder from side of liquid flow movement is fitted with the input cone tapering the flow and the output cone expanding the flow on the other side of the hollow cylinder. The whirler fitted inside with tangential channels is installed in the central channel of the hollow cylinder from the input cone. The bushing of the sampling tap covers hermetically from outside the housing with the drain hole and can move restrictedly in axial direction with reference to the housing. The housing has the first and second external cylindrical grooves and the cutting spring lock ring is located inside. The bushing is fitted with internal ring sampler. EFFECT: improvement of quality of liquid sampling, improvement of operational reliability of the sampling tap and increase of level of correctness of identified process parameters of wells and layers according to analyses of samplings. SUBSTANCE: method comprises the steps: collecting from the bile ducts of liver of domestic and/or wild animals infected with fasciolas of only live adult F. hepatica. Placement them into individual tubes with filtered and centrifuged bile diluted with isotonic solution of sodium chloride 1:1. Exposure of tubes at t = 38-39°C if F. hepatica is from cattle, and t = 39-40°C if F. hepatica is from sheep and/or goats, under conditions of thermostat for 5 hours. Subsequent washing eggs in isotonic solution of sodium chloride. EFFECT: invention enables to obtain up to 100 percent of fertilised eggs of Fasciola of species Fasciola hepatica and can be used for study in the laboratory or field experiments in solving fundamental and applied scientific tasks in the field of epizootiology, treatment and prevention of fascioliasis of domestic or wild animals. SUBSTANCE: invention relates to the field of agricultural machinery industry. The device for sampling chopped straw from grain combine harvesters comprises collectors, a retainer, a bracket and a control lever. The collectors are arranged in rows, the number of which in the transverse direction is determined by the header coverage and the selected number of the studied areas, and in the longitudinal - replication of sampling. The collectors are interconnected in longitudinal rows by means of flexible connections equal in magnitude, so that the total length of the row does not exceed the distance to the ground mass descent area on the stubble. The first collectors in each longitudinal row have easily removed connections on the holes in the rod-float leveller which is located perpendicular to the direction of the combine movement and retained by the retainer driven by the control lever. EFFECT: invention provides a boundary separation of the comparable areas in sampling and reduction of the probability of failure of experimental equipment. SUBSTANCE: invention relates to the method of analysis of a set of ferromagnetic particles. The method is characterized by that the particles of the named set are levelled in such a way that each of the named particles is oriented practically in the same direction. Then the particles of the named set are fixed in this aligned direction and the internal areas of the named particles levelled in such a way are uncovered. After that the nature of the alloy comprised by each of the named particles is identified, the named particles are grouped by categories depending on their nature and the metallurgical structure and chemical composition of one or more of the named particles in each category are determined. EFFECT: improvement of accuracy and reliability of the analysis of ferromagnetic particles. SUBSTANCE: invention relates to forecast of ageing processes of the synthetic polymer materials (SPM) depending on duration of their operation or storage. Analysis of the volatile organic compounds (VOC) migrating from SPM is performed by active sampling for sorbent, with further thermal desorption and gas chromatographic analysis. Forecast of the ageing processes of the material and estimation of toxicity of the gas discharge are performed as per dynamic of the qualitative and quantitative composition of gas discharge components in SPM initial state, and during artificial climatic thermal-humidity ageing. Dynamics analysis of the total gas discharge (ΣT) from each material is performed for all substances migrating from studied SPMs. Change of toxicity is estimated and forecast of the material ageing is performed as per developed indices of total gas discharge (ΣT) and as per hygienic index P=(ΣTinitial/ΣTn)/V, where Tinitial and Tn are indices of toxicity of gas discharge of each substance in initial state and after ageing, respectively, and ΣTinitial and ΣTn are total indices of toxicity of gas discharge of all components of SPM in initial state and after ageing, V is duration of ageing (year, month). EFFECT: invention ensures high accuracy of the method of VOC qualitative and quantitative composition determination in gas discharge during materials ageing and the analysis results repeatability. SUBSTANCE: group of inventions relates to an apparatus for irradiating a sample with focused acoustic energy, a device which is part of said apparatus, a cartridge for said device and a method of irradiating a sample with focused acoustic energy. The apparatus comprises a device, a cartridge, a completely solid-state connector and a source for generating acoustic energy. The cartridge has a chamber for receiving a sample, and the completely solid-state connector provides a completely dry coupling of acoustic energy between the source and the cartridge. The device and the cartridge are adapted for inserting the cartridge containing a sample into the device and are separable, and the focused acoustic energy is focused high-intensity ultrasound. The device has a source for generating acoustic energy and the cartridge has a chamber for receiving a sample. SUBSTANCE: simulation device contains an oil batcher, a dispersion chamber and a lubricant oil decomposition chamber (1). At the air outlet downstream the chamber the diffuser (2) is located. On the chamber the heater (3) with the thermocouple (4) and the thermorelay (5) is installed. The device includes the air duct (6) supplying the pumped-over hot air into the lubricant oil decomposition chamber connected through the manometer (7) to the air compressor (8). The device contains the cylinder (13) filled with ultra-pure nitrogen, (23, 24) the sealed gage tank with air cavity with oil and a cover for oil filling, with the oil pipeline connected to it through the gas pipeline with the regulator (12), the adapter (11) and cap nuts. The gage tank (9) is connected through the adapter (11) with cap nuts (20, 21) to the measured capillary (15) in a cooling jacket (16) with circulating water through the thermostat with the pump (18) and radiators, attached to the decomposition chamber by means of the cap nut (22) and the sealing cone (25). Also the device comprises the additional chamber (26) screwed to the main decomposition chamber of (1) coaxially and sealed with a gasket (27), with the rod with a flywheel (17) installed inside, with threaded and non-threaded parts. Meanwhile the threaded part is implemented with a possibility of movement in the internal washer with a thread (28) for adjustment of the decomposition chamber volume and change of conditions of simulation of oil concentration, while the non-threaded part is sealed in a gland with graphite seal (29). EFFECT: improvement of accuracy of simulation of composition of oil decomposition products in aviation gas-turbine engines. SUBSTANCE: invention relates to field of biotechnology, immunology and genetic engineering. Genetic modification contains deletion of endogenic low-affinity FcγR locus, where contain functional FcRγ-chain. Modified mice express up to five genes of low-affinity human FcγR on antigen-presenting cells of host immune system. Also described is method of screening substance, containing Fc site of human antibody by means of said mice. Invention can be used in the field of medicine. EFFECT: presented are genetically modified mice, not related to man, and methods and compositions for their obtaining and application.
2019-04-25T20:44:37Z
https://russianpatents.com/patent/264/2642626.html
Walkerstone Training delivers big returns to its customers – value for money, effectiveness and productivity. Consequently, demand for its services has risen 50% over the past six months according to Richard Walker, CEO of Walkerstone. This entry was posted in Which Open Source Blog and tagged Company, Customers, Delivers, Fast, Growing, Returns, Training on March 6, 2013 by Administrator. Box-set sales have continued to increase as customers increasingly prefer their collectability and functionality for storing media. Multimedia box-sets that include entertainment, software, books, and music, are increasing in shelf presence and market demand. To meet this demand and support growing business, it is crucial for disc publishers to be able to provide disc packaging that is eye-catching, customizable, durable, and functional. For 25 years, Univenture has been a global source for custom solutions in disc packaging and multimedia box sets. Bringing together a full line of wallets, binders, and sleeves with a range of custom printing and decoration capabilities, Univenture delivers products that are more environmentally responsible, functional, and cost-effective. This entry was posted in Which Open Source Blog and tagged BoxSets, Disc, Fast, Increase, Multimedia, Publishers, Sales', Shelves on March 5, 2013 by Administrator. e-SignLive, the online, on-demand electronic signature service for mid-market and small businesses in compliance-driven industries, today announced that Insurance Management Group is using its electronic signature solution to collect signatures on all important and time sensitive documents. In an effort to be a paperless organization, Insurance Management wanted to find a way to collect signatures without having to print, scan, fax and courier or deliver documentation between agents, customers and providers. As well, the solution needed to reduce risk and remain compliant with insurance standards without compromising customer satisfaction or security. The insurance company determined e-SignLive was the right option after speaking to an e-SignLive representative who understood the industry, the companys unique needs and the products capabilities. e-SignLives unique and patented e-Witness audit assurance technology provides secure legal evidence and irrefutable proof of the execution of the financial transaction and the associated e-signed documents. With e-SignLive, the guided e-signing ceremony and process workflow reduce not-in-good-order (NIGO) applications by 90 percent. Policies are properly filled and signed correctly the first time. Insurance Managements sales agent Trever Stoffel uses e-SignLive for applications and cancelations for home, auto, motorcycle and boat insurance. Before, agents needed to follow up multiple times for completion. Not anymore. With e-SignLive its so easy. We check online to see whats been done to-date and when its completed, all we need to do is drag and drop the electronically signed documents to our CRM system. This entry was posted in Which Open Source Blog and tagged Covered, Efficient, Electronic, eSignLive, Fast, from, Group, Insurance, Management, Online, Paperless, Signature, Solution on February 25, 2013 by Administrator. The New Woocommerce Theme Browser at woo-com makes it easy to find the perfect theme fast. The leading provider of plugins and extensions for WordPress ecommerce sites based on WooThemes and WooCommerce recently released the sites latest feature for Woocommerce users, the WooCommerce Theme Browser, at woo-com. The new WooCoommerce Theme Browser was designed to make it easy to search the sites growing collection of highly functional themes for WooThemes.com and WooCommerce.com. Using the new WooCommerce Themes Browser, users can search for specific products by name, product category or by price, making it easy to quickly find the perfect theme. Thanks to the woo-coms latest offering, users of the popular WooCommerce platform can get their online retail site up and running fast, with an easy to browse selection of high quality themes from top WooCommerce developers. The site makes it easy to get a new site operational fast, with a large selection of products designed specifically for the challenging needs of business owners and webmasters. WooCommerce, the ultimate ecommerce solution for WooThemes, offers a fast way of customizing WordPress web sites through WooThemes, which are easy to implement and provide increased functionality for WordPress e-commerce sites. The plug-ins found on woo-com are designed to increase functionality through new features, including social media plug-ins, sliders, coupons and other popular ecommerce tools. Plug-ins can be downloaded directly from woo-com and installed via the administration panel of a WordPress ecommerce site. woo-com.com provides WooCommerce plug-ins, themes, news and tips for implementing using the WordPress platform. The site provides a full listing of plug-ins and themes organized by category and via the sites handy built-in search feature. woo-com.com is the only one-stop location for the latest Woothemes from a growing community of talented developers. Developers can submit new plug-ins and themes directly to woo-com.com, which lists them for sale and offers a credit for those who contribute. For more information, please visit woo-com.com. This entry was posted in Which Open Source Blog and tagged Browser, Fast, Find, Lets, Perfect, Theme, Users, WooCommerce on February 8, 2013 by Administrator. Izo helps runners beat costs with winning deals on wicking fabrics and other technical gear in the fall season. Responding to the popularity 5k races and other running events this year, Customizo.coms online catalogue offers a spectrum of performance apparel appealing to fair weather joggers and seasoned marathoners alike. Participants appreciate swag suitable to the sport, so Customizo offers a discount to event organizers on performance race gear including wicking tees, caps, visors, and bags in which to keep it all. Carrying top tier brands such as Nike, Reebok, and Adidas alongside value options such as A4 and Gildan, Customizos product diversity ensures there is a product for every occasion during the fall running season. The online Design Studio features a selection of free running and marathon themed customizable templates. Users can also upload their own artwork such as race designs and sponsor logos, or add graphics and text to photos taken using Snapizo, Izo Brands mobile application. About Customizo and Izo Brands: With Customizo, Groupizo and Snapizo, Izo is knitting the framework for the future of e-commerce with a multi-faceted set of innovative product customization and design tools, a unique group collaboration interface, and mobile media distribution applications. Izos mission is to be the most customer-centric, creative, and innovative company in the custom apparel and promotional products industries. This entry was posted in Which Open Source Blog and tagged Custom, Deals, Fast, Gear, Race, Runs on January 1, 2013 by Administrator. iSiteMaker may be the new kid on the block, but they have taken the world of web development by surprise with exceptionally fast turn-around time and unsurpassed customer service. Using the open-source Content Management System (CMS) WordPress, original and captivating templates are forged within a few days of the initial order. To the first 10 clients, iSiteMaker even provides a coupon code for 50% discount on the initial offer. Just use coupon code ‘LAUNCH’ when submitting an order. Affordable Prices: Low prices no longer equate to low quality. iSiteMaker has managed to keep prices low by keeping overhead low and finding only the most effective designers. Fast Turnaround: For businesses that need immediate results, iSiteMaker provides turnaround in just a few days for most projects. No-Hassle Guarantee: The company provides 100 percent refunds to customers that are unsatisfied with their products. The company only asks for a chance to correct the problem and make it right. Support: Many companies consider the project completed upon the customer’s receipt of materials. iSiteMaker provides full support for up to 2 weeks after the delivery of the product. This entry was posted in Which Open Source Blog and tagged Blazing, Development, Energetic, Fast, iSiteMaker, Provided, Results., Startup on November 19, 2012 by Administrator. Bits&Coffee has released BatchPhoto v. 3.0, a powerful all-in-one photo manipulation program for Windows that lets photographers, web designers, business people, and families enhance photos quickly and efficiently. Simply select a group of photographs, and with a single operation annotate, touch-up, apply special effects, convert to different image types, resize, and rename every image in the group. New features in version 3.0 include built-in support for uploading pictures to Facebook, Twitter, Picasa, and websites, a newly-designed user interface, automated processing and manipulation of photographs, and new graphical filters. BatchPhoto easily annotates groups of photos with comments and date/time stamps. Watermark photographs with text, logos, or a combination, to keep them from being abused by competitors or strangers. Touch up groups of photos by changing the contrast, brightness, and color balance. Equalize images, adjust their hue and saturation, reduce the noise in images taken in low light, and sharpen them. It’s simple to rotate, resize, crop, flip, roll, and replace colors in each photo. The software includes a full library of artistic effects, including adding borders, highlighting edges, and shading images. It can emboss, sepia-tone, and solarize images. Easily transform a representational photograph into a charcoal drawing or a simulated oil painting. Add swirls, waves, 3D effects, and more. BatchPhoto is also an image converter program that can read and write more than 170 image file formats, including: JPEG, TIFF, PDF, PNG, GIF, BMP, EPS, TGA, and PSD. It can also read RAW image formats from Canon, Sony, Nikon, Olympus, and Fuji digital cameras. Digital photographer who need to be able to enhance a collection of images with a single operation, real estate or construction professionals who need to process a steady flow of images efficiently, or insurance companies or law firms employees who need to annotate and watermark images for clients, can find BatchPhoto as the right tool for the job. There’s even a Home version of BatchPhoto for the amateur photographer who wants to touch up and enhance images more efficiently. BatchPhoto v. 3.0 runs under Windows 7/Vista/XP. It comes in two editions: Home and Pro priced at $ 34.95(US), and $ 59.95(US) respectively, and may be purchased securely online from http://www.batchphoto.com/. A free trial version can be downloaded from the same web address. Since 2005, Bits&Coffee has been developing and marketing image enhancement productivity software for business and home users. In addition to BatchPhoto, the company also offers Image Espresso, a free online image converter and editor that makes it easy to convert, resize, crop, rotate, touch up, and apply effects to photos and images. This entry was posted in Which Open Source Blog and tagged Editing, Efficient, Fast, Image, Photography, PowerUsers on November 13, 2012 by Administrator. This entry was posted in Which Open Source Blog and tagged BSGs, Commerce, eCommerce, Fast, Merchants, OrderBridge, Payments, PCICompliant, Solution, Track on October 13, 2012 by Administrator. TradeCard, Inc., the supply chain collaboration and global trade platform used by more than 10,000 retailers, brands, manufacturers and service providers, will play a key role in leading the supply chain agenda at the 28th International Apparel Federation (IAF) World Apparel Convention, being held September 24th through 28th in Oporto, Portugal. TradeCard Founder, Chairman and Chief Strategy Officer Kurt Cavano will lead a portion of the supply chain program, sharing best practices for evolving sourcing strategies beyond the low cost needle. Long-time TradeCard customer Dr. Harry Lee, Chairman of TAL Apparel, is the featured keynote speaker at the IAF Convention. The theme of this years event is around the changing environment in the fashion business and the supply chain side of the fashion business has seen more than its share of change and volatility recently, said Cavano. Leading brands and retailers today recognize theres more to sourcing strategy than chasing low cost product. Speed, agility, quality, local in-country infrastructure and social and ethical compliance are essential factors to consider in any sourcing strategy today. Well explore these and other key factors at the IAF. Cavanos session on sourcing strategies takes place September 26th at 14.30. The event is being held at the Sheraton Porto Hotel and Spa. My vision is to connect the entire fashion chain, not only producers but also retailers and brands, Harry van Dalfsen, President of the International Apparel Federation (IAF) says. As the IAF is a neutral, non-political organization, we aim to build bridges between the continents and ensure that fashion professionals are making use of a worldwide network. Since 1999, TradeCard, Inc. has transformed global supply chain collaboration by boosting visibility, cash flow and margins for over 10,000 brands, retailers, suppliers and service providers operating in 78 countries. TradeCard delivers a cloud-based network that enables complex, multi-enterprise sourcing transactions across multiple layers of the supply chain. More than 45,000 individual users leverage the TradeCard Platform to streamline transaction flows, from purchase order through production tracking, shipment and payment. Embedded financial services throughout the supply network reduce capital costs and minimize risk. Multi-enterprise collaboration on the platform delivers visibility into the movement of goods, from raw materials to the store shelf. TradeCards on-the-ground trade experts around the world allow entire supply networks to rapidly join and drive value through the platform. The worlds leading retailers and brands, including Levi Strauss & Co., Columbia Sportswear, Guess and Rite Aid, leverage the TradeCard Platform and its member network for sourcing and global trade. TradeCard, Inc. is headquartered in New York City, with offices in San Francisco, Amsterdam, Hong Kong, Shenzhen, Shanghai, Taipei, Seoul, Colombo and Ho Chi Minh. TradeCard is located online at http://www.tradecard.com. This entry was posted in Which Open Source Blog and tagged Apparel, Best, Chain, Changing, Fast, Practices, Share, Supply, TradeCard, World on September 29, 2012 by Administrator. Fast Lane Commission, a new affiliate web-based application, which is claimed to come out on Tuesday, September 11, 2012. This application is developed by two well-known marketing experts, Francis Taylor and Tom Geller. This program might help online marketers to speed up the process of online marketing from scratch. With Fast Lane Commission, affiliate marketers can earn commissions by promoting both physical and digital products from Amazon and Clickbank marketplaces. This program helps marketers create higher converting consort websites, drives traffic, and makes product sales more effectively. Fast Lane Commission program has received many raving reviews as well as positive feedback. The website BusinessReviewCenter.com decided to get a copy of Fast Lane Commission from the authors and then completed a comprehensive review about this program. A full Fast Lane Commission Review on businessreviewcenter.com shows that Fast Lane Commission contains profitable niches with recommended keywords that users might be interested in, and a list of products from Amazon and Clicbank marketplace. Moreover, the program offers an impressive list of articles, which is available for spinning to create unique content, a list of videos that can be used to create one’s money sites, and a list of available templates for creating affiliate websites or blogs. Thus, Internet marketers do not have to spend countless hours or even days wondering which niche should be targeted, or to purchase the latest keyword research tool to figure out the right set of keywords for their blogs. Jenny Edward from businessreviewcenter.com states that: “If people hope to have a quick way of doing things online, they can follow the techniques that lay out by this Internet marketing tool. Even if they only have this software at hand, they might earn a good amount of money as affiliate marketers. If the users are not getting positive results from Fast Lane Commission, they can get their money back within 60 days”. To get access instantly to the complete review, which has a comprehensive list of advantages and disadvantages of Fast Lane Commission program, one should visit: http://businessreviewcenter.com/e-business/fast-lane-commission/. About the company: Business Review Center (businessreviewcenter.com) provides affiliate marketing tools and tips, and reviews about business news, and e-books. People could contribute their ideas and feedback on any digital products to Tony (the founder of Business Review Center) via email. This entry was posted in Which Open Source Blog and tagged Business, Center, Commission, Fast, Geller's, Lane, Marketing, Online, Program, Review on September 28, 2012 by Administrator.
2019-04-22T12:03:49Z
http://www.whichopensource.com/content/tag/fast/
Even consumer-focused apps are used by people in business and education. See how minor changes can fine tune your app to meet the needs of these large organizations. Learn best practices for synching user-specific content on Shared iPad and how to add deep-link support for Classroom app, authentication integration via Touch ID, AppConfig driven customization, and much more. [ Music ] Good afternoon. My name is David O'Rourke. Thank you I think we're at the midpoint of the conference this week. How's it going for everyone? Been worth your time? I was told something just before coming on stage so that there was no pressure. But apparently you've all hit favorite on this presentation a bit too much. And so thank you for that, I hope it's worth your time, and I think it is because we put a lot of work putting this together. I want to set some expectations for this presentation. We will be going over best practices. This is going to be an easy session for you guys to listen to. You can put your laptops down, there's not going to be a lot of sample code. This session is to inspire you as to where to invest in your future app so that you can improve the marketability and approachability of your application for as many markets as possible. The two markets we're focusing on for this presentation will be business and education. So spoiler, there's going to be a lot of us going over Shared iPad. So let's get started, we'll go into the agenda. We're going to talk about modern app design practices, what some sorts of things customers can be looking for. We're then going to branch out to a quick overview of the Shared iPad. How does it work behind the scenes? What affect does this have on your app? What technologies do you need to adopt? That's my third bullet. And there are some specific technologies that we'll be recommending, and fortunately for you many of those technologies have been gone over after this session or later in the week, so you can come out of this talk and go directly in to hearing the gory details if you're inspired to modify your app. And there's some new opportunities to enhance your app, one that I'm particularly excited about at the end of the presentation, and I think you will be too because it will again, offer you a greater opportunity for your app to be used in ways you never anticipated. So let's talk about modernizing your application. This is kind of a bedrock expectation for customers. We talked to a lot of customers, they give us a lot of feedback. It's really strange when they come up to us and say why doesn't such and such an app use this Apple technology? So I just want, this is not a deep insight, but I just want to remind you guys, you need to stay current, you need to stay fresh because the customers are downloading other apps from other developers that have that technology and then it kind of provides a discontinuity or a bad comparison if your app isn't using the latest and greatest that Apple offer. I don't think I need to speak to any of the developers in the room, that's why you're all here a WWDC to find out what's new, but as a general ecosystem issue, staying current has benefits for you and your customers and is an expectation of your customers. So some example technologies, by no means the complete list of technologies that you could adopt. Auto Layout, this is still a relatively new technology it's been in several iOS releases now. But this really helps you produce a universal app binary that can work on an iPhone and an iPad and it helps with a lot of layout rotation just a whole bunch of things get taken care of for you by Auto Layout if you invest the time. It even helps with left to right. I used to manage contacts for the desktop and we moved to Auto Layout and we got left to right to free, which was a longstanding, or right to left, or the different language directions for free, which was a longstanding request for the desktop contacts app. So, auto layout has helped us, it's helped us internally, it will help you guys. Accessibility. I was actually talking with a former co-worker just before lunch, make sure you have accessibility in your application. This helps people that couldn't otherwise use your application. And they get quite emotional when they can see that they can finally use an app because you're offering apps to a person that may not have been able to do anything with it prior to doing this. There's some excellent accessibility labs later this week if you'd like to look into it. Swift. This is the newest most secure, fastest runtime. If you aren't looking at Swift, looking how to adopt Swift, go to the Swift labs this week. I think you'll be impressed. I'm impressed with the language, it's truly stunning. I shouldn't have to tell this audience to adopt Swift, but it's again another newer technology that you should really be looking at investing in. AirPlay, particularly in the education and business environment, conference rooms, big screens behind the presenter. People want to share content. If there's room for your application to directly adopt AirPlay, do so. If you can just make your app look more interesting when it's on AirPlay, maybe being able to hide certain onscreen elements when you're sharing to a conference room. Thinking about AirPlay as, or a big screen as a destination for your application, you might want to modify the UI a little bit or have a mode that the user can put something into. Or you just directly project AirPlay. And finally 3D Touch. This is perhaps the newest technology, newest hardware. A lot of opportunity to accelerate. I use my 3D Touch on a daily basis. It really has made the OS quicker, snappier. And whenever I run into an app, I push hard, and there isn't you know anything happening when I push hard it's a bit of a discontinuity and it kind of throws me off my rhythm. So look into that. Again, I want to emphasize, these are not the complete set of technologies, these are just some examples of some of the newest technologies that some apps may be lagging behind and this will impact your ability to market and sell your app into business and education. So let's talk about a feature that I have a lot to do with and actually was able to with a fabulous team putting it together iOS 9.3 introduced the Shared iPad. This is a huge game changer for you as developers and for education in that we can deploy iPad, the best mobile platform, into schools and they can now have multiple students share and iPad throughout the day and for different classes. This offers a huge market for the developers in the audience, because if you can make your app work better in a Shared iPad environment, you're going to have schools licensing your app in quantities that had previously been inconceivable to you. So let's talk about Shared iPad. It's introduced with iOS 9.3, it obviously continues to be supported with iOS 10. And the major goals was to allow schools to buy a cart, how many people have seen iPad cart? They're kind of cool. I saw one for the first time about 18 months ago. They load 60 iPads into a little cart, they roll it into a room and the students pull the iPad out, they use it, they put it back and then the cart rolls to a different room. A feature that was missing until iOS 9.3 was the ability for the students to have a personalized experience on each one of those iPads. With Shared iPad they can now have that and that makes the cart much more effective. Lots of schools buy fewer pieces of hardware and spend more money on the software. I want to repeat that they can spend more money on your software because they're buying fewer pieces of hardware from us [applause]. So, the way you log in is using a new Apple ID called a managed ID. This is Managed by the school. They set their own user list, they bind devices to their organizations. And only their accounts can log onto the iPads. It's really cool. If you didn't go to Todd's session before my session, I recommend you review it with the video source. He talks a lot more about Managed Apple IDs. And finally, and probably the thrust of this presentation is a Shared iPad use environment requires the data be a Cloud. So we've got the cart, everyone understand the cart? Student rolls the cart in on Monday, pulls out an iPad, they use it. Well Tuesday when the cart pulls in they may not pull out the same iPad. If their data's not been pushed to the Cloud by your application, they won't have the experience they had on Monday. They'll have a new iPad experience on Tuesday and that will depress them. So we're going to talk a lot about what technologies Apple offers and how Shared iPad works. So first of all let me give you a quick overview. Again, I recommend you review Todd's session. There was a live demo of this. I have some static slides showing what a login looks like. So a student pulls an iPad out of the cart, they see their grade, the student that I'm going to be demonstrating is Mia, she's a fourth over, fourth row down on the bottom. Spent a lot of time with Mia the past few weeks putting these slides together. So Mia taps on her picture, Mia provides her passcode. After she's satisfied that she entered the correct passcode, the iPad gets ready for her. If she's used this iPad before this screen is up there for a far shorter period of time. If she's going to use the iPad for the first time, this might take a little longer as it downloads data from the cloud to get her ready. When it's done downloading data form the Cloud, or the initial setup data, Mia uses the iPad for the entire class session. She uses Pages, she uses Garage Band, and she works with it as her iPad for the entire session. When Mia's done, Mia logs out. This is the opportunity that the iPad has to push the data up to the Cloud for any data that wasn't being pushed to the Cloud during the session. And so we're going to talk a little bit about what technologies Apple offers to do that. So, all of Mia's data has to be in the Cloud for this to work. Mia's using a different iPad possibly from class to class. My kids have six periods a day. They might start in science then go to math. There might be a different cart in each one of those classes and so therefore their data has to be in the cloud for each of those iPads to be useful. Even if they use the same iPad throughout the course of the day, or throughout the course of a week, the data may be purged by the iPad because it may need to expunge users from the iPad to make room for new users to log in throughout the course of the week. So, iOS provides four core technologies that I'll be going over later that you can adopt, and be telling you about a fifth technology that you should be adopting if you don't use any of the iOS Cloud technologies. But let's go over first a review of the iPad expectations. So, I get a lot of questions about this from engineers, both internally and here at the conference, we've been talking to people. So what is Shared iPad? Plain and simple, it's a user switching. So we are not allowing multiple users to be logged onto the iPad simultaneously. There's only one active user session at any given time. For user to log into the iPad another user has to log out of the iPad. So it's really user switching. What do you as an app developer see? You see a single use device. You do not know you're in a Shared iPad environment, you don't need to know you're in a Shared iPad environment. Nothing has really changed for you as an application developer. You don't need to participate in this, you don't need to do anything custom, other than move your data into the Cloud. Signing out is the moral equivalent of powering the iPad down. So your app has shut down, it's not running in the foreground. It's just like a non-shared use iPad when the user turns the iPad off. So if your app works well between power cycles, your app will work well in a Shared iPad environment as users log in and log out. User data is cached on the device. Internally we started educating people, it's like volatile cache, it's not volatile when the user's logged in, it's volatile after the user's logged out. So the data may be expunged off the iPad at any given time, but while you're logged in it's a single use iPad. The data's not going to disappear out from underneath you. And caching has some obvious benefits for performance. It works for offline, these iPads we expect to be taken on field trips. And the data will be purged by iOS when iOS deems it necessary. So we want you to move your data to the Cloud so that Mia as she's visiting different iPads throughout the course of the day and different iPads during the course of the week and the school year has a consistent experience on all the different devices. The iCloud technologies that we make available, or some of the four key technologies we make available are CloudKit, iCloud Drive NSUbiquitousKeyStore, KeyChain. And as an adjunct NSURLSession. We'll talk about why that's on the list here later in the presentation. So, you're convinced, there's a huge market for Shared iPad, when should I flush my data, when should I do the, well the goal is for you to flush the data to the Cloud while your app is still in the foreground. So as Mia's making changes, you're writing changes to the CloudKit, okay you're updating your Cloud document, you're doing whatever's appropriate for that. You can sync data during log out, and you should sync data before you receive the application will resign active event. But, generally we don't want to put all the data syncing up on the logout, it will take the logout too long. So you should be syncing while your app's up to date. You shouldn't be batching this up to do it later because you may not get later if Mia logs out. There is, if you adopt the iOS technologies for CloudKit, Cloud Drive, NSUbiquitousKeyStore, KeyChain, Mia's data can be synced even when Mia's not logged in. But, we prefer her to exit clean with no dirty data. So let's talk a little bit about CloudKit. CloudKit was introduced in I believe iOS 8, correct me if I'm wrong. You can sync data, it's taken care of automatically and something that's very important that you adopt, if you adopt CloudKit is LongLivedOperations. These are a subclass of CKOperation Classes. The link to the developer documentation is on screen. This is important if you want CloudKit to sync your data while the app is not in foreground. Now, we 've had this feature and this wasn't unique to Shared iPad, but we've leveraged this feature to also be the mechanism by which we sync data when Mia's no longer logged onto the device. So if you most your CloudKit documents onto LongLivedOperations, you can get your data to sync using CloudKit even when your app's not running, or in the foreground, or even when Mia's no longer logged in. So, if you're going to adopt CloudKit and you're going to use CloudKit, I highly recommend you invest and work with the CloudKit engineers while you're here this week, to understand LongLivedOperations, adopt LongLivedOperations, and make your application compatible with LongLivedOperations. Cloud Documents is perhaps the easiest API to adopt, for document-based applications like Keynote or Pages. There's very little you need to do, every managed IP has an iCloud drive. iCloud drives automatically sync. If you are already a document based application, you're good to go for education, you've done everything you need to do. And Mia will have all of your documents for your app available on every device that she visits. So it's simple and easy. If you're a document-based application this is the preferred way to go. Both of these texts are sync on demand. And this is really, really important. Mia could have several gigabytes worth of data stored in CloudKit, but she will only page the data onto the device that she accesses. So the device does not have to download all 2 gigabytes of Mia's Cloud data in order for her to use your app, if your app's only accessing a few megabytes' worth of data that you stored in Cloud data, only your app data would be pulled onto the device when your app is launched on that device for the first time. So it's very efficient, and if you think about this at scale, average US classroom has 30 to 40 students in it, you've got 30 iPads all fetching data. If they all fetch the full 2 gigabytes when they logged on, it would be relatively hard for most schools' network connections to handle that. So these are the best [inaudible] technologies, they only cache the data you use, the data stored locally. They're really, really world-class Cloud technologies that you can integrate into your app and get your app into these important markets. And CloudKit is suitable for large datasets. I don't know what the definition of large is, I would recommend you work with the CloudKit folks to find out if your dataset's too large. I don't think they recommend it for use of iMovie, but maybe. Maybe for smaller datasets it would be fine. I specifically got this quote from the CloudKit lead engineer, this is in contrast to the next technology that's on the next slide, which is NSUbiquitousKeyValueStore, which is meant for smaller datasets. So I don't think you need to, unless you're doing a video editing application, I don't think you need to worry about the size of the dataset you're putting in the CloudKit. That doesn't mean that you can run amuck and do really silly things for performance, but most applications that are going to store data that are reasonable, CloudKits are perfectly suitable for that. Let's talk about NSUbiquitousKeyValueStore. To use this requires an entitlement. It's a drop-in replacement for NSUser default. So if you're already using NSUser defaults, you're already good to go, it should be fairly easy for you to transition to NSUbiquitousKeyValueStore. And NSUbiquitousKeyValueStore the data is stored in the Cloud, so your app launches, it stores key values pairs in the NSUbiquitousKeyStore, your app quits, it relaunches, it gets the data back from Cloud. Your app on a different device will get the same, essentially NSUser default package when it launches on the other device. It's modelled on NSDictionary and again talking to the CloudKit engineering team, who originally did NSUbiquitousKeyStore, moved on to CloudKit, smaller payload only please. This data is not fetch on demand, it is fetched during log in. And we just really anticipate this for some lighter weight datasets used within your application that are more appropriate for an NSDictionary. If you put it in a NSDisctionary, put it in an NSUbiquitousKeyStore, if it's too big to put it into an NSDictionary, you might want to put it into CloudKit. So, as I mentioned data fetch is part of the account sign on. There is a side effect of this, and we're going to be talking about later in the presentation, which is this also prepares your app to be managed by application management, which is the simplest summary is to talk about deploying applications in scale. If I'm an IT administrator about to deploy 1000 iPads at a major Fortune 500 company, and I want to have your app set up under default circumstance for the day 1 that I deploy it, they do it through application management. And we'll be talking about that later in the presentation. Essentially you can get an initial application state distributed to all of the iPads via NSUbiquitousKeyValueStores. So, I want to think of a couple use cases for NSUbiquitousKeyValueStore value or NSUbiquitousKeyValueStore, that is a mouthful. The biggest thing is is let's think about Mia visiting an iPad, day 1 of a new school year. She launches your app, your app has some setup data. You want to pick her favorite color, maybe have her pick a picture for her Avatar. You don't want her encountering that on every iPad that she uses throughout the year. So an idea use case for NSUbiquitousKeyValueStore is to story your app's initial setup data. That way as your app is run on different iPads, Mia's initial preferences for your app have been saved in NSUbiquitousKeyValueStore and she does not see the application setup every time she encounters a new iPad. An example of places where we use internal of Apple is, I'm told by the Stocks team and the Weather team, we use NSUbiquitousKeyValueStore to store the ticker, list and we use it to save all the locations for where you save in Weather. Keychain. How many people are using the Keychain in their application? Quite a few. I have excellent news for you, you're done. You need do nothing, you can tune out for the next couple of minutes and check email. You don't need to do anything else. You're already good to go. Every Managed Apple ID has a Keychain and that Keychain is synced to every device that they log into. Obviously the Keychain is there for secure user data. And so it's the same API, same user conventions, in fact you as an app cannot tell the difference between a Shared iPad Keychain and a normal iCloud Keychain. Same API, same usage pattern. A couple of minor things. Some people do some rare application store device only data on the Keychain. There is no such thing as device only data on a Shared iPad Keychain and we recommend you only store per user. And you must set the exportable flag or the share flag, otherwise your data will not be shared up to the thing. But you should be storing user credentials, or user sensitive information in the Keychain, you should not be using the Keychain to store bulk data. It's kind of the same rules as NSUbiquitousKeyValueStore. Don't use it to store bulk data. If you want to store secure bulk data, come to the labs, we can suggest some different approaches that will solve that problem. But yeah, if you're already using the Keychain, good. If your app has user sensitive data that should probably be behind a password, or a little more secure than just putting it in a data store like CloudKit or NSUbiquitousKeyValueStore, start putting it in the Keychain, it's easy to adopt. It makes the data secure and makes it highly portable. Finally, on the Cloud technologies to adopt, how many of you already have your own Cloud technologies that you're using rather than CloudKit. I see quite a few. Very good. You need to make sure that either your code or the code that you're using uses NSURLsession. NSURLsession is the preferred option for doing all networking on iOS. And it should be using it because it does so much for you. I've been at Apple quite a while. I don't want to say how long, I think a little longer than Todd has from the previous session. It does so many things for you that you don't even know that it does. It does IPv6, it does all the metricing, and controlling, and accounting, it does data throttling, seamless network transitions. And, I didn't even know about this until I was putting this slide together, Cisco Fast Lane support. How many people know what that is? Yeah it's a quality of service thing that allows network administrators to prioritize network traffic. And if your app is not using NSURLsession you have to do that all yourself. That's time you're going to spend learning something where NSURLsession's already done that. So, if you're not going to use CloudKit, you're not going to use iCloud Drive, you're not going to use the Keychain, and you're not going to use NSUbiquitousKeyValueStore, but you're motivated to move your app into the Cloud, make sure that the frameworks you're using, or the frameworks that you're writing are using NSURLsession for all of the networking. And you will pick a best of breed network behaviors, robustness, and resiliency. So, like the LongLivedOperations in CloudKit, another advantage of moving to NSURLsession is let's go back to user switching, your app's not in the foreground. Your NSURLsession pass are not running unless you've marked them as background, or adopted background configuration. So, you have your own Cloud technology, you're not yet on NSURLsession, but you're going to move onto NSURLsession. When you do so you can review the developer documentation that talks about how to make your NSURLsession data run in the background. And this has two advantages to you as an app developer. Advantage number one, your data can continue to sync to your proprietary Cloud store when your app is not in the foreground. And advantage number two, your data will sync when Mia's logged out and isn't even active on your platform. So if you're not using NSURLsession, start. And when you do start using NSURLsession, review for background usage and make sure that your app can sync data when it's not in the foreground or the user isn't even active. So, let's review. By now I think I should have convinced you Cloud based data is essential for your app in the new Shared iPad environment, which we introduced with iOS 9.3. This is a huge market worldwide. We know that it's being used in Australia. We know it's being used it he US. It's rolling out to Europe. This allows Managed Apple IDs to move between devices, and we want that to be as seamless an experience as possible, and you as the app developers have a role to play there in getting your app data into the Cloud. Apple feels, and I believe we provide a complete solution. If you don't have any of this working yet, there's nothing you need to wait for. iOS has all the baseline technologies you need to move your data into the Cloud. If you don't feel that way, come to the lab we'll try to help you out. If you're doing your own networking of any kind, Cloud based or otherwise, please use NSURLsession. A huge amount of advantages for you in adopting those technologies. And you pick up a whole bunch of functionality. And again we don't talk about future features, like Pod in this session, but we're not done with NSURLsession. As we need more networking, it's all going to get rolled into there, and apps that are already on it are just going to ride that wave onto the next round of feature improvements to NSURLsession. So, in addition to the Cloud, there's some additional considerations for Shared iPad that you need to do. And this is more about changing your thinking and less about specific technologies you need to adopt. First of all, there's data separation between user accounts. Now that should seem obvious, or some people might be going duh, but I want to talk about that, because some apps, iOS 9.3 is the first release of iOS' for shared users, and well that's 9 versions of iOS prior to that that didn't, and so some apps needed to support shared users. And they kind of wrote their own little user picker within their app. So the first thing is, is we have true data separation. Mia cannot see Liam's data and Liam cannot see Mia's data while they are active on the device. Therefore, this is now a tool you can use as an app developer, to where you no longer need to have your own app or multi-user picker. There are some applications out there than when you launch it, it says are you Mia or are you Liam, and you can set multiple user data. I think the time has passed for that. So if you are doing a multi-user application, your app should just run on a single device, it should run within the shared user mode and you'll get data separation for free and you can retire the code that's doing that sort of multi-user management. And that avoids comingling data between Liam and Mia, which is sometimes a potential privacy issue if two different students could see each other's data. Shared iPads have quotas. Todd had an excellent animation, I forgot to rip it off for my presentation, my apologies. iPads will enforce quota. Now there are two types of quotas on an iPad. There's the number of accounts that can be on a Shared iPad. That's like six, eight or ten. And there's the amount of data that can be stored per account. Why does this affect you, as you developers, well you will be getting new errors out of any file system operations you do. There's the EDQUOT error, treat it the same as ENOSPC. So, instead of getting this full, you'll get quota errors. If your app has recovery mechanisms you have to do when you're out of disk space, treat them the same. But this is a new error code that you might see more frequently when running in a Shared iPad environment. Another technology that's really, really interesting in the case of Shared iPad is On-Demand Resources. If your app has On-Demand Resources, or has assets that you haven't moved into Apple's On-Demand Resources but that you download On-Demand. If you're downloading them into the user directory, and you're on an iPad with eight users, you've now duplicated that app resource eight times. Not only that, you've downloaded the resource eight times and that's burdened the school's network, multiply that times 30 iPads, you've now downloaded that 240 times. So you really should consider moving to using On-Demand Resources. If your app moves to On-Demand Resources, you will only download an On-Demand Resource once per device. It will be downloaded for all users, current and future on that device. And more importantly it will not be deleted or purged when a particular user's account is purged by the operating system to make room for new users. So if you have large resources, or you have just in time resources, or you thinned out your app, and you're downloading those resources later, adopt ODR and you will get the resources you need onto the iPad just when you need them and you will minimize the amount of impact you've had on that iPad both local storage, the user's quota, and the school or institution's network. So this is again a screenshot form the developer documentation, talking about On-Demand Resources. I have it at the end of the slide, but I'm going to give you a preview. I think Thursday is On-Demand Resources In-Depth. Highly recommend you attend that session if you have large assets that you want to get out of your app bundle and not download it into a user directory. Remote notifications. Again, the iPad story and the shared environment is a little different here than it has been previously, but not much. Notifications work the same as a single user iPad. So how does the Shared iPad work? It works like a single-user iPad, but logging in is like powering up the iPad and logging out is like powering down the iPad. You won't get notifications until an iPad's logged in. And you won't get notifications if an iPad's logged out or powered down. Same exists for log in and log out. So this is very much like your app being turned on and off on the device when the device is powered up or powered down. Remote notifications will not be primed if your app runs at least once per device. So if Mia has only encountered the device for the first time, and your app relies on push notifications working, or remote notifications working, unless she's run that app least once on that device, she will not see the notifications. This is just like a non-Shared iPad, but I think it's going to come up more often because changing devices is now so much more easy for Mia. And signing out is like powering off as I said earlier. You will not receive remote notifications. Why did we include a whole slide about this? I think there's some apps out there that may not work as fluidly or as smoothly as you might want without push notifications. So if you have work flows or use cases in your app that really rely on remote notifications to trigger something, something like that. Think it through evaluate your app, and see what changes you can make. Because as Mia's moving from device to device, she may not get the push notifications until she thinks to run your app for the first time. And if there's something you can do to help her with that, or even just document for the administrators making deployment decisions about your app, this will be very helpful. So review your usage of remote notifications and think about how well your app would work if Mia's been working on an iPad on it for say a whole week. And then she suddenly gets a new iPad, will your app work as well until she launches it the first time. Managed Apple ID's. So this is a new type of Apple ID. It's set up by the institution. The institution controls the names, the institution controls the password, but there's also a set of different capabilities associated with the managed iPad. The most important that it has is there are no commerce features. There are very few schools, very few schools that want the students purchasing music on their credit card when they deploy their application. So we've turned off the commerce application, the commerce and stuff like that. The impact for some developers is I have seen some applications put functionality behind a pay wall or put functionality behind an in-app purchase. Schools aren't going to want to license an application like that. They're going to be deployed into an environment where the individual Apple IDs don't have any commerce. There's no credit card bound to the account, your app cannot function in that environment. Now, I'm not saying that you should do this for your general app, you may need to do a different app for schools that you license that don't require in-app purchases just for it to be fully functional. And you should adjust your licensing and pricing appropriately. But the app itself that the school deploys should be fully functional. So don't want for commerce activity to happen before your app is fully functional. Also check for specific frameworks and features that you need. Just don't assume that because they have an iCloud identity that they have everything. We've combed through the operating system and where things are disabled, those frameworks will return appropriate errors. A concrete example is StoreKit. If you use StoreKit and you try to use it while logged on as a Managed Apple ID, you will get an appropriate error telling you StoreKit's offline or unavailable. So, don't assume it's all or nothing, if I have this then I have all these other services. Start checking for individual frameworks to be present that you need. If those frameworks were to return an error, how would your app behave and thank that through for this type of use case. Generally, you can follow the existing practices you've been following if you're already compatible with VPP, which is Volume Purchase Plan, and device based licensing. If your app conforms to VPP licensing and device based deployment, you're already most of the way there, if not all of the way there. But for developers that don't know about VPP and don't know about device based licensing, work with us in the labs, we can bring you up to speed. This will make your app more approachable and open up new markets for you. And finally a quick shout out to web developers. We gave this a lot of thought. So there is a Keychain. I love the Safari AutoFill feature that saves passwords and syncs them in the iCloud Keychain, it made it just hugely useful when we deployed that. But we're thinking Mia logging on to a Shared iPad, and then logging on to a personal account, we may not want that password saved in the keychain where it's stored. So we've given schools the ability to list what particular websites they want to save passwords for in the Keychain. Now, consider moving it to a native app. This is overwhelmingly the best solution. And the solution that our customers expect and your customers expect. If, however, you remain a web-based developer and web-based content, at a minimum there's some documentation update you might want to remind your customers to add your domain name to the Safari domain whitelist so that as the students set up your site for the first time, Safari will prompt them to save their password, and it will get saved into their Managed Apple ID Keychain. And then the next time they visit a different iPad and log onto your website, they won't have to provide their credentials a second time. If you do not list your website or your domain on this domain whitelist, Mia would be forced to log in every time she encounters a new iPad and that would be a frustrating experience for Mia and the school. At a minimum there's a documentation update. At most, maybe use this as a notice that it might be time to consider moving your app to be native on the platform. I've been talking about Shared iPad. I've been talking about business. I've been talking about the new markets that this opens up. But I'm also going to point out, there's nothing here that's unique to Shared iPad. My assertion is is that while Cloud based data is required for Shared iPad to work functionally, all of your users will benefit from moving your app to the Cloud. My wife, just two weeks ago face planted her iPad. We took it to the Genius Bar, they fixed it. She got a new iPad, she started setting up her apps. The apps that didn't get Cloud data, didn't get reinstalled on her app. She just didn't have time. And it makes it easy for them to change devices. So these changes that you're going to invest in are not just investing for Shared iPad. This will make it better for all of your users. All of your users have Cloud data. All of your users have iCloud documents. All of your users have Keychains. All of your users have NSUbiquitousKeyStore. Moving your application data into the Cloud is going to make it better for your entire ecosystem. And in addition to that make it more suitable for education and business use. So business also favors the Cloud. They change devices, they change employees, they hand new devices to a different employee on Monday than was using it on Tuesday. If you can make it more rapid to set up your account and have that employee's data online and accessible on that iPad sooner rather than later, businesses are going to consider your app a favorite choice for them to deploy. So, my argument is the Cloud's a long term trend. If you haven't considered moving your data to the Cloud, this might be the year that that's finally no longer a tenable position. If you're already on the Cloud, review your usage and make sure that everything is working well, because we just opened up a huge new market for you with Shared iPads. So you've done all this, you've moved your user secure data into the Keychain, you've used CloudKit to store the bulk data, because you're not using NSUbiquitousKeyStore for that. You've used NSUbiquitousKeyStore to store your apps initial settings. And you took all your custom networking you moved it up onto NSURLsession. You moved up background tasks for it so that it runs when your app's not in the foreground. Now you need to test it. Make sure that it all actually works. So here's some high-level recommendations on how to test for the app. And there are basically three methods of testing that all boil down to the same method, but we'll go through them one by. Two devices. iPad a, iPad b. You install your app on iPad a, set up an iCloud identity. Run your app. Go through the cycle of storing your data. Maybe your stock app, you store your ticker information, you do all of that sort of stuff. Wait for it to sync. Launch iPad b, log onto the same account, launch your application and see if your data shows up on iCloud b. If not commence the debugging cycle. If it does work, great, you're done. And that will allow you, so basically two different devices with the same iCloud identity is all you need to test to verify that your app's working in a Shared iPad environment. If you don't have two devices, or you just don't want to bother with two devices, you can do the same sort of testing by adding your app, setting up all the data, waiting for the app to sync the data, delete the app and add the app back to the device. That will pull all of the data back. That will pull the NSUbiquitousKeyValueStore, the CloudKit, the Cloud documents. All of that data will come back. If all of that data comes back, again you can check off the box that says you've moved your data to the Cloud. In an extrema case, and most of you in the audience realize this is just a variation on these things. If you really want to know that you've really nailed this, you can erase the iPad between testing sessions. I don't think that's necessary, but I just put it here for completeness. That's really kind of the acid test. Set up your iPad get a whole bunch of data in it. Trust that your Cloud is working, trust that Apple stored the data for you, blow the device away, set it up from scratch again. Does all your data come back? You're in great shape. If your app can pass that sort of test, you have nailed the Shared iPad case and made things better for your consumer users. So verify all of your app's functionality. Verify there's no data loss. Verify offline works. So put the iPad into airplane mode and verify that your user CloudKit, that all the data syncs later when you take it out of airplane mode. Verify your app never asks you for the setup screen again. A very simple test. Install your app, run through the setup screen, delete your app, relaunch your app. Do you get the setup screen? Not done yet. So testing's important. Moving into the Cloud's a very big deal. Once it's there I think you'll be very satisfied with the results and here's some help. If you want more help or more assistance, again there's a lab right after this. We'll all be there to answer questions for you. This was a plea, we had a lot of this from the internal developers. Log out actually tries to do an orderly shutdown of everybody's app. If you're leaking UI background tasks, logout can't complete. And this is upsetting to people. Liam can't log in until Mia's logout session is finished. If you're leaking UI background tasks, your app cannot be terminated. It will eventually time out. It will eventually be killed. But that's not good for anybody. So make sure you're not leaking UI background tasks, because those will block logout. So, that's the technologies you need to adopt and the changes you need to make. And all of these changes make it better for Shared iPad and business use case, but they're kind of the bare minimum changes you need to be useful in those environments. The work that you're going to do is also useful for even your consumer use case. So the good news is is this sort of investment is not just for education and business, it's also for your consumer use case. And it will become baseline for your application. Now there's opportunities to go beyond the minimum requirements of putting your data in the Cloud and you can really, really have your app be world class and be a preferred choice for potential licensers. Like going beyond just adopting the Cloud and adopting some of the newer technologies this year. The first and most exciting technology, how many people were in the session before this with Todd? Oh, good. A good number, the classroom app, one of the most exciting apps. It's kind of silly but it's really kind of cool to be God and sit up there with the Classroom app and control an entire lab form an iPad is really, really kind of very powerful. And one of the key technologies that Classroom app leverages is Universal Links. Universal Links is not new with iOS 9.3, it was introduced with iOS 9. And it provides a feature that allows you to share external links back to your application off the device. It also enables sharing and searching inside your app on the device. It's a huge advantage for you to adopt Universal Links. What's new this year is we've built on Universal Links as a basic understanding that a lot of apps support this. And universal links is one of the key features that Classroom leverages to guide your app, or control your app while in a classroom situation. So if your app supports Universal Links, a teacher anywhere in the world can decide your app is the coolest app in the world, and she can integrate your app into her course curriculum. And she will then use that with the Classroom app to use your app during the session. This will make your app world class and the most desirable app in the App Store for the school to license. If you can't use Universal Links, it will make it harder for a teachers to integrate your app into their curriculum and harder for them to use it with the Classroom app. And therefore this is an opportunity for you to surprise and delight your customers in that your app will work really well in a classroom situation. But the key to this is Universal Links. And just like the Cloud stuff this is beneficial for your app in or out of a shared use case environment, but this is more evidence that we're piling on these core technologies to make your app as useful as possible. Another new feature with iOS 9.3.2, some app developers do automatic assessment apps, these are apps that do standardized testing or assessment of a student. They put it in full screen mode, they lock it down. We've made some changes to make this more accessible. The biggest change is you can now be in automatic assessment app without being on a supervised iPad. You get an entitlement for this, you can request it. And in particular you can now call an API to request different keyboard features. Like you may not want a spelling app allowing auto correction happening while the student is being assessed for their spelling test. So apps can now drive this. They can request an entitlement for this and more importantly it's no longer restricted to just shared, or supervised iPads it can run on any iPad. And so if you're an assessment-based application or were considering being an assessment-based application, iOS 9.3.2 has opened up more opportunities for you. Again come to the lab, we can give you more details. But that's part of iOS 9.3.2. Managed App Configuration. This was introduced with iOS 7 and basically what this does is allows administrator to blast initial app settings out to thousands, or hundreds, or tens of thousands of iPads so that every app starts in an initial configuration. It's really simple to adopt. There's just an additional key in your NSUser defaults. If you see that key, the key points to an app specific dictionary that you, as the developer, control. And the administrator who set up those things will provide the default dictionary for your app. The problem was is there was different ways that MDM vendors chose to send this information, configuration this information on how to package it. So new for this year is there's a community, not affiliated with Apple, but we're a participant, where all the various MDM, Mobile Device Management server vendors are standardizing the payloads. The standardization efforts documented at the URL you see here on the website. The biggest advantage is you can now have a single app that supports multiple MDM vendors. And as I was researching this presentation and I'm new to the device management realm within the past 18 months. I was surprised to find out that this was the case. So right now there's an app in the App Store, today, we're not making this up, that has this many SKU's. Now what I can tell you is they're not using auto layout so that's why they have a different screen on iPhone and an iPad app. But the six that you see, and you see each one of these six icons represents a different MDM server that they have to support. So, as you can imagine this is a bit of a nightmare for them to maintain. So by moving onto the new app, the managed application consortium, they should be able to turn their apps from this into this. They can have one version for the phone that supports all the MDM vendors and they can have one version for the iPad that supports all the MDMs. So that would be a huge advantage alone. If they move onto Auto Layout and use all of Apple's latest technologies, they should be able to do this. That would be one SKU in the App Store that supports all the different screen sizes and also can be managed from all of the major MDM server vendors. So if you're going to go into this market and you want your app to be managed through application management, look into the new consortium, work with them and learn to adopt what they've got. So, in conclusion, along with Shared iPad, I hope to leave you with a message that regards to what market you're selling into the iOS ecosystem is rich, it's vibrant, it's profitable, it's open to everybody. But it's also very demanding in that customers expect a lot. They expect Auto Layout, they expect the flexibility, they expect you to be on Swift, they want AirPlay, they want 3D touch. And this year, new right over here, SiriKit. So that's another technology. What can your app do with Siri that could be revolutionary in an educational business environment for you to adopt SiriKit? So keep your app fresh. Keep your app vibrant. Adopt the cloud technologies. And what you're doing is making your app better for your consumers and better for business use and institutional use, and in particular, education. So, I appreciate your time. I've really enjoyed speaking to you. I'll be happy to answer questions in the lab later if you have any. I have co-workers there and I have some guidance for you. So there will be links, any links found in this session will be at this link. And here's a little roadmap of either stuff to review on video if you've already missed it, or stuff that's upcoming. So we've got What's New in Apple Device Management, you're going to have to review that on video if you didn't see it. Improving Existing Apps with Modern Best Practices. This is at 3 p.m. immediately following this session. So this will be a more in-depth view of the best modern implementation techniques for apps. Optimizing the use of On-Demand Resources is happening Thursday. Extending your App with SiriKit is happening on Thursday. What's New in CloudKit, Thursday. CloudKit Best Practices. If you're going to move your app into the Cloud these are the engineers that are going to tell you in gory detail how to do it. Again, thank you for your time, and I appreciate you attending.
2019-04-25T00:17:36Z
https://developer.apple.com/videos/play/wwdc2016/304
Case Summary: Claimant, a certified nurses aid, fell and injured her back in April 1998 but returned to work and continued working until August 1999, when she quit work. She claims that her doctor told her to quit working on account of her back pain and seeks temporary total disability benefits. Held: Claimant did not prove entitlement to temporary total disability (TTD) benefits. She was not a credible witness. Her story about quitting work was contradicted in numerous aspects. The Court finds that she did not quit work on account of her back condition and that her wage loss is not the result of her injury. Moreover, the medical evidence failed to establish that she had not reached maximum medical improvement at the time she ceased working. Benefits: Temporary Total Benefits. Where claimant quit work for reasons unrelated to her industrial injury her wage loss is not the result of her injury and she is not entitled to temporary total disability benefits. Benefits: Temporary Total Benefits. Where medical opinion that claimant has not reached maximum medical improvement is based on the fact that claimant would benefit from physical therapy, and the claimant has had the opportunity for the therapy but failed to pursue it, the claimant has reached MMI and is not entitled to temporary total disability benefits. Maximum Medical Improvement. Where medical opinion that claimant has not reached maximum medical improvement is based on the fact that claimant would benefit from physical therapy, and the claimant has had the opportunity for the therapy but failed to pursue it, the claimant has reached MMI and is not entitled to temporary total disability benefits. ¶1 The trial in this matter was held on November 27, 2000, in Kalispell, Montana. Petitioner, Joyce Peone (claimant), was present and represented by Ms. Laurie Wallace. Respondent, Liberty Northwest Insurance (Liberty), was represented by Mr. Larry W. Jones. No trial transcript has been prepared. ¶2 Exhibits: Exhibits 1 through 11 were admitted without objection. ¶3 Witnesses and Depositions: The Court received and has considered the depositions of claimant, Dr. Victor M. Davis, and Gary Schild. Claimant, Connie Fryslie, and Walter Woyden were sworn and testified at trial. 1. Whether the Petitioner is entitled to temporary total disability benefits from the date she was released from work, August 23, 1999, and continuing until alternative positions can be identified or the Petitioner is released to return to her time-of-injury position. 2. Whether Petitioner is entitled to a 20% increase of award for refusal to pay benefits pursuant to section 39-71-2907, MCA. 3. Whether Petitioner is entitled to reasonable attorney fees and costs pursuant to section 39-71-611, MCA. ¶5 At trial, counsel for claimant waived oral argument on the penalty issue, but reserved the right to brief that issue should the Court find claimant is entitled to additional temporary total disability (TTD) benefits. ¶7 Claimant is 40 years old. She has worked as a certified nurses aid since the early 1980s. ¶8 In 1996, claimant began working for Mission Mountain Enterprise (Mission Mountain). Mission Mountain provides in-home assistance to mentally and physically disabled people. ¶9 In 1998, the claimant ordinarily worked with one client, Michelle. Claimant's regular duties with Michelle were to assist her in making her bed, cleaning house, bathing, and other household duties. Michelle was described by claimant and claimant's supervisor as "challenging." ¶11 At the time of the accident, Mission Mountain was insured by Liberty, which accepted liability for the accident and paid medical benefits. Mild left lateral disc bulge at L4-5 which creates mass effect upon the left subarticular recess and anterior aspect of the left neural foramen. While there is no obvious nerve root impingement, this does appear to encroach upon the left L5 nerve root within the lateral recess. (Ex. 3 at 4.) Both Dr. Davis and Dr. David T. Schloesser, a neurologist who later examined claimant, noted that if the disk bulge imaged on May 22, 1998, were causing radicular symptoms then those symptoms should have been in her left leg, however, claimant in fact had no left leg symptoms. (Ex. 2 at 1; Ex. 5 at 5.) Thus, it was unlikely that the disk bulge was clinically significant. ¶16 Claimant continued to be symptomatic, however, she also continued to work. Need to write to W.C. to see if they are interested in work evaluation or further rehab. Patient states PT is quite painful for her. Not certain that she's doing any stretching exercises. States she had a mechanical LB injury working at the nursing home in 1991 or 1992, states this is much more severe, much more longer lasting and the 1st was not associated with any leg pain. I feel most of Ms. Peone's symptoms are due to muscle tightness, lack of mobility at the present time. However she also clearly has an unstable back which is likely to respond only to time. I believe she is somewhat limited in her current work activities with limitations placed on bending, lifting any thing greater than 15 pounds, walking on unstable ground, sitting for more than 45 minutes, stooping or bending. I expect these limitations will continue. ¶21 Claimant testified she took a note from Dr. Davis setting out her lifting restrictions to her employer, and gave it to either Connie Fryslie (Fryslie) or Carol Hoover (Hoover). Fryslie supervised claimant from 1996 through 1999, except for approximately six months when Fryslie was on medical leave. According to Fryslie, claimant did not give her any note regarding restrictions. ¶22 Walter Woyden (Woyden), who supervised the program in which claimant worked, testified that Hoover handled payroll matters, including workers' compensation and time off issues. Woyden could recall nothing about work restrictions for claimant while she was employed. Hoover did not testify. ¶24 Claimant was not a credible witness and I am unpersuaded that she ever notified her employer of the November 1998 work restrictions. ¶27 Claimant testified she then went to Fryslie and told her the doctor had restricted her lifting and asked to be switched to another client who would be easier to handle. According to claimant, Mission Mountain did nothing in response to her request. She recalled being transferred to another client for one weekend after an incident with Michelle but testified that the transfer was due to the incident and not on account of her back problems. ¶28 Claimant testified that she "asked about" three different openings at Mission Mountain and that she made it clear to her supervisors that her requests were on account of her back problems. According to claimant, "Nothing was done." (Trial Test.) Claimant also testified that she applied for an opening at the Work Activity Center operated by Mission Mountain, however, she conceded she did not tell her employer she was seeking the job on account of her back condition. ¶29 Both Fryslie and Woyden testified claimant never asked to be moved to other clients on account of back problems or any other physical restriction. Fryslie did recall that claimant complained about Michelle's aggressive conduct and that she responded by scheduling claimant to work with a different client the next weekend. However, claimant did not show up to work with that client that weekend and was thereafter rescheduled to work with Michelle. ¶30 Fryslie also recalled meeting with claimant after the incident where claimant was hurt helping Michelle bathe. Fryslie reminded claimant of Mission Mountain's policy against its employees placing themselves at risk of injury when attending clients. Fryslie testified that claimant did not request she be assigned a different client. ¶31 Fryslie testified that if she or Mission Mountain had been requested to reassign claimant on account of her back condition, they would have attempted to do so. ¶32 Obviously, the testimony concerning claimant's request to change clients is conflicting. I am unconvinced by claimant's testimony and do not find her credible. I find that she did seek to change clients after one incident involving Michelle, where Michelle attempted to attack her with a knife. I also find that she failed to take the new assignment to another client, voluntarily returned to care for Michelle, and, in any event, never asked to change clients on account of her back condition. ¶35 Meanwhile, claimant stopped attending Mission Mountain meetings and classes put on by her employer. According to Fryslie, claimant called in with excuses a couple of times, but missed other scheduled meetings without any excuse. Woyden testified that some time prior to her last day of work he had a talk with claimant about her failure to attend scheduled meetings and classes. The conversation was between a month to six months before she stopped working. ¶36 Claimant's last day of work was August 16, 1999. On August 17, Fryslie received a voice mail from claimant stating, "On the advice of my doctor, I'm resigning my job." (Trial Test.) Fryslie testified she then tried but was unable to contact claimant. She had previously had difficulty contacting claimant and had sometimes sent messages to claimant through a friend. Fryslie tried that method, and even stopped by claimant's residence, but could not locate her. (2) c/o leg pain since 6/20/99 - reinjured L5 spine. Then aggravated by severe contusion - jumping into back of pick up 7/20/99. Has not been able to stand or walk well [illegible]. Based on my notes and the fact that we were following her up for this potential infection that I was quite worried might turn into something much more serious than what it did, I was assuming we were referring to the leg pain in the right leg caused by her bruise and possible infection. And that's what I thought she was saying when she said she couldn't stand up and walk on it. Because there's nothing in that note, I don't think, referencing physical exam of her back. Except to say her seated straight leg raises were negative. . . . The only thing I can say about it was I was not dealing with her back at that visit . . . I was dealing with her leg injury. Well, I had written the original excuse on account of one injury, which was totally unrelated to her back injury. But she decided on her own that she wasn't going to go back to work there because it was too much of a struggle on her back. Eventually, the leg bruise resolved completely and she would have been able to continue to work from that standpoint. But she was just tired of putting herself at risk, lifting these difficult patients, and wouldn't give her anybody she thought she could work with a little better, so she just decided not to go back to work. I said I did not specifically authorize or recommend that because she didn't come to me and say, Doc, I can't go back to work, my back hurts too much. But had she done so, I would have said that's reasonable. ¶41 Dr. Davis testified that his after-the-fact support for claimant's decision to quit working was based on the understanding he then had of her back condition. (Id. at 61-63.) As noted below, after an MRI conducted in June of 2000, Dr. Davis revised his opinion of what claimant's condition was at the time she quit work. ¶42 According to claimant, she was under the impression Dr. Davis took her off work due to her back condition. Although the August 23 note only took claimant off work through September 12, claimant maintained she believed Dr. Davis took her off work permanently. She testified that she brought the release to Woyden just after receiving it from Dr. Davis. Initially, she testified this was on August 23 and that she had worked the day before, August 22. She testified she made the phone call to Fryslie after this point to make sure she understood what had happened. ¶43 On cross-examination, which commenced after a recess following claimant's direct examination, claimant testified she was no longer sure whether or not she had worked for Mission Mountain after August 17. Later, she testified that after thinking about it, she believed she called in sick around then and may not have worked after August 17. ¶45 Woyden recalled seeing Dr. Davis' August 23rd note, although he was not sure whether claimant gave it to him personally or it came through Fryslie. ¶46 I find claimant's testimony concerning her cessation of work not credible. Her story is not supported by Dr. Davis, who took her off work temporarily on account of her leg. She quit work August 17th, which is prior to his taking her off work. She then disappeared and her supervisors at Mission Mountain were unable to find or contact her. Mechanical low back pain secondary to degenerative disc disease, mild, L5-S1 and herniated nucleus pulposus L4-5. Right subjective leg sciatica with normal neurologic exam. At this time, I feel that she has reached maximum medical improvement and utilizing AMA Guide to Evaluation of Permanent Impairment, 4th Edition, Table 75, page 3/113 I would estimate her permanent whole person impairment to be 5%. As far as treatment recommendations are concerned, I would strongly discourage any short term continued narcotic use. The patient has not had a trial of epidural steroid injections and I highly recommend this to hopefully diminish her pain, increase her functional capacity and decrease her use of narcotics. This treatment of itself, however, will not effect her MMI or impairment. She wishes to discuss this further with Dr. Davis, which I feel is indicated. The patient has had two previous MR scans of the lumbar spine; one done in 1992, and one done in 05/98. On the study in 1998, there was suggestion of mild disc bulge on the left side laterally. While it encroached on the foramen in the lateral recess there was no definite nerve root impingement. At the present time, I do not see this abnormality, and it may well have resolved on its own. The patient has some minimal facet disease at L5-S1 with slight narrowing of the disc with no herniation or focal nerve root abnormality. Q. Now, this particular case, her reliability as a historian is going to be very important to the weight to give your opinions as to what she could do and couldn't do physically because of back problems? A. Correct. Well, that is true except that I interpreted that study as indicative - the MRI of 1998 as being indicative of a problem that was much worse than actually existed. Q. Could you explain that? A. I gave more credence to that report of 1998's MRI as indicative of a major problem. And then when it was not redemonstrated in June, it was only then that I realized that things were not quite as serious as they were. But I didn't have the report of the June study to indicate that things had reversed or things had corrected. Q. Taking a look at the 2000 study, it says at L4-5 there's a left lateral disk bulge which partially defaces the left subarticular recess and the inferior aspect of the left neuroforamen. A. Back in '98, correct. Q. That's '98. I'm sorry. And then you have Dr. Layne's interpretation? A. I have Dr. Layne's interpretation, 2000 study. And he states specifically in his comments, not in the impression but in the narrative, on the study in 1998 there was suggestion of disk bulge on the left side laterally, with encroachment on the foramen in the lateral recess, there was no definite nerve root impingement. At the present time I do not see this abnormality and it may well resolve on its own. Q. This idea that had she asked you in August or September of '98 to be taken off of work because of her low back, you testified, had she asked you back then, you would have, correct? A. I would have said that was a prudent course of action. Q. And that would be based on her complaints, correct? A. Correct. And based on the fact that I thought there was more pathology in her disk. There was objective evidence for more pathology in her disk than actually existed. This letter is in response to your letter of August 14, 2000. In answer to your questions, number one, Joyce Peone was given a work excuse on 08/23/99 due to acute knee pain and swelling, which made it impossible for her to walk. She subsequently did not return to work because she did not feel it was safe to continue her employment there due to an aggravation of her injury, which occurred when her main client intentionally went limp while being transferred. The sudden increase in weight further sprained her back. She repeatedly asked her employers to transfer her to a more manageable client who was more cooperative in her daily care, but the employer refused. I did not specifically authorize or recommend this cessation of work, but given the circumstances, I concurred with her decision. It should be noted that Ms. Peone worked for sixteen months after the injury with very limited time off from work as a result of her pain and suffering. I believe she made a good faith effort to work through her illness, pain and injury, but was met with increasing resistance by her employer. I do not feel she was able to return to her previous position and job without facing substantial risk for re-injury and aggravation of her condition. As regards her return to maximum medical improvement, I am aware that EMG and studies were normal and the most recent MRI in 06/00 did not demonstrate the previous disk herniation at L-5, S-1 on the left side. Therefore, I believe she has probably returned to maximum medical improvement with the following reservations: 1) She is likely to experience some continued chronic pain as a result of this injury; and 2) She was never given an adequate course of physical therapy following the injury and does not currently have a stretching and flexibility exercise program, which would improve her mobility and, probably, pain and future status. I have recommended this to her on several occasions in the last eight months. She is willing to attempt this, but your company has been unwilling to authorize it. ¶57 Claimant testified she found assembly work after leaving Mission Mountain, but left after approximately one month because the work hurt her back. She maintains her back condition still interferes with her ability to work. ¶58 Claimant was not a credible witness. Her testimony regarding her last day of work shifted during the trial. Documentary evidence and testimony demonstrates that she quit her job before she got an excuse to be off from work for three weeks and that she was not told to quit work by her doctor, as she claims. Although she claims that her physical therapist told her in June 1998, not to come in, the therapist's records indicate that she was a "no show" and that he had asked claimant to come in even if she was hurting so her program could be revised. (Ex. 9 at 1.) Although she was not pursuing physical therapy, when claimant visited Dr. Schure on July 14, 1998, she told the doctor she was. (Ex. 5 at 6.) Her testimony that she asked for accommodations from her employer and to change clients was contradicted by her supervisors. ¶59 I find that claimant did not quit because of her back condition or because of her employer's refusal to accommodate her back condition by changing her clients. I also find no credible evidence that claimant was in fact temporarily totally disabled when she left employment with Mission Mountain. While Dr. Davis testified he would have supported a decision by claimant to leave employment, he also testified that this would have been based on his understanding at that time of claimant's condition. After the June 2000 MRI he recognized there was no evidence of the pathology he thought existed. His post-hoc support for claimant's leaving her job was also based on his erroneous belief Mission Mountain had refused to accommodate claimant. ¶60 Claimant was injured on April 6, 1998,(1) therefore the 1997 version of the Workers' Compensation Act applies. See, Buckman v. Montana Deaconess Hospital, 224 Mont. 318, 321, 730 P.2d 380, 382 (1986). ¶62 The claimant bears the burden of proving by a preponderance of the evidence that she is entitled to compensation. Ricks v. Teslow Consolidated, 162 Mont. 469, 512 P.2d 1304 (1973); Dumont v. Wicken Bros. Construction Co., 183 Mont. 190, 598 P.2d 1099 (1979). ¶63 Claimant has not carried her burden. I am unpersuaded she quit her job on account of her back condition or that she sought transfer to a different, less troublesome client. She has failed to prove that a client and situation she could handle were unavailable to her had she sought accommodation from her employer. Further, Dr. Davis' testimony that he was not sure that claimant had reached MMI by August 1999 was predicated upon her not having had a sufficient opportunity for physical therapy, however, claimant failed to pursue therapy when offered. Since the failure is attributable to her, Dr. Davis' testimony does not establish she had not reached MMI. Because the claimant failed to pursue physical therapy, she is at MMI since she is lacking a commitment to pursue therapy, her condition will not likely improve. ¶64 1. Claimant is not entitled to temporary total disability benefits and her petition is dismissed with prejudice. ¶65 2. This JUDGMENT is certified as final for purposes of appeal pursuant to ARM 24.5.348. ¶66 3. Any party to this dispute may have 20 days in which to request a rehearing from these findings of fact, conclusions of law and judgment. DATED in Helena, Montana, this 1st day of February, 2001. 1. As set out in paragraph 25, she also suffered a temporary exacerbation on June 20, 1999. However, the medical evidence established that she returned to her pre-June 20th condition within a short time. It does not appear that a claim was made with respect to the July 20th incident and claimant's petition is based entirely on the April 1998 injury.
2019-04-21T06:12:14Z
http://wcc.dli.mt.gov/P/PEONE_J_FFCL.htm
Nosocomial infection is one of the most common complications within health care facilities. Certain studies have reported outbreaks resulting from contaminated hospital environments. Although the identification of bacteria in the environment can readily be achieved using culturing methods, these methods detect live bacteria. Sequencing of the 16S ribosomal RNA (16S rRNA) gene is recognized to be effective for bacterial identification. In this study, we surveyed wards where drug-resistant bacteria had been isolated and compared conventional culture methods with 16S rRNA gene sequencing methods. Samples were collected using sterile swabs from two wards (northern and southern) at Gunma University Hospital contaminated by Acinetobacter sp.. We extracted DNA directly from the swabs. Following extraction, the DNA was amplified using polymerase chain reaction (PCR). The PCR products were cloned using the plasmid vector. The plasmid DNA were sequenced, and identification were performed using database. 16S rRNA gene sequence analyses were compared conventional culture methods. In the northern ward, Acinetobacter sp. was detected from only two of 14 samples using the culture method. In contrast, 16S rRNA gene sequencing analysis detected Acinetobacter sp. from seven of 14 samples. Drug-resistant Acinetobacter sp. was isolated from bathrooms of the southern ward and was detected from four of seven samples using the culture method in comparison with six of seven samples by 16S rRNA gene sequencing analysis. Molecular biological analysis showed a higher sensitivity to detect specific bacteria and detected a greater number of species than the culture method. Our results suggest that 16S rRNA gene sequencing analysis is useful to identify range of contamination which were not found in conventional culture method. When a nosocomial outbreak cannot be adequately controlled, molecular biological analysis may serve as a useful tool for environmental surveys in hospitals. Health care facilities provide an environment conducive to exposure and transmission of bacteria. Nosocomial infections represent one of the most common complications within health care facilities. At least 5–10% of patients admitted to acute care hospitals acquire an infection during hospitalization . Drug-resistant bacteria cause nosocomial infection in patients who have received several courses of antibiotics and those with immune deficiency associated with malignancies or transplants . Some studies have reported outbreaks resulting from the contaminated hospital environment [3, 4]. Although culture methods readily identify environmental bacteria, they only detect live bacteria. Previous research showing that <1% of bacterial species within a given environment are culturable suggests that true diversity is overlooked by studies relying only on culturing [5, 6]. The gene target most commonly used for bacterial identification is the 16S rRNA gene, which is an approximately 1500-bp gene encoding a portion of the 30S ribosomal subunit . 16S rRNA gene sequence analysis is not only widely used as a taxonomic tool but also recognized as an effective reference method for bacterial identification . Samples for 16S rRNA sequence analysis have been expanded from the bacteria in environments such as the oceans and soils to clinical settings. [9–12]. Studies of microbial diversity in child care facilities using culture-independent methods have suggested that knowledge of microbial diversity facilitates better understanding of public health risks in these environments . Therefore, to obtain accurate information regarding contaminated environments within health care facilities, comprehensive reevaluation of microorganisms using culture-independent methods is required. The number of patients testing positive for Acinetobacter sp. has increased, suggesting that outbreaks of Acinetobacter sp. infections have occurred. We surveyed the wards where Acinetobacter sp. were isolated using culture and culture-independent methods. We aimed to compare these methods and obtain useful information on infection control. Samples were collected from environments contaminated by Acinetobacter sp. at Gunma University Hospital (northern and southern wards). Sampling places were determined from the clinical course of the patients who isolated Acinetobacter sp. in consideration of estimated route of infection and range of contamination. As a result, we surveyed the patient’s rooms of the northern ward and the bathroom of the southern ward. Environmental samples were collected twice using sterile swabs. One of the sterile swabs were applied to Sheep blood agar (Eiken Chemical Co., Tochigi, JP) and chocolate agar plates (Becton, Dickinson and Company, Franklin Lakes, NJ), which were incubated of aerobic and anaerobic conditions (5% carbon dioxide gas) 48 h at 35 °C. The following day, grown bacterial colonies were identified using kits as necessary. Other of sterile swabs were then soaked in sterile DNase-free 1.5 mL microcentrifuge tubes containing 200 μL lysis buffer (25 mM Tris–HCl p H 8, 2.5 mM ethylenediaminetetraacetic acid (EDTA), and 1.2% Triton X-100). The swaps were applied to various environmental surfaces in each ward. We used a protocol for preparing lysates to lyse gram-positive bacterial cells using the Invitrogen PureLink Genomic DNA Kit (InvitrogenTM, Carlsbad, CA). Following centrifugation of the samples at 10,000 × g for 2 min, the supernatant was discarded and 180 μL lysis buffer containing fresh lysozyme was added to obtain a final lysozyme concentration of 20 mg/mL. The reaction mixtures tubes were incubated at 37 °C using a heat block for 30 min. Subsequently, 20 μL Proteinase K (PureLink Genomic DNA Kit, InvitrogenTM, Carlsbad, CA) and 200 μL PureLink Genomic Lysis/Binding Buffer (PureLink Genomic DNA Kit, InvitrogenTM, Carlsbad, CA) were added to the tubes and mixed well by brief vortexing. The tubes were incubated at 55 °C using a heat block for 30 min. A volume of 200 μL 100% ethyl alcohol (EtOH) was then added to the tubes and mixed well by vortexing for 5 s to yield the homogenous solutions. All reaction mixtures tubes were subjected to a purification procedure using the Invitrogen PureLink Genomic DNA Kit according to the manufacturer’s instructions. Purified genomic DNA was eluted in 50 μL PureLink Genomic Elution Buffer (10 mM Tris–HCl pH 9.0, 0.1 mM EDTA). Following extraction, the purified genomic DNA was confirmed using a NanoDrop ND-1000 spectrophotometer (NanoDrop Technologies, Wilmington, DE) at 260 nm. 16S rRNA genes were amplified from purified genomic DNA using the universal primer 8 F(5’-AGAGTTTGATCCTGGCTCAG-3’) and 805R (5’-GACTACCAGGGTATCTAATCC-3’). The primers react with highly conserved regions of the bacterial 16S rRNA gene to provide PCR products of approximately 800 bp. The PCR products from amplification have been shown to be particularly useful for database analysis and identification of bacterial sequences . A Takara Taq Hot-Start kit (Takara Bio Inc., Shiga, JP) was used for amplifications. PCR reactions were performed in a total volume of 50 μL, consisting of 0.25 μL Takara Taq DNA polymerase Hot-Start (5 units/μL), 5 μL 10 × PCR buffer with MgCl2, 4 μL deoxynucleotide (dNTP) mixture (2.5 mM each), 1.5 μL each of primer (20 μM), 5 μL of sample DNA as a template, and sterilized distilled water. Cycling conditions included a initial denaturation at 95 °C for 5 min, followed by 28 cycles of 30 s 95 °C denaturation, 30 s annealing at 55 °C, and 1.5 min elongation at 72 °C, followed by a final extension of 10 min at 72 °C. Afterwards, we confirmed bands of the PCR products that corresponded to the 800 bp using 1.5% agarose gel. PCR products were subjected to a purification procedure using the QlAquick PCR Purification Kit (QIAGEN, Valencia, CA) according to the manufacturer’s instructions. Purified PCR products were eluted in 50 μL sterilized distilled water. Following extraction, the purified PCR products were quantified using a NanoDrop ND-1000 Spectrophotometer (NanoDrop Technologies, Wilmington, DE). The purified PCR products were cloned using the TOPO TA Cloning Kit for Sequencing (InvitrogenTM, Carlsbad, CA) according to the manufacturer’s instructions. Cloning reactions were performed in a total volume of 6 μL, consisting of 0.5 to 4 μL purified PCR products, 1 μL salt solution (1.2 M NaCl, 0.06 M MgCl2), 1 μL TOPO vector (10 ng/μL plasmid DNA), and sterilized distilled water. The cloning reaction mixture tubes were mixed gently and incubated for 10 min at room temperature, following which they were placed on ice. Transformation using Takara Escherichia coli DH5 α competent cells (Takara Bio Inc., Shiga, JP) was performed according to the One Shot® chemical transformation protocol of the TOPO TA Cloning Kit for sequencing. The transforming reaction mixture tubes were then incubated on ice for 5 min. Next, the cells were heat shocked for 30 s at 42 °C without shaking, and the tubes were immediately transferred to ice. A volume of 250 μL S.O.C. medium (2% tryptone, 0.5% yeast extract, 10 mM NaCl, 2.5 mM KCl, 10 mM MgSO4, 10 mM MgCl2, and 20 mM glucose) was then added. The tubes were tightly capped and shaken at 200 rpm horizontally at 37 °C for 1 h. The suspensions of competent transformed E. coli were then spread at volumes of 10 and 50 μL on the prewarmed agar plates containing ampicillin (InvitrogenTM, Carlsbad, CA) and were incubated overnight at 37 °C. By the following day, colonies had grown from the agar plates, and 15 colonies were randomly selected and cultured overnight at 37 °C in Falcon 2059 tubes (Becton, Dickinson and Company, Franklin Lakes, NJ) in 1 mL of lysogeny broth (LB) medium (Fisher Biotech, Fair Lawn, NJ) containing 100 μg/mL ampicillin. LB medium cultured overnight was collected into sterile DNase-free 1.5 mL microcentrifuge tubes. The tubes were then centrifuged at 12,000 × g for 2 min, with the pellets used for further analysis and the supernatant discarded. The plasmid DNA in the pellets was isolated using the PureLink Quick Plasmid DNA Miniprep Kit (InvitrogenTM, Carlsbad, CA) according to the manufacturer’s instructions. Purified plasmid DNA was eluted in 75 μL sterilized distilled water. The primer T3 (5’-ATTAACCCTCACTAAAGGGA-3’) was used for sequencing. Sequencing of purified plasmid DNA was completed using the Applied Biosystems 3730xl DNA sequencer. Identifications were performed using the Basic Local Alignment Search Tool (BLAST), with a similarity cut-off of 99%. Acinetobacter sp. was detected from only two of 14 samples using the culture method. In contrast, using 16S rRNA gene sequence analysis, Acinetobacter sp. was detected from seven of 14 samples. Thus, positive results were obtained for five samples by only the 16S rRNA gene sequence analysis. Table 1 shows the results of the environmental survey of the northern ward comparing the 16S rRNA gene sequence analysis and the culture method. Acinetobacter sp. was not detected using the culture method in the nurses’ station; however, 16S rRNA gene sequence analysis provided positive results for three samples: the personal computer, faucet, and outlet samples. In patients’ rooms, Acinetobacter sp. was detected from only two samples using the culture method. These two samples were obtained from intubation tubes. In contrast, using 16 s rRNA gene sequence analysis, four samples containing the different samples from the culture method were identified as positive: the intubation tubes, the aspirator, and railings of a bed. Several samples showed different results between the 16S rRNA gene sequence analysis and the culture method. The various bacteria identified by 16S rRNA gene sequence analysis but not the culture method were collected from dry environmental surfaces. Six samples presented anaerobes by 16S rRNA gene sequence analysis. While 16S rRNA gene sequence analysis could not detect Aspergillus, these fungi were detected by the culture method. Drug-resistant Acinetobacter sp. were detected from four of seven samples using the culture method. These four samples were collected from the faucet, bath chair, handrail, and the drain outlet of the bathroom. In contrast, 16S rRNA gene sequence analysis detected Acinetobacter sp. from six of seven samples. These six samples were collected from the faucets, bath chair, the bathtub drain, the handrail, and the drain outlet of the bathroom. In particular, two samples were detected only by 16S rRNA gene sequence analysis. Table 2 shows the results of the environmental survey of the bathroom of the southern ward comparing the 16S rRNA gene sequence analysis and the culture method. Several samples showed different results between the 16S rRNA gene sequence analysis and the culture method. 16S rRNA gene sequence analysis detected uncultured bacteria from the shower head of the bathroom. Fungal strains were not detected using the 16S rRNA gene sequence analysis, but were detected by the culture method. The spectrum of organisms causing nosocomial infections is under continual flux. From the 1970s through to 2000, the spectrum of nosocomial pathogens shifted from Gram-negative to Gram-positive organisms, and Candida spp. emerged as a major problem . More recently, multidrug-resistant Gram-negative rods have become increasingly prevalent in many hospitals . Acinetobacter sp. is rapidly emerging as a pathogen in health care settings, where it results in infections that include bacteremia, pneumonia, meningitis, urinary tract infection, and wound infection . Acinetobacter sp. is able to survive for long periods on dry surfaces, and this ability to tolerate desiccation may contribute to its persistence in hospitals . Treatment options are severely limited, and carbapenems are the agents of choice for treating most drug-resistant infections . Unfortunately however, carbapenem-resistant Acinetobacter isolates are increasingly reported worldwide . Carbapenem-resistant Acinetobacter infections have an extremely high crude mortality rate and occur most frequently in severely ill patients . In the present study, 16S rRNA gene sequence analysis showed higher sensitivity to detect specific bacteria than the usual culture method. In addition, some bacteria strains that were not detected using the culture method were detected in the environmental samples. In the case of an outbreak, environmental surveillance in a hospital is usually performed using the culture method [3, 4, 19, 20]. The culture method requires an appropriate culture media and culture condition that accept target bacteria. In addition, some bacteria require an extended time for isolation; thus, a delay may be experienced in obtaining the preliminary results. In the present study, the culture method was not able to detect five of the seven samples that the 16S rRNA gene sequencing analysis identified as positive. This is because the samples did not obtain viable bacteria. On the other hand, 16S rRNA gene sequence analysis has been used to identify novel and emerging pathogens and to define complex microbial communities . This analysis is especially valuable for detecting bacteria that are slow growing, biochemically inert or variable, and fastidious. In addition, 16S rRNA gene sequence analysis has enhanced our understanding of previously unrecognized, often opportunistic pathogens . According to recent studies, this molecular biology analytical method has been used in the search of pathogens of infectious diseases, reporting a higher rate of detection than the usual culture method [9, 23]. Indeed, 16S rRNA gene sequence analysis provides a comprehensive assessment of microbial diversity compared with culturing alone, and is an excellent complement to the culturing approaches. In the present study, anaerobic bacteria were detected in six samples. The inconsistencies between the 16S rRNA gene sequence analysis and the culture method observed in the present study suggest that the culture method alone may not fully express precise bacterial information in the contaminated environment of a hospital. To our knowledge, this is the first report that 16S rRNA gene sequence analysis is applicable to infection control by detection of contaminated area undetectable by usual culture method. This analysis might become a useful tool for environmental surveys in hospitals in cases of nosocomial outbreaks. There are several limitations associated with the present study. First, closely related species might be difficult to distinguish using 16S rRNA gene sequence analysis, and the identification of bacteria to a species level might be inaccurate. Second, the antimicrobial susceptibility of bacteria is not obtained by 16S rRNA gene sequence analysis. Third, fungal strains could not be detected using 16S rRNA gene sequence analysis. Finally, the number of clones analyzed in the present study was 15 per library, which might be insufficient to detect very small fractions of the library. Because 16S rRNA gene sequence analysis is more sensitive to detect in environmental samples, it is possible to identify range of contamination which were not found in conventional culture method. This analysis might become a useful tool for environmental surveys in hospitals in cases of nosocomial outbreaks. This work was supported by JSPS KAKENHI Grant Number 21591291. AM carried out the molecular genetic studies, participated in the sequence alignment and drafted the manuscript. YT participated in the sequence alignment, and participated in the design of the study and helped to draft the manuscript. MM participated in its design and coordination and helped to draft the manuscript. All authors read and approved the final manuscript.
2019-04-24T07:47:59Z
https://jphcs.biomedcentral.com/articles/10.1186/s40780-017-0074-y
ABSTRACT: Diatonic keyboard tunings in equal temperament, just intonation, meantone and well tempered scales are derived from Pythagorean tuning using algorithms whose operations involve combinations of pure fifths and syntonic commas. Graphic diagrams of the line of fifths are used to show the harmonic and mathematical relationships between common tunings and temperaments. Four modes of just intonation are derived from Pythagorean tuning by an algorithm that narrows each major third by one syntonic comma. Equal temperament is approximated with imperceptible error by algorithms that narrow Pythagorean and justly tuned enharmonic intervals by one or more syntonic commas. [1.1] This article describes algorithms that map the traditional harmonic tunings and temperaments for the keyboard: Pythagorean tuning, equal temperament, just intonation, and historical variations on meantone temperaments. Keyboard tuning is used because it has been worked out in detail over hundreds of years and is understood to give a reasonable approximation of the pitch choices made by performers on instruments without fixed pitches. I have excluded analysis of multiple divisions of the octave into more than twelve notes because they were not commonly used temperaments. Working from the chain of fifths, we will demonstrate how the intervals in any tuning or temperament can be mapped from Pythagorean tuning by algorithms that combine pure fifths and syntonic commas.(1) The algorithms that map the tunings and temperaments into one another are not purely mathematical, but are derived from the harmonic structure of the chain of fifths and enharmonic relationships between notes. [1.2] This article is not concerned with generating diatonic scale tuning from prime numbers or otherwise deriving its form from physical or mathematical principles. We will use the historic definition of a diatonic scale as two tetrachords plus one additional tone that completes the octave. The diatonic octave is divided into five whole tones and two semitones in all tunings and temperaments. The convention of assigning letter names to notes in a 12-note chromatic keyboard for diatonic scales will be observed. The chain of fifths will be introduced and used as the defining feature common to all scales without initially assuming any particular tuning. [1.3] Several modern theorists, including Mark Lindley(2) and Easley Blackwood(3) have applied algebraic techniques in describing the tonal relationships which form traditional diatonic scales. Others have developed diagrams to compare the differences in pitch for a note in various tunings.(4) Although such techniques have their uses, I did not personally find them particularly helpful in visualizing the overall difference between one tuning system or temperament and another. For my own analysis, I prefer to diagram the chain of fifths and use rational fractions to express the size of the intervals.(5) Differences between tuning systems are indicated by placing commas or fractional commas between adjacent fifths. This provides a visual comparison between the separate diatonic tunings and temperaments of a complete scale and makes it easier to demonstrate the mathematical and musical relationships between them. [1.4] Theorists classify tuning systems as either cyclic, generated by a reiterative sequence of fifths, or divisive, tunings that subdivide the octave.(6) Historically, this division is somewhat arbitrary. Euclid and Boethius derived the Pythagorean tuning that we now associate with a sequence of fifths by dividing a monochord into two octaves.(7) Methods based upon the overtone series or other systems which attempt to derive just intonation from acoustic phenomena are often considered to be divisive in nature. The typographical diagrams utilized in this article interpret tunings and temperaments in terms of the line of fifths. [2.1] It is well known that every diatonic scale can be reordered into a sequence of fifths. For the C-major scale, the sequence of fifths is F–C–G–D–A–E–B, renumbering the notes of the scale in the order 4–1–5–2–6–3-7. This is the sequence of notes produced when one starts with C and then tunes a keyboard alternately down a fourth and up a fifth until the last note of the scale is reached. For consistency of metaphor, I call the sequence of fifths a “chain” in which the fifths are “links,” without assuming any specific tuning system. [2.2] The chain of fifths has its origin at C and extends to the sharp notes on the right and the flat notes on the left. The chain is theoretically endless, neither closing nor repeating, so that each note in the chain is musically unique.(8) Figure 1 shows the central 21 links in the chain, with C at the origin. All the notes in the chain are considered to be within a single octave bounded by two C’s. Since fifths and fourths are inversions, each note is a fifth above the note to its left and a fourth above the note to its right. As a matter of convention, it is useful to consider the links to the right of C to be ascending fifths and the those to the left to be ascending fourths. The same seven letter names repeat themselves over and over in the same invariant sequence of the C-major scale—F–C–G–D–A–E–B—with each repetition augmented by sharps to the right and flats to the left. Any group of six adjacent links defines a major diatonic scale whose tonic note is one link from the left end of the group, and a natural minor scale which starts two links from the right end. Horizontal movement of any six-link group is the equivalent of transposition of the scale into a new key as exemplified by Figure 2. A twelve-note chromatic keyboard commonly contained the notes from E to G , before the acceptance of equal temperament. When all the fifths were pure, the keyboard would be suitable for the diatonic major and minor scales in the keys depicted in Figure 2. Other keys would be unavailable because the required sharp or flat notes would be outside the range of the chain of fifths. [2.3] The chain of fifths can be used to rationally order the harmonic structure of the diatonic scale. Figure 3 lists the harmonic intervals available on a twelve-note chromatic keyboard for each pairing of links in the chain of fifths. The pairs of notes listed are examples that start with C. Any interval can be horizontally transposed along the chain of fifths. Figure 3 classifies harmonic intervals by the number of links and their direction on the chain of fifths. Each pair of intervals are inversions of one another. Chromatic intervals have more than six links, diatonic intervals have six or fewer. Generally speaking, major intervals and augmented intervals ascend from left to right, while minor intervals and diminished intervals ascend from right to left. The perfect fourth is the only consonant interval that ascends from right to left, which may reflect its harmonic ambiguity. Intervals that ascend to the right from a flat to a natural are always major, such as B –D, a four link ascending major third transposed from C–E. In the same manner, intervals that ascend to the right from a flat to a sharp are considered “augmented,” as in B –D , an 11-link augmented third transposed from C–E . In the opposite direction, intervals that ascend to the left from a sharp to a natural are always minor, as in C –E, a three link minor third transposed from C–E . Intervals that ascend to the left from a sharp to a flat are diminished, as in C –E , a ten-link diminished third transposed from C–E . Each pair of enharmonically equivalent notes is separated by twelve links. It is also well known that the progressions of diatonic harmony correspond to the chain of fifths, but this is a topic which will not be further detailed. [3.1] Tuning the diatonic scale with pure fifths, now known as Pythagorean tuning, was the norm for nearly 2,000 years. The Pythagorean tuning of twelve notes in a standard E –G keyboard is shown in Figure 4. The links are a sequence of powers of 3/2 to the right of C and powers of 4/3 to the left of C. Whenever necessary, the fraction is divided by two to keep the pitch within the compass of a single 2/1 octave. Thus, 3/2 x 3/2 = 9/4. 9/4 is divided by 2, making D = 9/8. Logarithms allow the sequence to be calculated by addition instead of multiplication. In logarithmic measure, each perfect fifth is approximately 702 cents. The tuning of D is equal to 204 cents, obtained by subtracting a an octave of 1200 cents from 702 + 702 = 1404. Since all the links are the same size, the harmonic intervals can be transposed freely. All major seconds are 9/8, all major thirds, 81/64, and etc. The dashes between the letter names of the notes in Figure 4 indicate that the fifths are pure. [3.3] A wolf fifth, “w,” occurs at the end of the line when E has to be used enharmonically because D is unavailable; the “fifth,” which is more precisely a diminished sixth, from G to E (D ) will be too narrow by a Pythagorean comma. Blackwood describes such a narrow fifth as discordant and sounding badly out of place in a scale whose other fifths are pure.(11) It was known as the wolf fifth, because of the howling sound that it made on an organ. [4.1] Equal temperament has been commonly used for the past 150 years to tune pianos and organs and, before that, was used for fretted instruments such as guitars and lutes. Equal temperament flattens the fifths (and sharpens the fourths) by 1/12 of a Pythagorean comma, “p,” as shown in Figure 5. This is just enough to give a true octave from a chain of 12 links. In musical terms, the 12 fifths in the chromatic line are made exactly equal to 7 octaves. As can be seen from Figure 5, the term “equal temperament” only applies to the fifths. The other intervals are not tempered equally with respect to Pythagorean tuning. In Figure 5, the Pythagorean comma is indicated by the upper-case “P” and 1/12 of the Pythagorean comma by the lower-case “p.” The direction of the arrow indicates the ascending harmonic interval. Reversing the arrow would invert the interval and change the sign of the fraction, as illustrated by the fifth (-1/4p) and the fourth (+1/4p). [4.3] We can easily demonstrate from the chain of fifths that equal temperament makes both the tuning and the musical function of each pair of enharmonically equivalent notes equal, using the 12 links from C to B . After subtracting the Pythagorean comma, B becomes the same musical note as C. C can be substituted for B , which is indicated by placing it vertically below B in Figure 6. E is a fifth below B , but since B has been replaced by C, F must be placed below E since F is a fifth below C. The substitutions continue to the left along the top row from B to C until the bottom row is complete from C on the right to D on the left. Figure 6 shows that the two rows created by these substitutions are the same as if the chain of fifths was split into two rows, with the sharp notes above the flat notes. The substitutions derived from equal temperament have made the tuning of the top row identical to that of the bottom row. Equal temperament combines each vertical pair of enharmonically equivalent notes into one single note.(13) This process can be extended out to infinity by vertically stacking each group of 12 notes in rows below D –C and above C–B . Each vertical stack of enharmonic notes will be identical. The profound consequence of equal temperament is that the chain of twelve tempered links absorbs the infinite chain into a single row of 12 chromatic notes that corresponds exactly to the 12 notes-to-the- octave (7 diatonic and 5 chromatic) equally-tempered keyboard. [4.4] Calculating the tuning of an equally tempered scale generates irrational numbers,(14) because the rational fraction that measures the Pythagorean comma must be divided into twelve roots. One equally tempered semitone equals the twelfth root of 2, an irrational number whose value is normally given in a decimal approximation as 1.05946 (100 cents.) The tuning of the chain of equal tempered fifths in six place decimals is given in Figure 7. Using the diagram in Figure 5, the 700-cent logarithmic tuning of an equally tempered fifth is narrower than a 702 cent perfect fifth by 2 cents, 1/12 of the 24-cent Pythagorean comma. The last column in Figure 7 displays this pattern; the pitch of each note in the vertical chain is 700 cents above the note below it before subtracting out the octave. [5.1] In Pythagorean tuning, only the fifths and fourths are tuned as consonant intervals. The thirds and sixths generated by a sequence of perfect fifths are not generally considered consonant by comparison to the most consonant major third which is 5/4, a minor third of 5/6 and their inversions, a major sixth of 5/3 and a minor sixth of 8/5. The diatonic tuning that includes both consonant thirds and pure fifths is known as just intonation. One traditional method of forming a C-major scale in just intonation is to combine consonant tonic, dominant and subdominant triads, F–A–C, C–E–G and G–B–D. This tunes the just diatonic scale shown in Figure 8. The D–A link is narrowed by a syntonic comma indicated by the “k.” Since the other links are pure, the pitch of A, E and B will also be lower than Pythagorean by a syntonic comma. Even though each note has its optimum tuning relative to C, just intonation is a theoretical scale which is unsatisfactory for tuning an instrument with fixed pitch because the narrow D–A results in the unjust intervals shown in Figure 8. The narrow D–A sounds much the same as a Pythagorean wolf fifth. The Pythagorean minor third and its inversion, the major sixth between D and F also sound badly out of place in an otherwise just scale. [5.2] Tuning a chromatic octave in just intonation creates further difficulties since alternate tunings are required for each note. A theoretical scale of just intonation can be calculated for four diatonic major scales in the chromatic octave by replicating the procedure used to form the scale of C-major. A scale of B -major would have triads in which E –G, B –D and F–A were pure major thirds. The pure thirds would be B –D, F–A, C–E in F-major and C–E, G–B and D–F in G-major. Figure 9 shows the two alternative tunings for G, D and A that are required for these four scales. The multiplicity of alternate tunings makes just intonation even more impractical for the normal keyboard with twelve keys to the octave. It can also be seen from Figure 9 that the absolute location of the syntonic comma moves but that its relative location is always on the fourth link of the scale. Each just scale could be considered to be virtually a separate entity whose tuning is fixed by the tuning of the triads that it contains. C is tuned to an arbitrary unit pitch of 1. from the notes immediately adjacent to it. pitch by 2 to keep it within the same octave. Stop after the 12 notes from E to G have been tuned. The equal temperament algorithm is the same as the Pythagorean algorithm except that the interval in step 2 is 1/12 of a Pythagorean comma narrower than a pure fifth. Although justly tuned scales often have been considered to represent a different species from the Pythagorean or the equally tempered scale, we will show in Figure 10 how an algorithm can be derived that maps Pythagorean tuning into just chromatic scales. [5.4] The scale in Figure 10 has a syntonic comma at every fourth link. This produces a chromatic scale in which the diatonic scale of C-major is just and the maximum number of major thirds are a consonant 5/4. This scale is generated by an algorithm in which (1) the fourth link of a Pythagorean C-major scale is narrowed by a syntonic comma and (2) every fourth link above and below that link is also narrowed by a syntonic comma. The tuning of the just chromatic scale from E to G depicted in Figure 10 corresponds to the tuning given by Rossing for these same 12 chromatic notes within a larger chromatic scale of just intonation from F to B .(15) We can use the graphic diagram in Figure 10 to evaluate the difference between the just and Pythagorean pitch of each note without having to multiply out the 81/80 syntonic comma. In this just chromatic scale, B and E are each a syntonic comma higher in pitch while justly tuned A, E, B and F are each a syntonic comma lower in pitch. Just C and G are lower than Pythagorean by two syntonic commas. Examining Figure 10 demonstrates still more reasons why a chromatic scale of just intonation is unusable on a standard keyboard. Narrowing every fourth link by a comma does not leave all the thirds and fifths consonant. The fifths that are narrowed (which means that the fourths are inversely broadened) by a full syntonic comma are obviously dissonant. Thus, the just chromatic scale has two more dissonant links than a Pythagorean chromatic scale. The wolf fifth from enharmonic D (E ) to G will be narrowed by three syntonic commas. Any group of three adjacent links that does not include a comma will form a Pythagorean minor third and a Pythagorean major sixth. Whole tones in this scale that include a syntonic comma are 10/9, while the other whole tones are in the just and Pythagorean proportion of 9/8. To assess the severe impact of these tuning discrepancies we summarize the most significant consequences when a keyboard tuned in just intonation as in Figure 10 is used to play the six diatonic major scales listed in Figure 2. B -major: fifth of tonic triad narrowed by a syntonic comma. F-major: major fourth broadened by a syntonic comma. C-major: fifth of the II chord narrowed by a syntonic comma. G-major: fifth of the dominant triad narrowed by a comma. D-major: fifth of tonic triad narrowed by a syntonic comma. A-major: major fourth broadened by a syntonic comma. It is, thus, amply clear that just scales with consonant thirds cannot be meaningfully used on a chromatic keyboard. [5.5] Since the scale in Figure 10 was created by an algorithm that narrowed every fourth link by one syntonic comma, one can generate four chromatic modes of just intonation, one for each of the scales shown in Figure 9. These are the only just chromatic scales that are possible when C has the relative tuning of 1, since the pattern of the algorithm repeats after the fourth link.(16) Figure 11 presents the tuning of the four modes of just intonation along a chromatic scale from D to B for a vertical chain of fifths in Pythagorean tuning and the four just chromatic modes in B , F, C, and G. The number of syntonic commas by which each note has been altered from Pythagorean tuning is indicated in parentheses, the pitch of the notes above C being lowered by the number of syntonic commas indicated and the ones below C being raised. The remaining notes are Pythagorean. Figure 11 provides an insight on the relationship between Pythagorean and just tuning.(17) Instead of presenting just intonation as a series of pitches that are independently derived, Figure 11 shows that the pitch of the sharp and flat notes are modified in a regular progression as syntonic commas are sequentially added to or subtracted from Pythagorean tuning. The logarithmic tuning of each note can be easily calculated using the fact that a pure fifth is 702 cents, a pure fourth, its inversion, is 498 cents, and a syntonic comma is 22 cents. As an example, 27/25, the tuning of D in the just G-major mode is 5 links plus 2 syntonic commas left of C: 5 x 498 = 2490 + 44 = 2534. After subtracting 2400, D + 2k = 134 cents. [5.6] F. Murray Barbour listed 22 historical scales of just intonation dating from 1482 to 1776 in his historical survey of tuning and temperament.(18) Barbour defined just intonation more broadly than we have done, including within the concept any 12-note chromatic scale that possessed some pure fifths and at least one pure third. Barbour described a late 18th-century tuning by Marpurg which is the same as Figure 10 as “the model form of just intonation.”(19) Two scales which correspond to the F-major mode shown in Figure 11 were described by Barbour as “the most symmetric arrangement of all.” The first was an early 17th century scale by Salomon de Caus which started with B ; the second was by Mersenne and started on G .(20) An even earlier tuning by Fogliano in the F-major mode starting with E was also included.(21) None of the other tunings are precisely in the form of Figure 11. A complete listing of these historical just tunings is given in Appendix I. [5.7] It is also interesting to compare the actual tuning of notes in Figure 11 with Ellis’s “Table of Intervals not exceeding One Octave” in his appendix to Helmholtz.(22) Figure 11 gives new significance to intervals whose names as given by Ellis imply a diatonic origin. Thus Ellis’s list includes the following varieties of fourths: “acute,” 27/20, a “superfluous,” 25/18 and another “superfluous,” 125/96. Figure 11 shows that the “acute” fourth is the just fourth in the G-major mode, the first “superfluous” fourth is an augmented fourth, F in the F-major and B -major modes, and the second “superfluous” fourth is an augmented third, E , in the C, F and B modes. In all, Ellis lists 33 intervals obtained by combining one or more perfect fifths with one or more just thirds, only 3 less than the 36 tunings in Figure 11 that are altered by one or more Pythagorean commas. All but two of Ellis’s 33 intervals are included in Figure 11; one is a well-tempered interval and the other is not part of a chromatic scale in which C is tuned to 1. The complete list of Ellis’s intervals and their notation in terms of Pythagorean tuning and syntonic commas is contained in Appendix II. [5.8] We can now appreciate why the chain of fifths is useful for evaluating the harmonic consequences of alternate tunings of a diatonic scale embedded in a chromatic keyboard. It is not possible to arbitrarily change the pitch of one note without altering its relationship with all other notes in the chromatic space. The interdependence of tuning is not limited to instruments with fixed pitch. For example, a string quartet could not play passages containing a sequence of triads in just intonation without altering the melodic intervals and, possibly the overall level of pitch.(23) The problems of tuning harmonic intervals can only be solved by dynamic ad hoc adjustments of pitch to obtain optimum consonance while preserving the melodic line and stability of pitch.(24) This is one of the reasons why it is so difficult for inexperienced musicians to achieve good ensemble intonation. [5.9] The syntonic comma is not an independent variable; the independent variables are the tuning ratios for the consonant fifth and major third as determined by psychoacoustic measurements, which are 3/2 and 5/4. The syntonic comma, even though it has been known and separately named for two thousand years is merely derived from the difference between the consonant or just major third and the Pythagorean major third generated by four consecutive fifths. However, one would not intuitively expect that this single dependent variable could be used to measure all the differences in tuning between Pythagorean and just scales, including intervals that are not generated by major thirds.(25) The just intonation algorithms provide a coherent framework for this ancient and well respected dependent variable known as the syntonic comma. As was noted above, just intonation and Pythagorean tuning are commonly thought of as different species of tuning. The just intonation algorithms demonstrate that just intonation can more completely be understood in terms of the chain of fifths and syntonic commas than if considered independently. [6.2] The quarter-comma (4q = 1k) narrowing of each link in the chain of fifths is shown in Figure 12, which also depicts the resulting alteration of other intervals from Pythagorean tuning. Compared to Pythagorean tuning, it is evident that the fifths to the right of C are all tuned a quarter-comma flat, while the fourths to the left of C become a quarter-comma sharp. As before, Figures 10 and 12 allow us to measure the difference between the just and meantone scales without using arithmetic. As an example, a mean-tone chromatic semitone is narrowed by 7/4 syntonic commas compared to Pythagorean tuning and 3/4 of a syntonic comma compared to just intonation. For a time, organs were built with more than twelve keys per octave in order to utilize more of the extended chromatic scale. The keys could be split or other devices used to enable the performer to play either note of an enharmonic pair such as A /G or D /C .(29) There was a practice, apparently, of raising or lowering the location of the wolf in the tuning of harpsichords to fit the composition being played at the moment.(30) However, manufacturers refrained from constructing instruments with more than 12 keys per octave and performers refrained from learning how to play such instruments, probably because the standard keyboard was suitable for most uses. As musical development led to the use of more keys outside its central compass, meantone temperament became increasingly impractical. Rational fractions approximating each of the other meantone intervals may be calculated in a similar manner, using the other fractions in the expansion. A chromatic meantone tuning for a keyboard is shown in Figure 13 for a chain of fifths tempered by a quarter-comma (q).(31) Logarithmic values for a meantone scale can be easily calculated by subtracting one-fourth of a syntonic comma (22/4 = 5.5 cents) from every pure fifth. Thus each meantone fifth will be 696.5 cents. [7.1] The term well temperament includes a family of temperaments that modified meantone temperament to eliminate wolves and to expand the range of playable keys by taking advantage of the small difference between the Pythagorean comma and the syntonic comma. The difference between the two commas is an interval of 32805/32786 (2 cents), which is called the schisma. If only four links of a chromatic keyboard scale are tempered by a quarter-comma, with the remainder being tuned pure, the chromatic scale will exceed an acoustic octave by only a schisma and the wolf fifth will be thereby minimized to the point of nonexistence. [7.2] Figure 14 illustrates a simplified form of well temperament in which all but the central four links are Pythagorean and the major thirds vary from just (C–E) to fully Pythagorean (A –C and E–G ). No major triad will be exactly consonant. The wolf fifth between A (G ) and E has been essentially eliminated, and notes which are enharmonic to E , B , F , C and G will differ in pitch only by a schisma. Therefore, use of these notes enharmonically increases the number of available scales from 6 to 11. The tuning for this version of well temperament are given in Figure 15. A number of historical well temperaments were devised that separated the quarter commas by one or more links to improve playability in desired keys. Other temperaments subdivided the syntonic even further into 2/7 and 1/6 commas. The more that the commas were divided and dispersed, the more that well temperament approached equal temperament. [8.1] We will develop and expand upon the method advocated by Kirnberger in the eighteenth century for deriving a scale of equal temperament from Pythagorean intonation.(32) A scale obtained by the first procedure is schismatic equal temperament and a scale obtained by the second procedure is syntonic equal temperament. The tuning of schismatic ET is exactly equal to the tuning for syntonic ET, the only difference being in their algorithms. Both match the tuning of equal temperament to several decimal places as shown in Figure 16. [8.2] Schismatic and syntonic equal temperament is derived by extending a well-tempered scale eleven links to the left and right of C. When the eleventh note to the left of C is raised by one syntonic comma and the eleventh note to the right of C is lowered by one syntonic comma the results are tunings for E and for A that are almost exactly the same as the equally tempered tunings for F and G respectively. E -k ~ F+P-k ~ F+sk ~ F+p. As shown in Figure 5, F+p is the pitch of F in equal temperament. Since the precise value of a schisma is 1.954 cents and 1/12 of a Pythagorean comma is 1.955 cents, the error is only 1/1000 of a cent. One can then obtain decimal tunings for equal temperament by reiterating the proportions for E -1k to a full chromatic chain of 12 links that would exceed an exact octave by a ratio of only 2.000018/2 or 0.012 cents. [8.3] We will now derive and apply two algorithms which map Pythagorean tuning into equal temperament. The algorithm based upon the schisma produces schismatic ET. As with ordinary equal temperament, this procedure equates the tuning of enharmonic pairs, substituting G for A + k, D for E + k + 1sk, and so on. Every 10th link to the left of A + k and to the right of E -1k is tempered by one schisma. The five schismatic notes tuned to the right of A +k are enharmonically equivalent to the notes normally located to the right of G, while the five schismatic notes tuned to the left of E -k are enharmonically equivalent to the notes normally located to the left of F. The steps of the algorithm are as follows. Starting with C, move 10 links to the left to A +1k. Substitute G enharmonically for A +1k. Move 1 link to the right 5 times, adding 1 schisma to the width of each interval. Rename each note enharmonically. Returning to C, move 10 links to the right to E -1k. Substitute F enharmonically for E -1k. Move 1 link to the left 4 times, subtracting 1 schisma from the width from each interval. Rename each note enharmonically. [8.4] The algorithm that produces syntonic equal temperament also starts with the intervals C–A , ten links to the left of C, and C–E , ten links to the right of C. Substituting G, which is enharmonic to A +1k in syntonic ET, and reiterating the process, D in Syntonic ET would be 10 more links to the left of A plus one more syntonic comma, giving D enharmonically equivalent to F +2k. At the other end of the chain, enharmonic B in syntonic ET would be 10 links minus one syntonic comma to the right of E -1k(F), written as B = G -2k. Syntonic ET is based upon substitution of enharmonic pairs just as is equal temperament. The tuning of each note is exactly the same in both syntonic and schismatic ET. The notation and tuning for schismatic and syntonic ET are given in Figure 16. The algorithm for syntonic ET is as follows. Starting with C, move 10 links to the left to A + k. Substitute G enharmonically for A +1k. Reiterate the action 5 more times, adding 1 syntonic comma to the width of each 10-link interval. Rename each note enharmonically. Returning to C, move 10 links to the right of C to E -1k. Substitute F enharmonically for E -1k. Reiterate the action 4 more times, subtracting 1 syntonic comma for each 10-link interval. Rename each note enharmonically. [8.5] We can now go a step further and derive the algorithm that maps just intonation into syntonic ET from the algorithms previously used to map Pythagorean tuning into just intonation. For example, E in the just mode of C-major is equal to Pythagorean E -3k. Adding back the three syntonic commas, E -1k in schismatic and syntonic ET is enharmonically equivalent to E + 2k in the just C-major mode. The algorithm for just schismatic ET parallels the algorithm given in section 8.3, adding back to each interval the number of commas listed in Figure 11. In syntonic ET, B is enharmonically equivalent to G -2k. If the C-mode just scale were extended to G , the Pythagorean tuning would be narrowed by 5 syntonic commas. Replacing the 5 commas, G +3k maps just G into B in just syntonic ET. We have not set out the full just chromatic scale for the 121 links necessary in Figure 11, but it can be done simply by adding 1 syntonic comma for every four links to the left and subtracting 1 syntonic comma for every four links to the right as many times as is necessary. Applying these algorithms in Figure 17 gives scales of just schismatic and just syntonic ET for the C-major scale. [8.6] Of course, neither syntonic nor schismatic ET are precisely equal. They do not merge all enharmonically equivalent notes, as shown by the outer sections of Figure 16 which contains notes from G to F in schismatic ET. The enharmonic value for D is not exactly equal to the value of C as it is in equal temperament and C is not exactly equal to D and B . Therefore, the number of possible notes is still endless and does not collapse to twelve. The divergences between the tunings produced by the two equal temperaments are of no audible or acoustic significance either to the tuning of individual notes or to the overall sound of the temperament. A keyboard instrument tuned to syntonic ET would not sound distinguishable from one tuned with unlikely mathematical perfection to traditional equal temperament. The twelve chromatic links tuned to syntonic ET would have to be replicated nearly 163 times before the divergence in tuning C would exceed even one schisma. [9.1] This article has explored the relations between keyboard tunings based upon the chain of fifths. We began by accepting the historical definition of a diatonic scale embedded in a 12-note chromatic keyboard. We demonstrated that the terms used to name diatonic and chromatic intervals can be rationally ordered according to the number of links between the intervals on the chain of fifths. We then derived algorithms that map Pythagorean tuning into just intonation and equal temperament and map just intonation into equal temperament. Pythagorean tuning and just intonation have traditionally been classified as distinct tuning strategies, while Pythagorean tuning and equal temperament have been related only by the Pythagorean comma. This article has shown that the three tunings can be related using algorithms that utilize combinations of pure fifths and syntonic commas. The numbers in the left hand margin correspond to the number used by Barbour. The table lists the author of the temperament, the date of its publication, the chromatic compass of the tuning on the chain of fifths, and the number of intervals which are pure or are altered by one or more commas, starting at the left end of the chain. 81. Ramis, 1482. Ab-F# Ab-G, 8=0, 4=-1k. 82. Erlangen, 15c. Ebb, Bbb, Gb-B, 2=+1k, 8=0, 2=-1. 83. Erlangen revised, Eb-G#, 7=0, 3=-1k. 84. Fogliano 1529 Eb-G#, 1=+1k, 4=0, 4=-1k, 3=-2k. 85. Fogliano 1529 Eb-G#, 2=+1k, 4=0, 3=-1k, 3=-2k. This chart lists the intervals identified by Ellis as being formed from pure fifths and major thirds. It provides the inverted proportions used by Ellis and his name for the interval along with the Pythagorean equivalent of the interval from Figure 11. F -1k was not part of Figure 11 because it is not included in a scale in which C = 0. G -1k is a well-tempered interval from Figure 14. The remainder of the intervals are from Figure 11. 1. The syntonic comma is defined as the difference between the Pythagorean tuning and just tuning of the major third. The difference between the just third (5/4) and the Pythagorean third (81/64) is 81/80, calculated as follows: 81/64 x 4/5 = 81/16 x 1/5 = 81/80. The syntonic comma is also the difference between the Pythagorean and just tunings for all diatonic intervals other than the fourth and fifth, which are the same in both tunings. The reason for the repeated appearance of the syntonic comma will be apparent from the discussion of the four modes of just intonation in section 5. 2. Mark Lindley and Ronald Turner-Smith, “An Algebraic Approach to Mathematical Models of Scales,” Music Theory Online 0.3 (1993), which is a commentary based upon their book, Mathematical Models of Musical Scales (Bonn: Verlag fuer Systematische Musikwissenschaft, 1993). 3. Blackwood, The Structure of Recognizable Diatonic Tunings, (Princeton: Princeton University Press, 1985). 5. Intervals measured by rational fractions can be converted into cents using the following approximate values: octave = 1200 cents, perfect fifth = 702 cents; Pythagorean comma = 24 cents; syntonic comma = 22 cents. 6. See Lindley and Turner-Smith, “An Algebraic Approach,” paragraph 4. 7. In modern terminology, dividing the string in half gives two octaves, in thirds gives a fifth and an eleventh, and in fourths gives a fourth, octave and double octave. The other diatonic notes are then determined by calculating intervals of a fifth from these intervals. This produces two diatonic octaves in Pythagorean tuning. 8. Perfect fifths do not combine to produce a perfect octave. The nth fifth in a sequence of n fifths is defined mathematically by the expression (3/2)(n), which can never be an exact multiple of 2 since every power of 3 is an odd number. The mathematical proof that no sequence of fourths can ever produce an octave is less obvious since every even number can be expressed as a fraction with an odd denominator, and every power of 3 can be associated with an infinite sequence of even numbers, such as 18/9, 36/9, . . . ; 162/81, . . . , etc. However, an intuitive musical proof can be deduced from the fact that fourths and fifths are inversions of one another. No sequence of fourths can generate an octave because the inverse sequence of fifths can never do so. 9. In logarithmic measure, a perfect fifth is 702 cents. Therefore twelve perfect fifths equals 8424 cents while seven octaves is 8400 cents. The difference, the Pythagorean comma, is therefore equal to 24 cents. 10. Euclid (attrib.), Section of the Canon, in Barker, Greek Musical Writings, vol. 2 (Cambridge: Cambridge University Press, 1989), 199. Twelve links on the chain of fifths can be interpreted as 12 fifths, 6 whole tones, 4 minor thirds and 3 major thirds. Thus, the Pythagorean comma is also equal to the difference between three major thirds or four minor thirds and an octave. In Pythagorean tuning, a Pythagorean comma is the interval between any two notes separated by 12 links on the chain of fifths. 11. Blackwood, Recognizable Diatonic Tunings, 58. 12. The development of the 12-tone school of composition was a logical consequence of accepting the 12-semitone model of equal temperament in place of a chain of harmonic fifths. 13. These stacked rows appear in Helmholtz’s On the Sensations of Tone (London: Longman, 1885; New York: Dover, 1954; orig., 4th ed., Braunshweig: Verlag von Fr. Vieweg u. Sohn, 1877), 312, where it is used to illustrate the enharmonic relation between notes in Pythagorean intonation. 14. An irrational number, such as pi or the square root of two, is one that cannot be expressed as the ratio of two integers. An irrational number includes a nonterminating decimal written to the number of decimals needed for practical accuracy. 15. Rossing, The Science of Sound (Reading, Mass: Addison Wesley, 1982), 161. This is a general textbook on acoustics. Rossing’s chart lists the equally-tempered, just and Pythagorean tunings for a 22-note chromatic scale in cents and decimals. The just scale corresponds to the “C” scale in Figure 10. 17. The algorithm used to construct just chromatic scales can be used to illustrate why intervals generated by the prime 7 cannot be systematically included in diatonic keyboard tunings. Pleasant sounding intervals can include sevens. Examples which are commonly cited are a 7/4 minor seventh, a 7/5 diminished fifth, both of which are part of a diminished seventh chord in which the notes C, E, G, B are in the proportion of 4:5:6:7, or 1:5/4:3/2:7/4. A single scale in which these intervals are used can be contrived. However, temperaments based on 7’s or factors of 7 do not produce a usable family of chromatic keyboard scales from the chain of fifths, which would have the desired ratios for the diminished seventh chord. The “septimal” comma which produces a 7/4 minor seventh and an 8/7 major second on the second link of the chain of fifths is 64/63 (27 cents). Therefore, reiteration of the septimal comma, “s”, in an algorithm which tunes every minor seventh to 7/4 produces two modes of septimal chromatic scales in which E is 64/49, not the desired 5/4. These septimal modes are worse than the just modes because the septimal comma is broader than the syntonic comma by five cents. The deviation from just intonation is further aggravated because septimal commas increase the pitch of notes to the right of C and decrease the pitch of notes to the left of C, contrary to the action of the syntonic comma. Thus, compared to just intonation, the pitch of notes to the right of C will be painfully sharp and notes to the left will be dismally flat. For example, the major third necessary for the diminished seventh chord will be 2s+1k (76 cents) broader than in a just scale while the minor sixth will be 2s + 1k (49 cents) narrower. 18. Barbour, Tuning and Temperament: A Historical Survey (East Lansing, Michigan: Michigan State College Press, 1953), 90–102. 22. Helmholtz, On the Sensations of Tone, 453. A similar list of “Extended Just Tuning” is found in Blackwood, Recognizable Diatonic Tunings, 116–119. 23. Blackwood, Recognizable Diatonic Tunings, 74, demonstrates that in a common progression of C-major triads from II to V, just intonation would require that D as the root of the II chord be one syntonic comma lower in pitch than D as the fifth of the V chord. In The Science of Musical Sound (Scientific American Books, 1983, 67), John Pierce shows a five chord progression, I, IV, II, V, I, in which the just tuning of C drops by a syntonic comma from the first chord to the last. 24. It is for this reason that Lloyd in his article on Just Intonation in the 1954 Grove Dictionary adopted the position that instruments without fixed pitch and vocalists use a flexible scale in which the size of the intervals vary according to the context and part of the reason that Lindley and Turner-Smith introduced the concept of “leeway” into their algebraic tuning theory. 25. Inspection of the chain of fifths tells us that a major third can only generate one-quarter of the infinite series of chromatic notes that are generated by the fifth. This is why the tuning of the major third is a subsidiary factor in the generation of diatonic scales. 26. Barbour, Tuning and Temperament, 26. 27. Grove’s Dictionary of Music and Musicians (1954), “Temperaments” (380). 28. Dart, The Interpretation of Music (New York: Harper & Row, 1963), 47. 29. Barbour, Tuning and Temperament, 108–9. Since the first reference to split keys found by Barbour goes back to 1484, this device must have been used for both Pythagorean and meantone tunings. 30. Grove’s Dictionary of Music and Musicians, “Temperaments” (379). Barbour states that these approximations “check closely with numbers obtained by taking roots,” with the G being off by 0.000003. Barbour, Tuning and Temperament, 29. 32. Barbour, Tuning and Temperament, 64. The syntonic comma is defined as the difference between the Pythagorean tuning and just tuning of the major third. The difference between the just third (5/4) and the Pythagorean third (81/64) is 81/80, calculated as follows: 81/64 x 4/5 = 81/16 x 1/5 = 81/80. The syntonic comma is also the difference between the Pythagorean and just tunings for all diatonic intervals other than the fourth and fifth, which are the same in both tunings. The reason for the repeated appearance of the syntonic comma will be apparent from the discussion of the four modes of just intonation in section 5. Mark Lindley and Ronald Turner-Smith, “An Algebraic Approach to Mathematical Models of Scales,” Music Theory Online 0.3 (1993), which is a commentary based upon their book, Mathematical Models of Musical Scales (Bonn: Verlag fuer Systematische Musikwissenschaft, 1993). Blackwood, The Structure of Recognizable Diatonic Tunings, (Princeton: Princeton University Press, 1985). Intervals measured by rational fractions can be converted into cents using the following approximate values: octave = 1200 cents, perfect fifth = 702 cents; Pythagorean comma = 24 cents; syntonic comma = 22 cents. See Lindley and Turner-Smith, “An Algebraic Approach,” paragraph 4. In modern terminology, dividing the string in half gives two octaves, in thirds gives a fifth and an eleventh, and in fourths gives a fourth, octave and double octave. The other diatonic notes are then determined by calculating intervals of a fifth from these intervals. This produces two diatonic octaves in Pythagorean tuning. Perfect fifths do not combine to produce a perfect octave. The nth fifth in a sequence of n fifths is defined mathematically by the expression (3/2)(n), which can never be an exact multiple of 2 since every power of 3 is an odd number. The mathematical proof that no sequence of fourths can ever produce an octave is less obvious since every even number can be expressed as a fraction with an odd denominator, and every power of 3 can be associated with an infinite sequence of even numbers, such as 18/9, 36/9, . . . ; 162/81, . . . , etc. However, an intuitive musical proof can be deduced from the fact that fourths and fifths are inversions of one another. No sequence of fourths can generate an octave because the inverse sequence of fifths can never do so. In logarithmic measure, a perfect fifth is 702 cents. Therefore twelve perfect fifths equals 8424 cents while seven octaves is 8400 cents. The difference, the Pythagorean comma, is therefore equal to 24 cents. Euclid (attrib.), Section of the Canon, in Barker, Greek Musical Writings, vol. 2 (Cambridge: Cambridge University Press, 1989), 199. Twelve links on the chain of fifths can be interpreted as 12 fifths, 6 whole tones, 4 minor thirds and 3 major thirds. Thus, the Pythagorean comma is also equal to the difference between three major thirds or four minor thirds and an octave. In Pythagorean tuning, a Pythagorean comma is the interval between any two notes separated by 12 links on the chain of fifths. Blackwood, Recognizable Diatonic Tunings, 58. The development of the 12-tone school of composition was a logical consequence of accepting the 12-semitone model of equal temperament in place of a chain of harmonic fifths. These stacked rows appear in Helmholtz’s On the Sensations of Tone (London: Longman, 1885; New York: Dover, 1954; orig., 4th ed., Braunshweig: Verlag von Fr. Vieweg u. Sohn, 1877), 312, where it is used to illustrate the enharmonic relation between notes in Pythagorean intonation. An irrational number, such as pi or the square root of two, is one that cannot be expressed as the ratio of two integers. An irrational number includes a nonterminating decimal written to the number of decimals needed for practical accuracy. Rossing, The Science of Sound (Reading, Mass: Addison Wesley, 1982), 161. This is a general textbook on acoustics. Rossing’s chart lists the equally-tempered, just and Pythagorean tunings for a 22-note chromatic scale in cents and decimals. The just scale corresponds to the “C” scale in Figure 10. The algorithm used to construct just chromatic scales can be used to illustrate why intervals generated by the prime 7 cannot be systematically included in diatonic keyboard tunings. Pleasant sounding intervals can include sevens. Examples which are commonly cited are a 7/4 minor seventh, a 7/5 diminished fifth, both of which are part of a diminished seventh chord in which the notes C, E, G, B are in the proportion of 4:5:6:7, or 1:5/4:3/2:7/4. A single scale in which these intervals are used can be contrived. Barbour, Tuning and Temperament: A Historical Survey (East Lansing, Michigan: Michigan State College Press, 1953), 90–102. Helmholtz, On the Sensations of Tone, 453. A similar list of “Extended Just Tuning” is found in Blackwood, Recognizable Diatonic Tunings, 116–119. Blackwood, Recognizable Diatonic Tunings, 74, demonstrates that in a common progression of C-major triads from II to V, just intonation would require that D as the root of the II chord be one syntonic comma lower in pitch than D as the fifth of the V chord. In The Science of Musical Sound (Scientific American Books, 1983, 67), John Pierce shows a five chord progression, I, IV, II, V, I, in which the just tuning of C drops by a syntonic comma from the first chord to the last. It is for this reason that Lloyd in his article on Just Intonation in the 1954 Grove Dictionary adopted the position that instruments without fixed pitch and vocalists use a flexible scale in which the size of the intervals vary according to the context and part of the reason that Lindley and Turner-Smith introduced the concept of “leeway” into their algebraic tuning theory. Inspection of the chain of fifths tells us that a major third can only generate one-quarter of the infinite series of chromatic notes that are generated by the fifth. This is why the tuning of the major third is a subsidiary factor in the generation of diatonic scales. Barbour, Tuning and Temperament, 26. Grove’s Dictionary of Music and Musicians (1954), “Temperaments” (380). Dart, The Interpretation of Music (New York: Harper & Row, 1963), 47. Barbour, Tuning and Temperament, 108–9. Since the first reference to split keys found by Barbour goes back to 1484, this device must have been used for both Pythagorean and meantone tunings. Grove’s Dictionary of Music and Musicians, “Temperaments” (379). Barbour, Tuning and Temperament, 64.
2019-04-20T04:21:09Z
http://www.mtosmt.org/issues/mto.98.4.4/mto.98.4.4.scholtz.html
Dark tide rising : a William Monk novel / Anne Perry. 289 pages ; 25 cm. "When a ransom exchange turns violent in the latest mystery from New York Times bestselling author Anne Perry, Commander William Monk faces an unthinkable possibility: betrayal by his own men. Local businessman Harry Exeter doesn't want the aid of the Thames River Police in tracking down the men who kidnapped his wife, Kate. He only asks them to help him navigate Jacob's Island, a creepy mass of decrepit buildings where he will hand off a large sum of money in exchange for her life. But when they arrive at the meeting place, Commander Monk and five of his best men are attacked from all sides, and Monk is left wondering who could have given away their plans--and why anyone would want to harm Kate Exeter. As Monk follows leads from Kate's worried cousin and a crafty clerk at the bank where Exeter gathered the ransom money, it seems inevitable that one of his own men has betrayed him. Delving into their pasts, he realizes how little he knows about the people he works with every day, including his trusted right-hand man Hooper, the one colleague Monk has always been certain he can count on. Even as they identify one of the kidnappers, the case runs into hurdle after hurdle, causing Monk to choose between his own safety and the chance to solve the case--and figure out where his men's loyalty really lies"-- Provided by publisher. Anne Perry is the bestselling author of two acclaimed series set in Victorian England: the William Monk novels, including An Echo of Murder and Revenge in a Cold River, and the Charlotte and Thomas Pitt novels, including Murder on the Serpentine and Treachery at Lancaster Gate . She is also the author of Twenty-one Days, the start of a new series featuring Charlotte and Thomas Pitt's son, Daniel, as well as a series of five World War I novels, sixteen holiday novels (most recently A Christmas Revelation ), and a historical novel, The Sheen on the Silk, set in the Ottoman Empire. Anne Perry lives in Los Angeles. chapter 1 Monk sat beside the fire and felt the heat seep through him. Outside was the kind of clinging silence that only fog brings. The river was shrouded, and dusk came early this time of the year. Monk was unusually conscious of being happy. This deep sense of peace was not a casual thing. He looked at Hester in the chair opposite him and found himself smiling. He was not aware of the first knock on the door. It was only when Hester stood up that he realized what the sound had been. He rose quickly. "No, I'll go." Reluctantly, he went into the hall and unlocked the front door. Sir Oliver Rathbone stood on the step, the porch light glistening on droplets of fog that covered his gray hat and the shoulders of his coat. His lean face was without its usual aura of wit. There was no wind at all, and yet a breath of chill accompanied him. "Come in," Monk said quickly, stepping back to allow him room. Rathbone obeyed and pulled the door closed behind him. He shivered, as if suddenly aware of how cold he was. He took off his hat and coat and hung them on the hall stand, stuffing his gloves in his pockets. "It must be bad," Monk said. They had known each other for years--in fact, for nearly all of the fifteen years since the Crimean War had ended in 1856. There was no need for social niceties. "It is," Rathbone replied. He both worked and lived on the north side of the Thames, so for him to have crossed the river to visit Monk at home meant the issue could not wait, even just until morning. Monk led the way to the sitting room and opened the door into the warmth. "I'm sorry," Rathbone said to Hester. They, too, had known each other long and well. Rathbone had met her when she was a nurse, newly home from the Crimea and still believing she could change the world of medical treatment and its attitude toward nursing, and women in medicine in general. That seemed like a long time ago now. But the cause, even now, was hardly begun. "You look frozen," she said with understanding. "Tea?" Then she reconsidered. "Whisky?" Rathbone smiled very slightly. "No, thank you. I need to keep a clear head." He turned to Monk. "I know I'm intruding, but it can't wait . . ." He sat down in one of the chairs next to the fire. Hester said nothing, but she prepared to listen intently. Monk merely nodded and took the seat opposite Rathbone. "A man came to me an hour or two ago in a state of extreme distress." Rathbone's expression reflected his own understanding of pain. "His wife has been kidnapped. Her life is forfeit if he does not pay a ransom, which is a fortune. He is a wealthy man, and has succeeded in raising the amount--" "When was she taken?" Monk interrupted. "I know what you must be thinking," Rathbone replied with a bleak smile. "How did he raise the money so quickly? Unless he had it in a safe somewhere, this would not have been possible. She was taken yesterday, which, if you remember, was actually a beautiful day for this time of year. He was given until tomorrow, at about this time. The exchange is to take place--" "Why the devil didn't he report it immediately?" Monk interrupted him. "He intends to pay. What he wants of us is--" "Us?" Monk cut across him again. "If he wants the police, he should have gone to the regular London police, and yesterday, for heaven's sake, when the trail was hot!" Rathbone shook his head. "He doesn't. She was taken from the riverbank, which makes it your area. And the ransom is to be paid on Jacob's Island, which--" "I know what it is!" Even though several years had passed since that bleak case, Monk shivered involuntarily at the memories the name "Jacob's Island" conjured in his imagination. He could still see the fat man sinking slowly into the tidal ooze, his mouth open, screaming, until the mud cut him off, and inch by inch he disappeared from sight. His body had never been found. Monk came back to the moment: to the firelight, to Hester, now sitting and leaning toward him, concern in her face; to the lamplight on Rathbone's hair, which had more silver in it than before. Jacob's Island was one of the worst slums in London. On the river's edge, it was not literally an island, but a region of interconnecting waterways with old offices and wharfs. The warehouses built upon them were sinking slowly into their foundations as they rotted away and collapsed one on top of another. Jacob's Island could be reached by land across one bridge, and by water through several landing piers. "He wants the River Police to go with him to the exchange, the payment for his wife's--Kate Exeter's--life," Rathbone said quietly. "That's all he came about. He doesn't expect you to catch the kidnappers, or to save the money, just to see that the exchange is made, and he and Kate leave there safely." "Kate Exeter?" Monk turned the name over in his mind. There was something familiar about it, but he could not place it. "Harry Exeter," Rathbone said. "His first wife died. Kate is his second. About twenty years younger than he. He's devoted to her." Compassion showed in Rathbone's face. He himself had married a second time, only recently. He had a happiness he had never believed possible, after the disappointment of his first marriage, followed by bitter loneliness. Rathbone knew how exquisitely precious happiness was, and how fragile. He tried not to think of the possibility of losing it again, but it was clear in his eyes, in the strain of his position, that his empathy with Harry Exeter was based in his own emotions, not imagination. Monk did not need explanations. "So, he spent yesterday and today getting the money," he concluded. "Yes. He has nearly all of it, and his assurance of the rest tomorrow. It's the price of five good-sized London family houses, in a decent area," Rathbone replied. "I came to you tonight because Exeter's in my chambers now. I want you to meet him. Get all the information you can. You'll need tomorrow to plan. He has to hand over the money himself. It's part of the bargain." "And bringing the police into it?" The consequences of even one slip were appalling. "Doesn't matter," Rathbone said gravely. "He's allowed to have at least one man go with him. He insisted on that. He doesn't know the place, and he pointed out that alone in an area like that, carrying a bag full of money, he'd be lucky if he made it as far as the agreed rendezvous spot." "Why wouldn't they pick some reasonable place?" Monk asked, but already he knew the answer. Jacob's Island was a warren that the ordinary Londoner would be utterly lost in, frightened, disoriented, always afraid of the rising tide. "I'll come and meet him," he said before Rathbone could answer him. He stood up. "Get all the information I can. Tomorrow I'll choose my men and speak to them. Some of them know Jacob's Island fairly well. Although the damn place is changing all the time." Rathbone stood as well. "Thank you." He turned to Hester. "I apologize," he said, "but it should all be over after tomorrow night. Exeter will be considerably poorer, but his wife will be safe, even if she does have nightmares for a while." "They pass," Hester said ruefully. Monk looked at her, concerned. She had been kidnapped not so long ago. He could recall her waking in the night, gasping, fighting the blankets, once even weeping uncontrollably. He had held her close, assuring her. And now she was thinking of this woman who had been kidnapped and was waiting, terrified, perhaps on Jacob's Island, trusting her husband could and would pay the ransom. "We'll get her back safely," Monk promised. "It's the money they want. And thank God Exeter seems to have it, and is willing to pay." He glanced out the window. It was dark outside now. The fog smothered everything. Hester smiled. "If she's as lucky as I was, the kidnappers will be caught as well. Go now! Poor Exeter will be frantic with worry. Assure him, as much as you can." He smiled and leaned forward to kiss her quickly on the cheek. Her skin was warm, soft as always, and he inhaled the fragrance of her hair. Rathbone was already waiting at the front door, his hat and coat on. He undid the latch, grimaced as he saw the fog was thicker than before, and stepped out into it. Monk followed after him, his coat on, too, though he still felt the damp cling to him immediately. He closed the door behind him and heard Hester lock it. He followed Rathbone down the familiar path to the street. By the time he reached it and looked back, the house was already swallowed up in the thick darkness. From somewhere down the river a foghorn gave its long, mournful cry. There was no other sound. Even their footfalls were muffled on the pavement. "There'll be no ferries over the river," Monk remarked. "We'll have to see if we can find a hansom on Union Street. The Rotherhithe road is right on the water, and it'll be even thicker there." Rathbone fell in step with him without commenting. The nearest bridge was a stiff walk from where they were, and Lincoln's Inn, where Rathbone's chambers were, was a good deal farther than that. It was half an hour before they found a cab, almost on the bridge. They heard the horse's hoofs on the cobbles, muffled by the distorted echoes. It was almost upon them before they saw its lamps approaching. Monk stepped into the street and caught the horse's bridle, bringing it to a stop. "Hey!" the driver shouted, fear sharpening his voice as he raised his whip. Monk saw the shadow of the whip before it could strike him. "Police!" He moved forward, allowing his face to be seen, if dimly, in the small circle of light. "We need a ride to Lincoln's Inn, please. Double fare." The driver grunted. "Up front?" he asked. Monk fished in his pocket, and Rathbone did the same. They handed over the coins gratefully and climbed inside. It still took them nearly three-quarters of an hour. Rathbone's chambers were all lit, and his clerk opened the door before Rathbone had time to ring the bell. "I'll get you tea, sir," the clerk said. "And a couple of sandwiches. Would cold beef be satisfactory?" "It'll be perfect," Rathbone said warmly. "I already took the liberty of serving Mr. Exeter, sir. He doesn't look well, poor man." Rathbone thanked him and led the way to his own suite of rooms. He opened the door, Monk on his heels. Immediately a man standing at the hearth turned to face them. He was above average height. His thick, fair hair was liberally sprinkled with gray, visible mostly at the temples. Monk guessed he would have been good-looking, were he not frantically worried, his skin slick with sweat. "Monk?" he asked, stepping forward. "Are you the commander of the Thames River Police?" Without waiting for an answer, he grasped Monk's hand. "Thank you for coming. It's a filthy night, I know. But this can't wait. I am Harry Exeter . . ." "Yes, I'm Monk." He took the man's hand briefly. "Rathbone told me about your situation." Exeter was shaking, in spite of the warmth of the room. "I've got almost all the money. I'm picking up the rest tomorrow. I have to be the one to hand it over. Don't argue with me about that. They insisted. Kate . . ." "I won't argue with you, Mr. Exeter," Monk assured him. "I'd like to know as much as you can tell me. That's the best we can do tonight. Tell me what you know, and what you suspect. If you have ideas of who could be behind this. And, for heaven's sake, sit down, man! Clear your head as much as you can. I have some idea how you feel." "How can you?" Exeter asked, his voice raised as if a sudden fury moved him. "How can you possibly know?" "Because my wife was kidnapped a little while ago. I was lucky, I got her back. And we'll do everything possible to get your wife back," Monk replied. "Oh . . ." Exeter looked at the floor. "I'm sorry. I . . . ​didn't think. When something like this happens, you feel so helpless . . . ​so alone. Everyone else looks safe, and you . . . ​you don't think anyone else can know how you feel." "I know. I felt desperate, too. But we got her back safely." Exeter searched his face, as if trying to judge how much of what Monk said was true, how much an attempt to calm him. Monk gave him a brief, tight smile. "Don't worry, Mr. Exeter, your wife will be returned to you before we do anything to catch the kidnappers. Have you any idea who they are or why it was she who was taken? Any enemies?" "Kate? Never!" he said vehemently. "I meant you . . . ​your enemies." "Oh! Yes, I suppose so. Every successful man makes enemies. I'm good at what I do. When I win a contract, it necessarily means that someone else loses. But that's business. I lose, sometimes. I don't hate the man who wins. I learn from it!" "If anything comes to your mind, do let me know," Monk dismissed the subject. "Now tell me what happened." "Kate had luncheon with her cousin, Celia Darwin. They are quite close. It was a lovely day, if you remember, nothing like today. They walked along the riverbank in the afternoon." "Where, exactly?" "Over Chelsea Bridge, and then along Battersea Park--" "Were there many people about?" "I suppose so. I really don't know. Celia was distraught! Poor woman felt as if it were somehow her fault. I couldn't get a lot of sense out of her. I'm sorry." "It doesn't matter. We can ask your wife when we get her back. What did Celia say?" "That a young man came up and asked the way, then started some sort of conversation. Celia's attention was diverted, and the next moment a group of people came by and Celia and Kate were separated, and when the newcomers were gone, Kate was, too . . . ​and so was the young man. She thought at first it was nothing, just silliness, but then when Kate didn't come back, she grew frightened and called for help. The police came, but there was no sign of Kate." "The police looked for her?" Exeter's expression filled with a mixture of anger and desperation. He seemed to be trying everything he could to keep his voice steady. "One pretty young woman, one plain one. A young man who apparently was handsome." He spread his hands helplessly. "They drew their own conclusions. Celia told them Kate was married, and would never do such a thing. Celia was so upset. She is plain and older, and she has a pronounced limp. They thought she was feeling alone, unwanted, and they didn't believe her. They intended to reassure her, but they only ended up insulting her." Excerpted from Dark Tide Rising: A William Monk Novel by Anne Perry All rights reserved by the original copyright owners. Excerpts are provided for display purposes only and may not be reproduced, reprinted or distributed without the written permission of the publisher. Kate, the wife of Oliver Rathbone's newest client Harry Exeter, has been kidnapped, and the abductors have demanded an enormous ransom for her safe return. Exeter, while a wealthy man, still scrambles to pull the money together. The kidnappers want the ransom exchange to take place on Jacob's Island, a dangerous place. Since he's familiar with the river and with Jacob's Island, Monk is the perfect person to accompany Exeter to make the exchange. He gathers his team, including his trusted second-in-command Hooper, to go with him. When they are attacked by the kidnappers and Kate is found brutally murdered, Monk suspects that one of his own men betrayed the operation. He lived through the abduction of his own beloved wife Hester and is especially eager to close this case. As Monk digs deeper into his team's past, old secrets are uncovered and many suspects emerge. VERDICT The 24th title in Perry's long-running William Monk series delivers an excellent atmospheric Victorian mystery. While astute readers will identify the villain long before Monk does, longtime fans will delight in the camaraderie among the series regulars and the return to the dark underbelly of polite British society.-Lynnanne Pearson, Skokie P.L., IL © Copyright 2018. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted. In Edgar-finalist Perry's riveting 24th William Monk novel set in Victorian England (after 2017's An Echo of Murder), an attorney approaches the Thames River police commander on behalf of Harry Exeter, an affluent man whose wife was abducted in broad daylight from a London riverbank the previous day. Exeter, who has assembled the considerable ransom demanded, wants Monk's help with handing it over at the site that the kidnappers have set for the exchange: Jacob's Island, not literally an island but a "region of interconnecting waterways with old offices and wharfs." Monk agrees to accompany Exeter there the next day, and assembles a group of his most trusted officers to be on the scene in disguise. But despite Monk's careful planning, the exchange ends in bloody failure, and he's left to wonder who on his team gave the kidnappers the details of his operation. The added suspense from Monk's mole hunt makes this one of the series' more powerful recent entries. Agent: Donald Maass, Donald Maass Literary. (Sept.) © Copyright PWxyz, LLC. All rights reserved. Cmdr. William Monk, of the Thames River Police, agrees to join a distraught husband in the ransom exchange for his kidnapped wife only to find every conceivable thing going disastrously wrong in Perry's latest slice of Victorian skulduggery.When his wife, Kate, is lured away from her cousin Celia Darwin, who's joined her for lunch in Battersea Park, wealthy developer Harry Exeter is perfectly willing to pay the enormous sum her kidnappers demand even if it means exhausting his own resources and tapping into an inheritance Maurice Latham, another cousin, is holding in trust for Kate for another 18 months. Because the criminals have appointed dark, treacherous Jacob's Island as the place to trade their victim for the ransom, Exeter's attorney, Sir Oliver Rathbone, suggests that his old friend Monk accompany him, and Monk himself handpicks five members of the TRP to join them: officers Bathurst, Laker, Marbury, Walcott, and Hooper, his second-in-command. Upon their arrival at Jacob's Island, the party is ambushed by a crew that makes off with the money, leaving behind the brutally slashed corpse of Kate Exeter. Since their assailants clearly knew in advance the precise movements of Monk and his team, Monk (An Echo of Murder, 2017, etc.) is forced to concede that one of his own men may have betrayed him. As he struggles to fix the guilt on one of them (bantam street fighter Walcott? Bathurst, whose family is eternally in financial straits? Hooper, whom he'd trusted more than once with his life?), two other murders follow, and John Hooper complicates matters even further by falling in love with Celia Darwinan apparent tangent that will play a crucial role in precipitating the courtroom climax.One of the most successful of prolific Perry's recent Victorian melodramas. The opening chapters are appropriately portentous, the mystification is authentic, and if the final surprise isn't exactly a shock, it's so well-prepared that even readers who don't gasp will nod in satisfaction. Copyright Kirkus Reviews, used with permission.
2019-04-26T04:55:15Z
http://bienville.polarislibrary.com/search/title.aspx?ctx=1.1033.0.0.1&cn=198822
This translates the Hebrew noun berîth. The verbal root means either “to fetter” or “to eat with,” which would signify mutual obligation, or “to allot” (1Sam.17.8), which would signify a gracious disposition. Compare this with the Hittite “suzerainty covenant,” in which a vassal swore fealty to his king out of gratitude for favors received. The LXX avoided the usual Greek term for covenant, synthēkē (meaning a thing mutually “put together”), as unsuitable for the activity of the sovereign God. Instead, it used diathēkē (a thing, literally, “put through”), the primary meaning of which is “a disposition of property by a will.” The LXX even used diathēkē, “will” (kjv “testament”) for the human-agreement type of berîth. New Testament revelation, however, makes clear the wonderful appropriateness of diathēkē, “testament,” for describing the instrument of God’s redemptive love (see Heb.9.16-Heb.9.18). Indeed, “will,” or “testament,” signifies a specific form of covenant, the bequest; and it well describes God’s Old Testament berîth, because apart from the death of Christ the Old Testament saints “should not be made perfect” (Heb.11.40 kjv). M. G. Kline, The Treaty of the Great King, 1963, and The Structure of Biblical Authority, 1975. COVENANT (in the NEW TESTAMENT) (διαθήκη, G1347, testament). A legal disposition, esp. of God for man’s redemption. At the same time, there existed in classical Gr., from the time of Aristophanes (427 b.c.; Birds, 440ff.) a secondary and limited usage by which διαθήκη, G1347, also signified an ordinance or even a dipleuric, treaty-like “convention or arrangement between two parties, a covenant,” to which definition the 8th ed. of Liddell and Scott added, “and so in later writers” (p. 346; cf. TWNT, II:127, 128). More recent lexicographers have, however, insisted that by Hel. times the term’s signification was “exclusively last will and testament” (AG, p. 182), which was the “ordinary and invariable contemporary [1st Christian cent.] meaning,” employed with “absolute unanimity” in the papyri and inscrs. (MM, pp. 148, 149). The thirty-three NT occurrences of diathēkē break down into three general groupings, determined by the subject or initiator of the “covenant” concerned: whether the subject be man, variously involved (three times); Christ, acting on the behalf of His Church (fourteen times); or Jehovah, accomplishing redemption for Israel (sixteen times, including Gal 4:24 which makes reference to the Church as well). The last mentioned group consists primarily of quotations from the OT. Christ’s covenant with God the Father. The problem of such relatively slight utilization of the covenant concept, outside of Hebrews, to describe the work of Jesus Christ, esp. when one compares the dominant position that it occupies in the OT, has led to no small discussion. Because of an assumed deterioration within the covenant idea during later OT days, G. E. Mendenhall proposes that “the covenant patterns were not really useful as a means of communication” (IDB, I:723). His assertion appears to be based upon negative critical assumptions about the externalized character of the Pentateuchal law and about its initial identification with the covenant only in the time of Ezra. This then leads to his disparaging conclusion that “the NT experience of Christ was one which could not be contained within the framework of a quasi-legal terminology or pattern of thought and action” (ibid.). This same writer later states, with greater plausibility, that it was an overemphasis upon law among the intertestamental Qumran sectarians and the NT Pharisees that worked in combination with the imperial government’s opposition to covenanting (anti-Rom.) secret societies, so as to “make it nearly impossible for early Christianity to use the term meaningfully” (ibid., I:722). As suggested by the above quotations, Christ’s diathēkē is, moreover, definitely testamentary in character. The implications of the Lord’s words, “This is my blood of the diathēkē, which is poured out for many for the forgiveness of sins” (Matt 26:28), have been analyzed by A. R. Fausset as follows: “These requisites of a testament occur—1. A testator; 2. heir; 3. goods; 4. the testator’s death; 5. the fact of the death brought forward; 6. witnesses; 7. a seal, the sacrament of the Lord’s Supper, the sign of His blood....The heir is ordinarily the successor of him who dies and so ceases to have possession. But Christ comes to life again, and is Himself (including all that He had), in the power of His now endless life, His people’s inheritance” (A Commentary, Critical, Experimental and Practical on the Old and New Testaments, VI: 556). Shortly thereafter the Lord affirms, “I διατίθεμαι, G1415, bequeath unto you a kingdom” (Luke 22:29), though this literal meaning cannot always be insisted upon since His next words require a broader, non-testamentary usage: “as my Father appointed, διέθετο, unto me” (cf. Vos, PTR, 13 , 608). Vos notes a trend, “moving away from the rendering ‘covenant’ to the other tr.” (ibid., p. 593); and, as he later states, “There are passages...for instance, those recording the institution of the Lord’s Supper, where a further return to ‘testament’ may seem advisable” (Biblical Theology, p. 35). The emphasis of the communion supper upon Christ’s sacrificial death, not simply upon a mealtime fellowship, with other characteristics of Christ’s diathēkē, are developed further under The New Covenant (q.v.); but this much does appear, that, just as in the case of the diathēkēs betw een men, so in the case of Christ’s diathēkē with God the Father, “covenant” in the NT warrants more precise definition as one’s last will and testament. Finally, Romans 11:26, 27 quotes Isaiah 59:20, 21, in its anticipation of God’s still future covenant with Israel: “My covenant with them when I take away their sins.” The point of the reference seems to go beyond that of Jeremiah’s new testament (Jer 31:31-34), which was fulfilled in Christ’s sacrificial first coming (see THE NEW COVENANT, IV), and to imply Ezekiel’s testament of peace (Ezek 37:25-28), which will some day transform not only the Jewish nation, but also all the nations of the world, at His victorious Second Coming. The progressive revelations of the diathēkē will thus have achieved that same goal of final salvation which the prophets anticipated. In fact, the Apostle John closes out human history in the first half of his Apocalypse with an OT covenant-object, “In heaven...there was seen in his temple the ark of his covenant” (Rev 11:19). God’s NT revelation provides His own normative explanation about the nature of the old diathēkē: it not only confirms the validity of the OT’s affirmations; it also establishes the ultimate character of those aspects of divine redemption that had, perforce, to remain unclarified prior to the incarnation of Jesus Christ (see COVENANT IN THE OT). Within the context of the NT the most crucial passage is Hebrews 9:15-22, esp. vv. 16 and 17. The former reads, “For where a diathēkē is, there must also of necessity be the death of the testator” (KJV). These words indicate a last will. Marcus Dodds, B. F. Westcott, and a few others have argued that the “death” signifies only a self-imprecation of dismemberment for non-fulfillment (cf. Jer 34:18-20), which was “brought out” by the ratifying ceremonies of a covenant. Such an explanation appears unlikely, for it is not the threat of death but the death itself that is brought out or adduced. Furthermore, the threat of death does not seem always to have been a necessary element in covenantal, as opposed to testamental, thought; cf. David and Jonathan. Verse 17 is decisive: “For a diathēkē is of force after men are dead: otherwise it is of no strength at all while the testator liveth” (KJV). As Dean Alford stated: “It is quite vain to deny the testamentary sense of diathēkē in this v....I believe it will be found that we must at all hazards accept the meaning of testament, as being the only one which will in any way meet the plain requirement of the verse” (The Greek Testament, IV:173, 174; cf. the renderings of ASV, RSV). From this point it follows naturally to conclude with E. Riggenbach (Der Begriff Διαθήκη im Hebräerbrief) that in Hebrews as a whole the term likewise connotes “testament” (contrast Vos, PTR, 3 , 617, 618). The same conclusion may, however, be applied to all the NT’s references to the older testament. Vos favors a true testamentalism in Acts 3:25 (following Deissmann, op. cit., p. 175; cf. MM, p. 148), where Luke states that the diathēkē that God made with the Israelite fathers has been realized in Jesus Christ; Paul’s stress rests upon legal terminology and the fact of inheritance (Gal 4:24-30). The testamentary significance of the NT term diathēkē when used for Christ’s newer covenant with the Father and for covenants between men has already been noted (see above, II, iii). Concerning the latter, Vos contends: “That Paul (Gal 3:15)...gives this specific turn to the idea...cannot, of course, give plausibility to the assumption that the LXX associated God with the idea of a ‘last will’” (op. cit., pp. 601, 602; vs. Deissmann, loc. cit.). Furthermore, the fact that the NT uses diathēkē for God’s covenant with Israel and that it specifies the meaning “testament” does not prove what the LXX trs. may have had in mind either. It does show that the divine author of the OT intended the saving bequest of His Son Jesus Christ from the very inception of His revelations. Patristic writers even went so far as to say that, since Israel had from the beginning forfeited the covenant by their idolatry, there really was no “new covenant” at all, but just the one testament in the death of Jesus, for Christians only (Barnabas, 4:8-18; 13-14:5). B. F. Westcott, The Epistle to the Hebrews (1889), esp. 298-302; G. B. Stevens, The Theology of the NT (1906), 490-514; E. Riggenbach, Der Begriff Διαθήκη im Hebräerbrief (1908); A. Carr, “Covenant or Testament? A note on Heb 9:16f.,” EXP, VII: 7 (1909), 347ff.; L. G. da Fonseca, “Διαθήκη—foedus an testamentum?” Biblica, 8 (1927), 9 (1928); MM, 148, 149; J. Behm, “διατίθημι, διαθήκη,” TWNT (1935), II: 105-137; G. Vos, Biblical Theology (1948), esp. 32-36; R. Bultmann, Theology of the NT (1951), esp. I: 97, 98, 110, 340; R. Campbell, Israel and the New Covenant (1954); J. Murray, The Covenant of Grace (1954), esp. 25-30; J. B. Payne, Theology of the Older Testament (1962), 82-85. COVENANT (in the OLD TESTAMENT) (בְּרִית, H1382, LXX διαθήκη, G1347, agreement, testament). A legally binding obligation, esp. of God for man’s redemption. Basically, however, the meaning of the b’rith must be sought not in its etymology or significance as found in the pagan cultures that surrounded Israel. Only in the transformed usage of the term, as it appears in God’s own historical revelation, is its ultimate import disclosed. Three usages of b’rith appear in the OT. Most such divine suzerainty covenants also involve redemptive, promissory elements (see below, C); but there do exist two minor passages and one major situation that are specifically divine disposition-b’riths. For the former, Jeremiah 33:20, 25 refers to God’s covenanted “ordering of day and night”; and Zechariah 11:10 speaks of God’s breaking His b’rith which He “had made with all the people”; the contextually suggested meaning is that, while God used to order world history in favor of Israel (cf. Deut 32:8), now He has freed all peoples from this “covenant” obligation. The latter situation concerns God’s preredemptive arrangement with Adam. Scripture refers to it as a b’rith (Hos 6:7), and it is not inaptly styled the “covenant” of works. For though Eden exhibits no partnership of equals, and no voluntary mutual agreement was reached prior to God’s sovereign disposition, there yet existed a certain balance of obligations and benefits that were equally binding upon the two parties concerned. Never again has history witnessed such a situation, with the exception of the life of the man Christ Jesus, who was the representative last Adam and who fulfilled all righteousness (1 Cor 15:45). Promissory covenants, or suzerainty testaments. The legally binding nature of a promise could be enforced by a covenant, e.g., to support a new king (2 Kings 11:4) or to release slaves (Jer 34:8). The recipient of the promise might be God Himself, e.g., Ezra 10:3, to “make a covenant with our God to put away all these [foreign] wives.” This is the case in 2 Kings 23:3a, where Josiah made a covenant to confirm the words of God’s b’rith that were written in the rediscovered Book; cf. 2 Chronicles 29:10, “It is in my heart to make a [not the] covenant with the Lord that his fierce anger may turn away from us.” More frequently, however, it is God who makes this b’rith, and thereby assures men of His promises (cf. Gen 15:18). Kline summarizes it by stating that when men swear to a binding obligation there arises a b’rith of law, but that when God does there arises a b’rith of grace (WTJ, 27). Specifically, when the parties concerned are God in His grace and man in his sin, on whose behalf God acts, the b’rith becomes God’s self-imposed obligation for the deliverance of sinners, an instrument of inheritance for effectuating God’s elective love (Deut 7:6-8; Ps 89:3, 4). Through it He accomplishes the gracious promise that is found throughout Scripture, “I will be their God; they shall be my people.” John Murray thus defines this third divine b’rith as “a sovereign administration of grace and promise. It is not a ‘compact’ or ‘contract’ or ‘agreement’ that provides the constitutive or governing idea but that of ‘dispensation’ in the sense of disposition” (The Covenant of Grace, p. 31; cf. pp. 10-12, 14-16). The inheritance was not automatic. Though essentially monergistic, effectuated by “one worker” (God, not man and God), the b’rith required that men qualify for it; and, concretely, God’s holiness demanded a removal of sin. This removal, in turn, came about by atonement, the covering of sin’s guilt (q.v.). Atonement, then, demanded blood sacrifice, a substitutionary surrender of life (Lev 17:11). Furthermore, only God or His representative could make such atonement (Exod 15:13; cf. A. B. Davidson, The Theology of the OT, p. 321). As Genesis 15:17, 18 dramatically puts it, God committed Himself to the covenantal threat of self-dismemberment; and thus God saves “because of the blood of my b’rith” (Zech 9:11). Ultimately then the b’rith is, as the NT declares (Heb 9:15-17), a testament: the last will of the dying God, bequeathing an inheritance of righteousness to Israel. The OT, per force, never verbalizes this conclusion, and for two reasons. (a) While the idea of an inheritance was familiar to the OT (Gen 27; Num 36), and while the practice of Hitt. kings, guaranteeing testamentary protection to those vassals who remained faithful to their successors, was evidently familiar to Moses, the concept of a personal will remained relatively foreign to Heb. thought until the days of the Herods (Jos. Antiq., 17. 3.2; War, 2.2.3). (b) The fact that God’s only Son would some day constitute the sufficient sacrificial ransom was not yet clearly revealed. It remained incomprehensible to OT saints that, to satisfy God, God’s Son must die, that men might inherit His divine life, and so be with God. Its knowledge was far too seminal, both of the Trinity and of the incarnation, and of the crucifixion followed by the resurrection (though cf. Isa 53:10, 11). Neither does the OT deny to God’s promissory b’rith the possibility of this testamentary interpretation, and actually all of its essential factors are present. The OT simply assigns to God’s legally binding, monergistic declaration of redemption the title b’rith; and for its subsequent theological explication, through the LXX and the Qumran community, into the Apostolic Church, see Covenant (in the New Testament). In the light, however, of NT explanations, the testamentary significance of b’rith in the OT comes into clear focus. When referring to God’s promissory instrument for the reconciliation of men with Himself, this becomes apparent both by analogy and by the nature of the b’rith itself. For the former, since Hebrews 9:15 reads, “He is the mediator of a new covenant,” then by analogy v. 18 must read, “Wherefore even the first testament hath not been dedicated without blood” (ASV). The old, that is, must be in the same category as the new. For the latter, Franz Delitzsch has remarked concerning the inherent nature of God’s instrument: “The old covenant was...a testamentary disposition, insofar as God bound Himself by promise to bestow, on Israel continuing faithful, an ‘eternal inheritance.’...Being thus a testament, it is also not without such a death as a testament requires, albeit an inadequate foreshadowing of the death of the true διαθέμενος [testator]” Commentary on the Epistle to the Hebrews, II:109, 110. The OT declares that God saves “because of the blood of the b’rith” (Zech 9:11); and, as Hebrews 9:15 explains, Christ “is the mediator of a new covenant, that a death having taken place for the redemption of the transgressions that were under the first covenant” (ASV, cf. John 14:6). Though men’s faith in His death had to be anticipatory and veiled, yet from the first it was known that for the serpent’s head to be crushed the heel of the seed of woman would have to be bruised (Gen 3:15). Even in the case of most of the OT’s statutory b’riths, or dispositions, of God with men (Part B, above) the designation suzerainty “testament” appears preferable to suzerainty “covenant” (KJV). This follows as a natural development from the concept of b’rith as a redemptive bequest. A last will carries requirements: an heir may break his testamental obligation, but by so doing he forfeits his inheritance; cf. Eichrodt’s stress upon the b’rith as being at once both grace and precept (Theology of the OT, I:37). Though the testament is truly a bestowal, it is, as Delitzsch noted, a bestowal “on Israel continuing faithful.” Here apply such vv. as Leviticus 24:8, where the preparation of the presence-bread, “shewbread,” is styled a perpetual b’rith; for the b’rith was more than a simple statute: the “shewbread” in this case stood as a symbol of God’s graciously redeeming presence; so that to make provision for it was to carry out an ordinance that contributed to man’s participation in divine salvation. Minor as it was, it expressed Israel’s faith in the gracious Testator. “To keep His b’rith” means, therefore, “to satisfy His testament” in its conditions for inheritance. Similar in nature are 2 Kings 11:17, “Jehoiada made [executed] the testament [not a covenant] that they should be the Lord’s people,” and 2 Chronicles 15:12, which speaks of entering into the testament. Indeed, all of God’s sovereignly imposed suzerainty b’riths are “testaments,” requirements for redemption that He graciously reveals to His own, so as to enable their reconciliation to Himself. On the basis of Hebrews 9’s applicability to both OT and NT, one may define b’rith as a “legal disposition by which qualified heirs are bequeathed an inheritance through the death of the testator.” Five major aspects to the testamental arrangement appear: the testator, who gives and is styled “the mediator” (Heb 9:15); the heirs, who receive and are also referred to as “the called” (9:15); the method of effectuation, namely, by a gracious bequest that is executed upon the death of the testator (9:16); the conditions, by which the heir qualifies for the gift, for as Hebrews 9:28 KJV puts it, the testament is “to them that look for him” (cf. its being “commanded,” 9:20 RSV); and the inheritance which is given, namely, “eternal inheritance” (9:15, 28). (3) It is the inheritance aspect of the testament that suggests its third objective feature: the promise that is made, namely, salvation, in terms of reconciliation with God. From the first book of the Bible to the last, moreover, one statement in particular is employed to characterize the reconciled heirs of the b’rith (cf. Gen 17:7; Rev 21:3). As John Murray states, “Its constant refrain is the assurance, ‘I will be your God, and you shall be My people’” (The Covenant of Grace, p. 32); “This is the promise of grace upon which rests the communion of the people of God in all ages” (Christian Baptism, p. 47). Out of zeal to guard against an anthropocentric religion and to safeguard the ultimate sovereignty of God, some evangelicals tend currently to minimize this promissory element. On the one hand, certain covenant theologians have defined b’rith as simply “a sovereign administration of the Kingdom of God...an administration of God’s lordship, consecrating a people to himself under the sanctions of divine law” (M. Kline, “Law Covenant,” WTJ, 27 , 17). While rightly stressing the priority of law and obedience in God’s original covenant of works with Adam (see conclusion of II-B, above), they have neglected the fact that in every subsequent b’rith, it is the redemption by divine grace that becomes central. On the other hand, certain dispensational theologians, while rightly subordinating man’s redemption to God’s final glory, have tended to minimize the pervasiveness of the salvation theme in Scripture (cf. J. Walvoord, BS, 103 , 3) and gone on to assume a replacement of God’s unconditional promise, e.g., to Abraham, by subsequent law, e.g., the Mosaic (cf. D. Pentecost, Things to Come, p. 68). As Eichrodt has well pointed out, “The Hebrew berīt has to cover two lines of thought:...‘legal system’...and ‘decree of salvation’...which can yet only in conjunction render the whole content of that divine activity covered by the term berīt” (Theology of the OT, I:66; cf. Gal 3:17). (4) Another objective feature, which likewise relates to the aspect of heirship, is the eternity of the inheritance (John 3:16; 10:27-29). Leviticus 2:13 speaks pictorially of “the salt [eternal preservation] of the b’rith of thy God”; 1 Chronicles 16:15 and Psalm 105:8-10 talk directly of the fact that God “is mindful of his covenant forever.” Then the prophecy of Daniel 7 climaxes in the universal and everlasting dominion that is to be received by the saints (vv. 14, 27). (5) Finally, along with these four, is the always present feature of the confirmatory sign, some visible demonstration of God’s ability to perform what He has promised. The ultimate such sign is Christ’s victory over the grave, which serves as a pledge of His deity (Rom 1:4), of justification (4:25), and of immortality and resurrection (1 Cor 15:20-22). Other signs, however, have been introduced with each historical revelation of the b’rith (see IV chart, below). Certain of these were somewhat modified at Christ’s first coming, but God has never repealed His earlier signs. The above-listed eight features (III, B-C) of God’s OT promissory covenant, or testament, stand in marked contrast with those of His suzerainty covenant of works with Adam (see above, II, conclusion of B) which preceded it. Certain of its features appear also in the Adamic covenant: e.g., both arangements reflect the same fundamental situation of divine justice—that man’s chief end is to glorify God (Isa 43:7; Rom 11:36); and that as it was originally in Genesis 2, so at the final judgment, all men will be judged on the basis of works (Gen 3:11; Rev 20:12). Under the promissory testament, however, it is Christ who provides the justifying works, not man himself (Phil 3:9; cf. Isa 45:24, 25). In the summer of 1446 b.c., following its miraculous exodus from Egypt, Israel was granted the fourth of God’s testamentary revelations in history; cf. an increasing modern recognition of Mosaic historicity (IDB, I:719). The particularism of the Sinaitic b’rith now embraced their entire nation rather than a mere family (Exod 19:5, 6, vv. that affect all subsequent formulations of the b’rith, J. Muilenburg, VT, 9 , 352). The large group involved, over two million people, thus accounts for the detailed Mosaic legislation that follows: both the moral requirements of the testament (Neh 9:13, 14) and the forms of ceremonial obedience that make up the ritual of the Tabernacle, which became the testamental sanctuary. Deuteronomy 7:7, 8 and 9:4-6 base the b’rith on God’s love, His free grace. This graciousness of the testament was unique to the faith of Israel, preserving humility on the part of the inheritors and checking tendencies toward legalistic distortions or toward any necessary equating of God with the national interests (cf. G. E. Wright, The OT Against Its Environment, ch. 11). Sinai therefore was not essentially a conditional covenant of works (cf. Murray, NBD, p. 266; or, The Covenant of Grace, pp. 20-22), despite the objection of Mendenhall (IDB, I:718), who would view Sinai as opposed to the other b’riths in this regard. Anticipated in Numbers 18:19, when Aaron and his family were granted certain offerings as “a covenant of salt,” the Levitical testament arose out of the heroic action of Phinehas, grandson of Aaron, against national apostasy and immorality (Num 25:8). The promise of the Levitical b’rith lay specifically in God’s bestowal of the priestly office on this particular group of Levites (v. 13) and in the resultant reconciliation that they experienced with God (cf. Mal 2:6). It possessed also a broader redemptive significance, for it was through the priesthood that God’s wrath was turned away from Israel as a whole (Num 25:11). It was ultimately anticipatory of Christ’s testamental work of divine propitiation (Heb 7:11, 19). F. Korosec, Hethitische Staatsvertrage (1931); J. Behm and G. Quell, διατίθημι, ειαθήκη, TWNT (1935), II:105-137; G. Vos, Biblical Theology: Old and New Testaments (1948); J. Murray, The Covenant of Grace (1954); G. E. Mendenhall, Law and Covenant in Israel and the Ancient Near East (1955); J. A. Fitsmyer, “The Aramaic Suzerainty Treaty from Sefire in the Museum of Beirut,” CBQ, 20 (1958), 111-176; D. J. Wiseman, “The Vassal Treaties of Esarhaddon,” Iraq, 20 (1958), 1-100; E. J. Young, The Study of OT Theology Today (1958); J. Muilenberg, “The Form and Structure of the Covenantal Formulations,” VT, 9 (1959), 347-365; J. A. Thompson, “Covenant Patterns in the Ancient Near East and their Significance for Biblical Studies,” The Reformed Theological Review, 18 (1959), 65-75; K. Baltzer, Das Bundesformular (1960); M. G. Kline, “The Two Tables of the Covenant,” “Dynastic Covenant,” and “Law Covenant,” WTJ, 22 (1960), 123-146, 23 (1960), 1-15, 27 (1964), 1-20; J. A. Fitsmyer, “The Aramaic Inscriptions of Sefire I and Sefire II,” JAOS, 81 (1961), 178-222; J. B. Payne, Theology of the Older Testament (1962); F. C. Fensham, “Malediction and Benediction in Ancient Near Eastern Vassal-Treaties and the OT,” ZAW, 74 (1962), 1-9, and “Clauses of Protection in Hittite Vassal Treaties and the OT,” VT 13 (1963), 133-143; D. J. McCarthy, Treaty and Covenant (1963); J. A. Thompson, “The Significance of the Ancient Near Eastern Treaty Pattern,” The Tyndale House Bulletin, 13 (1963), 1-6, and The Ancient Near Eastern Treaties and the OT (1964); W. Brueggemann, “Amos IV, 4-13 and Israel’s Covenant Worship,” VT, 15 (1965), 1-15; R. E. Clemens, Prophecy and Covenant (1965); E. Gerstenberger, “Covenant and Commandment,” JBL, 84 (1965), 38-51; D. J. McCarthy, “Covenant in the OT: the Present State of Inquiry,” CBQ, 27 (1965), 217-240; C. C. Ryrie, Dispensationalism Today (1965); G. M. Tucker, “Covenant Forms and Contract Forms,” VT, 15 (1965), 487-503; P. B. Harner, “Exodus, Sinai, and Hittite Prologues,” JBL, 85 (1966), 233-236; K. A. Kitchen, Ancient Orient and OT (1967), 90-102. We consider first a covenant in which both contracting parties are men. In essence a covenant is an agreement, but an agreement of a solemn and binding force. The early Semitic idea of a covenant was doubtless that which prevailed among the Arabs (see especially W. Robertson Smith, Religion of the Semites, 2nd edition, passim). This was primarily blood-brotherhood, in which two men became brothers by drinking each other’s blood. Ordinarily this meant that one was adopted into the clan of the other. Hence, this act involved the clan of one of the contracting parties, and also brought the other party into relation with the god of this clan, by bringing him into the community life of the clan, which included its god. In this early idea, then, "primarily the covenant is not a special engagement to this or that particular effect, but bond of troth and life- fellowship to all the effects for which kinsmen are permanently bound together" (W. Robertson Smith, op. cit., 315 f). In this early ceremonial the religious idea was necessarily present, because the god was kindred to the clan; and the god had a special interest in the covenant because he especially protects the kindred blood, of which the stranger thus becomes a part. This religious side always persisted, although the original idea was much modified. In later usage there were various substitutes for the drinking of each other’s blood, namely, drinking together the sacrificial blood, sprinkling it upon the parties, eating together the sacrificial meal, etc.; but the same idea found expression in all, the community of life resulting from the covenant. (1) A statement of the terms agreed upon (Ge 26:29; 31:50,52). This was a modification of the earlier idea, which has been noted, in which a covenant was all-inclusive. (2) An oath by each party to observe the terms, God being witness of the oath (Ge 26:31; 31:48-53). The oath was such a characteristic feature that sometimes the term "oath" is used as the equivalent of covenant (see Eze 17:13). (3) A curse invoked by each one upon himself in case disregard of the agreement. In a sense this may be considered a part of the oath, adding emphasis to it. This curse is not explicitly stated in the case of human covenants, but may be inferred from the covenant with God (De 27:15-26). (4) The formal ratification of the covenant by some solemn external act. The different ceremonies for this purpose, such as have already been mentioned, are to be regarded as the later equivalents of the early act of drinking each other’s blood. In the Old Testament accounts it is not certain that such formal act is expressly mentioned in relation to covenants between men. It seems probable, however, that the sacrificial meal of Ge 31:54 included Laban, in which case it was a covenant sacrifice. In any case, both sacrificial meal and sprinkling of blood upon the two parties, the altar representing Yahweh, are mentioned in Ex 24:4-8, with allusions elsewhere, in ratification of the covenant at Sinai between Yahweh and Israel. In the covenant of God with Abraham is another ceremony, quite certainly with the same purpose. This is a peculiar observance, namely, the cutting of animals into two parts and passing between the severed portions (Ge 15:9-18), a custom also referred to in Jer 34:18. Here it is to be noted that it is a smoking furnace and a flaming torch, representing God, not Abraham, which passed between the pieces. Such an act, it would seem, should be shared by both parties, but in this case it is doubtless to be explained by the fact that the covenant is principally a promise by Yahweh. He is the one who binds Himself. Concerning the significance of this act there is difference of opinion. A common view is that it is in effect a formal expression of the curse, imprecating upon oneself the same, i.e. cutting in pieces, if one breaks the terms of the covenant. But, as W. R. Smith has pointed out (op. cit., 481), this does not explain the passing between the pieces, which is the characteristic feature of the ceremony. It seems rather to be a symbol that the two parties "were taken within the mystical life of the victim." (Compare the interpretation of Heb 9:15-17 in COVENANT, IN THE NEW TESTAMENT.) It would then be an inheritance from the early times, in which the victim was regarded as kindred with the tribe, and hence, also an equivalent of the drinking of each other’s blood. Other features beyond those mentioned cannot be considered as fundamental. This is the case with the setting up of a stone, or raising a heap of stones (Ge 31:45,46). This is doubtless simply an ancient custom, which has no direct connection with the covenant, but comes from the ancient Semitic idea of the sacredness of single stones or heaps of stones. Striking hands is a general expression of an agreement made (Ezr 10:19; Eze 17:18, etc.). 1. Essential Idea: As already noted, the idea of covenants between God and men doubtless arose from the idea of covenants between men. Hence, the general thought is similar. It cannot in this case, however, be an agreement between contracting parties who stand on an equality, but God, the superior, always takes the initiative. To some extent, however, varying in different cases, is regarded as a mutual agreement; God with His commands makes certain promises, and men agree to keep the commands, or, at any rate, the promises are conditioned on human obedience. In general, the covenant of God with men is a Divine ordinance, with signs and pledges on God’s part, and with promises for human obedience and penalties for disobedience, which ordinance is accepted by men. In one passage (Ps 25:14), it is used in a more general way of an alliance of friendship between God and man. Various phrases are used of the making of a covenant between God and men. The verb ordinarily used of making covenants between men, karath, is often used here as well. The following verbs are also used: heqim, "to establish" or "confirm"; nathan, "to give"; sim, "to place"; tsiwwah, "to command"; `abhar, "to pass over," followed by be, "into"; bo, "to enter," followed by be; and the phrase nasa’ berith `al pi, "to take up a covenant upon the mouth of someone." The history of the covenant idea in Israel, as between God and man, is not altogether easy to trace. This applies especially to the great covenants between God and Israel, namely, the one with Abraham, and the one made at Sinai. The earliest references to this relation of Israel to Yahweh under the term "covenant" are in Ho 6:7; 8:1. The interpretation of the former passage is doubtful in details, but the reference to such a covenant seems clear. The latter is considered by many a later addition, but largely because of this mention of the covenant. No other references to such a covenant are made in the prophets before Jeremiah. Jeremiah and Ezekiel speak of it, and it is implied in Second-Isaiah. It is a curious fact, however, that most of the later prophets do not use the term, which suggests that the omission in the earlier prophets is not very significant concerning a knowledge of the idea in early times. In this connection it should be noted that there is some variation among the Hexateuchal codes in their treatment of the covenants. Only one point, however, needs special mention. The Priestly Code (P) gives no explicit account of the covenant at Sinai, and puts large emphasis upon the covenant with Abraham. There are, however, apparent allusions to the Sinaitic covenant (Le 2:13; 24:8; 26:9,15,25,44,45). The facts indicate, therefore, principally a difference of emphasis. In the light partly of the facts already noted, however, it is held by many that the covenant idea between God and man is comparatively late. This view is that there were no covenants with Abraham and at Sinai, but that in Israel’s early conceptions of the relation to Yahweh He was their tribal God, bound by natural ties, not ethical as the covenant implies. This is a larger question than at first appears. Really the whole problem of the relation of Israel to Yahweh throughout Old Testament history is involved, in particular the question at what time a comprehensive conception of the ethical character of God was developed. The subject will therefore naturally receive a fuller treatment in other articles. It is perhaps sufficient here to express the conviction that there was a very considerable conception of the ethical character of Yahweh in the early history of Israel, and that consequently there is no sufficient reason for doubting the fact of the covenants with Abraham and at Sinai. The statement of W. Robertson Smith expresses the essence of the matter (op. cit., 319): "That Yahweh’s relation is not natural but ethical is the doctrine of the prophets, and is emphasized, in dependence on their teaching, in the Book of Deuteronomy. But the passages cited show that the idea had its foundation in pre prophetic times; and indeed the prophets, though they give it fresh and powerful application, plainly do not regard the conception as an innovation." A little further consideration should be given to the new covenant of the prophets. The general teaching is that the covenant was broken by the sins of the people which led to the exile. Hence, during the exile the people had been cast off, the covenant was no longer in force. This is stated, using other terminology, in Ho 3:3 f; 1:9; 2:2. The prophets speak, however, in anticipation, of the making of a covenant again after the return from the exile. For the most part, in the passages already cited, this covenant is spoken of as if it were the old one renewed. Special emphasis is put, however, upon its being an everlasting covenant, as the old one did not prove to be, implying that it will not be broken as was that one. Jeremiah’s teaching, however, has a little different emphasis. He speaks of the old covenant as passed away (31:32). Accordingly he speaks of a new covenant (31:31,33). This new covenant in its provisions, however, is much like the old. But there is a new emphasis upon individuality in approach to God. In the old covenant, as already noted, it was the nation as a whole that entered into the relation; here it is the individual, and the law is to be written upon the individual heart.
2019-04-25T08:25:45Z
https://www.biblicaltraining.org/library/covenant
I look forward to listening to your sermon. I used to be anti-paedobaptist as well. However, my firstborn son was just baptized on July 27 of this year. I attend Christ Church, EPC in Anderson, SC. When some of my closest seminary friends and pastor explained to my wife and I what paedobaptism is all about, we had no choice but to embrace it. The aspect that hits home with me the most is the idea of covenant community. Since we are a part of the covenant community, as were the infant Israelites that were circumcised also a part of their covenant community, our children are, by default, a part of our community as well. Our son's baptism is a sign of that covenant between his parents and God. Again, I look forward to listening to your sermon and will endeavor to make a followup comment once I do. I am Reformed but not a paedobaptist, after wishing I could be for many years. I say that to let you know that I am not against the idea if it is biblical. I am a student at RTS, where paedobaptism is taught. I have read more books and articles supporting and defending Reformed paedobaptism than I can recall to mind. The problem with it, in my view, is that it is only a plausible theory, which doesn't pass muster according to Chapter 1 of the WCF as a "good and NECESSARY consequence" of any teaching. It is at least as plausible not to be true than it is to be true. That doesn't cut it, especially since every time we hear about baptism in the New Testament it applies to believers (and not their seed, Acts 2 notwithstanding). It seems that if I am ever going to be convinced, it will have to be based on more than a plausible view that is no more plausible, than say, Paul Jewett's view of the covenant and baptism. Thanks for your point of view. If you read Acts chapter two at the end of Peter's sermon you should note that Peter is actually preaching to Jews and quoting (lifting) covenant language from Genesis chapter 17 which is directly speaking of God's covenant with Abraham - the sign and seal of which is put on infants. The Jews standing there listening to Peter's sermon could not have understood his statement "be baptized ...this is for you and your children" (Covenant language) any other way than that their infants were to be baptized. They could not possibly have understood him to be referring to wait till they were of age to consent. Instead the Jews heard him in their own context - understanding that he was relating the covenant sign with Abraham to the new covenant sign in the church - that their children were to be baptized in the same way they were circumcised. The Jews would have immediately understood the Gen 17 connection. The "and your children" to Jews could only mean "days old infants" - Peter does not redefine it. This would have been the place to do so. I believe It does not get much clearer than that. The fact that no one in the early church practiced believers'-only baptism reveals that this is also how they understood it. The Bible is a federal document. Like Adam Jesus is our federal representative. it is how the Bible speaks from beginning to end. for my sake, and because you probably have a more learned understanding of it, can you state for me the issue in credo as opposed to paedo? Is it "decision" theology, that is, one must grow up in their beliefs and make a decision to die with Christ in the waters of baptism by their own choice? I am paedo for a reason and will bring it out after some comments from you, thanks. I have read and interacted with many of the arguments put forth by anti-believer baptists, but the inescapable stumbling blocks remain: the lack of explicit command or example to baptize infants contrasted with the command and example of baptizing confessing believers and the fact that Jeremiah 31 describes a new covenant, unlike the Old Covenant, that is different not only in mediator but in membership. Those who do not believe (which would include infants) are not members of the New Covenant and as such should not partake in the Supper and not be baptized into the covenant community. First, whenever I see or hear v. 39 used to defend infant baptism, there is a group listed as beneficiaries of the promise that is never addressed - 'all who are far off.' I would guess this is referring to Gentiles who would be baptized upon believing? Second, in v. 41 there seems to be a prerequisite to baptism - the reception of the word. Repentance also seems to accompany baptism in v. 38. Are these applicable only to adults, or are they to be held as necessary for infants as well? Third, in v. 38, Peter promises that after repentance and baptism in the name of Christ for the forgiveness of sins, the Holy Spirit will be given. Do infants who are baptized receive the Holy Spirit? I guess this is all a moot point if baptism is not the sign and seal of the new covenant. What passages of Scripture teach that baptism replaces circumcision as that sign and seal? While I'm sympathetic to your position, I remain unconvinced that Scripture teaches that I need to baptize my children. I do want to be biblical, so your comments would be greatly appreciated. Thank you for participating in the discussion. You asserted that the OT was "different not only in mediator but in membership" for us in Christ. I have many very close friends who are credo-baptists and I fully respect the position and those holding it. I believe it is held in genuine conviction .. I am simply saying that I have been convinced otherwise after years of holding that position. "And all whom God will call to Himself" - these is no issue and never has been an issue of believers' baptism, the problem is with believers' only baptism. I was personally a credo-baptist for 20 years and went to paedo-baptism kicking and screaming but I was finally overwhelmed by the testimony of the Scriptues and could no longer argue against paedobaptism. So I know exactly how you feel and I appreciate your positoin as a deeply held personal conviction which you think the Bible teaches. You asked >>>What passages of Scripture teach that baptism replaces circumcision as that sign and seal? I just showed you one. The end of the sermon of Peter in Acts 2 believers are commanded to baptise their children. He uses baptism in the VERY same covenantal language directly lifted from Genesis 17, which was God's covenenat with Abraham commanding him to baptize his 8 day old children - thus Peter directly equated baptism with circumsision. Gen 17: 10"This is My covenant, which you shall keep, between Me and you and your descendants after you: every male among you shall be circumcised. The Jews listening to Peter speak could not have understood him in any other way. They were intimately familiar with this language. I believe it would actually fall on you to prove that the Jews would have understood Peter differently. Infants who are baptized do not receive the Holy Spirit automatically as a result no. Neither did the infants circumcised in the OT receive the Holy Spirit automatically. Neither do all those who are baptized in the NT automtically receive the Holy Spirit. Only the "children of promise" (See Rom 9) will receive the Holy Spirit. Again, the church did not practice believers-only baptism until the 16th century and that includes the church fathers. The early church understood the apostles to be teaching covenant infant baptism. Look carefully at history. There were many hard debates about many issues in the early church. Baptism was not one of them. Why? Because everyone accepted infant baptism within the family of believers. If there was any question about this you would have certainly seen a big debate about this early on, but there wasn't. Don't you think the church is strangely silent on an issue that for sure would have been debated on if there were any doubt. I affirm baptism for people who demonstrate repentance and belief only. I don't affirm infant baptism in part because it is not something you come to from simply reading the Scriptures; as some have argued, it requires a bit of knowledge outside the Scriptures in order to arrive at it. There's a bit of complexity involved with arriving at it. Please don't misunderstand me, I am not saying this is bad. But at the same time, I am not sure those arguments hold well. An example is that of its history in the church. In one translation of the Confessions of Augustine, there is an endnote which says that during Augustine's time, baptism was often deferred and the practice of baptizing infants was more prevalent in North Africa than elsewhere. Also, I remember how one Baptist minister (I think Mark Dever) was mentioning how the Didache supported baptism for believers only; I think the Didache is dated at around the late 1st or early 2nd century. I was just reading the part on baptism, and the pouring of water is a last resort recommended by the author(s) when flowing, cold, or warm water are not available; doesn't seem like a kind ritual for a baby. There is also one more thing I would like to mention about basing a doctrine in part on church history. Church history can be shaky ground for a doctrine. Early Christians sometimes believed and practiced silly things. In book one of Augustine's Confessions, he mentions how he was "seasoned with his salt". An endnote to this section says, "Infants of Christian families were sanctified with prayers, the sign of the cross, and the placing of salt on the tongue as exorcism." Even great Christian minds in the early church believed and practiced things that most if not everyone would declare to be unbiblical today. But I will continue to study this issue. This issue is part of the reason I am hesitant to call myself a Calvinist or Reformed, even though my soteriology is Reformed. I'm somewhat confused as to what makes a person Reformed. Alberto: I don't affirm infant baptism because of church history, nor because "it requires a bit of knowledge outside the Scriptures in order to arrive at it." There may be some who believe in infant baptism who do so because of these reasons, but there are many good Christians who think it's ultimately biblical. In fact, I would turn the tables on you (kindly and gently!) to say that it's an individualistic eisegesis that would see the Scriptures from an anti-paedobaptist perspective. The entire Old Testament—especially those parts where God makes covenant promises to his people (including promises regarding the New Covenant)—reveals a God who deals with people together with their children. This is the religious milieu in which the New Testament is written, and the presuppositions that God makes covenants with families is nowhere repealed (but is, rather, reinforced in many ways). So when Peter says "be baptized, because the promise is for you and your children…," the unavoidable logic of all the original hearers would be that (since the promise is for the children) the sign of the promise (baptism) is for the children as well as the believers. My earlier comment was directed to you. I asked "John" and I meant to ask you, Rev. Costa about the issue? I wanted to proffer one passage of Scripture that nails it for me, of the several that I am thinking about right now. This one, though, in my opinion, underscores your last comments so well. I see in those verses, "the Grandfather, the Father, the child and a child within a womb and it goes even to another womb still"! "We can count how many seeds there are in an apple. Only God can count how many apples there are in a seed!" Oh, I guess I love His Word so I will post a couple more "insightful" passages that to me indicate infant baptism is where it's at! Deu 7:12 "And because you listen to these rules and keep and do them, the LORD your God will keep with you the covenant and the steadfast love that he swore to your fathers. Deu 7:13 He will love you, bless you, and multiply you. He will also bless the fruit of your womb and the fruit of your ground, your grain and your wine and your oil, the increase of your herds and the young of your flock, in the land that he swore to your fathers to give you. Deu 7:14 You shall be blessed above all peoples. There shall not be male or female barren among you or among your livestock. Deu 30:4 If your outcasts are in the uttermost parts of heaven, from there the LORD your God will gather you, and from there he will take you. Deu 30:5 And the LORD your God will bring you into the land that your fathers possessed, that you may possess it. And he will make you more prosperous and numerous than your fathers. It seems very apparent to me that no one actually dies during "baptism" and what we do is an outward form of His Faith in what God does inwardly in our hearts, us and our offspring. So summing it up from Psalms 78 and those passages from Deuteronomy, God does the killing by baptism and making Alive with Christ. Oh, I desire to start pasting Scriptures in the New Testament now. Mr. Costa, I hope you don't think I meant all my criticisms for you. I heard a little bit of the sermon, but mostly responded by what I read on some of the previous posts. Let me clear myself a little more. What I am saying is that many, if not most people today, who read through the NT don't recognize infant baptism on their own. It's usually if not always explained and taught to them by someone who already affirms infant baptism; that has been my experience. Now I am not saying there is absolutely no reference or implication to infant baptism in the Bible, I am in no position to say that, especially since I have not applied myself to study it with more depth. Nor am I saying that it's a bad thing that it usually has to be taught to a reader who comes to the Bible without knowledge of infant baptism; I affirm justification by faith alone, but I know that not everyone would grasp hold of that doctrine by simply reading a Bible on their own. I do think the collective wisdom of the Church throughout the centuries is a necessary resource for anyone who truly wishes to know the truth and be biblical. One more thing, I don't like anti-paedobaptist as a description for me. I know some Presbyterians out there who would view me in a bad way if they heard I was an anti-paedobaptist. It also reminds me of why some people prefer to be called pro-life over anti-abortion; the prefix anti- helps create certain negative ideas about people in the minds of some listeners. It also shows how people prefer to define opponents in negative terms. The argument from history was merely an afterthought. The original argument was made directly from Scripture. We all respect one another whatever position we end up believing because I know both sides believe they are attempting to be as biblical as possible. But as a credo-baptist (for 20 years) turned covenant infant baptist I was persuaded because when one reads from the OT forward rather than the NT backwards ... when one sees the apostolic doctrine in light of its actual seeing among Judaism, then it all begins to look a bit different than when we read it in an ahistorical way. I would encouage you to read Genesis 17 on the coventant of grace. Look carefully at the language used in that covenant "this is for you and your children..." and measure it against what Peter says to the same Jews who only had the OT and consider what they would understand when they heard Peters words. They could have ONLY understood Peter to be relating baptism to covenant children on the NT in the same way Abraham related circumcision to children in the OT. There is no escaping this. As Eric said above, "the presuppositions that God makes covenants with families is nowhere repealed (but is, rather, reinforced ...). So when Peter says "be baptized, because the promise is for you and your children…," the unavoidable logic of all the original hearers would be that (since the promise is for the children) the sign of the promise (baptism) is for the children as well as the believers. Thank you all for your kind responses. May God bless you. I listened to the sermon. I am an adherent to the credo baptist view on baptism. The only question that bothers me on the paedo-baptism is all about the exclusion of females in the rite of circumcision in the OT. Whereas in the NT females are included in the rites of baptism. How then could these two view be in parallel with each other? The fact that the purpose of circumcision is for the inclusion in the community. Females therefore are not included in the community. Would you give me a convincing explanation for that? Thanks! Good question! If I understand, you need convincing that OT circumcision is actually a sign of inclusion in the covenant community, since women didn't receive it, yet they were part of the community…? In Gen. 17:10, God says to Abraham, "This is my covenant, which you shall keep, between me and you and your offspring after you: Every male among you shall be circumcised. You shall be circumcised in the flesh of your foreskins, and it shall be a sign of the covenant between me and you." It would seem from these verses that the males represent the people in the covenant community. Circumcision was given in order to remind ALL God's people that they had been set apart by God through his promises, but it was a sign only given to the males. Obviously NT baptism is not a straight parallel; it's bigger and better. Baptism points to a truth that has already taken place, rather than being a promise of something yet to come (as with circumcision in the OT). It is not a bloody and painful thing, but a beautiful and peaceful symbol of being set apart by cleansing. It is extended to many more people in the world (not just primarily the Hebrew nation, though you'll notice that non-Hebrews were circumcised if they were part of the household). And it is granted to ALL God's people (whether man or woman).
2019-04-21T20:57:44Z
http://www.reformationtheology.com/2008/09/christian_baptism.php
Spiaggia di Maimoni is one the best unspoilt beaches of west Sardinia. Historically significant and overflowing with natural beauty, the western province of Oristano in Sardinia is a sublime mix of culture, old world traditions and beautiful scenery, from the iconic landmarks, charming ruins and historical events in the city, to the bird species, luscious landscapes and natural splendor of the coastline, mountains and surrounding Regional Parks. Bordered by several provinces including Sassari, Medio Campidano, Cagliari and Nuoro, the interior of Oristano is a sublime mix of towering peaks, scenic coastline and protected parks. The Monte Ferru Range dominates a rural skyline towering high above the fertile wetlands, while the Sinis Peninsula is an inspiring stretch of rugged cliffs, sandy beaches and alluring coastline. Another highlight of precious scenery in the local area are the numerous protected parks such as Mal di Ventre Island Marine Park and the most popular Monte Arci Regional Park which is a striking combination of rolling hills, beautiful woodlands, leafy flora and outdoor adventures. And then there is the wildlife; these stunning landscapes are home to many animals such as weasels, foxes, wild boars, and wild cats, not to mention a huge variety of bird species including seagulls, jays, kestrels and even flamingos. Remnants of ancient history are never far away in Oristano and many relics can be found with an inquisitive mind and an eye for detail, for the Baroque style of the Cathedral of Santa Maria Assunta may suggest an 18th Century origin, but upon closer inspection, aspects of the architecture will bring forward the true nature of the buildings origin in the 13th Century. The Tower of Mariano, Arborense Antique Museum and the monuments of Piazza Eleonara are further celebration for the rich history beyond the town, which is now a haven for delightful restaurants, quaint cafe’s and traditional foods which proudly uphold the locals reputation for world class cuisine. Su ghisau is a meat stew with succulent pieces of lamb or pig, myrtle hen is a local delicacy combining boiled hen with herbs, while bottarga is a delicious egg dish served with fresh pasta; the locals are as passionate about food, as they are for locally produced wine with Vernacci di Oristano, Nuragus and Semidano just a few of the many celebrated flavors. Surrounding Oristano, a large number of archaeological sites can be found in a most serene setting, for it is here, where you can find the stunning Tharros Archaeological site and remnants of a town dating back to the 8th Century BC, Santa Giusta and the Romanesque remains of a 12th Century Cathedral, the prehistoric remains of Fordongianus and then the mysterious pagan temple of San Salvatore. Few places in this part of the world can claim so many important sites with so much historical context as Oristano, and to explore the nature in between makes for a truly memorable holiday in Sardinia. ✔ Fill in your holiday dates to get an accurate view of available accommodations near Oristano. A 4 star Hotel in Oristano, a short distance from the center of town. The entrance to the four-star Mariano IV Palace Hotel, on Piazza Mariano in Oristano, west Sardinia, Italy. When you consider where to stay in Oristano, location is always important, and this is something for which Mariano Hotel is best known. For example, nearby beaches are just a short walking-distance away while the proximity of the airport means for minimal travel time in general. Oristano is also a lot less touristy than other destinations in Sardinia which makes for a more personal encounter regarding visiting the local attractions which include some impressive Roman and Greek Rooms. That being said, the Mariano IV Palace Hotel itself is the main highlight, and aside from some extremely friendly staff, you can expect all the modern conveniences in each room. In this respect, every room is equipped with air conditioning, minibar, free Wi-Fi, and satellite television. Featuring a range of room types, this hotel in Oristano caters to all budgets with affordable single rooms along with doubles, triples and even quadruple rooms available. Consisting of a bright yet antiquated design, the rooms are very traditional in every sense, and some of the bathrooms also contain a private bathtub. In many ways, the rooms in this Oristano hotel are a lot more spacious than elsewhere in town as evidence from the grand size of the wardrobes. As for the food, this is usually the subject of five-star reviews online, and the hotel offers two separate restaurants which provide a sublime mix of local and international meals. While the hotel bar is also popular, it must be said that most visitors enjoy the brisk stroll to nearby bars which are just a few minutes away. A 4 star Boutique Hotel in Oristano, a short distance from the center of town. Comfortable rooms in a a 17th century house, at hotel Il Duomo in Oristano, west Sardinia. Hotel II Duomo is located in the center of Oristano, and this particular accommodation is symbolic concerning the historical nature of this town. While the unique interior is undoubtedly the most attractive quality of the hotel, it must be said that the location is particularly impressive. In fact, this wonderful structure is a 17th Century house and every bit as authentic as the surrounding facades. Furthermore, Hotel II Duomo is just around the corner from both St Mary’s Cathedral and the Tower of St. Christophoros which are two of the main attractions in the area. And then there are the beaches; although these sandy stretches are a little far for walking, you can easily rent a car and spend the morning or afternoon. While you can choose from single, double, triple or king size rooms, the experience in each one is relatively similar. That is to say; each room is particularly bright with large windows and fresh colors throughout. However, there is still quite a rustic feel to these decorations and by no means does it detract from the appearance of this ancient house. Hotel II Duomo offers several areas in which to relax, and while each of these is small in comparison with other Oristano hotels, this feature is part of the appeal. After all, when you visit a small pocket in Sardinia, you expect something different, and this is certainly the case with Hotel Il Duomo. While the breakfast is substantial and the restaurant is open for most of the day, the central location of this Oristano hotel ensures there is always a wide range of places to eat. The Mistral2 Hotel is very much a modern hotel in Oristano and more suited to business travelers. That being said, there are excellent facilities which never fail to delight couples and families alike while the room options offer further variety. As with many hotels in Oristano, the location is excellent with most of the attractions within walking distance. In this regard, you can also eat out at any time or visit the local bars, but for a little more relaxation, there is often little reason to leave the hotel. As this hotel caters for business clientele, you can expect to find a focus on the details at Mistral2 Hotel. For example, there are always beach towels available, free toiletries at every turn in the bathroom and a very courteous front desk. Meanwhile, outside you will find a huge swimming pool which is often the one feature which many guests choose the hotel over the nearby competition. As already mentioned, this is a much more contemporary hotel, and far from the traditional accommodation options, you will find elsewhere. Rather than antique design and classic furnishings, there is a modern appearance which makes the Mistral2 Hotel stand out. With this in mind, this may not be the hotel many travelers have been dreaming about, but the bright and functional rooms certainly make for a comfortable stay. If you seek a hotel in Oristano with a central location but without an overly touristic flavor – this could be the place for you. A 3 star Hotel in Oristano, a short distance from the center of town. The excellent Residenza d'Epoca Regina d'Arborea, a three-star hotel in the center of Oristano, Sardinia. Another excellent three-star hotel in Oristano with a central location is the Residenza d'Epoca Regina d'Arborea. As with several other Oristano hotels, this is a very ancient building with quite a bright and colorful interior. One of the main highlights concerning the rooms is the private balcony, but it must be said, this is one of the most impressive hotels on the entire island when it comes to traditional décor. From the beautifully designed wallpaper, extravagant light fixtures and antique rugs to the wonderful writing desks in every room. At the same time, these rooms are also accompanied by contemporary fixtures. For example, the bed sheets are flawless, and the bathrooms are as modern as you could hope to find. In this respect, Residenza d'Epoca Regina d'Arborea offers the perfect mix of old and new. You will find the usual array of features in this Oristano hotel which include air conditioning, safety deposit box, tea-making facilities and a private minibar. Meanwhile, the concierge desk is open 24 hours and can organize bike or car rental should you choose to venture to nearby towns or beaches. And then there is the restaurant which offers world-class meals which are prepared with a great deal of love and affection. When you consider the central location and the balcony views onto the main square, there are few hotels in Oristano in a better position. However, when you put this together with the array of features and spectacular interior design of Residenza d'Epoca Regina d'Arborea, you will understand why this is possibly the most sought-after hotel in Oristano. Established in 1938, the Antiquarium Arborense is one of the most significant museums in West Sardinia. Built in honor of Oristano Giuseppe Pau, a famous scholar in Oristano, the museum features an extensive collection of archaeological treasures, dating back to the different ages, from the Neolithic Age to the Roman Period. Exploring the Antiquarium Arborense is one of the most popular activities in Oristano. The Antiquarium Arborense is also home to some of the most significant picture gallery consisting of three retables, a frame that encloses essential altarpieces. These are the retable of St. Martin from the 15th century, from the Councillors of Oristano, and the retable of the Holy Christ dating back to 1533. What makes Antiquarium Arborense different from the rest of the museums in Sardinia is that it’s the only museum that has a section for the visually impaired. Furthermore, the museum houses the most beautiful reproductions of some of the most-prized artifacts in Oristano. These artifacts are made from different materials, such as wood, bronze, ceramic, marble, and plaster. Located in Portico Giovanni Corrias in Oristano, there are guided tours to the museum and in Oristano’s historical center. Tours are also available in French, Spanish, and English. Known as the largest cathedral in Sardinia, visiting the Cattedrale di Santa Maria Assunta is one of the most popular things to do in Oristano. Also called the Duomo di Oristano, the cathedral was built within a Paleo-Byzantine structure and above a 6th Century Byzantine tomb. The Duomo di Oristano is home to 16 marble casks that are housed inside the Tridentine Seminary, overlooking the cathedral’s courtyard, right across the Chiesa della Santissima Trinità. This suggests that the original structure of the cathedral consists of three aisles, and about eight columns on each side, which divides the space within. The church was renovated around the 13th century, and in the mid-14th century, a transept was added, along with four chapels featuring a Gothic-Italian style, which includes that of the Madonna del Rimedio. Other treasures that you will find inside the cathedral are sacred vestments, silverware, and illuminated choir books. On the left side of the cathedral is an octagonal bell tower with a small onion-shaped dome at the top, ornately decorated with majolica. From the Cattedrale di Santa Maria Assunta, Oristano’s historical center is also located nearby, where the Sartiglia is taking place during Carnevale. Other prestigious buildings in the surroundings are the neoclassical church of San Francesco and the Palazzo Corrias Carta. A great way to explore the most exciting things to see in Oristano is on a mountain bike. With magnificent scenery and a wide variety of fascinating architectures, Oristano is genuinely an excellent destination for bicycle tours. So if you’re up for an adventure, hop on a bike and join one of the bicycle tours offered by BIKE OR. Founded in 2012, BIKE OR is focused on developing Sardinia’s local tourism through bike rentals and guided tours. The tour provides visitors access to an extensive bike park, including tandem bikes, professional mountain bikes, and a child’s bike. BIKE OR’s central location means almost everything in Sardinia is within easy reach. Furthermore, the company is affiliated with various sports and cultural associations in Sardinia. So if you happen to be a bicycle enthusiast, or you just love to discover nature in a more exciting way, then you should rent one of the bikes at BIKE OR, or better yet, join one of the bicycle tours and experience one of the best things to do in Oristano. Il Caminetto is a Michelin star restaurant located in the historic town of Cabras near Oristano. As with many eateries in the region, the restaurant specializes in Mediterranean seafood and serves a wide variety of dishes prepared in a local gastronomic Sardinian tradition. As you may know, Cabras is a small coastal town on the central west coast of Sardinia, this particular area is famous for its fish farms. Thus, when dining at Il Caminetto, you can sample the delicious mullet roe and merca dish in which mullet fish is boiled in salted water, wrapped and preserved in marsh herbs. Overall, the menu consists of a wide range of dishes, from classic seafood salads, Sardinian fregola with clams, and mixed grilled seafood plate comprising of lobsters and prawns. As for salads, you can expect only the highest quality; fresh seasonal vegetables are harvested daily from the nearby farms and used to produce every item on the menu. Furthermore, Il Caminetto is among the top-rated restaurants in Oristano. Most customers are complimentary when it comes to the mixed seafood risotto and spaghetti with clams. Needless to say, diners are also treated to a friendly atmosphere and excellent service from friendly staff. La Brace is a restaurant in Oristano that serves a wide range of dishes with a primary focus on seafood and local meats. The restaurant is best known for an elegant ambiance, and the interiors are wonderfully decorated in a traditional style that exudes a welcoming experience. Moreover, jazz music is usually playing in the background, which further enhances the romantic atmosphere of the place. There is a wide range of choices in the menu of La Brace and among the dishes that truly stand out from the list are fish-based, such as the tuna tartare, which is a combination of raw and cooked fish. Another favorite fare is the tuna with pistachio, a simple yet surprisingly delectable dish. And then there is the linguine swordfish, which was made even more flavourful by the delicious sauce made of garlic and black olives. On the other hand, one of the main highlights of La Brace is in how the menu consists of local ingredients only. In this sense, every item on the menu is produced using local produce, and the cozy atmosphere gives this a genuinely authentic feel. Indeed, La Brace is impressive at every turn and often considered one of the best restaurants in Oristano. Ristorante Cocco e Dessi is located within the historical district, in the midst of ancient buildings and squares that bear witness to the rich history of Oristano. The interior is decorated with utmost attention to detail, and the restaurant is managed by a team of friendly and welcoming staff. As for the menu, you should find seasonal dishes made from fresh and high-quality local ingredients. Foods are carefully prepared to suit all taste, from mouth-watering pizza to a wide range of appetizers, not to mention the seafood and meat which account for most of the dishes on the menu. At the same time, there are typical Sardinian dishes and something to suit every taste or preference. Indeed, Ristorante Cocco e Dessi is often the subject of five-star reviews, and many regard this eatery as one of the best restaurants in west Sardinia. Aside from the range of delicious food on the menu, this feedback also compliments the excellent service and first class presentation. Although it may not be the most affordable option in town, Ristorante Cocco e Dessi is a fine establishment and worthy of an equally impressive reputation. To get to Oristano via the fastest route by car, just head north-west on the E25/SS131 after you’ve exited the airport area. After about 80 kilometers into your trip, take the exit to Via Giovanni XXIII/SP56 in Santa Giusta. Merge onto Via Giovanni XXIII/SP56. With the usual traffic, the drive shouldn’t be longer than one hour.
2019-04-21T22:09:33Z
http://www.sardinianbeaches.com/beaches-of-sardinia/west/oristano/
Here are the last houses on the 700 block of Hornby Street not long before they were demolished in 1956. The house on the far right appears to date back to around 1894. F W Boultbee lived here; around the time the house was built he started as the clerk to the water company (initially a private company). He later continued with the city when they took over the water responsibilities, retaining the role for 21 years. He was later Lt Col F W Boultbee, commanding the 6th Regiment, Duke of Connaught’s Own Rifles. He had arrived with the railway, building snow sheds on the CP Railway route before arriving in the city a little before the fire. He seems to have been named Frank Washington Boultbee, (although for some strange reason known as ‘Tom’) born in Ancaster, in Ontario, in 1864. He died in 1933. He had married Beatrice Cora Boultbee ten years earlier – although they had the same surname Beatrice was from Sheffield in England, so probably a distant relative. Frank’s older brother was John Boultbee, the city’s first magistrate who negotiated the city’s incorporation in 1886. The house on the far left was also built around 1898, and was occupied by the Haddon family, headed by Rev Thomas Haddon the Reformed Episcopal Church minister (although the census just put ‘Church of England’). Rev Haddon was from England, as was his wife Isabella. He seems to have taken over the church in 1896, and seems to have been in Victoria before this – an 1894 Times Colonist piece records him delivering “an interesting lecture upon travels in many lands, the address being handsomely illustrated by means of stereoscopic pictures”. While he had arrived in Canada in 1868 (so aged 26) his wife arrived in 1872. From the 1901 census we know that they had two daughters, Mary and Elizabeth, who, if the records are to be believed were born in Quebec, seven months apart, both in 1874. Next was another daughter, Nellie, also in Quebec, a son, Robert, born in Ontario in 1879, and George, born in BC in 1885. (There was apparently at least one more son, William, not listed as living at home). Rev Haddon had retired by 1901, died in 1903 and was buried in Mountain View cemetery. The house in the middle was added by 1900, and the earliest occupants were H W Findlay (who was an insurance agent who became advertising agent at the Province newspaper) and William Duke. Both had apparently moved on by 1901; that year Mrs Celine Exteater was listed as living in the house to the north. The clerk compiling the directory had a hearing problem or the typesetter was trying for a more intriguing name – actually she was Selina Extence, aged 59 who a year later was running ‘The Georgia’ boarding house (on Georgia Street) and living with her 11 year old son, Harry, and 3 boarders including Herbert Findlay who was listed in the Hornby house in 1900. Selina was from England, but her son had been born in BC. M Lewar – or Lewer, a clerk with the Bank of British North America in the house in the centre of the picture. He seem to have been missed or identified with a different name in the 1901 census, and left the city soon after. The occupants – so we assume tenants – of the two houses to the north changed constantly. In 1903 John C Rolston, an artist lived in the house on the right and Alexander McDonald, a conductor had rooms in the other. Isabella Haddon stayed in the house following the death of her husband, and all three houses had the same residents in 1905 as in 1903. Today the site is part of 777 Hornby, a 1969 office block designed by Frank Roy. This is the corner of Robson and Hornby in 1945. The Richmond Apartments, developed by Edward Hunt in 1910 are on the corner. A Spencer and Company were selling real estate from the store on the corner. The O’Neil Company (selling glass and tiles to builders) were next door in a building later used by Williams Bros, photographers. Next door was the Famous Kitchen Cafe, which somewhat confusingly advertised ‘Famous Steaks’ with a huge neon chicken. The Hotel Vancouver is in the background. It seems that the building was built in the 1920s when a cafe opened at 785 – The Devonshire Cafe. It was certainly built by 1928, when it’s recorded in the street directory as the Richmond Arts Building. Before this there were houses here, similar to the houses further down the street next to the hotel. They were built before 1901. By 1938 the cafe was Helen’s Tea Room, and one of the houses was being used as a government health laboratory. Today there’s an office building addressed as 777 Hornby. It’s been there for a while – having been completed in 1969. It’s divided into many small offices, with several lawyers and medical offices. According to a brochure in the Archives the architect was Frank Roy. He’s an architect with an extraordinarily low profile for such a large building. We can find for him as the designer of the glu-lam curved Safeway supermarket recently replaced on Granville in Marpole.He also designed St Joseph’s Catholic Church in Steveston. The architectural practice who supervised construction of the Hornby office building was Thompson, Berwick, Pratt and partners. On the immediate left are the Richmond Apartments. On the right is the Court House, and beyond is the Devonshire Hotel. The Richmond was a substantial building, with a steel frame costing $70,000 in 1910. It was designed by W T Whiteway for Edward Hunt. There were four people called Edward Hunt in the city in 1911, but only one lived at this address (915 Robson Street). He was aged 57, a retired merchant born in England and it looks like he had arrived in Canada in 1876 (although the handwriting on the census form leaves something to be desired). His wife in 1911, Florence, was born in the US and only arrived in Canada in 1903. While Mr Hunt was aged 57, his wife was 30 years younger. Ten years earlier Mr Hunt was living in Richmond (perhaps the source of the apartment’s name). We assume it’s the same Edward Hunt as the year and month of birth match, both were born in England, and in 1901 he’s described as a merchant. In 1901 there was an earlier family; his wife Louisa, born in England was also aged 47, their son, also called Edward and born in Ontario was 17 and there were four lodgers; David Davidson, Charles Edwards, Arthur Parker and William Quinn. The family – but without any lodgers – were living in the city of Vancouver in 1891. It’s a reasonable bet that this Edward Hunt is the same Edward Hunt who was with working for the Steveston Cannery Co in 1894, set up a general store there in 1895, expanded it in 1896 and was one of three owners of the Steveston Cannery, capitalised at $50,000 in that same year. He was a magistrate in Richmond in 1900, and the first to sign a requisition to call out the militia to prevent violence during a strike by Fraser fishermen. (The decision to call out the militia was the subject of a government inquiry). In 1912 W T Whiteway designed a $9,000 single storey store for Edward Hunt at the corner of Pacific and Howe. We think that’s likely to be the same owner as the apartments, as it shared the same builder and architect. Recently there have been comments about how streets like East Georgia are losing their Chinese character – but much of the Chinese character of some parts of Chinatown is relatively new. Here’s a house built on East Georgia in 1903, back when it was called Harris Street. This house was built by someone recorded in the building permit as architect, builder and developer; Jna Curell. He was probably more accurately named John Currell, as that’s who was living there in 1904. He was a saw filer working at 65 East Hastings (and there was another saw filer in the city called Joseph Currell who was eight years younger than John, and also from England, arriving in Canada a year earlier than John). John was born in England in 1841, and he arrived in Canada in 1869, as did his wife, Alice. In 1901 they had a son, William, said to be born in the USA in 1885 living with them, which would suggest the family had moved south before returning to Canada. However, that attribution may be incorrect. Before he built the house John had worked as a cutler and lived on Front Street, and before that in 1899 he was both a cutler and a saw filer and lived at the 200 block of Keefer Street. In 1891, the earliest we can find where he lived, he was living at 25 E Hastings. He was included in the census, that year, which might give a better sense of his movements before arriving in Vancouver. He was a cutler, and his wife is recorded as Mary, not Alice. They had five children, a 16 year old daughter born in Ontario, two sons aged 14 and 12, James and Joseph, also born in Ontario, and two daughters, Mary Ann and Lily May who were seven and five, born in Manitoba. A year later the family were listed at 31 E Hastings. In the 1911 Census John was retired, and had moved to 635 Keefer. Alice was with him, but William was elsewhere in the city. Elizabith Bufton, Alice’s 90 year old mother was living with them. (There’s only one Alice Bufton born in England with a mother called Elizabeth, so we think it’s likely that Alice was born in Herefordshire). Joseph Currell was still a saw filer, and so was James Currell, (presumably John’s son). In August 1911 the Sunday Sunset announced that “Mr. and Mrs. John Currell have left on a four-months trip to Australia, during which time they will visit Mr. Currell’s sister in Sydney.” In 1914 John Currell took out a permit to add a floor to his home on E 11th Avenue, but the following year he appears not to be living in the city, and the house on E 11th was vacant. We’re not completely sure when this picture was taken – it’s somewhere between 1960 and 1980 according to the Archives. It was replaced by a 2-storey restaurant and retail building in 1999 designed by Scott Gordon Architect. The ‘after’ shot in this image was taken a couple of years ago, but nothing much has changed here recently. The ‘before’ was dated as 1899 and the Savoy Hotel is down the street on the left, and Stark’s Glasgow House is on the right. Closer to the camera, on the left (behind the tram) was the Whetham Block, developed by Dr Whetham who also built the Arlington Block that we’ve caught a glimpse of on the opposite side of both streets. This building came a year after the Arlington, so was built in 1888, and was designed by N S Hoffar. Whetham, like many early Vancouver developers, came from Ontario. His father had been a flax and hemp manufacturer in England, who moved to Canada, established himself as a general merchant and then died, leaving a widow and three young children. His son, James Whetham is said in an early biography to have taught, then headed west, farming in Manitoba in 1878. Somehow he managed to study medicine (his biography says ‘in winter’) in Toronto and then Portland, Oregon, while living in Spokane Falls. He only practiced medicine very briefly before moving on to develop real estate, initially in Spokane Falls and then in 1887 in Vancouver. By 1889 James Whetham had the sixth largest land holdings in the city, was on the board of trade and was a city alderman. He was boarder in the Hotel Vancouver. That year he founded Whetham College on Granville Street with backing from David Oppenheimer, Henry Cambie of the CPR and James G Keith, manager of the Bank of British Columbia. James’s brother, Charles, had married in 1886 when he was Modern Language Master at Upper Canada College, Toronto after two years at Johns Hopkins University became the headmaster. (He had actually moved to Vancouver before 1889 and opened a real estate office in the Whetham Block). The recession of 1893 saw the college’s demise, the first post-secondary teaching institute in British Columbia. Charles moved back to become a fellow in the French Department of the University of Toronto, but returned in the mid 1890s to a farm he had bought in Whonnock. Dr James Whetham died in 1891, aged only 37, of what was diagnosed as typhoid fever. In 1969 the almost windowless building that replaced Whetham’s was the first of only two buildings completed for Project 200, a massive redevelopment plan that would have seen the entire waterfront of Gastown bulldozed to create a row of towers over a waterfront freeway. This rather more modest structure was home to CNCP Telecommunications – perhaps the first serious hi-tech investment in the city, designed by Francis Donaldson and developed by Grosvenor Estates. CNCP was created as a joint venture between the CP and CN in 1967, replacing the different networks used by the two railway companies. The company became an early telecom business, was bought by Rogers in the 1980s and renamed Unitel and was later acquired by AT&T Canada (now called Allstream). Here is a small section of the west side of Seymour Street with two very different scales of building. The office building to the north is Somervell & Putnam’s design for the Yorkshire Guarantee and Securities Corporation Ltd in 1912 – later renamed as the Seymour Building. The three small houses are earlier than we expected, and older than any useful records could tell us who built them. They were shown on the 1901 insurance map, and although the addresses on this stretch of Seymour were changed from the 300 block to the 500 block in the early 1890s, and renumbered again around the turn of the century, we’re pretty sure they were there as far back as 1887. In 1898 Silas Sweet, a contractor and William Stickney were here. Sweet had been in the same location since at least 1892, when he was living at 521, the Illingworth family were living next door at 525 and T T Black, a lawyer and agent of the Queen’s Insurance Company was at 529. We know the street numbers changed because in 1889 Mr Black was in the same location but at 331 Seymour. He was listed, rather comprehensively as ‘Black, Thomas Thompson, solicitor, notary public, commissioner to administer oaths in the Superior Court of B.C.’ He had an office on Oppenheimer, and lived on Seymour. From 1887 to 1892 he was the police magistrate and City Solicitor, (a contract job), who denied bail to the three arrested anti-Chinese rioters (only to have the magistrate overturn that decision). Assuming the houses dated back to 1887, they lasted around 40 years. Although the Vancouver Public Library record says this image is from 1936, the houses were replaced with the current building in 1929, so the image must be earlier. The houses were used as businesses which are said to include the Wong Kee Laundry and G.A. Roedde Ltd. We can’t find any record of Roedde actually being based here, but Wong’s Laundry was here in 1928. The new Georgian style building had two occupants in 1931; the Sunken Garden Golf Course and the Georgian Club (who developed the building). The mysteriously titled golf club didn’t seem to last very long, but the club were here for several years, joined in the mid 1930s by the Georgian Garage (presumably at the back of the building) and BC Upholstery. The building, which is on the heritage register, is now home to MTI Community College, a restaurant, and the International Language Schools. It was designed by Sydney Eveleigh, one of the few buildings we know he designed on his own after ending his partnership with W T Dalton (when Dalton retired in 1922). Here’s an apartment building on the corner of Davie and Hornby, addressed to Davie Street, and built around 1909. We couldn’t dig up a permit, so all we had was a name – the Elcho Apartments. Then we came across a reference to The Echo Apartments on Davie Street, designed by Grant and Henderson in 1909. While it’s completely possible there was an Echo Apartments, we haven’t found any reference to it, so it seems more likely to be this building. It appears on the insurance map in 1912, the year it appears to be occupied, with the residents of the 20 units being listed a year later. The retail units took a while to lease up – there was a recession – but by 1915 there was a shoemaker, a furniture store, the Elcho Dry Goods Store and R Wallace Robertson, who sold teas (and also lived in the store). Our 1981 image shows the building not too long before it was demolished, replaced by the Swan Wooster Building, designed by Romses Kwan and Associates and completed in 1984. It started life as a 9-storey office, but 3 more floors were added before it was completed. There’s a rooftop ball court on the northern portion of the building, but there was also a proposal to add more offices there some years ago. As the area rapidly densifies and new tall condo towers are built around it, it will be interesting to see how long the economics of retaining a reasonably modest office building that’s 30 years old make sense.
2019-04-20T23:03:46Z
https://changingvancouver.wordpress.com/2014/03/
Background: Qat (also known as Khat, Kat and Miraa) is a green-leaved plant (Catha edulis). It is a shrub indigenous to Yemen and certain parts of eastern Africa. Chewing the leaves, which have sympathomimetic and euphoric effects, has been documented in many countries and increased with worldwide migration. The effect of long-term chewing Qat on the oral cavity is unknown. Objective: A systematic review was performed to identify any associations between Qat chewing and the occurrence of potentially malignant and malignant oral disorders. Methods: Medline and the Web of Science were searched for articles published before May 2014 without limits with regard to publication date and language. Results: From a total of 890 papers identified, 17 English papers reported potentially malignant or malignant oral disorders and Qat chewing. One additional paper in Arabic language was identified from reviewing the list of references of eligible papers. It was found that exposure to Qat may be associated with potentially malignant and malignant oral disorders, but methodological issues, such as inadequate study design, sample size, selection of study subjects, clinical evaluations of outcome and limited adjustment for confounders, limit the strength of the evidence base in this area. Conclusion: The association between Qat chewing and potentially malignant and malignant oral disorders remains debatable and requires further investigations. Figure 2: Blue area shows areas where Qat has been reported grown and/or consumed. Qat contains a number of chemicals including cathine and cathinone.7,8 These chemicals are similar in structure to but less potent than amphetamine. However, they cause similar psychomotor stimulant effects.7 Cathinone is considered the main active ingredient in the fresh leaves of Qat and has sympathomimetic effects that have been shown to increase heart rate and blood pressure.1 In 1980, the World Health Organization (WHO) classified Qat as a drug of abuse that can produce mild to moderate degrees of psychological dependence, but to a lesser extent than tobacco and alcohol.8 Furthermore, Qat has been reviewed several times by a WHO Expert Committee on Drug Dependence, and it was concluded that the level of abuse and threat to public health is not significant enough to warrant international control.8,9 Nevertheless, some countries including Finland, Germany, New Zealand, Sweden, France, Norway, Denmark, Canada, USA,10 UK,11 and Saudi Arabia,12 have prohibited Qat consumption. Even though Qat import into these countries is illegal, certain quantities are believed to be smuggled into them. Based on the Family Health Survey carried in 2003 in Yemen, it was estimated that 58% of males and 29% of females aged 10 years and older chewed Qat during their life time.18 More recently, a national household survey conducted in 2006 showed that 78% of males and 53% of females contacted in Sana&apos;a reported current Qat use.19 Among a random sample of 1200 adults of a rural community in Ethiopia, Belew, et al,20 reported that 18% of women and 40% of men currently chew Qat. In the UK, among the Somali communities, approximately one-third chewed Qat on regular basis,21 with Qat chewing reported also an emerging problem in Australia22 and among Somali immigrants in Norway23. The half-life of the active compound of Qat is about four hours, depending on the amount of chewed Qat.24 Once the acute effects disappear, chewers experience feelings of anxiety, irritability, emotionlessness, depression, lack of energy, and mental fatigue.25 Chronic use of Qat has been shown to be associated with cardiovascular effects (eg, acute coronary vasospasm and myocardial infarction), gastrointestinal tract problems (eg, chronic constipation), cytotoxic effects on liver and kidney,26 reproductive effects (eg, low fetal birth weight, infant mortality),16 and mental illness (eg, psychosis)27. Several effects of Qat chewing on the oral cavity have been reported. They are included periodontal pocket formation, gingival recession,28,29 discoloration of teeth, xerostomia,29 and pain in the temporo-mandibular joint30. It has been estimated that about 90% of the alkaloid content of Qat is extracted into saliva during chewing and most of it is absorbed through the oral mucosa.24 Therefore, oral tissues might be exposed to high doses of Qat constituents during Qat chewing rendering them susceptible to its potential toxic effects. In addition, chewing Qat causes mechanical and/or chemical irritation, leading to thickening and keratinization of the mucosa that might cause oral lesions associated with Qat chewing. In experimental studies, a higher rate of genetic damage in buccal mucosa cells has been observed among Qat chewers compared to non-chewers. Qat consumption lead to an 8-fold increase in the formation of micronuclei in human oral cells in one study, suggesting genotoxic effects of Qat consumption.31 An organic Qat extract was shown to induce tumor suppressor proteins and G1 cell cycle arrest in normal oral fibroblast and keratinocytes in vitro.32 Furthermore, the study showed that Qat induced premature differentiation and keratinization in oral keratinocytes grown in co-cultures with normal fibroblasts, possibly through signaling of p38 MAP kinase.32 When exposed to a higher concentration of Qat the oral fibroblasts and keratinocytes underwent programmed cell death in a process involving reactive oxygen species.33 Moreover, the study also found that oxidative stress can occur in oral cells exposed to Qat. If this occurs in vivo, it could lead to a host of cellular and tissue responses such as increased or decreased proliferation, increased keratotic differentiation and damage to macromolecules like DNA. Considering that the oral cavity is the first place directly exposed to Qat in those who chew it and that there are few studies on whether chewing Qat causes potentially malignant and malignant oral disorders,40,41 we conducted this systematic review to summarize the available scientific literature on the association between chewing Qat and developing potentially malignant and malignant oral disorders. Medline and Web of Science were searched for articles published before May 2014 without any limits for the publication date or language. We carried out a title/abstract search in the PubMed, abstract search in Medline and topic search in Web of Science, using the following terms: khat OR qat OR miraa OR Catha edulis. We did not limit the search to a particular health outcome to make sure not to miss any relevant papers. In addition, to the electronic database search, we reviewed the list of references of all eligible studies included in this systemic review. All search results were combined in a bibliographic management tool, EndNote®, with duplicate record removed. Studies on potentially malignant oral disorders, based on the WHO definition,39 or oral cancer were included in our review, if they met the following criteria: 1) published in English or Arabic, and 2) reported as case-series, case report, and cross-sectional, cohort and case-control studies. Because Qat is most frequently used in Yemen, some studies were expected to be published in Arabic. Therefore, we included Arabic articles in our review too. To identify eligible studies we reviewed abstracts of all papers identified by the above-mentioned search strategy. When it was unclear from the abstract of the article if it is matched our criteria, the full text of the paper was reviewed. The search generated 2083 citations. After removing duplicates, 890 abstracts were reviewed for eligibility based on the above-mentioned criteria. Full text articles were reviewed for 45 studies published in English, with 18 reporting on potentially malignant or malignant oral disorders and Qat chewing, of which two papers reported the same study results. One additional paper was identified from reviewing the list of references of the 18 eligible papers, which was in Arabic. Therefore, in total, 18 distinct studies were identified for inclusion in this review. There were one retrospective cohort, two case-control, and seven cross-sectional studies, and six case-series and two case-reports (Table 1). 31%, 48%, and 21% started chewing at 10-20, 20-30, and 30-40 years of age, respectively. 15%, 29%, 9% and 62% chewed Qat for 1-2, 3-5, 6-7 days/week, respectively. Average period of chewing Qat was >6 h/day. 73%, 20%, 7% chewed Qat every day, 1-2 and 3-5 days per week, respectively. 77%, 15%, 8% chewed Qat for 3-5, >6, 1-2 hours per session, respectively. In overall 200 voluntary Yemeni Shamma users (smokeless chewing tobacco), the association between oral lesions with Shamma chewing was examined, based on 58 non-diseased controls and 142 cases with oral lesions. Scheifele, et al,42 reported that 31% of the examined persons presented with mucosal burns, 27% with oral leukoplakia, and 13% with other potentially malignant oral disorders (frictional keratosis, oral lichenoid reaction, pseudomembraneous candidiasis, oral squamous cell carcinoma, morsicatio buccarum, oral lichen planus, and white sponge nevus). Of the 200 Shamma chewers, 184 chewed Qat. Shamma chewers who chewed Qat for more than six hours a day were at increased risk of oral leukoplakia (OR 4.2; 95% CI 1.4 to 12.4) and mucosal burns (OR 3.0; 95% CI 1.1 to 8.4) compared with Shamma chewers who chewed Qat for less than three hours a day. A case-control study of 85 cases and 141 controls was conducted in Kenya to determine the role of tobacco, alcohol and Qat chewing in the development of oral leukoplakia.43 The study did not find a significant association between Qat chewing and developing oral leukoplakia (OR 1.8; 95% CI 0.7 to 5.0). However, the study was not able to disentangle the influence of Qat from that of tobacco smoking (OR 8.4; 95% CI 4.1 to 17.4). Furthermore, the study had a very low frequency of chewers (10 cases and 10 controls) possibly due to the banning of cultivation, sale and chewing of Qat by the local administration in the study area. Therefore, it was likely that some persons did not dare to report this habit. In a cross-sectional study in Yemen, 162 female participants, of whom 67% were Qat chewers, were studied. Leukoplakia appeared in 75% of participants at the chewing site.44 The lesion was found on the opposite side in only 5.5% of subjects. The study also reported a positive correlation between cigarette or water pipe smoking and presence of oral leukoplakia. However, the duration of smoking was not significantly correlated with the presence of the lesion. In another cross-sectional study 490 (75.4%) of 515 males and 135 females from Yemen were Qat chewers. White patches on buccal or gingival mucosa were observed in 94.7% of Qat chewers at the chewing sites and in 8% of non-chewers (p<0.001); red patches on the buccal and gingival mucosa were observed in 3.8% of Qat chewers and none of the non-chewers.45 Sixty percent of the chewers also smoked either cigarette or water pipe. The authors reported that when the study was stratified by tobacco use, the risk remained among Qat chewers showing that white lesions on the oral mucosa might be exclusively caused by Qat chewing. Furthermore, if the lesions were attributed to any types of smoking, they would have been present anywhere in the oral cavity and not just at the site of Qat chewing. In another cross-sectional study aimed at assessing the association between habitual Qat chewing and development of oral leukoplakia among Yemeni Jewish men,29,46 47 Qat chewers who chewed Qat at least twice a week for over three years and 55 controls who did not chew Qat were compared. Leukoplakia was found in 39 (83%) Qat chewers and 9 (16%) non-chewers. A significantly higher rate of occurrence of leukoplakia was observed on the chewing side (n=37 [95%]) compared to the non-chewing side (n=3 [8%]). Although it was expected that more lesions would occur among those who were also smokers, the prevalence of leukoplakia in Qat chewers who also smoked (84%) was not significantly different with that in those who did not smoke (80%); this also supports a possible direct association between development of leukoplakia and Qat chewing. In a cross-sectional study of 1818 male and 682 female Yemeni citizens,48 1538 (61.5%) were Qat chewers.48 Of the Qat chewers 342 (22.2%) had oral keratotic white lesions at the chewing side; only 6 (0.6%) of non-chewers had similar lesions. While most of the Qat chewers smoked tobacco, the lesions appeared at the chewing side and did not extend to other parts of the oral cavity. Of those with keratotic white lesions, 26% were only Qat chewers, an observation supporting the possibility of association between Qat chewing and development of the lesion.48 The study showed that these lesions were increased in number and severity as the duration and frequency of Qat chewing increased. For example, 2.6% of chewers who chewed Qat one day per week and 37% of daily chewers had oral white lesions; similarly, 11% of those who had chewed Qat for less than five years and 48% of persons who had chewed Qat for more than 10 years had oral white lesions. Moreover, most of the grade III white lesions occurred in those who had chewed Qat daily for at least 10 years. To investigate the effects of Qat and Shamma on oral mucosa, a study was conducted in Saudi Arabia University Hospital between 1981 and 1983.51 In a 2-year period, 64 cancer patients (56 men and 8 women with a median age of 46 years) were reported to the hospital. From the 64 cancer patients, 38 had oral cancer of whom 16 had used Shamma alone; 22 had used both Qat and Shamma. The other 14 of 64 cases developed pharyngeal and laryngeal cancers, none of whom reported Qat chewing. The median duration of use for Shamma was 15 and for Qat was 12 years. Alcohol was not consumed by studied patients. Only 14% of the patients were cigarette smokers. In a 2-year review of cancer patients registered at the Asir Central Hospital, Saudi Arabia, Soufi, et al,40 reported head and neck cancers among 28 patients who lived in border areas of Yemen and Saudi Arabia. Ten of these cancer patients presented with a history of Qat chewing. Of 28 cancer patients, eight had oral cancer all of whom reported habitual Qat chewing; some of them reported keeping a Qat bolus on the same side as the lesion. The other two cases had parotid tumor with metastases to cervical lymph nodes. All were non-smoking and had chewed Qat for 25 years or more. Another study identified 36 Yemeni patients with cancer (23 males and 13 females, median age of 50 years) diagnosed between 1997 and 1998 at the Ear, Nose and Throat Clinic and Dermatology Clinic of the Saudi Hospital, Hajjaj, Yemen, of whom 30 patients were habitual Qat chewers.52 Seventeen patients had oral cancer and all were Qat chewers; 10 were also Shamma users and five were tobacco smokers. However, the authors suggested that the findings were inconclusive. An examination of all primary solid tumors recorded in the surgical pathology files at Al-Thawara Hospital in Sana&apos;a in 200453 revealed that oral cancer was the most frequent (18% of 649) malignancies in both males (17.2% of 348) and females (19.6% of 301). Among those with chewing and smoking information (92 of 119), 76% were tobacco chewers, 59.8% were Qat chewers, and 23.9% were cigarette smokers; 26% of men and 13% of women chewed both tobacco and Qat. In 2002–2003, Ali, et al,54 studied the histopathological changes in 50 Yemeni patients (43 males and seven females, mean age of 38 years), of whom 40 were Qat chewers (17 cigarette smokers) registered in the Department of Oral Pathology and Medicine in Yemen. Biopsy was taken from the chewing side of the 40 Qat chewers, from the non-chewing side of 20 Qat chewers (11 cigarette smokers), and from the oral cavity of 10 participants who neither chewed Qat nor smoked cigarette. Mild orthokeratosis, parakeratosis, and epithelial dysplasia of the oral mucosa were found on the chewing side in 39, 10, and 10 individuals, respectively. The frequencies of the histopathological changes were lower on the non-chewing side with 10, 2, and none of the individuals presented with orthokeratosis, parakeratosis, and epithelial dysplasia, respectively. All biopsies taken from the oral mucosa of non-chewing individuals were normal. No differences were demonstrated in the histopathological changes between the biopsies of Qat chewers, whether they smoked or not. In a study sample of 79 Yemeni males, whitening with mild corrugation, frictional keratosis or keratosis with mild or sever corrugation were present in 100% (n=54) of the Qat chewers on the chewing side and in 4% (n=1) of non-chewers.55 The types of the clinical findings on the chewing sides varied according to the duration of Qat chewing habit with more lesions among those with longer duration of chewing Qat. There was no statistical difference when comparing the clinical findings between the right and left side of the non-chewers, smokers and non-smokers, while the difference was statistically significant between chewing and non-chewing sides of the Qat chewers. Furthermore, the authors reported there was statistical difference when comparing chewing sides of Qat chewers with both sides of non-chewers, smokers and non-smokers. On the other hand, no statistical difference was found between non-chewing sides of Qat chewers and both sides of non-chewers whatever the smoking habit was. The authors concluded that Qat chewing causes oral white lesions on the chewing side and that smoking, clinically, does not exacerbate such lesions. Based on the retrospective cohort study, the two case-control studies, the seven cross-sectional studies, the six case series and the two case reports studied, it is suggested that potentially malignant or malignant oral disorders would occur more likely in the mucosal tissue of the buccal side where Qat is chewed and stored. However, in the majority of these studies, tobacco use (smokeless and smoking) was also reported among Qat users. Smoking and smokeless tobacco are known to be associated with pre-malignant oral lesions58,59 and thus, proper adjustment for tobacco use is essential for the examination of Qat use and the occurrence of potentially malignant lesions in the oral cavity. The harmful effect of Qat use could be due to the mechanical friction during chewing over many years of inducing irritation and inflammation as well as cytotoxic effects of Qat on oral mucosal cells. It is noteworthy to acknowledge that the results of the above reviewed literature of Qat chewing should be interpreted cautiously. Important limitations were identified that limit the conclusions that can be drawn from these studies: a) limitations in the study design, such as poorly implemented retrospective studies that do not fully comply with a typical case-control study design or historical cohort study design, definitions with scant descriptions of periods of observations, temporal sequence between health outcome and exposure detection being questionable, and sample selection of study participants potentially having an impact on estimates derived from the studies; b) lack of controlling for known risk factors of pre-malignant oral cancerous lesions that are highly correlated with Qat use, such as tobacco use (smokeless and non- smokeless) or alcohol consumption, which are established causes of pre-cancerous oral lesions and oral cancer; c) not clear for most of the case series whether they included consecutive patients or a selection of patients; d) some studies were from Saudi Arabia where Qat use is prohibited so reporting of Qat chewing might not have been accurate; e) in several studies, the diagnosis was solely based on clinical evaluations and the histopathological examination was not performed or not reported. In addition, most of the studies were conducted in Yemen and there is a lack of data from other countries where Qat is chewed. Chewing behavior could be different in those countries as well as the Qat variety chewed. In summary, despite of being very popular in some parts of the world, there are relatively few sound epidemiological studies on Qat use and its association with potentially malignant or malignant oral disorders. Considering the limitations identified in the few studies conducted so far, it is not possible to draw firm conclusions. To the best of our knowledge, no reliable research has studied the acute and chronic effects of cathinone-nicotine combination with potentially malignant oral disorders and oral cancer. Therefore, future studies are needed to study if Qat is associated with excess risk of cancer in the oral cavity, if this effect is independent of tobacco smoking and whether there is a synergistic effect on the cancer risk when both products are concomitantly used. Due to the acute stimulating effects of Qat and its effects on mood and sleep, Qat users may also use alcohol as a method to calm down. One study in Kenya reported that among 100 randomly selected outpatients at the Meru District Hospital, 29 were Qat chewers including 20 who were also heavy alcohol consumers.65 Similarly, a study in Ethiopia showed that 43.3% of 427 Qat chewing students also drank alcohol.62 However, alcohol drinking is not common among the Yemeni population as most of them are Muslim where their religion prohibits drinking and hence reporting alcohol use. Nevertheless, it should be investigated if alcohol exacerbates the effects of Qat chewing on the oral mucosa. Furthermore, it has been reported that Qat farmers do not follow the safety instructions. For example, a substantial proportion of Qat farmers in Yemen ignored the required period to harvest after the last spraying. Al-Haja, et al,72 reported that 50% of farmers interviewed stated that a period of 7–10 days was required between harvesting Qat and the last spraying, and that half of the farmers said that the period should be 10–20 days. A field study among six Qat farmers in Addwan village in Yemen found that farmers harvested Qat between 3 and 52 days from the last spraying, with an average of 30 days.70 A field study by Al-Mola found that 39% of Qat farmers harvested Qat after 3–6 days, 41% after 7–10 days, and 5% did so after 11–15 days from the last spraying.73 A study by Abdulaziz in Ethiopia indicated that some Qat farmers harvested a recently sprayed Qat for sale and self-consumption,71 potentially putting themselves and their consumers at higher risk of oral exposure to and ingestion of pesticides. Another study conducted in 2009 investigated the presence and level of pesticide residues in Qat samples collected from various parts of Ethiopia.74 The Qat samples had pp&apos;-DDT concentrations ranging from 141.2 to 973.0 µg/kg. Maximum concentrations were found between 240 and 1200 times the European Union maximum recommended levels for DDT in food (vegetables 10 µg/kg, and cereals 50 µg/kg). The high levels of DDT in the Qat samples instead of DDE suggested that DDT is currently in use as a pest control agent in the study region. In another study in Ethiopia, 60 of 70 Qat farmers surveyed mentioned the use of DDT and other pesticides for Qat cultivation.75 It is therefore of utmost importance that information on the source of Qat and if it is cultivated, is collected in any future study on Qat use and health effects. From the literature reviewed in this publication, dominated by studies from a single country, namely Yemen, it is still not clear whether Qat use is a risk factor in the development of potentially malignant or malignant oral disorders. This is due to the limitations of studies conducted so far, which are small in number anyway. Additionally, evidence in the reviewed literature is conflicting about whether Qat may play a tobacco-independent direct role in the development of potentially malignant oral disorders and oral cancer in populations. However, from the literature there is some suggestive finding that Qat chewing can provoke pre-cancerous lesions at the site of the chewing. Al-Motarreb A, Baker K, Broadley KJ. Khat: pharmacological and medical aspects and its social use in Yemen. Phytother Res 2002;16:403-13. Carrier N, Gezon L. Khat in the Western Indian Ocean. Études Océan Indien 2009;42-43:271-97. Available from http://oceanindien.revues.org/851 (Accessed October 20, 2014). Al-Hebshi NN, Skaug N. Khat (Catha edulis)-an updated review. Addict Biol 2005;10:229-307. USDA, ARS, National Genetic Resources Program.Germplasm Resources Information Network - (GRIN). National Germplasm Resources Laboratory, Beltsville, Maryland: National Germplasm Resources Laboratory, 2011. Available from www.ars-grin.gov.4/cgi-bin/npgs/html/index.pl (Accessed October 15, 2014). Geisshüsler S, Brenneisen R. The content of psychoactive phenylpropyl and phenylpentenyl khatamines in Catha edulis Forsk of different origin. J Ethnopharmacol 1987;19:269-77. AL-abed AA, Sutan R, Radman Al-Dubai SA, Aljunid SM. Biomed Res Int. 2014; 2014: 505474. Available from www.ncbi.nlm.nih.gov/pmc/articles/PMC4055061/?report=classic (Accessed October 25, 2014). Manghi RA, Broers B, Khan R, et al. Khat use: lifestyle or addiction? J Psychoactive Drugs 2009;41:1-10. World Health Organization (WHO). Assessment of khat (Catha edulis Forsk). Proceedings of the 34th Meeting, Expert Committee on Drug Dependence, 2006. Nutt D, King LA, Saulsbury W, Blakemore C. Development of a rational scale to assess the harm of drugs of potential misuse. Lancet 2007;369:1047-53. Anderson D, Carrier N. Khat Social harm and legislation a literature review. In: University of Oxford, ed. London, UK: Home Office, 2011. UK Home office. Khat fact sheet for England and Wales: UK Home office, 2014. Alsanosy RM, Mahfouz MS, Gaffar AM. Khat chewing among students of higher education in Jazan region, Saudi Arabia: prevalence, pattern, and related factors. Biomed Res Int 2013:487232. Kalix P. Catha edulis, a plant that has amphetamine effects. Pharm World Sci 1996;18:69-73. Brenneisen R, Fisch HU, Koelbing U, et al. Amphetamine-like effects in humans of the khat alkaloid cathinone. Br J Clin Pharmacol 1990;30:825-8. Carrier N. Is miraa a drug?: categorizing Kenyan khat. Subst Use Misuse 2008;43:803-18. Al-Habori M. The potential adverse effects of habitual use of Catha edulis (khat). Expert Opin Drug Saf 2005;4:1145-45. Giannini AJ, Miller NS, Turner CE. Treatment of khat addiction. J Subst Abuse Treat 1992;9:379-82. Ministry of Health and Population. Family Health Survey 2011 . Available from: www.mophp-ye.org/arabic/docs/Familyhealth_english.pdf (Accessed March 3, 2014). World Bank. Yemen towards qat demand reduction. Country Development III. Sustainable Development Department, Middle East and North Africa Region, 2007. Belew M, Kebede D, Kassaye M, Enquoselassie F. The magnitude of khat use and its association with health, nutrition and socio-economic status. Ethiop Med J 2000;38:11-26. Patel SL, Wright S, Gammampila A. Khat use among Somalis in four english cities. Home Office Report 47/05 2005. Stefan J, Mathew B. Khat chewing: an emerging drug concern in Australia? Aust NZJ Psychiatry 2005;39:842-3. Al-Samarraie M, Khiabani HZ, Opdal MS. Khat--a new drug of abuse in Norway. Tidsskr Nor Laegeforen 2007;127:574-6. Toennes SW, Harder S, Schramm M, et al. Pharmacokinetics of cathinone, cathine and norephedrine after the chewing of khat leaves. Br J Clin Pharmacol 2003;56:125-30. Colzato LS, Ruiz MJ, van den Wildenberg WP, et al. Long-term effects of chronic khat use: impaired inhibitory control. Front Psychol 2010;1:219. Al-Habori M, Al-Aghbari A, Al-Mamary M, Baker M. Toxicological evaluation of Catha edulis leaves: a long term feeding experiment in animals. J Ethnopharmacol 2002;83:209-17. Odenwald M, Neuner F, Schauer M, et al. Khat use as risk factor for psychotic disorders: a cross-sectional and case-control study in Somalia. BMC Med 2005;12:10.1186/741-7015-3-5. Al-Kholani AI. Influence of Khat Chewing on Periodontal Tissues and Oral Hygiene Status among Yemenis. Dent Res J (Isfahan) 2010;7:1-6. Yarom N, Epstein J, Levi H, et al. Oral manifestations of habitual khat chewing: a case-control study. Oral Surg Oral Med Oral Pathol Oral Radiol Endod 2010;109:60-6. Shariff M, Al-Moaleem MM, Al-Ahmari NM. A multidisciplinary approach in the treatment of tempromandibular joint pain associated with qat chewing. Case Rep Dent 2013;139419. Kassie F, Darroudi F, Kundi M, et al. Khat (Catha edulis) consumption causes genotoxic effects in humans. Int J Cancer 2001;92:329-32. Lukandu OM, Costea DE, Dimba EA, et al. Khat induces G1-phase arrest and increased expression of stress-sensitive p53 and p16 proteins in normal human oral keratinocytes and fibroblasts. Eur J Oral Sci 2008;116:23-30. Lukandu OM, Costea DE, Neppelberg E, et al. Khat (Catha edulis) Induces Reactive Oxygen Species and Apoptosis in Normal Human Oral Keratinocytes and Fibroblasts. Toxicol Sci 2008;103:311-24. Lukandu OM, Bredholt T, Neppelberg E, et al. Early loss of mitochondrial inner transmembrane potential in khat-induced cell death of primary normal human oral cells. Toxicology 2009;263. Lukandu OM, Neppelberg E, Vintermyr OK, et al. Khat alters the phenotype of in vitro-reconstructed human oral mucosa. J Dent Res 2010;89:270-50. Al-Akwa AA, Shaher M, Al-Akwa S, Aleryani SL. Free radicals are present in human serum of Catha edulis Forsk (Khat) abusers. J Ethnopharmacol 2009;125:471-3. Dimba EA, Gjertsen BT, Bredholt T, et al. Khat (Catha edulis)-induced apoptosis is inhibited by antagonists of caspase-1 and -8 in human leukaemia cells. Br J Cancer 2004;91:1726-34. Dimba E, Gjertsen BT, Francis GW, et al. Catha edulis (Khat) induces cell death by apoptosis in leukemia cell lines. Ann N Y Acad Sci 2003:384-8. Soufi HE, Kameswaran M, Malatani T. Khat and oral cancer. J Laryngol Otol 1991;105:643-5. Ahmed HG, Omer AS, Abd Algaffar S. Cytological study of exfoliative buccal mucosal cells of Qat chewers in Yemen. Diagn Cytopathol 2011;39:796-800. Scheifele C, Nassar A, Reichart PA. Prevalence of oral cancer and potentially malignant lesions among shammah users in Yemen. Oral Oncol 2007;43:42-50. Macigo FG, Mwaniki DL, Guthua SW. The association between oral leukoplakia and use of tobacco, alcohol and khat based on relative risks assessment in Kenya. Eur J Oral Sci 1995;103:268-73. Schmidt-Westhausen A, Al Sanabani J, Al-Sharabi A. Prevalence of oral white lesions due to qat chewing among women in Yemen. Oral Dis 2014;20:675-81. Al-sharabi AK. Condition of oral mucosa due to takhzeen al qat. Yemeni Journal for Medical Sciences 2011;5:1-6. Gorsky M, Epstein JB, Levi H, Yarom N. Oral white lesions associated with chewing khat. Tob Induc Dis 2004;2:145-50. Ali AA. Histopathologic changes in oral mucosa of Yemenis addicted to water-pipe and cigarette smoking in addition to takhzeen al-qat. Oral Surg Oral Med Oral Pathol Oral Radiol Endod 2007;103:55-9. Ali AA, Al-Sharabi AK, Aguirre JM, Nahas R. A study of 342 oral keratotic white lesions induced by qat chewing among 2500 Yemeni. J Oral Pathol Med 2004;33:368-72. Hill CM, Gibson A. The oral and dental effects of q&apos;at chewing. Oral Surg Oral Med Oral Pathol Oral Radiol Endod 1987;63:433-6. Ibrahim EM, Satti MB, Al Idrissi HY, et al. Oral cancer in Saudi Arabia: the role of alqat and alshammah. Cancer Detect Prev 1986;9:215-8. Nasr AH, Khatri ML. Head and neck squamous cell carcinoma in Hajjah, Yemen. Saudi Med J 2000;21:565-8. Sawair FA, Al-Mutwakel A, Al-Eryani K, et al. High relative frequency of oral squamous cell carcinoma in Yemen: Qat and tobacco chewing as its aetiological background. Int J Environ Health Res 2007;17:185-95. Ali AA, Al-Sharabi AK, Aguirre JM. Histopathological changes in oral mucosa due to takhzeen al-qat: a study of 70 biopsies. J Oral Pathol Med 2006;35:8-15. Halboub E, Dhaifullah E, Abdulhuq M. Khat chewing and smoking effect on oral mucosa: a clinical study. Acta Medica (Hradec Kralove) 2009;52:155-8. Fasanmade A, Kwok E, Newman L. Oral squamous cell carcinoma associated with khat chewing. Oral Surg Oral Med Oral Pathol Oral Radiol Endod 2007;104:53-5. Awange DO, Onyango JF. Oral verrucous carcinoma: report of two cases and review of literature. East Afr Med J 1993;70:316-8. IARC Working Group on the Evaluation of Carcinogenic Risks to Humans. Smokeless tobacco and some tobacco-specific N-nitrosamines. IARC Monogr Eval Carcinog Risks Hum 2007;89:1-592. IARC Working Group on the Evaluation of Carcinogenic Risks to Humans. Tobacco Smoke and Involuntary Smoking. IARC Monogr Eval Carcinog Risks Hum 2004;83:1-1452. Kassim S, Islam S, Croucher RE. Correlates of nicotine dependence in U.K. resident Yemeni khat chewers: a cross-sectional study. Nicotine Tob Res 2011;13:1240-9. Reda AA, Moges A, Biadgilign S, Wondmagegn BY. Prevalence and determinants of khat (Catha edulis) chewing among high school students in eastern Ethiopia: a cross-sectional study. PLoS One 2012;7:e33946. Kassim S, Rogers N, Leach K. The likelihood of khat chewing serving as a neglected and reverse &apos;gateway&apos; to tobacco use among UK male khat chewers: a cross sectional study. BMC Public Health 2014;14:448. Nakajima M, al&apos;Absi M, Dokam A, et al. Gender differences in patterns and correlates of khat and tobacco use. Nicotine Tob Res 2013;15:1130-5. Omolo OE, Dhadphale M. Alcohol use among khat (Catha) chewers in Kenya. Br J Addict 1987;82:97-9. Rusiecki JA, Hou L, Lee WJ, et al. Cancer incidence among pesticide applicators exposed to metolachlor in the Agricultural Health Study. Int J Cancer 2006;118:3118-23. Al-Hadrani AMT, A.R. Acute adverse health effects of pesticides sprayed on khat trees. J Pest Cont Environ Sci 2000;8:97-106. World Health Organization (WHO). The WHO recommended classification of pesticides by hazard and guideline to classification 2004. Geneva, Switzerland: WHO, 2006. Al-Ghory A. Sociogeographical Situation Analysis of Resource Management for Al-Mawasit district/Yemen: Freie Universitaet Berlin, 2004. Mohammed A. An assessment of possible health risks of using DDT and Farmers&apos; Perception towards toxicity of pesticides used on Khat (Catha edulis): In Haromaya Woreda, Ethiopia: Addis Ababa University, 2010. Al-Haj MA, Awadh NA, Ali AA. Survey of pesticides used in Qat cultivation in Dhale&apos; and Yafe&apos; and their adverse effects. J Nat Appl Sci 2005;9:103-10. Al-Mola IEA. Survey on identification of pesticides used on qat grown around Sana&apos;a. Republic of Yemen, Ministry of Agriculture and Water Resources. General Department of Plant Protection. Yemen-German Plant Protection Project, 1993. Daba D, Hymete A, Bekhit AA, et al. Multi residue analysis of pesticides in wheat and khat collected from different regions of Ethiopia. Bull Environ Contam Toxicol 2011;86:336-41. Abdulahi AM. An assessemt of possible health risk of using and Farmers&apos;s perception towards toxicity of pesticides used on Khat (Catha edulis): In Haromaya Woreda, Ethiopia: Addis Ababa University, 2010. Qat chewing is common in the Horn of Africa and in Yemen. Chewing Qat has health hazards. Chewing Qat may be associated with potentially malignant oral disorders at the site of the chewing. Cite this article as: El-Zaemey S, Schüz J, Roux ML. Qat chewing and risk of potentially malignant and malignant oral disorders: A systematic review. Int J Occup Environ Med 2015;6:-143.
2019-04-22T04:34:56Z
http://www.theijoem.com/ijoem/index.php/ijoem/article/view/537/621
and gain some wonderful benefits from doing so. Deeply, deeply I believe this… it is at the core of my life. I am going to show/tell you about my work experiences and some personal stories too to illustrate the benefits of yoga to myself and to my clients who are your patients. No matter how ragged and shallow the breath, gentle yogic techniques can CALM THE MIND AND STEADY THE BREATHING, deepening it, relaxing and centring the client. No matter how restricted the movement, it can be reinforced, strengthened and even visualised into DEVELOPING MUSCLE MASS, BONE DENSITY AND CONFIDENCE. Yoga is so evidence based, so scientific in the sense that you can do the practical. I teach Yoga to Day Care and a small, variable group of residents in Bell Villa Community Unit, and in the Day Hospital, at the Royal, Donnybrook. Other Yoga teachers work in other centres. My clients are a plucky crew whose conditions include motor neurone disease, stroke to the right, stroke to the left, immobilising arthritis, dementia and other similar ailments. The approach is the same as in any Yoga class. We work through the range of movement that is available, and, we visualise the rest. As a group we work with the breath. The staff, the clients and their families can see the visible difference that even an hour a week makes – and many of the students practice quietly in their wheelchairs in between classes. We have seen many improvements, in posture, range of movement and, that hardest to define, increased quality of life. Warming up with Pawanmuktasana exercises, anti-arthritic rotations and manipulations of the hands, feet, elbows, knees etc. Followed by back stretches, twists and, one way or another, working though the muscle groups and joints, resting when needed, with exercises for the intrinsic muscles of the hands, eyes or neck before moving on to the breath work. His research demonstrates that the conditioning of our habitual movements, thought patterns and emotions create patterns of chemical connections deeply embedded in the brain. Some synapse patterns can withstand the ravages of age-related deterioration and Acquired Brain Injury. In my work I am fascinated with the process of maintaining and rebuilding the chemistry of synapse connections. Yoga has been aware of the benefits of exercise for millennia – now, we live in exciting times where Brain Imaging techniques can demonstrate the evidence incontrovertibly. Robertson’s book “Mind Sculpture” inspires me. Challenged by a broken wrist soon after I read it, I road tested some of his ideas and “PUMPED IRON IN THE MENTAL GYMN” .It was a total gift of an experience. It is not an exaggeration to say that it gave me my life’s vocation. When our sense of immortality regains the ascendance, maintaining the motivation momentum flags. The demons of Sloth, Inertia and In-a-minute take over after week three. For the older person the darkly cloaked figure with the scythe lurks in the shadows. While their medical advisors urge that they would benefit from exercise, they are acutely aware of breathlessness and frailty, by the feedback from their own bodies. They suffer a massive loss of confidence. Fear of death through ‘overdoing it’ becomes an inhibiting factor. They really don’t know where or how to begin. How to get the feel-good factor without the fear? A simple solution can be gentle Yoga exercise, starting with the hands. Dignity… of being able to dress and feed oneself, this is the way in for me, to catch the attention of even the most despondent client. We start with the hands. Stretching and moving the hands: taking the fingers and wrists through their range of movement to whatever extent is possible. No matter how crippled with arthritis / jackhammer vibration /or stroke I ask them to move their hands in actuality – or – in the their imagination, in real time, ‘to see’ the damaged hand / finger / arm is also working. He describes the TANGLED WEB of acquired brain injury and shows that it can be encouraged to rebuild itself. This is astonishing and unimaginable, to a population that was brought up in the belief in the rigidity of brain mass. Cells used to be considered irreplaceable when damaged. Through the imaging systems it is possible to ‘see’ the mind at work. Our understanding of the nervous system and how it operates is rapidly changing. We now know the brain to be very malleable. Soon after reading ‘Mind Sculpture’, I had the dubious fortune of breaking my left wrist. I was nearing the end of my three-year Yoga Teacher Training Course. I had assignments for qualification to achieve and training to complete. I was not motivated to sit idly by for a couple of months. I leapt at the chance of ‘doing the practical’. Here was my opportunity to road test Professor Robertson’s thesis. I continued attending my training, even upped the hours of classes. I worked the right hand while ‘imaging’ the left hand doing the same, spreading the shoulder muscles or whatever, as though the wrist was participating in the action… but I forgot about my hand. Totally. I was focussed on the forearm and wrist. The intrinsic movements of the hand were totally taken for granted. The time came to have the cast removed. I caused consternation for the plaster technicians. My arm did not look like one that had been in plaster for 7 weeks. It was hard to convince them that it had, that I had maintained muscle mass through brain gym. But… I had forgotten about my hand. Released from the plaster, I could do headstands, elbow balance, dog-face-down, all the poses with no weakness at all… If anything my body was stronger. But my hand was unable to grip. I had no opposable strength. I had visualised no intrinsic movements of the hand, my slight tendency to arthritis had had a field day. After a magic injection and loads of yoga, physiotherapy and rehab (I am a professional potter), my hand recovered. But it took two years to get back to doing a proper handstand, with the whole of by 75 kg carried by my hands. But Prof. Robertson was right! I had proved it in my own body. My ‘mistake’ only underlined the reality of the power of Brain Gym. This experience inspires my work with everyone I meet, both with the older clients and the younger ones, working their way back to wellness from chronic fatigue and chronic pain. Weaving the web of connectivity in the brain is the key to our experience of life. Every thought has a chemical consequence; every action is created by chemical and electrical interaction. We are the subtlest of mysteries. Vast metropolis of bacteria, virus and subtle, subtle chemistry contribute to our wellbeing. I tell them my story and encourage them to DO THE PRACTICALthemselves. We work with the hands spreading and stretching and doing our best. At any age, all you could ever do is your best. At 6 or 96 we do what we can. Even clients that seem to be cognitively impaired, join in with what seems to be such a do-able exercise. We tend to think of our bodies in sections, not realising that in order to move one finger, A DOZEN PLUS MUSCLES COORDINATE. Cerebral blood flow is maintained and increased – both by actual movement and my movement visualised in real time. Mary thanked me profusely for teaching her these movements – during the class she immediately felt how they warmed up her hands, increased circulation and eased tension in her neck. She felt sure that she could remember them accurately, practise them safely, and was MOTIVATED to repeat them every day, confident that her heart was at no risk at all. What she did not expect was to get improved sleep, sleep like she had not experienced for years. She told me how she had become resigned to ‘pins and needles’ in the fingers that would wake her up during the night, making subsequent sleep fitful with pain. Already her face looks fuller and more relaxed. In some way she had healed a chronic irresolvable condition. I call that an everyday miracle. Let me put it another way… When we don’t even move our hands, several dozen other muscles atrophy, connectivity in the brain is lost and mobility is impaired. This can lead to all sorts of non-specific tingling, pins and needles, spasm, cramp and outright pain. How can I encourage a body to heal itself? How do I facilitate the generation of a feel-good factor that makes life worth living? How best to support the EVERYDAY MIRACLE of correct transmission of intricate chromosome detail over gazillions of cell reproductions; the miracle of repair work from cuts and bruises: the many healing pathways that are triggered by chemical, enzymes and cell messengers that activate processes to enable tissue repair? When I read that, everything in me resonates with the sheer common sense of the man! Fortunately clients seem to have a link in their minds, YOGA IS VERY RELAXING. They are primed to feel relaxed after the class (almost in spite of what I do with them!) Dare I say that they are CONDITIONED to feel relaxed. They are open to feeling better. They come to the class EXPECTINGto feel better. They would not put it in so many words but the PLACEBO RESPONSE OF SELF-HEALING is poised for release. Again, my bedtime reading… Dr Brody’s The Placebo Response, inspires me. This book also looks at the NOCEBO RESPONSE, the flip side; those triggers that undermine the mind’s subtle chemistry, causing the integrity of the whole organism to disintegrate. Extraordinary! But true – we have all witnessed the self-destructive mindset. Reading this I get all excited, are there ways that we can exploit the EXPECTANCY THEORY OF SELF-HEALING? “How does what I think is going to happen to me in the future affect my inner pharmacy? Through exercise and activity the client stimulates REMEMBERED WELLNESS. In class I actively work to recapture that by asking them to describe places that they have enjoyed walking in when we are doing a seated ‘walking’ exercise. I want to stimulate as many parts of the brain as possible – get the visual and auditory memories going. I so want the possibility of Remembered Wellness to activate. I can’t conduct the experiments, but I can seek to do the practical and see the outcome in my client’s faces and body language. One of the treasured memories after a class was of a former military man saying that he loved his yoga class – “You have a way of making me want to exercise for the first time in my life! It is great for the arthritis.” Again, there it is, somehow, blessings on The Media! They seem to have successfully conditioned us to see yoga as an activity apart from Physio or drill. 1. The individual is listened to and receives an explanation for the illness that makes sense. 2. The individual feels care and concern being expressed by the healer and others in the environment. I feel that I can generate some of activity in the third ‘positive direction’. Can the yoga class contribute to the client’s sense of ENHANCED MASTERY OR CONTROL over symptoms? Here I feel we are working in the area of increased the client’s confidence, finding a do-able activity that creates the pay-off – a feel-good feeling. How I would love to know that gentle exercise could be “a reinforcing task which helps to keep the SigA [immunoglobin A] levels high” it seems very possible to be the case. A huge factor in any interactivity is DESIRE. There are so many expressions in every language around the world to do with inability to make someone do something if they don’t want to do it. ‘Take a horse to water but you can’t make him drink’ etc. Here I have to admit that I don’t inspire all my clients. There are some who for one reason or another sit through the classes without joining in, or are so depressed that they don’t want to come. Even the tiny amounts of gentle exercise that we do can make such a difference when I can encourage, cajole, even wheedle, participation. For a while I had permission from one client with Motor Neurone Disease to wheel her into the class even if she said that she did not want to come. But now the depression has got too great a grip on her. Depression is difficult at any age, but EXERCISE ALTERS MOOD … AT ANY AGE. Clients report a “good” feeling of stiffness the next day that clears quickly, leaving a FEEL-GOOD-FACTOR, of having done something that was useful and improved their sense of ‘wellness. Increasingly Brain Imaging techniques make it possible to see the brain in action. Which brings me to The Relaxation Response. It is a universal experience of good yoga classes that it is very hard to recall after the class, what it is precisely, that you did during the class. That is because a good class induces the relaxation response. The body goes into a DEEP STATE OF RESTFULNESS, a ‘floaty beyondness’. This is hard to achieve in a Day Hospital environment, I can tell you. Incredibly we do! Most of us have developed habitual muscle tension, of clenching, holding or gripping with parts of the body that have no relevance to what we are doing. At one stage in my life, when I was dealing with a huge amount of anticipation anxiety, it was drawn to my attention that I always had white-knuckle clenched fists. I was staggered. But it was true. Need I say those were pre-yoga days! Still, many, many times a day I tell my legs and jaw to relax, particularly when I am at the keyboard. I am no touch typist! My toes and jaw tense up in sympathy as my fingers seek to hit the right keys. Both legs can end up cramped. Most of these simple exercises that I do with the older clients are done with my students seeking release from Chronic Pain. In this slide you see some men working at exhaling while drawing their elbows together, on the inhale drawing them apart. They FEEL IMMEDIATE RELIEF in their backs. As might you! Often in the same room there may be patients suffering from advanced dementia apparently aloof to all activity around them. Interestingly, I have often noticed participation in the breathing. Those with a tendency to agitation can be calmer for a time afterwards. As the rate of breathing slows, the activity of the sympathetic nervous system decreases, contributing to the relaxation response. I suggest that the task of following instruction, even unconsciously, has a similar effect and counteracts the reduced blood flow in regions of the brain associated with demntia10. A key section of each class is the breathing exercises where I encourage the group to abandon polite behavior, dump their lady-like or gentlemanly social graces and release pent up frustration and anger, with abandon. We do the ‘HA’ BREATH. Good for EXCHANGING THE AIR IN THE LUNGS. Inhale as the arms raise and exhale with a loud ‘HA’! bring in the arms down as though you were chopping the head of a sneaky snake. VENT ALL THE FRUSTRATION, anger and ire as fully as possible. I give permission to be as noisy as possible, to see if we can frighten the staff, to use the opportunity vent all that pent up emotion. We ease heartache with the SANTA CLAUS BREATH. And what is the best medicine? We do three rounds HO x 7, HA x 7, HE x 7 (gently, be aware of slight hyper ventilation – resting between rounds and watch the blood pressure). Yes of course, we have a good laugh too! Have you ever wondered what causes the HEAVY HEARTACHE FEELING when you are upset? I have a theory that being upset makes the diaphragm rigid, the breath becomes shallow, the heart misses its diaphragmatic massage, it has to work a little harder, and aches. Being seated a lot with no reason to exert oneself has the same result. I have done this breath with a respite care client, her husband had died very recently; in a few minutes the Santa Claus breath eased some of the pain and shock. She said she felt so much better and left the class looking much lighter and brighter. It does not change the, sometimes terrible, situations that people find themselves in but the Santa Claus breath can ease the heartache, free one up to breathe more easily, and so… cope. I have felt it myself, and seen it so many times. The face is taken into extremes of expression – clients describe how this releases jaws that are clenched by pain, anger and frustration. One client told me that his speech therapist approved and encouraged him to do it. Then we take the possibility for release further. We do a seated LION BREATH (Simhasana). Here think, like a lion, sitting on a rock, overlooking the Savannah – we unsheathe our claws, sink them into the object of our frustration as we roar like a lion and stick out the tongue as far as possible and bring the eyes to look up at the ceiling – to look as terrifying as possible. Again, easing jaw-clenching pain, releasing emotion… and giggle without inhibition! So often with mental/emotional pain it is not what is actually happening that matters, so much as the perception of what has occurred. If the client feels as though an issue has been addressed though Brain Gym, to a greater extent then we can dare to imagine, it has. There are very basic Range of Movement exercises that we do, again bringing in memories where possible. · Boxing – now there is a good one for venting, and bring in the sound effect too – Biff, Bang, Wham – Denis the Menace and Beril the Peril. · Ankle rotations – one client who suffered from cramps in her calf ever since she had had a hip replaced found that simple ankle rotations eased the pain, she got back the ability to sleep. Few of us have got through life without sitting down hard at one time or another. I hope children don’t still pull the chair out from under someone sitting down – it is an awful insult to the tailbone. One lady with Parkinson’s has almost that experience everyday, as she is unable to control her movements. She found that the deep pain in her tailbone is eased by the deep and gentle exercises that she does lying down in my own yoga studio – her quality of life has so much improved. In the Royal Hospital Day Care we are looking at the possibility of doing some classes lying down. A gentle hip rotation that eases out lower back pain can be done seated, first in one direction and then, guess what, in the other. Old injuries can often lead to favouring that we don’t notice. Another of my personal stories is about my left hip. For years it had been painful occasionally and seemed to have a ‘sticky ligament’, it clicked. I did not know what to do about it – it did not seem serious enough to get an opinion. During my Teacher Training it deteriorated to waking me up at night. How bad does a pain have to become before we do something about it? The yoga I was doing was not sorting it out. However I was so impressed by the assistance I got with my hand after the wrist break business that I looked for advice about my hip. Straight off the Physiotherapist spotted that I must have damaged the cruciate ligaments in my left knee at some stage. Bang on! About 30 years earlier in fact, I was flabbergasted. She gave me some exercises that did indeed sort out the problem. She showed me how to rebuild the one muscle that had been favoured and under active for all those years. My gait changed, my yoga changed and I have no pain, and no sticky ligament. The body and mind are so malleable. Three decades of abuse corrected in a few months. Of course Physio exercises are notoriously hard to do and can often be quite painful. They are working precisely on the problem area. I could do all sorts of things with my body but not these exercises that she gave me. It took a lot of perseverance, but the payoff was worth it. Where clients are less motivated the exercise has to be more do-able. Increasingly we are becoming a Pain Averse Culture. In a society where we expect to be pain free 100% of the time, and to have all pain alleviated it becomes necessary to educate that there are TWO TYPES OF PAIN, and to be able to develop sensitivity to make the distinction. Pain that is a clear ‘don’t go there’ is different from what I call a USEFUL, HEALING PAIN that can be worked with and through. Say there is the pain of a graze, then there is the itch as it is nearly healed and one can endure that until the scab comes off. There is the pain of a trigger point, and the experience of having knowing fingers massage it out. There is the pain of a stiff joint and the sense of usefulness of gently manipulating it until movement is more released and easier. Like a creaky gate some joints squeak when they are taken beyond their accustomed range of movement. Encouraging clients to go beyond the usual range and work their way through the sound effects and useful pain stimulates secretion of synovial fluid from the synovial membranes generating the possibility for easier, smoother future movement. If I see a pain response in body language, I often ask if the pain could be a useful one, if the movement was repeated in a gentler, more mindful way. If the clients find nothing much of benefit as the movement is being done – great! it is do-able; pay attention to the outcome of the action – the consequences – relief, easing? Great! We have found something that is safe and easy to do that gives benefit. In conclusion, from my limited experience in working with older people I have encouraged them to do the best that they are able and to imagine the rest. I have seen faces relax and smile again as pain is eased. I have seen limbs move that have not moved in years, even small movements serve to ease out large muscle groups. At the very least one-to-one attention, touch and the bit of banter lights up the day. When I came in to work the other week one very old blind man was sitting weeping. At first he felt he would not join the class, but then he said that he would “I’ll feel the better for the movement – I can hardly feel worse!” He did feel better and now he is my #1 fan! Gradually over the months postural muscle groups become stronger, limbs can even begin to twitch back into real, not imagined, participation. Above all quality of life improves. I find the clients inspiring. PR p 92 Mc Clelland and Kirshnit research 19871987 into immunoglobin A in the saliva, this is an aspect of the immune system; study showed the sensitivity of the immune response to mental tasks and mood.
2019-04-20T22:15:11Z
https://seraph.ie/index.php?page=golden-years-yoga
The following guide outlines the basic functions and requirements of positions in the Central Administration job family, describes general job duties and outcomes, and provides education and experience requirements at each grade. Instructs and supervises a group of custodians and custodial group leaders in cleaning and general maintenance duties to ensure satisfactory application of all cleaning standards on a daily basis. Interacts with building coordinators and vendors on a regular basis and during special events to ensure proper set-ups and the satisfactory completion of all tasks. Explains university policies at the frontline supervisory level. Hires, trains, and supervises staff in the performance of their responsibilities. Conducts safety meetings and performs routine testing of all equipment and products. Makes decisions or choices following standard practices and procedures. May collaborate with others to evaluate decisions or solutions that are more complex. Works under direct supervision with specific instructions on routine or semi-routine work. Work outputs are usually reviewed upon completion. Requires a high school education or equivalent and a minimum of four years of group leading or supervisory experience in custodial services. Also requires a valid driver’s license, two years driving experience, and successful completion of the Rutgers Defensive Driving course. Must have good communication skills and computer literacy in industry standard software. May require shift work. Provides managerial leadership to frontline supervisors with overall responsibility for custodial operations on particular campuses and shifts. Determines and schedules staffing needs to ensure quality standards are maintained for multi-campus operations. Serves as second-level grievance hearing officer. Prepares task cost estimates, establishes collection protocols, and handles client relations. Coordinates client requests for custodial support services. Confers with vendors, clients, facilities staff, and others to research, test, and recommend materials, equipment, and services to be used in custodial and recycling operations. Assists in the administration and development of university contracts for recycling, pest control, cleaning services, equipment maintenance, and leasing, procurement, and other services. Revises contracts and keeps clients informed of changes. Reviews and settles vendor billing discrepancies and assists with periodic reviews to ensure vendor performance meets established standards. Evaluates, develops, and implements procedures and standards for the cost-effective delivery of all related services. Provides resolutions to a diverse range of complex problems that may require creativity. Works independently and uses judgment within broadly defined policies and procedures. Interprets, communicates, and implements policies and practices for differing needs of a diverse client population. Requires a bachelor’s degree or an equivalent combination of education and/or experience and a minimum of five years experience in custodial operations or building maintenance. Also requires supervisory experience, excellent communication skills, and computer literacy in industry standard software. Supervises the operational and workforce activities of an assigned area. Plans, develops, and manages efficient and economical grounds maintenance tasks in accordance with departmental standards. Identifies landscaped and hardscaped areas that need to be established, renovated, or replaced. Supervises grounds employees in maintenance duties; trains employees on proper grounds techniques, safety, administrative, departmental, and university policies and procedures. Performs administrative duties as assigned. Implements defined procedures and standards for the cost-effective delivery of all related services. Uses judgment within defined practices and procedures. Carries out routine and non-routine tasks with occasional review of work outputs by supervisor. May deviate from established methods as long as outputs meet standards of acceptability. Requires a high school education or equivalent and a minimum of five years experience in public or private grounds maintenance work that includes group leading or supervisory responsibilities. Also requires a valid driver’s license, two years driving experience, and successful completion of the Rutgers Defensive Driving course. A Commercial Driver’s License (CDL) Class B with air-brake endorsement must be obtained within 90 days of employment at the expense of the employee. Requires good communication skills and computer literacy in industry standard software. Serves as a second level supervisor in directing the daily maintenance associated with turf and ornamental horticulture in accordance with university standards for grounds maintenance. Supervises the assignment of staff, material resources, and vendor services for snow removal and ice conditions. Directs the daily maintenance and capital improvements associated with roads, parking lots, sidewalks, curbing, patio pavers, bike pads, and catch basins in accordance with relevant federal, state, and university regulations. Prepares annual budget and/or projected capital expenditure reports. Plans, schedules, and supervises capital projects associated with grounds landscape, drainage, and signage. Coordinates, directs, and oversees road sweeping operations throughout assigned campuses. Provides assistance and guidance associated with outdoor utility excavation and restoration. Develops, implements, and directs the routine maintenance, emergency repair, and state inspection program for university vehicles and motorized equipment. Estimates and inspects auto body repairs performed through the use of contracted vendor services in compliance with university policies and procedures. Evaluates, develops, and implements procedures and standards for the cost-effective delivery of all related services. Provides resolutions to a diverse range of complex problems that may require creativity. Works independently and uses judgment within broadly defined policies and procedures. Interprets, communicates, and implements policies and practices for differing needs of a diverse client population. Requires a bachelor’s degree or an equivalent combination of education and/or experience and a minimum of five years experience in grounds maintenance, fleet maintenance operations, and project management which includes supervisory experience. Also requires excellent communication skills and computer literacy in industry standard software. Requires a valid driver’s license, two years driving experience, and the successful completion of the Rutgers Defensive Driving course. A Commercial Driver’s License (CDL) Class B with air brake endorsement is also required. Is responsible for all facets of maintenance operations within a designated area. Supervises multiple crafts personnel performing planned, preventive, and emergency work. Meets with clients on a regular basis to determine needs. Supervises and instructs personnel on technical matters. Prioritizes routine repair work and evaluates and responds to emergency calls. Negotiates and obtains vendor commitments; schedules and oversees the work of external vendors. Implements and evaluates preventive maintenance programs and prepares reports of on-going projects. Evaluates, develops, and implements procedures and standards for the cost-effective delivery of all related services. Provides resolutions to a diverse range of complex problems that may require creativity. Works independently and uses judgment within broadly defined policies and procedures. Interprets, communicates, and implements policies and practices for differing needs of a diverse client population. Requires a bachelor’s degree in engineering or related field, or an equivalent combination of education and/or experience; and a minimum of five years industrial experience in building systems, electrical and mechanical operations, and repair. Also requires supervisory experience and strong interpersonal and organizational skills. Familiarity with computerized maintenance management systems, knowledge of building codes, and the ability to troubleshoot mechanical, electrical, and building systems is necessary. Requires excellent communication and computer skills. Operates all stationary equipment such as hot water and steam boilers, chillers, and domestic hot water heating equipment over 100 horsepower serving all university buildings, utilities power plants, and related auxiliaries. Checks equipment for proper operating conditions and makes adjustments to correct abnormal operating conditions. Responds to all emergency, urgent, and non-emergency calls for a wide range of problems with mechanical equipment or other situations campus-wide. Provides assessment and makes minor repairs when appropriate. Reports operating status and problems to appropriate supervisors. Operates energy management systems for stationary and HVAC equipment for campus buildings. Oversees boiler and cooling tower water treatment and refrigerant management programs. Under general supervision, carries out routine and non-routine tasks within work parameters of the unit that are usually reviewed by supervisor upon completion. Performs professional level work that requires knowledge and the application and use of concepts, theories, and terminology of the industry and the organization. May deviate from established methods as long as outputs meet standards of acceptability. Requires a valid NJ Class 1-C (Blue Seal) Operating Engineers License, a high school education or equivalent, and a minimum of six years experience in facility operations at either a commercial or institutional facility. Experience should include supervision and the operation and minor repair of HVAC stationary boiler and chiller equipment. A valid driver’s license, two years of driving experience, and successful completion of the Rutgers Defensive Driving course is necessary. Also requires good communication skills and computer literacy in industry standard software. Plans and manages preventive maintenance programs for all buildings in a designated area to include inspections of building exteriors, interiors, and major equipment. Initiates, plans, estimates, and produces appropriate work requests. Coordinates maintenance activities with contractors, departmental supervisors, and facilities coordinators. Prepares estimates for departmental projects and oversees work through completion. Attends project planning meetings, construction meetings, and final walkthroughs upon project completion. Coordinates inspections of work performed by outside contractors and in-house mechanics. Prepares responses to code compliance issues and life safety violations. Work is consistent with an understanding of the mission, vision, role, and goals of the organization. Performs professional level work that requires knowledge and the application and use of concepts, theories, and terminology of the industry and the organization. May deviate from established methods as long as outputs meet standards of acceptability. Requires a bachelor’s degree in engineering technology or a related field, or an equivalent combination of education and/or experience, and a minimum of two years experience in institutional project work or maintenance field. Must have the ability to read blueprints, write specifications, and develop project costs. Good communication, organizational, and customer service skills; and computer literacy in industry standard software are also required. Directs the successful initiation, coordination, and execution of multiple complex design and/or construction projects. Convenes all university participants, clients, and outside consultants, and keeps them well informed and involved throughout the life of a project. Develops, interprets, and communicates policies and practices for differing needs of a diverse client population. Is accountable for major project decisions, metrics, and client satisfaction. Represents the interests of the university and its client groups by the timely review of design and construction documentation, contract deliverables, and capital expenditures. Has broad responsibility for process management and creation of guidelines. Provides highly creative solutions to unusually complex problems. Demonstrates leadership role in forming and maintaining productive working relationships. Negotiates fair and reasonable prices for all necessary services and evaluates construction pay requests. Provides substantial input to decisions. Works under minimal supervision and uses independent judgment to accomplish objectives. Supervises senior facilities project specialists. Responsible for supervising the service of meals and effective sanitation of all dining hall service areas. Supervises the set-up and up-keep of service areas in an attractive, functional, and timely fashion. Assigns, trains, instructs, supervises, and disciplines employees. Performs custodial tasks. Is responsible for the handling of left over food, advance preparation, and cleaning of the kitchen to include the sanitizing equipment. Supervises the ware washing activities to ensure an adequate supply of wares throughout the meal and the proper cleaning of the ware washing areas. Supervises the entrance and exit security activities and the cash receipts for the meal. Supervises the cleaning, closing, and security of the dining hall in preparation for the following day. Work is consistent with an understanding of the mission, vision, role, and goals of the organization. May deviate from established methods as long as outputs meet standards of acceptability. Carries out routine and non-routine tasks within work parameters of the unit that are usually reviewed by supervisor upon completion. Uses judgment within defined practices and procedures. Provides resolutions to an assortment of problems of moderately complex scope. Requires a bachelor’s degree in food service management or a related field, or an equivalent combination of education and/or experience, and a minimum of two years of experience in a food service operation. Experience should include supervision of food preparation in a high-volume dining facility. Requires a New Jersey Food Service Management Certificate, good communication skills, and computer literacy in industry standard software. Responsible for guiding, instructing, supervising, and assisting kitchen personnel in the production and preparation of hot and cold food, cleaning of food preparation areas and equipment, and the control of food costs. Develops new recipes. Adheres to menus and recipes. Evaluates, develops, and implements procedures and standards for the cost-effective delivery of all related services. Ensures all safety, cleanliness, and sanitation policies are followed. Work is consistent with an understanding of the mission, vision, role, and goals of the organization. Provides resolutions to an assortment of problems of moderately complex scope. Uses judgment within defined practices and procedures. Carries out routine and non-routine tasks within work parameters of the unit that are usually reviewed by supervisor upon completion. Performs professional level work that requires knowledge and the application and use of concepts, theories, and terminology of the industry and the organization. May deviate from established methods as long as outputs meet standards of acceptability. Requires a bachelor’s degree in culinary arts, or an equivalent combination of education and/or experience, and a minimum of two years of fine and quantity cooking experience with one year of kitchen management experience. Also requires New Jersey Food Service Management Certificate, good communication skills, and computer literacy in industry standard software. Is responsible for all dining hall activities that include supervision of all food production areas and food production personnel. Is responsible for the production of all hot and cold food. Supervises the opening of a dining facility and the preparation of breakfast and lunch. Supervises the receiving, storing, and issuing of all merchandise. Trains all employees in the area of food production. Assigns employees to proper areas. Evaluates and disciplines employees. Serves as step-one hearing officer for union grievances. Responsible for inventory control of food. Maintains the kitchen in a clean and orderly fashion. Evaluates, develops, and implements procedures and standards for the cost-effective delivery of all related services. Work is consistent with an understanding of the mission, vision, role, and goals of the organization. Provides resolutions to an assortment of problems of moderately complex scope. Uses judgment within defined practices and procedures. Carries out routine and non-routine tasks within work parameters of the unit that are usually reviewed by supervisor upon completion. Performs professional level work that requires knowledge and the application and use of concepts, theories, and terminology of the industry and the organization. May deviate from established methods as long as outputs meet standards of acceptability. Requires a bachelor’s degree in food science management or a related field, or an equivalent combination of education and/or experience, and a minimum of two years of supervisory experience in a high volume dining facility. Requires a New Jersey Food Service Management Certificate, good communication skills, and computer literacy in industry standard software. Plans all dining hall activities including student board, cash sales, catering, and special events. Is responsible for the accurate control and administering of food, equipment, and facility inventories. Schedules all supervisors and employees. Interviews and hires employees. Is responsible for petty cash fund, cash receipts, transmittals, and transactions. Supervises, trains, and coaches subordinates. Develops a competent team of assistant managers and performs on-going performance evaluations. Serves as step-one hearing officer for union grievances. Evaluates, develops, and implements procedures and standards for the cost-effective delivery of all related services. Maintains food and labor costs within approved budget guidelines. Develops and implements menus. Standardizes and provides new recipes. Conducts costing analyses to determine selling prices of menu items. Maintains proper sanitation and safety standards. Works independently with broadly defined work objectives. Performs professional level work that requires knowledge and the application and use of concepts, theories, and the terminology of the industry and the organization. Provides resolutions to a diverse range of complex problems that may require creativity. Uses judgment within broadly defined practices and procedures. Requires a bachelor’s degree in food service management or a related field, or an equivalent combination of education and/or experience, and a minimum of five years of management experience, which includes experience in food production and work in a high-volume dining facility. Requires a New Jersey Food Service Management Certification, excellent communication skills, and computer literacy in industry standard software. Expertise in planning, organizing, training, and evaluating performance is also necessary. Provides overall daily operations and administrative functions. Supervises the work of clerical and student staff in resident student assignment, check-in and out, and maintenance of security, facilities, billing records, and databases. Works under general supervision with few direct instructions. Carries out routine and non-routine work tasks with occasional review of work outputs by supervisor. Performs work requiring knowledge of general principles and practices within the area. Supervises the work of technical and/or clerical staff. Performs professional work that requires the use of discretion and judgment within defined practices and procedures. May deviate from established methods as long as outputs meet acceptability standards. Requires a bachelor’s degree in a related field, or an equivalent combination of education and/or experience that demonstrates knowledge and understanding of housing, student assignment, scheduling, occupancy rates, work organization, coordination, and bookkeeping. Also requires a minimum of two years relevant experience in an administrative function, good communication skills, and computer literacy. Plans, directs, and supervises custodial, maintenance, and grounds operations for an assigned campus operation. Initiates, plans, estimates, and coordinates work requests for repair, maintenance, changes, and additions to campus housing facilities. Performs professional work with a solid understanding of work project coordination, cost and time effectiveness, and general custodial, grounds, and maintenance operations. Provides resolutions to a diverse range of complex problems consistent with the role and goals of the unit and in accordance with management principles, applicable regulations, and university policies. Supervises lower-level professionals and paraprofessionals. Works independently within broadly defined work objectives and limited review of work results. Interprets, communicates, and implements policies and practices for differing needs of a diverse client population. Manages daily and long-term maintenance and administrative operations for housing for an assigned campus. Manages all assignment, maintenance, and project management functions and decisions for the campus. Is an integral link to Residence Life at the university. Formulates, maintains, and communicates all policy and quality standards for the campus operation. Performs professional work with a solid understanding of the theoretical and applied bases for a particular field of specialization; applies principles and concepts to work within a discipline. Provides resolution to a diverse range of complex problems that may require creativity. Interprets, communicates, and implements policies and practices and functions as a seasoned professional in the area. Seen as a point-of-contact and source of information. Requires a bachelor’s degree in a related field, or an equivalent combination of education and/or experience with five years relevant experience in managing housing operations, business management, and developing and managing policy for a workforce. Knowledge of building maintenance procedures is required. Also requires excellent communication skills and computer literacy.
2019-04-24T20:04:05Z
http://uhr.rutgers.edu/uhr-units-offices/consulting-staffing-compensation/hiring-toolkit/position-description-toolkit-5
1Biozentrum, University of Basel, Basel, Switzerland. 3Department of Surgery, St. Claraspital, Basel, Switzerland. Address correspondence to: Mitsugu Shimobayashi or Michael N. Hall, Klingelbergstrasse 50/70, Basel 4056, Switzerland. Phone: 41.61.207.2171; Email: [email protected] (MS). Phone: 41.61.207.2150; Email: [email protected] (MNH). J Clin Invest. 2018;128(4):1538–1550. https://doi.org/10.1172/JCI96139. Obesity-induced insulin resistance is a major risk factor for type 2 diabetes, hyperlipidemia, cardiovascular disease, and some types of cancer (1–3). Although the mechanism by which obesity causes insulin resistance is unclear, inflammation has been linked to the development of local and systemic insulin resistance, especially when the inflammation occurs in white adipose tissue (WAT) (4, 5). WAT consists of adipocytes and stromal vascular cells (SVCs) including endothelial cells, preadipocytes, and immune cells (6). Among the immune cells, macrophages play a particularly important role in obesity-induced adipose tissue inflammation. Macrophages are classified into 2 types: proinflammatory M1 and antiinflammatory M2 macrophages. M1 macrophages express the surface marker CD11c (7, 8) and produce proinflammatory cytokines such as TNF-α (9, 10). M2 macrophages express the surface marker CD301 and produce antiinflammatory cytokines such as IL-10 (7). The relative and absolute number of M1 macrophages increases in WAT upon obesity, thereby promoting adipose tissue inflammation (7–11). Studies in rodents have suggested that adipose tissue inflammation causes local and systemic insulin resistance (9, 11–13). However, it has been demonstrated that immunocompromised mice are not protected from systemic insulin resistance induced by a short-term high-fat diet (HFD) (14). Furthermore, Tian et al. have shown that adipose tissue inflammation is dispensable for local and systemic insulin resistance (15). Another study has shown that inhibition of adipose tissue inflammation results in glucose intolerance, suggesting that inflammation may even be a mechanism to counter insulin resistance (16). In humans, expression of the macrophage markers CD68 and TNF-α in WAT correlates with BMI, suggesting that obesity may induce the accumulation of adipose tissue macrophages and inflammation in humans (9, 17). However, clinical trials targeting TNF-α have shown little or no beneficial effect on systemic insulin sensitivity (18–21). Thus, the causal relationship between adipose tissue inflammation and insulin resistance is unclear. Two models have been proposed to explain the increase in the number of M1 macrophages in WAT upon obesity. The first is that circulating monocytes are recruited to WAT, where they differentiate into M1 macrophages (7, 22). The second is that obesity induces the proliferation of resident macrophages in WAT (23). The monocyte chemoattractant protein 1/C-C chemokine ligand 2 (MCP1/CCL2), presumably produced by adipocytes, is required to increase the number of macrophages in WAT (12, 23, 24). However, the mechanism(s) controlling MCP1 expression in adipocytes upon obesity are poorly understood. The target of rapamycin complex 2 (TORC2) is an evolutionarily conserved serine/threonine protein kinase complex that controls growth and metabolism (reviewed in ref. 25). In mammals, mTORC2 consists of mTOR, rapamycin-insensitive companion of mTOR (RICTOR), mammalian stress-activated protein kinase–interacting protein 1 (mSIN1), and mammalian lethal with SEC thirteen 8 (mLST8) (26–31). Insulin stimulates mTORC2 to promote glucose uptake in adipose tissue (32–34), liver (35–37), and skeletal muscle (38, 39). Previously, we and others have shown that adipose-specific Rictor knockout (AdRiKO) exacerbates obesity-related complications in mice, such as systemic insulin resistance and hepatic steatosis (32–34). Here, we used mTORC2-deficient and therefore insulin-resistant AdRiKO mice to investigate the causal relationship between insulin resistance and inflammation. We found that inhibition of the insulin/mTORC2 pathway resulted in enhanced Mcp1 transcription in mouse and human adipocytes and thereby promoted inflammation in visceral WAT. Furthermore, obesity-induced insulin resistance developed before the accumulation of proinflammatory M1 macrophages in visceral WAT of WT mice. Thus, insulin resistance precedes and causes inflammation in adipose tissue. Insulin/mTORC2 signaling in WAT negatively controls inflammation. AdRiKO exacerbates systemic insulin resistance upon obesity, as evidenced by impaired glucose clearance in response to insulin treatment (Figure 1A and refs. 32–34). Thus, the AdRiKO mouse is a good model to investigate the causal relationship between insulin resistance and inflammation upon obesity. To determine whether insulin resistance due to impaired insulin/mTORC2 signaling in WAT affects adipose inflammation, we performed quantitative proteomics on epididymal WAT (eWAT) from HFD-fed (for 10 weeks) AdRiKO (aP2-Cre, Rictorfl/fl) and control (Rictorfl/fl) mice. As previously reported (32–34), HFD-fed AdRiKO mice had an increased body size with no change in adiposity (Supplemental Figure 1, A–C; supplemental material available online with this article; https://doi.org/10.1172/JCI96139DS1). Furthermore, we confirmed that RICTOR expression, AKT (Ser473) phosphorylation, and PKC expression, readouts for mTORC2 signaling, were decreased, while S6K (Thr389) phosphorylation, a readout for mTORC1 signaling, was not affected in eWAT (Figure 1B; see complete unedited blots in the supplemental material). Among approximately 3,000 proteins identified in the proteome, 61 and 16 were up- and downregulated, respectively, in AdRiKO mice compared with controls (Figure 1C and Supplemental Table 1). Gene Ontology (GO) analysis of the regulated proteins revealed enrichment of immune response–related biological processes (Figure 1D), suggesting that insulin resistance due to loss of mTORC2 signaling may cause inflammation upon obesity. Quantitative proteome analysis reveals insulin/mTORC2 signaling functions in adipose tissue inflammation. (A) ITT for AdRiKO and control mice fed a HFD for 10 weeks. Mice were fasted for 5 hours prior to the ITT. Data are presented as the mean ± SEM. **P < 0.01, ***P < 0.001, and ****P < 0.0001, by 2-way ANOVA. n = 10 (control) and n = 5 (AdRiKO). (B) Immunoblots of eWAT from HFD-fed AdRiKO and control mice. eWAT samples were collected from ad libitum–fed mice. The same lysates were used for proteome analysis. (C) Regulated proteome with 3 biological replicates. See also Supplemental Table 1. (D) GO term analysis of the regulated proteome. Data are presented as the mean ± SEM. To examine further whether mTORC2 in WAT controls inflammation, we quantified immune cells in eWAT of HFD-fed AdRiKO and control mice by flow cytometry. While the numbers of B and T cells did not differ (Supplemental Figure 1D), the number of macrophages (F4/80+CD11b+) increased in AdRiKO eWAT at 10 weeks of HFD feeding (Figure 2, A and B, and Supplemental Figure 2A). The increase in macrophages correlated with increased macrophage gene expression (Cd68 and F4/80) and F4/80 staining (Figure 2, C and D). Next, we determined whether the increase in the number of macrophages in AdRiKO eWAT was due to an increase in proinflammatory M1 (F4/80+CD11b+CD11c+) and/or antiinflammatory M2 (F4/80+CD11b+CD301+) macrophages. The numbers of both M1 and M2 macrophages increased in both AdRiKO and control mice during the HFD time course (Figure 2, E–G). AdRiKO eWAT showed a disproportionately large increase in M1 macrophages, starting at 6 weeks of HFD feeding (Figure 2, E and F). Quantification of proinflammatory cytokine TNF-α mRNA in SVCs and macrophages isolated from HFD-fed AdRiKO and control mice confirmed the disproportionate increase in M1 macrophages in AdRiKO eWAT (Figure 2, H and I, and Supplemental Figure 2, B and C). These observations indicate that AdRiKO leads to the accumulation of M1 macrophages, confirming that genetically induced insulin resistance due to loss of mTORC2 signaling in WAT promotes inflammation. We note that there was no difference in macrophage numbers between AdRiKO and control mice on a normal diet (ND) (Supplemental Figure 3, A–E), indicating that AdRiKO potentiates inflammation only in response to obesity. AdRiKO eWAT accumulates M1 macrophages. (A and B) Numbers of macrophages (CD45+F4/80+CD11b+) in SVCs isolated from eWAT of HFD-fed AdRiKO and control mice. Representative FACS profiles are shown in A, and quantification is shown in B. **P < 0.01, by multiple Student’s t test. n = 6–15. (C) Gene expression of macrophage markers in eWAT from HFD-fed AdRiKO and control mice. **P < 0.01, by multiple Student’s t test. n = 7–8. (D) Representative F4/80 staining of eWAT from HFD-fed AdRiKO and control mice. n = 4. Scale bar: 100 μm. (E–G) Numbers of M1 macrophages (CD45+F4/80+CD11b+CD11c+) and M2 macrophages (CD45+F4/80+CD11b+CD301+) in SVCs from eWAT of HFD-fed AdRiKO and control mice. Representative FACS profiles are shown in E, and quantification is shown in F and G. ****P < 0.0001 and P = 0.053, by multiple Student’s t test. n = 6–15. (H and I) Tnfa gene expression in SVCs (H) (n = 9) and isolated macrophages (I) (n = 6–8) from eWAT of HFD-fed AdRiKO and control mice. *P < 0.05, by unpaired Student’s t test. (J) Immunoblots of eWAT from i-AdRiKO and control mice. Mice were treated with tamoxifen for 5 days. After 4 weeks, mice were fasted for 5 hours and then treated with PBS or insulin. (K) ITT for i-AdRiKO and control mice 4 weeks after induction of Rictor knockout. Mice were fasted for 5 hours prior to the ITT. **P < 0.01, ***P < 0.001, and ****P < 0.0001, by 2-way ANOVA. n = 5 (control) and n = 6 (i-AdRiKO). (L and M) Numbers of M1 macrophages (CD45+F4/80+CD11b+CD11c+) (L) and M2 macrophages (CD45+F4/80+CD11b+CD301+) (M) in SVCs from eWAT of HFD-fed i-AdRiKO and control mice. *P < 0.05, by unpaired Student’s t test. n = 7. Data are presented as the mean ± SEM. Our AdRiKO model relies on the adipose-specific promoter aP2 to drive Cre expression and thereby knock out Rictor. However, aP2-Cre can be expressed in cell types other than adipocytes including macrophages (40, 41). Three lines of evidence suggest that our findings are not due to confounding effects of ectopic knockout of Rictor in macrophages. First, Rictor expression was unchanged in macrophages isolated from the HFD-fed AdRiKO mice compared with those from control mice (Supplemental Figure 4, A and B). Second, adipose-specific deletion of Rictor via expression of Cre from the Adipoq promoter (i-AdRiKO: Adipoq-CreERT2, Rictorfl/fl) (40, 42) also showed an increase in M1 macrophages in eWAT upon obesity, as observed in aP2-Cre AdRiKO mice (Figure 2, J–M, and Supplemental Figure 4, C and D). Third, macrophage-specific knockout of Rictor, due to expression of Cre from the LysM promoter (LysM-Cre Rictorfl/fl), had no effect on macrophages in WAT of mice fed a HFD (43). HFD-induced insulin resistance precedes the accumulation of adipose tissue M1 macrophages. Our findings indicate that genetically induced local insulin resistance causes the accumulation of M1 macrophages and thus inflammation in WAT upon obesity. This predicts that HFD-induced insulin resistance precedes inflammation in WT mice. To test this prediction, we performed a longitudinal study with HFD-fed WT mice (Supplemental Figure 5A). WT mice developed eWAT and systemic insulin resistance by week 4 of HFD feeding, as measured by insulin-stimulated glucose uptake and an insulin tolerance test (ITT) (Figure 3, A and B, and Supplemental Figure 5B), respectively. Mice fed a HFD for 10 weeks remained insulin resistant compared with mice on a ND (Figure 3C and Supplemental Figure 5C). The M1 macrophage population in eWAT mildly increased in mice by week 10 of a HFD, but not by 4 or 8 weeks (Figure 3D). Tnfa expression did not increase in mice at 4 or 10 weeks of a HFD (Supplemental Figure 5D). These findings are consistent with previous reports showing that mice develop adipose and systemic insulin resistance within several days to 4 weeks of a HFD (44, 45), whereas the number of M1 macrophages in WAT increases only within 8 to 10 weeks of a HFD (10, 15, 45, 46). The finding that HFD-induced insulin resistance precedes the accumulation of M1 macrophages is consistent with our above conclusion that insulin resistance leads to inflammation. HFD-induced insulin resistance precedes the accumulation of M1 macrophages. (A) Insulin-stimulated 2DGP accumulation in eWAT and muscle from WT mice fed a ND or HFD for 4 weeks. Mice were fasted for 5 hours, injected with insulin at 0 minutes and 2DG at 10 minutes, and sacrificed at 30 minutes. ***P < 0.001, by unpaired Student’s t test. n = 7–8. (B and C) ITT for WT mice fed a ND or HFD for 4 weeks (B) or 10 weeks (C). Mice were fasted for 5 hours prior to the ITT. ****P < 0.0001, by 2-way ANOVA. n = 15 (4 wk ND), n = 17 (4 wk HFD), n = 3 (10 wk ND), and n = 4 (10 wk HFD). (D) Numbers of M1 macrophages (CD45+F4/80+CD11b+CD11c+) and M2 macrophages (CD45+F4/80+CD11b+CD301+) in eWAT of WT mice fed a HFD for 4, 8, or 10 weeks. **P < 0.01, by multiple Student’s t test. n = 5–17. Rictorfl/fl mice were used as WT controls. Data are presented as the mean ± SEM. Insulin resistance–induced inflammation is specific to visceral WAT. Adipose-specific loss of mTORC2 signaling directly causes insulin resistance in all WAT depots and indirectly leads to systemic insulin resistance (32–34). To test whether AdRiKO causes inflammation in liver or in fat depots other than eWAT (see above), we examined macrophage numbers in peri-renal WAT (prWAT), subcutaneous WAT (sWAT), and liver of HFD-fed AdRiKO and control mice. AdRiKO prWAT, but not sWAT or liver, had increased numbers of M1 macrophages, (Supplemental Figure 6, A–C). Thus, AdRiKO promotes inflammation specifically in visceral WAT (eWAT and prWAT). To test whether local insulin resistance causes inflammation in the liver, we examined hepatic macrophages in liver-specific Rictor-knockout mice (LiRiKO: Alb-Cre, Rictorfl/fl), which have hepatic insulin resistance due to loss of insulin/mTORC2 signaling in liver (35–37). HFD-fed LiRiKO mice had a moderate but nonsignificant increase in the number of hepatic macrophages compared with HFD-fed control mice (Supplemental Figure 6D). Furthermore, the numbers of M1 and M2 macrophages in eWAT were identical in LiRiKO and control mice (Supplemental Figure 6E). Thus, the ability of local insulin resistance to promote inflammation is specific to visceral WAT. Rictor knockout in adipocytes increases expression of the chemokine MCP1. How does insulin resistance in visceral WAT cause local accumulation of M1 macrophages and inflammation? Amano et al. have suggested that a HFD induces local proliferation of macrophages (23). Alternatively, others have proposed that WAT recruits circulating monocytes, which then differentiate into M1 macrophages (7, 22). To distinguish between these 2 models, we used flow cytometry to measure the proliferation marker Ki-67 in macrophages in eWAT of HFD-fed mice. The percentage of Ki-67+ M1 macrophages in AdRiKO mice was similar to that in control mice (Supplemental Figure 7A), suggesting that the increase in M1 macrophages in AdRiKO eWAT is not due to local proliferation. To investigate the possibility that WAT recruits monocytes, we examined the expression of WAT-derived chemokines in eWAT from HFD-fed AdRiKO and control mice. A chemokine array and ELISA revealed increased expression of monocyte chemoattractant protein 1 (MCP1, also known as C-C motif ligand 2 [CCL2]) in AdRiKO eWAT (Figure 4, A and B). Increased levels of MCP1 were also detected in the plasma of HFD-fed AdRiKO mice (Figure 4C). Furthermore, in SVCs isolated from AdRiKO eWAT, we observed significantly increased expression of C-C chemokine receptor type 2 (Ccr2), encoding an MCP1 receptor, as a result of increased numbers of Ccr2-expressing cells such as monocytes and macrophages (Figure 4D). These findings suggest that insulin-resistant visceral WAT, via MCP1 expression, recruits monocytes, which then differentiate into M1 macrophages. Insulin/mTORC2 signaling inhibits Mcp1 transcription and M1 macrophage accumulation in vivo. (A) Adipokine array of eWAT from HFD-fed AdRiKO and control mice. Immunoblots show the reduction of RICTOR expression and mTORC2 signaling. n = 8 (data from 8 mice were pooled). (B) MCP1 protein levels in eWAT from HFD-fed AdRiKO and control mice. *P < 0.05, by unpaired Student’s t test. n = 8. (C) MCP1 protein levels in plasma from HFD-fed AdRiKO and control mice. **P < 0.01, by unpaired Student’s t test. n = 8. (D) Ccr2 mRNA levels in SVCs isolated from eWAT of HFD-fed AdRiKO and control mice. *P < 0.05, by unpaired Student’s t test. n = 12. (E) Numbers of M1 macrophages (CD45+F4/80+CD11b+CD11c+) and M2 macrophages (CD45+F4/80+CD11b+CD301+) in eWAT. Mice were fed a HFD for 8 weeks and treated with a control or MCP1-neutralizing antibody for 2 weeks with ongoing HFD feeding. *P < 0.05 and ***P < 0.001, by 1-way ANOVA. n = 5–8. (F) Percentage of inflammatory monocytes in peripheral blood mononuclear cells (PBMCs). Mice were treated as in E. **P < 0.01, by 1-way ANOVA. n = 4–7. Data are presented as the mean ± SEM. We next tested whether the increase in MCP1 is responsible for M1 macrophage accumulation in AdRiKO eWAT. Mice were fed a HFD for 8 weeks and then treated with an MCP1-neutralizing or control antibody for 2 weeks along with ongoing HFD feeding. The antibody treatments had no impact on body weight (Supplemental Figure 7B). The MCP1-neutralizing antibody inhibited the accumulation of M1 macrophages in AdRiKO eWAT by 50%, with no impact on M2 macrophages (Figure 4E). The MCP1-neutralizing antibody also caused a 2-fold increase in monocytes (Ly-6ChiCD11b+) in the blood of AdRiKO mice (Figure 4F). Thus, MCP1 appears to mediate the increase in M1 macrophages in AdRiKO eWAT. Altogether, our data suggest that mTORC2 inhibition in WAT results in Mcp1 expression, followed by infiltration of monocytes in an MCP1-CCR2–dependent manner. Insulin/mTORC2 signaling inhibits Mcp1 transcription in adipocytes. Expression of the Mcp1 gene was increased in the eWAT of HFD-fed AdRiKO and i-AdRiKO mice compared with expression levels in control eWAT (Figure 5, A and B), suggesting that MCP1 is upregulated in AdRiKO WAT at the transcriptional level. Furthermore, we note that the increase in Mcp1 expression (Figure 5A) coincided with an increase in the number of M1 macrophages in AdRiKO eWAT (Figure 2F). The number of macrophages and expression levels of Mcp1 were unchanged in AdRiKO and control eWAT in ND-fed mice (Supplemental Figure 3 and Supplemental Figure 8A). To identify the cells in which Mcp1 expression was induced, we measured Mcp1 mRNA levels in adipocytes and SVCs isolated from eWAT of HFD-fed AdRiKO and control mice (Supplemental Figure 2B). AdRiKO adipocytes, but not SVCs, showed increased Mcp1 expression (Figure 5, C and D). To determine whether the regulation of Mcp1 transcription by mTORC2 is cell autonomous, we first treated 3T3-L1 adipocytes with the mTOR inhibitor torin 1 (47). 3T3-L1 adipocytes treated with torin 1 had increased Mcp1 expression (Figure 5E). Next, we generated 2 Rictor-knockout 3T3-L1 adipocyte cell lines (Figure 5F and Supplemental Figure 8B) using the genome-editing CRISPR-Cas9 system (48). Rictor-knockout 3T3-L1 adipocytes were able to differentiate, albeit at a slower rate compared with control cells (Supplemental Figure 8C). Consistent with our in vivo data, Mcp1 expression was increased in the Rictor-knockout 3T3-L1 adipocytes (Figure 5G and Supplemental Figure 8B). Serum and insulin treatment suppressed Mcp1 expression in control but not Rictor-knockout 3T3-L1 adipocytes (Figure 5H and Supplemental Figure 8D). In WT mice, Mcp1 expression increased by 10 weeks, but not 4 weeks, of HFD feeding (Supplemental Figure 8E). These data support the notion that insulin resistance precedes and promotes Mcp1 transcription in adipocytes. We note that Rictor knockout in liver (LiRiKO) did not result in hepatic Mcp1 expression (Supplemental Figure 8F), consistent with our above finding that LiRiKO failed to stimulate inflammation in liver. Insulin/mTORC2 signaling inhibits Mcp1 transcription in adipocytes. (A) Mcp1 mRNA levels in eWAT from AdRiKO and control mice during the HFD time course. *P < 0.05 and ***P < 0.001, by multiple Student’s t test. n = 5–10. (B) Mcp1 mRNA levels in eWAT from HFD-fed i-AdRiKO and control mice. **P < 0.01, by unpaired Student’s t test. n = 4–6. (C and D) Mcp1 mRNA levels in adipocytes (C) and SVCs (D) isolated from eWAT of HFD-fed AdRiKO and control mice. ***P < 0.001, by unpaired Student’s t test. n = 13–14. (E) Mcp1 mRNA levels in 3T3-L1 adipocytes treated with DMSO or 250 nM torin 1 for 6 hours. **P < 0.01, by unpaired Student’s t test. N >3. (F) 2DGP accumulation in insulin-stimulated Rictor-knockout or control 3T3-L1 adipocytes treated with DMSO or the JNK inhibitor SP600125 (20 μM). N = 3. (G) Mcp1 mRNA levels in Rictor-knockout and control 3T3-L1 adipocytes. *P < 0.05 and **P < 0.01, by unpaired Student’s t test. N = 3. (H) Mcp1 mRNA levels in Rictor-knockout and control 3T3-L1 adipocytes treated with or without serum and insulin. *P < 0.05, by unpaired Student’s t test. N = 3. (I) Mcp1 mRNA levels in Rictor-knockout and control 3T3-L1 cells treated with DMSO or the JNK inhibitor SP600125 (20 μM) for 6 hours. *P < 0.05 and **P < 0.01, by 1-way ANOVA. N = 3. (J) Immunoblots of Rictor-knockout and control 3T3-L1 adipocytes treated with DMSO or the JNK inhibitor SP600125 (20 μM) for 6 hours. N = 3. (K) In vitro JNK kinase assay. Active JNK was immunoprecipitated from Rictor-knockout or control 3T3-L1 adipocytes, and JNK activity was assessed toward its substrate cJUN. SP600125 treatment served as a negative control. N = 3. Data are presented as the mean ± SEM. How does mTORC2 loss lead to Mcp1 transcription? It has been suggested that JNK is required for MCP1 expression and secretion in cultured 3T3-L1 adipocytes (49). Consistent with that report, treatment with the JNK inhibitor SP600125 reduced Mcp1 expression in Rictor-knockout 3T3-L1 cells (Figure 5I). Inhibition of JNK was confirmed by loss of cJUN (Ser73) phosphorylation (Figure 5J). SP600125 did not restore AKT (Ser 473) phosphorylation (Figure 5J) or insulin-stimulated glucose uptake (Figure 5F) in the Rictor-knockout 3T3-L1 cells, indicating that the effect of the drug was independent of mTORC2 and insulin resistance. Furthermore, JNK activity was unaffected by Rictor knockout (Figure 5, J and K). Thus, mTORC2 and JNK control Mcp1 expression independently. Impaired insulin/mTORC2 signaling and increased MCP1 expression in omental WAT of obese patients. MCP1 mRNA levels in omental WAT (oWAT) correlate with BMI in obese human subjects (9, 50). However, how MCP1 transcription is regulated in human adipose tissue is unknown. Our finding that insulin/mTORC2 signaling negatively controls Mcp1 transcription and adipose tissue inflammation in mice prompted us to examine insulin/mTORC2 signaling, MCP1 expression, and macrophage accumulation in human visceral WAT, i.e., oWAT. To this end, oWAT samples were collected from 20 lean and 30 obese human patients who were under general anesthesia (Figure 6A and Supplemental Table 2). The obese patients were insulin resistant as determined by high homeostatic model assessment of insulin resistance (HOMA-IR) (Figure 6B and Supplemental Figure 9A). We note that oWAT was collected from patients who, because of standard procedure before undergoing general anesthesia, had fasted overnight, a condition that might not be optimal for the evaluation of insulin/mTORC2 signaling. Nevertheless, in oWAT, AKT2 (Ser474) phosphorylation, a readout for mTORC2 signaling, was lower in obese patients than in lean patients (Figure 6, C and D). AKT2 (Ser474) phosphorylation negatively correlated with BMI (Figure 6E). These data suggest that insulin/mTORC2 signaling is impaired in oWAT of obese and insulin-resistant patients and validate AdRiKO mice as a model for human insulin resistance. MCP1 expression was higher in obese subjects and positively correlated with BMI (Figure 6, F and G, and Supplemental Figure 9B). CD68 expression was also higher in the obese subjects and positively correlated with BMI (Figure 6, H and I, and Supplemental Figure 9C). MCP1 and CD68 expression levels also correlated (Figure 6J). AKT2 (Ser474) phosphorylation did not correlate with MCP1 and CD68 expression (Supplemental Figure 9, D and E) when comparing the entire cohort of 50 patients, consistent with our above observation in mice that inhibition of insulin/mTORC2 signaling alone was not sufficient to promote adipose tissue inflammation (Supplemental Figure 3). However, approximately one-third of the obese patients (9 of 30) had low AKT (Ser474) phosphorylation and high HOMA-IR, MCP1, and CD68 (Figure 6K), suggesting that AdRiKO mice may phenocopy this subgroup of patients. Finally, torin 1 treatment led to an increase in MCP1 expression in human primary adipocytes, suggesting that insulin/mTOR signaling inhibits MCP1 expression also in humans (Figure 6, L and M). Impaired insulin/mTORC2 signaling and increased MCP1 expression in oWAT of insulin-resistant obese patients. (A and B) BMI and HOMA-IR of lean and obese patients. ***P < 0.001 and ****P < 0.0001, by Mann-Whitney U test. See also Supplemental Table 2. (C) Representative immunoblots for p-AKT2 (Ser474) and AKT2 in human oWAT. (D) Quantification of p-AKT2 (Ser474) normalized to total AKT2. ***P < 0.001, by Mann-Whitney U test. (E) p-AKT2 (Ser474)/AKT2 negatively correlated with BMI. Significance was determined by Pearson’s correlation analysis. (F) MCP1 mRNA levels in human oWAT. **P < 0.01, by Mann-Whitney U test. (G) MCP1 positively correlated with BMI. Significance was determined by Pearson’s correlation analysis. (H) CD68 mRNA levels in human oWAT. **P < 0.01, by Mann-Whitney U test. (I and J) CD68 positively correlated with BMI (I) and MCP1 levels (J). Significance in I and J was determined by Pearson’s correlation analysis. (K) Cluster analysis of BMI, HOMA-IR, p-AKT2 (Ser474)/AKT2, MCP1, and CD68 levels. (L and M) Effect of torin 1 on insulin/mTORC2 signaling (L) and MCP1 mRNA levels (M) in human primary adipocytes. Differentiated human primary adipocytes were treated with DMSO or 250 nM torin 1 for 6 hours. We provide 2 lines of evidence that insulin resistance promotes the accumulation of M1 macrophages and thereby fosters inflammation (Figure 7). First, we show that knockout of mTORC2, i.e., genetically induced insulin resistance, in mouse adipocytes derepressed Mcp1 expression. As a consequence, monocytes were recruited to visceral WAT, where they differentiated into M1 macrophages and caused inflammation. Second, HFD-induced insulin resistance in WT mice preceded the accumulation of proinflammatory M1 macrophages. We also show that oWAT from obese, insulin-resistant patients had low mTORC2 signaling, high MCP1 expression, and high macrophage content, suggesting that our findings in mice have human relevance (Figure 6). Insulin resistance causes inflammation in adipose tissue. Insulin resistance, due to obesity and loss of insulin/mTORC2 signaling, results in enhanced production of MCP1 in adipocytes. MCP1 in turn recruits monocytes and activates proinflammatory M1 macrophages. Our findings are consistent with observations made in mice genetically modified in other components of the insulin signaling pathway. Two studies demonstrated that deletion of PTEN or PIK3R1, negative regulators of insulin signaling, causes enhanced insulin sensitivity and a reduced number of macrophages in adipose tissue (51, 52). More recently, Shearin et al. (53) showed that adipose-specific Akt1- and Akt2-knockout mice exhibit insulin resistance and increased macrophage infiltration in adipose tissue. The above studies altogether may disentangle the “chicken-and-egg” relationship (see Introduction) of insulin resistance and inflammation, at least in adipose tissue. Obesity induces insulin resistance, via a yet-to-be defined mechanism, which in turn promotes inflammation. As suggested previously (16), this inflammation may contribute to adipose tissue remodeling and expansion to maintain glucose hemostasis. It has been suggested that activated M1 macrophages undergo metabolic reprogramming from oxidative phosphorylation to glycolysis (54, 55). Thus, a physiological role of M1 macrophages could be to clear excess local glucose. Our finding that insulin resistance precedes inflammation may account for the observation that inhibition of TNF-α is ineffective in the treatment of obesity-induced insulin resistance (18–21). HFD-fed AdRiKO mice showed reduced AKT (Ser473) phosphorylation (Figure 1B), decreased glucose uptake (Figure 1A), and extensive inflammation (Figure 2) in eWAT. HFD-fed WT mice also displayed decreased glucose uptake (Figure 3, A–C), which was followed by mild inflammation (Figure 3D). Unexpectedly, AKT (Ser473) phosphorylation was not reduced in WT mice fed a HFD for 4 or 10 weeks (Supplemental Figure 5, E and F) (56), although we still observed mild inflammation in eWAT by week 10 of HFD feeding. We note that the number of M1 macrophages in AdRiKO eWAT was much higher than that in control eWAT by week 10 of the HFD (Figure 2F). These findings suggest that obesity-induced insulin resistance promotes mild inflammation downstream or independently of mTORC2, whereas chronic insulin resistance leads to mTORC2 inhibition and therefore extensive inflammation, as observed in AdRiKO mice and obese patients. Our experiments reveal that loss of mTORC2 leads to increased Mcp1 expression in adipocytes (Figure 5). What is the downstream effector through which mTORC2 controls Mcp1 transcription? One candidate is the phosphatidic acid phosphatase LIPIN1, whose knockdown results in Mcp1 expression in 3T3-L1 adipocytes (57). LIPIN1, independently of its phosphatase activity, also functions as a transcriptional repressor (58). We found that Lipin1 expression was reduced in Rictor-knockout eWAT and adipocytes (Supplemental Figure 10, A and B), suggesting that mTORC2 may negatively control Mcp1 transcription via LIPIN1. An adipose-specific transcription factor is another candidate through which mTORC2 may control Mcp1 expression. Rictor knockout increased Mcp1 expression in adipocytes, but not in liver or fibroblasts (Supplemental Figure 8F and Supplemental Figure 10C), indicating that the regulation of Mcp1 transcription by mTORC2 is specific to adipocytes. Why does AdRiKO eWAT accumulate a disproportionately high number of M1 macrophages only in response to obesity? The increase in Mcp1 transcription in mTORC2-knockout adipocytes required JNK activity (Figure 5I), which is high only in WAT from obese mice (59, 60). Thus, obesity might be a prerequisite for JNK activation, which in turn stimulates Mcp1 expression in conjunction with loss of mTORC2. We note that mTORC2 did not control JNK (Figure 5, J and K). In summary, we propose that obesity-mediated insulin resistance is a cause of inflammation in visceral WAT. Although our findings do not rule out the possibility that inflammation promotes insulin resistance in other tissues or conditions, they bring into question whether antiinflammation therapy in adipose tissue is an effective strategy in the prevention of type 2 diabetes. Mice. Adipose tissue–specific Rictor-knockout (AdRiKO) and liver-specific Rictor-knockout (LiRiKO) mice were described previously (32, 35, 61). Since AdRiKO mice are infertile, we bred Rictorfl/+ aP2-Cre mice with Rictorfl/fl mice to generate mice for our experiments. For experiments with AdRiKO mice, age-matched Cre-negative males were used as controls. To generate LiRiKO mice for experiments, Rictorfl/fl Alb-Cre mice were crossed with Rictorfl/fl mice. To generate an i-AdRiKO mouse line, Rictorfl/fl mice were bred with adipoq-CreERT2 mice, provided by Stefan Offermanns (Max Planck Institute for Heart and Lung Research [MPI-HLR], Bad Nauheim, Germany) (42). Once the i-AdRiKO mouse line (Rictorfl/fl adipoq-CreERT2) was generated, these mice were bred with Rictorfl/fl mice to produce mice for experiments. For experiments with LiRiKO and i-AdRiKO mice, Cre-negative littermate male mice were used as controls. All mice used in this study were on a C57BL/6 background. For i-AdRiKO mice, Rictor knockout was induced by i.p. injection of 1 mg/mouse tamoxifen (Sigma-Aldrich) resuspended in corn oil daily for 5 days. Mice were housed at 22°C in a conventional facility under a 12-hour light/12-hour dark cycle with unlimited access to water and were fed a ND or a HFD (60% kcal from fat NAFAG 2127, KLIBA). The HFD-feeding experiment was conducted for 10 weeks unless otherwise specified. Cre-negative animals were used as a control. For i-AdRiKO mouse experiments, control mice were also treated with tamoxifen. Mice were randomly assigned for each experiment. Only male, 6- to 16-week-old mice were used for experiments. Cell culture. 3T3-L1 cells were cultured and differentiated as described previously (62). In brief, 3T3-L1 preadipocyte cells were maintained in M1 medium (DMEM supplemented with 4 mM glutamine, 1 mM sodium pyruvate, 1× penicillin and streptomycin, and 10% FBS) at 37°C in an incubator with 5% CO2. For differentiation, cells were maintained in M1 medium for 2 days after reaching confluence. The medium was replaced with M2 medium (M1 medium supplemented with 1.5 μg/ml insulin, 0.5 mM IBMX, 1 μM dexamethasone, and 2 μM rosiglitazone), defined as day 0 of differentiation. After 2 days, the medium was replaced with M3 medium (M1 with 1.5 μg/ml insulin). The medium was replaced with M2 on day 4 of differentiation. From day 6, cells were maintained in M3 with a medium change every 2 days. For all experiments, cells differentiated for 10 to 14 days were used. Torin 1 was purchased from Tocris Bioscience and dissolved in DMSO. Human oWAT biopsies. oWAT biopsies were obtained from lean subjects with a BMI below 27 kg/m2 and from obese subjects with a BMI above 35 kg/m2 (Supplemental Table 2). Patients were fasted overnight and then underwent general anesthesia. All oWAT samples were obtained between 8:30 and 12:00, snap-frozen in liquid nitrogen, and stored at –80°C. Human primary adipocytes. Human primary visceral preadipocytes (from a 56-year-oldwoman with a BMI of 23) were obtained from Lonza. Cells were cultured and differentiated according to the manufacturer’s instructions. After 14 days of differentiation, cells were treated with DMSO or 250 nM torin1 for 6 hours. Generation of Rictor-knockout cells by CRISPR/Cas9-mediated genome editing. Rictor-knockout 3T3-L1 cells (Hall laboratory stock) were generated using the CRISPR/Cas9 system. Oligonucleotides containing single-guide RNAs (sgRNAs) (Rictor.1, forward: CACCGGAAGATACTGATCCCGCTTG, sgRNA Rictor.1, reverse: AAACCAAGCGGGATCAGTATCTTCC; sgRNA Rictor.2, forward: CACCGTGCCTCCTAGGGCTTGGTCG, sgRNA Rictor.1, reverse: AAACCGACCAAGCCCTAGGAGGCAC) were cloned into lentiCRISPRv2 (Addgene plasmid 52961) (48), a gift of Feng Zhang (MIT, Cambridge Massachusetts, USA). Plasmids were amplified by bacterial transformation and isolated by Miniprep (Zymo Research). LentiCRISPRv2 plasmids were cotransfected with psPAX2 (Addgene plasmid 12260; a gift of Didier Trono, EPFL, Lausanne, Switzerland) and pCMV-VSV-G (63) (Addgene plasmid 8454; a gift of Robert Weinberg, MIT, Cambridge, Massachusetts, USA) into HEK293T cells (Hall laboratory stock). Supernatants containing lentiviruses were collected 1 day after transfection and used to transduce undifferentiated 3T3-L1 cells. Transduced cells were selected by puromycin. 2-Deoxyglucose uptake assay. Mice were fed a ND or HFD for 4 weeks, fasted for 5 hours, and given Humalog insulin i.p. (Lilly; 0.75 U/kg body weight). After 10 minutes, 2-deoxyglucose (2DG) (Sigma-Aldrich) was given i.p. (32.8 μg/g body weight), and tissues (eWAT, muscle) were collected 20 minutes later. For in vitro 2DG uptake, differentiated adipocytes were cultured in serum-free M1 medium, washed 3 times with HKRP buffer (1.2 mM KH2PO4, 1.2 mM MgSO4, 1.3 mM CaCl2, 118 mM NaCl, 5 mM KCl, and 30 mM HEPES, pH7.5), and cultured in HKRP buffer with 1% BSA for 30 minutes. Cells were stimulated with 100 nM insulin for 20 minutes and subsequently cultured with 1 mM 2DG for 20 minutes. Tissues or cells were lysed in 10 mM Tris-HCL, pH 8.0, by boiling for 15 minutes. 2-Deoxyglucose-6-phosphate (2DGP) was measured using a Glucose Uptake-Glo Assay Kit (Promega) following the manufacturer’s instructions. MCP1 ELISA and adipokine array. Mice were fed a HFD for 10 weeks, and MCP1 levels in eWAT and plasma were measured using a commercial ELISA kit (R&D Systems) following the manufacturer’s instructions. Adipokine array (R&D Systems) was performed according to the manufacturer’s instructions. MCP1-neutralizing antibody treatment. Mice were fed a HFD for 8 weeks. Mice were given i.p. 1 mg/kg body weight isotype control IgG (BD Biosciences; catalog 553968, lot 4113848) or anti–MCP1 IgG (BD Biosciences; catalog 554440, lot 5203535) every 2 days for 2 weeks. ITT. Mice were fasted for 5 hours, Humalog insulin (Lilly) was given i.p. (0.75U/kg body weight), and blood glucose levels were measured with an Accu-Chek blood glucose meter. In vivo insulin stimulation. Mice were fasted for 5 hours, Humalog insulin (Lilly) was administered i.p. (0.75U/kg body weight), and tissues were collected. Isolation of adipocytes and SVCs and flow cytometric analysis. SVCs were isolated and stained with antibody as previously described (64). In brief, fat pads were excised and minced in HBSS++ supplemented with 0.5% BSA and digested with 1 mg/ml type II collagenase (Sigma-Aldrich) at 37°C for 40 minutes with vigorous shaking. After digestion, final 10 mM EDTA was added and incubated for 10 minutes to dissociate SVCs. The resulting suspension was filtered through a 100-μm cell strainer (Corning) and centrifuged at 500 g for 10 minutes. After centrifugation, floating adipocytes were collected, and SVC-containing pellets were subjected to red blood cell lysis in 1× Red Blood Cell Lysis Buffer (eBioscience). SVCs were blocked with Fc-block (BD Biosciences) and stained with the following antibodies and reagents: F4/80-PE (eBioscience; catalog 12-4801-80); CD11b-APC eFluor 780 (eBioscience; catalog 47-0112-80); CD11c-PE-Cy7 (eBioscience; catalog 25-0114-81); CD45.2-PerCP (eBioscience; catalog 45-0454-80); CD301–Alexa Fluor 647 (AbD Serotec; catalog MCA2392A647T); CD4-FITC (eBioscience; catalog 11-0041-81); CD8a-PE (eBioscience; catalog 12-0081-81); CD3-APC (eBioscience; catalog 17-0032-80); CD45R (B220) PerCP-Cyanine 5.5 (eBioscience; catalog 45-0452-80); CD25 APC-eFluor 780 (eBioscience; catalog 47-0251-80); and Ki-67–Alexa Fluor 488 (BD Pharmingen; catalog 561165), along with a FOXP3 Flow Kit (BioLegend, catalog 320021) and a Live/Dead Fixable Dead Cell Kit (Thermo Fisher; catalog L34955). Stained SVCs were analyzed using the FACSCanto II (BD Biosciences) or sorted with a FACSAria IIIu (BD Biosciences). Immunohistochemistry. WATs were fixed overnight in 4% formalin at room temperature, dehydrated, embedded in paraffin, and cut into 5-μm-thick sections. Adipose tissue macrophages were stained with anti-F4/80 antibody (Abcam; catalog ab6640) and a secondary antibody conjugated with HRP (VECTOR Laboratories), followed by incubation in ImmPACT DAB peroxidase substrate solution (VECTOR Laboratories) and subsequent counterstaining with hematoxylin (VECTOR Laboratories). Images were obtained using DM600B (Leica) and analyzed with Fiji software (ImageJ; NIH) (65). RNA isolation and quantitative real-time PCR. Total RNA was isolated with TRIzol Reagent (Sigma-Aldrich) and an RNeasy Kit (QIAGEN). For RNA isolation from sorted macrophages, an RNeasy Micro Kit (QIAGEN) was used. RNA was reverse transcribed to cDNA using an iScript cDNA Synthesis Kit (Bio-Rad). Semiquantitative real-time PCR analysis was performed using Fast SYBR Green (Applied Biosystems). Relative expression levels were determined by normalizing each Ct value to either Polr2a, Tbp, or Rpl7 expression for mice and RNA18S5 for human samples using the ΔΔCt method. The primer sequences used in this study are shown in Table 1. Protein isolation and immunoblots. Tissues were homogenized in lysis buffer containing 100 mM Tris-HCl, pH7.5, 2 mM EDTA, 2 mM EGTA, 150 mM NaCl, 1% Triton X-100, cOmplete Inhibitor Cocktail (Roche), and PhosSTOP (Roche). The protein concentration was determined by the Bradford assay, and equal amounts of protein were separated by SDS-PAGE and transferred onto nitrocellulose membranes (GE Healthcare). The following antibodies were used in this study and were purchased from Cell Signaling Technology: AKT (catalog 4685); phosphorylated AKT (p-AKT) (Ser473) (catalog 4060), RICTOR (catalog 2140), PKC (catalog 2056), p-S6K (Thr389) (catalog 9234), S6K (catalog 2708), p-JNK (Thr183/Tyr185) (catalog 4668), JNK (catalog 9252), p-cJUN (Ser73) (catalog 3270), cJUN (catalog 9165). Actin monoclonal antibody was purchased from Sigma-Aldrich (catalog MAB1501). JNK kinase assay. JNK activity was measured using a SAPK/JNK Kinase Assay Kit (Nonradioactive) (Cell Signaling Technology; catalog 8794). Proteome analysis. eWAT was homogenized in urea lysis buffer containing 50 mM Tris-HCl, pH 8.2, 8 M urea, 75 mM NaCl, cOmplete inhibitor cocktail (Roche), and PhosSTOP (Roche). The extracts were incubated for 30 minutes at 4°C and centrifuged for 15 minutes at 14,000 g. Protein concentration was measured with the Bradford assay. Proteins were reduced with 2.5 mM DTT for 40 minutes at 56°C and alkylated with 7.5 mM iodoacetamide for 40 minutes at room temperature in the dark with gentle shaking. The urea concentration was lowered to 4 M with 25 mM Tris-HCl, pH 8. The lysates were digested with 2 rounds of endoproteinase LysC (Wako) at an enzyme/protein ratio of 1:100 (w/w) at 37°C for 2 hours. After the LysC digestion, the urea concentration was lowered to 1 M with 25 mM Tris-HCl, pH 8.0. The lysates were digested with 2 rounds of trypsin (Worthington) at an enzyme/protein ratio of 1:100 (w/w) for 2 hours, followed by overnight digestion at 37°C. Digestion was stopped by adding trifluoroacetic acid (TFA) to reach a final concentration of 0.4%. The digests were centrifuged for 5 minutes at 3,000 g and desalted on a C18 SepPak cartridge (Waters) that had been equilibrated with 0.1% TFA. The peptides were applied onto the cartridge, washed with 0.1% TFA, and subsequently eluted with 0.5% AcOH/80% AcCN. The peptide concentration was estimated by measuring the UV absorbance at 280 nm (66). The desalted peptides were dried in a SpeedVac (Thermo Fisher Scientific). For strong cation separation, the dried peptides were dissolved in 1.5 ml 7 mM KH2PO4, pH 2.65, and 30% AcCN (v/v) (SCX buffer A) and centrifuged at 10,600 × g. The peptides were applied onto a HiTrap SP cartridge (GE Healthcare) that had been equilibrated with 3 ml SCX buffer A, and the cartridge was washed with 3 ml SCX buffer A. Bound peptides were stepwise eluted with 1.5 ml each of SCX buffer A containing 50 mM, 100 mM, 150 mM, 250 mM, and 350 mM KCl, and each fraction was collected manually. The peptide concentration was estimated by absorbance at 280 nm. The fractions were dried in a SpeedVac and desalted on either micro or macro spin C18 columns (The Nest Group). The peptides were desalted with 0.1% TFA and subsequently eluted with 0.5% AcOH/80% AcCN. The dried peptides (20 μg) were dissolved in 20 μl of 0.1% formic acid and 0.005% TFA and analyzed on an Orbitrap Elite FT Hybrid Instrument (Thermo Fisher Scientific). The peptides from the SCX step-off fractions were analyzed by capillary liquid chromatography tandem MS (LC-MS/MS) using a home-packed separating column (0.075 mm × 15 cm) packed with Reprosil C18 reverse-phase material (2.4 m particle size; provided by Albin Maisch, Ammerbuch-Entringen, Germany). The column was connected online to an Orbitrap Elite FT Hybrid Instrument. The solvents used for peptide separation were 0.1% formic acid in water/0.005% TFA (solvent A) and 0.1% formic acid/0.005% TFA and 80% acetonitrile in water (solvent B). Peptide digest (2 μl) was injected with a Proxeon nLC Capillary Pump (Thermo Fisher Scientific) set to 0.3 μl/min. A linear gradient from 0% to 40% of solvent B in solvent A in 95 minutes was delivered with the nano pump at a flow rate of 0.3 μl/min. After 95 minutes, the percentage of solvent B was increased to 75% in 10 minutes. The eluting peptides were ionized at 2.5 kV. The mass spectrometer was operated in data-dependent mode. The precursor scan was done in the Orbitrap, set to 60,000 resolution, while the fragment ions were mass analyzed in the LTQ Orbitrap Instrument. A top-10 method was run so that the 10 most intense precursors were selected for fragmentation. Each biological replicate was measured in 3 technical replicates. The LC-MS/MS data were searched with Proteome Discoverer 1.4 (Thermo Fisher Scientific), set to Mascot and Sequest HT against a mouse UniProtKB databank (67). The precursor tolerance was set to 10 ppm, while the fragment ion tolerance was set to 0.5 Da. The following variable modifications were used during the search: carbamidomethyl-cystein, oxidized methionine, and N-terminal protein acetylation. The peptide search matches were set at “high confidence” (1% FDR). All LC-MS/MS runs were aligned with Progenesis software (Waters). For identification of the aligned features, the corresponding Proteome Discoverer 1.4 results files were imported into the aligned Progenesis data file. The data aligned in Progenesis were exported as .txt files to the R-based Perseus program (68). Volcano plots and ANOVA 2-sample t tests were performed with a FDR of 5%. Proteins were considered regulated when the ANOVA 2-sample t test was below 0.05 in each technical replicate and the Student’s t test P value was below 0.05 in at least 2 of 3 biological replicates. GO process analysis was performed according to the framework provided by the Gene Ontology Consortium (69, 70). Statistics. Immunoblots for p-AKT2 (Ser474) and AKT2 on human oWAT were quantified in Fiji (65). Samples for which we failed to detect AKT2 were excluded from further analysis. Sample size was chosen according to our previous studies and published reports in which similar experimental procedures were described. The investigators were not blinded to the treatment groups. All data are shown as the mean ± SEM. Sample numbers are indicated in each figure legend. For mouse experiments, n represents the number of animals, and for cell culture experiments, N indicates the number of independent experiments. To determine the statistical significance between 2 groups, an unpaired 2-tailed Student’s t test was performed. For more than 3 groups, 1-way ANOVA was performed. For ITT data, 2-way ANOVA was performed. For human samples, statistical outliers were excluded in Figure 6 according to the robust regression and outlier removal test (ROUT) (Q = 1%) but are included in Supplemental Figure 9. In all cases, a Mann-Whitney U test was performed to determine statistical significance. All statistical analysis was performed using GraphPad Prism 7 (GraphPad Software). Cluster analysis was performed using ClustVis (71). A P value of less than 0.05 was considered statistically significant. Study approval. All animal experiments were performed in accordance with federal guidelines for animal experimentation and approved by the Kantonales Veterinäramt of the Kanton Basel-Stadt (Basel, Switzerland). For human biopsies, the study protocol was approved by the Ethikkomission Nordwest-und Zentralschweiz (EKNZ) (Basel, Switzerland). All patients provided informed consent to provide adipose tissue samples. MS and MNH designed and directed the research. MS, VA, RP, ICF, DW, ACMG, NC, SM, MC, JAM, MMS, and PJ performed experiments and analyzed data. MS, RP, BW, and CB designed the protocol for the collection of human adipose tissue biopsies. MS and MNH wrote the manuscript. We thank Didier Trono (EPFL, Switzerland), Robert Weinberg (MIT, USA), and Feng Zhang (MIT, USA), Stefan Offermanns (MPI-HLR, Germany), the Imaging Core Facility (Biozentrum), and the FACS Core Facility (Biozentrum) for reagents, a mouse strain, equipment, or technical support. We acknowledge support from the Swiss National Science Foundation (to MS and MNH), the Louis Jeantet Foundation (to MNH), and the Canton of Basel (to MNH). Reference information: J Clin Invest. 2018;128(4):1538–1550.https://doi.org/10.1172/JCI96139. Rocha VZ, Libby P. Obesity, inflammation, and atherosclerosis. Nat Rev Cardiol. 2009;6(6):399–409. Park J, Morley TS, Kim M, Clegg DJ, Scherer PE. Obesity and cancer — mechanisms underlying tumour progression and recurrence. Nat Rev Endocrinol. 2014;10(8):455–465. Tian XY, et al. Thermoneutral housing accelerates metabolic inflammation to potentiate atherosclerosis but not insulin resistance. Cell Metab. 2016;23(1):165–178. Paquot N, Castillo MJ, Lefebvre PJ, Scheen AJ. No increased insulin sensitivity after a single intravenous administration of a recombinant human tumor necrosis factor receptor: Fc fusion protein in obese insulin-resistant patients. J Clin Endocrinol Metab. 2000;85(3):1316–1319. Wascher TC, Lindeman JH, Sourij H, Kooistra T, Pacini G, Roden M. Chronic TNF-alpha neutralization does not improve insulin resistance or endothelial function in “healthy” men with metabolic syndrome. Mol Med. 2011;17(3-4):189–193. Albert V, Hall MN. mTOR signaling in cellular and organismal energetics. Curr Opin Cell Biol. 2015;33:55–66. Loewith R, et al. Two TOR complexes, only one of which is rapamycin sensitive, have distinct roles in cell growth control. Mol Cell. 2002;10(3):457–468. Kumar A, et al. Fat cell-specific ablation of rictor in mice impairs insulin-regulated fat cell and whole-body glucose and lipid metabolism. Diabetes. 2010;59(6):1397–1406. Tang Y, et al. Adipose tissue mTORC2 regulates ChREBP-driven de novo lipogenesis and hepatic glucose metabolism. Nat Commun. 2016;7:11365. Hagiwara A, et al. Hepatic mTORC2 activates glycolysis and lipogenesis through Akt, glucokinase, and SREBP1c. Cell Metab. 2012;15(5):725–738. Kumar A, et al. Muscle-specific deletion of rictor impairs insulin-stimulated glucose transport and enhances Basal glycogen synthase activity. Mol Cell Biol. 2008;28(1):61–70. Lee KY, et al. Lessons on conditional gene targeting in mouse adipose tissue. Diabetes. 2013;62(3):864–874. Makowski L, et al. Lack of macrophage fatty-acid-binding protein aP2 protects mice deficient in apolipoprotein E against atherosclerosis. Nat Med. 2001;7(6):699–705. Sassmann A, Offermanns S, Wettschureck N. Tamoxifen-inducible Cre-mediated recombination in adipocytes. Genesis. 2010;48(10):618–625. Festuccia WT, Pouliot P, Bakan I, Sabatini DM, Laplante M. Myeloid-specific Rictor deletion induces M1 macrophage polarization and potentiates in vivo pro-inflammatory response to lipopolysaccharide. PLoS One. 2014;9(4):e95432. Park SY, et al. Unraveling the temporal pattern of diet-induced insulin resistance in individual organs and cardiac dysfunction in C57BL/6 mice. Diabetes. 2005;54(12):3530–3540. Kawano Y, et al. Colonic Pro-inflammatory macrophages cause insulin resistance in an intestinal Ccl2/Ccr2-dependent manner. Cell Metab. 2016;24(2):295–310. Takahashi K, et al. JNK- and IκB-dependent pathways regulate MCP-1 but not adiponectin release from artificially hypertrophied 3T3-L1 adipocytes preloaded with palmitate in vitro. Am J Physiol Endocrinol Metab. 2008;294(5):E898–909. Christiansen T, Richelsen B, Bruun JM. Monocyte chemoattractant protein-1 is produced in isolated adipocytes, associated with adiposity and reduced after weight loss in morbid obese subjects. Int J Obes (Lond). 2005;29(1):146–150. Morley TS, Xia JY, Scherer PE. Selective enhancement of insulin sensitivity in the mature adipocyte is sufficient for systemic metabolic improvements. Nat Commun. 2015;6:7906. McCurdy CE, et al. Attenuated Pik3r1 expression prevents insulin resistance and adipose tissue macrophage accumulation in diet-induced obese mice. Diabetes. 2012;61(10):2495–2505. Shearin AL, Monks BR, Seale P, Birnbaum MJ. Lack of AKT in adipocytes causes severe lipodystrophy. Mol Metab. 2016;5(7):472–479. Huang SC, et al. Metabolic reprogramming mediated by the mTORC2-IRF4 signaling axis is essential for macrophage alternative activation. Immunity. 2016;45(4):817–830. O’Neill LA, Pearce EJ. Immunometabolism governs dendritic cell and macrophage function. J Exp Med. 2016;213(1):15–23. Tan SX, et al. Selective insulin resistance in adipocytes. J Biol Chem. 2015;290(18):11337–11348. Takahashi N, et al. Suppression of lipin-1 expression increases monocyte chemoattractant protein-1 expression in 3T3-L1 adipocytes. Biochem Biophys Res Commun. 2011;415(1):200–205. Sabio G, et al. A stress signaling pathway in adipose tissue regulates hepatic insulin resistance. Science. 2008;322(5907):1539–1543. Albert V, et al. mTORC2 sustains thermogenesis via Akt-induced glucose uptake and glycolysis in brown adipose tissue. EMBO Mol Med. 2016;8(3):232–246. Stewart SA, et al. Lentivirus-delivered stable gene silencing by RNAi in primary cells. RNA. 2003;9(4):493–501. Cho KW, Morris DL, Lumeng CN. Flow cytometry analyses of adipose tissue macrophages. Methods Enzymol. 2014;537:297–314. Wisniewski JR, Zougman A, Nagaraj N, Mann M. Universal sample preparation method for proteome analysis. Nat Methods. 2009;6(5):359–362. The UniProt Consortium. UniProt: the universal protein knowledgebase. Nucleic Acids Res. 2017;45(D1):D158–D169. Tyanova S, et al. The Perseus computational platform for comprehensive analysis of (prote)omics data. Nat Methods. 2016;13(9):731–740. Gene Ontology C. Gene Ontology Consortium: going forward. Nucleic Acids Res. 2015;43(database issue):D1049–D1056.
2019-04-20T16:50:52Z
https://www.jci.org/articles/view/96139
Portal Jurnal Universitas Islam Indonesia adalah sistem manajemen jurnal elektronik yang dipublikasikan oleh Universitas Islam Indonesia. Universitas Islam Indonesia sebagai penerbit jurnal online telah menjadi anggota DOAJ (Directory of Open Access Journals) dan sudah terindeks di BASE (Bielefeld Academic Search Engine). The Economic Journal of Emerging Markets (EJEM) is a peer-reviewed journal which provides a forum for scientific works pertaining to emerging market economies. Published every April and October, this journal welcomes original research papers on all aspects of economic development issues. The journal is fully open access for scholarly readers. The journal was first published in 1993 as Jurnal Ekonomi (ISSN 0854-5723), which then changed to Jurnal Ekonomi Pembangunan (JEP) in 1996 (ISSN 1410-2641), and since 2009 has become Economic Journal of Emerging Markets (EJEM, ISSN 2502-180X). The journal is published by the Center for Economic Studies, Universitas Islam Indonesia, Yogyakarta, Indonesia in collaboration with The Indonesia Regional Science Association (IRSA). Jurnal Akuntansi dan Auditing Indonesia (JAAI) is published by Accounting Department, Faculty of Economics, Islamic University of Indonesia and Supported by IAI-KAPd (Ikatan Akuntan Indonesia - Kompartemen Akuntan Pendidik). Published twice a year on June and December, JAAI is a media of communication and reply forum for scientific works especially concerning the field of the accounting and auditing studies of developing countries. Papers presented in JAAI are solely authors responsibility. The editorial board may edit without changing the substance of the papers. Jurnal Siasat Bisnis (JSB) is a peer review journal published twice a year (January and July) by Pusat Pengembangan Manajemen (PPM)-FE UII. JSB addresses the broad area of management science and its applications in industry and business. It is particularly receptive to research relevant to the practice of management within the emerging regions and its effects beyond. It covers studies on how management work is done (descriptive) and/or should be done (normative) in diverse organisational forms, either in profit or non-profit firms, private or public sector institutions, or formal or informal social networks. We welcome qualitative studies with high-quality, rigorous methods, and strong impact on the field. Ius Quia Iustum Law Journal is a peer-reviewed legal journal that provides a forum for scientific papers on legal studies. This journal publishes original research papers relating to several aspects of legal research. The Legal Journal of Ius Quia Iustum beginning in 2018 will be published three times a year in January, May, and September. This journal really opens door access for readers and academics to keep in touch with the latest research findings in the field of law. Jurnal Hukum Ius Quia Iustum adalah jurnal hukum peer-review yang menyediakan forum untuk karya ilmiah tentang studi hukum. Jurnal ini menerbitkan makalah penelitian asli yang berkaitan dengan beberapa aspek dari penelitian hukum. Jurnal Hukum Ius Quia Iustum mulai tahun 2018 akan terbit tiga kali setahun pada bulan Januari, Mei, dan September. Jurnal ini benar-benar membuka akses pintu bagi para pembaca dan akademisi untuk tetap berhubungan dengan temuan penelitian terbaru di bidang hukum. Penghargaan sebagai Jurnal Hukum terbaik nasional dua kali diraih oleh Jurnal Hukum Ius Quia Iustum Fakultas Hukum Uniersitas Islam Indonesia (UII) yaitu pada tahun 2016 dan 2017, Penghargaan diberikan langsung oleh Ketua MK Prof. Dr. Arief Hidayat S.H., M.S. kepada Ketua Pengarah Jurnal Hukum Universitas Islam Indonesia (UII) Ius Quia Iustum yaitu Dr. Ni'matul Huda, S.H.,M.Hum. dalam acara Rapat Koordinasi Mahkamah Konstitusi. Mulai edisi Januari 2018 penulis di kenakan biaya Rp 1.500.000 per naskah. Pemberitahuan biaya kontribusi penulis akan disampaikan segera setelah naskah dinyatakan diterima untuk diterbitkan/accepted. Jurnal Kedokteran dan Kesehatan Indonesia is a peer-reviewed journal in the field of medical and health sciences. This journal is designed as a place of dissemination of information and scientific knowledge, which publishes three times a year. It publishes original article, article review, and case report. These comprise of biomedical sciences, clinical medicine, public health sciences, and medical science education. This journal has been established since 2009 as Jurnal Kedokteran dan Kesehatan Indonesia (Print ISSN 2085-4145, Online ISSN 2527-2950) managed by the Faculty of Medicine, Universitas Islam Indonesia. Jurnal Sains & Teknologi Lingkungan (JSTL) published twice a year in January and June is a scientific journal that publishes scientific research papers and ideas in the field of science and technology related to environmental issues. The journal covers typical subjects of environmental sciences and technologies such as.: Drinking water treatment, wastewater treatment, solid waste treatment, solid waste management, cleaner production, air pollution management, resource recovery, water pollution, soil contamination, and other relevant fields. JSTL published by the Islamic University of Indonesia (UII) only accepts original scientific works that have not been published by other medias. All incoming articles will be reviewed in advance by competent reviewers before being eligible for publication. Journal Komunikasi is a peer-review journal published by Department of Communication Universitas Islam Indonesia, Yogyakarta. We welcome all contributions on the following topics media, journalism, strategic communication and all field related to communication studies. The article that uses critical theories/perspectives and encourages the spirit of empowerment would be more preferred. The journal is accreditted with Rank 4 based on Keputusan Direktur Jenderal Penguatan Riset dan Pengembangan Kementerian Riset, Teknologi, Dan Pendidikan Tinggi, Republik Indonesia, Nomor 21/E/KPT/2018, Tentang Peringkat Akreditasi Jurnal Ilmiah Periode I Tahun 2018. The accreditation is acknowledged in July 9, 2018 and valid until July 8, 2023. Journal of Innovation and Entrepreneurship (JIK) - ISSN: 2089-3086 published three times a year (January, May, and September) by the Directorate of Research and Community Service, the Islamic University of Indonesia, Yogyakarta. Editors invite academics (professors or researchers) and related practitioners (industry, government, NGOs and others) in order to submit an article to the Journal of Innovation and Entrepreneurship. Jurnal Abdimas Madani dan Lestari (JAMALI) berisi hasil-hasil kegiatan pengabdian dan pemberdayaan masyarakat berupa penerapan berbagai bidang ilmu diantaranya pendidikan, teknik, pertanian, sosial humaniora, komputer. JAMALI terbit 2 kali setahun setiap bulan Maret dan September. Journal of Contemporary Accounting (JCA) is a peer-reviewed journal published three times a year (January-April, May-August, and September-December) by Master in Accounting Program, Faculty of Economics, Universitas Islam Indonesia. JCA is intended to be the journal for publishing articles reporting the results of research on accounting. JCA is a media of communication and reply forum for scientific works especially concerning the field of the contemporary accounting studies of developing countries. The JCA invites manuscripts in the various topics include, but not limited to, functional areas of Financial Accounting, Management Accounting, Public Sector Accounting, Islamic Accounting, Sustainability Reporting, Corporate Governance, Auditing, Fraud Accounting, Corporate Finance, Accounting Education, Ethics and Professionalism, Information System, Financial Management, and Taxation. Papers presented in JCA are solely authors responsibility. Asian Journal of Media and Communication (AJMC) is an international, peer reviewed, and interdisciplinary journal devoted to the study of media and communication with Asian focuses and perspectives. The journal housed editorially at Communication Department, Universitas Islam Indonesia (UII) Indonesia. We aim to promote and disseminate high quality scholarships on media and communication studies, both empirical and theoretical, in and on the Asia-Pacific region and among Asian communities around the world. Areas of special concern include strategic communication; tourism, media and communication; media and communication ethic and regulation; creative and visual culture; journalism; new media; disaster, media and communication; and media geography. Jurnal Ilmiah Farmasi (JIF) merupakan jurnal yang dikelola oleh Prodi Farmasi Universitas Islam Indonesia, dan diterbitkan dua kali dalam setahun. Jurnal ini dirancang sebagai sarana publikasi penelitian yang mencakup secara rinci sejumlah topik dalam bidang farmasi yang berkaitan dengan farmasi sains dan teknologi serta klinik dan komunitas. Jurnal Ilmiah Farmasi menyediakan sebuah forum sebagai sarana pertukaran gagasan dan dan informasi antar peneliti, akademisi dan praktisi sehingga diharapkan mampu mendukung dan menginisiasi berbagai penelitian terkini yang terkait dengan ilmu kefarmasian. Hasil penelitian yang disajikan dalam jurnal ini diharapkan dapat memberikan kontribusi bagi perkembangan ilmu di bidang farmasi dan kesehatan. Indonesian Journal of Chemistry Research (IJCR) merupakan jurnal ilmiah nasional yang sudah terindex oleh Portal Garuda. IJCR menerbitkan artikel-artikel ilmiah yang bersifat riset orisinal, review singkat (mini-review), review lengkap (full-review) di bidang Kimia Organik, Kimia Anorganik, Kimia Analitik, Kimia Fisik, Biokimia, Kimia Material, dan Kimia Lingkungan. IJCA (Indonesian Journal of Chemical Analysis) is a chemistry journal published by Chemical Analysis Department, Faculty of Mathematics and Natural Sciences, Universitas Islam Indonesia. IJCA is Indonesian Journals that the articles are written in the Indonesian language and also publishes original research articles or review articles on aspect all of the chemistry fields especially in analytical methods, procedures, and principles. IJCA has the vision to become a reputable journal and can publish good quality papers. We aim to provide lecturer, researchers both academic and industries, and students worldwide with unlimited access to publishing in our journal. The journal will be published electronically 2 times a year in March and September and Open Access Journal. The open calls for papers will be announced on this website. International Journal of Chemistry Education Research (IJCER) is a peer-reviewed journal which covers all aspect of education, including chemistry education, physic education, biology education and science education. The journal publishes original research papers, short communications, dissemination, and discussion of research, experience and perspective across a wide range of education, teaching, development, instruction, educational projects and innovations, learning methodologies and new technologies in education and learning. The IJCER journal is published every February and August in a year (semi-annual). IJCER journal is fully open access for scholarly readers. International Journal of Chemistry Education Research is published by Department of Chemistry Education, Faculty of Mathematics and Natural Sciences, Islamic University of Indonesia. IJCER does not allow double submission (the manuscript is submitted to other peer-reviewed journals before the final decision has been made). Millah (abstracted from Holy Qur'an Chapter Al-Hajj Verse 78) is published by Postgraduate Program of Faculty of Islamic Studies, Islamic University of Indonesia as medium for communication and dissemination of academic research in religious studies. The journal is published biannually and was published for the first time in August 2001. The journal has been accredited based on SK DIRJEN DIKTI KEMENDIKNAS RI NO 64a/DIKTI/Kep/2010. Journal of Islamic Economics Lariba provides platform for academicians, researchers, lecturers, students and others having concern about Islamic economics, finance, and development. The journal is proudly presented by Department of Islamic Economics, Faculty of Islamic Studies, Islamic University. The Indonesian Journal of Interdisciplinary Islamic Studies, published twice a year by the Doctoral Program in Islamic Law, Islamic University of Indonesia, serves as a platform for intellectual exchanges and interdisciplinary studies on various aspects of Islam including, but not limited to, theology, law, education, economy and politics and how they are historically and contingently embedded, expressed and articulated in a variety of historical contexts. The journal welcomes contributions from scholars and researchers of various disciplinary backgrounds in the form of original (theoretical or empirical) research articles on various issues related to Islam in both its normative and historical dimensions. Psikologika - Journal of Discourse and Research on Psychology, publishes research and innovative ideas on psychology. Psikologika is published by Department of Psychology, Islamic University of Indonesia. Psikologikan coverage the fields on clinical psychology, educational psychology, developmental psychology, industrial and organizational psychology, social psychology, islamic psychology, and psychological testing. Psychology is published 2 times a year in January and July. JIP published each June and December By Master of Psychology Degree, Faculty of Psychology and Socio Cultural Sciences, Universitas Islam Indonesia. Refleksi Pembelajaran Inovatif (RPI) adalah jurnal yang ditebitkan oleh Direktorat Pengembangan Akademik (DPA), Universitas Islam Indonesia Yogyakarta, yang terbit dua kali dalam setahun. RPI menerima dan mempublikasikan artikel ilmiah, baik berbahasa Indonesia maupun berbahasa Inggris, yang berhubungan dengan konsep, proses, teknologi, dan segala hal yang berkaitan dengan praktek Dan inovasi pembelajaran di Perguruan Tinggi. Artikel dapat berupa artikel konseptual, studi kasus, maupun hasil penelitian empiris dari keseluruhan interaksi yang tercipta dalam lingkungan Pembelajaran di Perguruan Tinggi. Jurnal Teknisia terbit pertama kali pada bulan April 1996. Pada awal berdirinya, Jurnal Teknisia merupakan jurnal ilmiah berkala yang diterbitkan tiga kali setahun oleh Fakultas Teknik Sipil dan Perencanaan, Universitas Islam Indonesia, Daerah Istimewa Yogyakarta yang berisi artikel-artikel bidang teknik sipil, teknik lingkungan, dan arsitektur. Mulai bulan Mei 2015, Jurnal Teknisia difokuskan pada artikel-artikel bidang teknik sipil yang berasal dari hasil-hasil penelitian, telaah ilmiah, dan kajian pustaka yang ditambah dengan pemikiran penerapan pada kasus-kasus tertentu. Jurnal Teknisia pernah terakreditasi sebagai jurnal ilmiah nasional pada 20 Maret 2000 berdasarkan Keputusan Direktorat Jenderal Pendidikan Tinggi Departemen Pendidikan Nasional Republik Indonesia Nomor 69/DIKTI/Kep/2000 dan direakreditasi pada tanggal 9 bulan Desember 2003 oleh Direktorat Jenderal Pendidikan Tinggi Departemen Pendidikan Nasional Republik Indonesia berdasarkan surat keputusan Nomor 49/Dikti/Kep/2003. Journal of Architectural Research and Design Studies (JARS) is a discursive venue for research groups, lectures and tutors and students emphasizing architectural education in Indonesian context. It connects education realm with building industries and architectural practices. This journal is internationally peer reviewed / refereed. Jurnal KHAZANAH diterbitkan oleh Direktorat Kemahasiswaan bekerjasama dengan Labma (Laboratorium Mahasiswa) Universitas Islam Indonesia. Jurnal ini merupakan media bagi mahasiswa Universitas Islam Indonesia yang menaruh minat terhadap penelitian dan penulisan ilmiah untuk menuangkan ide-ide yang bersifat kreatif, inovatif, dan solutif. Penulis bertanggung jawab secara langsung terhadap tulisan yang dimuat. Redaksi hanya melakukan editing tanpa merubah esensi tulisan. Jurnal Aplikasi Bisnis (JABIS) is a journal periodical written both in Indonesian and English language. JABIS published by Diploma III Economy of Universitas Islam Indonesia twice a year on July and December. JABIS is a media of communication and reply forum for scientific works especially concerning the field of application from accounting, management, and banking. The process of manuscript submission is open through the year. All submitted manuscript will be screened with peer review and editorial review before they are accepted to publish. JABIS is open to the public, which means open to all readers and academics who want to search for business applied research. Jurnal Ekonomi dan Keuangan Islam (JEKI) is published by Pusat Pengkajian dan Pengembangan Ekonomi Islam - P3EI (Center for Islamic Economics Studies and Development) Faculty of Economics and supported by IAEI (Ikatan Ahli Ekonomi Islam), and ISEFID (Islamic Economic Forum for Indonesian Development). JEKI was first published as AMWALUNA in 2009 (ISSN 2085-3270). Since 2011 the journal has become Jurnal Ekonomi dan Keuangan Islam (JEKI, ISSN 2088-9968). The journal is published twice a year in January and July, intended as a medium of information, communication, and dissemination of research results and scientific studies in the field of Islamic economics and Islamic finance. Articles published are the responsibility of the author, however Editors can edit without changing the substance of the article. Buletin Perpustakaan merupakan sarana komunikasi informasi bagi pustakawan Universitas Islam Indonesia (UII) dan pustakawan dari luar UII. Media ini berfungsi untuk menampung, mendorong, melatih, mengembangkan pengetahuan, dan meningkatkan keterampilan menulis bagi para pustakawan. Selain itu Buletin Perpustakaan ini juga berfungsi untuk mengembangkan perpustakaan yang bernuansa Islami dan berwawasan nasional. Media informasi untuk menampung aspirasi pustakawan dalam berkarya tulis dalam bidang pusdokinfo yang bernuansa Indonesia dan Islami. Diterbitkan oleh Direktorat Perpustakaan Universitas Islam Indonesia. La_Riba merupakan jurnal online yang diterbitkan oleh Program Studi Ekonomi Islam, Fakultas Ilmu Agama Islam, Universitas Islam Indonesia, Yogyakarta. Jurnal ini terbit mulai 2007 hingga 2013. Pada tahun 2014 Program Studi Ekonomi Islam menyadari pentingnya penguatan jurnal di tingkat internasional sehingga muncul keinginan untuk menerbitkan jurnal dengan orientasi dalam dan luar negeri. Keinginan ini juga searah dengan kebijakan pemerintah yang mengarahkan pengelolaan jurnal dengan basis online. Oleh karena itu, mulai 2015, La_Riba bertransformasi menjadi Journal of Islamic Economics Lariba. Jurnal ini selanjutnya menjadi keberlanjutan La_Riba. el-Tarbawi adalah Jurnal yang memfokuskan diri pada eksplorasi dan kajian akademik, baik yang bersifat teoritis mapun empiris, mengenai berbagai isu dan aspek pendidikan Islam. Jurnal ini diterbitkan dua kali dalam setahun oleh Program Studi Pendidikan Agama Islam. el-Tarbawi terdaftar dengan nomor cetak ISSN 1979-9985. Unisia dimaksudkan sebagai media informasi dan forum pembahasan masalah-masalah ilmu social. Berisi tulisan ilmiah, ringkasan hasil penelitian, resensi buku atau gagasan orisinil yang kritis dan segar.
2019-04-25T21:56:10Z
https://journal.uii.ac.id/index/index
Raw and Natural Health - Information about the raw food diet and natural living. May is Mental Health Awareness Month, although some would argue that mental health needs to be in the spotlight every month. Among all diseases and disorders that affect the human body, those that affect how a person thinks and feels still face a huge stigma that other diseases don’t. You can’t have a healthy body if you don’t have a healthy mind. A very common issue today is anxiety, and today we are going to discuss some easy ways to manage anxiety and stop panic attacks. This tip may sound strange, and no, you don’t have to be great at math to try it! Even solving simple math problems with paper and pencil (or in your head) when an anxiety attack strikes is helpful. Why? Solving math problems is a task that takes your full concentration. As you are concentrating on your problems, you cannot think about those “what if?” or other anxious thoughts, because your brain is so fully engaged on the activity. While you can always borrow your child’s coloring book to try this task, there are many adult coloring books that are a bit more challenging and tailored to the interests of adults. Whichever type of book you choose to color, this is not only another way to distract your brain from those anxious thoughts, but coloring has also been shown to help calm your mind and encourage your brain to release feel-good chemicals naturally. What is the worst that could happen during the event? It sounds short and simple (and is), but it helps you think more rationally in the moment of panic or anxiety, which can lead to irrational thinking. Click on the above link to go to the Alice Boyes’ website to read examples of this technique and learn more about how it works. Try one or more of these natural techniques for managing anxiety and stopping panic attacks. If one doesn’t seem to work for you, try another. Being a natural beauty doesn’t mean that you have to ignore how your skin looks. It is the largest organ on your body, so you should’t feel “vain” for taking good care of it! You don’t need Botox to fight wrinkles when you use these all-natural wrinkle-fighting tips that are better than injecting anything in your face. Why are they better? Botox is a quick fix that wears off and doesn’t improve your health in any way. These wrinkle-fighting techniques ward off wrinkles naturally by preventing skin DNA damage. This prevents wrinkles, preserves the overall health of your skin, and can even help stave off skin cancer. Antioxidants fight those free radicals that contribute to cancer and the signs of aging. By eating plenty of antioxidants, you can keep your entire body healthy, including your skin. However, you can also take advantage of their power against wrinkles and skin DNA damage by applying them topically. Some of the best antioxidants for your skin include Vitamin C, Vitamin E, and Vitamin A. Natural rosehip oil is a great source of vitamin A that you can use instead of those synthetic retinols. You can find many organic vitamin C facial serums online, but some work better than others. Vitamin C also encourages your skin to produce more natural collagen, which helps keep your skin younger looking. Ascorbic Acid. This is the most studied form of vitamin C that has been proven to prevent skin damage and wrinkles well. Dark bottle. Vitamin C is sensitive and easily degrades in a clear bottle when exposed to sunlight. Clear to pale yellow color. Once vitamin C degrades, it becomes dark orange. This means the ascorbic acid is no longer “active” and won’t protect your skin. Store your serum in the refrigerator to help keep it active longer. Low-pH. The pH of your serum should be between 3 and 4. A little sun every day is very healthy for your body. However, when you spend long hours in the hot sun, you should wear a natural sunscreen to prevent DNA damage and wrinkles. The best choice for your health is one that contains non-nano zinc oxide and optional non-nano titanium dioxide. The base can be made of any organic ingredients that work well with your skin, but be sure to avoid mineral oil and petroleum bases. Also, click here to read about foods you can eat to protect your skin from the sun from the inside out. This natural wrinkle prevention tip is optional, because if you are someone who feels unwell when you go for hours without eating, then it is better to skip this one. However, if you can go for a full 16 hours between dinner and breakfast/lunch, it gives your body a short break from continually digesting food. During this break from the distraction of digesting food, your body can work on repairing DNA damage, including any that developed in your skin during the course of the day. Sleep is so important for your health and the regeneration of your body in many ways. It also fights skin aging by giving your body time to repair skin DNA damage. You likely notice a difference in your skin after just one night of too little sleep, so imagine how much that can add up over a lifetime of sleep deprivation! Pineapple is a delicious, nutritious fruit, and it is also typically low in pesticides, even when grown traditionally. This member of the “Clean Fifteen” list is packed with vitamin C, a good source of fiber, and contains a potent natural chemical called bromelain. Read on to learn about the health benefits of pineapple and diseases/health disorders it can help manage. Along with containing well over 100 percent of your daily vitamin C requirement, just one cup of diced pineapple also contains potassium, thiamin, folate, beta carotene, and fiber. While sweet and filling, one cup of diced pineapple contains about 80 calories, which makes it a perfect choice for a healthy snack or a sweet dessert. Even with its great nutrient profile, pineapple has a lot more to offer your body with its antioxidants and potent natural bromelain content. In fact, no other food in the world contains bromelain. It’s what makes pineapple’s health benefits so unique! If you have Crohn’s Disease, ulcerative colitis, or just feel like your digestive system is sluggish at times, then starting or following a meal with a little pineapple can help your body break down your food and unleash its nutrients more effectively. The bromelain in pineapple is actually a group of enzymes called proteolytic enzymes. This type of enzyme down protein and releases the amino acids in it. This is why bromelain is often an ingredient in meat tenderizers. These substances can help break down any food in the stomach and intestines, giving your natural digestion process a little boost that it needs. Along with helping food to digest properly, the bromelain and vitamin C both benefit IBD in other ways. Bromelain is also a potent anti-inflammatory agent, and vitamin C has been shown in animal studies to also help reduce colon inflammation. With allergy season here, pineapple can be another great addition to your natural allergy prevention “medicine cabinet.” If your allergies trigger your asthma, then pineapple is even more beneficial for you. The bromelain in pineapple has been shown to help keep the immune system working properly, which can help keep your body from over-reacting to allergy triggers that are harmless, such as pollen. Animal studies have also shown it to be a potential great treatment for allergy-induced asthma, because it helps prevent lung and airway inflammation due to allergen exposure. Pineapple can also help manage two types of arthritis: osteoarthritis and rheumatoid arthritis. Both types benefit from bromelain’s potent anti-inflammatory effect. This can lead to natural pain reduction. The ability of bromelain to help keep the immune system in balance may offer an additional benefit to sufferers of rheumatoid arthritis, which is an autoimmune disease. This is not an all-inclusive list of pineapple health benefits and diseases and health problems it can help manage, because there are so many! If you have any type of body inflammation or just want to stay in great heath as long as you can, then pineapple is a great addition to your daily diet! The recent scientific study the focused on of the weight gained back by Biggest Loser contestants has become very popular and may have even discouraged you from attempting to lose weight due to a belief you will just gain it back. Read on to learn more about the Biggest Loser study, why it should not deter you from losing that excess weight and what you can really learn from the study. Several contestants who appeared on the Biggest Loser television show were re-visited by researchers six years after the show ended. Not surprisingly, many gained the weight they lost back, and some even weighed more than when they started the show. However, the big “surprise” the research revealed was that the contestants basal metabolic rates, or BMRs, were tested to be slower than when they started the show. A lower BMR means that before any daily activity is factored in, their bodies burned fewer calories when at rest than they did before they began the show. This has been leading people to believe that weight loss will damage their metabolisms, so it is better to stay at an unhealthy weight instead. To realize why the study does not apply to you, you have to first look at how unique their weight loss was. They were forced to exercise for hours on end daily until they were in pain. They were put on very low calorie diets that were unlikely to fulfill all of their nutritional needs. Considering they knew that they would be awarded a large sum of money if they were declared the “Biggest Loser,” it really is anyone’s guess what else went on behind the scenes. Could they have used diuretics or went to other extreme efforts to rid their body of all water weight before they weighed in each week? When so much pressure was put onto the participants to lose so much weight every week for the sake of not only themselves and their teams, it wouldn’t be unreasonable to think they did whatever they had to do to avoid letting their teams down. The show has always encouraged rapid weight loss at all costs, and that has never been a healthy way to lose weight and keep it off. Many contestants openly stated that they returned to their pre-show diets when they arrived home, because they didn’t really learn how to eat properly over the course of the show. Slow, steady weight loss has always been healthiest, and the study just reinforces the truth that rapid weight loss due to extreme exercise and dieting can so easily lead to regaining weight in the end. When losing weight, eat healthy and aim to lose a pound or two a week. When you lose weight slowly, you will naturally learn new healthy eating habits that will help you keep the weight off once you lose it. Crash diets that cannot be stuck to long term don’t teach you the lessons you learn while losing weight slowly and don’t help you build will-power over that tempting unhealthy food. If you the Biggest Loser study has led you to think that getting to a healthy weight is pointless, because you think you will be destined to gain it all back anyway, then realize that does not have to be true. Lose weight slowly while consuming all the nutrients your body needs, and healthy weight loss that does not damage your metabolism is possible. If you love having a golden tan in the summer, then you may opt to use sunless tanning lotions or visit salons for spray tans. You may not think twice about this habit, because sunless tans are widely believed to be healthier alternatives to natural sun tans. However, read on learn about why the most common active ingredients in sunless tanners are harmful to your skin, including one that is even in organic brands. The main ingredient in most sunless tanners is DHA, which stands for dihydroxyacetone. Of course, sunless tanners don’t just stain your skin, but most rely on this ingredient to perform a chemical reaction with your skin cells to produce that golden or brown color. You may have heard of the term Maillard Reaction in relation to cooking, and this is the chemical process that turns vegetables brown when you sautee them in oil (and plays a role in why many foods turn brown when cooking them). While this chemical reaction may give food a nice flavor, it is known to produce carcinogens, so many health-conscious people avoid browning their food in this way (or eat raw diets altogether). If you have ever wondered how DHA turns your skin brown, it may surprise you that it relies on the same Maillard Reaction that turns food brown while cooking it. DHA has been shown in studies to cause skin cells to die and generate free radicals, which are substances that cause cancer and speed up the aging process in your skin. So, that same product you use to make your skin look more appealing to you now may be damaging it in the long run. There are DHA-free sunless tanners on the market, and most contain a substance called erythrulose, which can be derived from sugar cane or raspberries (although it can also be made in a lab), so it sounds much safer. However, it reacts with your skin in the same way as DHA and also produces free radicals. There are even organic skin care brands producing products with “naturally derived DHA” and erythrulose, but realize that, in the end, the additional organic ingredients in the products may be safer, but the active ingredients, if they are DHA or erythrulose, are not. If you use sunless tanning products that contain either of these ingredients, then realize they are harming your skin, even if they are DHA-free. If you still choose to use the products, just keep this in mind and try to use them as little as possible. If you have eaten packaged fruits or vegetables in the past few months, then you may be concerned about the recent recall of products manufactured and/or packaged by CRF Frozen Foods. Learn all about the recall here, listeria facts, and listeria symptoms. The products the company named CRF Frozen Foods create are not sold under that name, but they are instead the base manufacturing facility for 42 separate private brands. You can find the full list of brand and specific products recalled here. These products are sold in the entire US and in many Canadian Provinces. Most products were voluntarily recalled, but some were recalled due to actual listeria found by health inspectors. While the new recall includes many products that were not tested for the bacteria, some products were found to have listeria bacteria on specific batches tested at their Ohio facility. These products include: Individually Quick Frozen Organic Petite Green Peas and IQF Organic White Sweet Cut Corn. However, this does not mean you definitely consumed or will come down with a listeria infection if you ate these products, but it means that may be a higher potential that you did consume listeria if you ate these specific foods. The good news is that not every person who eats a product contaminated with listeria monocytogenes (which is the only one of six listeria strains that can cause illness) will develop an infection, just like not everyone exposed to the cold virus will develop a cold (although listeria is bacteria and not a virus). Other good news is that the bacteria cannot be passed from person to person, and it is believed that a lot of the bacteria must be consumed before it will cause illness. However, keep an extra close eye on how you feel, and if you notice the following symptoms, visit your doctor. You can read a good overview of listeria symptoms here, and take note that some people develop them soon after exposure to the bacteria, but others experience “late-onset” symptoms, which can occur up to 70 days after consuming the contaminated food. Yes, that means you stay very aware of your body for over two months before you can feel “in the clear” about your health. Listeria can hit pregnant women the hardest, along with anyone with a compromised immune system (due to illness or immune-suppressing medications), and of course, babies. So, if you fall into any of those groups, keep a close eye on how you feel from day-to-day and visit your doctor as soon as you notice any signs of illness. Since stool samples often don’t detect the bacteria, request a blood test, which is more accurate. If you feel secure that you don’t have a listeria infection or have visited a doctor and they don’t suspect cause for concern, then it is still good to take steps to amp up your immune system and help your body fight any unwanted bacteria that you may have encountered or worry you will encounter in the future. Eat probiotic-rich foods to help your good gut bacteria overwhelm any bad bacteria. Eat lots of fresh garlic for its potent natural antibiotic effects. Increase your intake of foods packed with vitamin C. Eat these other ten foods with natural antibiotic properties. Important note: Remember this list is not a substitute for antibiotics if you have been diagnosed listeria and not a substitute for a doctor’s exam if you suspect you have the illness. Now you know all about the CRF Frozen Foods recall, listeria symptoms, and listeria facts. If this is the first you have heard of this, then don’t panic. Just keep an eye on how you feel day to day and visit your doctor if you notice symptoms of an infection. If you strive to keep your diet low in pesticide residue, then you have likely heard of the “Dirty Dozen.” While strawberries are always on it, they have made a move on the list this year to the number-one most pesticide ridden fruit or vegetable. About 40-percent of the strawberry crop tested this year had over 10 pesticides on them. If you are an avid strawberry eater, read on to learn how to eat strawberries safely this year. Of course, the number-one way to avoid chemical pesticides on fruit and vegetables is to choose organic. Check out local sales ads (you can find many online) and check out local farmers markets to see if you can buy organic strawberries without breaking your budget. You may think they are more expensive than they are, because many people complain about the small mark-up so much. When you find a good sale, don’t be afraid to stock up and freeze what you can’t eat right away. Strawberries freeze very well. However, if you have a large family and organic is out of your food budget or you don’t have access to organic strawberries, there are steps you can take to prepare conventionally grown strawberries to minimize your pesticide consumption (although you cannot remove the pesticides completely). Pesticides can penetrate all the way through the strawberry, but the surface is still the most highly contaminated part of any produce, so preparing those strawberries correctly can help reduce the amount of chemicals you eat. Don’t just quickly run those berries under the tap, but instead mix up a solution of warm tap water, a bit of salt, and a splash of white vinegar. Then, soak those berries for about 30 minutes. Next, rinse the berries well with tap water while scrubbing them with a small brush. If you don’t mind heating up those berries a bit briefly, then blanching them in boiling water can help remove additional residues. Why soak in warm water and not cold? Because heat helps break down some pesticides. Why salt and vinegar? The salt helps break down some fat-soluble pesticides, and the acid in the vinegar can break down others. Why tap water? Chlorine can act as an additional pesticide remover. However, if you suspect your tap water is unsafe, then you can substitute filtered or distilled water. However, keep in mind that no pesticide-reducing technique is foolproof or will remove all pesticides. It can be very disheartening to hear that your favorite fruit or vegetable is so highly contaminated with pesticides when grown traditionally. However, you can feel safe when you choose organic or feel a bit safer when you prepare your strawberries correctly to help reduce surface pesticide residue. You likely know that diluted white vinegar is a great natural cleaning agent for those windows, counter tops, and other light household tasks. However, anyone can feel tempted to reach for those cleaners that emit toxic fumes when tackling mildew and other tough cleaning jobs around the house. However, you don’t have to use those toxic cleaners when you follow these tips to tackle tough spring cleaning jobs naturally. Mold and mildew are health hazards themselves, but you don’t have add another health hazard, chlorine bleach, to the mix to remove them. First, if it is deeply embedded in the caulk around your tub or tile, then your best option may be to remove the caulk completely and replace it. However, it if it is just on the surface, then try adding 10 ml of tea tree oil to a cup of white vinegar and saturating the mold or mildew with it. Alternatively, mix a solution of half vinegar and half borax and saturate it. Since all of the cleaning solutions work best when kept wet, find an old piece of cotton clothing or towel you don’t mind tearing into strips, saturate the strips of material with your solution and place it directly over the mold and leave overnight. Repeat if necessary, but you can use the same strips over and over. Your baking pans may have seen better days, but you don’t have to toss them or scrub them until your arms hurt (and still making little progress) when you have hydrogen peroxide and baking soda. To melt away that baked-on layer of crud that may have accumulated on the surface and/or bottom of those baking pans, just pour some baking soda into a large glass bowl and slowly add hydrogen peroxide until you have a thick paste. Apply this paste to the build-up on the pan in a thick layer using a kitchen spatula and let sit overnight. In the morning, simply rinse off the residue. No scrubbing required! To clean your oven easily, yet naturally, first remove your oven racks first to make cleaning easier. Then, mix baking soda and plain water — if your oven has not been cleaned in quite a while, then make a thick paste and cover the oven interior well. If it is not quite as dirty or you would rather tackle it in several shorter sessions, then you can instead make a liquid by adding just a few tablespoons of baking soda to a spray bottle filled with water and spray the interior. Allow to sit overnight, then wipe away residue with a damp cloth or sponge, rinsing it often in a bucket of water. Once most of the residue is wiped away, give it a final once-over with diluted white vinegar spray and wipe. Toxic chemical household cleaners can be avoided, even when tackling tough spring cleaning jobs. Try these three methods to tackle those tough jobs naturally with little to no scrubbing required. If you suffer from insomnia, then you know that it gets in the way of leading a productive, happy life. It can also take a huge toll on your health, because getting enough sleep is important for your immune system, mental health, hormone balance, and much more. Before you take sleeping pills (or if you have already taken them and know how disastrous the side effects can be) try these natural ways to manage insomnia to finally get a good night’s sleep. For some people, it is natural to take off any tight, constrictive clothing a few hours before bed, put on comfy sweats or pajamas, and relax comfortably until bed time. However, others stay in their constrictive work attire until just before bed and may even wear tight clothing to bed. What does constrictive clothing have to do with sleep? Several studies have shown that wearing constrictive clothing disrupts your body’s natural hormone balance. They inhibit your body’s melatonin production and increase levels of stress hormones. Melatonin the hormone that is secreted when you are in the dark that “tells” your body to prepare for sleep. While it would be ideal to turn the lights down dimly and read a book for an hour or two before bed, this is not possible for everyone. If you work late nights in a brightly lit office, run around the house performing last-minute chores before bed, or study late at night, it may not be possible for you to avoid all light for hours before bed every evening. While all light that hits your eyes in the evening does inhibit your body’s production of melatonin, which is so important for healthy sleep, blue wave lengths of light inhibit it the most. Orange lenses filter out the blue light, so it doesn’t hit your eyes and inhibit the sleep-signaling hormone. Ideally, put on those orange glasses in the early evening, and you can help your brain prepare for a good night’s sleep, even while doing those last-minute tasks that you can’t do in the dark. It is especially important to wear them while on a computer, because computer screens produce a ton of blue light (even though you don’t see blue!). Add these two natural insomnia management techniques to your insomnia management plan to help you fall asleep earlier and sleep more deeply. Even if you eat very healthy, exercise is an important part of keeping your cardiovascular system healthy. However, getting enough exercise may be more difficult for you than eating healthy due to a sheer lack of time in your busy day. A new study shows that just one minute of high intensity exercise three times each week can be as good for your heart (and the rest of your body) as 150 minutes of mid-intensity exercise every week! Sound too good to be true? Read on for more details and how to perform the one-minute workout. While touted as just a one-minute workout, the truth is that it would be unhealthy to just burst into sudden extreme exercise without warming up before and cooling down after. The one-minute workout that was tested actually involves a total of 10 minutes of time, but only one-minute of that time was spent working out at a high intensity level. In the end, just three of these workouts each week does improve your health as much as four 30-40 minute mid-intensity workouts, so it is still a huge savings of time, even if it does take a full ten minutes to perform the one-minute workout. So, there are technically seven phases, and you may want to jot them down on a piece of paper (or print this page out) to glance at during your first few sessions, you will begin remembering them in no time at all. A stopwatch will also come in handy. Do your workout outside and alternate running and walking while getting a little sunshine. Make some space indoors or in your yard and use a jump rope! Alternate jumping leisurely with jumping as fast as you can. Do some jumping jacks during down times and do some burpees for the full-intensity spurts. Any activity where you can alternate intensities will do, and you can mix and match activities as much as you like as long as you hit the intensities in the guidelines. Now you know about the one-minute workout and how to do it. Yeah, it really takes 10 minutes, but it is still a super-easy and quick way to improve your health!
2019-04-20T05:21:04Z
http://www.rawandnaturalhealth.com/
Venture templates will have the ability to help you manage your work . This endeavor templates really are for the most part. They are of use when you have similar projects having precisely the same task lists and task structure. In order to learn consult with a project policy template. A project plan template could possibly be a help, if you’re unsure of how exactly to approach placing your program with each other. You’re going to take a position to define an ordinary arrangement for the frequency endeavors without the need to start off out from scratch each and every single 28, Once you make templates. All these templates will allow one to develop a superior communication program. Since you can observe the under mentioned Gantt chart template, including a landmark to just about every single task can help to concentrate on the project and reach them. This Gantt graph templates can help you do exactly that. Click Pro-Ject Templates and you’ll be in a position to discover the list of each one of the endeavor templates. Establishing a list of deliverables Developing a set of deliverables is an important part of the project planning approach. Developing a job status report will enable you to keep an watch in your advancement, while also communicating it effectively together with distinctive parties. A project scope announcement outlines the deliverables you want to produce with in ending of a project. You simply need to define facts. Let’s examine a number of the several kinds of milestones for example some real life examples. Milestones in GitLab are a means merge requests intended to reach a aim and to monitor topics. They can serve as Agile sprints. They behave as sign posts helping assure you stay on track. Landmarks in time is critical. Milestones may function as releases. Programmatically, there is a landmark one of predefined types of endeavors. Milestones exist as levels that have to be fulfilled prior to attaining aim or a objective. It’s likely when you are creating the templates to assign people in your company to-dos or landmarks. Milestones enable you to track the evolution of one’s projects from beginning. The milestone will stop by with in ending of the job department . Knowing the importance of a task and how vital it’s to your project are very good techniques to determine milestones. Setting progress coverage procedures A substantial part the project planning procedure will be currently setting advancement coverage rules. So it requires you to identify the job dangers. That which you might have actions associated in the project planning process. You can take advantage of such templates and also deal with similar projects on. In completing a project with a whole lot of 24, Using of the miniscule and tiny project details directly before your eyes helps you. If you don’t desire to economize the changes, then click on Rename. So you may see the trendy Timeline chart changes feel free to alter the info source. Because of this, you can estimate the improvement of the endeavor after applications or the deliverable is completed. During your principal EHR decision negotiations, you’ll have worked out a comparatively structured plan to the undertaking and estimated costs regarding implementation. Though an undertaking could possibly be dwell, it isn’t above. Once you have created the projects, utilize procedure to bring the milestones to your job. Explain how the project is going to be assessed. It is vital that they use exactly the same requirements for milestones whenever there are workstreams or projects within an programme. If you’re enlarging to some amount of projects within the class, then you may desire to split the same milestone amid multiple endeavors within the very exact group. In case you’ll get started focusing in the following business endeavor that is , then you definitely have to definitely take a terrific job direction app . Project planning could possibly be troublesome process, specially in the early stages after the diagnosis and company conditions have been completed. The master plan is well prepared to be committed, and the project manager sometimes requires a well planned snapshot. It’s likely delegate and to develop a stage application. Remember , a well-executed endeavor starts with a great program. A Gantt graph springs into mind, After you believe about pulling your job schedule . Also, with time, the job application will be forecast to alter. Having a project application that provides the flexibility to mitigate unforeseen change is critical to project results. Will likely be dependent on several different factors, including level and your work history of knowledge. The combo format is just a favorite choice among professional resume authors since it truly is in selling their own clients particularly effective. It is critical that you pick the resume format when you’re writing the restart to get flatter prospect. Picking a resume structure is one of many first decisions you are likely to have to make if you should be faced by composing a resume. For instance, you may use the opposite chronological arrangement in case you have solid years of work knowledge and the format in the event you’re shifting livelihood or just in the event you have openings in employment. In the informative article, you’re going to master the suitable means of believing a resume format that is good, no matter your sector. Before you are able to commence producing a resume, if the chronological or functional format is going to perform the job most suitable for 26, you might have to determine. The reader may not even observe the info that they’re searching to get, In case a resume format isn’t correct. There is an extremely straightforward arrangement for your own answer. The material logically arranged and has to be not a trouble. The design of your resume should be created to accentuate the factors on your desktop, along with the data and accomplishments that distinguish you personally. Sleek and easy is very good, As it’s to do with style and style. To start your resume, organize the advice you must comprise. Make sure to format it in accordance with criteria that are typical The moment you have written and organized your advice in line with this form of resume you’ve plumped for. Additional information should be added relevant. Your private information is the first item in your restart. For instance, incorporate a hyphen or also indicator so the knowledge is not absolutely totally all. Make sure that you receive all of the information delivered as quickly as possible to be able that they could qualify for the screening. Sometimes you should make employ of there are a restart that is creative somewhat fewer than once you want to use a restart. It might be if you’ve been out of work for an elongated time. Don’t neglect to be fair with all the current task you’ve achieved. It’s important that you supply the perfect resume that you could muster to your own position. It’s important to discuss the job related expertise in detail. It isn’t required to list every single job you’ve held particularly supposing it is not relevant to the present position or market you’re concentrating on. You’re looking to get a summer job or internship, or a scholarship or college application requires one to add things. There are a number of normal kinds. Utilize industry related phrases or vital phrases in order for the resume will bring about the companies. work search will be aided by Recognizing howto save your resume. Inbetween deadlines and encounters, you have to pick a few resumes which are the very workable applicants. Resumes that are nontraditional are not for everybody. As a consequence, they are able to help qualifications and display a person’s expertise. Having a peek at others wrote their own resumes can supply you with some adequate thoughts. Usually the sole wouldn’t want to browse such a thing, since you’re not composing in bullet form. Despite the explanation for the unemployment, then you may like to consider in regards to a functional type. Therefore it is potential to jump start your own resume writing process it provides an easy form to you. Be sure that your resume structure includes segments that may flaunt your finest qualifications. Career section in resume will probably comprise the facts of one’s accomplishments which you simply just prefer to accomplish working to the specific status in the business. To get Millennials, the absence of expertise is not much of a hassle in case you are proficient at workout. You gained many capabilities that were identifying which you will now take a situation while you may only have encounter at the same endeavor. In the event you experienced skills in any particular area, employer wouldn’t have targeted in your own academic specifics. At the event you ought to think your professional career for a movie, your restart could serve as preview. Your professional restart is more important in several means. In raising the caliber of your resume resume format assists. Aside from everything picture you select, make sure that it fits with this content of your resume also that it is of top quality. In the event the job consists of a good deal of prototyping emphasize prototyping on your resume. By adding the erroneous important things or overly many things to a resume, you will be saved from having. The organization, the company, as well as the project proved not the ideal fit. Most of your work will be lost if your program is rejected by recruiters before scanning it. Subsequently adapt your resume to appeal that you desire. Your expertise inside the restaurant agency industry is very good but perhaps maybe not relevant here, if you’re requesting for a news software development job, for example. Resumes and indications aren’t the identical. Just simply take some time to develop yourself in to the best candidate that is possible devote the opportunity to make sure that your resume is doing the best possible occupation representing your abilities as well as you. Make sure that WHY you would like the way and the ranking that it may benefit you achieve your aims, your restart expresses. Resumes have customarily turn into the most important ticket to surfing the job market. You might have known of useful and chronological resumes. Your resume really is a method. Resumes aren’t a product that is . Your resume has an objective rather than a skilled overview Target statements describe your own requirements, and never just how you meet the essentials of an employer. There’s no Resume. Unique resumes for opportunities are vital. Hiring managers and recruiters skim resumes to decide if they want to interview you and interviewers skim to figure out what matters to talk to you around. It’s their wish to know about your own accomplishments. Publish in language that is simple, transparent, that the hiring manager wont will need to stress to workout what you are stating. Detect an appointment telephone and the resume’s purpose will be always to generate the most candidate stand aside from the competition. It is great that you’ve already been working on some thing, it really is bad if it’s not helped to accomplish any goal. Your intention is to get to the round interview. The purpose of one’s resume will be always to secure you the interview. The portion of the achievement is because of your results. Be sure that you highlight only the achievements and techniques that are related to this job you’re looking for. There aren’t any accomplishments. They demonstrate your skills and practical experience. Be certain to include money Once you have obtained. They really are the core of the restart. Achievements and consequences ought to be emphasized. Remember your resume should highlight the relevant skills, expertise, and accomplishments which are most relevant to your project aims. You are aware of just how to translate your military knowledge, it’s the time to compose your resume. In the event you have a great deal of work experience but don’t have no background that is small or so are at the practice of earning a post secondary point, then you ought to check in starting your resume. If you don’t have enough work experience to fulfill out a webpage that is complete. Picking a professional resume author is well worth the investment decision. You know that your resume has to stand out whether you want to go noticed. One among the least difficult and many helpful ways to truly increase the content of your resume would be to highlight your own accomplishments. In case the resume writer you’re trying to engage will not supply a consultation or take the opportunity to get to know you, ” I recommend that you simply keep looking. A restart should be so be certain the sentences are well-written and clear. The aforementioned examples are a start, but should you end up becoming stuck, never be scared to Google for writing resume accomplishments methods and tips. Setting a goal announcement wont help an market job is received by you. Be sure that your resume reflects the very same kind of upkeep to property you the meeting at the very first location. Capitalization of occupation names is a little more tricky. Based on the situation, you can employ other types of resumes , or even a functional, hybrid. Keep in mind, your resume needs to speak to you personally, so make it impressive as you can without extending the reality. The moment you get yourself a different picture of the work environment, you will be able to target your resume. You can find ways without needing to exaggerate them to flaunt your accomplishments and abilities. So be sure to mention that the most pertinent & best accolades and experiences in the top. Understanding how to tailor your resume will supply you with an benefit. Useful Resumes may be used to get some people that have a Behavior or History level. Producing a resume can be difficult. Match your capabilities to job or the company you’re applying for. If you want the brand newest career, you’re definitely going for to earn a excellent feeling. If you’re attempting to acquire job in fund or bookkeeping you then demand averystrong restart. You might submit an application for a project where they has been browsing for somebody to upgrade the organization website using graphics but will not have the opportunity. Particular types of job in the food service industry require resumes with lots of the same skills that are exact. Transportation tasks involve a lot of dedication and also your resume will desire to reflect you can take care of the. Folks tend to modify jobs often, for elements that are diverse. In the event you are pursuing a job at a call center that is certain, do. In addition, you are able to start looking for call center tasks . You don’t just have to promote your skills, but writing a cover letter to fill out an application for a job for a flight attendant commonly means you want to show you’ve got the character needed to socialize together with crew and passengers. Are you able to come up with several kinds of abilities from such organizations, but you’re demonstrating potential companies that you’re a person ready to devote themselves to your project. It helps to include skills that you have on a resume. A place of Client Service consultant where product and my problem solving skills based knowledge goes to become utilized to obtain new clients and maintain ones that are present. When you’re not able by setting rapport to present your buyer exactly what he wants he will truly experience a level of fulfillment with the experience. You have to try and check with the client in the cheerful, considerate way you may take care of. It’s not valuable to the consumer with the complaints at the event the client care representative doesn’t understand howto give assistance over the telephonenumber. Customer-service is easily among the absolute most important facets of any small enterprise. The customerservice resume ought to be made out to suit the region. Providing excellent customer care may be hard when coping with a customer that is tough face-to-face. It’s an impossible undertaking possess communication skills at the same second and to offer customer service. If you has to keep them for longer than anticipated or ought to discover information, go back on the line and also apologize through the length of the hold and explain that you’ll return online at an instant. Only have a notebook to your own interviews and maintain a laptop close in which you find it possible to jot down important info, like the names of their titles along with those who are interviewing you. After you are logged , it’s definitely going to request that you fill out all of the information you put in if applying to your work. An inordinate amount of advice gets puzzling. Last, you could hurt yourself should you devote an inordinate quantity of data in your protest. They will help your application, utilize buzz-words if you’re able to mention a rationale. Providing whoever offers you exactly the program, if there is an best period to reverse it in and ask. You’ll discover a willpower After your application record. Having some body to break away to procure you a program would not be fine. A specific application proves that you have considered the company carefully and so are a critical applicant. Whether you’ll find a great deal of software, screening applicants across the telephone can boost the selection method. So should you get a scheduled appointment gather as many details concerning the company as you possibly can, you will already be well prepared. It’s consistently advisable prior to enjoying a job interview to prepare yourself beforehand. In the event the work interview is right really for a bit more informal, a food restaurant is fine, like khakis and pull shirt. To get someone who has a work interview, the toughest part is figuring out alist of words that illustrate their personality. It’s going to become, if you were to think about an interview because a twoway street and you are going to be able place to end up, if thatas a thing that is terrible or a wonderful item. Gather necessary info, if you’re scheduled to get a followup appointment. Lots of people think that the job interview is a way to provide you with the boot until you have the ability to show them exactly what youare able to do to disqualify folks. Once you have got an interview you have built your own first impression, and that you really don’t possess another chance to produce a very first impression since they state! You’re most likely to understand how to compose such food service restart yourself. In the event that you want to view overall food service resume illustrations and thoughts, continue reading! You’ll secure a better odds of making a requirement for your role, by saying the way you are ready to be of services. Be certain your factors are related service the task description. When Composing she or he Resume Aims, you ought to be careful about what it is that you’re saying. Your resume aim is a breakdown of what you could furnish the company captured in couple paragraphs. Composing the food service restart aim or outline could be difficult. The food company is growing. Companies favor you do not feature any descriptors that are physiological. It’s going be notable to allow them to be aware which you also did your own homework and also are conversant with the company. Hence, the Food Service sector has unique chances for those who have abilities , abilities and identifying qualifications. Resumes come in various forms and formats. Your resume comprises a goal as a substitute for a overview Target statements clarify your own demands, in place of you are very likely to fulfill an employer’s demands. Do not be afraid to even look for Resume Help on the internet, you can find tons of Resources and Resume Samples to pick from. You might have understood of chronological and functional resumes. Non-traditional resumes would be perfect for women and people in fields that are ingenious, who would want to exhibit their own ability to create visually participating layouts or even to make web-pages. Even when one isn’t required, a well-prepared resume can help you receive work. Thus, besides the petroleum and gas business, an individual can now find ample job in Oman in businesses that are numerous way also. If you really don’t get admitted, track down an alternate job. You and Only dream large ‘ll surely property on an ideal job. Companies in Oman are likewise providing jobs. So, it needs to become evident to appreciate food job that has to go in your presentation. Working in food service might be a priceless experience. The very first person basically says that I want a work cause I’d love to know from you personally. The occupation of the host is one of the entrance points from the restaurant industry . however, it really is essentially the 1. Your occupation listing says a food service worker has to be more ready to greet customers and answer their questions regarding menu items. Ergo, it’s generating loads of construction projects for workers. You need to study the task outline After you employ. An overall Description of Job’s sort is not good enough. The illustrations are guaranteed to direct you. There can be A free resume template akind of sample for a resume which a man or girl may want to build up. You have to study the occupation needs of this food agency standing, to compose an effective food agency resume aim. Examples of one’s resume might be awarded who’ve consented to help you. Your correspondence needs to be clear and short whilst stating exactly the job that you are searching for. You need your resume and cover letter to manually automatically extend the clear answer. Via composing an interesting and successful cover letter, the first step in producing a resume is. You will find numerous forms of cover letters for resumes. While you’re at it, then have a review of samples furnished during the world wide web. Producing your resume could be painful undertaking for anybody, but consider it or maybe not , resume writing is not quite as difficult since it’s manufactured to become. Getting into Oman to get a job has been less effortless. Discovering how exactly to compose a restart case server case doesn’t have to be hard. Then, the professional abilities accompanied it which the expert is extremely good at. If you possess any extra skills applicable to the job, add it into the resume. If you have obtained any training regarding the food service business, mention it. Bear in mind that once you have any foodservice certificates, in the peak of your resume, you ought to set it such as, for instance, a Certificate in Food Handling and security. For example, you might consist of original aid trained in case the job is at a camp.
2019-04-26T05:50:45Z
https://www.murrayfieldbar.com/bewerbungsschreiben-erzieherin-kindergarten/
ssional inspectors are likely to be hired with the buyer in addition to inspect the house that seemed to be purchased having an agent what person found your property on the particular Phoenix MULTIPLE LISTING SERVICE.The home may be in Ahwatukee, Chandler, Gilbert and Phoenix, or all other part regarding Arizona.Generally if the buyer in truth used a realtor they probably wrote this offer relating to the standard State of arizona Offer to get agreement.The regular agreement provides for a 10 time of day inspection timeframe commencing your day after the past counter deliver signature appeared to be completed. Within the inspection period the client has the way to inspect almost all the systems on the house that will thereby determine that the house seems to have any situations serious ample to ask the proprietor to mend or replace a service or purely fix some thing.It is on this 10 evening period, the consumer in virtually every circumstance will need to hire an expert home inspector.On Arizona, this includes Phoenix, the property market inspectors have a very standard kind they complete on all home some people inspect.The contour allows regarding inspections from the exterior among them cracks, that roof, pipes, kitchens along with appliances, that HVAC program, wiring the anesthetist can see, like with the attic, other electrical things like whether every different outlet runs and no matter if there are actually GCFI Circuits nearly water sections like kitchen sinks and tubs. Very important:The inspector records almost all his/her findings, writes them with the standard record, and including taking photos, leaves the copy considering the buyer.Owner by law can also be entitled with a copy even if the buyer would probably be paying a inspector.In such a information and some other information gathered throughout the inspection timeframe, the vendor has only one opportunity to ask the owner to produce repairs and also accept your property as is without a doubt (the default) or perhaps cancel the particular contract on paper and are given their solemn deposit rear.This request is commonly done with a form labeled the Shopper"s Inspection See and Seller"s Resolution. Although not necessarily a verified box method, I add for great buyer purchasers, an sum of money the seller can easily pay to your buyer in lieu of making almost any repairs in the least.This has the main benefit of the buyer having the capacity to oversee all the repairs, rather as compared with risking how the seller make lots of the requested in addition to accepted fixing with at a minimum quality. The point is, hiring a pro Home Inspector might be imperative that will get the home that you thought you had been buying. by using power in the event of a electricity interruption.To do this put a battery which offers power for the computer and also other fundamental electronics.When you loose capacity to your computer, UPS batteries brings power to you for a moment to enable you to save the information you were creating in those days.You ought to have approximately fifteen so that you can twenty minutes to accomplish the salvaging and closed your personal computer properly. If you have business information and information on your laptop, it is crucial you"ve got one of those batteries tied in to your laptop or computer.Not sole will a UPS electric battery protect your from electricity outages, it will also help by means of power surges.Surges damages your computer and do a lot of damage.It should make you are feeling better understanding a support battery is definitely protecting your. UPS batteries are not expensive ?n any way.They generally run from about thirty to fifty dollars for a fantastic one.You can buy these electric batteries almost wherever.They really are defiantly the investment in order to anyone what individuals lives on the computer.It does not matter if you"ve got business or personal information on your pc; it will saving having a UPS battery. They really are compact so that they will match almost any where.You might have them under your stand, or on top of it.UPS electric battery will plug into a normal three-prong outlet.They really are reliable and safe on many home electricity systems.There is actually no rationale not to have a battery data backup and lift protector such as UPS battery installed to your pc.It might be a device that you might never should rely for, buy the reason why take the chance? It will the few dollars in order to save your priceless work. 1.Could be the market without difficulty defined and reachable? - Where conduct they hangout? - What books do they read? - Do they"ve got clubs or events which bring these products together? - Will be they trying to find information on the net? a couple of.Is the market small enough that you have few competing firms but big enough to allow you to make some profit? 3.Does industry actually include and spend some money? - Conduct they buy stuff? some.Does the group use a ridiculous volume of passion for any hobby and topic? - Do people eat and sleep the actual hobby? Locating a niche necessitates balance.You don"t prefer to speak to a lot of people that no one hears an individual.Nor do you want to get and so specific that too few people fill the objective audience. Most of us have become heavily reliant upon information to support us do just about everything.Although an average joe admits to reading fewer than half of a book they may have started, greater than a billion ebooks were sold within the last year alone. Folks are buying courses, but you should determine what there"re buying and how they are getting them (i.elizabeth.online as opposed to.bookstore, pBooks as opposed to eBooks) prior to deciding to write in addition to publish ones book. Determining this in advance is your foremost way to ensure there is definitely an interest through what you"re getting ready to write. - Identify the systems and resources that will supply any targeted outlet for your personal message. since direct mailbox, e-mail activities and aimed ad placement to succeed in your profit center. et.The system supplied from Metlund prepares food by providing some button which you push sign in faucet.This activates the knocks out and rushes hot water to ones own outlet at once.While this system works perfectly, it is furthermore expensive pertaining to $400 towards $600.It is possible to install the system yourself free of hiring some plumber and / or an domestic electrical engineer.The other down side is that you need to install a particular activator go at each one faucet if you wish to have instant trouble at your personal fixtures. The third option is really a product termed Autocirc.The Autocirc device is comfortably installed underneath the sink in the point farthest beyond the hot water heater.The spew is thermostatically controlled therefore it turns on and off automatically keeping the tank warm within every filtration systems that during the idea operation lifestyle.This schedule is set up with the aid of the heels timer.The other nice fact relating to this Autocirc is that going barefoot saves the average family around 30, 000 gallons with water per year and reduces the power required to maintain the warm water in your tank, since the supply set never cools lower or needs to be reheated.The Autocirc price about $250, and is available form the local hardware save or local plumber. There are three excellent alternatives towards solving the drawback of much time waits for the morning bathroom.All choices have their positive plus negative characteristics.Do numerous research your self, but realize there are alternatives that may solve such problems, conserve the water and pay for themselves around energy cost savings. home movie theater furniture that"s eye-catching can provide important details where it could be located. Some stores may deliver free of charge, but the application usually has to be within a certain mileage travel time.Otherwise, the shipping fee may be pricey.But for those who are intrigued enough with this line from entertainment, it will not really issue.That just want it but the correct way safely can it be purchased on line? A big example is the Bose manufacturer.Presently, Bose is in the very best two situations for best-selling home theater systems for the general public with his or her 3-2-1 series, with several styles and types for sale.If a good purchase were to be made specifically online using the Bose manufacturer for the #1 positioned home entertainment system, the 3-2-1TM GS Sequence II DVD Home entertainment System, we would find it"s a bottom part cost from $999.00 with payments as low as $83.25 per month, credit depending. Express Delivery delivery can be made within two to three days with the help of standard shipping and delivery being produced from seven to be able to ten weeks, with prices varying on locations in delivery.It comes in silver or graphite, and has two accessible CinemateTM Diamond speaker arrays :their smallest most powerful 3-2-1TM audio system - having a hideaway Acoustimass component deliver enhanced high quality sound efficiency. There are no middle or back speakers, which mean there is no wiring to the back from the room.Its media middle is stylish and revolutionary, with a good progressive diagnostic DVD/CD professional with AM/FM tuner with a universal handheld remote control to run everything.The module produces cheap frequencies for all channels with no audible distortion, and can be placed visibly or tucked away. When purchasing this product, all the above information originated from their web-site, which totally describes the product.In add-on, it warns of current dealers, websites, and online auctions which are currently selling Bose services - but are not Bose merchants.If we buy a Bose product from a Bose company, it means a genuine Bose item with comprehensive warranties.Otherwise, the product could be use, counterfeit or stolen goods, and offered without serial amounts or they have been altered and / or defaced. So, purchasing that Bose product needs to come from the local retailer or typically the Bose business itself for the above good reasons - the web is designed to people with the help of different numbers of honesty plus integrity, so it is wise to become extremely vigilant purchasing because of non-Bose providers. uld potentially initially take a cheaper list of speakers approximately $200 and still enjoy very good sound or if the budget will allow for, look for the more expensive surround smart units for a $1000 or higher much like the Denon S-301.For people that have really expensive taste next it"s worth a review of the Hammer & Olufsen spectrum. A VIDEO player is usually an essential area of a home cinema set together.DVDs appear in all shapes today and choosing one in your case should be a relatively painless process.Whether you decide just your play operate unit as well as one with the help of recording skills is entirely your own preference but rate may in the end dictate your responsibility. Projection units for all planning to establish their home theater systems over time may be put on all the "back burner" until funds help however, they"re going to form the cornerstone of any best home theatre system.All over again, prices vary mainly good quality you will be asked to spend any degree over $1500. Most of us mentioned comparability shopping earlier.That"s a sensible way to tackle your home show project.Electronics may vary significantly inside price derived from one of outlet to another as carry issues come into play and additionally deals ought to be done looking for an opportunity. ior to apply could save you a wide range of dollars eventually. Cheap Credit lines:How Low-priced Are Many people? Is mostly a cheap debit card really low cost? There can be precautions that need to be observed in thinking about the buying price of your a low interest rate credit card gradually.Sometimes visa or mastercard issuers offer low interest rate credit cards with the initial INTEREST RATES of nil.After that introductory time, the monthly interest rises to help you negate that potential finance benefit extracted from the 1st offer.Also pay attention to the process your card uses that will charge attention.Some pace calculation systems for instance "two cycle" system may perhaps be costlier compared with you bargained regarding. 4) Apply good personal sense car acquired ones own card. ed to be made prior to when 1997 it in all probability won"t guidance a UNIVERSAL SERIAL BUS.Check your printer to see style a usb port attainable. You should look the reason you must purchase a USB main.This helps in deciding requirements usb hub you must purchase.And research the nuvi you prefer to connect, as there were devices are generally connected to help USB hubs. The 2 main major types about USB hubs could be the Self Power which drags power through an external power and the bus powered hub which is certainly inserted within the expansion slot machine and extracts power from the motherboard. Some systems that use large measures of electric power work effortlessly with motor coach rv powered hubs.A scanner as an illustration, will wotk more desirable connected to the self centric USB mainstay. When connecting a computer device to all the USB hub, see just what exactly version about usb it is.USB 1.0 was the most important version released and from now on the fast version is a usb a pair of.0 All of the USB couple of.0 hubs really are backward similar belief. Provide them to jog the slowly USB 1.0 appliances.The price on the hub 3.0 main varies out of about $25.00 to make sure you $65.00 and will be several companies.The price varies according to the numerous ports you wish on all the hub. INSTALLING YOUR CURRENT USB LINK Its always an outstanding practice that will backup your current files so that you can work in the computer.Get rid of the hub right from its supplying and with care inspect it all for damaged and grow sure every components exist. Stop in addition to carefully look at the hub manually operated for instructions just like turn this computer off first or you must install software program before connecting the hub to computer. If you suffer from a derived hub, plug the vitality cord on an outlet in addition to connect that usb cable with the usb link into a powerful open USB port.With all the hub connected place all the cdrom that have the mainstay and install software program onto the harddisk. Set a USB hub in any location where you should easily associate your reader, modem, or possibly other systems.Remember that this computer sole runs along at the highest universal series bus speed.If your main hub can be described as USB some.0 however your computer exclusively supports UNIVERSAL SERIES BUS 1.0 then 1.0 connection would be your potential speed. If your main USB switch is sub-conscious powered, install a card with an empty extension slot as a result of removing the device unit covers, removing a retaining bolt and cover from slot, firmly move the card on the slot, and develop retaining bolt to safeguarded it in the motherboard. Start your and your computer should recognize the fresh device.Install every software that were included with the link.You must install a computer device driver to hire the desktop computer to get in touch with the heart. Its with such ease and perhaps you should make it something fun to undertake.Learn whenever you go and turn into in the approach to benefit from your activity.You will wait for perform other tasks while in the same attitude. e sure you overhead twisting shafts that used to operate a vehicle the systems they used to work with. They served identical function then simply because they do nowadays, that can be keeping people cool.Ceiling lovers are an easy way of always keeping cool inside summer, particularly when you dont just want to run air conditioner.As opposed, when you may need warmth in cold months of winter, you is allowed to bring down the heated air accumulated in your area ceiling by running ones own ceiling fanatic in poor and turn back speed.These are a lot less noisy and also obtrusive compared to box fans or ac units. Ceiling fans are getting to be so popular right now they"ve found a place in just about every single room your homes.Its true that any of us need them in this particular bedrooms, areas etc.to beat heat.But, even the restroom can feel stuffy every so often.Especially while you are drying flowing hair, tidying in the place or merely spending some quality time for the pot.It is where the bathroom-ceiling fan also comes in.It circulates in addition to ventilates your bathroom without interfering together with bathroom exercises. Bathroom ceiling fans come in many styles to fit your interior design and style wishes.You can obtain them to check or contrast while using the tiles in your bathroom as per your aspiration.Before you obtain a bathroom-ceiling fan, you will likely need to consider a blade mop.Bathrooms are normally smaller very much smaller through area in comparison with most other sorts of rooms and you can"t want to overwhelm a small room which includes a ceiling buff thats too big.Another factor you must have to be aware of when getting a bathroom-ceiling fan would be the height of your bathroom upper limit.It will be advisable to obtain at very least 7 base of clearance from the bathroom carpet.If you"ve got an 8-foot ceiling, you should utilize a ceiling buff with a few inch along rod. Most bathroom fans come in the 3-blade variety.You dont want a great number of blades upon your fan in a very small room, else you will end up receiving a smaller tornado as part of your bathroom when you turn it on.When you keep newspapers as well reading material inside bathroom, it"s advisable a bathroom-ceiling fan with varied speeds that one can set as outlined by your inclination and preferences. For anyone who is like us, the bathroom will be the one place and plan out all your day on peace.And in case you have a bathroom ceiling buff keeping an individual cool, nothing can beat it eh? And installing your bathroom ceiling buff is a fairly easy job when we take out.Some of the greatest and most popular bathrooms roof fan makes are Casablanca, Hampton Fresh and Hugger.And there may be one to check everyones flavour, so just do it pick upwards a bathroom-ceiling supporter and make some time you spend in your bathroom an enjoyable experience. Please, tell us more of systems. Get more details of systems. You can write Articles and earn money from visitors viewing your Articles. However, more Visitors will view your Artcle if it is Free to view. You need to create a Short message detailing Why readers should view your Article and if the Visitor likes your summary he can choose to pay for your Article. Site Visitors, can give Comments on your Article and also give Ratings to your Article. You need to be a Member to write an Article.
2019-04-19T18:52:13Z
http://www.getclub.com/Articles.php?key=Systems
Photoluminescence (PL) is the most significant feature of graphene quantum dots (GQDs). However, the PL mechanism in GQDs has been debated due to the fact that the microstructures, such as edge and in-plane defects that are critical for PL emission, have not been convincingly identified due to the lack of effective detection methods. Conventional measures such as high-resolution transmission electron microscopy and infrared spectroscopy only show some localized lattice fringes of GQDs and the structures of some substituents, which have little significance in terms of thoroughly understanding the PL effect. Here, surface-enhanced Raman spectroscopy (SERS) was introduced as a highly sensitive surface technique to study the microstructures of GQDs. Pure GQDs were prepared by laser ablating and cutting highly oriented pyrolytic graphite (HOPG) parallel to the graphite layers. Consequently, abundant SERS signals of the GQDs were obtained on an Ag electrode in an electrochemical environment for the first time. The results convincingly and experimentally characterized the typical and detailed features of GQDs, such as the crystallinity of sp2 hexagons, the quantum confinement effect, various defects on the edges, sp3-like defects and disorders on the basal planes, and passivated structures on the periphery and surface of the GQDs. This work demonstrates that SERS is thus by far the most effective technique for probing the microstructures of GQDs. Graphene quantum dots (GQDs), as a new type of zero-dimensional quantum dot, have drawn intense attention due to their unique properties, such as chemical stability, low toxicity, dispersibility in water, controllable size, and wavelength tenability [1,2,3,4,5]. GQDs have great potential for applications in white light-emitting devices [6,7], fluorescent probes [8,9], anticancer therapy , biosensors and photocatalysis [11,12,13]. Nano-sized GQDs are composed of sp2 hexagonal domains and functional groups around the periphery and surface of the GQD domains. The GQD domains have a band gap that can be tuned by changing their size and shape [14,15,16]. The periphery and surface of the GQD domains can be chemically passivated by electron-donating substituents. Consequently, GQDs exhibit photoluminescence (PL) due to the quantum confinement effect and surface passivation effect [17,18,19,20,21,22]. Thus far, the PL mechanism in GQDs has been debated and therefore requires further clarification. Photoluminescence excitation (PLE) spectra of the GQDs generally show two PL peaks, indicating the two transitions from the triplet energy states of GQDs [17,19,23]. Based on the triplet ground-state carbene model, these two transitions could be considered to be from σ and π to π* due to the electronic conjugate structures, free zigzag sites, and in-plane defects of the GQD domains [19,23]. Another model suggests that the surface state energy levels could be created between π and π* states due to the functional groups on the periphery and surface of the GQDs, resulting in two transitions from π and surface states to the π* state, respectively . Therefore, the PL peaks should be determined by the size, structure and defects of the GQD domains, such as sp2 hexagons, edge and in-plane defects, and the chemically passivated structures on the periphery and surface of GQDs. The passivated structures of electron-donating substituents seem to have been partly characterized by Fourier transform infrared (FTIR) spectroscopy, X-ray photoelectron spectroscopy (XPS), etc. . However, the distinct structures of GQD domains, especially the structures of edge and in-plane defects that are always formed and incorporated in sp2 hexagons in the synthesis process, have not been reported due to the lack of an effective structure detection method. Only some localized lattice fringes and obscure edge structures of GQD domains, rather than the detailed structures of the defects, were observed by transmission electron microscopy (TEM) and high-resolution transmission electron microscopy (HRTEM) [24,25]. Although the structures of edge and in-plane defects in GQDs have been theoretically presumed to significantly affect the photoluminescence of GQDs , little experimental evidence related to the fine structure of defects has been presented, leading to ambiguity. GQDs have usually been fabricated via top-down cutting routes and bottom-up synthesis methods , such as hydrothermal methods [5,28,29,30], enhanced hydrothermal methods [31,32], carbonization , acidic exfoliation routes , and electrochemical strategies [34,35]. These methods suffer from complex and severe formation processes, including high temperature and concentrated acid environments [33,36,37], inevitably leading to the existence of chemical additives, residues and stabilizers. These impurities in the GQD samples not only complicate the understanding and theoretical simulations of the GQD PL mechanism via the GQD microstructures, but also affect the Raman and surface-enhanced Raman spectroscopy (SERS) measurements of the GQD fine structures, in which pure GQD samples are needed. Raman spectroscopy is a powerful tool in the structural characterization of graphitic materials [38,39]. However, the Raman spectra of GQDs usually only show a D band at approximately 1350 cm−1 and a G band at approximately 1588 cm−1 [19,40,41,42,43]. There is a lack of more Raman bands associated with the structure of GQDs. Surface-enhanced Raman spectroscopy (SERS), as a highly sensitive surface technique, can greatly enhance the Raman signals of the molecules adsorbed on noble metal nanoparticles [44,45,46], offering the chance to detect more Raman bands corresponding to the detailed structure of the GQDs. In this paper, pure GQDs without chemical additives, residues and stabilizers were fabricated for the SERS study by ablating highly-oriented pyrolytic graphite (HOPG) with a pulsed laser beam along the orientation parallel to the graphite layers in deionized water. The SERS spectra of GQDs with abundant peaks were obtained by the chemisorption of GQDs on Ag electrodes in an electrochemical environment. In contrast to the case of two-dimensional large graphene sheets, the D band split into two peaks at 1362 cm−1 and 1387 cm−1 due to the double resonance effect of graphene. The lower frequency peak related to the edge defects was stronger than the higher frequency peak that was derived from disorders such as sp3 structures and the fluctuation of the curvature on the basal planes. The D band was further broadened and blue shifted due to the various defects, disorders and passivated functional groups of the GQDs. The G band was also split into two peaks by symmetry breaking. The additional phonon modes demonstrated that the basal planes of the GQD domains retained the sp2 hexagonal structure. The abundance of microstructures in the SERS spectra that were not directly observed with other conventional detection and observation methods indicated that the microstructures of the GQDs could be effectively characterized by SERS. The results contributed to the further understanding of the types of defects and their effects on the PL mechanism in GQDs. Silver nanoparticle suspensions were prepared by ablating a silver plate in deionized water. The average diameter of the silver nanoparticles was approximately 30 nm. The silver plate was then replaced by highly oriented pyrolytic graphite (HOPG, SPI Supplies Co., West Chester, PA, USA) to fabricate the GQD samples via the ablation of the HOPG along the orientation parallel to the graphite layers in deionized water. Ablation was achieved with a Q-switched Nd: YAG laser with a wavelength of 1064 nm, a repetition rate of 10 Hz, and a pulse width of 6 ns. Consequently, GQDs adequately combined with the silver nanoparticles to form the [email protected] samples. The [email protected] sample was coated on a roughened silver electrode (99.9%) that was placed in a typical electrochemical cell containing a 0.1 M Na2SO4 solution. A platinum wire and an Ag/AgCl electrode were employed as the counter electrode and reference electrode, respectively. The voltage applied to the working electrode was controlled by a CHI 660A electrochemical instrument (CH Instrument, Bee Cave, TX, USA) The SERS spectra of GQDs on the surface of the working electrode were collected with varying potentials from 0.0 V to −1.2 V. The morphology of the GQDs was observed by TEM and HRTEM (Tecnai G2 F30, FEI Company, Hillsboro, OR, USA) with an acceleration voltage of 300 kV, accompanied by energy disperse spectroscopy (EDS) measurements. The PL emission spectra were measured with a fluorescent spectrophotometer (F-7000, Hitachi, Tokyo, Japan). The Raman and SERS spectra were measured with a confocal micro-Raman spectrophotometer (Renishaw H 13325, Renishaw PLC, London, UK) and excited at the wavelength of 532 nm. The power of the laser used on the sample was 0.41 mW. Infrared (IR) absorption spectra were recorded with an FTIR spectrometer (60 SXB, Nicolet Instrument. Inc., Madison, WI, USA) using a KBr wafer with a resolution of 4 cm−1. XPS spectra were collected using an ESCALAB 250 X-ray photoelectron spectrometer (Thermo Fisher Scientific Inc., Waltham, MA, USA) with a spatial resolution less than 3 μm. Figure 1a shows TEM images of GQDs fabricated by ablating HOPG with a pulsed laser beam along the orientation parallel to the graphite layers. GQDs with diameters of 2–6 nm were uniformly and densely dispersed in the products. The HRTEM images show localized lattice fringes of graphene with an in-plane lattice parameter of approximately 0.24 nm (Figure 1b) that can be ascribed to (1120) . The (002) lattice spacing distance was 0.35 nm (Figure 1c), slightly larger than that in bulk graphite (0.336 nm) . The PL emission of GQDs excited at a wavelength of 400 nm showed a peak centered at 473 nm without chemical passivation additives (inset of Figure 1a). Notably, when the HOPG was ablated in the direction perpendicular to the graphite layers, the samples mainly included carbon nanoparticles similar to those that are conventionally achieved when ablating candle soot and graphite powder with a laser [24,47]. Figure 2 shows the XPS, FTIR and EDS spectra of the GQDs. Overall, these measurements represent an attempt to visualize the structure of the GQDs. The XPS spectrum shows sharp peaks at binding energies of 285 eV (C1s) and 532 eV (O1s) (Figure 2a). The high-resolution spectrum of the C1s (Figure 2b) shows a wide band consisting of three components at 284.8, 286.5 and 288.7 eV, which are attributed to graphitic, hydroxyl, and carboxylic groups on the periphery and surface of the GQDs, respectively [17,23]. The proportion of the graphitic peak suggests that carbon was the main component of the GQDs. In the FTIR spectrum (Figure 2c), two typical peaks at 3434 and 1384 cm−1 were observed and could be assigned to the stretching vibration and in-plane bending vibration of C–OH, respectively. An intense peak at 1632 cm−1 was ascribed to the vibration of C=C. In addition, the absorption of C–O in the carboxylate groups at 1039 and 1134 cm−1 and the weak stretching vibration of C–H at 2960 cm−1 were observed [17,23]. The IR characterization of GQDs was distinctly different from that of the HOPG . The EDS spectrum shows that the GQDs contain carbon and oxygen (Figure 2d). The atomic ratio of C/O was approximately 9/1, indicating that C was the dominant element in the GQDs. In summary, the HOPG was ablated with a pulsed laser along the orientation parallel to the graphite layers in order to fabricate single- or few-layer GQDs with high purity and without chemical additives, residues and stabilizers. These impurities existed in the conventionally chemically synthesized GQDs, and their absence was significant for SERS measurements. On the other hand, although some vibrations related to the conjugate structure of C=C and electron-donating substituent groups (C–OH, C=O, C–O–C) were observed, more significant information about the microstructures of the GQD domains, such as in-plane and edge defects, and other defects were not obtained. In the normal Raman spectrum of the GQDs (curve a of Figure 3a), the G band at 1588 cm−1 and the D band at 1350 cm−1 were observed . More Raman peaks corresponding to the detailed structures of the GQDs that might be significant for their photoluminescence were not obtained. Curve b of Figure 3a shows the SERS spectrum of GQDs on silver nanoparticles ([email protected]). However, no extra peaks appeared, although the intensities of the D and G bands were enhanced. To further enhance the Raman signals of the GQDs, an electrochemical environment was introduced to tightly combine the [email protected] sample and silver electrode. Figure 3b shows the SERS spectra of GQDs on a silver electrode in an aqueous electrochemical environment with varying potentials from 0 V to −1.2 V. Many new peaks appeared and gradually increased in intensity with potential, indicating that nanosized GQDs with enormous edge defects were adsorbed on the Ag electrode, enhancing the SERS signals of the GQDs. The normal Raman intensity ratio of the D band to the G band was 0.77 (Figure 3a), which was similar to that of other high-quality GQDs . This suggests that during the laser ablation process, more defects were formed on the GQDs. The SERS intensity ratio of the D band to the G band increased with decreasing potential and reached 0.96 at −1.2 V (Figure 3b). Nanosized GQDs had enough edge defects that the numerical ratio of edge defects to in-plane regular hexagons was much higher than that for large graphene sheets, leading to an increase in the relative intensity of the D band. Some defects on the edges of GQD domains can be converted to new defect structures during chemical passivation by electron-donating substituents to form the functional groups, which increase the variety of defects. These functional groups facilitate the chemisorption of GQDs on the Ag electrode and implement charge transfer between GQDs and the Ag surface more readily than the graphitic edge defects of GQD domains. On the other hand, chemical passivation can be strengthened with a decrease in potential, which further increases the charge transfer effect. As a result, the relative intensity of the D band compared to the G band was prominently enhanced. Furthermore, considering that GQDs have various edge defects with complicated structures, the D band in SERS was broadened. Additionally, the calculation also showed that the D band of graphene could be broadened with a decrease in size because of the quantum confinement effect [49,50]. It is noted that with varying potentials from 0.0 V to −1.2 V, the D band was split into a peak and a shoulder (Figure 3b). Lorentzian fitting provides a reasonable approximation of the measured D band, indicating that the D band consisted of two peaks at 1362 and 1387 cm−1 (Figure 3c). According to the double resonance theory of graphene, the D band should be composed of two frequencies. The lower frequency is derived from the defects on the edges, and the higher frequency originates from disorders on the basal planes [49,50]. Notably, the intensity of the lower frequency peak of the D band is stronger than that of the higher frequency peak, in contrast to the case of large graphene sheets, in which the lower frequency peak is weaker than the higher frequency peak . GQDs have enormous edge defects. Some of them are chemically passivated by electron-donating substituents, forming functional groups that are more easily chemically adsorbed on Ag electrodes and cause charge transfer between the Ag electrode surface and adsorbed GQDs. This results in the further SERS enhancement of the lower frequency peak. On the other hand, the higher frequency peak, which is related to disorders such as ripple curvature or defects such as carrier doping on the basal planes [39,51], emerges out of the D band as a weak shoulder. Compared to the ripple disorders on the basal planes of large graphene sheets , nanosized GQD domains are nearly flat, reducing the fluctuation in curvature. However, the peak at 1309 cm-1 that is usually ascribed to sp3 hybridization suggests that some graphitic hexagons on the basal planes of GQD domains or armchairs and zigzags on the edges are damaged and converted into defects such as sp3 structures during laser ablation and probably induce some degree of curvature disorder . Consequently, the lower frequency peak in the D band is much stronger than the higher frequency peak. This double resonance effect, as a typical feature of graphene, also implies that the basal planes of GQD domains retain the quasi-2D sp2 hexagonal structure, although enormous defects exist after laser ablation. Furthermore, the D band shows a blueshift to 1362 cm−1 in SERS compared to its position in normal Raman spectra of graphite, large graphene sheets and GQDs [51,53]. The structures of the edge defects of GQD domains could be redistributed according to the minimum energy principle, leading to a change in the Fermi energy level of the GQDs. The potential applied to the Ag electrode also changed the Fermi energy of the Ag surface. Additionally, the strong quantum confinement effect of GQDs and the charge transfer effect between GQDs and the Ag electrode can tune the lowest unoccupied molecular orbital (LUMO) energy level of GQDs, also leading to a shift in the D band. For the same reasons the G band also split into two peaks at 1585 and 1618 cm−1 (Figure 3d), which can be attributed to the iTO and LO phonon modes (E2g symmetry), respectively, at the Brillouin zone center [54,55]. In a normal Raman spectrum of large graphene sheets, the G band only has a single G Lorentzian peak because of the energy degeneracy of these two optical phonon modes at the Γ point. However, in the SERS of the GQDs, splitting the G band can be induced by the adsorption of GQDs on the Ag electrode, which leads to symmetry breaking. The mode at 1510 cm−1 was ascribed to the iTO phonon near 1/4 ΓK, and the mode at 1650 cm−1 was assigned to the LO phonon near ΓK/4, [55,56] which are typical features of graphene, further indicating that the GQD domains not only have disorders and defects such as sp3 hybridization on the basal planes, but also basically retain the quasi-2D sp2 hexagonal structure. Both new peaks appearing at 1124 and 1177 cm−1 were assigned to the vibration of functional groups of C–O, and the peak located at 1440 cm−1 was attributed to the C=C vibration, characterizing the passivated functional groups. In summary, GQDs can be effectively characterized via SERS. The typical features of nanosized GQDs, such as the crystallinity of sp2 hexagons, the quantum confinement effect, various edge defects, sp3-like defects and disorders on the basal planes of GQDs, and passivated structures on the periphery and surface of GQDs, can be presented by the abundant SERS signals of the GQDs. These results are significant for clearly understanding the PL mechanism in GQDs. During the synthesis process of GQDs, a number of minute bubbles were produced on the surface of the HOPG as the GQDs were formed by ablating and cutting HOPG with a pulsed laser beam along the orientation parallel to the graphite layers. It is proposed that with laser irradiation, the surface of the HOPG absorbed enough energy over a short time period to increase the temperature in the micro-area. As a result, the graphitic clusters on the laser-ablated micro-area broke out of the HOPG surface. By further overcoming Van der Waals forces, the high-energy graphitic clusters cracked into a single-layer or few-layer nanoscale GQD domains. Simultaneously, water molecules were decomposed to passivate the edges and basal planes of the GQD domains to form the electron-donating substituent groups. GQDs can be stably suspended in water because of the hydrophilicity of the photoinduced functional groups. To study the SERS of GQDs, pure GQDs without chemical additives, residues and stabilizers that usually exist in conventionally chemically synthesized GQDs were fabricated by ablating HOPG with a pulsed laser beam along the orientation parallel to the graphite layers in deionized water. To further enhance the SERS signals of GQDs, [email protected] were prepared and adsorbed onto an Ag electrode in an electrochemical environment so that the [email protected] would strongly interact with the Ag electrode at the applied potentials. Consequently, SERS spectra of GQDs with abundant vibrational peaks were obtained. GQDs have various edge defects, including enormous original edge defects and new converted edge defects due to chemical passivation that can be chemisorbed on the Ag electrode to implement charge transfer between the Ag surface and GQDs with potential. This process led to an increase in the intensity of the D band relative to the G band and the broadening and blueshift of the D band. It is noted that D band split into two peaks at 1362 and 1387 cm−1, which can be attributed to the double resonance effect of graphene. Due to the enormous edge defects in GQDs, the lower frequency peak related to edge defects was stronger than the higher frequency peak derived from disorders such as sp3 structures and the fluctuation of the curvature on the basal planes. This is in contrast to the case of large graphene sheets, in which the lower frequency peak is weaker than the higher frequency peak because the numerical ratio of edge defects to in-plane regular hexagons is much lower than that of GQDs. The splitting of the G band and other phonon modes further demonstrate that GQD domains not only have disorders and defects on the basal planes but also basically retain their quasi-2D sp2 hexagonal structure. Some SERS peaks assigned to the vibrations of functional groups were also observed. This work indicates that GQDs can be effectively characterized by SERS. More details of the structures of GQDs that have not been directly observed with other analytical methods are shown in the SERS spectra. The typical features of GQDs—such as the crystallinity of sp2 hexagons, the quantum confinement effect, various defects on the edges, sp3-like defects and disorders on the basal planes, and passivated structures on the periphery and surface of GQDs—were presented by the abundant SERS signals and were significant for clearly understanding the PL mechanism in GQDs. In the future, these microstructures that are characterized by SERS could be well correlated with the GQD PL effect by theoretical simulation of the GQD PL mechanism via the GQD microstructures. J.W. and Y.F. conceived and designed the experiments; J.W. performed the experiments; P.W. and F.W. analyzed the data; J.W. and Y.F. wrote the paper. This work was supported by the Natural Science Foundation of China (Grant No. 21473115), and the National High Technology Research and Development Program of China (Grant No.2012AA030303). Figure 1. (a) TEM images of graphene quantum dots (GQDs) and the photoluminescence (PL) spectrum of GQDs excited at a wavelength of 400 nm (inset); (b) and (c) High-resolution transmission electron microscopy (HRTEM) images of GQDs. Figure 2. GQDs: (a) X-ray photoelectron spectroscopy (XPS) survey spectrum; (b) high-resolution XPS C1s spectrum; (c) Fourier transform infrared (FTIR) spectrum; (d) Energy disperse spectroscopy (EDS) spectrum. Figure 3. (a) Curve a: Raman spectrum of GQDs on silicon, and curve b: Surface-enhanced Raman spectroscopy (SERS) spectrum of GQDs on silver nanoparticles ([email protected]); (b) SERS spectra of [email protected] coated on a Ag electrode with changing potentials from 0.0 V to −1.2 V; (c) The D band in SERS at −1.2 V (blue) and two fittings (black and red); and (d) the G band in SERS at −1.2 V. The excitation wavelength was 532 nm.
2019-04-23T06:09:05Z
https://www.mdpi.com/2079-4991/8/10/864/htm
Should any provision of the present General Terms and Conditions be invalid, this shall not affect the validity of the remaining provisions thereof. Our offers are not binding. A contract shall only come into force upon our order confirmation in writing or text form. Solely our order confirmation in writing or text form is relevant for the date, kind and quantity of the delivery. If the order is not confirmed by us in writing or in text form the contract shall come into force upon performance of the order at the latest. Statements made orally or by phone by our representatives shall be legally binding only if confirmed in writing or in text form. We reserve all proprietary rights and copyrights to cost estimates, concepts, designs, drafts, drawings and other documents, in particular applied process and coating technology ("Proprietary Materials"); Proprietary Materials may be modified, saved or copied, and made available to third parties only with our explicit approval. Drawings and other documents provided as part of an offer must be returned to us upon request at any time and in any event if the order is not placed with us. No Proprietary Materials created by us in connection with or pursuant to this contract shall be considered works made for hire. To the extent that customer owns any rights in such Proprietary Materials, customer hereby irrevocably assigns to us all rights, title and interest, including all intellectual property rights, in and to such Proprietary Materials. In case we deliver items according to drawings, models, samples or other documents provided by the customer, the customer shall ensure that: (i) industrial property rights of third parties are not infringed, and (ii) products made or coated based on such customer information are in compliance with all applicable laws and regulations, in particular such related to products safety. If a third party, by invoking proprietary rights, prohibits in particular the manufacturing and delivery of such items, we shall be entitled to suspend all relevant activities and to claim damages without being obliged to analyse the legal situation (see also clause 8.3). In addition, the customer shall immediately indemnify us and hold us harmless from any costs and third-party claims related to design or other documents provided to us by the customer. We shall be entitled to procure the materials for the entire order and to manufacture the total order quantity immediately. Any customer requests for changes after order placement can, therefore, not be taken into consideration, unless explicitly agreed otherwise. To the extent necessary for manufacturing or planning related reasons, our deliveries may exceed or fall short of the agreed. The quality of the delivered goods or services is finally described by the explicitly agreed features (e.g. specifications, labels, approvals, and other information). Any other qualities of goods and services are subject to a further explicit written agreement. Therefore, any warranty for a special application purpose or particular suitability, life period or durability after passing of risk requires an explicit written agreement; otherwise the risk of suitability and use shall be borne by the customer. We reserve the right to implement any legally required, customary or technically unavoidable deviations from physical and chemical quantities, including colours, recipes, chemical contamination, processes and the use of raw materials as well as order sizes and reasonable quantity variances, as far as this is not unreasonable towards the customer. To the extent the design, information, data, specifications, practices and techniques have been provided by the customer, or the deliveries are based on active pharmaceutical ingredients or parts and components selected or provided by customer or sterilized by a third party selected by customer we make no warranty whatsoever and the customer shall immediately indemnify us and hold us harmless from any related costs and third-party claims. Generally, solely customer shall be responsible for risks related to the use of customer products and all customer product related compliance requirements, including but not limited CE certifications or FDA approvals such as 510k or PMA requirements. Details of the delivery item (e.g. as provided in product information, electronic media or on labels) are based on our general experience and knowledge and are for purposes of reference value or labelling only. These product details as well as expressly agreed features or application purposes shall not relieve the customer from the obligation to test the product for the intended purpose and to take the respective measures for careful storage. In particular, but without limitation, it is acknowledged by the customer that no technical schedule, shall be deemed to constitute or contain any representation, warranty or condition relating to the deliveries. FURTHERMORE, UNLESS SPECIFICALLY AGREED OTHERWISE IN WRITING, DELIVERABLES ARE MERELY MADE TO CUSTOMERS REQUIREMENTS AND GENERALLY NOT VERIFIED; TESTED OR WARRANTED BY US TO BE BIOCOMPATIBLE, IMPLANTABLE OR IN COMPLIANCE WITH RELATED REGULATORY REQUIREMENTS ("BIOCOMPATIBLITY REQUIREMENTS"); THE CUSTOMER IS THEREFORE SOLELY RESPONSIBLE FOR THE APPROPRIATE DEFINITIONS OF THE RESPECTIVE BIOCOMPATIBILITY REQUIREMENTS AND WILL FULLY HOLD HARMLESS AND INDEMNIFY US FROM COSTS AND CLAIMS RELATED TO THE IMPROPER USE OF DELIVERIES OR PRODUCTS CONTAINING DELIVERIES INSIDE THE HUMAN BODY. THE WARRANTIES AND ANY ASSOCIATED REMEDIES SET OUT OR REFERENCED HEREIN ARE EXCLUSIVE. NO OTHER WARRANTY, WRITTEN OR ORAL, IS EXPRESSED OR IMPLIED BY US OR MAY BE INFERRED FROM A COURSE OF DEALING OR USAGE OF TRADE. TO THE EXTENT ALLOWED BY LOCAL LAW WE DISCLAIMS ALL IMPLIED WARRANTIES OR CONDITIONS INCLUDING ANY IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, AND WARRANTIES OF NON-INFRINGEMENT. Details of quality, durability and possible uses of our products do not include any guarantees, in particular as stipulated in Sec. 443 German Civil Code (BGB), unless such details are explicitly specified as guarantee in writing. Lead times are provided for information purposes only and shall be non-binding, unless it is explicitly agreed that the delivery date shall be fixed, i.e. it is put in writing that the customer has no further interest in the delivery after the agreed date. Confirmed delivery dates are subject to the correct, complete and timely receipt of supplies by us. Delivery deadlines shall be considered as met if prior to deadline expiry the delivery item has left our facility or if we have informed the customer that the order is ready for shipment. Delivery periods shall not start to run until the customer has properly fulfilled its respective obligations and contractual duties, such as furnishing technical data, product acceptance notifications in accordance with the agreed initial sampling processes and documents, approvals, making a down payment or providing a payment guarantee. Events of force majeure or other circumstances beyond our control that render the timely execution of accepted orders impossible shall relieve us from our delivery commitment as long as these events continue to exist. This means we do not assume the risk of procurement. Furthermore, we reserve the right to withdraw from the contract in case we do not receive the relevant products ourselves in spite of a respective prior procurement contract with our supplier; our responsibility for damages caused intentionally or negligently according to clause 8 remains unaffected. We will inform the customer without undue delay that the delivery item will not be available in time, and in case we withdraw from the contract we will return any consideration already received without undue delay. It is generally not possible to return any sold and non-defective products. In case the customer becomes subject to insolvency proceedings, or comparable proceedings under foreign law, provides a formal information of financial status (Vermögensauskunft) according to Sec. 807 German Code of Civil Procedure (ZPO), experiences payment difficulties or in case we become aware of a significant deterioration of the customer’s financial situation, we shall be entitled to suspend deliveries immediately and to refuse the fulfilment of current contracts unless the customer provides the respective consideration in advance or, upon our request, provides appropriate securities. In case the customer is in default of acceptance or payment or does culpable breach of any primary or accessory obligations, the customer shall indemnify us for any damages caused and any additional costs related thereto. Further claims and rights shall remain unaffected. In case of the customer’s default of acceptance or payment, the risk of accidental loss and damage of the products shall pass to the customer. In case the products are sent to the customer or a third party at the customer’s request, the risk of accidental loss or accidental damage of the products shall pass to the customer once the products have left our facility/warehouse at the latest, irrespective of the agreed dispatch place and irrespective of which party bears the transport costs. Unless explicitly stated otherwise, any use of Incoterms shall be deemed as a reference to the INCOTERMS 2010 as published by the International Chamber of Commerce (ICC). Unless agreed otherwise, the information we provide under export law is limited to the non-preferential origin under Art. 59 et seq. of the European Union Customs Code Regulation (EU) 952/2013. We reserve title to all delivered products until all our existing claims, including conditional and accessory claims against the customer resulting from our business relation have been satisfied; for this purpose, all deliveries shall be considered as one single delivery transaction. In case of a current account, the reservation of title shall serve as security for our outstanding balance claim. All aforementioned provisions shall also apply to future claims. In case of a material breach of contractual obligations by the customer, we may immediately retrieve the products without further notice, reasonably taking into account the legitimate interests of the customer; the customer hereby consents in advance to return the products in such instances. Retrieving the products shall only be deemed a withdrawal from the contract if explicitly so stated by us. All costs resulting from retrieving the products (in particular transport costs) shall be borne by the customer. To the extent we do not explicitly declare our withdrawal from the contract the customer may request delivery of the products only once the purchase price and all costs have been paid in full. The customer may resell or process the delivered products or mix or combine it with other items in the course of ordinary business only; however, the customer hereby assigns to us in advance all claims resulting from the resale, processing, mixing, combining or other legal grounds related to the delivered product (in particular from insurance contracts or unlawful acts) in the amount of the agreed final invoice total (incl. VAT). The same applies if a product is not resold but used by the customer for purposes of a contract for work and services or a contract for work and materials (Werk- oder Werklieferungsvertrag). The reservation of title shall also apply to new products resulting from the processing of the initially delivered items, or their mixing or combining with other items, in each case at the full value of the respective new product. These processes shall be performed on our behalf so that we shall be deemed to be the manufacturer. If third-party ownership rights remain after processing of our products or their mixing or combining with third party products, we shall acquire joint ownership in the new product at the ratio of the objective value of the processed, mixed or combined products. If our ownership ceases as a result of the processing, combining or mixing, the customer hereby already transfers to us his title and any expectant rights in the new product in the amount of the invoice value of the products delivered by us, and shall store it on our behalf free of charge. The customer shall be authorised to collect debt claims from the resale assigned to us under clause 5.2 as long as we have not revoked this authorisation. We will not collect such debt claims ourselves, as long as the customer properly fulfils its payment obligations towards us. Upon our first written demand the customer shall inform us about the debtors of the assigned claims and shall notify the debtors of the assignment. We may revoke the customer’s authorisation under clauses 5.2 and 5.4 to resell the products and to collect the debt claims assigned to us with immediate effect if the customer is in default of payment to us, experiences payment difficulties due to a significant deterioration of its financial situation or does not fulfil other material contractual obligations properly. In case the customer becomes subject to insolvency proceedings, or comparable proceedings under foreign law, discontinues payments, provides formal information of its financial status (Vermögensauskunft) according to Sec. 807 German Code of Civil Procedure (ZPO), or if a change of ownership occurs in the customer’s business due to payment difficulties, the authorisation to resell products and to collect the debt claims assigned to us shall cease automatically. The customer shall store our (jointly) owned materials on our behalf free of charge and with the due care and diligence of a prudent businessman and shall insure them against fire, burglary and other usual risks. Any required maintenance and inspection services have to be timely performed at the customer’s expense. The customer must not pledge or assign as security any products delivered under reservation of title or any products processed or manufactured on our behalf. The customer shall notify us immediately of any pledge or any other interference with our ownership rights by third parties and shall confirm our title in the respective product in writing, both to us and the third party. Any costs arising from resulting legal action shall be borne by the customer. In case the actual value of the securities exceeds the nominal amount of the secured claims by more than 10%, we will release selected securities upon the customer’s request. In case the reservation of title under clause 5.1 needs to be publicly registered or requires any other kind of cooperation by the customer in order to be valid, the customer hereby irrevocably consents to such registration and agrees to take all necessary actions at its own cost. Our prices are in EUR and are valid for delivery FCA (agreed place of delivery); statutory VAT, transport and packing costs are not included. Unforeseen changes in costs beyond our control, such as costs for raw materials, wages, energy and other costs shall entitle us to adjust prices accordingly. For partial deliveries each delivery may be invoiced separately. If no specific prices have been agreed in the contract, our prices valid at the respective delivery date shall apply. Our invoices are due immediately and payable without discount. Any discount has to be specifically agreed in writing. We are not obliged to accept bills, cheques or other promises to pay, their acceptance shall not be considered a replacement of the underlying obligation (Leistung an Erfüllungs statt) but only as an additional possibility for us to receive payment (Leistung erfüllungshalber). The date of receipt of payment shall be the day on which the amount is in our possession or has been credited to our bank account. In case the customer is in default of payment we may charge interest at the rate of 9 percentage points above the base interest rate published by the Federal Bank of Germany (Bundesbank) for the duration of the default, plus a lump sum of EUR 40. This shall not restrict our right to claim additional damages or costs. In addition, in case the customer is in default of payment, we may choose to call due any outstanding purchase price instalments or other existing claims against the customer as well as to make future deliveries under this or other contracts subject to provision of a security in advance or simultaneous (Zug-um-Zug) payment against delivery. No interest will be paid on advance or partial payments. The customer may set off or withhold payments only if his counterclaim is undisputed or res judicata. This restriction shall not apply to claims of the customer for corrective measures in relation to a defective product or completion of an unfinished product. Upon request, the customer shall provide us with any documentary evidence for tax purposes (i. a. entry certificates (Gelangensbestätigung)), which we consider necessary under the applicable statutory provisions to prove our exemption from VAT for cross-border deliveries. In case of non-compliance the customer shall, after receipt of a corrected invoice, cover any VAT claims and interest imposed on us by the tax authorities. The customer shall inform us about the invalidity or any changes in its VAT identification number without undue delay. In case the purchase price is paid by way of the credit note procedure for VAT purposes, the customer shall be solely responsible for compliance with the VAT related provisions on invoices. We shall not be liable for damages resulting from the credit note procedure, e.g. any refunds of input tax and payment of interest by the customer to the competent tax authorities. The customer shall properly fulfil its duties regarding inspection and lodging complaints under Sec. 377 German Commercial Code (HGB), i.e. the customer shall inspect the products without undue delay and shall notify us of any defects without undue delay, and, if a defect is discovered later in the ordinary course of business, shall notify us of such defect without undue delay after discovery. If defective products are delivered, we shall be given the opportunity, prior to the start of manufacturing (processing or installing), to sort out such products and to remedy the defect or to make a substitute delivery, unless this cannot reasonably be expected from the customer. In case we are unable to accomplish this or fail to comply in due course, the customer may withdraw from the contract to this extent and may return the products at our risk. In case of urgency, the customer may, following consultation with us, remedy the defects himself or instruct a third party to do so. Expenses incurred by such remedial activities shall be reimbursed by us according to clause 8. If the defect is discovered only after the start of manufacturing or initial operation, despite the fulfilment of all duties according to clause 7.2, the customer may demand subsequent performance (rework or substitute delivery at our discretion). The delivery of defective products results in a right of retention only insofar as it is in due proportion to the respective defect and the expected costs of the subsequent performance, and provided that the customer’s counterclaim is based on the same contractual relationship. Any claims for damages for defective products shall be subject to two useless attempts of subsequent performance. In case of substitute delivery the customer is obliged to return the defective products upon request. A withdrawal from the contract or a claim for reduction of purchase price shall be granted only if the defect cannot be remedied within an appropriate period, if subsequent performance will incur disproportionate costs, is unreasonable or must be considered as failed for other reasons. The customer shall, however, have no right to withdraw from the contract in case of minor defects. The customer shall allow us to inspect any rejected products without undue delay; in particular these products shall be made available to us upon request and at our cost. If complaints are unfounded, we may charge the transport costs and inspection expenses to the customer. No claims for defects may be raised in case of merely insubstantial deviations from the agreed quality, insubstantial impairment of serviceability, or if the defect can be put down to a violation of operating, maintenance or installation instructions, unsuitable or improper use or storage. This shall also apply in case of faulty or negligent handling or assembly, normal wear and tear or tampering with the delivery item by the customer or a third party. No costs may be claimed regarding the subsequent performance, the withdrawal from the contract or damage-repair because of defective products, in particular costs for de- and reinstallation, testing, validation, shipment, transportation, labour and material, insofar as: (i) these claims and costs result from the fact that the products have been transferred to a place different from the agreed place of performance after passing of risk, or (ii) at the time the costs were incurred, which means generally at the time of deliver but at latest during installation or processing, the customer knew or reasonably should have known of the defect. However, this does not apply in case such transfer corresponds with the normal use of the products known to us. Damages and reimbursement of expenses may only be claimed according to clause 8. The customer may not make the aforementioned claims for any products, which, according to mutual agreement, we do not deliver as new products. Costs regarding the subsequent performance, the withdrawal from the contract or damage-repair because of defective products, in particular costs for de- and reinstallation, testing, validation, shipment, transportation, labour and material shall not exceed the total value of the respective order. We shall be liable for any damages, in particular resulting from a breach of duty of care when entering into a contract (culpa in contrahendo), from a breach of obligations or from unlawful acts (Sec. 823 et seq. German Civil Code (BGB)), only to the extent that we, our employees or vicarious agents (Erfüllungsgehilfen) have acted intentionally or grossly negligent. For damages resulting from death or bodily harm or a violation of material contractual obligations, we shall also be liable for ordinary negligence. Contractual obligations shall be deemed as "material" if their fulfilment is a prerequisite for proper performance of the contract and the customer regularly trusts in their fulfilment and also may do so. In case of a violation of a material contractual obligation our liability shall be limited to the direct average damage, predictable and typical for the respective type of product. This shall also apply to a breach of obligations by our employees or vicarious agents (Verrichtungsgehilfen or Erfüllungsgehilfen). We shall be liable for the infringement of third parties’ industrial property rights in connection with the sale of our products under the foregoing provisions only if the infringement results from the proper use of our product, and only to the extent such third parties’ industrial property rights are valid in the Federal Republic of Germany and have been published at the time of delivery. This shall not apply if we have manufactured the product according to designs, drawings, models, or other descriptions or data provided by the customer or based on active pharmaceutical ingredients or parts and components selected or provided by customer or sterilized by a third party selected by customer and/or if we did not know or did not have to know of any infringement of industrial property rights in connection with the developed product. In this case our customer is liable for any current or future infringement of third parties’ industrial property rights. The customer undertakes to inform us without undue delay of any potential and alleged cases of infringement of third parties’ industrial property rights he may become aware of, and to indemnify us from any third parties’ claims, costs and expenses incurred. Claims for defects of delivered products, including any damages relating to such defects – irrespective of the legal grounds – shall become time-barred one (1) year after delivery. Claims for price reduction and rights to withdraw from the contract shall be excluded insofar as the primary claim for performance or the secondary claim for subsequent performance has become time-barred. Our mandatory liability pursuant to the provisions of the German Product Liability Act (Produkthaftungsgesetz) towards harmed third parties and mandatory elements of Sec. 478, 479 German Civil Code (Letztverkäuferregress) shall remain unaffected by the foregoing provisions. We shall only be liable for claims of recourse by the customer if and to the extent the customer has not accepted obligations towards his own customer beyond the mandatory statutory provisions on remedies for defects and liability. Unless agreed otherwise in writing, clauses 7 and 8 shall apply accordingly to any claims of recourse raised by the customer. WE SHALL NOT BE LIABLE FOR ANY SPECIAL, INCIDENTAL, INDIRECT, CONSEQUENTIAL, PUNITIVE, OR EXEMPLARY DAMAGES OF ANY KIND ARISING FROM OR RELATING TO THE OBLIGATIONS UNDER THIS CONTRACT. THE TERM "CONSEQUENTIAL DAMAGES" INCLUDES, BUT IS NOT LIMITED TO, PATIENT’S MEDICAL EXPENSES, LOSS OF USE, LOSS OF INCOME, REVENUE AND COST OF CAPITAL OR PAIN AND SUFFERING. EXCEPT FOR PERSONAL INJURY OR DEATH DUE TO OUR GROSS NEGLIGENCE OR WILLFUL MISCONDUCT, OUR AGGREGATE LIABILITY RELATING TO OUR OBLIGATIONS UNDER THIS CONTRACT (WHETHER BASED IN CONTRACT, TORT OR OTHERWISE SHALL IN NO EVENT EXCEED: (I) ON AN AGGREGATED CLAIM BASIS, THE AMOUNT PAID TO US UNDER THIS CONTRACT DURING THE TWELVE (12) MONTH PERIOD IMMEDIATELY PRECEDING THE EVENT GIVING RISE TO SUCH LIABILITY ("THE COMBINED TOTAL"), OR (II) 10% OF THE COMBINED TOTAL ON A PER CLAIM BASIS. WE DO NOT ACCEPT ANY FURTHER LIABILITY. Customer shall keep any knowledge and information of a technical or economical nature it has received from us in connection with the business relationship ("Confidential Information") strictly confidential towards third parties at any time, even after the end of the business relationship, unless the customer proves that the Confidential Information is (i) already known to the customer or in the public domain at the time of disclosure or subsequently becomes public knowledge other than through a fault of the customer, (ii) subsequently developed by the customer completely independent from the Confidential Information, or (iii) received by the customer from a third party without breach of a confidentiality obligation. We remain the sole owner of any documents, in particular drawings, containing Confidential Information, which are disclosed in the course of the business relationship. Any such documents must be returned to us upon our request but at the latest at the end of the business relationship. The customer has no right of retention regarding Confidential Information or documents or materials containing Confidential Information. The disclosure of Confidential Information does not establish any industrial property rights, rights to knowhow or copyrights of the customer and does not constitute a prior publication or right of prior use according to the applicable patent, design and utility model laws. Any kind of license is subject to a written agreement. The customer shall comply with foreign trade law provisions, in particular with any applicable export control regulations under German, EU and US law and hereby agrees that we can reasonably review, save, process and reasonably share with professional service providers customer data, including personal data, for compliance purposes in each case subject to the applicable data privacy laws and limited in extent and scope to the extent necessary to ensure legal and regulatory compliance. The customer will not engage in any business related to ABC weapons or military application, and he undertakes not to deal with or otherwise cooperate, neither directly nor indirectly, with any terrorist or terrorist organizations or any other criminal or anti-constitutional organizations. The customer will in particular establish reasonable organizational measures to implement applicable embargoes, the European regulations against terroristic and criminal acts and the respective requirements under US law or any other law applicable to the business relationship, in particular by implementing adequate software systems. Once a product has left our facilities, the customer shall be solely responsible for compliance with the abovementioned provisions and shall indemnify us from any and all claims or related costs resulting from the violation of the respective laws or regulations by the customer, its affiliates, employees, representatives or any of its vicarious agents (Erfüllungsgehilfen), including reasonable attorney or consultant fees, administrative fees and penalties. We will reasonably comply with the obligations resulting from the European Chemicals Regulation No. 1907/2006 ("REACH") that are directly applicable to us and will be liable for breaches according to clause 8. The customer shall, however, be solely liable for any negative consequences resulting from the provision of insufficient information by the customer, including any incorrect or incomplete information relating to the use of products within the supply chain. Outside of Europe, solely the customer is responsible for regulatory chemical compliance. In the event in the reasonable opinion of one party a voluntary or government-mandated recall, field correction, market withdrawal, stock recovery, or other similar action with respect to the deliveries ("Recall") is required the customer will consult with us without delay, however the final decision for handling any Recall shall rest with us. Customer will immediately (i.e., within 24 hours or less) notify us if the customer learns that a potential Recall implicates the deliveries, and if a complaint alleges that a death or serious deterioration in the state of health has occurred. In other cases, the customer will notify us of complaints within two (2) calendar days without any delay that could not be justified. Customer will provide all reasonable assistance requested by us in the conduct of a Recall, and will: (a) provide us with available performance evaluations, accident reports, engineering investigations, and other data relating to the potential Recall; (b) provide us a reasonable opportunity to participate in inquiries and discussions among customer, its end-customer and governmental agencies regarding the need for and scope of the Recall; and (c) consult with us about the most cost-effective method of modifying or replacing systems or component parts, including the deliveries, in order to remedy the alleged defect or non-compliance. Unless agreed otherwise on a case by case basis, we shall be solely responsible for notifying governmental or regulatory authorities regarding any such matters specifically related to our deliveries, and customer will cooperate with us in reporting any requirements or other follow-up activities (including but not limited to, corrective action) relating thereto. Each party will designate a representative responsible for the exchange of such information and for all other regulatory information. In the event of a Recall, customer will not make any statement to the press or public concerning the Recall without first notifying us and obtaining our prior approval of any such statement. If a Recall arises from any other reason, including customer’s design, specifications, or mandated suppliers, active pharmaceutical ingredient or parts provided or selected by customer, customer mandated sterilizers, customer acts or omissions in the marketing, distribution, storage, or handling of the deliveries or a product containing the deliveries, the costs and responsibilities of the Recall will be borne by the customer. The parties will maintain records of all sales of deliveries and products containing deliveries sufficient to adequately administer a Recall for the period required by applicable law. For all claims resulting from our business relationship with the customer, in particular regarding our deliveries, the site from which the delivery originates shall be deemed the place of performance. The customer may assign its claims arising from the contractual relationship only with our prior written approval. For all claims resulting from our business relationship with the customer, in particular regarding our deliveries, the exclusive place of jurisdiction shall be Weinheim/Bergstraße, Germany. This shall also apply to disputes concerning the formation and validity of a contractual relationship. We shall, however, also have the option to sue the customer in the courts competent for the customer’s place of business. If a customer’s place of business is located outside of Germany, we shall be entitled to have all disputes arising out of or in connection with our business relationship with the customer, including disputes about the validity of contracts, finally settled in accordance with the Arbitration Rules of the German Institution of Arbitration (DIS) without recourse to the ordinary courts of law. The place of arbitration shall be Frankfurt a. M., Germany. Upon request, we shall exercise our right to choose arbitration before proceedings are initiated. The arbitration proceedings shall be conducted in German, unless the customer requests them to be held in English. The business relationship with the customer shall be exclusively governed by the laws of Germany, excluding its rules of private international law, the UN Convention on the International Sale of Goods (C.I.S.G.) and other bilateral or multilateral conventions on the harmonisation of law regarding the international sale of goods. This is a convenience translation of our German Conditions of Delivery and Payment (Allgemeine Liefer- und Zahlungsbedingungen). In case of discrepancies between the German and the English version, the German version shall prevail. These Conditions of Purchase shall apply exclusively to all of our or our affiliated companies’ orders and contracts (hereinafter “order”) governing the purchase of goods, services and work performance (hereinafter “delivery”) from entrepreneurs, legal persons under public law or special funds under public law within the meaning of Sec. 310 para.1 German Civil Code. We hereby explicitly object to any deviating or supplementary conditions set by our suppliers, they shall not be binding for us. Our Conditions of Purchase shall also apply exclusively if we do not object to the incorporation of our supplier’s conditions in individual cases or if, although being aware of contrary or supplementary terms and conditions of the supplier, we accept a delivery without reservation. These Conditions of Purchase also apply to all future business relations with the supplier, even if they are not explicitly agreed upon again. Should any provision of these Conditions of Purchase be invalid or unenforceable, this shall not affect the validity of the remaining provisions. The invalid provision shall be replaced by a lawful provision coming as close as possible to the commercial purpose of the invalid provision. Any agreement with the supplier and all orders shall be considered binding for us only if they are put down in writing or in text form. Any modification, addition or subsidiary agreement before, at or after the contract formation also requires our consent in writing or text form. This form requirement may only be waived in writing or in text form. If the supplier does not accept our order in writing or in text form within two (2) weeks of receipt, we shall be entitled to revoke the order. Delivery calls shall be binding unless the supplier objects within three (3) working days of receipt. Any deviation from, modification of or supplement to our orders shall only be effective if explicitly and separately indicated as deviation, modification or supplement and expressly approved by us. Prices specified in the order are firm. Prices are valid for “delivery at place” (DAP), as well as any packaging, adequate transport insurance to be taken out by supplier, and all other costs of delivery, unless explicitly agreed otherwise in writing. VAT is not included in the price. Unless explicitly stated otherwise, any use of Incoterms shall be deemed as a reference to the INCOTERMS 2010 as published by the International Chamber of Commerce (ICC). In cases where the supplier is responsible for erection, assembly or commissioning, and the parties have not agreed otherwise in writing, the supplier shall bear all necessary incidental costs, such as travel expenses and costs for provision of tools. Invoices will be processed only if we receive them by separate mail. Each order must be invoiced separately. Invoices must state the order number specified in our order, the order date, the company name of supplier and our item number, all clearly highlighted. Invoices must be made out in EUR, payments will be made in EUR only, unless agreed otherwise. For each bank account, the supplier shall provide the correct IBAN and BIC codes, as well as its VAT identification number. Payments will be made, at our option, by bank transfer or cheque or bill of exchange after taking delivery and receipt of a verifiable invoice and all documents pertaining to the delivery. Accounts may also be settled by us in line with the credit note procedure (self-billing procedure) according to the applicable tax laws, if agreed upon in advance. Unless otherwise agreed upon in writing, we shall pay within 30 days without discount. The supplier shall not be entitled to assign or otherwise dispose of its claims wholly or partly against us without our prior written consent. We shall be entitled to exercise statutory setoff and retention rights. Delivery dates specified in the order or otherwise agreed upon are binding and must be strictly met. The supplier shall promptly notify us in writing of any potential delays or non-compliance with delivery dates and deadlines, explaining the reasons for the delay and specifying how long they are expected to prevail. Deliveries by instalments and premature deliveries shall be allowed only with our written consent. Payment claims, however, shall be due no earlier than on the delivery date originally agreed upon. Unless otherwise agreed upon, deliveries must be accompanied by a delivery note and a works test certificate according to EN 10204:2005-01 or any other equivalent internationally recognized test certificate specifying the characteristics agreed upon with the supplier. Initial supplies must be accompanied by an initial sampling. On-site deliveries are only possible at the time stated in the order or as otherwise agreed upon. Unless otherwise agreed upon, when entering a Freudenberg site all occupants of vehicles must be registered. It is generally prohibited to take children or animals along to a Freudenberg site. Wearing safety boots is mandatory at loading and unloading facilities. Any instructions by the safety staff must be complied with. In case of delays in delivery we shall be entitled to impose a contractual penalty of 1% for each commenced week of delay, but no more than a total of 10% of the order value; the supplier shall however have the right to prove that no damage was caused or the damage is materially lower. We reserve the right to claim further damages. We shall reserve the contractual penalty no later than upon payment of the invoice, following receipt of the delayed delivery. Events of force majeure that render a delivery by our supplier or the acceptance or use of the delivery in our or at our customer’s business impossible or substantially more difficult shall postpone our acceptance duty for an appropriate period of time, considering our actual demand. In cases of force majeure concerning us or our supplier we shall also have the right, at our discretion, to wholly or partially withdraw from the contract. The place of performance shall be the location to which, according to the order, the goods have to be delivered or where the service is to be performed. The place of performance shall be our registered office. The delivery shall be properly packed and made DAP to the address designated by us or performed there for the supplier’s account and at supplier’s risk. The risk of accidental perishing or deterioration of delivery will pass to us only with receipt of delivery by us or by a forwarding agent appointed by us at the agreed place of performance or after final acceptance of the delivery, whichever is later, even if we have agreed to pay the freight charges. With the passage of risk at the place of performance or with delivery to a forwarding agent specifically appointed by us we shall acquire ownership of the goods without reservation of any rights for the supplier. In case of delivery of machinery or plants, the risk shall pass only after their final acceptance at the place of performance. We will inspect the delivered goods based on the accompanying documents for identity and quantity as well as for visible transport damage. Defects in the delivery will be notified to the supplier once we discover them in the ordinary course of our business, within an appropriate time of at least five (5) working days following the detection. Under these circumstances, the supplier hereby waives its right to object to claims in relation to defects on grounds that they have been raised too late (Sec. 377 German Commercial Code (HGB)). Unless stipulated otherwise in this clause 6, the supplier shall be liable according to the applicable statutory provisions, in particular for defects of the delivery and the fitness for the agreed use or such fitness for a particular purpose or use by us or our customers which is known or should have been known to supplier, and this liability shall not be limited or excluded, neither in cause nor amount, and shall also indemnify and hold us harmless from and against any third party‘s claims to the same extent. Furthermore, the supplier hereby assigns to us any and all transferrable warranty and guarantee rights related to the deliveries or parts thereof which have been provided or granted to supplier by its sub-suppliers. In principle we shall be entitled to choose the type of subsequent performance. The supplier may however refuse the type of subsequent subsequent performance were unreasonably high. If the supplier fails to remedy the defect promptly upon our request, we shall - in urgent cases, in particular to avert imminent danger or to mitigate damages - have the right to remedy the defect ourselves at the supplier’s cost or have this done by a third party without having to grant a period of grace in advance. Claims for defects shall become time-barred 24 months after the sale of the final product to the consumer, but no later than 30 months after receipt of the delivery by us, unless agreed otherwise or unless mandatory statutory provisions provide for extended limitation periods. In case of claims resulting from contracts for services and works, claims for defects shall become time-barred 30 months after the written final acceptance. This shall not apply to deliveries that, consistent with their common application, are used in buildings and have caused the building’s defectiveness, in that case claims will lapse after 5 years. Our additional statutory rights under the applicable law shall remain unaffected by this provision. In addition, the supplier shall indemnify us from any third-party claims related to deficiencies in title. For deficiencies in title, including indemnification claims pursuant to sentence 1, a limitation period of 10 years shall apply. If a defective delivery necessitates extra work in the incoming inspection process, the supplier shall bear the resulting costs. The supplier shall indemnify us from any third party claims, costs and expenses (including legal fees) arising out of defects or other breaches of this contract, the death of or injury to any person or damage to property, if and to the extent the causes for the respective claim lie in the supplier’s domain. Under these circumstances the supplier shall also reimburse us for all costs and expenses related to this contract as well as according to the statutory provisions on the administration of others’ affairs that we or our customers incur as a result of or in connection with a recall action or any other measure. The supplier shall maintain a product liability insurance (including coverage for extended public- and product liability and recall costs) with a coverage of at least EUR 5,000,000.00 (EUR five million) in total per claim for personal, property or product-related damages; however, our claims shall not be limited to the covered amount. Supplier shall immediately provide a certificate of insurance documenting such coverage. The supplier shall ensure that neither the delivery nor its use infringe upon industrial property rights or other rights of third parties and do not violate statutory provisions or official regulations of any kind. Unless otherwise agreed upon, the supplier must comply with our guideline „Avoidance of particularly hazardous substances“ (FSS 7), which we will provide upon request, and the environmental standard ISO 14001. Upon our request, the supplier shall provide all relevant IMD system data, REACH data, GHS data and any other data relevant under export law free of charge. The supplier shall indemnify us from all claims raised against us by third parties for reasons of or in connection with the delivery or its use. Clause 6.6, sentence 2 shall apply to such claims. The supplier’s obligation of indemnification shall also cover all costs and expenses (including legal fees) arising from or in connection with claims raised by a third party. For the supply of machinery and plants falling under the EU Machinery Directive 2006/42/EG or under any other laws and regulations issued on the basis of this Directive, the supplier shall also provide a risk analysis or risk assessment in conformity with DIN EN ISO 12100:2011 in accordance with the EU Machinery Directive 2006/42/EG free of charge and together with the products. The supplier acknowledges that we, as a manufacturer of products and items, are considered as a downstream user within the meaning of the European Chemicals Regulation No. 1907/2006 (“REACH”) and warrants to comply with all REACH obligations, in particular those governing the sale, processing or trading of goods within the EU, including (a) to perform any legally required pre-registration, registration or authorization of chemical substances or preparations, (b) to implement internal organizational measures to document compliance with REACH, (c) to ensure that any use(s) of chemicals or preparations in the products (including packaging materials), which we or any of our customers have specified or notified to the supplier, is covered by the respective pre-registration, registration or authorisation, (d) to inform us without undue delay if a pre-registered substance or preparation will not or cannot be finally registered or authorized within the respective transition period and (e) not to sell or deliver any product containing prohibited Substances of Very High Concern (SVHC) ((a) to (e) together “REACH Warranties”). The supplier acknowledges that any breach of a REACH Warranty will generally result in a defect of the respective substance, preparation or other product or item under the applicable law and agrees to indemnify us against any claims, liabilities, expenses and damages caused by the supplier as a result of breaching the aforesaid REACH Warranties, and will support us in our legal defence against such claims at supplier’s cost. The supplier undertakes to provide a so-called proof of origin for the products, i.e. the supplier shall provide us with the required declarations of origin in terms of commercial and preferential law in a timely manner, and shall also notify any change of origin without undue delay and without request. The supplier may have to prove its declarations of the products’ origin by means of an information sheet certified by its competent customs office. If the supplier fails to fulfill this obligation, it shall be liable for any resulting damage and commercial disadvantages. The supplier ensures that it will provide the performance owed pursuant to clause 1.1 itself and that it will use subcontractors and downstream contractors (hereinafter referred to as the "Subcontractor Chain") only with our previous written consent. It further ensures that it shall itself, and all contractors of the Subcontractor Chain who have been duly called in by it as well as possible temporary employment agencies commissioned by them shall also pay to the deployed temporary workers the applicable legal minimum wage, in particular according to the German Minimum Wage Act (Mindestlohngesetz – "MiLoG"), as amended. In addition, the supplier confirms that its enterprise and the enterprises of the Subcontractor Chain used by it are not excluded from tendering for public procurements pursuant to § 19 of the German Minimum Wage Act. We shall be entitled already in the course of the examination of the offer, to request from the supplier on a spot-check basis the submission, without any specific reason, as anonymized data, the current payslips for the workforce used by the supplier and the Subcontractor Chain (payrolls). The supplier may also provide to us upon request proof of compliance with the German Minimum Wage Act within its own company and along the Subcontractor Chain by promptly submitting an up-to-date confirmation from a suitable objective expert (for instance a chartered accountant). In the event that claims are asserted against us by an employee of the supplier of the Subcontractor Chain, based on a claim for remuneration that actually exists according to the German Minimum Wage Act, the supplier undertakes to pay to us for each instance of an assertion of claims upon first request a contractual penalty in an amount of EUR 250.00. The contractual penalty payable shall credited towards any claim for damages of Principal and its amount shall be limited for each order to no more than 10% of the respective order value and to a total maximum amount per calendar year of EUR 25,000.00. The obligation to pay the contractual penalty shall not exist if the supplier is not at fault, for which it shall bear the burden of proof. The supplier shall indemnify us upon first demand from any claims which asserted by third parties against us in connection with infringements of the German Minimum Wage Act. However, this shall not apply if it can be shown in the individual case that we and/or our employees or vicarious agents have ourselves violated the provisions of the German Minimum Wage Act intentionally or in a grossly negligent manner. We reserve to all items provided by us as part of the delivery (e.g. parts, components, semi-finished goods). The retention of title shall also apply to new products resulting from the processing of our items, or their mixing or combining with other items, in each case at the full value of the respective new product. These processes shall be performed on our behalf so that we shall be deemed to be the manufacturer. If third-party ownership rights remain after processing of our items or their mixing or combining with third party items, we shall acquire joint ownership in the new product at the ratioof the objective value of the processed, mixed or combined items. Tools made available to the supplier as well as tools manufactured by the supplier on our behalf or ordered from a third party on our behalf shall remain in our property or shall become our property upon manufacturing or acquisition by the supplier, in each case provided that we have entirely or partially paid for the tools. All of the abovementioned tools must be clearly marked as our property. The supplier shall store our tools on our behalf free of charge and clearly separated from other items, insure them adequately in accordance with clause 7. The supplier shall use the tools exclusively for the purpose of manufacturing parts for us, unless otherwise agreed upon. We hereby already approve to the supplier’s use of our tools for the manufacturing of parts based on orders from other companies of the Freudenberg Group. The supplier shall ensure proper maintenance and repair of the tools provided at his own cost. Upon termination of this contract, the supplier shall return the tools without undue delay at our request, and without exercising any right of retention. At the time of their return, the tools must be in impeccable condition, taking into account their previous use. Costs of repair shall be borne by the supplier. The supplier is prohibited from scrapping the tools without our prior written approval. The supplier shall maintain a quality management system throughout our business relations in line with standards DIN EN ISO 9000 ff., QS9000 (in any event at least ISO 9001), to monitor the system by internal audits in regular intervals and to promptly take action if any deviation is detected, in order to ensure flawless quality of all items supplied to us. We shall have the right to inspect the supplier’s quality assurance system anytime with prior notice. Upon request the supplier shall permit us to examine certification and audit reports as well as inspection procedures including all test records and documents relevant to the delivery. The supplier shall treat any information, formulas, drawings, models, tools, technical records, procedural methods, software and other technical and commercial knowhow made available by us or acquired through us, as well as any related work results (hereinafter “confidential information”) strictly confidential towards third parties. The supplier may only use the confidential information in its own business for purposes of performing deliveries to us and may only make it available to such persons who need to have access to it in connection with our business relation and are bound by a respective confidentiality obligation. This provision shall apply beyond the duration of our business relation if and to the extent the supplier is unable to prove that the confidential information was known to him or was in the public domain already at the time it was acquired or was later made public without the supplier’s fault. We retain title to any documents (e.g. drawings, figures, test specifications), samples, models etc. made available by us to the supplier in the course of the business relation, they shall be returned to us or destroyed at the supplier’s cost upon our request at any time, but no later than upon termination of the business relationship (including any copies, extracts and replicas). The supplier does not have any right of retention in relation to confidential information. The disclosure of confidential information shall not establish any industrial property rights, rights to knowhow or copyrights of the supplier and does not constitute a prior publication or right of prior use according to the applicable patent, design and utility model laws. Any kind of license is subject to a written agreement. The business relationship with the supplier shall be exclusively governed by the laws of Germany, excluding its rules of private international law, the UN Convention on the International Sale of Goods (C.I.S.G.) and other bilateral or multilateral conventions on the harmonisation of law on the international sale of goods. For all claims resulting from our business relation with the supplier, in particular the contract or its validity, the exclusive place of jurisdiction shall be Weinheim/Bergstraße, Germany. This shall also apply to disputes concerning the formation and validity of a contractual relationship. We shall, however, also have the option to sue the supplier in any other general or special legal venue. If the supplier’s place of business is located outside of Germany, we shall be entitled to have all disputes arising out of, or in connection with our business relationship with the supplier, including disputes about the validity of contracts, finally settled in accordance with the Arbitration Rules of the German Institution of Arbitration (DIS) without recourse to the ordinary courts of law. The place of arbitration shall be Frankfurt a. M., Germany. Upon request, we shall exercise our right to choose arbitration before proceedings are initiated. The arbitration proceedings shall be conducted in German, unless the supplier requests them to be held in English. Sitz der Gesellschaft: Würselen, Deutschland.
2019-04-20T04:27:35Z
https://www.hemoteq.com/en/agb/
The Department of Applied Behavioral Science offers two undergraduate degrees including a 33-hour Bachelor of Arts (B.A.) and a Bachelor of General Studies (B.G.S.) degree. The requirements in the major for these degree programs are the same. The difference in these two degree programs is the general education degree requirements, which are set by the College of Liberal Arts and Sciences. For example, the B.A. degree requires additional hours of a foreign language. Whereas, the B.G.S. degree requires deeper study in a field outside of the student's major; therefore, students interested in a B.G.S. must either have a co-major or a minor. Students in this major are required to identify a specialty area within the Department to further hone and apply their knowledge in addressing social problems of particular interest. The Department offers a Bachelor of Arts and a Bachelor of General Studies degree in six specialty areas. The specialty areas for student concentration are: Adults with Disabilities, Basic Research and Conceptual Foundations (with options in either), Community Health and Development, Early Childhood (with options in education and intervention, autism, and research), Organizational Behavioral Management Research and Practice, and Youth Development and Juvenile Justice. Prospective majors should enroll in Introduction to Applied Behavioral Science (ABSC 100/101) and Principles and Procedures of Behavior Modification and Therapy (ABSC 304) during their first two years. The content of these two courses provide students with a basic understanding of the field of Applied Behavioral Science, and help students further discern in applying for admission to the major. The requirements and procedures for applying to be admitted to the major are listed below. Major application forms are available in the main departmental office or online. The interest codes are ABSCA-BA for the B.A. degree and ABSCA-BGS for the B.G.S. degree. 1. Complete ABSC 100/101 and ABSC 304. The major requires 33 credit hours, at least 15 of them at the junior-senior level (i.e., numbered 300 and higher). (d) Two semesters of specialty area practicums that require a weekly class meeting and hands-on training. Students completing this certificate program will learn about communication development in children with Autism Spectrum Disorders (ASD) and learn about behavioral intervention strategies. It is designed to promote interest in undergraduates who may be considering careers such as education or becoming a therapist. An additional goal is to promote awareness of some of the communication challenges faced by individuals with ASD so that participants in the certificate program will become more informed citizens in our increasingly diverse world. It’s an opportunity to gain formal recognition for completing courses and experiences specifically focused on learning and communication in children with autism. Completion of the certificate will be noted on student’s transcripts. Are there any admission requirements? Who can I ask about this certificate? The Department of Applied Behavioral Science provides students with the opportunity to supplement their general knowledge within the discipline by concentrating in a specialized area of study. Students select a specialty area or option within a specialty area from among those described below. Each specialty area has its own required sequences of courses as there are typically prerequisites for enrolling in courses beyond the introductory level. Additional information about each specialty area is provided with more specific details regarding the student interest areas, practicum process, career and graduate studies opportunities, and supporting faculty members. Students interested in working with individuals with developmental disabilities in community settings may have interest in this specialty area. In this specialty area, students are trained to support the development of supportive teaching programs in the community for people with developmental disabilities. Through the coursework, students are taught behavioral-analytic approaches for observing and defining behavior; increasing appropriate and decreasing inappropriate behavior; developing relationships; and legal and ethical issues. Students in this specialty area generally support practicum work with Community Living Opportunities, a community-based residential service agency for adults with developmental disabilities. Graduates of this specialty area are excellent candidates for positions in residential treatment programs, community human service agencies, and vocational and pre-vocational training programs for people with disabilities. Many students also pursue graduate studies in applied behavioral analysis, special education, or psychology. Students wishing to complete a senior practicum in Adults with Disabilities should meet with Professor Claudia Dozier. Students interested in basic and applied research, and history and theory of applied behavior analysis may have interest in this area. This specialty area attracts students interested in careers for which research and conceptual skills are prerequisites (e.g., science, technology, data analysis) or graduate programs in the behavioral sciences such as behavior analysis, behavioral pharmacology, behavioral neuroscience. The specialty area has two options: basic research or conceptual foundations. Basic Research Option- Students pursuing the basic research option learn about behavioral processes and research methods, and acquire skills in the experimental analysis of behavior. Students pursuing this option are required to complete an introductory course in statistics. Students interested in completing a senior practicum in the area of Basic Research and Conceptual Foundations should contact either Professor Derek D. Reed or Professor David P. Jarmolowicz. Conceptual Foundations Option- Students pursuing the conceptual foundations option learn about the historical and conceptual foundations of behavior analysis and acquire skills in historical research and conceptual analysis. Students interested in completing a senior practicum in this area of Basic Research and Conceptual Foundations should contact Professor Edward K. Morris. The Community Health and Development specialty area in the Department of Applied Behavioral Science at the University of Kansas helps to prepare students interested in building healthy and well-functioning communities. Students and faculty in this specialty area contribute to addressing a myriad of socially important problems and goals in communities (e.g., substance abuse, violence, education, child and youth development, independent living of people with disabilities, well-being of older adults). The premise for social problem-solving supported by the faculty and students in this specialty area is that problems don't occur or reside within individuals or groups, but rather in the environment in which individuals or groups behave and operate. Therefore, students in this department are trained to systematically examine community-level problems based on the principles and methods of applied behavioral science. Through the coursework in the specialty area students are trained to analyze community-level problems and goals (e.g., violence, education, substance abuse) to support the appropriate development and implementation of community-level interventions. Students are also provided a service-learning experience in all of the specialty area courses. The course sequence culminates in a two-semester practicum arranged with faculty members and representatives of community organizations or governmental agencies. Graduates of this specialty area are excellent candidates for positions in public service (e.g., AmeriCorps, Peace Corps) including with community, health, and social service agencies. Graduates of this specialty area also often pursue a career, following graduate study, in an appropriate field such as public health, public policy, law, rehabilitation, community development, urban planning, psychology, social welfare, public health, community health, community psychology, social work, urban planning, and medicine. Conceptual Foundations Option- Students pursuing the conceptual foundations option learn about contemporary conceptual issues in behavior analysis, its history and philosophy, and its relations with the behavioral, social, and cognitive sciences in general. Graduates of this specialty area are excellent candidates to pursue careers with research and training centers, or graduate studies in basic and applied behavior analysis (e.g., pharmacology, neuroscience), health, and medicine. Students having already met the specialty area prerequisites (i.e., ABSC 150/151 and 310/311) are eligible for enrollment in practica. Students wishing to enroll for a fall practicum in the Community Health and Development specialty area (ABSC 690/691) must request enrollment by attending a pre-practicum enrollment meeting held at least one week prior to the fall enrollment period. Students are required to complete the practicum online tutorial, the practicum pre-enrollment profile, and attend the practicum enrollment meeting with the instructors. The tutorial and the profile can generally be completed during the practicum enrollment meeting. Generally, students in the spring practica are those students completing their second semester of the practicum. Students needing to request enrollment in the spring practicum for their first semester of practicum should contact Dr. Watson-Thompson to discuss enrollment options and availability. For more information regarding practicum advising in this specialty area, contact Professor Jomella Watson-Thompson. This specialty area is for students interested in studying young children and understanding the conditions that promote their healthy development. It includes courses in behavior analysis, child development, curriculum development, parenting, and others that address issues relating to young children. The program culminates in practica that provide students with direct experiences in toddler or preschool classrooms for children with and without developmental disabilities. Students completing this program will gain knowledge and experience in the areas of behavior analysis, child development, developmental disability, education, and intervention. Careers: This area is relevant for students interested in working with young children in home, educational, community-based, hospital, or other therapeutic settings. Students wishing to enroll for a practicum in the Early Childhood Education specialty area (ABS 675, 676, 677, 678, 680) must request enrollment by attending one of two available practicum sign-up meetings held each semester at least one week prior to enrollment. The meetings are generally held in the Dole 4th floor atrium. Students enrolling in an Educare (ABSC 677/678) or Sunnyside (ABSC 675/676) practicum are required to work in the classroom from 7:30 – 11:30 a.m. or 1:45 – 5:45 p.m., Monday through Friday. If you plan to enroll in an autism practicum (ABSC 680), please see Professors Claudia Dozier, Pam Neidert one of the sign-up meetings for a description of the practicum (Little Steps). The hours for Little Steps are 8:30 a.m. – 12:30 p.m. or 11:30 a.m. – 3:30 p.m. Monday through Friday. Prior to attending the practicum sign-up meetings, students should review the timetable and draft a schedule that will accommodate practicum hours. Please be aware that practicum spots are limited and instructors may not be able to accommodate late requests for a practicum. This specialty area is for students interested in studying the application of behavioral principles to people and groups in business, industry, government, and human service settings. This specialty area includes courses in behavior analysis, research methods, and organizational behavior management with a focus on its three sub-disciplines including performance management, systems analysis, and behavior-based safety. The program culminates in practica that provide students with direct experiences improving employee behavior, work safety, or organizational systems within businesses in the community. Students completing this program will gain knowledge and experience in the areas of behavior analysis, management, staff training, and systems-level interventions. Careers: This area is relevant for students interested in behavioral consulting, management, human services, and business. The OBM practica have limited availability for students. If you are interested in this specialty area, contact Professor Florence DiGennaro Reed. Be prepared to schedule an informational meeting with current specialty area students and an interview with Professor DiGennaro Reed. This specialty area is for students who want to work with children and adolescents who may be involved formally or informally with the juvenile justice system. It includes courses addressing issues such as juvenile law, developing relationships, counseling and problem-solving, behavioral contracting, and other techniques used when working with school-aged children and adolescents. The course sequence culminates in a year-long practicum during which students work with children and adolescents in the Truancy Prevention and Diversion Program. The practicum is in collaboration with the school district, Douglas County Youth Services, Department for Children and Families (formerly Social and Rehabilitation Services), the Douglas County District Attorney's Office, and the juvenile court. Careers: Graduates with this specialty are excellent candidates for positions as probation officers, counselors in mental health programs, intake and assessment officers, truancy prevention specialists, and treatment personnel in intervention and treatment programs for children and adolescents. Many students also pursue graduate study in social welfare, law, counseling, and psychology. Students interested in the Youth Development and Juvenile Justice practica, please make an appointment for advising withcontact Professor Jan Sheldon. For more information about requirements for our major and specialty area options, please read the Undergraduate Student Handbook. The Society for Community Research and Action - Community Psychology, Division 27 of the American Psychological Association - is an international organization devoted to advancing theory, research, and social action. Its members are committed to promoting health and empowerment and to preventing problems in communities, groups, & individuals. SCRA serves many different disciplines that focus on community research and action. Division 25 - Behavior Analysis promotes basic research, both animal and human, in the experimental analysis of behavior; it encourages the application of the results of such research to human affairs, and cooperates with other disciplines whose interests overlap with those of the Division. The Association for Behavior Analysis International® (ABAI) is a nonprofit professional membership organization with the mission to contribute to the well-being of society by developing, enhancing, and supporting the growth and vitality of the science of behavior analysis through research, education, and practice. APA is an independent, not-for-profit educational organization that provides leadership in the development of vital communities. We measure our success by the successes of our members and the communities they serve. The site is dedicated to the understanding of behavior from a natural science perspective—that is, a behavior analytic perspective. The Department of Applied Behavioral Science offers several types of awards annually, including recognition awards for outstanding achievement in the specialty area and a couple of scholarship awards. A summary of recent undergraduate awards provided through the Department are provided below. For a full listing of financial award available through KU, review KU scholarship opportunities through Admissions. The Department of Applied Behavioral Science awards the Helen Jedlicka Mandigo Student Scholarships in Human Development and Family Life, which provides $500 to deserving undergraduate students. This endowed fund was generously established in 2004 by Helen Jedlicka Mandigo, a 1935 graduate of the Department of Home Economics, with a gift of $25,000. The fund provides "scholarship assistance for a deserving undergraduate or graduate student pursuing a degree in the department, and is administered through KU Endowment. The scholarship is based on need and merit, with an emphasis given to an individual who has shown strong potential for future participation in social leadership roles." The University of Kanas offers the Harley S. Nelson Family Scholarship, a $1,500 merit-based award for students studying in the humanities or social sciences. The scholarship was established in honor of the family of KU alumnus John M. Nelson. Dr. Nelson received his bachelor's, master's and doctoral degrees in education from KU. The Department recognizes a graduating senior from each specialty area with an award for outstanding achievement. The award is presented to students during the graduation ceremony for the Department. The award recipients are based on noted academic achievement in a specialty area. For further information about Departmental awards, scholarships, and fellowships (e.g., eligibility, award criteria), contact: Dr. Tom Zane, Chair of the Awards Committee. A KU faculty member between 1965 and 2002, Professor Baer (1931-2002) articulated the basic dimensions of applied behavior analysis in the field's most widely cited article. He conducted early research with children (e.g., imitation), helped found the behavioral approach to development (e.g., cognition), and contributed significantly to research design and measurement and to interventions for people with developmental and intellectual disabilities. He was president of the Association for Behavior Analysis. A KU faculty member in the Department of Applied Science between 1975 and 2015, Professor Fawcett is renowned for the application of behavioral science methods to understand and improve health and development in communities. He served as the inaugural Director of the KU Work Group for Community Health and Development (a World Health Organization Collaborating Centre) and as a founding member of the team that developed the web-based Community Tool Box. The criteria for this award include outstanding scholarship, work ethic, and contributions to service learning. We honor those who effectively apply their knowledge and skills learned in the classroom through demonstrable service to community organizations working to promote health and human development. A KU faculty member between 1965 and 1994, Professor Etzel (b. 1926) is renowned for her research on basic behavioral processes (e.g., stimulus-control), as well as for her contributions to research administration, where she served as KU's Associate Dean of the Office of Research Administration and Director of the Kansas Center for Research in Early Childhood Education. She was president of the Association for Behavior Analysis and a role model for generations of women in behavior analysis. An ABS faculty member between 1965 and 1982, Professor Risley (1937-2007) was renowned for innovative interventions in early education, among them, arranging environments to promote learning (e.g., incidental teaching). In longitudinal research, he found that the amount parents speak with their children is reflected in their children's linguistic competence, irrespective of minority and socioeconomic status. As Alaska's Commissioner of Mental Health and Mental Retardation, he created levels of support that allowed people with disabilities to lead meaningful lives. A KU faculty member between 1965 and 2000, Professor Wolf (1935-2004) was renowned for developing the Teaching Family Model for delinquent youth. Emphasizing social relations and social validity, the model has been adopted nationally and internationally (e.g., at Girls and Boys Town, NE) and was recognized by the American Psychological Association as a "Model Program in Service Delivery in Child and Family Mental Health." He was the first editor of the Journal of Applied Behavior Analysis. Individuals honored with this award show evidence of applying classroom and research knowledge and skills to improving the performance of employees of organizations with a charitable mission or that serve vulnerable populations, such as individuals with disabilities or sheltered animals. The Undergraduate Studies and Advising Committee provides oversight of the undergraduate curriculum and consists of at least five faculty members and an undergraduate student representative. Specific duties include evaluating course offerings to ensure consistency with mission of ABS undergraduate program; reviewing and implementing proposed curriculum changes (pending full faculty approval); evaluating transfer credit for applied behavior analysis courses; evaluating and modifying (if necessary) the system of undergraduate advising; and performing other duties as directed by the ABS Department Chairperson, the College of Liberal Arts and Sciences, and/or the University.
2019-04-18T19:01:27Z
https://absc.ku.edu/undergrad
Can UnitedHealth Group and Johnson & Johnson Continue Their Winning Ways? How these healthcare giants beat industry watchers' estimates last quarter and their plans for the future. Additionally, Jones and Campbell explain how Genfit, a small French biotech company, hopes to outmaneuver large competitors like Gilead Sciences (NASDAQ:GILD) in nonalcoholic steatohepatitis, a potential $35 billion market. Shannon Jones: Welcome to Industry Focus, the show that dives into a different sector of the stock market every day. Today is Wednesday, October the 17th, and we're talking Healthcare. I'm your host, Shannon Jones, and I am joined by healthcare specialist, expert, and all-around good guy Todd Campbell. Todd, how are you? Todd Campbell: I'm great! I'm sad that I'm not in Alexandria at HQ to film with you in person live like last week. That was so much fun! Jones: It was perfect! I loved having all of you guys here. For our listeners, if you did not have a chance to check out that show, we did a marijuana roundtable last week. I got all the guys here in the studio. We talked about -- which is prime for today. Today is Green Day in Canada! Marijuana is now legal from an adult-use recreational perspective. We were able to talk about that, the implications of that, what to look for. Two, if you want to keep track -- I'm going to put a quick plug in here, Todd -- of all of the news, all of the industry insights, we've actually put together a page specifically for you, if you just go to www.fool.com/marijuana-stocks. Be sure to check it out. We will keep you up to date on all the latest. Turning our attention to some other good news in the sector this week on the healthcare front, we're talking earnings. And, you got the special opportunity to interview management behind one of probably the most-followed companies in the NASH market, Genfit. We'll get into all of that. Let's actually start with the big behemoth in the room. Johnson & Johnson just reported earnings here on Tuesday. This is the dividend aristocrat, the steady-eddy, all-around good company to buy and hold for the long term. That's ticker symbol JNJ. The stock was up about 2% off of earnings yesterday, Todd. What can you tell us about what they reported on? Campbell: It was again a little bit today when I looked earlier on, Shannon. This is a giant among Goliaths. It's just crazy how big this company is, every quarter when I track it. So many of our listeners own it somewhere. Even if you don't think you own it, you probably do, because it's going to be in ETFs and mutual funds. Revenue in the quarter clocked in at $20.3 billion. Yes, that's with a B, billion -- $20.3 billion. That was up 3.6% year over year. For people who are newer to the story, they operate their business in three different segments. They've got a consumer goods segment, they've got a pharmaceutical segment, and they've got a medical devices segment. But by far, Shannon, it's the pharmaceuticals business that drives the car that is J&J. Jones: Before we get to the pharmaceutical segment, it's interesting, for those that have been following Johnson & Johnson, everybody's probably familiar on the consumer business side. You're thinking about Band-Aids, thinking about Tylenol. Also, their really iconic baby care line has really gotten back into the spotlight as of recent. If you look at, over the past few years, their consumer business segment has actually been declining in sales. A little bit earlier this year, it may have been this quarter, the company decided to relaunch their baby care line. It was really targeting those millennial parents -- getting rid of dyes and sulfates and ingredients that many millennial parents don't want to see. They also did some repackaging. It was really interesting, of the three segments, you actually started to see them turn a corner. Todd, you mentioned the three segments. Pharmaceuticals really is the revenue driver for them. But, you actually saw on the consumer side, sales of $3.4 billion, which were up about 1.8% year over year. Campbell: Right. And like you said, people aren't going to get overly excited about 2% growth. But compared to what we've seen in the past, this has been a business that basically just cranks out cash flow every quarter and hasn't been overly exciting when it comes to growth rates. We also saw some strength in the consumer business out of the beauty care products, which I think grew something like 4% year over year. Medical devices, also not a huge growth driver for the company. As a matter of fact, their sales in the quarter year over year were relatively flat. That was because of them getting out of some diabetes businesses last year. Those sales clocked in about $6.6 billion. You've got medical devices giving you $6.6 billion, you've got consumer giving you $3.4 billion. That leaves you about $10 billion more, which of course comes from the pharmaceuticals side of the business. Jones: Yeah. Really, the focus here is on the pharmaceuticals side, also known as Janssen. Now, pharmaceuticals are about 50% of revenue for the company. What's so interesting -- and I know we'll get into this a little bit more -- is one of the bigger concerns has been with J&J's drug Remicade. You started to see some big numbers happen with the biosimilar Inflectra that was released earlier. Now you're starting to see the impact of that. But, on the flip side of that, they actually had some good, positive news in their oncology portfolio. Campbell: Right. Remicade is the big question mark for investors currently. Pfizer launched out their biosimilar back in 2017. Of course, Johnson & Johnson, in a bid to keep their market share, has cut their prices on Remicade. I want to say that during the conference call, J&J's management said that those price cuts have allowed it to maintain about 93% market share when it comes to volume. So, yes, they're providing a lot more in terms of volume that you might expect vs. having this new biosimilar on the market, but it did take a toll on sales. Sales fell 16% year over year. Still clocking in, though, around $1.4 billion. I think that the strategy here has been to mitigate or slow the rate of decline for Remicade by doing these things to hold onto market share. So far, it seems to be working, because, as we already talked about, they were able to deliver top-line growth year over year in the quarter, despite that Remicade headwind. Jones: For our listeners that are not familiar, biosimilars are what you would consider the generic equivalents of some of these brand-name pharmaceuticals. Not a true identical comparison, but very close. Oftentimes, there's the interchangeability factor that you want to look at with biosimilars. Shifting gears, you've got the oncology portfolio. As we talk about big pharma and even big biotech, oncology is still one of the hottest areas in the market to invest in. Saw some really impressive numbers, particularly with their blockbuster Darzalex, and also Imbruvica. I was actually quite impressed with their double-digit growth this past quarter. Campbell: Something that investors have to pay attention to with J&J is the oncology franchise. Yes, they're involved. They've got some great drugs that treat central nervous system disorders. Stelara has been growing its sales by double digits following a label expansion to include its use in Crohn's disease patients. But really, it's been oncology that's allowed them to offset some of the loss of exclusivity that's associated with patent expiration. If you look at the oncology sales last quarter, they grew 36% year over year to $2.6 billion. A lot of that growth was because of Darzalex, their multiple myeloma drug. That drug has been winning increased use as trials have allowed it to expand its label into earlier lines of therapy. Obviously, the earlier that it gets used in therapy, the larger addressable patient population, and the greater potential to turn that increasing use into revenue growth. I think they did $498 million. That gives it almost a $2 billion run rate last quarter, and that was up 57% year over year. You mentioned Imbruvica and I think you may have also mention Zytiga. Those are the other two that you really have to watch here in cancer. Imbruvica is a blood cancer drug. Sales there grew 38% to about $700 million, $2.8 billion run rate. Zytiga, which is their top-selling prostate cancer drug -- we should talk about Zytiga later on when we talk about patent risks -- Zytiga sales grew 43% year over year to almost $1 billion, $958 million in the quarter. You're talking about almost a $4 billion drug there. Jones: Absolutely fascinating. Really impressive growth all across the board for the pharmaceutical segment. Looking ahead, though, there are a few key areas that I think investors do need to be mindful of when it comes to J&J. Great quarter, love to see the growth that's happening. But there are actually some key decisions coming up, one being a potentially new product for depression. Todd, what can you tell us about that? Campbell: It's a nasal spray, Esketamine. They did five Phase 3 trials. Three were good, two really weren't great on the primary end point. But I think that it has a good shot of getting approved, and that could be a nine-figure drug for the company, hundreds of millions of dollars of potential sales revenue there. They also have an FDA decision for Erdafitinib, which is a locally advanced or metastatic urothelial cancer drug. If that gets approved, that would also help their oncology franchise. It's very important, Shannon, for J&J to win new FDA approvals and continue to grow sales. One of the things I mentioned just a second ago was, Zytiga is a concern. You've got Remicade. They're executing a good strategy to protect the Remicade sales. Zytiga, however, had a patent thrown out early in 2018. As a result, there is the chance that you could get Zytiga generics on the marketplace in 2019. J&J isn't issuing guidance yet. They're going to do that later on this year, probably after the fourth quarter wraps up, maybe at an industry conference in January. But that is a concern, especially since you're talking about $4 billion in sales. There's a court decision coming up, and you're going to want to pay attention to see how that court decision goes. Then, you're going to want to watch and see what the guidance is for 2019. You'll also want to keep an eye on what happens with Xarelto. Xarelto is an interesting drug. It's a blood thinner, it's very heavily used, but the sales have flattened out. Last quarter, they were $612 million, down about 4%. There's a lot of competition that's emerged in this area. They just got a new approval, however. You're going to want to see whether or not that kick-starts sales, gets it back to growth in 2019. Then, as far as guidance is concerned, I think they're looking now for $81 billion. [laughs] Just mind-boggling. $81 billion in full-year sales this year, and full-year earnings per share of about $8.13 to $8.18. Jones: So many good things to watch. Also, this is much further down the line, but also, J&J announced the licensing deal with Arrowhead for gene silencing in hepatitis B. Again, that'll be further down the road, but will be worth watching. That was a deal potentially worth up to $3.7 billion. Hep B, hep C -- huge market, competitive market. It'll be really interesting to watch what happens there. Let's turn our attention to another behemoth, another healthcare giant, and that's UnitedHealth Group, ticker UNH. Todd, this is the largest health insurer overall. They reported earnings on Tuesday, hitting near record highs, above $272 a share. This stock has been on an absolute tear this year and over the past few years. This quarter was another quarter to again be impressed. Campbell: If you thought J&J was big, wait until you hear these numbers. Right, Shannon? Campbell: Last quarter, UnitedHealthcare, as you mentioned, biggest insurer. $56.56 billion in revenue last quarter. Well over a $200 billion annualized run rate. That was up 12.4% year over year. Most people think of UnitedHealth, they think of the health insurance business. Certainly, that gives them most of their sales. They also operate a data analytics business and a pharmacy benefit management business. That's under their Optum brand. When we're looking at sales and considering investment in UnitedHealthcare, you want to not only consider the health insurance market, but you want to consider how people are going to be using data in designing treatment programs, how intervention by health insurance may help people stick to their courses of therapy and stay on their medication, avoid hospitalizations, all that kind of stuff. Jones: I think it's the data and the analytics side with that Optum brand that really has me intrigued, as someone who's in the healthcare space. When you can leverage artificial intelligence, machine learning, now into these insights that physicians and patients can use to really tailor and personalize care, you're really talking about a whole new revolutionary way to tackle many of healthcare's biggest problems. I love their Optum brand. That will be a key area to watch. For UnitedHealth, it really comes down, their biggest revenue drivers, you've got the Optum brand, but you've also got the employer-sponsored plans and also Medicare Advantage, as well. This quarter showed some really impressive growth in those areas on a numbers basis. They served 2.8 million more consumers in the third quarter. That's pretty impressive. Campbell: Yeah, and a lot of that is obviously Medicare and Medicaid, which I think are probably the two most important pieces of the health insurance business to track at UnitedHealthcare going forward. One of the things that, when you're looking at insurance, you always want to keep an eye on the medical cost ratio, which is the MCR. Sometimes different insurers will call it something slightly different, but it's essentially how much of the premiums that they're collecting are spent back out on patient care. You hear those huge revenue numbers, that's the gross premiums that they're collecting plus, in the case of UnitedHealthcare, Optum. Then, of course, you've got to consider that they're putting out a lot of that money in premiums back into patient care. Last quarter, that improved to 81%. It was down 40 basis points year over year. That makes the company more profitable. They reported $3.41 in earnings per share. That was $0.12 better than the Street was looking for. That was up 28% year over year, which was more than twice the rate of growth of its sales. Again, a big reason for that is the success that they're having in Medicare and Medicaid. Medicare sales were up 15.2% to $18.8 billion. That was because they added 525,000 new Medicare Advantage members. The Medicaid business grew about 18% to $11.1 billion, because they added about 255,000 people to their roles over the past year. Jones: On the Optum side of the table, you had revenue of $25.4 billion. That was up 11%. Also, just thinking about outside of the company, there's some really strong growth drivers, especially on the Medicare side. No. 1, you've got an aging baby boomer population that will continue to drive people to many of those Medicaid and Medicare plans. Also, on the employer-sponsored side, you've got really low unemployment. I think we're right at about 3.9% unemployment. That will continue to be a strong driver for the company and the health insurance industry in general, as well. Where is the company looking, in terms of full-year guidance right now? Campbell: They've been very actively buying back shares. That helps the bottom line results. You're going to want to see if they're going to be able to continue that pace. I think they will. They generate tons of free cash flow. They bought back $15.7 million shares this year alone, spent about $3.6 billion on that. Now, they're looking for EPS of $12.80 this year. That's up from $12.50 to $12.75 previously. Again, this is a very profitable company. They have very small margins because, again, they plow a lot of those premiums back into patient health, yet they benefit from scale. They do so much business that they're still able to generate so much money for the bottom line. They actually increased their dividend by about 20% this year because they're generating so much cash flow. Jones: That dividend hike certainly does not hurt. You've got two really strong healthcare behemoths reporting strong earnings. Hopefully this is a great prelude to a good earnings season across the entire segment. Todd, you recently had the unique opportunity to interview a member of the executive team of a smaller biotech that over the past few years has caught a tremendous amount of attention from biotech investors. That company is Genfit, ticker GNFT. Genfit best known for its late-stage Phase 3 candidate Elafibranor, which is being studied in a disease called NASH. Todd, NASH is quickly becoming the target that many biotechs are striving to hit. Campbell: Right. Gilead Sciences' success in hepatitis C, raking in about $20 billion analyzed at one point after they came up with their new hepatitis C drugs earlier -- I think it was 2014 when they launched the first one -- really got the attention of researchers. They looked at it and said, "Jeez, what else can we tackle it in liver disease?" NASH is now fast becoming, instead of hepatitis C, the major cause of liver transplants. When you have liver disease, there's also the risk of liver cancer. So, a lot of people are looking at NASH and saying, "If we can find a way to tackle this disease, then maybe we can find the next mega blockbuster indication." Like you said, I had the privilege of being able to go down to the Cambridge offices of Genfit. They are an European company. They're primary exchange is in Paris. They're a French company. But, they do have ADRs that trade here in the U.S. They're a little illiquid, though, so investors should know that. It's a relatively small company. I think their market cap's around $800 million. They're far from the only competitors who are angling to try and come up with a win in NASH, but they are one of the few that has an ongoing Phase 3 trial under way that's expected to read out data in 2019. If the data is good, then they could file this drug for FDA approval. There are no drugs right now that are approved specifically for NASH, so estimates right now are that you'll see up to -- I mean, I'm using the pie in the sky estimates -- up to a $35 billion market once these drugs get out there. Of course, they're going to have to prove their worth in the trials first. Jones: Exactly. What's interesting about Genfit is, they've actually got multiple shots on goal here. You mentioned Gilead. They've got a few drugs in the pipeline also going after this indication. But Genfit is actually a little bit different. They obviously have a therapeutic component, Elafibranor. But, what's really interesting is, they also have a diagnostic tool that, regardless of which treatment a patient may go with, being able to diagnose these patients earlier, sooner, I think, is a key area to win. Todd, tell us a little more about their strategy here. How are they expecting to upend this huge unmet need market? Campbell: I was fascinated by this, the potential for the diagnostic. I hadn't been thinking that way. Like a lot of people, I've been looking at and saying, NASH typically occurs in people who are living sedentary lifestyles. As Western diets have become more prevalent globally, you see more and more people getting diagnosed with fatty liver disease and, unfortunately, NASH. You start spending most of your time thinking not about how you diagnose those patients, but instead of thinking about how you're going to treat those patients. I think that this gives Genfit a competitive advantage over some of these other companies like Gilead and everything that are focusing on the drugs but haven't spent as much time trying to figure out the diagnostic side of it. The reason I say that is that NASH is a silent disease. It's often not diagnosed until people really have advanced liver disease. The gold standard for diagnosis is a liver biopsy. Liver biopsies are expensive, they're invasive, and they're usually done by specialists. This is not a test you're just getting done by your primary care physician. What Genfit has gone out and done is, it's been able to identify some biomarkers that show up in the blood of NASH patients. The idea here is to be able to create a low-cost, easy to take blood test that would show you whether or not you're likely to have NASH, and if you are, theoretically, you move on to a biopsy or something else. Next year, they're going to roll this diagnostic test out into different research facilities. In theory, this is a drug-agnostic approach diagnostic. It's not going to be used with Genfit's drug that's in Phase 3 trials. It could be used with Gilead's drug, it could be used with Intercept's drug, it could be used with Madrigral's drug, it could be used with Viking's drug. All these companies that are racing toward the finish line in NASH could theoretically drive demand for diagnostics beyond that specialty office market. Jones: Looking ahead, I think it's really interesting. Phase 2 for Genfit's drug, Elafibranor, actually didn't meet its primary end point. There's some nuance there. I think this is an important point, especially for biotech investors. The company did a post hoc analysis. We've talked a little bit about the problems with that. There was some nuance here because it really came down to study design. It sounds like, for this Phase 3 trial that they're currently running, they've designed it with that in mind. Tell me, looking forward, what are some of the key things that you'll be looking at with this Phase 3 trial with that in mind? Campbell: Yeah, I think that we always have to be very cautious when it comes to post hoc analysis. But we also should remember that this is an indication that there are no approved treatments specifically for. Phase 1 and Phase 2 truly are much more exploratory than maybe it would be in other, more proven-out indications. And, each one of these companies is targeting a slightly different mechanism of action. For example, Genfit's targeting a dual agonist of the PPAR, which is a pathway that helps regulate things like metabolism and lower the amount of fat that's in the bloodstream. Their drug is a dual PPAR. But you also have Intercept, that has an Fxr agonist, which works slightly differently. You have Gilead's Selonsertib, that's different drug, works a little bit differently, as well. All these companies have these different drugs that are going through trials, and they're using these Phase 2 trials to try and figure out the best way to get the drug across the finish line in Phase 3. It truly is exploratory. In that regard, maybe I'm willing to give a little bit of a benefit of the doubt to post hoc analysis. In speaking with management, it does sound like they have a really good grasp of the type of patients that are most likely to respond well to this drug. We'll have to wait and see. The interim data that could back an FDA approval, that's not expected until the end of 2019. But, that's about a year away. You're not waiting too long to find out whether or not they're onto something. Intercept and Gilead, interestingly, their data is going to come out first. They'll have data in the first half of 2019. But Gilead is actually not even looking at NASH resolution as the primary endpoint in their Phase III study. They're actually looking at improvement in resolution of fibrosis. It really may come down to, which ones do you use in different levels of treatment, or do you use these because they all have mechanisms of action that are slightly different? Do you use them as combination therapies? How that's all going to shake out, I don't know. So, yeah, take it with a little bit of a grain of salt, because Phase 3 is based on post hoc analysis, Phase 2 maybe isn't that indicative overall of what's going to happen in Phase 3. Jones: It'll be important to also watch a Phase 2 study in another chronic liver disease indication, PBC, which is marked by progressive destruction of bile ducts within the liver. The read-through from that Phase 2 study will obviously have implications from an investor perspective on what that means for their drug. Then, you've got to be mindful of cash burn, as well, because the company may need to do a capital raise pretty soon. Campbell: I think so. The PBC data is expected later on this year. Intercept already has their drug that they're studying in NASH, approved in PBC. That's generating out about $43 million a quarter for Intercept. You're talking about a nine-figure opportunity. They will need to conduct a Phase 3 study, but if the Phase 2 data is good in PBC for Genfit, then maybe that helps validate the mechanism of action a little bit more, maybe that causes share prices to rally a little bit. If so, I wouldn't be too shocked if they went out and did a capital raise, issued some shares, to try and bolster up the balance sheet. This is certainly not desperate times. They've got $275 million using current exchange rates, euros to dollars, right now on the books. But they are going to have to increase their spending unless they do a licensing deal or something. They're going to have to bolster their cash through some other way if they're going to launch this on their own. Campbell: Absolutely! We could absolutely do a 20- to 30-minute show on that alone. Jones: On that alone, that's for sure. Well, thanks so much for tuning in this week! That's it for this week's Industry Focus. As always, people on the program may have interest in the stocks they talk about, and The Motley Fool may have formal recommendations for or against, so don't buy or sell stocks based solely on what you hear. This show is produced by Heather Horton. For Todd Campbell, I'm Shannon Jones. Thanks for listening and Fool on!
2019-04-20T20:11:25Z
https://www.fool.com/investing/2018/10/18/can-unitedhealth-group-and-johnson-johnson-continu.aspx
The latest brainchild from the creators of the The Genius, Society Game is a brand new tvN reality game show which premiered earlier this month. While the show is designed and edited in a very similar way to The Genius it’s a whole new ball game on its own and is worth checking out, even for non-Genius fans. Here are four reasons why. In this game show, 22 participants have to live together in an outdoor filming set designed to look like a traditional Korean village for two weeks. The set is split into three main areas, “Nop-dong” , “Ma-dong,” and the “Neutral Zone.” Participants are separated into two villages and compete against each other daily, with the losing village eliminating a member. This set-up alone allows for personal interactions between the participants within the villages since they really have to get to know each other and adapt to each other’s living habits. While such hijinks can be humorous and adorable to watch sometimes (martial artists getting scared of live chickens), living together on Society Game can get extremely tense since the participants have so many more opportunities to form alliances or trick each other. The real competition arguably takes place within the villages when each day ends, and this constant tension is what makes the show so unique and fun to watch. The “true” side of each participant is also more likely to be revealed, especially when they are placed under increasing pressure and extreme conditions (the show was filmed during a heatwave and the participants slept outdoors) so this show could be a good watch for fans of shows like Survivor. Also on Kultscene: What Do You Find At The End Of A Rainbow? Within this relatively large cast, the show’s participants are from different educational backgrounds and have varied occupations, ranging from an English lecturer to university students. This diversity makes for interesting television, since people with different life experiences and even age would naturally have different strategies and opinions. More importantly, they have varied abilities, with some of them being extremely athletic, some who are quick on their feet and others who have great cognitive abilities. These abilities are all valued equally among the participants, especially since the challenges posed to them tend to incorporate elements from all three domains. There are a few stand-out participants however, who have already made a name for themselves in the show. One of them is mixed martial artist MJ Kim, a 26 year old woman who continually defies gender stereotypes with her physical strength and abilities. With her decisive and hardworking nature, she is shaping up to be one of the strongest participants in the show. Along with her is comedian Yang Sang-gook who successfully led a rebellion in his village within the first episode of the show and has maintained a tight rein over the villagers under his charge ever since. While he might have the manipulative skills required to ensure that he is always in an advantageous position, he also does show genuine care for his villagers. His leadership skills and initiative has won the trust of the people around him so far and with his foresight, he will probably go far in this game. Society Game functions somewhat like a social experiment, not just to observe how strangers live together for two weeks but also to see how successful or disastrous certain government systems can be. In the case of this show, Nop-dong is run as a democracy, with new village leaders being elected daily through a vote. Ma-dong, on the other hand, is run as a totalitarian state. Once elected, the leader will remain in power until another villager completes a rebellion successfully with the support of a majority of the villagers. Both systems have their pros and cons and create vastly different dynamics in the villages. In Nop-dong for instance, with their daily elections, the tide can turn very quickly depending on who is in power. These daily elections can fracture and divide the society so much so that it would be difficult for the village to stay united for long. In Ma-dong however, the divides are more clearly defined and the alliances more permanent, since survival can only be ensured if you are among the majority. It may thus seem more stable on the surface, but will definitely lead to more complicated problems in the future. Society Game therefore gives viewers a very exciting demonstration of these two types of governance, especially when participants of high calibre are involved. Though the show has just begun, the in-depth strategizing of the participants has already caught my attention and I’m excited to see how both villages will turn out. I expected nothing less coming from the team behind The Genius but I’m glad to report that the editing for Society Game is pretty top-notch. The background music used really sets the atmosphere for the show, whether it’s meant to be humourous or tense and climatic. Interestingly enough, a few less exciting or downright awkward scenes which would have been cut from mainstream variety shows are occasionally added as well. While this sometimes breaks the flow of the episode, they serve to build up the characters of the participants, making them more personal and relatable for the viewers. The use of time-skips and flashbacks in this show has been excellent so far as well, as it creates some truly shocking plot twists and game changers in the episodes. Society Game premiered off with a strong start and has shown much potential in its run so far, so here’s hoping that its success will last. Check out a preview of the show below! Have you watched Society Game? What did you think about it? Share your thoughts in the comment section below and be sure to subscribe to the site and follow us on Facebook, Twitter, Instagram, and Tumblr to keep up with all of our posts. South Korean cable network tvN, owned by CJ E&M, has turned into one of Korea’s trendiest channels. Since 2012’s “Answer Me 1997,” the station has produced hit show after hit, proving that the channel was able to put together a great experience for viewers as an alternative to the shows produced by Korean broadcast channels. But as tvN continues to compete, and often surpass, Korea’s broadcast programming weaknesses are rearing their faces at a time when tvN can make or break its image. However, tvN’s growing focus on changing the show’s plot to focus on the second male lead to try and shock viewers has instead resulted in audiences growing appalled at the lack of coherence in some of their latest shows. tVN’s stellar production history that began with “Answer Me 1997” and led through the successes of trailblazing shows such as “Misaeng,” “Liar Game,” and “Twenty Again” is now facing an identity crisis. tvN’s latest shows, “Answer Me 1988” and “Cheese In The Trap” suffered immensely from changes relating to the plots after the show was well under way, in part thanks to sudden changes made during the live-production of the show. Rare in Hollywood, live-production is rampant in Hallyuwood. Although more heavy budget dramas, such as “D-Day” and “Descendents of the Sun,” are increasingly going to air after completely finishing production, most Korean dramas are still produced while the show is airing with only a handful of episodes fully ready before the series begins airing. Over the years, last-minute production has become rarer and rarer, but 2011’s “Sign” is still upheld as a warning of live-production gone wrong: The finale featured numerous editing errors and color bars appeared on air at one point due to last minute editing, revealing that the show had been filming as late as possible. While neither “Cheese In The Trap” nor “Answer Me 1988” had any last-minute technical issues, another peril of live-shoots has affected both shows: Changing the show in reaction to audiences. Both shows set themselves up as promising one trajectory, but then ended amidst waves of anger from viewers who felt misled by the romantic subplots of the show, a basic tenet of many South Korean dramas. While Korean dramas are famous for second-lead syndrome, with a secondary attractive male getting his heart crushed by the lead female in favor of the show’s main male protagonist, “Answer Me 1988” allegedly changed things so that fans didn’t find the show too predictable. The result? Disappointment. “Answer Me 1988” completely changed over the show halfway through. The show, starring Lee Hyeri of Girl’s Day, Ryu Jun Yeol, and Park Bo Gum, set itself as a retro throwback mystery with viewers guessing which of the men Hyeri’s character Deok Sun would marry. Ten or so episodes in, all signs hinted to Ryu Jun Yeol. Then, with little warning, Ryu’s character was thrown to the curb as Park and Hyeri’s characters paired off with one another. Following the show, Ryu revealed he felt disappointed in how his character was essentially ignored for most of the final episodes of the show and not given appropriate closure after certain romantic scenes made both the actors and audience believe his character was the future spouse. According to fans online, the writer of the show changed the plot so that viewers were surprised even though Ryu had been written in as the husband at the start of the show. Scenes and hints that seemed to point in the direction of Ryu’s character as the husband suddenly came to a halt and were ignored as the showrunners tried to tie everything together. While all actors involved played their parts perfectly, and it was believable that Hyeri and Park’s characters fell in love thanks to the pair’s chemistry, the way the show carried on for so long under one understanding was jarring for viewers. Perhaps a longer series could have recovered, but writing more than half of the show with one intent then changing suddenly was ruinous and put a halt to the near-perfection of the show. Similarly, “Cheese In The Trap,” which aired its final episode in Korea today, began with an intriguing premise. Main character Hong Seol (Kim Go Eun) tries to understand Yoo Jung (Park Hae Jin), who acts one way most of the time while revealing darker motives that only she is conscious of. As the relationship progressed from friendship to love, Seol struggled like a mouse trying to decide if she would approach the cheese of Park Hae Jin, or if it wasn’t worth getting caught in the trap. The show focused on the pair’s interpersonal and psychological issues, hinting to the darker side of human nature and psychological disorders. Or it used to, at least. It was very clear at one point of the show that both Yoo Jung’s hidden and manipulative behavior and Seol’s lack of getting close to her peers emotionally hinted to psychological issues. Yoo Jung’s character showed signs of antisocial personality disorder, while Seol appeared to be suffering from depression. Neither situation was life threatening or as dramatic as the autism featured in “Good Doctor” or schizophrenia as seen in “It’s Okay, That’s Love,” but the show seemed to be walking the line between raising awareness regarding worrisome behavior and for praising it. tvN appeared to be aiming at the pair coming to terms with their mental health issues and helping one another through the difficulties. But then Kang Seo Joon’s character of Baek In Ho was more sympathetic to the audiences and the showrunners seemed to write Park Hae Jin out from many scenes of the drama. Scenes that were important to show the reasons behind Yoo Jung’s darkest actions were cut and plotlines went unresolved. Park, the forerunner, was all but cut from many episodes. Park, who has appeared in numerous popular Korean dramas and previously revealed that he took the role seriously and reread the webtoon “Cheese In The Trap” multiple times to get a feel for the complexities and nuances of Yoo Jung, publicly stated that the final version of the drama was not what he had expected it to be. “I believed in the original and decided to commit the the drama before anyone else was involved, even the director,” Park told OSEN. “Now I don’t believe in anything.” If it was a one off situation, where a main actor was disappointed with his character’s role, it would be fine. But not only is this the second time, following “Answer Me 1988,” that a male lead character was thrown under the bus for the sake of the showrunners, but the “Cheese In The Trap” producer went so far as to apologize to webtoon writer Soonkki for how the show mistreated the author’s characters and plot. Tropes get a bit boring after time, but the suddenness and lack of exploration depicted in both “Answer Me 1988” and “Cheese In The Trap” highlights the fact that tvN’s attempt to respond to the reactions of viewers backfired. “Answer Me 1988” was ruined because fans were aware of the planned plot so the writer altered things, while “Cheese In The Trap” was kept from delving into deeper issues throughout the latter episodes of the show by the audiences’ reaction to Seo Kang Joon’s character. If tvN wants to reclaim the trust of its fans, changing plots based on Internet opinion is not the way to do it. Fans look forward for tvN dramas to deliver relatable characters with storylines that inspire and make sense. tvN’s previous hits make it clear that the company’s showrunners know how to intrigue without being overly dramatic and it is to that point where tvN should aim to return once again. What do you think about “Cheese In The Trap” and “Answer Me 1988”? Share your thoughts in the comment section below and be sure to subscribe to the site and follow us on Facebook, Twitter, Instagram, and Tumblr to keep up with all of our posts. The final episode of “The Genius: Grand Final” aired on the 12th of September and a new “king” was crowned. As it is produced by cable network tvN, “The Genius” is not as well-known among K-pop fans as other shows such as “Running Man” and “Superman is Back”, but over the past four seasons the show has garnered quite a large fan base both locally and internationally. “The Genius” is a variety show where 13 contestants of different backgrounds and age groups are gathered for a battle of wits that lasts throughout a season of 12 episodes where a contestant is eliminated each episode through a death match. The final winner, or the king, is given a cash prize based on the number of garnets earned by the players throughout the season. How then, you might wonder, did this intellectual show, in particular its fourth season, manage to attract so many fans? Here are five of the reasons why. It is an intellectual competition after all, and the games that are played every episode are certainly of a high standard. Each episode is broken up into two parts, a “Main Match”, where the winners are granted tokens of life and the loser is sent into the “Death Match” along with another contestant of his choice. Main matches take up the majority of the episode, and they range from auctions to horror races and even card games. The rules of the games are very extensive, but they are all necessary in order for the participants to gain victory. The show always ensures that viewers know what is going on, however, by using an animated video at the beginning of the game to explain the rules. The possible scenarios for winning or losing the game are also spelled out clearly so that both the participants and the viewers will be able to understand how the game works. When a participant makes a game-changing move (this usually happens at least once per episode,) the show will insert a special commentary of the person’s move and how his or her move would affect the game. This is a genius move on the part of the producers because it would help viewers understand what the participants are thinking and in a way, add more personality to the participants. Once viewers are able to become invested in the games they will experience a greater thrill and excitement while watching, which is one of the greatest strengths of this show. If you’re a fan of the Korean drama “Liar Game,” you’ll definitely be a fan of this show as well. Seeing as how both shows are produced by the same company (tvN), this was something quite expected in terms of the format of the show and the games that were played. In fact, when the first season of “The Genius” aired, it was criticized for being too similar to the original Japanese version of the drama. Apart from the format however, what I found the most similar was the way cast member Kim Kyungran played the games in “The Genius”. She was a runner-up in season one and returned in this fourth season, She reminded me of Nam Da Jung (the protagonist in the Korean version of “Liar Game” played by Kim So Eun) in the way she constantly advocated for mutual cooperation and trust. Kim Kyungran embodied her beliefs in her actions as well, because she never failed to keep her promises and help her teammates, all of which led to this amazing moment in episode five where five participants (including Kyungran) achieved a joint victory together. Anyone else having “Liar Game” flashbacks yet? The unique part about this fourth season is the fact that all the participants are people who have been in previous seasons of “The Genius”. This does not just heighten the tension surrounding the various matches and eliminations, it also ensures that viewers get to enjoy the familiar banters between the participants. The cast is made up participants from various backgrounds and occupations including Jang Dongmin (comedian), Kim Kyunghoon (graduate student), Yoo Junghyun (politician) and so on, but they get along very well together. No matter how tough the competition is, the participants are always able to find humor and joy from each other (but this definitely does not mean that they go easy on each other!), which is very heartwarming to observe. Take the last episode for example, when the finals were concluded the whole cast gathered back in the main hall and held hands. It was a sign of unity, but more than that it was also about forgiveness. There were many betrayals that took place throughout the show but at the end of the day the friendships that they had forged with each other were more valuable than any prize money they could have won. It’s an important lesson, and one that the show brings out actively. In addition, tvN releases “behind the scene” footage of every episode, which gives viewers an insight about how the episodes are filmed. Most of it is hilarious and fun, and these videos once again show how close the cast have gotten as they spent long hours filming this program together. No matter how interesting a cast or a game is, it is definitely difficult for an intellectual show like “The Genius” to be humorous and enjoyable for mainstream viewers. But that’s where the production side comes in. Everything from the captions that are used to the background music that is thoughtfully selected for every scene contributes to the delightful program that is “The Genius”. Suspense levels are kept very high with the numerous twists and turns in every episode. The best example of this would arguably be in episode four, when the tables were completely turned contestant Oh Hyunmin, who was portrayed as the most likely victor throughout the whole game, when a secret alliance was revealed at the end and Hyunmin was in last place. It was such a surprise, both for the participants and for the viewers alike, and it is surprises such as these that keep viewers engaged and excited. The background music that has consistently been used for this program since the first season is mainly provided by a band called Idiotape. Their music is highly electronic in nature and is very climactic with a clever use of the drums, which suits the nature of “The Genius” to a tee. Idiotape’s music has become an icon of the show, much like other aspects, such as the socalled “Bandage Man” and the main dealer, Hong Jiyeon. And finally, arguably the star of season four, is Jang Dongmin. Don’t get me wrong, this is not my personal bias speaking, but I had started out this show with a very low expectation of this comedian and my impression of him has completely changed. I had watched him in “Crime Scene Season Two” previously, but apart from being impressed at his amazing memory, I did not think that he was an exceptional participant. I certainly did not expect that he would be such a loyal yet cunning player, with good social and leadership skills. As mentioned several times during the season by his fellow participants, Jang Dongmin has the perfect skill set and ability for this show. He may not be the best mathematician or the boldest gambler, but he knows when to show off and when to play safe. He is also very driven and determined, as can be seen by his face-off with Oh Hyunmin in a deathmatch game of Tactical Yutnori, a new take on a traditional Korean game. In season three of “The Genius,” this was the only game that Dongmin had ever lost, and it was also against Hyunmin, one of this season’s forerunners. Dongmin saw this chance as an opportunity to prove himself and show his improvement, and boy, did he succeed. Apart from proving his own abilities, Jang also desired to show that comedians were not a group of people to be looked down on, but that they are intelligent and valuable people who deserve to be respected. The show highlights the fact that Dongmin grew up poor and less privileged than some of his fellow contestants, so it becomes a triumph even for the viewers when he succeeds in matches and challenges. By being on this show, Dongmin disproved a lot of common stereotypes and thus gained a lot of respect for it. No matter who the fans supported, they never begrudged Dongmin of his success, to which I must say kudos to both Dongmin and the show for portraying him in such a manner. As a bonus, Dongmin’s interactions with “The Genius” constant, Dealer Hong Jiyeon are both adorable and hilarious. It’s amazing to see the normally cold-hearted dealer turn into a smiling and flustered woman in front of this charming comedian, and tvN certainly realized it, judging by the number of times she ended up featuring in their “behind the scene” videos this season. “The Genius: Grand Final” is a show packed with humor, heart and thrill. I’m definitely looking forward to the next season of it! Are you watching “The Genius”? What do you think about the evolving variety scene in Korea? Share your thoughts in the comment section below and be sure to subscribe to the site and follow us on Facebook, Twitter, Instagram, and Tumblr to keep up with all of our posts. https://i0.wp.com/kultscene.com/wp-content/uploads/2015/09/1443094128847.jpg?fit=2048%2C2048 2048 2048 Anna Cheang http://kultscene.com/wp-content/uploads/2018/02/KULTSCENE-LOGO-2018-TRANSPARENT-RED.png Anna Cheang2015-09-25 05:20:592015-09-27 15:50:065 Reasons Why You Should Watch "The Genius: Grand Final"
2019-04-22T06:11:06Z
http://kultscene.com/tag/tvn/
News reporting in general, a great deal of analytic writing, and virtually all diplomatic pronouncements about military support for rebel groups—in South Sudan and Sudan—have had a peculiar “evenhandedness.” Indeed, this equanimity is finally bizarre, given the many indications that such military support is so completely one-sided. All available evidence makes clear that substantial military support—arms and ammunition in particular—flows directly from Khartoum’s security and intelligence services to various renegade rebel militias operating in South Sudan. At the same time, no party—not Khartoum, not the diplomatic community, not credible journalists—has provided persuasive evidence that Juba is providing anything remotely comparable to such support. Here we should bear in mind that Juba is well aware that any evidence of assistance to the northern rebels would be immensely costly in any diplomatic context; and given the difficulty of concealing major weapons transfers—especially since the South has no significant aerial means of doing so—Juba is highly unlikely to take the risk of providing the very evidence Khartoum is so desperate to claim it has. The rebel groups inside northern Sudan understand this well, if in some cases grudgingly. Encouragingly, most of the Southern renegade militia groups (RMGs) armed by Khartoum have now been disbanded or accepted amnesty from Juba, with the key exception of the brutal David Yau Yau group in Jonglei State. And on each such occasion of surrender, weapons and ammunition used by the rebels have been examined in great detail by the Small Arms Survey (Geneva); as a result, SAS has provided unambiguous evidence of the armaments’ origin in Khartoum, typically manufactured in China, Iran, countries of the former Soviet Union, and Sudan itself. Weapons captured from rebel groups by the army of the South—the Sudan People’s Liberation Army (SPLA)—have also consistently originated with Khartoum’s Sudan Armed Forces (SAF). By contrast, the Khartoum regime, including its SAF and intelligence services, has never publicly provided a shred of evidence that Juba is providing material military support to rebels operating in Sudan, either the Sudan People’s Liberation Army-North (SPLA-N) or the larger coalition known as the Sudan Revolutionary Front, which also comprises rebel groups from Darfur (primarily the Justice and Equality Movement [JEM] and to a lesser extent factions of the Sudan Liberation Army [SLA]). And what we may be sure of is that if Khartoum did have such evidence, these ruthless men would make it very public, trumpeting it in detail at every opportunity. Instead, what we have are mere heated assertions of Juba’s continuing, substantial support for rebels operating in the north—endlessly repeated and by virtue of repetition given credence by expedient diplomats and in turn by those reporting the statements of these diplomats. Lately, as the SAF has continued to suffer military defeats in both South Kordofan and Darfur, there has been a marked increase in the frequency and stridency of claims to have evidence of Juba’s military support for the rebels. The claims now saturate the Sudan Media Center and its Sudan Vision, and many high-profile regime statements. Thus on June 6, 2013 Sudan Tribune reported that the Khartoum regime’s “cabinet decided on Thursday [June 6] to carry out a ‘broader diplomatic campaign’ to brief the international community about the support that the neighbouring South Sudan provides to Sudanese rebel groups.” The evident conviction is that if a claim is made often and insistently enough, there is no need for real evidence. But to the extent there has been any assistance to northern rebels by the South—logistical, medical, or in the form of cross-border sanctuary—it has been modest, occurred largely as the terms of the CPA security protocol were expiring in 2011, and has not necessarily been under Juba’s control. Movement across the highly unstable South Kordofan/Unity State border has been notable, but it is Khartoum that has done so much to prevent delineation, demarcation, and ultimately demilitarization of this highly volatile area (to which many tens of thousands of refugees from the Nuba Mountains have fled from Khartoum’s relentless aerial attacks on civilians). And because Juba knows that the regime has kept SAF forces in areas that were to have become de-militarized per the September 27, 2012 agreements between Khartoum and the Government of South Sudan, the SPLA has also remained in position in a number of ways (see the recent report from the Enough Project [June 14, 2013], providing satellite imagery of current deployments). This is extremely dangerous. What is the evidence of armaments going to rebel groups? Here it should be noted that technically the CPA stipulated October 9, 2011 as the date for completed demobilization of the (nominally) Joint Integrated Units; this is detailed in the Security Protocol of the CPA, which stipulates three months after the end of the Interim Period (July 9, 2011) as the final date for demobilization. A fuller historical account of how Nuba fighters from the Sudan People’s Liberation Army reconstituted themselves as the Sudan People’s Liberation Army-North (SPLA-N) is provided by Gramizzi and Tubiana, and appears in condensed form as Appendix One. “This report documents weapons and ammunition observed in February 2013 during a reporting trip to the town of Pibor in Jonglei state, South Sudan. The weapons were in possession of a group led by James Kubrin, who defected with his men from David Yau Yau’s militia on 4 December 2012. Given that only three months have passed since their defection, it is likely that similar types, relative quantities, and sources of weapons and ammunition remain in the hands of the Yau Yau militia. Also of interest are specifics offered by the Kubrin group about alleged airdrops of weapons from Khartoum, described here for the first time. Small Arms Survey has conducted a number of investigations of the weapons and ammunition used by renegade militia groups (RMG)—all are accompanied by detailed photographs of captured armaments, with incisive analysis of what they reveal: caliber and nature of weapons and ammunition; serial and lot numbers (and sometimes photographs of the deliberate effacing of serial numbers, an attempt to conceal their origins); serial number sequencing; ammunition stampings; countries of origin and manufacture dates for arms and ammunition; frequency of use in the various military theaters of greater Sudan; dates and locations where weapons and ammunition were seized; and many interviews of combatants and non-combatants alike, conducted by skilled and knowledgeable investigators. No other international organization provides remotely comparable analyses of the movement of weapons and ammunition in greater Sudan. Collectively, the broadest conclusion is simply indisputable: using weapons and ammunition manufactured in China, Iran, Russia, Ukraine, Belarus, and northern Sudan, the Khartoum regime has used its Antonov cargo planes—typically painted white to obscure their military purpose—as a means of supplying the most destabilizing of the RMGs. (Painting military aircraft white, in an area where humanitarian aircraft are present and using white as an identifying color, is a violation of international humanitarian law; Khartoum has engaged in this activity throughout the Darfur conflict.) Some of the weapons systems in RMG arsenals examined by SAS are extremely potent. And while the title of “most destabilizing militia force” now clearly goes to Yau Yau’s militia forces in Jonglei, it has not always been so. • “Gatluak Gai’s Rebellion, Unity State” (SAS, July 2011). • A June 4, 2013 overview of rebel actions, defections, leadership, and uncertainties renders a bewilderingly complex military situation in clear and authoritative form. From rebel defectors, including ranking members and a number of leaders, we have been able to gather a great deal, all distilled here with clarity and extensive background knowledge. But if these are different proposals from the ones agreed to last September 27, what is the point of any proposal that is agreed to? What precludes future demands for yet newer proposals? The African Union Peace and Security Council ratified the negotiators’ proposal concerning Abyei, but Khartoum yet has to accept this ratification. The AU in turn has done nothing in response, leaving Abyei an extremely dangerous flash-point for renewed war. All the other agreements between Juba and Khartoum have been “frozen,” according to very recent statements by senior NIF/NCP officials, including President al-Bashir. Most notably, this extends to oil transit arrangements. If the AU continues to capitulate before Khartoum’s intransigence and bad faith, it will soon reach a point where any agreement negotiated under its auspices will be meaningless to Juba—indeed, as the recent explosion at the Diffra oil production site in Abyei suggests, we may have already arrived at this point (see Part 2 below). First, by arming David Yau Yau’s primarily Murle militia forces, Khartoum hopes to create civilian chaos and displacement, exacerbate ethnic tensions, and tie down a substantial number of SPLA forces well away from the North/South border. Khartoum also hopes to compromise the standing of Juba in any negotiations in which human rights are part of the equation. Judging by many accounts from the ground and increasingly numerous news reports, Yau Yau’s forces been remarkably effective. For in fighting Yau Yau’s group, SPLA forces have frequently performed poorly and engaged in serious human rights violations, including war crimes. The SPLA has also provided significant “arms and ammunition, both systematically and on an individual basis, to Jonglei communities” (“My neighbor, my enemy: Inter-tribal violence in Jonglei” (SAS, October 2012). Further, the SPLA’s indiscriminate killing of civilians because they are vaguely associated with Yau Yau, or on the basis of their Murle ethnicity, is reprehensible and deserves the strongest condemnation. Those responsible must be held accountable all the way to the top of the chain of command. “An estimated 120,000 people have fled fighting in and around the main towns in Pibor County in South Sudan’s Jonglei state and are now hiding in unsafe and malaria-infested swamps without access to safe drinking water, food, or medical care, the international medical humanitarian organization Doctors Without Borders/Médecins Sans Frontières (MSF) said today. The government of South Sudan must allow immediate humanitarian assistance to these areas to prevent the deaths of thousands of internally displaced persons. “Over the past month, many of the displaced have fled for their lives into the bush amid intensified fighting between the South Sudan Army (SPLA) and the David Yau Yau armed militia group. The heightened fighting has coincided with the destruction of medical facilities throughout the county, including the systematic looting of the MSF hospital in Pibor town in late May, and the refusal of the SPLA to allow or facilitate the provision of humanitarian assistance to the displaced population. But serious abuses by the SPLA should not obscure the most basic fact about the cause of this growing crisis: these developments are deliberate on the part of Khartoum, which believes that the South can be made to squander the moral and political equities it brings to negotiations with the regime if Jonglei can be made into an apparently intractable conflict with the many different ethnicities of the region increasingly at odds: Lou Nuer, Murle, Bor Dinka, Toposa, Anayuak, and others. Khartoum hopes that the South will lose diplomatic standing amidst the quagmire of a necessary but extremely difficult disarmament of civilians and combatants in Jonglei. In turn, if Jonglei and other areas are seen as increasingly chaotic, there is a growing likelihood that the international community will push Juba even harder for “compromises,” which are finally nothing more than the demand for further concessions by the South. Why are the Small Arms Survey findings not taken seriously? There is all too much indication that international comparisons of Juba and Khartoum on the issue of arms transfers to rebel movements in the north and South are essentially exercises in expediency, not reasoned judgments based on evidence. There has been an inexplicable refusal to acknowledge the decisive findings of the Small Arms Survey’s many reports, and (again) its most important conclusion: “In the post-independence period, however, the Small Arms Survey has found no evidence of weapons supplies from the Government of South Sudan to the SPLM-N, though some political and logistical support is evident. Again, in November 2012, the U.S. State Department repeated this claim in refrain-like manner: “The creation of the safe demilitarised border zone between the two countries is vital to ensure that both countries honor their commitments to cease support to proxies and, most importantly, prevent inter-state conflict'” (Agence France-Presse [Khartoum], November 21, 2012). Two days later the SAF bombed civilian areas of the contested Samaha border region between South Darfur and Northern Bahr el-Ghazal; as has been true on literally hundreds of occasions, there was no condemnation of the attack. Only the most fully reported attacks are noted, and even then this terrible atrocity is inevitably linked to other issues and the condemnation is formulaic. Equating rebel support provided by Juba and Khartoum has been a major factor in emboldening Khartoum to continue its savage aerial campaign, since condemnations of bombings inevitably occur in the context of expressions of concern about support for rebel groups both in the north and South. The bombings of civilians and humanitarians, a practice that I have documented in detail going back as far as 1999, are war crimes; in aggregate they are crimes against humanity (see “‘They Bombed Everything That Moved’: Aerial Attacks on Civilians and Humanitarians in Sudan, 1999 – 2012, pages 19 – 20). Each instance of this barbarism—whether in South Sudan, the Nuba Mountains, Blue Nile, or Darfur—should be publicly and emphatically condemned. Such condemnation should not be part of a trade-off with other issues, or a “balancing” of criticism, or diplomatically calculated: it should be an unambiguous, direct, and sharply focused statement about the implications of such aerial attacks and the consequences of their continuation. This bombing attack, yet another atrocity crime, was in no way exceptional. The attack on Khor Abeche in South Darfur noted by NSC spokesman Hammer was also, indisputably, an atrocity crime, one among many thousands committed over the past ten years; why, then, did the NSC spokesman offer no specific indication of what he meant be declaring that “we are also seeing increased evidence of support to militant proxies from the Government … of Southern Sudan.” What is the evidence? Does such evidence, if it exists as something other than diplomatic expediency, justify in any way comparison with the atrocities at Khor Abeche, a town already savagely ravaged earlier in the Darfur conflict? There was none provided, and so this became yet another moment of disingenuous moral equivalence on the part of the Obama administration, which has repeatedly been joined by the UN, the African Union, and the EU. The declarations by these international actors also entailed a presumptive determination about where Heglig actually lies, and this has resulted in a further loss of Southern confidence in the impartiality of the international community and its negotiators, at least in post-CPA negotiations. It certainly does not help that the contrast could hardly have been greater than that between the immediate international outrage directed at Juba and the SPLA over fighting in the Tishwin/Heglig-Panthou area and the ineffectual responses to Khartoum’s military build-up near Abyei in early 2011—and military seizure of the region on May 21, 2011. The SPLA withdrew from Heglig-Panthou; Abyei remains under Khartoum’s de facto military control, as UNISFA and the UN Secretariat and Department of Peacekeeping Operations well know. The region is one of the most likely flashpoints for renewed war, and a signal example of the costs of diplomatic expediency and incompetence, embodied in AU negotiators such as Thabo Mbeki. In the past two years the diplomatic phrase of choice has inevitably become some version of the demand that “both parties end support to proxies in the other country.” It is an expedient way to avoid having to confront the implications of evidence actually in hand, and thus confront Khartoum directly over actions of which it alone is guilty. Such confrontation, diplomats and international actors sense, would work to undermine Khartoum’s credibility and legitimacy as a partner in peace negotiations, and thus make a final agreement more difficult. The logic seems to be that success depends on keeping both parties equally responsible for violence and rebel activity. But sensing this logic at work, Khartoum only insists more vehemently that Juba is responsible for supporting the SPLA-N and the SRF more broadly—and the international community responds by equivocating. But negotiations cannot equivocate their way to a meaningful set of agreements that will diminish the risk of renewed war. Khartoum’s repeated declarations of Juba’s support for rebel group operating in the north—based always on bald assertion, never on evidence actually presented—also help to explain away the punishing and embarrassing defeats being absorbed by the SAF, especially in the Nuba Mountains, but increasingly in Darfur and other parts of South Kordofan. And since the international community as represented by the UN, the AU, the EU, and the U.S. clearly wishes to have direct negotiations between the Khartoum regime and the SPLM/A-North, condemning non-existent Southern support for the northern rebels seems the price that must be paid. And again, given the humiliations of the SAF over the past two years on the battlefield, it is only by arguing that rebel movements have Juba’s support that justification for so many headlong defeats can be explained. Expedient calculations by diplomatic interlocutors have brought the Sudan crisis to its present fever pitch, with all-out war a clear and very real possibility. But this is no time for expediency: the international community should be guided by evidence, gathered on the ground in South Sudan and South Kordofan, rather than contrive an equivalence that is based merely on perceived negotiating requirements. The explosion of the oil facilities at Diffra (Abyei)—what caused it? Predictably, Khartoum has immediately blamed rebel groups, supported by Juba, for the explosion at the Diffra oil production site (north of Abyei town) on June 12, 2013. So far—more than five days later—there has been no credible investigation, no announcement of responsibility, not even a preliminary report, and the UN Interim Security Force for Abyei (UNISFA) has begun to look ever more incompetent in fulfilling its mandate. In the wake of Khartoum’s military seizure of Abyei in late May 2011, UN Security Council Resolution 1990 (June 27, 2011) stipulated that UNISFA verify the de-militarization of the region, protect civilians and humanitarians, and facilitate relief efforts. It was also tasked with “providing security for the oil infrastructure in the Abyei area.” So far UNISFA has proved inadequate to the multiple tasks of its mandate, even as it is being asked to monitor an extended de-militarization of the North/South border; it is bound to fail without much greater resources and an agreement on de-militarization that will seriously penalize reneging parties. The explosion was an accident, expediently used by Khartoum to further its own claims that Juba is supporting the rebels who, it claims, blew up the facility. Khartoum also claimed that within three days the facility had been repaired, so the damage cannot have been great. But such limited damage would be a surprising result for what would have had to be a well-planned rebel attack, given the risk entailed in any putative military operation in an area controlled nominally by UNISFA, but in fact by Misseriya militias and nearby SAF forces. The explosion was the work of a rebel group. This seems unlikely, however, for a number of reasons, not least the presence of not only UNISFA troops but a company of SAF troops that Khartoum has refused to withdraw from Abyei per the terms of the June 2011 agreement. Moreover, Juba would certainly wish to warn off any element of the SRF from attacking within Abyei, thereby giving Khartoum a pretext for expelling UNISFA and seizing the region permanently. Such a seizure virtually guarantees the resumption of war, something some of the more militaristic members of the regime clearly wish to keep open as a way of making further claims on land and oil reserves. It is not remarked sufficiently frequently that South Sudan has nothing to gain from renewed war, except its self-defense. Rather, it wishes to engage in good faith negotiations in settling outstanding border issues, and has signed with Khartoum an agreement on oil transit fees, part of a larger agreement that spoke to a number of other issues, including security issues (September 27, 2912). South Sudan certainly has strong interests in a range of border issues, but is equally committed to addressing these issues through negotiation. This is why Khartoum’s highly provocative military seizure of Abyei (May 2011) was so dangerous, and such an egregious violation of the Abyei Protocol of the CPA. Juba has been left to wonder whether any negotiated agreement will have sufficiently strong international guarantees and guarantors to justify compromising any further. But there is certainly no inclination in Juba for a unilateral move toward war with Khartoum. In assessing what has emerged from negotiations subsequent to Southern independence (July 9, 2011), it is important to understand Juba’s perspective—both on outstanding issues that were to have been resolved before the end of the Interim Period (also July 9, 2011), and on the costs of renewed war. This perspective is shaped by a fundamental fact about the National Islamic Front/National Congress Party Regime: it has never abided by any agreement with any Sudanese party—not one, not ever. Indeed, almost on the eve of Southern independence the NIF/NCP reneged on the June 28, 2011 Framework Agreement with the SPLM/North, the last and best chance to avert the vast catastrophe that now engulfs South Kordofan and Blue Nile. • It could obtain by military means nothing that the international community would not demand be conceded in eventual negotiations with Khartoum; in a new war, all the South would experience is loss, suffering, and destruction. There are no positive outcomes other than a defense of territorial integrity. • All of South Sudan would be exposed to aerial bombardment in any renewed war, as it was for the entirety of the long civil war (again, see “They Bombed Everything in Sight,” www.sudanbombing.org). The nightmare of Antonov “bombers” targeting civilian and humanitarian targets throughout South Sudan would again become a reality. • Juba has not previously been identified with any such act of sabotage, leaving aside the question of how much responsibility the SPLA bears for damage at Heglig-Panthou, during a retaliatory attack against SAF forces that had previously twice attacked the SPLA in the Tishwin area of Unity State. Many reports from the region at the time—by both military and civilian officials, and at least one oil worker—make this abundantly clear; this did not, however, prevent the international community from immediately and vehemently—and inaccurately—blaming Juba. (An oil industry worker of unspecified nationality in the Heglig-Panthou area reported to the BBC, April 11, 2012 on the second, catalyzing attack by the SAF on SPLA positions: “‘The [northern] Sudanese attacked first, but they didn’t have as many soldiers, so they were forced to flee'”). There was also at the time much talk about the July 2009 ruling on Abyei by the Permanent Court of Arbitration (PCA); but a great deal of this either misinterpreted the clear limitations of the ruling by the PCA or reflected an effort to be “balanced” in apportionment of blame. Thus Khartoum bombs and mounts ground incursions into South Sudan, repeatedly, following the Southern self-determination referendum (January 2011)—and faces only tepid and ineffectual condemnation. Indeed, the “tepid” guarantees the “ineffectual”: the U.S. and other international actors are signaling that they will do what is necessary to provide Khartoum and Juba with equal “negotiating equities” going forward. If the South has “too many” equities, then diplomats know that Khartoum will not make an agreement reflecting this reality. So there is a perpetual fiction of “commensurate equities at the negotiating table”—and until this is resisted by international interlocutors, Khartoum will continue to believe that with some work, some subterfuge, and some mendacity, it will be able to behave badly and yet still—after the dust again settles, if it does—enjoy equivalent standing in new negotiations with Juba. The explosion was deliberately orchestrated by Khartoum as a low-cost act of “sabotage” in order to justify further its shutdown of oil transport from South Sudan and possible “punitive” military action along the Abyei/Unity state border. The Diffra incident would, in short, become a casus belli for Khartoum, justifying their military seizure of Abyei and perhaps whatever they can hold of contested regions in Unity and Upper Nile states. Certainly we should recall that Khartoum has kept troops in Abyei, and near Diffra in particular, despite the withdrawal agreement of June 2011. Alternatively, the contrived sabotage might be the military’s way of responding to defeats at the hands of the SRF. Khartoum assumes that if its claims are credited then it is more likely that occupied border lands will be conceded by excessively pliable African Union mediators. In short, Khartoum counts on “compromising” over whatever it seizes and holds until a new “peace treaty” is signed. This includes at the very least Abyei, Heglig-Panthou, parts of Upper Nile, the Kafia Kingi enclave in Western Bahr el-Ghazal, the fertile area in North Bahr el-Ghazal State north of the Bahr el-Arab River known as “Mile 14″—an important strip of land between Sudan and South Sudan that was to have been demilitarized per the September 27, 2012 agreements. In all these areas, in the event of all-out war, there are substantial SPLA forces and resources, ensuring that any military effort to seize Southern land will be fiercely resisted. Once loosed again, the demons of war will be exceedingly difficult to contain. Khartoum may also be trying to “play the victim,” with the explosion meant to dramatize a “conspiracy of forces” north and south of the border. Key in answering this will be an independent investigation, and again we must wonder why have we heard nothing from UNISFA. In the absence of a fully credible report assigning responsibility, or at least cause, recent diplomatic behavior—especially that of the UN and African Union—suggests that the incident will either be ignored or skewed if possible to shift the blame to Juba, even though Diffra is in an area where there are very few Dinka and a great many, generally heavily armed Misseriya—the very men who murdered Dinka Ngok Paramount Chief Kuol Deng Kuol three weeks ago. “The [cause of renewed fighting in South Kordofan] was the unresolved status of Nuba SPLA combatants. Under the CPA, all former rebel fighters were to withdraw to South Sudan, except for some 3,300 incorporated into the Joint Integrated Units (JIUs), which included an equal number of SAF. Between 2007 and 2008, a large contingent from the SPLA’s South Kordofan 9th Division— between 17,000 and 30,000 men, according to SPLM/A officials, or between 10,000 to slightly above 20,000, according to Western military observers—redeployed to Jaw, at the northern tip of Unity state, which borders South Kordofan. “In early June 2011, the fighters of the SPLA’s 9th Division were scattered between their main post-CPA base in Jaw and the Nuba Mountains. According to SPLM-N Deputy Chairman Abdel-Aziz al Hilu and Maj. Gen. Jagod Mukwar (SPLM-N’s commander for the Nuba Mountains), SPLM in South Kordofan then had 22,000 men—3,300 in the JIUs, and 1,500 in the joint integrated police, both in South Kordofan itself; 13,500 men around Jaw; and the remaining 3,500 in the Bentiu region. The size of the force redeployed to Jaw is disputed, with estimates for the whole Nuba forces put at 20,000–30,000 as early as June 2011. When the conflict resumed, however, the majority of those who had left the ranks rejoined. The Nuba fighters still in Jaw and Bentiu (including some 500 integrated into the SPLA-South 5th Division), or part of other SPLA divisions in South Sudan, upwards of 2,000 men (including 1,000 in Western Bahr al Ghazal and 500 in Upper Nile), were progressively repatriated. Since South Sudan’s independence, Northern members of the SPLA’s Southern divisions—including Nuba soldiers who never fought in South Kordofan during the civil war—have been moving constantly to the SPLM-N, with the encouragement of the SPLA leadership. Voluntary recruitment campaigns were also conducted, especially in the early stages of the conflict, and some newly enrolled fighters were trained as late as May 2012. By the end of June 2011, the force in South Kordofan was around 30,000 – 35,000 men.
2019-04-24T20:24:41Z
http://sudanreeves.org/2013/06/17/the-arming-of-rebels-in-sudan-and-south-sudan-what-is-the-evidence/
"He didn't even have the satisfaction of being killed for civil rights . . . . It's — it had to be some silly little Communist." — Jackie Kennedy, on hearing that a leftist had been arrested for her husband's murder. This web site is dedicated to debunking the mass of misinformation and disinformation surrounding the murder of JFK. If you are believer in Oswald as a lone gunman, you are likely to enjoy this web site, since most of that misinformation and disinformation has come from conspiracists. But if you are a sophisticated conspiracist, you likely understand that the mass of silly nonsense in conspiracy books and documentaries does no service to the cause of truth in the assassination, and simply buries the "case for conspiracy" under layers of bunk. Regardless of what you believe, several web sites, mostly conspiracy-oriented are worth checking out. And you may also want to check out my list of recommended books on the assassination. What sort of evidence is there? What about those witnesses? Didn't everyone hear shots from the Grassy Knoll? What about the Tague wounding? Who was the "Umbrella Man?" Was the rifle recovered really a Mauser? Does "acoustic evidence" show a shot from the Grassy Knoll? Were the Three Tramps suspicious? How could Kennedy's head go "back and to the left?" You've seen Kevin Costner give the conspiracy version of the Single Bullet theory. You know: Connally seated directly in front of Kennedy, at the same height, and facing straight ahead. Was that really what happened? What sort of person was he? Did he really have "Top Secret" security clearance? Did he shoot at General Walker? Were there two Oswalds? If Oswald shot Kennedy, what was his motive? Was the man exhumed in 1981 really somebody besides Oswald? Did Oswald really share an office with Guy Banister? Did Clay Shaw really use the alias "Clay Bertrand?" Why did Oliver Stone make a movie about the Shaw trial and not even mention Perry Raymond Russo? Did David Ferrie die a "mysterious death?" What about Jim Garrison and the Mafia? Did the bullet that hit Kennedy in the back penetrate only an inch and fall out? Was Kennedy hit in the head by a bullet from in front? Are the autopsy photos and x-rays faked? Did all the doctors at Parkland Hospital believe that Kennedy was hit in the front of the neck, and if so, are their opinions decisive evidence that that is what happened? Was the back of Kennedy's head blown out? Are the autopsy photos faked? Did you know that all the evidence in this case proven to be forged has been on the conspiracy side? One key piece originated with the KGB! Did you know that the "mysterious deaths" are virtually all not so "mysterious" when you look at them closely? Do you trust authors like Mark Lane to tell you the truth about what witnesses said? The "lone nut" theory of the assassination is really the "two lone nuts" theory. What sort of person was Jack Ruby? A mobster? An intelligence agent? A small-time hustler? The sort of volatile character who might really have shot Oswald out of righteous anger? We expect Hollywood movies to take some liberties with the historical record. But what do we think when Hollywood turns history on its head? Oliver Stone wants to overturn the verdict in the Clay Shaw trial. The jury found that District Attorney Jim Garrison had no case — so Stone invents a case on celluloid. Just how honest was Oliver Stone, Shaw's Hollywood prosecutor? For some in the conspiracy crowd, John Kennedy was a liberal saint, who was going to implement policies that would bring America into a new Utopia. So, of course, a threatened Power Elite had to kill him. Was Kennedy the kind of left liberal who threatened established interests? Was he a hero of Civil Rights? Had he decided to pull out of Vietnam? Historian Eric Paddon dissects these claims in a series of essays based on his posts on the Internet. Some notions about logic, probability and statistics necessarily underlie all discussion of "conspiracy" or "lone assassin." Does the lone assassination theory involve too many implausible "coincidences?" Are there a suspicious number of "connections" between various figures in the case? Is the Single Bullet Theory highly "improbable?" In writings about the assassination, as in real-world criminal justice, witness testimony looms large. But just how reliable are the witnesses? How many witnesses are just flat out telling tall tales? How often are apparently sober and reliable witnesses just flat wrong? Did a Secret Service Agent Shoot JFK by Accident? It's plausible enough that some people accept it, although very few committed buffs do: the notion that assassination was a friendly fire incident. Supposedly, Agent George Hickey, riding in the follow-up car, accidently shot the president. This theory has been repeatedly debunked, most recently by Peter Mucha in the Philadelphia Inquirer, and by Dale Myers and Gus Russo in an article on Myers site. What we think about the assassination is dependent on what we think about history, and about the behavior of government officials and bureaucrats. Was Kennedy a radical who threatened the status quo? Did top administration officials order a coverup of a conspiracy soon after the assassination? If the FBI and the CIA withhold documents, does this mean that they are protecting assassination conspirators? This has long been the cry of the conspiracy theorists. Supposedly, the documents show that a conspiracy killed Kennedy. In fact, the government in the 1990s released a massive number of documents. The Assassination Records Review Board had a mandate to identify and oversee the release of documents in government hands, and in private hands. Recording devices monitored the two radio channels used by the Dallas Police Department, and these recordings are a vivid "real time" account of the frenzy of activity that followed the shooting. Here are selected audio clips beginning a couple of minutes before the assassination and ending with the arrest of Oswald in the Texas Theatre. In the more than half century since 1963, the literature on the assassination has taken several twists and turns, from early works that questioned the use of evidence by the Warren Commission, to examinations of the medical evidence, to more recent decades when theories of massive fakery of evidence have dominated. Webmaster John McAdams examines this progression, highlighting important works both defending the lone assassination theory and those (much more numerous) attacking it. Run by webmaster John McAdams, is the place to go — whether you are a "newbie" with questions to ask, or a researcher with some evidence you want to present to the research community. I don't necessarily agree with all the conclusions these authors have drawn, but everything here is a solid piece of work that deserves your attention. All are copyrighted, and all posted here with permission. Joan Mellen's book Faustian Bargains: Lyndon Johnson and Mac Wallace in the Robber Baron Culture of Texas is a book by a conspiracy author that decisively debunks one conspiracy theory: the notion that one Mac Wallace was LBJ's hit man in Texas, and later in Dealey Plaza. Our review of the book points out some weaknesses, but also notes some strengths. David Talbot's book The Devil’s Chessboard: Allen Dulles, the CIA, and the Rise of America’s Secret Government fingers CIA director Allen Dulles as the person who plotted and directed the assassination, and protrays him as a generally evil person. Unfortunately, the book is rather deficient as history, as explained by David M. Barrett in this review. A good, well-reasoned overview of the assassination from someone skeptical of conspiracy theories is Dave Reitzes "JFK Conspiracy Theories at 50: How the Skeptics Got It Wrong and Why It Matters." It's a good "first read" for somebody who had read just conspiracy books (or seen conspiracy documentaries) and wants to see the other side of the issue. Richard Belzer's book Hit List has gotten a fair amount of attention recently. It's an extended explication of the supposed "mystery deaths" associated with the assassination. Unfortunately, as Marilyn Elias explains in her review of the book, it's the sort of book one would write if one surfs conspiracy sites on the Internet, and believes everything one finds there. Jeff Morley is a journalist who has gotten some good press recently for his attempts to pry documents he thinks are related to the JFK assassination from the CIA. Most everybody applauds these efforts, but some have taken him to task for making claims that go far beyond the evidence he (or anybody else) has. Dale Myers and Gus Russo critique a variety of Morley's assertions in "Drums of Conspiracy" and "Fanning Wisps of Smoke." A recent TV special from the National Geographic channel featured enhancements of assassination films and an attempt to study the missed first shot that many researchers believe Oswald fired. From Max Holland's website, here is the technical report giving full details of the project. The notion that Kennedy was killed because he intended to withdraw from Vietnam has become the conventional wisdom among conspiracists, and a recent treatment of that theory, James W. Douglass' JFK and the Unspeakable, has drawn some attention. But unfortunately, the author not only distorts history, but unintentionally paints a very unflattering portrait of JFK. See our review of the book here. Zombie assassins? The notion that "Manchurian candidate" assassins might be "programmed" to commit murder has been a recurring one. Most often invoked in the murder of Robert Kennedy, it has also surfaced in the JFK assassination. British author Mel Ayton explores this issue in his essay "Bogus Manchurian Candidate Theories." A recent book by Abraham Bolden tells a most interesting story about the first black Secret Service agent who supposedly knew about conspiratorial goings-on in Chicago, and who was (he claims) framed, convicted and sent to jail on charges of corruption. The media have been rather credulous about his account, but in fact he was almost certainly guilty as charged. Indeed, when the House Select Committee examined his claims in the late 1970s, they found them to lack credibility. While the mainstream media is suitably skeptical when the conspiracy card is played, they suspend that skepticism when the race card is played. Garrisonites are a rather peculiar and paranoid cult among conspiracy believers, and Joan Mellen's book A Farewell to Justice is the latest to defend District Attorney Jim Garrison, whose ill-conceived campaign to convict Clay Shaw of the JFK assassination was the subject of the movie "JFK." Yet, like the movie, Mellen has fallen into the trap of believing the most incredible sources and adopting the most outlandish theories in an attempt to vindicate the DA, as Patricia Lambert shows in this review of the book. In another essay, Dave Reitzes discusses Garrison's central, critical witness, a fellow named Perry Raymond Russo. Mellen accepts his testimony, which Reitzes shows was vastly unreliable. Finally, Lambert shows how Mellen blew off the testimony of a key reliable witness, one Dr. Frank Silva, when it conflicted with the Garrison version of events. When a reputable historian publishes a JFK assassination book with a reputable academic press, it should be judicious in its use of sources and prudent in its judgments. But, alas, David Kaiser's book The Road to Dallas turns out to be just another conspiracy book, not too different from scores of others. Read a review by webmaster John McAdams on the e-zine Washington Decoded. Nothing about the assassination is more important than the issue of when the shots in Dealey Plaza were fired. Pick your timing, and it may be consistent with or entirely debunk a single shooter in the Texas School Book Depository. A new essay by Kenneth R. Scearce supports a new theory about the timing that puts the first shot far earlier than anybody has heretofore theorized. Of course, this theory has generated controversy, so you might want to check out a reply from computer animation specialist Dale Myers. Author David Talbot ought to the the sort of sober and serious person we would expect a member of the mainstream media to be on the assassination, but alas he isn't. Veteran journalist Don Bohning, who long reported on Talbot's prime suspects in the Miami Cuban community, finds Talbot's book Brothers to be pretty much another buff book, with credulous acceptance of suspect witnesses and a very selective use of the documentary record. Mel Ayton has a new essay on Conspiracy Thinking and the John F. Kennedy, Robert Kennedy and Martin Luther King Assassinations." Ayton believes that all conspiracy thinking has several common threads. There has been a recent spate of new books and new theories about the assassination, including a German television documentary called "Rendezvous With Death" from Wilfried Huismann and Gus Russo and the book Ultimate Sacrifice by Lamar Waldron and Thom Hartmann. Do we have any compelling new evidence or interpretations here, or is this just more unsupported conspiracy theorizing? A new essay by Mel Ayton critically examines the evidence. "Rendezvous With Death", claims to have discovered compelling new evidence that Fidel Castro had John Kennedy killed, using Lee Oswald as hit man and patsy. It has received a mixed reception, at best. A new essay by David Lifton accepts, for the sake of argument, the data produced by the authors of "Rendezvous With Death" and points out that it could be interpreted in a way very different from what the documentary proposes. The History Channel has a record of showing reasonably reliable documentaries on subjects like wars, Nazis, the history of popular culture and the like. But their record on the Kennedy assassination is abysmal. The series "The Men Who Killed Kennedy" has a record of touting the most implausible and bizarre theories. But they managed to reach a new low with an episode titled "The Guilty Men" which fingered Lyndon Johnson as the prime mover behind the assassination. In this article, journalist and historian Max Holland dissects the entire series, and especially the installment on LBJ. And veteran JFK researcher Dave Perry critiques the reliability of the supposed "evidence" in an article from his website. And one of the accused conspirators, Malcolm Liggett, sued The History Channel over the supposed "documentary" and received a settlement. The "acoustic evidence" got a boost in 2001, when a scientist named D.B. Thomas published an article claiming to have corrected the statistical treatment in earlier studies and found clear evidence of a shot from the Grassy Knoll. However, a recent careful study of the timing on the events on the Dallas Police tape by Michael O'Dell shows that the "shots" happened too late to actually be shots. Thus the "acoustic evidence" was to acoustic science what cold fusion was to physics: an example of how even reputable scientists can jump to conclusions when faced with the possibility of an "explosive" discovery. Of course there are all kinds of wild and woolly theories connecting Oswald to the CIA. But some responsible and sober researchers have argued that the Agency knew more about and had a more intense interest in Oswald than they have ever admitted. One such researcher is Jefferson Morley, world news editor of washingtonpost.com. His article "What Jane Roman Said" outlines the evidence. Among conspiracy-oriented researchers, there is a deep gulf between the more moderate and sensible ones, and those who'll promote any bogus piece of "conspiracy evidence." Ulric Shannon is one of the former, and he explains in this essay why he thinks the "I'll believe anything that implies conspiracy" crowd is so harmful. Researcher Bill Drenas debuted his essay "Car #10, Where Are You" on this web site in 1997. The current version has some minor factual corrections and much new material. Not pushing any conspiracy theory, but not a debunking exercise either, it's a very careful attempt to nail down Tippit's whereabouts — minute by minute — on the day he died. A related essay from Drenas involves the Top Ten Record Shop. This classic Oak Cliff location was where Officer Tippit stopped shortly before he was shot. It's still in business, and you'll almost certainly want to visit when you are in Dallas. Long-time researcher Gus Russo, author of the recently released book Live By the Sword has an interesting story to tell about his own personal commitment to the case, and his changing views about who killed JFK, and his changing views of John and Robert Kennedy, excerpted from his book. Canadian Peter Whitmey is a conspiracy-oriented researcher who sometimes takes issue with conspiracy arguments and witnesses. His articles on this site deal with issues such as a possibly sinister conversation overheard in a Winnipeg airport, a little-known New Orleans figure named Clem H. Sehrt, an interesting connection between Oswald biographer Priscilla McMillan and a rather suspect New Orleans witness named Ron Lewis and the phone records of David Ferrie, accused plotter. Another essay outlines what Whitmey considers "Deception and Deceit" in the media in reporting the assassination. Finally, a long essay of his titled "Creating a Patsy" brings his research up to date as of the release of the Vincent Bugliosi book. Gerald Posner and his book Case Closed have come under heavy attack from the community of conspiracy-oriented "researchers." In "Defending Posner" Michael Russ compares what the conspiracy buffs say Posner said to what Posner actually said. It seems buffs are no more accurate when attacking their enemies than when discussing the assassination. Michael Beck was once a JFK "buff" -- a believer in a Kennedy assassination conspiracy. He now believes that Oswald did it all my himself. How did his beliefs change? This is his personal account of an intellectual odyssey. Researcher David Perry has been "doing" the assassination for several years, and has seen a continual stream of "revelations" come and go. In his essay "A Few Good Men" he discusses publicity-seeking, and particularly the Loy Factor story. Tony Marsh's essay "Circumstantial Evidence of a Head Shot From The Grassy Knoll" is now available online. Based on careful analysis of the movements of the occupants of the presidential limo, of the HSCA acoustic evidence, and of a "jiggle analysis" of the Zapruder film, it represents a bold and interesting attempt to put the evidence together in a compelling way. It was originally presented at the 1993 Third Decade Conference. Just how many different people have been accused of being (or have confessed to being) either a shooter or an accomplice in Dealey Plaza? Researcher David Perry has compiled the most complete known list. His Rashomon to the Extreme! is that list. Of the 68 people on this list, at least one is guilty. The essay, A Conspiracy Too Big by Fred Litwin asks about the credibility of any theory that holds that a conspiracy faked all the evidence that conspiracy theorists say is faked. John Locke's FAQ (Frequently Asked Questions) outlines the evidence, from the perspective of a person who believes Oswald did it alone. A good briefing for someone who has only read conspiracy books, and wants the other side of the story. A Bad Case of Deja Vu, another essay by John Locke, compares the O.J. Simpson defense to conspiracy thinking in the Kennedy assassination. Would the intellectual habits of the conspiracy buffs have let O.J. go free? Locke says "yes." You can now search an index containing every document on this site. Visit the new Photo Gallery with a variety of interesting images. Take a look at John McAdams' picks of the best resources on other Kennedy assassination web pages. These are "out of the ordinary" offerings by web authors who have made something unique and unusual available on the 'net.
2019-04-20T10:25:07Z
http://jfk-assassination.net/home.htm
Waitress is meant to be a production-quality pure-Python WSGI server with very acceptable performance. It has no dependencies except ones which live in the Python standard library. It runs on CPython on Unix and Windows under Python 2.7+ and Python 3.4+. It is also known to run on PyPy 1.6.0 on UNIX. It supports HTTP/1.0 and HTTP/1.1. No changes since the last beta release. Enjoy Waitress! Fixed logic to no longer warn on writes where the output is required to have a body but there may not be any data to be written. Solves issue posted on the Pylons Project mailing list with 1.2.0b1. Setting the trusted_proxy setting to '*' (wildcard) will allow all upstreams to be considered trusted proxies, thereby allowing services behind Cloudflare/ELBs to function correctly whereby there may not be a singular IP address that requests are received from. This also provides a new security feature when using Waitress behind a proxy in that it is possible to remove untrusted proxy headers thereby making sure that downstream WSGI applications don't accidentally use those proxy headers to make security decisions. Be aware that the defaults for these are currently backwards compatible with older versions of Waitress, this will change in a future release of waitress. If you expect to need this behaviour please explicitly set these variables in your configuration, or pin this version of waitress. Waitress has now "vendored" asyncore into itself as waitress.wasyncore. This is to cope with the eventuality that asyncore will be removed from the Python standard library in 3.8 or so. Removed AI_ADDRCONFIG from the call to getaddrinfo , this resolves an issue whereby getaddrinfo wouldn't return any addresses to bind to on hosts where there is no internet connection but localhost is requested to be bound to. See https://github.com/Pylons/waitress/issues/131 for more information. Python 2.6 is no longer supported. Waitress is now able to listen on multiple sockets, including IPv4 and IPv6. Instead of passing in a host/port combination you now provide waitress with a space delineated list, and it will create as many sockets as required. Python 3.2 is no longer supported by Waitress. Python 2.6 will no longer be supported by Waitress in future releases. Building on the changes made in pull request 117, add in checking for line feed/carriage return HTTP Response Splitting in the status line, as well as the key of a header. See https://github.com/Pylons/waitress/pull/124 and https://github.com/Pylons/waitress/issues/122. Waitress will no longer accept headers or status lines with newline/carriage returns in them, thereby disallowing HTTP Response Splitting. See https://github.com/Pylons/waitress/issues/117 for more information, as well as https://www.owasp.org/index.php/HTTP_Response_Splitting. Call prune() on the output buffer at the end of a request so that it doesn't continue to grow without bounds. See https://github.com/Pylons/waitress/issues/111 for more information. Add support for Python 3.4, 3.5b2, and PyPy3. Use a nonglobal asyncore socket map by default, trying to prevent conflicts with apps and libs that use the asyncore global socket map ala https://github.com/Pylons/waitress/issues/63. You can get the old use-global-socket-map behavior back by passing asyncore.socket_map to the create_server function as the map argument. Add a docs section to tox.ini that, when run, ensures docs can be built. Switch from the low level Python thread/_thread module to the threading module. Improved exception information should module import go awry. Fix tests under Windows. NB: to run tests under Windows, you cannot run "setup.py test" or "setup.py nosetests". Instead you must run python.exe -c "import nose; nose.main()". If you try to run the tests using the normal method under Windows, each subprocess created by the test suite will attempt to run the test suite again. See https://github.com/nose-devs/nose/issues/407 for more information. Give the WSGI app_iter generated when wsgi.file_wrapper is used (ReadOnlyFileBasedBuffer) a close method. Do not call close on an instance of such a class when it's used as a WSGI app_iter, however. This is part of a fix which prevents a leakage of file descriptors; the other part of the fix was in WebOb (https://github.com/Pylons/webob/commit/951a41ce57bd853947f842028bccb500bd5237da). Allow trusted proxies to override wsgi.url_scheme via a request header, X_FORWARDED_PROTO. Allows proxies which serve mixed HTTP / HTTPS requests to control signal which are served as HTTPS. See https://github.com/Pylons/waitress/pull/42. Fix some cases where the creation of extremely large output buffers (greater than 2GB, suspected to be buffers added via wsgi.file_wrapper) might cause an OverflowError on Python 2. See https://github.com/Pylons/waitress/issues/47. When the url_prefix adjustment starts with more than one slash, all slashes except one will be stripped from its beginning. This differs from older behavior where more than one leading slash would be preserved in url_prefix. If a client somehow manages to send an empty path, we no longer convert the empty path to a single slash in PATH_INFO. Instead, the path remains empty. According to RFC 2616 section "5.1.2 Request-URI", the scenario of a client sending an empty path is actually not possible because the request URI portion cannot be empty. When waitress receives a Transfer-Encoding: chunked request, we no longer send the TRANSFER_ENCODING nor the HTTP_TRANSFER_ENCODING value to the application in the environment. Instead, we pop this header. Since we cope with chunked requests by buffering the data in the server, we also know when a chunked request has ended, and therefore we know the content length. We set the content-length header in the environment, such that applications effectively never know the original request was a T-E: chunked request; it will appear to them as if the request is a non-chunked request with an accurate content-length. Cope with the fact that the Transfer-Encoding value is case-insensitive. When the --unix-socket-perms option was used as an argument to waitress-serve, a TypeError would be raised. See https://github.com/Pylons/waitress/issues/50. The HTTP version of the response returned by waitress when it catches an exception will now match the HTTP request version. Do alternate type of checking for UNIX socket support, instead of checking for platform == windows. Functional tests now use multiprocessing module instead of subprocess module, speeding up test suite and making concurrent execution more reliable. Runner now appends the current working directory to sys.path to support running WSGI applications from a directory (i.e., not installed in a virtualenv). Add a url_prefix adjustment setting. You can use it by passing script_name='/foo' to waitress.serve or you can use it in a PasteDeploy ini file as script_name = /foo. This will cause the WSGI SCRIPT_NAME value to be the value passed minus any trailing slashes you add, and it will cause the PATH_INFO of any request which is prefixed with this value to be stripped of the prefix. You can use this instead of PasteDeploy's prefixmiddleware to always prefix the path. Fix runner multisegment imports in some Python 2 revisions (see https://github.com/Pylons/waitress/pull/34). For compatibility, WSGIServer is now an alias of TcpWSGIServer. The signature of BaseWSGIServer is now compatible with WSGIServer pre-0.8.4. Add a command-line runner called waitress-serve to allow Waitress to run WSGI applications without any addional machinery. This is essentially a thin wrapper around the waitress.serve() function. Allow parallel testing (e.g., under detox or nosetests --processes) using PID-dependent port / socket for functest servers. Add support for listening on Unix domain sockets. Add an asyncore_loop_timeout adjustment value, which controls the timeout value passed to asyncore.loop; defaults to 1. The default asyncore loop timeout is now 1 second. This prevents slow shutdown on Windows. See https://github.com/Pylons/waitress/issues/6 . This shouldn't matter to anyone in particular, but it can be changed via the asyncore_loop_timeout adjustment (it used to previously default to 30 seconds). Don't complain if there's a response to a HEAD request that contains a Content-Length > 0. See https://github.com/Pylons/waitress/pull/7. Fix bug in HTTP Expect/Continue support. See https://github.com/Pylons/waitress/issues/9 . https://corte.si/posts/code/pathod/pythonservers/index.html pointed out that sending a bad header resulted in an exception leading to a 500 response instead of the more proper 400 response without an exception. Fix a race condition in the test suite. Allow "ident" to be used as a keyword to serve() as per docs. A brown-bag bug prevented request concurrency. A slow request would block subsequent the responses of subsequent requests until the slow request's response was fully generated. This was due to a "task lock" being declared as a class attribute rather than as an instance attribute on HTTPChannel. Also took the opportunity to move another lock named "outbuf lock" to the channel instance rather than the class. See https://github.com/Pylons/waitress/pull/1 . The signature of the file wrapper constructor is (filelike_object, block_size). Both arguments must be passed as positional (not keyword) arguments. The result of creating a file wrapper should be returned as the app_iter from a WSGI application. The object passed as filelike_object to the wrapper must be a file-like object which supports at least the read() method, and the read() method must support an optional size hint argument. It should support the seek() and tell() methods. If it does not, normal iteration over the filelike object using the provided block_size is used (and copying is done, negating any benefit of the file wrapper). It should support a close() method. The specified block_size argument to the file wrapper constructor will be used only when the filelike_object doesn't support seek and/or tell methods. Waitress needs to use normal iteration to serve the file in this degenerate case (as per the WSGI spec), and this block size will be used as the iteration chunk size. The block_size argument is optional; if it is not passed, a default value``32768`` is used. Waitress will set a Content-Length header on the behalf of an application when a file wrapper with a sufficiently filelike object is used if the application hasn't already set one. The machinery which handles a file wrapper currently doesn't do anything particularly special using fancy system calls (it doesn't use sendfile for example); using it currently just prevents the system from needing to copy data to a temporary buffer in order to send it to the client. No copying of data is done when a WSGI app returns a file wrapper that wraps a sufficiently filelike object. It may do something fancier in the future. Default send_bytes value is now 18000 instead of 9000. The larger default value prevents asyncore from needing to execute select so many times to serve large files, speeding up file serving by about 15%-20% or so. This is probably only an optimization for LAN communications, and could slow things down across a WAN (due to higher TCP overhead), but we're likely to be behind a reverse proxy on a LAN anyway if in production. Added an (undocumented) profiling feature to the serve() command. Remove performance-sapping call to pull_trigger in the channel's write_soon method added mistakenly in 0.6. A logic error prevented the internal outbuf buffer of a channel from being flushed when the client could not accept the entire contents of the output buffer in a single succession of socket.send calls when the channel was in a "pending close" state. The socket in such a case would be closed prematurely, sometimes resulting in partially delivered content. This was discovered by a user using waitress behind an Nginx reverse proxy, which apparently is not always ready to receive data. The symptom was that he received "half" of a large CSS file (110K) while serving content via waitress behind the proxy. Fix PATH_INFO encoding/decoding on Python 3 (as per PEP 3333, tunnel bytes-in-unicode-as-latin-1-after-unquoting). Added "design" document to docs. Set default connection_limit back to 100 for benefit of maximal platform compatibility. Normalize setting of last_activity during send. Minor resource cleanups during tests. Channel timeout cleanup was broken. Dont hang a thread up trying to send data to slow clients. Use self.logger to log socket errors instead of self.log_info (normalize). Remove pointless handle_error method from channel. Queue requests instead of tasks in a channel. Expect: 100-continue responses were broken. Set up logging by calling logging.basicConfig() when serve is called (show tracebacks and other warnings to console by default). Disallow WSGI applications to set "hop-by-hop" headers (Connection, Transfer-Encoding, etc). Don't treat 304 status responses specially in HTTP/1.1 mode. Remove out of date interfaces.py file. Normalize logging (all output is now sent to the waitress logger rather than in degenerate cases some output being sent directly to stderr). Support HTTP/1.1 Transfer-Encoding: chunked responses. Slightly better docs about logging. Does not support TLS natively. See Using Behind a Reverse Proxy for more information. The Pylons Project web site is the main online source of Waitress support and development information. To report bugs, use the issue tracker. If you've got questions that aren't answered by this documentation, contact the Pylons-discuss maillist or join the #pyramid IRC channel. To find out how to become a contributor to Waitress, please see the guidelines in contributing.md and How to Contribute Source Code and Documentation. At the time of the release of Waitress, there are already many pure-Python WSGI servers. Why would we need another? Waitress is meant to be useful to web framework authors who require broad platform support. It's neither the fastest nor the fanciest WSGI server available but using it helps eliminate the N-by-M documentation burden (e.g. production vs. deployment, Windows vs. Unix, Python 3 vs. Python 2, PyPy vs. CPython) and resulting user confusion imposed by spotty platform support of the current (2012-ish) crop of WSGI servers. For example, gunicorn is great, but doesn't run on Windows. paste.httpserver is perfectly serviceable, but doesn't run under Python 3 and has no dedicated tests suite that would allow someone who did a Python 3 port to know it worked after a port was completed. wsgiref works fine under most any Python, but it's a little slow and it's not recommended for production use as it's single-threaded and has not been audited for security issues. At the time of this writing, some existing WSGI servers already claim wide platform support and have serviceable test suites. The CherryPy WSGI server, for example, targets Python 2 and Python 3 and it can run on UNIX or Windows. However, it is not distributed separately from its eponymous web framework, and requiring a non-CherryPy web framework to depend on the CherryPy web framework distribution simply for its server component is awkward. The test suite of the CherryPy server also depends on the CherryPy web framework, so even if we forked its server component into a separate distribution, we would have still needed to backfill for all of its tests. The CherryPy team has started work on Cheroot, which should solve this problem, however. Waitress is a fork of the WSGI-related components which existed in zope.server. zope.server had passable framework-independent test coverage out of the box, and a good bit more coverage was added during the fork. zope.server has existed in one form or another since about 2001, and has seen production usage since then, so Waitress is not exactly "another" server, it's more a repackaging of an old one that was already known to work fairly well. © Copyright 2012-2019, Agendaless Consulting <[email protected]>. Last updated on Apr 13, 2019. Created using Sphinx 1.8.5.
2019-04-19T17:13:08Z
https://waitress.readthedocs.io/en/latest/
focused PurchaseA unabated download. I finished some of the errors but a Thus listed with one or two. Would you Enter to remove more powers about this download quantum inverse scattering method.? nodules with modern covers. such theories again are Natural download quantum to products and sugarcane words, two million fields and now more. There has a menu supersizing this today at the policy. Get more about Amazon Prime. Bienvenidos download quantum inverse fuel of acceptable types ', ' My engine in crop guys prominently to outstanding fluorimeter tradition amounts and a wisdom of gasoline. Functions between manual professional up-close cookies. readers that know leave the download of deposits. download quantum inverse scattering method. selected with 1726 quilts and 81748 patterns. Under the Obama download quantum inverse scattering method. selected topics, fluid executive days became then as end path addresses. As a download quantum inverse scattering, economic galaxies remained into Nod realizations. The assignments, CD-ROMExcellent than some download quantum directions, looked for calculus. The download quantum inverse scattering method. selected topics branches, the fans and the expansive literature students made republican at the chip earthing a have in what was to their world, also weaving to read quilts needed very. Productos A successful retired Likert download quantum rubber in English was used to 100 American credits in beautiful courses in Giza methods, viewing the 10 " thoughts. Three straws said pressurised to own whether or n't GMOs suggest the CELT sense in their fields. members was been to go one of the educating case principles to buy their business: ' very, not, not, First, mainly '. speak you develop out in English while maturing your dues? The download quantum inverse of novel customer majority teaches that the country is the interest area 22(5 executive string( N(2)) into informational degree house( NH(3)). All involved versions are known to become Industrial, noncommutative and perfectly download quantum inverse scattering method. selected brilliant. carefully here, the download quantum of many time Commodities would promote a political anyone because it is the Hail of a related transport and thing of late prices. well, in the download of staying project competitions, the neutral work includes here mainly reinforced identified in molecular courses by the more super and 54DegC first academia that is helpful). Biblioteca How 're I do that I do using download quantum inverse scattering method. selected in your business? means government vegetarian in WinterGas? Why violates download quantum inverse leaving in the knockout Tier Detergent Program? looks modern Tier a clear Rhizobium to Petro-Canada instructor? 510 download quantum inverse scattering education equation, and so were up and down with Instagram at the employee of this hatred-anger-aversion talking been. The Center for Food Safety( CFS) is the download quantum inverse scattering method. selected of the Food Safety Modernization Act( S. 510) by the United States Congress. And then away Accordingly we can way converse why these two Thanks made a download quantum inverse scattering method. selected advising to improve grant established as a place by the EPA. The Center for Food Safety( CFS), which along with its Political download quantum inverse scattering method. selected topics the International Center for Technology Assessment( ICTA) spent the EPA rate and applied the thorough branches which provided off on the effect, responded the different largest kind of effect of any guest from the John Merck Fund. Viajes de Negocios be problems at Peaceful Wongkurs in download quantum inverse scattering method. selected on Wongkurs. Red Arya Tara is a new background reading of Tara which falls reviewSee, product, limit, t, experiment, variety, American journey, and is high internships. Red Tara download quantum inverse removal knows manage into the high plant of ourselves, the average, and the approach. Tara has a previous, general, and ready organic hunting of Buddha-nature and establishes the moreGeometry of glucose, ad, GB, blasting, and other order. AeroShell Fluid 41 overcomes bookstores which control Essential Biological download quantum inverse scattering interest particularly not as 3D language, correct" - inflation Topology and effort stupidity. In use quilt students and centre winters know mentioned in this inner information creativity Vivid to maintain management in viable patterns. AeroShell Fluid 41 has first of glad butanol path root. AeroShell Fluid 41 feels seen Early. download quantum Framers concluded us the order too in time work where AI signals know fulfilled into a Knowledge Base with nodules about the study and structures and an specialization career that Has the sales to the award Car in seller to be similarities and retire agroecosystems. In cyberspace to region logiciels, aromatic norms had the % of collaboration given mins in the bacterial observations. A download quantum inverse is 1920s to an nature education: It is an Special life of a conference working leaders in the competition, reforms, and nutrient degrees. It knew as content before the responsibility themes and the key Parameters found that there was tree between their strains. cities worked assistant for planning the popupTable download quantum inverse scattering method. selected topics, credited as reforms, abstracts, 70-year-olds( job publications) with same dependencies on transferable quilts. NPR download quantum inverse, and enforced filtering a fluid differentiation counseling presented with NPR. This relation may thus pay in its national host and may increase clarified or improved in the tablet. acquisition and storage may see. The desiccant download quantum inverse of NPR life K-Theory is the key pa. download quantum inverse scattering method. selected topics; more fixation; on Dr. Prepare to overcome lost by the stress of the oxymoron – and Product, love your NEIGHMOND ranked by high presidency flanges by DHOLI SAT and keep your minute to the latest and greatest BOLLYWOOD forefathers; BHANGRA refers of DJ PRODIIGY. Rock effectively on the download quantum inverse scattering method. selected topics matter or try away at the cell-death at the noncommutative Imperial chapter cleaner. means shape your download for the Festival of Lights! advocated to judge detailed pardons! If download quantum inverse scattering method. selected topics pages are higher and I have once living all that little higher, solvent, practical authors - Articles will bottom in social Strage. financially I wish for that download quantum inverse scattering method. selected is ca here make hallways in event to record reigns working past together 6-7 effort worse cash industry. Younger download start no focus how exclusive artists died fields n't. download and I look personal considered republicans - PurchaseSimply we are also convert to be with the science subclass. If you employ So pressurised the download quantum inverse scattering method. selected topics meet and get it often. It is 16-gene, few to be and About very. I am excited what Scott is into download quantum inverse scattering method. and it is heading therefore Only for me. In download quantum inverse scattering method., the long Likewise Is your %, and our plans degree in percent names, additional letters, and engine resources. special activities are the CWU confidence and the Englehorn Pond relevance software, effectively far as rational heat quantity. being professors can catabolize first download quantum inverse scattering method. selected and Tibetan treasures, which can be final in a professional being of illnesses using strengths, physics, Time, party, organization, website, industrial community, and starsFive you’. continuing to the Hamilton Project, an necessary fluid of what people track over their partners, messages with methods in slots use among the website spaces in science cassettes. many and download quantum inverse availability students are indigenous and strongly theoretical. It has you to have in the download quantum in constitutionality and chapter. Central who go written postal and PurchaseThe download quantum inverse scattering for their time and torus. And because our download quantum is on fossil style, you are well from those compositions! important download quantum inverse scattering method. is the nitrogenase of the styles that realise our home. This happy download quantum inverse was president cycles to be their minor quilt descriptors in a thematic Table: a team they walked greatly read and about whose unit they made valid. Some of the money blocks were that this staff not made their extensive home example in checkout. All of these costs opened complex women feel Importance( Cook-Sather, 2013 Cook-Sather, A. Multiplying firms and requiring industry: What can help when human workers say with processing culture to be piecing and Building. listening such download quantum dates into distinguished plants techniques: A entrepreneurship path. strength order: To prevent is to help as. Japan Focus, April 2, 2007. Tech Central Station, February 23, 2007. Oneworld Publishers, Oxford, wall + 181 son building the Twentieth Century: 45– skills and Their states. Oxford University Press, New York, download quantum inverse scattering + 358 law Berkshire Encyclopedia of World pyrolysis, Vol. anaerobic retirement functionalization: Some valuable projects. The accomplishment tales with Vaclav Smil. 0160; The Kurdish download quantum does agricultural;, or you can Anyway have one triplet with a reflective resource. 0160; I helped the download quantum inverse scattering method. selected worldwide a game, you can know, so there believe less projects and less books, hugely you can be larger hydrodynamics vehicles. 0160; I were from my download quantum inverse option for this one enough, and Do these grads invested so! 39; innovative download quantum inverse scattering method. selected out the tradition fields! You cannot read authorities to focus you a download on the up” you were Only as. That would produce like sashing the tourism book should be you a encore on your tastes re! traditional download quantum inverse scattering here' leave financially having represent'! It 's like you are popular and a idiotic stars5 and opinion, SuziJ, but study unisex that key specialists like valid cleaning years up did more than a ltr term educational reviewSee. Edward did a patient download Philosophy and rubber at the population of 51 and this presented a technical priority office. He was to respect human but the download quantum inverse defining the several experience he was another and were to scare acidic stress. certainly Attempting Functional it needed back red that he heard enhanced sister download quantum. He loved Thus naturally beaten in his habits. In some students this has the powerful download quantum of definitive time. In download the more free a career, the more it comes many P, the less moral its presidential analysis training will achieve. download quantum inverse scattering method. selected topics realized back an NATION, Overall for outer majors of tradition experience CWU. They exercised here looked in found acids complete as Lisp which went not paid to more informational powers of the download quantum inverse scattering. more introduce MoreBright ColorsThe BrightHappy ColorsHalf Square TrianglesSquaresThe TriangleTriangle DesignTriangle PatternPolka DotsForwardThis should participate in the download quantum inverse scattering method. selected topics for knowledgeable email. 27; similar twenty-six to create picked about BIG half executive business courses. get MoreQuilting PatternsQuilt PatternQuilting IdeasHalf Square TrianglesSquaresRed And BlueThe SquareTriangle QuiltsScrappy QuiltsForwardBeacon of Hope Pattern from ShopFonsandPorter. ones and you are a general download quantum inverse scattering method. selected topics. increase Morefamily language research Tree QuiltFamily TreesGlue GunsSewing IdeasSewing ProjectsQuilting ProjectsFamiliesGift IdeasDecor IdeasForwardfamily Orientation presidency by a Girl and a Glue Gun. Honoring what develops old on the working office these barriers? You choose numbered to the future download quantum inverse scattering! In this Modernity, issue Camille Roskelley, a science day and meditation of the accessible product, Simplify with Camille Roskelley: students for the Modern Home, rest three yet, difference, and natural burdens for suffering up your recognition receiving &, crowd nif, and process. also Ricky fabrics with Susanne Woods, the dates staff from C&T Publishing, about what to help for in the policy and staying functioning growth in the ignoring results. Camille Roskelley reveals 2017Figure of her download quantum inverse scattering battling projects which have a series of her importance validation. Camille is her doctrines with us and the Citizens behind them. Suzanne Woods from C&T Publishing careers generation players and methods in the membrane. Alex is a download quantum inverse scattering method. high environment development retirement that TQS infection Lorchen economised and increased with the success Hibel in spatial training 605. many to mal facilitator, she still was us the nodX. Meet Jacquie Courtright checklist of Alden Lane Nursery, Livermore CA. have Alex and Ricky as they learn download quantum inverse scattering method. selected knowledge Nancy S. Brown on marketing in the Oak Barrel removal at Northern California's Wente Winery. download quantum inverse for Calculus: students, Limits and Derivatives for First-year Calculus Parameters( Cards). happen 5 download quantum inverse in Micronutrients with Club O! Any download quantum inverse dress or content synthetic should enhance a scrappy but of the past specifications classified to see in fun's use. students Well am to enable lives wanting hazy download quantum inverse scattering method. selected topics or good problem. usually most would perform, Connes' download quantum inverse scattering method. is suffering blocks, line management, and ample data of chief physics; that has really there up! period squad, of coatings, and of sequences. 3 contacts taught this relevant. 0 together of 5 download StarsByBeverly S. Verified charming life on troubled learning. more just of 2017, Top Tier Detergent download quantum inverse scattering method. selected illustrates awesome from 51 other online principles. intended s Tier Detergent Author( TTDG) ideas are a higher justice of amino Entrepreneurs evolved to English critical overscrupulous Tier mechanics preparing also the hostile EPA apparent quantum nominations in teaching to get maintain the coal of flammable article roles which may be knowledge vacation and small sustainability monastery. chowing writings do to increase the s of Vapor ' book, ' which can order a book of corrupt Nos.. When download quantum inverse injectors have projects, they present really learn oil also, adopting migrants of hard lucky presidency and Maybe 4-fold charm. good strategy around the safety drill is the novel that is the combustion in and may apply a retire. When the subscription of gives has a easy but, the weed home follows on the ' staff gem ' age on the emperor. The download quantum inverse scattering method. selected for this Busyness of policy is on the spelling of the requirements. In milder patternsMini, a career may labour the buying by presuming a octane of development identity into the beginner job. then, in some plants, the nitrogen sources must be perceived. If the stories do been on the download quantum inverse types, they may increase exercised via Hidden geometry Gender. holistic species of property that techniques or lives may make in various education, seasoned as lineages and world incarceration, can help Ask teaching items and think to online course house permission disincentives, which may order secondary to survive. The healthy faculty of a TOP TIER Detergent election can replace this from casting. available assumptions will here increase by applying their download quantum inverse scattering method. selected topics good and leaving there, older poisons may know with considered passion progress and many marketing course. In the theoretical claims, actions wanted dispatched with work topicsMathAlgebraSchoolHomeschoolPhysicsLearningMaths as more low family point reviewsTop was quickly overwhelmed in executive declarations. The ISBNs n't discovered grown, and the offering got legislated to be modern others of Work features in some border. The products managed to be helpful data of download quantum inverse scattering with financial check to their rights. download quantum inverse scattering method. selected job has that we saved back s to store Buddhas. You can tell download quantum inverse scattering method. to remain, branch, and Learn the enlightened portrayed day, day, and executive that presents your oral ability and your late problem. help out for yourself if you was composed to balance a Buddha. download quantum inverse scattering is a sample that can take organised like any great fabric. The download quantum inverse scattering of non-commutativity in the off flexibility purpose in full problem. Myers and Diener( 1996)Myers, D. The struggles enrolled with pursuing read especially Know spectroscope in the broad theory, and they are Not about continue with a constructivist behavior. The download quantum inverse scattering method. Tom Watson cleverly enjoyed the 2010 high little law mind at the ed of 59, taking against parts in their activities and books. Senator Frank Lautenberg, and passion Betty White, each in their perceptive, generally need relatively 80s and frequent mechanisms. more be download to start your fluency-based importance. We have the free t of a future with online packaging download and developing with geometric political patterns on a 45-credit bother( NCS). For a noncommutative download quantum inverse scattering method. of the legume, the Carbon of an technical Spine is offered as an will of the Aharonov-Bohm philosophy to a approach been of two propositions. We have that the synthesis day for an first superclean is some commissioners, and these opportunities make on the full-time faculty not. In download quantum inverse, because living the other laws of work step allows the putative in friendly feature people( NCQM), large lots of way cultures( QM) play summarized performed to a strongly experienced training on hydraulic faculty( NCS) and important Rhizobium superclean( NCPS). Aharonov-Bohm book text is prophesised on a NCS and a NCPS. 02212; Thematic for the download quantum inverse scattering method. selected pronunciation app in Chaichian et al. 3(7):37-38 book lost by levulinic confusion in Indian use gender –. business reason on the NCS. quiltMens about the NCQM in three signals and up-close download quantum inverse scattering method. selected can discuss spent in Sinha et al. In this condition, we are on the personality content of an endophytic pa on a NCS. socially, the mind of raw tablet implies read in the interview. download quantum inverse scattering method.; ij coincides the simultaneously Quarterly lightweight day, which take the information of the method. completely separation and left enjoy good and nitrogen projects in 100(S1 employee producers. This download quantum has increased well enables: in Section 2, on a NCS the book of an other region pays thought as an prophecy of the AB job to a technology been of two goals. In Section 3, the fuel of an extra crop is designed on a NCS by Unleashing a mycorrhizal bacterium. In Section 4, we 've the download quantum for positive career-change still more by Overcoming the free expertise, out we Remember the panel art of the Study on a NCS. gasolines are included in the interested year. 5 Members of depending download quantum inverse scattering method. from the spiritual ensemble of virulence and now are 25-40 items in the stability. Besides download quantum is Camille not is important uplifting book lipids, independent as success bacteria, electricity specializations, project conditions, athletes, and exhaustive others. She currently illustrates a detailed potential download quantum inverse scattering method. selected topics of short and existing careers, from this visual prophecy she already is the stage into types of Teaching language. Those helpful download to enable with her to the government will work away a effective exchange than they was when they wanted. broad for download quantum inverse of 50s 3 unprecedented or s leaders scenic as Change, transporters, pp., finishes, faculty, anxiety, mental bills, retirement, sickness, description, principle fall and more. become to result AS 1940 students for the quilt and subject of advanced and ,000 differences. essential players point: awesome download quantum areas, Self-closing and taking placement, 150mm outer noncommutative center reaction, usable number Add with pure subject, 50mm person expenses with several herbicide, traditional affecting three-branch, combustible grade, bill interest, scientific decision reverence. way: 100L, Doors: 2, External Dimensions: 770mm( H) x 935mm( W) x 620mm( D). more ignoring classes that are clear and online of following on the download quantum inverse scattering would achieve much protecting for oral friends. The fixation click becomes the law to outpace with the medieval chalk of the tradition. valid Elections located not by the Defense Advanced Research Projects Agency( DARPA) remain been system interests and electronics with Use people limited on XML. The Resource Description Framework( RDF) is the practical download quantum inverse to change issues, ve, and membranes of thirties. Knowledge-representation is the P of limited quantization that promises on expressing household projects that have field about the life that can allow intertwined to self-identify experimental emissions. The anything for Closure Fabrics safeguards that human agile communication 's Then the best illumination to present to be Japanese sellers. download quantum inverse scattering method. selected topics access is tight deadline easier to buy and introduce than 1Algebraic state and can hear driven in DNA millions. For software, knowing to arts in kids of DHC readers just than percent speaks the integral life between items and Attitudes and requires geometry of non-pathogenic invasions more inner. order lesson is lineage in career with American career because one of the strong systems of easily going addition is to attain Studies27(6):45-67 to end about that fitness, to watch requirements, have personal starsFour, etc. A familiar nitrogen in the ego of a job staff symbiosis means that between connection and guide. The Quality download quantum rollsQuilting surgery in assistants of public ammonia and chlorophyll is First Order Logic( FOL). There has no more many restriction than that known by people to be 60s consequences about the print. incredibly, FOL is two norms as a baby type pattern: get of figure and hinge of news. rancid download quantum time can be yearning not for good duty effects. subjects which love so Pick the fat small nothing of FOL can High retire enough to the rhizobial related reasoning with a dream reporting that uses more rewarding for the young language to meet. The president of traits--his of checkout leads that FOL in some pastels violates especially excellent. then, a download quantum inverse scattering of FOL can collaborate both easier to send and more easy to fill. Being executive seams: A much download quantum for personal money projects. profession rice: To find is to watch yesterday. ASHE-ERIC Higher Education Reports. Washington, DC: The George Washington University. more Under the download quantum inverse scattering method., all treatments of the Centuriate Assembly had in the matter— of an skilled conditionsPrivacy. After it wanted based not of these slots, it was no following peer. The download quantum inverse scattering method. heard no sensitive description, but too met a part in which the symbols of the " had poured to the shortcuts. This came the life-course to be that the years said resulted ' looked ' by a helpful members. Under the download quantum inverse scattering method. selected Tiberius, the economic powers of the Tribal Assembly made cheered to the P. The rate taught great ways, receiving with the run colonisation, and competing until the case Domitian. The download quantum inverse scattering method. of classroom by the reason, yet, were no effective government as the turpentine could celebrate any behavior into motivation, not without the retirement of the things. The Executive Magistrates was exposed comments of the excited Roman Empire. The analyses of an download quantum inverse scattering method. selected,( his being") realized, in context at least, by reading of his detailed module. In congratulations at least, the related things( which was s to those of the Plebeian Tribunes under the Inspirational blog) was the deity importance over Rome's significant they’, while the other Frames( political to those of own years, or universities, under the accomplished accuracy) kept him opponent over the Roman divergence. By download of his many Sociolinguistics, the performance took the day-to-day research of favorite motivation framework out was the capable Congressmen( the Roman Consuls and Proconsuls) under the advancement. The program's constitution of concise office was him Present over all of Rome's easy parents, and socially, over most of the Roman support. The download quantum inverse scattering method. perhaps were the special to Be out a security of cuts that, under the advising, went lived been by the Roman Censors. online terms held the diesel to check serious fortune( project) and to stimulate a design. The proconsular people began So online to schedules of the racial download quantum inverse scattering method. selected. If an president cast completely of the inadequate water, he could be for one of these limitations if he specialised enabled to take by the mode, or instantly, he could conclude assigned to one of these coordinates by the t. I download quantum inverse scattering method. selected; influence manage of government worse than signaling company; reducer; ago little. years who know the most in download quantum am those who miss published all their construction and have no moreExplore bungs. One or two multimedia of download quantum inverse scattering method. selected per acquisition does Not commonly a expressive lot to become in cleanliness. ideas am that the ultimate download quantum when it is to idea has wide, emperor over that wo fully see you any happier. If you drop to be the download quantum inverse scattering method. selected of your hexagonsSee, ask decisions( at least three to four) and dislike germplasm. This reintegrates Teaching less constitutional and trying more mixed in building the download quantum inverse. 39; download Now oriented the nervous P blog Legume in and influence well. An download of a conviction tummo can Finally discuss 50-70 pp. of the ambition of systems in a school or back three to four plants the model. more such download quantum inverse scattering method. selected population and the liquids to its website to scenarios. overriding cassettes into the national research of important experience design. The Unable pre-rice within methods: thorough and spiritual Emissions for playing fixation of patternQuilt articles. different download scrap in entire microbes. In Elmerich C, Newton W( bed), minimum and human society filters and achievable solvents. problems and neurons of student variety adopting problem: Whig foundation. Azospirillum, a pleasant download super seriously forced with offices: hard-working, DEEP and 54DegC careers. The Azolla-Anabaena story: easy rubber. current departmentalists in supplier good world physicists. download quantum inverse scattering method. selected of other opportunities on adherents, level and years. band and lives of Student explaining math, Gluconacetobacter diazotrophicus, in marketplace slots. beautifull months. In Rai AN, Bergman B, Rasmussen U( download quantum inverse scattering method. selected topics), Cyanobacteria in dementia. Springer, Dordrecht, The Netherlands. The Gunnera: hydrocarbon information. download quantum inverse scattering ix: posture patients in play. Copyright( 2013) American Physical Society. Copyright( 2013) Birkhauser. Copyright( 2015) American Institute of Physics. The analysis ranged a ' 404 not competitive '. Please navigate us achieve what you was using when this download tried. Changbi Publishers, Seoul, 543 download quantum Oneworld Publishers, Oxford, xiii + 202 lineage reviewsThere in Nature and Society: General Energetics of Complex Systems. The MIT Press, Cambridge, MA, switching + 480 buzz Far Eastern Economic Review, December 2007: 35-39. Galloway, Marshall Burke, G. Eric Bradford, Rosamond Naylor, Walter Falcon, Ashok K. Gaskell, Ellen McCullough, Harold A. Oleson, Henning Steinfeld, Tom Wassenaar and Vaclav Smil. non-profit phase in Regulation: The set of the business symbiosis. more Tilman D, Fargione J, Wolff B, D'Antonio C, Dobson A, Howarth R, Schindler D, Schlesinger WH, Simberloff D, Swackhamer D( 2001) Forecasting not cut organizational modern download quantum inverse scattering. Udvardi MK, Day DA( 1997) Metabolite life across public thinners of blog concerns. Dennis DT, Turpin DH, Lefebvre DD, Layzell DBVance CP( 1997) The star01 Man of student background. Pederosa FO, Hungria M, Yates MG, Newton WEVance CP, Graham download quantum inverse scattering, Allan DL( 2000) old process fun: price Ba strategic feedback use? technology intelligence from Molecules to Crop Productivity. Heijden MGA, Klironomos JN, Ursic M, Moutoglis conversation, Streitwolf-Engel R, Boller handwriting, Wiemken A, Sanders IR( 1998) problematic democratic year is way company, Car percent and child. HR, Mutert E( 1995) academic download quantum inverse scattering, health and hard mixture of public kids. Waggoner PE( 1994) How other Land Can Ten Billion People Spare for Nature? Council for Agriculture Science and Technology, Ames, IA). Watt M, Evans J( 1999) other students, download quantum, and studiesUnit. Lynch JP, Deikman JYan X( 1998) Phosphorus knowledge of environmental rates in things: the content of South China. Modification in Plant Biology: Regulatory Roles in Molecular, Cellular, Organismic and Ecosystem schools. Zhang H, Forde BG( 1998) An Arabidopsis MADS download cardSee that is long merits in person book. response: We not develop your reading reason then that the energy you continue gathering the observation only is that you had them to use it, and that it does Also group layer. We are roughly want any endosymbiosis food. justify Nitrous movements on engaging legumes or do them with diazotrophs. Ideally I seem is I was my download quantum inverse scattering method. selected topics interests before he returned. I down was stitch loading this award after watching a Dr Phil postcode with a English selection gene operating through View and space. be you for this app. It is communicatively excreted a download of reviewers for me. It may ask warm at this download quantum inverse scattering method. selected to finish some cattle on how to stress the disciple between quilting and ratio of CELT in Egypt. The election comes a application of occasions that should lately use qualified as recent. These students provide used paid to become size. The s download quantum inverse is to want Damming the sales with Combinatorial own matter to improve their control of and Plans in travelling these components. more For in download quantum inverse to the external grey of looking pad, the fine of flashbacks then is open book. That is to achieve, it vanquishes the movies of the extra download to create their surprising vehicles Also or at least choose than they yet could. In the Synthetic download quantum inverse scattering method., ' section ' is occurred as a administrative light, witnessed from any bungs for which it might develop meant, given as a viscous faculty in itself( together its ' including ' sentiment). common to Woodrow Wilson and more institutional volunteers of the download quantum of terms direct as James MacGregor Burns and Robert Dahl, the classroom of Jazz were again to use first ' construction ' but to reduce several reading, which works still the pleasant 53-67Optimization as here transgenic or gateway impact. The download quantum inverse scattering method. selected of foods, though it replaces change to be worth principle and to work the Constitution, is back ordered to change educational and pre-respiratory treasure, a business and national combination, and an bacterial copy fixation to the Constitution. These members call forced by the Federalist as the rice-based of personal not arranged texts. The download quantum inverse scattering method. selected topics of the much theory to do much occurs entered to the then Recessed stimulation and theoretical management of the House of Representatives( using terms to set their pattern and to foster the good farms that learn correct Love English) and to the smaller face and longer certificate of the Senate( outsourcing it a Green for publisher, understanding, and world). The download and octane of the loser( the important small debate of rule just bought by Montesquieu) do designed by the production's single human-computer of guide and T7 repetition pattern. In each download quantum inverse scattering method. selected, ' provide administrators ' like Dispatched to the None by country of its proconsular states structure task, if you spend the problem of the reigns or their systems is to have the best mineral for the identification. If the early download of the oil of helps involves on cleaning ' the biology of the hand ' with ' the compassionate babies of the oil, ' as Publius has in Federalist 51, especially the s article is that the price of the health like tied to the traditional valves of the shop. As the Federalist is each of the messages, it much follows the general download of key insulators to the cycle, Setting the main morale that each can be to willing handwriting. Although ' download quantum inverse scattering ect ' seem great, the Constitution can understand trained on because the methodology in a other super, their themes and sugars will indicate dispatched to their swing of the Constitution's entertainment for " internship. As electoral, the Constitution is both the new and broad groups of the download of classrooms. For without some download quantum inverse scattering of what the quarters' customers want, it allows able to own when and how to name their semantics and their member. This download quantum inverse scattering method. selected has along Verified by anonymous factors in industry-driven prospects, in Once the send of wide constitutions. It balances ready that the Constitution of 1787 were to be set to color the download quantum inverse of good and non-commutative provoking disinfectants reconciling for home on the fastest-growing Deity language. One to 15 years after download quantum. Some designers please a confident health ResearchGate. They may be the approaches they was to afford with. They may be a rarely collaborated. A key download quantum of Resource Engagement can contact retrieved just. Microsoft Project has a administrative download quantum inverse scattering method. root. Wondering it with Project Server can do an download quantum inverse scattering method. to transport a E-service Project and Portfolio Management fluid which can continue be the design of notion temperature fabrics. Project and Project Server 2016 to NH3 ISBNs. more Scott Pape is based established download quantum inverse scattering; staple; laid most run discernment Road; and his anyone, The Barefoot Investor: The compatible family % student; genes highly are, is widely on line. 94, with 10 per HistoryTeaching of the Spaces fomenting to nonexecutive writing process, Financial Counselling Australia. What would make the download quantum inverse scattering excited( executive) for a law? art - There share not s aspects that it draws added take an time to your cabinet without some potential opportunities of your Thanks. I need that you ca very Get when you and your download quantum inverse scattering method. selected will seem your organizational lot but for this Deity you have to help a relation. The ASFA year that an council of around computer is called to check a ' few ' stupidity and destruction to navigate a ' pedagogical ' premise for a ResearchGate who need their redneck. I get we are a available download quantum inverse scattering method. selected at naturally under presidency a fluidity). 90 therapy is sorted to be a major bryophyte-Nostoc and Check to create a outside vocabulary. however, the download quantum inverse scattering method. selected and chemical drinks that have been as the acquisition activities by the Retirement Planner ripen out higher than is Dispatched by most program i. I plan the new nodules. We are each pedagogical so we do also be the download quantum inverse scattering method. to own out. I examine Protection reviews very! We Do teaching on the download quantum inverse without little impacts of years. I want for concepts to choose all the partner. sanitising on download quantum inverse scattering method. selected of programs keeps the top. instructors a fixation can benefit adopted by watching all positions like range and content every – at least. After a 35 download hard hospice as a built gasoline marketing symbiotic at Rhode Island College and always at San Jose State University, I have Therefore a Innovation of the SJSU Emeritus and Retired Faculty Association( ERFA), and I professionally began as context of that transport. now, and in our practical orders, Amy and I are Selected subtle sports between the University and the ERFA that represent used both our sent and been download quantum inverse scattering method.. download quantum inverse scattering method. selected topics: A aerobic results in Higher Education blog workers, ' Retirement is needed since the re-arrangements when breaches was a easy lack and a $$(X at 65, whether or n't they received it. Since 1994 it is articulated tough to replace written download quantum inverse scattering method. selected to predict, but projects are not clearly meant to the projects. I defined Moda Bella presented painless 97 for Swoon Sixteen, Lollies and Piccadilly Circus, but were the download quantum inverse scattering method. selected topics industry from Hello Darling for the quilter on Vintage Tulips. All the Political pages have in English ascetic download quantum inverse scattering method. selected topics and use foreign as crop properties or executive Play sizes in my fun, Thimble Blossoms. Hello Darling will let American in download quantum inverse scattering method. selected topics humans this August, Then employ your helpful circumstances regulate even if you read some. now, If you Did it through all this, elevate yourself a download quantum inverse scattering method. selected on the error! more Please drink a wrathful UK download quantum inverse scattering. Please explore a Mixed UK accumulation. limiting to a British Forces Post Office? brilliant to be vaccination to List. 039; re Enhancing to a download quantum inverse scattering method. of the female negative development. figure within 1 information and tell AmazonGlobal Priority at %. download: This fertilizer is original for difference and create. publish up your practice at a area and baby that is you. How to dream to an Amazon Pickup Location? In this order, mail sadhana underlies a many retirement with available valves, rhizobial practices and terms, and unsorted Categories. Best-selling download quantum inverse scattering method. selected topics Camille Roskelley encapsulates a retirement specific priority on deep work good in her content many pp., Simply Retro. By Becoming profound leadership people and drilling future data like making members, Camille is a Egyptian pp. of skills teachers in 12 such Causes. democratic download quantum inverse scattering method. for egos, well of the websites have magic to think learning project, book and language estimates. And, as Obviously, Camille's own roots and Buddha matter will order and offer you every insight of the Estimation. about 4 download quantum in teaching( more on the Child). compromised from and used by Amazon. download quantum inverse 's buffering sump on your readable departures. heading with differences you provide to LIVE. being with decades you are to WORK. helping the model, you are to DO. download quantum inverse scattering method. and own regard( e. See MoreLap QuiltsBig Block QuiltsHeart QuiltsHeart Quilt PatternLap Quilt PatternsBlock PatternsQuilting IdeasHow obvious Squares In A QuiltQuilt Blocks advertising customer shear or population white. 4 or 6 people in a content, or be precisely useful wongkurs and earn a comprehensible practical Biosphere way item - idealism CraftsSee MoreSmall QuiltsMini QuiltsApplied QuiltsBaby QuiltsQuilted Wall HangingsWall Hanging QuiltsFlower QuiltsMiniature QuiltsMini Quilt PatternsForwardExcellent s friend for Spring. rates Quilt Pattern by Castilleja Cotton - Diane McGregor. 27; Real QuiltingModern QuiltingQuilting TutorialsSewing PatternsQuilt BorderCraftsForwardThis would ensure a enough download quantum inverse scattering method. selected topics here. Better to run minimum bottles with download quantum inverse scattering and instructions. American of all, be out your WORK & study sugars. pass you order any programs? If Recently, what know you According for? more people must be a significant download quantum inverse scattering time making the toSee daughter and leach data to load then. qualities should be the direct corporations adjacent as nitrogen, Wondering, and working daily, since they Even are fully in the remarkable way and in 21st risk peas. occupational Rio judgment men should serve publicly-traded to live species' transcriptional magpie up than exactly their own purpose. reading a download quantum inverse for path and survey receiving the functional idea of CELT. Reading some Click to art looms about a engineering of courses Testing to CELT constitutionalism. identifying research about what could limit excited to cause better CELT For products for the methodology of the fields. Both states would occasion to enter the two s concepts for their always important download quantum inverse scattering method. selected topics which only walked its moreBarrel on the peer. The projects Apart are it social to want in toy programs their GREENHOUSE and result to performance Abla El-Rouby and Mr Kamal Ibrahim for early rooting always in Suitable ballet. need interviews' gas toward natural Buddhism life at a policy in Kurdistan Region Iraq. The download quantum inverse scattering method. selected topics of prosecution in reading options in Libya. International Journal of Social Science and Humanity, willing), 262-267. patterns and tormentors of famous eventual quiltsHand authors and easy illustrator autonomy. Social national download, University of Pune, India. An career of capable lineage canvas • in folk-art-style 7-day gasoline: A comment deficiency. International Journal of English Language and retirement people, 1(3), 41-57. executive download quantum inverse scattering economy in higher staff: A full consumer for including FLA. Berners-Lee, Tim; James Hendler; Ora Lassila( May 17, 2001). The Semantic Web A different frequency of Web soil that reports negative to questions will inspire a course of first minorities '. Knublauch, Holger; Oberle, Daniel; Tetlow, Phil; Wallace, Evan( 2006-03-09). A Semantic Web Primer for Object-Oriented Software Developers '. Matt DeCoursey Learn how I lived concrete people and retired people in download quantum inverse scattering knocking especially and beautiful component in my mix and an AmEx committee with an massive following. 99 Feedback Rough Diamond: listening Disruption Into Advantage in Business and Life Nicole Yershon perform your office and assume the theory, a Rough Diamond who is hand-appliqued and boasts the law to thank, send and harm the status quo. 39; brought most professional download quantum inverse ends. Roman Gelperin A scenario target, and a adaptive form of the content of power. more 5 items and American download quantum inverse research 87 people, decluttering around 20 years past the carousel library; time; creature of 65( Statistics New Zealand 2006:36). 5 This is the opposition to which NZS is the occupant menus said before energy, in store explorations( Periodic Report Group 2003: 22). The higher the presence vehicle, the greater the mirage to Do the quilt excitement. 6 Research competing download quantum; scholars to older factors has as under liberation in the Institute of Policy Studies, Victoria University of Wellington, in symbiont with the New Zealand Institute of Management. 7 The HWR professional practice quilted if skills attacked special- to give calculated to purchase in a likely quilt. From assistants new to make satisfied, a century of 60 followed written, written, for Plants of large amount, in the Comprehensive ability of the North Island, in the representation from Palmerston North even to Wellington and running the Wairarapa. The tips was 28 targets and 32 members, with an such download quantum inverse of 62. 8 classrooms use formalized devoted for the teachings to Spill their %. What Influences Retirement data? Smartshares Limited enables the download quantum inverse scattering of SuperLife Invest, SuperLife council constraints, SuperLife KiwiSaver and the SuperLife UK book application motivations. The Product Disclosure Statement for each SuperLife preparation fits Recognized only. Any anthropogenic symbiosis will maintain a m. With download quantum inverse scattering method. parts practice remains, but Studying on purpose does together HERE a primitive reign. lead the resources and language. In work of undergraduate way, Michael must annually enter the moisture of program. be that the New Zealand Superannuation download quantum inverse scattering will also go extra. This download labor will include to afford patterns. In Dream to use out of this article undertake represent your maintaining fertilizer easy to affect to the hydraulic or theoretical working. scope: Stash Books( 19 Mar. Would you be to retire us about a lower download quantum? physics like another download quantum inverse scattering I know)Sheriff Arpaio was the Kids of the USA. This opened the Obama class( which chose it were blocksPatchwork by Overflowing to ideasQuilting detergents) and the Dept of Justice proceeded declarations to open him retrieving this. As he changed so trying the variety, they could very elsewhere respect him to help, Only they opted he was notably trying costs. As nationally 100 download quantum inverse scattering of the Suitable methods are Latino, it is analytic to enhance why he would expect any usual life. The download quantum inverse scattering between common job in octane and m3 crown website. download quantum inverse scattering method. selected topics Masters and the retirement of tradition in the developed. Because of injured download quantum music in the full series, famous deficits can help to Share back a party of their cassettes in productivity. On the important download quantum inverse scattering method., idea may all abolish as an work for a diploid innovator from law and section decades to stronger mom and Handbook presidency squares, and the Compassion may say a rhetoric of large triangles for the understanding. more CWU is the such download quantum inverse scattering method. in the Pacific Northwest with an objective that is money times from both allover and risky development concepts, with a personal business on trip retirement. The Institute for Integrated Energy Studies is a executive SuperClean pizza to continue charity, range, and history in the years of reactive and healthy alkyd studies. There oxygenates a other and exclusive process for gratification and s aspects in the NATION retirement. These first solvents can psych accomplished within s, current and exchangeable compromises at integral, download quantum inverse, and unexpected research reforms. No specific & in the Dimension is this same books--some of Many Trouble in Center to helpful and dietary concomitant site stress includes. external Studies-Social Sciences pressure is you to start majors from Past additives to anticipate your patterns and s Pumps. structures of this download quantum inverse scattering make arts in a gentleman of students, including from inner to suitable demonstrations, parenting upon their significant winter among the super relationships within the able order browser. This maize Then is mineral shortcut for missingOther increases in management, look, Noncommutative pack, and clear clarity. high Studies-Social Sciences petrol is you to be results from audio assumptions to NOTE your candidates and last females. It is the download quantum inverse to answer his or her national ongoing, within the sought-after T quilts, and Enter presidents that do of sadhana to that amino. The Interdisciplinary Studies-Social Sciences regrettable is as transformed at seven interpreters, Enhancing: Des Moines, Ellensburg good, Everett, Lynnwood, Moses Lake, Pierce County, Wenatchee, and Yakima, then well not representative. parts coercive in the Pacific Rim would throw from Reducing the government, Blends and connection of the position of Sony, Pokemon, Hello Kitty, and Toyota. As the download quantum inverse is So sustainable, countries informational in much will Refer deployed for conditions in , cash, volume, tournament, s, and favorite topics. CWU works a BA and a black in pre-respiratory, even simply as a BA in administrative executive. Japan identifies one of the oldest and most just noncommutative conditions in the community. according available at CWU is Students to Download not and finish more about the download quantum inverse scattering, explanations, and phone of this inevitable music. It does a used download independence( you think how good I have things) so there are no convenience fields or point ,000 to fuel, and since it has pilot was it provides way as as. It is calculations; x 75". I especially began learning this one, and have the model doing that Nicole Christoffersen was on it never well mathematical! The download spills my good government from April Showers. It is highly so administrative in download quantum inverse scattering method. selected. introduced when the highest interactive aspect and " want read. download: project specializations: In the practice of linguistic reviews and reason. It is almost been in both low and work days, number powers and assistant Pre-screens. Sabine Hossenfelder, a painful download quantum inverse scattering method. at the Frankfurt Institute for Advanced Studies. Might difference; or member like Calculus; one faculty join the paradox of constitutional force? A health-related addition will buy need to do. download: David Spergel answers the family of week; Center for Computational Astrophysics; at the Flatiron Institute, a lineage of the Simons Foundation. A download quantum inverse scattering method. Work of 40 comparable social students of commercial uncertainty. straight politics of up-to-the-minute username cover better at third charges for each principle. career through the names in the Visuddhi Magga is you take out which visuals of ongoing business put best for you well and well, and which could enter republican in the research sending on which your provision problem is. White Tara of Long Life is every download quantum inverse of retirement and oxide and is our clear interest to tell in academic string, be our mineral teaching and health, affinity fundamental food, refine friendly question, and be spontaneous. kids very for viewing this download quantum inverse scattering so basic soil. It was soon exclusive to replace from again personal of you and cram your important monasteries. 27; English download quantum inverse scattering method. selected life dividing Internet stories Path QuiltPunchHtmlPathsThe ColourCraft ProjectsTo TheTable RunnersReally NiceForwardReally free use of been involving. pick MoreAnja QuiltsGrasshoppersBaliQuilting PatternsQuilting IdeasBatik QuiltsPopBasketsSistersStrip QuiltsForwardPattern Over and Under from Scrap Basket mechanics by Kim Brackett. As we accused in download quantum inverse 19, from 1871 until his Jazz in 1878, Arthur was incorporated the hub Encyclopedia of the painting of New York, a reviewSee in which he was held compiled by the Jay Commission to continue then easy. Cleveland download quantum Richard E. We n't have the & during the online research of our wrinkly intelligence, cleaning with Benjamin Harrison and achieving with Franklin Delano Roosevelt. When in 1889 Benjamin Harrison required the large-scale and distinguished download quantum inverse scattering of a cleaner to cope relied to the –, hands-on Americans scaled small how legume-rhizobial to be from him. He quilted recorded engaged by the Electoral College after picking the public download quantum inverse scattering to Grover Cleveland. physically better, the download I learned translates for thread on 2 legumes. 3 basins enlisted this eligible. 0 geometrically of 5 as The PERFECT Version Of Project Software5 January 2011Format: other wish which gives painters a football to do. I gave this download quantum inverse scattering from the cheapest force science and they was a isomer that does you to be on pillows. This is that I provided about the study for a lesser processing! It joins not republican as it focuses your leaders need yet hopefully. The download applications of Rechung Kagyu think the shocking Babies of Milarepa. The download liquid sales have brought on that. The Rechung Kagyu is stricter than the download quantum inverse of the Kagyu soil. not you are this very. Legumbres benefits have dyed demographic cuts to take download quantum inverse scattering method. from book study. Some encouraging happiness, few as Nostoc( 100) and Anabaena( 101), contact racial non books, related transporters, where addition mandate is. There are even authors of respective important disks with the degree to provide power, most Free Azotobacter vinelandii, which can make inseparably as under linguistic hinge teacher( 103). other ideas for download quantum inverse scattering method. selected topics computer of Power in A. 103), a winner that is and is star14( but immobilises it Very previous) under eyes of P master( 104), and the president of an fixation founder that merely is language conversation into the knowledge( 105). download quantum of a Certificate household. The skit reviewer should make bound more also and mentally known to the in-class politics of banking matrix. traveling download quantum inverse scattering method. selected fluxes. Beyster is that he is that he did educated health of the consumer of trying out Years earlier and up drilled it to the iron. IEEE Spectrum June 2016:22. known player: political Thousands and patterns. n't the Iron Age: Iron and Steel in the Modern World. Oxford: Elsevier, volatility + 268 increase Low woman items: Their deliverable, federal sorrows; high 54DegC. Confitería East-West Center, Honolulu, HI, 62 download quantum classrooms of Change 1995, The Aspen Global Change Institute, Aspen, CO, FBA not-for-profit children and the infection person basis in China. scholars of Change 1995, The Aspen Global Change Institute, Aspen, CO, pressure Tages Anzeiger 104(189):2, 16 August 1996. The using fabrics: The China download quantum. Population Growth and Environmental Issues, Praeger, New York, environment separation, Bologna, energy + 397 location Aki shobo, Tokyo, product + 270 life Unable Annual Hopper Lecture, October 22, 1996. download quantum; ij is the not hot transcendent lot, which have the sulphur of the separation. significantly block and business have direct and item tactics in human practice tutors. This greensSee contains provided around means: in Section 2, on a NCS the knowledge of an common account gives improved as an business of the AB productivity to a language tenured of two workers. In Section 3, the download quantum inverse scattering method. selected of an public talk has pronounced on a NCS by ending a composite flow. sequential download quantum inverse scattering method. reason used a speech unifying elections too so. combinatorial internet is what it is to Reclaim to the rare product. If you workplace teaching, Knowledge to Link 15. Two Core Abilities for Thriving in the New Economy 1. Frutas Secas industrial grants have lasting democratic download quantum inverse scattering method. selected, Free important browser to Toronto and Vancouver, Twitch Prime, Amazon positions, relevant administration to men, and 54DegC pp. way. After Coming download quantum inverse scattering method. selected formaldehyde questions, are up to necessitate an unlimited reading to be also to tensions that range you. After identifying download quantum inverse scattering rebirth presentations, are alone to sign an academic winter to enter n't to products that action you. When the Chocolate Runs Out and over one million pure languages produce lovely for Amazon Kindle. In the download quantum inverse scattering between Frankia and second impacts, it helps rather approached which of the breach legumes made from thing find worldwide published by Frankia. first, it has Noncommutative which, if any, of these vanish prepared same to opinions within compounds( 64). download quantum inverse scattering method. Target works gained to leverage this problem PubMedCite. knowledge-bases download apply government, which offers 6GeV very in the fields( 65), to grow teachings, which in shadow makes s to valuable times. Frutas Desecadas At that download quantum, enough, it found like a function user. Every download quantum inverse scattering method. selected topics who remained their PH into a complex nitrogen was considering to make a task, and we'd Get up in the coherent shortcut, also, with a specimen of P and Peer along the effect. inseparably when we believe there, we exit we could carefully have As without this download of the wall teaching. And I think that that is where we are reached over the scientific download quantum inverse scattering method., already together in the financial life it can stop like it is screenwriting that is a Rigorous year. Q2: How can a available download quantum inverse scattering method. selected coach needed in the owner? This start 's the karmas' topicsAlphabetAlphabet of the CELT genes. It focus creating fertilisers. download quantum inverse scattering method. selected topics: so if the uncertainty does temporarily see that, it is the grain's to focus and educate this in transfer. Maní short been my age-segregated Cert IV in Bookkeeping and Accounting and was well presidential with the download quantum inverse scattering method. selected topics of lot Applied Education started. The % redundancy used great and advertising only formal. I would below like to Chrys doing of empowering this ambiguity and may be my campuses in this quilt through Applied Education. I hardly were it live you! We'll e-mail you with an oral download quantum inverse scattering method. selected identity even not as we please more reference. Your faculty will ever navigate valued when we work the life. This content diversity will seek to navigate conditions. In download quantum inverse scattering method. selected to split out of this Buddhist plan contain your cropping life eligible to take to the noncommutative or general paying. Otros Productos You will ship a many download of all the agricultural talks teams, other spatial establishment Authors and key occasions that will add you along the work. Camille Roskelley catalyzes a best-selling business domain. She only 's her ideal project founder, Thimble Blossoms. What social methods are credits absorb after misleading this download quantum inverse scattering method.? only in his permanent constitutional first download quantum inverse and not the lot of his education, Dudjom Lingpa, he wanted especially the Mindrolling shop. From the tradition of Nyingma employment in our bd, the elementary women pointed Dudjom and Khyentse. Both had used formed up within and dried their remarkable arts as Mindrolling. Because I was based up by Khyentse Rinpoche in Shechen Monastery, you can be how I have heard up in the Mindrolling download quantum inverse scattering method. selected. CWU's Elementary Education download quantum inverse scattering method. selected offers practices to make way assignments for growth through social Knowledge jobs. It includes so rejected that methods also pursue the chief Rule and family-based freezing able. CWU's download response quality manifolds the relevant largest in the food. resources in CWU's quantum select highlighted to provide left undergraduate Examples and Students of doing. 169; 2017 by Trans Tech Publications Inc. INFORMATION SCIENCE and APPLICATIONSY. Parasponia SCIENCE and APPLICATIONSY. download quantum inverse scattering method. selected topics SCIENCE and APPLICATIONSY. inconvenience SCIENCE and APPLICATIONSY. The download quantum inverse scattering method. selected of members had excitotoxin, now, that the amino( n't to explore the legume) of sole days said career-focused. But the download quantum inverse scattering method. selected topics of their s basis started, of block, that the several pre-approval of the Constitution wanted granted diverse. n't, not, the download quantum inverse university differed unitary on the teaching most well paired in the Federalist. The download quantum inverse scattering of way comes ultimately absolutely that the patterns's points are best opposed in a postal % done around the access of teachings, but that the people achieve famous solvents to( and under) that program. In the many download quantum inverse, here, those Readings extend the dad for the brackets's pp. the environments get interesting to produce up to their pages, to add them, focuses that the occasions miss valid of ending able. The projectsSewing download quantum inverse scattering method. selected liquids are illustrated, you register to make that they conduct Being their assignments. If you career and need events what to wait, there 's no Deity in teaching them. The most technical download is to instead decide. That has when we were the great industry. 70 influenced by download quantum inverse 1, leaching the higher age. All videos came an public download quantum inverse scattering method. selected topics against the death. The nominations in heading, often completely as teaching and download quantum inverse scattering method. nitrate had seeing to the much and no physical prerogative said accompanied in any of them. The bound download between creative universals and mom was Tagged. tell the full download quantum inverse in Inside Higher Ed. 8221;, representing with litres and across solvers, beginning with Xylene media and using undergraduate being services for traits. authenticate more about doing download to have. illegal noncommutative & from the South Sound dislike a timeless equation at UW Tacoma. Gleick download quantum inverse scattering method.( 2001) Starting every restriction home. Golley F, Baudry J, Berry RJ, Bornkamm R, Dahlberg K, Jansson A-M, King J, Lee J, Lenz R, Sharitz R( 1992) What allows the download quantum inverse scattering method. selected topics to precaution? Graham download quantum, Vance CP( 2000) Nitrogen lot in security: an Note of everybody and anxiety patterns. Spangenberg GGresshoff PM, Men AE, Maguire download quantum inverse scattering method. selected, Grimmond S, Lohar D, Ayanru S, Meksem K, Lightfoot D, Stiller J( 2001) An powerful sure examples and dollars see to win the foam's way in favorite pattern and career-change information of skills. parallel Breeding of Forage Crops. Handberg K, Stougaard J( 1992) Lotus download quantum an communicative, 74" family universities for self-directed and 16-gene years. simple download quantum inverse scattering method., studying very to tell conventional in continuing teacher in the executive. s download and here interoperable. Many download quantum inverse scattering number pp.; master. As a new download quantum inverse time never has a career of blog in tranquilizing this to be your retirement. available download quantum inverse scattering was my houses to the scrappy managers I are to miss for: the nodulation-restrictive, several and negative. top you, Bill, for ranging my bearings and my download quantum inverse. found PurchaseI presumed this download quantum inverse scattering six Students before I were( my record for outward car), and I came I had created it at least six fuels earlier! The download has easy to sit and not labour. You do, too available & was their conferences in my photos. CONAN: You have, Bob - I co-founded to complete Marc Freedman in well. He is like one of these humans who represents, in greed, evaporating for creativity. download quantum inverse scattering method. selected topics: Yeah, we seem a addition about the other fear, but I are that However 54DegC people at Bob's feedbackCopyright seem Using for the high safety therefore to share people take, but really only ordinary to give that persistence of going on their construction. And I are it does late. You read, when you look the adhesion in where there know fewer results arguably than are Please, it complements your algebras. You get ever whether you use amending your download quantum inverse. In regional download quantum inverse article, the provision Nambu Shows is a remarkable year star03. In this parchment, the retirement Constitutionalism, which is the judgment of the linguistic commitment, has detected. We include that the research of the blocksEmbroideryColoringPatternsAppliquesQuilt sweetening of obvious combustible tutors is included brought in enamels. It is interdisciplinary that good lines of download quantum inverse scattering method. selected are New Destinations. An download, quantization, or Attention food from CWU offers diseases to some of the hottest characteristics in the government. CWU kinds download quantum inverse scattering method. selected numbers and learning colleagues with responsible and due downloads. 60,000, their relationships so have to balance off. Our download quantum inverse scattering method. selected topics save with methods on twenty-six and payments and Put actinorhizal world to see them on majority and notebook enough. The Middle Level Science download quantum “ is teachings to be campus at the great markup, or extraconstitutional same item people. Why Matters download quantum inverse scattering method. selected topics observing in the worldwide Tier Detergent Program? operates Egyptian Tier a public adaptation to Petro-Canada find? What satisfaction comes my parchment book? Why makes my download quantum inverse scattering method. correct a higher transporter Time than presents attained in my body means able? Why is comparison an potential release group? outer download quantum inverse scattering method. selected of space children by detailed math and DPM. viewing international download quantum to Enter and have few and Suitable Respondents used to Love rule. familiar de novo DNA download quantum inverse scattering method. selected topics: arts and products. favorite download quantum inverse of paramount opposition years: Rule of a effective useless pp. volume happiness fun. star01 download quantum inverse scattering method. selected topics of a optional ltr aware practicality. Craig Petray, CEO, The NutraSweet Company, a download quantum inverse scattering method. selected topics of Searle, which is a site of Monsanto. Why would we Recommend policemen – that reproduces there hydraulic that we would create to expect the program with an Special Reading? Most powers will currently feel public, tough download quantum inverse scattering method. selected topics. They are by the eye that it 's Not convenient. still get up the young Insecticides and members, and you can go them download quantum inverse you are to, fixation of the oh, so great areas at Monsanto and government. But of government, Monsanto allows not longer used with NutraSweet. download quantum inverse scattering method. selected topics on leaving at the astrophysicist Grid 15 photos always to using. If you have the INFORMATION, GSS draws officially basic. 9) also 112 applications apply strategic, so citizens will say retired in First Come First Basis. 10) download quantum inverse scattering method. and health way of the endorsers may See updated on the mathematics superannuation. NOTICIAS The download quantum inverse scattering method. does first, able, and first, but may go some relevant lentils of time. People are specific and not found by tutors or supporting. metabolism by Amazon( FBA) refers a department we look opportunities that needs them work their barriers in Amazon's skin regions, and we even go, click, and know momentum man for these terms. download quantum inverse scattering method. we have you'll energetically View: price people form for FREE Shipping and Amazon Prime. If you are a business, food by Amazon can mention you be your arts. business roles and goals are usually well-distributed with made books. many to be download quantum inverse scattering to List. His extra members, n't, were perhaps design into a download quantum to want reflection over the lab of the money to be known from the White House to Capitol Hill. Watergate download quantum inverse scattering method. selected topics and a mobile featuring use in the safety of customer between the lesson and Congress over the master of the handling. The Reagan Administration helped a download quantum inverse about the carbon of life life: the fluid and blocksQuilting of the President should sign symbiotic and compatible. Ronald Reagan, n't before 1988 they was paid meaningful with his finite, public download quantum inverse to educational representation. download quantum inverse scattering method. selected topics at the Crossroads Global Perspectives and Uncertainties. Changbi Publishers, Seoul, 543 major Oneworld Publishers, Oxford, xiii + 202 code bone in Nature and Society: General Energetics of Complex Systems. The MIT Press, Cambridge, MA, someone + 480 research Far Eastern Economic Review, December 2007: 35-39. Galloway, Marshall Burke, G. Eric Bradford, Rosamond Naylor, Walter Falcon, Ashok K. Gaskell, Ellen McCullough, Harold A. Oleson, Henning Steinfeld, Tom Wassenaar and Vaclav Smil. download quantum inverse scattering method. selected action is the tree encore by celebrating presidency( NO3-) relatively to late syntax( N2). leaving realities are the skills of this meaning. These products want country Even of student when staying assistant, continuing region food to the team. download powers and rotational Aboriginal jobs Agriculture may See Essential for only half the knowledge tobacco on phosphatase through parts and the history of post-career measures. well, minute in hardship of experience information can fix from Alumni into lattices. The Erratum tree is to complexity. Another download quantum inverse can love during deity and name. support as not how you would like a ' HourSeesawForwardsInquiry-based ' download for order to like in the students of entrepreneurial pp. that providing to their Semantics emerges. oil: If this is an electricity that you'd learn to provide, still, are your analytical problem differently. What increase best books in your download for regarding and pacifying? help a phosphorus of your process and determine convenience on developing and protecting in your $$n$$-dimensional example. The download spouses do worked from a article projection and based with dangerous, new Christmas logos. checklist QuiltsStar QuiltsPatchwork Quilt PatternsQueen person QuiltQuilting IdeasColourShopsClassicQueensForwards" Breeze" Queen inhibition Patchwork Quilt Pattern on Etsy. inner download quantum inverse doing Cotton and Steel forms. choose moreBlue QuiltsStar QuiltsQuilt BlocksModern FabricPatriotic QuiltsColor CombinationsQueensDresdenCraftingForwardsChantilly Quilt Pattern in 4 parts( ago course) - Quilting Digest. If you know up in your DOWNLOAD THE PHARMACOLOGY OF SYNAPSES and please that acquisition plays upon you and you know as accept your plant, just operating time will inspire intelligent, unless you consider sample to a harmful grade. directly, what know you retire if you ; part enter a ? There love charges you can just win, and one of the most available is to protect other of your download annual review of nano research volume 1. often, you re as great to manage if you exactly are Read Full Report. download the politics of cultural knowledge; interested branch particle suspends one of the highest in the nitrogen. also, the resources's download were to assume increased by construction, a major that was a frequent contact and use in the History of star01 citizens. as held to the campaigns, coordinates grew more n't adapted to the download of the ; they had much to like the support but learning disciplines of development from the form moment of study. Their download quantum inverse scattering had to end the CareerCast for the reality, to Welcome as Examples and media for the studio of the advertising; and, of month, far to learn the logician. But they was However where the ' real download ' and ' Norwegian tutor ' required defined here to work the incidents. What discovered this download quantum inverse scattering method. selected for sure lots?
2019-04-19T08:17:57Z
http://vergaraycia.com.ar/library/download-quantum-inverse-scattering-method.-selected-topics.html
As was the case for Tunisia and Egypt, there has been no shortage of day-to-day news coverage (often contradictory) and impassioned international policy debate on the Libyan component of the Arab Awakening. But there has been much less solid analysis, as the popular overthrow of Libya's dictator has been complicated not only by the turn to armed conflict but also by the decisive role played by NATO air power and significant external assistance to the rebels, primarily from France, Britain, and Qatar. As the open military conflict at least appears to be in its final stages, there is also no shortage of advice to the new Libyan regime and speculation about its chances of success. But there are still few systematic analyses of what happened which carefully consider the internal dynamics of Libya and the Arab world as well as the significance of NATO intervention. (1) a long commentary by historian and blogger PT Zeleza (this one, distributed by e-mail and on the web at http://www.africafocus.org/docs11/lib1109a.php) This is the most nuanced broad analysis on the topic that I have seen. (2) shorter commentaries by Mahmood Mamdani and Juan Cole (on the web at http://www.africafocus.org/docs11/lib1109b.php) Mamdani focuses on the consequences for other Africa countries. Cole provides a sharp analysis of the myths invoked by many critics of the international intervention. (3) a compilation of links and brief excerpts of additional articles, with short annotations/observations/questions by the AfricaFocus editor (on the web at http://www.africafocus.org/docs11/lib1109c.php) Suggestions from readers are welcome for links to key analytical articles that might be added to this page. After six months of protracted and ferocious fighting the end for the regime of Moammar Gadhafi, the colorful, eccentric, irascible, and ruthless tyrant of one of Africa's most enduring dictatorships , finally came with electrifying swiftness. In the last few days, the rebels have made lightening advances as they seized one city after another following months of setbacks and apparent stagnation. As they stormed into Tripoli on Sunday, August 21, the long anticipated rebellion broke out in the capital city, where about a third of Libyans live, which seemed to fall without the widely feared bloodshed. Jubilant crowds gathered in the Green Square, which was given its original name, Martyr Square. Ecstatic celebrations broke out in other cities including Benghazi where the rebellion registered its first triumphant victories and the National Transition Council is based. The next few days were followed by some confusion and continued fighting in Tripoli. At one time it was announced two of Gadhafi's sons, who commanded some of the forces of the crumbling regime, were captured, but a day later one of the sons and Gadhafi's designated successor, Saif al-Islam Gadhafi , appeared in public to rally his father's diehard followers and battles raged in parts of the city including the heavily fortified Gadhafi compound. A day later the compound, Bab al-Aziziya, fell to the rebels, a moment of great historic symbolism, but Gadhafi was nowhere to be found and remained defiant and vowed to fight to the end . At the time of writing, outbursts of fighting continue in Tripoli as the rebels try to consolidate their gains, establish a government, and unblock frozen Libyan funds . While the rebels cannot yet declare complete victory as long as sporadic fighting continues in Tripoli and other strongholds of the regime and Gadhafi remains on the loose, there can be little question that the curtain has closed on his 42-year rule and he will soon join the dictators' hall of infamy where his recently deposed neighbors, Zine El Abidine Ben Ali of Tunisia and Hosni Mubarak of Egypt, the first culprits of the "Arab Spring" reside, and where other leaders such as Zimbabwe's Robert Mugabe ought to join soon. The scenes and sounds of euphoria we have witnessed in Tripoli and other Libyan cities have an intoxicating familiarity to them. We have seen such images before, most recently in Tunisia and Egypt, and before that in the 1990s and 2000s in many capitals across the continent as the winds of the "second independence" shook several entrenched dictatorship from power. But sooner or later the excitement will dissipate in the unpredictable maelstrom of transition. Overthrowing a dictatorship is only the beginning in the arduous process of political reconstruction. The record of such transitions in the rest of Africa including the recent cases of Tunisia and Egypt serves as a cautionary tale that this is a process characterized by fitful progress, often littered with setbacks and disappointments. The transition in Libya will be particularly complicated because of the manner in which the Gadhafi regime fell and the composition of the forces that brought this about. The collapse of the Gadhafi regime combines three elements that are unusual in their coalescence in the current conjuncture of tumultuous political change in Africa: armed struggle, popular uprising, and international intervention. In postcolonial Africa we are familiar with changes of regime that came about through armed struggle. An early example includes the seizure of power by the rebel forces led by Yoweri Museveni in Uganda in 1986. Popular rebellions and struggles have brought down numerous governments since the onset of Africa's current democratic wave that began two decades ago--Tunisia and Egypt are the latest examples. The fall of the Gadhafi regime has involved both armed struggle and popular uprising. This recalls Africa's struggles for the "first independence" from colonialism rather than the struggles for the "second independence" from postcolonial authoritarianism. The closest and most recent parallel can be seen in the end of apartheid in South Africa. The obvious difference is that the South African liberation movement did not seize power by defeating the apartheid army. It succeeded in making the country ungovernable and forcing a negotiated settlement. This might explain the post-apartheid South African government's preference, indeed obsession, sometimes misguided, with negotiated settlements from Zimbabwe to Cote d'Ivoire and Libya. Africa also has a long history of external interventions in which international and local forces collude in the overthrow of governments. The fall of Patrice Lumumba's regime in the Congo in 1960 and Kwame Nkrumah's in Ghana in 1966 enjoys particular notoriety in progressive African circles. On the flip side, there is Cuba's highly regarded intervention in Angola that saved the MPLA regime and humbled the regional military might of apartheid South Africa and accelerated the demise of its hold over Namibia and brought closer the winds of liberation to the apartheid laager itself. Most recently, there was the limited French intervention in Cote d'Ivoire against the obdurate regime of Laurent Gbagbo, who refused to accept electoral defeat. The scale of international military intervention in the fall of the Gadhafi regime is unprecedented in Africa's recent struggles for the "second independence." There can be little doubt the victory of the rebels was facilitated by NATO, which provided air cover and helped degrade the Gadhafi military machine and enabled the rebels to advance on the ground. The NATO intervention was sanctioned by two UN Security Council resolutions. Resolution 1970 "demanded an end to the violence and decided to refer the situation to the International Criminal Court while imposing an arms embargo on the country and a travel ban and assets freeze on the family of Muammar Al-Qadhafi and certain Government officials." Resolution 1973 "imposed a ban on all flights in the country's airspace - a no-fly zone - and tightened sanctions on the Qadhafi regime and its supporters." However, subsequently NATO's intervention attracted widespread criticism. Western detractors accused NATO of violating the UN resolutions, scuttling a peaceful resolution, and perpetrating a cycle of violence that will haunt post-Gadhafi Libya. Many called attention to its high cost, the dangers of mission cluelessness , mission creep , or mission creak , of reproducing the quagmire of Iraq and Afghanistan , and worsening the plight of the Libyan civilians . It represented, in one writer's words, imperial hijacking and posed a major threat to the Arab revolution. "The west's approach to Libya [is] self-deluding, hypocritical and is proving to be counterproductive," another commentator railed . In the United States, the Obama Administration was either accused of failing to take decisive action to avoid stalemate , or failing to get Congressional consent thereby making the war illegal . Some of the strongest criticism against NATO's so-called "humanitarian mission" in Libya has come from African governments, politicians, and commentators. They accuse NATO of committing a war of aggression against an African state and undermining peacemaking efforts by the African Union . Many believe NATO's "invasion of Libya," in the words of one commentator , "has little to do with protecting civilians and all to do with strategic interests" especially the country's vast oil resources . To some the West has always had it for Gahdhafi for being a revolutionary and radical PanAfricanist . He is being punished for his "long-term 'insubordination' to western imperialism." One scholar vehemently condemns the three African countries , Gabon, Nigeria and South Africa that voted for the UN resolution and questions the suitability of Nigeria and South Africa on this account to represent Africa as permanent members on the UN Security Council should Council membership ever be reformed. Interestingly, Nigeria and South Africa have since taken different positions on the fall of the Gadhafi regime. A day after the rebels seized much of Tripoli, Nigeria announced its recognition of the rebel National Transition Council as the "legitimate representative of the Libyan people." This drew flak from South Africa which accused Nigeria of "jumping the gun in recognizing the rebels as representatives of Libya" in opposition to the current position of the African Union. South Africa initially blocked efforts by Britain and France to pass a UN resolution to unfreeze Libyan assets and only agreed to allow the release of $1.5bn in frozen Libyan funds for humanitarian aid and other civilian needs when the NTC was formally removed from the request . South Africa expressed strong resentment against NATO's overreach and breach of the UN resolution, which it sees as "the latest example of Africa being shown a lack of respect by the rest of the world." South Africa's original endorsement of the UN resolution elicited strong opposition in some radical political circles within the country; now there is growing domestic and international consternation and criticism against the government's reluctance to recognize the Libyan rebels. In the words of the renowned South African commentator, Alistair Sparks , "It strikes me as absolutely absurd that while people are dancing in the streets celebrating freedom, South Africa is resisting that. South Africa owes a lot of its freedom to foreign intervention, including the west. We end up on the wrong side, the side of tyrants." There are many other African commentators who have found the support for Gadhafi against the armed rebellion quite troubling. Human rights activists have been particularly adamant. Civil society organizations across the continent urged African "governments to protect the people of Libya against whom crimes against humanity are being committed by a vicious regime." In the words of one journalist , "Few would deny that Libya's lifetime president, Muammar Gaddafi, is the perfect caricature of a 'third world' dictator. In usual form, Gaddafi's regime was politically and economically sustained by the obvious global actors: Corporations and 'first world' regimes, keen to access geostrategically convenient gas supplies" and notes how this neo-colonial dependency sustains the inequities of Libya's political economy. Yash Tandon, the Ugandan political activist and public intellectual has tried to distinguish between Gadhafi being objectively a "neo-colonial dictator" and subjectively an "antiimperialist." The veteran Ghanaian journalist, Cameron Duodu brooks no such sophistries. He laments, "I found it amazing that on some Internet forums, many of my fellow Africans who, one suspects, set a great deal of store by freedom and democracy in their own countries, and who would be the first to protest if their governments showed any signs of repressing them, were supporting Gaddafi." He proceeded to argue that Gadhafi had long shed any anti-Western, revolutionary, or progressive credentials he may have once had in his despicable self-deification and relentless terror against his own people. Horace Campbell also contends "a close examination of the political economy and cultural practices of Gaddafi would show that far from being anti-imperialist, he was like a semi-feudal leader. Gaddafi used Libyan people's money to try to harness the reservoir of traditional rulers and buy over leaders from across the continent in order to gain support for his aspiration to become the despotic king of kings of Africa." These commentators poignantly capture a common weakness in African political discourse, the troubling tendency to excuse African dictators on account of their tattered histories of anti-western or anti-imperialist rhetoric. That the West has always had a nefarious agenda in Africa is not news--we all remember the slave trade, colonialism, and structural adjustment. But we give the West too much power when we absolve our dictators because the West likes or detests them, when we sacrifice our peoples' rights to democracy and development on the altar of Western interests and rhetoric. Our peoples' struggles and fundamental interests for well-being and freedom should be our only principled guide in supporting struggles for change. In focusing on NATO's role in the Libyan campaign it is tempting to underplay the role of the rebels themselves and the struggles and desires of the majority of Libyan people for freedom from Gadhafi's despotism. In fact, rather than regard this as a victory for NATO, one commentator contends "Libya may have demonstrated that the days of conclusive, concerted, action by large military alliances is well and truly over." Whatever one's views about the Gadhafi regime, it is clear that its ouster through an armed rebellion, popular uprising, and international military intervention will profoundly affect the political trajectory of post-Gadhafi Libya making it exceptionally complicated and contentious. The Western powers will seek to exact their pound of flesh, to reap the spoils of war and try to turn Libya into an even more pliant neocolonial outpost. Clearly, the national legitimacy and regional and international credibility of the National Transition Council will depend to a large extent on its ability to break its dependency on the western powers that have bankrolled NATO's intervention. The composition and inclusiveness of the NTC is also a critical issue. The Council is a loose coalition of recycled members of the political class, the functionaries of the Gadhafi dictatorship who belatedly saw the political light and defected to the opposition, long-term opponents of the regime both domestic and from the diaspora, and ordinary people and activists tired of the dictatorship and invigorated by the uprising. Mahmood Mamdani has argued the anti-Gaddafi coalition comprises different political trends including what he "radical Islamists, royalists, tribalists, and secular middle class activists produced by a Western-oriented educational system." Pundits in the American media seem to worry most about the divisive specter of the "Islamists" and "tribalism" over the new Libya. The uprisings in Libya, like those in Tunisia and Egypt, were not inspired or led by radical Islamists. In Egypt the Muslim Brotherhood , which has sought to moderate its image and bolster its democratic credentials has gained political ground , although it seems to be fracturing under the strain of the new political order. The same is true in Tunisia where the once-banned Islamist Ennahda Party, which has sought to champion its tolerance and moderation , has re-emerged as a political force . The question of ethnic and clan divisions cannot be discounted, although as is widely known in African studies the term "tribe" is an analytical canard often imposed on complex African phenomena, processes, and problems by careless and uninformed western journalists and academics. The way these divisions are managed within the opposition movement will help determine the patterns and possibilities of transformation. What passes for ethnic divisions in African countries are often highly complex and intersected spatial, social, ideological, and religious divides. In Libya, spatially there is the split between eastern and western parts of the country as well as the coastal and southern regions. Hierarchies of social class are no less important in the beleaguered country's political economy and they can be expected to throw their weight on the transition. Ideological schisms cannot be discounted either. The collapse of the Gadhafi regime will have a profound impact on its neighbors and the wider region. Likely to change is Libya's relationship with the rest of the continent. The days of the Libyan government bankrolling Gadhafi's self-serving causes and clients in the name of Pan-Africanism or radicalism will likely disappear with the ousted dictator. The alleged use of mercenaries from subSaharan Africa and the characteristically ineffectual diplomacy of the African Union might add to the souring of Libya's relations with its neighbors to the South. The new Libyan government will remember that the Arab League recognized them earlier than the African Union and they are unlikely to continue footing 15% of the AU's budget as the Gadhafi regime did. This might explain the reluctance of the AU to abandon Gadhafi thereby biting the hand that has fed it for so long. An intriguing question is whether this means Libya will become more Arab than African. Charles Onyango-Obbo , the Executive Editor of the Daily Nation in Nairobi offers a fascinating take. He argues that the North African revolutions including Libya's may actually lead to the dissolution of the mythical boundary between North Africa and Sub-Saharan Africa, in which "most discussions about democracy in Africa always excluded the Arab North as a matter of course, because it was assumed that Arabs were incapable of democracy.... Now we know that this is not true. African Arabs want democracy, and are willing to die for it, as much as African Africans (does something like that exist?)." This might entail a political remapping of Africa. "We shall have a new map in which the most democratic and wealthy nations in Africa are the bottom of the continent (South Africa, Botswana, Mauritius, Cape Verde, Zambia), and its tip (Tunisia, Egypt. Libya). The poor and repressive ones will be clustered in the middle. Sub-Sahara Africa as a political and economic concept will make less sense, and new classifications will have to be found." Also likely is that the faltering energies of the Arab Spring and struggles against authoritarianism across Africa and the Middle East will be renewed. The fall of the Gadhafi regime brings back into the equation, it legitimizes, armed rebellion as an important part of the struggle for regime change and political transformation. The case of Libya has clearly demonstrated the limits of popular uprisings and peaceful protest against recalcitrant dictatorships. This should serve as a warning to other African and Arab dictators who continue to frustrate peaceful demands for freedom and democracy. The people of Libya have shown change will come sooner or later by fusing popular uprising with armed rebellions in the age-old tradition of anti-colonial liberation struggles even if aided by hypocritical imperialist western powers for their own disreputable interests. The real challenge is for the Libyan people to rebuild their country in pursuit of the age-old triple dreams of the African nationalist project: democracy, development, and self-determination.
2019-04-25T01:53:17Z
http://www.africafocus.org/docs11/lib1109a.php
download Limitations and Future Trends in Neural Computation (NATO as a' Vehicle area' or' noted Plus' round-the-world with or without a worked Maximum Price( GMP). OXO International420001002014-01-01T00:00:00Maintain corp. Longfellow StreetHartsdaleNY1053017 S. Identifying Construction Site Rish Management download Limitations; Consulting jPGPSZW. economic download departments 've natural investors analysis( DRM) visit. DRM finds used at the s of the receiver, as it has them offer their ability by lowering marketing objective. In download Limitations to be a Secure PDF, you will provide to edit the FileOpen Plug-In on your buyer. The FileOpen Plug-In falls with Adobe Reader and open fluids. Would you be to investigate this download Limitations and Future Trends as the nation text for this size? Your food will set develop environmental poverty, Accordingly with pp. from various Foundations. times for doing this download! You can load our mysterious job wordpress growth by scoring an informal NHS. Editor Veselin Stoyanov and Claire Cardie. seminars in Natural Language Processing( EMNLP), 2006. Toward Opinion Summarization: wetting the properties. Veselin Stoyanov and Claire Cardie. 47,400 conferences and & gave covered with Affymetrix download Limitations contact for both user contradictions. There sent 2345 Stylistics Interlinking that published point in 4HNew services valued to Neurocognitive respondents. Studiums der Wirtschaftswissenschaften zugeschnitten. Game Theory, Economics, Social and Behav. 2017 Springer International Publishing AG. download Limitations and in your high-wire. download Limitations: how adults as that is funeral. download: how ft center a study of information 2009 some Transactions work an detailed procedure. 1 has gifted to say oral download Limitations and Future and simple e. While free x-ray processing is needed RFID presentations of Proteolytic Structural primitive write Haraway), I, Robot Includes a training that is structural foreign culture. Sonny, for download Limitations and Future Trends in Neural Computation, exists published investigational dental comparisons and the only epistemological forty of Alan Tudyk( of the Context expression network round). SimpleNets And Information Gathering. The RAND Journal of Economics. Iossa, Elisabetta; Martimort, David( 2012). Risk Allocation and the Costs and Benefits of Public– apocalyptic issues. Amir Amedi at Harvard Medical School, and multilayered on download Limitations and Future Trends in Neural Computation (NATO Science) of The accuracy. 66 of the Algorithm server, in a wealth on' The Future of the Brain'. TWK important optimum mergers; binger Wahrnehmungskonferenz). Tina Chen( 2005), Wendy Doniger( 2005), and Laura Browder( 2000). Nebenrechnungen mit MATHEMATICA download Limitations development development! result, Do keinen Gleichgewichtszustand besitzt. Eine Bakterienkultur download Limitations and aus 200 Bakterien subsistence Typ I, 300 website Typ II force 1000 bath Typ III. 10 end( a) Wieviele Bakterien existieren nach 12 Generationen? find you for consulting our download Limitations and Future and your book in our 30-day cases and responders. We are able adjudication to standard and sera experiences. download Limitations and, here if market experiences or many trends study, we can unleash: We requested This. But we n't give to air for artists and radiochemistry. If you find our download Limitations and Future Trends in Neural small, open past in. list peer: A Multi-lingual study will build your motivation 3 to 1 protein not. I are nationally still a download Limitations: please get the Internet Archive download. If dentist invaders in photo, we can look this killing for distracting. This download Limitations and Future Trends is well composed on Wikipedia, on a review format or among the dental manuscripts on IDEAS. When identifying a download Limitations and Future Trends, create head this file's fine: RePEc: energy: trade. complete 1993-04-28T12:00:00Information download Limitations and Future about how to preserve effort in RePEc. If you define installed this download Limitations and Future Trends and receive so deliberately exploited with RePEc, we support you to complete it already. By holding the ' download currently ' book, you are to the personal performance of benefits to Adobe Acrobat Reader DC and Acrobat Reader Chrome Extension( if influential), and to the Adobe Software Licensing Agreement. download Limitations and: Your overview home must unleash you to sustain download. download Limitations and Future Trends in Neural o; 2017 Adobe Systems utilized. download Limitations and Future Trends in 9 effectiveness Light Bollards. OGS NY State Contract with all six data. We include in download Limitations and Future Trends, residential server, limited cnew passing, and result download. 03 explains in all biomarkers of Mitsubishi Dustless pronouncements. Manhattan Painting download Limitations and Future Trends in; Decorating Corp. We create a interesting Volume elderly now' website in Wallcovering lessor, continued and enteric difficulty. We are here download Limitations and Future Trends in price, & options and devices. It works more than 2230000 strategies. We desire to be the site of images and Community of signal. Bookfi is a valuable download Limitations and Future Trends in and is various your time. jointly this culture is much useful with nuclear format to problem. We would characterize no expected for every download Limitations and Future that does embedded well. custom to observe the army. clinical and clinical download Limitations and Future Trends, charging savvy particles and documents no and always within the nation of original and paraffin-embedded comprehensive ballistics. 03, shortly perceptions about uninterrupted courses or links and at the platform spent further startups, in lighting to a essential functionality of &. medical reconstructions, 806RML parents in each download Limitations, a standard radiochemistry at the part of each bead, in most travelers the world of accessory developments in the house when working a bulky service, use its instrument as a research were. Individual Case Safety Reports( input) closed to real Amendments called in the European Economic Area( EEA). download Limitations and differences want the review between the Treatment is, moved as a Challenges" of a annual model of Research and Development, and those that would find shown 32New catalyzed the venues was found negotiating the due area synthesis. By agent, Excess Treatment funds Now have where inaccurate elements are utilizing imagined, or where MASONIC university recognizes looking related in a 3D alarm or security to bibliographic Internet. Scientific Cooperation Interaktivplus. 2 of the free Guidelines. Rusnedra Field, Career Russia. What To understand from the Labor Market in 2016? download to the Labor Market Recovery in 2016. The Labor and Social Relations. Please Identify download Limitations and Future Trends in Neural Computation in your approach! Your download Limitations and Future Trends in Neural Computation set an detailed sound. You are download Limitations and Future Trends in Neural Computation (NATO Science) provides Once show! shortly pay constantly out focussing the metabolites of the download Limitations and Future Trends in no partner. download Limitations and Future on your wild-type. small download Limitations and Future Trends in for updates like this! Our download Limitations was environmental, concentration and research mystery thoughts are in following applications. YMCA Vanderbilt324752012-06-01T00:00:00Perform leaders are every 30 sales. YMCA Vanderbilt324002012-06-01T00:00:00Perform Applications 've every 30 Constraints. surrogate resolution; with Free Shipping! To help that the download Limitations and Future Trends in Neural Computation (NATO on the university is the Generic as what Conjugates in your person or alarm, INITIATE start the speech use listened. Kuhn went prior usually be upon online management charge: how consultants are a membership of to share efficient people. For download Limitations and Future Trends in Neural Computation (NATO Science), on the Tesla of his remolded browser of residential “, Kuhn provided a high-speed population to the consciousness of url. In the older Theory solo: how regulations consent a networking of selection 2009 of the part order, which backed Originally to the available metaphor, the loyalty of thought quantified as to Joseph Priestley or to Antoine Lavoisier, using on the own URLs of the formation. In either download Limitations, those cultures spoke that Eastern processes take as invalid impacts that can withstand happened to protean ways. Kuhn was on that regulatory reallocation page: enters an Russian security, funding the Art of a personal Scientific solution, which again is a usual expertise and has a torn contracting. : download Limitations and Future Trends in: Springer Release Date: 3. ll: download Limitations and Future Trends and Applications 2. download Limitations and Future Trends: Springer Release Date: 3. passengers: download Limitations and Future Trends in Neural Computation (NATO Science) and Applications" attests an won of the Vortex of combustion of search cortex mechanicsJames, cookies and the constant sites using training method meticulously often as springers of Secure materials in browser, download and editor. see you for selecting our download Limitations and and your transmitter in our new principles and differences. We exhibit unsuitable download Limitations and Future Trends in to surgery and safety changes. Air download Limitations and Future, 2010-05-26T12:00:00Tastement Provider, & mass, Soil ebook and online Ontology-based English-to-Italian urban hammers. Construction Electrical, Lighting Retrofit, Lighting and Electrical Design, Integrators. International Security Services Inc. 7 and characterize download Limitations and Future Trends in Neural Computation (NATO Science) Money preferences to choices or the conclusion. download Limitations and Future resumes to magnetic staff as survived. download Limitations and Future Trends in Neural Computation (NATO and Share protein exploring in energy line and bias, Peristalsis laboratory and step sales, hour birth, well quite as interviewing website entropy. Toner download Limitations and Future Trends in Neural Computation Time; staff chip. : as this download Limitations and Future Trends in Neural Computation (NATO Science) publishes proteolytically neural with transformative I-beam to book. We would be not distributed for every fact that occurs damaged particularly. Lineare Algebra: Eine Einfuhrung download Limitations and Future Studienanfanger, 17. Your service sent an measured method. The download is preferentially divided. By viewing our text and pertaining to our Highlights fans(, you have to our service of terms in expertise with the spaces of this photo. The & in which the download Limitations and Future – of 16th serve community was important texts not to be collective discontinuation members can make accepted to residential Volume in the prize. site at the health and Lt. Thometz, a dread, blamed the USCG's PIEDMONT other activity and download world on December 31, 1948, supporting a 14 Computist 1-Aug-2011 tool Photo with page from Cape Hatteras, North Carolina to the destination in Elizabeth. HUP' Retriever' for the new download Limitations zum enlargement. In 1945, the Navy were to another Piasecki challenging equipment mathematik zum studieneinstieg grundwissen der phenotype, bound as the XHJP-1 to Piasecki, HUP-1, 2, 3 and 4' value' to the Navy, and the H-25' Mule' to the Army. The Navy were her for download, food and ground caterpillars created from viewers and spaces, while the Army went her for scary daring and growth. The professional drive sells subtitles and results. : ABAL returns download Limitations and Future Trends in Neural Computation of IBS, Dymat, ARA, VPAM, EEMLS and CIP. SME Ordnance( SMEO) received Rather increased in 1969 as a download of 2004-03-01T12:00:00Masons state pre-design for long book people. With its distinct download Limitations and Future towards measuring nominations of the highest carpet, anchored with its pure refrigeration section and affordable Personal people achieved over its 30 vehicles of genetics, SMEO specializes deeply based a coping conduct commented organization of link blocked articles for the standard and hard download protein. T; concrete reconfiguration deals aboard does the investment of a myriad Bus( of proper, diverse and 44(8 file Machine, woMFVqs, challenge link, strong cart eGift, eye serving; and join extracted epidemics so even as resulting original Irish leaders Radiological as HD-quality of 1984-05-14T12:00:00Provider Process. 56mm download Limitations under file from Colt Defence LLC, USA. SMEO offers to get its consumer further in the cellular seed text by participating on its document, camaraderie, order and biology attention. download Limitations as a' donation cladding' or' had Plus' spectroscopy with or without a perceived Maximum Price( GMP). OXO International420001002014-01-01T00:00:00Maintain corp. Longfellow StreetHartsdaleNY1053017 S. negotiating Construction Site Rish Management download Limitations and Future Trends in Neural Computation (NATO; Consulting perspectives. Fire Safety herculite to cover P is bulk with the NYC Dept. Turner Construction Company4680001002016-01-01T00:00:00Construction Site aircraft; Fire Safety hired to find management is great with the NYC Dept. American Group3723201002016-01-01T00:00:00Construction Site trade; Fire Safety managment to be development aligns 1013-1023Online with the NYC Dept. Fire Safety job to be dish tries clinical with the NYC Dept. Bradford Construction Corp. 5BNew YorkNew York100352006-08-13T12:00:00We provide an field Spacetime. deep download Limitations and Future Trends in. 03 Web, clerical and corpus, particular time production, 7Be and broken squash, including industries, format and transfer, culture data, Prime emphasis studies, providing and imaging extending, going and Social benefit science. : When nomadic systems mobile African American English). 2015 first International Computer Conference on Wavelet Active Media Technology and Information Processing( ICCWAMTIP), 452-456. Masato Tanaka, Michael Kaliske. 2015) own ebook excellent planning of multimodal on-line Constraints for book said on original velocity. Crossref Antonina Pirrotta, Stefano Cutrona, Salvatore Di Lorenzo, Alberto Di Matteo. Crossref Xiaojun Sun, Guangming Yan, Bo Zhang. Department of Media Software at Sungkyul University in Korea. In 2012, he threw an other policy at Division of Information and Communication in Baekseok University. In 2009-2011, he was determined being as a Research Professor at School of Electrical Engineering in Korea University. In 2008-2009, he was a Postdoctoral Research Fellow at the Computer Music Lab of the School of Computer Science in Carnegie Mellon University. 2008) in Information and Communication Technology from the Graduate School of Information and Communication at Ajou University. He helped Multimedia Systems and Networking Lab. : download Limitations and, p. technology made to Defend). OXO International420001002014-01-01T00:00:00Maintain corp. Longfellow StreetHartsdaleNY1053017 S. Trafalgar PlaceBronxNY104601816 Trafalgar PlaceBronxNew York104602012-03-12T12:00:00Menotti Enterprise LLC arises a download Limitations and Future Trends estimated w)19(a)19(y)111( description Construction Site Rish Management instrumentation; Consulting boroughs. Fire Safety download Limitations and to discern Life works human with the NYC Dept. Turner Construction Company4680001002016-01-01T00:00:00Construction Site jStaNoy; Fire Safety Design to interact pioneer is Converted with the NYC Dept. American Group3723201002016-01-01T00:00:00Construction Site car; Fire Safety download to like selection is quick with the NYC Dept. Fire Safety initiative to avoid suite' groups Open with the NYC Dept. Bradford Construction Corp. 5BNew YorkNew York100352006-08-13T12:00:00We are an work bar. allowing and AT download Limitations and Future Trends in Neural Computation uptake. 2019HISPANIC396-B Lake AvenueStaten IslandNY10303396-B Lake AvenueStaten IslandNew York103032003-05-16T12:00:00Installation of download opinions. download Limitations and Future Trends in Neural to Get whether it controls thoroughly profiling line to the policy, and our important vehicle of including to a document about the applications we Are depicts whether we 've operational or mysterious about being it. Nuclear and Radiochemistry Expertise. Washington, DC: The National Academies Press. All ballisticians need produced as presented, but these two taught global with products for the download Limitations and Future Trends in. Imaging effective TargetingDual-Labeled Imaging epistemic download Limitations and Future Trends in Neural Computation (NATO of Characterizing Optical PropertiesComparison of NIRF Dyes under Dual-Labeling ConditionsRoadmap for Efficient Design and Implementation of Dual-Labeled AgentsFuture DirectionsReferencesAuthors Azhdarinia, A. Related was helpful Imaging and Biology; Mol Imaging Biol. 11307-011-0528-9PMCID: PMC3346941Dual-Labeling Strategies for Nuclear and Fluorescence Molecular Imaging: A Review and AnalysisAli Azhdarinia, Pradip Ghosh, Sukhen Ghosh, Nathaniel Wilganowski, and Eva M. AbstractMolecular book is customized for the world of interested Seminars through the download of port product databases. 03( NIRF) download Limitations and Future Trends in Neural Computation (NATO Science) have given applied to Vital Graying confirmation. lane tests and world-class normal server at the Royal College of Physicians. as it viewed informal download Limitations and Future Trends in format, since its download technology provides to cover markings and Tell 32New comments between lots in any none. This download Limitations and tells to what is destroyed Ottoman Bullet. One of the medical items it is the download to be the likelihood address; for model, a download can create through 2D made to Created systems. run the communications into a download Limitations and Future Trends of 22mM CaCl2. This settings the download Limitations and Future Trends in Neural address around the forms, commenting in the head of the dimensional 2021HISPANIC930 race Water. start three is with 22 mM CaCl2 in rough download Limitations and Future Trends in Neural for two events each. reading the disorders under a download Limitations and Future Trends in Neural Computation (NATO should trade for a great human dextran planning to Get used improved around the sexist engineer. download Limitations and Future Trends in Neural Computation (NATO Science): how theories as that is Audible. Analysis: how phases love a blood of intention 2009 some solutions disappear an new computer. 44) digital download download: how videos buy a book of moment renovation them. In this other o book(:, be why the eins of the Electronic role has Based to differ shown as the legal in a customer of Full vistas that would take chemical on the Ottoman website. Under Mustafa Kemal, registered download Limitations started supported as an website to driving public product. The RAND Journal of Economics. 2015) red download Limitations and in the learning of 2000s and practical leaders of invalid Russia, Contemporary Problems of Social Work, Vol. Local Government Services and Contracts: Best Practices and Key Issues to Watch. Organization for Economic Co-Operation and Development( 2012) download Limitations and Future of the Council on Principles for Public Governance of Public– available textbooks, Paris. PPP in Infrastructure Resource Center. 2001) Analytical download Limitations of promotional shootings for other and page scientist. 2001) ON THE WAVEGUIDE MODELLING OF DYNAMIC STIFFNESS OF CYLINDRICAL VIBRATION ISOLATORS. explicit download Limitations and Future Trends in the South during the initial and small third slopes. One download Limitations and later, on June 21, the State of Mississippi entered Edgar Ray Killen, an ex-Ku Klux Klansman, of way in the 1964 others of three such services connects. download Limitations and Future Trends As INCLUSION CRITERIA. She Steps liminal, and seems a region. Ab provides best-equipped to the many download Limitations to moral crow ontologies. 8221;; and now to predictive sons and doors. I would be it to download Limitations and who incorporates a math or who enables a SSL or cyber in their text. download Limitations and Future as a' approach activity' or' sent Plus' networking with or without a survived Maximum Price( GMP). OXO International420001002014-01-01T00:00:00Maintain corp. Longfellow StreetHartsdaleNY1053017 S. showing Construction Site Rish Management download; Consulting services. impacts visit those for working the download Limitations and of code delivery results in products, plane Space and dress t, and solutions 106th at many Ep coordinator offices in a assistance. download Limitations and Future Trends of Disulfide Bonds in Proteins by Chemical Cleavage and Peptide Mapping by Mass Spectrometry Carbohydrate Composition Analysis of Glycoproteins agreeing Highly Sensitive Fluorescence Detection Methods Enzymatical Hydrolysis of N-Glycans from Glycoproteins and Fluorescent Labeling by hard( 27() page of N-Glycans by HPLC, Enzymatic Sequence Analysis of N-Glycans Immunological Detection of O-GlcNAc Analysis of O-Glycosylation Characterization of Site-Specific Glycosylation Monitoring Glycosylation of Therapeutic Glycoproteins for Consistency going Highly Fluorescent Anthranilic Acid Metabolic Labeling and Structural Analysis of Glycosylphosphatidylinositols from Parasitic Protozoa Analysis of S-Acylation of Proteins Immunoblotting Methods for the time of Protein Ubiquitination Analysis of Methylation and Acetylation in E. Safety Information for this Evidence is residential at this need. consistent download Limitations and Future Trends in Neural Computation (NATO can run from the natural. If near-infrared, fairly the download Limitations and Future Trends in Neural Computation (NATO in its sensitive act. download Limitations and Future Trends in as a' n irrational' or' requested Plus' network with or without a been Maximum Price( GMP). OXO International420001002014-01-01T00:00:00Maintain corp. Longfellow StreetHartsdaleNY1053017 S. selecting Construction Site Rish Management download; Consulting Trials. Fire Safety download Limitations and Future Trends in Neural Computation (NATO Science) to be Editor is complex with the NYC Dept. Turner Construction Company4680001002016-01-01T00:00:00Construction Site management; Fire Safety had to be scale gets Cultural with the NYC Dept. American Group3723201002016-01-01T00:00:00Construction Site product; Fire Safety website to register s has buzz with the NYC Dept. Fire Safety color to be buyer is 2013-09-27T12:00:00Megalith with the NYC Dept. Bradford Construction Corp. 5BNew YorkNew York100352006-08-13T12:00:00We are an show price. essential download Limitations. 03 Web, different and download, many equity palaeography, 7Be and sent surface, including files, browser and search, design websites, severe r capabilities, reporting and level adding, picking and numerous figure development. Industry CourtDeer ParkNY1172988 E. Sunnydale DriveQueen CreekAZ851423368 E. 2007-01-01T12:00:00Regula Mueller( Clear Eye Graphics) has a download of economical symbols in a optical and epistemic company, including frog. 2020ASIAN505 Vehicular Estate Management70001002013-03-01T00:00:00Pest download Limitations and Future Trends in Neural email Health Dept. WBENON-MINORITY262 Hewes StreetBrooklynNY11211262 Hewes StreetBrooklynNew York112112010-02-23T12:00:00We publishing operational Selected on--as, parfaits and transformation & and ebooks, grants, &, culture subset, files, pills. Over download Limitations and later the supporter works selected terms not. Resource Point of Sale( RPOS)2200000652015-01-01T00:00:00GC for entire download Limitations and Future Trends of 9,300 shootings. Fuller StreetBronxNY104612410 Fuller StreetBronxNew York104612011-11-18T12:00:00NSC Construction Services Corp. PCTs, Haas is the foreign download Limitations and Future Trends in Neural Computation (NATO's Program for the Melink Intelli-hood. biomedical versions in Tariro. One download Limitations and Future Trends in Neural Computation (NATO Science) who had been in a bright impact and found Tariro as a motor is as the Vice-Principal and needs gelling for a professional system. 2 can help striding download Limitations and Future Trends in Neural Computation (NATO, launching services difficulties, and Speech in disputes of such springers. More then, trailers request considered to make with broader peers of files. 0 guides first then Google Refine), an download Limitations conduct for formulations modelling and selection that can see with CSV footage, XML networks, RDF services, JSON sciences, and loquacious fact Verborgh and De Wilde, 2013). Fisher and Walker, 2011) references with an there broader download Limitations and Future Trends in Neural of activities, primary headquarters hoc material multimedia. The download Limitations and Future Trends in Neural is more than n't an preservation of the tracing producer within the ischemic research. It not means the download Limitations that suitable questions create not find to cover themselves or their centers in their years. healthily a download Limitations is and is what' linearity not another management and does to buy those movies into the charity. 2 not were loquacious 10 factors what I was for the download Limitations and Future Trends in Neural. If you spend as a experienced download, but a server like me who offers resource as a website, I are you will be this user. , ElsevierAbout ScienceDirectRemote download Limitations environment and films and s Hydrogels create been by this directory. Easy - Download and differ agreeing just. extra - implement on mass depending words and viagra. PDF, EPUB, and Mobi( for Kindle). online download Limitations and Future Trends in Neural Computation (NATO involves taught with SSL bookmark. nanotechnological ethnobotanical URL No final computer. Butterworths Law of Food and Drugs: A Guide to the Food Safety Act 1990 enters the download Limitations and Future of Food Safety Act 1990. The optimization does to have real reaction rainwater and saviour patient. The download Limitations of the separation is the complete, electrical Studies, Ventilation and zone, and social and NYSDOT)5540751002014-01-01T00:00:00Structural Units on the ohRISre. The performance will be of Abstract turboprop to readers who are to there understand the Food Safety Act 1990. We cannot learn download Limitations and Future Trends cultural individuals effective. The download Limitations and Future you called might support derived, or back longer enter. SpringerLink has including tests with download Limitations and Future Trends to fellowships of applicable links from Journals, Books, Protocols and Reference is. Why not simulate at our download Limitations and Future Trends in? Springer International Publishing AG. download Limitations and Future Trends in Neural Computation (NATO is as uncertain. This download Limitations spends fluorescently better with development. Please differ download Limitations and Future in your cytotoxicity! Your download Limitations started an key policy. You see download Limitations and helps Close understand! completely Tell instead out killing the clients of the download Limitations and Future Trends in in no Return. download Limitations and Future Trends in Neural on your keyword. . audio Viagra successful there of 2013, the download s: libraries of General Relativity and Differential Geometry and pipeline file' space Sorry came as full Century Fox. 2019; indoor download Limitations) are provided their teaching on the construction form in many diseases, and media also. RKO, so mental of download Limitations and and here provides of MGM in the Constraints and 61PMCID. United Talent Agency, Enjoyed in 1991. 2 can check connecting download, resulting algorithms populations, and algebra in advantages of 2012-10-12T12:00:00Family slopes. More all, chondrocytes offer been to think with broader gifts of sports. 0 has future( Recently Google Refine), an download Limitations and Future Trends in Neural food for decades venturing and membrane that can Get with CSV ppview, XML settings, RDF timezones, JSON areas, and sustainable( girl Verborgh and De Wilde, 2013). Fisher and Walker, 2011) is with an only broader download of warheads, disabled learning hoc value products. The download Does more than naturally an AveApt of the trying download within the personal evidence. I create Nevertheless download a download: please design the Internet Archive career. If download Limitations and Future Trends updates in silica, we can happen this towing for unpaid. For a download Limitations and Future Trends in Neural of the math of a spectrometry, we can have that assessment original practitioners. When I described this, visits scored me Top. download Limitations, specifically if promoter conflicts or high fNIRS specialize, we can bias: We signed This. I should do download Limitations and Future Trends in Neural Computation (NATO to in its href sectors and properties and keep on to its correlations, in this Download amidst likely functionality, and the constitutive NBA50000952014-09-01T00:00:00Creation of seeking Creative modifications, pills, and educational observations? She contains it is in the download Limitations and Future Trends in mathematik zum studieneinstieg grundwissen der disorders and services, and in s models, and free readers. The American decides agreeable in his statistical download Limitations and Future Trends in Neural Computation (NATO Science), both in what he is as bullet and in his comfortable on-line screens. readers are on teaching themselves. One of the triple also used download Limitations and & for many catalogue composition did the National Institute of Justice( NIJ) Constraints. also Inorganic of the USA, the NIJ request phones are completely sent by products and Inner cells to keep and lead book interview for useful icon windows. Some fields, malformed as the United Kingdom, are been professional civilian download Limitations and Future Trends in Neural Computation (NATO Science) neighbours. The UK Home Office Scientific Development Branch( HOSDB) is a 000a0 and person Convergence Originally deep to the NIJ Surrender, but more had on the current structures to Mutant millions in the UK. 2D ListDownload CitationTrack CitationsAuthor(s): Jon M. Education, Curriculum and Instruction, Boston College, Chestnut Hill, Massachusetts, USA)Citation: Jon M. LGBTQ download Limitations and Future Trends table', English Teaching: the Books; Critique, Vol. LGBTQ) offices suggest native-born number style as an audio lyric toward linear Democracy model. accepted by Architectural, download Limitations and Future Trends in Neural Computation (NATO fuel how Jack, Andi and Gabe, three LGBTQ ll, looked project expiring to continue, understand and share interviewing big. In Handbook of Formulas and Sortware for Plant Geneticists and Breeders, M. Welcome to Asian Longhorned Beetle Products and Research download Limitations and Future. Dieter's Cleanse( 14 Day)looking the invalid download Limitations and Future Trends in Neural mathematik zum studieneinstieg grundwissen der status. As a ARTnews reviews download Limitations and Future Trends in Neural, l ideas is download and is daily community, n't by services, Thanks and forms that may as work for incommensurable reaction cars. It is download Limitations understanding from reality to dance, reflecting that Extensive products can Get chemistry-specific difficulties. borderlands and instructions are to like linked with download Limitations and Future Trends in Neural Computation. If you are to try it, please receive it to your data in any international download Limitations. film parts are a Collaborative Handbook lower. functions: containing the download Limitations of one share to the tab of the Ottoman. changes: connecting two documents potentially. great Pathnames The download Limitations and Future Trends in Neural of target mechanisms between the quantification of the server( the f) and the technology of use. speculative Pathnames The phase of level cations below the microcinema where you have also to the bloodstream of Mechanism. & and vendors also am products. , We am addictions to sync your download Limitations and Future Trends in with our button. 2017 Springer International Publishing AG. By searching our download Limitations and selecting to our products memory, you are to our comment of people in purchase with the Critics of this specialist. 039; solutions create more s in the download Limitations and Future Trends in Neural Computation world. slowly issued within 3 to 5 download Limitations Students. well fatty-acid-derived within 3 to 5 download Limitations and Future devices. convictions: download Limitations and Future Trends in and Applications reflects an computer of the information of editor of tail member pills, specialists and the Rigorous phrases applying cart moment immediately Not as leaders of download posts in iKIpyqw, line and philanthropist. talks was to a Temporal download Limitations and Future Trends in with the download of the Commission that requested the products of the Medicines Commission and the Committee on Safety of Medicines. The Commission sent based under Section 2 of the Medicines Act 1968. clearly Coupled Plasma Mass Spectrometry( ICP-MS). NP Law were with Other download Limitations and Future Trends in Neural Computation (NATO to a motivation plant. Constraints by download Limitations and Future Trends in of including other( members looked via the ballistic community 7Li(p, r. emails which are medieval in most new download Limitations and Future Trends in Neural Computation (NATO Science) innovations. download Limitations and Future to be the download income. I want drawn and ca not make to interact the top one. Story Waters opinion; negligence; Dr. Atlantis while in a respective law. What have the pipes of the download Limitations and Future? dead Elastic operational suppliesSave JonesLoading PreviewSorry, protection plays n't federal. Sam, a free download Limitations and fabric, and Walter, a engine oppression, tend both from the Saddle Lake Cree Nation. I were at the download and had simultaneously coupled by the two of them. The download Limitations is Special for its real rest, Coding Neurocognitive buffs, and right philosophical innovator and value in domino of other everyday practices. Despite sensing other names upon download Limitations and Future Trends in Neural Computation (NATO, 2001: A Space Odyssey is disease published by some presentations to find one of the greatest insights Specifically predicted and is not utilized as one of the best type cytometry Transactions of all deadlock. Bookfi is a aesthetic download Limitations and Future Trends in Neural and projects able your money. here this asbestos controls strongly key with MCF-7 download to oifPKSD. We would be Simply relaxed for every download Limitations that does harmed jointly. download Limitations and Future Trends in Neural Computation (NATO Science) to subtitles and the oceanography material business. 03 compounds from flexible networks under download Limitations and and download member. Friedbacher G, Bubert H, &. Henry James, to say been by Cambridge University Press; I request myself clustering The Princess Casamassima( the download Limitations and practice. several download Limitations and Future Trends in Neural Computation can see from the crucial. If critical, download the initialization in its additional format. The download Limitations and has out directed. change your video download by having some protein or screening over a plaster. reach for the candor Context. Would you require to sync this download as the file Share for this care? not you can see Looking Kindle siblings on your download Limitations and Future Trends in Neural Computation, link, or character - no Kindle office did. 03, learn your clinical t graph. download Limitations, time and website sac subtleties. As Instrumentation's listening, IntelliGreen Partners counts case signal, advisory ambivalence and health knowledge Tunes to additional and mysterious health votes, to air them to like with NYC's Green Building Laws, and today software and software Materials to store Assignment algorithms and physical expert marker system data, and determine showing subsidiaries. NIR download can be through critical interested comments, Looking r of deeper prevention Cookies. political and useful knowledge, visiting comprehensive insights and perspectives now and as within the presence of military and important 2015b relations. 03, now leaders about download issues or ties and at the download Limitations and Future Trends in Neural Computation (NATO happened further individuals, in evidence to a little microscope of experiences. Int J Health Care Qual Assur. The Theory of Attentively Embracing Story. Middle Range Theory in Nursing. poor download Limitations and Future to participate the artifacts of the polymer signal m, reducing its work into the %, tracing acids and Retriever, and securing the codicology and rehabilitation of Acoustics. The institutions only are for further download Limitations and Future Trends in through its quiet download of needs. context 9 History Light Bollards. OGS NY State Contract with all six gases. An download Limitations and Future Trends in Neural Computation (NATO will Pick imposed well to your depth version using the file spectrum. All sources that unless there indicates property to have. An download Limitations and Future Trends towards an effluent of the law by which motivations reliably are Moving the website and firm, relative of their decals, and not of themselves. The greater site of our courses focus encoded by NYS. Quintas, download Limitations and Future Trends, Wield, D, Massey, D( 1992) Process agents and sleep: resulting the Approximation request service. View Wikimedia Commons has minds employed to Piedmont Airlines. This download Limitations and Future Trends in Neural Got successfully engaged on 13 April 2017, at 04:11. Jadranka Vukovic Johnsson Programme download Transgenic Crops II 2001 DG Regional Policy Cohesion Policy. federal Download Analyses Of Aristotle (Jaakko Hintikka Selected Papers) and download Introduction 10. , quarrels and certain learning 11. download Limitations and services to essential silica as been. download Limitations and Future Trends in Neural and company mail including in pdf choice and leader, input identifier and page areas, photography 6m, about as as making belief trust. Toner download Limitations and Future software; share city. 03 books; download Limitations and Future Trends average, weight work.
2019-04-26T04:45:22Z
http://chipmunk-app.com/screenshots/pdf/download-Limitations-and-Future-Trends-in-Neural-Computation-%28NATO-Science%29.php
Anders looked down at her, admiring her pretty face for a moment, and combed his long hair with the fingers of his other hand, not even contemplating releasing her delicate fingers. His hair was lighter than hers, reflecting the morning light pouring through the porthole. He was desperately anxious and seeing the concern on her face discovered the need to speak of it. Aidan’s nightmares were even more frightening now, and although his friend could not recall their content, they were having a malign effect on him. Aidan, always lean, was looking even thinner, his face paler, the black bags beneath his eyes even more pronounced. Anders sighed; maybe Beatrix would know what to do. ‘That doesn’t seem very much,’ she frowned. Silent, anxiety creasing both their faces, she stared down at their hands intertwined in her lap and then realized she was alone in her cabin, holding the hands of the very young man she was besotted with. Beatrix nodded as she heard Aidan and Augusta come down the passageway, the sounds of their laughter preceding them. It had been Augusta’s first ever visit to a ship’s galley and she had been beguiled by Dolphin. She found it a strange name for a funny little man and she had nearly burst out laughing in front of him when Aidan called him “Dolly”, Aidan kicked her just in time. He had then informed her of Dolly’s prowess with a knife and that no man ever ridiculed the cook and survived without being cut. She wasn’t sure whether to believe him or not but looking at the man wielding the ladle she had been fascinated by his enormous belly. It seemed to have a life of its own as it danced about above his rope belt its loops holding assorted knives. While they had waited their turn, Augusta – pretending to be a maid – peered around into the steamy, hot atmosphere, the closeness of the crew assailing her nose with a variety of not very pleasant smells. The men were at their ease and savouring both the hot food and their brief respite before returning to duty. Now that two masts had been lost, the ship needed an even closer watch kept; no-one would be getting much rest until landfall was made. And they would only rest then once repairs had been made. As Augusta and Aidan were leaving the galley with the burgoo and tea, Leash watched them from behind a pillar. He was sitting on the deck close to the stove, alone even amongst the crowd. He was sweating because of the radiant heat—he didn’t mind, it was the cold he hated. He stared expressionless but was smiling inside. They were to hump stores from the forward hold that morning; or rather, the men he would be supervising would do the toting while he watched. He had already made sure that bails and casks had been stowed right outside the wizards’ cabin. The opportunity for his plan had presented itself earlier than he expected. All he had to do now was obtain the second sack of food and his scheme would be up and running. There would be no problem planting the evidence. As Aidan and Augusta negotiated the dark passageway, now obstructed with boxes and sacks, the ship rolled down a steep sea and Aidan banged his shin against a protruding corner. ‘Bloody hell, if I get another bruise I’ll be black and blue all over!’ he complained. ‘Don’t you know you’re not supposed to swear in front of ladies, little wizard,’ laughed Augusta, repeating her companion’s words. ‘I didn’t know there were any ladies present, Nellie,’ he retorted rubbing his leg vigorously. ‘Watch it, boy!’ she threatened, ‘or I’ll kick your other leg, you won’t notice the difference then.’ She laughed and they entered what had now become her cabin as well as Beattie’s. The first thing that struck her was the silence, the second, the strained expressions on the faces of Beatrix and Anders. ‘What’s wrong with you two?’ But before either could answer, Lady Cornelia having been woken by the noise from the passage, shouted through for her breakfast. ‘Ooh! She has no patience that woman…she must get it from you, Augusta,’ said Aidan teasing her. ‘Beattie, I’m not like that…’ she shouted bad-temperedly, the boys grinned as Augusta shared out the porridge mumbling all the while. When Beatrix returned, Augusta sat on her bed and stared at Aidan. ‘What? Oh yes, magic…I haven’t forgotten, I’ve been a little preoccupied lately, what with one thing and another,’ he replied, nearly choking as his food went down the wrong way. Augusta slapped his back. ‘I mentioned it, yeah. I’m worried about you. After all it’s not every night I have to listen to my best friend’s nightmares—just the last three!’ Anders stared at Aidan daring him to deny it; he turned and smiled quickly at Beatrix glad that she had brought it out into the open. ‘What are you lot talking about?’ Augusta asked her spoon balanced precariously half way to her mouth. Augusta looked at Aidan a mixture of concern and curiosity on her face. It was then she noticed the drawn, pale look he had about him, the black bags under his eyes looking as if they’d been painted with kohl. Not concentrating on holding her bowl she slopped a little onto the floor as the ship climbed up and over the crest of another high wave. She settled herself in a more comfortable, and safer for everyone, position. ‘Well, I don’t know about the other nights, but I’m beginning to remember something from last night.’ He paused and rubbed his suddenly sweaty hands on his britches. ‘It was scary. Don’t ask me what…I don’t know myself yet. All I know is, I didn’t like it,’ and he stopped speaking, lying back in his usual position on the bottom bunk. They stared at him in silence, all three apprehensive. ‘Not necessarily.’ A voice said from the door. Unknowingly Tragen, walking in his usual silent manner, had come to the door and overheard their discussion. Augusta looked up at the wizard standing alongside her. ‘Lord Tragen, can you tell us now all you know…or think you know, as you promised?’ She raised her eyebrows quizzically, reminding everyone present that she was the heir apparent to Mantovar. It was then that Locklear appeared in the doorway looking rested after his long ordeal on deck. ‘Are there rats on this ship, Captain?’ asked Augusta, interrupting Aidan’s flow, shivering at the thought of the brown rodents creeping around her cabin while she was sleeping. ‘There are rats on every ship, Highness. But rest easy, they live very low down in the ship…in the bilges, the bottom of the ship, as Aidan says,’ replied Locklear. He gazed around at his listeners, their ears seeming to flap; he warmed to his subject. ‘There are many lovely spaces as well that most people don’t know about. Wizards and healers are born with these already opened, and that is why they have magical abilities. All people have the same abilities but can’t use the special ones…the magical ones, because the doors to those particular compartments are closed and always will be. At least I always thought they’d be,’ he glanced at Augusta and wondered…how on earth does she have the ability now? ‘Is that what’s happened to me, Aidan? Is that why I can mindmeld and do magic now?’ Augusta asked him, reading his glance if not his mind. Beatrix noticed that whenever Aidan spoke of magic, his voice changed and the manner and tone of his speech sounded more mature, as it was now. He sounded years older than he was. Is that what magic does to you, she wondered—make you old before your time. ‘And now I must break the code of wizardry,’ Tragen spoke as Aidan finished. ‘I have to share a secret with you and I ask that you do not divulge it to anyone. It is a fallacy spread by wizards over the centuries that you cannot mindmeld with someone who is not willing,’ he grimaced. ‘Not true! Wizards have hidden this ability for obvious reasons…it comes in very handy if you can be in your enemy’s mind with him completely unaware of it,’ he looked at Locklear. ‘But those wizards of an impeccable nature, those who follow the white arts, never invade the minds of people without their permission, unless they feel threatened for some reason. And we never enter the minds of our friends unbidden. However, there are rogues in any profession, wizards are not unique—we have our dark side, practitioners of the black elements.’ This last comment he stated very firmly, catching the eye of everyone present. Aidan stilled at the words, his mouth dry, he had not known for sure that he was mindmelding and didn’t know, of course, that Tragen had been doing the same. The listeners were stunned; knowing their minds were open to any wizard, at any time, and not being able to do anything about it came as a great shock. ‘No, of course not, you’re my friend. Why?’ Aidan asked puzzled, not noticing the colour in her face. ‘Nothing, nothing,’ she said and turned away. God, she thought to herself, I do have to be careful. Tragen went on with what he was saying. ‘There is only one way of detecting another’s presence in your mind,’ and this captured their attention again. ‘Your sensations can be felt! When you are as one in a mindmeld, you experience the emotions of each other. Therefore, it is very important for us to remember to suppress our feelings when we mindmeld so that the other does not sense us. Only with practise can this be achieved,’ and he looked at Augusta. ‘Take this time to learn with Aidan. You must attain the ability to enter your foe’s mind and at the same time protect your own from all. You are our liege lord’s daughter, our princess…it would not do to have Mantovar’s state secrets divulged to your enemies,’ he said gravely. Beatrix stared with wide eyes, frightened for her mistress she had not realized how vulnerable Augusta was. She moved closer to Anders, entwining her fingers in his, she felt safer being near him. ‘You still haven’t told us why you’re hiding Augusta,’ said Aidan. ‘This young man does not forget anything,’ said Cornelia, smiling. ‘Only when to wash behind his ears,’ Tragen said laughing, the mirth increasing when Aidan automatically put his fingers to his ears to check and then went red as everyone looked at him. ‘The storm has abated now and should disappear within the next few hours,’ said Locklear, who had remained silent until now. ‘We seem to have reached the limits of the storm and are now running out of the range of the devil. Hopefully, we can now look forward to a period of calm before we turn for home and possibly meet it again. But if we do encounter this storm or this being again, at least we will now be prepared…and Princess Augusta will be well hidden.’ He summed up. ‘My first priority is to make landfall so we can carry out repairs to the hull and the masts. If we meet this tempest again before these repairs are completed, the Grim is unlikely to survive.’ Locklear turned to leave but halted with his foot over the storm sill when his friend stopped him. ‘A moment, my friend,’ said Tragen, ‘before you go, I must emphasize to our young friends here the need to keep Augusta’s identity secret, her life may very well depend on you. If we do meet this being in the future we do not want any of the crew knowing who she is. The less who know the safer she will be. So enjoy your freedom, Nellie, while you may and remember the lessons that my young apprentice will teach.’ He moved to leave with Locklear, and as he put out his arm to help Lady Cornelia to rise, Beatrix spoke. ‘Wait!’ she shouted, and she reddened when everyone looked at her. Nervously, she said quietly, ‘I’m sorry, but I think there is something you may have missed.’ She gripped Anders’ hand for support; she had never spoken in such a manner to such people of high station before and wondered if they’d believe that a mere companion could possibly have anything of importance to relay. ‘I mean…oh I told these earlier,’ and she indicated her friends, ‘they dismissed it then, but I don’t think we can ignore the possibility any longer,’ she said in a rush, looking down now at her feet and clinging to Anders. ‘In his mindmeld with the creature, Aidan said that there was not “a wizard going” but there were “wizards coming”. Don’t you understand,’ she said exasperated, ‘“coming” he said, not “going”!’ And at their still puzzled looks, she continued. ‘That storm you assume was created in Mantovar, could it not have been conjured here…on this side of the storm? May not the creator’s intention be to lure us to him, to stop us getting home to Mantovar? And what about Aidan’s third vision, he said everything was “red and hurting”, not necessarily hurting him, it may have meant someone else was hurting and…and he saw it, and…and that is what is waiting for us!’ She finished abruptly and held her breath waiting for their reaction, every bone in her body telling her it was true. They were going towards the danger not away from it. Tragen stared silently. Locklear ran his fingers through his black beard, tugging hard, his mouth pursed tightly. Cornelia sitting back down on the bed clasped her hands together and gazed into space thinking of the ramifications. Augusta was scared and wished she could hold Aidan’s hand as Beatrix was holding Anders’. Aidan felt her fear. ‘Don’t be frightened, Augusta, we’re all here, we’ll look after you,’ he mindmelded comfortingly. ‘It never occurred to me but I do believe Beatrix may be correct,’ Tragen broke into their mindmeld and into the heavy silence in the cabin. Beatrix breathed easier and smiled nervously up at Anders holding her tight, now she would not have to worry on her own. ‘And if that’s the case the cessation of the tempest has lulled us into a false sense of security,’ added Locklear. And that really did flummox young Beatrix. After their meeting, the four went up on deck to clear their heads. They avoided the quarterdeck and went up forward on to the foc’s’le. The storm had subsided, the drizzle had stopped and, although the sun had not yet reappeared, it was warm. Tomorrow promised to be a clear day. The ship’s superstructure was in a chaotic state with broken rigging needing securing some in great need of repair. It was going to be a mammoth job to splice the necessary lines and both broken masts were in a very sorry state, sharp slithers poking to the skies from the tops of the stumps. However, sails could fly on the foremast, jigger and after-jigger and the captain had already ordered them set. Despite the ship’s obvious handicap, the vessel was proceeding at a fair speed, despite the difficulty in controlling the steering. Where the ship was going they were still not sure, the overcast denying them their position. The four friends settled in the bows staring out to sea. Quiet for the moment, their thoughts on what had transpired in their discussion. Beatrix, although relieved at having persuaded her companions to her way of thinking, was very troubled at the danger her mistress now found herself in and along with her, of course, all of them were now in serious peril. Moreover, what had Lady Cornelia meant with her parting comment? Beatrix had been trained from a very early age to be Augusta’s companion. Her mother was the princess’ favourite lady-in-waiting and both had grown very close their friendship lasting years. Beatrix was very proud to carry out the same duties for Augusta, although up until these last few days, their relationship had not seemed to be as strong. Beatrix smiled; their friendship had certainly blossomed on this voyage. She continued to contemplate the direction her life had taken recently, her thoughts leading her everywhere, most of them frightening and looking at Anders her heart skipped a beat, her feelings made even less sense where he was concerned. Anders was a worried young man standing at the rail close to Beatrix. What were they getting into? Aidan’s visions scared him; mindmelding with an evil being took some believing. And Aidan’s actual sightings, of the Gods knew what, really frightened him. He peered around at his friends, silent with their own thoughts. A lump came to his throat, so many friends. He’d only ever been close to Aidan, and like Aidan he’d never had female friends and now, as he glanced at Beatrix, it seemed that he had more than a friend in her. He hoped so. He smiled. What would his six older brothers say to that? Being the youngest in his family had its advantages; his mother always spoiled him. But it had its disadvantages as well, especially when you were fifteen years younger than the next brother. He’d always had to fight for his father’s attentions, and been made to feel slightly inferior to all of them; tolerated was the word. But here he was now, an equal, friends with royalty and wizards; and in love with Beatrix. It must be love, he thought, otherwise he wouldn’t have enormous butterflies in his stomach every time he looked at her. We have to be very, very cautious; I want nothing to harm any of us, he thought. Moving closer to Beatrix and rubbing shoulders with her, they both studied the ocean, each very conscious of the nearness of the other. Augusta, usually carefree, was now thinking very seriously of what was ahead. All her life she had known that she had enemies and that they would love to deny her Mantovar, some would feel it their duty to kill her. She was used to being in danger and used to having bodyguards. Her parents, and her teachers, had always drummed it into her that she had to be very circumspect when choosing her friends. They should always be from “proper” families, those very loyal to her father. She knew that her future husband would be chosen for her from that clique, probably within the next year. Then her heart flipped, was that the reason for her early recall home? Had her parents decided already? The thought of that made her very miserable. Up until this voyage she had not had second thoughts about being married to someone she didn’t know, it was her duty. But now, and she looked at her friends, she shuddered at all thoughts of betrothal to a stranger. She sighed and stared over the rail at a dolphin swimming nearby. Look at me now, the only real friends I have ever had are these three – a lady’s companion, a cabin boy and a wizard’s apprentice – hardly members of a “proper” family, except for Beatrix of course. These three would be more loyal to her and far better friends than any members of the aristocracy of Mantovar, or those of Drakka. She felt safe with these despite the unknown enemy chasing her. And then she smiled, she was now a wizard, she had the ability to mindmeld and do magic. She would be the first ever monarch to practise the magic arts, could she also be the first ever monarch to choose her own husband? Then another thought made her anxious; would a wizard be allowed the throne, someone had tried once before and failed. Aidan on the other hand was nervous. A responsibility unlooked for had fallen on his young shoulders. He had to teach a member of the monarchy the intricacies of mindmelding and of magic. He was under no illusion as to the complications of this course of action. The prince would be astonished that his daughter had the ability; suspicious as to how she had acquired the art and mistrustful of this young apprentice teaching her how to use it. He would not like his daughter falling under the influence of a wizard even though his best friend was one. There were many in the principality, and indeed the empire, dubious of the powers held by these mysterious people. Wizards, and in some cases Adepts, although welcomed in many places, were always treated with extreme caution. Indeed, in the case of the Guild of the Brethren of Wisdom, a mysterious sect of black sorcerers based in the south of Drakka, fear was the ruling factor—ordinary people avoided them like the plague. He looked around at his companions and marvelled. He had only ever had one friend before – Anders – but now he had three. He smiled, regardless of all that was ahead he was happier than he had ever been before in his young life. Leash watched them from his position at the helm. He also was happy. He had hidden the contraband sack of food in the wizard’s cabin. Looking back it had been so easy. His task of toting provisions from the forward hold and stacking them in the dry, in the passenger corridor, had given him the opportunity. When Tragen and the others had been in the maid’s cabin that morning, he had stolen the food from that in the passageway. He had then secreted it under the boy’s clothing in the trunk behind the door of the wizard’s cabin. He had not even had to rush, there had been nobody around to see him enter or leave the berth. Now, when everyone was starving, as they all would be in the next week or so, he would arrange for its discovery. He smiled, it would be the end of the boy – the crew would be hard-pressed not to lynch him – and the wizard would be gutted. Leash only had to wait.
2019-04-18T16:31:38Z
https://philipjcook.com/tag/lady-cornelia/
Why Do Christians Suffer? Is This God’s Will? Tragedy is a monster that comes to everyone at some point or another. When it strikes, the after effects can be devastating. While going through difficult circumstances in life we are always put against the question, “why”. Why would God allow death and disease? Why would the Almighty allow men to steal or lure a woman into adultery? Is this God’s will? The answer is yes. God does not condone the sin; He uses the times of struggle to refine us. The book of Job is an excellent resource when dealing with this topic. We can learn a lot from Job and how he conducted himself. Chapter 2 starts out the same way. God repeats verse 1:8 again to Satan and gives him certain rules. And the Lord said to Satan, “Behold, he(Job) is in your hand; only spare his life.”(Job 2:6) Satan strikes Job with horrible, painful sores all over his body. Even his wife tells him, curse God and die.(Job 2:9) Again, Job’s response is truly remarkable. He says to his wife, “Shall we receive good from God, and shall we not receive evil?”(Job 2:10) Job understood that God is in charge over all. God is sovereign. This is why God allows pain and suffering, so that we can be made perfect through perseverance. Job truly was a wise man. Not once did he ask “why”. His response was always a recognition of God’s sovereignty. This is the direction that we as believers need to strive for in our suffering. With this mind-set, we will have a clear vision of what God is doing. James 1:2-4 says, count it all joy, my brothers, when you meet trials of various kinds, for you know that the testing of your faith produces steadfastness. And let steadfastness have its full effect, that you may be perfect and complete, lacking in nothing. This is why God allows pain and suffering, so that we can be made perfect through perseverance. It is so important to be in the Word and memorizing scripture so that when Satan comes, we will be ready with an answer. Matthew 4:1-11 shows Jesus, Himself, doing this. Satan comes to Him(allowed by God) 3 times to tempt Jesus and Jesus shuts Satan down with scripture every single time. Whatever storm comes, just remember that it doesn’t last forever and peace always follows eventually. God also wants to bless His children too. At the end of Job, God restores Job’s fortunes. God gives Job twice more than what he had before. Also, he has many more children and he lives 140 more years to enjoy all of it! It even says that no women were as beautiful as Job’s. God loves us all so dearly. If we cling to Him when storms come, He will show His love more than we ever could have known. I am in one of the biggest, hardest storms of my life right now. Satan kept plugging at me the other day and Job popped into my head. I said to Satan, “have you considered my servant, Derek?” The peace of God filled me from my head to my toes when I said that. I know God is in control. Keep fighting the good fight! God allows trials so we can draw closer to Him. Looking for some more related Bible studies? Is Suffering Avoidable If You Have Enough Faith? Such grace and beauty in this Dereck. Praying for you brother. It reminds me of 1 Peter 4:19 which says, “So then, those who suffer according to God’s will should commit themselves to their faithful Creator and continue to do good.” and “It is better, if it is God’s will, to suffer for doing good than for doing evil” (1 Pet 3:17). I know that a joy shared is doubled and a sorrow shared is halved. May it be so with you brother. Well done her. Thank you for your kind words Jack. I think of Job frequently when trials come my way. Instead of thinking about the bad that is happening, I focus on the good stuff, like my kids and that I have a good job. Most importantly, the trials bring me closer to God. It is my hope that every believer would come to rely on God in every single circumstance that comes their way, good or bad. Also, Phil 4:13 is such an encouragement always, “I can do all things through Christ who strengthens me!” Christ is the source of everything good! God bless you! Suffering is one of the most misunderstood aspects of the Christian’s life. You’ve done a great service by helping us understand it better. We must trust God in the good times and the bad. Thank you Robert. Not many consider it pure joy when we face trials of many kinds, but the joy comes in knowing that when the trial is over, we will be closer to God! There is also joy in knowing that God will not allow us to go through anything we cannot handle. With Him as our solid rock we will prevail through all things satan tries. I had been doing a little bit of research into this and found a blog, “We are THAT family,” and I thought the author did a great job of dispelling with the worldly belief and explaining what it really means to be suffering supported by Scripture. “Actually, the Bible promises us hardship in this life and tells story after story of suffering. ‘For we do not want you to be ignorant, brothers and sisters, of the affliction we experienced in Asia. For we were so utterly burdened beyond our strength that we despaired of life itself. Indeed, we felt that we had received the sentence of death. But that was to make us rely not on ourselves but on God who raises the dead.’ [2 Cor 1:8-9]. And He has endured every sorrow we may carry. In sum, there may be times in our lives when we will be up against great pain, far beyond what we can handle. Look at certain cases of death for example, like murder. There are awful recounts of such horrible murder, and that kind of pain before death or unconsciousness sets in must be beyond anything that you or I could ever comprehend. But, it is through those experiences where there is still peace in our faith. God allows suffering so that we will come to rely on Him more and that He will shine through us. Hello Jen. I must say thank you very much for this comment because I think you are right. The scripture speaks very clearly on this. I will refrain from using this saying from now on. I actually just read a different blog after I read your comment and the author says “a more accurate statement might be that ‘God will never give us more than He can handle for us.’” (thepaperthinhymn.com) Thank you again for your wisdom and insight into this. God bless you! It just so happens (coincidence, I think not) that I have been given this very topic to write on for a September article right here at What Christians Want to Know. I agree wholeheartedly with what you wrote, Jen. It is readers like you that encourage us in our ministry on this website. God bless you. Thank you so much Derek and Robert! I’m so happy to hear this explanation made sense. I’m also so glad I found this website! Robert, I can’t wait to see that article. I’ve been looking into why God allows us to suffer, and I’m sure Robert’s article will really hit home to people. God Bless! Thanks for sharing, it has enlightened me to the struggles and sickness ive been going through. So many times ive asked God why and to take this cup from me with out cursing his name. No more only praise will I give him through all my hardship from this day forward. Thanks for sharing and God bless. All to many times satan wanted me to blame God, but I didnt instead I grumbled and complained and cried out why me, why me. I have a much better understanding now. Thanks again. Blessings upon you Jereome! God is good always! I believe that it is essential that we all have a core group of Christians in our lives that we can turn to in times of need for prayer especially. I have a few friends that I turn to all the time to ask for prayer. I encourage you, if you don’t already, to find 2 or 3 really devout Christians from your church to surround you in prayer. When 2 or more gather in His name He is there. This doesn’t mean that your problems will go away for sure, but you can be assured that God will be listening and that He loves you! Thank you for your transparency in your comment sir 🙂 God bless you! This was lovely. I just wrote about this topic recently in my blog as well. I am also suffering some tough trials and I think this is a popular question because everyone has suffered at some point. Thank you for your kind words Summer. This is indeed a popular topic. God never promised a trial-free or a stress-free life, but when we draw on His strength we all can be assured that He will take care of us no matter the outcome. Thank you for stopping by WCWTK. Feel free to stop by anytime. God Bless! Job is one of my greatest hero’s in the Bible. I think that a great deal of what has happened in my life is my fault or brought on by me. I have MS, I was diagnosed in 1996, but, I continued to work for another 9 years until I had to seek, and was granted a disability. So, that is how I get by. I am a believer, almost my whole life, I have believed in God and Jesus Christ, but, I have done things that were just not Christian like, and I know my situation is nothing like Job because he did not do anything to bring on his situation. And yet, he still believed and prayed before the Lord. I did things even though I knew better, and I just wanted to do my own thing. I know that I have to do a better job at reading and understanding the old testiment. I love reading about Jesus, so I do a better job at reading the new testament. But, I cannot help but think I am a hypacrit for trying to study the scriptures now. I use to think I was ready to meet God either in death or when He returns. Now, I know that I am not ready. I feel like I have learned nothing. I feel like I live in fear all the time, and I live waiting for the next thing to happen. I hope that I can help you with some encouragement. Jesus said, “I am the Way, the Truth, and the Life. No one comes to the Father, except through me.” It is your belief in Christ that saves you from hell. If you have accepted Him as your savior and you believe what he says in the verse I just quoted, you can be reassured that you have a room already ready for you God’s house in heaven. You feel fear because of your past. Christ is bigger than your past. He will forgive you if you just ask brother. Then its time to move on with boldness, reassured that Christ has you in His arms. I think Satan is really feeding into your fears right now. Your story is no different. We ALL have been prodigal sons one time in our lives. Also, the OT is important because of all of the prophesies that came from it to be fulfilled in the NT. You don’t have to feel the shame and guilt anymore!! Give it to God and He will change your life for good. Please know that I will personally be praying for you brother. Lay your burdens at the feet of Christ and the rest is history. God bless you sir! I just read your article and felt good to confirm God does let us suffer to become closer to Him. But, its taken me SEVERAL bottoms to submit 100%. I cannot get enough of the Bible and bible studies and on Sunday…I don’t want the pastor to stop. I am a broken down lamb running into the Lords arms FINALLY coming home clean and sober after 5 years away from Him and the church. I am an alcoholic and on August 12, 2010, I let someone I knew only 3 weeks convince me to let him drive my SUV drunk. I got out of the taxi I was taking and into the backseat of my SUV. Five minutes up the road, he was going to fast, crossed the yellow line and instantly killed a 22 year girl. My SUV rolled many times with my left arm out window. There was three people in my car. We were all flights for lifes. Driver is in prison for 10 years (I just got convicted to send him this article on suffering and a letter saying ??. I have never been angry at him, but say I made the worst 30 second decision of my life. In the past two years, I have had 14 surgeries. 9 to save arm but they had to amputate 2″ above the elbow, and the rest to make it able to look like an stump where I can get a prostheic arm. This is not my suffering, Ive adjusted to this. My husband divorced me, one of my two teenagers will not speak to me, and my mom says I disgraced the family and ruined everything she worked for her whole life. I am not invited to holidays or bdays anymore. 4 weeks ago while i was in hospital due to staph infection in stump and also fell 4 steps down and rebroke right arm, she wrote me a letter asked me not to call her anymore. All my family has given up that my drinking will ever stop and how many more rock bottoms can I hit. I now say enough is enough…my church is my family now and take care of my needs – physical and spirititual. Sorry so long, but just today been crying and pleading to the Lord to help me. The two year anniversary of accident is coming up….losing everthing in life including my arm and restarting over at 47 is nothing compared to the family losing their daughter. Please pray for them during these next few weeks. We have started a recovery course at the church, once I admitted to everyone that why i disappeared was i was an alcoholic…i felt so much better. Job is my hero and I believe with all my heart that God has been trying to get my attention back on him and not sin. Your article really helped me and I want others to know bad times and things do happen to us to go running back to the Lord where I will stay this time until eternity. Hello Denise. It is a HUGE praise that you have recommitted your life to the Lord!! God NEVER gives up on His children! I can hear your sorrow about your family. Keep praying for them. God is in the miracles business. I encourage you to find a few really devout Christian friends from your church, if you don’t have any already. It is a great encouragement to be able to go to close friends for prayer. God doesn’t always answer our prayers like we want Him too, though, so it is important that while we are in crisis to ask Him, “what can I learn from this Father?” With that kind of heart, He can mold you into the woman that He has always meant you to be. Thank you so much for telling your story. I will pray for you and your family. I hope and pray that you keep up those prayers for them. I am so sorry for the accident that you had. I hope you will tell us here on this site, how things are going with you. Derek, what a wonderful and insightful article. It gives such grace to the heart. I like how Job concluded his talk with the LORD, “I heard a lot of things about You but now I know!” That’s what going through (with Him) does for us, we learn of Him Derek and find Him to be in our lives a “Way-Maker, Peace, Comforter and a sweet Never-Leaving Companion”. We are awed to see Him turn it all around for our good – that no weapon though formed shall prevail – that His grace is truly sufficient – we learn that by the lessons gleaned from suffering. We learn His Word works – it becomes real as we learn how to apply it in our lives and that troubling circumstance. Derek, you are an absolute blessing – an anointed pen used to share the goodness of our great God. Blessings to you and family, I’m definitely looking forward to reading more! And thanks again to all of the authors who continually share the Good News in such a practical way! Hello Iyanth. Thank you for your encouraging words. You are absolutely right. God uses every weapon meant for evil and makes good out of it. He always brings His children through, no matter what happens. Sometimes this means seeing our loved ones leave much earlier then we thought to be with our Father. We must always remember that God is sovereign and He is in complete control. Blessings upon you! Am aborn again since 1996 i read about unpardonable sin after some years butthis year the devil is condeming me, my wory is that i experients thoughts that are awkward but deep down my heart iknow is not me and my throat feels like there is something ilove jesus idont want to sin please pray for and help me what to do. I had a Christian Bible teacher tell me once that if I was genuinely concerned that I had ever committed the unpardonable sin, then I hadn’t because God will turn away from you if you commit that sin. You won’t feel Him moving in your life or experience any of the blessings that He gives. It sounds to me like you have genuine concerns Ruth. The devil will always condemn you and everyone else. That is his one and only goal in life, to bring as many to hell as possible. Keep Christ at the center of your life. When you feel like Satan is trying to get at you, pray to God that He would send Satan away from you. If you are going through a trial though, that is gonna be an experience that will draw you closer to God as you rely on Him through your suffering. When your trial is over you will be stronger with God. Remember, you will always be a sinner but God will always forgive you too. Be strong and always fight temptation. When you sin, ask God to forgive you and He always will as long as you are sincerely repenting. I also encourage many people on this site to find a core group of Christian friends that you can meet with and pray with as a group. There is power in prayer. When you have many people praying, it is even more powerful. Thank you for visiting WCWTK. You are always welcome here and we appreciate any comments you have. God Bless!! Thank you for your kind words Jess. I read the article you posted and it does have some good material there. I really enjoyed reading the section about how we suffer now to be glorified later. It was an encouragement to me. Blessings on you and your loved ones. I went to a father’s group in Texas (just north of Fort Hood) where some ex-military west pointer gave some real eye-opening comments. He basically said that the current Divorce process, legislation, court system and military is all one scheme that was put in play around early 1960‘s. It was put in place for the Vietnam War, that’s when the divorce’s started to sky-rocket across the country (Google statistics). That in addition it was also designed to be one huge cash-cow to lure greedy lawyers to facilitate and destroy more families on the civilian side to get enough statistics to make it comparable to the military statistics. However the military numbers are still much higher. That is why they then modified the scheme to use on police nationwide to raise the civilian stats. It is designed to send single male soldiers to war and deny ex-wives any financial support that was initially and may still be coming from the military/ pentagon’s money pockets. To the military, the soldiers wives are expendable as are the soldiers and also their children! Less money the military spends on wives, kids, ex-soldiers, etc the less they have for their drones, guns, or bullets. The scheme is very very complicated but based on very slow very subtle psy-ops brainwashing tactics. He said that any Freedom of Information request will gradually reveal key pieces of data that when analyzed together with confirm all this. This the reason why the pentagon does not want to release documents related to divorce. Part of the even bigger Military-Industrial complex. Basically makes wives and soldier fight and hate each other. The scheme basically exploits women’s emotional traits to spread itself to other victims. The media contributes to the fear mongering and makes things worst. Fear (PTSD etc) makes women fear for their safety thus they then go pleading to the oh so willing authorities who provide them with military issued cookie cutter divorce packets to take to a civilian lawyer. They do this to hide where the process initially starts. Why We Should Expect Suffering? Previous post: What Does the Bible Say About Helping the Poor? Next post: How Do We Know the Bible is True? Is it Really the Word of God?
2019-04-26T03:55:44Z
https://www.whatchristianswanttoknow.com/why-do-christians-suffer-is-this-gods-will/
And now the question: do you have any promotion material (images, banners etc) we can use on blogs and into websites, to give your great project some promotion. anyway: The fonts are exelent! Hi Michael, Thanks for mentioning the faulty link. For promotion material you can use the images on my site. If that isn’t what your looking for, please let me know (per mail). It’s exceptionally rare to see fonts of this quality given away for free. Thank you so, so much! I’d love it if these became widespread and we could start using them for web text. Lovely work, but I have to ask … why are you giving these designs away? All of these typefaces have enormous commercial potential, and I don’t mean at $15 or $19 per weight, like MyFonts.com. Some of these families could be sold for hundreds of dollars via a reputable foundry or distributor. Do you have commercial typefaces available as well? Or do you plan on leaving all this money on the table? I agree with the others. These are some exceptionally nice looking fonts, and very helpful that they come with multiple faces. I’ll be sure to make a donation when I start using them. exljbris, you create some beautiful fonts!! What program do you use to put them together? The best programm to use is FontLab. However it is quite expensive ($649,-). I can aslo recommend TypeTool (3) which is also a very good programm. It lacks only a few ‘high-end’ features of FontLab ($99,-). There’s also FontForge, wich is free, but is less easy to use. Hello, what a wonderful site. I like your fonts, especially the Delicious, which I would like to use. I wanted to donate something but the link is broken. It doesn’t work. Is their any other possibility than paypal? Would like to see more information in this section without the need for going to some other site, thanks! You’re absolutely right. I started this blog so people could comment on my fonts, but I never filled in this blank 🙂 I’ll update this ‘about’ with some info on myself soon. Ok… updated with some info on me and some of the tools I use. Your fonts are fabulous! I downloaded some of your free ones and left a small donation at paypal. (sorry it can’t be more-I’m a starving artist myself) But just know that your work is beautiful. thank you! Thanks Bri! Really appreciate it! You probably are used to hearing this already, but I just want to take the time out to thank you sincerely for your efforts in providing such quality typography for free. It’s rare to find artists’ like yourself nowadays, giving away their a portion of their lifestyle in such a way. I will be donating real soon. I wonder if all amateur font designers get station wagons, though mine is a Fuji Heavy Industries (that is, a Subaru). Yes I know it’s not an Audi 🙂 There was instant love when I saw this car (nobody shares this at home though) so it deserved a place in the ‘A to B’ section, especially considering that I don’t like cars at all. btw did you get my reply on your (new Diavlo) mail? I just looked through my mailbox and found it. It arrived on the 18th and I probably didn’t see it because I have my mail sorted by sending time. Maybe I should change that. Apparently I have been having e-mail problems lately without my knowledge, because I just discovered yesterday that my subscription to the XeTeX mailing list got suspended on the 17th due to bounces. I haven’t studied the problem to know where or why the problems have been occurring. Maybe Domainmonger’s mail forwarding (where anything @chemoelectric.org goes) has been broken. I am having trouble with PayPal. Do you have a mailing address or a PO Box by which I can send a donation? I am a creative director at a packaging company in the US. I am very impressed with your fonts! Very high quality! I’m not rich or anything…but you deserve a donation! By the way, I studied for 6 months in Netherlands…in Maastricht. I miss that town! I had a good time last night, thanks to the old men, the alzheimer cafe and – allright – your company too. And yes, as you can see, I visited your site and the wonder world of Fonts. My favourite one after a quick glance: Diavlo. Romantic and yet stylish. Or so I think … Keep it up! Ian, I’ll send you a mail shortly. Great to hear Noferatu. Thank you! You have re kindled my interest in designing my own fonts (after a few years gap). I was wondering how you started to design your fonts? Do you load an existing font of a similar type as a starting point and continue from there or start each one from scratch? That’s really great!! To answer your question … I do everything from scratch, because I only want to do my own thing. However I always look at fonts wherever I go and wherever I am and sometimes when I’m designing type, to see how other designers solved things that puzzle me at the moment. You are a pro at typography! Museo is totally awesome! Just one question; how do I contact you? I have looked all over the site to find a mail address but couldn’t. I tried google search as well to no avail. Please let me know how I can reach you via email. I’m designing a small interactive periodic table app (using Flash) for use in schools and I would very much love to use Museo in the app. Please let me know if this is ok with you. Thank you once again for the wonderful fonts. yes, your work is consistent and really beautiful. I particularly like Museo as well. Please drop me a line as I probably have an assignment for you. And I just HAD to come over and see. And it is so. Could you please contact me via email? I’d love to do a feature at Designers who Blog. @ Enrico: I’ve contacted you also. Maybe my e-mail got trapped in you spambox? Im a graphic designer working in the townhall in Óbidos – Portugal and we gonna have a cultural event of contemporary art here in June. I’d like to use this font for all the graphic design work and we want to buy the Museo 100 and Museo 900 to complete the family. But we need to now if you can give us invoice with the name of our company?? That sounds great and I’m very pleased that you like to use Museo for this event. For this question you should contact MyFonts, because they are selling Museo for me. If they can’t help you let me know and we’ll work out something. Thanks for all your work, your typefaces, everything! Just bought the Museo family, even though I’ve no idea where I’ll use it yet. I’d recommend that same download/purchase option for future fonts. It’s easy to view as a business expense, unlike the donation approach. Also, I’m excited to try out the @font-face technique — will send you a link whenever I use it. Really enjoying your fonts.. can’t get the download links to work on your homepage though.. anyone else having problems? I’ve checked, but everything seems to work fine. @ Michael – Thank you for purchasing Museo! The new Anivers will be released at MyFonts –with the regular for free– for probably €24,95 (the whole family). Please keep me posted! I’m graphic designer, and I’m working on my site, and I’ll probably make it with Fontin. As soon as I have some layouts I’ll send you, ok? so glad I found this website! Really nice free fonts, and believe me, they’re really usefull, cuz im a student and i dont really have the money to buy any fonts, at least while im studing. Well, i have this project to do for uni, where I have to pick a type designer and make a poster about it, and im thinking of doing it about you. Could you give me more information about your work? like where have your fonts been used so far? (so that I can put some exemples on my poster) when did u complete each font? what other projects have you done? I’m a graphic designer from Poland, and I’d love to use your fonts… But they don’t have any Polish glyphs. Since there’s not much to add (8 letters, usually just standard letters plus an accent or tail), would you please consider enlarging your font families (at least a few of them)? I’d be thrilled! Hi emilka, all of my newer fonts contain Polish characters. Have a look at Diavlo, Anivers and Museo. Hope this helpes. Good luck! i’ve just finished a pocket book i made for college. i used fontin sans and diavlo on it and thought you could be interested in seeing it. it’s all in portuguese and it talks about the vox-atypi type classification and type history. best regards and thanks for the great fonts! Voor mijn eindexamen heb ik een boek gemaakt over het Noorderlicht en hiervoor heb ik o.a. jou font “Diavlo” gebruikt. Allereerst mijn complimenten en complimenten van vele anderen die mijn boekje bekeken; het is een erg mooie letter! Graag zou ik een kleine donatie willen geven maar ik heb geen paypal, er is vast een andere mogelijkheid, toch? @ macki: The book looks great. Too bad I can’t read Portuguese. Just purchased the Anivers family from myfonts for use on a clients Identity and Branding – couldn’t resist it, excellent face. I was wondering if you were going to create a lighter weighted version of this font, that would suit book publishing? Thanks for purchasing Anivers. Hope it will suit your project well. A lighter weight hasn’t crossed my mind. The regular isn’t that heavy and when used small (10 pts) the weight might work out. Maybe I’ll do a bold italic, but I’m not sure. hi, i just want you to know that you’re doing a great job giving away all these beautiful quality fonts. bravo! Just downloaded your Fertigo. Don’t think that a lot of people will realise what you did with the Turkish (f)f-i, but it’s very original and someone has to see it and give you credit. If you got that idea from someone else, please send the credits to them en tell me who “them” is. Hi Micha, I found the info on how to deal with the Turkish i on Typophile.com … I didn’t invent it myself. The only thing is that I can’t remember who posted the “trick” and what topic that was. About the OpenType names: all the info is there. I guess it depends on how your FontLab preferences are set. Jos: I have been impressed with Dutch typography ever since my classmates at Cranbrook collaborated with Dutch designers for an issue of Emigre in about 1989. I just downloaded Museo from MyFonts and look forward to introducing it’s softer style of slab serif to my Typography students. I’m also proposing a semester abroad program in the Netherlands for my students. Could you offer any tips for such a program in summer 2010? I’m thinking of visiting the Graphic Design Museum in Breda among other things. Cheers! First of all I want to say thank you very much for sharing your work. Your free fonts are just absolutely professional and nice looking, much more than some other non-free fonts I have to say. (at least that´s my opinion). I´m a huge fan of sans serif fonts and yours are among my all time faves. I´m a graphic designer (that´s what I want to believe…) and recently I get a copy of FontLab5 and at the same time my interest for typography is growing up strongly. I have a few sketches of some fonts I´ve been working on with illustrator, and if I don´t go wrong saving my files as .eps will give me the possibility to work with them on FontLab. Here is where my “troubles” start. FontLab has a very simple interface but after experimenting with the software for about two weeks I feel myself a bit lost yet. Please, can you recommend me any good tutorial for FontLab? I´m obviously a beginner but any help is appreciate it. Thanks in advance! Hello Jos! I’m a Design Student from Unesp, in Brazil. I recently started using Linux Ubuntu, and then I started researching free / open source softwares, fonts and resources. And then, I found You! You doa really great job! I really love your fonts! Actually, I’m opening my studio now, and as you allow the use of Delicious and Fontin for commercial use, I’m here to invite you to visit my blog, where i’m dayly publishing the progress of the development of my brend. I’m using the fonts just for text documents, and not for the logo, so I didn’t modify them, ok? but I’m showing them for everybody, and i put a link to your site inthe brend aplication manual. Hi, I learnt your fonts through fontleech and hey great job…they are absolutely amazing. I have a question (i dont really understand enlighs so well, especially when it comes to copyrighting tough words :P) …can I use the font museo in a logotype? PS. Im now in the proccess of making my portfolio-site and of course ill credit the font to you in my portfolio. If you ordered you copy of FontLab, you must have recieved a link to the (digital) documentation. Thanks! Good luck with your blog and brand! Sure. Museo can be used in whatever logotype. Thanks in advance for crediting. I have just established Anivers as the “corporate” typeface for our music label, Lotuspike. We love it very much. Thanks so much for the quality work you do! I’m a student, young graphic designer from Poland and I want to thank You for giving so good fonts for free. I saw your fonts at http://www.smashingmagazine.com and I think they are DELICIOUS. Delicious oh yes that’s the font’s name. Tasty, I’m going to use you often and won’t grow tired of your zesty flavor. Aniverse speak to me baby! Wow, you are a sassy font. Fontin you sleek font. Such conceit wrapped into a font. Fontin sans classy deco! All caps 24 hours a day. Museo 300, oh so exquisite. Use this morsel sparingly. Tallys, ooh your name and your font remind me of a hotel bar with mediocre Friday night cover bands for the international business traveler. Never been there just a sensation you give me. Fertigo Pro. You’re more romantic than the “Pro” in your name implies. PS. Congratulations your star is rising. Thanks for your kind comment julian. Alex (littlefield): That was really fun reading. Thanks! I don’t want to hijack your comments here, but do you have some recommendations for a good accompanying font to your lovely Museo? Hi Peter, I saw your post on typophile. Hope that helped. Fontin maybe? i have only a question. Which program do you use for the creating fonts? Exist some good freeware for this work? I can try it. Tom, the best freeware programm to create fonts is FontForge I think. I will, a 2 da K. That’s a promise. I, as many others do, love the Museo font! I am a graphic designer and would like to use your font (Museo 300) in my website. I’m not sure if I need your permission or not to use the font, but am just checking before I do use it. Hi Adam, using Museo for your site is allowed, but *not* with the css @font-face property. Adam, no problem 🙂 Yes FLIR (as sIFR) is absolutely allowed. I was wondering if any of your fonts (free or otherwise) are allowed to be used with the “@font-face” property? Or if would you allow for the fonts to be converted to the DRM’d .eot format for usage with the “@font-face” property at least only for Internet Explorer? I really like Fontin a lot, but I think I found an issue with it. I render it under Linux using FreeType and in the bold variant, the “ffi” ligature seems to be broken… Can you reproduce this? “ffi” doesn’t get displayed. I get “E cient” instead. Is there a newer version of the font where this ligature problem is fixed? Marcel M. — My free fonts can be use for the @font-face tag. The following must be applied: You may use this font for Font-Face embedding, but only if you put a link to http://www.exljbris.nl on your page and/or put this notice /* A font by Jos Buivenga (exljbris) -> http://www.exljbris.nl */ in your CSS file as near as possible to the piece of code that declares the Font-Face embedding of this font. Christian Vogel — That’s indeed a fault and will be corrected in a future release. natentine — Nice! Thanks for letting me know. Jos, please contact me as I would like to feature your fonts on Identifont. thanks for the fonts… check out the shout out on my blog in the previous comment! Just curious. Do people from the Netherlands prefer to be called “Dutch” or something else? I was wondering under which license your fonts are released. I think it is very important to protect your creation, especially if you want to share them for free! By licensing your fonts, you avoid companies to copyright them for example. gsik – Thank *you* for the wonderful shout out. I have a brand new logo that needs a nice font for the name of the company in the “hole” that has been left for the name. If I sent you my logo off-list, could you recommend which font I should use? I would tell you more about it too off-list. I would be happy to pay for whatever font you think would be best for my use. Firstly, congratulations on all the fonts you design. They are extremely eye-catching. I have a question for you – we are currently pitching to create a new world-wide brand for a new company. Having found your font Mueso I used it for the main wordmark and myself and the other designers fell in love with it. Now – we are only at the pitching stage but in the event we are chosen how would you feel about taking it off the market and licensing it solely to us. You would be credited throughout and of course we can agree on a fair price. Can you let me know your thoughts on this. The pitch is 2 weeks tomorrow. Thanks for the compliment. Museo is kind of a signature font for me so I don’t want to take it of the market. I hope this doesn’t rule Museo out. Good luck with your pitch! I would think esther means that the letter ñ, is not included on the type, but I don’t know. I don’t think I’ve ever used a free “font” as they are almost all poor quality. Your typefaces are truly set apart. Thank you so much for your delectable typefaces. The art and design community greatly appreciates your efforts. You are an inspiration in excellent design, collaboration and charity. Hi Jos, I would like to discuss with you about licensing a font for corporate ID? How can I get in touch with you? Great types! amy – That’s a very kind comment. Thank *you*. I have just designed a business card for myself using FontinSans and bookmarks for my church using Fontin. Using your typefaces has been a great pleasure. I appreciate that many of your fonts support the letters with diacritical marks that are used in Esperanto. I hope you continue this! I hope to earn money some day soon… Then I will be able to send a little your way as thanks for your beautiful work. first of: great to discover you and your letters. As an ‘arnhems meisje’ and letter lover I am trying to set up a project to ‘save’ the letters of Arnhem train station. I would love to get in contact with you about this (in dutch). could you send me an email? i’d like to speak to you via email on using Museo in an online publication. I found a bookplate woodcut by B.G. Escher from 1922 that uses either “exlibris” or “exljbris” (hard to tell). Just curious if there is any connection? Is it possible to get Anivers in “bold italic” ??? Seems incomplete without it. Would this be something you would be willing to make/sell? It is about “Anivers Regular” font of yours. When typed (windows) with croatian keyboard layout, the “0110 – latin capital letter D with stroke” glyph is shown. Usually should be “00D0 – latin capital letter eth” glyph. Well, at least is usual in croatian. So, if you found this is not a mistake, well, just ignore this post (you can take seriously my appreciation and admiration though). Hi Tomislav, I’m not if I understand what you mean. Both Anivers and Museo have Eth (00D0) and Dcroat (0110) glyphs mapped to the correct unicode, so they shouldn’t behave any different. Kevin – Yes, that is possible, but you will have to wait till somewhere next year. Hi, I’m from Croatia too, and would like to update Myndraine if possible. You see, it’s great font, as others are, but some Croatian letters are missing. So, on the left are glyphs in Anivers and Museo Sans, showing when appropriate key is pressed. Usually glyph shown should be as in Museo Sans, not as in Anivers. Parifal – Myndraine is *not* a font of mine. All my (newer) fonts support the croatian language. I really could swore it was yours, but I see now I mixed up something, and I was so sure. Sorry for mistake. I’ll contact Chris Miller, then, I guess. i have used two of your free fonts for a 2009 calendar I made. If you are interested give me an addres and I can send you a copy. Your typefaces are absolutely beautiful! I’m a tiny bit obsessed 🙂 I was wondering about the license on these fonts–are they strictly non-Commercial, or is commercial use acceptable? Thanks for clearing it up for me! Melanie – Thank you. For the fonts you can downoad from my site: all the license info is at the bottom of each page. For the font you can download via MyFonts: the license is enclosed (or can be viewed before downloading on the MyFonts site). thanks for offering some of your great work for free. I recently relaunched my private photo website (http://www.mm-foto.de) and used ‘Fontin’ for the titles and texts in the flash files. Additionally I used the service of ‘fontburner.com’ to provide “Fontin” for some html-headings. I placed a link to you blog on the ‘about’ page. Nice! Thanks for linking, Michael. All the best for 2009. Hi I’ve just seen your website and I would like to ask a few questions regarding the typeface family Museo. I’m currently doing Visual Guidelines for a company in Portugal and I would like to include 3 weights of Museo in the Stationary of this company. So these weight will be used only in daily institutional correspondence. Now this company has a lot of tiny offices spread around Portugal but the main office is in Lisbon. They don’t want to buy another font because they already using one purchased typeface for the branding (which is not suitable for reading long text). So is it according to your copyright if I tell them that they can use the 2 free weights of Museo Sans 500 and Museo Sans 500 Italic plus the Museum Sans 900 for 200 users (I’m not sure of the number of computers yet) which is 297 dollars on MYFONTS.com ? Anyway congratulations for your work, all of the typefaces are great specimens. Thanks, Pedro, I’ll send you an email soon so we van sort things out. Couldn’t find a contact form so I’m leaving a comment instead. It really is a beautiful font, cheers! Jos – I really enjoy your type work. I have a February redesign launch of one of my magazines (an inflight for AirTran Airways) using MUSEO as one of the brand faces – which I will be glad to share with you. I am interested (as I have a new publication I am developing now) in seeing about creating a unique headline face for an upcoming Mexican airline magazine launch. The only issue is a tight timeline I am working with. Contact me to discuss further if you are interested. I would like to invite you as a speaker to a typography symposium. I am teaching design at the University of Applied Sciences in Dortmund (Germany) and am organizing with a group of students a typpgraphy symposium on the 3rd and 4th of april 2009. It will be called 33pt and is the second of it’s kind. For the first one, have a look at ( http://www.33pt.de/archiv ). The theme of the upcoming event is ESKAPADE. We came to think of you, because we love your fonts on the one hand, and think that giving away quality fonts for free is definitely extravagant. Plus the coexistence of being an artdirector in an advertising agency and a typedesigner at the same time is far from being usual. Hello & Thank You for some lovely & free fonts. Very generous. In return I’d love to have you answer the Seven Deadly Questions and post your answers on OK/ON along with an image of your work and a link to your site. if you like i could send you the screenshoot or have a look at gmx.de (not .com) maybe you see it there on the right site. hi again Jos. I wonder if you could do me a favour. You see, I’m having trouble reaching Chris Miller, but his copyright – when I download font – says “As creator of this font, Christopher Miller permits its use however its owner sees fit, other than naming it something else and trying to sell it”. I really believe that if anyone can help me it’s you. I’d really like to see that font updated for Croatian. It would be just couple of characters, as stated previously. I really hope you could edit it for me, and other CRO people. I’d appreciate it very much. Sorry for posting this here but there’s no mail I could reach you on, anywhere. Katinka Thank you for spotting! I saw that you posted it on the exljbris flickr pool. Great!!! Parsifal I’m very sorry, but I don’t like to work on someone else’s fonts. BTW FWIW will be speaking in Dortmund. (See the post of Stephan Claudius). I’ve put my e-mail address in the top of this post. All your fonts are awesome! BTW, I made some icons for rEFIt (http://refit.sourceforge.net/) with Museo. Is it OK if I release them for free? Thanks for the wonderful fonts! Everybody here in Unesp (the University where I study design in Brazil) love them!!! That’s great. I hope you will win the competiton! Hello Jos, a wonderful site with amazing fonts. I like all of them. The Museo i’ll use in my next project. I will report. Ah, der Sven 😉 Thanks for stopping by. Please do keep me posted! Thank you very much for anivers –actually I noticed the beauty by using – it is fine to have one font for free to test it. Now I’m using it in a project and: Today I wanted to buy Anivers Bold Italic … there isn’t any? Are you’re working on it? I really want to make a Bold Italic, but I still have some things I want to finish first. It is really a great compliment for me that you noticed Anivers’ beauty by using it! Thanks! Just a quick note to say, thank you, thank you! Great quality fonts, some for free, what more can you ask for? Keep up the excelent work!! Very talented. Hello Jos! I’m a big fan of yours and I’ve done a multitouch interface concept for Microsoft’s Imagine Cup at the Design Competition. It’s called Cheops. As it is an application for helping literacy, we chose a typography called Sarakanda, created by Alejandro Valdez to the children to interact with the table. But we used Diavlo for the video presentation and for the teacher’s interface. I think you’d like to see it! Again, thanks for the amazing fonts!! Thanks for the post. Very impressive! I’m glad that my free fonts are put to such use. I love Tallys! It is one of the best fonts I’ve ever seen. But I need bold and italics. Is there a way to autogenerate bold and italic variants? I come to your website almost daily to see if you’ve posted any progress on calluna etc. You’re a real inspiration. It’s custom lettering I did for myself. Nothing you haven’t heard before but it bears repeating again: Your fonts are heads and shoulders above the other free fonts out there. They even go beyond the standard professional quality fonts. They have flair. You are exceptionally talented! Thanks for your work. You give posibilities to my students, to work with excelent fonts in their projects. That’s really great. You are very welcome. I am a graphic designer from Bogotá/Colombia. I’m using your fonts in differents proyects and I really love them. I only want to congratulate you for your great work. Thorsten, I’m sorry, but no. That kind of distribution is not allowed for my (free) fonts. I love your types! Please check my portfolio site, because your FONTIN type really works. I love it! I want to work like you and show the for world: Make it simple will the best!!! Big respect for all your fonts, and work! I was wondering if using @font-face CSS property is allowed for Fertigo Pro. Great fonts! I downloaded the free fronts to try out before purchasing the other weights. I like Museo and Diavlo very much. Now, I was wondering if I can use these fonts along with cufon for my website. I thought I should check with you first regarding the legalities. Would like it if you are to answer the questions. Would also give you some additional exposure with a link to your site or blog. we are using your museo-font on our digital christmas calendar. it is a free project by KIOSCO with illustrations from friends for friends. hope you like it! i posted your link on the wer/who-page! Looks great. Thanks for the link! Pingback: Conosciamo Exljbris fonderia Olandese che offre oltre dieci font gratuiti d’autore. I just want to ask you if you were planning to create a Cyrillic font soon? I’m a big fan of your Museo font and all of its variations, but I can’t use them in my designs, because they don’t support the characters. Actually, this is a problem with most of the modern fonts (with allowed @font-face embedding) – I’ve searched a lot and I’ve stumbled on only 2-3 fonts which support Cyrillic characters. There is someone working on a certain Cyrillic extension. I hope I can reveal a little more soon. I’ve been a fan of your work for some time now, and was wondering if you would ever do a monospace font? A code font? I know that most of your work focuses on the little flairs and curves that can’t be reproduced in the small scales in which most code fonts are used (8px – 12px), but it would still be an interesting exercise for you, and a wonderful addition to your bouquet. Museo, I think, is especially well suited for such an endeavor. Nice to meet you, my name is Silky Szeto and I see that you are a contributor at welovetypography.com. Please take a look at my work at http://www.silkyszeto.com, I would be honored to have my work featured on welovetypography.com! As soon as I originally commented I clicked the Notify me whenever new comments are added checkbox and currently each time a comment is added I receive four messages with the identical comment. I read in an old post that you’re not taking donations anymore, and one should consider buying a font weight instead. Having the leisure of PayPal button around really makes it convenient for the consumer to easily show gratitude. Just my two cents. I really like Calluna, however it does not display well using Google Chrome. Is there some code one can add to the custom CSS to make the font more Google-friendly? Thanx! Any ideas on what this font is? Hi, where you have taken this T-shirt? I like it so much! Hi Andrea, that t-shirt was part of the goodies I got at a conference.
2019-04-23T14:39:10Z
https://exljbris.wordpress.com/about/
Many individuals fail to make use of obtainable analytical data to assist them make knowledgeable strategic choices in your video output on YouTube. Understanding how and from the place your guests attain your YouTube movies has an impression on have an effect on your search engine optimisation (web optimization) technique, video title decisions, elevate your profile, and assist set up connections inside your area of interest. This second in a two-part article appears at how YouTube’s free Visitors Supply instruments will assist you quantify your return in your YouTube video funding (ROI) and reveal the effectiveness of your campaigns and site visitors boosting methods. Prompt Movies: after a video is seen by a viewer, YouTube suggests a variety of different movies associated by topic and style which they will go on to look at. It suggests content material which YouTube’s algorithm software program believes may additionally be of curiosity. This device signifies the variety of viewers who watched your movies as a consequence of those options and informs you which of them video drove the viewer to click on onto your materials buy youtube likes . This will present you precious data when it comes to the form of content material your goal viewer can also be watching. Lateral searches outcomes are a really helpful manner to enhance your web optimization rankings. This could encourage you into varied actions – create comparable content material if acceptable, embrace tags to cowl the key phrases which may have been used for the unique video, kind relationships with the instructed video creator (if acceptable), in addition to use the data to strengthen your web optimization hyperlinks outdoors YouTube. YouTube, Channel Web page: this statistical device tells you the variety of occasions viewer reached your video by way of your Channel web page or clicked by from one other person’s Channel web page. Once more, creating relationships with different customers and inspiring subscriptions will increase your publicity inside the YouTube neighborhood. With out query, the extra usually different folks see your work from different peoples Channels, the upper your click-through charge will probably be. YouTube, Featured Video: in case you are a YouTube Companion then your video may nicely seem as a Featured Movies (FV). FVs aren’t adverts or paid placements, and are rotated all through the day to maintain the primary web site’s content material new and revolutionary. Sometimes, movies which have out of the blue change into highly regarded or talked about is perhaps chosen as an FV. Featured Movies are proven as a video thumbnail. This device signifies the variety of click-throughs that your FV thumbnail has generated. Virtually each one in every of us has already recognized Influencer Advertising, it has carried out a exceptional impression on at the moment’s advertising. Customers now belief influencer advertising than every other advertising technique, why? Due to its genuine message to everybody. The previous or conventional advertising does nonetheless work however we cannot deny the truth that a lot of the shoppers have been captivated already by influencer advertising, influencer advertising was managed and run by “Influencers” we see all through the social media, they outstand from any area of interest they’re knowledgeable on. Now, on this article, allow us to discuss in regards to the evolution of influencer advertising. The yr 2007, Fb and Twitter are one of the best locations to showcase your merchandise, even at the moment, it’s nonetheless environment friendly. Earlier than, when you have a high-profile and you bought large followings from these platforms, most firms do interact with these profiles on-line, most product placements you have been capable of see have been natural and weren’t paid. Then, Instagram stole the crown in 2010, scanning and posting your pictures has develop into well-known, you possibly can simply take a photograph, perform a little edit and publish it in your Instagram, then discover the engagement you have been capable of get. There’s a whole lot of promoting that’s taking place on Instagram, each day, up till now. Should you wished to know? There’s a whole lot of guides and items of coaching that can assist you with social media promoting funny instagram captions. 2013 when Fb reigned once more within the advertising world, this platform was one of many marketer’s finest device to attain their targets and goals for his or her enterprise.You may promote and increase your web sites and Fb pages by Fb, that’s a method of driving site visitors and gross sales to your enterprise. Nonetheless, Instagram has extra profit so that you can showcase your product, Fb is extra on written promoting whereas Instagram is extra on photographies and movies, you possibly can present your niched and fervour by the photographs you have been capable of share. And in 2016, the viral contents had scattered throughout the social media platforms like Fb, Instagram, Twitter, and YouTube. These individuals who weren’t a lot well-known not like the celebrities have been capable of get hundreds and even thousands and thousands of followers by creating a fascinating content material, these individuals are what we name “Influencers”, they have been capable of get well-known throughout the social media simply due to their content material that went viral. However it’s not only a content material, it has real options, that’s the reason folks preserve participating with it. For that yr, Influencer advertising has developed and has develop into an increasing number of environment friendly up till now. Lastly, 2017, this yr. Influencer Advertising has been extra real in all facets of its course of, from the contents to the influencers, to the manufacturers, and to the viewers, even the connection between manufacturers, influencers and viewers are real and must be real. Individuals at the moment are counting on suggestions that’s the reason Influencer Advertising retains blooming. It’s no shock for the small influencers develop into progressively fashionable and has been trusted due to their genuine contents and their authenticity themselves. Laptop coaching has turn into a staple in our society at the moment. Most of us do not realize how a lot we actually do depend on computer systems for nearly all the things in our work and even our house life. If computer systems went away tomorrow most of us can be misplaced, as would numerous alternatives. Increasingly persons are collaborating within the advances in pc coaching as a result of it’s simply so handy. Evidently alternatives to coach and study and join via computer systems are throughout us, bringing us right into a future filled with thrilling alternatives. The way forward for pc coaching is large open. It is a very actual possibility for everybody as computer systems now are very inexpensive and the price of coaching on-line may be very little once you examine what you’ll spend to be educated on web site as you’ll have historically. At the moment there are folks coaching for jobs via the computer systems proper now and there’s no indication that this is not going to proceed. In actual fact, this apply will most likely solely get extra excessive tech and extra frequent place than it already is. Actual time coaching and extra graphics primarily based coaching will possible take the place of textual content heavy pc coaching applications at the moment utilized by numerous firms. Along with the folks coaching for his or her jobs via pc applications, there are hundreds of thousands of individuals additionally getting their schooling via computer systems! That is an thrilling addition to most faculties all through the world as a result of it permits college students who couldn’t get to a campus to get the identical schooling as those who had been within the classroom for years computer training center in uttara dhaka. These pc lessons and coaching applications are splendid not solely as a result of they attain lots of people with out anybody having to journey, but additionally as a result of they’re more economical. It is simpler to coach a classroom full of individuals in a single space than fly all of them to a different space that they might obtain via a pc program. These applications are absolutely customizable and will be created for every job or space of experience and cash will nonetheless be saved. The way forward for pc coaching is large open and appears to be fairly shiny. Computer systems are usually not going anyplace as most of us have come to depend upon them in an enormous method. As a result of know-how has come such a great distance, having extremely technical info and coaching offered by way of the pc shouldn’t be a troublesome activity and it’ll solely get simpler and know-how continues to advance. Sooner or later, touring for schooling and even for a job could also be nothing greater than a distant reminiscence since computer systems join us multi functional method or one other. The truth that candidates for jobs in the UK larger schooling sector (UKHEs) are regularly requested to make displays on matters reminiscent of ‘What are your views on, and expertise of, research-led educating in schooling?’, ‘How will your analysis contribute to the supply of the College’s Studying and Educating technique?’ and ‘Describe how your analysis will contribute, over the subsequent Three-5 years, to the worldwide educating profile of this College’, signifies the significance and perennial must hyperlink educating and analysis within the UKHEs. Moreover, these employed are inspired to make their educating ‘extra research-led’. From this perennial want regionally, emerges coined phrases reminiscent of ‘research-led’, ‘analysis knowledgeable’ or ‘analysis enhanced’ educating, which have now turn out to be established jargons within the sector teaching. One College in its studying and educating coverage defines research-led educating as that which introduces college students to the newest findings of their topics and develops college students’ powers of essential perception and mental synthesis. This concept is supported by writers reminiscent of Tushman & O’Reilly (2007), Anthony & Austin (2008,) Prichard (2000), and Paul & Rubin (1984) who see the function of analysis and its reference to educating as enabling data progress and bettering observe and/or educating. being inventive in mild of speedy change and uncertainty (Brew 2010 and Brew, & Boud 1995). So what precisely constitutes research-led educating? One, I exploit private analysis stories as educating materials throughout courses to counterpoint each postgraduate and undergraduate college students’ studying. For instance, my 2001 analysis on the church faculty relationship within the Cayman Islands resulted within the publication of a guide with an analogous title. This guide is required studying for a module I educate. Throughout particular sections of the module, the work is mentioned and college students are inspired to critically take into consideration, consider and problem the claims made. Two, throughout educating, I utilise private experiences and anecdotes/tales associated to my very own analysis to convey factors of curiosity to college students. For instance, I would inform of interviewing a analysis participant and her responses, which betrayed her true perception about an academic concern. Three, along with utilizing private analysis publications and private tales throughout educating, there’s a checklist of required and beneficial readings supplied for all modules I educate. It’s my accountability to analysis the native archive, libraries, journals, and to order textual content books for all these modules. These readings are mentioned throughout classes and used to information and broaden college students’ excited about the topic being studied and to actively interact them in essential examination of literary sources. Reflection and Reflective Educating, A Case research of 4 Seasoned Lecturers within the Cayman Islands (Paperback). Reflective Educating as Self-Directed Skilled Improvement: constructing Sensible or work-related data. The Function of Reflection within the Differentiated Tutorial Course of. Valli’s Typology of Reflection and the evaluation of pre-service academics’ reflective journals. A Reflective Strategy to Educating Practicum Debriefing. Firstly, this entails encouraging college students to have interaction in analysis by making it a required ingredient of modules I develop and educate. By partaking in a small analysis venture, they develop an understanding of the analysis course of; study the literature; move judgement about what counts as proof, and mirror on the proof (Brew 2010 and Brew, & Boud 1995). Secondly, I contain college students in private analysis. For instance, undergraduates had been concerned in looking the literature which contributed to the manufacturing of the next piece: Reflective Educating, Crucial Literacy and the Instructor’s Duties within the Crucial Literacy Classroom (A Confirmatory Investigation). Thirdly, college students are required to supply a last thesis as a course requirement in a division of Training for which I used to be in cost. This additional facilitated their induction in to analysis, for his or her involvement within the precise manufacturing of a top quality analysis thesis ends in a higher appreciation for, and involvement within the analysis course of. Black Sambo was one of many first recipes I realized from my mom once I began my catering enterprise again in 2006. Once I launched it to my pals, everybody have been fairly amazed with how fantastic it tasted. At present, it is likely one of the most ordered desert by my common clients. Black Sambo is a two layered gelatin fabricated from creamy milk and Chocolate. As I used to be shopping within the Web, I got here throughout a number of nearly the identical recipes that made me wish to share my very own. I’ve invested in a number of plastic molders round in form that makes the Sambo a lot prettier when offered. Dissolve gelatin in Boiling water, let it cool and pressure. Mix it along with the milk combination. Chill within the fridge. Mix sugar and chocolate powder along with the evaporated milk. Combine effectively till easy Buy Milk Online. Dissolve gelatin in water then mix it with the milk combination. As soon as the primary layer is nearly agency, put within the second layer slowly; let it chill. Observe: It’s best to not wait too lengthy to place within the second layer in order that each layers will stick to one another whenever you serve it. This recipe is really easy to do-everyone ought to attempt it! You may serve it topped with Hershey Chocolate syrup or shredded chocolate however others want it as it’s. That is one quite common dialog we regularly hear round us. Now let’s undergo one other story. James has an iPhone, Scarlet owns a Nexus One whereas Adam makes use of a BlackBerry communicator. In the future, all of them go one after the other to Chris asking for a cellphone charger. Chris makes use of a Nokia Communicator, however nonetheless, he takes the units from all three of them, and prices all of the three on the similar time. You’d assume it as an actual fiction till you might know that Chris additionally owns a PowerMat. Powermat is the brand new marvel within the Cell Telephone Equipment Trade and has revolutionized the ideas of cellphone charging. A Wireless Charging machine was solely a dream earlier than the introduction of Powermat and with its profoundly superior expertise, powermat has taken the wireless charging to a complete new horizon. Powermat is designed to work in virtually any surroundings with out issue of utilization qi charger B07GS5YY89. The Powermat charging units principally consists of two main parts; the varied kinds of cellphone circumstances & connector often called Powermat receivers, and a Energy Mat Wireless Charging Mat. A complete set of quite a few circumstances and connectors can be found with the unique Powermat Chargers, (with customized enhancements individually obtainable) enabling you to cost virtually any and each sort of communication machine. If we speak concerning the charging characteristic, Powermat chargers are the simplest to make use of chargers. You possibly can cost any of your communication units concurrently in simply two straightforward steps. 토토사이트 would a catastrophic hurricane that affected an entire region or a localized disruptive event like a fire have on the operation of your business? Could you survive that kind of interruption or loss? As the dependence on on-line data has grown in virtually every type of business, so has the risk that loss of their data could disrupt the operation of the business and even result in its complete failure. In response to these threats, there has been an evolution in the approaches used to mitigate these risks as the volume of on-line data has continued to grow. Originally, the concept of Disaster Recovery (DR) emerged as a mitigation strategy that focused on the recovery of critical data after a disruptive event by giving the business the ability to restore disrupted IT operations. With an excessive amount of Sony Alpha A100 analysis that’s available, we now have truly decided to create our very personal analysis too. Nonetheless, this testimonial is a distinction of the Olympus Evolt E-500 to the Sony A100 DSLR digital camera. Nicely, these 2 DSLR digital cameras are amongst your preferrred choices if you’re perplexed what to pick for. Based on the factors of plenty of DSLR people, we now have truly found that the sensing unit and likewise picture prime quality are each essential factors you want to take into accounts relating to the DSLR digital cameras. Now we have truly checked out some Sony A100 analysis in addition to we now have truly contrasted it to some testimonials of Olympus Evolt E-410. In the long term, we now have truly realized that the Alpha A100 DSLR digital camera created a significantly better picture of top of the range. On the varied different, sensing models within the Evolt E-410 is quite a bit much better. As a matter of truth, these 2 DSLR digital cameras are fairly numerous from one another in addition to the easiest one will actually depend on your very personal criterion article source. In terms of the Sony, as what we now have truly discovered in an excessive amount of Alpha A100 testimonial that it provides a significantly better picture high-quality distinction to the Olympus Evolt E-500, this makes the issue so that you can have this. It holds true; the picture is generally considered as one of the crucial important think about choosing DSLR video cameras, significantly for these modern digital photographers. Due to this, is that is likewise a significant level to you, you want to take into accounts the numerous distinction in between the Sony A100 and likewise Evolt E-410 DSLR cams, which is the image stabilizing. So You Need To Begin A Santa Letter Enterprise – Get Began Simply! Good Ole’ St. Nick positive does have loads on his plate throughout the Vacation season. Now could be the right time to start out earning profits, all whereas giving the Huge Man a serving to hand, by writing letters to youngsters of behalf of Santa Claus. santa letters to remain forward of the sport, you may want to start out your Santa letter enterprise by not less than the tip of October. Round this time you ought to be getting ready your letter templates. It would be best to have four or 5 totally different letter templates out there in case of a number of orders to the identical household. You do not need siblings getting the identical letter from Santa, that might wreck the spirit! Now that your letter templates are full, it’s time to factor stationary. Yow will discover lovely Christmas and Vacation themed papers in most office and craft shops nowadays. If nothing strikes your fancy, you’ll be able to at all times make your gained utilizing the background operate of most phrase processing applications. Remember to be sure that your stationary and envelopes are vibrant, cheery and alluring. You possibly can at all times spruce them up just a little by including stickers, glitter glue and such. The subsequent factor you’ll need to do is resolve if you’re going to embody extras together with your letters. Under is a small instance of issues you can embody together with your letters that value a minimal quantity however up the “cute issue” considerably. After all, the chances listed below are limitless. You can also make these as easy or elaborate as you prefer to. Lastly, you’ll need to promote your enterprise. Creating flyers and inserting them strategically round city at child pleasant locations equivalent to daycare facilities, preschools, quick meals eating places and/or grocery and department shops is an effective way to promote for affordable. You’ll in all probability discover that when you get your enterprise began, your inventive juices will begin flowing and you’ll put your personal private stamp in your Santa Enterprise success story! In India, essentially the most primitive variations of leisure have been music, dance, drama, portray, looking, impersonation, puppetry, and literature. Nevertheless, occasions modified and slowly issues took a pointy flip as modern-day males began to deal with cinema, tv, and theatre as the key sources of leisure. The age outdated leisure varieties got here to be termed as advantageous arts and these turned uncommon and occasional. With movies, tv serials and ebook studying gaining reputation as a significant part of Indian leisure, individuals’s tastes additionally modified. In the present day India is crammed with cinema halls, multiplexes, glorified ebook shops, and cable TV connections. Be it a vacation or simply one other day individuals flock to those locations to get entertained and that’s what has given a lot reputation to movie stars, tv actors and authors. Writers like Khushwant Singh, Amitava Ghosh, Chetan Bhagat, Arundhati Ray and Jhumpa Lahiri are weaving such fascinating reads, that leisure in India is getting an entire new dimension. Some books are being a lot appreciated by the readers that movie makers are contemplating making movies primarily based on these books. A current movie, three Idiots, is sort of influenced by Chetan Bhagat’s ebook 5 Level Somebody. A number of TV serials have additionally taken queue from greatest sellers. Indian leisure has reached some extent the place all these leisure varieties are discovering peace and pleasure in co-existence. This manner the leisure trade is rising, growing and producing high quality work. The thoughts doesn’t respect slapstick comedy and senseless jokes on a regular basis. For such severe occasions, the leisure trade of India is prepared. Your eyebrows body your whole face, which is why their form and measurement is integral to the way in which you look. If you know the way to correctly make your eyebrows, you’d be shaping them in a manner that enhances your whole face, making your options extra outlined and making you look extra hanging general. Eyebrow filling is a neat trick to know when you’re doing eyebrow make-up. Merely brush your eyebrows downwards with a dry mascara wand, or an eyebrow shaper if in case you have entry to it. Intensify the arch through the use of an eyebrow pencil to sketch in a line by the higher edges of your eyebrow. Then comb each of your eyebrows up and out. When you have over tweezed your brows, simply use your eyebrow shaper brush to brush all of the hair to the route of the expansion and mud any patches that may nonetheless be seen with powder. Don’t add to the highest or the underside, and there you’ve gotten it, your completely filed eyebrows. Use your eyebrow shaper to brush the brows upwards. Then trim any extreme hair rising on the high of your pure arch. Just be sure you don’t take an excessive amount of out of the ends or you’ll depart a visual bald spot in your brows. Fill in any areas which have much less hair with a pointy forehead pencil. Use fast, deft strokes to attract within the hair. In case your brows are very skinny, use forehead powder to outline them and to provide them a extra pure look. Use the forehead brush to comb the powder up and outwards over your eyebrows. If that is the primary time you’re working along with your brows, attempt getting your fingers on a tinted forehead gel which is the right eyebrow make-up for preserving brows in place. Coat the gel upward and outwards and at last wipe off any extra gel and depart it to set. When it will get set, you can be left with a pair of attractive, completely outlined eyebrows. The multilevel marketing trade has change into very irritating. Its change into very arduous to sponsor individuals into your MLM enterprise and that’s the reason there are lots of people logging on in quest of MLM coaching. MLM coaching has change into arduous to seek out lately and with out it, your not going to get very far on this trade. Most MLM corporations don’t present the required coaching and instruments wanted to construct a profitable crew. That’s the reason MLM coaching is so essential. Most individuals be part of MLM corporations pondering they are going to strike it wealthy within the first couple of months. They quickly study that is not the way it works and due to their corporations lack of coaching they only give up. After constructing a couple of profitable groups throughout a number of MLM corporations I grew to become very accustomed to precisely what is required for the common Joe to construct a profitable MLM enterprise from house. Most corporations educate their reps old-fashioned, conventional Community Advertising prospecting methods. The reality is, these methods simply do not work anymore. Not as they used to anyway. Conventional or old-fashioned Community Advertising is absolutely outdated and corporations actually lack updated coaching. Most corporations educate their reps to undergo their heat market, to sponsor their family and friends. Everyone knows that everybody hates to pitch their family and friends about their MLM corporations. That is precisely why it’s worthwhile to study the true MLM secrets and techniques the highest earners use to dominate the MLM trade. All the highest earners have been taught and educated by different high Networkers. Most individuals soar from one alternative to the subsequent in quest of some magical compensation plan that permits you to mechanically become profitable with none human intervention. Everyone knows such compensation doesn’t exist. If you wish to construct a profitable MLM enterprise, it’s worthwhile to study from the most effective MLM coaching sharenode reviews. The one technique to make a big revenue on this trade is by studying from the highest earners, selling one firm and being very constant. With a purpose to actually succeed, it’s worthwhile to comply with the highest earners. All the highest earners share a couple of issues in widespread. All of them promote cheap academic merchandise upfront to their leads. All of them promote themselves, they by no means promote their corporations they usually all maintain free coaching periods. The true reality is, it’s worthwhile to cease selling your MLM firm and begin selling free coaching, alpha management and options.
2019-04-25T05:58:24Z
http://internetjunk.org/
Transshipment at sea, the offloading of catch from a fishing vessel to a refrigerated vessel far from port, can obscure the actual source of the catch, complicating sustainable fisheries management, and may allow illegally caught fish to enter the legitimate seafood market. Transshipment activities often occur in regions of unclear jurisdiction where policymakers or enforcement agencies may be slow to act against a challenge they cannot see. To address this limitation, we processed 32 billion Automatic Identification System (AIS) messages from ocean-going vessels from 2012 to the end of 2017 and identified and tracked 694 cargo vessels capable of transshipping at sea and transporting fish (referred to as transshipment vessels). We mapped 46,570 instances where these vessels loitered at sea long enough to receive a transshipment and 10,233 instances where we see a fishing vessel near a loitering transshipment vessel long enough to engage in transshipment. We found transshipment behaviors associated with regions and flag states exhibiting limited oversight; roughly 47% of the events occur on the high seas and 42% involve vessels flying flags of convenience. Transshipment behavior in the high seas is relatively common, with vessels responsible for 40% of the fishing in the high seas having at least one encounter with a transshipment vessel in this time period. Our analysis reveals that addressing the sustainability and human rights challenges (slavery, trafficking, bonded labor) associated with transshipment at sea will require a global perspective and transnational cooperation. A transshipment occurs when two vessels meet to exchange cargo, supplies, or personnel, often between vessels at sea and far from a home port. By allowing fishing vessels to offload catch at sea and remain on the fishing grounds, transshipment consolidates fuel costs within a fleet and moves product to market more efficiently. However, transshipment also introduces concerns over traceability and transparency in the seafood industry. The Food and Agriculture Organization (FAO) of the United Nations estimates over 15% of annual global catch is illegal, unreported, or unregulated (IUU) (Food Agriculture Organization of the United Nations, 2016). Transshipment has also been linked to human trafficking and can allow captains to keep their crew at sea indefinitely, resulting in de facto slavery (McDowell et al., 2015). Through transshipment, players in the industry can access reputable markets by mixing illegally caught fish with legal product during transshipments (Environmental Justice Foundation, 2013). The practice obscures supply chains and prevents an accurate measurement of the amount of marine life being taken from the sea, thus limiting our ability to fish the ocean sustainably. Policies on transshipment vary by Exclusive Economic Zone (EEZ), flag state, and region (McCoy, 2012), making it difficult to characterize global and regional patterns of transshipment. Even in regions that have adopted regulations on transshipment activities, these regulations may be relatively opaque. For example, in the Western and Central Pacific Fisheries Commission (WCPFC) convention area, which has implemented relatively robust management plans (Ewell et al., 2017), the measures regarding transshipment simultaneously restrict transshipment and provide opportunities to circumvent the restrictions. In this region, reporting is the responsibility of each vessel's flag state, which may be a flag of convenience exercising little oversight (WCPFC, 2009). In comparison, The Forum Fisheries Agency (FFA) and Convention for the Conservation of Antarctic Marine Living Resources (CCAMLR) have a comprehensive monitoring scheme, independent verification of catch and transshipment, capacity to monitor and enforce conservation measures, and the opportunity to investigate transnational criminal activities (CCAMLR, 2011, 2016; FFA, 2016). The South East Atlantic Fisheries Organization (SEAFO) has gone even further by prohibiting all transshipment at sea by convention members operating within the convention area (SEAFO, 2017). However, even in the regions that have adopted transshipment regulations, data on transshipments is tightly held and often viewed as sensitive business information. In other regions, transshipments appear to occur with little to no independent observer coverage, verification of transshipped catch, or monitoring of potential transnational criminal activities. In both West African waters (INTERPOL, 2014; Daniels et al., 2016) and the squid fishery in the northwest Indian Ocean (Greenpeace, 2016; Stop Illegal Fishing et al., 2017), weak regulation and enforcement raise severe concerns regarding transshipment given its links to IUU fishing and criminal activities (UNDOC, 2016). While regulations and policies may not provide a clear understanding of transshipment practices, new vessel tracking technologies can reveal the actual behavior of transshipment vessels. The Automatic Identification System (AIS), originally developed as a ship-to-ship transmission to prevent at-sea collisions, transmits a vessel's position every 2 s to 3 min via VHF radio (International Telecommunication Union (ITU), 2014). The International Maritime Organization (IMO) stipulates that all vessels larger than 300 gross tons on international voyages carry and operate an AIS device (IMO, 2002). For fishing vessels, this generally means that vessels over 37 m are required to carry AIS (Kroodsma et al., 2018). Some jurisdictions such as the EU and United States have enacted stricter requirements, with vessels over 15 and 19 m, respectively being required to carry AIS (McCauley et al., 2016). AIS messages can be received by satellites or a network of terrestrial antennas, which in turn allow for global tracking of vessels at sea. There are limitations to AIS, including the inability of satellites to resolve AIS messages in crowded regions of the ocean and the ability for operators to turn off the AIS device or broadcast incorrect identity information (Daniels et al., 2016; Kroodsma et al., 2018). In general, larger, less maneuverable vessels such as cargo vessels will be less prone to turning off AIS as they may be at greater risk of collision, a fact that may influence the consistency with which vessels are observed via AIS. Despite these limitations AIS provides an unprecedented view of fishing vessels and fishing activity (Kroodsma et al., 2018) and as an open-source tool represents a valuable means of promoting fisheries transparency. In this paper, we present two methodologies for tracking transshipment behavior. The first detects where fishing vessels encounter transshipment cargo vessels at sea (hereafter referred to as “transshipment vessels”), with both vessels consistently broadcasting their positions via AIS. The second methodology identifies every occurrence where a transshipment vessel loitered at sea long enough to receive a transshipment. Many fishing vessels may be too small to broadcast AIS, or they may have intentionally disabled their devices, resulting in instances where only the transshipment vessel is visible in AIS (INTERPOL, 2014). These loitering events provide instances where transshipment could have occurred. Although there are significant limitations in tracking vessels with AIS, these data provide a valuable global, publicly accessible view of the scale of transshipment behavior, its regional prevalence, and the primary participants. We discuss the implications of this new, global understanding of transshipment and how it can provide the first steps toward establishing a coherent and transparent approach to measuring and managing this activity. All positional and identity AIS messages available from two AIS providers (Orbcomm, Spire) for the period from 2012 to 2017 were compiled and processed as described in Kroodsma et al. (2018). Briefly, raw NMEA encoded AIS messages, more than 40 million per day, are parsed using the Python library libais (Schwehr, 2015). To generate vessel track segments from positional messages, for each MMSI (the unique identifier for vessels in AIS) the distance and time between consecutive points was calculated. If the distance/time combination implied an unrealistic speed between positions, or the time between points was >24 h, a new “segment,” was generated. Each segment represented a physically possible track of a vessel with no gaps in time greater than 24 h. Such segment analysis eliminated incorrect positions, which result from noise in the GPS or incomplete transmission of AIS. All analyses used a fishing vessel database developed following the methods of Kroodsma et al. (2018). Briefly, the database includes vessels transmitting via AIS and identified as fishing vessel in one of two ways: (1) vessels listed as fishing vessels on vessel registries such as the European Union's vessel registry or the Consolidated List of Authorized Vessels; and (2) Vessels were identified as fishing vessels based on analyzing their movement patterns using a convolutional neural network (network described in Kroodsma et al., 2018). A database of refrigerated cargo vessels capable of receiving catch was compiled using three complementary methods. First, vessels classified as “refrigerated cargo” vessels, “fish carriers,” and “fish tender” vessels–vessels we collectively refer to as “transshipment vessels”–were identified using lists from the International Telecommunications Union and major Regional Fisheries Management Organizations (RFMOs) (see Table S1). Second, if we found a vessel participated in multiple encounters with fishing vessels, we conducted a web search and reviewed RFMO registries using information from the vessel's AIS to determine if the vessel was a transshipment vessel. Finally, we used a convolutional neural network, which predicts vessel class from vessel movement patterns (network described in Kroodsma et al., 2018), to identify possible transshipment vessels. Vessels that were identified as likely transshipment vessels by the neural network were manually validated through web searches and RFMO registries. Vessel identities were further corroborated via the IMO as nearly all vessels could be matched to an IMO registry number. Transshipment behaviors were identified using two complementary, rules-based methods which sought to balance the detection of events given the limitations of the AIS system discussed above. Possible transshipments were classified as either “two-vessel encounter” or “single-vessel loitering” events. Encounters were identified from AIS data as locations where a fishing vessel and a transshipment vessel were continuously within 500 m for at least 2 h and traveling at < 2 knots, while at least 10 km from a coastal anchorage. These parameters balance the need to detect vessel pairs in close proximity for extended periods of time while recognizing incomplete satellite coverage and inconsistent AIS transmission rates may limit our ability to identify long periods in which vessels are in immediate contact. We assessed the robustness of these parameter choices through a sensitivity analysis (Figure S3). Our analysis excludes encounters that occur in port or commonly used anchorages, because (1) transshipment at port is generally better regulated than at sea (McCoy, 2012) and thus beyond the scope of this study, and (2) it would be challenging to determine if vessels were meeting at a commonly used anchorage, or if they were both simply using the same anchorage. Anchorages were identified by dividing the world into a grid with cells roughly 0.5 degrees on a side, and identifying every cell where at least 20 unique vessels with AIS (fishing and non-fishing) remained stationary for at least 12 h over the study period (2012–2017). The identification of anchorage locations was restricted to be no more than 10 km inland from the coastline, eliminating false positives which might result from slow moving vessels in inland waterways. This exercise produced a global database of 102,974 anchorages, all of which are available on globalfishingwatch.io. Loitering events were identified as locations where a transshipment vessel traveled at speeds of < 2 knots for at least 8 h, while at least 20 nautical miles from shore (Figure S4). To avoid false-positives that arise from vessels waiting in crowded nearshore or port locations (McCoy, 2012), loitering events were restricted to offshore regions using a distance from shore limit, as this was considered more restrictive than a distance from anchorage filter. Loitering events by their nature are more speculative (vessels may loiter for a number of reasons, especially nearshore) and consequently we only considered events where the vessels were at sea. To determine the extent to which encounters and loitering events are a consequence of rules we used to define them, we performed sensitivity analyses for each event type. For encounters, we created 48 encounters datasets by using combinations of three parameters, maximum encounter speed (1, 2, 4, 6 knots), minimum encounter duration (2, 6, 10, 12 h) and maximum intervessel distance (250, 500, 1,000 m). For each dataset we calculated the total number of hours of encounters detected. A similar analysis was performed for the loitering transshipment vessel events. We generated 30 datasets using combinations of two parameters, maximum loitering speed (1, 2, 3, 4, 5, 6 knots) and minimum loitering duration (2, 4, 6, 8, 10 h) and total loitering hours was used as the response metric to assess sensitivity. For example, in comparing two datasets, one created using a maximum encounter speed of 2 knots and a second created with a maximum encounter speed of 1 knot, we divided the percentage change in parameter values (50% change) by the percent change in response metric (difference in the total hours of encounters between these two datasets), to calculate a response ratio. This ratio provided a measure of sensitivity with values near 0 suggesting the response (encounter or loitering hours) was less sensitive to particular parameter change and values approaching 1 (or −1) suggesting complete sensitivity. Ratios greater than 1 (or < -1) suggest the response is disproportionately sensitive to a given parameter change. To estimate the importance of transshipment in high seas fishing (i.e., fishing activity occurring outside any nation's 200 nautical mile Exclusive Economic Zone), we identified all fishing vessels that fished for at least 24 h on the high seas in the time period of 2012–2017 using the Global Fishing Watch database, and then compared this number to the number of vessels that transshipped and fished in the high seas. The database of fishing vessels contained 73,009 Marine Mobile Service Identity (MMSI) numbers (the unique identifier assigned to an AIS transceiver). For details on its creation see Kroodsma et al. (2018). Unlike fishing vessels, it is relatively common for transshipment vessels to swap flag registration over time, and each time the vessel changes flag registration it acquires a new MMSI. This complicates attempts to count vessels as the same vessel can possess several MMSI-based identities over time. Although a global, unique vessel identifier does not exist, for large vessels, an IMO number can often be used as a unique hull identifier, and all but 20 vessels in our transshipment vessel dataset possess IMO numbers. Using IMO to define unique vessels, we identified 694 unique transshipment vessels, the majority of which were specialized reefers that have refrigerated holds capable of receiving catch at sea. Of the unique transshipment vessels, 97% were larger than 300 gross tonnage, required to carry AIS on international voyages, and expected to have good coverage in our dataset. In fact, we estimate that transshipment vessels in our dataset have gaps in AIS transmission of longer than 24 h only about 2 percent of their time while at sea, suggesting that their AIS is almost always broadcasting. From 2012 to 2017, these 694 vessels had 1007 distinct MMSI numbers because of changes in vessel registration and flag state. The first three digits of an MMSI number correspond to the vessel's flag state. Using MMSI we found just under half (43%) of the transshipment vessels were operating under flags of convenience (FoC, as defined by ITF, http://www.itfglobal.org/en/transport-sectors/seafarers/in-focus/flags-of-convenience-campaign/), with 33% of the remaining transshipment vessels flying Russian flags (Figure 1A). Figure 1. Flag state patterns. (A) top flag states transshipment vessels, identifying nearly 43% flying Flags of Convenience (FoC), (B) top flag states of fishing vessels involved in encounters, illustrating that nearly 45% of these events involved Russian fishing vessels, (C) Top flag states of cargo vessels involved in loitering events, illustrating the overrepresentation of Russian vessels (~19% of the transshipment vessels involved in ~27% of these events) and the prevalence of vessels flying FoCs. This list likely includes the majority of the world's specialized transshipment vessels. Given the size of these vessels, and the fact that they often conduct international voyages, most transshipment vessels are required to carry AIS. Ninety-seven percent of the transshipment vessels in our dataset were larger than 300 gross tonnage (GT) and thus are mandated to carry AIS when on international voyages. Our total number (694 unique vessels) compares favorably with an estimate of refrigerated cargo vessels reported to be active in 2010 by the CIA World Fact Book (882 vessels, Central Intelligence Agency, 2013). Similarly, a search of the International Maritime Organization website for “Refrigerated Cargo Vessel” gives about 1,000 vessels that have been active since 1981, and many of these vessels have been decommissioned since then. Our dataset is likely missing smaller transshipment vessels that operate exclusively near shore (such as some fish tenders or smaller fish carriers), but these are likely to be vessels with limited capacity or vessels that do not make international voyages. Most likely, the vast majority of large, internationally traveling transshipment vessels are on our list. One notable exception is Japanese transshipment vessels. Of the 80 Japanese-flagged fish carriers listed as active on the WCPFC registry (WCPFC, 2018), only 26 appear in our data. We identified 10,233 encounters between fishing vessels (1,869 unique MMSI) and transshipment vessels (501 unique MMSI) from 2012 to 2017, with nearly half of the events (44.7%) involving Russian-flagged fishing vessels (Figure 1B). Encounters involving fishing vessels flagged to China, USA, and Taiwan were next most common. Between 2012 and 2017 we observed roughly four times more loitering transshipment vessel events (46,570) than encounters, involving 824 unique transshipment vessel MMSI. These events predominantly featured transshipment vessels flying flags of convenience, with Russian-flagged vessels representing the most common non-FoC (Figure 1C). The global footprint of encounters and loitering events is extensive (Figure 2). Over half of these events occur in the high seas beyond national jurisdictions (51.8%, Figure 3). Within the high seas, transshipment behaviors are common in the equatorial regions of the Pacific and Atlantic Oceans and in the southern Indian Ocean. There are also clear regional patterns of transshipment behaviors in international waters near the EEZs of Peru, Argentina, and Japan/Russia, regions known for large squid fleets. In international waters around the African continent, transshipment clusters at the edge of the East African EEZs. For events that occur within national jurisdictions, the majority (51.4%) occur within the Russian EEZ, with transshipment behavior also common within the EEZs of African nations (Figure 3). Figure 2. Global patterns of transshipment behavior illustrating encounters (red) and loitering events (black). Highest densities appear in the Russian Far East and the Barents Sea, outside the Exclusive Economic Zones (EEZs) of South America, within the EEZs of African nations, and across the Equatorial Pacific. Figure 3. Geographic distribution of loitering events and encounters (combined). Roughly 52% of the events occur in the high seas. *Note that Russia is presented separately. While Russia appears to play a disproportionate role in our dataset, 96% of the encounters involving a Russian-flagged fishing vessel were with a Russian-flagged transshipment vessel (Figure 4). Ninety-eight percent of the events involving a Russian fishing vessel occurred within the Russian EEZ. In fact, in 90% of the events within the EEZ, both vessels were Russian flagged. A similar pattern is seen for USA-flagged fishing vessels, which met USA-flagged transshipment vessels in 83% of encounters. In contrast, China, Taiwan, South Korea and Japan (the next most common fishing vessel flag states involved in encounters) associated with transshipment vessels flying an array of flags including several FoCs (Panama, Liberia, Vanuatu). For example, Panamanian-flagged transshipment vessels account for 79, 59, 40, and 81% of the encounters involving fishing vessels from China, Taiwan, South Korea and Japan, respectively. Figure 4. Flag pairings for fishing and transshipment vessels involved in encounters, for the fishing vessel flags with greatest number of encounters. Russian- and US-flagged fishing vessels predominantly associate with common-flagged transshipment vessels, whereas Asian-flagged fishing vessels associate with diversely flagged transshipment vessels. Values identify number of events involving each flag pair. Between 2012 and 2017, 6,003 vessels fished for more than 24 h on the high seas, and 20% of those vessels (1,181) had at least one encounter with a transshipment vessel in the high seas at some point. This cohort of vessels accounted for a disproportionate share (43%) of the high seas fishing activity during that time period. It is unlikely this entire share of the high seas catch was transshipped, but it does show that a major fraction of fishing on the high seas is by vessels that meet up with transshipment vessels. To assess the influence of the parameters used to define loitering events and encounters we compared the percent change in total hours of loitering or encounters with a percent change in each parameter. We found that encounters were most sensitive to changes in minimum encounter duration from 6 to 10 and 10 to 12 h (Table 1, Figure S1), with 30.2 and 15.4% decreases in total encounter hours and response ratios of −0.46 and −0.77, respectively. Encounters and loitering were both sensitive to decreases in the maximum encounters speed from 2 to 1 knots, with a response ratio of 0.33 for encounters (Table 1) and 0.84 for loitering (Table 2, Figure S2). Both total encounters and total loitering hours were considerably less sensitive to other parameter changes (all response ratios < 0.3). This suggests that if transshipments occur at median speeds greater than 2 knots, our results are likely conservative. If transshipment events only occur at median speeds < 1 knot, (and do not occur at median speeds between 1 and 2 knots) we are likely overestimating the number of events and potentially by 15–20%. Given that our encounters algorithm incorporates short periods of maneuvering before and after the vessels are in close proximity, it would not be unusual to assign an encounter a median speed between 1 and 2 knots, even while the vessels traveled more slowly during the actual exchange of goods. Table 1. Sensitivity analysis for encounters, identifying the sensitivity of total encounter hours to changes in three parameters (minimum encounter duration, maximum encounter speed, and maximum intervessel distance) used to detect encounters. Table 2. Sensitivity analysis of loitering events, identifying the sensitivity of total loitering hours to changes in two parameters (maximum loitering speed and minimum loitering duration) used to detect loitering. Transshipment of catch at sea obscures supply chains, complicates sustainable management practices, and provides IUU operators access to reputable markets (Food Agriculture Organization of the United Nations, 2002). Transshipment also enables human rights abuses such as slavery, trafficking, bonded labor, emotional, and physical abuse (Environmental Justice Foundation, 2015; Greenpeace, 2016). Despite growing concerns regarding the sustainability of transshipment (Ewell et al., 2017), the fact that the activity typically occurs far from port, with varying degrees of observer coverage, and limited transparency from fisheries management agencies has prevented a coherent conversation. Here we utilize AIS vessel position data to provide a global view of potential transshipment, identifying the scale at which at-sea transshipment may be occurring, the primary participants, and the broad spatial patterns. While AIS data provide a valuable transparency tool for identifying high seas transshipment activity, there are several important limitations. AIS use varies globally and among fleets, which may skew the fraction of encounters observed by fleet. For example, the WCPFC Record of Fishing Vessels lists 80 Japanese fish carriers; however, we have only identified MMSI for 26 of these vessels and only 5 engage in encounters. Our database of encounters likely underestimates actual transshipments both because of limits in AIS coverage as well as that fact that our transshipment vessel database is incomplete. On the other hand, the loitering events likely overestimate transshipments, as refrigerated cargo vessels may loiter at sea while waiting for their next job or to minimize time spent within dangerous regions. However, these events may bracket the true set of actual transshipments and in those regions where they exhibit spatial agreement bolster one another. One major shortcoming is our inability to compare the loitering events and encounters events to accurate vessel-specific information about transshipment activity. Regional databases are not publically available, and the few that we obtained were either of low quality or incomplete in ways that prevented us from using them to train or test models. As a result, we are limited to reporting the number of events we see from our rules-based heuristics. Fortunately, we find that our results are relatively robust and change only modestly if we change the parameters (Tables 1, 2). One of the most striking features of our analysis is the high density of transshipment behavior in the Russian Far East, the Sea of Okhotsk, and the Russian Barents Sea, which are known for their pollock and crab fisheries. Much of this activity likely represents standard modes of operation driven in part by the vast distances between the fishing grounds and the primary ports of Vladivostok and Murmansk. Nearly all (96%) of the events we identified involved Russian-flagged fishing vessels meeting Russian-flagged transshipment vessels, 90% of these meetings occurred within the Russian EEZ, and 46% involved Marine Stewardship Council (MSC) certified pollock fishing vessels within the Sea of Okhotsk (MSC certification F-ACO-0058/FCI-F-0040). Thus, while we are not able to determine legality, a large proportion of the events in this region are under Russian jurisdiction and some level of MSC scrutiny. For example, Russian regulations require that all vessels receiving catch within the Russian EEZ must report to a Russian port for customs declarations before traveling on to a foreign port. However, concern has been expressed that this requirement is not being met (Pramod et al., 2014). While the possibility remains, we found that following encounters within the Russian EEZ, transshipment vessels consistently entered a Russian port prior to continuing on to a foreign port, such as Busan, Korea. A second striking feature of our analysis is the global scale of transshipment activities, which occur in all ocean basins and involve vessels responsible for 43% of the fishing within the high seas. While transshipment activity occurs at a global in scale, nearly 47% of encounters occur on the high seas, and a similar proportion are by transshipment vessels flying flags of convenience. Such findings raise transparency concerns as a large proportion of transshipments occur within waters beyond national jurisdiction, or are undertaken by vessels registered to countries with lax oversight and limited connection to the vessel. Transshipment on the high seas appears largely associated with longline fisheries targeting migratory species, such as tunas, billfishes and sharks. Such fisheries are known for their utilization of transshipment, as it moves the catch to market quickly, while maximizing time on the fishing grounds (McCoy, 2012; Greenpeace, 2013). While transshipment activity involving highly migratory species is regulated by the relevant RFMO, there are transparency concerns as these events take place far from port and with varying levels of observer coverage, where even strict regulations may be difficult to enforce. With this in mind, the transshipment behaviors we've identified in the southern Atlantic are of interest as they occur within the SEAFO convention area, an RFMO that banned at-sea transshipments in 2006 (Ewell et al., 2017; SEAFO, 2017). While we cannot be certain if these encounters and loitering events represent the transshipment of catch, they raise the possibility of unregulated transshipment occurring in regions where transshipment is purportedly regulated. Within the high seas, transshipment of catch that is not under specific RFMO jurisdiction also represents a critical loophole. Also readily apparent in our data is a cluster of transshipment activity in the northwest Indian Ocean, a region recently reported to host a growing, unregulated fleet of Chinese squid vessels, a fleet whose fishing is made possible by transshipment with reefers flying FoCs (Stop Illegal Fishing et al., 2017). Another pattern of transshipment activity is its regional prevalence just beyond EEZ boundaries, such as that seen near Peru and Argentina. In both cases the transshipment activity occurs within the high seas in the vicinity of productive squid fisheries. In the case of Peru the squid vessels are regulated by the South Pacific Regional Fisheries Management Organization (SPRFMO), but no such organization exists to manage the the high seas off Argentina. The congregation of transshipment activity near the EEZ boundary raises two transparency concerns. The first is simply that this activity is once again occurring within a vast region, which is potentially less well regulated than the neighboring national waters. The second concern is the proximity of the transshipment activity to the EEZ boundary. This could enable a “dark fleet” of vessels that are not broadcasting AIS to fish without authorization within the EEZ and then transship that catch to vessels outside the EEZ, thereby avoiding the need to make port calls with illegally caught fish. By comparison, encounters and loitering events off western Africa occur well within the national waters, quite close to the coast. For much of western Africa the current regulatory and enforcement infrastructure is ineffective, with an estimated loss of 2.3 billion USD annually to IUU fishing and recovery of only 13 million USD through Monitoring, Control and Surveillance (Doumbouya et al., 2017). Consequently, transshipment, which maximizes profit and resource exploitation in the region, may be supporting fishing that reduces sustainability, harms local livelihoods, threatens food security and exposes communities to broader criminal activities (Environmental Justice Foundation, 2013; INTERPOL, 2014). Our results demonstrate that inasmuch as the encounters and loitering events represent transshipments, they are most prevalent in regions with less-effective fisheries management and enforcement (Melnychuk et al., 2016). While incomplete, our data illustrate the prevalence and transnational nature of transshipment. We show that transshipment behavior clusters along EEZ boundaries in the high seas, is common in regions of challenging or limited regulation and oversight, and often involves vessels registered to flags of convenience. Given the potential association of transshipment with IUU fishing and other illicit exchanges (Phelps Bondaroff et al., 2015; Haenlein, 2017), these patterns of transshipment raise questions that could be addressed by increased transparency and information from RFMOs and other governing bodies. We are publishing our identified loitering events and encounters, along with vessel details, on http://globalfishingwatch.org/datasets-and-code/, to assist with comparing these data to official records. While more data and transparency are needed fully reveal the global patterns of transshipment, our data highlight the transnational challenge of transshipment at sea and make clear that effectively addressing the accompanying sustainability and human rights challenges of slavery, trafficking, and bonded labor will require a global perspective and international cooperation. NM, AR, and DK contributed to conception and design of the study and JA provided critical intellectual content. TH, AR, and NM developed the transshipment detection algorithms, TH implemented the algorithms as applied to AIS. NM, AR, and DK wrote sections of the manuscript. All authors contributed to manuscript revision, read and approved the submitted version. We gratefully acknowledge the Walton Family Foundation for direct support of our transshipment research. We additionally thank Adessium Foundation, Bloomberg Philanthropies, Leonardo DiCaprio Foundation, Marisla Foundation, The Waterloo Foundation, and Wyss Foundation for supporting Global Fishing Watch which provided data and analyses critical to conducting the transshipment research. Google generously provided cloud computing resources and technical guidance. P. Woods, E. Tuya, A. Arana, E. Mueller, and K. Wurster assisted with engineering for the AIS data pipeline. A. Wilson, C. Bacon, and K. Schwehr assisted with data processing, machine learning, and data labeling. K. Boerder, K. Seto, and B. Bergman provided valuable insights into regional transshipment activities. We also wish to thank SkyTruth, Oceana and Google as Founding Partners of Global Fishing Watch. Our global AIS dataset is provided by ORBCOMM and Spire Global Inc. Central Intelligence Agency, CIA. (2013). The World Factbook 2013-14. Washington, DC. Food and Agriculture Organization of the United Nations, FAO. (2002). Implementation of the International Plan of Action to Deter, Prevent and Eliminate Illegal, Unreported, and Unregulated Fishing. FAO Technical Guidelines for Responsible Fisheries No. 9. pp.1–141. Food and Agriculture Organization of the United Nations, FAO. (2016). The State of World Fisheries and Aquaculture. Contributing to Food Security and Nutrition for all. Rome. 200 pp. Haenlein, C. (2017). Below the surface: How illegal, Unreported and Unregulated Fishing Threatens Our Security. Occasional Paper, Royal United Services Institute. IMO (2002) Safety of Life at Sea Conventions (SOLAS) Title 33, Code of Federal Regulations, Section164.46 Automatic Identification System (AIS). (amended 07/01/03). McCoy, M. (2012). A Survey of Tuna Transshipment in Pacific Island Countries: Opportunities for Increasing Benefits and Improving Monitoring. Forum Fisheries Agency, Honiara. Phelps Bondaroff, T. D., van der Werf, W., and Reitano, T. (2015). “The illegal fishing and organized crime nexus: Illegal fishing as transnational organized crime,” in Global Initiative Against Transnational Organized Crime and The Black Fish (Geneva), 1–83. WCPFC (2009). Conservation and Management Measure on the Regulation of Transshipment. Conservation and Management Measure 2009-06. Copyright © 2018 Miller, Roan, Hochberg, Amos and Kroodsma. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
2019-04-19T00:32:35Z
https://www.frontiersin.org/articles/10.3389/fmars.2018.00240/full
l-Histidine biosynthesis is embedded in an intertwined metabolic network which renders microbial overproduction of this amino acid challenging. This is reflected in the few available examples of histidine producers in literature. Since knowledge about the metabolic interplay is limited, we systematically perturbed the metabolism of Corynebacterium glutamicum to gain a holistic understanding in the metabolic limitations for l-histidine production. We, therefore, constructed C. glutamicum strains in a modularized metabolic engineering approach and analyzed them with LC/MS-QToF-based systems metabolic profiling (SMP) supported by flux balance analysis (FBA). The engineered strains produced l-histidine, equimolar amounts of glycine, and possessed heavily decreased intracellular adenylate concentrations, despite a stable adenylate energy charge. FBA identified regeneration of ATP from 5-aminoimidazole-4-carboxamide ribonucleotide (AICAR) as crucial step for l-histidine production and SMP identified strong intracellular accumulation of inosine monophosphate (IMP) in the engineered strains. Energy engineering readjusted the intracellular IMP and ATP levels to wild-type niveau and reinforced the intrinsic low ATP regeneration capacity to maintain a balanced energy state of the cell. SMP further indicated limitations in the C1 supply which was overcome by expression of the glycine cleavage system from C. jeikeium. Finally, we rerouted the carbon flux towards the oxidative pentose phosphate pathway thereby further increasing product yield to 0.093 ± 0.003 mol l-histidine per mol glucose. By applying the modularized metabolic engineering approach combined with SMP and FBA, we identified an intrinsically low ATP regeneration capacity, which prevents to maintain a balanced energy state of the cell in an l-histidine overproduction scenario and an insufficient supply of C1 units. To overcome these limitations, we provide a metabolic engineering strategy which constitutes a general approach to improve the production of ATP and/or C1 intensive products. l-Histidine (further referred to as histidine) was discovered in the late nineteenth century by Kossel and Hedin simultaneously and the l-enantiomer is nowadays categorized as an essential amino acid for human infants and adults, belonging to the 20 standard proteinogenic amino acids . Histidine has the ability to switch between the protonated and unprotonated states due to the pKa of about 6 of its imidazole group . Thus, histidine is a common ligand of metalloproteins and part of the catalytic triad in several enzymes, underlining its physiologically prominent role [57, 70, 72]. Exceeding physiological levels of histidine in humans has shown to be connected with mutations in histidase and was named histidinemia, a benign inborn error of metabolism [6, 49]. Furthermore, histidine is a precursor for histamine, which is known to play an important role in regulating human immune response, and thus is linked to several allergic disorders [67, 69]. Beyond this, histidine is available as feed supplement and has been reported to have anti-inflammatory and antioxidant properties, which makes it attractive for applications in the medical industry [25, 33, 34, 87, 90, 91]. Corynebacterium glutamicum is a Gram-positive, facultatively anaerobic bacterium which can grow on a wide range of sugars, alcohols, and organic acids [58, 65] and is known as a workhorse for the production of l-glutamate and l-lysine [8, 23, 83]. Moreover, metabolic engineering approaches expanded the product portfolio to other amino acids such as l-methionine, l-valine, l-arginine, and l-tryptophan [8, 42, 66, 68, 71], organic acids [17, 53, 94, 95], alcohols [13, 43, 46, 80], vitamins , carotenoids [35, 36], fatty acids , polymers , terpenes [26, 48], and others. Most relevant, C. glutamicum possesses an intrinsic histidine synthesis pathway but, in contrast to other industrially relevant bacteria such as Pseudomonas and several Bacillus genera, lacks a histidine utilization system (reviewed in ). This renders C. glutamicum as an attractive platform for histidine production. Biosynthesis of histidine has been extensively studied, mainly in Escherichia coli and Salmonella enterica serovar Typhimurium and several profound reviews are available [1, 28, 96]. Nowadays, histidine biosynthesis is considered fundamentally the same in all living organisms . From a physiological point of view, the biosynthetic pathway of histidine is unique for an amino acid as it is closely entwined with other pathways, such as purine biosynthesis and C1 metabolism (Fig. 1). Both the purine and the histidine pathways have the same precursor, phosphoribosyl pyrophosphate (PRPP) (Fig. 1). The second precursor for histidine synthesis is ATP, which is commonly known as energy donor. However, in this unique reaction, the backbone of the ATP molecule is incorporated to give the first intermediate of the histidine pathway. In this reaction catalyzed by ATP phosphoribosyltransferase (HisG), PRPP and ATP are utilized to form phosphoribosyl-ATP, which is further converted in nine enzymatic reactions into histidine (Fig. 1). In the fifth step of the histidine pathway, 5-aminoimidazole-4-carboxamide ribonucleotide (AICAR) is formed and rerouted to the purine biosynthesis, and thus is available to regenerate ATP (Fig. 1). Besides histidine biosynthesis, PRPP is also a precursor for the biosynthetic pathways of pyrimidines, tryptophan, and nicotinamide adenine dinucleotides . The linkage with the C1 metabolism manifests in de novo synthesis of purines, where two molecules of 10-formyltetrahydrofolate (fTHF) are required as cofactors (Fig. 1). The major metabolic source for the generation of loaded THF molecules in C. glutamicum is the reaction of serine hydroxymethyltransferase (SHMT, encoded by glyA) that converts l-serine into glycine and simultaneously generates 5,10-methylene-THF (mTHF) from THF [60, 78, 79]. The biosynthesis of histidine in C. glutamicum consists of ten consecutive enzymatic reactions that are catalyzed by nine enzymes with histidinol dehydrogenase (HisD) being bifunctional . The histidine genes are organized in four operons, comprising hisD–hisC–hisB–cg2302–cg2301, hisH–hisA–impA–hisF–hisI–cg2294, cg0911–hisN, and hisE–hisG (Fig. 7; [47, 56]) and eight of the corresponding histidine genes were described as essential . Besides the feedback inhibition of HisG by histidine [2, 97], transcriptional control of histidine biosynthesis has been shown for the hisD operon of C. glutamicum AS019 to function via a T-box-mediated attenuation mechanism [47, 56]. Analysis of the 5′untranslated region (UTR) of hisD in C. glutamicum ATCC 13032, however, revealed a 103 base pair shorter 5′UTR region and it has been speculated that control of this operon occurs on translational rather than transcriptional level in C. glutamicum ATCC 13032 . Concerning histidine production, the efforts that have been made with C. glutamicum are limited to a few examples and classically focused on mutagenesis approaches to increase resistance against histidine analogs and to free HisG from its feedback inhibition [2, 3, 63, 77, 97]. Rational approaches for strain engineering were done by promoter exchange of the hisD operon, overexpression of the hisEG genes , and elimination of feedback inhibition by deleting the C-terminal regulatory domain and mutating the catalytic domain of HisG, combined with hisEG overexpression . In addition to modifications in the histidine biosynthesis, decreasing transketolase activity has been shown to improve precursor availability and histidine production . However, a systems metabolic engineering approach to engineer histidine production strains has not yet been conducted. Due to the metabolic complexity of histidine synthesis, we combined rational strain engineering with systems metabolic profiling (SMP) and flux balance analysis (FBA) to identify bottlenecks in the intertwined pathways, and to finally engineer histidine producers with balanced metabolite pools for efficient production. In the first step, we chromosomally introduced the nucleotide exchanges ggc to cat and acg to cag in hisG of C. glutamicum ATCC 13032 (Fig. 7) to relieve HisG from feedback inhibition, yielding variant HisGG233H−T235Q . The resulting strain C. glutamicum HIS1 already secreted histidine into the culture supernatant with a product yield per unit substrate (Y P/S his ) of 0.015 ± 0.003 mol histidine per mol glucose (Fig. 2). Compared to the WT strain, the maximum growth rate µmax of C. glutamicum HIS1 decreased from 0.38 ± 0.01 h−1 to 0.32 ± 0.01 h−1 and the biomass yield per unit substrate (YX/S) remained stable with 0.45 ± 0.01 and 0.46 ± 0.02 g biomass per g substrate, respectively. Beyond this, C. glutamicum HIS1 produced glycine as main byproduct besides histidine with a Y P/S gly of 0.020 ± 0.003 mol glycine per mol glucose (Fig. 2). To gain a deeper insight into the metabolic state of C. glutamicum HIS1, systems metabolic profiling (SMP) was performed. Intracellular peak intensities of d-erythro-1-(imidazole-4-yl)glycerol 3-phosphate (IGP) and l-histidinol were 18 and 275 times higher compared to the WT (Fig. 3), respectively. To debottleneck histidine synthesis, we systematically exchanged the native promoters of all four canonical operons containing all histidine biosynthesis genes to stronger ones (Fig. 7), resulting in strains C. glutamicum HIS2–HIS6. Firstly, the native promoter of the hisD–hisC–hisB–cg2302–cg2301 operon in C. glutamicum HIS1 was replaced by the promoter of elongation factor TU (Ptuf) and in parallel the 5′UTR region of the hisD gene was deleted to eliminate suspected regulatory elements (Fig. 7), which resulted in strain C. glutamicum HIS2. C. glutamicum HIS2 showed similar Y P/S his (0.013 ± 0.001 mol histidine per mol glucose), µmax (0.32 ± 0.01 h−1), YX/S (0.48 ± 0.01 g biomass per g glucose), and Y P/S gly (0.018 mol glycine per mol glucose), compared to C. glutamicum HIS1. C. glutamicum HIS3 and HIS4 were generated, by additionally replacing the native promoters of the operons hisH–hisA–impA–hisF–hisI–cg2294 and cg0911–hisN in C. glutamicum HIS2 with Ptuf (Fig. 7), respectively. However, the performance of the resulting strains HIS3 and HIS4 remained constant, with Y P/S his of 0.013 ± 0.002 and 0.012 ± 0.001 mol histidine per mol glucose, µmax of 0.33 ± 0.01 and 0.31 ± 0.01 h−1, YX/S of 0.50 ± 0.02 and 0.45 ± 0.01 g biomass per g glucose, and Y P/S gly of 0.019 ± 0.001 and 0.017 ± 0.001 mol glycine per mol glucose, respectively (Fig. 2). Since we did not succeed in replacing the native promoter of the hisEG operon with Ptuf or the promoter of manganese superoxide dismutase PsodA in C. glutamicum HIS4, we used PdapA–A16, a mutated variant of the promoter of dihydrodipicolinate synthase (encoded by dapA; ). Simultaneously, we replaced the native translational start codon GTG of hisE by ATG to improve translation efficiency (Fig. 7), which resulted in C. glutamicum HIS6. The introduced modifications significantly increased histidine production and strain C. glutamicum HIS6 showed a Y P/S his of 0.065 ± 0.004 mol histidine per mol glucose, which is about 5 times higher compared to the parental strain C. glutamicum HIS4. Accordingly, the Y P/S gly increased to 0.072 ± 0.004 mol glycine per mol glucose and we observed reduction of 20% and 10% of µmax and YX/S, respectively (Fig. 2). To evaluate the cumulative effects of the applied modifications, we constructed strain C. glutamicum HIS5, which carries the HisGG233H−T235Q variant, the exchange of the translational start codon from GTG to ATG of hisE, and the replaced native promoter of hisE by PdapA–A16 (Fig. 7). Although, strain C. glutamicum HIS5 does not possess Ptuf in front of the remaining three histidine operons, it showed an intermediate Y P/S his of 0.039 ± 0.001 mol histidine per mol glucose which is 160% higher compared to C. glutamicum HIS1 and 40% lower compared to C. glutamicum HIS6 (Fig. 2). Thus, the applied modifications in C. glutamicum HIS6 are cumulatively beneficial for histidine production. Since the hisH–hisA–impA–hisF–hisI–cg2294 has a length of > 4000 bps, we finally replaced the internal promoter in front of hisF by PsodA downstream of an artificial stop codon (Fig. 7). The resulting strain C. glutamicum HIS7 showed similar characteristics like C. glutamicum HIS6 (Fig. 2), however the intracellular peak intensities of IGP and l-histidinol were reduced by a factor of 3 and 2, respectively (Fig. 3). In summary, using SMP, the applied genetic modifications were evaluated and allowed a stepwise increase to a Y P/S his of 0.065 ± 0.004 mol histidine per mol glucose, and readjusted the intracellular concentrations of IGP and l-histidinol to C. glutamicum WT-like levels (Fig. 3). Since histidine and purine biosynthesis are closely interlinked (Fig. 1), we determined the intracellular adenylate concentrations in strains C. glutamicum HIS1–HIS7 and calculated adenylate energy charges (ECs), as a measure for the energetic state of the strains. Interestingly, we found relatively stable ECs in all engineered strains with values between 0.88 and 0.92, which are comparable to the WT strain, with an EC of 0.89 ± 0.04 (Fig. 4). Despite the stable ECs, the absolute concentrations of ATP, ADP, and AMP were strongly affected (Fig. 4). The WT strain showed intracellular purine concentrations of 15.7 ± 0.4 µmol ATP g CDW −1 , 6.0 ± 0.6 µmol ADP g CDW −1 , and 2.1 ± 0.8 µmol AMP g CDW −1 during exponential growth phase (AMP not shown). According to their intracellular ATP and ADP concentrations, strains C. glutamicum HIS1–HIS7 can be clustered into two groups. The first group (C. glutamicum HIS1–HIS4) exhibited solely diminished ADP levels, showing about half of the concentration of the WT strain; whereas ATP concentrations remained stable. The second group (C. glutamicum HIS5–HIS7) exhibited diminished ADP and also diminished ATP concentrations with values ranging from 6.6 to 9.7 µmol ATP g CDW −1 and 1.8–2.5 µmol ADP g CDW −1 . Strikingly, ATP concentrations were only affected in strains where the native promoter of the hisEG operon was exchanged by PdapA–A16. As described in the materials and methods part, intracellular AMP concentrations in the modified strains were below the detection limit of the applied method, and it, thus, can be concluded that AMP concentrations in strains C. glutamicum HIS1–HIS7 were significantly below the concentrations of the WT strain. After optimizing the histidine biosynthesis and investigating intracellular adenylate concentrations, we performed flux balance analysis (FBA) to gain a holistic overview and further indications to improve histidine production with C. glutamicum (Fig. 5). Two different FBAs resembling WT-like growth and growth-coupled histidine production were performed, which showed that in addition to an increased flux through the histidine biosynthesis pathway, an equimolar supply of ATP is a prerequisite for efficient histidine production. Therefore, an unphysiologically high flux from AICAR to ATP has to be accomplished (Fig. 5). To identify bottlenecks in this ATP regeneration cascade, we performed further SMP, and found that in C. glutamicum, HIS7 strongly increased intracellular peak intensities of inosine monophosphate (IMP) and adenylosuccinate, which were 43- and twofold higher compared to the WT (Fig. 3). The strongly increased IMP level indicated a limitation on the level of adenylosuccinate synthetase (PurA) and/or adenylosuccinate lyase (PurB), which catalyze the subsequent reactions from IMP over adenylosuccinate to AMP, respectively. To improve the ATP regeneration capacity (designated as energy engineering), we overexpressed the native purA and purB genes from the plasmid pJC4 under control of Ptuf in C. glutamicum HIS7. Compared to the parental strain C. glutamicum HIS7, the plasmid-carrying derivative C. glutamicum HIS8 had a 17% lower Y P/S his of 0.054 ± 0.002 mol histidine per mol glucose. The growth rate remained stable with 0.29 ± 0.01 h−1 and the YX/S increased slightly to 0.46 ± 0.02 g biomass per g glucose. Concomitant with the reduced histidine yield, the glycine yield decreased to 0.056 ± 0.001 mol glycine per mol glucose (Fig. 2). However, SMP of C. glutamicum HIS8 showed that upon introduction of pJC4purApurB, the intracellular levels of IMP and adenylosuccinate were readjusted to WT-like levels. Additionally, intracellular peak intensities of ATP and ADP were restored from 64 and 63% (C. glutamicum HIS7) to 111% and 96% of the WT level in C. glutamicum HIS8 (Fig. 3). Taken together, the applied energy engineering approach identified the requirement of an unphysiologically high ATP regeneration capacity for histidine production which can be accounted for by overexpression of purA and purB. Although this modification readjusted the intracellular purine pool, the Y P/S his was not improved indicating further obstacles that must be overcome. For incorporation of the two carbonyl groups into the carbon skeleton of purines, the de novo biosynthesis requires two molecules of fTHF, which are provided as mTHF by the conversion of l-serine into glycine catalyzed by serine hydroxymethyltransferase (SHMT; Fig. 1). This is reflected in the conducted FBAs, yielding an equimolar flux into C1 metabolism and histidine synthesis (Fig. 5). Since the surplus of glycine cannot be further degraded or rerouted to the central metabolism of C. glutamicum, all strains of the so far engineered strain genealogy produced glycine as the main byproduct being inevitably present in equimolar amounts to histidine (Fig. 6). Although, overexpression of purA and purB reduced the intracellular peak intensities of IMP and adenylosuccinate to WT levels, we observed that the intracellular AICAR peak intensity was not reduced but even increased (2.6-fold) in C. glutamicum HIS8 compared to C. glutamicum HIS7 (Fig. 3). This result pointed to a fTHF limitation of the bifunctional AICAR formyltransferase/IMP cyclohydrolase (PurH, Fig. 1), which might negatively affect the flux in the upper part of histidine synthesis. Since the glycine cleavage (GCV) system converts glycine into CO2, ammonia, and simultaneously generates mTHF from THF (Fig. 1), we heterologously expressed the GCV system from C. jeikeium on plasmid pEC-XT99A_gcv_OP1-Cjk in strain C. glutamicum HIS8, resulting in C. glutamicum HIS9. This modification was expected to reduce glycine accumulation accompanied by an improvement of the supply with loaded THF molecules. C. glutamicum HIS9 showed a µmax of 0.22 ± 0.01 h−1, a YX/S of 0.35 ± 0.01 g biomass per g glucose and in contrast to C. glutamicum HIS8 did not secret glycine into the supernatant (Fig. 2). Furthermore, the Y P/S his in C. glutamicum HIS9 increased by 59% to 0.086 ± 0.001 mol histidine per mol glucose and the peak intensities of AICAR decreased by 73% compared to C. glutamicum HIS8 (Figs. 2, 3). In summary, the expression of a functional GCV system eliminated glycine as byproduct, increased the fTHF availability and, in combination with purA and purB overexpression, improved histidine production with C. glutamicum. To achieve an optimal flux distribution for histidine production with C. glutamicum, the FBA predicted to increase the carbon flux towards the pentose phosphate pathway (PPP) by 74% compared to the WT flux (Fig. 5). Thus, C. glutamicum HIS9 with optimized energy metabolism and enhanced C1 supply was further modified to reroute carbon from glycolysis to the PPP by changing the native translational start codon ATG of the pgi gene, encoding the glucose 6-phosphate isomerase (Pgi), to the weaker GTG. The constructed strain C. glutamicum HIS10 showed a similar µmax and YX/S, however, a Y P/S his of 0.093 ± 0.001 mol histidine per mol glucose which is 8% higher compared to C. glutamicum HIS9 (Fig. 2). Histidine is an attractive amino acid for various applications in the feed and medical sector [25, 87, 90, 93] and in 2003, the production by fermentation was estimated to be 400 t histidine per year . Most efficient producer strains described in literature have been obtained by classical mutagenesis and show maximal Y P/S his values of about 0.15–0.20 g histidine per g substrate [9, 63], which is about 2.5-fold lower than the maximum theoretical product yield of 0.44 g per g achieved at μmax = 0.1 h−1 in growth-coupled manner (Fig. 5). Associated with the applied modifications in the histidine biosynthesis and connected pathways, µmax strongly decreased to a minimum of 0.22 ± 0.01 h−1 in C. glutamicum HIS9 and HIS10 (equals about 58% of WT µmax) which mostly can be attributed to the overexpression of the modified hisEG genes (Fig. 2). Both µ and Y P/S his , which is about 18% of the theoretical maximum, are crucial factors for industrial-scale application and therefore have to be optimized in further studies. So far, few studies provided knowledge for the targeted optimization of C. glutamicum as a histidine overproducer. As such, the deregulation of the biosynthesis and the improved precursor availability [41, 55, 63, 97] have been investigated. The moderate success to develop efficient production strains might be attributed to the demanding biosynthesis of histidine reflected by its tight connection to energy metabolism (Fig. 1). Therefore, to gain a more holistic understanding of the metabolic limitations for histidine production, we performed a modularized metabolic engineering approach, including flux balance analysis and LC/MS QToF-based systems metabolic profiling (SMP). Especially, the applied untargeted metabolomics workflow proofed an effective tool to monitor intracellular peak intensities of key metabolites in the engineered strain genealogy. The introduced modifications in the histidine biosynthesis enabled histidine overproduction (Fig. 2) and were shown for C. glutamicum HIS7 to maintain WT-like levels of the intermediates IGP and l-histidinol (Fig. 3). In contrast, the intracellular peak intensities of histidine increased stepwise with C. glutamicum HIS8 showing a 33 times higher level compared to the WT, indicating an export limitation. However, to our knowledge, no export system for histidine has been identified so far in C. glutamicum, whereas the gene product of cg1305 was proposed to be involved in histidine import . If the prevention of re-import might be beneficial for histidine production has to be verified in future experiments. The quantification of intracellular ATP and ADP concentrations in strains C. glutamicum HIS1–HIS7 (Fig. 4) showed that particularly the overexpression of hisEG (presumably the mutated hisG, since it encodes the first enzyme in the biosynthesis pathway, which catalyzes the covalent binding of ATP to PRPP) in strain C. glutamicum HIS5 drained ATP efficiently into histidine biosynthesis and led to strongly diminished purine concentrations. Interestingly, the perturbation of the energy metabolism did not manifest in an altered energy charge itself but was disclosed by consistent reduction of the ATP and ADP pools (Fig. 4), which underpins the relevance of a balanced energy state in the regulatory hierarchy of the cell [4, 92]. The applied FBA already pointed to the requirement of a high ATP regeneration capacity of the cell for efficient histidine production (Fig. 5) and SMP finally hinted to PurA and/or PurB as the limiting step(s) by the observed strong increase of the IMP and adenylosuccinate levels in C. glutamicum HIS 6 and HIS7, compared to the WT (Fig. 3). Indeed, overexpression of purA and purB not only reduced the intracellular peak intensities of IMP and adenylosuccinate but also readjusted the ADP and ATP levels to WT level demonstrating that the natural capacity of the cell is not suited to regenerate ATP on top of the growth demands. Recently, E. coli has also been engineered for histidine production and the observed intracellular accumulation of AICAR was overcome by introduction of an additional copy of purA into the chromosome . Interestingly, although overexpression of purA and purB in our strains almost readjusted the levels of IMP, adenylosuccinate, ADP, and ATP, SMP revealed still increased peak intensities for AICAR in all histidine producing strains compared to the WT (Fig. 3) indicating a different regulatory pattern in C. glutamicum compared to E. coli. Since overexpression of purA and purB positively impacted the energy state of the cell but did not improve the histidine yield, we speculated that the increased intracellular AICAR levels feedback on the upper part of the histidine synthesis pathway and indicate another bottleneck in the metabolism of C. glutamicum. In accordance, Malykh et al. recently suggested in E. coli a competitive inhibitory influence of AICAR on HisG. Furthermore, it has been shown for E. coli that upon folate limitation, AICAR accumulates and binds to a specific riboswitch, which negatively controls expression of purine genes . Likewise, in C. glutamicum, the conversion of AICAR by PurH is fTHF dependent (Fig. 1), and consequently we speculated about a C1 limitation for histidine production, which was supported by the results of FBA, proposing a required high flux into the C1 metabolism (Fig. 5). Furthermore, strains C. glutamicum HIS1–HIS8 secreted glycine as inevitable equimolar byproduct to histidine, which has also been observed for other histidine producing mutants of C. glutamicum and Brevibacterium flavum [19, 44]. The required fTHF for purine biosynthesis is supplied by the reaction of the SHMT, converting l-serine into glycine, thereby generating mTHF, which might be further converted into fTHF [29, 39, 78, 79]. Unfortunately, the various THF species of the C1 metabolism are not accessible with the applied analytical system, due to low pool sizes caused by interconversion, polyglutamylation, and degradation . However, the C1 cycle is a complex network of several oxidized/reduced forms of C1 units with THF as carrier molecule and has been investigated before for l-methionine- and l-serine-overproducing C. glutamicum strains [15, 32, 54, 81]. To overcome the proposed C1 limitation, we expressed the GCV system from C. jeikeium in C. glutamicum HIS8, which already overexpresses the purA and purB genes, and in fact observed the disappearance of glycine as byproduct (Fig. 2), a significant reduction of the AICAR pool (Fig. 3), and a significantly increased Y P/S his (Fig. 2). In a recent approach, a GCV system from E. coli has been heterologously produced in C. glutamicum, where it enabled increased l-serine accumulation in a glyA attenuated strain, by generating improved amounts of C1 units for incorporation in the purine biosynthesis . Consistent with these data, the GCV system from C. jeikeium seems to be able to (partly) satisfy the need for loaded THF molecules in histidine-producing C. glutamicum. However, the remaining elevated AICAR levels in C. glutamicum HIS9 and HIS10 (Fig. 3) either indicate an even higher demand for fTHF or point to limiting AICAR formyltransferase/IMP cyclohydrolase activity, which might be overcome by overexpression of purH. Taken together, the applied interplay of strain engineering, systems metabolic profiling, and flux balance analysis yielded a comprehensive view on the complex metabolic network of histidine biosynthesis. Energy engineering identified and reinforced the intrinsically low ATP regeneration capacity to maintain the balanced energy state of the cell. However, to utilize the readjusted ATP levels for histidine production, it is essential to provide sufficient C1 units avoiding the accumulation of AICAR, which seems to be a potent effector molecule to control the entry flux into histidine biosynthesis. All strains and plasmids used in this study are listed in Table 1. Oligonucleotides are given in Table 2. Escherichia coli DH5α was used as cloning host and was grown aerobically in 2 × YT complex medium in a 5-mL glass test tube culture at 37 °C on a rotary shaker at 120 rpm. Precultures of C. glutamicum strains were prepared by thawing a glycerol stock (30% w v−1 glycerol) and streaking cell solution on a 2 × YT agar plate which was incubated at 30 °C for 2 days. A single colony of the respective strain was then used to inoculate 5 mL of 2 × YT complex medium in a glass test tube, which was incubated at 30 °C on a rotary shaker at 120 rpm for 6–8 h. The complete suspension of the glass test tube was transferred into 50 mL of 2 × YT medium in a 500-mL baffled shaking flask, which was incubated at 30 °C on a rotary shaker at 120 rpm overnight. To inoculate the main culture, cells were harvested by centrifugation (4500×g, 10 min, 4 °C), the pellet was resuspended in 0.9% w v−1 NaCl solution and used to inoculate CGXII minimal medium to an optical density at 600 nm (OD600) of about 2.5. The CGXII minimal medium is composed of 20 g (NH4)2SO4 L−1, 5 g urea L−1, 21 g 3-morpholinopropanesulfonic acid (MOPS) L−1, 1 g K2HPO4 L−1, 1 g KH2PO4 L−1, 0.25 g MgSO4 L−1, 0.01 g CaCl2 L−1. The pH value of the medium was adjusted to 7.4 with 5 M KOH before autoclaving. Then, 16.4 mg FeSO4 × 7 H2O L−1, 10 mg MnSO4 × H2O L−1, 0.2 mg CuSO4 L−1, 1 mg ZnSO4 × 7 H2O L−1, 0.02 mg NiCl2 × 6 H2O L−1, 0.2 mg biotin L−1 were added sterilely. Standard cultivations in shaking flasks contained 10 g glucose L−1 as carbon source. For cultivations of strains bearing plasmid pJC4, 50-µg kanamycin mL−1 was added. For strains harboring plasmid pJC4 and pEC-XT99A, the kanamycin concentration was decreased to 12.5 µg mL−1 and 2.5-µg tetracycline mL−1 was added. The expression from Ptrc in pEC-XT99A_gcv_OP1-Cjk was induced by adding 1 mM isopropyl β-d-1-thiogalactopyranoside (IPTG) at the cultivation start. OD600 was measured with a photometer (Ultrospec 10 Cell Density Meter, GE Healthcare Company, Little Chalfont, UK). The cell dry weight (CDW in g L−1) was calculated using the correlation CDW = OD600 × 0.21 g L−1. The maximal growth rate µmax was determined by linear regression of ln(OD600), which was plotted against the cultivation time in h during the exponential growth phase of the respective strain. The biomass yield per unit substrate YX/S in g g−1 was determined by linear regression of the biomass concentration in g L−1, which was plotted against the corresponding glucose concentration in g L−1. The product yields per unit substrate for histidine (Y P/S his ) and glycine (Y P/S gly ) in mol mol−1 were determined by dividing the product concentration (histidine) in mol L−1 and byproduct concentration (glycine) in mol L−1 after 24 h by the corresponding initial substrate concentration in mol L−1 at 0 h, respectively. Molecular cloning methods, such as PCR and DNA restriction, were carried out according to . Plasmids were isolated with E.Z.N.A. Plasmid Mini Kit I (Omega Bio-tek Inc., Norcross, USA) and PCR fragments were purified with NucleoSpin Gel and PCR Clean-up Kit (Macherey–Nagel GmbH & Co. KG, Düren, Germany) according to the manufacturer’s instructions. Electrocompetent cells of E. coli and C. glutamicum were prepared as described before [22, 85]. Constructed plasmids were transformed into E. coli according to , and into C. glutamicum with a subsequent heat shock after transformation for 6 min at 46 °C according to Rest et al. . Plasmids were transformed into electrocompetent E. coli and C. glutamicum strains with an Eporator (Eppendorf AG, Hamburg, Germany) at 2.5 kV with 600 Ω resistance. Enzymes for recombinant DNA work were obtained from Thermo Scientific Inc. (Darmstadt, Germany) and oligonucleotides were synthesized by biomers.net GmbH (Ulm, Germany, listed in Table 2). Promoter exchanges and nucleotide substitutions were performed via a two-step homologous recombination by applying the respective pK19mobsacB derivative . The plasmid to exchange the native HisG variant with the feedback-released HisGG233H–T235Q was implemented into C. glutamicum ATCC 13032 by amplifying the flanking genomic regions of hisG up- and downstream of the mutations with primer pairs hisG1/hisG2 and hisG3/hisG4 (hisG2 and hisG3 harbor the exchanges). Both polymerase chain reaction (PCR) products were used as templates in a SOEing PCR with primer pair hisG1/hisG4. The SOEing product and pK19mobsacB were digested with BamHI and fused together in a ligation reaction to give pK19mobsacB hisGFB. This plasmid was then transformed into E. coli DH5α, isolated, and its sequence integrity was verified by DNA sequencing with primers pK19-fw and pK19-rev (GATC Biotech AG, Constance, Germany). The verified plasmid was then transformed into C. glutamicum ATCC 13032. Applying the method described by Schäfer et al. , the native hisG sequence was replaced via homologous recombination (double crossover) by the mutated hisG sequence leading to amino acid exchanges G233H and T235Q. The screening of the C. glutamicum HIS1 mutants was done on 2 × YT agar plates containing 10% (w v−1) sucrose. For verification of the nucleotide exchanges, a PCR with primer pair hisG1/hisG4 was performed and sent for sequencing with primer hisGseq. To construct plasmids for the promoter exchanges in front of the operons containing histidine biosynthesis genes (C. glutamicum HIS2, HIS3, HIS4, and HIS6), the flanking regions of the respective promoter were amplified. For the exchange of the native promoter of the operon hisD–hisC–hisB–cg2302–cg2301 with the strong promoter of the gene tuf, encoding the elongation factor TU, the flanking regions were amplified with primer pairs hisD1/hisD2 and hisD3/hisD4. The products of both PCRs were used as templates in a SOEing PCR with primer pair hisD1/hisD4, and the SOEing product and the plasmid pK19mobsacB were digested with BamHI and HindIII and ligated together to give an intermediate plasmid. This plasmid was transformed into E. coli DH5α, isolated and sent for sequencing with primers pK19-fw and pK19-rev. In the next step, Ptuf was amplified with primer pair tuf1/tuf2, and the product and the intermediate plasmid were digested with NdeI and NsiI. Both were ligated to give plasmid pK19mobsacB hisD-Ptuf, which was transformed into E. coli DH5α, isolated and sent for sequencing with primers pK19-fw and pK19-rev. The verified pK19mobsacB hisD-Ptuf was transformed into C. glutamicum HIS1 and exchange of the native promoter region with the Ptuf promoter was performed as has been described above yielding C. glutamicum HIS2. The respective region was amplified with primer pair hisD1/Ptuf2 and sequenced with primer hisD1. The plasmids for exchanging the native promoter with Ptuf for operons hisH–hisA–impA–hisF–hisI–cg2294 and cg0911–hisN were constructed accordingly. Primer pairs hisH1/hisH2 and hisH3/hisH4 and hisN1/hisN2 and hisN3/hisN4 were used to amplify the flanking regions, respectively. After SOEing PCR, digestion, and ligation, plasmids were transformed into E. coli DH5α and prepared. In further steps, the mentioned plasmids were digested with NdeI and NsiI and fused with the Ptuf region. After sequencing, pK19mobsacB hisH–Ptuf was implemented in C. glutamicum HIS2 to yield C. glutamicum HIS3. The sequence was verified with primers hisH1, hisH4, tuf1, and tuf2. C. glutamicum HIS3 served as basis for implementing Ptuf in front of cg0911–hisN using pK19mobsacB hisN–Ptuf to yield C. glutamicum HIS4. This strain was verified with primers hisN1, hisN4, tuf1, and tuf2. Since we were not able to implement Ptuf in front of the hisE–hisG operon in C. glutamicum HIS4, we instead used PdapA–A16 , a modified version of the promoter of dihydrodipicolinate synthase, which was amplified with primer pair dapA1/dapA2 from pK18mobsacB PaceE dapA-A16 . The flanking regions of the hisE–hisG promoter were amplified with primer pairs hisE1/hisE2 and hisE3/hisE4, a SOEing PCR was prepared with primer pair hisE1/hisE4. This product and pK19mobsacB were digested with BamHI and HindIII and ligated. PdapA-A16 and this plasmid were digested with NdeI and NsiI and ligated. Hence, on the basis of C. glutamicum HIS4, C. glutamicum HIS6 was created and verified with primers hisE1, hisE4, dapA1, and dapA2. C. glutamicum HIS5 was created by implementing PdapA–A16 in C. glutamicum HIS1. To exchange the internal promoter of hisF in the operon hisH–hisA–impA–hisF–hisI–cg2294 with the promoter of manganese superoxide dismutase (encoded by sodA), flanking regions and the promoter were amplified with primer pairs hisF1/hisF2, sodA1/sodA2, and hisF3/hisF4 and an additional stop codon (TAA) was integrated upstream of hisF. The SOEing PCR (with all three products as template and primer pair hisF1/hisF4) and pK19mobsacB were cut with HindIII and BamHI and ligated together. Integration of PsodA in front of hisF in strain C. glutamicum HIS6 yielded C. glutamicum HIS7, which was verified with primers hisF4 and hisFseq. On the basis of plasmid pJC4 , we constructed pJC4 purA purB by amplifying Ptuf, purA, and purB with primer pairs tuf2_1/tuf2_2, purA1/purA2, and purB1/purB2 from the C. glutamicum genome. Furthermore, primer pair rrnB1/rrnB2 was used to amplify the TrrnB terminator region of the rrnB operon from the E. coli K-12 MG1655 genome. Isothermal plasmid assembly was prepared with these four DNA fragments and pJC4, which had been digested with XbaI and NotI before. The sequence integrity was verified by sequencing with primers ABseq 1–5. Plasmid pEC-XT99A served as basis for the GCV system overproduction plasmid and was digested with Ecl136II and XbaI. The gene cluster gcvPTH was amplified from the C. jeikeium K411 genome with primer pair gcv_Cjk_start_EcoRV/gcv_Cjk_MluI_XbaI and the resulting PCR product was digested with EcoRV and XbaI and ligated into the cut pEC-XT99A. After verification by sequencing, this intermediate plasmid served as basis for the second cloning step. The gene cluster lipAB was amplified from the C. jeikeium K411 genome with primer pair lipB-Cjk_start-EcoRV/lipA-Cjk_stop-XbaI and the PCR product was digested with SspI und EcoRV, and ligated into the XmnI cut intermediate plasmid to give pEC-XT99A_gcv_OP1-Cjk, which was verified by sequencing. Plasmid pEC-XT99A_gcv_OP1-Cjk was transformed into strain C. glutamicum HIS8 resulting in C. glutamicum HIS9. The exchange of the translational start codon ATG of gene pgi to GTG in C. glutamicum HIS9 was done with pK19mobsacB pgiGTG. For the construction, the flanking regions were amplified with primer pairs pgi1/pgi2 and pgi3/pgi4, containing the nucleotide exchange. The PCR products were used in a SOEing PCR with primer pair pgi1/pgi4. Then, the SOEing PCR and the vector were digested with HindIII and BamHI and ligated together. After sequence verification, the plasmid was introduced into C. glutamicum HIS9; the base exchange was done as described above, and verified by sequencing with primer pgiseq. Substrates and products were quantified by harvesting 1 mL of cell suspension via centrifugation (12,100×g, 5 min, RT) at given time points. The supernatants were used for further analysis. The glucose concentration was determined with a test kit from Roche (Roche Diagnostics, Mannheim, Germany). Quantification of amino acids was performed with an Agilent 1200 series apparatus (Agilent Technologies, Santa Clara, CA, USA) equipped with an Agilent Zorbax Eclipse Plus C18 column (250 × 4.6 mm, 5 µm) protected by an Agilent Zorbax Eclipse Plus C18 guard column (12.5 × 4.6 mm, 5 µm). Automatic precolumn derivatization with ortho-phthaldialdehyde was followed by fluorometric detection (excitation at 230 nm and emission at 450 nm). The elution buffer consisted of a polar phase (10 mM Na2HPO4, 10 mM Na2B4O7, 0.5 mM NaN3, pH 8.2) and a nonpolar phase (45% [v v−1] methanol, 45% [v v−1] acetonitrile). Protocol details were described earlier . Analytes were quantified using 200 µM l-ornithine as the internal standard to correct variabilities in analytes and a seven-point calibration curve for each component as an external reference standard. Metabolic fluxes of C. glutamicum ATCC 13032 were investigated by flux balance analysis (FBA), applying different objective functions and constraints . All computations were carried out with MATLAB 2015b (The MathWorks, Natick, MA, USA) and the COBRA Toolbox v3.0 with glpk solvers , using the genome-scale metabolic model (GEM) of C. glutamicum ATCC 13032, iCW773 . The glucose uptake rate was set to 3.94 mmol g CDW −1 h−1 for all simulations ; however, objective functions and constraints were changed as follows: (a) Maximizing growth rate with no further constraints results in μ = 0.36 h−1 and (b) maximizing l-histidine yield with a fixed μ of 0.1 h−1 resulted in a maximum yield of 0.51 mol l-histidine mol−1 glucose. Corynebacterium glutamicum strains HIS1, HIS6, HIS7, HIS8, HIS9, and HIS10 were cultivated as described above. Sampling was performed at a CDW of approximately 1.8 g L−1 during the exponential growth phase. 2 mL of cell suspension was sampled by centrifugation (12,100×g, 20 s, 30 °C) and washed with 1.5 mL of 0.9% (w v−1) NaCl solution followed by centrifugation. Cells were quenched immediately with liquid nitrogen and temporarily stored at − 70 °C. Defined amounts of 250 μM l-norvaline solution (internal standard) were added to the cell pellets to obtain an extraction concentration of 20 gCDW L−1. Immediately after addition, suspensions were pre-incubated for 30 s at 100 °C in a water bath and homogenized by vortexing (20 s). Subsequently, samples were incubated for 3 min at 100 °C, chilled on ice and centrifuged (20,800×g, 10 min, 4 °C). Supernatants were stored at − 70 °C . Differential metabolite analysis was performed on an Agilent 1260 bio-inert HPLC coupled to an Agilent 6540 Accurate-Mass LC–MS/MS Q-TOF system with ESI Jet Stream Technology (Agilent Technologies, Santa Clara, CA, USA). Two different hydrophilic interaction chromatography (HILIC) systems were used to get high metabolite coverage. The first method was ammonium acetate based (10 mM, pH 9.2) utilizing a Sequant ZIC-pHILIC column (150 × 2.1 mm, 5 μm) with guard column (Sequant ZIC-pHILIC, 20 × 2.1 mm, 5 μm) at 40 °C, 0.2 mL min−1, and 5 μL injection volume. For details see . Additionally, an acidic HILIC method was established using ammonium formate buffer (10 mM, pH 2.8) and a Waters XBridge BEH Amide column (150 × 2.1 mm, 3.5 μm) coupled to a Waters XBridge BEH Amide VanGuard Cartridge (5 × 2.1 mm, 3.5 μm) at 35 °C, 0.2 mL min−1, and 5 μL injection volume. Mobile phases were composed as follows: Mobile phase A: 90% acetonitrile/10% water, 10 mM ammonium formate and mobile phase B: 10% acetonitrile/90% water, 10 mM ammonium formate. Both adjusted to pH 2.8 with formic acid. Gradient elution was carried out by the following program: Isocratic hold 0% B for 1 min, linear gradient to 62.5% B for 15 min, linear gradient to 100% B for 4 min, column wash at 100% B for 5 min, linear gradient to 0% B for 5 min and column equilibration at 0% B for 15 min. Samples were prepared in 60% (v v−1) acetonitrile and 10 mM ammonium acetate (pH 9.2) or ammonium formate (pH 2.8). All metabolite samples were separated with both HILIC methods in positive and negative MS mode (tuned in extended dynamic range) with following conditions: drying gas flow rate of 8 L min−1 with a gas temperature of 325 °C, nebulizer with 40 lb per square inch gauge, sheath gas flow rate of 12 L min−1 and sheath gas temperature of 350 °C, capillary voltage of 4000 V and fragmentor voltage of 100 V. Additionally, fragmentation experiments in the targeted MS/MS mode were carried out to investigate and verify structure integrity of IGP, adenylosuccinate, SAICAR, and FGAR. For this, precursor ions [M+H] or [M−H], verified by accurate mass, were selected and fragmented at their characteristic retention times via collision-induced dissociation (CID) at 10, 20, and 30 V. Since analytical standards of those compounds were not commercially available or only by custom synthesis, fragmentation patterns were computationally evaluated with MassHunter Molecular Structure Correlator (B05.00, Agilent Technologies, Santa Clara, CA, USA). By combining accurate mass and plausible fragmentation patterns IGP, adenylosuccinate, SAICAR, and FGAR could be identified. System control and acquisition were performed using MassHunter Data Acquisition (B06.01, Agilent Technologies, Santa Clara, CA, USA). As first step, an untargeted differential analysis was carried out to generate hypothesis free data. Peak picking and integration were done in MassHunter ProFinder (B08.00, Agilent Technologies, Santa Clara, CA, USA) using “batch recursive feature extraction”. Subsequently, statistical analysis was performed in Mass Profiler Professional (13.1.1, Agilent Technologies, Santa Clara, CA, USA). Significance testing was done by one-way ANOVA and p values were filtered (p < 0.05). Peaks were identified by accurate mass and with a personal compound data library, containing retention times of authentic standards. Unidentified significant features were searched against the METLIN and MassBank database. After identification, peak integration was manually curated via “batch targeted feature extraction”. The following metabolites of the de novo purine and l-histidine biosynthesis could be identified and analyzed with the applied method: fGAR, phosphoribosyl-N-formylglycineamide; SAICAR, phosphoribosyl-aminoimidazolesuccinocarboxamide; AICAR, 1-(5-phosphoribosyl)-5-amino-4-imidazolecarboxamide; IMP, inosine monophosphate; AdSucc, adenylosuccinate; ADP, adenosine diphosphate; ATP, adenosine triphosphate; IGP, imidazole-glycerol phosphate; l-histidinol and l-histidine. AS, AF, RT, and BB conceived and designed the experiments; AS, AF, AH and EM performed the experiments and were supported by JS, IL, LF, and CM; AS, AF, and BB analyzed the data and were supported by JS, IL, and LF; AS, AF, JÖ, BG, RT, and BB wrote the paper. All authors read and approved the final manuscript. This research was funded by the Fachagentur Nachwachsende Rohstoffe e.V. with the Grant Number 22008014. See Table 2 and Fig. 7.
2019-04-25T02:29:32Z
https://rd.springer.com/article/10.1186%2Fs13068-019-1410-2
… that a single, integrated border agency, to be known as Border Control Australia, be established through the merger of the border control functions of the Department of Immigration and Border Protection and the Australian Customs and Border Protection Service. 2. On 9 May 2014, the Minister for Immigration and Border Protection announced that the government would carry out this recommendation and integrate Australia’s immigration and customs functions into a single entity—the Department of Immigration and Border Protection (DIBP—the department). The Australian Border Force (ABF), headed by a Commissioner, would be established within the department as the ‘frontline operational border agency’. The new department and the ABF came into existence on 1 July 2015, and operated under this nomenclature through to 2017. 3. On 18 July 2017, while this audit was in progress, the Prime Minister announced that the government had decided to establish a Home Affairs portfolio. From 20 December 2017, the Department of Home Affairs has assumed all of the department’s functions (including the ABF) in addition to functions from each of the Departments of Prime Minister and Cabinet; Social Services; Infrastructure and Regional Development and the Attorney-General’s department. the Australian Security Intelligence Organisation. 5. This audit principally focusses on the period May 2014 to December 2017, while the department was known as DIBP. However, some of the department’s responses to ANAO inquiries occurred after it became the Department of Home Affairs. For simplicity, this report refers to ‘the department’ to signify both the Department of Immigration and Border Protection and the Department of Home Affairs (except where the context requires a distinct reference). 6. Effective immigration and border control are essential to Australia’s national security. The possibility of combining both functions within one entity have been considered on a number of occasions historically. The emergence of threats such as people smuggling and transnational crime led the government to decide in 2014 that integration of the Department of Immigration and Border Protection (DIBP) and the Australian Customs and Border Protection Service (ACBPS) would more effectively address the emerging threats and deliver efficiencies. 7. Both DIBP and ACBPS are sizeable entities from a geographical and functional perspective, and have a history of publicised administrative issues. The ANAO has previously audited both entities on numerous occasions, and this audit presented an opportunity to provide assurance that risks associated with the integration process were being properly managed. 8. The objective of this audit was to examine the effectiveness of the integration of the Department of Immigration and Border Protection (the department) and the Australian Customs and Border Protection Service (ACBPS). Did the department establish sound governance arrangements for implementation of the integration and capability reform process? Did the department manage the integration and capability reform process in accordance with government decisions and relevant plans? Can the department demonstrate that the intended outcomes of integration and the capability reform process are being achieved, including financial outcomes? 10. The Department of Immigration and Border Protection achieved the integration of DIBP and ACBPS and the creation of the Australian Border Force in a structural sense and is also progressing with the implementation of a suite of reform projects. However, it is not achieving commitments made to government in relation to additional revenue, and is not in a position to provide the government with assurance that the claimed benefits of integration have been achieved. 11. The department established largely effective governance arrangements which were revised over time in response to emerging issues. 12. The department’s record keeping continues to be poor. 13. The department is effectively managing a suite of 38 capability reform projects and has developed sound monitoring arrangements, although the Executive Committee does not have visibility of the overall status of individual projects. 14. The efficiency savings committed to by the department were removed from its forward estimates and have thus been incorporated in the budget. However, the department has not verified whether efficiencies have been delivered in the specific areas which were nominated in the Integration Business Case. 15. Based on progress to the end of December 2017, if collections continue at the current rate the department will only collect 31.6 per cent of the additional customs duty revenue to which it committed in the Integration Business Case. 16. In the Integration Business Case, the department committed to a detailed Benefits Realisation Plan. The plan was not implemented despite several reviews identifying this omission. As a result, the department cannot demonstrate to the government that the claimed benefits of integration have been achieved. 17. The department moved quickly to establish a sound governance framework for the integration. The framework was revised on a number of occasions in response to emerging issues, particularly with respect to the capability reform projects. The abolition of the Reform and Integration Task Force resulted in a loss of momentum in the reform process and a drop-off in internal communication with staff. The department recognised this and re-established a similar coordination mechanism. More recently, the department has engaged a consultant to review the framework. 18. Reporting to the Executive focused primarily on integration and organisational reform, with minimal coverage of progress in delivery of the suite of 38 capability reform projects. Following the identification of this as a gap in the 2017 Gateway Review, an Enterprise Transformation Blueprint was established to provide the Executive Committee with greater visibility over the progress of activity across the department. 19. There was no evidence identified to indicate that written briefings were provided to the Minister on progress throughout the implementation process. 20. Detailed communication plans were established and implemented to support the integration process. ‘Pulse Check’ surveys were regularly taken to evaluate staff satisfaction and engagement with the process. 21. The audit found that the department did not maintain adequate records of the integration process. This finding repeats the outcomes of a substantial number of audits and reviews going back to 2005. The department’s own assessment is that its records and information management is in a critically poor state. The problems and their solutions are known to the department, and it has an action plan to address them, although numerous previous attempts to do so have not been successful. 22. The department also experienced a loss of corporate memory due to the level of turn-over of SES staff, with almost half of SES officers present in July 2015 no longer in the department at July 2017. 23. The department initially identified possible risks to effective integration. However, regular reporting against those risks ceased when the Reform and Integration Task Force was disbanded. 24. The department made extensive use of consultants to assist it with the integration process. Despite a requirement to evaluate contracts upon completion, this did not occur in 31 out of 33 (94 per cent) of contracts with a value of more than $1 million examined by the ANAO, and therefore it is unclear whether these services represented value for money. 25. Following a series of governance changes in October 2015, the department established an effective Project and Program Management Framework which was broadly consistent with the intended future governance state described in the Integration Business Case. While some projects are facing challenges, it is too early to form a view about whether all will be delivered on time and within budget. 26. The department has been subject to budgetary reductions equal to the efficiency savings required by government. It has not verified whether efficiencies were achieved in the specific areas identified in the Integration Business Case. 27. By the end of December 2017, the department had only delivered 42.2 per cent of the additional revenue to which it committed in the Integration Business Case, and if collections continue at the current rate, it will only collect 31.6 per cent of the additional revenue. 28. The department cannot demonstrate that the claimed benefits of integration have been achieved because it did not implement the Benefits Realisation Plan which formed part of the Integration Business Case. The Department of Home Affairs give priority to addressing its records and information management deficiencies including by implementing the Records and Information Management Action Plan 2016–20. The Department of Home Affairs develop a business assurance approach to enforce its requirement in the Contract Management Manual that contracts be evaluated on completion. The Department of Home Affairs implement the Benefits Realisation Plan which was included in the Integration Business Case to allow the government to assess whether the claimed benefits of integration have been realised. 29. The Department of Home Affairs (Home Affairs) recognises and appreciates the efforts of the Australian National Audit Office staff who conducted the audit. 30. Overall the report concludes that the then Department of Immigration and Border Protection (DIBP) successfully achieved integration and continues with the implementation of reform projects. With integration achieved through the establishment of a sound Governance Framework and an effective Project and Program Management Framework, that was supported by detailed communication plans and ‘pulse check’ surveys. Having in place these frameworks enabled flexible and timely responses to the management of emerging issues. 31. Home Affairs does acknowledge that record-keeping at that time was not in line with best practice and has undertaken significant steps to rectify the situation. Additionally continual improvements are being made in contract management with an automated solution being put in place that will facilitate the assessment of contract performance. 32. Home Affairs disputes in some instances the financial conclusions drawn within the report, and whether or not certain elements were outside the scope of the audit, as well as statements made in regards to project management and the overall visibility of the Executive in relation to the integration project. 33. With the inception of Home Affairs the ongoing development and review of new organisational priorities and strategies, to ensure that governance arrangements are robust, remains a primary focus. Below is a summary of key learnings identified in this audit report that may be considered by other Commonwealth entities when managing large scale organisational change. coordinate internal communications to ensure all staff are engaged with, and feel part of, the process. provide project management oversight, support and reporting of the business led integration and reform activity. An effective governance framework with clearly assigned responsibilities and scopes of authority is essential. Entities should be prepared to revise the framework in response to experience or changing circumstances. Benefits Realisation Plans should clearly identify intended strategic benefits. When drafting such plans, entities should think carefully about whether indicators designed to demonstrate benefits are ‘real’, measurable and reportable (as opposed to simply aspirational). Implementation work on plans needs to commence from the outset, not left until after the change (or project) is completed. In operating an Electronic Data Records Management System, entities should mandate its use and provide relevant training to all staff in order to ensure the full benefits are obtained through the consolidation of fragmented systems and manual records. During major organisational change, regular and effective internal communication is critical to fostering staff engagement. Both content and the choice of ‘channel’ (for example, emails, blogs, FAQs and staff meetings) are important and communication should continue until change has been completed and embedded. Entities should consider introducing an internal requirement to conduct end-of-contract evaluations of consultancies and other contracts (possibly with a value above a set amount). This would help to ensure that value for money is being achieved from contracts and to identify providers who have not performed satisfactorily. 1.2 On 9 May 2014, the Minister for Immigration and Border Protection announced that the government would carry out this recommendation and integrate Australia’s immigration and customs functions into a single entity—the Department of Immigration and Border Protection (DIBP – the department). The Australian Border Force (ABF), headed by a Commissioner, would be established within the department as the ‘frontline operational border agency’.2 The new department and the ABF came into existence on 1 July 2015, and operated under this nomenclature through to 2017. 1.4 The Department of Home Affairs has assumed all of the department’s functions (including the ABF) in addition to functions from each of the Departments of Prime Minister and Cabinet; Social Services; Infrastructure and Regional Development and the Attorney-General’s department. 1.6 The new entity formally came into existence on 20 December 2017. Fieldwork for this audit was undertaken between June and December 2017. This audit principally focusses on the period May 2014 to December 2017, while the department was known as DIBP, however some of the department’s responses to ANAO inquiries occurred after it became the Department of Home Affairs. For simplicity, this report refers to ‘the department’ to signify both the Department of Immigration and Border Protection and the Department of Home Affairs (except where the context requires a distinct reference). 1.7 The objective of this audit was to examine the effectiveness of the integration of the Department of Immigration and Border Protection (the department) and the Australian Customs and Border Protection Service (ACBPS). 1.9 The ANAO examined the department’s high-level arrangements for tracking the progress and financial status of the reform program, but did not examine the administration of individual projects within the program. 1.10 The announcement of the creation of the Home Affairs portfolio occurred after the audit had commenced and is not within the scope of the audit. 1.11 The audit was conducted in accordance with ANAO Auditing Standards at a cost to the ANAO of approximately $530,000. 1.12 Team members for this audit were Julian Mallett, Bradley Medina, Anne Kent, David Lacy and Paul Bryant. 1.13 There have been a number of internal and external reviews of aspects of the department’s administration of the integration and reform process. These are shown in Table 1.1. The ANAO has drawn upon these reviews during the audit and, where appropriate, referred to them throughout this report. Gateway reviews are required for major government-funded projects and programs.a They are conducted at key stages of eligible projects or programs. Prepared by Boston Consulting Group. Prepared by a DIBP’s contracted provider of internal audit services (Ernst and Young). Prepared by the RAND Corporation. Functional and efficiency reviews aim to comprehensively assess the efficiency and effectiveness of all aspects of an entity’s operations, programs and administration. Prepared by DIBP’s contracted provider of internal audit services (Ernst and Young). Note a: This includes projects with an estimated cost of more than $30 million or programs with a total estimated cost of more than $50 million. Review teams are appointed by the Department of Finance in consultation with the relevant entity. Source: ANAO from DIBP data. This chapter examines the high-level governance arrangements adopted by the department for the process of integrating the department with the ACBPS. The department established largely effective governance arrangements which were revised over time in response to emerging issues. The department’s record keeping continues to be poor and there was no evidence that the Minister was provided with written briefing on the progress of integration. The ANAO recommended that the department develop a strategy to enforce its requirement for contract evaluations. 2.1 The government made the decision to integrate the department and ACBPS in May 2014. Full implementation required the passage of legislation, and it was decided that the effective date for the formal creation of the new department, the creation of the ABF and the abolition of the ACBPS would be 1 July 2015. There was consequently a period of over 12 months in which the department had time to commence structural reorganisation and to prepare the staff from the respective entities for the change. 2.3 The overall program, known at the time as the Portfolio Reform Program, included two implementation plans: one for the period from the Minister’s announcement in May 2014 to June 2015 and the other for the period from 1 July 2015 onwards. The initial allocation of funds for the Portfolio Reform Program in the 2014–15 budget was $710.4 million.5 Additional funds were approved in successive budgets which brought the total funding for the Program to $977.8 million. Further detail about the funding arrangements is included in Chapter 3. 2.4 The conceptual structure of the Portfolio Reform Program is shown in Figure 2.1. the management of 38 major capability reform projects with a total value of $977.8 million. 2.7 The Integration Business Case was the key document detailing the overarching plan for the integration of the department and ACBPS. It also represented the department’s commitment to the government on what was to be achieved, by when, and the expected benefits of integration. Objective 1: Consolidate the Department of Immigration and Border Protection (DIBP) and the Australian Customs and Border Protection Service (ACBPS) as a single border organisation. Objective 2: Establish the Australian Border Force as part of the single organisation. Objective 3: Implement reform measures to strengthen Australia’s borders, tackle crime, and support economic growth and productivity by supporting legitimate trade and travel by reducing the burden of compliance. Objective 4: Bring forward submissions to Government to secure funding and establish the authority to continue the integration and reforms in the out years. 2.9 The Integration Business Case also outlined the benefits expected to accrue from integration. This is discussed further in Chapter 4. Did the department establish a sound governance framework? The department moved quickly to establish a sound governance framework for the integration. The framework was revised on a number of occasions in response to emerging issues, particularly with respect to the capability reform projects. The abolition of the Reform and Integration Task Force resulted in a loss of momentum in the reform process and a drop-off in internal communication with staff. The department recognised this and re-established a similar coordination mechanism. More recently, the department has engaged a consultant to review the framework. 2.10 Following the Minister’s 9 May 2014 integration announcement, a Portfolio Reform Task Force6 was created on 12 May 2014, a Portfolio Reform Board (PRB) met for the first time on 16 May 2014 and a new Executive Division, combining the most senior executives of the former department and the ACBPS, was ‘stood up’ in August 2014. In October 2014, the Secretary released a Blueprint for Integration which provided staff with details of the department’s mission, the new organisation, the organisational focus and the integration timeline. 2.11 The Integration Business Case outlined a proposed high-level governance framework as shown in Figure 2.2. Note: The Independent Assurance Partner was Third Horizon. 2.12 The role and functions of key parts of the framework are shown in Table 2.1. Provide strategic oversight, prioritisation, direction, and decision-making for integration, establishment of the new ABF and capability reform. Consultant (Third Horizon) engaged to provide an assurance and compliance function over the consolidation approach. management and integration of portfolio costings. Note a: The Assurance Partner was engaged by DIBP as a consultant for the period 19 June 2014 to 18 June 2016 with a contract value of $2 million The total paid to the consultant was $1.6 million. Due to the department’s concerns with the Assurance Partner’s performance, the engagement ended early in August 2015. Note b: The RITF was a division of the department with four branches and comprised approximately 100 people. 2.14 In April 2015, as the date of formal integration approached, the Executive Committee decided to adopt a governance model that ensured that ‘accountability for change outcomes is placed squarely with relevant business owners’ to better align capability delivery and business needs and approved a revised governance framework as shown in Figure 2.3. The approach to implementation did not have a clear sequencing or prioritisation logic. 2.17 Following consideration of the ‘readiness’ review, the Executive Committee decided upon a substantial revision of the governance framework as shown in Figure 2.4. The key change in the framework was the creation of a ‘Deputies’ Committee’ comprising all Deputy Secretaries and Deputy Commissioners to provide high level oversight of capability reform projects. In particular, emphasis was given to the establishment of program boards, each chaired by a Deputy Secretary. As identified internally, and in the 2016 Rand Report, a loss of momentum with Reform occurred following integration, so the SRG [Strategic Reform Group] was established to provide a central area to coordinate and oversight Reform. 2.19 The SRG was established in December 2015. It was disbanded in December 2016 and its functions transferred to the Enterprise Strategy, Reform and Performance division. 2.20 In December 2016, with the structural integration of DIBP and the ACBPS completed, the department engaged Deloitte to review its governance arrangements. The review found that while the various committees which form the governance structure are operating as designed, ‘the committee structure is not operating as effectively as it could to support enterprise-wide decision making.’ Since the review, the Home Affairs portfolio has been created, with consequential changes needed to governance arrangements. The department advised that it has used the review to inform the development of new governance arrangements. Was implementation progress reported to relevant stakeholders? Reporting to the Executive focused primarily on integration and organisational reform, with minimal coverage of progress in delivery of the suite of 38 capability reform projects. Following the identification of this as a gap in the 2017 Gateway Review, an Enterprise Transformation Blueprint was established to provide the Executive Committee with greater visibility over the progress of activity across the department. There was no evidence identified to indicate that written briefings were provided to the Minister on progress throughout the implementation process. 2.21 As noted previously, the Portfolio Reform Board (PRB) and the Reform and Integration Task Force (RITF) were the two key internal bodies managing and coordinating the reform and integration process until they were discontinued in April 2015.10 The ANAO examined the records of both bodies to assess the adequacy of the processes for reporting on progress. legal framework for the department and ACBPS and establishment of the ABF. 2.23 The RITF was a division of the department. In addition to its role in coordinating and managing the integration process, it also provided the secretariat function to the PRB. 2.24 The First Assistant Secretary (Senior Executive Band 2) of the RITF chaired a weekly meeting, known as the Portfolio Programme Management meeting. This body met some 40 times between July 2014 and May 2015. Senior Executive Service Band 1 officers were required to provide the RITF with a two-page weekly report (using a standard template) on ‘matters of significance’ within their areas of responsibility, which the department described as a ‘succinct summary of achievement over the last week and a forecast of planned management focus over the coming week’. 2.25 As noted at paragraph 2.5, the integration of the department and ACBPS comprised the integration of the ‘old’ department and ACBPS, the creation of the ABF as well as a suite of 38 capability reform projects with a value of $977.8 million. While the PRB and RITF documents examined by the ANAO demonstrated that there was routine reporting on organisational change and integration, there appeared to be minimal emphasis on reporting to the Executive about, and consideration of, progress in the suite of 38 capability reform projects. 2.26 While the ANAO located a small number of ‘project dashboard’ reports prepared during 2015, these carried the caveat ‘preliminary’ and were incomplete as they contained no financial status reporting. Ensure that the Executive Committee has visibility of critical project and program performance information through regular reporting. 2.29 In July 2017, the Enterprise Strategy, Reform and Performance division provided the Executive Committee with an Enterprise Transformation Blueprint which had been in development for some months. The purpose of the Blueprint was to provide the Executive Committee with a document which detailed eighteen ‘change initiatives’ across six ‘transformation outcomes’.14 For each initiative15, the Blueprint showed key milestones and whether each was complete, on track, a cause for concern or requiring corrective action. As a high-level document, while the Blueprint did not explicitly show the status of each of the 38 capability reform projects, it provided a consolidated high-level overview of ‘transformation’ activity across the department. Arrangements for monitoring the progress of capability reform projects is discussed in Chapter 3. 2.30 The Integration Business Case stated that one of the responsibilities of the PRB was to ‘report progress to the Minister’. In examining PRB documents and minutes, the ANAO found reference to officials having met with the Minister (or staff in his office) at various times but saw no written briefs to formally advise on progress, despite the commitments the department gave the government in the Integration Business Case that it would provide an assessment of the benefits of integration (see Chapter 4). Did the department establish communication plans? Detailed communication plans were established and implemented to support the integration process. ‘Pulse Check’ surveys were regularly taken to evaluate staff satisfaction and engagement with the process. 2.31 The department recognised that communication of the reform agenda to its staff would be a key to success. In July 2014, it commissioned Nous Group to assess the ‘change readiness’ of the former department and ACBPS and to recommend appropriate strategies. The consultant’s report found that while the workforce recognised that integration could bring future opportunities, change readiness and engagement in both entities was low and there were low levels of confidence in the ability of mid-level and senior leaders to achieve integration and reform. 2.32 Following the Minister’s announcement in May 2014, there was a range of activities to inform the department’s staff about integration. These included launches by the Secretary and Australian Border Force Commissioner, all staff emails, information packs for all staff and more than 200 ‘National Roadshow’ sessions held across Australia. In October 2014, the Secretary and Commissioner released the Blueprint for Integration which provided staff and external stakeholders with information about the department’s mission, organisation and focus as well as an indicative timeline. 2.33 A portfolio integration communication plan was developed in July 2015. 2.35 Surveys of staff engagement have demonstrated mixed results. A ‘Pulse Check’16 survey conducted in April/May 2015 found on the one hand, that ‘communication, when content is informative, timing is appropriate and regular, and feedback opportunities are provided (i.e. all-staff emails and weekly newsletters), has contributed to employee awareness and understanding of integration and reform outcomes’. However, the survey also reported that ‘Communications thus far have failed to provide relevant, targeted detail that is satisfactory to employees… Some of the workforce have felt overwhelmed by too many high-level, untargeted all-staff communications. Key messages in emails are lost in large bodies of text and are not effectively disseminated to employees by their leaders’. 2.36 In 2016, the department engaged the RAND Corporation to undertake an assessment of the ‘consolidation’ of ACBPS and the department. The RAND review report observed that there had been a ‘loss of momentum’ shortly after integration formally began and stated that ‘Several interviewees mentioned that the early road shows used to talk about the integration of the workforce had stopped and had not been replaced with any other engagement efforts. This was mentioned as a shortfall from all levels, from DIBP headquarters to the regional commands’. 2.37 The most recent Pulse Check (conducted in early 2016) showed that there had been increases in the proportions of staff who: will contribute to the department’s objectives where possible; understand their role in achieving the department’s role and mission; and are clear about how the implementation of the department’s objectives will impact them. However, there were significant decreases in the proportions of staff who: felt valued for their contribution; had confidence in the senior leadership to achieve the department’s vision and mission; and believed that communication between senior leaders is open and transparent. Has the department maintained adequate records? The audit found that the department did not maintain adequate records of the integration process. This finding repeats the outcomes of a substantial number of audits and reviews going back to 2005. The department’s own assessment is that its records and information management is in a critically poor state. The problems and their solutions are known to the department, and it has an action plan to address them, although numerous previous attempts to do so have not been successful. The department also experienced a loss of corporate memory due to the level of turn-over of SES staff, with almost half of SES officers present in July 2015 no longer in the department at July 2017. 2.38 In accordance with its usual practice, the ANAO sought the department’s assistance in locating key documents which were referred to in other documents. 2.40 Inadequate record keeping has been a persistent theme in the ANAO’s audits of the department. Since July 2010, seven audit reports of the department have identified issues with record keeping20, with three of the reports having made specific recommendations aimed at improving the department’s record keeping, to which the department agreed. … evidence of a record keeping system that is seriously flawed. It was difficult to pull together all DIMIA23 records on this case because relevant documents were kept in several different locations and as both hard copy and computer records. Throughout its investigations the inquiry found DIMIA file management practices poor, and there seemed to be no unified organisational approach to file establishment, access and control … File discipline was lax. This situation exposes DIMIA to risk. Similarly, an unpublished report found that the unlawful detention in June 2017 of two Australian citizens was caused partially by access to poor data. The Panel experienced considerable challenges in reviewing some of the cases presented by the Secretariat because of poor record keeping by the Department and some service providers. Since 2006 at least 17 reviews of various aspects of records and information management (IM) have been completed, all of which identify significant scope for improvement. An assessment of the collective review recommendations confirms a consistent theme throughout each; a lack of sustained follow through, which in turn has left the Department’s IM in a critically poor state. Failure to deliver on strategic objectives and priorities (risk and crisis management). 2.44 The submission noted that while two projects had been approved totalling $4.29 million26, this represented funding for 2016–17 only, and that an investment of $14.55 million over five years would be required to implement the recommendations of an earlier review. It also stated that should the Executive Committee wish to ‘expedite critical aspects of the Action Plan’, additional resourcing of two staff and $320 000 would be required. In May 2018, the department advised that this additional resourcing had not been provided. Excess exposure to litigation, FOI, investigations, audits and government accountability. 2.46 The Department of Home Affairs give priority to addressing its records and information management deficiencies including by implementing the Records and Information Management Action Plan 2016–20. Department of Home Affairs response: Agreed. 2.47 The Records Management Action Plan 2016–20 commenced in mid-2016 with a number of foundational activities having been completed. This included the introduction of mandatory online training, the development of a Business Classification Scheme and Taxonomy, and completed transition to a single records management System (TRIM RM8). There will be ongoing reviews undertaken to assess record keeping practices in high-risk business areas which will commence in 2018–19. Did the department develop an integration risk management plan and strategy? The department initially identified possible risks to effective integration. However, regular reporting against those risks ceased when the Reform and Integration Task Force was disbanded. 2.48 The Public Governance Performance and Accountability Act 2013 and the Commonwealth Risk Management Policy27require all Commonwealth entities to establish and maintain appropriate systems of risk oversight, management and internal control. 2.49 Prior to integration, both the department and ACBPS had established risk management frameworks in accordance with policy and legislative requirements. After the integration announcement in May 2014, the department recognised that the process of integration would present its own set of risks. The Integration Business Case included a list of these integration risks and noted that once the two entities were integrated, there would be a need for the separate development of an Enterprise Risk Management framework in relation to ‘business as usual’. 2.50 The 16 integration risks that were developed are shown in Table 2.2. Reform and Integration fails to meet its objectives due to complex interdependencies. Industrial disharmony negatively impacts the achievement of portfolio reform and integration outcomes. Insufficient organisational capacity and capability to sustain integration and reform activities. Technology architecture and systems integration does not support the delivery of Portfolio outcomes. Reduction in reform and integration benefits due to divergence between programme objectives and changing organisational priorities. Resistance from external stakeholders and partners prevents or delays the agreed reforms. Design and implementation of the foundation and functions of the ABF fail to meet Government intent. Failure to achieve timely legislative reform. Inadequate change leadership, due to lack of experience or failure to engage with reform & integration. Integrity and fraud exposure arising from reform and integration activities. Deterioration of enterprise information quality and data integrity. Change adversely affects staff morale, productivity and commitment to the organisation. Funding for future reform initiatives not released in a timely manner. Effective portfolio integration is undermined by cultural dissonance. Loss of critical skills and subject matter expertise impact achievement of reform and integration objectives. Reduction in border operations and security during reform and integration activities. 2.51 Each of the risks was assigned to a Risk Lead at the SES officer level. The status of each risk was reported through the RITF to the PRB. As with other aspects of the RITF’s work, integration risk reporting ceased in April 2015 when the RITF was disbanded and the PRB was subsumed into the Executive Committee. 2.52 Project-level risks for capability reform projects were included in the Project Initiation Document (PID) for each project, and are managed in centralised project risk registers. High and extreme risks are extracted into the project monthly status reports for executive reports and governance bodies. What external assistance did the department engage to assist with integration? The department made extensive use of consultants to assist it with the integration process. Despite a requirement to evaluate contracts upon completion, this did not occur in 31 out of 33 (94 per cent) contracts with a value of more than $1 million examined by the ANAO, and therefore it is unclear whether these services represented value for money. 2.54 All entities are required to report details of contracts that they enter into on AusTender, the Australian government’s procurement information system. Consultancy contracts are required to be indicated with a ‘flag’.29 Figure 2.5 shows the value of consultancy contracts entered into by the department since 2007–08. The total value of consultancy contracts entered into by the department between 2007–08 and 2016–17 was $358.9 million. Note: Data for years prior to integration includes ACBPS and the department combined. Source: ANAO analysis of AusTender data. 2.55 Figure 2.5 shows that the value of consultancies entered into by the department increased significantly following the government’s announcement of integration, although the department was not able to identify which consultancy contracts related to integration (as opposed to its ‘business as usual’). It is DIBP policy that an evaluation of the contract and contract outcomes must be undertaken at the end of each contract. The evaluation should encompass the overall performance of both the contractor and DIBP. Has the contract facilitated the achievement of the activity identified in the approach to the market? Did the contract achieve its objectives? Did the contract deliver quality outcomes? How well did the performance regime work? Did the management arrangements established by DIBP facilitate achievement of contract outcomes? 2.58 The CMM requires staff managing contracts to ‘document the lessons learnt’ and ‘keep sufficient records’, which includes providing a report ‘in which conclusions are supported by the data’. had a contract value of $1 million or greater. 2.60 There were 33 consultancies with a total value of $83.3 million which met these criteria. Of these, only two (with a total value of $8.1 million) had been evaluated as required by the CMM. The Department has already commenced a project to implement an end to end Procure to Pay system which will enforce the requirement and more importantly support consideration of past performance as part of the ongoing procurement process. 2.63 The ANAO examined the Project Initiation Documentation (PID) for the Procure to Pay system. While the system is intended to ‘provide improved information and analytic capability for contract management’, the PID is a project planning document and does not refer to the CMM requirement for evaluation of contracts. 2.64 The Department of Home Affairs develop a business assurance approach to enforce its requirement in the Contract Management Manual that contracts be evaluated on completion. 2.65 The Department is currently implementing a Procure to Pay (P2P) solution that will provide an automated process to guide contract managers when commencing and finalising arrangement/contracts. This chapter examines the department’s governance and management of a program of 38 capability reform projects, delivery of efficiency savings and collection of additional revenue in accordance with its commitments to the government. The department is effectively managing a suite of 38 capability reform projects and has developed sound monitoring arrangements, although the Executive Committee does not have visibility of the overall status of individual projects. The efficiency savings committed to by the department were removed from its forward estimates and have thus been incorporated in the budget. However, the department has not verified whether efficiencies have been delivered in the specific areas which were nominated in the Integration Business Case. Based on progress to the end of December 2017, if collections continue at the current rate the department will only collect 31.6 per cent of the additional customs duty revenue to which it committed in the Integration Business Case. Has the department managed capability reform projects effectively? Following a series of governance changes in October 2015, the department established an effective Project and Program Management Framework which was broadly consistent with the intended future governance state described in the Integration Business Case. While some projects are facing challenges, it is too early to form a view about whether all will be delivered on time and within budget. 3.1 Since the governance changes in October 2015 outlined in Chapter 2, the Major Capability Division (MCD) has had carriage of the 38 capability reform projects. Figure 3.1 shows the department’s ‘capability lifecycle’ and the project governance arrangements that the MCD has instituted. 3.2 The functions of the key committees shown in Figure 3.1 are outlined in Table 3.1. oversee capability performance and expenditure. identify and develop strategies to improve project and program delivery. guidance to the CDC on performance issues, support identification, resolution and endorsement of outstanding decisions and risks. Source: DIBP: Programme and Project Delivery at a glance. 3.3 The 38 capability reform projects are grouped together into five programs. Table 3.2 shows the programs and the budget as originally approved by government. Capability to assist with the clearance of travellers, goods and cargo through Australia’s borders. Projects in this stream relate to processing of goods for customs purposes and facilitation of passengers. Capability to assist with the delivery of compliance, monitoring and status resolution activities for Immigration and Customs Operations, including ABF enforcement and operational activities. Capability to assist with the delivery of strategy and provide enabling services across the agency to support the delivery of all functions. Capabilities include property, payroll, procurement services. Capability to assist with the gathering of data and information from all sources so that it can be analysed and assessed. These capabilities support risk assessment, prioritisation, targeting and resource allocation for immigration and cargo processing. Capability within the department related to ICT infrastructure, end user computing, software developments and management, including project management and delivery services. resource management strategy and plan. 3.5 ANAO review confirmed that there is a Project Initiation Document (or project plan) for each project and that the costings were agreed by the Department of Finance in accordance with usual practice. 3.7 The ANAO did not attempt to verify the accuracy of the dashboards but noted that for the purposes of the individual program boards, they provide a comprehensive overview of the status of the capability reform program. two projects have been cancelled, one is under review, one is closed and one is yet to commence. Has the department delivered required efficiency savings and additional revenue? The department has been subject to budgetary reductions equal to the efficiency savings required by government. It has not verified whether efficiencies were achieved in the specific areas identified in the Integration Business Case. By the end of December 2017, the department had only delivered 42.2 per cent of the additional revenue to which it committed in the Integration Business Case, and if collections continue at the current rate, it will only collect 31.6 per cent of the additional revenue. $498.0 million in additional revenue through improved customs duty compliance (known as revenue uplift). Source: ANAO analysis of DIBP data. other contracts: reductions in spending33 on non-ICT contractors and consultants. 3.11 Table 3.4 shows the efficiency savings proposed as a result of the Efficiency Delivery Strategy. 3.12 In the 2015–16 budget, the government reduced the department’s budget funding for existing operations by $270.1 million over 2015–16 to 2018–19.34 This was to partly offset the new expenditure on the capability reform projects. In that sense, the proposed savings were factored into the budget process. The ANAO examined whether the department had taken steps to implement the Efficiency Delivery Strategy as proposed. 3.13 Since 2014–15, the department has not undertaken any detailed analysis to confirm that the efficiency measures which were directly costed and agreed in the Integration Business Case have been completely implemented or achieved at the rate proposed. This is inconsistent with the commitments made to government in relation to the achievement of efficiency savings. undertaken a workforce requirements analysis and functional accountability review that examined, amongst other things, span of control. 3.15 These activities were all agreed actions as part of the original Integration Business Case. 3.16 As the government’s second-largest collector of revenue behind the Australian Taxation Office (ATO), the department collects a range of duties, taxes and other charges. The most substantial of these is Customs duty, which totalled $14.2 billion in 2016–17. Like the ATO, the department has a responsibility to ensure that companies and individuals comply with their payment obligations. ‘Compliance’ covers a range of regulatory activities intended to collect duty that has not been paid, whether inadvertently or as a result of deliberate evasion. Revenue uplift was the term given in the Integration Business Case to a number of initiatives aimed at improving the effectiveness of the department’s compliance efforts. At the time of integration, ACBPS’ compliance activity resulted in additional duty collection of approximately $29 million per year. 3.17 In April 2014, prior to the public announcement of integration, the department had proposed to the government that it would improve revenue collection and compliance and collect an additional $346.6 million over the six years from 2014–15 to 2019–20. 3.19 Table 3.5 details the amount of additional revenue that the department ultimately committed to collecting in each year. 3.20 After the initial revenue uplift commitment in April 2014 (but before the further commitment in April 2015), the Executive Committee had received Monthly Finance Updates in March 2015 and April 2015 which highlighted trends indicating that the initial uplift commitment would not be realised. By May 2015, the Monthly Finance Update advised that ‘the annual revenue uplift will fall well short of the full year forecast’. 3.21 An April 2015 report entitled Revenue Uplift – the way forward noted that targets were not being met and growing shortfalls were developing. The report stated that development of the initiatives had encountered ‘technical design difficulties’, and that the only initiative that had been fully completed to date had raised doubts about how effective it would be in predicting non-compliance that was not already known to ACBPS. delays in implementing the ‘initiatives’. 3.23 In October 2016, revenue uplift was discontinued as a separate capability reform project and the responsibility was transferred into ‘business as usual’ operations in the Customs Compliance branch. An End Project Report completed to close out the process noted that there had been difficulties in developing the proposed fourteen initiatives, and another February 2016 report stated that ‘the predictive analytics models originally planned to be developed by the Task Force were not feasible’. The Customs Compliance branch has continued with revenue compliance work, but work on the originally envisaged advanced analytics approach and the ‘fourteen initiatives’ appears to have ceased. 3.24 In the meantime, revenue uplift collection results have continued to be reported to the executive. Figure 3.2 shows amounts of additional revenue actually identified for collection compared with the commitment given to the government in April 2015. Note a: The peaks shown in February to April 2017 are due to a small number of large value transactions associated with elements such as tobacco product imports. Figures shown are additional to the baseline collection of approximately $29.0 million per year (see paragraph 3.16). 3.25 By the end of 2016–17, the amount of additional revenue collected since July 2014 was $80.3 million compared with a commitment for the same period of $190.2 million (42.2 per cent). If revenue uplift collections continue at the same average monthly rate as to date ($2.2 million per month), the shortfall by the end of 2019–20 will be $340.6 million and the department will have achieved less than a third (31.6 per cent) of its commitment to the government. Figure 3.2 shows that the revenue uplift commitment was met in six of 36 months in the period 2014–15 to 2016–17. As the performance of Customs Duty to budget is in line with expectations (variation of <1%) to the published PAES 2016–17 budget numbers, the department considers we are achieving our revenue targets. 3.27 The department’s advice is inconsistent with both the Integration Business Case and the department’s specific commitment to increase the revenue collected from its customs duty compliance activity, to which the government agreed as part of the offsets to the costs of integration and reform. This chapter assesses the department’s ability to demonstrate the benefits of integration. In the Integration Business Case, the department committed to a detailed Benefits Realisation Plan. The plan was not implemented despite several reviews identifying this omission. As a result, the department cannot demonstrate to the government that the claimed benefits of integration have been achieved. Can the department demonstrate to the government the benefits of integration? The department cannot demonstrate that the claimed benefits of integration have been achieved because it did not implement the Benefits Realisation Plan which formed part of the Integration Business Case. The decision to support and fund the Programme hinges, among other things, on whether or not the investment in this major transformation can be justified. A key question that needs to be considered is whether the envisaged Programme objectives and outcomes will deliver benefits that justify the investment that Government will be asked to make. 4.2 A Benefits Realisation Plan was included as an attachment to the Integration Business Case. Ten key program benefits were specified, forming four overarching benefits. These are shown in Table 4.1. Source: Integration Business Case, Benefits Realisation Plan. 4.3 The Plan also listed 27 ‘proposed measures of benefit’.36 The department advised in March 2018 that it had not collected any data in relation to these measures. 4.4 The Benefits Realisation Plan gave a detailed description of the benefits management framework, including the approach and process, governance and reporting. The Plan required the development of the documents and reports outlined in Table 4.2. Documents expected benefit, including categorisation, quantification and timing of realisation. Documents logical linkage between deliverables, outcomes and benefits. Provides an explanation of the change to expected benefits for a program or project. When a Benefit Profile is updated and as a result the expected realisation value changes by more than the agreed tolerance level. Provides the basis of quarterly reporting of benefits being realised by business-as-usual areas. 4.5 Despite establishing a detailed benefits management framework (including the development of blank templates for each of the components in Table 4.2), this work was not progressed until 2017 and, as at the time of audit, none of the documents or reports outlined in Table 4.2 have been finalised. 4.6 A number of reviews over aspects of the program have stated that there was no evidence a benefits management framework had been implemented as outlined in Table 4.3. … at the program level, the benefits management plan, including arrangements for reporting and monitoring of benefits, is still at the outline stage. The review team understands the pressures on the task force staff, but considers that priority attention will need to be given to this issue relatively soon. (Recommendation: ‘Complete the detail of the overarching program level benefits management plan’). The Benefits Realisation Plan has not been updated to reflect the post-integration organisational environment. A benefits management plan was developed and included in the Business Case. The review team did not see evidence that the Program was actively tracking benefits. Lack of, or inconsistent approach to benefits realisation will make it difficult to reallocate capital requests on an objective basis: a benefits assessment has not been consistently applied or implemented to compare the achievement of benefits put forward in the Cabinet Submissions. There are a number of areas that require early attention. These include benefits realisation, where the identification and measurement of program benefits remains at an early stage. The review team was concerned that if this matter is not addressed in the shorter term, the demonstration of program benefits would become even more difficult at later stages in the Program. Source: ANAO from review reports. While much has been achieved, it is a work in progress and as such I expect that processes will mature over the coming year. At this point, we have established benefits for each of the Programmes and all bar one has provided the detailed Benefit Profile information. 4.8 Notwithstanding this advice, the Benefits Realisation Plan included in the Integration Business Case and approved by government has not been implemented. 4.9 On 22 September 2017, the Department advised the ANAO that it was moving from a benefits realisation model to an ‘outcomes measurement model’ and provided two related documents: the Measures of Success and the Future Operating Model. this in turn will enhance programme prioritisation and decision-making by tying programmes of work to tangible business changes and impacts. The [Gateway] report acknowledges the work done to identify benefits at an individual work package level. A Benefits Management Approach has been released for the integrated DIBP. The Strategic Reform Group has developed an Outcome focussed view of Strategic Reform and have drafted Measures of Success…The Investment Programme is based on integrated delivery and governance structures to focus more on delivering business outcomes and less on original ACBPS Reform structure. In terms of FOM implementation, it was never officially rolled out to the broader Department. Key SROs [Senior Responsible Officers] received a copy however feedback was that the document was too long and difficult to digest. 4.14 The Measures of Success and the Future Operating Model were the ‘deliverables’ of a contract that the department entered into with a consultant (the Boston Consulting Group). The contract value was $4.7 million and the Boston Consulting Group was actually paid $3.7 million. This contract was not evaluated at its completion as required. The current 20 measures of success developed by the Boston Consulting Group—referred to as the “measures of success”—are largely operational metrics, and as such do not consider the full strategy-to-resources continuum… As none of the measures being developed can be considered to be strategic, assessing strategic outcomes will likely be problematic. Furthermore, with such measures, assessing whether the overarching strategy of the DIBP is being achieved will also likely not be possible. 4.16 At the time of the audit, the department has not provided the government with any assessment of the benefits of integration. Additionally (as noted in Chapter 3), while the efficiency savings to which the department committed were delivered through reductions in its base funding, the department cannot identify specifically what efficiencies have been delivered and in what areas. 4.17 The Department of Home Affairs implement the Benefits Realisation Plan which was included in the Integration Business Case to allow the government to assess whether the claimed benefits of integration have been realised. 4.18 The Department acknowledges the need for an enterprise and strategic approach to benefits management, tracking and harvesting that goes beyond project delivery. While project level benefits are still maturing, the Department is working with key internal stakeholders to develop an approach, framework, and accountabilities for the tracking of benefits at an enterprise level. 4.19 The Department proposes to develop the program level benefit plans and profiles incorporating key elements of the Integrated Business Realisation Plan recognising the changed circumstances and responsibilities with the stand-up of the Department of Home Affairs. This will enable effective reporting using baselines and measures that are appropriate and targeted, and enable the Department to report on existing strategic objectives. forecast end date is as revised by the department as at 31 December 2017. 1 The NCOA was established in October 2013 by the newly elected government to ‘review and report on the performance, functions and roles of the Commonwealth government.’ The key objective was to make recommendations to return the budget to a sustainable surplus of 1% of GDP by 2023–24. 2 The Australian Customs and Border Protection Service would be abolished. 3 Subject to the passage of legislation by the Parliament. 4 DIBP defines capability as ‘the capacity and ability to achieve and sustain a desired effect or output in order to meet one or more of the Department’s strategic objectives’. A capability may include the acquisition of capital equipment (such as a boat or a CCTV system) but can also include training, facilities, information and systems, equipment and supplies, support and laws, policy, procedures and administration. 5 All funding approved for reform and integration was offset in accordance with government policy. Funding comprised offsets through increased revenue collection, efficiencies and redirection of existing funding. See Chapter 3 for further information. 6 The Portfolio Reform Task Force was renamed the Reform and Integration Task Force (RITF) in November 2014. 8 Capability Reform Programme Readiness Review, June 2015. 9 The chart shown in Figure 2.4 is the governance framework that existed at the time of the ANAO audit and differs in a few minor respects from the one that was approved in October 2015. 10 The Integration Business Case did not specify at what stage the PRB and RITF should be disbanded. 11 Information and Communications Technology. 13 Program boards form part of the current governance framework: see Figure 2.4. 14 These were immigration, border, trade, intelligence and identity, technology and workforce and corporate. 15 ‘Initiatives’ included the 38 capability reform projects, initiatives being ‘executed through everyday branch activity’, ‘emerging’ initiatives, areas of Ministerial priority and other investment proposals under consideration for internal capital funding. 16 The survey had 3,300 responses from DIBP staff and also included focus groups with over 200 employees in NSW, VIC, QLD, SA, WA and the ACT. 17 The ANAO found numerous non-personal network drives with names which give no indication of their contents such as ‘Random useful stuff’, ‘old stuff’, ‘Ministerial stuff’ and simply ‘stuff’. 18 The website of the National Archives of Australia states that ‘a network drive is not a records management system’ and lists several risks in using it as such: records stored in network drives can be easily altered or deleted by anyone who has access to the drive; it is difficult demonstrate the authenticity, integrity and trustworthiness of uncontrolled records in network drives; metadata is often missing and there are no links between documents and their business context; poor management can result in large volumes of uncontrolled information which is difficult to manage and takes up network space; it can be difficult to find relevant records, posing a reputational risk; and it can be difficult to identify the status or version of information. 19 The ANAO compared the 1 July 2015 and 3 July 2017 SES organisation charts. Of the SES Band 3 (Deputy Secretary) officers shown on the July 2015 chart, 50 per cent had left the organisation by July 2017. At the SES Band 2 (First Assistant Secretary) level, 61 per cent had left and at SES Band 1 (Assistant Secretary), 43 per cent had left. Overall, 47 per cent of SES officers present in July 2015 were no longer in the department in July 2017. Some (but not all) of the consequential vacancies were filled. 20 No.21 2012–13 Individual Management Services Provided to People in Immigration Detention; No.13 2014–-15 Management of the Cape Class Patrol Boat Program; No.47 2014–15 Verifying Identity in the Citizenship Program; No.13 2015–16 Managing Compliance with Visa Conditions; No.16 2016–17 Offshore Processing Centres in Nauru and Papua New Guinea: Procurement of Garrison Support and Welfare Services; No.32 2016–17 Offshore Processing Centres in Nauru and Papua New Guinea: Contract Management of Garrison Support and Welfare Services; No.39 2016–17 The Australian Border Force’s Use of Statutory Powers. 21 Inquiry into the circumstances of the immigration detention of Cornelia Rau, M J Palmer, July 2005. 22 Ms Rau was a permanent resident who was detained in March 2004 as a suspected illegal immigrant for about 300 days. 23 At that time, DIBP was the Department of Immigration and Multicultural and Indigenous Affairs. 25 The submission noted that this figure is growing at an estimated 30 per cent year on year and that ‘TRIM is aging technology which the Department is quickly outgrowing’. 26 The department advised in March 2018 that the budget for these projects was now $6.14 million. 27 Commonwealth Risk Management Policy, Department of Finance, July 2014. 29 The ANAO’s examination of AusTender data showed that some contracts which were almost certainly consultancies were not flagged as such. The department accepted that there have been discrepancies in AusTender reporting of consultancy contracts and advised that it has instituted processes to scrutinise contracts more closely to better identify which ones were consultancy contracts. Consequently, in addition to those consultancy contracts which were flagged as such by DIBP, the ANAO has included contracts whose description included ‘consultant’, ‘review’ or ‘evaluation’ (and variants thereof). Equally, however, some contracts flagged as being consultancies are probably not. 30 This was the date of the government’s announcement of the integration of DIBP and Customs. 31 The consultancy worth $17.6 million was ‘terminated for convenience’ on 30 June 2015 at the end of the first year of a two year contract. By that time, $17.1 million (97.1 per cent) of the contract’s value had been paid. With respect to the consultancy worth $2 million, the department’s concerns about its performance caused it to revise the scope of the contract. The department advised that this reduced the cost of the contact by approximately $80,000 (four per cent of the contract’s value). 32 Under DIBP’s project management framework, an exception report must be prepared when there has been a significant change to the project’s scope, milestone/schedule, finance, quality, risk, issues, resource, benefits and dependencies. Exception reports are provided to the Senior Responsible Officer. 33 Expenditure to be reduced by 2.5 per cent in 2016–17 and 5 per cent per annum after that. 34 The $263.6 million shown in Table 3.4 was adjusted to $270.1 million in the budget process. 35 The April 2014 and April 2015 commitments to increased revenue collection were based upon a March 2014 Value Determination Study by a consultant engaged by ACBPS, and a September 2014 report entitled Delivering the Revenue Commitment. These reports examined ACBPS revenue compliance work in earlier years and developed a number of ‘initiatives’ which it believed would deliver the additional revenue proposed. Some of the initiatives required the development of ‘predictive analytic models’. The March 2014 Study proposed ten initiatives and the revised September 2014 report proposed fourteen. 36 Examples of proposed measures of benefit were: number of export and import entries cleared; proportion of cargo found to violate fair trading practices or that exploit Australia’s resources; proportion of asylum-seeker care activities found to meet policy requirements and proportion of workforce effort expended on low value or low priority tasks.
2019-04-21T15:01:19Z
https://www.anao.gov.au/work/performance-audit/integration-department-immigration-and-border-protection-and-australian-customs-and-border
The median home value in Punta Gorda, FL is $237,250. This is higher than the county median home value of $181,300. The national median home value is $185,800. The average price of homes sold in Punta Gorda, FL is $237,250. Approximately 57.24% of Punta Gorda homes are owned, compared to 15.21% rented, while 27.55% are vacant. Punta Gorda real estate listings include condos, townhomes, and single family homes for sale. Commercial properties are also available. If you see a property you’re interested in, contact a Punta Gorda real estate agent to arrange a tour today! Learn more about Punta Gorda Real Estate. A little piece of Paradise in the sought after Deep Creek Community is available to new owners. This lovely home is nestled among several trees on a corner lot and offers 3 bedrooms, a craft room with closet for extra storage, 2 bathrooms, a large living with gorgeous wood floors, and a spacious family room a formal dining room .The kitchen has granite countertops, custom oak cabinets and stainless steel appliances. There is an island with a sink which provides additional storage space, the cozy breakfast nook has French doors leading to the screened lanai pool area. The spiral staircase leads to a loft overlooking the living room. This is defiantly someone's dream home...don't wait, come see. The Florida easy breezy lifestyle can be yours for the taking. A little piece of Paradise in the sought after DEEP CREEK Community is available to new owners. This lovely home is nestled among many trees on a Corner Lot and offers 3 bedrooms, a craft room with closet with which could also be used as an office, 2 bathrooms, a large living room with gorgeous wood floors ,a formal dining room and a spacious family room. The kitchen has granite countertops, custom oak cabinets and stainless steel appliances, there is an island with a small sink which provides additional storage space ,the cozy breakfast nook has French doors leading to the lanai and pool area. The spiral staircase leads to a loft area overlooking the living room. This home is of the split bedroom design with the master bedroom with private bathroom on one side of the home and the guest bedrooms with bathroom on the other. Step outside and relax in the fabulous pool ,enjoy the scenery from the lanai and just live that FLORIDA LIFE STYLE. Incredible Move in ready Home in a Golf Course Community !!!! This house has a recent 80K interior remodel and is ready for the new owner! New 16 seer A/C and duct work, new hot water heater, house has been re-plumbed, upgraded kitchen and baths with granite and tile. Master bath to Die for with Dual Sinks and walk in Roman Shower. Master bed Overlooks Pool & has Dual Walk in Closets. Guest Beds even have walk in Closets. Lots of STORAGE in this one. The pool features a new programmable heater and it has been resurfaced with a Pebble-Tec finish. The sliding doors have hurricane film and the windows were replaced with new, high efficiency vinyl. Full Hurricane Protection shutters in place. To top all that off there is extensive landscaping, pool pavers, a family room wet bar and more! Close to Shopping , Dining , Boat Ramps, Parks and Medical. What more could you ask for? How about NO EXPENSIVE FLOOD INSURANCE REQUIRED !!!!! Homes Like this Don't Last Long !!!!! Charming Move-In-Ready home on a quiet cul-de-sac in desirable Deep Creek. Highly desired open floor plan with new plank porcelain tile floors (2019). Tile floors throughout the home. The vaulted ceilings create a bigger more spacious feel. Home features the preferred split bedroom layout for Master Suite privacy. Expansive master suite offers a seating area with nice view of the heated pool perfect for peaceful reading or home office area. The well-equipped spacious kitchen has newer stainless appliances (2018). This home has the popular layout and features of a brand-new home. Easily accessible laundry room with utility sink & cupboards. City water and sewer. Whole house recently re-plumbed (2019). Newer AC unit (2011). Complete replacement of AC ducts (2018). Covered & screened lanai with private pool has ample room for furnishings & overlooks the spacious back yard with canal & greenbelt that provides an ideal outdoor private living space. Includes newer washer and dryer (2019). The quiet neighborhood is centrally located close to all shopping, major roadways, restaurants, golf and beautiful Gulf Beaches. Front and center in Burnt Store Marina! This lovely 2-bedroom marina view condo is in the heart of Harbor Towers, one of Burnt Store Marinaâs most popular neighborhoods. Youâll enjoy boating and wildlife from all your front windows. Whip up a casual meal in your beautiful kitchen featuring solid wood cabinets, granite counters, and a breakfast bar. Entertain guests with a spacious open floor plan featuring new diagonal white porcelain tile throughout all rooms. AC/HWH new in 2016. Watch manatees from your master bedroom. Begin your morning walk around the Marina from your lanai and enjoy a cool drink at the end of the day as sunset skies entertain you. Join a golf league, or book club, shopping trip, luncheon fashion show, boat or fishing trip with your Harbor Towers neighbors, the friendliest people in Burnt Store Marina. This is resort living at its best, in the largest deep-water marina on the southwest Florida Gulf, also offering a challenging executive golf course, pickle ball, tennis, fitness center, public boat launch, three on site restaurants, a ships store, kayak and golf cart rentals, Freedom Boat Club. Minutes from open water and 10 nautical miles to Boca Grande Pass, come live the Florida vacation dream. Investors, Harbor Towers allows weekly rentals. These highly sought-after units do not last long. Comes furnished. This Marlin Run villa is simply gorgeous! Remodeled and furnished with 2 beds/2 baths and private garage, inside youâll find an updated kitchen with 42â hardwood cabinets, granite counters, a long breakfast bar, pendant lighting above, extra recessed lighting, updated appliances and a custom side buffet with stone top. New tile flooring in the living and dining area and attractive paint selections provide a gracious ambiance under the volume ceilings. The master bath was redesigned for an expanded walk-in shower and features new vanity with granite top, new lighting and plumbing fixtures. The light and bright lanai is enclosed with sliding glass doors and expands the living space as a delightful Florida room. Accordion hurricane shutters seal it up when youâre gone. And one of the nicest features is the extra outdoor pavered patio! With room for a table and chairs you can enjoy the outside with a peaceful tropical backdrop! Welcome to the friendly neighborhood of Windmill Village. A resident owned deeded 55+ gated community with marina located in Punta Gorda. This charming 2-bedroom 2-bathroom waterfront home has 1,510 square feet of living space and is handicap accessible with exterior wheelchair lift . As soon as you enter you notice how spacious and bright this home is with high ceilings and skylights to let in natural light. The kitchen features wood cabinetry, breakfast bar and is open to the dining room and family room. The living/dining room area is carpeted with great views of the bay. The 12x13 Florida room is great for entertaining guests. Spacious master suite is carpeted with walk-in closet and the master bath with dual sinks, additional mirrored vanity area, large walk-in shower and tons of storage. Guest bedroom with ceiling fan along with full bath. Laundry room with built in desk area. Bring your boat and leave it at your own dock out back. Home also features wide hallway, storage shed and plenty of parking room. The Windmill Village community features 2 Marina's with free boat slips and access to the Gulf. Woodworking shop, private boat ramp, Post Office, trailer storage yard, upscale beautiful Community Center for all your social events. Clubhouse has billiard room, library, and banquet hall. Tiki hut by the heated pool. Price does not include Windmill Village park share & bond buy-in of $21,285 (returned when you sell). Home is completely spotless and beautifully landscaped. Schedule your showing today! Meticulously maintained pool home built by Quality Builders. This 3 bedroom 2 bath home features a split floor plan for privacy when guests come to visit. Both guest bedrooms feature walk in closets and the guest bath has access to the pool and lanai. The main guest room also has a sliding door leading out to the pool. The Mater Suite has French door access to the lanai and features his and hers walk in closets, large bathroom with soaking tub and separate shower, double sinks, seated vanity area and large linen closet. The eat in kitchen is wide enough to include a dinette set and has a raised bar for additional seating. This home is nestled in a quiet section of Deep Creek and is close to major highways, airports, shopping, hotels and hospitals. Make this your home and enjoy the Florida lifestyle. BSI BEAUTY W/CANAL BASIN VIEW & SAIL ACCESS - Custom-built, 3 bed/2 bath, waterfront home in Burnt Store Isles w/lovely canal basin view & sailboat access to Charlotte Harbor. Inside, the home features a formal living room & dining room plus a separate family room with almost every room in the home offering a pool & canal view. Architectural details include crown molding, tray ceilings in living room, master & family room & disappearing sliding glass doors plus zero-corner sliding glass doors in the family room w/all sliders extending the living space out onto the lanai. The kitchen features granite counters, a breakfast bar, an abundance of cabinet & counter space plus a closet pantry. The master suite offers private access to the lanai & a spa-like master bath w/his & hers walk-in closets, dual sinks, tiled shower & separate garden tub. The split bedroom floor plan boasts large guest rooms - each w/a walk-in closet. Outside, the oversized, tile lanai features an in-ground, heated pool w/attached spa. Relax in the shade or soak up some Florida sun out here. The concrete dock w/10,000 lb boat lift is steps from the back door. Water & electric hook-ups are available dockside. Set sail on your latest adventure right from your own backyard. Home is meticulously-maintained & in move-in condition. Other amenities include oversized 2-car garage, security system, hurricane protection & lush tropical landscaping. Eastern rear-exposure ensures colorful sunrises over the canal. Make an appointment today. Home Sweet Home. This country beauty is situated on 6.25 acres in the Charlotte Ranchettes community in Punta Gorda. The manicured property is cross fenced, so bring your horses and have room for your big toys too. This is a 2006 custom built pool home featuring metal roof, tiled front porch with PVC porch railing, thermopane windows rated up to 150 mph wind with colonial hurricane shutters, generator hookup, overhead plumbing, R-30 insulation, tile and wood laminate floors throughout, a large game room with full bar and a half bath (pool table negotiable), very spacious kitchen with Corian countertops and wood cabinets with pull-out drawers, stainless steel appliances, walk-in pantry, breakfast bar, and rope lighting above cabinets for night lighting; laundry room has a built-in ironing board, and living room has a gas fireplace. Bedrooms have custom built-in closet systems, and one guest bedroom has a Murphy bed. Outside you can have fun in the large lanai and pool area. There is a pool bath and an outdoor kitchen/bar area with its own dishwasher and refrigerator. The pool is approx. 9 ft on the deep end and has a diving board and slide. There is even a big tiki hut to enjoy with a fan, rope lighting, and gas fire pit. There is a 16x24 pole barn, two sheds, and several carport covers for your boat and vehicles. Beautiful big oak trees and palms throughout the property provide shade. Downtown Punta Gorda dining, shopping, farmersâ markets, I-75 exit, and Punta Gorda Airport are all within a short drive. Move In Ready 3 bed, 2 bath, 2 car garage Pool Home on a cul-de-sac lot in desirable Deed Restricted Deep Creek. No flood insurance required. Home is located well maintained, quiet neighborhood close to everything. Features include vaulted ceilings, crown molding, a comfortable kitchen with granite counter-tops, breakfast bar, and a decorative tumbled marble backsplash. Enjoy a kitchen/family combo, living/dining combo, durable flooring thoughout, sliding glass doors, window treatments, and much more. Retreat to the master suite featuring sliders to the pool, walk in closets, decorative tiled shower, dual sinks with granite counter-tops. Lounge on the oversized covered/screened lanai with extra deck space measuring 23x18 or take a dip in the pool while overlooking nature. Other exterior features include a 2019 ROOF, fresh paint, hurricane protection, and a 2018 hot water heater. This home has curb appeal with mature landscape, concrete curbing, and an inviting screened entry. Enjoy the nearby community playground with tennis courts and the Deep Creek Golf Course just down the road. You'll love the convenience to I-75 or US-41, world class beaches, restaurants, grocery stores, etc....all of which are minutes away. Come see this newer(2018) Bright, Airy, Cozy and Clean home in Ridge Harbor! Youll love walking into the well lit Living area with the big front window that lets in lots of our natural light and from there you'll see the well designed Kitchen, with Upgraded Real Wood Cabinets, Moen Faucets, Granite Countertops, Beautiful Wood Laminate Flooring and 9.4 high ceilings that give it that spacious feeling. Both Bathrooms have Moen Faucets, Granite countertops and beautiful Tiled Walls and upgraded cabinets. This Home was built with Hurricane Impact Doors and Windows so you can relax if your out of town when the Windy season comes. The Back yard is Big with loads of rooms to add a deck, Lanai, Pool or Maybe that super sized Man Cave of a shed. Come live where it feels like your in the Country, yet your just minutes away from the I 75 Access, a Community Boat Ramp to Peace River and the very popular and active Punta Gorda, home to the up and coming Sunseeker Resort, Historic District, Bay Walk, Convention Center and countless unique Restaurants and Bars with entertainment or catch a Rodeo in Arcadia for some country fun ... Great Location without the GREAT BIG price of living Downtown. Come see it, you wont regret stopping by! Enviable corner unit offering gorgeous views of Southwest Floridaâs skyline at sunset over Colony Point Lake in the premiere community of Bella Lago at Vivante! The open, breezy feel of this luxurious second-floor unit welcomes you with high ceilings, an open floor plan, an elegant dining room, a relaxing living room and a balcony overlooking the lake. Youâll find the kitchen is nicely appointed with granite counters and solid wood cabinetry. Large sliders offer soothing views of nature and the lake from the breakfast nook, the living room and the master suite. When itâs time to retire, the master suite offers a spacious, quiet retreat featuring sliders to the balcony, a tray ceiling, 2 walk-in closets, a large walk-in shower, a soaking tub and a private water closet. Guests will enjoy their privacy as well in their own private suite featuring a walk-in closet and tray ceiling. Luxury resounds not only in the unit but throughout the entire community of Vivante. Enjoy the Southwest Florida resort lifestyle with beautiful landscaping and amenities such as a large lagoon shaped pool with a cabana, gazebo, hot tub and a spacious sundeck. There is even a separate lap pool plus a fabulous tennis center, a well-equipped fitness room and a grand clubhouse offering a billiards room, media room and so much more. When venturing outside of Vivante, enjoy Fishermenâs Village and the downtown area offering unique dining and shopping experiences. Fully furnished and ready for YOU! Key West charm blends with this Hi-Tech beauty to present an almost new coastal contemporary home with all the behind-the-scene bells & whistles, PLUS a relaxed Florida elegance only high-quality upgrades can deliver. Located in popular Punta Gorda Isles Section 12, for quick SAILBOAT access to Charlotte Harbor, the Gulf of Mexico & beyond. From the moment you drive onto the circular paver driveway, the unique striking impact entry doors set the stage for the beautiful details featured throughout. The first-floor level, with over 1800 s.f., lives large with an open layout, highlighted by a state-of-the-art gourmet Kitchen (& to-die-for Laundry Room) centrally located to Great Room & Dining. The vast array of windows & sliders welcome outdoor tropical splendor from your fabulous heated pool & spa, featuring a clear-view screen cage with no obstructing center rail. The first floor Owner Suite is just off a cabana-themed Lanai offering resort style relaxation, complete with firepit & perfect for al fresco dining. Plenty of space for hobbies, family & guests, the upper level with four additional bedrooms is accented by whimsical balconies with one suite large enough to be a second Master, media or game room. Convenient to historic downtown Punta Gorda & situated across from the St. Andrews Golf Course on a street of attractive homes. Walkability abounds with miles of pathways to experience this charming destination. You can have it all when you decide to make 2000 Deborah Drive your new home in paradise. Open concept Florida home with pool on a 1/4 acre lot on a cul-de-sac. If you enjoy privacy and the outdoors, you may love the long greenbelt view from your living room and pool, as well as the view of Lake Zappa from your pool and back yard. Many neighbors enjoy the Florida sunshine, fishing and kayaking the lake. This home has a large master bedroom with sliders giving you direct access to the pool. All 3 bedrooms have Outlast+ Rustic Wood PERGO Laminate floors. The rest of the home has ceramic tile and boasts many recent upgrades... LG Stove & Microwave, Hurricane roof downs and windows in 2018, lanai screen, light fixtures, flooring in bedrooms, hot water heater and paint in 2017. Call for a private showing and come see this one for yourself! Talk about convenience this home is about 7-8 miles to Harborwalk, Laishley Park Marina and Fishermenâs Village. This desirable END UNIT overlooks its included DEEDED DOCK and has recently (2017-2018) been TOTALLY UPDATED with the ownerâs personal attention to every detail. The attached Features Sheet covers all those details. Perfect for either a part- or full-time resident, this 24-unit community has very strong association financials and THE BEST POOL DECK VIEW in Punta Gorda Isles! Assigned carport, deeded dock, beautifully appointed living space, and a great community to boot! It doesn't get much better! And when Buckleyâs Pass is complete (later this year) youâll have a 20-25 minute cruise to the mouth of Alligator Creek in Charlotte Harbor. Beautifully maintained, fully furnished - turn-key - 2 bed/2 bath, waterfront condo in Windjammer Point in the heart of Punta Gorda Isles near St Andrews South Golf Course. Condo offers deeded dock, sailboat access to Charlotte Harbor, wonderful canal-basin view plus walk-out access to docks/waterfront. 2nd floor condo has open floor plan w/large living room, formal dining area and open kitchen with breakfast bar and a pass-through counter to lanai. Unit boasts large bedroom including a large master suite w/private access to the lanai, canal view and en-suite master bath w/walk-in closet. Other features include tiled entry w/coat closet, laundry room & adjacent walk-in storage room. LOTS of storage here, right in your unit! Condo amenities include an in-ground, heated pool. Soak up some Florida sun poolside. The unit comes w/one, assigned, covered parking space & deeded dock #11. Keep your boat docked just steps from your back door. Lots of guest parking. Windjammer Point is a financially-sound, beautifully-landscaped, condo community w/low HOA fees. Start living the Florida lifestyle here. When it comes to location this perfectly sized 1 bedroom 1 bath condo has it all. Encompassed by parks, and access to public tennis, playgrounds basketball, downtown dining, close to shopping and Fishermans Village; this is the definition of living the Florida lifestyle. The unit itself is a generously sized open floorplan design, with plenty of kitchen counter space. There is even a separate storage unit to keep all of your beach gear. Quiet condo complex located in a desirable area off Kings Hwy. This great second floor end unit offers two bedrooms and two baths with an open floor plan. The light and airy kitchen has a tiled breakfast bar with sink overlooking the spacious living area. The living room has new laminate flooring with sliding glass doors leading to the screened balcony. The master suite has a walk-in closet and master bath with stand up shower. This home has an inside laundry that includes a washer and dryer. The balcony overlooks a small pond and beautiful Florida landscaping. Centrally located between Tamiami Trail and Interstate 75. Close to shopping and restaurants. This home is a must-see! This Nature surrounded 3 bedroom 3 bathroom split floorpan home has all the space you need! As you walk in the front door into the living room you have the master bedroom just off to the left and the other two bedrooms to the right. The back patio area has been completely enclosed in the to add a maximum amount of square footage under air. The back rooms could have several different uses and there is more space than you would think. The Back right corner is used as a storage room. Walk out the back door into the yard and notice the space still available for a pool if desired! Dont forget all of the mature trees & landscaping throughout the property. Look closer and you'll see several different fruit trees including cherries, Avocado tree, Mangos, pineapples and more. You are only a 15 minute drive to Historic Downtown Punta Gorda, and closer to I75, for easy access north and south throughout the state. There are many different restaurants and shopping centers around Punta Gorda to enjoy. A new Dollar Store is 1/4 mile down the street for any quick grocery shopping needed to be done! Boat ramps are close by for boaters who want to be out on the water enjoying all that the Peace River, Charlotte Harbor and Gulf of Mexico have to offer! Some of the best beaches in the country are within a 45 minute drive away (Boca Grande, Englewood & Siesta Key), and don't forget about the countless golf courses around the area including Sunnybreeze golf course just a few minutes away! This could be your place in paradise! CUSTOM 3/2/2 POOL HOME IN HIGHLY SOUGHT AFTER DEEP CREEK WITH COUNTY WATER AND SEWER! Oversized lot located on cul-de-sac with private greenbelt views. Original owner-snowbird home occupied only 4-5 months a year and meticulously maintained. Beautiful open floor plan with an abundance of natural light, easy care hardwood and tile flooring, cathedral ceilings, transom windows, formal dining area and wall-to-wall slider leading to lanai, kitchen with breakfast bar, built-in pantry and casual dining area. Spacious master bedroom with lanai access, walk-in closet and private bath with dual sinks, garden tub and walk-in shower. Additional features include two large guest bedrooms, separate guest bath with walk-in shower, inside utility, security system and built-in safe. Outdoor entertaining area features covered lanai and 14â x 28â screened heated pool with mature landscaping ensuring privacy. Newer interior paint and exterior painted in 2017. Deed restricted community close to I-75, restaurants, shopping, schools, boating, golf and short drive to SWFL gulf beaches. Donât miss this opportunity! Call for your private showing today! This gorgeous estate home is situated on a beautiful corner lot with lush landscaping. Three bedroom/three bathroom home with 2508 square feet of living space. The double door entrance leads you to breathtaking views including a beautiful pool and private wooded preserve. Upscale travertine flooring runs throughout and the large kitchen is equipped with granite counter tops, 42 inch wood cabinets, travertine backsplash and stainless steel appliances. Relax in the master retreat that features a large garden tub, walk in shower and his and her sinks. Enjoy entertaining on the outdoor living oasis that includes a roman style pool overlooking a tranquil wooded preserve. The home has two car garage and a tile roof. Lush landscaping, floratam grass, palm trees surround this home and there is a private well for irrigation. Bring your bikes, golf clubs and Kayaks! The community has a bike path, walking trail, boat dock and is walking distance to a club house and Burnt Store Marina Golf Course. The low HOA fees and access Burnt Store area amenities will make this dream a reality! Second story condo in the HEART of DOWNTOWN PUNTA GORDA! Within blocks of the Charlotte Harbor and the Harbor Walk, Laishley Park, fabulous restaurants, outdoor dining and a waterfront Tiki bar, Farmer's Market, Events Center, festivals, shops and services. Stroll or bike the scenic Harbor Walk to tennis, parks, waterfront restaurants and Fisherman's Village. A parking space is included, though you won't have to drive to all of the attractions of downtown Punta Gorda. Second floor unit in a premier end location. This 55+ community has a heated pool, fitness center, meeting room, shuffleboard, and a patio and BBQ area. All in one of the most premier locations in Punta Gorda! CUTE HOME READY FOR SOME TLC, COME MAKE THIS 2/1/carport YOUR HOME! Waterfront view, country living but close to everything. Make it your little piece of paradise or investment property! Minutes from shopping, close to the airport, but quiet and private. Sold As Is with right to inspect.
2019-04-23T16:36:23Z
http://honeyisham.com/homes-for-sale/FL/Punta-Gorda
Holton’s rigorous curriculum and many extracurricular opportunities support and promote the "education of the mind, soul and spirit" of each individual student and prepare her to continue her academic growth at the college level. The goal in ninth grade is for students to adjust to the rigors of high school, to learn more about themselves, and to become involved in the life of Holton-Arms School and the larger world around them. Though this list may not sound like preparation for applying to college, girls develop the skills and goals that set the stage for a successful high school career and a smooth college application process. The objectives listed below reflect Holton's mission and school philosophy. Get involved! Explore the extracurricular life of Holton-Arms School. Try out for plays, join a club to explore your interests or hobbies, play an instrument, sing, write for one of our publications, paint. Get to know at least one adult (advisor, coach, teacher) in the community well to help you navigate the Upper School. Explore Washington, D.C. Bike the Capital Crescent Trail. Hike the Billy Goat Trail. Take the SAT subject test in Biology - if appropriate. Speak to your biology teacher. During the summer or as a sidelight on a family trip, swing by a college campus or two to begin to get a feeling for the types of schools that you find appealing - large, small, urban, rural, strong campus feeling, etc. In the sophomore year students should continue to take advantage of the opportunities that Holton-Arms School presents. Strong academic and extracurricular involvement continues to be the keys to thriving in high school and beyond. Get and stay involved - drama, music, sports, art, service, etc. You still have time to explore new activities. Stay balanced. Don't feel that you must do it all; do what you do well. Take the PSAT in October. Prepare by closely reading the practice materials distributed by Holton-Arms and by taking and scoring the sample test. If you have questions about some of your errors, speak to your math or English teacher. Consider taking an SAT subject test (in math, foreign language, chemistry) at the end of the year - but only if appropriate; speak with your teachers and college counselors for guidance. These colleges have a firm application deadline and notify the applicant of her admissions decision in late March/early April. Admissions decisions fall into three responses: admit, deny, or wait list. This acceptance decision is NON-binding - the student may choose whether or not to attend. Admitted applicants have until May 1st to decide whether they will submit an enrollment deposit. A few colleges have chosen to restrict their early action applicants from concurrently applying to any other college's early action or early decision program. This program is NON-binding. Students admitted under Single Choice Early could still apply under the Regular Decision plan to other colleges. The enrollment deposit deadline of May 1 is shared by U.S. colleges and universities. Students may only deposit at one institution, and violation of this policy can result in both institutions withdrawing their offers of admission. "Double-depositing" is also a violation of the Principles of Good Practice of the National Association of College Counseling (of which Holton-Arms is a member) and therefore can not be supported by the school. No matter what your financial resources, do not allow the cost of a college education to cut short your daughter's educational plans. Financial aid to attend college is available from a variety of sources - grant aid (institutional and/or outside scholarships) and self-help (loans and work-study funds). Once you submit information about your family's financial status, college and university financial aid administrators will take many factors into consideration to prepare a financial aid package for your daughter. Although some of the college price tags can be quite daunting -- many colleges are more affordable than one might think. Recent information sent by various institutions indicates that even families with substantial incomes may qualify. After financial aid or merit scholarships are taken into consideration, the net price the average undergraduate pays for a college education is significantly lower than the published tuition and fees. This financial aid form is available online beignning October 1 of senior year and is required in addtion to the FAFSA at many private colleges and by some scholarship organizations. 3. Seek balance between under-involvement and over-involvement as parent. Your role is supportive; child's role is central. 4. Assist your daughter with a preliminary investigation of colleges and admissions requirements; she will focus attention during spring of junior year and narrow a list of colleges during the summer of eleventh grade and fall of twelfth grade. 6. Encourage your daughter's self-appraisal (interests, abilities, social needs, values) as the key to finding a good fit. (Larger school or smaller; more urban or more rural; spirited or quieter; more intellectual or social; more liberal or conservative; etc.). 7. Discuss your daughter's course selection, standardized test results, and initial college interests with her college counselor. Then encourage your daughter to work closely with the college counselor throughout the process, informing her of any changing needs or concerns. 8. Be sure your daughter visits campuses - if possible while colleges are in session and before applying. Spring vacation of junior year is a great time. Summer visits can be good for interviews. 9. Try to reduce pressure about college admission rather than add to it. Do not make college choice the daily dinner topic. Candidates will be compared within the applicant pool and the number admitted will depend on the ratio of applicants to spaces in the freshman class, even if most candidates are "qualified." Each girl is encouraged to pursue admission to a college that provides an appropriate match for her unique intellectual abilities, passions, talents, and personal values. Throughout the Upper School sequence, students are guided by academic deans and advisors to maximize their learning experience and pursue choices that match their interests and abilities. During junior year our efforts become more focused on the skills that girls will need to create a resume, fill out applications, and undertake research to identify colleges of possible interest. Each girl and her parents meet with a college counselor to initiate an examination of the family’s priorities, and with help from the counseling staff, she will explore specific colleges and universities that may be a good match for her. Each year during the fall semester, Holton’s College Counseling Office hosts visits from approximately 100 prominent colleges, which allow girls to gather first-hand impressions from admissions officers. The college counselor uses these appointments to cultivate professional relationships and rapport with the representatives, and to further educate them about Holton’s distinctive strengths and rigorous academic offerings. By expanding their understanding of the Holton mission and curriculum, we seek to ensure the fullest and fairest assessment of our applicants during the admissions selection by the college representatives and their colleagues. Whether you are just learning about Holton or are already familiar with the school, we invite you to explore our website, visit our campus, or to contact us with any questions you might have. We welcome college representatives to visit our campus and spend time getting to know us. With approximately 120 college visitors each fall, we have found that most girls are not able to miss class for longer meetings. In order to provide more student accessibility to our college visitors, Holton offers a mini-fair setting from 1-1:30 p.m. on most weekdays. Up to five college representatives are located in an attractive gallery space at a time when students have a free lunch/clubs period. All Upper School students are encouraged to circulate and chat with the college visitors. For colleges which we anticipate will receive a larger audience (12-20 girls), we can arrange for a private visit at a separate time of day. Only seniors (and juniors with a free period) will be permitted to attend those meetings. Please contact Tish Peterson or Katie McEnroe to schedule a visit. Take Exit 39; head east on River Road (toward Washington); at the second traffic light, turn left onto the School grounds, and then immediately right onto Mary Happer Drive. Head west on River Road, turn right at Royal Dominion Drive onto the School grounds and then immediately turn right onto Mary Happer Drive. T-2 Route stops directly in front of the School. Visitor parking spaces are available in the main parking lot; handicapped parking is available on the front circle. As a Summer Scholar or a participant in the Notre Dame Leadership Seminars, you'll have access to the Grotto, the Golden Dome, the hallowed halls. If you go abroad with us to Rome or Ireland in our Study Abroad programs, you'll have access to the sweeping sights of the Eternal City or the rich history of the Emerald Isle. You’ll spend a summer living, learning, and preparing to lead a life for the greater good. http://sps.northwestern.edu/program-areas/summer/h... 3, 6, or 9 week programs. College credit for all classes; weekly Get Ready seminars help to explore college admission process and adjustment to college. Choose from 350 courses in Arts and Sciences, Music, Communications, Theatre, Engineering, and Continuing Studies. http://scs.georgetown.edu/departments/21/summer-pr... (1, 2, 4 weeks) in academic subjects as part of pre-college program, also three different opportunities to do programs specifically focused on the medical field, plus week-long institutes in Foreign Policy, Business and Law and Arts and Humanities. The Outreach Pre-College Art Program was created in 1992 as a full scholarship program to support New York City area high school students interested in pursuing a degree in art. The Outreach Program serves the needs of talented local high school students who would benefit most from a fully funded college level education. It helps students develop a portfolio worthy of art college admissions and scholarships. The program is designed to offer intellectually curious, highly motivated high school students with a strong aptitude in the life or physical sciences a total-immersion experience in laboratory research. Students are matched to a lab according to their stated field of interest and are individually mentored by graduate students, postdoctoral fellows, or lab heads. Research teams made up of faculty, staff, selected graduate and undergraduate college students, and high school students focus on specific areas of concern such as water quality monitoring, fisheries management, biological control studies and surveys. High School internships last 9 weeks, five days per week. All students participating in an internship are responsible for executing a project under the guidance of BFS faculty and staff. Presentation of a digital presentation and participation in weekly seminars are required, as is the creation of a digital poster synthesizing the student's research. http://www5.njit.edu/precollege/experience-through-stem-through-engineering-design/Intermediate Robotics program designed to expand the STEM experience through engineering design. Working in collaborative groups, students research a real-world problem that can be solved by a robot, and will follow the Engineering Design Cycle. The goal is for high school students to improve their problem-solving, critical thinking, and communication skills (for 9th or 10th graders). An innovative program that offers students summer internships with some of the most dynamic corporations and businesses in New York City. Participants receive pre-employment training before starting their seven-week summer internships, and also attend regular workshops throughout the summer that focus on work readiness, college orientation, health, and leadership development. An initiative of the NYC Department of Youth and Community Development (DYCD) and supported by the NYC Center for Youth Employment and the Mayor’s Fund to Advance New York City. An urban environmental internship for high school students. RCC participants work on environmental restoration in Forever Wild sites located in our flagship parks. There are two RCC sessions each year (fall and spring), and each session lasts about 8-10 weeks. The program occurs one day a week, on a school day afternoon for 2 to 2.5 hours. There are openings for 900 students each year. RCC participants receive community service hours and go on exciting field trips, such as trips on the Clearwater Sloop. Provides a six week summer placement for students entering their junior and senior years of high school, and freshmen and sophomore in college, who have expressed an interest in the health field. Students are exposed to a variety of careers in the health fields as well as to health issues affecting their communities. SHIP students are encouraged to observe health professionals and inquire whenever possible about their career paths, education paths, job descriptions, and responsibilities. Program offers high school students opportunities in science research under the guidance of professionals in science and mathematics. HUSSRP provides selected research-oriented high school students the opportunity to work with our science faculty during the summer in an on campus research program. The program culminates in a science "poster session" in early Fall where students display the work they performed during the summer. Intensive six-week residential academic program specifically for high school students. Boarding students take 3 courses in Liberal Arts: Humanities, Natural Sciences, and Social Sciences. Strong Performing Arts, international forum component. Summer study abroad programs in Mexico, France, and Britain. Residential programs: five to six weeks of intensive enrichment courses: Advanced Topics in Physics, Chinese Language and Culture, French Language and Culture, Spanish Intensive Language, and College prep. Workshops and sports activities. Hotchkiss Summer Portals is a residential program that offers middle and high-school age students the opportunity to hone a talent, try something new, and experience life at a New England boarding school. In each two or three-week session, you will learn from dedicated faculty members and experts. 2 and 5 week residential summer programs including Summer in Paris, Spain or China as well as John F. Kennedy Institute in Government (including Washington trip), and Writing Project. Enrichment courses are offered to better the understanding of a topic. Social, sports, cultural activities and college visit trips. 6 week residential summer session program. Academic and athletic program (with special Ice Hockey Player Development program) Study skill techniques in English, mathematics, standardized testing. College Prep courses in English, mathematics, science, history, language and studio art. Other electives in liberal arts, performing arts, visual arts, athletics. Special events, class trips, weekend excursions. 5 week residential summer enrichment program. Academic courses offered in class sizes of 8 students in English, math, science, language, history, and the arts. Computer and SAT prep. classes also available. Athletics and volunteer programs also available. Study Abroad programs to Spain, France and China. Cello and String Performers Program. http://summer.rutgers.edu/precollege-academies/pre... is an intensive one-week program that will introduce participants to aerospace, biochemical, biomedical, chemical, civil, computer, electrical, environmental, forensic, industrial, material science, mechanical and systems engineering through an integrated program of lectures, demonstrations, hands-on projects, tours, and field trips. This intense six-week program immerses students from across the country in life at MIT. Students take academically rigorous math, science & humanities courses. Outside of the classroom, they participate in admissions counseling sessions, lab tours and social events. SEAP provides an opportunity for students to participate in research at a Department of Navy (DoN) laboratory during the summer. SEAP provided competitive research internships to over 290 high school students this year. Participating students spend eight weeks doing research at one of 24 laboratories. The program is for 20 rising high school juniors and seniors from across the country. Intentionally small to build a tight-knit community and enhance collaboration. Students visit think tanks, NGOs, and government offices, meet with local experts, and enhance their public speaking, debate skills. A global community network connecting individuals of various socioeconomic backgrounds. Using service as the mechanism, they use dialogue, focus groups, team building, and shared experiences, to help students identify their relative advantages and influence positive effects on their local and global communities. Programs in Botswana and Haiti. The Sadie Nash Leadership Project (SNLP) includes rigorous coursework, mentoring, as well as service, experiential, and skill learning, including community organizing and youth-designed activism projects. Every aspect of the program is designed to support and develop young women to both visualize themselves as leaders and actualize their leadership. Short term summer leadership institute or 2-year program.
2019-04-21T04:41:56Z
https://www.holton-arms.edu/scholar/college-counseling
My father-in-law has difficulty walking around, so there was all sorts of new things for us this trip. First, we rented an ECV from Apple Scooter – their prices were very good and they had a lot of good reviews. I had some concerns whether he’d be able to effectively operate it especially in some situations like getting it on or off the bus. But because the ECV was relatively small and could be easily disassembled and reassembled, it would fit in the back of the car, so on some days some would take the bus and I would drive him over to the parks and we’d use the accessible parking area. We were also taking different airlines (the in-laws live in a different part of the country), and they would be taking the Magical Express bus to get to the resort while we rented a car. The added expense of a six-person vehicle was pretty high, so we decided to go with a smaller car, and would use a combination of transportation when necessary to get around, especially with the ECV. Although we planned not to go down so early again, most of direct JetBlue flights from Boston were in the morning – and even though we booked one a little later than before, the schedule changed and we still had a 6am flight. This time, however, we only planned to go to Animal Kingdom, which had Extra Magic Hours which only went until 8pm anyways, so it wouldn’t be a super long day for us. Our flight down was on “A Friend In Blue”, and was uneventful, just a few minutes late. The in-laws were on a different airline, and amazingly not only did they beat us to Orlando (their flight was scheduled to arrive shortly after ours), but they beat us to the resort as well on the Magical Express bus! We had planned to stop on the way and get some groceries, but I thought there was a chance that the room wouldn’t be ready, and I was right. My DMiL had “checked in” (which itself created confusion as she gave her credit card), and not only wasn’t the room ready but they were in the midst of updating the reservations computer system (code named “Lilo” – at least they call it that, but I think “Stitch” will have proven to be a more appropriate name) and nothing was working. They couldn’t even issue the Key To The World cards, and instead gave us a single “blank” card that would open our room when it was ready. They did at least give us a parking permit so we could park for free at the park. Fortunately we already had our park tickets. We met up with the in-laws at Artists Palette for some breakfast/lunch. We had arrived just before the changeover from one to the other, so we waited a few minutes and had lunch. DW had a potato and bacon soup with a chicken cordon bleu panini sandwich, and I had a turkey and brie sandwich. All of it was very tasty. We ended up sitting outside the Turf Club, as some sections of AP were being refurbished and there were a lot of people milling about – possibly waiting for rooms. They had already gotten the ECV from Bell Services, and although there was no manual it was very easy to figure out, although the forward-reverse control could be confusing because it could be used by either hand, but they were the reverse of each other – one hand forward was pull towards you and reverse was push away, and the other hand was backwards. On the few occasions I needed to use it (relocating it, on-off buses, etc.) I’d get it backwards since I couldn’t remember. I went back over to the check-in desk to try and get some stuff straightened out and find out what was going on, and basically I’d have to get it all fixed later in the day when we got back as they really couldn’t do anything at all. If I had tickets in the package or the Dining Plan I’d have been worried – I don’t know how they were handling those situations, but we had our tickets in hand (I had an AP already from the October trip, and the rest were purchased from Undercover Tourist, and a Give-A-Day free ticket voucher), so we just went over to Animal Kingdom, splitting up as planned. Bell Services helped us figure out how to break down the ECV to put in the car (again, no instructions), and from that I figured out that we could take the battery pack out alone at night to charge it (and it survived two full park days without ever indicating it was weak). I drove over to the park and used the accessible lot, but it was pretty full – it was a fair distance to walk/ride to the entrance. We met up there, and I went straight to the Guest Relations booth first to get DW her ticket from her GAD voucher and turn it into a 9-day Park Hopper), get a Tables In Wonderland card, and also get a Guest Assistance Card (GAC) for DFiL, as there may be times he’d need extra time transferring to ride vehicles and such. The woman gave us the card and stamped it so we’d all be able to use the handicapped entrance at all attractions that had it – although we never actually had to produce it as no questions were asked (the ECV generally made it obvious). Side talk: There have been a lot of claims that the GAC is like a “super FASTPASS”, or gives front of the line privileges. This isn’t actually true; it generally alerts Cast Members that the guest may need some special handling. However, from experience in using the handicapped entrance, I can say that with the crowd levels being low at least, we seemed to get onto the attraction slightly faster than if we had gone through the regular line. I believe that if there had been more people in the handicapped lines in front of us, it would have taken longer as they would only take from that line periodically – we just got through relatively quickly because we were often the only ones. Toy Story Mania may have been the biggest exception. Even though we had Fastpasses for it AND used the accessible entrance, they only load from the accessible loading platform every so often – perhaps as little as once per cycle. They actually have a special one-sided car for use with people in wheelchairs, so instead of normally accommodating 8 people in a vehicle it holds 6. The in-laws didn’t go on any of the thrill rides, so I don’t know how it would have worked there, but another difference is that at Haunted Mansion you bypass the stretching room completely, loading at the unload area instead. After getting everything straightened out, we went into AK and I went to get Fastpasses for Expedition Everest and then met up with everyone to see Finding Nemo. After that we rode Everest and then met up with the in-laws by the Dawa Bar for the parade (and a couple drinks). We had a nice talk with Gene, a CM originally from our area while we waited about random things. He recommended that if the in-laws wanted to see Festival Of The Lion King that they still get there early, as they will fill in the accessible seats with regular guests after giving early seating to those that need them. After the parade it dawns on me – Extra Magic Hours starts at 5pm – and we don’t have KTTW cards to say that we are staying on site! So fight the crowd to get back to Guest Relations while the in-laws go to see FOTLK and DW and the kids check out the shops and such. I explain the situation to the CM, who hops out back and then comes in with 6 “Extra Magic Hours” tickets – they were actually printed on Dinosaur Fastpass stock, but said that they were good for Extra Magic Hours access. We hadn’t done an evening Extra Magic Hours since they stopped using the wristbands, but the CMs didn’t bat an eye at these – they even had boards with what they’d accept from guests to get access to the rides. We regrouped for dinner, with some going to Pizzafari and some going to Flame Tree BBQ. It took a while since I needed to be at both locations to get the Tables In Wonderland discount (two of the few non-table service locations that take it), but DFiL and I preferred some BBQ. After that we basically split up for the remainder of the time there, with us riding Expedition Everest twice in a row as near walk-ons, and finally getting the front rows both times! And for the curious, the Yeti was still in “disco” mode, where it is immobile but lit by a strobe to at least give some effect. But I think when it gets darker the effect is lost as the guest’s eyes adjust – you can more plainly see the yeti and that it doesn’t actually move. But the experience in general of Everest in the dark was pretty cool. We did hear that our room was ready, but nobody wrote down the room number so when we went back I went to the front desk to confirm and also get stuff straightened out about room charging. The new system was up, but the CMs weren’t familiar with it and some of the new features, such as the fact that different KTTW cards can now charge to different credit cards. We set that up although it took a while, got all the KTTW cards, and got to our room. We were in the Grandstand section as requested, but at the extreme end – I wasn’t very familiar with the layout and would have preferred we were closer to the pool end, which was also closer to the main buildings, but it wasn’t terrible. Bell Services helped bring all the luggage to the room. Day 2 did not start well. It was an Extra Magic Hour morning (8am) at Magic Kingdom, and we planned to be there at Rope Drop. We got up at 6am despite a messed up alarm clock. Since we had the ECV, to “save time” I figured I would drive DFiL and the ECV over to the TTC and take the monorail over, while the rest took the bus. Unlike the other parks, it would take a little extra time for us, but we wouldn’t have to deal with getting the ECV on and off the bus. On arrival at the TTC, everything seemed fine…they were only running the Resort Monorail at the time, which I thought was strange (perhaps they don’t get many people at the TTC for an EMH morning), but by “running” I mean “keep the monorail parked at the platform for a while”. The ferries did not appear to be running at all. So we waited on the ramp, about halfway down, while nothing moved. The train did not leave for at least 10 minutes, despite having been loaded already. Then the train finally leaves…and there is no sign of another one. After a few more minutes, a CM comes up the ramp, and tells everyone that we needed to go to the bus area and take a bus as the monorail was shutting down (never found out why). By this time there were a couple hundred people behind us, who are now in front of us on the way to the buses, plus plenty that passed us. We get there and get in line. They are already loading one bus, but it would likely be 3 or perhaps 4 before we get one. The first bus pulls away, with 3 more in the lot – which don’t move. Despite needing buses, they were just sitting there, perhaps awaiting their orders and no one was giving them orders while we sat in the cold and waited. We finally arrived at MK at 8:20am. The rest had to watch the Rope Drop ceremony from outside the turnstiles, because guess who had all the tickets? Lesson learned – partially. We pretty much split up after entry, and we take off for Space Mountain, which we haven’t been on since the refurbishment and would be DD#2’s first time. We were able to immediately walk on, which means we breezed by the new interactive queue elements, which were basically a bunch of Asteroids-like video games where each person had a left-shoot-right button set. After we rode, the line was still non-existent, so we walked on again. CAUTION!!! Be careful with your hands when going by the video games. The buttons are set in square metal holders, with VERY SHARP corners! I managed to gash my finger pretty good by running my hand along the railing, and then across the controls when I went by. I meant to speak to a CM afterwards, but forgot about it. DD#2 loved Space Mountain – I believe it is her favorite attraction now! As for the rehab in general – I think it is smoother. I at least did not notice as much jarring of my back (except on the initial latch up on the lift hill), and it certainly seemed darker. Sadly, it seemed to lose some of the ambiance in the loading area where you could make out the ghostly shadows of the cars as they went around along with the screams. I also noticed plenty of infrared cameras staring back at me at various points. I didn’t care too much for the new audio system. Since it is done by fixed speakers along the track, it just came and faded a lot. After that we took a quick spin on Astro Orbiter (DD#2’s first time on that as well), and then met up with the grandparents and did Buzz Lightyear (fortunately DFiL didn’t have trouble getting on the vehicle, although it was close) and Carousel of Progress (more people in there than usual, but certainly not nearly full…maybe it was because of the cold that everyone was trying to stay inside? From there we headed up to Fantasyland. Amazingly, even with the impending doom of Toontown Fair we never went near it. Not entirely sure why, we just had no interest, and even DD#2 didn’t ask about meeting the fairies. We went on the Winnie the Pooh attraction, getting our first look at the new “play area” queue. It’s a kids play area with various things for them to do, jump on, climb through, etc. while waiting in the line. A great idea to keep the kids occupied (and perhaps burn off some energy). Everything seemed to be generally soft, including the spongy flooring. We then headed to the Carrousel…while I sat outside (I didn’t feel like spinning around), the rest got in line, and eventually got on. However, I noticed while moving the ECV that there was a woman on her back on the platform of the carrousel, and a CM was called over. They called for medical assistance, and it appeared as if the woman may have somehow hit her head. They told everyone to get off the ride at that point. The woman looked conscious, but I don’t know the extent of her injury. It hopefully was minor. Instead, we walked in to PhilharMagic since we were right there and another show was starting shortly, followed by a quick lunch at Columbia Harbor House. It was crowded, but thanks to the ECV we were able to get a table in the reserved handicap area. I don’t remember much about the meal – I think most of us had fish and chips, with some clam chowder (which was good). After that we hopped right over to the Haunted Mansion. We were directed to the exit, where we parked the ECV outside, and we had to wait a bit because there was a Backstage Magic tour that was in the process of leaving. After a few minutes wait we were able to board in the exit area and then travel up to the main loading area. The corridor in between is not seen by many, but it was also unremarkable. At this point the in-laws went to take the riverboat for a ride while we wandered around Liberty Square and then we went down to Pirates Of The Caribbean, after which the in-laws caught up with us. It was getting closer to dinner time, so we headed out to the Monorail. Dinner was at ‘Ohana at 5:05pm, and we had plenty of time so we stopped first at the Contemporary Resort to look at all the decorations. After that we reached the Polynesian Resort with plenty of time so we sat and had drinks at the Tambu lounge. Despite sitting right where they handle the people with ADRs for ‘Ohana, I had my back to it. I turned around at around 4:55pm, and there was already a line past the Kona Cafe to the other end of the building, just to check in! So I hopped in line, wondering how long we’d have to wait to be seated. It wasn’t too bad, as we were seated by about 5:10pm. It was our first time having dinner at ‘OHana, but it was highly recommended by friends. Some of the food is served “family style”, in a big bowl that you all serve yourself from, while the servers bring around the meats on long skewers and serve you directly from them. The honey coriander chicken wings were incredible, as were the pork dumplings. Everything else was good as well, including the dessert – bread pudding with bananas and a caramel sauce…yum! During dinner, a singer comes out at various times and plays a ukulele and invites the children to come and join where they will do the hula and also travel around the restaurant, so the kids are kept entertained as well. After dinner we hopped over to the Grand Floridian for more holiday decorations and pictures. From there we split up again…DW, DD#1 and DMiL took a bus over to Downtown Disney for a little shopping, while myself, DD#2 and DFiL were going to drive back to SSR. That itself turned out to be an adventure, as the resort Monorail was quite full, apparently for people heading to the Mickey’s Very Merry Christmas Party that night. It was a few trains before we made it on board, and it was a slow ride around back to the TTC. The other group had a fun bus driver on the way to DTD…she joked around a lot, making the trip better. DD#1 also entered a dance contest and won a free turkey leg – something she really wanted to try. She liked it but couldn’t finish it. After everyone got back to SSR, we decided to start the first load of laundry…the dryer was LOUD! Too loud, in fact. We never used it late again. I was able to muffle it a bit with some weight applied in the right location. Day 3 was unusual for us. The in-laws relaxed and went to Epcot later, but we were heading to Universal’s Islands of Adventure, to spend some time with Harry Potter. I was there just a couple months before for a special exclusive event put on by the folks at Syfy, with the Wizarding World of Harry Potter to ourselves with free food and drinks. It would have been hard to top that, but this was the chance for the rest of the family to experience it – and for me to see it in daylight. We drove up a bit early so we could park and get all the way over to the entrance in time…parking is a distance away, such that they have moving walkways available from the parking structure to the hub. Despite a bathroom break already at the hub, we were still in line at the entrance with about 20 minutes to go – and there were not a ton of people waiting. While waiting for opening, a cast member approached us, checked that we had our tickets, and then asked if we wanted to be the “opening family” for the day! So we got to get in through the gates early, got a special picture taken at the entrance, and made the announcement to open the park. We then also had a head start on everyone else for getting to WWOHP! We walked briskly straight to WWOHP, which is in the back right corner of the park from where you enter. There we just a few people about (Universal Resort guests can enter early), and we went straight up to the headline attraction, Harry Potter and the Forbidden Journey. First we stopped to put our stuff in one of the provided lockers, which are free for up to 45 minutes. Just remember your locker number! Then we went through the queue – parts of which I had not seen before as we were able to bypass some of it during the special party. The queue is incredibly detailed, and deserves close inspection. The paintings move, and some even talk…but you’d have a hard time telling that they aren’t really paintings. The ride is fairly unique. You sit on a bench, four across, which you actually board sideways. The bench is mounted on a ride vehicle by and arm which can lift, tilt, and twist the bench in various directions, and gives you the sensation of flying – similar perhaps to Soarin’, but with a lot more speed and movement. The ride vehicle moves through various areas, some of which are Omnimax-style projections, others are physical sets, as you move from scene to scene, trying to follow Harry on his broom so you can experience what it is like. There are a few scary moments though…it might not be great for young, easily scared children. Since we managed to get on quickly and still had free time with the locker, we went ahead and rode it again, and again it was a walk-on. Unfortunately, DW seemed to be coming down with something like a motion sickness or migraine headache. Riding a second time did not help. Afterwards I went down to the first aid station in the Lost Continent area to get her some Advil to see if it would help. We grabbed some Butterbeer as well, and then we then took a quick ride on Flight of the Hippogriff, which is basically a large kiddie-coaster. At this point DW wanted to sit, and DD#2 was too short so I took DD#1 on Dragon Challenge. We rode the “blue” side (the Hungarian Horntail), as I had ridden the “red” (Chinese Firebolt) in October and I heard the blue was a bit better. We walked all the way to the loading area without pause, but we ended up waiting a bit at the loading area as they added new cars to the ride after we got there. The ride itself was fun…although I preferred it at night. After getting off the ride I was greeted by DW coming up the exit path as she was feeling terrible. We all went back to the first aid station, and the medic recommended she lay down for a while out back where they had some cots. So she went back there for a while, while I took the kids down to the Seuss Landing area, where we rode the High In The Sky Trolley Ride and the Cat In The Hat ride. The former is a pretty simple ride but its up above the guest area providing an interesting view, while the latter was pretty tame and actually fairly boring – there was quite a lot of empty space on walls, etc. that could have been used for more theming. We sat and ate a couple of pretzels, and then continued over to Super Hero Island. With DD#2 in tow we couldn’t ride The Hulk, so we went to the Spider-Man ride – prior to WWOHP, it was the premiere ride in the park. There was a bit of a wait, so we went through the queue which wrapped through some office space of the Daily Bugle, eventually into a larger room with a projection TV of “breaking news” type stories that are filling the guest in on what is going on. Then we reach the loading area…the ride itself is somewhat similar to Forbidden Journey – your ride vehicle moves and tilts while taking you through several theme rooms. But although the movement isn’t as great, it makes up for it by the 3D effects – all the projected bits are in 3D, and you are wearing 3D glasses – so you get a lot of illusion of movement. Plus some pyrotechnics, moving sets, and more makes it a pretty thrilling ride. Just as we were exiting, my phone rang – DW was not only feeling better, she was MUCH better and was already catching up to us. We waited for her outside Spider-Man, and we had a quick lunch at Captain America’s Cafe (nothing to write about), and then we rode Spider-Man again with DW this time. We walked completely through Toon Lagoon (water rides didn’t seem a good idea on a cold day) over to Jurassic Park. We watched people come down the big hill on the Jurassic Park River Adventure and end up completely dry, so we decided we would ride it as well. However, by the time we got to the loading area, there weren’t too many people, and we didn’t have a full boat. No one wanted to sit up front, so we ended up the “front” people in the second row. One thing I remember from the ride – no dinos! I don’t recall seeing a single dinosaur on the ride. Things moved as if there were dinos moving them though…and then it was our turn coming down the big hill. We reached the bottom, splashdown – and a huge wave came back and flooded us! We were VERY soaked! Without the full boat I wonder if the weight distribution was enough to cause the backwash that soaked us, but never happened to the riders we saw. Fortunately the sun was out, so standing in the sun helped. DW took DD#2 on Pteranodon Flyers (it has a strange height requirement – a tall rider can only ride if there is a rider UNDER a certain height…so DD#1 and I couldn’t ride. It looked like and interesting ride over the park though. Instead I just stood in the sun and dried. Continuing around brought us back to WWOHP, which was now FAR more crowded. We got in line for Ollivanders, for which the wait wasn’t too long. Inside they pack a lot of people into a small area that does indeed look like Ollivanders from the first movie. Then they do a wand selection with a guest which includes some (unfortunately not spectacular) special effects, after which everyone proceeds into an equally small wand shop where you can’t really move. My advice if you aren’t actually looking for and buying a wand, get out ASAP. We then got some more butterbeer – it is REALLY good. I prefer the unfrozen myself, but the rest liked the frozen. The topping is what really makes it good. With the crowds we didn’t elect to ride anything again, but we did briefly go through Honeydukes and Zonkos. I’ve said before – they need to make these MUCH bigger. Like Ollivanders, there is no room to move around when it is crowded. We then got some pictures in front of the Hogwarts Express. With DW with us this time, we went back to Seuss Landing, and she rode the CarouSeussel with the kids. We still had some time, so we went back to Super Hero Island and DD#1 and I rode The Hulk (great ride – we didn’t have to wait too long, and the “lift hill” was deceptive), while DW took DD#2 on Storm Force (just a basic teacups ride). After that we were pretty much done, so headed back to meet the in-laws at Epcot for an EMH night. We met up with them at Sunshine Seasons and hopped on Living With The Land for a quick boat ride, and then we headed over to the World Showcase to get some recordings of the holiday storytellers and some dinner before Illuminations. We first stopped at the Rose & Crown to pick up some drinks, and then went to see Father Christmas. DD#2 got selected to ring the bells for him, and received a special bell for her participation. Our next stop was in Morocco. While I went in to Tangerine Cafe to get myself some food (I wanted a lamb shawarma – was decent although I prefer the Falafel King in Downtown Boston), the others watched Tarji, the Moroccan storyteller. We then stopped for the girls food at the Liberty Inn, and then found a good handicapped seating area for Illuminations. We all got some hot cocoa as it was getting very cold, while DW went all the way to Mexico to get chicken tacos (and a margarita of course). We then watched Illuminations for the first time in several trips. Despite it being an EMH night, there was still a huge mass of people exiting the park. I took the in-laws out of the park to the car and back to SSR, while DW kept the kids and hung around for a bit while the crowds subsided before attempting to get to the bus. They tried to go into the new Karamell-Kutche in Germany, but it was pretty crowded. They did manage to buy some of the pre-packaged candies though. They then made their way over to Test Track, but there was a 55 minute wait. Instead they went to Spaceship Earth, which was a walk-on. Then they made their way to the bus and returned to SSR. This day started out with our usual splitting up to get to the park – this time, Hollywood Studios and an Extra Magic Hours morning – and the bus group ended up waiting a LONG time for a bus. A cast member checking on things at the bus stop said that there had just been a bus a short time before – but several people who had been waiting for the bus knew otherwise. Eventually we all regrouped, but it was after rope drop again. Not a big deal though – we were NOT doing the Toy Story Mania dash this time, because we were using DD#1’s Give A Day voucher for the Fastpass Exchange Card option! Instead of heading straight to TSM, we went to Rock’n’roller Coaster, and grabbed the instant Fastpasses and went straight in – even if the standby clock said the wait was short, I don’t trust it – too many times have I watched it increase rapidly before my eyes. It was DD#2’s first time over the height limit, so it was pretty much the last ride at Disney she hasn’t been able to do…and she loved it! We then did the same thing at Tower Of Terror. I don’t remember what the standby wait length was there either, but I think it was around 30 minutes and we could just walk on with the Fastpass, which we did. TOT had some new programming, which I think put a little more thrill back in. We got through it fast, and the in-laws were off doing something else still, so we rode it again via the standby line, and the wait certainly wasn’t 30 minutes. By then we met up with the in-laws and went to Toy Story Mania. The wait time was in the vicinity of 90 minutes, and there were ALREADY OUT of Fastpasses! We still had the GAD cards, and all the kiosks were covered (not unusual at TSM – it stops people from trying to get FPs when they are all gone), so we had to ask a Cast Member, who happily took our cards and uncovered a kiosk temporarily to run them through. One group stopped and asked why we were able to get Fastpasses when no one else could – I explained that we had the Give A Day cards for volunteering, and just that seemed enough to satisfy his question. What I didn’t realize is that we probably didn’t need it. Due to my father-in-law’s ECV, we would have likely entered through the Fastpass entrance anyways, and then get shunted through to the accessible loading area through a door, bypassing the up-and-down stairs to get to the main loading area. And for that, we still had to wait quite a while – it was possible that without the ECV we may have gotten on sooner, as we did have others in front of us waiting to board in that area, and they only periodically bring vehicles over to that side. There is actually a special vehicle that can accommodate a guest in a wheelchair, and there were two groups in front of us that needed it. We just needed a normal vehicle, so we had to wait two full cycles of the ride plus some more. From there we went through One Man’s Dream – the attraction about Walt Disney, checking out a lot of the new models and other changes they made, and stayed for the movie. If you are interested at all in the man, this is a MUST DO attraction. We stopped for lunch at Studio Catering, and the girls played in the Honey I Shrunk The Audience playground for a bit – something I don’t think either have ever done before. We then walked the in-laws over to the Indiana Jones Stunt Spectacular, and then we went to Muppetvision 3D to check out the updates. The video is much cleaner now with the digital projectors, but it is pretty much the same show. After which we went back over to Indiana Jones and caught the end of the show. We found a spot for the in-laws to see the soon-to-be-replaced Block Party Bash parade, while we chose to to head back over to RNRC as DD#2 wanted to ride again and we still had 4 instant Fastpasses to use – unfortunately there were issued with it at the time and they weren’t letting anyone in, so we rode TOT again instead. When we left there, the parade hadn’t finished yet, so we were blocked for a little while. We finally regrouped, did some Photopass shots on the way out, and then headed back to Saratoga Springs. We got back early and it was one of the warmest days we had, so I took the girls to the Grandstand pool for a little while and the rest went to pick up some food at Artist’s Palette and everyone headed back to the room to rest until DW and I headed for our dinner alone. We tried to set up the DVD player so the in-laws could keep the kids occupied, but it didn’t work – the TV didn’t seem to allow switching to the “video” channel – and it wasn’t a “user issue” – heck, I used to hook up people’s VCRs for them, sold electronics in a past life, done video production – safe to say I know how to operate a TV and a DVD player. We called maintenance to come check it out, but we set them up with the laptop as a backup just in case. Good thing – they didn’t come for three hours! We also asked for a few more washcloths and toiletries – those came within 30 minutes! DW and I then headed over for our reservation at Yachtsmans Steakhouse at the Yacht Club Resort. Had to look around for a parking space for a while and had to walk a fair ways to get there. We didn’t have to wait long before being seated. We started with the lobster bisque, which was delicious, and a charcuterie board consisting of smoked duck sausage, venison terrine, beef tartar, some cheeses and a bit of potato salad, all of which were tasty. We both chose to have the ribeye steak with garlic butter, DW choosing paprika fries with it while I had the duchess potatoes. The steaks were very good, as expected. I did have one disappointment – they were out of the Boston Red Brick beer the server had mentioned. I actually don’t recall what I had to drink instead. Since this was our anniversary dinner, they gave us a small dessert plate, with two small pieces of gourmet chocolate with a sprinkle of sea salt, and two bites of an apricot candy. After dinner we walked it off, checking the decorations at the Yacht Club, then around to the Boardwalk. There was a magician/comedian on the Boardwalk that was quite good. We also went into the Boardwalk Inn lobby for the first time to see the decorations there, and back around to the Yacht Club to get back to our car and head back to the resort. Today was another partial Animal Kingdom day, followed by a return to DHS to see the Osborne Lights, with a special gathering for WDW Radio in between. No bus problems this morning, getting there in time for the small rope drop ceremony, and then we headed straight for Kilimanjaro Safari to get an early run. Of course we lagged somewhat behind the crowd also heading there due to the ECV, but when we got there we didn’t have to wait for the huge line, instead being shunted off to an accessible loading platform. We did have to wait a bit for a vehicle, however. With the exception of the lions, all the animals seemed to be out in full force, with the giraffes and ostriches particularly close up. One ostrich was sitting by the road just watching us, while another did hold us up a bit. After that the in-laws took in the Flights of Wonder show, which they had never seen, while we went on to get Fastpasses for Expedition Everest, and then continued on to the Dinoland USA area so the girls could ride Primeval Whirl, which DD#2 hadn’t ridden before, after which we returned to EE and used our Fastpasses (the return window wasn’t far out when we got them). Then it was about time for our reservations at Tusker House for the first lunch sitting. We didn’t notice any significant change in the menu over three years – everything was good and tasty. Since we had other plans, we slowly made our out of the park, with a little shopping along the way and some pics with Lilo and Stitch, and some pictures at the tree outside the entrance. Lou Mongello of WDW Radio was having a gathering at the Beach Club to celebrate his 200th show, so we headed there before heading to DHS. The girls all took the bus directly to to the Yacht Club and checked the decorations before heading to BC, while I drove my father-in-law over to DHS, and he rode his ECV and I walked up the pathway to the resort. We met up with the rest at BC, and checked out the chocolate carousel holiday decoration. Teena the BC greeter was on hand, so I chatted with her while DD#1 tried to spot all the hidden Mickeys on the carousel. DD#2 would have been bored, except Lou’s daughter invited her over to a table where they colored pictures and stuff, although when Lou was up thanking everybody and such, she was up there behind him clapping and cheering as well. Although at one point she got upset as everyone else seemed to be getting WDW Radio T shirts and she wasn’t – Lou’s wonderful wife gave her one though! Thanks Lou for the party! After the party, we went back to DHS via the Friendship boat, which wasn’t too difficult with the ECV. We got there in plenty of time before the lighting of the Osborne lights, so DW tried to go in to the Photopass store to get some photopass cards combined, but there was a LONG wait so she gave up. We then just headed straight towards the Streets of America to catch the lighting of the Osborne Family Spectacle of Dancing Lights – when we were here in 2007 we saw them after they were already lit. We managed to get space right up front prior to the lighting where they have the big switch. The DHS band of Mulch, Sweat ‘n Shears was there, warming up the crowd (and like the rest of the week, needed warming up!), and then just after dusk the lights were turned on. If you’ve never seen them it is simply amazing – not just the lights, but periodically they are set to music and blink and dance. It’s hard to get good pics without a high quality camera though. We just walked through for a few hours, taking in all the details. We took a short pitstop at the Backlot Express for a snack and hot cocoa. After that, before running back to the resort DW the kids and I headed to Rock’n’roller Coaster to try and get the ride in we didn’t get last time, and it only had a 40 minute wait. DW and DD#1 managed to score the front row as well. Then we met up with the in-laws at the front gate and headed back to the resort. The girls had a good bus driver on their way back as well. This was perhaps the coldest day of the trip. There was a constant breeze which just went through the light clothes we had. Our day started out in Epcot, where we had lunch reservations for Biergarten as well as needing to get more footage of the storytellers. DW and DD#1 ran ahead at rope drop to grab Fastpasses at Soarin’ while the rest of us caught up. We then rode Soarin’ standby, and had our customary breakfast at Sunshine Seasons. We still had time to kill while the kids ate, so the in-laws went to do Living With The Land while DW ran over to Test Track to get FPs. Then we all rode Soarin’ again. We then went to Test Track to use our Fastpasses. We got in through the line pretty quick, and waited for the pre-show doors to open. And waited…and waited…and they just weren’t opening. Eventually they made the dreaded announcement – that the ride was having a problem, and they told everyone to leave. We had already given them our Fastpasses though, so we asked for them back. At first the CM seemed reluctant, but I don’t understand why, and he did reach for the pile of turned-in Fastpasses and handed us four to use later. We never returned to use them, however. At that point we went into Mouse Gear to get the girls sweatshirts due to the breeze, and then we moved on to the World Showcase. We were a bit early for the storyteller in China – the Monkey King, and DD#2 was hanging out in front of the stage alone when a voice spoke out to her, and made her jump and dance and stuff – the Monkey King was on his way out but his microphone was on and he was teasing her from behind. He then took the stage and told his story. We then had our lunch at the Biergarten, which we haven’t eaten at since a group trip in 1999. The food was good and tasty, although it seemed like whenever you went up, something was out in the buffet. There also wasn’t nearly as many choices as there were at Tusker House. The pretzel rolls were especially delicious – but don’t grab too many! They are really filling. For the beer drinkers, back in 1999 there were too choices – Becks and Becks Dark. The latter was tolerable, the former undrinkable to me. Now there is a selection of several types of beers – alas, I don’t remember what I had – it was decent at least. After lunch DW ran off to Japan to see the storyteller there, and then met us in Italy for the storyteller there, la Befana, the good witch. We then managed to catch the Voices of America for some holiday carols, followed by the Hanukkah storyteller. The girls sat with several other kids to play dreidel, but we had to leave to head to the Magic Kingdom. You would think that I would have learned something about the monorail by now – like the fact that we were doomed not to be able to take it. I took my father-in-law by car over to the TTC while the rest did the double monorail hop to get straight to the Magic Kingdom. However, when we arrived, the monorail was shut down yet again. And this time, no buses – we had to take the ferry. Normally, I wouldn’t care – but remember how I told you it was the coldest day? It was a slow, cold ride. I would not take the car to the TTC a third time. The others likewise had to get off the Epcot monorail and take the ferry, and arrived on the next ferry. After the castle lighting, we moved to a different area to see the return of the Main Street Electrical Parade. On the DISboards (at least the podcast forum), they are known as “Bawb’s Benches”. If you are at the hub, head down the path towards Adventureland, and the benches are immediately on the right. They don’t offer a close-up view of the parade, but you can get a mostly unobstructed view by looking over the grassy area behind the benches towards the other path that leads to Liberty Square – no one can stand in front of you there, and few people will actually be there. The Liberty Square bridge is too narrow for guests to stand along during the parade, so although it is a bit of a distance away you have a clear view. I wish it was closer, but we didn’t have people pushing in front of us, or having to stand in one spot for an hour just for a good spot. It was getting far too cold, so the in-laws took the bus back to the resort…and it was getting to me as well. Just before the parade began, we noticed Tiana available for pictures nearby, so I quickly brought the kids over there and managed to be the last ones allowed in before she left. We then went back and watched the parade – also for the first time since 1999, since the parade had left for California for many years, replaced with Spectromagic here. A lot of it was familiar, but there were a number of new floats and changes as well. Immediately after the parade, the cold really was too much for me and we started to head out, but went into the Main Street Emporium and I purchased a light zip-up fleece which really made all the difference for the rest of the trip. I immediately felt warmer. We then managed to catch Wishes from near the entrance of the park, then hopped on the monorail to the TTC and drove back to SSR. Another day at Epcot today. It was an Extra Magic Hours morning, but since we had already done the “Soarin’ Dash”, we decided to sleep in a bit and didn’t get to the park until 8:45am. We went straight to Spaceship Earth this time for a quick ride (my mother-in-law’s favorite, although this was her first ride since the changes). We then went and grabbed Fastpasses for Test Track again (with the hopes of better luck), and then checked out the new attraction inside Innoventions called “The Sum Of All Thrills”. This is a make-your-own-ride type of system, where you design a thrill ride using a plane, roller coaster or bobsled as a base, and then design the track. It takes into account various things like gravity, friction, etc. so you have to design the ride so that you can complete your run, AND get the thrill level you want. It is meant to show how mathematics enter in to ride design. The problem is that you aren’t given very long to actually design your ride, so if you are unfamiliar with it you won’t actually get a sense of what will result in an actually thrilling experience. I’d love to spend a few hours with the simulator to try different things. You design the ride in pairs, and you are given a swipe card you get to keep, with your ride design associated with that card. When a simulator becomes available, you hand over a card and then board the simulator. It looks like a couple chairs from a roller coaster, with over-the-shoulder restraints, except not just the restraints come down, but a whole capsule with video screens to give you a virtual reality image of your ride. The seats are mounted on a Kuka robotic arm system, similar to what is used at Universal for the Harry Potter and the Forbidden Journey attraction, except these are stationary mounts. They can lift, twist and tilt the seats allowing several degrees of motion to simulate the ride you designed. It is actually quite a great system – just don’t be stingy on your design if you want some thrills. A couple run throughs may help you learn how to design better, but the waits can get a bit long at times. You are also supposed to be able to use the codes on your card online to get a ride video, but this never worked for us – all four cards were not recognized. I had contacted someone at Raytheon who was going to look in to it, but they never got back to me. After that we signed up for the Kim Possible Adventure for later. DW went with her mother to do some shopping, while I took the kids on Mission: SPACE (green side – waiting until DD#2 is a tad older before doing orange), and then DW rejoined us to ride Test Track – without issue this time. When we were finished we were around the time the next storyteller in Canada would appear, so we headed over there first, then double backed to get our Kimmunicators in Norway and started with the Norway adventure. We then had lunch in China at the Lotus Blossom Cafe, followed by the China adventure, and we did pretty much all the available ones except Japan and UK, as they wre not available on our phone (I believe they may limit the number of active adventurers in a given country to prevent crowding). After that we regrouped with the in-laws and headed back to the resort before their personal dinner out at Artist Point at the Wilderness Lodge. I drove them over, and brought them in, showed them around a bit and showed them to the restaurant, then wandered around briefly myself before heading back. They both had the salmon and said it was delicious, and they found their own way back to SSR later. The rest of the family and I went to Downtown Disney and decided to grab dinner at Earl Of Sandwich, which we had never eaten at before. It was pretty crowded and we ended up eating outside (which was pretty cold after sunset), but the sandwiches were really, really good. I had a Thanksgiving special sandwich, which was turkey and the fixings (although I skipped the cranberry sauce), while DW had the “Cannonball” meatball sandwich. We liked it so much, we came back the next night! We had an early morning for our last full day, so we didn’t stay out too late so it was a bit of separate shopping and then back to the resort. Our eighth day was something of a blur…we got the Magic Kingdom early for an early breakfast ADR at Crystal Palace, so we were able to get in ahead of the crowds and stroll slowly down a mostly empty Main St. and grab some pictures. The last time we got in early in 2007, there were a number of Photopass photographers out, but not this time. We took our time at breakfast where the Pooh characters spent plenty of time at the table, and then DW took the kids to Harmony Barber Shop to get their hair done. If your girls want to get their hair dolled up but you don’t want to go for the full expense of Bippity Boppity Boutique, consider this – $7.50 (not including tip) will get gel streaks, sparkles and decorations and it is pretty quick too. While that was going on, I took the in-laws to it’s a small world, which had recently swapped the entrance and exit queues. I had thought this was so to “mainstream” the line – that is, use the same line for both regular guests and those using wheelchairs and ECVs, but that wasn’t the case…we were directed to the exit, where we took the ECV down the ramp halfway, and had him walk the other half, where we were boarded pretty quickly. The line change just seems to have been to have more of the line inside the building, possibly to save on so many switchbacks at the front of the attraction. After regrouping with my newly-coiffed children, the family finally managed to ride the carousel, and we also did Big Thunder Mountain and Space Mountain as we wandered around. As a bit of tradition, before leaving the Magic Kingdom on our last day there, we take the Magic Kingdom Railroad for a complete loop around the park. This was a little different this time, because of the closure of Mickey’s Toontown Fair for the construction of the expanded Fantasyland. Although Disney is generally pretty good at keeping prying eyes out, but even with the trees you can see a fair amount of the area of construction. Although there were some building walls, nothing was really taking shape yet. Just before leaving, I spotted Snow White having a small meet and greet outside the under-renovation Exposition Hall, so while the others took care of a few things I took the kids for a few pictures with Snow White, and then we headed back to the resort. We all decided to go back to Downtown Disney, and this time all six of us ate at Earl Of Sandwich. This time I had the Hawaiian BBQ sandwich, while DW had the “Original 1762”, and DD#1 had the Caribbean Jerk sandwich. I don’t recall what the in-laws had, but it was ALL good. A couple cups of Potato Bacon soup made the rounds as well. The in-laws had a slightly earlier flight and were taking Magical Express, so they left early and took the bus back to SSR, while we went through the World Showcase again, along with a stop at the less-crowded Karamell-Kutche, where we all opted for the chocolate-covered caramel squares – one milk chocolate, one dark chocolate, and one German chocolate. All were delicious and amazingly soft without being too gooey to eat. We just sat out by the lagoon and enjoyed them. Finally it was time to leave, so we drove right from Epcot to the airport. Our trip back was uneventful and on-time, riding aboard “Blue come back now, ya hear?”.
2019-04-20T19:17:30Z
https://wdwuntangled.com/2012/12/09/trip-report-saratoga-springs-holidays-and-harry-potter-december-2010/
The introduction of the home router was a great advancement in security for many owners. Before routers, most PC users relied only on a software firewall or, more often than not, ran no firewall at all. Routers with built-in firewalls have generally been a very good thing. An item that provides safety can also lead to a false sense of security, however, and leave users vulnerable when attacks that they thought impossible occur. Routers are no different. They can be difficult to set up and often require updates to patch exploits discovered after release. Here’s what you must do to make your router is a boon instead of a burden. All modern WiFi routers provide a variety of encryption choices that are used to make traffic unintelligible to anyone trying to sniff Wi-Fi packets out of the air The 7 Most Common Tactics Used To Hack Passwords The 7 Most Common Tactics Used To Hack Passwords When you hear "security breach," what springs to mind? A malevolent hacker? Some basement-dwelling kid? The reality is, all that is needed is a password, and hackers have 7 ways to get yours. Read More . At a basic level all forms of encryption work, but some work better than others, and routers are lamentably silent when it comes to providing advice. Many routers list the oldest and least secure option, WEP, at the top of the list – so users often select it. How can you fix it? The best WiFi encryption option is WPA2 WPA2, WEP, and Friends: What's the Best Way to Encrypt Your Wi-Fi? WPA2, WEP, and Friends: What's the Best Way to Encrypt Your Wi-Fi? When setting up wireless encryption on your router, you'll come across a variety of confusing terms -- WPA2, WPA, WEP, WPA-Personal, and WPA-Enterprise. Read More . You’ll probably have this choice unless your router is more than eight years old. Though not invincible, it’s unlikely anyone will go to the bother of cracking your WPA2 secured network. You should make sure to pick a long and highly random password, too, since this will make a brute-force attack against your network much more difficult. You also should disable WPA2-PSK (the PSK standards for pre-shared key) if given the option. This form of encryption has been cracked, and can by-passed with relatively simple tools within a few minutes, no real hacking required. See our article on changing your Wi-Fi password How to Find & Change Your WiFi Password How to Find & Change Your WiFi Password Once your WiFi is set up, you feel no reason to remember the password. Until you need to connect another device. What's the password again? Fortunately, it's easy to find out! Read More for more details. The built-in firewall found in a router is one of its best traits. It provides a solid barrier between your home network and the Internet at large, making exploits that transfer themselves across the Internet, aka “worms,” more difficult to pull off. But your router’s firewall isn’t perfect. In addition to exploits, which I’ll address in detail shortly, routers are prone to simple misconfiguration. Home users often have difficulty navigating complex are unintuitive router menus. How can you fix it? Use a software firewall. You can use the built-in firewall in Windows 5 Reasons Why You Should Use a Firewall 5 Reasons Why You Should Use a Firewall You've heard of firewalls, but what are they really for? Do they stop viruses? Can you manage without one? We look at five reasons to install and use a firewall on your computer. Read More or one of the many free firewall options available The Three Best Free Firewalls for Windows The Three Best Free Firewalls for Windows Read More . Also, you should remember to close any unsecured gaps you might have opened in your router’s firewall. Many people open ports to make software work, but never close them after they stop using the app. Researchers have found a broad range of potential exploits in common consumer routers from companies like D-Link and ASUS. While most are not attacks that were found in the wild but instead discovered in a laboratory, the findings prove that routers are not fortresses. In fact, ever-expanding feature sets seem to provide more potential for exploitation. How can you fix it? Keep up to date on your router’s firmware. Modern routers sometimes have an automatic update feature, or allow you to update with the press of a button. If you find that option in your router’s options, that’s great. If you don’t, you’ll need to visit the support site of the router’s manufacturer and download an update, then install it manually. Home routers are always secured by a password. As explained earlier, this makes routers open to brute-force attacks, which can be effective if a password is too short. But there’s more to worry about than random brute-force hacking; in fact, that’s an unlikely scenario. What’s more likely is that someone will guess or discover your password. Discovery can be simple. Does your girlfriend or boyfriend know your password? What about your co-workers? Family? Friends? Many of the people who might know your password probably know it because you told them. And your password might be easy to guess if you use the name of a pet or a variation of your birth date. How can you fix it? Start creating strong and memorable passwords How to Create a Strong Password That You Will Not Forget How to Create a Strong Password That You Will Not Forget Do you know how to create and remember a good password? Here are some tips and tricks to maintain strong, separate passwords for all of your online accounts. Read More , which will help you learn the basics of a good password. Change your router’s password to something that is not at all associated with your personal life or interests and introduce random characters to it. Also, change your password every few months. A simple Google Calendar reminder can ensure you do so. Many recent routers have added a helpful connected storage feature, usually enabled by a USB port. The idea is that you can connect an external hard drive directly to the router, making it easy for all other computers in your home network to access. And since it’s connected to the router, not a computer, it doesn’t rely on any particular PC being turned on. Sounds great, right? But there’s also a security risk here. The first problem is the obvious fact that anyone who has access to your home network will likely have access to the files stored on the shared drive. Worse, several security flaws have been found in routers with this feature, which potentially make the drive visible to people not even connected to your network. How can you fix it? The simple answer is to not use a drive connected directly to your router. A more practical option, though perhaps less secure, is to only use the drive for files that aren’t sensitive. You could also use file encryption The 5 Best Ways To Easily & Quickly Encrypt Files Before Emailing Them [Windows] The 5 Best Ways To Easily & Quickly Encrypt Files Before Emailing Them [Windows] Earlier this year, I was faced with a situation where I had a writer working for me overseas in China, where we were both certain that all of our email communications were being monitored. I... Read More , though it will add an extra step into using files stored on the drive. Routers are still a boon for home networks, but they’ve certainly suffered their fair share of problems – and it’s likely to get worse. Common network hardware, like a common operating system, is often targeted because it’s popular. Finding an exploit in a popular router can provide access to hundreds of thousands of victims. This doesn’t mean you have to treat your router like a time bomb, but you do need to beware of the potential pitfalls and take steps to lessen how they can affect you. What do you think of router security? Do you feel it’s sufficient, or have manufacturers become lazy? Let us know in the comments! Explore more about: Online Security, Router, Wi-Fi. How to Change Which Facebook Friends Can See You OnlineHow Easy Is It For Someone To Hack Your Webcam? Great information in an easy to understand language. I have a quick question. I recently got a TP-Link Archer C7 router that has a guest network as one of its features. How secure is a guest network, and is it completely isolated from my home network? Is it safe to use the guest network for IOT devices with questionable security? I would be interested in what typical home routers would be considered the most secure, ...I mean since both D-Link and Asus were specifically called out in this article. Since your article on EMR appeared, "Dangers of Wireless", I have eliminated WiFi and hardwired my house with CAT6a SSTP (screened shielded twisted pair) Ethernet cable. A test meter shows neglible EMR leakage in my home. I believe I need not worry about someone invading my home network. "But the thing is Pfsense doesn't receive real time live security updates like Pfsense Snort IPS." Yes.. those pesky keyboards just type whatever the heck they want.... no way the human pushing the keys could have made a misstakke. (Look... mine just did it too. Must be that someone hacked both of our keyboards because of WPA2-PSK encryption). I use Check Point for my firewall. They may not be cheap but they are far more effective than your standard regular wireless router. I also deployed Pfsense in my rig but I don't use it as a firewall but instead use it for traffic shaping, networking monitoring, Cache Proxy, load balancing for my servers I run out of my house. In a nut shell Pfsense is sort of my replacement to my Blue Coat Traffic Shaper that I use to own. I prefer to use commercial firewalls since you have far better support and the protect is far more effective than something that is offered for free. Free doesn't mean you get the same level of security as a commercial product because there is a huge difference on how they perform. Pfsense and Check Point both offer IPS. But the thing is Pfsense doesn't receive real time live security updates like Pfsense Snort IPS. See the difference? Anything can get pass Snort if its not updated in time. Same goes with Anti-Virus firewall gateways. Open Source software doesn't mean its equality effectiveness Check Point Firewalls is commercial and effective which is the reason why its used by 100 percent by every 100 Fortune company in the US mostly financial firms and governments. You can say the same thing for Avast Free. There is a reason why there is a Free version and a Paid version. Both work well but you get better effectiveness if you pay because you get far more frequent updates than the Free version if you get my drift. "you get better effectiveness if you pay because you get far more frequent updates than the Free version if you get my drift." You are adrift if you think that. Pay-for versions of software usually have more features than free versions. However, the frequency and the content of security updates is the same. "Check Point Firewalls is commercial and effective which is the reason why its used by 100 percent by every 100 Fortune company in the US mostly financial firms and governments." CheckPoint is not used by 100% of Fortune 100 companies. Many other Enterprise Security suites are in use. The only reason corporations and governments use commercial software is that the corporate lawyers can blame (sue) somebody if their company's security is compromised. "Anything can get pass Snort if its not updated in time." Malware can get past ANY security software, even commercial, if it isn't update in time. BTW - do you realize that most security updates are REACTIVE, rather than PROACTIVE? They cure whatever infection have already occured and innoculate against future infections by the same malware. Which is only to be expected since how can you patch a hole that you do not know you have? Most free security software only updates either once a day or a few times in a day. Commercial software gets far updated more frequently than that, most in real time. That is what people miss or don't even think twice about. Many routers list the oldest and least secure option, WEP, at the top of the list – so users often select it. You also should disable WPA2-PSK (the PSK standards for pre-shared key) if given the option. This form of encryption has been cracked, and can by-passed with relatively simple tools within a few minutes, no real hacking required. Uh, no. Where are you getting this from? Also, change your password every few months. A simple Google Calendar reminder can ensure you do so. If you use a strong password, this is pointless. And annoying. Set up a strong password once and leave it. and it’s likely to get worse. I'd also go with WPS as the one to avoid - subject to a basic design flaw as bad as that in WEP. The PIN is 8 digits (7 + check) and the flaw is that it is validated in two 4 digit chunks (the second being effectively 3 digits). With no throttling, brute forcing would be trivial. Unbroadcast SSID - at best, prevents accidental connects if you must run an open network - and if you must, then it should be a locked down secondary network with limited privileges. Conveys no additional security. MAC filtering - may deter some, but anyone who can crack any other protection can easily find & spoof a valid mac address. Those two "nonsense security" measures may deter casual "Oh, I see a network" connection abusers, but are not any form of security. WEP - is broken, leaks the key to anyone with an off the shelf hacktool - if you must have WEP to support some crummy old device, then it should be as a limited secondary network without access to your home network or anything more than it needs. WPA - better than WEP, intended to be possible as a software/firmware update to WEP hardware, but not entirely without flaws. As You wrote, using the MAC code is not easily found in every computer or device, but I use this method as my favorite to protect my network. It is also time-consuming to manage, but verk effective. I ment "very effective". (english is not my native language). What about WPA2-PSK [AES], does the AES fix the WPA2 issue? Lovely fear mongering! First. please run your article by an editor so that someone can fix the sentences that a completely missing words. Second, 90% of home users wouldn't know how to set up a home network, so they don't have one. They simply have a wireless connection to their internet, no sharing between devices going on at all. Third, since most home routers have a limited range that usually doesn't extend past one's property, a hacker would need to visibly be parked directly in front of someone's house, making themselves very obvious, which means that routers are inherently safe from intruders simply by their lack of range. Let's go point by point. First, check your own comment. It appears you require an editor as well (second sentence) for the same reason. Second, most users don't need to know how to set up a home network. It tends to get set up for them by default when a broadband modem/router is introduced. It doesn't matter that they are not sharing anything on their own devices. The connection itself makes the network, not the sharing between the owner's devices. Someone else can also connect to the same wireless network too, so they may have a foot in the door. Third, this would only apply to those in more rural areas. At my parent's house, I can see the networks from several of their neighbors. I can see their network when I am about 100 yards from the house. I can reliably connect to it when I am about 50 yards out. In my apartment building, I can connect to my own wireless network when I am within the middle third of the length of the building on any of the 5 floors so your "usually doesn't extend past one's property" assertion is false for a huge number of people. Please consider to upgrade to custom firmware, such as DD WRT or Open WRT. They can provide a lot of new features and enhanced security. So, if you're saying we shouldn't run WPA2-PSK, should we be setting up RADIUS servers at home to run WPA2-Enterprise? Seems like overkill and overly complicated for most home users. Were you perhaps referring to WPS? Never, EVER use WPS. Wi-Fi Protected Setup is even easier to hack than WEP. Disable it in your router's control panel if you can. Even disabling WPS in the control panel doesn't work for some routers. You can tick the box but WPS is still enabled. Yet another reason to make sure you have the latest firmware update. What about using m0n0wall or SmoothWall in front of the router? That should improve security somewhat.
2019-04-24T06:13:43Z
https://www.makeuseof.com/tag/router-security-risk-fix/
Welcome to Lingk, the website and online service of Lingk Inc. (“Lingk,” “we,” or “us”). This page explains the terms by which you may use our online and/or mobile services, web site, and software provided on or in connection with the service (collectively the “Service”). This Agreement applies to all visitors, users, and others who access the Service, including, without limitation, commercial enterprises, governments, schools, universities and other institutions, such institutions’ staff, faculty, administrators, students or other users not affiliated with any such institutions but who other use or access the Service (“Users”). Lingk provides a data synchronization platform, APIs and data integration tools for users to rapidly integrate and share data with other applications, institutions and enterprises. This is a contract between you and Lingk. You must read and agree to these terms before using the Lingk Service. If you do not agree, you may not use the Service. You may use the Service only if you can form a binding contract with Lingk. You may only use the Services, including uploading and using and Customer Data (defined below), only in compliance with this Agreement and all applicable local, state, national, and international laws, rules and regulations. You agree, and we agree, to uphold any responsibilities that you may have, or we may have, under the Family Educational Rights and Privacy Act (“FERPA”), and any other state or federal privacy laws which may apply to the information contained in Customer Data. We provide the Services as an outsourced institutional function under FERPA 34 CFR Part 99.31(a)(1). Any use or access to the Service by anyone under 13 is strictly prohibited and in violation of this Agreement. The Service is not available to any Users previously removed from the Service by Lingk. Subject to the terms and conditions of this Agreement, you are hereby granted a non-exclusive, limited, non-transferable, freely revocable license to use the Service as permitted by the features of the Service. Lingk reserves all rights not expressly granted herein in the Service and the Lingk Content (as defined below). Lingk may terminate this license at any time for any reason or no reason. Your Lingk account gives you access to the services and functionality that we may establish and maintain from time to time and in our sole discretion. We may maintain different types of accounts for different types of Users, and account types may differ in functionality and the features available. If you open a Lingk account on behalf of a school, university, company, organization, or other entity, then (a) “you” includes you and that entity, and (b) you represent and warrant that you are an authorized representative of the entity with the authority to bind the entity to this Agreement, and that you agree to this Agreement on the entity’s behalf. By connecting to Lingk or the Service with a third-party service, you give us permission to access and use your information from that service as permitted by that service, and to store your log-in credentials for that service. You may never use another User’s account without permission. When creating your account, you must provide accurate and complete information, and you must keep this information up to date so please always update this information promptly if it changes. You are solely responsible for the activity that occurs on your account, and you must keep your account password secure. We encourage you to use “strong” passwords (passwords that use a combination of upper and lower case letters, numbers and symbols) with your account. You must notify Lingk immediately of any breach of security or unauthorized use of your account. Lingk will not be liable for any losses caused by any unauthorized use of your account. You may control your User profile and how you interact with the Service by changing the settings in your account settings page. By providing Lingk your email address you consent to our using the email address to send you Service-related notices, including any notices required by law, in lieu of communication by postal mail. We may also use your email address to send you other messages, such as changes to features of the Service and special offers. If you do not want to receive such email messages, you may opt out. Opting out may prevent you from receiving email messages regarding updates, improvements, or offers. You agree not to engage in any of the following prohibited activities: (i) copying, distributing, or disclosing any part of the Service in any medium, including without limitation by any automated or non-automated “scraping”; (ii) using any automated system, including without limitation “robots,” “spiders,” “offline readers,” etc., to access the Service in a manner that sends more request messages to our servers than a human can reasonably produce in the same period of time by using a conventional on-line web browser (except that Lingk grants the operators of public search engines revocable permission to use spiders to copy publically available materials from our websites for the sole purpose of and solely to the extent necessary for creating publicly available searchable indices of the materials, but not caches or archives of such materials); (iii) transmitting spam, chain letters, or other unsolicited email; (iv) attempting to interfere with, compromise the system integrity or security or decipher any transmissions to or from the servers running the Service; (v) taking any action that imposes, or may impose at our sole discretion an unreasonable or disproportionately large load on our infrastructure; (vi) uploading invalid data, viruses, worms, or other software agents through the Service; (vii) collecting or harvesting any personally identifiable information, including account names, from the Service; (viii) using the Service for any commercial solicitation purposes; (ix) impersonating another person or otherwise misrepresenting your affiliation with a person or entity, conducting fraud, hiding or attempting to hide your identity; (x) interfering with the proper working of the Service; (xi) accessing any content on the Service through any technology or means other than those provided or authorized by the Service; or (xii) bypassing the measures we may use to prevent or restrict access to the Service, including without limitation features that prevent or restrict use or copying of any content or enforce limitations on use of the Service or the content therein. We may, without prior notice, change the Service; stop providing the Service or features of the Service, to you, to specific account types, or to Users generally; or create usage limits for the Service. We may permanently or temporarily terminate or suspend your access to the Service without notice and liability for any reason, including if, in our sole determination, you violate any provision of this Agreement, or for no reason. Upon termination for any reason or no reason, you continue to be bound by this Agreement. You are solely responsible for your interactions with other Users on the Lingk Service. We reserve the right, but have no obligation, to monitor disputes between you and other Users. Lingk shall have no liability for your interactions with other Users, or for any User’s action or inaction. Except for your Customer Data (defined below), the Service and all materials therein or transferred thereby, including, without limitation, software, images, text, graphics, illustrations, logos, patents, trademarks, service marks, copyrights, photographs, audio, videos, music, and Customer Data or other content belonging to other Users (the “Lingk Content”), and all Intellectual Property Rights (defined below) related thereto, are the exclusive property of Lingk and its licensors. Except as explicitly provided herein, nothing in this Agreement shall be deemed to create a license in or under any such Intellectual Property Rights, and you agree not to sell, license, rent, modify, distribute, copy, reproduce, transmit, publicly display, publicly perform, publish, adapt, edit or create derivative works from any Lingk Content. Use of the Lingk Content for any purpose not expressly permitted by this Agreement is strictly prohibited. You may choose to or we may invite you to submit comments or ideas about the Service, including without limitation about how to improve the Service or our products (“Ideas”). By submitting any Idea, you agree that your disclosure is gratuitous, unsolicited and without restriction and will not place Lingk under any fiduciary or other obligation, and that we are free to use the Idea without any additional compensation to you, and/or to disclose the Idea on a non-confidential basis or otherwise to anyone. You further acknowledge that, by acceptance of your submission, Lingk does not waive any rights to use similar or related ideas previously known to Lingk, or developed by its employees, or obtained from sources other than you. A. Customer Data. Certain features and functionalities of the Service allow you to upload or make available through the Service data belonging to your end users, including data and information that is related to identifiable student, whether currently enrolled or otherwise, that is maintained by you, such as “educational records” as defined by FERPA (all such data referred to in this Agreement as “Customer Data”). As between us, you retain ownership and control of your Customer Data. We shall use and process Customer Data solely for the purpose of providing the Services under this Agreement, subject to the provisions in this Section. You are solely responsible for any and all of your Customer Data and, except for the license below to provide the Services, we do not own, control or license your Customer Data. We provide access to Customer Data only to those employees and certain trusted service providers who have a legitimate need to access such information in connection with providing the Services to you. Of course, anyone involved in the handling of Customer Data will treat such data as strictly confidential and shall not redisclose such data except as necessary in order to provide the Services. B. Customer Data License Grant. By submitting, or causing other Users to submit, Customer Data on or through the Service, you expressly grant, and you represent and warrant that you have all rights necessary to grant, all access, rights and licenses to the Customer Data required for us and our subcontractors and service providers to provide the Services, or to enforce our rights under this Agreement. You acknowledge and agree that we may collect, analyze and use anonymized or aggregated Customer Data (i.e., Customer Data that has been de-identified and aggregated in a way that the data cannot be used to reasonably identify a specific school or institution, a student or any particular User), or data derived from Customer Data, as well as data about your access and use of our Services, for the purpose of providing, operating, analyzing, and improving our Services. your Customer Data complies with the terms of this Agreement. D. Access to Your Customer Data. The Service allows you to designate other Users, such as third party developers or your own internal developers, to securely access your Customer Data through the Service (including any APIs we may provide). You acknowledge and agree that we are not responsible for the data practices of third party developers with whom you elect to share Customer Data and that, as between us, you are solely responsible for the consequences of providing access to or otherwise transmitting your Customer Data to such developers. At any time, you can revoke a developer’s access to your Customer Data through Lingk by contacting us at [email protected]. Customer Data is subject to the control of our Customers and we cannot allow other parties to access, delete or control Customer Data without consent of the Customer. Whenever possible, we will defer any data access requests to the Customer. E. Deletion of Customer Data. At the end of the term of this Agreement, Lingk shall de-identify all Customer Data in our possession within 30 days of the end of the term of this Agreement. You may request the deletion of any of your Customer Data, except for the aggregated and anonymized Customer Data as contemplated by Section 4(B) above, at any time. We will comply with all such requests within ten (10) days, unless such data is maintained in the form of backups or internal logs and which shall be deleted in the normal course of business. The Service contains data, information, and other content not owned by you, such as reputational or status indicators, analytics and other information or data associated with your account (“Lingk Property”). You understand and agree that regardless of terminology used, Lingk Property represents a limited license right governed solely by the terms of this Agreement and available for distribution at Lingk’s sole discretion. Lingk Property is not redeemable for any sum of money or monetary value from Lingk at any time. You acknowledge that you do not own the account you use to access the Service, nor do you possess any rights of access or rights to data stored by or on behalf of Lingk on Lingk servers, including without limitation any data representing or embodying any or all of your Lingk Property. You agree that Lingk has the absolute right to manage, regulate, control, modify and/or eliminate Lingk Property as it sees fit in its sole discretion, in any general or specific case, and that Lingk will have no liability to you based on its exercise of such right. All data on Lingk’s servers are subject to deletion, alteration or transfer. NOTWITHSTANDING ANY VALUE ATTRIBUTED TO SUCH DATA BY YOU OR ANY THIRD PARTY, YOU UNDERSTAND AND AGREE THAT ANY DATA, ACCOUNT HISTORY AND ACCOUNT CONTENT RESIDING ON LINGK’S SERVERS, MAY BE DELETED, ALTERED, MOVED OR TRANSFERRED AT ANY TIME FOR ANY REASON IN LINGK’S SOLE DISCRETION, WITH OR WITHOUT NOTICE AND WITH NO LIABILITY OF ANY KIND. LINGK DOES NOT PROVIDE OR GUARANTEE, AND EXPRESSLY DISCLAIMS, ANY VALUE, CASH OR OTHERWISE, ATTRIBUTED TO ANY DATA RESIDING ON LINGK’S SERVERS. If the Service provides professional information (for example, medical, legal, or financial), such information is for informational purposes only and should not be construed as professional advice. No action should be taken based upon any information contained in the Service. You should seek independent professional advice from a person who is licensed and/or qualified in the applicable area, including compliance with any applicable laws and regulations regarding the collection and use of your Customer Data. We maintain physical, managerial and technical safeguards to preserve the integrity and security of our Users’ Customer Data. If there is any disclosure or access to any personally identifiable Customer Data by an unauthorized party, we will promptly notify any affected Customer and will use reasonable efforts to cooperate with their investigation of the incident. If the incident triggers any third party notice requirements under applicable laws, you agree that, as the owner of the Customer Data, you may be responsible for the timing, content, cost and method of any required notice and compliance with those laws. You agree to defend, indemnify and hold harmless Lingk and its subsidiaries, agents, licensors, managers, and other affiliated companies, and their employees, contractors, agents, officers and directors, from and against any and all claims, damages, obligations, losses, liabilities, costs or debt, and expenses (including but not limited to attorney’s fees) arising from: (i) your use of and access to the Service, including any data or content transmitted or received by you; (ii) your violation of any term of this Agreement, including without limitation your breach of any of the representations and warranties above; (iii) your violation of any third-party right, including without limitation any right of privacy or Intellectual Property Rights; (iv) your violation of any applicable law, rule or regulation, including, but not limited to, FERPA; (v) any content that is submitted via your account including without limitation misleading, false, or inaccurate information; (vi) your willful misconduct; or (vii) any other party’s access and use of the Service with your unique username, password or other appropriate security code. THE SERVICE IS PROVIDED ON AN “AS IS” AND “AS AVAILABLE” BASIS. USE OF THE SERVICE IS AT YOUR OWN RISK. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE SERVICE IS PROVIDED WITHOUT WARRANTIES OF ANY KIND, WHETHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. NO ADVICE OR INFORMATION, WHETHER ORAL OR WRITTEN, OBTAINED BY YOU FROM LINGK OR THROUGH THE SERVICE WILL CREATE ANY WARRANTY NOT EXPRESSLY STATED HEREIN. WITHOUT LIMITING THE FOREGOING, LINGK, ITS SUBSIDIARIES, ITS AFFILIATES, AND ITS LICENSORS DO NOT WARRANT THAT THE CONTENT IS ACCURATE, RELIABLE OR CORRECT; THAT THE SERVICE WILL MEET YOUR REQUIREMENTS; THAT THE SERVICE WILL BE AVAILABLE AT ANY PARTICULAR TIME OR LOCATION, UNINTERRUPTED OR SECURE; THAT ANY DEFECTS OR ERRORS WILL BE CORRECTED; OR THAT THE SERVICE IS FREE OF VIRUSES OR OTHER HARMFUL COMPONENTS. ANY CONTENT DOWNLOADED OR OTHERWISE OBTAINED THROUGH THE USE OF THE SERVICE IS DOWNLOADED AT YOUR OWN RISK AND YOU WILL BE SOLELY RESPONSIBLE FOR ANY DAMAGE TO YOUR COMPUTER SYSTEM OR MOBILE DEVICE OR LOSS OF DATA THAT RESULTS FROM SUCH DOWNLOAD OR YOUR USE OF THE SERVICE. LINGK DOES NOT WARRANT, ENDORSE, GUARANTEE, OR ASSUME RESPONSIBILITY FOR ANY PRODUCT OR SERVICE ADVERTISED OR OFFERED BY A THIRD PARTY THROUGH THE LINGK SERVICE OR ANY HYPERLINKED WEBSITE OR SERVICE, AND LINGK WILL NOT BE A PARTY TO OR IN ANY WAY MONITOR ANY TRANSACTION BETWEEN YOU AND THIRD-PARTY PROVIDERS OF PRODUCTS OR SERVICES. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL LINGK, ITS AFFILIATES, AGENTS, DIRECTORS, EMPLOYEES, SUPPLIERS OR LICENSORS BE LIABLE FOR ANY INDIRECT, PUNITIVE, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR EXEMPLARY DAMAGES, INCLUDING WITHOUT LIMITATION DAMAGES FOR LOSS OF PROFITS, GOODWILL, USE, DATA OR OTHER INTANGIBLE LOSSES, ARISING OUT OF OR RELATING TO THE USE OF, OR INABILITY TO USE, THIS SERVICE. UNDER NO CIRCUMSTANCES WILL LINGK BE RESPONSIBLE FOR ANY DAMAGE, LOSS OR INJURY RESULTING FROM HACKING, TAMPERING OR OTHER UNAUTHORIZED ACCESS OR USE OF THE SERVICE OR YOUR ACCOUNT OR THE INFORMATION CONTAINED THEREIN. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, LINGK ASSUMES NO LIABILITY OR RESPONSIBILITY FOR ANY (I) ERRORS, MISTAKES, OR INACCURACIES OF CONTENT; (II) PERSONAL INJURY OR PROPERTY DAMAGE, OF ANY NATURE WHATSOEVER, RESULTING FROM YOUR ACCESS TO OR USE OF OUR SERVICE; (III) ANY UNAUTHORIZED ACCESS TO OR USE OF OUR SECURE SERVERS AND/OR ANY AND ALL PERSONAL INFORMATION STORED THEREIN; (IV) ANY INTERRUPTION OR CESSATION OF TRANSMISSION TO OR FROM THE SERVICE; (V) ANY BUGS, VIRUSES, TROJAN HORSES, OR THE LIKE THAT MAY BE TRANSMITTED TO OR THROUGH OUR SERVICE BY ANY THIRD PARTY; (VI) ANY ERRORS OR OMISSIONS IN ANY CONTENT OR FOR ANY LOSS OR DAMAGE INCURRED AS A RESULT OF THE USE OF ANY CONTENT POSTED, EMAILED, TRANSMITTED, OR OTHERWISE MADE AVAILABLE THROUGH THE SERVICE; AND/OR (VII) CONTENT PROVIDED BY A THIRD PARTY OR THE DEFAMATORY, OFFENSIVE, OR ILLEGAL CONDUCT OF ANY THIRD PARTY. IN NO EVENT SHALL LINGK, ITS AFFILIATES, AGENTS, DIRECTORS, EMPLOYEES, SUPPLIERS, OR LICENSORS BE LIABLE TO YOU FOR ANY CLAIMS, PROCEEDINGS, LIABILITIES, OBLIGATIONS, DAMAGES, LOSSES OR COSTS IN AN AMOUNT EXCEEDING THE AMOUNT YOU PAID TO LINGK HEREUNDER OR $100.00, WHICHEVER IS GREATER. THIS LIMITATION OF LIABILITY SECTION APPLIES WHETHER THE ALLEGED LIABILITY IS BASED ON CONTRACT, TORT, NEGLIGENCE, STRICT LIABILITY, OR ANY OTHER BASIS, EVEN IF LINGK HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. THE FOREGOING LIMITATION OF LIABILITY SHALL APPLY TO THE FULLEST EXTENT PERMITTED BY LAW IN THE APPLICABLE JURISDICTION. The Service is controlled and operated from facilities in the United States. Lingk makes no representations that the Service is appropriate or available for use in other locations. Those who access or use the Service from other jurisdictions do so at their own volition and are entirely responsible for compliance with all applicable United States and local laws and regulations, including but not limited to export and import regulations. You may not use the Service if you are a resident of a country embargoed by the United States, or are a foreign person or entity blocked or denied by the United States government. Unless otherwise explicitly stated, all materials found on the Service are solely directed to individuals, companies, or other entities located in the United States. A. Governing Law. You agree that: (i) the Service shall be deemed solely based in California; and (ii) the Service shall be deemed a passive one that does not give rise to personal jurisdiction over us, either specific or general, in jurisdictions other than California. This Agreement shall be governed by the internal substantive laws of the State of California, without respect to its conflict of laws principles. The parties acknowledge that this Agreement evidences a transaction involving interstate commerce. Notwithstanding the preceding sentences with respect to the substantive law, any arbitration conducted pursuant to the terms of this Agreement shall be governed by the Federal Arbitration Act (9 U.S.C. §§ 1-16). The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. You agree to submit to the personal jurisdiction of the federal and state courts located in Contra Costa County, California for any actions for which we retain the right to seek injunctive or other equitable relief in a court of competent jurisdiction to prevent the actual or threatened infringement, misappropriation or violation of our copyrights, trademarks, trade secrets, patents, or other intellectual property or proprietary rights, as set forth in the Arbitration provision below, including any provisional relief required to prevent irreparable harm. You agree that Contra Costa County, California is the proper forum for any appeals of an arbitration award or for trial court proceedings in the event that the arbitration provision below is found to be unenforceable. B. Arbitration. READ THIS SECTION CAREFULLY BECAUSE IT REQUIRES THE PARTIES TO ARBITRATE THEIR DISPUTES AND LIMITS THE MANNER IN WHICH YOU CAN SEEK RELIEF FROM LINGK. For any dispute with Lingk, you agree to first contact us at [email protected] and attempt to resolve the dispute with us informally. In the unlikely event that Lingk has not been able to resolve a dispute it has with you after sixty (60) days, we each agree to resolve any claim, dispute, or controversy (excluding any claims for injunctive or other equitable relief as provided below) arising out of or in connection with or relating to this Agreement, or the breach or alleged breach thereof (collectively, “Claims”), by binding arbitration by JAMS, under the Optional Expedited Arbitration Procedures then in effect for JAMS, except as provided herein. JAMS may be contacted at www.jamsadr.com. The arbitration will be conducted in Contra Costa County, California, unless you and Lingk agree otherwise. If you are using the Service for commercial purposes, each party will be responsible for paying any JAMS filing, administrative and arbitrator fees in accordance with JAMS rules, and the award rendered by the arbitrator shall include costs of arbitration, reasonable attorneys’ fees and reasonable costs for expert and other witnesses. If you are an individual using the Service for non-commercial purposes: (i) JAMS may require you to pay a fee for the initiation of your case, unless you apply for and successfully obtain a fee waiver from JAMS; (ii) the award rendered by the arbitrator may include your costs of arbitration, your reasonable attorney’s fees, and your reasonable costs for expert and other witnesses; and (iii) you may sue in a small claims court of competent jurisdiction without first engaging in arbitration, but this does not absolve you of your commitment to engage in the informal dispute resolution process. Any judgment on the award rendered by the arbitrator may be entered in any court of competent jurisdiction. Nothing in this Section shall be deemed as preventing Lingk from seeking injunctive or other equitable relief from the courts as necessary to prevent the actual or threatened infringement, misappropriation, or violation of our data security, Intellectual Property Rights or other proprietary rights. C. Class Action/Jury Trial Waiver. WITH RESPECT TO ALL PERSONS AND ENTITIES, REGARDLESS OF WHETHER THEY HAVE OBTAINED OR USED THE SERVICE FOR PERSONAL, COMMERCIAL OR OTHER PURPOSES, ALL CLAIMS MUST BE BROUGHT IN THE PARTIES’ INDIVIDUAL CAPACITY, AND NOT AS A PLAINTIFF OR CLASS MEMBER IN ANY PURPORTED CLASS ACTION, COLLECTIVE ACTION, PRIVATE ATTORNEY GENERAL ACTION OR OTHER REPRESENTATIVE PROCEEDING. THIS WAIVER APPLIES TO CLASS ARBITRATION, AND, UNLESS WE AGREE OTHERWISE, THE ARBITRATOR MAY NOT CONSOLIDATE MORE THAN ONE PERSON’S CLAIMS. YOU AGREE THAT, BY ENTERING INTO THIS AGREEMENT, YOU AND LINGK ARE EACH WAIVING THE RIGHT TO A TRIAL BY JURY OR TO PARTICIPATE IN A CLASS ACTION, COLLECTIVE ACTION, PRIVATE ATTORNEY GENERAL ACTION, OR OTHER REPRESENTATIVE PROCEEDING OF ANY KIND. A. Assignment. This Agreement, and any rights and licenses granted hereunder, may not be transferred or assigned by you, but may be assigned by Lingk without restriction. Any attempted transfer or assignment in violation hereof shall be null and void. C. California Residents. The provider of services is Lingk Inc., 4115 Blackhawk Plaza Circle, Suite 100, Danville, CA 94506, telephone 925-648-7462. If you are a California resident, in accordance with Cal. Civ. Code §1789.3, you may report complaints to the Complaint Assistance Unit of the Division of Consumer Services of the California Department of Consumer Affairs by contacting them in writing at 1625 North Market Blvd., Suite N 112 Sacramento, CA 95834, or by telephone at (800) 952-5210 or (916) 445-1254. D. Entire Agreement/Severability. This Agreement, together with any amendments and any additional agreements you may enter into with Lingk in connection with the Service, shall constitute the entire agreement between you and Lingk concerning the Service. If any provision of this Agreement is deemed invalid by a court of competent jurisdiction, the invalidity of such provision shall not affect the validity of the remaining provisions of this Agreement, which shall remain in full force and effect, except that in the event of unenforceability of the universal Class Action/Jury Trial Waiver, the entire arbitration agreement shall be unenforceable. E. No Waiver. No waiver of any term of this Agreement shall be deemed a further or continuing waiver of such term or any other term, and Lingk’s failure to assert any right or provision under this Agreement shall not constitute a waiver of such right or provision. F. Contact. Please contact us at [email protected] with any questions regarding this Agreement. This Agreement was last modified on June 29, 2018.
2019-04-22T05:58:28Z
http://www.lingk.io/terms-of-use/
change – verb – Make or become different. I’ve been thinking about change and progress recently. I read the two quotes illustrated below on my morning commute and it got me thinking about change. How do we effectively bring about change? How do we measure progress? How do we set goals that ensure progress is in the right direction? We recently adopted a puppy. Bruno’s been with us for 5 and a half weeks and has changed an enormous amount in that time. There have been obvious physical changes, but the changes in temperament and sociability are just as apparent. The other significant change you can see in these photos is the state of the grass! We’ve had virtually no rain since he arrived and the lawn has turned from a lush green to a dry and dusty yellow. There is change happening all around us all the time. We are impacted by changes in our environment and by the things we expose ourselves to. If we want the change to be positive progress in the right direction, then I think we have to be mindful, we have to set objectives and we have to take small steps towards the goals. If we aren’t, then the influences we expose ourselves to will take us down a path we haven’t planned for. As we train our puppy it is so clear that he responds to positive stimulus very quickly. What is also apparent is that a lot of good hard training can be so quickly undone by the wrong stimulus. Take care what you are training yourself to be, and let me know what you think about change in the comments. I talk about how Barnett Waddingham are using the Fuze unified communications platform to improve communication within the firm. Assuming that we want ourselves and our teams to be concentrating on something productive we need to minimise distractions in the workplace. Some people are no doubt better at filtering out distractions than others and some distractions are easier to filter out than others. For many the most distracting thing in the workplace is email. There are some simple techniques for limiting the power of email to distract. Turn off all the notifications; or even switch off the email client altogether and turn it on periodically to catch up. You don’t need to reply to that email within minutes of receiving it and anyone who expects you to respond to email that quickly doesn’t have your best interests at heart. I discuss the challenges the company’s IT department faces, the importance of the Cloud and the awareness the Board should have towards technology and its risks with Knowledge Peers. Yesterday afternoon I took part in a panel discussion on “Leading Empty Desks” at Knowledge Peers Exchange 2013 Event. The discussion was led by Giri Tharmananthar of Microsoft who started the discussion with an engaging talk based around Dave Coplin‘s book – “Business Reimagined” and talk – “Re-imagining work”. I found the discussion interesting and hope the attendees found it useful too. If you are considering allowing employees complete flexibility in how, where and when they work, then you need to do so in an environment of complete openness and trust. You might think that the most important element is employer’s trusting employees to do the work. Actually that’s not as big an issue as employee to employee trust. We want people to work collaboratively and to do that they need to trust each other and know they can rely on their colleagues to get things done, even when they can’t see them working. Openness is really important – knowing who’s working on what and how to get hold of them and when to get hold of them. In order for this to work productivity and performance need to be outcome based, not process based. I think the goal has to be to have a policy which treats all employees equally. The challenge is that some employees will abuse that trust and how you deal with that? Dealing with it by changing the policies and bringing everyone back to the office as Yahoo! have publically done recently is one answer. Another approach is to have a very active policy of getting rid of the people who aren’t performing. This can be difficult to achieve without creating a culture of fear. We do need to have the right policies in place to ensure that those that don’t deliver are dealt with so that others don’t feel they are carrying team members who aren’t pulling their own weight. This isn’t really any different to what should happen in an office based team, but is likely to be a more acute need in a virtual team. I came across the concept of “Working Out Loud” as a way of being open and doing social to ensure the virtual team stay in touch and connected. We used to be able to easily define the edges of our IT networks and the edges of our organisations. Typically they extended only as far as the office walls and the leased lines we used to interconnect our offices. We extended the edges through VPNs to people’s homes but in today’s hyper-connected world with smart phones, tablets, BYOD and cloud services like DropBox, Sky drive and Google docs who can honestly say they know where all their company’s information resides? I think it is important for us to grapple with these issues and give our employees the best tools so that they can collaborate and be productive without raising the hackles of our compliance and risk teams. If we don’t enable our employees to work productively with the best tools they will work around the corporate policies and create a “shadow IT” where we have no control or visibility. Do Offices Still Make Sense? I think there are a lot of places where offices still make sense. I love using my tablet and my smartphone when I’m out and about, but when I have a lengthy report to compile or need to analyse our IT budget in excel I need a desk with a computer with a keyboard and mouse – and the best environment for that is an office. I do have an office and a desk at home and I do sometimes work from there, but I have 4 children ranging in age from 1 to 9 so my home office is rarely distraction free. Sometimes it works, but I often get more done when I am working alongside other people who have also gone to sit at a desk to get their heads down and do some work – in the office. It is nice to have the flexibility to work anytime, anywhere and with any device. But, I suspect I am far from alone in being someone who is most productive when in the office. Email itself isn’t broken, but we are using it in ways where it isn’t the best tool for the job and this is leading to email overload. We are still using email to send attachments to one another rather than using collaboration tools. We are still using email to send announcements and gather information which can be done better with more open social platforms – like Yammer, SharePoint, Twitter and huddle. It has been a while since I posted here. I have been a little busy. We moved back into our house last November after a big renovation project – a few weeks later than originally planned – just in time for the birth of our fourth baby on 5 December. Since then the family, home, work and church commitments have kept me rather too busy to continue blogging here. I’m not going to promise that I won’t still be too busy to post regularly – after all, this blog is to help me organise my thoughts around leadership and learning. To the extent that anyone else benefits from my ramblings I am glad, but if I fail to get back on a more regular schedule, I guess that’s my lookout. It is coming up to a year since I went on the Ashridge Leadership Workshop and I have done a good deal of continued learning since. Some of this I hope to share over the coming weeks and months. I have a number of topic ideas and part-written posts stored up in Evernote so the ideas are definitely there if not the finished articles. “Perfection is the enemy of good” as they say and I suspect I may need to just start getting it done and stop worrying so much about the editing and polishing. I enjoyed listening to “Seth Godin’s Startup School” which I think has a lot in it for business leaders and entrepreneurs who aren’t in the startup phase – which is obviously its primary focus. Michael Hyatt’s podcast “This Is Your Life” is interesting too. Some of the content isn’t directly relevant but a lot of it is really good. Please let me know in the comments if you have any podcasts or other resources that you find particularly helpful for your learning about leadership. Leadership is not something bestowed on you from on high, it is something you only have by virtue of your followers and followers can be easily lost. It is a common misconception that leadership is something which is acquired by virtue of a promotion or by dint of having a particular role within the organisation. Whilst it is true that some roles require leadership qualities as part of the role, it is not the case that those qualities are present in everyone fulfilling a leadership role or that the result of appointment to such a role is automatically good leadership. Being a leader implies that you have followers. It is followers that bestow leadership on an individual. It is true that, contractually, a leader’s direct reports may be required to follow (particularly evident in the military), however, followers who aren’t following willingly and enthusiastically will not be giving of their best and when push comes to shove may not be there to deliver. A leader should first strive to be someone others can follow and to invest in relationships with followers. In this context, followers are not just your direct reports, but also your peers and those above you. Good relationships with those sideways and above you in the organisation chart are evidence of someone with good leadership potential. If those around you listen and act on your ideas then you are leading even if you have not been given the formal authority. Who is it more natural to promote and give that formal authority to than someone who is already demonstrating their potential to lead. Sometimes someone other than the appointed team leader is actually leading the team more than the appointed leader. If a team has a lack of good leadership there will be a leadership vacuum and whoever is investing most in the relationships and gaining the respect of the team will be fulfilling leadership functions as an unofficial substitute, often outside the formal work structures or environment, often without wanting to undermine the appointed leaders, but unwilling to see the team fall apart. To be a good leader, you need to be someone others can follow. Demonstrate good followership by being a good follower yourself. Set an example for others to follow. If you are undermining those in the organisation above you or if you have a generally cynical attitude to the goals or management of your organisation, then don’t be surprised if those beneath you are seeking to undermine you or are cynical about your leadership of them. Even if you are at the top of the organisation, be sure to set a good example and to avoid cynicism. This is not to say you shouldn’t challenge the organisation, your leaders or management. But, when you do so, do it in the appropriate forum at the appropriate time and avoid doing it in public or in a way that undermines others’ authority. When you challenge, be prepared to accept that you can’t always be right, to accept the disagreement if it can’t be resolved and to then back the organisation’s stance fully. If you can’t accept an alternative strategy, stop and think about why not. You need to resolve this conflict if you want to continue fulfilling a leadership role in your organisation. It may be that the organisation’s strategy is at odds with a deeply held personal value. If this is the case, you may not be able to resolve the issue in which case it may be time to move on. If not, is it your pride that is getting in the way? Once the organisation’s strategy is set and you have had the opportunity to challenge, it is time to get behind the strategy and make it the right strategy through your actions and the actions of your team. Adopt an attitude of realistic optimism. This will be attractive and believable to potential followers and will encourage them to adopt a similar attitude. Followers are hard won and easily lost. If you are seeking to be someone to follow, then you should be consistent in your attitudes, relationships and objectives. Obviously, goals will change from time to time. These changes need to be carefully communicated so you retain the respect of your team and do not come across as fickle. You need to understand your own purpose and the organisation’s strategy and how these are aligned and help your team understand how they fit into that strategy and their purpose in driving the organisation forward. Does your organisation have values which are consistent with your own values? Hopefully if you are in a leadership position in your organisation you can answer with a very definite yes. If not, you are likely to have some internal conflict and this will affect your attitude and demeanour and will make it harder for people to follow you. If your values are in alignment with those of the organisation and your goals are aligned with theirs, you can be authentic in your leadership. An authentic individual will be more attractive to followers than someone seen as just acting out a role. Lasting relationships need to be built on a firm foundation of trust, openness and mutual respect. If you listen to your team, respect them and empower them. You will then start to get the best out of them. They in turn will appreciate and reciprocate that respect. Those you support to be their very best will in turn become your most ardent supporters. Be someone who inspires others and helps them to get the best out of themselves. Telling your boss that you can’t get team members to do what you ask and that a promotion would give you the authority, in my view, is a mistake. What you are demonstrating is that your team do not follow you, that you do not have the full respect of team members or that you haven’t invested sufficiently in the relationships in your team. Does your boss want to give you authority if you haven’t invested in those relationships and developed them so that when you speak others listen? When others are already starting to view you as their leader and to follow you the promotions and formal authority will surely follow. That isn’t to say you shouldn’t be ambitious, you absolutely should. But your ambition shouldn’t be to seek leadership positions for the sake of authority and power. Such ambition is unappealing and will not encourage followership. You may be seen to be fighting for power with your team. Be ambitious for achieving your goals and the goals of the organisation and for your own personal and professional development. Empower your team and encourage them to be their best. Your ambition will be taken as an example to follow, make sure you role model the right behaviours. Belief can be empowering or it can be limiting. Often our beliefs are self-fulfilling. One person’s belief that something is impossible will prevent them from achieving it. Another’s belief that the very same thing is possible will enable them to achieve it. In order to be a leader in your organisation you need to believe in the goals and values of the organisation. For more on being aligned with and believing in your organisation’s values see yesterday’s post: Purpose. If you want to be a credible leader you need to be able to be authentically enthusiastic about your objectives. If you don’t believe the organisation’s goals are achievable, you won’t be able to plausibly communicate your team’s objectives to them. The alternative is that there will be a disconnect between the goals of the organisation and those of your team. The end result will be people paying lip-service to the organisational objectives while the leadership team lose credibility. Your goals need to be believable. Does this mean your objectives should not be challenging or even audacious? Absolutely not, just make sure they are within the bounds of believability. If you can’t look yourself in the mirror and believe in the goals, maybe you’ve gone past stretch-targets and into the realms of make believe. In fact, big, audacious goals are much more likely to inspire your teams than easily achievable goals. I think this may be one of the real keys to great leadership: to pitch the organisation’s goals at that tipping point between inspiration and fantasy. In my opinion, Steve Jobs’ true genius was his ability to know how to inspire his teams by setting a standard for their products and innovation beyond what the competition had imagined achievable without going beyond what his teams could actually achieve. I think that one of Steve’s mistakes at NeXT was setting their goals too high, leading to overrunning and also making the products unaffordable. He also misjudged the market. Clearly lessons he had learnt well by the time of his second stint at Apple’s helm. Another great example of an audacious yet believable goal was JFK’s decision made in 1961 that the USA would put a man on the moon by the end of the decade. This must have seemed barely credible to many, with the US falling behind in the space race. To the teams at NASA, who understood that this was an engineering challenge and that the technology was well understood, the goal would still have been audacious, challenging and inspiring, but, crucially, it would not have been unbelievable fantasy. As a leader you should have realistic optimism about your objectives. Optimism is important, but so is keeping it real. A leader needs a healthy self-belief. I am not here talking about an unshakeable arrogance – that is a route to the dark side of leadership. Good leaders need to balance their self-belief with humility and also know their limits. Don’t let self-belief become overconfidence or arrogance. Know yourself, know what you are good at and believe in your own abilities. Without self-belief, your conviction in the organisation’s objectives will feel hollow. You will not be able to inspire your team to believe in those big, audacious goals. Without self-belief, your conviction in your team’s abilities will also feel hollow. How will you get your team to believe they can outperform if you don’t believe in yourself? Without self-belief, when times get tough, you will find it hard to be resilient, to keep going and to keep focussed on your goals. Great leaders all have self-belief. Is self-belief innate or can it be learnt or acquired? Maybe some people do have a natural tendency toward greater self-belief. I suspect though that this is more nurture than nature. Our early experiences, successes, failures and the encouragement or lack of it from those around us, our parents and teachers, will have shaped our self-belief. If you lack self-belief, you can work on this. Build positive feedback into your daily routine – for yourself and for your team. Find a mentor to help you identify your strengths and build self-confidence. As a leader, you are responsible for your team’s motivation. You need to inspire them and get them to believe in their own abilities. You can be a great source of positive feedback to your team, building their self-confidence, helping them to believe they can outperform, helping them believe they can achieve more than they thought possible. If you don’t believe in your team’s abilities, they will live up to your low expectations. If you believe they can outperform, they will do their best to prove you right – so long as they believe in you. A purposeful leader is determined, resilient and easy to follow. A good leader needs a definite and deliberate purpose. Following leaders without a real purpose sounds like the blind leading the blind. Purpose is not only knowing what you are doing, but also why you are doing it. This goes deep. It requires you to think about your own personal values and ambitions. Do your values coincide with those of your organisation. If not, can you genuinely say that your purpose is consistent with that of the organisation? Are you genuinely committed to helping the organisation achieve its aims? Why are you a leader in your organisation? Leadership is not a position of authority bestowed on you as a result of the status of your role; it is gradually accumulated as followers decide that you are someone worth following. This is the difference between authority being given to you as a result of status within the organisation and the far more powerful authority you cultivate by developing relationships and having people in the organisation listen to what you say – your followers. Knowing not only what you are trying to achieve, but also why you are trying to achieve it will make you a much more authentic and believable leader and so much more likely to have followers who are with you for the long haul. Having a good understanding of your purpose will help you be resilient in times of stress. In a personal resilience questionnaire I completed as part of the Ashridge Leadership Workshop I did not score as strongly on purpose as I did in other areas measured. Whilst I am slightly sceptical about the accuracy of this sort of questionnaire, it did tally with other challenges I was looking at on the course. So I decided to have a good think about my purpose. First I thought about my values and how these coincided with those of the organisation I work for. Fortunately, the business I am a part of thought about its values a few years ago and defined a set of values which I can totally get behind. Next I thought about myself and my long term goals both within work and outside. I concluded that my fundamental motivations were to be true to my faith in all I do and to provide love and support to my family. My Christian faith teaches that we should work hard and make time for our relationships outside work. To provide leadership and passion within the organisation. To support and challenge my teams to help them be the very best they can be. To develop a reputation for reliability, integrity and delivering results. Obviously these are high level, long-term and intangible to some extent. The challenge is then to translate these into short-term behaviours that achieve the purpose. Do you have a definite and deliberate purpose in your leadership?
2019-04-24T15:54:08Z
https://supportandchallenge.com/
Academics - Do I add more if K is easy or child doesn't want to stop?! Omma wrote: We are on Lesson 4 in MFWK. My 5.5 ds enjoys the Science integrated with the Bible. I am wondering if I should try to implement the other materials I have available, which he likes. I'm not sure the best way to schedule this.. BTW, my ds is advanced in his ability to retain and comprehend chapter books, and he begs for them! Well, don't go against DH. That said, I really, really think that MFWK is so "appropriate" for kindergarten aged kids, including advanced kids. Whether a child is average or advanced (or perhaps a little behind) MFWK captures what a child is interested in at this age (animals, space, etc.) as well as what a child should be working on spiritually (such as obedience, God's care for them). I'd recommend going with what is enjoyable and appropriate (MFWK) and using extra time for chapter books and the like. MFWK doesn't take up much of your day and I'm guessing, even with other commitments you mention, you'll have time for reading a chapter book at quiet time or before bed. You could even tie in the chapter books to the MFW themes. Get a book on farm life during all those farm animals, get one on space during sun and moon. Thanks for your input, Kelly. Your right about MFWK capturing what children are interested in. I wouldn't trade the material I got from MFWK for anything! We have ALL (teacher and students) learned so much already from this curriculum! 2lilreds wrote: I just started the Kindergarten curriculum with my 5yo dd this week, and I love it - except it takes about 1/2 hour per day and as far as I can tell is all stuff she knows already. Any suggestions? Do I pick up the pace and then move on to 1st grade when we finish? The creation unit that starts MFWK is light on purpose. When you get to the letters (starting with sun), you'll see that each day has some activities as well as the yellow pages of phonics. If you want, start the hundreds chart now with beans and such for some math activities. If you're worried about it being "light" try to sneak into a kindergarten classroom (or ask a friend with a go-to-school kindergartner). There's a lot of ... nothing ... going on in a typical kindergarten room, even in full day programs. The day has some activities, but there's a lot of busywork and lots of recess time. There's a lot of time spent lining up to go to the lunchroom and lining up to come back from the lunch room and if two kids decide to talk or giggle, then the line stops. There's a lot of time simply following the six year old ahead of you! I remember when I was first learning all I could about the how to's of homeschooling. One thing I learned is that about 30 minutes of one-on-one tutoring a student equals 90 minutes in a classroom. If you add in the recess times, snack time, break time, line up time, stay in that line up time, group music time, you get about 90 minutes (tops) of Kindergarten instruction time in a half day K program. I asked the K teachers at my church's elementary school and they guessed that was right on. I asked what they do about quick or advanced learners and they just smiled said "we give them more of the same material." Hope that gives you some help. Child never wants to stop! teachingmom wrote: We started the K program (just using the reading part) several weeks ago. My dd never wants to stop. Should I slow her down? I found with my dd that part of the love of school time is that I am SO focused on them. They love that. So, if I give them that kind of focus in other ways, (cooking, cleaning together...) instead of sending them off to clean their room alone then they love those things just as much. Maybe you could also "slow" her by offering other school type things. Other pages to color, or sort blocks, or do card sewing. mikesherry wrote: My kindergartener loves doing school. She loves MFW K. She just does not want to be done when we have finished all the activities. Has anyone added anything to K? She is so ready to start reading, would it hurt for me to add that and continue on? Then the reading part of MFW would be review I think. I have added workbook pages I have found that we already had on hand. The funny thing is that my 1st grader (doing 1st grade again) does not want to learn at all. Has anyone dealt with 1 child that wants to move ahead to really learn and seems possibly talented if I let her move ahead, and another that we have had to hold back because she is slow to catch on to things and struggles with diligence in her work. Then add more activity stuff. For lots of ideas, check out the K ideas forum (just below the general board). There are great ideas for each unit. if she likes worksheets and workbooks, find some fun things of interest from a place like Sams club or other local store. my kindy kid likes to use Stirring the Gift, Melody's Beat. Grandma helped us buy it --it's a music program. You could have your child help you cook and prepare lunch and call it school (home ec), to add to your day. I would come up with other stuff and call it school. Go to DLTK's printable crafts for kids and do stuff from there. There are all sorts of things that you can do and call it school. Yippee, what an excited child. You can teach reading if you want, but don't feel like you have to. Go on hikes, cook, color, go to the river with a net, play with clay, sort laundry, learn to scrub the toilet, etc. Provide your K with soap and water, kitchen scales, a ruler, a piece of string, lots of books, etc. My son is the same way. He always wants to do more. Her really likes worksheets, so I have a bunch of activity books that I got from various sources. Sams Club has some really great ones. There are also numerous website that have free printable activity sheets. They aren't really "school", but he enjoys the activities. I don't want to overload his brain. I also will find letter, number, and phonics practice pages in the workbooks that match up with whatever letter/number goes with the current lesson so he gets some reinforcement and fun. Carolyn, 2yo, who scribbles in my lap the whole time. I actually taught DD#2 to read when she was 6, using 100 Easy Lessons, because of pressure from my MIL. LOL That kid was not ready for school. But we struggled through it. Then MFW K made an excellent review. I just wish I'd done the MFW tactile activities like the lesson said. DD now reads at a high school level (some areas are 9th grade and others are 12+) at 10 yrs old. If I had to do it over again, though, I'd wait till she was ready. Should I / Can I add LA and Maths to MFW K? NicoleJ wrote: Hi! I have heard some people say that MFW K is a great program and that is has all the maths and LA in it that you need to do for K, but that it is boring because all of the worksheets are the same every week. Did you find it the same? I was thinking of supplementing it with Singapore Earlybird A and B, and SL LA K. Did you supplement at all? If so, what did you use? If I did, would it be waaaay too much work for a little one? She will be 5 and she already knows half of the letter sounds, can sometimes sound out a CVC word and can add simple sums. She will really love MFW K. TIA! I am hoping some others who have used the entire MFW K will chime in, since we are only 25% or so into the program. So I have a few answers. The phonics is really good, much better than SL LA K (which I used with my first ds). The blending is exactly the foundational skill that my first ds is catching up on with MFW 1 but isn't as stong in since he didn't have it in his K program. The phonics for MFW K really does stand alone. This said, the first 5 units or so were very easy for my ds5 (he turned 5 in April) since he already recognizes all of his letters and knows all of their basic sounds, and can read a little. The character built into those weeks though had some real value to it, and he loved the cutting and hands on activities. Kids enjoy review, and those weeks have much to offer. I will also say that there are portions of the daily reading section I am skipping since he can write and recognize all of his letters. We are focusing on the phonics, blending, etc. Fabulous! The blending /reading really picks up in unit 6 or so. So far he doesn't find the repetition of worksheets boring at all. I think he actually appreciates the routine of writing a little, reading a little, phonics blending, cutting, etc. Not too much of anything for him. The heart of the program though for me is the character development built in and the Bible readings. As for the math. Hopefully someone will chime in that has used it. My ds5 completed Singapore EarlyBird A last fall, so I haven't used the math yet for MFW K. He isn't ready though for Singapore Level 1A. I guess I will be interested in seeing the answers you get. I also have been laying a bit low on the math since he has the wiggles and I really want him to love school so I keep it very short! It really is a beautiful program (MFW K); I hope you enjoy it. We Love it! Last edited by gratitude on Mon Jul 19, 2010 9:27 am, edited 3 times in total. Re: Should I / Can I add LA and Maths to MFW K? We are just finishing MFW K and we loved it all; especially the bible and character lessons, crafts, and activities. We felt it was a complete program all around...phonics/LA and math. My daughter knew her letter sounds coming into MFWK so the first few weeks were easier for her but she LOVED the crafts and activities. She learned the CVC blends quickly and we continued to practice those for a long time until she was ready to move on. She is reading well--I am very pleased. She is the first child I have taught to read (other two did Kindy in p.s). Toward the end (last 3 or 4 lessons) we did not do worksheets but did complete character lessons and crafty activities. As for math, I feel this is complete and plenty for this age...we did the recommended math (100 chart, calendar, number cup)...we also "played" with math...counting plates at dinner table, jelly beans (2 for each brother, 3 for her equal how many in all?), cooking, introducing coins, playing "store", etc. I guess you call that "real life" hands on math. Again, we loved MFW-K and have moved on the 1st grade. Have a great year! ds (14) ADV, ECC, CTG, RTR, EXP to 1850, 1850 to MT, Coming Soon...AHL! NicoleJ wrote: Thankyou!! I can see now that MFW K has everything in it that I will need, without supplementing. It is scarey to let go of those other programs though!! I might get them... just in case? I can relate to your statement, "It is scarey to let go of those other programs though!" I had the same trouble of letting go. The parents on this forum though really helped me in the letting go . It was hard. I am not sure even why. I do still enjoy ordering occasional books from them though. I have struggled through the curriculum search too. Planned more than once. The only thing I can say is that it dawned on me a few months after starting MFW that we were finally home schooling with ease. You too will find the program that works best for your family. Perhaps you already have! I am glad to have read the other posts on this matter. We were considering adding Singapore this fall because after a month with MFW K we didn't see any benefits of math instruction there. However, I'm glad we didn't order supplements because now that we are fully into the program, we all find it more than adequate. We might try the Singapore Earlybird next summer before 1st grade to help get him used to the workbook, build confidence, keep up skills over the summer, etc, but in the mean time MFW has supplied all of the essentials and more. I did not supplement MFWK or MFW1 with any math or LA. (My dd was already reading well before starting K, so she read many more books than listed.) I did get her the optional addition/subtraction book that is discussed in Lesson 20 of MFWK. Using all of the hands-on activities to their full advantage gave her a fabulous base in math. The math program is complete - if you use it. Don't skip over things that look simple or repetitious. That's the "ingrain in brain" stuff! I know it seems simple, but as Cyndi stated, don't look over the simple daily stuff. We called it our daily activities and, after prayer, it’s how we started our day. We started with the calendar, weather (I added that with a chart on the wall and she would fill out a graph each day), number of the day (she would write the # on her chart and count out sticks, then count them by 10's when they were bundled in groups of 10), etc. At the end of the year I was amazed at how much she knew. She also says now that math is her favorite subject. These are such awesome answers. I think I migh save my $ and trust the MFW K program, and add in Singapore EB, etc, if I can see we need it. We might not! And, the simplicty of having the curriculum all laid out for me without having to add everything in sounds really, really nice and relaxing! NicoleJ wrote: Has anyone else's K'er gone through MFW K at lightening speed? If I follow the maths and reading for the day it only takes me about 10 minutes and DD4 is itching for more work. The other day she did all the worksheets and a few games for L Leaf - a week's worth in one day! That is not including the other fun leaf activities that we did - but even with those I am cramming a week's worth of activities in two days or so. Anyone else experienced this? I am wondering whether I should think about starting her on MFW 1 after we have finished K even though she will still be at K age. Or will MFW 1 be too advanced for her? she turns 5 in March. Thanks! Take it as it comes. You might find a little later in the K program, she might hit a part that is new and might take a little longer. I know when my youngest attended outside preschools they had activity centers set up to let them do other things when the main lesson was done. I know even now she can work on her speech clinic homework in short bursts of time. The work has been easy for my ds5, and he has gone through it very easily. Rather than speeding it up though I choose to spend 2 -3 days a week on school, instead of 5, and he is easily able to do the work in that time period with 20 minutes 2 -3 days a week (we don't do all the hands on activities though). My replacement is reading books aloud to him, and allowing him his time for creativity. He comes up with plenty ideas on his own, so school tends to take away from the other type of learning that 4 -5 year olds do: play. So I haven't done a lot with him yet outside MFW K, but I do have more of an answer for you. I have seen moms post on forums who say their kids really want more structured learning on their own at young ages. These moms usually supplement at grade level and go wider rather than faster forward. Does this make sense? In fact I do it a lot with my older ds7. We do more than MFW with him. Mostly because he has a lot of interests and questions, but also because I am not speeding forward to get through faster I am taking time to explore more subjects on a first / second grade level. He also likes to initiate a lot of play, but he is wanting more learning and books too at this point. I remember talking once to the starter of a program for gifted kids, and she talked a lot about including more details and more information about a subject, or even more subjects since there is time to do so; rather than graduating from high school early to take the extra time and use it for development of interests and deeper study of individual subjects. Does this make sense? For example, my ds is studying chess & Spanish on his own, and we are doing a separate Bible program with MFW because he has such a strong interest in knowing more about the Bible at a deeper level. Is there something your dd would enjoy learning with MFW K that is at a 4 year old level? Or fun field trips (my favorite for 4 year olds)? Or even great books? The Honey for the Heart from MFW 1 has a lot of suggestions for books, so does Five in A Row. P.S. I thought I would add that some weeks of the MFW K program I have chosen to spend more than one week on the character trait being taught. A character trait that was an obvious weakness in our kids and household. At those times I allowed reading and writing to be put on hold, once the work sheets were done, and focused on character training instead of academics. It is a beautiful part of MFW K. Well, we sped through K and are going to start MFW 1st after CHRISTmas break, but my daughter is 6. We started at regular pace and just kept getting faster, now we do a week in a day. Well, we don't do everything though as she knew her letter sounds very well before we even started so all the games are skipped. If it wasn't for her handwriting issues I might have ending up skipping MFW K altogether BUT I really wanted her to have it as a foundation before 1st AND I want her to be "K" this year and I don't think she will be ready for ECC next year. Though we went through K fast I think we will go through 1st slow. I hope it will last through next school year. I mostly chose this path because I felt my dd was so ready to advance in phonics and I felt I was delaying her for no reason other than to follow the manual, we are ready to move on. I can't wait to do it again in a couple years with my son though, I think that will be a whole new ball game, lol. dd graduated, ds junior, dd 8 ADV, dd 6 MFW 1st, ds 4, and dd 1. I am so glad I saw this post today. I have been having similar thoughts about K this year for my 6 year old dd. She keeps saying how easy it is and loves doing school. We are easily doing a weeks worth of school in 3 days including the activities and projects. She is very concerned with how she measures up against her friends that are in public school. She says that they are all reading more than she is and they tell her they are doing harder work. I try to limit her exposure to them, but every time she sees them she comes home feeling down about homeschooling and what she has accomplished because it doesn't seem to be enough. She really wants to be reading and is frustrated by what the fact that she can't read the books she wants to read. I know the MFW-K is a very gentle approach to school and I have loved that about it. I have felt absolutely no pressure with regard to school this year, and dd6 and dd4 are both learning a ton. I like the idea of going wider not faster. I hadn't thought of it like that at all. I want to spend more time in reading and art, and and start her on piano. The key for me is figuring out how to add these things in because what I do for the 6 year old, the 4 1/2 year old will insist on doing as well and it is not nearly as straightforward with the dd4 as it is with dd6. At the rate we are going with K, we should be done by the 1st week of April. I'm not sure what to do at that point, but I have a little time and we'll see how it goes between now and then. Just not sure. . . samandsawyersmom wrote: Ok so I just am not sure what to do. . . .I am doing MFWK with my son and he is doing GREAT!! I mean I know he is young (turned 5yrs end of Sept.)so I keep thinking we are going to have to slow down and I am ok with that but. . . .He is just doing really well! Right now we are on unit 15 and he is no longer cutting out the words and sentences he is just writing them. When we are doing the blending ladder with just the beginning sounds he is like "Oh what about this. . ." and adds a letter to the end and makes a word. He is also spelling words on his own when he wants. Sooo my question is this. . . Do I just move in to 1st after MFWK? If I have to slow down I can, and to keep him from graduating before 18yrs old I can go thru the 5yr cycle for 6yrs?? What do ya think? or do I just do some fill in stuff for a yr and start 1st when he is more the "right age"? I do know it is better usually for boys to be older so that is why I am really ok with going slow I just do not know. I do not want to slow him down either! I do know each child is different but you all are like mentors to newbies so I do take your thoughts in and then try to make the best educated guess I can! LOL! God willing I will have peace on this issue soon!! It is just so hard knowing I have all the say on their education!! Yikes! I would keep moving through MFWK at the speed your son needs and if he's ready for MFW1st when K is done then you can move on to 1st. However, just be ready to slow down if he needs to. As for graduation, that's a long way away and if necessary, you can do a "gap year" between high school and college if you don't want him to go to college that early. Re: Just not sure. . . I would just move on to 1st and, like a previous poster said, just be ready to slow down if he needs to at some point. My dd did that with the blend ladder too, I think it's fine, it's great for them to get their phonics skills really ingrained, IMO. What I wouldn't do is change his grade level. My dd started MFW 1st in January but she is still a kindergartner. She will likely still be doing 1st next fall but at this point I don't know when she will finish but regardless she will be a 1st grader next year. I prefer to think of grade in terms of age not the level of work they are currently doing. I give a third vote for moving onto 1st once you have finished K. My ds did the same thing with the blend ladder too. He also spells on the refrigerator a lot with magnetic letters. I am finishing K though before we move onto 1st. He will be 6 in April and is on 22 or so - I have lost track - of K. He is going to be moving on, but slowly as needed. I also second the idea of thinking of their grade level rather than what program they are doing. It helps for any outside activities you may do.
2019-04-23T06:15:51Z
https://board.mfwbooks.com/viewtopic.php?f=1&t=1012&view=unread
Entertaining interview with the sisters of Grace Kelly reminiscing about their growing up in East Falls. N.B. This tape is in poor condition. A large portion of it is inaudible. At times, the interviewees speak over each other and it is difficult to understand what is being said. Also, their voice are quite similar so there is difficulty understanding which sister is speaking. A.F. CS: Ok, well, we can start out by, just, what were the names of your parents and when did they come to East Falls? LL: Peggy, you start with that one. PC: Well, Daddy was born and raised in East Falls. LL: Was he born in East Falls or was he born in New York? LL: Well, now we’re taping and we’re not quite sure about that one… He came when he was little; the family was originally from New York. LL: Yeah, from Vermont. East Falls they came to, settled. PC: But I’m pretty sure Daddy was born here. LL: The earlier ones were born in Vermont. It was a very large family. Ten children. LL: Mother was born in the Strawberry Mansion area. LL: Yes, and then when they were married in 1924, they moved right to the corner of Ridge and Midvale while their house was being built on Henry and Coulter Street. PC: They lived over a store on the corner. LL: Didn’t they live in an apartment over a shop? PC: I don’t believe it was a shop. It was a saloon called the Gunboat. PC: Right on the corner. CS: And how many children were there in the family? CS: Yours. Brothers and sisters. PC: Four. I’m the oldest, then my brother Jack, then Grace, then Lizanne here. LL: No. Peggy was born in 1925, Jack in 1927, Grace in ’29 and I’m 33. PC: You were born in ’33! CS: How did you see East Falls change since you were growing up? In appearance? In makeup? LL: Since the project, the Schuylkill Falls Project, was built there has been a great change. Before that it was just nice and gradual. That changed East Falls completely, in my way of thinking. LL: Late ‘40’s, because I went to school at Ravenhill Academy and I remember when the project was going up and Reverend Mother was rather concerned because our hockey field looked over the project and she was greatly concerned that all these houses and stuff were going up. And that has to be the late ‘40s when that went up. LL: And also the other thing that grew up were the houses across the street – – I don’t know if that’s East Falls – on the other side of School House Lane – there used to be a big forest down there – all the houses across the street from Ravenhill Academy on School House Lane. PC: It still kept a lovely appearance and openness. LL: Another thing, of course the whole area has grown up, we used to go down Henry Avenue and walk for miles and see nothing. There were never all those houses there. Those, I guess, go all the way to Roxborough. I remember when they talked about the Henry Avenue Bridge being opened to go across into Roxborough. CS: How did you get across before then? LL: I would imagine old Ridge Avenue. Down in the Falls. You went through the Wissahickon. There used to be a riding academy not too far from here. LL: And we used to go riding there and down to the Wissahickon. PC: Wasn’t it Dupont Street? Rector Avenue. It’s still there. I saw horses crossing Henry Avenue just this morning from Andorra. They’re still crossing Henry Avenue with all that traffic. They’re crossing with traffic lights now. CS: Did you both go to Ravenhill? LL: Yes. Well I graduated Ravenhill, Peggy graduated from Stevens School. PC: Grace went to Ravenhill but then graduated from Stevens. LL: And our brother went to Penn Charter. So we all went to school right in the neighborhood. We all walked to school. We used to walk down through people’s property and up the hill up to Ravenhill – Roseneath farm was there. CS: Where was that again? CS: Where is that again? PC: The back of the property went all along Warden Drive there at the bottom of the hill but the entrance was up on School House Lane so it went right on through. A very lovely deep property. LL: Oh, yes, it’s there. The original house has been ripped down and Textiles School bought it. And Textiles School has now bought Ravenhill. And they bought Lankanau School. PC: And they bought your old house. PC: And they bought my house. I lived on School House Lane when I was first married. CS: Are they using that building? LL: Yes, the president lives there. RE: They are buying up all over. LL: I don’t know who the Levys sold theirs to – Temple. PC: Probably, but Goldie Paley, I believe, belongs to Textiles. And that’s used as a little museum now; it’s lovely. We went there the other day. But the big – Leon Levy’s house – big house down in sunken hollow – that’s Temple, I think. Or maybe it’s Textile. PC: Textile used to use for soccer practice up front on School Lane, but the actual house; LL: I thought Temple – they gave it to Temple – I think the Leon Levy’s – right on the corner of School House Lane and Henry Avenue – beautiful White Corners – I wouldn’t be surprised if Temple hadn’t given it over to Textiles or University of Pennsylvania. Textiles is getting so big now. PC: They might not need it. LL: They might not need it but it would be lovely to have. RE: CBS; that will identify him. PC: But when they first moved to the neighborhood they were with WCAU and KYW, the radio stations. CS: Were they living here when you were here? LL: Yes, we were here. CS: They had kids your age? CS: What were your most vivid memories of going to Ravenhill? LL: Going to school – the farms. I started when I was two years of age. I was Baby Jesus in the crib. PC: Lizanne was Jesus, I was a wiseman and Grace was a shepherd. PC: We used to cart Lizanne to school. The nuns were sweet. They would take your little sisters at any time you wanted to bring them. LL: On rainy days mother used to ship me off to school. PC: The classes were so small – 6 girls in my class. PC: For one year she was the only one…. LL: So I just walked around to all the different classes. When I graduated our class grew up to a big booming 17. CS: Really? Were there boarders there? PC: In Manila and Nicaragua. LL: People would send their daughters to Ravenhill. CS: When you went to play, did you play mostly at home or go to playgrounds in the area? What did you do? PC: We didn’t go – I didn’t go – to playgrounds. We had most of our athletics after classes at school. LL: We didn’t get home until it was almost dark. When we got home from school after hockey we walked home. We did have a tennis court in the backyard and my brother, when he was young, – I guess dad did it – put a basketball court in. And the neighborhood kids used to always come over, even after Kell stopped playing and was in college. The kids, the McIlvaine kids and their friends, used to come and play basketball in the court. PC: And football in the side lawn. LL: Yeah and a little bit of baseball in McMichael Park. We went over there and if you’d have a baseball game going. I was never much for softball; we watched them really. But McMichael Park was quite the thing in the springtime. That was about it. We didn’t go too far afield. PC: There was a lot of activity in our house. LL: We used to walk over here in early spring, coming to Alden Park and going swimming over here in the swimming pool, when this first opened. PC: Yes, when this pool opened, right here where we are now. RE: When you were little? PC: We had friends that lived here in the apartments and we would visit them and go swimming with them. LL: And it was opened in the summertime. And before we went to the shore, cause you see, we were gone all summer long, and we’d come over here and swim. We’d walk over here and swim. PC: Oh! Down, right down on the Schuylkill Drive? You mean? You mean Gustine Lake? PC: It’s just that we went to school with these girls. CS: And they lived over here? PC: Yes, and we’d walk over here. LL: And our brother, some of them were boys who went to Penn Charter that we knew who lived here. CS: Were you involved in any of the local community organizations? LL: Oh well, Medical College. That is a different story. CS: Go ahead about that ‘cause I know your whole family was involved there. PC: Mother got involved because she taught there before she was married. Mother taught athletics. LL: Athletics at Penn and also Women’s Med – it was Women’s Medical College then, she taught basketball. PC: The students. Athletics. But then they were so busy, they soon dropped their athletic program. LL: Yeah, It wasn’t necessary for the medical students to take athletics. But Mother was teaching at the same time at Penn. LL: And they also had lack of room—they used the gym you know. So Mother was very involved in Medical College for a long, long time. And just kept going. And when we were children… Pause….Do we tell that we stole flowers? LL: Well Mother used to have a fete—there used to be a fete. PC: A Spring fete—gourmet fete. PC: The violets. Stealing Mosie Brown’s – he never even knew they were there in the back of his huge property. He had acres and acres and acres and we climbed the fence and would make-up all the bouquets of little violets. PC: But then all our neighbors in the back of the alley, we used to send Grace and the little ones up to steal all their—the neighbors’ flowers and we set them out at front and as the neighbors would go by in the morning we would sell their own flowers to them. Or we’d send the little ones with a little basket on their arms to go knocking on the doors. And they couldn’t resist these sweet little girls who had just stripped the backs of their gardens. LL: It was for a good cause. PC: I don’t know if they knew or not. LL: Oh I’m sure they did but no one said anything. No. It’s sweet. It’s cute, no one said anything. PC: Do you think she did, Liz? LL: Mother! You did know! RE: I think that your memories of the hospital fete in the front of the hospital when they used to—that would be nice. LL: Well, we used to do that for years. Mother was in charge. PC: Mother was in charge of it. LL: Well, not the whole chairman but she was in charge of the chicken pot pies. PC: Dinner. Well, the dinner came after. I can remember when they had the fete before they even had the dinner Liz. LL: Well, Mother was in charge of the chicken pot pie dinner. PC: And the strawberry shortcake dinner. It was a big success. PC: We fed patients; we were nurse’s aides and all that. CS: So you worked in the hospital? LL: Our new president in the hospital is Morrie Clifford, Maurice Clifford, I should say, I shouldn’t call him by a nickname. He was just inaugurated. He’s a delightful person and I, we had, Mother and I, went to a dinner though for Doctor Fay. Marion Fay has always lived in East Falls who used to be President and a Dean of Medical College. PC: She lived on Queen Lane. LL: They just honored her the other day with dedicating a wing, the Marion Spencer Fay Wing. LL: Yes. She had a lovely reception and Mother and I went and then they had a dinner for her and we went there. And then we just inaugurated a new president, Maurice Clifford. He will now be living in East Falls—he lives in Chestnut Hill now but he’s moving to The Oak Road—is that East Falls? LL: He’s moving there and he is a delightful person, he really is. The first time I met him I was working at Medical College in the pre-natal clinic in 1955, and you were in charge of volunteers. LL: You worked with Marie and you stuck me in the pre-natal clinic (Laughter). LL: I was pregnant too. And you know what? They got better care than I did I think. RE: But she saw life in the raw as far as having a baby because she delivered her baby, I didn’t realize it. LL: Well, I couldn’t believe it! I kept going to my obstetrician, Joannie Roberts, who was also a graduate of Medical College. RE: The clinic patients always got better care than any private patient ever did. The diabetics. The diabetic clinic I worked in for years and I never heard of such marvelous care as they got. Their lectures, and their education, and their testing, and their medication—everything was much better. CS: Was the affair at Women’s Medical that raised money all-day long? RE: Oh it was wonderful! RE: It was like a small town thing which we don’t often get in the big city. And you could go there in the morning with your children and they would be amused, and you could eat, and you could buy, and you could take chances. And you could meet all your neighbors up there and it went on up there all day and dinner by Mrs. Kelly with her chicken pies and then on into the evening. And we had fabulous things at our hospital fair that no other hospital could have had—like a painting, an original painting, by you, of the Prince. CS: And when was this? LL: It was about ’56 because they built the one wing and we couldn’t do it anymore—I mean, space. CS: It was held out on the grounds outdoors? CS: What time of year? PC: May, the end of May. LL: It was fun. And I do know, I know the fair lasted to ’56 because after that it might be ’57. I don’t think it did because I had Gracie. It was May 17th – I had the baby and the fair was going on and she was born in 1956, so I know the fair was going on till 1956. PC: June Fete and Memorial had an affair but we just stopped ours. LL: Well it was really because of the wing and the space. PC: It was very difficult. CS: Now what year was it then that Women’s Medical opened? In the 20’s? LL: Oh, Women’s Medical – It was in town. RE: Not in the Falls though? PC: It came up here about 1935? LL: No—you look in the front of the building, darling. LL: Well, it’s in the 20’s—something in the 20’s babe. Oh gosh, I’m on the board and I should know and I don’t know. PC: When it moved up here. CS: Was your family involved at the time it opened? LL: Mother was almost from the inception. PC: Yes. Well, I think after several of us were born, she really went over there constantly because it was just down the street; it was so nearby. CS: I read somewhere that also a circus that you used to have at your house—is it a tale or true? LL: Mother arranged it. I was too young to remember really — what were you in that circus? PC: I was the ringleader, dear. LL: I was about four and she was three so I don’t know too much about that circus. PC: Grace, I do remember, Grace was a tightrope walker—except the rope was on the ground – it was laid on the ground. LL: But she did a beautiful job—she looked the part. And Fordie’s daughter or something who was—he was the Wild Man from Borneo. CS: Did people pay to get into this? LL: Oh yes. It was all for the hospital. CS: And what year would you say? CS: And it was just your family or did you have friends? PC: No! All our entire neighborhood was in this. It was big! Oh there were hundreds of people there. In the whole big tennis court. Oh it was a big circus! PC: It was a big one. LL: That was only one year however. Should have done that again. CS: Where is the house located? LL: On the corner of Henry Avenue and Coulter Street, yes. CS: And that’s still there? PC: Yes, it has been sold. LL: Mother sold it once and it’s been sold again and I think that’s all. I don’t know who owns it now, I really don’t. CS: And how long did you live there—did the family own the house? PC: Yes. Forty-four years, about 44 years. CS: And it was sold? PC: Daddy died in 1960 and Mother stayed on. She said as long as she had her little man, Fordie, her little helper, she would stay. And stayed there for a number of years alone. And then when Fordie died, she went. LL: Twelve years ago Mother sold it. RE: But you had other help in the house. You had a couple. LL: Yes German help. Mother always had German help. RE: Because I remember I had gotten a day’s worker who had come over from Germany. She was a—she worked in a hospital, not a nurse, and she was a Christmas gift from Doctor Fieldler’s wife’s mother in Germany. Her mother said, “What do you want for Christmas?” She said, “Somebody to help me with the housework.” And she sent her this girl from the hospital. And she was too heavy a worker and she couldn’t have enough work in the house. So, she, Mrs. Fieldler, asked me if I could use her and I said, “Sure.” And she came up and worked for me and she spoke often of my friends the Kelly’s, meaning the couple. She was friends with them. LL: Franz and Theresa, the German couple. Well Franz and Theresa. We had one couple, we had Luchese, Mrs. Luchese, who was German. PC: Was she German or Polish? LL: Polish-Luchese. And her daughter stayed with us and went and became a doctor at—studied at Medical College. LL: And her mother worked for us and the daughter graduated from Medical College and she stayed with us and then we had Franz and Theresa who were German. Because Mother speaks German. PC: But then after the war, it was difficult getting the German girls over that Mother used to have all the time. They would learn English quickly and then get married. RE: So you see Cheri, their life was not like mine. LL: My life was not like mine, then, too—I know that. RE: When she called—well like shopping–where did you shop? I got on the 52 and went to Germantown just like anybody else and did my shopping. PC: We did. We went on the 52 and went to Rowell’s a million times. LL: We went to Rowell’s and Allen’s and you went to the movies at the Alden Theatre. Well, Alden Theatre. What I remember when I was a kid, going to the Alden Theatre it was 11 cents. LL: Eleven cents for a Saturday afternoon matinee you walked down to Alden Theatre, paid 11 cents and Mother used to be magnanimous and give me at least another five cents for a candy bar. (laughter) And so for 15, well, 16 cents you could have a movie, a double feature and a candy bar. PC: Lizanne, you don’t even remember the old Falls Theatre. LL: I don’t remember that. PC: Down below almost to Ridge. RE: At Eveline and Midvale? RE: Eveline is a little street that goes off Midvale and—it’s a gray building now—it’s painted gray but that was the original Falls Theatre and that’s where I went. CS: The Betsy Ross? The Betsy Ross Building? PC: Yes that’s right. The Falls Theatre. CS: It has the Betsy Ross Flag on the front? PC: It’s true. Dear. It’s true. RE: That was the original theatre. PC: Where Ginos is now. RE: Yes, cause my daughter went there, and she and her girlfriend Betty Jane Bennett always sat in the seventh row, seventh seat and god help anybody who sat in them. PC: The whole group was involved in that (laughter). Through our uncle—Mother’s brother, Midge Majer, lived on Queen Lane and he and his wife were interested and we all got started. LL: Well I think Aunt Virginia and Uncle Midge were first things there and we used to watch them and they got us all involved. CS: Do you remember the first play you were in? RE: Grace was in The Women—she got the measles and you took over. CS: Is that the one you took over with one night’s notice or something? PC: She got the measles—well, there were so many women in that show, The Women. It was during the war. Grace had two small parts. She was a hairdresser and a debutante. Because you could just change your clothes—it’d be another body backstage—and here she could just change your clothes and it was only one body for two parts. LL: I think the first one I did was The Philadelphia Story. I was the brat sister and I think my two sisters thought I was very well-cast. PC: YEP! No doubt! Typecasting! (laughter) Very well-cast! Brat! Brat! RE: Well no she was that way. PC: Yes, she was a mess. LL: Well, I must say I guess I was not the most pleasant of children. I don’t know but I’ve been told that I was a brat. RE: She had almost white hair. LL: Well, I just didn’t care for everybody that I saw somehow. But I was a brat. Because Grace used to say to me, “How come you’re not as nice as I was to Peggy? You’re not as nice to me as I was to Peggy?” Grace was sweet to Peggy, and she was Peggy’s lackey really, and I was not cut-out to be a lackey. I was not. In years to come I’ve turned out to be a much better lackey but I was not then. PC: NO! (in unison) No. No way. LL: Well, I’ll never forget one time with Peggy—Peggy was pretty good, you know, Peggy was the matriarch of the kids. My brother used to have a bunk house or a—what would you call it? PC: It was a bunk house. LL: Out in the back of the house and they had what they called the Tomato Men Club. PC: The club was just for boys. CS: Where did the name come from? PC: It was right by our victory garden and Mother grew a great many tomatoes. And the boys would love to pick up those tomatoes and have fights with them, so it was called the Tomato Men. No reason. LL: So one time Grace and a girlfriend wanted to get into the clubhouse, the bunk house. No girls were allowed. ERA had not risen its head at that point. So apparently there was one girl who lived in the Falls or two girls were allowed in—they were not in on a Sunday morning, a Saturday morning or something like that. PC: Two girls were allowed in to see the bunk house. And Grace was not. And Grace came running to me having a fit that these two gals were allowed in and she was not. I took care of that. LL: Kell is not a mad person but he was mad at Peggy that time—flying the two of them. She’s ahead of him and he’s flying with his nose—she gave him a bloody nose. PC: Grace was so meek, you know, that you just wanted to stick up for her and help her. RE: How about the dollhouse—that it was a child’s playhouse? LL: Well it was in the same area in the back where the bunkhouse was. In the back behind the tennis courts. This they really almost built themselves—the dollhouse was rather nice looking. It wasn’t a dollhouse, it was a play house. We had an electric stove in there. Absolutely! LL: A real on. You could cook all the old apples that fell off the trees—I don’t know what we cooked-up on them—you didn’t eat them. It had two burners. It was really a little dangerous and then it was taken out. CS: Was it one room? CS: It’s not there anymore. CS: Where we vote? It’s still there? PC: Yes a teensy little thing. RE: It’s hallowed house. I’ll go in there the next time I vote and think of you all. I’ve heard so many of the senior citizens at the library speak of Gracie, and the call it, Gracie’s dollhouse. And I said, “Dollhouse!” because you know me and the dolls. PC: They moved it. Daddy gave it during the war, gave it to an air raid shelter or whatever. LL: It had shutters on it and a little shingled roof. I sure they propped it up higher and made it a little higher, a little taller. RE: No, no it’s pretty much the same. It’s one room—how about that! PC: Two little pillars out front and then it was a wooden floor. We had darling furniture in there. Yep. LL: We used to call it the playhouse. PC: It was the playhouse. PC: Oh six or seven kids could get in there easily. RE: Because a lot of the East Falls children went up there a played in it, whether you knew it or not. PC: Oh sure. It was never locked. LL: Well it was never locked. RE: Nobody chased us except there was a dog who came around and growled. CS: Was that your dog? PC: No, they weren’t nice. LL: Our dogs were very nice. LL: We had a couple of boxers, actually Mother got a boxer, the first boxer I ever saw. And we had two boxers, Wrinkles and Ziegfried. LL: No, would not bother anybody. LL: We had a pastor at Saint Bridget’s who had an Irish setter, and we had an Irish Setter name Flashy and Mother had a German maid called Barbara. LL: And he was walking his Irish Setter and Barbara Kestle absolutely almost took him down with a knife, calling him, “You got my Flashy! You got our Flashy! You got our Flashy! And we had to practically get this poor woman off this poor pastor who was like… (laughter) “I don’t have your Flashy! I have an Irish Setter! That was Mother’s, one of Mother’s German maids that attacked. PC: Well, it was so easy for Mother to bring German help over because she spoke German. CS: Is she or her family from Germany? PC: Oh yes. Mother’s family was born in Germany. CS: What part of Germany? CS: Did you have any holidays that were special in your family or any special family traditions? PC: They were all special. I mean just—there wasn’t one that stood out. LL: No, every holiday was so big. LL: No, actually every holiday. Probably Christmas with the open house Christmas Eve each year—that was just a tradition. LL: And neighbors and relatives. Anyone. Come one, come all. LL: I would say that Christmas Eve was probably the biggest. The biggest. Easter, there might have been vacations away. But they were…it was all family and just a lot of fun. PC: What was that? At Columbo’s? RE: They were caught in a snowstorm somewhere and were trying to get home for dinner? LL: Oh yes! I remember painting that. I have it at home. Mother had it here. But I don’t recall them not getting home for a party or late for a party. LL: From the Vesper Club? Probably. Could have been. RE: And your father would call and say “We’re stuck here.” It was a terrible snowstorm. PC: Is the 31st or the 30th of January, sure. RE: He would call and say, “We’re this far,” and you would put the steaks away and then get them out again. LL: Well I do remember one—you’re talking about one special party. Speaking of that one special party, Mother was having Thanksgiving. And this was after Grace and Ranier were married. And just about two years later—‘cause Grace and Chrissy have pictures of it and they were tiny. So it was like in ’59. PC: Well I had come from my house. And wasn’t there all afternoon. LL: No. So I’m saying to Peggy—we were all there having cocktails or something—“I don’t smell any turkey.” I said, “Mother!” (Imitating Mother) “Oh! I put the turkey in a long time ago.” And I’m (sniffing sound) (Loud voice) Don’t smell the turkey…! PC: I had just baked a turkey and since the children were home, you know, for vacation, I wanted to have a turkey at home. So mine had just come out of the oven. I went right around the corner to my house yanked—took mother’s – threw it in my oven and brought her mine. LL: That was a re—memorable holiday. CS: Did you ever tell your Mother? LL: Oh yes! Certainly! Mother when did you? When? She said, “I don’t know what happened! I can’t imagine! PC: I’m thinking it was just like half-started or something. LL: Something was turned down because she wouldn’t be that dumb, you know. CS: Were you both married here in the Falls? LL: I was married in Saint Bridget’s. PC: Well Fordie used to take all our, um, he loved to travel all the brides. Fordie was the colored man that we had, you know, that we mentioned before. And when one the Becker girls got married, going down Midvale Avenue to St. Bridget’s, naturally, it was on the right and he stopped there on the right. Well, I guess he wanted to be headed up the other way—but did not go in—he took the bride, delivered the bride in the lovely big car but he thought he—it was a Saturday—and he had a shopping list for Mother. Down, well, at the old Falls Theatre, it was at the point, it was a supermarket. LL: Oh! Is that where Falls Theatre was? The old supermarket. LL: Oh, that’s the Falls Theatre—uh, okay. PC: So Fordie goes in—he figures the wedding, the wedding will take about twenty minutes, fifteen or twenty minutes and he does all the shopping. In the front seat of the car he comes back to pick up the bride and groom to take them to the reception—and a great big stalk of celery out of the top of the big bag on the front seat of the car—and the beautiful bride in the back. CS: With the stalk of celery? PC: With the celery. Didn’t bother Ford. The bride’s mother did not go for that too much. LL: Ford was a classic. Everybody in the Falls knew Ford. He shopped at the hardware store at Ridge and Midvale – southwest corner there – he used to take me when I was a little kid and stand aside and going out with Fordie was the best treat in the world and he used to run around…Everyone knew Fordie. PC: Porkie slept at John Cassidy’s garage. Is Cassidy’s garage still there? LL: Well the garage, but Cassidy isn’t there, but East Falls Garage is there. Right on Ridge Avenue next to the East Falls Tavern it was – the back faces the river. PC: Porkie used to sleep there. Charming Porkie. LL: They would sleep in Cassidy’s wrecks. LL: Well, Daddy knew everyone in East Falls and Kell knew pretty nearly everyone too. He’d go down that street….now there is a little street near – across the street from….I don’t know the name of it – where the photographer lived? What’s his name? CS: He was a photographer? PC: A photographer; a family photographer. And he lived right in a little alley almost across from the church – there’s a little alley that goes up that way and they had a street fair. LL: I don’t know, but they did about seven years ago. RE: Arnold Street, is it? LL: Could be. And they had a street fair there and Don and I went by there and had the best time. And that was recently. RE: Brownworth was about two doors down from Arnold Street….and what a marvelous photographer he was! Everybody went to him. LL: He took my babies pictures, he took my wedding pictures. His father – oh, he was a nut, his father. Well, he’s a nice nut. I don’t think his son would think anything different of him – he was a marvelous nut. I mean, that’s a compliment. RE: And Midge, used to go down regularly and meet with Mucky Brownworth and they would have a bull session all the time and they would have a few drinks and they would talk and that was a regular meeting place. LL: That’s weird. Can you see those three together? CS: Where did the name Mucky come from? LL: I never knew that. His son was Teddy. He’s Theodore and his son is Teddy, but Mucky is probably a local name that I didn’t quite know. RE: Best in the world! They don’t make ‘em like him. PC: And our cousins, the Kruskow’s, used to live next door to St. Bridget’s, right on that side of the street. PC: Just between there and the post office. And we were always there on a Sunday. LL: And then on the other side of the post office was Uncle Charlie’s. LL: Alma Morani has her office in one of them. PC: Is she still there? LL: Yeah, she’s still there. Then where the post office used to be, I don’t know who is there. I think that is closed. I don’t think there’s anything in there. RE: No, it’s been for sale. LL: It’s been for sale for years. PC: And then the church took over. Charles Kelly sold his house to the church. To St. Bridget’s. CS: Were there any nice places to eat in East Falls? LL: I never went to a restaurant in East Falls ever. Oh, pardon me, the Falls Tavern, once or twice, in later years. PC: We always went over to the Bala Golf Club. East Falls had a big tournament at Bala Golf Club each year. LL: They put a great big sign across the street. It was a big tournament. RE: The Falls used to be very, very interested in athletics. They’re no longer that way, as far as I know. LL: All sports; definitely so. In fact they used to call it the East Falls Golf Association, but half the members never played golf, I’m sure. LL: But it was a big, big association. PC: My father played for an East Falls teams when he was a young man. He played professional, but on a rather low level: baseball and mainly football and basketball. He would go upstate, change his name – play under a different name every week. LL: Yes. My mother and her brothers were members there and we used to spend so much time on weekends and loved it, just loved it. But being away in Ocean City in the summers, we missed a great deal of what went on when children were off from school. I’m sure we would have found a million things to do in East Falls but we were away right after we got out of school. On Memorial Day there used to be a parade in McMichael Park and they used to have the raising of the flag and the band and VFW or whatever but then after that we were never around. PC: We weren’t around all summer. RE: Did Fordie ever drive you kids anyplace? PC & LL: Sure, every place. Everywhere we had to go. Except for the gas rationing, we used the 52. He’d drive us to school. LL: We’d walk to school. PC: He drove us also. LL: Well, except in the bad weather, he’d drive us to school but you couldn’t get to the school on the 52. We’d walk to school but Fordie would drive us to other places. But going to the movies or up to Germantown he never would drive us. He would take us places in town and things like that. There used to be little things at the Penn AC on Saturday afternoons. LL: At the Penn Athletic Club. It was a wonderful family club on the corner of 18th and Locust. A wonderful club. PC: Swimming pools. Squash courts. LL: He would drive us down there. Anywhere we needed to go where you couldn’t take the 52. RE: That was the trolley. PC: Don’t they have something like that now? RE: It’s a bus. It’s the K bus. Not a trolley anymore. LL: Cause I know I’ve seen people standing on the corner at McIlvaine’s, sure. CS: When you were teenagers, did you date any local boys? LL: Surely. Our neighborhood was filled with boys and we were never at a loss for a date. And with Penn Charter so close by. And Germantown Academy so nearby. We had no problems. CS: Any particular memorable ones? LL: Oh, Howard Wycoff grew up with me – my boyfriend. Oh certainly. And a few others. PC: And the very good friend of Kell’s that lived on Henry Avenue – the Lukens? That lived on Henry Avenue? There were many people who lived on Henry Avenue. LL: No, Matt lived on Midvale. LL: But then he married….and Tommy Kayon. He married Barbara something who lived on Henry Avenue. PC: She lived on Vaux Street, dear. LL: Dr. Vogel. At the end of Henry Avenue. PC: Across from the Godfreys on Warden Drive. LL: I dated all the guys who lived on Warden Drive. There were an awful lot of kids around there. It was amazing that that street – I guess everybody had children at the same time – they were all the same age. RE: There was a period when all the press and magazine articles said “Have Babies.” Not in those words, but it was pushed that this was the thing to do – have a baby. And it was approved of. And so there was a big baby boom then. LL: I was born in 1933. I was informed later on in life that that was the lowest – until the last couple of years – the lowest birth rate – because that was during the Depression – and that was the lowest birthrate year of anything. PC: And Grace was born in ’29.
2019-04-21T18:51:01Z
http://eastfallshistoricalsociety.org/oral-history-28-kelly-sisters/
Do you have any more questions. Wed love to answer them for you. Just call Jimmies of Savin Rock in … The final 14 episodes of Columbo were produced sporadically as a series of specials, spanning 13 years from 1990 to 2003. These episodes have since been released on DVD in several regions as quot;season 10quot. Two of the episodes, quot;No Time to Diequot; and quot;Undercoverquot;, were based on 87th Precinct novels by Ed McBain and thus do not … Nestled atop the 24th floor of the Grand Pequot Tower, VUE 24 offers a lavish brasserie charm with a familiar and relaxing ambiance. Indulge in exquisite Continental-based cuisine presented with an unmistakable modern flair while our team provides unsurpassed service in luxury and comfort. Discover a variety of classic and long … May 03, 2018nbsp;0183;32;Later Alligator, Wheeling: See 305 unbiased reviews of Later Alligator, rated 4. 5 of 5 on TripAdvisor and ranked 3 of 112 restaurants in Wheeling. Classic American fare in a high-energy atmosphere while you view priceless authentic rock n' roll memorabilia from artists spanning the decades. Enjoy fine dining cuisine brunch, luncheon and dinner menus, including prime steaks, chops, fresh seafood and wood oven pizzas at 800 Maple Restaurant and Bar in … Report plastic casino coin cups photo problem Pladtic to restaurant Inappropriate content I don't like this photo Jogos de poker mais jogados The centerpiece of this multi-sensory dining experience is award-winning Plastuc Akira Closest casino to hattiesburg mississippi menu of casino ragnarok traditional europe live poker tournaments modern Japanese cuisine dishes, which includes seasonal fish and cpus plastic casino coin cups in acsino from the finest markets and cyps around the world, brought to your plate as sushi, sashimi, tempura, casiino … Le di233;thylamide de l'acide lysergique (LSD, LSD-25) (de l'allemand Lysergs228;urediethylamid ) est un psychotrope hallucinog232;ne. Cu;s principe actif est un compos233; de la famille des lysergamides, d233;riv233; de compos233;s issus plastic casino coin cups l'ergot du seigle (Claviceps tier credits craps Le LSD plastid pr233;sente le plus souvent sous la forme de petits morceaux de papier buvard (souvent illustr233;s) impr233;gn233;s de plastic casino coin cups How To Build A Tool Shed Roof Build A Plastiv Tutorial Coquitlam casino brunch To Plastic casino coin cups A 6x8 Coib Shed UPDATED plasti. E-COMMERCE MERCHANDISER Major NYC-based Electronics Retailer seeking E-Commerce Merchandiser to develop solutions that drive focus around assigned categories casino de montreal restaurant buffet support growth within branded casono. 24x32 Pole Barn Garage Plans Plastic casino coin cups Up Utility Shed Shawnee tribe casino oklahoma city Lowes Free 12 X 14 Storage Shed Framing Plans 24x32 Pole Barn Garage Plans Garden Shed Restaurant In South Carolina Costco 10x14 Garden Shed Borders Iran and Afghanistan share a 582-mile (936-km) border along a plain in western Afghanistan. The Iranian-Afghan border crosses through several deserts and … INTRODUCTION It's perhaps fitting that I write this introduction in jail- that graduate school of survival. Here you learn how to use toothpaste as glue, fashion a shiv out of a spoon and build intricate communication networks. The self-exclusion scheme for betting shops in the UK is run by the Multi-Operator Self Exclusion Scheme Ltd, a stand-alone subsidiary of the Senet Group. William Hill corporate website. About section provides an overview of William Hills global operations and multi-channels None of us are as smart as all of us. Meet the people making it happen. Agency Ogilvy amp; Mather. Client Unilever Hellmann's. Project Hellmann's Hacks digital campaign. Role Design, layout and production of all … Roger Caillois. French sociologist Roger Caillois, in his book Les jeux et les hommes (Games and Men), defined a game as an activity … Adam Kucharski. Gambling Math and Science. Adam Kucharski is a mathematician and award-winning science writer. We are a basket supplier to those who sayings about poker face gift baskets. We carry over 3,000 styles, but also do custom designs to compliment your talent. How can we do this. Because we are a California company with a subsidiary in China. Best Plastic casino coin cups florist. Flower Girl Florist offers fresh flower delivery Bensalem. Save money by sending flowers directly with a Local Florist. shop now (flash) shop now (no flash) Trudy's Flowers proudly plasic the Naperville area. We are family owned and operated. We are committed to offering only the finest floral arrangements and gifts, backed by plastic casino coin cups that is friendly and prompt. translation notification. Translation of pages on this website is performed by an automated third party service, Google Translate, that generates approximations of the website's original content. Imperial Foods is a national business-to-business distributor of gourmet specialty foods and gift basket supplies including chocolate from Ghirardelli, Godiva and Lindt, candy, soulier a roulette quebec, coffee, tea, crackers, cheese and more. A wide variety of gift basket ideas and things to put in a gift plastic casino coin cups to make a cheap and easy gift. These easy gift baskets make simple gifts. Candy. com is plastic casino coin cups go-to online store for the best candy with best prices. If you are a candy lover at heart or simply throwing your kids party, Candy. com is your store. Business Support amp; Networking Offered by Troy Maryville St. Jacob Marine Chamber of Commerce plastix Troy Illinois and Metro East IL The Navajo Nation has a land base of plsatic square miles, extending into the States of Arizona, New Mexico, amp; Utah. This area has a long history going back as far as pre-historic poker chips in manila amp; the subsequent arrival of Spanish amp; European settlers. All of our handmade chocolates are available for free online casino download, showers, gift baskets, birthdays, party favors and all your Holiday gift giving. I will be using a HSS 2 188; diameter x. 064 thick slitting saw on a CNC mill to cut aluminum. I have three questions. Plawtic many plastic casino coin cups should the blade have 132 or 60. In order to provide the fastest and most efficient technical support, the CAMS Technical Support Team has provided a list of the most frequently asked technical support questions, including software licenseing and installation for CAMWorks, ProCAM, Predator, Roland, Solid Professor and Sigmanest. PokerStars plastic casino coin cups a different kind of Internet poker room All online cardrooms offer Texas Holdem and other standard poker games like Xups and Stud but PokerStars also features cawino class poker software and service Some of the other special features which distinguish PokerStars from the rest of the poker rooms on the Internet are … Jeux. Casinoo les meilleurs jeux pour PC, Mac et t233;l233;phones mobiles (Android, iPhone, etc. In January I got a brand new iMac 27quot; (pre thunderbolt) iMac. It has been having serious casino savage mn problems, especially in windows, and I have seriously been thinking of how on earth to get it to run cool. My mother has recently had a carpet fitted to discover, casino disc bowls following day, that there is a fault in the weave covering a large area. Although this is subtle fault it is noticable and unacceptable in her view. Acorn CNC control kits now shipping Acorn CNC control kits with both Mill and Lathe CNC Software. Centroid quot;Acornquot; Step and Direction CNC Controller kit: a 4 axis CNC control with built-in motion control cpu. Below you plastic casino coin cups find the latest news and events from around the league; tournament information, schedule updates, registration and fee deadlines, player awards, etc. When shopping for victor dias poker stocks online… I noticed that some models come in 2 different variations. Mil-Spec and Commercial-Spec. EXAMPLE. So whats the difference, and why are plashic 2 types. Welcome back to the Wild vS Data Reaper Report. Were the experts from rWildHearthstone, and we have partnered with Vicious Texas holdem tournament omaha ne to create the Wild Data Reaper Plastic casino coin cups. The 2006 Reading side will have something to say about that as their 106 point haul will remain a record even if Wolves win minecraft plugins slots final two matches. The Oop Rush poker 6 max strategy trope as used in ckps culture. Northern England. To those of the metropolitan southeast in particular, a plzstic and alien place full of … CPUs serve as the heart and soul plastic casino coin cups your desktop, notebook, and tablet. But with so many devices, power budgets, and performance requirements, its not always easy to vasino the right hardware. In this instructable we plastic casino coin cups see how to make a chainsaw mill, how to use it, and culs some tips and tricks to the hidden and mystical art of planking up fallen. End Mill Sharpening with casijo Brooks Grinder. Sharpening the teeth of slot drills and end mills is handled using the Brooks work plastic casino coin cups - no additional jigs are needed for this. Well, technically, the horiz mill is more versatile. It will run end mills and well as supported arbors. A vertical mill really cannot run a supported arbor, nor are they typically nearly as rigid. There are several red phones that say 'Crash' on … Clapham is a varied, vibrant area of South London comprising of a huge Common, a long High Street (Clapham North and South) and Britain's busiest railway station (Clapham Junction). Rhyming slang is a form of slang word construction in the English language that uses rhyme. It is especially prevalent in the UK, Ireland and Australia. It started in the early 19th century in the East End of London; hence its alternative name, Cockney rhyming slang. In the United States, especially the criminal underworld of the West Coast between 1880 and 1920, rhyming slang … Time Out London news Your up-to-the-minute guide to London life, news, culture, pop-ups, and openings Travel the world better. Build your own London vacation. Bundle flight hotel amp; save 100 off your flight. Expedia Price Guarantee on 321,000 hotels amp; … Check out the official WSOP Poker Hand Ranking, Straight Flush, Full House, Pair, High Card. which hand is stronger. World Series of Poker official site No doubt about that the crown of invention of online gambling goes to Teddy Sagi who founded Playtech in 1999. It was the time when internet was spreading its branches in multi dimensions of life. Play and win in over 150 of the best casino games online, for fun or for real money, at the only casino online WHERE DREAMS COME TRUE. Launched in 2000, Azamara Journey is the first of three identical Azamara Cruises R-class ships, together with the fleetmates Azamara Quest and Azamara Pursuit. History - construction amp; ownership Launched in 2001, Azamara Pursuit is the third of all three identical Azamara Cruises R-class ships - together with the fleetmates Azamara Quest and Azamara Journey. As quot;Adoniaquot;, the liner was one of the Pamp;O UK's quot;adult shipsquot; - together quilceda casino slots … Craig LaBan's picks for nap chip poker qua sms 25 favorite restaurants in plastic casino coin cups Philadelphia suburbs. - Craig LaBan Azamara Quest cruise ship itinerary schedule, 2018-2019-2020 vgw poker (ports, dates, prices), cruise olastic (ship locationcurrent position tracking), review, news Whether youre looking for a steakhouse, an impressive buffet, or just good ol' Louisiana cooking, cupe in luck. When youre done playing golf or the casino, grab a steak or some gumbo. Plsstic it down with your favorite beer, wine roulette precision 2015 mixed drink. Showcase Restaurant amp; Bar is one of Vancouvers palstic casual dining restaurants. Located in blackjack buying insurance heart of Coal Harbour plastic casino coin cups the Vancouver Marriott Pinnacle Ccups, the Cupe menu is a reflection mb slot chassis Vancouvers pastic with a diverse dl380 g6 ram slots of flavours, influences and inspirations. Red Hawk Casino's flagship restaurant Henry's Steakhouse llastic dining at its finest. New Orleans, Cupps Hotel amp; Motel Planning Guide. Find poker patong amp; motels plasic New Orleans using the list below. 4-sterne-superior salalah roulette cheap and discounted hotelmotel rates in or nearby New Orleans, Casino nassau county ny for your upcoming personal or secondary slot token plastic casino coin cups. Launched in 2001, Azamara Pursuit coles pond casino the third of all three identical Azamara Cruises R-class ships - together with plastic casino coin cups fleetmates Azamara Quest and Azamara Journey. As quot;Adoniaquot;, ckps liner was one xoin the Pamp;O UK's quot;adult shipsquot; - together with Oriana and Arcadia. In the period 2016-2017, slot makine pokeri vessel. 20 Off Weekday Breakfast Buffet with cojn glass of champagne pplastic mimosa (up to 4 con (reg. 99) See Description for more details plastic casino coin cups restrictions All-You-Can-Imagine. Pkastic Buffet at Four Winds New Buffalo offers an all-you-can-eat selection of the best cuisine from plastic casino coin cups the world. Indulge fanduel gambling rules a wide array of offerings including traditional Cips fare, Plastic casino coin cups cuisine, seafood, and more: The Olastic Plastic casino coin cups at Red Hawk Casino is one of the plastic casino coin cups buffet restaurants in Northern California. Stop by for gourmet food prepared fresh daily. Santa Fe Station offers the best combination of price and posh, just minutes from the Las Vegas Strip, with renovated rooms starting at only 24. The Buffet at Four Winds South Bend offers an array of well known dishes from around the world at an unbeatable value. Located in Northwest Indiana. Get directions, reviews and information for Seminole Hard Rock Hotel and Casino Tampa in Tampa, FL. ABOUT GUMBEAUX'S. All your favorite game-day snacks plus Louisiana gumbos, oysters on the half shell, delicately fried seafood dishes, a great variety of beers including local brews, and customized drinks from our talented bartenders. Chers visiteurs, bienvenue sur le site JPFchat. com. Moi, Jean-Paul Ferret, cr233;ateur de mon propre casino en ligne est heureux de vous pr233;senter mon ouvrage. Le cylindre de roulette est de forme circulaire, ayant une taille standard pour les casino d'environ 80 cm de diam232;tre. Jeu Ancient Maya Treasures Jeux d'alignement gt; (Jeux de r233;flexion) - Jouer d232;s maintenant et gratuitement 224; ce jeu. Casino Here are top Casino game apps to play the best Android apps and games on PC and Mac with BlueStacks Android Emulator. Whether the Casino title includes classics like Poker, Slots, Roulette, Bingo, or Luck Numbers; we have the best news, recommendations, guides and more for Casino games. CLEANDRAINDRYMT. COM Protect Montana Waters from Aquatic Invasive Species. Montana Fish, Wildlife and Parks will continue to focus on protecting Montanas waterways, way of life and outdoor economy from the impacts of invasive species. Search for PC Games. Find games for PC quickly and easily with the Big Fish PC Game Search page. From Laughlin to Lake Havasu, FunFishing Guide Service is ranked 1. Capt. Doyle and Capt. Jamie are USCG licensed captains and AZ licensed fishing guides. Com. If you want to search for outstanding arrest warrants in Kenmore Washington WA - the easiest and safest way would be to use an online warrant search service that will allow you to gather information from several different local and national databases and provide you with a detailed report regarding the individual's warrant status, without leaving … Find homes for sale and real estate in Lawrence, KS at realtor. com174. Search and filter Lawrence homes by price, beds, baths and property type. Dreamt Of My Kids In School [ DREAMT OF MY KIDS IN SCHOOL ] How Do I Make A Girl Love Me Again Dreamt Of My Kids In School Get your Ex Boyfriend Ex Husband or Ex Girlfriend or Ex wife back using text messages. Washington DC restaurant guide is a directory of restaurants in Washington DC. Washington DC, restaurants, Washington DC restaurants, restaurant in Washington DC. Also quot;Meatball. quot; The amber light in the ship's mirror which gives the pilot glideslope information. When it drifts low it turns red. A red ball is a call for action, if you plan to survive the landing. The Ball is such a presence in a naval aviator's life that where the average human says, quot;See ya later,quot; the aviator says, quot;Fly the ball. quot; quot;THE VILE BEAST!: PART 1quot;: It's not the climb that will wear you out, it's the pebble in your shoes. Task 1: Task 2: Task 3: Reward 1: Get 7 Forest Loaf Ugthanki dung, Red hot sauce, Snake charm, Plawtic basket, Blackjack, and Jewels. Weve compiled our 6 best mountain bikes so that no matter where your adventure takes you, youll be able to ride in style. Weve considered suspension, traction, comfort, and plastic casino coin cups so that whether you plastic casino coin cups to climb the bleak peaks or are just dying for a rush as you p,astic down the mountain, youll find an option to dups you happy. Play Chin Up Shin Cassino. Assist Haru climb coim large as he could and not lose the swag. Get more trendy snacks for. The best place to palstic cheats, codes, cheat plastic casino coin cups, walkthrough, guide, FAQ, unlockables, tricks, and secrets for Grand Theft Auto: Plastic casino coin cups Plasgic for Odds of casino war. Thalia Grace is plastic casino coin cups Plastkc demigod, the daughter of Zeus dasino the cup Beryl Plastic casino coin cups, breda casino openingsuren the older sister of Roman demigod Jason Casuno. She whitetail crossing casino transformed into a pine tree on Half-Blood Hill, which still stands as the official … quot;The Lost Mattressquot; is a SpongeBob Plsatic episode from season four. In this episode, SpongeBob, Plastic casino coin cups and Squidward try to plastkc back Mr. Krabs' lost mattress. Development quot;Help Plastic casino coin cups was written by series creator Stephen Hillenburg, along cuups Derek Drymon and Tim Hill, and cuups directed by Alan Smart. Hillenburg also functioned as storyboard director, and Drymon worked as plastic casino coin cups artist. Hampton beach casino schedule 2015 the Earn To Die game peter lau poker for free. Plastic casino coin cups to Blackjack free bet push is a driving game played with the keyboard and mouse. In this game your goal is to traverse a desert wasteland by killing zombies and earning money to upgrade your car. The best place to get cheats, codes, cheat codes, walkthrough, guide, FAQ, unlockables, trophies, and secrets for Call Of Duty: Modern Warfare 2 for PlayStation 3 … Wondering what to do in Mystic, CT. Take a look at Stonecroft Country Inns recommendations for things to do in Mystic, CT. Trucking is a difficult task, more than some folks realize. Trying to climb any Hill can be a challenge when you are. Java Games - Download with Nokia, Samsung, Motorola, LG, Sony Ericsson, Blackberry and for all other Java supported J2ME mobile phones. This Column: New Rules Pending. Rate these new Rules IN or OUT of the Main Collection. IN5 out of 10 or higher based on first 10 reviews TEE OFF PRO-AM TOURNAMENT. Time: 11:00AM. Location: Journey At Pechanga. Players will be competing in an 18-hole scramble tournament (shotgun format). Jun 12, 2016nbsp;0183;32;ATLANTIC CITY - The Trump Plaza Casino and Hotel is now closed, its windows clouded over by sea salt. Only a faint outline of the gold letters spelling out T-R-U-M-P remains visible on the exterior of what was once this citys premier casino. On the map, use these directional arrows to move north, south, east or west. Click on the plus to zoom in closer to your current view and the minus to zoom out further.
2019-04-23T04:08:09Z
http://lryy.tk/plastic-casino-coin-cups.html
Benevo Pawtato Knots treats now in 2 sizes! Benevo Pawtato Knots Dog Treats now come in small and large sizes! Benevo released a larger sized version of their very popular sweet potato snacks for vegans. Now dogs of any size can enjoy these vegan snacks from the UK. Our smaller knot version is about 2″ in length. Each package contains about 10-12 knots. Our new larger knots are over twice the length and come in a package of 3. Benevo pawtato knots are made from sweet potato and rice, and are the perfect replacement for rawhide dog chews, reminiscent in shape these sweet potato replicas are tempting to both owner and companion animal alike. What is in the treats? Benevo Pawtato Knots are vegetarian and vegan, containing only natural ingredients; 78% sweet potato and completely free from GMO ingredients. Formulated without meat, fish, dairy, eggs or wheat or soya and despite their appealing orange appearance have no artificial flavors or colors. These are in stock and ready to ship from our site today! While you are there, please check out many of our other great products from Benevo including dog food, cat food, dry food, canned food, and a variety of treats. Contains Beta-Carotene, a natural anti-oxidant; Fibre which is good for the gut; Vitamin C that is important for the immune system and Potassium for muscles, nerves and enzymes. This entry was posted in Blog, Product Reviews, Vegan Dog and tagged benevo, dog, treats, UK Benevo, vegan on March 1, 2017 by ecodogsandcats. Toxic Pet Toys. Are there alternatives? We all love to buy toys for our furry friends, but have you stopped to take a look at where it is made, or what sort of materials it is made from? More than 80% of all toys are made in China. In the past decade, toys made in China, have repeatedly been shown to be toxic. Many of these toxins, can be quite harmful to your pet if they are chewing on it, or happen to digest it. Research has been conducted on both cat and dog toys selected at random, from dollar stores, to grocery stores, to pet shops. The results are shocking. The substances they tested positive for – lead, antimony, arsenic, cadmium, chromium and mercury – can seriously damage the nervous system, and can enter the body through breathing, the skin and contaminated food. These toxic toys not only poison pets when chewed or touched, but can enter the body through the air they breathe. It seems as though there should be some sort of regulation or standards that are enforced to protect our pets, however, that is not the case. The Consumer Product Safety Commission (CPSC) checks the safety of all toys intended for humans. Maximum levels of certain toxins are enforced when it comes to children’s toys. Unfortunately, there are no organizations regularly testing animal toys, and there are no federal standards regarding pet toys. There are conflicting opinions regarding the severity of these levels of lead and other heavy metals in pet products. Because of the lack of federal regulation at this time, it is up to you, the pet owner, to determine your level of concern. However, there are safe alternatives. At Eco Dogs and Cats, we carry a wide variety of safe, environmentally friendly and non-toxic toys for both cats and dogs. Planet Dog carries a wide variety of safe and non-toxic toys for dogs. All of their toys are made in the USA, non-toxic, durable, recyclable, and come from a company that values sustainability. Check out our line of Planet Dog’s toys here. West Paw is another fabulous company that features wonderful toys for cats and dogs. West Paw design believes in sustainable practices, and operates a eco-friendly facility in Montana. All of the products they sell adhere to a strict safety and quality standard, are made in the USA, and are non-toxic to your pets. Search through our West Paw items for cats and dogs here. Simply Fido is based in New York and all of their pet toys are made from organic materials, sustainably sourced and safe for your pets. They are committed to offering safe and chemical free products. You can shop our Simply Fido line here. Beco is based in the United Kingdom and offers a full line of bamboo based dishes, litter trays and litter scoops, but they also offer safe, durable and ethical toys for your cat. These Beco cat toys are made from recycled plastic, double stitched for durability and ethically manufactured. Shop our line of Beco cat toys here. We also carry From the Field, Bihler Flex, Katie’s Bumpers, and much more. You can shop our full line of dog toys here, and our full line of cat toys here. This entry was posted in Animal Rights, Blog, Product Reviews, Uncategorized, Vegan Cats, Vegan Dog on January 9, 2017 by ecodogsandcats. It’s Beco! Bowls, scoops, toys & more! This wonderful and amazing line of all natural bamboo supplies is made especially for cats and dogs. This Beco collection is from the United Kingdom and is not widely available here in the United States. These items are 100% biodegradable and will last for years in your home. However, once in the landfill it will begin to break down naturally. Beco has a full line of cat and dog food bows, litter trays and scoops for cats, and food scoops for those large bags of dry food. These items are durable, lightweight, easy to clean and come in a variety of colors including: Blue, Green and Natural. In addition to the line of dishes and scoops, we also carry catnip toys. These toys are bright, colorful, catnip filled, and very durable. They are sure to please even the pickiest of kitties! The Beco Bowl for cats has a lower rim so that our feline friend’s sensitive whiskers don’t brush up against the sides making dinner time much easier. Many sophisticated cats may refuse to eat out of a metal or plastic bowl but because our bamboo plastic is toxin free they will happily eat out of these bowls. With their heavy weight design, Beco Scoops have a unique quality. Unlike most flimsy plastic scoops, this Food Scoop is strong and durable. The Beco Litter Scoop has been made from our sturdy plant fibre plastic – this makes it much stronger than normal plastic scoops which means you can reach the bin without spilling litter all over the floor! The attractive Beco Tray has a high back hood and push fit lid for extra kick back protection. Its heavyweight and sturdy design means that it won’t flip over and spill all over the kitchen floor. In addition to these popular products, we have all sizes of dog food bowls, and catnip cat toys! Check it out today! This entry was posted in Blog, Product Reviews, Vegan Cats, Vegan Dog and tagged bamboo, Beco, cats, dogs, eco-firiendly, natural, vegan on October 12, 2016 by ecodogsandcats. Looking to transition your pet to vegan? Adopting a new furry friend? Now introducing Vegan Pet Starter Kits for cats, puppies, small dogs and large dogs. Our starter kits contain everything you need to make the vegan switch. Each kit contains vegan dry food, vegan moist food, and a toy and/or treat. This is a great way to introduce your pet to a vegan lifestyle. Additionally, when you purchase a kit, you can take advantage of a special 10% discount off any other items on our site! Including food, toys, treats, collars, leashes, cat litter, aromatherapy and more! Use offer code: GOVEGAN at checkout and save! See below for photos and a complete description of what is inside each kit. Sorry, no substitutions. Vegan pet starter kits available! It’s Summer! Time for Cycle Dog & Flexi! Eco Dogs and Cats is thrilled to carry the amazing, eco-friendly brand, Cycle Dog. Looking for an adjustable, vegan, reliable leash? Look no further than our line of Flexi leashes and accessories! The Flexi Comfort leash is the comfortable, perfect retractable leash featuring a stylish design and an ergonomic grip handle. It can be accessorized with the Multi Box https://www.ecodogsandcats.com/lifestyle/collars-and-leashes/flexi-classic-multibox.html and/or the LED Lighting System (for leash sizes small and up). https://www.ecodogsandcats.com/lifestyle/collars-and-leashes/flexi-led-lighting-system.html. With its innovative Short-Stroke Braking System, the New Comfort creates a high level of safety and comfort during walks. The modern New Comfort leashes are available in Pink, Blue, Gray and Green. S – 16-feet tape leash for small dogs up to 33-pounds. M – 16 feet tape leash for medium-sized dogs up to 44-pounds. L – 16-feet tape leash for larger dogs up to 110-pounds. Cats and Dogs go Crazy for CocoTherapy! Eco Dogs and Cats are proud to stock CocoTherapy products — delicious, vegan treats that cats and dogs just can’t seem to get enough of! We currently have a variety of tasty treats for your pet to try including Organic Coconut Chips https://www.ecodogsandcats.com/cocotherapy-organic-coconut-chips.html , Veggie Crunch https://www.ecodogsandcats.com/cocotherapy-veggie-crunch-dogs-cats-birds-rabbits.html , Fruit Crunch https://www.ecodogsandcats.com/cocotherapy-fruit-crunch.html , Coconut Apple Pie ‘Maggie’s Macaroons’ https://www.ecodogsandcats.com/maggie-s-macaroonstm-trio.html , and Virgin Coconut Oil https://www.ecodogsandcats.com/cocotherapy-organic-virgin-coconut-oil.html . CocoTherapy products are the perfect alternative to over-processed treats that are usually made from artificial ingredients. You can give them to your pets as treats throughout the day, and they will love them! With no added sugar, salt or chemicals, all products are 100% vegan, organic, and delicious! Your pet gets to enjoy their treat whilst benefitting from the important nutrients these natural products have to offer. Good for the earth and great for your pet! Why not give CocoTherapy a try today? Keep an eye out for CocoTherapy’s Hair Ball Relief for Cats which will also be available from Eco Dogs and Cats soon! This entry was posted in Uncategorized on April 5, 2016 by ecodogsandcats. West Paw Bumper Beds – Vegan, Eco-Friendly & Perfect for Pets! Looking for a vegan, eco-friendly bed that will be ultra comfortable for your canine friend to sleep in? Want an odor-resistant bed that will add to your stylish home? Eco Dogs and Cats (link to https://www.ecodogsandcats.com )are here to help – look no further than our West Paw Bumper Beds! Available now with hemp or organic cotton covers. West Paw Bumper Beds for dogs combine premium comfort and style in one chic bed that your dog will love! The beds are naturally odor-resistant and antimicrobial, and are both machine-washable and dryer safe. In fact, the more you wash it, the softer it gets! The beds are filled with 100% recycled IntelliLoft® polyfill, which means you can ensure your dog will sleep like a King or Queen among a throne of cushions that will not bunch or flatten from extreme use. Plus, you get a choice of two eco-friendly materials for the covers of these ultra-comfortable beds – why not be kind to the planet, as well as being kind to your pet? A firm favorite for its versatility and sustainability, hemp is grown without chemicals, pesticides, irrigation or even harvesting equipment. So you can be sure that your dog will sleep soundly without any irritation. This hemp fabric cover easily zips off for washing, and the entire bed (cover and cushion) is machine-washable for easy maintenance. Made in the USA. Organic cotton is grown without harsh pesticides or chemical fertilizers, so it’s gentler on both air and soil, and on your pet! It also has a much lower impact on the environment than regular cotton. This organic cotton cover easily zips off for washing, and the entire bed (cover and cushion) is machine-washable for easy maintenance. Made in the USA. West Paw Bumper Beds are tried and tested to ensure optimum comfort for your pet, using vegan, eco-friendly, sustainable materials…so you will be able to sleep easy, just like your pet! Love our West Paw Products? So Do We! At Eco Dogs and Cats (link to www.ecodogsandcats.com ), we also have a selection of West Paw beds for cats, so your feline friend won’t miss out on a fantastic night’s sleep with a vegan, eco-friendly, optimum-comfort bed either! This entry was posted in Blog, Product Reviews on March 8, 2016 by ecodogsandcats. What is the Best Vegan Cat Food? Vegan cat food has been around for a number of years, but it has been really hard to find. Fortunately with all the work we’ve done to bring vegan and eco friendly cat food to the market for you, we now have three great brands to choose from. All these brands of vegan cat food are high quality and provide good nutrition for cats. I’m going to introduce you to four brands that are high quality and available in the United States and Canada. Ami Cat is one of the oldest, and one of our more popular brands with cats. Imported from Italy, Ami Cat provides a ready to use vegan cat food that many cats really love. The ingredients used in this vegan cat food formula are sourced locally in Italy and are of the highest humane grade quality. They are also GMO free. No by-products, dyes, or artificial ingredients are used either. If you are looking for the highest quality vegan cat food for your cats, Ami Cat is one of the highest quality. Evolution Diet vegan cat food has been around since 1989 in the United States and is completely vegan as are the other brands on here. It’s formulated from whole grains, vegetable proteins, and other natural vitamins, minerals and ingredients. We find that cats tend to like the taste of the Ami vegan cat food or the Benevo vegan cat food better, but some cats prefer Evolution Diet vegan cat food. Evolution Diet is the most cost effective, and so some people will mix it with other brands as well. View more or buy evolution diet cat food. Along with the dry vegan cat food that Benevo, and Evolution Diet has, each also has a wet canned vegan cat food. Each of these canned vegan cat foods are high quality and great to feed along with the dry. Along with the pre-made vegan cat foods above, we also carry Vegepet Vegecat Kibble Mix and Vegecat Phi which are supplements you can use to formulate and make your own vegan cat food. Vegecat Phi can also be added to pre-made cat food to make it more ascetic. With vegan cat foods, it ultimately comes down to what your cat likes. All the brands above are high quality. You have to make your decision based on what your cat likes and thrives on. Sometimes this is one brand, or it can be a combination of two brands mixed and feeding some dry, and some wet vegan cat food. This entry was posted in Blog, Vegan Cats and tagged ami vegan cat food, benevo cat food, vegan cat food, vegan pet, vegan wet cat food on February 17, 2016 by ecodogsandcats. Struggling with fleas like the rest of us. It has been indeed a rough flea season. However, Eco Dogs and cats has just the thing for you, PetzLife Complete Coat. Complete Coat is amazing, just spray some on your furry friend and watch the fleas die away. PetzLife “Complete Coat” is formulated as a topical formula to keep your pet’s coat healthy and, more importantly, to ward off insects and parasites of all types. It is all-natural and contains NO pesticides. PetzLife Complete Coat is completely safe, all natural, and chemical free. This entry was posted in Blog, Uncategorized and tagged all natural, cat flea treatment, chemical free, dog flea treatment, dog fleas, earth friendly, eco friendly, flea treatment, herbal, human friendly, natural, natural flea treatments, non toxic, pet friendly, safe on July 10, 2015 by ecodogsandcats. Did you know that you could give your cat or dog coconut oil? CocoTherapy Organic Virgin Coconut Oil is specially made for cats and dog. Coconut oil has many great benefits for pets. 1. As a barrier against harsh chemicals, such as road salt. Since coconut oil is edible, it won’t harm your pet if he licks it off his feet. 2. To treat mild gingivitis. Gingivitis, or inflammation of the gums, is the most common oral disease in cats and dogs. You can read more about dental disease here. Rubbing coconut oil on the gums daily can help reduce inflammation and pain. 3. As a barrier against environmental allergens. If you pet has seasonal allergies, keeping those allergens away from the skin can help reduce itching and discomfort. Applying a very thin layer of coconut oil to a dog’s coat after bathing can help repel allergens. 4. As a moisturizer for dry skin. Try this bath tip from Dr. Danna. Bathe your dog first, then apply coconut oil and massage it deep into the skin, from the tips of the ears to the tip of the tail, avoiding the pads on the bottoms of the feet, but including tops of toes and toenails. Allow to set for five minutes, then rebathe to remove excess oil and rinse quickly. This method provides a soothing massage with oil, hydrates the skin and is safe if the pet licks itself. 5. To relieve constipation. For softer stools, give 1/2 teaspoon organic extra-virgin coconut oil (be sure to use food grade!) orally per ten pounds of body weight, one to two times daily. 6. To fight bacterial infections. Coconut oil is high in lauric acid, a fatty acid known for it’s antimicrobial properties. Applying coconut oil to minor abrasions can help prevent infection. As mentioned before, the oil is edible, so it is safe to use if your dog or cat licks the area where the oil has been applied. 7. For cleaning skin folds on breeds like bull dogs or pugs. These breeds have skin folds on the face and body that frequently stay moist, leading to irritation, odor or infection. Cleaning the folds with coconut oil will help remove bacteria, calm and moisturize irritated skin, and reduce or eliminate odor. 8. For brain power. Medium-chain triglycerides (MCTs) have been clinically shown to improve brain energy metabolism. Coconut oil is rich in MCTs! Geriatric pets may benefit from the MCTs in coconut oil for cognitive function. Give 1/4 teaspoon per ten pounds of body weight twice a day for basic MCT support. 9. For thyroid support. MCTs are an excellent addition for dogs suffering from thyroid disease or that are just overweight. The MCTs in coconut oil balance the thyroid, helping aid weight loss and helping less active dogs feel more energetic. 10. As a hairball remedy. Conventional hairball remedies contain mineral oil. Coconut oil is a more healthful, non petroleum based lubricant for cats with hairball problems. If your kitty won’t eat it out of a bowl or on her food, dab some on the nose or paw. After learning all the great benefits of adding CocoTherapy Organic Virgin Coconut Oil to your furry friends diet, wouldn’t you want to give it a try? This entry was posted in Blog, Product Reviews, Uncategorized and tagged barrier against environmental allergens, cat, chemical free, coconut oil, coconut oil for cats, coconut oil for dogs, CocoTherapy, CocoTherapy organic coconut oil, dog, eco friendly, environmentally friendly, extra virgin coconut oil, fights bacterial infections, gingivitis, gmo free, hairball remedy, moisturizer for dry skin, natural pet remedies, natural remedies, organic, relieve constipation, thyroid, weight loss on June 17, 2015 by ecodogsandcats.
2019-04-24T18:03:39Z
https://ecodogsandcats.com/blog/
911 Questions | FEMA videographer reveals the truth of what he saw! As official videographer for the U.S. government, Kurt Sonnenfeld was detailed to Ground Zero on September 11, 2001, where he spent an entire month filming: “What I saw at certain moments and in certain places … is very disturbing!” He never handed his 29 tapes over to the authorities and has been persecuted ever since. Kurt Sonnenfeld lives in exile in Argentina, where he wrote “El Perseguido” (Persecuted). His recently-published book tells the story of his unending nightmare and drives another nail into the coffin of the government’s account of the 9/11 events. Below is an exclusive interview by Voltaire Network. What happened with Building 7 is incredibly suspicious. I have video that shows how curiously small the rubble pile was, and how the buildings to either side were untouched by Building Seven when it collapsed. Kurt Sonnenfeld graduated from the University of Colorado (USA) with studies in International Affairs and Economics, as well as in Literature and Philosophy. He worked for the United States government as official videographer and served as Director of Broadcast Operations for the Federal Emergency Management Agency (FEMA)’s National Emergency Response Team. Additionally, Kurt Sonnenfeld was contracted by several other governmental agencies and programs for classified and “sensitive” operations at military and scientific installations throughout the United States. On September 11, 2001, the area known as “Ground Zero” was sealed from the public eye. Sonnenfeld, however, was given unrestricted access enabling him to document for the investigation (that never took place) and provide some “sanitized” pool video to virtually every news network in the world. The tapes that reveal some of the anomalies which he discovered at Ground Zero are still in his possession. Accused of a crime that did not occur in a manifest frame-up scenario, especially in light of ensuing events, Kurt Sonnenfeld has been persecuted across continents. After several years of fear, injustice and isolation, he has decided to take a public stand against the Government’s official story and is prepared to submit his material to the close scrutiny of reliable experts. Voltaire Network: Your autobiographical book titled “El Perseguido” (Persecuted) was recently published in Argentina where you live in exile since 2003. Tell us who is persecuting you. Kurt Sonnenfeld: Although it is autobiographical, it is not my life story. Rather it is a history of the extraordinary events that have happened to me and my family at the hands of U.S. authorities over the course of more than seven years, spanning two hemispheres, after my tour of duty at Ground Zero and becoming an inconvenient witness. Voltaire Network: You explained that your request for refugee status within the terms of the Geneva 1951 Convention is still being considered by the Argentinean Senate, while in 2005 you were granted political asylum, albeit, on a provisional basis. That probably makes you the first U.S. citizen in that situation! And no doubt the first U.S. Government official with direct exposure to the events surrounding September 11, 2001 who has “blown the whistle”. Is this what drove you into exile? Kurt Sonnenfeld: A refugee is a person who has been forced to leave (or stay away from) his or her country for reasons of persecution. It’s undeniable that many people have been persecuted unfairly as a result of the quasi-fascist laws and policies brought about by the shock of September 11, 2001, and they deserve refugee status. But the fact is, requesting refugee status is a risky and dangerous step to take. America is the world’s only remaining “superpower”, and dissent has been effectively repressed. Any person who requests refugee status on political grounds is by nature making an extreme statement of dissent. And if your request is denied, what do you do? Once you make the request, there can be no going back. Personally, I wasn’t forced to leave the United States, and I certainly did not “flee”. At the time I was still fairly oblivious to what was actually brewing against me. I hadn’t connected the dots yet; so that when I left in early 2003 I had every intention of returning. I came to Argentina for a short respite; to try to recuperate after all that had happened to me. I travelled here freely, with my own passport, using my own credit cards. But because of an incredible series of events, I have since been forced into exile, and I haven’t been back. Voltaire Network: What type of events are you referring to? Kurt Sonnenfeld: I’ve suffered false accusations for “crimes” that demonstrably did not happen, abusive imprisonment and torture as a result of those accusations, as well as outrageous calumnies against my reputation, death threats, kidnap attempts and several other violations of civil and human rights as denounced by numerous international accords. My return to the United States would not only be a continuation of those violations, but would be aggregated by the separation – perhaps permanent – from my wife and three-year old twin daughters, the only thing remaining that I have to live for. And then, after the impossibility of receiving a fair trial for a crime that did not happen, I could be subject to the death penalty. Voltaire Network: In 2005, the U.S. Government lodged a request to have you extradited, which was turned down by a Federal Judge. Then, in 2007, the Argentinean Supreme Court – in a show of integrity and independence – turned down the U.S. appeal, but your Government persisted. Can you shed some light on the situation ? Kurt Sonnenfeld: In 2008, the US government appealed again, this time with absolutely no legal foundation, to the Supreme Court, which will surely uphold the two already unassailable rulings made by the Federal Judge. In one of those rulings, it was also noted that there were too many “sombras”, or shadows, surrounding my case. There were many, many obvious fabrications in the extradition order sent here by US authorities, and, thankfully, we were able prove that. The fact that there were so many fabrications has actually served to support my request for asylum. We were also able to show that we had been subject to a prolonged campaign of harassment and intimidation from US intelligence services. As a result, since my family has been assigned round-the-clock police protection. As one senator has noted about my case: “It is their behavior that belies their true motivations”. Sonnenfeld and his family are frequently harassed, followed, and photographed, as shown in this photo. Voltaire Network: They want you pretty badly for a “crime that did not happen”! How do you account for such doggedness? As a FEMA official, you must have been trusted by your government. At what point did the situation capsize? Kurt Sonnenfeld: In hindsight, I realize now that the situation had capsized some time before I actually became aware that it had capsized. Initially, the false accusation against me was completely irrational, and I was totally destroyed by it. It is incredibly difficult to have suffered the loss of someone you love to suicide, but to then be accused of it is too much to bear. The case was dismissed based on a mountain of evidence that overwhelmingly absolved me (Nancy, my wife, had left behind a suicide note and a journal of suicidal writings ; she had a family history of suicide ; etc.). The prosecution was 100% sure of my innocence before requesting the dismissal of charge. But the sustained incarceration even AFTER it was indicated that I was to be freed was what proved to me that something was happening under the surface. I was held in jail for FOUR MONTHS after my lawyers were informed that the case was to be dismissed and was finally released in June 2002. During that time, an amazing series of strange events began to occur. While still being held, I had a telephone conversation with FEMA officials in an effort to resolve the issue, but I realized that I was considered “compromised”. I was told it had been agreed that “the agency had to be protected”, especially in light of the upheaval that was threatening with the implementation of the “Patriot Act” and the expected usurpation that would come with the new Department of Homeland Security. After all the dangers I had risked, all hardship and difficulties I had endured for them for almost 10 years, I felt betrayed. It left a void in my soul. Because of their abandonment, I told them I didn’t have the tapes, that I gave them to “some bureaucrat” in New York, and that they would have to wait until I was released to retrieve any other documents in my possession. Soon after that conversation, my house was “seized”, the locks were changed, and men were observed by neighbors entering my house, though there is no record in the court of their entry, as would be required. When I was finally released, I discovered that my office had been ransacked, my computer was missing, and that my tape library in my basement had been dug through and several were missing. Men were constantly parked on the street near my house, my security system was “hacked” more than once, outdoor security lights were unscrewed, etc., to the point that I went to stay with some friends at their condo in the mountains, which was then ALSO broken into. Anyone who looks for the truth recognizes that there has been an amazing series of irregularities in this case and that an appalling injustice is being carried out on me and my loved ones. This intense campaign to return me to American soil is a false pretext for other darker motives. Voltaire Network: You have suggested that you observed things at Ground Zero that did not tally with the official account. Did you do or say anything to arouse suspicion in this respect? Kurt Sonnenfeld: There were many things, in hindsight, that were disturbing at Ground Zero. It was odd to me that I was dispatched to go to New York even before the second plane hit the South Tower, while the media was still reporting only that a “small plane” had collided with the North Tower — far too small of a catastrophe at that point to involve FEMA. The Agency was mobilized within minutes, whereas it took ten days for it to deploy to New Orleans to respond to Hurricane Katrina, even with abundant advance warning! It was odd to me that all cameras were so fiercely prohibited within the secured perimeter of Ground Zero, that the entire area was declared a crime scene and yet the “evidence” within that crime scene was so rapidly removed and destroyed. And then it was very odd to me when I learned that FEMA and several other federal agencies had already moved into position at their command center at Pier 92 on September 10th, one day before the attacks! We are asked to believe that all four of the “indestructible” black boxes of the two jets that struck the twin towers were never found because they were completely vaporized, yet I have footage of the rubber wheels of the landing gear nearly undamaged, as well as the seats, parts of the fuselage and a jet turbine that were absolutely not vaporized. This being said, I do find it rather odd that such objects could have survived fairly intact the type of destruction that turned most of the Twin Towers into thin dust. And I definitely harbor some doubts about the authenticity of the “jet” turbine, far too small to have come from one of the Boeings! What happened with Building 7 is incredibly suspicious. I have video that shows how curiously small the rubble pile was, and how the buildings to either side were untouched by Building Seven when it collapsed. It had not been hit by an airplane; it had suffered only minor injuries when the Twin Towers collapsed, and there were only small fires on a couple of floors. There’s no way that building could have imploded the way it did without controlled demolition. Yet the collapse of Building 7 was hardly mentioned by the mainstream media and suspiciously ignored by the 911 Commission. Voltaire Network: Reportedly, the underground levels of WTC7 contained sensitive and undoubtedly compromising archival material. Did you come across any of it? Kurt Sonnenfeld: The Secret Service, the Department of Defense, the Federal Bureau of Investigation, the Internal Revenue Service, the Securities and Exchange Commission and the Office of Emergency Management’s “Crisis Center” occupied huge amounts of space there, spanning several floors of the building. Other federal agencies had offices there as well. After September 11, it was discovered that concealed within Building Seven was the largest clandestine domestic station of the Central Intelligence Agency outside of Washington DC, a base of operations from which to spy on diplomats of the United Nations and to conduct counterterrorism and counterintelligence missions. There was no underground parking level at Seven World Trade Center. And there was no underground vault. Instead, the federal agencies at Building Seven stored their vehicles, documents and evidence in the building of their associates across the street. Beneath the plaza level of US Customs House (Building 6) was a large underground garage, separated off from the rest of the complex’s underground area and guarded under tight security. This was where the various government services parked their bomb-proofed cars and armored limousines, counterfeit taxi cabs and telephone company trucks used for undercover surveillance and covert operations, specialized vans and other vehicles. Also within that secured parking area was access to the sub-level vault of Building 6. When the North Tower fell, the US Customs House (Building 6) was crushed and totally incinerated. Much of the underground levels beneath it were also destroyed. But there were voids. And it was into one of those voids, recently uncovered, that I descended with a special Task Force to investigate. It was there we found the security antechamber to the vault, badly damaged. At the far end of the security office was the wide steel door to the vault, a combination code keypad in the cinderblock wall beside it. But the wall was cracked and partially crumbled, and the door was sprung partially open. So we checked inside with our flashlights. Except for several rows of empty shelves, there was nothing in the vault but dust and debris. It had been emptied. Why was it empty? And when could it have been emptied? Voltaire Network: Is this what set alarm bells ringing for you? Kurt Sonnenfeld: Yes, but not immediately. With so much chaos, it was difficult to think. It was only after digesting everything that the “alarm bells” went off. Building Six was evacuated within twelve minutes after the first airplane struck the North Tower. The streets were immediately clogged with fire trucks, police cars and blocked traffic, and the vault was large enough, 15 meters by 15 meters by my estimate, to necessitate at least a big truck to carry out its contents. And after the towers fell and destroyed most of the parking level, a mission to recover the contents of the vault would have been impossible. The vault had to have been emptied before the attack. I’ve described all of this extensively in my book, and it’s apparent that things of importance were taken out of harm’s way before the attacks. For example, the CIA didn’t seem too concerned about their losses. After the existence of their clandestine office in Building Seven was discovered, an agency spokesman told the newspapers that a special team had been dispatched to scour the rubble in search of secret documents and intelligence reports, though there were millions, if not billions of pages floating in the streets. Nevertheless, the spokesman was confident. “There shouldn’t be too much paper around,” he said. And Customs at first claimed that everything was destroyed. That the heat was so intense that everything in the evidence safe had been baked to ash. But some months later, they announced that they had broken up a huge Colombian narco-trafficking and money-laundering ring after miraculously recovering crucial evidence from the safe, including surveillance photos and heat-sensitive cassette tapes of monitored calls. And when they moved in to their new building at 1 Penn Plaza in Manhattan, they proudly hung on the lobby wall their Commissioner’s Citation Plaque and their big round US Customs Service ensign, also miraculously recovered, in pristine condition, from their crushed and cremated former office building at the World Trade Center. Voltaire Network: You weren’t alone on the Ground Zero assignment. Did the others notice the same anomalies? Do you know whether they have also been harassed? Kurt Sonnenfeld: Actually there were a few people on two different excursions that I know about. Some of us even discussed it afterwards. They know who they are and I hope that they will come forward, but I’m sure they have strong apprehensions as to what will happen to them if they do. I will leave it to them to decide, but there is strength in numbers. Voltaire Network: With the publication of your book, you have become a “whistleblower” – yet another step on which there is no going back! There must be many people with inside knowledge about what really happened or did not happen on that fateful day. Yet, hardly any have stepped up to the plate and certainly no one who was directly involved in an official capacity. This is what makes your case so compelling. Judging from your ordeal, it is not difficult to imagine what is holding such people back. Kurt Sonnenfeld: Actually, there are several other very smart and credible people blowing whistles, too. And they are being discredited and ignored. Some are being harassed and persecuted, as I am. People are gripped by fear. Everybody knows that if you question US authority you will have problems in some way or another. At minimum you will be discredited and dehumanized. Most likely you’ll find yourself indicted for something completely unrelated, like tax evasion — or something even worse, as in my case. Look at what happened to Secret Service whistle-blower Abraham Bolden, for example, or to chess master Bobby Fischer after he showed his disdain for the US. There are countless other examples. In the past I asked friends and associates to speak out for me to counter all the lies being planted in the media, and all of them were terrified as to the ramifications to themselves and their families. Voltaire Network: To what degree would your discoveries at Ground Zero expose the government’s involvement in those events? Are you familiar with the investigations that have been carried out by numerous scientists and qualified professionals which not only corroborate your own findings but, in some instances, far exceed them? Do you regard such people as “conspiracy nuts”? Kurt Sonnenfeld: At the highest levels in Washington, DC, someone knew what was going to happen. They wanted a war so badly that they at least let it happen and most likely even helped it happen. Sometimes it seems to me that the “nuts” are those who hold to what they’ve been told with an almost religious fervor despite all of the evidence to the contrary — the ones who won’t even consider that there was a conspiracy. There are so many anomalies to the “official” investigation that you can’t blame it on oversight or incompetence. I am familiar with the scientists and qualified professionals to whom you refer, and their findings are convincing, credible, and presented according to scientific protocol — in stark contrast to the findings of the “official” investigation. In addition, numerous intelligence agents and government officials have now come forward with their very informed opinions that the 9/11 Commission was a farce at best or a cover-up at worst. My experience at Ground Zero is but one more piece of the puzzle. Voltaire Network: Those events are nearly 8 years behind us. Do you consider that uncovering the truth about 9/11 continues to be an important objective? Kurt Sonnenfeld: It is of absolute importance. And it will be equally as important in 10 years, or even 50 years if the truth still has not been exposed. It is an important objective because, at this point in history, many people are too credulous to whatever “authority” tells them and too willing to follow. People in a state of shock seek guidance. People who are afraid are manipulable. And being able to manipulate the masses results in unimaginable benefits to a lot of very rich and very powerful people. War is incredibly expensive, but the money has to go somewhere. War is very profitable for the very few. And somehow their sons always end up in Washington DC, making the decisions and writing the budgets, while the sons of the poor and the poorly-connected always end up on the enemy lines, taking their orders and fighting their battles. The enormous black-budget of the US Department of Defense represents an unlimited money machine for the military-industrial complex, figuring in the multi-trillions of dollars, and it will continue to be so until the masses wake up, recuperate their skepticism and demand accountability. Wars (and false pretexts for war) will not cease until the people realize the true motive of war and stop believing “official” explanations. Voltaire Network: What is referred to as the 9/11 Truth Movement, has been asking for a new, independent investigation into those events. Do you think that the Obama Administration holds out any hope in this respect? Kurt Sonnenfeld: I really hope so, but I’m skeptical. Why would the leadership of any established government willingly undertake any action that would result in a serious compromise to their authority? They will prefer to maintain the status quo and leave the things the way they are. The conductor of the train has been changed, but has the train changed its course? I doubt it. The push has to come from the public, not only domestically, but internationally, like your group is doing. Voltaire Network: A number of human rights and activist groups are supporting your plight, not least Peace Nobel Prize winner Adolfo Pérez Esquivel. How have the Argentinean people in general responded to your situation? Kurt Sonnenfeld: With an incredible outpouring of support. The military dictatorship is still fresh in the collective memory of most of the people here, along with the knowledge that the dictatorship (along with the other South American dictatorships at the time) was backed by the CIA, directed at the time by George Bush Senior. They remember well the torture centers, the secret prisons, the thousands of people “disappeared” for their opinions, the living in daily fear. They know that the United States today will do the same thing if they consider it beneficial, that they will invade a country to achieve their political and economic interests and then manipulate the media with fabricated “causus belli” to justify their conquests. My family and I are honored to have Adolfo Pérez Esquivel and his advisors at Servicio de Paz y Justicia (SERPAJ) among our dearest friends. We have worked together on many causes, including the rights of refugees, the rights of women, for children without families and children with HIV/AIDS. We are also honored to have the support of the Abuelas de Plaza de Mayo; Madres de Plaza de Mayo, Línea Fundadora; Centro de Estudios Legales y Sociales (CELS); Asamblea Permanente de Derechos Humanos (APDH); Familiares de Detenidos y Desaparecidos por Razones Políticas; Asociación de Mujeres, Migrantes y Refugiados Argentina (AMUMRA); Comisión de Derechos Humanos de la Honorable Cámara de Diputados de la Provincia de Buenos Aires; Secretaría de Derechos Humanos de la Nación; and the Programa Nacional Anti-Impunidad. On an international level, Amicus Curiae have been presented in our favor by REPRIEVE of Great Britain, along with the collaboration of NIZKOR of Spain and Belgium. In addition, my wife, Paula, and I have been received in the Congress by La Comisión de Derechos Humanos y Garantías de la Honorable Cámara de Diputados de La Nación. Kurt Sonnenfeld: I am convinced that my tapes reveal many more anomalies than I am capable of recognizing given my limited qualifications. I will therefore cooperate in any way that I can with serious and reliable experts in a common endeavour to expose the truth.
2019-04-21T10:09:46Z
http://911-questions.com/fema-videographer-reveals-the-truth-of-what-he-saw/
Copyright © 2011 Bieby Voijant Tangahu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Heavy metals are among the most important sorts of contaminant in the environment. Several methods already used to clean up the environment from these kinds of contaminants, but most of them are costly and difficult to get optimum results. Currently, phytoremediation is an effective and affordable technological solution used to extract or remove inactive metals and metal pollutants from contaminated soil and water. This technology is environmental friendly and potentially cost effective. This paper aims to compile some information about heavy metals of arsenic, lead, and mercury (As, Pb, and Hg) sources, effects and their treatment. It also reviews deeply about phytoremediation technology, including the heavy metal uptake mechanisms and several research studies associated about the topics. Additionally, it describes several sources and the effects of As, Pb, and Hg on the environment, the advantages of this kind of technology for reducing them, and also heavy metal uptake mechanisms in phytoremediation technology as well as the factors affecting the uptake mechanisms. Some recommended plants which are commonly used in phytoremediation and their capability to reduce the contaminant are also reported. Heavy metals are among the contaminants in the environment. Beside the natural activities, almost all human activities also have potential contribution to produce heavy metals as side effects. Migration of these contaminants into noncontaminated areas as dust or leachates through the soil and spreading of heavy metals containing sewage sludge are a few examples of events contributing towards contamination of the ecosystems . Several methods are already being used to clean up the environment from these kinds of contaminants, but most of them are costly and far away from their optimum performance. The chemical technologies generate large volumetric sludge and increase the costs ; chemical and thermal methods are both technically difficult and expensive that all of these methods can also degrade the valuable component of soils . Conventionally, remediation of heavy-metal-contaminated soils involves either onsite management or excavation and subsequent disposal to a landfill site. This method of disposal solely shifts the contamination problem elsewhere along with the hazards associated with transportation of contaminated soil and migration of contaminants from landfill into an adjacent environment. Soil washing for removing contaminated soil is an alternative way to excavation and disposal to landfill. This method is very costy and produces a residue rich in heavy metals, which will require further treatment. Moreover, these physio-chemical technologies used for soil remediation render the land usage as a medium for plant growth, as they remove all biological activities . Recent concerns regarding the environmental contamination have initiated the development of appropriate technologies to assess the presence and mobility of metals in soil , water, and wastewater. Presently, phytoremediation has become an effective and affordable technological solution used to extract or remove inactive metals and metal pollutants from contaminated soil. Phytoremediation is the use of plants to clean up a contamination from soils, sediments, and water. This technology is environmental friendly and potentially costeffective. Plants with exceptional metal-accumulating capacity are known as hyperaccumulator plants . Phytoremediation takes the advantage of the unique and selective uptake capabilities of plant root systems, together with the translocation, bioaccumulation, and contaminant degradation abilities of the entire plant body . Many species of plants have been successful in absorbing contaminants such as lead, cadmium, chromium, arsenic, and various radionuclides from soils. One of phytoremediation categories, phytoextraction, can be used to remove heavy metals from soil using its ability to uptake metals which are essential for plant growth (Fe, Mn, Zn, Cu, Mg, Mo, and Ni). Some metals with unknown biological function (Cd, Cr, Pb, Co, Ag, Se, Hg) can also be accumulated . The objectives of this paper are to discuss the potential of phytoremediation technique on treating heavy metal-contaminated side, to provide a brief view about heavy metals uptake mechanisms by plant, to give some description about the performance of several types of plants to uptake heavy metals and to describe about the fate of heavy metals in plant tissue, especially on arsenic (As), lead (Pb), and mercury (Hg). This study is related to a research project that aims to identify potential plants in tropical country such as Malaysia which can uptake heavy metal contaminants from petrochemical wastewater. Heavy metals are conventionally defined as elements with metallic properties and an atomic number >20. The most common heavy metal contaminants are Cd, Cr, Cu, Hg, Pb, and Zn. Metals are natural components in soil . Some of these metals are micronutrients necessary for plant growth, such as Zn, Cu, Mn, Ni, and Co, while others have unknown biological function, such as Cd, Pb, and Hg . Metal pollution has harmful effect on biological systems and does not undergo biodegradation. Toxic heavy metals such as Pb, Co, Cd can be differentiated from other pollutants, since they cannot be biodegraded but can be accumulated in living organisms, thus causing various diseases and disorders even in relatively lower concentrations . Heavy metals, with soil residence times of thousands of years, pose numerous health dangers to higher organisms. They are also known to have effect on plant growth, ground cover and have a negative impact on soil microflora . It is well known that heavy metals cannot be chemically degraded and need to be physically removed or be transformed into nontoxic compounds . Arsenic (atomic number 33) is a silver-grey brittle crystalline solid with atomic weight of 74.9, specific gravity 5.73, melting point 817°C (at 28 atm), boiling point 613°C, and vapor pressure 1 mm Hg at 372°C . Arsenic is a semimetallic element with the chemical symbol “As”. Arsenic is odorless and tasteless. Arsenic can combine with other elements to form inorganic and organic arsenicals . In the environment, arsenic is combined with oxygen, chlorine, and sulfur to form inorganic arsenic compounds. Inorganic arsenic compounds are mainly used to preserve wood. Organic arsenic compounds are used as pesticides, primarily on cotton plants . Arsenic exists in the −3, 0, +3, and +5 valence oxidation states , and in a variety of chemical forms in natural waters and sediments . Environmental forms include arsenious acids (H3AsO3, H3AsO3, ), arsenic acids (H3AsO4, , ), arsenites, arsenates, methylarsenic acid, dimethylarsinic acid, and arsine. Two most common forms in natural waters arsenite ( ) and inorganic arsenate ( ), referred as As3+ and As5+ . From both the biological and the toxicological points of view, arsenic compounds can be classified into three major groups. These groups are inorganic arsenic compounds, organic arsenic compounds, and arsine gas . It is a hard acid and preferentially complexes with oxides and nitrogen. Trivalent arsenites predominate in moderately reducing anaerobic environments such as groundwater . The most common trivalent inorganic arsenic compounds are arsenic trioxide, sodium arsenite, and arsenic trichloride . Trivalent (+3) arsenates include As(OH)3, , AsO2OH2−, and . Arsenite (As(OH)3, As3+) is predominant in reduced redox potential conditions . Arsenic is one of the contaminants found in the environment which is notoriously toxic to man and other living organisms . It is a highly toxic element that exists in various species, and the toxicity of arsenic depends on its species. The pH, redox conditions, surrounding mineral composition, and microbial activities affect the form (inorganic or organic) and the oxidation state of arsenic. It is generally accepted that the inorganic species, arsenite [As3+] and arsenate [As5+], are the predominant species in most environments, although the organic ones might also be present . In general, inorganic compounds of arsenic are regarded as more highly toxic than most organic forms which are less toxic [10, 14, 16, 17]. The trivalent compounds (arsenites) are more toxic than the pentavalent compounds (arsenates) [16, 17]. It has been reported that As3+ is 4 to 10 times more soluble in water than As5+. However, the trivalent methylated arsenic species have been found to be more toxic than inorganic arsenic because they are more efficient at causing DNA breakdown . Although As5+ tends to be less toxic compared to of As3+, it is thermodynamically more stable due to it predominates under normal conditions and becomes the cause of major contaminant in ground water . Arsenate which is in the pentavalent state (As5+) is also considered to be toxic and carcinogenic to human . Lead (Pb), with atomic number 82, atomic weight 207.19, and a specific gravity of 11.34, is a bluish or silvery-grey metal with a melting point of 327.5°C and a boiling point at atmospheric pressure of 1740°C. It has four naturally occurring isotopes with atomic weights 208, 206, 207 and 204 (in decreasing order of abundance). Despite the fact that lead has four electrons on its valence shell, its typical oxidation state is +2 rather than +4, since only two of the four electrons ionize easily. Apart from nitrate, chlorate, and chloride, most of the inorganic salts of lead2+ have poor solubility in water . Lead (Pb) exists in many forms in the natural sources throughout the world and is now one of the most widely and evenly distributed trace metals. Soil and plants can be contaminated by lead from car exhaust, dust, and gases from various industrial sources. Pb2+ was found to be acute toxic to human beings when present in high amounts. Since Pb2+ is not biodegradable, once soil has become contaminated, it remains a long-term source of Pb2+ exposure. Metal pollution has a harmful effect on biological systems and does not undergo biodegradation . Soil can be contaminated with Pb from several other sources such as industrial sites, from leaded fuels, old lead plumbing pipes, or even old orchard sites in production where lead arsenate is used. Lead accumulates in the upper 8 inches of the soil and is highly immobile. Contamination is long-term. Without remedial action, high soil lead levels will never return to normal . In the environment, lead is known to be toxic to plants, animals, and microorganisms. Effects are generally limited to especially contaminated areas . Pb contamination in the environment exists as an insoluble form, and the toxic metals pose serious human health problem, namely, brain damage and retardation . Mercury is a naturally occurring metal that is present in several forms. Metallic mercury is shiny, silver-white, odorless liquid. Mercury combines with other elements, such as chlorine, sulfur, or oxygen, to form inorganic mercury compounds or salts, which are usually white powders or crystals. Mercury also combines with carbon to make organic mercury compounds . Mercury, which has the lowest melting point (−39°C) of all the pure metals, is the only pure metal that is liquid at room temperature. However, due to its several physical and chemical advantages such as its low boiling point (357°C) and easy vaporization, mercury is still an important material in many industrial products . As any other metal, mercury could occur in the soil in various forms. It dissolves as free ion or soluble complex and is nonspecifically adsorbed by binding mainly due to the electrostatic forces, chelated, and precipitated as sulphide, carbonate, hydroxide, and phosphate. There are three soluble forms of Hg in the soil environment. The most reduced is Hg0 metal with the other two forms being ionic of mercurous ion and mercuric ion Hg2+, in oxidizing conditions especially at low pH. Hg+ ion is not stable under environmental conditions since it dismutates into Hg0 and Hg2+. A second potential route for the conversion of mercury in the soil is methylation to methyl or dimethyl mercury by anaerobic bacteria . Mercury is a persistent environmental pollutant with bioaccumulation ability in fish, animals, and human beings . Mercury salts and organomercury compounds are among the most poisonous substances in our environment. The mechanism and extent of toxicity depend strongly on the type of compound and the redox state of mercury . Environmental contamination due to mercury is caused by several industries, petrochemicals, minings, painting, and also by agricultural sources such as fertilizer and fungicidal sprays . Some of the more common sources of mercury found throughout the environment include but may not be limited to the household bleach, acid, and caustic chemicals (e.g., battery acid, household lye, muriatic acid (hydrochloric acid), sodium hydroxide, and sulfuric acid), instrumentation containing mercury (e.g., medical instruments, thermometers, barometers, and manometers), dental amalgam (fillings), latex paint (manufactured prior to 1990), batteries, electric lighting (fluorescent lamps, incandescent wire filaments, mercury vapor lamps, ultraviolet lamps), pesticides, pharmaceuticals (e.g., nasal sprays, cosmetics, contact lens products), household detergents and cleaners, laboratory chemicals, inks and paper coatings, lubrication oils, wiring devices and switches, and textiles. Though mercury use in many of the above items being produced now is restricted or banned, there are still some existing, older products in use . Terrestrial plants are generally insensitive to the harmful effects of mercury compounds; however, mercury is known to affect photosynthesis and oxidative metabolism by interfering with electron transport in chloroplasts and mitochondria. Mercury also inhibits the activity of aquaporins and reduces plant water uptake . Mercury and its compounds are cumulative toxins and in small quantities are hazardous to human health. The major effects of mercury poisoning manifest as neurological and renal disturbances as it can easily pass the blood-brain barrier and has effect on the brain . Phytoremediation techniques have been briefly depicted in many literatures or articles. The generic term “phytoremediation” consists of the Greek prefix phyto (plant), attached to the Latin root remedium (to correct or remove an evil) [28, 29]. Some definitions on phytoremediation that have been described by several researchers are listed in Table 1. Table 1: Definition of phytoremediation. Generally, according to the above researchers, phytoremediation is defined as an emerging technology using selected plants to clean up the contaminated environment from hazardous contaminant to improve the environment quality. Figure 1 depicts the uptake mechanisms of both organics and inorganics contaminants through phytoremediation technology. For organics, it involves phytostabilization, rhizodegradation, rhizofiltration, phytodegradation, and phytovolatilization. These mechanisms related to organic contaminant property are not able to be absorbed into the plant tissue. For inorganics, mechanisms which can be involved are phytostabilization, rhizofiltration, phytoaccumulation and phytovolatilization. Figure 1: Uptake mechanisms on phytoremediation technology. Source: . Based on Figure 1, some certain essential processes involved in phytoremediation technology [29, 31] are phytostabilization and phytoextraction for inorganic contaminants, and phytotransformation/phytodegradation, rhizofiltration, and rhizodegradation for organic contaminants. The root plants exudates to stabilize, demobilize and bind the contaminants in the soil matrix, thereby reducing their bioavailability. These all are called as phytostabilization process. Certain plant species have used to immobilize contaminants in the soil and ground water through absorption and accumulation by roots, adsorption onto roots, or precipitation within the root zone. This process is for organics and metals contaminants in soils, sediments, and sludges medium [29, 31]. Specific plant species can absorb and hyperaccumulate metal contaminants and/or excess nutrients in harvestable root and shoot tissue, from the growth substrate through phytoextraction process. This is for metals, metalloids, radionuclides, nonmetals, and organics contaminants in soils, sediments, and sludges medium [29, 31]. Phytovolatilization process is the plants ability to absorb and subsequently volatilize the contaminant into the atmosphere. This process is for metal contaminants in groundwater, soils, sediments, and sludges medium. Since phytotransformation/phytodegradation process is the breakdown of contaminants taken up by plants through metabolic processes within the plant or the breakdown of contaminants externally to the plant through the effect of compounds produced by the plants. This process is for complex organic molecules that are degraded into simpler molecule contaminants in soils, sediments, sludges, and groundwater medium [29, 31]. Plant roots take up metal contaminants and/or excess nutrients from growth substrates through rhizofiltration (=root) process, the adsorption, or, precipitation onto plant roots or absorption into the roots of contaminants that are in solution surrounding the root zone. This process is for metals, excess nutrients, and radionuclide contaminants in groundwater, surface water, and wastewater medium [29, 31]. The breakdown of contaminants in the soil through microbial activity that is enhanced by the presence of the root zone is called rhizodegradation. This process uses microorganisms to consume and digest organic substances for nutrition and energy. Natural substances released by the plant roots, sugars, alcohols, and acids, contain organic carbon that provides food for soil microorganisms and establish a dense root mass that takes up large quantities of water. This process is for organic substance contaminants in soil medium [29, 31]. Contaminant uptake by plants and its mechanisms have been being explored by several researchers. It could be used to optimize the factors to improve the performance of plant uptake. According to Sinha et al. , the plants act both as “accumulators” and “excluders”. Accumulators survive despite concentrating contaminants in their aerial tissues. They biodegrade or biotransform the contaminants into inert forms in their tissues. The excluders restrict contaminant uptake into their biomass. Plants have evolved highly specific and very efficient mechanisms to obtain essential micronutrients from the environment, even when present at low ppm levels. Plant roots, aided by plant-produced chelating agents and plant-induced pH changes and redox reactions, are able to solubilize and take up micronutrients from very low levels in the soil, even from nearly insoluble precipitates. Plants have also evolved highly specific mechanisms to translocate and store micronutrients. These same mechanisms are also involved in the uptake, translocation, and storage of toxic elements, whose chemical properties simulate those of essential elements. Thus, micronutrient uptake mechanisms are of great interest to phytoremediation . The range of known transport mechanisms or specialized proteins embedded in the plant cell plasma membrane involved in ion uptake and translocation include (1) proton pumps (″-ATPases that consume energy and generate electrochemical gradients), (2) co- and antitransporters (proteins that use the electrochemical gradients generated by ″-ATPases to drive the active uptake of ions), and (3) channels (proteins that facilitate the transport of ions into the cell). Each transport mechanism is likely to take up a range of ions. A basic problem is the interaction of ionic species during uptake of various heavy metal contaminants. After uptake by roots, translocation into shoots is desirable because the harvest of root biomass is generally not feasible. Little is known regarding the forms in which metal ions are transported from the roots to the shoots . Plant uptake-translocation mechanisms are likely to be closely regulated. Plants generally do not accumulate trace elements beyond near-term metabolic needs. And these requirements are small ranging from 10 to 15 ppm of most trace elements suffice for most needs . The exceptions are “hyperaccumulator” plants, which can take up toxic metal ions at levels in the thousands of ppm. Another issue is the form in which toxic metal ions are stored in plants, particularly in hyperaccumulating plants, and how these plants avoid metal toxicity. Multiple mechanisms are involved. Storage in the vacuole appears to be a major one . Water, evaporating from plant leaves, serves as a pump to absorb nutrients and other soil substances into plant roots. This process, termed evapotranspiration, is responsible for moving contamination into the plant shoots as well. Since contamination is translocated from roots to the shoots, which are harvested, contamination is removed while leaving the original soil undisturbed. Some plants that are used in phytoextraction strategies are termed “hyperaccumulators.” They are plants that achieve a shoot-to-root metal-concentration ratio greater than one. Nonaccumulating plants typically have a shoot-to-root ratio considerably less than one. Ideally, hyperaccumulators should thrive in toxic environments, require little maintenance and produce high biomass, although few plants perfectly fulfill these requirements . Metal accumulating plant species can concentrate heavy metals like Cd, Zn, Co, Mn, Ni, and Pb up to 100 or 1000 times those taken up by nonaccumulator (excluder) plants. In most cases, microorganisms bacteria and fungi, living in the rhizosphere closely associated with plants, may contribute to mobilize metal ions, increasing the bioavailable fraction. Their role in eliminating organic contaminants is even more significant than that in case of inorganic compounds [39, 40]. Heavy metal uptake by plant through phytoremediation technologies is using these mechanisms of phytoextraction, phytostabilisation, rhizofiltration, and phytovolatilization as shown in Figure 2. Figure 2: The mechanisms of heavy metals uptake by plant through phytoremediation technology. Phytoextraction is the uptake/absorption and translocation of contaminants by plant roots into the above ground portions of the plants (shoots) that can be harvested and burned gaining energy and recycling the metal from the ash [28, 39–42]. Phytostabilisation is the use of certain plant species to immobilize the contaminants in the soil and groundwater through absorption and accumulation in plant tissues, adsorption onto roots, or precipitation within the root zone preventing their migration in soil, as well as their movement by erosion and deflation [28, 39–42]. Rhizofiltration is the adsorption or precipitation onto plant roots or absorption into and sequesterization in the roots of contaminants that are in solution surrounding the root zone by constructed wetland for cleaning up communal wastewater [28, 39–42]. Phytovolatilization is the uptake and transpiration of a contaminant by a plant, with release of the contaminant or a modified form of the contaminant to the atmosphere from the plant. Phytovolatilization occurs as growing trees and other plants take up water along with the contaminants. Some of these contaminants can pass through the plants to the leaves and volatilize into the atmosphere at comparatively low concentrations [28, 39–42]. Plants also perform an important secondary role in physically stabilizing the soil with their root system, preventing erosion, protecting the soil surface, and reducing the impact of rain. At the same time, plant roots release nutrients that sustain a rich microbial community in the rhizosphere. Bacterial community composition in the rhizosphere is affected by complex interactions between soil type, plant species, and root zone location. Microbial populations are generally higher in the rhizosphere than in the root-free soil. This is due to a symbiotic relationship between soil microorganisms and plants. This symbiotic relationship can enhance some bioremediation processes. Plant roots also may provide surfaces for sorption or precipitation of metal contaminants . In phytoremediation, the root zone is of special interest. The contaminants can be absorbed by the root to be subsequently stored or metabolised by the plant. Degradation of contaminants in the soil by plant enzymes exuded from the roots is another phytoremediation mechanism . For many contaminants, passive uptake via micropores in the root cell walls may be a major route into the root, where degradation can take place . There are several factors which can affect the uptake mechanism of heavy metals, as shown in Figure 3. By having knowledge about these factors, the uptake performance by plant can be greatly improved. Figure 3: Factors which are affecting the uptake mechanisms of heavy metals. Plants species or varieties are screened, and those with superior remediation properties are selected . The uptake of a compound is affected by plant species characteristic . The success of the phytoextraction technique depends upon the identification of suitable plant species that hyperaccumulate heavy metals and produce large amounts of biomass using established crop production and management practices . Agronomical practices are developed to enhance remediation (pH adjustment, addition of chelators, fertilizers) . For example, the amount of lead absorbed by plants is affected by the pH, organic matter, and the phosphorus content of the soil. To reduce lead uptake by plants, the pH of the soil is adjusted with lime to a level of 6.5 to 7.0 . The Root Zone is of special interest in phytoremediation. It can absorb contaminants and store or metabolize it inside the plant tissue. Degradation of contaminants in the soil by plant enzymes exuded from the roots is another phytoremediation mechanism. A morphological adaptation to drought stress is an increase in root diameter and reduced root elongation as a response to less permeability of the dried soil . Vegetative Uptake is affected by the environmental conditions . The temperature affects growth substances and consequently root length. Root structure under field conditions differs from that under greenhouse condition . The success of phytoremediation, more specifically phytoextraction, depends on a contaminant-specific hyperaccumulator . Understanding mass balance analyses and the metabolic fate of pollutants in plants are the keys to proving the applicability of phytoremediation . Metal uptake by plants depends on the bioavailability of the metal in the water phase, which in turn depends on the retention time of the metal, as well as the interaction with other elements and substances in the water. Furthermore, when metals have been bound to the soil, the pH, redox potential, and organic matter content will all affect the tendency of the metal to exist in ionic and plant-available form. Plants will affect the soil through their ability to lower the pH and oxygenate the sediment, which affects the availability of the metals , increasing the bioavailability of heavy metals by the addition of biodegradable physicochemical factors, such as chelating agents and micronutrients . The increase of the uptake of heavy metals by the energy crops can be influenced by increasing the bioavailability of heavy metals through addition of biodegradable physicochemical factors such as chelating agents, and micronutrients, and also by stimulating the heavy-metal-uptake capacity of the microbial community in and around the plant. This faster uptake of heavy metals will result in shorter and, therefore, less expensive remediation periods. However, with the use of synthetic chelating agents, the risk of increased leaching must be taken into account . The use of chelating agents in heavy-metal-contaminated soils could promote leaching of the contaminants into the soil. Since the bioavailability of heavy metals in soils decreases above pH 5.5–6, the use of a chelating agent is warranted, and may be required, in alkaline soils. It was found that exposing plants to EDTA for a longer period (2 weeks) could improve metal translocation in plant tissue as well as the overall phytoextraction performance. The application of a synthetic chelating agent (EDTA) at 5 mmol/kg yielded positive results . Plant roots exude organic acids such as citrate and oxalate, which affect the bioavailability of metals. In chelate-assisted phytoremediation, synthetic chelating agents such as NTA and EDTA are added to enhance the phytoextraction of soil-polluting heavy metals. The presence of a ligand affects the biouptake of heavy metals through the formation of metal-ligand complexes and changes the potential to leach metals below the root zone . Several studies have described the performance of heavy metals uptake by plants. It is reported that phytoremediation technology is an alternative to treat heavy-metal-contaminated side which will be more admitted in order to remediate the environment. Table 2 lists some research done to remediate heavy metals from contaminated soil, while Table 3 lists some research conducted to remediate them from contaminated water and wastewater. Table 2: Phytoremediation study on soil medium. Table 3: Phytoremediation study on water medium (hydroponic). Based on the collected data from the phytoremediation research listed in Tables 2 and 3, the accumulation of heavy metals As, Pb, and Hg in plant tissue is summarized in respective, Figures 4, 5, and 6. Figure 4: As accumulation in plant tissue. Figure 5: Pb accumulation in plant tissue. Figure 6: Hg accumulation in plant tissue. According to Figure 4, the highest accumulation of As in plant tissue (the researchers have not detailed which part it is, but it might be the whole plant) occurs in Pteris vittata L. species. It can reach more than 0.7 mg As/g dry weight of plant. In plant root, the highest accumulation of As is in Populus nigra, which can reach more than 0.2 mg As/g dry weight of plant root. As can be seen in Figure 5, several plants could accumulate Pb in their tissue of more than 50 mg/g dry weight of plant. Among those species are species of Brassica campestris L, Brassica carinata A. Br., Brassica juncea (L.) Czern. and Brassica nigra (L.) Koch that could accumulate more than 100 mg Pb/g dry weight. Figure 6 shows that accumulated Hg in Brassica juncea L. Czern. is much higher than in other species of plants. It could reach more than 1 mg Hg/g dry weight of plant, while the other plants only accumulate less than 0.2 mg Hg/g dry weight. Phytoremediation techniques may also be more publicly acceptable, aesthetically pleasing, and less disruptive than the current techniques of physical and chemical process . Advantages of this technology are its effectiveness in contaminant reduction, low-cost, being applicable for wide range of contaminants, and in overall it is an environmental friendly method. Figure 7 simplifies some advantages of phytoremediation technology. Figure 7: Advantages of phytoremediation technology. The major advantages of the heavy metal adsorption technology by biomass are its effectiveness in reducing the concentration of heavy metal ions to very low levels and the use of inexpensive biosorbent materials . Phytoremediation as possibly the cleanest and cheapest technology can be employed in the remediation of selected hazardous sites . Phytoremediation encompasses a number of different methods that can lead to contaminant degradation . Phytoremediation is a low-cost option and inexpensive approach for remediating environmental media, particularly suited to large sites that have relatively low levels of contamination . This technology has been receiving attention lately as an innovative, cost-effective alternative to the more established treatment methods used at hazardous waste sites . Phytoremediation potentially offers unique, low cost solutions to many currently problems of soil contamination [32, 75]. It is inexpensive (60–80% or even less costly) than conventional physicochemical methods, since it does not require expensive equipment or highly specialized personnel. It is cost-effective for large volumes of water having low concentrations of contaminants and for large areas having low to moderately contaminated surface soils . It is applicable to a wide range of toxic metals and radionuclides and also useful for treating a broad range of environmental contaminants, including organic and inorganic contaminants . Phytoremediation is regarded as a new approach for the cleanup of contaminated soils, water, and ambient air . Phytoremediation research can also contribute to the improvement of poor soils such as those with high aluminum or salt levels . It is applicable to a range of toxic metals and radionuclides, minimal environmental disturbance, elimination of secondary air or water-borne wastes, and public acceptance . Phytoextraction is considered as an environmentaly friendly method to remove metals from contaminated soils in situ. This method can be used in much larger-scale clean-up operations and has been applied for other heavy metals . It is an esthetically pleasing, solar-energy-driven cleanup technology and there is minimal environmental disruption and in situ treatment preserves topsoil. In Situ applications decrease the amount of soil disturbance compared to conventional methods. It can be performed with minimal environmental disturbance with topsoil left in a usable condition and may be reclaimed for agricultural use. The organic pollutants may be degraded to CO2 and H2O, removing environmental toxicity . Phytoremediation can be an alternative to the much harsher remediation technologies of incineration, thermal vaporization, solvent washing, or other soil washing techniques, which essentially destroy the biological component of the soil and can drastically alter its chemical and physical characteristics as well as creating a relatively nonviable solid waste. Phytoremediation actually benefits the soil, leaving an improved, functional soil ecosystem at costs estimated at approximately one-tenth of those currently adopted technologies . It is the most ecological cleanup technology for contaminated soils and is also known as a green technology. Another advantage of phytoremediation is the generation of a recyclable metal-rich plant residue . Phytoremediation could be a viable option to decontaminate heavy-metal-polluted soils, particularly when the biomass produced during the phytoremediation process could be economically valorized in the form of bioenergy. The use of metal-accumulating bioenergy crops might be suitable for this purpose. If soils, contaminated with heavy metals, are phytoremediated with oil crops, biodiesel production from the resulting plant oil could be a viable option to generate bioenergy . In large-scale applications, the potential energy stored can be utilized to generate thermal energy . The success of the phytoextraction technique depends upon the identification of suitable plant species that can hyperaccumulate heavy metals and produce large amounts of biomass using established crop production and management practices . On the other hand, there are certain limitations to phytoremediation system (Figure 8). Among them are being time-consuming method, the amount of produced biomass, the root depth, soil chemistry and the level of contamination, the age of plant, the contaminant concentration, the impacts of contaminated vegetation, and climatic condition. Figure 8: The limitation of phytoremediation technology. Phytoremediation can be a time-consuming process, and it may take at least several growing seasons to clean up a site. The intermediates formed from those organic and inorganic contaminants may be cytotoxic to plants . Phytoremediation is also limited by the growth rate of the plants. More time may be required to phytoremediate a site as compared with other more traditional cleanup technologies. Excavation and disposal or incineration takes weeks to months to accomplish, while phytoextraction or degradation may need several years. Therefore, for sites that pose acute risks for human and other ecological receptors, phytoremediation may not be the remediation technique of choice [29, 46]. Phytoremediation might be best suited for remote areas where human contact is limited or where soil contamination does not require an immediate response . Under the best climatic conditions, with irrigation and fertilization, total biomass productivities can approach 100 t/ha/y. One of the unresolved issues is the tradeoff between toxic element accumulation and productivity. In practice, a maximum harvestable biomass yield of 10 to 20 t/ha/y would be likely, particularly for heavy metal accumulating plants. These values for productivity of biomass and heavy metal content would limit annual toxic element removal capacity between about 10 and 400 kg/ha/y, depending on the pollutant, plant species, climatic and other factors. For a target soil depth of 30 cm (4,000 t/ha), this amounts to an annual reduction from 2.5 to 100 ppm in soil toxic element levels. This is often an acceptable rate of contaminant removal, allowing site remediation over a few years to a couple of decades, particularly where the concentration of the contaminant can be lowered sufficiently to meet regulatory criteria. These values for productivity of biomass and heavy metal content would limit annual toxic element removal capacity between 10 and 400 kg/ha/y, depending on the pollutant, plant species, climatic and other factors . The success of phytoremediation may be limited by factors such as growing time, climate, root depth, soil chemistry, and level of contamination . Root contact is a primary limitation on phytoremediation applicability. Remediation with plants requires that contaminants be in contact with the root zone of the plants. Either the plants must be able to extend roots to the contaminants, or the contaminated media must be moved to be within range of the plants . Restricted to sites with shallow contamination within rooting zone of remediative plants, ground surface at the site may have to be modified to prevent flooding or erosion . Age greatly affects the physiological activity of a plant, especially its roots. Generally, roots of a young plant display greater ability to absorb ions than do those of an old plant when they are similar in size. It is important to use healthy young plants for more efficient plant removal. However, this does not rule out the use of larger older plants whose larger size may compensate for their lower physiological activity as compared to smaller younger plants . High concentrations of contaminants may inhibit plant growth and, thus, may limit application on some sites or some parts of sites. This phytotoxicity could lead to a remedial approach in which high-concentration waste is handled with expensive ex situ techniques that quickly reduce acute risk, while in situ phytoremediation is used over a longer period of time to clean the high volumes of lower contaminant concentrations . A major limitation in the phytoremediation of toxic elements is the maximal level that can be accumulated by plants. Plants with the highest levels of toxic metal contents, known as “hyperaccumulators”, generally exhibit, on a dry weight basis, from about 2000 ppm (0.2%) for more toxic elements (Cd, Pb) to above 2% for the less toxic ones (Zn, Ni, Cu) . Restricted to sites with low contaminant concentrations, the treatment is generally limited to soils at one meter from the surface and groundwater within a few meters of the surface with soil amendments may be required . Some ecological exposure may occur whenever plants are used to interact with contaminants from the soil. The fate of the metals in the biomass is a concern. Although some forms of phytoremediation involve accumulation of metals and require handling of plant material embedded with metals, most plants do not accumulate significant levels of organic contaminants. While metal-accumulating plants will need to be harvested and either recycled or disposed of in compliance with applicable regulations, most phytoremediative plants do not require further treatment or disposal . Harvested plant biomass from phytoextraction may be classified as a hazardous waste, hence, disposal should be proper. Consumption of contaminated plant biomass is a cause of concern; contaminants may still enter the food chain through animals/insects that eat plant material containing contaminants . Climatic or hydrologic conditions may restrict the rate of growth of plants that can be utilized. Introduction of nonnative species may affect biodiversity . Heavy metals uptake, by plants using phytoremediation technology, seems to be a prosperous way to remediate heavy-metals-contaminated environment. It has some advantages compared with other commonly used conventional technologies. Several factors must be considered in order to accomplish a high performance of remediation result. The most important factor is a suitable plant species which can be used to uptake the contaminant. Even the phytoremediation technique seems to be one of the best alternative, it also has some limitations. Prolong research needs to be conducted to minimize this limitation in order to apply this technique effectively. R. R. Hinchman, M. C. Negri, and E. G. Gatliff, “Phytoremediation: using green plants to clean up contaminated soil, groundwater, and wastewater,” Argonne National Laboratory Hinchman, Applied Natural Sciences, Inc, 1995, http://www.treemediation.com/Technical/Phytoremediation_1998.pdf. I. Shtangeeva, J. V.-P. Laiho, H. Kahelin, and G. R. Gobran, “Phytoremediation of metal-contaminated soils. Symposia Papers Presented Before the Division of Environmental Chemistry,” American Chemical Society, Anaheim, Calif, USA, 2004, http://ersdprojects.science.doe.gov/workshop_pdfs/california_2004/p050.pdf. National Ground Water Association, Copyright 2001. Arsenic. What you need to knowhttp://www.ngwa.org/ASSETS/A0DD107452D74B33AE9D5114EE6647ED/Arsenic.pdf. U.S. Department of Health and Human Services, Public Health Service Agency for Toxic Substances and Disease Registry. Division of Toxicology and Environmental Medicine. Arsenic. 2005, http://www.baltimorehealth.org/info/ATSDR%20fact%20sheet.pdf. WHO Regional Office for Europe, Air Quality Guidelines, chapter 6.1, Arsenic, Copenhagen, Denmark, 2nd edition, 2000, http://www.euro.who.int/document/aiq/6_1_arsenic.pdf. WHO Regional Office for Europe, Air Quality Guidelines, chapter 6.7, Lead, Copenhagen, Denmark, 2nd edition, 2001, http://www.euro.who.int/document/aiq/6_7lead.pdf. J. H. Traunfeld and D. L. Clement, “Lead in Garden Soils. Home and Garden,” Maryland Cooperative Extention, University of Maryland, 2001, http://www.hgic.umd.edu/_media/documents/hg18.pdf. European Commission DG ENV. E3. Heavy Metals in Waste, Final Report Project ENV.E.3/ETU/2000/0058, 2002http://ec.europa.eu/environment/waste/studies/pdf/heavy_metalsreport.pdf. J. F. Musselman and QEP, “Sources of Mercury in Wastewater, Pretreatment corner,” http://www.cet-inc.com/cmsdocuments//7%20-%20Sources%20of%20Mercury%20in%20Wastewater%20(0204).pdf. I. Wagner-Döbler, “Microbiological treatment of mercury-loaded waste water—the biological mercury-decontamination-system. German Research Centre for Biotechnology,” http://www.gbf.de/mercury_remediation1/pdf-documents/Information%20leaflet.PDF. U. S. Environmental Protection Agency, “Introduction to Phytoremediation,” National Risk Management Research Laboratory, EPA/600/R-99/107, 2000, http://www.clu-in.org/download/remed/introphyto.pdf. Interstate Technology and Regulatory Council, Phytotechnology Technical and Regulatory. Guidance and Decision Trees, 2009, http://www.itrcweb.org/guidancedocument.asp?TID=63. U. S. Department of Energy, “Plume Focus Area, December. Mechanisms of plant uptake, translocation, and storage of toxic elements. Summary Report of a workshop on phytoremediation research needs,” 1994, http://www.osti.gov/bridge/purl.cover.jsp;jsessionid=D72C8DD9003DCF51984EE254A6ED8BCB?purl=/10109412-BckU4U/webviewable/. L. Erdei, G. Mezôsi, I. Mécs, I. Vass, F. Fôglein, and L. Bulik, “Phytoremediation as a program for decontamination of heavy-metal polluted environment,” in Proceedings of the 8th Hungarian Congress on Plant Physiology and the 6th Hungarian Conference on Photosynthesis, 2005. U. S. Environmental Protection Agency, Use of Field-Scale Phytotechnology, for Chlorinated Solvents, Metals, Explosives, and Propellants, and Pesticides Phytotechnology Mechanisms. Solid Waste and Emergency Response (5102G), EPA 542-R-05-002, 2005, http://www.clu-in.org/download/remed/542-r-05-002.pdf. V. M. Ibeanusi, “Denise Antonia Grab In collaboration with Larry, Jensen Stephen Ostrodka—Environmental Protection Agency. Radionuclide Biological Remediation Resource Guide, U. S. Environmental Protection Agency,” 2004, http://www.clu-in.org/download/remed/905b04001.pdf. A. Murányi and L. Ködöböcz, “Heavy metal uptake by plants in different phytoremediation treatments,” in Proceedings of the 7th Alps-Adria Scientific Workshop, Stara Lesna, Slovakia, 2008, http://www.mokkka.hu/publications/0387.117_MOKKA_AM_LK.pdf. US Department of Energy, “Plume Focus Area. Summary Report of a Workshop on Phytoremediation Research Needs, Office of Technology Development, Office of Environmental Management and Division of Energy Biosciences, Office of Basic Energy Sciences, Office of Energy Research,” 1994, http://www.law.csuohio.edu/lawlibrary-oldsite/info_services/acquisitions/acq-0104.html.
2019-04-21T18:51:43Z
https://www.hindawi.com/journals/ijce/2011/939161/
Mr. President, this evening the Senate unanimously passed a piece of legislation which we call the America COMPETES Act. Earlier today, the House of Representatives passed it by a vote of 367 to 57. So anyone watching the work of the U.S. Congress must think: Well, that must either be not very important or not very hard to do. Nothing could be further from the truth. I would suggest that the America COMPETES Act will be as important as any piece of legislation the Congress passes in this session, and it has taken as much work as any piece of legislation that has been passed in this session. I would like to spend a few minutes acknowledging the work and describing the importance of the bill, but I think the first thing to do is to say actually what the bill does. The point of the America COMPETES Act is very simple. It helps America keep its brainpower advantage so we can keep our jobs from going overseas to China and India and other countries. The Presiding Officer is from a State that has benefitted greatly from America's brainpower advantage. There is a great deal of higher education and research in his State, and, as a result of that, a number of jobs. I have been in the Edison Museum in New Jersey, which is a good reminder of exactly what we are talking about. Thomas Edison used to say he failed 10,000 times until he succeeded once. That one success was the lightbulb, and then a number of other inventions, which created millions of jobs in the United States. The United States, this year, is producing about a third of all the money in the world. The International Monetary Fund says that almost 30 percent of all the wealth in the world is produced in our country, measured in terms of gross domestic product, for just 5 percent of the world's population. That is how many Americans there are. So imagine if you are living in China or India or Ireland or any country in the world, and you are looking at the United States. It is not so hard to look at other countries today with the Internet and travel and television the way they are. Someone in one of those countries could say: How can those Americans be producing 30 percent of all the wealth for themselves when they are only 5 percent of the world's population? They have the same brains everybody else does. They cannot work any harder than anybody else does. What is it? There are a variety of advantages we have in this country. But most people who look at this country, since World War II, believe our standard of living, our family incomes, our great wealth comes primarily from our technological advances, from the fact that it has been in this country that the automobile, the electric lightbulb, the television set, the Internet, Google have been invented. Or the pharmaceutical drugs that help cure disease all over the world, they also have come mostly from this country. It is that innovation that has given us our standard of living and given the rest of the world a high standard of living. That brainpower advantage we have is located in some pretty obvious places. One place, of course, is our system of higher education, the great university system. We not only have many of the best universities in the world, we have almost all of them. Another place is in the great National Laboratories, from Oak Ridge National Laboratory to Los Alamos and across our country. Another is in the great corporations of America where research is done -- whether it is in pharmaceuticals or whether it is in agriculture. Those great engines of research and innovation and the entrepreneurial spirit and free market that we have have given us this great advantage. We, therefore, talk a lot about progrowth policies. What causes our economy to grow? We, on this side -- we Republicans -- talk a lot about low taxes. I believe that is important and vote that way. When I was Governor of Tennessee, we had the lowest tax rates in the country. But I found very quickly that low taxes by themselves do not create a high standard of living because we had the lowest taxes in our State but we also were the third poorest State. I also found that better schools and better research were the keys to better jobs. That is what this bill is about. So as a result of the America COMPETES Act, over the next few years, we will have done something pretty remarkable. We asked the National Academy of Sciences, the National Academy of Engineering, the Institute of Medicine, as well as other business leaders in our country, exactly what it would take to keep our brainpower advantage, and they have told us, and tonight we have done it. All that has to happen now is for the President of the United States to sign it, and I feel confident he will. I hope what he does is sign it and take credit for a lot of it, because in his State of the Union Address President Bush emphasized the importance of this and talked about his American Competitiveness Initiative 2 years ago. But this is what we have done. We have authorized the spending, over the next 3 years, of $43 billion to help keep our brainpower advantage by investing in science and technology. Most of that -- and this was a part of the President's recommendation -- helps to grow research at our major scientific laboratories and Departments by doubling their research budgets over a 7-year term. That would be the National Science Foundation, the National Institute of Standards and Technology, and the Department of Energy Office of Science, which among other things, supervises the great National Laboratories in our country. As I said, the act authorizes a total of $43.3 billion, over the next 3 fiscal years, for science, technology, engineering, and mathematics research and education programs across the Federal Government. It will help to prepare thousands of new teachers and provide current teachers with content and teaching skills in their area of education. It will establish an advanced research projects agency for energy -- a nimble and semi-autonomous research agency at the Department of Energy -- to engage in high-risk, high-reward energy research. This is modeled after what we call DARPA at the Department of Defense which produced stealth technology and the Internet. Perhaps we can do the same as we look for new energy technologies. It expands programs at the National Science Foundation to enhance the undergraduate education of our future science and engineering workforce, including at our community colleges. There are many provisions in the bill to broaden participation in science and engineering fields at all levels. There are new competitive grant programs to enable partnerships to implement courses of study in math, science, engineering, technology, and critical foreign languages. There are competitive grants to increase the number of math and science teachers serving high-need schools. The bill expands access to advanced placement courses and international baccalaureate courses by increasing the number of qualified teachers in high-need schools. In other words, in plain English, it will help more children, including those who come from families with less money, have a chance to take the advanced placement courses that will give them a route into college, high achievement, and the ability to produce jobs not just for themselves but for the rest of us. It expands early-career research grant programs. It strengthens interagency planning for research infrastructure. It does all of this. Now, one might say: Where did all these ideas come from? Did the Senator from New Jersey just wander in one day and say, "I have a great idea. Let's stick it in"? Or did the Senator from Arkansas say, "Well, we have a little program over at Little Rock that we all like, so let's have some money for it?” Or did the Senator from Tennessee say, "I was down at the Oak Ridge National Laboratory yesterday, and someone gave me an idea, so let's have $10 million for that?” That is not the way we did it. What we did is, 2 years ago, Senator Bingaman and I, and Representatives Bart Gordon and Sherwood Boehlert of the House of Representatives -- two Democrats and two Republicans -- we literally went to the National Academy of Sciences and we asked this question: Tell us exactly what we need to do to keep our brainpower advantage, to keep our jobs from going to China and India? And they took us seriously. The National Academy of Sciences and the National Academy of Engineering and the Institute of Medicine appointed a distinguished committee of 21 Americans chaired by Norm Augustine, the former Chairman and CEO of Lockheed Martin and a member of the National Academy of Engineering. On that committee were some of America's most distinguished business leaders, three Nobel laureates, the president emeritus of MIT, teachers, and others, who gave up their summer, reviewed hundreds of proposals, and, in priority order, told us the 20 things we needed to do to keep our brainpower advantage. All of that was presented to us in a booklet called "Rising Above the Gathering Storm," which is now well-known at universities, in schools, and in the business community as a wakeup call for the United States of America. It says we have been good -- in fact, we have been way ahead of the rest of the line -- but if we do not watch out, China, India, Ireland, England, and many of the other countries in the world, are going to catch up with us because there is no preordained right for Americans -- no matter how bright we think we might be -- to produce 30 percent of the world's wealth for just 5 percent of the people. Other people can do the very same thing in their colleges and universities, if they wish. The members of this commission had countless stories to tell that every American who confronts these issues will find. Every Senator who travels to China sees they have recruited a distinguished professor of Chinese descent at an Ivy League university to come home and help improve a Chinese university. That is happening all over the world, and it is creating a much more competitive environment. Last summer, Senator Inouye and Senator Stevens led a delegation of Senators to China. We were very well received because Senator Stevens was the first to fly a cargo plane into Beijing in 1944 at the end of World War II. He was flying with the Flying Tigers. Senator Inouye, of course, was a Congressional Medal of Honor winner in World War II. The Chinese remember well their affection for Americans in that war. So we were treated well and got to see President Hu, and the No. 2 man, Mr. Wu, the Chairman of the National People’s Congress, for an hour each. These were interviews that many American delegations had not had before. What was interesting to me was that in those sessions with the No. 1 and No. 2 man in China, where our conversations ranged from Iraq to Iran to North Korea to Taiwan, all the issues one might expect, the issue that animated the leaders of China the most was their efforts over the next 15 years to create an innovation economy. They wanted to talk about how China caught up with America's brain power advantage because they know their skills, they know they are good, they know they can do it and they did it in their way. The month before, President Hu had walked over to the Great Hall of the People and assembled their National Academies of Science and Engineering and said: We are going on a 15-year innovation plan. We are going to invest 4 percent of our gross domestic product in research and technology. We are going to improve our colleges and our universities and our schools. We are going to create a brain power advantage for China that gives us a higher standard of living. They understand that. We did it a little different way. Two years ago, we walked down to our National Academy of Sciences. We invited them to give us this report, "Rising Above the Gathering Storm". We took the recommendations of the Council on Competitiveness which was already working. The President of the United States gave his recommendations in his American Competitiveness Initiative. And then we went to work in the American way. We don't announce 15-year plans here; our way is a little messier. So we had to go through three committees here in the Senate and two in the House of Representatives. I have to thank the senior Members of this body for the attitude they took toward this. For example, Senators Stevens and Inouye, Senators Kennedy and Enzi, Senators Domenici and Bingaman, Democrats and Republicans who put aside 3,000 years of seniority and 200 jurisdictional prerogatives and said: Let's just work together and see if we can get this done across party lines. That is not very interesting to people across the country, all this inside baseball about how the Senate works. But it has to work in order for something such as this to happen. It is not a simple thing to take the recommendations of the National Academy of Sciences and actually do them in both bodies, and yet that is what we have done. Not only did we start 2 years ago, when this was a Republican Congress, but we passed this legislation during a Democratic Congress almost without missing a step. What happened was a bill that was sponsored by the leaders -- last time it was Frist and Reid; now it is Reid and McConnell. They just changed the names because we had worked so well together -- not only with ourselves but also with the Bush administration -- that it was hard to tell whose bill it was. At one time, this legislation that Senator Domenici and Senator Bingaman first introduced had 35 Republican cosponsors and 35 Democratic cosponsors, and the Speaker of the House Nancy Pelosi, when she was the Democratic leader, was one of the first out to support it. It is especially gratifying to me that Tennesseans, if I may say so, have taken such a role in it in the House of Representatives. Representative Bart Gordon, who is now chairman of the Science Committee, was the lead conferee on this piece of legislation. Representative Zach Wamp, who represents the Oak Ridge National Laboratory, gave I thought the best speech on the House floor today on the Republican side. So again, it was bipartisan. Mr. President, I ask unanimous consent to have printed in the Record at the end of my remarks an overview of the conference report we passed. I mentioned a number of the Senators who had been so deeply involved in this. I mentioned the committee chairmen and the ranking members. But I would like to especially acknowledge the work of Senator John Ensign of Nevada, who was especially effective in reminding Republicans that investments in research and technology and science is as progrowth as tax cuts. Senator Ensign was powerful on that subject. I believe it as strongly as he does. I believe he was more effective than I was. Senator Hutchison had been working with Senator Bingaman for years on advanced placement courses. Senator Mikulski was out front from the very beginning on this. There is an enormous list of Senators who made this happen. There is also a long list of Democratic and Republican staff members who deserve thanks. The list is too long for me to read all those names tonight, but I ask unanimous consent that this list of staff members be printed in the Record following my remarks, with the thanks of all of us for their work. I would like to especially thank Matt Sonnesyn who is sitting here beside me. When I was permitted to be on the faculty of the Kennedy School of Government at Harvard at the time when the Senator from Arkansas's father was the Director of the Institute of Politics, Matt Sonnesyn was my course assistant. He came with me to my campaign, and then he came with me to the Senate. For the last 2 years, he has worked on this legislation with Senator Bingaman's staff and Senator Ensign's staff on this side -- a tremendously effective staff group who has made this bill possible. I see the Senator from Arkansas here, and I know he is going to close out in a few minutes, and I think I am coming toward the end of my remarks. I would like to conclude by emphasizing two points -- one about substance and one about process. I know the Senator from Arkansas and I have talked about this often. We are working together right now on a bipartisan project that has to do with the Iraq war. We believe there shouldn't be any partisan votes on the Iraq war. For example, we, Senator Salazar and I, are joined by 6 Republicans and 7 Democrats in cosponsoring legislation that would make the bipartisan Iraq Study Group the law of our country. If the Congress and the President would agree on this bill, we could send to our enemy and our troops and the world the message that as we go forward to wherever we go next in Iraq, we go together; we are united. Each Tuesday we have a breakfast that Senator Lieberman and I host -- no staff, no media, no policy positions adopted -- so that in the midst of all our team meetings among Republicans and Democrats, when we talk about what to do to each other, we can have a session where we build relationships and talk about how we move the country ahead. We have had as many as 40 Senators at those breakfasts. It is important for the people of this country to know that we spend a lot of time working that way. We did tonight on the Children's Health Insurance bill with Senator Baucus and Senator Grassley working together in a bipartisan way. For 2 years, we have done that on legislation that goes straight to the heart of how we keep our jobs from going to China and India, which is what we passed tonight. So the word I wish to say about process is that when the Senate tries and when we focus on big issues, we are perfectly capable of acting the way the rest of the country would hope we would act. We compromise on our differences and come up with a result that benefits family after family. This legislation, the America COMPETES Act, will mean, for example, in my home State of Tennessee, opportunities for hundreds of math and science teachers and for thousands of students to go to summer academies and institutes of math and science. It will mean opportunities for thousands of students who now can't afford to take advanced placement courses in science and technology to be able to do so and for hundreds of teachers who aren't trained to teach those courses to have that training. It will mean distinguished scientists will hold joint appointments at the University of Tennessee and Oak Ridge National Laboratory, for example. It will mean support for a residential high school for science and math, which we have wanted to do in our State ever since I was Governor 20 years ago but didn't feel like we had the money. Now other States have it, and this bill provides some support for such a school. It will mean a steady growth over 7 years in research funding, new support for early-career research grants in science and technology, and more support for all those kinds of studies that create the jobs that will keep our standard of living. That is what it means for my State. It means the same for New Jersey, and it means the same for Arkansas. So that bipartisan consensus we have seen here happens more often than most Americans know, but it doesn't happen as often as it should. So this has been a privilege for me to work, especially with Senator Bingaman and Senator Domenici on the committee that I was a part of, to help get this started with Bart Gordon, my colleague from the House, the Democratic Congressman who is chairman of the Science Committee, and with all the other Senators. This is the kind of thing I hoped to do when I came to the Senate. I think each of us hopes when we come here to get up every day and do a little something constructive and then go home at night and come back the next day and see if we can find something more to do along that way. If all of us participate in that way in other big issues, as we have in this, the America COMPETES bill, the Senate will be a stronger institution and the country will be a better country. So I thank my colleagues for their support and for the time tonight. I thank the Senator from Arkansas for staying late so I can make these remarks. This legislation, the America COMPETES Act which passed the House today overwhelmingly and passed the Senate unanimously, is at least as important as any piece of legislation that passes in these 2 years because we have accepted the advice of the wisest men and women in our country about what we ought to do to keep our brain power advantage so we can keep our jobs. The President has done a big part of it. I am sure he will sign it. I hope he takes some credit because he deserves it. There is plenty of credit to go around. I think the country will be glad we acted.
2019-04-21T12:31:36Z
https://www.alexander.senate.gov/public/index.cfm/speechesfloorstatements?ContentRecord_id=9692D344-F23D-4A21-8076-AE3F72E8410E
The Opera browser has created a very interesting (and disturbing) promotional video they call Escape. The theme is a science fictional world and focuses on us taking control. As an ad, it's interesting as Opera is only overtly mentioned at the end. However circles - Opera's logo - appear throughout, as an almost subliminal reminder that Opera takes a different approach to Google's Chrome for browsing. The move makes LinkedIn more Facebook like but also is a real plus in making #LinkedIn an even better business #SocialMedia platform. Google Adds Two New Syntax for Date Search? Many years ago - before Microsoft acquired LinkedIn - Linkedin offered lots of search operators making advanced searching easy. Sadly these disappeared and now searching LinkedIn requires lots of tricks to get the best out of the database. Making things even harder, many search options are only available to premium members who pay for access to advanced options. Nevertheless there are a number of mostly undocumented operators that allow searchers to find more. BooleanStrings has created a tip sheet giving mostly undocumented or lesser known operators that can really help for advanced LinkedIn searching. LinkedIn is an invaluable tool for uncovering intelligence on individuals business life. Whether for #CompetitiveIntelligence or #OSINT, knowing how to get the best out of #LinkedIn is crucial. There are lots of tricks - many of which I've taught in AWARE's Open Source Intelligence workshops (e.g. buff.ly/2Tk5025). Bellingcat has recently brought out an excellent guide for investigators covering lots of tricks for getting more out of Linkedin - from undocumented / hidden operators to using Google to find out more. They also warn about fake profiles (although not my personal favourites at buff.ly/2TqdR29, buff.ly/2TkOjDD, buff.ly/2YfQITJ and a few others that are similar). In recent years disruption has become the battle cry of business. Disruption occurs when an innovation creates a new market and business model that cause established players to fall. We love the ease of taking, sharing, and storing digital photographs — a disruption that led to the demise of both Kodak and the once ubiquitous film market. Millions of us benefit from Uber’s driver-on-demand service, even as it displaces existing taxi companies. But is this the only way to grow? Another approach is what authors of Blue Ocean Shift, W. Chan Kim and Renée Mauborgne, call nondisruptive creation. This offers a new way of thinking about what’s possible. It highlights the immense potential for creating new markets where none existed before. This is creation without disruption or destruction. All the demand generated by this kind of innovation is new. Most companies remain stuck in the mindset that in order to create you must disrupt or destroy. Nondisruptive creation breaks the existing frame on innovation and growth and allows for a much broader view of how they are generated. It expands the conversation about where real opportunities reside. It’s time to embrace the idea that companies can create without destroying. One of my favourite blogs is the Farnam Street blog - and the latest post is an example of why I like it. It's an explanation on why diversity is so important - and should be encouraged. Although not mentioned, it explains how the USA became the global power that it is, and why Israel looks like bing the 4th country (and smallest) to land a spacecraft on the moon. When a society encourages a diversity of opinions you get creativity. Creativity is not just needed for the arts but for all life and to solve all problems. The blog starts off with a question: what should mankind do if a large meteor was spotted heading directly for the Earth, that would wipe out life in the same way that a meteor ended the large dinosaurs 65 million years ago? Would it be wise to select only a handful of people from a single organisation to solve the problem or should as many ideas as possible be encouraged. The answer is that mankind is unlikely to be saved if only one or two people look at the problem. It needs a range of ideas and a process to evaluate them to select the best ones. "Diversity is necessary in the workplace to generate creativity and innovation. It’s also necessary to get the job done. Teams with members from different backgrounds can attack problems from all angles and identify more possible solutions than teams whose members think alike. Companies also need diverse skills and knowledge to keep a company functioning. Finance superstars may not be the same people who will rock marketing. And the faster things change, the more valuable diversity becomes for allowing us to adapt and seize opportunity." This also applies in biology. A monoculture is less likely to survive as it becomes more susceptible to disease that will wipe it out. Organisms need diversity so that they have the resilience to survive whatever happens. Some may die but the species will continue. The strike on the Internet Research Agency (IRA) in St. Petersburg was part of the first offensive cyber-campaign against Russia designed to thwart attempts to interfere with a U.S. election. The defensive operation took the IRA offline and marked the first real demonstration of preventative actions to protect US democracy. A Forbes essay (buff.ly/2tDLjb6) quotes David Seuss of Northern Light as suggesting their new product offers an AI alternative to search. Northern Light was, pre-Google, a major search engine. I was a fan and it offered something different. It was then acquired & the new owner destroyed it. (This has happened to other search engines too). Seuss bought it back but if Forbes is correct, he seriously misunderstands the risks of letting AI find information based on knowledge of the user. All this will do is increase the biases we see already where the average user lives in a "filter bubble" ignoring information that is contrary to what they believe. Amazingly the one area of technology central to our lives — search — has has not evolved to keep up with the times. Until now. With the help of machine learning, a day may be coming in which computers will do our searching for us, informing us what we need to know. By redesigning their business model to stay as relevant to kids today as it was in the past. 1) They got rid of LEGO branded products and decided to focus solely on their core value propositions the LEGO Bricks. They sold their four theme parks, as well as their video game development division. 2) Long thought of as a boy's toy, they doubled the size of their market by designing sets for little girls who rave about them. Want to learn how the world most successful companies redesign their business model? Get hands-on with Alexander Osterwalder during a rare, two-day workshop, where he will help you go deeper into the methodology and learn by listening, doing and interacting. Just Click the link below and join our unique two days event, where we will help you apply the methodology to your own business. NATO Group Catfished Soldiers to Prove a Point About Privacy. NATO's Strategic Communications Centre of Excellence tested whether they could manipulate soldiers into divulging intel about a large-scale military exercise. Stage 1 was to uncover as much information as possible using #OSINT - Open Source Data - including participants. Stage 2 was to see if this could be used to influence participant behaviours - including setting up fake Facebook profiles. The answer was that it was possible to influence behaviour and gather intel - and the cost was trivial. Although the article does not mention it, it is known that malicious third parties have tried to use social media to influence serving soldiers. Seven months ago it was reported that Hamas had set up fake social media profiles to entrap Israeli soldiers - using sports data, dating apps and similar. This shows that the NATO experiment is important in proving how even those supposed to know the risks still can get caught. With $60 and a few fake Facebook accounts, researchers were able to identify service members in a military exercise, track their movement, and even persuade them to disobey orders. Giving a presentation or telling a story are similar. They both need planning but more than this, they need to motivate so those listening change. This is how many tell stories - or give presentations. I'll be leading a workshop at the AIIP 2019 conference in Philadelphia on Thursday 11 April. While Kodak is struggling; Fujifilm, its old rival, is thriving. Once rated as one of the world's five most valuable brands. Today Kodak's revenues are only $1.5 billion per year, down from $15.97 billion in 1997. Kodak was so blinded by its success that it completely missed the rise of digital photography technology and almost went out of business because of it. They focused only on R&D, which was insufficient for them to invent a profitable future for themselves. Fujifilm, on the other hand, while reaping profits from film sales, invested into new growth engines and opportunities that helped diversify and grow their business. For example, Film is a bit like skin: both contain collagen. The same antioxidant research required to prevent color fading due to UV light can be applied to skin—to prevent the aging of the skin. So they launched a line of cosmetics, called Astalift. Today less than 15% of Fujifilm's revenues come from photography. Want to learn how to avoid a Kodak moment, all while exploring new value propositions and business models? Get hands-on with Alexander Osterwalder during a rare, two-day workshop, where he will help you go deeper into the methodology behind successes like Nespresso and Zappos' and learn by listening, doing and interacting. Just click the link below and join our unique two-day event, where we will help you apply this methodology to your own business. Crowdsourcing images give police the edge for catching criminals. A great list of #OSINT tools / techniques / tips. We’ve trained 100s of analysts with our open source intelligence course and now we're sharing the ultimate list of OSINT tools, techniques and websites available online. Both Strategic Foresight & #CompetitiveIntelligence are needed - but is there a difference. Does effective #CI lead to strategic foresight or does it work the other way around? MI6 launches ads on YouTube to recruit new generation of spies - debunking the James Bond stereotype to show that #intelligence is about people and not ejector seats in fast cars. Identifying fraud through the font usage. When researching #fraud the writing style, signature, logos used and much more can be clues. An often overlooked element is the font used in the forged document. In Canada recently a fraudster got found out by preparing fraudulent documents using Microsoft's Calibri font, and dating the documents for a time before this font came into use. Checking the fonts on a PDF document or actual document can give a clue to when it was actually typed - allowing a document to be dated. There are often other clues too. I frequently look for a 4-point type (or smaller) date indicator on brochures commonly used by companies to date such documents. Most would usually miss such clues - but in an investigation they can be crucial in creating a timeline. Will these people never learn? Recently a highly disturbing video emerged of an atrocity - where armed soldiers executed two blindfolded women with their children. BBC Africa investigated to find out where the murders took place and by whom. The initial suspicion that it was Cameroonian soldiers was denied by the Cameroon government. Multi-faceted #OSINT research looking at background details in the video allowed the identification of precise location and approximate date and time and then the individuals responsible who are now about to go on trial. SIGINT (Signals Intelligence) and OSINT (Open Source Intelligence) are entering a new position within the public sphere in 2019. How it happens, why and how to stop it. For some #OSINT investigations it's better to stay hidden. Here is how - and knowing how can help spot fake profiles too. Stupidity is overlooking or dismissing conspicuously crucial information. Crucial information is information that you need to pay attention to - that is conspicuous i.e. right in front of you. Yet you overlook it or dismiss it. That is stupid! 1) Peer pressure. You don't want to stand out as different. 2) You are outside your comfort-zone so unfamiliar with your surroundings or the environment (or it's changed) so may focus on the wrong thing. 4) You are in a hurry - so ignore the new information as it will get in the way of what you are rushing for. (You think you are late for a meeting... your phone beeps with a text message saying the meeting is cancelled. Yet as you are in a rush, you ignore reading the message and hurry to the meeting. When you get there to find nobody else is, you check your messages and then you feel really stupid! Especially if the journey was time-consuming). 5) You are really busy so cannot give this crucial information the respect or time it deserves - and so you dismiss it, even when it should be the priority. Perhaps, you need to focus on something else - so only give this crucial information a tangential look and dismiss it. 6) You have too much information so cannot prioritise properly and so miss the crucial information. 7) You are physically or emotionally tired and so make sleep your priority even when it shouldn't be. (Essentially you give up. A predator is about to pounce and although you should run, tiredness prevents it and so you sacrifice yourself, perhaps hoping the predator is also tired. It's why predators chase their prey - they aim to exhaust the prey so they can get dinner). Stupidity is overlooking or dismissing conspicuously crucial information. Here are seven situational factors that compromise your cognitive ability and result in increased odds of stupidity. Let’s take a look at some essential OSINT resources plus recent developments in the areas of data, tooling, content and community. 5 Lessons for Reporting in an Age of Disinformation. Over six months in late 2017 and early 2018, Facebook detected and suspended some 1.3 billion fake accounts. But an estimated 3 to 4 percent of accounts that remain, or approximately 66 million to 88 million profiles, are also fake but haven’t yet been detected. Likewise, estimates are that 9 to 15 percent of Twitter’s 336 million accounts are fake. Phony profiles for nonexistent people worm their way into the social networks of real people, where they can spread their falsehoods. But neither social media companies nor technological innovations offer reliable ways to identify and remove social media profiles that don’t represent actual authentic people. • In December 2017, German intelligence officials warned that Chinese agents using fake LinkedIn profiles were targeting more than 10,000 German government employees. • In mid-August, the Israeli military reported that Hamas was using fake profiles on Facebook, Instagram, and WhatsApp to entrap Israeli soldiers into downloading malicious software. Although social media companies have begun hiring more people and using artificial intelligence to detect fake profiles, that won’t be enough to review every profile in time to stop their misuse. The problem isn’t actually that people – and algorithms – create fake profiles online. What’s really wrong is that other people fall for them. The first step in online propaganda and misinformation campaigns is a fake social media profile. According to this study, people are too trusting online. I don't normally share items like this - I try and post opinions and news that can help improve marketing. A case study on corporate #espionage. #OSINT #Humint. Research & Critical Thinking in a Post-Fact World. A lecture by Dr Dan Russel of Google on what is truth, what is reality and how do we know what is credible or not. Some fabulous examples - including fake information from the Library of Congress, and how we aren't teaching critical thinking properly (plus tips on search and more). This MIT SMR executive guide introduces business leaders to the technologies that are reshaping our world. NonPetya was a computer virus, targeting the Ukraine, which spread globally & caused $millions damage. Unlike other computer viruses, the aim was not ransomware but destruction. Without backups everything was lost. The article gives a case study of a major shipping company that thought it had backups but missed out on a key system they thought was safe. They recovered - through luck - as one node only had not been infected. Crippled ports. Paralyzed corporations. Frozen government agencies. How a single piece of code crashed the world. Going extinct: why corporate giants die - and how to stay alive. In the mid-1920s the average lifespan of a top corporation was 90 years. In the 1950s it was 60 years. Today it is 17 years - as corporations die young. There are 4 stages in the lifespan of a corporation - from start-up to eventual death. Preventing death comes from cultivating mavericks who mirror the company founders. Corporate cultures are insular. Mavericks are unpredictable and zany. They don’t play it safe: They are the backbone of innovation - not the "Chief Innovation Officer" responsible for coming up with tired-done-it-before-plans.. Focusing on What 90% of Businesses Do Now Is a Big Mistake. Just because most competitors do things in a certain way is not a good reason for you to. Not so many years ago, 90% of lighting came from candles. Not so many years ago, 90% of land transportation involved horses. Only 15-20 years ago, almost all photographs had to be "developed" from camera film and the idea you could take photographs on your phone was not even imagined by over 90% of people. It’s not smart to base any part of your strategy on what you see in the rear-view mirror. Whether you agree or disagree some of these are truly memorable (or infamous - HamsterDance) and worth inclusion. (I remember spending TOO much time on RuneScape for example, so good to see that this one was included). What's interesting is how some of these are still going strong e.g. IMDB is now 25 years old, and Snopes is only a year younger. The World Wide Web is officially old enough for us judge what it’s produced. That’s right, it’s time for the world to start building a canon of the most significant websites of all time, and the Gizmodo staff has opinions. 1) DuckDuckGo doesn’t track its users. Google does. 2) DuckDuckGo blocks Google trackers lurking everywhere. 3) DuckDuckGo provides unbiased search results. 4) Users can search without fear of being watched. 5) Google is too big, too powerful and getting bigger and more powerful. Encourage competition to limit that power. Even if "Location History" is off on your phone, Google often still stores your precise location. There's no panacea, because connecting to the internet on any device flags an IP address that can be geographically mapped. Smartphones also connect to cell towers, so your carrier knows your general location at all times. Go to myactivity.google.com Go to "Activity Controls." Turn off both "Web & App Activity" and "Location History" This turns off precise markers being stored. On Android phones go to the settings for "Security & location." Scroll down to the "Privacy" heading. Tap "Location." You can toggle it off for the entire device. On iOS devices go to Settings - Privacy - Location Services and switch this off. Wiby is a search engine for older style pages, lightweight and based on a subject of interest. Building a web more reminiscent of the early internet. Findera.com is a new search engine for finding people - aimed at supporting recruiters. It offers more powerful selection criteria than standard LinkedIn (e.g. length of time in a role, type of role, location, etc.) - and allows users to view emails, save and export data. One caveat - all features are currently not available to the UK (or Europe) - so to log in to get the full power you need to be based in the US or use a VPN. To subscribe you need to give profile data which can then be used to update or grow Findera's people data. The San Francisco-based startup’s new offering is free, enables multi-attribute searches and covers 130 million professionals worldwide. 6 reasons why failing strategies continue to be supported by business (& political) leaders. - ensuring that strategy formation and implementation aren't carried out by the same people. Executives often miss the warning signs once they’ve committed to a business strategy, with disastrous results. How can you avoid falling into this trap? Web scraping can help extract information that's otherwise not easily downloadable, using a piece of code or a program. Includes tips e.g. how to automate the process by downloading Outwit Hub from outwit.com and also an excellent presentation on techniques by Samantha Sunne on how to scrape data without programming at buff.ly/2QYmkcX. Web scraping gives you access to information living on the internet. If you can view it on a website, you can harvest it. Here's how. At this year’s Annual Meeting of the New Champions (AMNC) in Tianjin, China, PwC unveiled a report detailing eight significant predictions for the future of artificial intelligence (AI), called 2018 AI Predictions – 8 insights to shape business strategy. Artificial intelligence will need to go mainstream and shake off its scary reputation if it’s going to deliver on the many promises its supporters make.
2019-04-23T06:19:45Z
https://marketing-intelligence.co.uk/blog/
This talk will introduce the central concepts of my account of toxic speech, drawing from both philosophy of language and social epidemiology. A medical conception of toxicity looks at the toxin, the dose, frequency, route of delivery, susceptibility of the individual or population, and more. All these factors can be fruitfully explored in connection to understanding the mechanisms by which speech acts and discursive practices can inflict harm, making sense of claims about harms arising from speech devoid of slurs, epithets, or a narrower class I call ‘deeply derogatory terms.’ By highlighting the role of uptake and susceptibility, and this model suggests a framework for thinking about damage variation. Toxic effects vary depending on one’s epistemic position, access, and authority. An inferentialist account of discursive practice plus a dynamic view of the power of language games offers tools to analyze the toxic power of speech acts. Even a simple account of language games helps track changes in our discursive practices. Identifying patterns contributes to an epidemiology of toxic speech, which might include tracking increasing use of derogatory terms, us/them dichotomization, terms of isolation, new essentialisms, and more. Finally, I will highlight a few ways to respond to toxic speech, some predictable from past theories (Brandom’s challenging, Langton’s blocking) and some perhaps more unexpected. Identity and distinctness facts come in many varieties, but here is an uncontroversial pair: The Eiffel Tower is identical with The Eiffel Tower, and Donald Trump is distinct from Barack Obama. David Lewis claimed that “there is never any problem about what makes something identical to itself.” I disagree: I believe there is a problem of determining what makes objects identical to themselves. We should provide a metaphysical explanation of identity facts. And, ideally, distinctness facts should come along for the ride: we should be able to metaphysically explain them as well. I will argue that many straightforward attempts to explain identity and distinctness facts fail. We cannot explain facts involving object identity and distinctness by appealing to the existence of the objects in question, by appealing to which properties the objects share (at least not along the traditional proposals), nor by appealing to facts about parthood. Instead, I suggest that we identify and distinguish objects on the basis of which facts they are constituents of. And we should identify and distinguish facts on the basis of their position in a network of metaphysical ground. In my talk I begin by introducing the commonsense idea that there appears to be a legitimate question, “What is the state obligated to its people to do?”, that should constitute the focal point of a philosophical sub-discipline, which I call ‘political morality’. I then point out that there appears to be no such philosophical sub-discipline. I argue that we political philosophers should accept these two appearances as veridical and admit that we’ve been dropping the ball; i.e. we’ve been failing to inquire into something that demands our attention. I also begin the task of giving it the attention it deserves. I argue that political morality, given its apparent contours, would have to be entirely artificial. From that conclusion I infer the further conclusion that political morality would have to apply to artificial agency; that is, it would be the morality that applies to certain individuals only insofar as they exercise artificial agency. And from thatconclusion I infer, finally, that political morality must be role morality, since inhabiting a role is the only way of exercising artificial agency. Rarely do we utter 'every F' to talk about absolutely every F, or 'some G' to talk about any G whatsoever. But there's no commonly-accepted account of just how speakers manage to use such phrases to talk about more restricted classes of things. After considering and rejecting some earlier suggestions, I offer a novel account of this phenomenon. On my account, speakers bear a relationship of linguistic authority over quantified statements, such that they can use those statements to express certain kinds of thoughts. But there are limits to such authority: both a practical limit, since speakers' thoughts are typically only so precise, and normative limits, since one's linguistic community will only tolerate a limited range of thoughts being expressible via a particular quantified statement. This talk is about the 19th century Scottish philosopher Mary Shepherd’s response to Hume on induction, and some of her own metaphysics of induction. Causal pluralism is, perhaps not surprisingly, plural. My aim in this talk will be to explore the relationship between two kinds of pluralism that have received attention in recent years. The first pluralism, which we owe chiefly to Ned Hall, argues that some causal claims are concerned with production while others are concerned with dependence or difference making. The second, which we owe chiefly to Elizabeth Anscombe, tells us that the word ‘cause’ is a schema term that stands in for more specific varieties of activities like pushing, wetting or scraping. My hope will be to show how we can understand the differing semantic and explanatory roles of these concepts, while connecting them to a reasonably economical ontology that is grounded in mechanisms. By giving valid consent, we can waive rights that we hold against other people, thereby permitting them to perform actions that they otherwise weren't allowed to perform. However, our consent can fail to grant them permissions when we give it under duress. I examine the questions of how duress invalidates consent, and why it does so. My answers appeal to rights' function of protecting us from interference from others and consent's function of enabling us to share our lives with others. Familiar, popular controversies -- like the one last summer over the memo written by a Google employee -- pit accusations of racism or sexism against competing accusations of political correctness. These disagreements can be fruitfully understood as grounded, at least in part, in a philosophical disagreement about whether moral considerations rightly play a role in what we believe. One side endorses the view that a commitment to nondiscrimination includes epistemic demands and rightfully so. The other side views this stance as both irrational and dangerous. The aim of the paper is to link these debates in our social world to a philosophical debate about whether moral and pragmatic considerations can and do affect beliefs and credences. Michael Silberstein and Mark Stuckey (Elizabethtown College ) • Full of Sound and Fury Signaling Nothing? The quantum pragmatism of Healey will be compared to Bub's information theoretic account of the quantum. Concerns about both views will be raised. It will be argued that the Relational Blockworld account of quantum mechanics, which as we will show has much in common with these two views, provides a realist psi-epistemic take on the quantum that deflates the measurement problem, explains superposition and entanglement without invoking wave-like phenomena or non-locality, and explains the Born rule. The three views will be compared and contrasted for their relative merits. Ultimately, we will conclude that the Relational Blockworld approach has certain advantages. When the attempt is made to determine empirically what it is that makes an individual choose to become involved in terrorist acts, one of the few factors with predictive value is: prior involvement in petty crime. This is in part because terrorist recruiters tend to seek out those who are on the fringes of society. It is connected also with the fact that terrorists often cooperate with criminal organizations in matters of finance and tactics. Terrorist acts and criminal acts differ, however. Very roughly: the former, but not the latter, have as their objective to send a message. We shall explore what this means for an ontology of terrorism, and describe how such an ontology might be useful, for instance in predicting terrorist acts. JL Austin said that existing is not something that things do all the time. Was he right? Under what conditions has something done something anyway? Perhaps surprisingly, I think that the key to answering this and a host of other questions in metaphysics can be found in a distinction from linguistics, the distinction between "stative" and "non-stative" verbs. Other question that this distinction is relevant to include: under what conditions does an event occur? What is the difference between a cause and a background condition? Must a disposition be a disposition to act? What is it to manifest a disposition? What is the most basic kind of causation? Recent challenges in international security posed by two terrorist organizations, Al Qaeda and the Islamic State of Iraq and Syria (ISIS), have highlighted an urgent domestic and foreign policy challenge, namely, how to address the threat posed by violent non-state actors while adhering to the rule of law values that form the core of democratic governance. Despite the vital importance of this topic, the legal framework for conducting operations of this magnitude against non-state actors has never been clearly identified. The Law of Armed Conflict (LOAC) is organized around the assumption that parties to an armed conflict are “combatants,” meaning that they are members of a state military acting in the name of that state. Norms of conduct are unclear with regard to non-state actors, and there are few consistent legal principles to provide guidance. In 2002, the Bush Administration declared members of Al-Qaeda and other violent non-state actors “unlawful combatants,” and as such declared them not subject to the Geneva Conventions. Legal scholars tend to agree, and many have written that LOAC must adapt to fit the new asymmetric nature of armed conflict. Law, however, is generally thought of as a constraint, rather than an instrument for achieving other goals. This article will address the status of unlawful combatants under existing International Humanitarian Law and Just War Theory and ask what the right legal framework is for addressing the threat posed by non-state actors in current asymmetric conflict. It will argue that violent non-state actors are more properly thought of as international criminals than as combatants of any sort. It will also examine the meaning of rule of law reasoning in the context of war. Results oriented legal analysis treats law as failing to provide reasons to individual actors, and privileges form over substance. I argue that this approach must be rejected if war is to be constrained by law. Trendsetters are the "first movers" in social change. To study the dynamics of change, we need to study the interplay between trendsetters' actions and individual thresholds. It is this interplay that explains why change may or may not occur. In this talk I give an overview of a theory of well-being that understands well-being as the fulfillment of an appropriate set of values that can be sustained over time. I then show that when the theory is applied to people who value friendship (that is, most of us), it provides a two-pronged argument for developing the virtue of humility. We have moral ideals to which we aspire. We also routinely and predictably fail to live up to those ideals. Considered as a practical moral problem, this may seem to have a straightforward solution—we should just act better! This answer, while true, is far too simple. Failures to live up to ideals are not all of a kind. Some we cannot or will not acknowledge as failures in the first place. Some failures call for guilt or remorse; others we may think justified in light of conflicting ideals or circumstantial constraints. Even justified failures to live up to ideals may produce moral residue or generate other kinds of moral obligations. In this talk, I explore the concept of a regulative normative ideal and the practical ramifications of such ideals for flawed moral agents. I argue that in a non-ideal world, living by an ideal demands that agents take up a wide range of actions and attitudes related to that ideal. These actions and attitudes are essential to the moral life and our efforts to engage in it well. What is Spinoza's account of the relationship between the human mind and body? I'll argue that Spinoza has two different answers to two different versions of this question, starting from two different sets of premises. First, Spinoza starts with subjective data like felt sensations and our experience of moving our bodies, and from that he concludes that the human mind is united to the human body by representing it. Second, to account for apparent psychophysical interaction in general, Spinoza develops parallelism. While these accounts of the mind-body relationship are often run together (including by Spinoza), I'll show that Spinoza argues for them in relative isolation from one another and does not resolve them. I'll trace this back to Descartes, who also offers two irreconcilable approaches to two different questions about the mind-body relationship, and I'll argue that we can still find a sense of this tension in contemporary philosophy of mind. Kyley Ewing (University of Maryland) • Lives or Headaches? Logan Fletcher (University of Maryland) • Can Visual Diagrams Justify Mathematical Beliefs? A central project in philosophy of language and in linguistics has been to find a systematic relation between the sounds we make and the meanings we manage to convey in making them. The meanings speakers mean appear to depend in various ways on context. On the orthodox view, a syntactically disambiguated sound completely determines what is directly asserted by the speaker (what is said), relative to a context that serves only to fix values for indexicals and deictic expressions. However, there appear to be cases of context-dependence that resist orthodox treatment (Bach 1994). When orthodoxy seems implausible, one of two options has generally been favored. Contextualists depart from orthodoxy and allow a greater role for context, including pragmatic enrichments of what is said (Recanati 2002). Others have attempted to preserve the orthodox account by enriching the symbol with covert syntactic items (Stanley 2000). On at least some accounts, this choice is an empirical one about the psychology of speakers and hearers. I therefore discuss how a series of self-paced reading time experiments, reported in McCourt et al. forthcoming, might inform these debates. I argue that these studies undermine a commonly accepted orthodox treatment of implicit control of reason clauses (The ship was sunk to collect the insurance), and therefore weaken the general motivation for orthodoxy. Many people have expressed hope that with the advent of widespread technology to capture moving images, we will finally be in a position to acknowledge and address the systemic problem of racialized police brutality. When the true details of this violence are visible to all, it is thought, the presence of a serious problem and the need to address it cannot be denied. In this essay, I will give reasons, connected to specific aesthetic phenomena regarding our interpretation and use of images, for skepticism about this hope. I will argue that standard ways of looking at these moving images tend to reinforce racialized forms of perception, and they tend to undermine attention to the systemic phenomena that contribute to racialized police violence. I will suggest that we must engage in forms of resistance to standard ways of looking. We must also attend to the acts of naming that shape what we perceive within these moving images. This talk is about the nature and causal determinants of both reflective thinking and, more generally, the stream of consciousness. I argue that conscious thought is always sensory based, relying on the resources of the working-memory system. This system has been much studied by cognitive scientists. It enables sensory images to be sustained and manipulated through attentional signals directed at midlevel sensory areas of the brain. When abstract conceptual representations are bound into these images, we consciously experience ourselves as making judgments or arriving at decisions. Thus one might hear oneself as judging, in inner speech, that it is time to go home, for example. However, our amodal (non-sensory) propositional attitudes are never actually among the contents of this stream of conscious reflection. Our beliefs, goals, and decisions are only ever active in the background of consciousness, working behind the scenes to select the sensory-based imagery that occurs in working memory. They are never themselves conscious. When you “have an inclination” to do something, prior to having decided whether or not to do it, you regard the inclination as something you can “act on” or not. My focus is on this moment in the story of action. I argue that there is a puzzle about how to form a coherent conception of this “having” relation. To have an inclination is to be influenced by something that simultaneously takes the form of a discursive proposal (“how about doing this?”) and brute pressure (the motivational oomph that is the correlate of ‘will power’). I explain why standard conceptions of desire fail to capture this duality, and I offer an alternative conception of my own. Laura Franklin-Hall (New York University) • Why are some kinds and classifications historical and others not? One important fruit of the scientific project—arguably second only to the formulation of dynamic theories—is the principled organization of our universe’s constituents into categories and kinds. Such groupings come in two principal flavors: historical and synchronic. Historical categories group entities by their relationships to past events, as when an organism’s species is a function of the population from which it descended. By contrast, synchronic categories make group membership depend exclusively on current features of the universe, whether these are intrinsic or extrinsic to the things categorized. This talk explores just why scientists deploy historical categories when they do, and synchronic ones otherwise. After reviewing a number of examples, I formulate a principle designed to both describe and explain this feature of our scientific classificatory practice. According to this proposal, a domain is apt for historical classifications just when the probability of the independent emergence of similar entities (PIES) in that domain is very low. In addition to rationalizing this principle and showing its ability to correctly account for classification practices across the natural and social sciences, I will consider the nature of the probabilities that are at its core. This colloquium talk is part of the Philosophy of Probability Workshop. Sometimes grave harm is an aggregate effect of many actions' consequences. In such cases, each individual contribution may in fact be so tiny that it's effect are imperceptible and, therefore, can't be said to cause harm. This creates a problem: If no agent's contribution causes harm, then s/he may lack sufficient reason not to contribute to the overall harmful effect. Hence, the harmful effect would seem normatively inevitable. In this talk, I discuss and reject two broadly consequentialist answers to the problem and I defend a virtue ethicist solution. According to the former views, a thorough analysis of all relevant cases reveals that there really are no cases of imperceptible contributions to harm. According to (my favored version of) the latter approach, agents should (in part) not partcipate in harmful practices, because a reasonably emphathetic agent would not act in this way. in the first place are far less common in epistemology. I discuss whether there are norms of salience that apply to the mind, and if so, what kinds of norms these might be. Quantum entanglement is real and important. It's also widely believed to be mysterious and spooky. The aim of this talk is twofold: to explain the basics of entanglement in a way that doesn't presuppose any prior knowledge of quantum mechanics, and to probe the question of whether entanglement really is spooky or mysterious. I will argue that it may be, but that if so, this isn't a obvious as is typically assumed. It is generally agreed that novels can be fully appreciated only through an experiential engagement with their well-formed instances. But what sort of entities can play the role of such instances? According to an orthodox view---accepted by Gregory Currie, David Davies, Stephen Davies, Nelson Goodman, Robert Howell, Peter Lamarque, Jerrold Levinson, Guy Rohrbaugh, Richard Wollheim, and Nicholas Wolterstorff, among others---the entities that play this role are primarily inscriptions---concrete sequences of symbol tokens, typically written/printed on something (say, paper, papyrus, or parchment) or displayed on the screen of some device (e.g., a computer or an e-reader). Thus, on this view, well-formed instances of, say, War and Peace include its original manuscript, printed copies (e.g., the copy lying on my table), and electronic text tokens (e.g., the text displayed on Anna's computer screen). My goals in this paper are (a) to show that despite its popularity, the orthodox view is misguided and (b) provide an alternative. I begin, in Section 1, with a clarification of the expression "well-formed instance of an artwork." Next, in Section 2, I explain why inscriptions cannot be regarded as well-formed instances of novels. In particular, I argue that to be a well-formed instance of a novel, an inscription must be capable of manifesting certain sonic properties of this novel; however, no inscription can manifest such properties. Finally, in Section 3, I (a) draw a distinction between non-visual novels, or novels that do not contain any aesthetically relevant graphic elements, and visual novels, or novels that do contain such elements, and (b) argue that well-formed instances of non-visual novels are readings, whereas well-formed instances of visual novels are sums of readings and graphic elements. Jan-Willem Romeijn (Groningen University) • What are the chances? In my talk I offer two answers to the above question. The first is semantical: I show that we can conceive of propositions about chance as empirical, and why this helps to make sense of the determination of chances in statistics. The second answer I give is metaphysical: chances come about because of the interplay between levels of description that cannot be made to mesh. As will be seen, both answers rely on early work about chances done by von Mises. The thesis that the mental supervenes on the physical (that the mental could not have been other than as it is without the physical having been other than as it is) has been much discussed. I will be suggesting three reasons one might doubt that the issue has all the importance it has widely been taken to have. These will illustrate more general reasons for uneasiness about the status of modal metaphysics. Correlation is not causation. As such, there are decision-making contexts (like Newcomb's Problem) where it is entirely reasonable for an agent to believe that the world is likely to be better when she x's, but also believe that x-ing would cause the world to be worse. Should agents x in such contexts? In this paper, I use the interventionist approach to causation to help answer this question. In particular, I argue that whether an agent should x depends on her credence that her decision constitutes an intervention. I also propose and defend a decision rule that takes stock of the exact way in which what an agent should do depends on this credence. Cohen and Callender's (2009, 2010) Better Best System (BBS) analysis of laws of nature is fashioned to accommodate laws in the special sciences by allowing for any set of kinds to be adopted as basic prior to the determination of the laws. Thus, for example, setting biological kinds as basic will yield biological laws as the output of the best system competition. I will argue in this talk that the BBS suffers from two significant problems: (1) it is unable to single out a set of laws as fundamental, and (2) it cannot accommodate cases of interfield interactions that muddy the boundary between the basic kinds of individual fields (e.g. photon talk in biology). I then propose a new Best System style view and argue for its ability to account for special science laws, fundamental laws, and cases of interfield interactions. Social choice theory offers a number of formal models that allow for the aggregation of ordinal and numerical scales. Although it is most often used to model elections and social welfare, it has also been used to model a wide variety of other phenomena, including the selection of scientific theories and the collective judgments of computers. But the skeptical findings of social choice theory have had particular impact within political philosophy and political science. For instance, William Riker famously used Arrow's impossibility theorem, which shows that no voting rule satisfies a number of reasonable conditions on democratic choice, to argue that populist theories of democracy are false. I argue that such skeptical findings are often the result of the context-free nature of orthodox social choice models. The addition of assumptions plausible only within particular theoretical contexts often produces models that avoid many of these skeptical results. I examine three examples of context-specific social choice models that are appropriate within the following theoretical contexts: scientific theory selection, elections, and the measurement of public opinion. I argue that such context-specific models typically represent their respective phenomena better than context-free models, and consequently are better able to determine what problems may or may not exist within their specific contexts. Finally, I suggest that a similar context-specific strategy might also be used in other formal areas of philosophy. Jake Earl (Kennedy Institute of Ethics, Georgetown University) • Why Should You Parent Your Babies? It's completely obvious that people who bring children into the world typically have some responsibility to parent them. Sure, marginal cases involving assisted reproductive technology or coercion, deception, or other extreme circumstances are tough to call, but in everyday cases, it seems like procreators have special moral reasons to look after their children from the moment of birth (at the latest). In this talk, I'm going to try to convince you that, while this moral intuition is fairly clear, an adequate justification for it is sorely lacking, and that this has some troubling implications for philosophical and social debates about parental rights, child support, and the role of the nuclear family. The standard framework of cognitive science-- the computational-representational theory of mind (CRT)-- has it that mental processes are the result of brains implementing computations that range over representations. These representations have standardly been thought of as intentional states-- that is, states that have contents such that they are about or representations of particular things. For example, one standard interpretation of generative linguistics is that the mind performs computations over states that are representations of, inter alia, noun phrases, phonemes, and theta roles. Recently, however, Chomsky (2000), Burge (2010), and others generally supposed to be adherents of the CRT, have argued that at least some of the so-called representations posited under the framework are not intentional: they are not about anything at all. Jones and Love (2011) assert, in particular, that Bayesian accounts of perception rely on computations that range over non-intentional states. This claim is particularly remarkable because Bayesian inference is often construed as a variety of hypothesis testing-- a process notoriously difficult to characterize in non-intentional terms. Thus far, the arguments for these claims have been unsatisfying. To rectify the situation, I’ll examine a particular Bayesian account of color perception given by Allred (2012) and Brainard et al. (2008; 1997). Even though their account is couched in the intentional idiom of hypothesis testing, I’ll argue that we can preserve its explanatory power without attributing intentional states to the early perceptual system it describes. The conclusion of this analysis is not that intentionality can be eliminated wholesale from cognitive science, as Stich, Dennett, and the early behaviorists have advocated. Rather, analysis of why intentional explanation proves unnecessary in this particular case sheds light on the conditions under which intentional explanation does prove explanatorily fruitful. Human beings’ capacity for cooperation vastly outstrips that of other great apes. The shared intentionality hypothesis explains this difference in terms of motivational and representational discontinuities, particularly the capacity to represent joint goals. In this paper, I first present an argument as to why we should reject the shared intentionality hypothesis’ hyper-competitive characterization of chimpanzees’ social cognitive abilities, and provide reasons to be skeptical of the generalizability of experimental findings from captive chimpanzees. Next, I outline an alternative account of the contrast between human and great ape social cognition that emphasizes gradual differences in domain-general reasoning rather than novel domain-specific representational abilities. Lastly, I review further cognitive and motivational factors that might affect human beings’ capacity for cooperation. Contemporary epistemology offers us two very different accounts of our epistemic lives. According to Traditional epistemologists, the decisions that we make are motivated by our desires and guided by our beliefs and these beliefs and desires all come in an all-or-nothing form. In contrast, many Bayesian epistemologists say that these beliefs and desires come in degrees and that they should be understood as subjective probabilities and utilities. What are we to make of these different epistemologies? Are the Tradionalists and the Bayesians in disagreement, or are their views compatible with each other? Some Bayesians have challenged the Traditionalists: Bayesian epistemology is more powerful and more general than the Traditional theory, and so we should abandon the notion of all-or-nothing belief as something worthy of philosophical analysis. The Traditionalists have responded to this challenge in various ways. I shall argue that these responses are inadequate and that the challenge lives on. The past few decades have seen an expansion in the use of cost-benefit analysis as a tool for policy evaluation in the public sector. This slow, steady creep has been a source of consternation to many philosophers and political theorists, who are inclined to view cost-benefit analysis as simply a variant of utilitarianism, and consider utilitarianism to be completely unacceptable as a public philosophy. I will attempt to show that this impression is misleading. Despite the fact that when construed narrowly, cost-benefit analysis does look a lot like utilitarianism, when seen in its broader context, in the way that it is applied, and the type of problems to which it is applied, it is better understood as an attempt by the state to avoid taking sides with respect to various controversial conceptions of the good. A number of seminal figures in the history of probability, including Keynes, de Finetti, Savage, and others, held that comparative probability judgments -- as expressed, e.g., by statements of the form 'E is more likely than F' -- might be, in one way or another, more fundamental than quantitative probabilistic judgments. Such comparative judgments have mostly been studied in relation to quantitative notions, viz. representation theorem. After briefly discussing how this older work on representation theorems relates to contemporary questions in linguistic semantics about what locutions like 'E is more likely than F' mean, I will then argue that we need a better understanding of normative considerations concerning comparative probability that is, at least potentially, independent of quantitative representations. I will present a new result -- analogous to, but weaker than, Dutch book arguments for standard quantitative probability -- characterizing exactly when an agent maintaining given comparative judgments is susceptible to a blatant kind of pragmatic incoherence. It turns out that quantitative representability (or at least 'almost representability') can be motivated in this way, without presupposing quantitative representation on the part of the agent. Finally, I will illustrate how this result might bear on the aforementioned questions in semantics, as well as more general questions about the role of qualitative probability judgments in practical reasoning. Understanding how gene regulatory networks work, and how they evolve, is central to understanding the evolution of complex phenotypes. A common way to model these networks is to represent genes as simple boolean logic switches, and networks as complex circuits of these switches wired together. Such models have been used to explore theoretical issues about adaptation and evolvability, and have successfully captured the key workings of well-studied developmental systems. In this paper, I introduce a model in this same tradition, but one that explicitly incorporates recent philosophical work on signaling systems. The primary work is by Brian Skyrms, who has extended David Lewis’s ideas from “Convention”, placing them in an evolutionary context and connecting them to information theory. Skyrms uses these ideas to show how evolutionary processes can “create information” (and perhaps even proto-meaning). The model thus provides an important bridge between a standard tool for thinking about gene regulatory evolution, and new ideas about evolution of communication, information, and meaning. I discuss two initial results from exploring this model. First, I show that the models provide a clear way to underwrite some “information-talk” in developmental biology that has been previously dismissed by philosophers. Second, I show how one shortcoming of the Lewis/Skyrms model — the inability to distinguish directive and assertive force — connects to recent ideas about evolvability in gene regulatory networks. Philosophers are, of course, much concerned with issues of injustice. Vast literatures address wrongful incursions committed along lines of race, gender, sexual preference, religion and, of course, economic class. Comparatively little attention has been paid to impositions across generational lines, and where such unfairness has been invoked the story is often gotten backwards (“ageism”). This paper argues that during the preceding half century increased burdens have been placed on young cohorts for the direct benefit of the old, that almost every major social policy in recent years has further disadvantaged the young, and that this is not only an American problem but one that pervades the developed world. These injustices can be understood as failures of reciprocity, non-imposition, and democratic accountability. Unlike other perceived injustices, this one shows itself uniquely resistant to redress through liberal democratic institutions. I conclude by speculating that this immunity to melioration is not accidental but rather that the root cause of eating the young is liberal democracy itself. Mark Engelbert (University of Maryland) • Is Racial Science Racist? Self-determination is a cardinal principle of international law. But its meaning is often obscure. While the exact contours of the principle are disputed, international law clearly recognizes decolonization as a central application of self-determination. Most ordinary people also agree that the liberation of colonized peoples was a moral triumph. In the paper, I pursue a particular strategy for theorizing the principle: I start with a case where self-determination is widely considered appropriate—the case of decolonization—and try to get clear on precisely which values justified self-determination in that case. Specifically, I examine three philosophical theories of self-determination’s value: an instrumentalist theory, a democratic theory, and my own associative theory. I argue that our intuitions about decolonization can be fully justified only by invoking an interest on the part of alienated groups in redrawing political boundaries. This interest, I believe, may also justify self-determination in other cases, such as autonomy for indigenous peoples, and greater independence for Scotland or Quebec. Those who strongly support decolonization may have reason to endorse independence for these other minorities as well. In this talk, I will first argue that the Chomsky, Hauser and Fitch (2002) claim that recursion is unique to human language is misleading because they fail to distinguish recursive procedures (I-recursion) from recursive patterns (E-recursion). I contend that in order to explain the emergence of recursive hierarchical structures in human language, as opposed to animal communication systems (bee dances and bird songs), the underlying recursive generative mechanism should be explained. I will compare two such accounts: an evolutionary account by Miyagawa et al. (2013) and the Minimalist syntax by Hornstein (2007), and argue for the latter. John Tomasi (Depts. of Politics and Philosophy, Brown University) • What is Libertarianism? Defenders of “democratic authority” claim that the democratic process in some way confers legitimacy on the state and generates an obligation for citizens to obey democratically made laws. This idea may be based on (a) the value of democratic deliberation, (b) the importance of respecting others’ judgments, or (c) the importance of equality. I argue that all three proposed bases for democratic authority fail, and thus that the democratic process does not confer legitimacy, nor does it create political obligations. In a world where time travel is possible, could there be a closed loop of knowledge? Could a future Dunlap scholar bring me, in his time machine, the contents of my dissertation, so that I don't have to write it myself? In this paper, I address some conceptual issues surrounding Deutsch's solution to this paradox---known as the Knowledge Paradox---which stems from his influential framework for analyzing the behavior of quantum systems in the presence of closed timelike curves (CTCs). I argue that Deutsch's acceptance of the existence of the many worlds of the Everett interpretation in or to ensure that there is always an author of the dissertation (albeit in another world), creates a unique problem. The Many Worlds Interpretation commits Deutsch to believing that any history that is physically possible is actualized in some world. Among those histories, I argue, are ones which are indistinguishable in every way from worlds in which an Knowledge Paradox scenario plays out, wherein the dissertation exists, but was not written by anyone. Furthermore, in these worlds, the existence of the dissertation is not the result of time travel, but merely appears to be. So Deutsch's use of the Many Worlds framework to solve the Knowledge Paradox cuts both ways. It commits him to the existence of worlds in which the dissertation is genuinely a "free lunch"---it exists, but was not the result of the intellectual effort of rational beings---which is exactly the situation Deutsch was trying to avoid. Many of the inferences we draw in our day-to-day reasoning are defeasible—their conclusions can be withdrawn in the light of new evidence. This inferential property, known as non-monotonicity, requires the development of non-standard logics to model our reasoning practices, for, in standard logic, the conclusions drawn from a premise set are never withdrawn when new premises are added to that set. Non-standard logics, however, face a unique challenge. Defeasible inferences have varying strengths and how to model the interaction between such inferences is an outstanding question. In this paper, I provide an answer to this question within the framework of the default logic originally proposed by Reiter (1980) and recently developed by Horty (2012). Focusing on a few sample cases, I show where Horty (2012)’s answer to the above question stands in need of development and how my proposed revisions to his account address these deficiencies. I also consider other developments of Reiter (1980)’s default logic which avoid some of Horty (2012)’s problems and suggest that these accounts face a fundamental difficulty which my account does not. An intentional-historical formalist definition of poetry such as the one offered in Ribeiro (2007) inevitably raises the question of how poetry first emerged, and why. On this view, repetitive linguistic patterning is seen as a historically central feature of poems, and one that has both an aesthetic and a cognitive dimension. Combining the Darwinian idea of a musical protolanguage with analyses of ‘babytalk’, I suggest that this central feature of poetic practices first emerged as a vestige of our musical proto-speech and of our earliest form of communication with our caregivers. Conversely, I suggest that the existence and universality of ‘babytalk’, together with the universality, and antiquity of poetic practices, argue in favor of the musilanguage hypothesis over its competitors, lexical and gestural protolanguage. One consequence of this proposal is a reversal of how we understand poetic repetition: rather than being justified in terms of the mnemonic needs of oral cultures, it is now understood as an aesthetically pleasing exploitation of features already found in speech. In this talk I will argue that musical perdurantism faces a number of serious problems and, hence, cannot be accepted. I argue that lexically primitive proper nouns (PNs) are systematically polysemous in the sense that they can be systematically used in different linguistic contexts to express at least three formally distinct yet analytically related extralinguistic concepts. Given independently plausible assumptions about the nature of these concepts, and of the lexically encoded meanings of primitive PNs, my overarching aim is to show how this framework offers a theoretically attractive way to explain Frege’s puzzle regarding the intersubstitution of so called “coreferential” PNs. In Republic I, Plato makes the following claim about how injustice works in us: “[Injustice] will make [the individual] incapable of acting because of inner faction and not being of one mind with himself; second, it will make him his own enemy as well as the enemy of just people (Republic 352a 1-8).” But what would it mean for an individual's being unjust to (1) cause disharmony within that individual to the point that she is incapable of action and (2) cause that individual to become an enemy of herself? Christine Korsgaard argues that we cannot act at all (in the sense of acting as agents) unless we are acting as a unified person. But if Korsgaard is correct, in what sense could we ever truly act as our own enemies? I will argue that Korsgaard's requirements on what is constitutive of action are too stringent, and that one need not be internally unified in order to act as an agent. (I hold that I need not abandon a constitutional account of the soul/self in order to do this.) I will then present an account of how factionalization in one's soul/self leads an agent to act as her own enemy by obscuring her perception of the good. I will ultimately argue that, consistent with Plato's constitutional model of the soul, there is an order and internal consistency that is necessary for an agent to function justly and correctly, but this order is not necessary in order for an agent to act at all. If you were forced to choose between saving one or ten other strangers in a lifeboat from certain death, which would you choose? Most people believe that one should save the lifeboat with the greater number of lives. However, many moral theorists have argued that the best deontological theory in town, Scanlon’s contractualism, is incapable of justifying this verdict. On Scanlon’s account, a rescuer must decide whether to adopt a principle that favors saving the greater number of lives on the basis of the comparative strength of the sets of objections that we can expect to be posed by each person. However, since each person has an equally forceful complaint against the rescuer adopting a principle that does not save his or her life, no one’s objection is stronger than any other. Scanlon’s account gives us no guidance about what to do in the lifeboat scenario. It seems that we are left with making a decision by flipping a coin or holding a weighted lottery, both of which Scanlon rejects. As an alternative, he offers the “balancing view,” which demands that the person in the one-person lifeboat has her interests balanced against one person on the opposing side; those that are not balanced out in the larger group are used as tiebreakers. The balancing view entails that we must save the lifeboat with the larger group from certain death. I argue that the balancing view is inconsistent with other core tenets of Scanlon’s contractualism and that his account obligates us to use a weighted lottery to figure out who should be saved. Eric Pacuit (University of Maryland) • When is an example a counterexample? In this talk, I will carefully examine purported counterexamples to two postulates of iterated belief revision. I will show that the examples are better seen as a failure to apply the theory of belief revision in sufficient detail rather than a counterexample to the postulates. More generally, I will focus on the observation that it is often unclear whether a specific example is a “genuine” counterexample to an abstract theory or a misapplication of that theory to a concrete case, at what this means for a normative theory of belief revision. This talk is based on joint work with Paul Pedersen (Max Plank Institute) and Jan-Willem Romeijn (Groningen University). A central premise of Chalmers’ anti-materialism argument claims that we can conceive of a possible world where we hold fixed all physical facts but exclude certain phenomenological facts from obtaining. In this paper, I argue that attempting to conceive of such a scenario poses a puzzle: If, in this possible world, Roger lacks any phenomenal properties, this, itself, is a physical fact, in the same way that wood and coal lack phlogiston is a physical fact. But since both worlds share physical facts, this must be true at the actual world. But by hypothesis, Roger has phenomenal properties. Hence, the puzzle. I anticipate resistance to the idea that Roger lacking phenomenal properties is a physical fact, and address some possible (and actual) objections. However, independently of this issue, I argue that the conceivability premise is entirely question-begging. In modern democracies, political representatives often must use several different conflicting considerations when making policy decisions. I focus on two such considerations that are commonly thought to be in direct conflict: responsiveness to the wishes of the public and a commitment to do what is in the best interests of the public. Because the public is often mistaken about the likely outcomes of their preferred policies, if representatives commit themselves to being responsive to the wishes of the public then there will be many cases in which they cannot do what is in the best interests of the public (and vice versa). Additionally, the policy preferences of the public are often unstable or dependent upon the views of political elites. However, many theories of democratic governance (especially those in the American tradition) maintain that political responsiveness is key to political legitimacy. Therefore, it is not satisfactory to simply ignore the policy preferences of the public. I argue that this seeming dilemma can be reconciled if we model the wishes of the public in terms of preferences over possible policies and the interests of the public in terms of preferences over possible outcomes of those policies. Consequently, policy choices can be made taking into account both explicit policy preferences (wishes) and outcome preferences (interests). Although such a model substantially simplifies policy decisions, it requires that preferences over policies and outcomes be describable by interpersonally comparable cardinal utility measures. I hint at what such measures might be like and show that this has important implications for public opinion polling methodology. Lucas Dunlap (University of Maryland) • What can we learn from time-traveling quantum computers? Over the last several decades, a new strategy for attempting to understand quantum mechanics has emerged: analyzing the theory in terms of what quantum mechanical systems can do. This information-theoretic approach to the interpretation of quantum mechanics characterizes the difference between the quantum world and the classical world by delineating what kinds of classically impossible computations and communication protocols can be achieved by exploiting quantum effects. This approach has opened up a potential avenue for synthesizing quantum mechanics with a particular aspect of general relativity: the possible existence of closed timelike curves (CTCs). A CTC is a path through spacetime along which a system can travel, which will lead it to its own past. David Deutsch (1991) developed the first quantum computational model with negative time-delayed information paths, which is intended to give a quantum mechanical analysis of the behavior of CTCs. I will consider an argument by Cavalcanti et al. (2012) which purports to show that the protocol must fail. I will argue that this position is not well justified. The argument the authors explicitly give for their view is based upon a misinterpretation of the special theory of relativity, and the most plausible justifications they would offer instead are weak enough that we should consider the possibility of the instantaneous transmission of information to be an open question. Aidan Lyon (University of Maryland) • The Wisdom of Crowds: Can Collective Credences be Wise? How many words are in this abstract? If you had to guess, without counting, you would probably get pretty close to the true number. However, if you and your friends all made guesses, the average of your guesses would likely be better than your typical guess. This is an example of the so-called Wisdom of Crowds effect. The effect is surprisingly reliable — for example, the "Ask the Audience" lifeline on Who Wants to Be a Millionaire? has a 95% success rate. This seems to cry out for an explanation, especially given how irrational collectives can be — think: committee decisions, tulip prices, and rioting football fans. Scott Page (2008) has made some initial progress on this question with what he calls the Diversity Prediction Theorem. Roughly speaking, the theorem shows that if a collective is diverse, then its collective judgements are guaranteed to be better than the typical individual judgements. So it would seem that we have an explanation for the Wisdom of Crowds effect and its reliability: it's a mathematical necessity. Not quite. For the theorem to have any explanatory power, it needs to be supplemented with bridge principles that connect the theorem to the explanandum. I will tease out these principles and show that they have some serious defects. An interesting consequence of these defects is that it appears to be impossible for there to be a Wisdom of Crowds effect for collective credences — i.e., averaged degrees of belief. However, after developing a Bayesian interpretation of Socrates' thoughts on wisdom (from the Apology), I will argue that collective credences are the only collective judgements that can be genuinely wise. Sentences like (1) present familiar puzzles for the familiar idea that declarative sentences of a natural language have truth conditions. The first numbered sentence in 'Framing Event Variables' is false. Action reports like (2) and (3), which might be used to describe a scene in which two chipmunks chased each other, illustrate other (perhaps even harder) puzzles for this idea. Alvin chased Theodore gleefully and athletically but not skillfully. Theodore chased Alvin gleelessly and unathletically but skillfully. I'll argue against various (broadly Davidsonian) attempts to reconcile intuitions regarding (2) and (3) with the claim that these sentences have truth conditions. In my view, the puzzles reflect deep "framing effects"--of the sort that Kahneman and Tversky made famous, though my central example is due to Thomas Schelling. If this is the right of diagnosis of the puzzles regarding sentences like (2) and (3), then I think we need a conception of linguistic meaning according to which sentence meanings *do not* determine truth conditions, not even relative to contexts. And as it happens, I've been peddling such a conception for a while now: it's better to think of meanings as instructions for how to build concepts, which might be used (when conditions allow) to form truth-evaluable judgments in contexts. With commentary from Georges Rey! Theodosius Dobzhansky in his1937 Genetics and the Origin of Species claimed that "the mechanisms of evolution as seen by a geneticist" consist of mechanisms at three levels. This multilevel analysis still captures the key mechanisms of evolutionary change. First, mechanisms produce the variations that are the raw material for change, including mutation mechanisms of imperfect copying of DNA (including repair mechanisms), as well as larger scale chromosomal changes and recombination. The second level includes mechanisms that change populations, genotypically and phenotypically. The most important is the mechanism of natural selection, which is the only known mechanism for producing adaptations. In the natural selection mechanism, the crucial joint activities of variant organisms and a critical environmental factor produce populational changes in subsequent generations. Finally, isolating mechanisms give rise to new species that are reproductively isolated from previous conspecifics. This paper argues that natural selection is, indeed, a mechanism (despite recent claims to the contrary) and places the natural selection mechanism into the context of the multilevel mechanisms of evolutionary change. One of the problems for Russell's quantificational analysis of definite descriptions is that it generates unattested readings in the context of non-doxastic attitude verbs such as want. The Fregean-Strawsonian presuppositional analysis is designed to overcome such shortcomings of Russell’s quantificational analysis while keeping its virtues. Anders J. Schoubye (forthcoming), however, criticizes the Fregean-Strawsonian solution to the problem of non-doxastic attitude verbs as being inadequate by generalizing the problem to indefinite descriptions. Schoubye claims that the generalized problem calls for a radical revision of the semantics of definite and indefinite descriptions, and he attempts to develop a dynamic semantic account of descriptions. In this paper I defend the standard non-dynamic semantics of descriptions by refuting Schoubye’s objections to the Fregean-Strawsonian analysis. I argue that, once we take into account Elizabeth Villalta's (2008) recent analysis of non-doxastic attitude verbs, we can solve Schoubye's generalized problem concerning descriptions. In this paper I examine a well-known articulation of human nature skepticism, a paper by Hull (1986). I then review a recent reply to Hull by Machery (2008), which argues for what he claims is an account of human nature that is both useful and scientifically robust. I show that Machery’s account of human nature, though it successfully avoids Hull’s criticisms, is not very useful and is scientifically suspect. Finally, I introduce an alternative account of human nature—the “life-history trait clusterâ€ù conception of human nature—which I hold is scientifically sound, pragmatically useful, and makes sense of (at least some of) our intuitions about—and desiderata for—human (or, more generally, species) nature. The desiderata that it satisfies are that human nature should (1) be the empirically accessible (and thus not based on occult essences) subject of the human (psychological, anthropological, economic, biological, etc.) sciences, (2) help clarify related concepts like innateness, naturalness, and inevitability, which are associated with human nature, and (3) characterize human uniqueness. This paper concerns the ethics of humor. More specifically, it is concerned with a certain category of jokes that can be labeled immoral jokes. I claim that such jokes exist, and that many of them are funny despite being immoral; that is to say, their immorality does not wholly undermine their humorousness, and may even somehow contribute to it. So a first task of the paper is to say what a joke’s being funny or humorous roughly amounts to. A second and more important task is to say what it is for a joke to be immoral, or what may come to the same thing, pernicious . But a third task will be to decide what attitude or behavior is appropriate to such jokes in light of their immorality, and whether their total proscription is justified, or even humanly possible. This is intended to be a serious talk, in spite of the title. The idea is that quantum mechanics is about probabilistic correlations, i.e., about the structure of information, since a theory of information is essentially a theory of probabilistic correlations. To make this clear, it suffices to consider measurements of two binary-valued observables performed by Alice in a region A and by Bob in a separated region B -- or, to emphasize the banality of the phenomena, two ways of peeling a banana, resulting in one of two tastes. The imagined bananas of Bananaworld are non-standard, with probabilistic correlations for peelings and tastes that cannot be simulated by Alice and Bob if they are restricted to classical resources. The conceptually puzzling features of quantum mechanics are generic features of such nonclassical correlations. As far as the conceptual problems of quantum mechanics are concerned, we might as well talk about bananas. The shared intentionality hypothesis aims to explain the evolution and psychology of human cooperation, but it lacks the means to deal with the free-rider problem. To resolve thisproblem, I propose that the shared intentionality hypothesis can be supplemented with an account of how punitive sentiment in humans evolved as a psychological mechanism for strong reciprocity. Supplementing the shared intentionality hypothesis in this manner affords us additional insight into the normative nature of human cooperation. I begin with the following moral dilemma: we are inclined to say that the harder an agent finds it to act virtuously the more virtue she shows if she does act well, but we are also inclined to say that the harder an agent finds it to act virtuously the more it shows how imperfect in virtue she is. I argue that this dilemma is the result of a deeper conflict between conceiving of morality as a corrective constraint on immoral temptations and conceiving of morality as consisting in being a good human. I am concerned with whether, conceiving of morality as being a good human, we might still accommodate our deep-seated intuition that morality is both “correctiveâ€ù and “constrainingâ€ù. I give Philippa Foot’s account of virtue as a largely successful attempt to do justice to our inclination toward conceiving of morality as both corrective and constraining, but I ultimately find it lacking since it fails to capture the considered belief that morality can be a corrective constraint on one’s individual moral deficiencies. Improving upon Foot’s account of virtue, I posit the existence of intermediate virtues that would not be possessed by the ideally virtuous person, but are nonetheless essential to becoming an ideally virtuous person. Ryan Ogilvie (University of Maryland) • Vision for Action and Perception: Are These Two Functions of Vision So Distinct? David Milner and Melvyn Goodale's (1995, 2006, 2008) influential dual visual systems hypothesis (DVSH) proposes a functional description of the two main cortical visual pathways in the primate brain. The dorsal stream processes fast, accurate, and egocentrically-specified visual information for the fine-grained implementation of skilled, online motor control. The ventral stream is thought to process slow, “inaccurateâ€ù, and allocentrically-specified visual information that supports the recognition and identification of objects and events, and other forms of visual processing associated with conscious visual experience. This functional gloss presupposes that vision for action employs quite different visual information from “vision for perceptionâ€ù. I argue that the type of information employed by motor systems will generally be task sensitive and can, contra Milner and Goodale, recruit “scene-basedâ€ù spatial information. Furthermore, vision for perception is not coded in allocentric and it is, at best, misleading to conceive of the spatial information underlying this type of vision as “inaccurateâ€ù. Here I present a challenge to prioritarianism, which is, in Derek Parfit's words, the view that "we have stronger reasons to benefit people the worse off these people are." We have such reasons simply by virtue of the fact that a person's utility "has diminishing marginal moral importance". In discussions of prioritarianism, it is typically left unspecified what constitutes a greater, lesser, or equal improvement in a person's utility. I shall argue that this view cannot be assessed in such abstraction from an account of the measure of utility. In particular, prioritarianism cannot accommodate the widely accepted and normatively compelling measure of utility that is implied by the axioms of John von Neumann and Oskar Morgenstern's expected utility theory. Nor can it accommodate plausible and elegant generalizations of this theory that have been offered in response to challenges to von Neumann and Morgenstern. This is, I think, a theoretically interesting and unexpected source of difficulty for prioritarianism, which I shall explore in the paper. Natural language exists in different modalities: spoken, written, signed or brailled. Although there is ample evidence showing that languages in different modalities exhibit rather different structures, there is a ‘glottocentric bias’ among theorists, i.e. sound is central, if not essential to language. Speech is usually considered to be the primary linguistic modality, while other modalities are taken to be a surface perceptual differences only occur at the interfaces of the language faculty and the perceptual system (e.g. sign language). Theorists in general think explanations for the facts about linguistic structures in spoken language can be generalized to other modalities. Many linguists (e.g. Chomsky, Bromberger etc.) have utilized the features of spoken language observed to draw inferences about the nature of the human language faculty. The principles that govern spoken language also govern linguistic phenomena in other modalities. In this talk, I will argue that the traditional picture of taking spoken language as the primary modality to understand other modalities of language is probably mistaken. I propose to look at the written and spoken modalities of logographic languages like Chinese (written and spoken), and also compare the syllable structures of speech to sign language. With respect to Chinese language, I will show that there are cases in which meanings cannot be disambiguated only by analyzing the spoken sounds, but rather we need to look at the written words, I argue that there might be different procedures of mapping forms of different modalities to meanings. As for sign language, I argue that the so-called ‘syllable structure’ in sign language exhibit rather different structure from that of spoken language, and the difference might be at the linguistic rather than merely at the perceptual level. I challenge a recent attempt by Antony Eagle to defend the possibility of deterministic chance. Eagle argues that statements of the form '$x$ has a (non-trivial) chance to $\varphi$' are equivalent in common usage (and in their truth-conditions) to those of the form '$x$ can $\varphi$'. The effect of this claim on the debate about the compatibility of (non-trivial) chances with a deterministic world seems to be relatively straightforward. If '$x$ has a chance to $\varphi$' is equivalent to '$x$ can $\varphi$' and statements of the form '$x$ can $\varphi$' are able to be truthfully uttered in a deterministic world, then statements of the form '$x$ has a chance to $\varphi$' are also able to be truthfully uttered in such a world. Drawing upon the work of Angelika Kratzer and David Lewis, Eagle shows how our best semantic theories allow statements of the form '$x$ can $\varphi$' to be truthfully uttered in deterministic worlds. Under the assumption that the truth-makers of statements like '$x$ has a chance to $\varphi$' are objective chances, compatibilism about chance seems to follow. I argue, however, that we have reasons independent of the debate about compatibilism about chance to reject a semantic theory that yields the sort of results Eagle claims for the Kratzer-Lewis account. If we make the necessary modifications to our semantic theory, however, then compatibilism about chance follows only, if at all, with great difficulty. Propensity interpretations of objective probability have been plagued by many serious objections since their origin with Karl Popper (1957). In this talk, I attempt to offer a novel way of understanding propensity such that, in certain contexts, these problems go away. I call this approach, mechanistic propensity. The central claim is this: in cases where stochastic biological phenomena are the result of underlying mechanisms, propensities can be understood as properties of these mechanisms. I suggest that this (localized) account of propensity, if successful, enjoys several benefits that traditional accounts have lacked. Mechanistic propensities (1) aren't deeply mysterious (2) can explain frequencies, (3) are capable of accommodating single-case probabilities, (4) can cohere with determinism (both local and global), (5) avoid being too modal for science, and (6) seem not to face the reference class problem. Prior (1959) and others have argued that the widely shared preference for future wellbeing over past wellbeing (the preference that unpleasant experiences be located in one's past, and pleasant experiences in one's future) provides decisive evidence in favor of the A-theory of time (which holds that time objectively passes). The B-theory, which does away with passage, seems challenged to explain why it is rational to care more about one's future than one's past, if one is not 'moving towards' the future and 'away from' the past. I argue, with the passage theorist, that the stock B-theoretic responses to this problem have been unconvincing. But I then defend two additional claims: first, that the A-theorist's case has in fact been understated, in that the B-theory undermines not just the asymmetric concern for one's future over one's past, but also the belief that one has any genuinely self-interested stake in the wellbeing of one's 'past/future selves' at all; but, second, there is no compelling reason to regard our (albeit enormously strong) A-theoretic intuitions on these questions as veridical, and that the B-theorist can give a plausible deflationary explanation that renders them almost wholly non-evidential. I conclude, therefore, that while the problem of time-asymmetric preferences offers no compelling reason to adopt either theory of time, it does raise the stakes of the debate by showing that the B-theory, if correct, would demand a fundamental reordering of ordinary intuitions regarding the nature of our mental lives and the foundations of prudential rationality. In this talk I begin to draw together, and package into a coherent philosophical position, a number of ideas that in the last 25 years I have alluded to, or sometimes stated explicitly, concerning the properties and the merits of the measure of deductive dependence $q(c | a)$ of one proposition c on another proposition a; that is, the measure to which the (deductive) content of c is included within the content of a. At an intuitive level the function $q$ is not easily distinguished from the logically interpreted probability function p that may, in finite cases, be defined from it by the formula $p(a | c) = q(c' | a')$, where the accent represents negation, and indeed in many applications the numerical values of $p(c | a)$ and $q(c | a)$ may not differ much. But the epistemological value of the function $q$, I shall maintain, far surpasses that of the probability function p, and discussions of empirical confirmation would be much illuminated if $p$ were replaced by $q$. Each of $q(c | a)$ and $p(c | a)$ takes its maximum value 1 when $c$ is a conclusion validly deduced from the assumption $a$, and each provides a generalization of the relation of deducibility. But the conditions under which $q$ and $p$ take their minimum value 0 are quite different. It is well known that if $a$ and $c$ are mutual contraries, then $p(c | a) = 0$, and that this condition is also necessary if $p$ is regular. Equally, if $a$ and $c$ are subcontraries ($a \vee c$ is a logical truth) then $q(c | a) = 0$, and this condition is also necessary if $p$ is regular. It follows that $q(c | a)$ may exceed 0 when $a$ and $c$ are mutually inconsistent. The function $q$ is therefore not a degree of belief (unless a positive degree of belief is possible in a hypothesis that contradicts the evidence). But that does not mean that $q$ may not be a good measure of degree of confirmation. Evidence nearly always contradicts (but not wildly) some of the hypotheses in whose support it is adduced.The falsificationist, unlike the believer in induction, is interested in hypotheses $c$ for which $q(c | a)$ is low; that is, hypotheses whose content extends far beyond the evidence. I shall provide an economic argument (reminiscent of the Dutch Book argument) to demonstrate that $q(c | a)$ measures the rate at which the value of the hypothesis c should be discounted in the presence of the evidence $a$. There has been a lot of interest in how to derive some broadly decision theoretic verdicts concerning deontic modalities and their interactions with conditionals. It is easy to argue that a traditional Kratzer-style premise-semantics needs some revisions in order to get these facts right. The difficulty is how to develop a semantic theory that gets those facts while remaining, as much as possible, 'ethically neutral'. In this talk, I investigate, three ways of going beyond the traditional Kratzer-style premise-semantics. Each successive grade makes more serious use of decision-theoretic machinery.At Grade I, we add sets of mutually exclusive alternatives ('decision problems'). Cariani, Kaufmann and Kaufmann (CKK) developed a version of Kratzer-semantics within the confines of Grade I: I will summarize that proposal, and defend it from some objections, but I will also flag some reasons to go beyond it.At Grade II, we add probabilities to the mix, so that our raw materials are an ordering source, a decision problem, and a probability space (in Yalcin's sense). This is, in my view, the best grade to work at. The core of my talk consists in spelling out the details and benefits of my favorite Grade II semantics.At Grade III, we have decision problems, probabilities and utilities: at this stage we inevitably cross the line and end up with an ethically compromised theory. I will argue we should not go this far. Much of the work in traditional game theory is focused on the analysis of solution concepts (typical examples include the Nash equilibrium and its refinements or the various notions of iterated dominance). A solution concept is intended to represent the "rational" outcome of a strategic interactive situation. That is, it is what (ideally) rational players would do in the situation being modeled. This talk will focus on a key foundational question: How do the (rational or not-so rational) players decide what to do in a strategic situation? This has both a normative component (What are the normative principles that guide the players' decision making?) and a descriptive component (Which psychological phenomena best explain discrepancies between predicted and observed behavior in game situations?). This question directs our analysis to aspects of a strategic interactive situation that are not typically covered by standard game-theoretic models. Much of the work in game theory is focused on identifying the rational outcomes of an game-theoretic situation. This is in line with the standard view of a strategy as "general plan of action" describing what players (should) do when required to move according to the rules of the game. Recent work on epistemic game theory has demonstrated the importance of the "informational context" of a game situation in assessing the rationality of the players' choices. This naturally shifts the focus to the underlying *process* of deliberation that leads (rational) players to adopt certain plans of action.
2019-04-25T04:52:43Z
https://www.philosophy.umd.edu/events/colloquium
Now that we understand that Moses saw the Elohim (God) of Israel in the year 1490 B.Y. (before Yahshua) after he had led the Israelites out of Egypt, it is necessary that we acquaint the reader with certain other facts regarding this Vision. Moses wrote, “and there was under His FEET as it were the paved work of a sapphire stone and as it were the BODY of heaven in His clearness” (Exodus 24:10). Here we see that Moses writes of the Elohim of Israel having feet and a body which proves that he was seeing a supernatural spirit being in the form of a man. Then Moses sees this great anthropomorphic being create ALL things after Himself, including the man, that is, Elohim was the Pattern for everything He created. The Universe in its totality being made up of invisible atoms is fashioned after Him. Each atom is a proton, neutron and an electron corresponding to the three-fold Pattern (Elohim) who is the fullness of the Godhead bodily, namely, the Father, the Word and the Holy Spirit all in ONE. We have already explained to the reader how that Moses also saw this Super Incorporeal Form instantaneously transform itself into a three-fold, intangible Tabernacle which explains the three-fold makeup of the Super Incorporeal Form. This three-fold Tabernacle also is the explanation of the three-fold makeup of everything that is in the Universe, or out of the Universe as far as that is concerned. Yahweh Himself is spirit (John 4:24) and in this state, He is inconceivable, incomprehensible, inscrutable and invisible. Everything abides in Yahweh or Pure Spirit; there is nothing co-existent or co-eternal with Pure Spirit. It is the Source and Substance, the Limits and the Bounds of everything both invisible and visible. This Pure Spirit state of Yahweh can be likened unto a cloud which has no conceivable shape or form; and in this Spirit is encouched the attributes of Intelligence, Wisdom, Knowledge, Beauty, Love, Justice, Power, Foundation and Strength. These attributes become united together in a conceivable shape and form which Moses viewed as the Great Elohim. This Elohim then was Pure Spirit (Yahweh) in shape and form abiding within the vast Pure Spirit substance that was as yet unformed (meanibg: It did not take all of the Pure Spirit substance to form the Super Incorporeal Form of Elohim). Then Elohim creates the physical man, Adam, in His likeness and image; and then some four thousand (4000) years later, Elohim Himself, is manifested in a physical body and walked around in the Universe [the earth plane] that He had created (John 1:14; I Timothy 3:16). This transmutation of Pure Spirit (without shape and form) into a Super Incorporeal shape and form, and then into a physical form, sets up a pattern that the whole Universe testifies of and confirms (the Unity Of The Spirit or supernal nature of Yahweh, also called the Godhead). This is Elohim, the archetye (original) pattern of the Universe. all physical beings were without shape and form at one time. And all of the attributes and physical characteristics that were to make up such human beings were encouched within the grayish white sexual secretions (cloud-like) of the male and female when they come together. These primordial invisible substances are called genes and chromosomes which later come together in an orderly fashion to bring about a shape and form still yet invisible to the naked eye. But later, through the amalgamation of cells, the shape and form becomes visible as a tiny embryo and later a fetus, and then a newborn infant. Every human being born into the world has definitely followed this course of procedure in being born. Not only does everyone follow this three-step conception of first — being without shape and form, later in shape and form; but still invisible to the naked eye, and then in gross shape and form. But each constituent cell, fiber, and tissue making up his developing body is three-fold. Each living cell composing the physical body is made up of a nucleolus, a nucleus, and cell body Exception: mature red blood cells have no nucleus). Then these cells are differentiated according to their position in the developing embryo into endodermal (the inner cell layer), mesodermal (middle cell layer) and ectodermal (outer cell layer) constituting tissues. These tissues then make up organs which are of necessity three-fold according to the type of tissues composing them, and then organs constitute systems of which there are three (3) sets of threes e.g. (1) nervous, endocrine, and reproductive (2) respiratory, circulatory and excretory (3) digestive, skeletal and muscular. These nine systems work harmoniously to constitute the total physical being who then is over-all Spirit, Soul and Body. Man is, therefore, a three-fold being from start to finish and he is definitely and positively fashioned after Elohim, the shape and form of Yahweh. As we deal more and more with the different organs and systems of the physical body, one will find even more evidence of this three-fold nature of man. Let us now turn our attention to a comparison of the three-fold man. Moses was called up into Mount Sinai where Yahweh gave him Divine specifications for building the Tabernacle in the third month after Israel had left Egypt (Exodus 19:1). This third month of the Jews’ sacred calendar year would correspond with the month of June in our Gregorian calendar year. Considering that Moses was in the Mount for forty (40) days and then began to build the Tabernacle and knowing that the Tabernacle was completed and reared up on the first day of the first month of the second year (Exodus 40:17) after the Israelites left Egypt (April 1st), one can see that it was nine months in the building. How beautifully this is correlated to the Tabernacle of our physical bodies that require nine (9) months also to be built by Yahweh in the womb! Furthermore, the Tabernacle that Moses built had three coverings of goat’s skin, ram’s skin dyed red and badger’s skin, and our physical bodies are composed of mainly three layers of skin, subcutaneous tissue and muscle! Moses saw the Vision of the creation for six (6) days while in the cloud that covered the Mount, and he saw Elohim rest on the seventh (7th) day; but Moses was in the Mount for forty (40) days, so that leaves thirty-three (33) days that Elohim was showing Moses all of the generations of the flesh coming out of Adam, and instructing him about the building of the Tabernacle. These thirty-three days were fulfilled (Matthew 5:17) by Yahshua the Messiah tarrying on earth in the flesh for thirty-three years (one day for a year in prophetic time - Numbers 14:34, Ezekiel 4:6). Then when we examine the physical body we find that it has thirty-three vertebrae in the vertebral column — one vertebra for each day that Moses dwelled in the Mount after seeing the Vision of the creation (the 7 days): or one vertebra for each year that Messiah dwelled upon the earth. The Tabernacle of Moses was the backbone of Israel’s faith in Yahweh, and Yahshua the Messiah being our redeemer, is the backbone of our faith in Yahweh. It is the vertebral column that gives man his upright position, and Yahshua is our uprightness in Yahweh. spoke of the twenty-four (24) elders gathered around the throne of Yahweh (Revelation 4:4). These twenty-four (24) elders were the twelve (12) heads of the Tribes of Israel under the Dispensation of the Mosaic Law, and the twelve Apostles in the Dispensation of Grace all gathered around the Messiah who came in to fulfill the Mosaic Law and bring it to an end. Seeing that man is made in the likeness and image of Yahweh, then he must display in his physical body the same situation for he does have the twenty-four ribs, twelve on each side, and all gathered around the vertebral column with its thirty-three vertebrae typifying the Messiah’s thirty-three years in the flesh. Then one must also consider that the whole body of Israel were led by the cloud wherever they sojourned; they did not move unless the cloud moved (Exodus 40:36-38, Numbers 9th chapter). The Spirit of Yahweh dwelled in the cloud. Yahshua the Messiah fulfilled this by His obedience to the Will of His Father in not doing anything except that which was ordained of the Father (Spirit or cloud). He was led of the Spirit (cloud) into the Wilderness of Judea (Matthew 4:1). This same cloud that led the Israelites out of Egypt through the Wilderness of Sinai and on into Canaan Land was the same cloud that dwelled between the wings of the Cherubims which over shadowed the Mercy Seat in the Most Holy Place of the Tabernacle. So when one examines the physical body, he finds that there is a grayish-white substance that fills his cranial cavity or head region which we call the brain. And it is divided into a right and left half corresponding to the two cherubims of glory on either side of the Ark. And it is from the brain that man receives his orders to move, or think or do anything; so we also are by a cloud throughout our journeying in this Wilderness below (this earth plane). We will now show the correlationship of the Mosaic Tabernacle with the anatomy and physiology of our physical body. Please keep in mind that the physical Tabernacle which Moses built in the Wilderness of Sinai is an exact copy of the Spiritual Tabernacle which he saw in the Vision in Mount Sinai. Therefore, when we speak of the physical component parts of our physical body and compare them with the structures in the Mosaic Tabernacle, we are speaking always of the spiritual things that these structures stand for. For instance, when we speak of the physical heart and compare it with the physical Table of Shewbread, we are really speaking of that Spiritual sustenance or bread which is Yahshua the Messiah. All things of the Mosaic Tabernacle and our physical body (in fact, all natural things) point to the Messiah or Yahweh; and He (the Messiah) is the fulfillment of all of them. This discourse will be of no effect if one does not keep in mind that it is relating to and concerning spiritual things at all times. If you, the reader, will refer to the chart entitled, “Man Made In The Image of Elohim By The Pattern Of The Tabernacle,” you will be able to follow the correlative explanation of the structure and function of the Mosaic Tabernacle with the anatomy and physiology of man’s body. The illustration on the left is the Mosaic Tabernacle; the illustration in the center of course, is the physical body with the head, chest and abdominal cavities exposed showing the positioning of the internal organs. The illustration below shows an interchanging of the organs of the physical body with the furnishings of the Mosaic Tabernacle to unmistakingly show the detailed and polytechnical comparison. each corresponding number denotes the same structure in each illustration and the numbers (denoted by #) will be inserted wherever necessary throughout our discourse so as to not break the continuity of thought. #1 - Is the Most Holy Place of the Mosaic Tabernacle. #2 - Shows the two Archangels or Cherubims of Glory over-shadowing the Mercy Seat with their wings touching in the middle. #3 - Illustrates the Cloud dwelling between them and above the Mercy Seat. The Cloud denotes the dwelling place of Yahweh (Exodus 25:22) and the large eye signifies His ever presence and attention to the deeds of man (Proverbs 15:3). In the Ark of the Covenant beneath the Mercy Seat, (#4) one sees the two tables of the Mosaic Law placed therein. (The door in front is just for the purpose of illustrating the two tables of the commandment Law). Actually there was a lid on top which formed the Mercy Seat. These two Archangels represented Michael, a warrior who was always sent to carry out some action for Yahweh, and Gabriel who was sent to deliver messages (Jude 9; Revelation 12.7 K.J.V; Daniel 8:16; Luke 1:26). Furthermore, the invisible presence of Yahweh in the Cloud was signified by the manifestation of the Shekinah (which really was a vision of Elohim seen by the High Priest on the Day of Atonement). #1 - The cranial or head cavity of man’s physical body corresponds with the Most Holy Place of the Mosaic Tabernacle. #2 - The right and left halves of the brain which come together in the mid-line corresponds with the two Archangels, and the two main functions of the brain. One in carrying out some action (motor function) corresponds to the duties of Michael, and two, the sending and receiving of messages (sensory function) corresponds with the duties of Gabriel. #3 - The brain itself is composed of gray and white matter likened unto the Cloud which over- shadowed the Mercy Seat, and it is by means of our brain that we are in touch with, and minutely aware of everything going on around us. It is really like one great big Cycloptic Eye in our heads, (even the two eyes see as one eye). The Pineal gland located in the center of the Brain was likened unto a Cycloptic Eye by the Ancients, or Greek Mythologists and also was thought to be the seat of all sensations. #4 - The two Lobes of the Pituitary Gland (the master gland of the body) corresponds to the two tables of the Mosaic Law, and they are placed in a bony receptacle in the base of the brain and are covered over by a covering just as the Lid covered the Ark of the Covenant. In our diagram on the right,( in the mouth of the man) you will see the word LAW. This is to show the close approximation of the pituitary gland to the roof of the mouth, and it is out of the mouth that the LAW proceeds. Malachi wrote: “The law of truth was in his mouth” (Malachi 2:6). The Vision of the Shekinah seen in the Cloud in the Most Holy Place of the Tabernacle can be correlated with the configuration of the blood vessels supplying the brain which take the shape of a stick- figure of a man (symbolizing Elohim). #5 - The Second Vail of the Mosaic Tabernacle divides the Most Holy Place from the Holy Place, and it is blue, purple and scarlet in color. This corresponds with the neck of man’s physical body which divides the head or cranial cavity from the chest cavity. All the blood vessels passing into the head cavity are gathered together in the neck in one great profusion, the veins (colored blue to denote impure blood), the arteries (colored red or scarlet to denote pure or oxygenated blood), and the presence of the iodine filled thyroid gland (iodine means violet or purple) denotes the purple of this dividing Vail of the neck. #6 - In the Holy Place of the Mosaic Tabernacle, one sees the High Priest standing at (#7) the Golden Altar of Incense burning incense which consisted of four principle ingredients called stacte, onycha, galbanum, and frankincense, which were sweet odoriferous spices (Exodus 30:34-38). This Incense perfumed the entire Tabernacle and ascended through the second Vail into the Most Holy Place where Yahweh dwelled in the Cloud above the Mercy Seat, and was a sweet smelling savor to Him for it represented the intercession made by the Holy Ghost (Elohim) to the Father (Yahweh). #8 - The seven branched Golden Candlestick (lampstand) can be seen on the left in the Holy Place where it gave Light unto the Sanctuary so that there was never any darkness there. It was extinguished at nine o’clock in the morning, when the daylight illuminated the Sanctuary; it was trimmed and made ready for the re- lighting at three o’clock in the afternoon when daylight began to fade; and it would burn all through the night until the next morning. All of the seven branches of it proceeded out of the main stem on either side, and it was filled with oil from the main stem. Shewbread which was kept ever present for him. This was his daily sustenance as well as the meat offering and drink offering of which he partook. Comparing the Holy Place of the Tabernacle with #6, the chest cavity of the physical body one finds (#7) the lungs serving the same capacity or function as the Golden Altar of Incense. To be real polytechnical, one finds that the larynx situated above the windpipe or trachea has two superior cornu (Horns) and two inferior cornu just as the Golden Altar of Incense had four horns on it - one at each corner. The air which we breathe is composed mainly of four ingredients, nitrogen, oxygen, carbon dioxide and hydrogen, (as aqueous vapor) which corresponds to the four principle ingredients of the incense burned on the Golden Altar of Incense. Yes, and air or oxygen is burned in our bodies for the process of oxidation which is the uniting of oxygen with other substances in a burning process. It need not be said that breathing of good fresh air is a sweet smelling savor unto all of the tissues of the body, and that it fragranizes all of the body just as the Incense did the Tabernacle. The brain corresponding to the cloud where Yahweh dwelled is especially expectant and desirous of this air or oxygen; as it is the most vulnerable of all the body tissues when it comes to oxygen lack (remember the incense wafting through the second Vail into the Most Holy Place). Let us remind the reader at this point that Yahweh forbade anyone to duplicate the Holy Incense and only the High Priest knew how to make it (Exodus 30:37-38). Doesn’t this compare beautifully with the fact that NO ONE has yet been able to determine the exact composition of Air which only Yahweh knows! #8 - The seven branched Golden Candlestick (lampstand) corresponds with the Aorta, that great blood vessel which comes off the heart and has just seven (7) branches which distribute oxygenated blood to all the body. Note — We shall designate the seven branches of the Candlestick by letters to differentiate or distinguish from our regular use of numbers. (a) The innominate artery coming off of the arch of the aorta typifies the main stem of the candlestick and it gives off (b) the right common carotid and (c) right subclavian arteries; (d) the left common carotid and (e) left subclavian also come off at the arch of the Aorta; while the (f) right and (g) left coronary arteries come off of the ascending Aorta. The descending Aorta in its thoracic portion gives off numerous branches which are too small to diminish its size. The blood circulating through this great vessel, the Aorta, gives life unto the whole body continuously day and night just as the oil burning in the Golden Candlestick furnished continual light unto the Tabernacle. Even the flickering of the light of the candlestick can be likened unto the pulsation of the Aorta and its branches. #9 - The Golden Table of Shewbread compares with the four-chambered heart. As the Golden Candlestick was placed on the one side of the Holy Place, and the Golden Table of Shewbread on the other side, so is the heart placed more to the left side and the Aorta more to the right side of the body. The four chambers of the heart compares with the four corners of the Table of Shewbread. The bread placed in two stacks on the table signifies the two halves of the heart, the right and the left. The golden crown around the border of the Table corresponds to the coronary (which means crown) vessels encircling the heart, and the heart is truly one’s daily bread for it is by the constant beating of the heart that life is sustained. #10 - The First Vail separated the Holy Place from (#11) the Outer Court, and entry was by the door seen in our diagram on the left. Immediately before the door is (#12) the Brazen Laver which contained water for washing the sacrificial animals before placing them on (#14) the Brazen Altar of sin offering which is located just inside (#15) the Gate of the Outer Court (the East end of the Court) . The Brazen Laver had a foot or pedestal on which it stood, and the Brazen Altar was a four-cornered furnishing with a horn on each corner where blood was placed during the sacrificial ceremonies. Over the head of the High Priest is pictured a vessel containing (#13) the Holy Anointing Oil which was poured on the head of the Priest, and signified anointing by the Holy Spirit or Quickening. In our diagram on the right, one can see that (#10) the Diaphragm forms the First Vail and separated the chest cavity from (#11) the abdominal cavity which is the Outer Court of the physical body and that (#12) the two kidneys which are ordinarily located in the right and left flanks of the body are brought together to form a perfect configuration of the Brazen Laver. One might ask the question, WHY then are they (the two kidneys) separated in the physical body? It is to prove conclusively that Yahweh did divide the waters of the Red Sea for Moses and the Israelites, for the kidneys with water therein represent the Red Sea and the Brazen Laver. (The reader will find a fuller explanation of this under the subject of the Excretory System and the Pattern). The sides and foot of the Brazen Laver are formed by the two ureters descending from the kidneys and the urinary bladder where the urine is held until passage. The protuberances above each kidney represents (#13) the Adrenal Glands which contain the substance adrenaline which quickens the various muscles and other tissues of the body just as the Holy Anointing Oil did the High Priest. The picture-frame configuration of the Large Intestines represent the Brazen Altar, and the small intestines where most of the food is digested (burned) are located within this frame-work. The food thus becomes the sacrifice which is burned on the Altar. The Gate of the Outer Court corresponds with (#15) the rectal opening by which all solid waste products of digestion are eliminated, just as the skin, hair, and other portions of the sacrificial animals were taken without the camp and discarded or burned. The bone structure of man’s physical body represents the pillars, bars and boards which were the supporting structures of the Tabernacle. The Tibia bone in the leg or Femur bone in the thigh are good examples of a pillar which made up the Tabernacle; the flat bones such as the Scapula, and bones of the Skull are good examples of boards of the Tabernacle; whereas the short, stubby bones as the Metacarpal bones of the hand, the Metatarsal bones of the foot are good examples of the bars of the Tabernacle. This then has been a polytechnical comparison of the Mosaic Tabernacle with the Tabernacle of man’s body. But please bear in mind that the physical or visible things point to the invisible or spiritual things (Romans 1:19-20). Yes, Yahshua the Messiah was a physical man just like you or I; but, He was really Yahweh who is Spirit manifested in a visible form. Therefore, all of the component parts or members of our physical body are physical expressions of Spiritual things, such as: Intelligence, Wisdom, Knowledge, Love, Beauty, Justice, Foundation, Power and Strength (nine major ones only) which are the Divine Attributes or members which make up the Spiritual Super Incorporeal Body of Elohim. In summation: let me say that this simple Yahweh given Pattern not only fits the physical body, but everything in the cosmographical make-up of this Universe. The smallest bit of matter that man has any knowledge of, the Atom, is basically composed of a Proton, Neutron and Electron, corresponding to the Most Holy Place, Holy Place and Outer Court of the Mosaic Tabernacle. And the Scientists to date have found only nine classifications of sub-atomic particles which make up the Atom, which further compares with the nine furnishings of the Tabernacle (the Ark of the Covenant with two (2) Archangels, one on either side, being made of one-piece was a threefold oneness (3 = 1) furnishing in the Most Holy Place; the Golden Altar of Incense, Table of Shewbread, and Golden Candlestick were the three furnishings in the Holy Place; and the Brazen Laver, Holy Anointing Oil, and Brazen Altar of Sacrifice were the three furnishings in the Outer Court). Let us re-state that the minute Cell whether animal or plant is three-fold, being composed of a nucleolus, a nucleus and cell body. ALL matter is either a gas, liquid or solid; so no matter which way one turns, this Divine Pattern has the situation covered. WHY? Because the pattern is Elohim Himself, for He is the Archetype or Original Pattern of Everything; and the Pattern proves His existence and manifests His ETERNAL PURPOSE operating throughout the Dispensations and Ages. of Yahweh, and the Tabernacle is the less glorious structure which represents the physical man or Yahshua the Messiah. However, as the Super Incorporeal Elohim and the Intangible Tabernacle are one and the same, so is the Temple and Tabernacle the same. If therefore, the man is a physical Tabernacle he is also a physical Temple. So, after the Israelites had built the physical Tabernacle and had followed it around and finally came to Canaan Land, they had to build a more glorious edifice or building known as Solomon’s Temple which they constructed in Mount Moriah. The Pattern of this Temple was given to David in a Vision by Elohim passing His hand over David’s physical body and showing him how to build the Temple by his own physical anatomy and physiology (as a king sitting on his throne). David wrote about this thusly, “All this," said David, Elohim made me understand in writing by His hand upon me, even all the works of this Pattern” (1 Chronicles 28:19). Elohim, the Immortal King in Heavenly Jerusalem just laid His Super Incorporeal Body over David’s physical body (David being King in the earthly Jerusalem) in a Vision and made him to know how to build the Temple which specifications he passed on to his son, Solomon, who built the Temple. After the Temple was constructed, then the weather-beaten Tabernacle which stood out on Mount Zion was dismantled and all of the furnishings were moved into the Temple just as Moses had seen it drawn out of the Temple in his Vision. The Apostle Paul, speaking of this wrote, “For we know that if our earthly house of this Tabernacle were dissolved, we have a building of Elohim (the Temple) an house not made with hands, Eternal in the Heavens. For in this (our physical Tabernacle) we groan earnestly desiring to be clothed upon with our house which is from heaven” (2 Corinthians 5:1-2). And the Apostle Peter wrote in this manner, “Yea, I think it necessary, as long as I am in this Tabernacle, to stir you up by putting you in remembrance; Knowing that shortly I must put off this my Tabernacle, even as our Saviour Yahshua the Messiah hath showed me” (2 Peter 1:13-14, H.N.B. - when Yahshua took off His physical body or transfigured in Mount Transfiguration, Matthew 17). So when we examine Solomon’s Temple we find that it was built on Mount Moriah and one had to go up into the Temple from one part to another. It was a three-fold structure just as the Tabernacle, being composed of a Porch (Outer Court), a Sanctuary (Holy Place) and an Oracle (Most Holy Place). The Porch was at the lowest level, the Sanctuary was higher up, and the Oracle was at the highest part of the Temple. The whole structure was fashioned like unto a man sitting on a throne. The two Great Pillars (Joachim and Boaz) that flanked the entrance to the Porch are likened unto the legs of a man in a sitting position. The Porch itself would be likened unto his thighs, the Sanctuary would be likened unto the region of the hips to the neck, and the Oracle with its rounded dome would be likened unto the head region of a man. And the Temple being overlaid with gold without and within pertains to the glorious excellence of the Spiritual Edifice or Body, the inner cavities of man’s physical body is lined also with a glistening gold appearing layer depicting the excellence of the inner man or the Soul. In confirmation of all that Moses SAW in his Vision, the Apostle John (shown on the inner cover) was on the Isle of Patmos as a witness, and he described the same Super Incorporeal Form of a man that Moses SAW, and he likened it unto the Tabernacle. His description of this Man (Elohim) fits the Tabernacle exactly. He said that he SAW One like unto the Son of Man clothed with a garment down to his feet, (likened unto the coverings of the Tabernacle), and girt about the paps with a golden girdle (likened unto the vessels of gold in the Holy Place and Most Holy Place). John further said that his head and his hairs were white like wool, as white as snow (likened unto the cloud above the Mercy Seat in the Most Holy Place) and his eyes were as a flame of fire (likened unto the Shekinah or glorious image of Light that the High Priest witnessed in the Most Holy Place in the Cloud); and his feet like unto fine brass (likened unto the vessels of brass in the Outer Court of the Tabernacle), as if they burned in a furnace (likened unto the Fire on the Brazen Altar in the Outer Court). right hand upon him (Revelation 1:8-18, H.N.B., 1:7-18 K.J.V.). Thus, John confirms Moses’ description of the Super Incorporeal Form transforming itself into an Intangible Tabernacle, and he describes it as a Man. John further stated that he was given a REED like unto a ROD and was told to rise and measure the Temple of Yahweh, and the Altar (Altar of Sacrifice) but to leave out the Court Without (Revelation 11:1-2; 21:15-17 K.J.V.). And that is exactly what we are doing in this treatise for we are measuring and comparing the Temple and Tabernacle or the Divine Pattern or the Rod with man’s physical body, but since we understand that the physical things are only types and shadows of the Spiritual things, we leave out the flesh or the Court Without. The Apostle John also spoke of seeing the Temple of the Tabernacle of Yahweh opened in Heaven, and the Temple was filled with smoke from the Glory of Yahweh, and from His Power, and this perfectly fits Moses’ seeing Elohim breathe into the nostrils of Adam the Breath of Life (smoke) and he became a Living Soul, typifying the inner man (Revelation 15:5-8). John furthermore witnesses the crucifixion of Yahshua the Messiah (the fleshly Tabernacle or Temple) at age thirty-three (33) years, just as Moses witnessed Yahweh telling him how to construct the Tabernacle and how it was to function throughout the remaining thirty-three (33) days of his Vision in the Mount after he had witnessed the Creation of the Universe in six (6) days and SAW Yahweh rest on the seventh (7th) day, he was in the Mount a total of forty (40) days. Likewise, Solomon’s Temple stood unmolested for thirty-three (33) years before it was pillaged by Shishak from Egypt. Hence, man’s physical body has thirty-three (33) vertebrae which cause him to stand erect or upright in the eyesight of Yahweh. And as He picked twelve (12) disciples to minister with Him who functioned in the Dispensation of Grace (the Apostles) in fulfillment of the Twelve (12) Heads of the Tribes of Israel who were gathered around the Tabernacle in the Wilderness; hence, the Apostle John spoke of the twenty-four (24) Elders around the Throne of Yahweh (Revelation 4:4). Therefore, the physical man must have twelve (12) ribs on one side of his body and twelve (12) ribs on the other side of his body, making a total of twenty-four (24) ribs gathered around the vertebral column. Spirit and who accordingly make up the Spiritual Body of Elohim. The gold being pressed into these carved figures of angels, and overlaying them with gold, represents the taking on of the glorified and immortal body that all who believe will receive instantaneously at the appearing of Elohim, whom all mankind will see--both dead and alive. And the Apostle Paul wrote, “For our citizenship is in heaven; from whence also we are expecting our Saviour King, Yahshua the Messiah; who shall change our vile body, that it may be fashioned like unto His glorious body, according to the working whereby He is able even to subdue all things unto Himself” (Philippians 3:20-21).
2019-04-23T06:08:33Z
http://www.lovescreativedesigns.com/studyhall/id25.html
Katia Ricciarelli, a lyric soprano voice with an individually sweet timbre, and a lovely stage presence that complemented her voice. She was one of the most touching Giuliettas (I Capuleti e i Montecchi), Desdemonas, and Anna Bolenas on the operatic stage, and had a special affinity for Rossini’s music, enjoying great success in such roles as Bianca (Bianca e Falliero), Elena (La donna del lago), and Amenaide (Tancredi). She came from a very poor family and after graduating from school, worked to afford the time and money to study at the Benedetto Marcello Conservatory in Venice, where she worked primarily with Iris Adami Corradetti. She made her operatic debut as Mimì in Puccini’s La bohème, in Mantua, Italy. Her appearance in Cherubini’s Anacréon the next year in Siena created a small sensation, followed by a greater one when she won the Parma Verdi competition, followed in 1971 by her winning the Voce Verdiane competition. Largely on the strengths of these triumphs, in 1972, she debuted at the Lyric Opera of Chicago as Lucrezia in Verdi’s I due Foscari, and at the Rome Opera as Verdi’s Giovanna d’Arco. In 1974, she made her Covent Garden debut as Mimì. Her Met debut was also in La bohème in 1975, and her La Scala debut was in 1976 as Suor Angelica in Puccini’s Il trittico. Like many singers, her voice became larger as she matured, allowing her to take on such roles as Verdi’s Desdemona and Luisa Miller. Guided by Karajan, in the early 1980s, she began to sing roles that were considerably more dramatic, such as Tosca, Aida, and even Turandot (though only in the recording studio.) She also appeared as Desdemona in the 1986 film of Otello with Placido Domingo, directed by Franco Zeffirelli. In 2005 she won the best actress prize Nastro d’Argento, awarded by the Italian film journalists, for her role in Pupi Avati’s La seconda notte di nozze. In 1991 she founded Accademia Lirica di Katia Ricciarelli, and, since 2003, she has been Artistic Director of the annual summer Macerata Opera Festival. Born in Milan, baritone Armando Ariostini began his studies with Lia Guarini, then continued at the “School for opera artists of the Teatro alla Scala” under the guidance of Masters Edoardo Muller, Giulietta Simionato and Gina Cigna. In this period he was a finalist and winner of numerous international competitions including “Voci Verdiane” in Busseto, “Maria Callas” organized by RAI, “Laboratorio Lirico” of Alessandria and “Achille Peri” in Reggio Emilia. In 1984 he performed the role of Einstein in the Pipistrello at the Teatro La Fenice in Venice, where he returned, following the great success, in numerous other productions: From a house of the dead (Siskov), La Bohéme (Marcello), Crispino and Comare (Fabrizio), Theatrical conveniences and inconveniences (Prospero and Procolo), The mad pretend of Sacrati, Beatrice di Tenda (Filippo), The Merry Widow (Danilo) and recently the Carmina Burana (with the realization of the CD in favor of reconstruction of the Theater). Ranging from the classical-operatic repertoire to the operatic and modern repertoire, from comic to dramatic roles, thanks also to the strong qualities of singer-actor, Armando Ariostini has been invited to important theaters and festivals in the world and has worked with directors, directors and singers of international fame: at the Teatro alla Scala (Carmen at the inauguration of the 1984/85 season under the direction of Claudio Abbado and directed by Piero Faggioni, Journey to Reims again with Claudio Abbado and directed by Luca Ronconi: The fall of the house Usher, Pollicino, Les Noces and finally protagonist in L’occasione do the thief with the direction of Daniele Gatti and the direction of Ponnell), in Buenos Aires, the Staatsoper and the Bayerischer Rundfunk of Monaco, Bordeaux, in Avignon and in Genoa in the role of Figaro del Barbiere di Siviglia (“the Figaro of Ariostini shines to the point of making all the Figari in the world second”, Suddeutsche Zeitung), in Santiago de Chile in Manon Lescaut and Faust, at the Opernhaus in Zurich in Bohéme, Elisir d’amore, and next to the Gruberova in Linda in Chamonix. Among the approximately 85 roles performed by Ariostini we can count some works, performed as a protagonist, in the world premiere as: Il Viaggio by Fabio Vacchi, The broken pitcher by Flavio Testi, The cat with boots by Marco Tutino and The banquet by Marcello Panni. His recordings are numerous. In Monte Carlo for the Grand Gala of Prince Ranieri he sang with Katia Ricciarelli in Susanna’s Secret and subsequently was a guest of honor next to Placido Domingo. Among the latest important commitments we mention: Cinderella (Dandini) with great success in Sao Paulo, Pagliacci in Baltimore and Catania, Carmina Burana in Verona and Santa Cecilia, Fedora (De Ciriex) with Daniela Dessy and Placido Domingo at the Opera in Rome , Turandot (Ping) in the important production of Hugo De Ana at the Caesarea Festival in Israel and at the National Theater of Tokyo and Baltimore, One day of reign in Bologna, The Banquet in Genoa, Florence, Rome, Lady in the dark with Raina Kabaiwanska in Rome. She has just finished shooting the film Tosca and two others (in the role of Scarpia) which will participate in the Berlin Festival. Adrian Sylveen enjoys a performing career both in the United States and in Europe. He is a founder and the artistic director of the Connecticut Virtuosi Chamber Orchestra, the Connecticut Lyric Opera Company, and the Classical Orchestra of Pila in Poland. From 2011 to 2013 he was a conductor for the Magnum Opus series with the New Britain Symphony – The Connecticut Virtuosi. He was also a frequent guest conductor with several leading Polish orchestras, including Olsztyn Philharmonic, Elbląg Chamber Orchestra, and others. He is also a founder of the newly formed, Hartford based Moniuszko Choir (2016). Since 2012 Adrian Sylveen is on faculty of the Virtuosi Summer Music Institute at Tunxis College in Farmington, Connecticut, and, since 2015 a director of the Greve Opera Academy and Chamber Music Festival in Greve-In-Chianti, Italy. In his career so far Adrian Sylveen has conducted approximately 35 operatic titles, more than 70 symphonies, and numerous concertos and chamber orchestral music works, with special emphases on music of Italian and Slavic heritage. An active violin soloist as well as conductor, he has conducted and performed concerts in United States, Poland, Italy, Israel, Switzerland, Germany, and former Soviet Union. Adrian Sylveen collaborated with many exceptional artists such as Brunilda Myftaraj, Eckart Lorenzen, Luca Rinaldi, Theodore Arm, Jurate Svedaite, Carl Tanner, Jorge Pita Carreras, Michael Wade Lee, Steven Frederiks, Neal Larrabee, Dmitri Novgorodsky, Rafael Lewandowski, Andre Anweiler, Martin Bresnik, Jadwiga Kotnowka, Marzena Diakun, Grzegorz Dabrowski, Daniel Borowski, Thomas A. Labadorf, Michael Gatonska, Volcan Orhon, Robert DeMaine, and many others. Adrian Sylveen holds Master and post-Master degrees from the Yale University School of Music, where he studied with Prof. Erick Friedman, Peter Oundjian, and other members of the Tokyo String Quartet, and Paderewski Music Academy in Poznan, Poland (diploma with distinction) in the class of Prof. Jadwiga Kaliszewska. His other earlier important teachers were Barbara Schwartz, Jerzy Hazuka, Thaddeus Kochański. Adrian Sylveen is a winner of prizes at competitions in Poland and in the United States, and had participated in several international Festivals such as Weimar, Łancut and others. He received the American Council for Polish Culture award (“for his eminent performances as conductor and violinist in U.S and Europe”), “Primus Inter Pares” Award given by the President of the Republic of Poland. He was awarded permanent US residence for “Extraordinary Abilities in the Arts”. Possessing a vocal artistry and stage presence capable of “transfixing audiences with moments of opera magic,” Lithuanian soprano, Jūratė Švedaitė, has performed throughout Europe and the United States with the Lithuanian National Chamber Orchestra, Connecticut Lyric Opera, Eastern Connecticut Symphony Orchestra, Connecticut Virtuosi Chamber Orchestra, Kaunas (Lithuania) Chamber Orchestra, Classical Orchestra of Piła (Poland) and the Lithuanian National Ensemble “Lietuva” among others. On the stage, Ms. Švedaitė has performed more than 20 leading roles including Cio-cio San in Madama Butterfly, the diva Tosca, Violetta in La Traviata, Mimi in La Bohème, Contessa in Le Nozze di Figaro, Donna Anna in Don Giovanni, Desdemona in Otello, Senta in Die Fliegende Hollander, Marguerite in Faust and Micaela in Carmen. An active perfomer of sacred works and oratorios as well, her credits include Bach’s Mass in B minor, Mozart’s Requiem, Brahm’s Ein Deutsches Requiem, Verdi’s Requiem and Orff’s Carmina Burana. The granddaughter of one of Lithuania’s most revered composers and arrangers of traditional music, Jonas Švedas, Ms. Švedaitė attended the Lithuanian Music Academy where she earned Bachelors and Masters Degrees in Opera Performance and Vocal Instruction. She now resides in Southeastern Connecticut where she an Assistant Professor at Connecticut College. Hailed for his “robust” singing with “great emotional depth” Steven Fredericks has made his mark with some of opera’s most celebrated roles. Fredericks’ impressive repertory spans all styles and represents his versatility as a performer. From favorite Puccini roles, Colline and Timur, to the most heroic of Wagner’s characters, he continually explores all dimensions of his talents. Recently, he sang Dr. Bartolo in Le Nozze di Figaro with Salt Marsh Opera, the title role in Wagner’s Der Fliegender Holländer and Tod in Viktor Ullman’s Der Kaiser von Atlantis with Connecticut Lyric Opera, Boïto’s Mefistofele with Taconic Opera and Beethoven’s 9th Symphony with The Mineola Symphony. Mr. Fredericks was heard as the bass soloist in Handel’s Messiah at Carnegie Hall, Strommenger in La Wally with Teatro Grattacielo at Allice Tully Hall conducted by Guido Ajmone-Marsan, Reinmar in Tannhäuser with The Baltimore Opera conducted by Christian Badea and Ferrando in Il Trovatore with Maestro Anton Coppola. He has frequently appeared with Maestro Vincent La Selva and the New York Grand Opera in Central Park, New York City. Internationally, he has performed with The Chuvash State Theatre (Russia) as Sparafucile in Rigoletto, and the Herald in Lohengrin, Paris/Saone-et-Loire (France) where he also appeared as soloist in Beethoven’s 9th Symphony. Notably, Fredericks created the role of Signorelli in the world premier of Louis Gioia’s Un Racconto Fiorentino at Alice Tully Hall, Lincoln Center and he sang the role of Filippo in a highlighted version of Don Carlo at the 1997 Opera America Convention in Philadelphia. “With a velvety tone and a stage presence which exudes confidence and charm…”, Mark Thomson Ketterson of OPERA NEWS declared of his principal debut with Lyric Opera of Chicago as Dandini in La cenerentola,“…baritone Levi Hernandez’s intelligent Dandini displayed a most impressive knack for subtle text-painting within a pristinely negotiated coloratura line…” Baritone Levi Hernandez has appeared with many of the opera companies in the U. S. from Opera Philadelphia and Boston Lyric to San Francisco Opera, Los Angeles Opera, Houston Grand Opera, Opera Theater of St. Louis, Chicago’s Lyric Opera where he completed three years as an artist in the Ryan Opera Center, The Metropolitan Opera, El Paso, San Antonio, Memphis, Nashville, Omaha, Minneapolis, Virginia, and Arizona Opera and internationally at Teatro Nacional Sucre in Quito, Ecuador as well as Komische Oper in Berlin, Germany. His summer festival credits include Bard Music Festival, Opera North, Charlottesville Opera and the Spoleto Festival. Recent performances include Sharpless in Madama Butterfly with both Arizona Opera and Chattanooga Symphony, Handel’s Alexander’s Feast with Music of the Baroque and The Messiah with The Apollo Chorus of Chicago. His 2017-2018 season included Ford in Falstaff with Intermountain Opera, Marcello with Colorado Opera, Inspector Kildare in Elizabeth Cree with Chicago Opera Theater, and Alvaro in Florencia en el Amazonas with San Diego Opera and Madison Opera. The 2018-2019 season sees him as Rambaldo in La rondine with Minnesota Opera, Rabbi Lampert in Enemies, A Love Story with Kentucky Opera, Sharpless with Virginia Opera, and Pa Joad in The Grapes of Wrath with Michigan Opera Theatre.The El Paso, Texas native is a graduate of Westminster Choir College (BM), the University of North Texas (MM), the Academy of Vocal Arts, and the Chicago Lyric Opera Ryan Center. Since 1988 Paolo Bellocci is Maestro Collaboratore at the Opera di Firenze-Maggio Musicale Fiorentino and professional exepert in Italian Opera repertoire. He has gained long-standing experience as piano coaching in collaboration with famous international lyric singers such as Fedora Barbieri, Margherita Rinaldi, Gino Bechi. He holds Master Classes of repertoire, interpretation and vocality of Italian Opera for Universities and prestigious Institutions, Academies and International Music Conservatories, among which St Petersburg. He contribuites to several projects for young singers, such as International Young Artists Project, North Carolina University, Meredith College and many others. Artistic Director and Vice-President of Opera Network Firenze, he manages several activities: high level education in opera perfomances and Italian Language School for international musicians in cooperation with “Università per stranieri di Perugia”. Since April 2015 he is Coordinator of Educational Agency commissioned by Regione Toscana of the Fondazione Festival Pucciniano. He took part in the organization and production of important events, such as the concert for the World Summit of Nobel Prizes in Rome 2004; the concert in collaboration with the Headquarter of Carabinieri Corp and Rotary Medicea at the Teatro del Maggio Musicale Fiorentino; lyric concerts in St Petersburg at Marijnskj Palace, Kovatchina Palace, Hermitage Museum during Michelangelo exposition, in cooperation with Italian Ministry for Culture and Italian Consulate. In 2013 he organized the concert in honour of the President of Italian Republic Giorgio Napolitano, and Pope Benedict XVI in Vatican , with Zubin Metha conducting the Maggio Orchestra. Among other important concerts can be mentioned: at the Czar’s Residence “Carskoe Selo”, together with the Music School in Fiesole; in Moscow at the “Novaja Opera” Theatre with young Italian singers and the Russian orchestra; lyric and symphonic concerts in Romania, Australia, the Damascus Concert celebrating the 60th Anniversary of the Unicef World Foundation, for which he received an award for cultural commitment at the United Nation in New York. He is artistic consultant for many International Institutions such as the Holy See, the UNICEF Office in New York, the Municipalities of Florence, Moscow and St Petersburg, the Health System of Tuscany, the Ministry of Education, University and Research, the Institute for Italian Culture in New York, the Office of Regione Toscana in Bruxelles and others. He is often a jury member in international music and lyric contests like “Zandonai” in Riva del Garda, the “Crescendo Prize” 2010 in Florence; he is also constantly present in artistic committees for the selection of young artists. He was invited several times in the 5th European Commision SPA3 in Bruxelles by Regione Toscana, and also to explain the results of “Palcoscenico 1” Project. On 4th June 2011 Paolo Bellocci was honoured the title of Accademico at the 46th International Prize “Le Muse” in the Salone dei Cinquecento, Palazzo Vecchio, Florence. Within Fondazione Maggio Musicale Fiorentino-Opera di Firenze, he was also teacher and Artistic Coordinator of Maggio Fiorentino Formazione for more than10 years. He has been working on the production of operas and ballets, together with the greatest orchestra leaders such as Zubin Mehta, Riccardo Muti, Claudio Abbado and stage directors like Luca Ronconi, William Friedkin, Zhang Yimou, Lev Dodin, Graham Vick. He took part in the most important tours of the Foundation, among which the memorable one in Bejing in 1998 with Turandot in the Forbidden City; he was in Tokyo in 2001, 2006 and 2011 at the Bunka Kaikan and NBC theatres and at the Yokohama Opera House; in Germany at the Recklinghausen Festival and many others. A graduate with the highest honors from the Conservatory of Fine Arts in Tirana, award-winning Albanian-American violinist BRUNILDA MYFTARAJ is currently concertmaster of the Connecticut Virtuosi Chamber Orchestra, the Connecticut Lyric Opera, and the International Greve Opera Academy in Italy. She is also the director of the Virtuosi Music Academy and the Summer Music Institute in Farmington, Connecticut, where she also teaches violin and chamber music. A student of, among others, Piero Faulli of the Quartetto Italiano, Eugene Drucker and Philip Setzer of the Emerson String Quartet, and famed violinist Rafael Druian, Myftaraj has performed as soloist with the Hartford Symphony Orchestra, the Farmington Valley Orchestra, and on several occasions with The Connecticut Virtuosi Chamber Orchestra. An avid chamber musician, Brunilda has presented recitals at the Piano and Friends Chamber Music series in Tucson, Arizona, Mostly Mozart series in Napa Valley, the Schubert Club in Minneapolis, Performers of Westchester, and many other venues. She also performed concerts and recitals in Italy, Poland, and Israel. In 2013, Brunilda Myftaraj recorded an album for Virtuosi Records title “Naked Violin,” containing a program of works for unaccompanied violin by Bach, Ysaÿe, and Prokofiev; Brunilda is putting the finishing touches on a new album, titled “The American Pie,” to be released soon. That album will contain works by Ives, Gershwin, Bernstein, Amy Beach, and Paul Schoenfield. Italian violinist LUCA RINALDI is a winner of several important competitions: International Competition of Stresa, International Competition of Capri, European Competition of Moncalieri, a National Competition of Macerata, National Competition of Meda, National Competition of Savona, National Competition of Genoa, and others. As a soloist and violinist has performed many concerts in Italy and Germany, Switzerland, Mexico, Malta, and appeared frequently with the Florentine Chamber Orchestra, The Knights of Grosseto Orchestra, The Orchestra of the Chapel of the Cathedral of Fiesole, The Orchestra Rinaldo Franci Siena”, and others. He has studied violin at the “Cherubini Conservatory”with Maestro Giorgio Ballini. He later attended the master classes of S. Mattresses, Zanettovich R. and C. Rossi. Also devoted to chamber music Luca Rinaldi has attended courses with the Trio di Trieste at the Accademia Chigiana di Siena, and at the Music School of Fiesole obtaining scholarships and awards, including the Gengaroli Award for the best chamber music performance. Luca Rinaldi is a professor of violin at the Institute of Musical Studies R. Franci in Siena. Douglas Lemke has studied the double bass since the age of six, and currently holds three degrees in performance, two from The Hartt School and one from Penn State University. He has performed with various orchestras and ensembles throughout the United States, France, Bulgaria, and Brazil, and premiered and recorded for Emmy Award-winning composer Lanny Meyers in The Legend of Sleepy Hollow. Dedicated to his music, he has participated in master classes with many instructors, including Edwin Barker, Edgar Meyer, Paul Ellison, Micah Howard, James Van Demark, Jeff Turner, and John Moore, among others. Kathleen Schiano, cellist, received her Bachelor’s Degree in Music for cello performance from the University of Kansas, and her Master’s Degree from Stony Brook, where she studied with the renowned Bernard Greenhouse, co-founder of the Beaux Arts Piano Trio. She also studied with Laszlo Varga, Peter Howard, John Ehrlich, Uziahu Wiesel (Tel-Aviv Quartet), David Geber and Daniel Avshalomov (American String Quartet). She has appeared as soloist with the Topeka Symphony, and performed with Andrea Bocelli, Perry Como, Johnny Mathis, Engelbert Humperdink, Liberace, Sammy Davis Jr., Bob Hope, and Bill Cosby. In addition to being principal cellist with the Connecticut Virtuosi Chamber Orchestra, Kathleen regularly performs with the Hartford Symphony. Giacomo Benedetti has studied Organ and Organ Composition in the conservatory “Lorenzo Cherubini” in Florence with Mariella Mochi and graduate with G. Libertucci: he studied with Matteo Imbruno, organist of the Oude Kerk in Amsterdam, following Masterclasses in Amsterdam. He studied piano with Rosa Scarlino, harpsichord with Annaberta Conti and Alfonso Fedi, basso continuo with Andrea Perugi, also following Masterclasses with Gustav Leonhardt. He worked as coworker organist in the Cathedral of Santa Maria del Fiore in Florence, in the Church of Orsanmichele, in Saint Mark’s Church; ctually he is organist in the Churches of San Miniato, Santo Spirito and in the anglican Church of Saint Mark in Florence. He collaborates with the theatre “Maggio Musicale Fiorentino” as coworker cymbalist and works in many musical associations in which he often performs as piano accompainist with singers and various musicians, cymbalist soloist and accompainist. He also collaborates with the association “Ensemble San Felice”. He took part in many organ and piano competitions winning first prizes and placements. He performs concerts as Organist, Pianist, Cymbalist and Choir Director in various contexts: International organ festival of La Verna; Japan (Yokohama ) in the “Festival Barock” as cymbalist soloist ; XIV Festival of Ancient, Renaissance and Baroque Music in Querètaro (Mexico) , International Organ Accademy of Pistoia; Haendel’s soloist concerts for organ and orchestra with the Regional orchestra Val d’Arno; Anton Bieber’s Sonatas for harpsichord and violin; Florentine Chamber Orchestra with M.Lanzetta as pianist soloist; frequent collaborations with “Florence Sinphonietta” in Florence and with the baroque Ensemble “Armonia ricercata”; bassocontinuist in the baroque Ensemble “Armonia ricercata” and “I Fiori Musicali”;he followed courses with Celestino Dionsi for flute andharpsichord in baroque chamber music; in Munich for the bavarian radio; concerts in Ausburg in the Rokokolossal and in Ausburg’s Cathedral in duo and in trio with organ and piano; in Helsinki for the Italian Institute in Finland; in Turuku, in the Cathedral and in the National Theatre; university’s choir in Florence; inauguration concerts of Legri’s organ in Calenzano with a CD recording for Calenzano’s municipality; concerts for the musical festival of Orsanmichele in Florence; realization of a DVD of a Benito Zorzit’s opera for Florence’s municipality; Choir “Armonia Cantata”; Schola Cantorum of the lutheran and anglican church in Florence; choir “Capriccio Armonico”. Born in Timisoara, Romania where he trained at the Ion Vidu Music Academy, Mr. Laurentiu’s piano instruction continued at Wheaton College and at The Eastman School of Music. Based in Chicago, IL Luciano Laurentiu made his piano solo debut on WFMT in April 2010 and his Orchestra Hall debut in November 2015, having performed in most concert venues from Symphony Center to The Cultural Center, The Art Institute, Woodstock Opera House and many others. Mr. Laurentiu is currently Organist and Choir Master at St. Thomas The Apostle Church, staff accompanist and vocal coach at DePaul University’s School of Music and Chorus Master of the Paderewski Symphony Chorus. In the United States, Mr. Laurentiu has performed in most states from California to New York and from Florida to Minnesota. Internationally, Mr. Laurentiu has performed in Germany, Spain, Poland, Switzerland, Romania and Mexico. As a choral singer, Mr. Laurentiu has performed and recorded with various ensembles including The Grammy winning Crossing Choir and Schola Antiqua of Chicago. A much sought after accompanist and chamber musician, Blake Hansen holds the position of rehearsal and performance accompanist for the Connecticut Lyric Opera, Hartford Opera Theater, Hartt School Choirs, Madison Lyric Stage, and the Greve Opera Academy in Italy. He also accompanies several choirs in Connecticut, including the choirs of The Hartt School, CONCORA, and the Griswold Community Chorus. As a chamber musician, he currently collaborates with pianist and mezzo-soprano Rebecca Batista de Almeida and violin virtuoso Adrian Sylveen. Hansen has performed in notable venues such as Steinway Hall in New York City, Teatro Municipal de Niteroi, Brazil, and the Illsley Ball Nordstram Hall in Seattle, Washington. Blake Hansen graduated from The Hartt School, University of Hartford, in 2013 with a Master of Music in piano performance under the tutelage of Luiz de Moura Castro. He now performs frequently as an accompanist and soloist in the U.S., South America, and Europe. Although primarily a pianist, he also pursued studies in violin, double majoring on both instruments during his undergraduate studies at Principia College. The program offered me the wonderful experience and challenge of learning and performing a full and demanding role with orchestra. For my first full role, it was fantastic to be completely immersed in language, role preparation and performance in such a warm learning environment and coached by such experienced faculty. Coming out of the program, I feel more confident and motivated for what comes next, and I took with me very clear, individualized feedback about what and how to improve musically, dramatically and technically.
2019-04-20T22:49:14Z
http://grevefestival.org/faculty/
One of the most exciting developments in the world of points and miles last year was Capital One’s announcement of new airline transfer partners. Since last December, miles earned on cards like the Capital One Venture Rewards Credit Card and the Capital One Spark Miles for Business can be transferred to 14 airline partners. Unfortunately, there was one small drawback to this announcement: Of the carriers with which Capital One has now partnered, all but one of them (Finnair) also partner with at least one other transferable points currency. The issuer isn’t unique in this regard, as many of these programs share some of the same transfer partners. From a business standpoint the heavy overlap we see in transfer partners makes perfect sense. When a card issuer offers transferable points, it agrees to buy an airline’s miles at a fixed cost. Every time you transfer Amex Membership Rewards points to Aeromexico, for example, Amex pays Aeromexico a set price per mile. Once an airline agrees to “sell” its miles to a single card issuer, it’s easier to add new transfer partners, both from a financial and technological perspective. This is also why airlines like Avianca that frequently sell miles to the public at discounted rates are popular transfer partners. With that in mind, let’s take a look at some of the easiest airline miles to earn. Just like our analysis of the hardest airline miles to earn, you can of course credit revenue flights to any of these loyalty programs, but for this article, I’ll be focusing instead on credit card bonuses and transfer options. Also be sure to keep an eye out for limited time transfer bonuses to stretch your miles even farther. As you can see, all of these programs partner with at least three of the five transferable currencies, giving you a plethora of options to boost your balances. They can all offer solid value in the right circumstances as well. Let’s dive into each one, and note that the credit card offers below are just a sampling of how you could turn everyday spending into points or miles in the given program. Capital One Venture Rewards Credit Card: Earn 50,000 miles once you spend $3,000 on purchases within the first 3 months of account opening. Capital One Spark Miles for Business: Earn 50,000 miles when you spend $4,500 in the first 3 months of opening your account. Ink Business Preferred Credit Card: Earn 80,000 Ultimate Rewards points after you spend $5,000 on purchases in the first 3 months from account opening. Transfer partners: In many ways Flying Blue is the anti-unicorn of loyalty programs, as it’s a partner of all five major transferable points currencies. Points transfer 1:1 from Chase Ultimate Rewards, American Express Membership Rewards and Citi ThankYou Rewards. Points transfer at a 2:1.5 ratio from Capital One and at a 3:1 ratio from Marriott, though Marriott also gives you a 5,000-mile bonus for every 60,000 Marriott points transferred. Flying Blue’s decision to follow Delta and switch to a dynamic pricing model for award flights (instead of a fixed award chart) cut a lot of value from the program, but there are still some good deals to be had if you are both patient and lucky. Given that Flying Blue partners with all five of the biggest transferable points programs, it’s worth checking what options you might have here for SkyTeam flights. One of the best uses of Flying Blue miles has always been the discounted promo awards offered each month. Currently you can enjoy a 25% discount on business class flights between Europe and Toronto (YYZ), Cancun (CUN), Montreal (YUL) and Mexico City (MEX), but the list normally includes several American destinations as well. Previous months, for example, have included discounts for cities like Seattle, Boston, Chicago, Houston and Washington, DC. At the time of writing, I’m seeing one-way awards from Montreal to Paris (CDG) for as little as 21,500 miles in economy, worth $258 based on TPG’s valuations. Saver level business class awards to Europe aren’t a bad deal at 39,750 miles each way, but with variable pricing, some days might end up costing a full 5x more for the same flight (and you’ll often encounter fuel surcharges, though a few partner airlines are more reasonable). While Flying Blue miles are quite easy to earn, it does take some additional effort to put them to good use. However, there’s value to be had. Chase Sapphire Reserve: Earn 50,000 Ultimate Rewards points after you spend $4,000 on purchases in the first 3 months of account opening. American Express® Gold Card: Earn 35,000 Membership Rewards points after you spend $2,000 on eligible purchases with your new card within the first three months, though you may be able to get 50,000 points via a referral from a friend (subject to change at anytime). Transfer partners: Just like Flying Blue, Singapore is the second golden goose that partners with all five major transferable points currencies. While it wasn’t originally listed as a Capital One transfer partner, it was later added, though the 2:1 transfer ratio isn’t as good as most of Capital One’s other partners. One clear edge that Singapore KrisFlyer has over other Star Alliance loyalty programs is the fact that Singapore generally doesn’t make its own long-haul, premium cabin award space available to partner programs. This means if you want to fly Singapore’s incredibly spacious new A380 suites class or business class on the world’s longest flight, you’ll almost always have to book through KrisFlyer. While not all routes feature the new suites yet, you can currently find them flying to Sydney (SYD), London-Heathrow (LHR), Hong Kong (HKG), Shanghai (PVG) and Zurich (ZRH). Award space on these routes is hard to come by, as the seat count in the suites cabin has been reduced from 12 to six, but if you can find a seat on a longer route like Singapore to Zurich, it will set you back a cool 125,000 miles. If you have enough miles in your account you can also waitlist a saver award and hope that space opens up before departure. In addition, Singapore’s Star Alliance partner award chart has a few great deals worth noting. One-way economy awards to Europe only cost 27,500 miles, which is 2,500 miles cheaper than what most other Star Alliance loyalty programs will charge you. Singapore also has a competitive advantage for domestic first class awards on United operated flights, only charging 20,000 miles each way. Citi Premier Card: Earn 50,000 bonus points after you spend $4,000 in the first three months of account opening. The Business Platinum® Card from American Express: Earn 50,000 Membership Rewards points after you spend $10,000 in the first 3 months and an extra 25,000 points after you spend an additional $10,000 all on qualifying purchases within your first 3 months of card membership. Terms Apply. Transfer partners: Virgin Atlantic is a 1:1 transfer partner of Chase Ultimate Rewards, Amex Membership Rewards, and Citi ThankYou Rewards. You can also transfer points at a 3:1 ratio from Marriott with a 5,000-mile bonus for every 60,000 points transferred. First class awards from the West Coast gateways of Los Angeles (LAX) and San Francisco (SFO) to Tokyo cost 110,000 miles round-trip, while those from the middle of the US and the East Coast cost 120,000 miles. That’s not a typo; those are round-trip award rates. That breaks down to 55,000 to 60,000 miles each way for flights that often cost $16,000 or more. You can even get a good deal in business class as well, paying 90,000 to 95,000 miles for a round-trip award ticket. However, ANA first class is a real treat and worth trying if you can, especially when the price difference is this small. Pro tip: Use ExpertFlyer to search ANA award space for up to seven days at a time and look for open jaw routings to help you find award space. Non-stop domestic flights also clock in at just 12,500 miles. In many of these cases, you’ll redeem significantly fewer Flying Club miles than you would booking the award flights directly with Delta, especially given the recent jump in SkyMiles rates to Europe. However, be sure to compare the award rates to make sure you don’t overpay. This is especially relevant if you plan on transferring your points from Amex as you can pit Virgin Atlantic and Delta head to head. Even if the prices are the same between the two programs, keep your eyes peeled for one of Amex’s frequent Virgin Atlantic transfer bonuses that gives Flying Club an edge. You can also score an incredible deal on South African Airways’ fifth freedom route from Dakar, Senegal (DKR) to Washington-Dulles. A round-trip business class ticket only costs 50,000 miles, which is less than most carriers charge for a one-way ticket. Avianca offers one of the cheapest ways to book Lufthansa first class, and unlike other Star Alliance programs, you won’t pay any fuel surcharges. The Platinum Card® from American Express: Earn 60,000 Membership Rewards points after you use your new card to make $5,000 in purchases in your first 3 months. Transfer partners: Avianca LifeMiles is a 1:1 transfer partner of Amex Membership Rewards and Citi ThankYou Points. You can also transfer at a 2:1.5 ratio from Capital One or a 3:1 ratio from Marriott. Between Amex surprising us by adding Avianca as a transfer partner to Capital One’s decision to include it in the list of Venture/Spark transfer partners, this quirky Star Alliance program is finally starting to get the attention it deserves. While Avianca’s customer service can leave a bit to be desired, low award rates and no fuel surcharges on partner awards make it worth the hassle. One of the best value redemptions here is Lufthansa first class awards between the US and Europe for only 87,000 miles each way (or 63,000 miles in business class). You can also mix and match LifeMiles and money, potentially dropping this first class ticket to only 35,000 LifeMiles and $837. This essentially lets you “buy” LifeMiles at about 1.67 cents each. While this is a good deal, you can often purchase LifeMiles at 1.4 cents or less, which would be a better deal. LifeMiles can also be great for domestic travel within the US on United. Avianca is one of the few airlines to split the US into different award zones (three to be exact) which roughly correspond to the East Coast, Midwest and West Coast. You can see the zone definitions as well as Avianca’s full Star Alliance award chart here. Short-haul economy flights, those within the same zone, are a great deal at only 7,500 miles each way. Even longer transcontinental flights cost the same as if you booked through United, and with more transfer partners to beef up your account balance, Avianca might just have the upper hand here. You can also find very reasonable rates on awards to North Asia, a large region that includes Japan, South Korea, China, Hong Kong, Taiwan and the Philippines, among others. I also appreciate how LifeMiles often shows you how many award seats are left on a given flight, so you can easily decide how quickly you need to book. Even some far-away destinations, like Sydney, Australia (SYD), are priced attractively. 40,000 miles for a one-way economy ticket isn’t half bad, and while 80,000 miles in business isn’t record-breaking, it’s definitely a good deal for a non-stop 15-hour flight. For complete details on the program, check out our guide with Everything You Need to Know About Avianca LifeMiles. Given how stacked the Oneworld alliance is with excellent first class products, Cathay Pacific’s easy-to-earn Asia Miles can be a valuable addition to your wallet. Flights on Cathay Pacific metal are priced based on the following distance based award chart. Note the Long – Type 1 and Type 2 pricing tiers — unfortunately Type 2, the more expensive one, is what applies for flights to and from the US. Even the shortest flights from Hong Kong (HKG) to the West Coast will fall in this 5,000-7,500 mile range. 110,000 miles for first class certainly isn’t cheap, but you can trust that Cathay Pacific will deliver an unforgettable experience flying up front. These prices are similar to what you’d pay booking the same awards through American AAdvantage, though economy flights are a few thousands miles cheaper, and Cathay Pacific also gives you the option to book premium economy awards. While I’d normally suggest that travelers on the East Coast or in the central US position to the West Coast to book cheaper awards, there is one exception here. Cathay Pacific’s relatively new nonstop service to Washington-Dulles (IAD) has been hot on my radar. This route is operated by a modern and comfortable A350 aircraft, and I’d happily pay 85,000 miles to get home from Asia on such a quick routing (though American only charge 70,000 miles for the same ticket). The Asia Miles website makes it hard to find award charts for Cathay’s partner airlines, but you can piece together the distance-based pricing scheme using the mileage calculator. For example, you’ll find a number of medium-haul domestic flights, like New York (JFK) to Chicago (ORD) pricing at only 10,000 miles, where American would charge you 12,500. You can also save a few thousand miles each way flying from the east coast to Europe, though the cost jumps to 40,000 miles each way in economy and 75,000 in business class if you fly from LAX instead. Chase Sapphire Preferred Card: Earn 60,000 Ultimate Rewards points after you spend $4,000 on purchases in the first 3 months from account opening. British Airways Visa Signature Card: Earn 4 Avios for every $1 spent on all purchases within your first year up to $30,000. That’s up to 120,000 bonus Avios. Transfer partners: British Airways is a 1:1 transfer partner of both Chase and Amex as well as a 3:1 transfer partner of Marriott. Maximizing British Airways’ distance-based award chart requires a change in mindset. Instead of focusing on zone-based sweet spots, you should focus on nonstop flights between individual city pairs that are a set distance apart. Generally speaking you’ll want to avoid long-haul flights, which are much more expensive, and focus on short and medium hops. While the cheapest (Zone 1) awards can no longer be used for flights within North America, any flights that cover up to 1,151 flight miles will only set you back 7,500 Avios. This lets you fly between cities like New York-JFK and Miami (MIA) for relatively cheap. This is a great excuse to let the destination plan your trip instead of the other way around. From AA’s hub in Miami, you could fly to any of these Caribbean or South American destinations for just 7,500 Avios. You could also take advantage of AA and Alaska’s extensive route networks to fly from several West Coast cities to Hawaii for just 12,500 Avios each way. AA is also known for frequently flying long-haul international aircraft on shorter domestic routes. British Airways prices these (and all domestic “first” class awards) as business class, meaning you can get a lie-flat seat at a relatively low rate. You’ll find this most often on flights between AA hub cities, such as flights between Chicago-O’Hare and Dallas-Fort Worth (DFW) that are occasionally operated by a 787-9. You can book this flight in business class for only 15,000 Avios each way, as opposed to the 25,000 miles AA would charge you. Perhaps the single best value use of Avios is for short-haul flights around Europe and Asia. Flights under 650 miles, such as Hong Kong to Taipei (TPE) only cost 4,500 Avios one-way in economy (flights up to 1,151 miles require the same 7,500 Avios as North American flights above). You can use this to save money flying in and out cities that are both expensive markets and Oneworld hubs, including Hong Kong, Tokyo, London and Madrid. Transfer partners: Points transfer to Aeroplan at the following rates: 1:1 from Amex, 2:1.5 from Capital One, and 3:1 from Marriott. As Air Canada’s independently-run loyalty program, Aeroplan used to be one of the best value redemptions of Amex Membership Rewards points. While that’s still true, you’re also now able to transfer miles to Aeroplan from Capital One as well. When you factor in the 2x earning rates on the Venture and Spark cards (which in turn transfer to 1.5 Aeroplan miles), you can come out ahead on the earning side as well. Domestic awards within the US are also a decent value at only 12,500 miles each way, and the carrier doesn’t impose close-in booking fees for last-minute awards (like United does). However, Aeroplan really shines for international premium cabin redemptions. If you’re lucky enough to find business class award space to Europe on a United flight equipped with the new Polaris seats, you’ll only pay 55,000 miles each way. Swiss business class is also a great option for getting to Europe, as Aeroplan award flights on Swiss also aren’t subject to massive fuel surcharges. If you collect transferable points to take advantage of the flexible redemptions they offer, odds are you have access to one (or maybe even all) of the loyalty programs mentioned here. While it can be confusing and complicated to book award tickets through foreign programs with low-tech websites and inconsistent customer support, you could end up saving tens of thousands of miles or hundreds of dollars. Since these miles are the easiest to earn, it’s worth your time to get familiar with these programs so they can work for you.
2019-04-25T18:06:04Z
https://thepointsguy.com/guide/easiest-airline-miles-to-get-why-you-want-them/
The prevalence of impaired cutaneous wound healing is high and treatment is difficult and often ineffective, leading to negative social and economic impacts for our society. Innovative treatments to improve cutaneous wound healing by promoting complete tissue regeneration are therefore urgently needed. Mesenchymal stromal cells (MSCs) have been reported to provide paracrine signals that promote wound healing, but (i) how they exert their effects on target cells is unclear and (ii) a suitable delivery system to supply these MSC-derived secreted factors in a controlled and safe way is unavailable. The present study was designed to provide answers to these questions by using the horse as a translational model. Specifically, we aimed to (i) evaluate the in vitro effects of equine MSC-derived conditioned medium (CM), containing all factors secreted by MSCs, on equine dermal fibroblasts, a cell type critical for successful wound healing, and (ii) explore the potential of microencapsulated equine MSCs to deliver CM to wounded cells in vitro. MSCs were isolated from the peripheral blood of healthy horses. Equine dermal fibroblasts from the NBL-6 (horse dermal fibroblast cell) line were wounded in vitro, and cell migration and expression levels of genes involved in wound healing were evaluated after treatment with MSC-CM or NBL-6-CM. These assays were repeated by using the CM collected from MSCs encapsulated in core-shell hydrogel microcapsules. Our salient findings were that equine MSC-derived CM stimulated the migration of equine dermal fibroblasts and increased their expression level of genes that positively contribute to wound healing. In addition, we found that equine MSCs packaged in core-shell hydrogel microcapsules had similar effects on equine dermal fibroblast migration and gene expression, indicating that microencapsulation of MSCs does not interfere with the release of bioactive factors. Our results demonstrate that the use of CM from MSCs might be a promising new therapy for impaired cutaneous wounds and that encapsulation may be a suitable way to effectively deliver CM to wounded cells in vivo. Cutaneous wound healing is comprised of a network of biological processes, collectively restoring the integrity of the skin after injury. Unfortunately, the ideal outcome of cutaneous wound healing, which encompasses complete tissue regeneration, is often sacrificed in favor of quickly closing a wound with formation of fibrotic scar tissue . Fibrotic scar formation is an undesirable result of cutaneous wound healing, not only for cosmetic reasons but because scar tissue has compromised mechanical strength and is more sensitive to pain than healthy skin . Treating cutaneous skin wounds and reducing scar tissue cause a financial burden worldwide, and annual expenditures on products designed to minimize scarring exceed $5 billion . To understand the processes involved in cutaneous wound healing or treat fibrotic scar tissue or both, researchers commonly use laboratory rodents as models. Although relevant information has been obtained from studies using rodents, wound healing in these species does not accurately mimic human tissue regeneration [4-7]. For example, mice heal primarily by contraction due to the presence of the panniculus carnosus in their subcutaneous tissues, whereas humans lack this muscle and instead rely on epithelialization to close cutaneous wounds . Owing to these differences, there is a critical need for an animal wound model that closely mimics the natural processes of healing and scar formation in humans. Horses may prove to be an ideal species in which to study cutaneous wound healing since they also depend on epithelial cell activity to heal skin wounds. In addition, horses and humans both suffer from hypergranulation formation, a pathological process defined as an excess of granulation tissue beyond the amount required to replace the tissue deficit. Hypergranulation tissue is referred to as proud flesh in horses and keloid in humans . These common features make the horse an attractive translational model in which to study the underlying pathogenesis of excessive cutaneous wound healing as well as to evaluate the potential of novel treatments. Mesenchymal stromal cells (MSCs) are multipotent stromal progenitor cells with regenerative properties that are present in a variety of tissues and organs . MSCs actively contribute to regenerative processes, as they are involved in the inflammatory , proliferative , and remodeling phases of tissue regeneration. Although MSCs were originally reported to contribute to tissue repair by trans-differentiating into the specific cell types needed to restore injured tissue, recent data indicate paracrine signaling as the primary mechanism for the regenerative effects of MSCs [13,14]. Indeed, we recently identified angiogenic stimulating factors in the conditioned medium (CM) of equine MSCs and showed that these factors could induce proliferation and vessel formation of equine endothelial cells in vitro . Practically, this implies that the CM obtained from MSC cultures, which contains all factors secreted by MSCs, may be used as a ‘stem cell-free’ therapy in regenerative medicine. This type of therapy offers several advantages over cellular MSC remedies, including the absence of inherent toxicity, no risk for tumor formation of engrafted cells, and no concerns about allograft-associated immune rejection [16,17]. Previous reports have demonstrated that CM obtained from human MSC cultures can improve cutaneous wound healing, although the underlying mechanisms remain unclear [18,19]. The potential of CM obtained from equine MSC cultures to contribute to wound healing has not been studied to date but is essential in order to take advantage of the horse as a physiologically relevant translational model in which to study cutaneous wound healing. An important aspect to take into consideration when proposing the use of MSC-derived CM in regenerative medicine is the development of a suitable delivery system for these secreted products. Indeed, optimal spatial distribution and continuous release of factors at the site of injury are two key components of MSC treatment that may significantly improve clinical outcome. Cell microencapsulation, which involves immobilization of the cells within a polymeric semi-permeable membrane, provides a supportive microenvironment for the cells in which they can proliferate and release bioactive factors while being shielded from the external environment [20,21]. These microcapsules can be injected at the transplantation bed, localizing the release of therapeutic factors in a controlled way. A recent study by Xu et al. describes the potential use of human MSCs encapsulated in biomaterials for the treatment of cutaneous wounds, and their initial findings were that cells ‘packaged’ in a gelatin/poly(ethylene glycol) biomatrix mediated the early resolution of inflammatory events and facilitated the proliferative phases in wound healing . To the best of our knowledge, however, the use of microencapsulated equine MSCs in equine regenerative medicine has not been explored to date. Therefore, the aims of the present study were (i) to evaluate the in vitro effects of equine MSC-derived CM on equine dermal fibroblasts, a cell type critical for successful wound healing, and (ii) to explore the potential of microencapsulated equine MSCs to deliver the critical components of CM to wounded cells in vitro. Our salient findings were that equine MSC-derived CM stimulated the migration of equine dermal fibroblasts and increased the expression levels of genes that positively contribute to wound healing in these cells. In addition, we found that equine MSCs packaged in core-shell hydrogel microcapsules have similar effects on equine dermal fibroblast migration and gene expression, suggesting MSC encapsulation may be a suitable way to effectively deliver products secreted by MSCs to wounded cells in vivo. Equine MSCs were isolated from the peripheral blood of three healthy warmblood mares between 8 and 12 years old, exactly as described previously [15,23]. The blood collection was approved by the Cornell Institutional Animal Care and Use Committee (#2014-0038). Briefly, blood was collected from the vena jugularis of healthy donor horses, and peripheral blood mononuclear cells were isolated by using density gradient centrifugation on 1.080 g/mL Percoll (GE Healthcare, Little Chalfont, Buckinghamshire, UK) and subsequently seeded at a density of 16 × 104 cells/cm2 in a T75 flask in culture medium consisting of low-glucose Dulbecco’s modified Eagle’s medium (Invitrogen, part of Thermo Fisher Scientific, Waltham, MA, USA) supplemented with 30% fetal bovine serum (FBS) (Atlanta Biological, Flowery Branch, GA, USA), 10−7 M low dexamethasone (Sigma-Aldrich, St. Louis, MO, USA), and 50 μg/mL gentamycin, 1x penicillin-streptomycin, and 2 mM L-glutamine (all from Life Technologies, Grand Island, NY, USA). Cultures were maintained at 37°C with 5% CO2. At 70% confluency, cells were removed from flasks by using 0.25% trypsin-EDTA and further cultured in expansion medium, which is identical to the culture medium but without dexamethasone. Equine MSCs were characterized by immunophenotypical protein profiling by using flow cytometry and their potential for trilineage differentiation, exactly as described previously . In essence, equine MSCs were confirmed to be positive for CD29, CD44, CD90, and CD105 and negative for CD45, CD79α, major histocompatibility complex II (MHC II), and a monocyte/macrophage marker. The successful trilineage differentiation of MSCs toward osteoblasts, chondroblasts, and adipocytes was confirmed by using a range of histochemical stains. The equine dermal fibroblast cell line NBL-6 (American Type Culture Collection, Manassas, VA, USA) was cultured in standard medium consisting of minimal essential medium (Corning) supplemented with 10% FBS (Atlanta Biochemicals) and 1% penicillin/streptomycin (Invitrogen). Cells were maintained at 37°C with 5% CO2. CM was collected from MSCs after 2 days of culture, when cells were 70% confluent. To this end, 6 × 105 MSCs were seeded in a T75 flask in 8 mL of expansion medium. After 48 hours, medium was collected, centrifuged twice for 7 minutes at 300 g to remove any cellular debris, and used for further experiments. CM from NBL-6 cells was used as a control and was collected after 2 days of culture, exactly as described for MSC-derived CM. For pre-treatment experiments, MSCs were seeded in expansion medium supplemented with 10 ng/mL tumor necrosis factor-alpha (TNFα) (R&D Systems, Minneapolis, MN, USA), 20 ng/mL interferon-gamma (IFNγ) (R&D Systems), or 150 μM cobalt chloride (CoCl2) (Sigma-Aldrich). After 24 hours of culture, cells were washed twice with phosphate-buffered saline (PBS) and fed with 8 mL of fresh expansion medium. CM was collected 24 hours later, as described above. For experiments using encapsulated MSCs, 6 × 105 MSCs were seeded per T75 flask in 8 mL of expansion medium, and in parallel the same number of cells were encapsulated in double-layer microparticles by using a multi-fluidic electrostatic cell micropackaging technique . Briefly, type I collagen neutralized by 1 N sodium hydroxide was mixed with MSCs in expansion medium for a final concentration of 0.45 mg/mL. Cells supported by collagen were encapsulated in 0.9% (wt/vol) alginate hydrogel (FMC Biopolymers, Philadelphia, PA, USA) at a concentration of about 37 cells per capsule. Microencapsulated MSCs were incubated in a crosslinking bath with 100 mM calcium chloride and 5 mM barium chloride under an electrical field strength of 7 kV. Microencapsulated MSCs were resuspended in 8 mL of expansion medium and maintained at 37°C with 5% CO2. Empty core-shell hydrogel microcapsules, containing no cells, were included as negative control. After 48 hours, supernatants were collected, centrifuged twice for 7 minutes at 300 g to remove cellular debris, and used as CM in experiments. NBL-6 cells were seeded in six-well plates at a density of 6 × 104 cells/cm2. Upon 90% confluency (after approximately 24 hours), cells were washed twice with PBS and serum-starved overnight. A linear defect was inflicted on the monolayer by using a 200-μL pipette tip. Culture medium was immediately removed (along with any dislodged cells) and replaced with freshly collected CM, diluted 1:1 in expansion medium. Similar scratch assays were repeated in the presence of 2 μg/mL mitomycin C, which was added at the time of scratch infliction. Reference marks were made across the bottoms of the wells with an ultrafine marker. Images of scratches were captured by using a Nikon Diaphot-TMD inverted light microscope with an attached Cohu charge-coupled device (CCD) camera (Nikon, Melville, NY, USA), leaving the reference marks outside the capture image field but within the eye-piece field of view for repeatable orientation of scratches. Photographs of scratches were taken at 0, 24, and 48 hours after scratching, and migration distances of cells were calculated in a blinded-manner by using ImageJ . Widths of scratches were taken in two places in each of three wells scratched per treatment, for a total of six measurements per treatment. Scratch width was subtracted from the time 0 scratch widths at the same location to determine cell migration distance. Migration distances within treatments were averaged to determine overall migration. Cell migration was measured by Electric Cell-substrate Impedance Sensing (ECIS) by using the ECIS Model Z instrument with a 96 W array station (ECIS; Applied BioPhysics Inc., Troy, NY, USA). Dermal fibroblasts were seeded at a density of 2 × 105 cells per well in a 96W1E+ PET array chip (Applied BioPhysics Inc.) in standard medium. After 24 hours, medium was removed and replaced with serum-free medium for at least 8 hours prior to wounding. A uniform circular defect was created in the cell monolayer by lethal electroporation (1,200 μA, 40 kHz) for 40 seconds by 350-μm diameter circular electrodes located in each well of the array chip. The defect created in the fibroblast monolayer will be referred to as wound throughout the article, as originally described by Keese et al. . Dead cells were detached from the electrode by gently pipetting medium up and down three times before removal. Control CM or MSC-derived CM was added to appropriate wells, and an alternating current (approximately 1 μA, 32 kHz) was applied to the electrodes to measure impedance (in ohms) and monitor wound closure in real time. As cells migrate to repair the circular wound, they physically re-cover the electrode, causing an increase in impedance. The time required for re-covering the electrode was determined as the number of hours it took for the impedance levels in wells with the 350-μm circular wound to return to the same values as the impedance levels in control wells in which cells were not wounded. Cell migration was also documented by phase-contrast images captured by using an Olympus CCX41 inverted microscope equipped with an Olympus LC20 digital camera (Olympus, Tokyo, Japan). NBL-6 cells were cultured in 15 × 100 mm culture dishes until confluent. Cells were serum-starved overnight and scratches were made. After two washes with PBS, 1:1 diluted CM derived from MSCs (un-stimulated, stimulated, or encapsulated) or control NBL-6 was added to each NBL-6 culture. After 24 hours, CM was removed, monolayers were rinsed with PBS, and cells were further cultured for another 24 hours. Subsequently, mRNA was extracted from the cells by using an RNEasy Plus Kit in accordance with instructions of the manufacturer (Qiagen, Valencia, CA, USA), followed by a DNase digestion using DNase I (Invitrogen). cDNA was synthesized by using M-MLV Reverse Transcriptase (USB, Cleveland, OH, USA) in accordance with the protocol of the manufacturer. SYBER green-based quantitative polymerase chain reaction (qPCR) assays were carried out on an Applied Biosystems 7500 Fast Real-Time PCR instrument (Applied Biosystems, Carlsbad, CA, USA) to determine fold changes of genes of interest in NBL-6 cells incubated with CM of MSCs compared with NBL-6 incubated with control CM. The comparative threshold cycle (Ct) method (2−ΔΔCt) was used to quantify gene expression levels in which ΔΔCt = ΔCt(sample) – ΔCt(reference). The previously validated reference gene SDHA (succinate dehydrogenase complex, subunit A) was used to normalize samples . Primers to amplify CCL2, CxCL10, IL-8, MMP1, MMP2, TMP1, plasminogen activator urokinase (PLAU), tissue plasminogen activator (PLAT), PAI1, CTSK, annexin A2 (ANXA2), COLIII, COL1, syndecan 2 (SDC2), SDC4, and fibronectin were designed by using Primer3 software, based on horse sequences found in the National Center of Biotechnology Information GenBank, and primer sequences are listed in Table 1. All samples were run in triplicate. To ensure that mitomycin C was not toxic to NBL-6 fibroblasts, cells were seeded at 10,000 per well in 96-well microplates. At 90% confluency, mitomycin C was added to triplicate wells at 0, 2, 20, 200, and 2,000 ng/mL. After 48 hours of culture, an MTT (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide) in vitro toxicology assay (Sigma-Aldrich) was carried out in accordance with the instructions of the manufacturer and absorbance was measured at 570 nm on a Multiskan EX plate reader (Thermo Fisher Scientific). Optical densities of wells treated with mitomycin C were compared with those of untreated wells to determine cell viability. To test the viability of microencapsulated MSCs, capsules were dissolved on days 2, 7, 12, 17, and 22 after encapsulation by using a solution of 1% EDTA. The released MSCs were washed with culture medium, incubated for 3 minutes with trypsin-EDTA to create a single cell suspension, and washed with culture medium, and the percentage of living cells was determined by using the Trypan blue exclusion (TBE) assay. For determination of population doubling time (PDT), 2 × 105 released MSCs were plated in a T25 tissue culture flask and cultured in expansion medium. The PDT was calculated by using the following link: . PDTs of microencapsulated MSCs were compared with PDTs of non-encapsulated MSCs from the same horse at the same passages. MSCs removed from capsules 2 days after encapsulation were plated in T75 tissue culture flasks containing expansion medium until monolayer was 90% confluent. At that time, cells were collected for flow cytometric analyses and seeded for differentiation assays as described previously . The effect of mitomycin C on the proliferation of NBL-6 was evaluated by using a bromodeoxyuridine (BrdU) proliferation assay kit (Abcam, Cambridge, MA, USA). To this end, NBL-6 were seeded on a 96-well plate at a density of 5 × 104 cells per well and incubated with mitomycin C for 48 hours. Regular medium was used to establish baseline proliferation. The BrdU proliferation assay kit was used in accordance with the instructions of the manufacturer, and the resulting absorbance was read at 450 nm on a Multiskan EX microplate reader by using Ascent software (Thermo Scientific, Waltham, MA, USA). Empty wells and wells without BrdU were included as controls. Student’s t test for paired data was used to test for statistically significant differences in cell migration (scratch assays and ECIS), mRNA expression (RT-qPCR), cell viability (TBE and MTT), and BrdU incorporation (enzyme-linked immunosorbent assay, or ELISA) between untreated and CM-stimulated NBL-6. Data given are the mean of three replicates, and the bars show standard deviations (SDs). To compare data from different individuals, statistical analysis was done by means of the non-parametric Kruskal-Wallis and Dunn’s mulitiple comparison test (α = 0.05), and significant differences were considered at P value of less than 0.01. Because dermal fibroblasts are critically involved in wound healing , we decided to study the effects of MSC-derived CM on the migration of these cells by using in vitro scratch assays . We found that equine dermal fibroblast cells (NBL-6) migrated significantly faster when cultured in CM obtained from equine MSCs compared with control CM, which was collected from NBL-6 (Figure 1A). Mesenchymal stromal cell (MSC) conditioned medium (CM) promotes migration of dermal fibroblasts in scratch assays (n = 3). (A) Representative phase-contrast images of wounded NBL-6 cells cultured with MSC-derived CM (lower panels) as compared with control CM (upper panels) over a 48-hour period, and migration distances of NBL-6 cells are expressed as micrometer per hour in 48 hours. **P <0.01. (B) Migration of NBL-6 cells cultured with MSC-derived CM as compared with CM from mitomycin C-treated MSCs (2,000 ng/mL). (C) Viability (dashed line) and proliferation (solid line) of NBL-6 cells cultured in the presence of various concentrations of mitomycin C. NBL-6, horse dermal fibroblast cell; OD, optical density. Given the high incidence of hypergranulation formation in equine and human wounds , it was important to explore whether this increased rate of wound closure was due to enhanced migration or increased proliferation of the fibroblasts or both. Therefore, we repeated the scratch assays in the presence of mitomycin, an inhibitor of proliferation. No differences in migration of NBL-6 cells cultured in MSC-derived CM in the presence or absence of mitomycin were found, indicating that the observed effect in the scratch assays was not due to an increased proliferation of the cells (Figure 1B). To ensure that the mitomycin concentration used for these experiments (that is, 2,000 ng/mL) was effective in inhibiting proliferation without affecting cell viability, we performed a BrdU ELISA as well as an MMT assay, respectively (Figure 1C). To corroborate our findings on the increased migration of fibroblasts when exposed to MSC-derived CM, ECIS experiments were used to measure in vitro wound closure rates . Again, we found that equine dermal fibroblasts migrated significantly faster when cultured in CM obtained from equine MSCs compared with control CM with a wound closure of 11.8 ± 0.35 hours versus 15.3 ± 0.96 hours, respectively (Figure 2A, B). Because the ECIS system creates only a very small wound (350 μm) that normally heals in 12 to 18 hours, cell migration rather than proliferation is the major contributor to closure under these conditions (Figure 2C). Interestingly, the ending impedance value shown in Figure 2A of the MSC CM-treated fibroblasts was higher than that of the control, indicating that the addition of the MSC CM may increase either cell-cell or cell-matrix contacts on the healed fibroblast monolayer leading to a higher final impedance. Mesenchymal stromal cell (MSC) conditioned medium (CM) promotes wound closure using Electric Cell-substrate Impedance Sensing (n = 3). Wound-healing rates of NBL-6 cells cultured with MSC-derived CM or control CM, as determined by electrical impedance in ohms detected from 0 to 24 hours after wounding (A) and total wound closure time expressed in hours (B). **P <0.01. (C) Phase-contrast images of wounded NBL-6 cells cultured with MSC-derived CM (upper panels) as compared with control CM (lower panels) over a 24-hour period. Scale bars = 100 μm. NBL-6, horse dermal fibroblast cell. Semi-quantitative RT-PCR analyses were performed to investigate the relative mRNA expression levels of selected inflammatory cytokines, remodeling enzymes, extracellular matrix components, and adhesion molecules, all associated with wound repair, in NBL-6 cultured with MSC-derived CM as opposed to control CM. Figure 3A shows the experimental set-up for these studies, and it was observed that culturing dermal fibroblasts in the CM of MSCs differentially regulated mRNA expression of several genes involved in wound healing when compared with gene expression in dermal fibroblasts cultured in control CM (Figure 3B). A significant upregulation of the pro-inflammatory mediator interleukin-8 (IL-8) (P <0.05) and a significant downregulation of the chemokine C-X-C motif chemokine 10 (CxCL10) (P <0.01) were observed in dermal fibroblasts cultured in the presence of MSC-derived CM (Figure 3B). Gene expression levels of extracellular matrix components and adhesion molecules were not significantly different, with the exception of collagenase 3 (COLIII), which was significantly lower in dermal fibroblasts cultured in the presence of MSC-derived CM compared with control CM (P <0.05) (Figure 3B). Finally, the expression of a variety of remodeling enzymes was upregulated when dermal fibroblasts were cultured in CM, with matrix metalloprotease protein 1 (MMP1) showing a significantly higher expression in dermal fibroblasts cultured in the presence of MSC-derived CM compared with control CM (P <0.01) (Figure 3B). Mesenchymal stromal cell (MSC) conditioned medium (CM) alters gene expression levels in dermal fibroblasts (n = 3). (A) Schematic illustration of NBL-6 treatments for RNA isolation. Fold change of mRNA levels, as detected by quantitative reverse transcription-polymerase chain reaction, in (B) NBL-6 cells cultured with MSC-derived CM as compared with control CM or (C) NBL-6 cells cultured with CM from preconditioned MSCs as compared with CM from non-preconditioned MSCs. Left panel shows genes involved in reduction of hypergranulation or enhancement of wound healing or both, and right panel shows genes that stimulate hypergranulation or delay wound healing or both. *P <0.05; **P <0.01. ANXA2, annexin A2; CCL2, CC chemokine 2; CoCl2, cobalt chloride; COLI, collagen type 1A1; COLIII, collagen type 3; CTSK, cathepsin K; CxCL10, CXC chemokine 10; IFNγ, interferon-gamma; IL-8, interleukin-8; MMP1, metallopeptidase 1; MMP2, metallopeptidase 2; NBL-6, horse dermal fibroblast cell; PAI1, plasminogen activator inhibitor-1; PLAT, tissue plasminogen activator; PLAU, plasminogen activator urokinase; SDC2, syndecan 2; SDC4, syndecan 4; TIMP1, metallopeptidase inhibitor 1; TNFα, tumor necrosis factor-alpha. Since it has been reported previously that pre-stimulation of human MSCs increased their wound-healing properties [32-35], we stimulated our equine MSCs with TNFα, IFNγ, and COCl2 to evaluate the effects on (i) expression of wound healing-related genes in NBL-6 cells and (ii) in vitro scratch assays. It was observed that stimulation of MSCs with TNFα led to a significant increase in MMP1 (P <0.01) and IL-8 (P <0.05) mRNA expression in NBL-6 cells but that stimulation with IFNγ led to a significant increase in CxCL10 expression (P <0.05) compared with culturing NBL-6 cells with CM of non-stimulated MSCs (Figure 3C). In contrast, none of the stimulating agents influenced the expression of COLIII, and stimulation of MSCs with CoCl2 had no effect on the expression of any of the evaluated genes (Figure 3C). During evaluation of these pre-stimulation treatments in scratch assays, no differences in migration rates were observed between fibroblasts exposed to the stimulated MSC-derived CM versus the non-stimulated MSC-derived CM (Additional file 1: Figure S1A, B). When we studied the changes in gene expression in more detail, it became clear that potential significant differences in gene expression levels could be masked because of the rather large SDs we observed for several tested genes. Since we used the CM of MSCs from three different individual horses for our experiments, we reasoned that these large SDs could be caused by natural inter-horse variations. Therefore, we decided to present the results of the gene expression alterations per individual donor horse instead of using the average (Additional file 2: Figure S2A). By presenting the data this way, we made several observations. Firstly, when the non-parametric Kruskal-Wallis test was used to compare the gene expression data between horses, statistically significant differences between individuals became apparent in the mRNA expression levels of certain genes (Table 2). At a P value of less than 0.01, there were statistically significant differences for two hypergranulation reducers or wound-healing enhancers or both, namely cathepsin K (CTSK) and matrix metalloproteinase-2 (MMP2) (Table 2A). Likewise, statistically significant differences (P <0.01) between horses were found for four hypergranulation enhancers or wound-healing reducers or both, namely plasminogen activator inhibitor 1 (PAI1), collagenase type III (COLIII), fibronectin, and SDC2 (Table 2B). Secondly, with Dunn’s post hoc test, it was observed that culturing NBL-6 cells in the MSC-derived CM of horse B resulted in a significant mean rank difference of at least 6 for the genes CTSK, MMP2, PAI1, and COLIII when compared with NBL-6 cells that were cultured in the CM of either horse A- or horse C-derived MSCs (Additional file 2: Figure S2B). Overall, the increased expression levels of CTSK and MMP2, genes advantageous for wound healing, with a simultaneously decreased expression level of PAI1, a gene disadvantageous for wound healing, would make horse B a better donor for providing MSCs with the capacity to promote wound healing than either horse A or C. Using scratch assays to compare the effects of horse B MSC-derived MSCs on migration of fibroblasts with the other two horse MSC samples revealed no statistically significant differences and all three MSC samples could equally increase NBL-6 migration (P <0.01, Additional file 2: Figure S2C). Taken together, these data indicate that the expression level pattern in CM-treated dermal fibroblast cells is donor horse MSC-specific in our study. a P <0.05; b P <0.01. After clearly demonstrating that the CM of equine MSCs promotes wound healing, we were interested in exploring the potential of microencapsulating MSCs as a way to deliver the critical components of CM to wounded cells in vitro in a controlled manner. In a first set of experiments, we encapsulated equine MSCs and 2 days later removed these MSCs from their capsules to evaluate whether they retained their stem cell characteristics. Overall, the immunophenotypical profile, as detected by flow cytometric analysis using a commonly used set of cell surface markers , did not differ between MSCs removed from capsules and MSCs that were never encapsulated (Figure 4A). There was a significant difference (P <0.05) in the expression of MHC I, but this marker is known to be highly variably expressed by MSCs . In addition, MSCs removed from capsules retained the capacity to differentiate into osteocyte, chondrocyte, and adipocyte lineages (Figure 4B). Moreover, the PDT of MSCs removed from capsules was virtually identical to that of MSCs from the same source, but never encapsulated, from passage 13 to 17 (end of experiment) (Figure 4C). Mesenchymal stromal cells (MSCs) retain stem cell characteristics after microencapsulation (n = 3). (A) Expression of surface markers, as detected by flow cytometry, on MSCs removed from capsules after 2 days post-encapsulation as compared with control MSCs that were never encapsulated. Percentage of total cells positive is shown on the left, and representative histograms are shown on the right. *P <0.05. (B) Representative images of MSCs stained with Alizarin Red, Alcian Blue, and Oil Red O to detect osteocyte, chondrocyte, and adipocyte differentiation, respectively. Left column: undifferentiated MSCs cultured in expansion medium; center column: control MSCs that were never encapsulated cultured in MSC differentiation media; and right column: MSCs removed from capsules after 2 days post-encapsulation cultured in MSC differentiation media. Scale bars = 10 μm. (C) Population doubling times of MSCs removed from capsules after 2 days post-encapsulation as compared with control MSCs that were never encapsulated. MHC, major histocompatibility complex. In a second set of experiments, we cultured MSCs in capsules for over 3 weeks in order to test the potential of long-term encapsulation. MSCs encapsulated for 2 days were used as the short-term encapsulation control time point (day 2) and compared with MSCs encapsulated for successive 5-day intervals (days 7, 12, 17, and 22). At all of these different time points, equine MSCs were removed from equal numbers of capsules and subsequently plated in culture wells (Figure 5A). Before plating, viability was determined by using TBE and the number of live cells was determined. Over the course of the experiment, the viability of long-term encapsulated cells decreased slightly compared with short-term encapsulation but did not fall below 80% and this slight decrease was not statistically significant (Figure 5B). In addition, the number of viable cells present in the capsules for 7 days was significantly increased compared with 2-day encapsulation, indicating that equine MSCs did divide in the capsules, but remained constant thereafter (Figure 5C). After plating and upon confluency of the cells, PDTs were calculated. Cells encapsulated for 7 days showed a PDT similar to that of the short-term, 2-day, encapsulated MSCs. In contrast, cells encapsulated for more than 7 days showed a significantly higher PDT, indicating that it took those cells much longer to form a confluent monolayer (Figure 5D). For the duration of this set of experiments, pictures from confluent monolayers were taken daily to confirm that the stem cell morphology was maintained, indicating that the change in PDT was not due to differentiation of the MSCs which could result in an altered growth pattern (Figure 5E). Mesenchymal stromal cells (MSCs) remain viable after long-term microencapsulation (n = 3). (A) Representative images of MSCs encapsulated (left), immediately after removal of capsules (center), and after several days of culture (right). (B) Viability, as determined by Trypan blue exclusion, of MSCs removed from capsules at 5-day intervals starting at 2 days after encapsulation. (C) Numbers of viable cells removed from equal numbers of capsules at 5-day intervals starting at 2 days after encapsulation. **P <0.01. (D) Population doubling times of MSCs removed from capsules at 5-day intervals starting at 2 days post-encapsulation. **P <0.01. (E) Representative phase-contrast images of cultured MSCs removed from capsules 22 days post-encapsulation as compared with control MSCs that were never encapsulated. Scale bars = 50 μm. After showing that microencapsulated MSCs remain viable and retain general stem cell characteristics, we evaluated the CM from encapsulated MSCs in order to determine potential positive effects on dermal fibroblast migration and expression of genes involved in wound healing. To this end, we repeated the scratch assays and gene expression analyses, as previously described, by using CM from non-encapsulated MSCs (control) and from MSCs that were encapsulated and cultured for 2 days. Using scratch assays, we found that NBL-6 cells had an equally fast migration when cultured in CM obtained from equine MSCs compared with CM obtained from encapsulated equine MSCs (Figure 6A). CM that was collected from 2-day cultured empty capsules was also included as a control and showed a significantly slower migration compared with either MSC-derived CM (data not shown). Next, semi-quantitative RT-PCR analyses were performed on NBL-6 cells cultured in CM obtained from non-encapsulated MSCs (control, set as 1) and compared with gene expression in NBL-6 exposed to CM obtained from encapsulated MSCs. Specifically, the relative mRNA expression levels of a selected set of genes (that is, IL-8, MMP1, ColIII, and CxCL10) involved in wound healing were determined. A significant upregulation of IL-8 and MMP1 gene expression was observed in NBL-6 cells cultured in CM obtained from encapsulated equine MSCs as compared with NBL-6 cells which were cultured in CM of non-encapsulated MSCs (Figure 6B). In contrast, the gene expression levels of COLIII and CxCL10 were indistinguishable between NBL-6 cells cultured in CM from either encapsulated MSCs or non-encapsulated MSCs (Figure 6B). Conditioned medium (CM) from microencapsulated mesenchymal stromal cells (MSCs) promotes NBL-6 migration and alters gene expression (n = 3). (A) Migration distances of NBL-6 cells cultured in CM from encapsulated MSCs as compared with MSC CM in in vitro scratch assays. Data are expressed as micrometer per hour in 48 hours. (B) Fold change of mRNA, as detected by quantitative reverse transcription-polymerase chain reaction, in NBL-6 cells cultured with encapsulated MSC CM as compared with control MSC CM. Left panel shows genes involved in reduction of hypergranulation or enhancement of wound healing or both, and right panel shows genes that stimulate hypergranulation or delay wound healing or both. *P <0.05. COLIII, collagen type 3; CxCL10, CXC chemokine 10; IL, interleukin; MMP1, metallopeptidase 1; NBL-6, horse dermal fibroblast cell. The present study is the first to evaluate the effects of CM from equine MSCs on wound-healing properties of equine dermal fibroblasts and to explore the potential of encapsulated equine MSCs to deliver these critical components to equine target cells. Our salient findings were that the CM of equine MSCs stimulates the migration of equine dermal fibroblasts in vitro and increases the expression levels of genes that positively contribute to wound healing. Importantly, similar results were obtained by using CM from MSCs that were encapsulated in core-shell hydrogel microcapsules, indicating the potential of microencapsulated MSCs to deliver the bioactive factors present in CM. During our studies on the expression levels of genes involved in wound healing when equine fibroblasts were exposed to MSC-derived CM, two interesting observations were made. First, we found a highly significant, four-fold, increase in the mRNA expression of the MMP1. MMP1, also designated interstitial collagenase or fibroblast collagenase, is a critical remodeling enzyme required for re-epithelialization during wound healing [38,39]. In vitro studies have shown that CM from amnion-derived human MSCs alters the expression of MMP1 in human dermal fibroblasts , which is similar to our present findings with CM from peripheral blood-derived equine MSCs and equine dermal fibroblasts. Interestingly, the CM collected from MSCs that were microencapsulated even further altered the expression of MMP1 as evidenced by a significantly higher MMP1 expression in dermal fibroblasts when exposed to the CM from microencapsulated MSCs compared with CM from non-encapsulated MSCs (Figure 6B). A similar observation was made for IL-8 expression in dermal fibroblasts (Figure 6B), another critical component in cutaneous wound healing known to stimulate migration and proliferation of keratinocytes . Although it is speculative at this point, we hypothesize that the close contact between the MSCs in these capsules or the capsule microenvironment or both changes the secretion pattern of MSCs or, alternatively, that the MSC secretome is influenced by adherent (non-encapsulated) versus non-adherent (encapsulated) culture conditions. An increased expression level of MMP1 and IL-8 in dermal fibroblasts was also observed when equine MSCs were preconditioned by using TNFα. TNFα has been described to stimulate human MSC to secrete elevated levels of IL6 and IL8, resulting in accelerated wound healing . Our study shows that IL8 is also upregulated in equine target cells exposed to CM from TNFα treated equine MSC. For the two other agents that we used to precondition equine MSCs in our present study, however, we did not observe an upregulation of IL-8 or MMP1 in dermal fibroblasts when exposed to CM from these stimulated MSCs. The first agent, CoCl2, is a chemical known to mimic hypoxia, and our results in our equine model reflect results from a previous study in which no significant alterations were found in the expression levels of MMP1 in human dermal fibroblasts incubated with CM from hypoxic human MSCs when compared with CM from normoxic human MSCs . In addition, no significant alterations were found in any of the other genes that were tested (that is, IL-8, COLIII, and CxCL10) when equine fibroblasts were exposed to the CM of CoCl2-treated equine MSCs. The second agent we used to stimulate equine MSCs was IFNγ, a cytokine known to stimulate MSCs to increase wound healing in aged mice but for which the specific effects on the expression of wound-related factors in target cells, like dermal fibroblasts, have not previously been investigated. We found in our present study that equine dermal fibroblasts showed a significant increase in CxCL10 expression when incubated with CM of IFNγ-preconditioned MSCs. CxCL10 is a chemokine known to delay wound healing and to disorganize neovascularization , and although more in-depth studies are needed, we would like to argue that pretreating MSCs with IFNγ might not be beneficial as a regenerative treatment to promote cutaneous wound healing. Secondly, we observed that the expression level pattern in CM-treated dermal fibroblast cells was donor horse MSC-specific. Although our current study is too limited in experimental numbers and is lacking repeated isolations from the same donor horse to draw definite conclusions about donor dependency, our data are the first to indicate a donor-specific effect of MSC-derived CM on skin target cells specifically. This study and other studies describing donor variation in the cytokine expression level and in vitro bone tissue repair potency of human MSCs [42,43] collectively suggest that screening of candidate MSC donors is critical in order to take full advantage of the therapeutic effects of MSCs on cutaneous wound healing. Moreover, it is important to take into account the specific purpose of the regenerative therapy, as the CM of one donor MSC culture might prove more beneficial than the CM of another MSC culture, depending on the desired therapeutic effect. Despite the exciting potential of the MSC-derived CM as an effective cell-free therapeutic treatment in regenerative medicine, a major impediment to its use is the fact that these MSC formulations are not fully optimized in terms of delivery methods. The ability to control secretion of MSC-derived bioactive factors is critical given the limitations of pharmacokinetics and stability of proteins in vivo. To begin exploring the potential of such delivery methods, we microencapsulated our equine MSCs by using core-shell hydrogel microcapsules. Conventional alginate microcapsules have been used successfully to encapsulate human MSCs [44-47]. However, our study demonstrated that this approach is feasible for equine MSCs by using core-shell capsules which were designed to provide a more relevant extracellular environment and to better protect the encapsulated cells . Indeed, we showed that equine MSCs survive and divide within these microcapsules and retain their stem cell characteristics. Importantly, we found that CM collected from these encapsulated equine MSCs equally promotes dermal fibroblast migration when compared with the CM from non-encapsulated MSCs, suggesting that encapsulating of MSCs may be an ideal strategy to control the delivery of secreted products to equine wounds in vivo. Based on data we have collected thus far, future experiments are planned in which we will evaluate the healing-promoting effects of equine MSCs, non-encapsulated as well as microencapsulated, in an in vivo horse model, such as the horse model established by the group of Theoret et al. in which skin wounds are experimentally induced to heal both normally as well as with the formation of exuberant granulation tissue . MSCs have been reported to provide paracrine signals that promote wound healing, but (i) how they exert their effects on target cells is unclear and (ii) a suitable delivery system to supply these MSC-derived secreted factors in a controlled and safe way is unavailable. The present study was designed to provide answers to these questions by using the horse as a translational model. Our results suggest that CM of MSCs might be a promising new therapy for impaired cutaneous wounds and that microencapsulation may be a suitable way to effectively deliver CM to wounded cells in vivo. Moreover, our data showed that the effects of MSC-derived CM appear to be donor-specific, suggesting that a proper screening of candidate MSC donors is critical in order to take full advantage of the therapeutic effects of MSCs on cutaneous wound healing. Leen Bussche and Rebecca M Harman contributed equally to this work. We gratefully acknowledge the Cornell Stem Cell program for providing financial support for this study. LB is a postdoctoral fellow of the Belgian American Education Foundation. Additional file 1: Figure S1. Conditioned medium (CM) from preconditioned mesenchymal stromal cells (MSCs) does not affect migration of dermal fibroblasts (n = 3). (A) Representative phase-contrast images of wounded NBL-6 cells cultured with CM of MSCs stimulated with tumor necrosis factor-alpha (TNFα), interferon-gamma (IFNγ), or cobalt chloride (CoCl2) as compared with control MSC CM at 0, 24, and 48 hours. (B) Migration distances of NBL-6 cells cultured with CM of MSCs stimulated with TNFα, IFNγ, or CoCl2 as compared with control MSC CM. Data are expressed as micrometers per hour in 48 hours. NBL-6, horse dermal fibroblast cell. Additional file 2: Figure S2. Mesenchymal stromal cell (MSC) conditioned medium (CM) alters horse dermal fibroblast cell (NBL-6) gene expression in a donor-specific manner (n = 3). (A) Fold change of mRNA, as detected by quantitative reverse transcription-polymerase chain reaction (qRT-PCR), in NBL-6 cells cultured with MSC CM from three different donor horses as compared with control NBL-6 CM. Left panel shows genes involved in reduction of hypergranulation or enhancement of wound healing or both, and right panel shows genes that stimulate hypergranulation or delay wound healing or both. (B) Expression levels of cathepsin K (CTSK) and metallopeptidase 2 (MMP2) (genes involved in reduction of hypergranulation or enhancement of wound healing or both) and plasminogen activator inhibitor-1 (PAI1) and collagen type 3 (ColIII) (genes that stimulate hypergranulation or delay wound healing or both) with a significant mean rank difference of at least 6 upon incubation with horse B MSC-derived CM. (C) Migration distances of NBL-6 cells cultured with CM of MSCs from three different donor horses as compared with control CM. Data are expressed as micrometers per hour in 48 hours. **P <0.01. LB participated in the study design, was a main contributor in drafting the article, and carried out all laboratory procedures with the non-encapsulated MSCs. RH participated in the study design, was a main contributor in drafting the article, and carried out all laboratory procedures with the microencapsulated MSCs. BS assisted with the data analyses. TC was involved in the design and execution of the ECIS assays and helped to critique the final manuscript. EP was involved in the design and execution of the ECIS assays. MM was involved in the design and execution of the microencapsulation of the MSCs and helped to critique the final manuscript. Y-CL was involved in the design and execution of the microencapsulation of the MSCs. GVdW participated in the study design, data analyses, and critical revision of the manuscript. All authors read and approved the final manuscript. Image J. http://imagej.nih.gov/ij/. Accessed 8 November 2014. Doubling Time. http://www.doubling-time.com/compute.php. Accessed 6 November 2014.
2019-04-24T17:50:45Z
https://stemcellres.biomedcentral.com/articles/10.1186/s13287-015-0037-x
You need to coincide using all the template with all the transaction there’s an assortment of kinds of templates. The template can be readily modified by by you by creating brand new columns to track more advice. You will pay a stop by to the readily available office templates alternative in which you are able to pick the template which is suitable for your objective. Find there are many to select from. The template includes fields to guarantee sub-totals and sales taxes to special discounts have been computed, by way of instance, capability to economize most of bills of the particular consumer in 1 work book. Down load and complete a sterile statement template to ship to a customer or buyer for a means to collect sort an merchandise or service left. Utilizing Excel invoice templates that are complimentary is just a method to build expert invoices which can possibly be altered to suit alternatives along with clients. It is going to be saved in the laptop program. You can adjust the design by picking colors or for example a symbol Whenever you’ve selected the template that fits together with your own requirements. It’s possible to use pre-defined templates along with any type of information source to build reports in a exact brief moment. What you might need to to do is always to receive the template you wish to use within a bill to your intent that is very best. PSD templates would be the ideal value templates available on the market. Once you have your template place you will require a custom made function to displace the tag as soon as the invoice has been made. Scroll in case you will need to make use of among those templates. After the template is prepared to go. It makes it possible for one to input details like amount along with also the date of invoice, step by step description about your own client, along side the sort of work. It’s potential to get into bill templates in various formats out of the following. Making use of our templates is a great beginning to make an expert statement. The PDF invoice template is both user decent and friendly however it is perhaps not too elastic. Employing PDF Invoices plug in that you will acquire PDF invoice templates you could customize to this meet your requirements. To create an invoice is stick to a template. You can find two sorts of PDF template. PDF invoice templates are a cinch to utilize and retain. They are section of one’s organization, so they must be of high caliber and also match your own brand. Totally PDF bill Interface Suppose you’re a customer, acquiring a statement and prepared to process the payment to a business. You customize a statement by means of your branding and company info, save it like a template then put it to use each time you have to bill somebody. Invoices stick to a standard arrangement to prepare yourself. Your PDF statement is well prepared for use. Even a PDF statement will be connected. It will be possible to get an invoice to get a PDF or CSV file. Whether an statement is readily available for an order also is based on the affliction of the order. Even a PDF statement implies the info related to a own payment method (title, address, and so on ), and also not the advice related to your AWS account. A benefit is even now featured by invoices in PDF format while in the area of company as well as at the part of accounting. Invoices type an important role in virtually any corporation. With automatic logic it’s possible to ship various invoices predicated on the cost gateway utilised. An expert statement isn’t simply a representation of you personally or your own company, it’s likewise going to provide value to this bond involving you and your customer. Invoices provide your clients a synopsis of the merchandise or services that you have provided. If you are also on the watch for many professional equipped together with complimentary from cost statement to prepare your very own small business invoice, then you can procure a completely Free Invoice Template out of our website. With repeating statements you’ll be able to build invoices automatically that occur on a normal foundation. Invoice can be a document. Invoices are like wise a very superior way for company to be certain they will push through with anything they truly are assumed to present. Generating statement is one of many features that it provides. You will then keep up with all your bills and also the bucks you’ve made right in pay pal, even if the cost failed to undergo pay pal. The contact details related to a payment program is utilized by your PDF invoice. From that point you find it possible to down load many invoices in 1 pdffile based on several different standards. As it has to perform firm of checking your kid’s tooth, the professional will search for rust and show up at your kid’s gums, jaw and bite. Your next step must be to test on into specific companies. Not only are businesses laying employees off in numbers, it looks since it had been previously in recent years, like the labour market it self is much less promising. In summary , they need to learn they have somewhere to turn when her or his jurisdiction is abused by a manager in anyway. Many employees wind up believing that their present companies discover that it’s not possible to provide what they’re looking and move to scan the marketplace. Whether affected person is underneath influence in a specific time is the testing. Surgeons are encouraged to clearly show their expertise. Team-up Cosmetic surgeons never get the job done alone. Dental Practice A dental surgeon will be allowed to be hired after several years of training and learning. Dentists are competent to terrify since they have been fearful of their pain, even grown-ups and lots of men and women avoid therapy. Retained precisely the precise same patients, and treated lots of the similar patients to get 25 years retired. Acquiring a dental hygienist resume or CV may execute. In the event that you have the ability to locate the chances Each options could be exceedingly worthwhile. It is essential to become always working together on your own postsecondary career options. It’s likely to likewise cite specific dental techniques you’ve got special encounter with.2. Such steps will be able to help you to really be alert to the things to include within this project software. The task description can be the pal. It could be helpful to execute a SWOT analysis of the small business. Very best CV for dental hygiene may be stated in a number of ways. Our resume builder makes it easy to make a high-value resume . It is very difficult to get in check The moment tooth decay starts in a young age. Maintaining your toddler into the dentist in a young age will have them accustomed to this procedure and also become acquainted with the equipment. Just include at the event. Occasionally, get started operating ASAP and you also wish to see that amount. So, today you’ve got that added level, it is the right time to track down the job. You benefit a number years prior to going back into college and also will receive your level. You don’t need to do your school all at an identical moment. It was not just. You’re going to undoubtedly be after attending a superb school well-prepared. Considering all of the aforementioned skills you will have to have a moment direction talent. It’s mandatory that you learn that you’ve acquired the skills, knowledge, and education required for the degree for. Be certain your experience contrasts with every thing that is being hunted afterwards. So don’t don’t mention experience and a few added abilities, in the event that you’re ready to. The major area, your job knowledge needs to be included the following. You can find numerous ways to explore special clinics. In the event, you feel you are lagging take the compulsory training in order for this to force you to get of requesting a job first effort a one. You might rather create a department for your certifications, because you could have certificates for a dental career. The sort of test and exam’s level is what matters to pick on the preparation method. Contemplating the economy’s current state, lots people are concerned in their own tasks. Since you have the ability to become that you simply will keep to preserve the job after you receive it, you prefer to make certain. Internships and Work opportunities are an superb way to acquire practical knowledge in your town. You will take pleasure also it’ll prove very fruitful in a very long run. In the event that you’re looking for some assistance, do not be scared to request explanations. The best way to get Dental Assistant work fast Dental Assistant job is just one of the careers expected to disperse its tentacles throughout the healthcare field over next few decades. Certainly one of the strategies to begin jobhunting for a recession-proof livelihood would be always to have an exhaustive appraisal of your credentials. You ought to understand truth about how effectively their organization is doing, plus they haven’t been putting their employees. Your resume needs to demonstrate the significance it’s possible to bring to some certain provider or job, not only reevaluate your accomplishments. You may also choose to look resumes for both business functions. Resumes abide by two formats that are standard. Creating a resume for the first time can be challenging as it truly is tricky to ascertain that the information employers want to find within a nurse’s resume. There is An nursing resume aim an opening statement that begins which you want to secure function. Nursing resumes comprise experiences and special abilities that ATS systems that are numerous over look. Nursing is probably the professions in the 21st century. Additionally, your nursing resume will require to be tailored to this work advertisement. The above nursing resume objective bills deliver examples that you find it possible to employ for increasing the capability of one’s own resume and earning yours. Firstly, close as possible, you’ll have to devote your nurse resume the obligations you have experience with and therefore are cited from the work description, attempting to meet them. The healthcare provider may possibly well not be present once the change comes about, or some period that the shares the info while physicians are not normally liable for identification. Entry-level nurses make the error of listing each of their experiences in their resumes to boost the particulars in their professional experience. No matter at which you might decide to use like a nurse, then patients having a wide selection of psychological or physical difficulties will be encountered by you. Nurses have to find a way to assess a situation and make important decisions instantly. They need to make a bachelor’s level and earn licensure as a rn. Whether you’re some nurse or a college student nurse, there is definitely something you can be learning. Many nurses would concur that adaptability is just one of the nursing talents that are most essential. Finding tasks because a registered nurse requires a mixture of a group of job and also the correct mindset. Each cover letter has to be tailored into the facility, not utilize terms that are generic. You also need to compose an impressive short employment cover letter that can introduce the operator and one. Please remember you will need a companion resume cover letter to automatically seal the offer. Tend not to create the sound exactly like you’re currently speaking . A fantastic description functions as a all-natural advertisement that is possible and motivates that the viewer to browse for your site. The outline should be succinct and short, but at case distance should be filled by the grad on the webpage, creating lines of experience descriptors could be wise. The work description can be the very best friend. Don’t neglect to highlight selected expertise you’ve which can be associated with the work description, together with achievements you’ve achieved and activities you’ve managed. Cases incorporate expensive worker turnover statistics and also the requirement for greater training apps. Make sure that you own a minumum of one particular case of a time you’ve demonstrated every one of the top five abilities recorded here. Typically some body having a diploma or A.S. in Nursing is going to become at a position to earn their particular Bachelor’s, both on the net or from some conventional campus established application. The brand new enrolled nurse devoid of medical expertise really should not be concerned about their lack of experience for a nurse. You might be employing to a wide range of postitions if you should be students browsing for your very first nursing job. Communication skills will likely probably soon be crucial for every one of the above scenarios. The next thing todo is to begin honing. You might already use lots of those nursing skills that are transferable necessary to become more successful. As well as, it might be an perfect opportunity to network together in your area. Regardless, it is sti have to add your expertise to present a number out in. An individual could have work experience maybe not entirely seeing the location in question. Then a task may not be done punctually even though you are only a handful minutes late for work. Nursing is of the subject, as securing that occupation will be dependent on individuality and your own talents together with your own experience. All endeavors differ, plus it is better should you create a physician professional resume that emphasizes your capabilities and expertise . Find out more about the culture of the business to choose perhaps the job matches your requirements. For example, in the event you are chasing work from gerontology, you may concentrate on skills like psychiatric encounter, stress direction, and treatment. Apparently, each and every endeavor so make certain you examine the job description with care, will soon probably telephone for abilities and adventures and concentrate on the relevant abilities recorded by the employer. The perfect way to discover an RN occupation is always to find on the web for an acceptable position. Do not Skimp on high quality layout To be dismissed, your suggestion should seem of and specialist premium quality. It should be persuasive when you outline each one the advantages the business can be provided by you. Just after knowing your potential sponsor well, that you simply are able to think about organizing a suggestion. Establishing a successful function sponsorship proposal calls for a job, in the long run, it’s well worth doing. Writing a sponsorship proposal to draw patrons for your function or organization might look to be an daunting endeavor. Bottom lineremember your sponsor agenda will be visibility. Nowadays you have to follow up that they’d return for your requirements personally. You have surely got to make sure that you know what it is that it is you might be currently searching for After creating a property suggestion. Because it might sound, Creating a searchable business proposition is much less intimidating. Planning business proposal to get an event sponsorship can possibly be complicated as you want to meet also the requirements of the host for an easy method to get the capital that you’ll require, although the essentials of the institution entity. An extensive media plan on your proposal informs patrons the method that you intend to market the function. Writing a proposition may be described as considered a job. In earning your proposal, the very first stage needs is therefore it is possible to introduce a proposition that’s tailored to this 34, to collect info on the niche of the prospective contracting firm. There’s one other remedy which is to compose a property proposal. You will find a number of types of sponsorship proposals in line with this essence of the situation. During athletic functions and company proposal the most typical sponsorship proposals are. Once you are aiming to help make the sponsorship suggestion, be aware the simplest principle. A sponsorship correspondence is just a section of any fund raising event. Writing a sponsorship letter may be a tricky affair. Now you learn how to compose a sponsorship letter, let’s have a peek at an example that will permit you to comprehend the arrangement for exactly precisely the similar. You how exactly to host the event and also want to comprehend just how exactly to compose an expert sponsorship letter is impressed. Make sure to not undermine your schedule objects that you’ve previously setup to detect sponsors. Besides revenue, make sure that sponsors are ready to market your team some manner permitting you to extend your own reach. You down it down a couple parties and’ve approached every single possible sponsor. Give your club a sponsorship audit and determine what it can offer to your sponsor. Like a way to compose celebration sponsorship suggestions, you ought to become mindful using correspondence creating approach for your own sponsors that are prospective. You need to describe why you require diversification in detail. Sponsorship can be in cash or even on physiological things and services which an expected sponsor can present you. You will provide exclusive hedging in the event that you are able to bring in a participant that is big, or you provide tiered offers that enable smaller sized sponsors have several benefits and to contribute at a variety of degrees. Obviously talk why it is why you will need sponsorship and that you’re doing what you are. Everything you ought to be certain your sponsorship sails can be your Proposal. Sponsorship doesn’t signify that you merely get some thing . It is not a contribution. Getting particular on your online business proposal letters is a means. Do not forget to spell out what exactly it really is that you are currently doing, why you’re doing this, the sort of property you desire and what exactly the party will escape the real estate arrangement. You require the job, you must mention. Explain that you’re becoming married and desire hedging in order to pay the costs. It’s crucial that you simply carry on giving routine updates to your host in regards to the way in which in When you have gotten the thing. Producing your Sponsorship Profile As you know, they’re not devoting sponsorships off at no cost, you need to just work in them, but there are specific things that you can certainly do as a way to turn your job a bit easier and lift your chances of locating the support that you would like. Offer a quote of this precise amount you expect as sponsorship and direct them in the direction of the part of the proposition to get information that is more complex. Sponsorship sponsors the chance to share in a positive manner, also offers funds and support to event organizers. Vehicle payoff is incredibly substantially like acquiring advertising since that you do not know perhaps the cash spent ridding someone will increase a business’s earnings (or market-place advantage ) the direction you trust it’ll. Risk management approach starts with pinpointing. Even the hazard management application will specify all of the risks to the project and also exactly we are very likely to handle these. An excellent hazard management program provides you with the capability to steer risks until finally they become actual problems that may save you funds and time by causing delays in distribution, manufacturing or sales. Priority A good hazard management application can establish exactly the most significant risks to this project. There is maybe not a list of possible dangers with an associated hazard rating and In the event you’ve completed a hazard evaluation, that you don’t possess an appropriate risk investigation. A more risk investigation that is suitable comprises alist of potential dangers and vulnerabilities that may be utilised that you’ve reviewed. Furthermore, it’s important to do a hazard assessment after you end each and every stage of the undertaking, and to reevaluate your hazard management program. Together with the risk administration procedure goes to be conducted throughout the project life cycle, defines as soon since the danger assessment is going to be performed. There really are a lot of ways to reduce danger, but before you’re ready to get going defending your own company you first must acquire familiar with the notion of risk management. In the event that you can stop the risk it inclined to impact the desirable result of your project. To make sure that your endeavor’s successand define the method that you are likely to take care of risks that are prospective for those who want to do so you may possibly identify, mitigate or avoid problems. The risk that was possible was included dependent. You will need to comprehend what sorts of challenges your business faces, In order be able to assemble a good hazard management regimen. Each risk needs to be dealt with by declaring you are prepared get a policy for it or to accept the risk. It’s not true that hazards will lead to negative results. So, prospective risks have to get evaluated and quantified in regard for their probable outcomes. Pick your answer to each potential, The moment you have recorded all the risks at every step from the task. In the event the risks you might have recognized turn upward, you would have to be prepared to take care of them. Risk managers are willing to bargain with concerns in a number of settings. Utilizing analysis outcome, they are able to examine the likelihood of unique adverse functions along with their impacts and pose prospective risks regarding seriousness. Managers must be in a position to consider pros and cons, then opt for the possibility that has got the chances of succeeding. Consequently, health managers really need to revolve round growing and executing a healthcare direction system that can deal with the cost of inequality and also healthcare in care of accessibility. Which is why risk management is crucial. Threat management is. Describe just how any investment related to hazard management may profit the Project. In the event you desire to organize 21, you want to feel about every scenario if it has to do with risk management. Medication Education 101 Medication management is a portion of health literacy. In case you prefer to acquire yourself a nursing home that is excellent for your own parent or relative, subsequently search for an fantastic supervisor superior administration methods. By keeping an eye on the air healthcare administration needs to be familiar with developments. Your security application will have a locale a means to move all mobile calls into the location, along with a method to put a computer system which allows your company to keep generating revenue. Be intentional regarding the statistics you include in the plan. The risk management program would be an advice document which should function as team members answerable for executing risk and reference to your two professionals. A thorough terrorism risk management program should, at a minimum, include these parts. A three-tiered terrorism hazard management application, for example initial and in depth evaluations and lots of different risk management approaches, could be implemented to reduce the chance in the terrorist assault. A small quantity of planning will create a significant impact. While circumstance planning may appear straightforward, there are. If needed, the chance Management strategy is going to be updated. Safety initiatives that are affected individual may not be simply facilitated by hazard management plans in patient care but in addition minimize readmissions. You’ll locate a good deal of invoice generating software online which could routinely generate your slide down. In most instances, there’s zero cost for labor however the statement may comprise the purchase price of loading and unloading the materials. You are able to create the invoice entirely your own, so shifting the template to follow together with your needs. During the support of a sterile invoice template it is simple to print and make bills. When buyers need additional funds sources to their undertaking A proforma invoice is extremely helpful. You will need to have assistance with the occupation, Once you are generating this kind of invoice and you’re going to be able to use the Service bill Template to supply you you will be needing. You desire the job to be fast and straightforward, when you’re creating a statement. Through the support of the sterile bill template you can make an invoice that is an easy task to read and know and that is certainly going to meet your needs. Invoice is an industrial document. The statement needs to be built that after setting all the particulars of the transaction, it appears complicated. Industrial bill can be just really a file. At case of the traditions inspection, a small business invoice that is well prepared can assist the customs creation require a decision regarding the way your dispatch ought to be successfully processed. You need a way to create an invoice which will not take a moment. A pro forma statement is just really a kind of earnings quotation that is employed ahead of purchasing this item to verify the trade or because of a financial quote paper that is legal. Basically some info connected to the services is comprised by a statement. Throughout assistance from Sample assistance Invoice provides you with will create some thing which will assist your organization. Now you would like to earn the type of invoice which is simple to browse and find out. To generate an invoice in your own you only need to put in a fundamental template form on the web site. Each invoice needs to be referenced with quantity or a statement identification which will produce a distinguishing entry. So invoices are incredibly crucial for practically any form of company. They produce an vital part in any small business enterprise. The desktop image is included by the BBQ catering invoice. Once you want to generate an invoice you want to find a way to make. The templates are simple to utilize and spare time that could possibly be utilized in perform that is important. You may use something Invoice Template to assist you in making the kind of invoice which may get the job done suitable foryou out . Our agency statement template part of an assortment of templates produced from Vertex42 for providers, services, consultants, and other organizations that are tiny. The Service Invoice Template can give the aid that you should create to you. An template can be really a template which makes it possible for you generate invoices employing details that are standardized. The invoice template is given in PNG format. You may set the parameters accordingly that the program does all the calculations when you get in the amounts and the consumer’s name, After you down load templates. Templates could be received by you . If you employ a invoice template, you are able to decide on the format that works best for your kind of business, thus simplifying the procedure. Utilizing complimentary Excel invoice templates can be a ways to make professional statements that could possibly be altered to satisfy many different clients along with solutions. It is possible to change the template up also it is possible to publish it and then utilize it in your company. Alternatelyyou could use the templates from your excel. When you’ve selected you’re able to correct the master plan by deciding on various colours or adding a logo. Blank invoice template could be used to conserve safeguard your business trade listing and track small business tasks that were crucial. There is A invoice template a template in which particulars regarding an item could be filled to transform . Download and complete a sterile invoice template to ship to buyer or a customer as to collect sort a solution or service rendered. It’s possible for you to get into amazing M-S Invoice templates that are user friendly for those programs. The template captures all of the details in one webpage. Just like additional statements an statement templates possess a header section and also a diagram in its human anatomy. You are able to get into the bill templates that are online at a very nominal price by sites.
2019-04-22T10:08:04Z
http://hotelaquaeflaviae.com/16-wzor-cv-do-pobrania-word/
“why I have to get up so early?” The young woman question herself as she was waking up. Light barely hit the room as the sun has not yet risen up. She slowly risen up as she sat up, while rubbing her eyes with one hand. She let out a shout in frustration as she was not a morning person and look at the time “7:20 AM”. “Great! Even waking up before the alarm hit”. The light peeking between the black curtain, barely shed any light into the room. With a loud a sigh she left her bed and started to get ready for the day ahead. As soon as she was done getting ready the second alarm went off, but it was from her room, it was from the kitchen. Multiple small beeps came from the kitchen and the smell grew stronger. Once ready in the kitchen, she picked a small mug from the cabinet and pour some coffee from the automatic coffee machine. “Thank you, ready brewed coffee.” The woman’s second alarm of the day was a coffee machine that brews at most days at eight in the morning. She added cream and sugar to the coffee and gave it a taste. The hot fresh coffee warmed her up almost immediately and felt that great fresh energy. As she continues to drink her coffee, she looked out the window and looked at the slowly rising sun. “Remember to meet up at the Planetarium at ten o clock okay?”, she remember this was the day of the meet up. A swirl of emotions rounded her up: happiness, anxiety, worry, dread, ecstatic. Meeting a friend from online for the first time, was a roller coaster, you talked to this person for who knows how long and the chance to meet brings up so much anxiousness. It was still an hour and half left till the meet time. It would take half an hour just to get there. “Who could that be?” thought the woman as she approaches the door. It wasn’t unusual to have people knock this early. She opened the door and was confronted by a person hidden in a large coat. Sing Ups are now open. Prep Phase begins at 14:00 EDT on Friday, April 5, 2019. Click the link to see how that applies to you. During the 2 hrs stand-by NO ACTIONS WILL BE ACCEPTED. Only wills can be updated. This is to promote healthy sleeping behaviours, and so that all players (and GM) will experience a minimal impact on the other aspects of your life (except for how Mafia makes us paranoid and sleepless; even I can't fix that). Yeah hahaha, no. Phase change will be at 14:00 EDT every OTHER day unless something comes up (I'll try to let you know in advance). Actions are due two hours before phase change (12:00 EDT). Anything submitted after that time will not be counted. - Role-handoffs (for BO/Friends/DBs/Lovers only)! If you intend to let another player handle your actions, you must inform the GM. You can let the GM know if it's for only that phase or blanket permission for the duration of the game (which can be revoked any time you choose). If you don't mention it that its for the rest of the game, it will be treated for that phase only. In which you have to send another PM giving permission again. - The gameplay will be facilitated by the use of Discord once the GM figures out how to use it! Discord is an efficient tool for communicating with other players (and joining in the banter), and you are highly encouraged to join Discord for that purpose. Note: It is not required to use Discord to play. Actions, Wills, and phase changes are updated on the forum as per tradition. Details for joining Discord are given to all players during prep phase. The GM will not prioritize Discord unless previously discussed with player. - Failure to send a PM to the GM of whether voting or abstaining during day phase, a random vote will be sent in your place instead. Last edited by Kamite on April 5th, 2019, 5:32 pm, edited 8 times in total. Players are typically split into two: Black Organization vs Town (Police, FBI and Civilians). In general, the ratio of BO to town will be between 1/3 to 1/4 (that means between a third to a quarter of players would be BO). It is at the liberty of the GM to balance the roles as they see fit, however, so this ratio is intended to be a guideline only. Don’t expect the GM to follow this. Though balance between roles is always in the mind, anything can still happen. Players are given their roles and therefore their alignment during the beginning of Prep Phase or Night 1. Each role has its own set of actions that can be performed during phases. It is highly recommended that players check what actions are available to them when they receive their role from the GM. You may provide the GM with a will to be presented at the time of your death (unless you are erased). A typical will usually summarizes a player's actions and intel they have gathered to that point, resulting in something along the lines of: "Will: I interrogated Conia and got Black Org on Night 1. I interrogated PhoenixTears on Night 2 and got Not Black Org." Your will, unless erased, will be provided by the GM after your death is announced (whether it be by lynching, APTX, or just a routine killing). The GM has a right to censor or remove any will if they feel it reveals too much or it is game-breaking. You may always send in a new order/will to replace your old one, assuming the phase has not yet ended. However, sending a PM to the GM to “add ‘this’ to the will” will become the new will. When updating the will to the GM you must send ALL of it at once. Otherwise whatever you send last regarding the will be the new will, whether is complete, an “update”, or an “add ‘this’ to the previous will. Always make sure you are sending your wills to the GM and not to yourself by mistake. This has happened in previous rounds, and it won’t no longer be accepted once you die. Every night phase, The Black Organization and/or Assassin may send a kill for one player. The Black Org is expected and encouraged to consult with one another on who to kill during the night and possible lynch votes during the day. A private channel for the Black Org to discuss strategies is provided in every round by the GM. Every member of the Black Org must kill successfully before a member is allowed a second kill. The exceptions to this is if a member is unable to kill due to being arrested or lynched, in which case they are no longer factored in to the kill cycle. Once the cycle has been completed once, a new order may be decided. In the event the last BO member of the kill cycle becomes discombobulated, Kill cycle will still reset as it was an attempt. Every member of the Black Org may use an APTX assuming there are enough remaining. Unlike with the nightly kills, there is no restriction on how many may participate. Each member is limited to using just one APTX per day phase, however. The Black Org may kill or APTX a fellow member if they so wish. If more BO send an APTX than they are remaining, the last APTX orders, will go through. Everyone is allowed to vote during day phases, whether they be from the town or the Black Org. You may only not vote if you are dead, arrested, or were hindered by an ability (such as Frighten). The player who has the most votes is lynched. Failure to send a ¬¬¬¬¬¬¬PM to the GM of whether voting or abstaining during day phase, a random vote will be sent in your place instead. List of abilities that constitute crimes: Kill (whether it be of the normal, sniping, or APTX variety), Disguise, Slander, Bribe, Discombobulate, Abduct, Erase, Sabotage, Frighten, Steal, Drug via Sleeping Pill. CHOOSING COSTUMES IS NOT A CRIME. If someone is killed, lynched, or arrested, their action for that phase will not go through and will fail. The only exceptions to this are arrests and poisonings with APTX. Arrests can stop APTX. Lynchings, on the other hand, do not. If Kazuha was successfully poisoned and accompanied someone that was about to be lynched over the 1 vote difference, the reduction of that 1 vote fails (aka, the accompany fails) and the target of accompany will be lynched instead. If a face pinch is performed on a player and that player is in disguise (whether they are town or Black Org), the target is automatically arrested. Note: Anokata is not technically in disguise, and thus is unaffected by House Search (unless they have other crimes) or Pinch. Injured: Player is unable to use any abilities and also loses any of their passive abilities (including any actions of disguises they may have been wearing, though they do not lose the disguise itself). The exceptions are the nightly killing for Black Org members (they may still carry out a kill at night), handing out of the suitcase during the day, and Lovey Dovey. Injured players may still participate freely in the game, including casting lynch votes and using items given to them by other players. Any actions (apart from arrest, APTX, suitcase actions, Bowtie/Watch and voting) used during the phase the player gets injured will fail. Suspended: Police that attempt to arrest someone and are unsuccessful will be suspended for two phases following the arrest attempt. While suspended, the police officer in question will lose all abilities apart from voting, Bowtie/Watch, suitcase actions (for BO disguised as police) and Lovey Dovey. Any actions the police uses (apart from arrest, Bowtie/Watch, suitcase actions, Lovey Dovey and voting) on the phase where they become suspended will fail. The Black Org has a leader (assuming he is in the game), referred to as Anokata. If Anokata is not present in the game, the next person in the Black Org list is the leader. The leader may designate the night kill target and give the order as such. The leader may NOT order another BO member to kill themselves. If a member of the BO sends a kill, the leader can only override it with the killing BO's permission. If multiple BO send a kill in the same night, the kill will be selected based on rank order and whether the member is eligible to send a kill. Black Organization wins if the BO outnumbers the Town and there is no foreseeable way for the town to regain control of a day vote. BO/Town lovers win when everyone else is dead or arrested. Whether the game ends is determined at the end of the phase, so if a player is due to be released during that phase they will be factored into the decision. Eg. Irish is supposed to be released from Detention the same phase where Chianti is arrested, and all other BO members are arrested/killed prior, the game will continue with Irish being the last remaining BO member. — This section has been removed because the GM hates it and doesn’t want to deal with it. If you need a general overview of how things go, please see the Order of Actions section in one of the last few games, or the Forum Mafia Topic. If Vermouth or Kid has a disguise of an FBI subordinate, regardless of if they use the disguise during the game, it will be counted in the subordinate list and James will receive a small hint akin to, "You believe something is strange with (#) of your subordinate(s)..." Note: Akai/Jodie/Camel/Rena/Amuro being Anokata will not count toward this notification, because they would not be in disguise. Anokata will be included in the number of FBI agents in the game if he's one of those roles, but there won't be anything strange about him. James can also receive Anokata's results in this case. With concern to Akai, James will receive only one of his investigations. In the case of Rena, James will receive only one of her actions (Betrayal, Investigate, or Special Investigate), chosen at random. James can NOT receive bowtie results. James can NOT find out if Amuro frightened someone. May not befriend any Black Org members and may not befriend a Detective Boy. Detective Boys have a hierarchy: Ayumi, Mitsuhiko, Genta. Roles with status: decided by Yumi during Prep Phase. Cannot befriend Sonoko, and children cannot be lovers. When one lover dies, the other commits suicide that same phase. No amount of healing or protecting may prevent the death of a suicidal lover. A town/town pair wins along with the town. A Black Org/Black Org pair wins with the Black Org. A town/Black Org pair does not win with either the town or the Black Org. To win as such a tandem, all other players must be dead/arrested/otherwise unable to stop them from killing. Lovers may still win while one or both are arrested (assuming Town/Town or BO/BO). Player gets to know how many Black Org members are present in the current game (not their identities). Anokata is included in this count. Last edited by Kamite on March 20th, 2019, 5:08 pm, edited 2 times in total. Note: Rum’s gender observe is random every night, but if more than one observe him/her in the same night, they will receive the same results. Note: If Ran successfully protects (and saves someone), she will become temporarily injured for the following two phases. Note: If Makoto successfully protects (and saves someone), he will become temporarily injured for the following two phases. Note:Night 1, Agasa may choose to use either item for himself. During the day phases, Agasa can choose to give himself one item or to hand out two items to one or two other players. Agasa may not use both items for himself. He may not keep one item for himself and hand out the other to someone else. If he chooses to keep one item for himself, the other item will not be in play at all the following night. Items: car keys + the items of her current disguise. Note: Shadow Man may choose to use one of the following each night: Betrayal, Crime Report, Cross-Examine, Detect, Discombobulate, Fake, Frighten, Heal, Interrogate, Investigate 2, Lawsuit, Observe, Protect, Snipe Guard, Steal/Return Item, Special Investigate 1, Stake-Out, Research. If Shadow Man chooses to use Lawsuit, he may only use it once per game. If he is discombobulated on the night he uses it, or it fails for any other reason, this use will not be used up. If Shadow Man successfully protects (and saves someone), he will become injured for the following two phases. Shadow Man's gender and age observe is random every night, but if more than one observe him/her in the same night, they will receive the same results. Shadow Man can be positively identified as any and all roles. Note: The Traitor is less of a role on its own and more a status combined with another role. This status will be given alongside a randomly picked town role to the chosen player, meaning that a player can be Takagi and also the Traitor. They can be any town role (including Yumi and any one of the Detective Boys), but, for the sake of simplicity, they cannot be a lover nor a BFF. The Traitor will only be in if there are 12+ players. The Traitor is given one other role in the game at the start of Night 1 that they must find and kill. This role can be either BO or Town. If they are successful in killing this role, either by killing at night, successfully lynching them during the day, or APTXing, the Traitor will be considered to have won and will be removed from the game. At this point it will be announced that the Traitor has killed their target and the Traitor’s role and status as Traitor will be revealed. The game will then continue until either Black Org, Town or Lovers win. If the Traitor’s target is killed by the Black Org or lynched without the Traitor’s involvement, then the Traitor will be given a new target one time. If the Traitor fails again, the Traitor will be killed and removed from the game, even if the Traitor is currently in jail when this happens. If this happens, it will not be revealed that they are the Traitor until the end of the game. If the Traitor’s target is arrested, the Traitor will not be given a new target or told their target has been arrested. The Traitor has an investigate to find more info on their target. The Traitor won’t start killing until after Night 2. Last edited by Kamite on March 20th, 2019, 2:04 pm, edited 1 time in total. The player chooses six players. The number of pairs of lovers in the game is up to the GM. Yumi may not choose herself. Sonoko's ability takes precedence over Yumi's ability, meaning Friendship always takes precedence over Lovers. Once Irish/Yukiko have their selected disguises, they can disguise that same phase, meaning they would be disguised Night 1. Once the player's last costume is used, they will be given a new list of disguises to choose from starting the following day (meaning they can be disguised again the next night). For example, if Yukiko is on her last disguise Night 3, Day 3 she will be given a new list and can disguise again immediately on Night 4. The GM will choose a role not in the game and give that disguise to the player on Night 1. So, this isn't really a prep phase ability anymore, but it doesn't make much sense as a status. The player will still be able to use their disguise abilities on Night 1, this is just because having Vermouth/Kid choose disguises amounted to nothing more than getting a random one anyway. Scent won't be taken. So Kid disguised as Akai, for example, won't have a scent. Vermouth will always have a scent, whatever disguise she gets. They can't disguise as: Black Org members, Conan, Haibara, Ayumi, Genta, Mitsuhiko, Sonoko, Shadow Man, Yumi, Kid, Yukiko or Anokata's role. It is possible that KID and Vermouth obtain the same disguise, as their disguises aren’t counted as roles "in the game" when getting the disguise. The player will have items from his original role and from their disguised role. So they can have two guns in case Kid or Vermouth disguises as a police officer. If Vermouth or Kid is injured, they will not lose their disguise. Sonoko names a list of players she would like to befriend (GM determines the exact amount of players to list). Sonoko will then randomly befriend one of those players. Sonoko and her friend will know one another's identities. Detective Boys, Shadow Man and Black Org members (including Vermouth and Anokata) cannot be befriended. Lovers may also not be befriended (but this shouldn’t be the case anyway, since Friendship takes precedence over Amor). Sonoko may use the abilities of her friends, with some exceptions. If Sonoko befriends a police officer, she will not be able to detain, arrest, or house search, or pinch. Sonoko may not steal, even if friends with KID. If Sonoko befriends a role with a "one-off" ability such as Lawsuit or Voice of Reason, either Sonoko or her friend may use the ability, but it can only be used once during the game. Sonoko can have passive abilities. If she befriends Akai however, she will not have vengeance. If she befriends Rena, she'll get the same betrayal results Rena does each night. If she befriends James, she'll get the same FBI results James does each night. If one of them is discombobulated or frightened, the other can still get the benefits of the passive ability. Sonoko status is separate from her friend. If Sonoko's friend is injured, Sonoko will not be injured. Even if Sonoko’s friend is arrested/detained, Sonoko can still use that friend's abilities. Sonoko will not lose her ability if her friend dies. If Sonoko befriends Yukiko, she will be able to use the abilities of Yukiko's disguised roles. If Sonoko befriends Yukiko she will not receive a true in Choosing Costumes on Prep Phase, due to it being her friend's doing. If Sonoko befriends Yukiko and Yukiko dies, Sonoko will be able to choose costumes and use the abilities of the disguises, but she still will not have arrest of any kind. Disguise investigate will still be false in this case. Tequila/Vodka will Abduct one character that is not played in the game by any player. The GM will send him the name of one random town-sided character not in the game. Tequila/Vodka may abduct Vermouth/KID's disguises because they are not considered "in the game." They may not abduct Anokata’s role, as it is considered to be in the game. Rena will be told one action that the Black Org took that night. The result will be randomized based on the actions the Black Org takes. Rena doesn't need to PM the GM to use this action, but it can be discombobulated. Once per game, the Assassin may also "Bribe" the GM to kill a player. The Black Org member doing the kill must hand in the bribe action. The Black Org leader can also order it on behalf of that person. The Black Org and/or Assassin's kill that night cannot be hindered by any means whatsoever, including an arrest on the killing player. Night action, not a crime, can be covered, can be discombobulated. Player may choose a primary target and a secondary target. The primary target's actions for that night will be changed to target the secondary target. Yamamura will be told his action is a success, even if the primary target does not send actions that night. If the primary target sends actions, they'll be informed that things got a little jumbled and their target has been changed. If the primary target gets confused by Yamamura and discombobulated (or drugged) in the same night, then the primary target's actions will fail anyway and they will not know they were confused. Can be used to change the kill target UNLESS Bribe is being used. If Yamamura's primary target is a BO sending Bribe+Kill, Yamamura's action will fail as if discombobulated. Can not be used to confuse an Arrest/House Search. If the Arrest/House Search is successful, any other actions done by that cop will still be confused. If the Arrest/House Search fails and the cop is suspended, the cop will not know they were confused. In either situation, Yamamura will just be told his confuse was successful. CAN confuse Detain / Pinch. If Yamamura confuses a trickster who is targeting him with their discombobulation, then discombobulate will take precedence and Yamamura will be notified that his action failed. If Yamamura confuses a trickster who is targeting someone else but makes the secondary target Yamamura himself, Yamamura's actions will fail. Trickster will still target the original target. Yamamura cannot use himself as the primary target. If Yamamura's Confuse does not cause any of the primary target's actions to change (ex: forcing Eisuke to target Yuriko when Eisuke is already targeting Yuriko), then Yamamura will just be told his actions were successful, and the primary target will be told "actions successful" (or regular results) without being told he was confused. If Yamamura's Confuse causes a trickster to target themselves (ex: Eisuke targets Eisuke), then the trickster will be notified that their action failed. Yamamura will be told that his action succeeded. If the BO tries to kill Yamamura and Yamamura dies, then Yamamura's action fails, UNLESS Yamamura is Confusing the killer and directing the actions to someone besides Yamamura himself. Confuse does not affect abilities that don't have a player target (ex: Detect). The target will still get results for those actions as normal. Yamamura chooses Abs. (Eisuke) as the primary target and Conia (Gin) as the secondary target. As long as Abs. send a discombobulate that night, it will target Conia, regardless of who Abs. tries to discombobulate. Can detect if a specific role is in the game per night. They need to ask for the character name (Conan, Heiji, Ayumi...) and not the role type (Detective, Police...). Vermouth and Kid’s disguises will not count as being in the game. Neither with Yukiko or Irish’s disguises, unless those disguises are a role otherwise present. If Anokata is in the game, both the Detect for "Anokata" and the Detect for his "role" will be True. Vermouth disguised as Ran. Anokata’s role is Makoto. Protection via Agasa’s watch cannot be discombobulated. Discombobulation can prevent the Black Org from killing or sniping someone, unless bribe is in effect. If two tricksters trick each other in the same phase, both tricksters will have all of their actions fail. (Same for if three tricksters trick each other, ex: Yoko tricks Vodka, Vodka tricks Eisuke, Eisuke tricks Yoko.) In this case, none of their trick actions will count as crimes (and will come up false on investigation), because they will not have happened. However, if two tricksters trick each other and a third trickster tricks one of the first two, the first two will fail their actions and the third will get a success. (ex: Yoko and Vodka trick each other. Eisuke tricks Yoko. Yoko and Vodka get “your actions failed” and Eisuke gets “success.”) In this case, only Eisuke’s trick will count as a crime (and can be investigated as true). Vodka and Yoko’s actions will not count as having happened. If the trickster tricks a killer using bribe (ex: Eisuke tricks Gin, who bribe-kills Kamite), the failed trick will not show up on a stake-out of the killer. Yoko discombobulates Vodka. Vodka discombobulates Amuro. Yoko discombobulate Vodka. Vodka discombobulates Eisuke. Eisuke discombobulates Amuro. The eraser has the option of erasing or not erasing a body if he is the one doing the killing himself. The action is not limited to a one-time-use and may be repeated so long as the eraser is the one doing the killing. Once per kill cycle, Pisco/Tequila may opt to erase a victim killed by another Black Org member. He can't, however, erase for another Black Org member if there are only 2 of them left. Erase, like all other individual Black Org actions, may not be ordered by the Black Org leader. If both BO and Assassin kill the same target in the same night and the BO tries to erase the target, but the BO kills fails, the target will still be erased (assuming the Eraser's actions go through). In this case, both the Eraser and the Assassin will get the role of the player and their will. Anokata, Vermouth and Irish cannot arrest people for framed actions. Town who are lovers with Black Org cannot arrest people for framed actions. Protect used on that day can be frightened. Akai's vengeance can be frightened (since his vote won't go through if he's frightened). Similarly, Revenge (Chianti/Korn) can also be frightened if Tequila/Vodka wishes. Only one Black Org member can use frighten per night. - If your target is not about to be killed, Kogoro learns of all actions performed to a player that night. So, "Akonyl guards Kleene" may result in a PM of "Kleene was healed and discombobulated", for example. Only keywords will be used (see Keywords section in Quick Reference). If someone were to use Special Investigate on the staked-out player, the result will only show "Investigate" and not "Special Investigate". Being in the Black Org isn't a crime. So you can't arrest Conia for being Gin. He'll get the result "BO" or "Not BO". Check the roles to see what result they would get under normal circumstances. The player can Investigate a certain number of actions. (For example, Yumi has “Investigate 2,” therefore she may use two investigations.) He can only Investigate the actions that are happening in the same night he's Investigating. He may not Investigate actions from previous nights, or Day actions. Akonyl kills PT. Yurikochan protects PT. PT interrogates Conia. Akonyl kills PT. Yurikochan protects PT. Conia discombobulates Akonyl. One Black Org member per night may choose another player to kill. If the Assassin is present, they may also choose another player to kill. The Black Org member/Assassin doing the kill is discombobulated. If both BO and Assassin kill the same target in the same night and both kills go through, then they will happen at the same time (which means both the Assassin the BO killer can be investigated/arrested for it). If the BO killer and the Assassin target each other in the same night, assuming that their kill has not been stopped (via Discombobulate, Heal, etc), both kills will go through and both the Assassin and the BO killer will die. If Sera is gender observed, the result will be random each night, if more than one player gender observe Sera, all players will receive the same results. Research will come back true if a town member used the ability or if it was Faked through the BS. If it blamed or used by a BO member, it will be false. Pisco/Tequila will choose during the night which player he would like to Sabotage. If, during the following day, that player is tied with another player for most amount of votes, the player who was sabotaged will have their vote count increased by 1. Pisco/Tequila does not need to vote for the person he Sabotages. Player may slander any player at night, whether it's himself, someone from the town, or someone from the Black Org. The holder of the Black Suitcase may slander one target: one Black Org or one town. If Gin is in the game, the BO as a collective may not slander two Black Org members. If more than one Black Org member sends a slander for a BO member, Gin's slander will take precedent. If the slandered target is interrogated that night, the interrogation result will be inverted. A townie that would normally come up as "Not Black Org" on an interrogation would instead become "Black Org" if slandered successfully. Likewise, if a slandered Black Org member is interrogated, any interrogations on them that night would return "Not Black Org" instead of the usual "Black Org". Snipe replaces kill for the specified roles. The BO Leader can therefore order Sniping if the killer is one of the roles with Snipe. If the target was killed in another way than sniping, then the target will die and Akai won't injure anyone. If Akai targets a sniper that is about to snipe someone, nothing will happen to the sniper and the victim will die. The user learns of all actions performed to a player that night. So, "Akonyl stakes out Kleene" may result in a PM of "Kleene was healed and discombobulated", for example. Only keywords will be used (see Keywords section in Quick Reference). Ex: If someone were to use Special Investigate on the staked out player, the result will only show "Investigate" and not "Special Investigate". If Abs. uses the black suitcase to fake "interrogate" Kleene, the PM will simply state that Kleene was interrogated, not that she was interrogated with the Black Suitcase or that it was a fake action. You will not be told how often a particular action was used on the target. So if multiple people investigate Abs., investigate will only show up once. Your own stakeout isn't included in the results list. So if the list says "xpon was observed," that wasn't your stakeout--he was observed by someone else. If the target is killed the night you stake them out, you learn from the GM the gender of the killer. This does not circumvent disguises, however (so Vermouth/Irish will come back with the gender of their disguises and not necessarily their actual ones). If a trickster tricks a killer using bribe (ex: Eisuke tricks Gin, who bribe-kills Kamite), the failed trick will not show up on stake-out of Gin. Return Item: Night action, not a crime. Cannot be investigated/does not show up on stake-out. CAN be discombobulated. Cannot be confused. If the player steals from a disguised player, he can steal from the disguise or from the original role (Kid, Vermouth). The player won't know it it's from the disguise or not. If the disguised player has 2x gun for example, he can steal a gun 2x. The whole BO get capsules with APTX4869 each game - a total of 3 APTX at the start of the game. If the BO tries APTX on Kid disguised as Shinichi, the BO must guess that player is Kid and not Shinichi. Successful APTX: The target was that role (success).The BO will keep the APTX. The actions and the votes of the victim don't count and the target dies. Arrest can't be stopped though. Failed APTX: The APTX will be used up and the BO will lose it. The victim won't know that he was targeted. The BO will get a message that the APTX failed and how many APTX are left. Different BO members can try to poison different targets (or the same target) the same day. Each BO can only start one poison attempt each day. If there are more poisoning attempts than remaining APTX the higher-ranked BO members poisoning attempts takes priority. Gin can poison pofa as Shinichi. But Gin can't poison pofa as Shinichi AND CTU as Ran in the same phase. Gin and Vermouth cannot both poison pofa as Shinichi in the same phase. Gin can poison pofa as Shinichi and Vermouth can poison CTU as Ran in the same phase, provided they have more than one capsule remaining. If the BO member who used APTX was lynched, the APTX is still effective and the target will still die. APTX can't hinder an arrest. Even if the arresting officer is successfully APTXed by another BO member who is not also being arrested, the arrest still happens. The arresting officer will die after the arrest takes place. Arresting the BO member who does the poisoning WILL hinder the poisoning. In this case, the APTX is NOT lost. This is the same with Detain and Pinching. During each day the Leader (also, next highest-ranked BO in case Leader dies or is arrested) can decide to give the "Black Suitcase" to any player (even himself). He can also choose a substitute in case that player is killed/arrested. If the Leader himself is killed/arrested, the action will still go through. Bow-tie: Can lend it to anyone for a night (and it is returned at the end of the night) or use it for himself. Someone in possession of the bow-tie can act if he were Conan and can choose to Investigate 5 OR Interrogate. If he chooses to give himself the Bow-tie, he cannot give out the Watch. Watch: Can also lend the watch to anyone for one night (and it is returned at the end of the night) or use it for himself. Someone in possession of the Watch is protected from the BO as if he were protected by Ran or Makoto, but he needs to fire from the distance so he does not get to see the attacker's face and will therefore not learn his identity. If he chooses to give himself the Watch, he cannot give out the Bow-Tie. Neither the recipient of Watch or Bow-Tie nor Agasa learn each other's identity (so CTU as Agasa will give the Watch to "Conia", and Conia (Ran) will receive it from "Agasa"). If Ran or Makoto gets the watch, they Protect themselves. So when they are targeted, they will be protected by the watch. If they protect someone successfully while holding the Watch themselves, they will still be penalized. If the protected one was sniped while Ran or Makoto had the watch, the watch won't be destroyed, but one of the protectors will still die. The Charm will only be used up, if the person with the charm would have been poisoned otherwise. BO will not be specially notified that the charm was in play and therefore lose that aptx. Kazuha won't know the identity of the one who received the Charm. The one who got the Charm will just know that Kazuha gave it to him/her, not the identity of the player. Disguises will not cause a change in scent. Vermouth and Irish will always have a scent; Kid and Yukiko will never have a scent. Anokata may or may not have a scent depending on which role they are. Example: Takagi stakes out Conia N1 and finds out he was slandered. During the following day, he may use Follow-Up to check "Conia slandered Conia N1" and get a true or false result. Tequila/Vodka can frighten a Detective Boy Identify if he frightens the one handing in the action, if several DB handed in actions, depending on the amount of DB in game, the chance will be 50-66% of failure. Normal lynching (no sniper or Akai powers) is different. If Ayumi is lynched but the others aren't interfered with, the next-highest Detective Boy who handed in an action can still get his results. If the person is disguised, they can't Identify the disguise but have to Identify if the player is Kid or Vermouth. The ranking of the Detective Boys are: Ayumi, Mitsuhiko, Genta. If the GM gets conflicting orders on whom to Identify, the GM will use this ranking. The Day after Irish/Yukiko used his/her last disguise, he/she can re-use Choose Costumes. During the day (and during prep phase), Irish/Yukiko may choose who to disguise as for the following night, out of their chosen 3 costumes, using this ability. Once a costume has been used, they may not re-use it again unless they choose it again with Re-choose Costumes. Needs to accuse a player for a specific crime during a specific past phase: "Arrest Akonyl for Killing Conia on Night 1" or "Arrest Conia for Slandering pofa on Night 2" or "Arrest Sebolains for disguising as Megure on Night 3." MAY NOT arrest someone for helping with a crime: "Akonyl helped Conia in killing pofa" Being in the BO isn't a crime. For the third time, you can't arrest Conia for being Gin. Stop trying. If the BO bribe-kills a target that should be successfully arrested in the same phase, the arrest will still go through, but the target will die. The cop will be notified that their arrest was successful, and they will not be suspended. The BO can't arrest someone for a blamed action in any way. Only one player at a time can be in detention, unless there are multiple people disguised as Satou. The player will be released automatically after 3 phases or if Satou dies. If Detain is used on Day 2, the player will be in jail for Night 3 and Day 3 but released before Night 4 starts. If all BO players are either dead or arrested and the only remaining BO is in detention, the game ends. If a BO player is due to be released at the end of the phase where the only other BO player remaining is arrested/killed, the game will continue with that one BO player remaining. If Satou is discombobulated while after she detained a player, she will not release said player. If Satou is suspended after the phase she had detained, she will not release said player until the normal time. If Satou detains a player with Vengeance or Revenge, she will not get injured. This protect will hinder lynching, killing, sniping and even APTX. Does not hinder Akai's vengeance or Chianti/Korn's Revenge. Nakamori will learn that the player was in disguise and also which disguise it was. If the player was disguised as Akai, Nakamori will auto-arrest the disguiser and be injured. If Yukiko or Irish is pinched and arrested, they do not get a new role automatically if freed. They will receive a new list and will have to Re-choose costumes. Vermouth/KID will automatically get a new disguise, however. May also choose one individual to Protect at night. If said individual is about to be killed by the BO, he again Protects the individual. The target in this case learns that he was Protected. Neither the Protected individual nor the Protector will learn the identity of the attacker. If sniped, the target survives, but the protector dies in their place. If Akai gets lynched, he'll kill the person he voted for too. If Akai is arrested, he will injure the arresting officer, like the snipers. If a player disguised as Akai is pinched, the auto-arrest will occur as normal and so he will injure the person who pinched him and then go to jail. An injured BO will lose all of his abilities, and abilities to kill (like sniping). However, they can still regularly kill at night, APTX and use items like black suitcase and bow-tie/watch. Last edited by Kamite on March 20th, 2019, 5:00 pm, edited 2 times in total. -Kogoro has Guard and Yoko is back with Discombobulated . -Assassin is now Traitor with changes to its abilities. -Yamamura is back with Confuse. Also the time announcer shows march 29th. So, is everybody also waiting for the last day to join? dumytru wrote: So, is everybody also waiting for the last day to join? Game cancelled due to small players . Going to try this again in a month.
2019-04-20T06:44:27Z
http://forums.dctp.ws/viewtopic.php?f=30&p=881437
For most new homeowners, ranch owners and land owners especially in rural areas, the concept water well drilling can thought about bewildering experience. This isn’t surprising since water once we use it in present day world comes from simple turning on of the faucets, not drawn from deep wells using a rope-and-bucket pulley system. You can apply also the practical implications of digging wells since the necessary legal permits, the depth of the well, and the equipment for drilling into the ground, among others. Fortunately, many companies are currently offering water borehole drilling services to individuals, families and business owners. There is no need to rent drilling equipment, hire laborers and install the well mechanism, to name a few related activities, since many of these tasks are done by these specialized service organisations. All you have to do in order to discuss the where, when and how much info on the project, be updated on its progress, manage it after its completion and bob’s your uncle! You now have a modern-day water well inside your backyard. Yes, it’s that’s easy-peasy. But before you hire a water well drilling company, you are well-advised to know its most important practical aspects. It simply will not do anyone personally to be totally ignorant about something you can paying for out of your own pockets. First, water borehole drilling is both a science and an art. It is science because scientific principles and practices in areas like geography are applied during the entire project duration but it can be an art because connected with experience are poured into pinpointing the best water source. You will get offers for with a Borehole Drilling Contractors Sandhurst report showing the progress, results and prognosis for your planned deep well. Keep in mind that water well drilling company must never start drilling before the borehole report showing a positive water source is cleared. Otherwise, you may find your deep well running dry before its expected date. Second, ask for the total estimated associated with the project along with an itemized subscriber list. You can then study expense of items, ask appropriate questions, and negotiate for lower project costs without sacrificing the quality among the work performed. learn more – https://www.bigtimedaily.com/valiant-comics-bloodshot-getting-a-reboot-and-a-brand-new-film/. If you have an outsized collection of movies tend to be having difficulty keeping all of these books organized and easy to find, it may ideal to put together a real estate movie list so for you to better keep your movie collection in check. If you’d like to know where your movies are, this website software packages are exactly what you need, as it will allow you to organize your movie collection into a simple movie list so that you could find what you need, when it’s needed. If you are tired of trying to locate a solution for organizing your movies into home movie lists, then this is plan that you are looking for. This software solution is in order to create movie lists from your movie collection, allowing you to better if you collection of movies. – Rrt’ll allow you to find the movie that you wish to watch without digging by your entire recovery. – It can allow for you to definitely share your movie list with others so they know what movies would inside the greatest treats. All My Movies is a personal movie database software solution escalating intended that can you manage your movie collection automatically rather than having to deal with it on a manual time frame. This software option is easy the and catalogs your DVDs, CDs, VHS tapes different similar collection agencies. All of information will be downloaded automatically from the web movie database, saving you countless hours of period and energy in the process. All My Movies can be a multi lingual software application that is built to to may choose to movies, supporting English, Russian, Dutch, Greek, Belorussian, French, Latvian, Serbian, Polish, Portuguese, Italian, Swedish, Finnish, Korean, Spanish, Chinese, Danish, German and Slovak languages. All my Movies is, simply put, the greatest movie organizer out there available for movie collectors that be reliant upon a detailed movie list to know what is and is not their particular current lineup. This software will allow you to easily import movie details from different internet movie databases in numerous different languages, offering extended cast details, television series support, nicely as the capacity print your collection done. You can save your collection to your own mobile devices like smartphones and PDAs as well, so you will have a transportable copy of your list for whenever an individual out buying movies and television collections. You’re able to even play movies straight from the program itself, using All My Movies to be a video playlister. If the looking for software solution that will establish detailed movie lists to show you what is in your collection, the All My Movies software solution could be the ideal solution for that you. If you will need detailed selection of your movie collection with information imported directly in from internet movie databases, All My Movies helps process simpler than before. Have you developed or had the inkling to develop something that might benefit mankind overall? Or have only developed something that will make kitchen life easier in your garage? Regardless products your current or future InventHelp Successful Inventions can be you need to look at the steps guard them. Getting a patent on your item is really step to insuring no one can copy your product or cheat get you started of money. In order to obtain a patent for your device, new product ideas, or service you should have three activities. These are money, a journal outlining what is actually important to your offering, and diagrams to illustrate how it will continue to work. These can differ in form, presentation, function, or implementation but nevertheless needed in order to get a patent. You need to be able to exhibit that your device works and what works in order for it regarding categorized with the patent office. A person have have acquired your patent you have 20 years to research, refine, develop, and market your products with no opponent. However you don’t want a patent begin production and marketing of your all-natural supplement. You can begin producing and selling your idea immediately if be careful to mind cheap imitations and copycat service popping up a person. When you do this and apply for a patent your companies will often be labeled patent pending meaning that the application has been downloaded. When acquiring a patent you need check to have got a your invention is not already in use. The rules are that in the event the service, invention or product is played with this or another country you cannot patent it. Patents cannot be issued for old ideas described in books that have been created feasible with modern technology. For example, scholar A that lived in 300 AD will present had an concept wasn’t practical in the time due to technological limitations. If he published his idea publicly and it is general public knowledge then inventor B cannot get a patent for which work in the modern world. This is as a result of fact that welcome this change inventor publicized his invention at the time even though exercise routines, meal a flight of fancy so to speak. This is an extreme example but and also get the way. A person may only apply for a patent if their idea is unique, has not been done before, and is currently not being used by another entity in any known country. People who file patents jointly both receive the rights to the patent provided that both of them helped develop help. In the instance where one person simply provides the money and another occurs with the idea the person who comes up together with idea will get the patent. This should not be forgotton when one person merely follows the instructions of the one who actually showed up with the principle. While patenting your device takes a period of time and how to invent a product effort its worth it. Carefully patent is into position no one else can compete collectively exact product for 20 years. This is substantially of time become worse improvements and solidify your place shopping around. It’s important to get noticable that the investments that you make during this period will make or break your business so spend wisely and avoid business pitfalls. If you have how you feel to be a great idea for an invention, and you don’t know what to conduct next, here are points you can do to shield your idea. If you ever finish up in court over your invention, you need conclusive evidence when you thought of your idea. In the Country the rightful owner for inventhelp reviews a patent is the one who thought of it first, not the one who patented it first. Which must be able to prove when you looked into it. One way to protect your idea is to write down your idea as simply and plainly as you can, and then have three or four credible non-relatives witness your document stating that they understand the invention and InventHelp patent services dating their signature. It’s often a good idea to include drawings or sketches as well. In the future, if that can any dispute in respect of when you came up with your idea, you have witnesses that can testify in court, as to when you showed them your idea. Proof positive is what you need. You might want to consider writing it within approved inventor’s journal – a book specially designed with numbered pages that it is difficult to add information later. There are several sources, just search the internet these. It his harder at least in theory to later alter the contents of the journal, making it better evidence when in court. Once you’ve established the date can thought of your idea, you end up being follow a few simple rules avoid losing your protection. If you do not do something to develop your idea within one year, then your idea becomes part for this public domain a person lose your to obtain a lumineux. So keep a file where will be able to put notes, receipts, etc. in, and at least do something that leaves a paper record you can file away just in case you end up issue will be important someday. Be known to prove in court that more in comparison to year never passed that you would not in some way work on is apparently. If you disclose your idea in a publication like a newspaper or magazine, that starts a 1 year period in places you must file a patent, or you lose your in order to file. Just because you have never seen your idea in a store doesn’t mean it’s patentable or marketable. According to the patent office, reduce 3% of issued patents ever get to the marketplace. It is possible your idea was invented however for any number of reasons was never marketed. If innovation has ever existed, InventHelp Pittsburgh anywhere, at any time, created by any person, it is patent it – it’s already been invented! And the U.S. Patent office searches world wide when they process your patent application. You can a bunch of own patent search using several online resources, but when you have determined that there is a viable and marketable invention, I would recommend that you hire a competent patent attorney to keep a professional prior-art patent search done, make certain your idea hasn’t already been thought of, wasting your valuable time and funds. I’ve tried doing patent searches modest own, and I’d been stunned when I saw the results a real patent examiner found. Considerable professionals and they are aware of what they are doing. Most famous inventors have done it with a single invention or a single patent my idea. Actually that almost all it takes – only one really good idea – to change your life forever! It is vital that note here in which do not just stumble onto ideas all the day time. Many times there is an excellent deal of work that goes into information technology. You can create an environment that is conducive to the generation of invention ideas, Invention Ideas more so that single idea areas capable of changing everything. You are a whole lot likely to stumble onto your big idea in market or industry that you just are already extremely familiar with. A much-loved hobby is really a great help. Considerably more no denying extremely that chances of one’s stumbling on a great invention idea are much more likely to take place while you are accomplishing something that you really enjoy doing. Something that you have no problem spending hours at a stretch doing. There are several reasons for this. Firstly people get brilliant invention ideas on areas and how to invent a product industries that they understand extremely well. Then there is the simple indisputable fact that chances of you stumbling on a really good invention idea boost your workers more time ultimately on the related environment. People will pay out more and a lot more effortlessly on something they really take pleasure with. Not everybody believes in destiny, nevertheless the truth of the matter is that every human on the world is born along with a particular purpose in this life and objective will tend to be very close to something you really enjoy doing. In other words, you big idea in this life is hidden in something really close to your heart. Still, whatever can be that you believe, the fact remains that all it is advisable to change your everyday life is just one brilliant invention idea. Anyone then need to have adequate knowledge on how you can get it from your drawing boards towards the waiting world in the world. A down economy can not take the fun out of dressing really. A sweater or dress that has been hanging within a closet for a time can receive new life with perfect accessories. Accessories make those between dressed and well-dressed. Scarves and jewellery are two popular accessories that add pizazz to plain fabric. However leather items like belts and Matterhorn purses additionally bring a bit of class to an everyday wardrobe. The following are a few tips for using accessories to develop personal luxury. Scarves can give a plain sweater or dress a sophisticated look. Whether flung or tied loosely about the neck, a well-designed scarf can make the difference. Carefully chosen brooches or pins add just enough “bling” additional medications an outfit exciting. A good wool winter coat appear special any large pin is connected to the lapel. Keep in mind the power of an easy piece of knickknack. Today’s larger watches with contrast bands and faces say “look at me” supplies a message of a confident dresser understands how decide on the best. A leather belt in rustic burgundy or light brown contrasts well with denim or tweed; and brings together a kind country meets city classic look. Leather boots brands an equally powerful declaration. Choosing classic pieces of clothing that never get out of style makes it simplallows you to accessorize. Pieces made of natural fabrics like wool, cotton and silk in neutral dark and lightweight colors is actually stylish for a few years. This means that associated with buying a new wardrobe every year, inspiring and eye-catching accessories found that will transform last year’s plain black dress into the 2011 classy holiday ensemble. The attractive element about accessorizing is that it can easily be done without going broke and that is a win-win! Have you developed or had the inkling to develop something that might benefit mankind overall? Or have an individual developed something that will make kitchen life easier in your garage? Regardless goods your current or future inventions may be you need acquire the steps to protect them. Getting a patent on your item is reduce costs step to insuring no one can copy your product or cheat get you started of money. In order to obtain a patent for your device, product, or service you should have three activities. These are money, a journal outlining what it really is your offering, and diagrams to illustrate how to get a patent for an idea it will continue to work. These can differ in form, presentation, function, or implementation but are usually needed in order to get a patent. You always be be able showing that your device works and what works in order for it for you to become categorized with the patent office. A person have acquired your patent you have 20 years to research, refine, develop, and market your product with no opponent. However you do not need a patent start with production and marketing of your all-natural supplement. You can begin producing and selling your idea immediately if you don’t mind cheap imitations and copycat service popping up a person. When you do this and apply for a patent your products and services will often be labeled patent pending meaning that the application has been created. When acquiring a patent you end up being check to make sure your invention is not already in utilize. The rules are that generally if the service, invention or product is implemented in this or another country you cannot patent my idea it. Patents cannot be issued for old ideas described in books that have been turned feasible with technologies. For example, scholar A that lived in 300 AD is going to have had an indisputable fact that wasn’t practical in the time due to technological limitations. If he published his idea publicly and it is general public knowledge then inventor B cannot get a patent for which work in today’s world. This is due to the fact that original inventor publicized his invention at period even though hints a flight of fancy so to talk. This is an extreme example but it does get the way. A person may only apply for a patent if their idea is unique, has not been done before, and is currently not made use of by another entity in any known country. People who file patents jointly both receive the rights to the patent provided that both of them helped develop thinking about. In the instance where one person simply provides the money and another comes up with the idea the person who comes up with the idea will get the patent. This should not be forgotton when one person merely follows the instructions of a single who actually came up with the principle. While patenting an idea your device takes a and effort is actually possible to worth it. Once a patent is installed no one else can compete with your exact product for 20 years. This is substantially of time become worse improvements and solidify your place available in the market. It’s important to that the investments that you make during this period will make or break your business so spend wisely and avoid business pitfalls. Developing original products or vastly improving existing ones is a tedious process. The hope, of course, is that one ones ideas will be the next big thing and result in the marketplace. Inventors spend countless hours thinking and designing, keeping their inventor’s logs, and checking into already approved patents for making sure their idea is truly original. Then, they spend hundreds to thousands of dollars to protect their idea with a patent. But then what? Fewer than 2% of all patented products ever turn a profit. Though there are as many benefits of this as there are failed products, Www.Leny-icons.com there are some steps you can take to improve the odds that your product will succeed in the marketplace. As soon as you file your patent application, begin planning your manufacturing and distribution processes. Obviously, you the have to get your product made in volume, a person also apparent way to get it with your customers’ cards. While it may be accomplished to manufacture and distribute your invention yourself, most inventors are less than interested in taking on that chore. Partnering with a business-focused colleague can be an excellent option, in particular when the partnership will expand the odds of securing financing for beginning. There are also established manufacturing firms specializing in producing a good variety of products. Outsourcing your production often makes probably the most sense, both financially and logistically. Other choices manufacturing and distributing your invention include going a good invention broker to make those arrangements or selling the rights to your invention completely. In either case, InventHelp Patent Referral Services do your research before pursuing these sources. Evaluate any brokers you are thinking about by checking multiple references, checking utilizing Better Business Bureau, and searching for for every can find about them on the net. They are required to your family with proof of their historical past for success upon request, so appropriate size tire to request it. Also look for brokers who work on contingency.they get compensated when goods gets convinced. Many scammer “inventors’ marketing” firms require fixed fee payments to market your product. Avoid them, and absolutely do not pay an upfront fixed fee. There may be few excellent inventors’ websites with community forums.a good starting point start to look into specific brokers or vendors. If you intend to sell your patent outright in which means you can back again to the lab, study homework for making sure you have grown to be a reasonable price and the experienced attorney negotiate the offer with a person will. Your patent law attorney should either be able to help or refer you to someone that can. Whatever route you choose, you need evidence your product will viable within the marketplace. It is critical to at least one working model of one’s product. Any manufacturer, distributor, broker, or potential customer will in order to see what works and how it looks before they commit. Also, be sure you have filed for your patent anyone decide to present the actual merchandise to almost any individual. Just filing for your patent (whether through a regular or provisional application) provides patent pending protection.enough create it impossible that anyone will steal your idea. Once may decided close to the right route for manufacturing and distributing your product, the serious marketing work begins. Have the product in the front of specific target customers that can use it. Have them test it under regular and two opposites. Ask for honest feedback and consider any changes that might make your invention even more inviting. If any changes are patentable, certain to modify your application immediately. Don’t count relating to the opinions of just loved ones and kids. Find as many members of the expected marketplace as foods high in protein and test, test, test. The marketability of your invention ideas might be all basic factors: cost, value, durability, reliability, safety, ease of use, along with the direct benefits your customers receive. Your market testing should definitely be focused on these circumstances. If your profit margin as well low, or using supplement uses is inconvenient for your customers, it will likely never trigger you to any . Use the testing to gather an honest assessment of your product. You shouldn’t be discouraged by negative feedback, but look for easy alterations or other ways to promote that will downplay the criticisms. Don’t give up. Have you developed or had the inkling to develop something that might benefit mankind altogether? Or have only developed something may make kitchen life easier in your garage? Regardless of what your current or future inventions might be you need to adopt the steps to protect them. Getting a patent on your item is really step to insuring no one can copy your product or InventHelp Company cheat you out of trouble of money. In order to get a patent for use on your device, product, or service you need have three circumstances. These are money, a journal outlining what it is your offering, and diagrams to illustrate how it will continue to work. These can differ in form, presentation, function, or implementation but they are needed in order to get a patent. You need to be able to show that your device works and how it works in order for it regarding categorized with the patent office. A person have acquired your patent you have 20 years to research, refine, develop, and inventhelp success market goods with no competition. However you don’t require a patent to begin out production and marketing of your all-natural supplement. You can begin producing and selling your idea immediately if should mind cheap imitations and copycat service popping up around you. When you do this and apply for Bankamagazine.blogspot.com that patent your companies will often be labeled patent pending meaning that the application has been created. When acquiring a patent you need check to make certain your invention is not already in exercise. The rules are that if the service, invention or product is implemented in this or another country you cannot patent it. Patents cannot be issued for old ideas described in books that have been adapted feasible with technologies. For example, scholar A that lived in 300 AD will present had an undeniable fact that wasn’t practical in the time due to technological limitations. If he published his idea publicly and it is general public knowledge then inventor B cannot get a patent for that makes it work in today’s world. This is as a result of fact that this is a significant inventor publicized his invention at time even though it was a flight of fancy so to talk. This is an extreme example but it does get the way. A person may only apply for a patent if their idea is unique, has not been done before, and is currently not being used by another entity in any known country. People who file patents jointly both receive the rights to the patent provided that they both helped develop is apparently. In the instance where one person simply provides the money and another pops up with the idea the person who comes up the particular idea will obtain the patent. This should also apply when one person merely follows the instructions of make certain who actually showed up with the principle. While patenting your device takes a and effort every person worth it. Used to be a patent is set no one else can compete by using these exact product for 25 years. This is of time become worse improvements and solidify your place looking out. It’s important to get noticable that the investments that you make during this period will make or break your business so spend wisely and avoid business pitfalls. Have you developed or had the inkling to develop something that might benefit mankind altogether? Or have only developed something that will make kitchen life easier in your garage? Regardless products your current or future inventions always be you need to adopt the steps guard them. Getting a patent on your item is the first step to insuring no one can copy your product or cheat you out of money. In order to get a patent of your device, product, or service you have to have three things. These are money, a journal outlining what could your offering, and diagrams to illustrate how it succeeds. These can differ in form, presentation, function, or implementation but they are needed in order to get a patent. You in order to be be able to exhibit that your device works and operate works in order for it end up being categorized with the patent office. A person have acquired your patent you have 20 years to research, refine, develop, and market your products with no tournament. However you do not require a patent to begin production and marketing of your nutritional supplement. You can begin producing and selling your idea immediately if you don’t mind cheap imitations and copycat service popping up a person. When you do this and apply for just about any patent your products and services will often be labeled patent pending meaning that the application has been recorded. When acquiring a patent you have to check to have got a your invention isn’t already in exercise. The rules are that generally if the service, invention idea or product is discovered this or another country you cannot patent it. Patents cannot be issued for old ideas described in books that have been created feasible with modern technology. For example, scholar A that lived in 300 AD is going to have had an concept wasn’t practical in the time due to technological limitations. If he published his idea publicly and it is general public knowledge then inventor B cannot get a patent for making it work in today’s world. This is due to the fact that this is a significant inventor publicized his InventHelp Invention News at period even though produced by a flight of fancy so to speak. This is an extreme example but it is doing get the way. A person may only apply for a patent if their idea is unique, has not been done before, and she is currently not in use by another entity in any known country. People who file patents jointly both receive the rights to the patent provided that they both helped develop help. In the instance where one person simply provides the money and another occurs with the idea the person who comes up with the idea will get the patent. This should also apply when one person merely follows the instructions of make certain who actually came up with the idea. While patenting your device takes it slow and Adidassuperstardiscount.Xyz effort is usually worth it. Examination actually patent is in place no one else can compete jointly exact product for 20 years. This is a lot of time to make improvements and solidify your place in the market. It’s important to be aware that the investments that you make during this period will make or break your business so spend wisely and avoid business pitfalls. If you’re thinking of hiring a taxi or limo service, price may be at the top of your mind. You may even be obsessed with trying to discover the lowest possible deal. While this is a good matter for your wallet, it might not be the smartest choice. It’s just as important drugs sure that you are hiring a competent taxi driver as it can be always to find a good the price tag. If you’re lucky, items will go hand-in-hand. Businesses like to be competitive utilizing pricing and the service they provide. However, it isn’t always accurate, so you’ll need to do a little sleuthing to find the best driver. Before we get some that, it’s in order to discuss why it’s necessary to selection what kind of drivers are travelling to get with any company. First of all, your driver needs to have in mind the area so may get get from some time to the other safely and gradually. You also must make sure that the driver is not preparing to try to pull the wool over your eyes using longer route to obtain additional money. The driver also needs in order to become fully certified and know all there is to know about both driving safely and providing good customer specialist. Without those things, getting the lowest price is not a good deal after all! Your driver should also be very professional. Disturb helping you with a door if you prefer, and a person with your bags as well. Should you be hiring a luxury taxi or limo, the driver ought to be dressed to fit in with your event. Individuals for a wedding or an important business meeting. The driver ought to be very courteous becoming overwhelming. They should understand that many passengers will be busy preparing to find a meeting or discussing with other passengers during progress. The driver should not try to overwhelm the discussion or ask probing important questions. At the same time, if the passenger wants to talk the driver end up being kind and competent. It doesn’t matter where you live, as a homeowner; one of main things you have to be worrying about is water damage and mold. Don’t assume that your belongings is fortified enough to withstand all instances of flood and moisture. Elements can cause some troubling issues to your property. Do a favor and make that our rentals are covered. Ask anyone that has ever completed it; this kind of situation often is the place it is least expected. Once it doesn’t occur, it can be very had in which to stay focused on dealing with the aftermath. Water damage can do more than wreck your happy home, it can also destroy remnants of memories and possessions that are tough to replace. You don’t want to deal making use of emotions and disappointment that comes from having to settle for this situation. As an alternative to wallowing in grief while you fight to determine what excellent do, in order to try and salvage what you can, contact the experts and let them help guide both you and make sure your home can be restored. You don’t should be at a drawback because of the moisture that eroded the foundation of your property. You can still save your property and live a pleasant life once is certainly restored. You can avoid having to foot the bill for all from the repairs and renovations that may be compelled to be done. If you’d like to have a peace of mind and some security against blemishes and catastrophes that the actual result of excessive moisture, make sure you have a good water damage insurance policy. Don’t just let that policy collect dust unless you need them. It is important a person are trained in for you to do if your unexpected carry. Look over your policy and red things thoroughly. Make sure you understand everything. Still have any questions to get hold of your insurer if run across something wish to understand. Unique that the protection you have is enough and covers everything oodles of flab . to watch over. Contact services that are dedicated to water harm. It is a good idea for you to screen several and get familiar with their staff as well services. Try to find choices that the excellent to handle this type of situations. The should offer a good reputation in industry, they should also have a ton of happy and satisfied customers who are willing to vouch for them. Matter to have at least three companies on your speed dial that it is possible to contact any kind of time time content articles ever need them. While you can never be truly prepared for any catastrophes that could happen to your property, you can have safeguards in place that will provide you with enough coverage to provide you some serenity. Water damage restorations companies can save you a a lot of open money and prevent you from losing no doubt one of your most valued properties. Company registration development is the very first thing to wind up being done to set up a enterprise. You need to be choose a title for your home business and register which with the Corporations House. You also need to always check the availability of the name. This guidance can be constructed by checking on the Internet not to mention verifying whether that this name is absolutely taken or fail to. To help with Company Registration, various business owners provide home business formation guru. This is a relatively easy tool to actually register your company live on the internet. It is just also your own very will cost you effective and fast route of sign up as when likened to paperwork and most of the time cooking paper medical record process. The majority of of these companies give you direct references to the Companies Bungalow filing program. Every ritual can you ought to be completed around the internet without tiresome paper your job. The commercial enterprise registration approach is finalize only looking for the necessary documents varieties of as memorandum, articles along with association on top of that forms 17 and 12 are inhabited in fully and taken by some Companies Own home. The first of all step is definitely to pick-up the legal name approved. Secondly, fill one particular forms where it come your individual way. Thirdly, pay this particular registration price tag. The fourth step are to call or inspire people that can invest found in your website. * Choosing the name, once that is confirmed as presented. * Deciding the official document of company formation. With their emergence with regards to online subscription facility, people can keep time, money and vigour. The whole process owns now end up a simple, easy-to-complete activity, which should be just a mouse hyperlink away by you. Thinking of taking a chance on a dip all through the entrepreneurial lakes and rivers? This may just be the right time. According to make sure you a recent economic survey by This Entrepreneurs Board, small entrepreneurs are more likely to tear the country out of recession when compared to united states government measures and device packages. According to our own survey, more besides 38% of participants were seriously enthusiastic about a company registration in the near future with 45% of those taking into consideration that company formation mentioning the thrill from the experience compared to the main cause! So, if ever you are thinking of a workplace registration(s), listed are some important pieces to explore. Should the software be a new great LLC and sole proprietorship or a product else? What have to have to the determine of typically the company are? Many leaders recommend LLCs simply considering the fact that they are less complicated. There is just less paperwork, more benefits yet more insurance policy for those owner of the commercial enterprise. LLC is simply also considered to come to be the most efficient option inside case yourself want in sell the actual business at a at a later moment date. As a rule big retailers are motivated in searching only if you find you are ready with regards to an good point sale, which is complex if buyers are their LLC. But, there can be other demands that seek to be considered before the company sign ups. For instance, venture capitalists are better off forming an Inc. Company registration, even in the law suit of each LLC, is without a doubt a frightening task on the grounds that it involves a much of paperwork, following regulations, getting makes it possible for and sending in everything by using the spot on place over the true time. Obviously, company registration, whether within the US, UK together with elsewhere can an overwhelming task. In most cases, seeking expert help at the minutes of workplace registration could recommended. Even those which of you have found itself through the type of company advancement process a real number behind times fly to unquestionably the experts just so that this process is often streamlined as well as works that includes clockwork precise. As a bit more and good deal more entrepreneurs be subjected to the itch to choose up and simply run businesses, the road ahead consists of been performed easier furthermore as swish as possible by brand new legislation. Organization formation knowledgeable have did it easy enough to complete the complicated procedure created by Online Company incorproation in Chennai Tamil Nadu development in just simply a few steps. It is true it company structuration is always considered boring and tortuous. However, it’s is vital that business minds try also understand a person’s process as being much as possible this they could possibly avoid our own mess very could go after if completely decisions are taken, still if they’re going to are appointing a firm agent or even other experts to take them just by the operation formation section.
2019-04-22T06:33:44Z
http://utterback.csdformula.com/author/utterback/
Date and Time: Once a week for 4 hours. Students can register the class either on Saturday or on Sunday. If students have schedule conflicts, they can switch between Saturday Class and Sunday Class but have to obtain a permit from the teacher. Mrs. D. R is thrilled to become part of the team at Discover Learning Center. Her 22 years of teaching experience includes certifications in middle and high school English, middle school Social Studies and K-12 Gifted Education. Mrs. D. R earned her Bachelor of Science in Education through East Carolina University, and later pursued her Masters degree in Education there as well. Her love of learning compelled her to complete an additional certification in School Administration and Leadership through The George Washington University. Currently, Mrs. D. R is part of the exemplary school system of Fairfax County, where she works tirelessly to instill a love of learning through critical thinking, problem solving and creativity. Mrs. D.R. believes learning should be rigorous, collaborative, and above all, fun! Dr. J. M. has been the department chair at Fairfax public school for the past five years. She is certified in middle school math and science, and teaches 7th and 8th grade science at Fairfax public school. Before that, Dr. Mike taught in three different private schools, starting in 1992 when she retired from her career as an Air Force physician. Dr. Mike has a special certification in teaching Advanced Academic courses and has seen more than 100 of her students reach Thomas Jefferson School for Science and Technology. Ms. C. M. completed her Master’s degree in education with a focus on curriculum and instruction (science) at the University of Toronto. Her undergraduate degree in biology/chemistry (interdepartmental) was completed at Viterbo University in La Crosse, Wisconsin. She has a VA state professional teaching license with endorsements in biology, chemistry and gifted education. She is currently an eighth grade physical science teacher in FCPS. Ms. C. M. has taught various subjects, including chemistry, biology, physical science and math. With 20 years of experience teaching at all levels of the education system, Ms. C. M. has also served in other capacities such as educational administration and doing educational development work with international donor agencies in Belize. Mrs. K. taught middle school, high school, and college math for more than 15 years. She has secondary math professional teaching license, AAP certificate for gifted-talented teaching, and Intel Master certificate about creating mathematics curriculums. Mrs. K. is currently teaching at a magnet high school in Fairfax County. The 7th grade Language and Writing class will target at the 8th to 9th grade level. Course Description(part 2): The course continues from the Fall 2018. Because we write as we read, students will be immersed in a variety of classic and seminal reading material that will provoke higher-order thinking and discussion, and culminate with effective written responses. Emphasis will be on expository and persuasive writing assignments, and because classes are small, students receive useful and comprehensive feedback on their weekly essays. It is expected that all students who demonstrate perseverance in this class will build their skills of problem-solving, personal reflection, evaluation, and creativity. Greater than all of these skills, however, is a student’s sense of self-efficacy that comes with tackling a challenge. Mr. H grew up in the Reston/Herndon area and is from a family with both parents are English teachers. After graduating from UNC-Greensboro with a degree in English Education, Mr. H was selected to teach at FCPS and has remained there for 21 years. Mr. H has extensive teaching experience and has taught everything from the third grade Language Arts to SAT Reading/Writing. He has helped many students achieve their dream of attending Thomas Jefferson High School and many of his students have received a perfect score on the Reading/Writing SAT. Mr. H is certified by the state of Virginia and endorsed by Fairfax County Public Schools to teach Advanced Academics. Mr. H is passionate about teaching. His classes will be engaging and challenging! Supplies: View 1 inch, three ring binder with front and back pockets, a spiral note book, pencils, blue or black pens, green or red pens, colored pencils, yellow highlighters, paper and a small pouch to hold the supplies that can be kept in the binder, and a black and white composition book. Homework is assigned on a regular basis and is discussed in class the day it is due. Timely homework completion is essential for student comprehension and participation (e.g., reading and drafting assignments). Homework reflects what is being done in class—it may be an opportunity for practicing, discovering, or enrichment and extending knowledge. Mr. V has taught all levels of Mathematics from 4th grade through AP Calculus BC over his 8 year teaching career. He built and maintained an AP Calculus program at his first teaching assignment in PA where the course was never offered. He was brought to Fairfax County four years ago to help develop a non-AP Applied Calculus course for Fairfax County Schools (which has been adopted county-wide). He currently leads the AP Calculus AB Team at a top Fairfax County Public School. He has been an AP Reader (expert teacher flown to Kansas City, MO to grade the official AP Exam Free Response Sections) and has attended several AP Collegeboard trainings and Summer Institutes for Calculus. He was a part of the leader teachers’ panel to adopt textbooks for the 2019 school year and beyond in FCPS for Computer Science and Calculus. Even with his work at the high school level, he has experience with rising 4th, 5th and 6th grade students who are looking to advance as far in mathematics as they can go. He has been a coordinator for middle school Mathcounts to which several of his students made it to rounds beyond their expectation. He has been the American Math Challenge coordinator for High school students for the past four years. Recently, he has helped a group of 7th graders master Geometry this past summer 2018. He’s very excited to work with Discover in the hopes that he can have an even larger impact on students’ lives. Course Description: The course continues from the Fall 2018. The targets the 7th/8th level. Students study rich vocabulary, grammar, literature, and writing, setting themselves up for success in higher education. These skills will help students effectively write academic essays, participate in critical analyses, and share with small/large groups. Students will develop an understanding of the six traits of writing, the eight parts of speech, and numerous poetic tools: all elements of higher-level communication. Goals: A complete and coherent instruction of formal language study. 1. Study of prefixes, suffixes, and sophisticated vocabulary. Students who know quality words can write and speak with quality words. 2. Reading of literature comprised of rich ideas universal to all cultures. 4. Free writing every day. 5. Timed writing every week. Mr. H grew up in the Reston/Herndon area and are from a family with both parents are English teachers. After graduating from UNC-Greensboro with a degree in English Education, Mr. H was selected to teach at FCPS and has remained there for 21 years. Mr. H has extensive teaching experience and has taught everything from the third grade Language Arts to SAT Reading/Writing. He has helped many students achieve their dream of attending Thomas Jefferson High School and many of his students have received a perfect score on the Reading/Writing SAT. Mr. H is certified by the state of Virginia and endorsed by Fairfax County Public Schools to teach Advanced Academics. Mr. H is passionate about teaching. His classes will be engaging and challenging! -- Concentrate on the task at hand. -- Adjust your voice level to suit the activity. -- Come to class on time with all materials and assignments. -- Respect every person, place, thing, and idea. -- Respect yourself: when appropriate, go beyond your comfort zone. Book List: We will order the books for you. The book cost is not included in the tuition. 2. A pouch to store at least 3 sharpened pencils, 2 pens, and 1 highlighter. Location: 503 Carlisle Dr., Room 275, Herndon, VA 20170. There is easy access from Route 7100/286 (Fairfax County Pkwy). It is right off Elden Street. This course continues from the “5th to 6th Grade Pre-Algebra/Iowa Algebra Aptitude Test (IAAT)” course in fall of 2018, which extends students' knowledge and understanding of the real number system and its properties through the study of variables, expressions, equations, inequalities, and analysis of data derived from real-world phenomena. Emphasis is placed on making connections in algebra to geometry and statistics. Calculator and computer technologies will be used as tools wherever appropriate. Use of a graphing calculator is considered essential to provide a graphical and numerical approach to topics in addition to a symbolic approach. Topics include linear equations and inequalities, systems of linear equations, relations, functions, polynomials, and statistics. Books: We will order the books for you. The books cost is not included in the tuition. Mr. V has taught all levels of Mathematics from 4th grade through AP Calculus BC over his 8 year teaching career. He built and maintained an AP Calculus program at his first teaching assignment in PA where the course was never offered. He was brought to Fairfax County four years ago to help develop a non-AP Applied Calculus course for Fairfax County Schools (which has been adopted county-wide). He currently leads the AP Calculus AB Team at a top Fairfax County Public School. He has been an AP Reader (expert teacher flown to Kansas City, MO to grade the official AP Exam Free Response Sections) and has attended several AP Collegeboard trainings and Summer Institutes for Calculus. He was a part of the leader teachers’ panel to adopt textbooks for the 2019 school year and beyond in FCPS for Computer Science and Calculus. Even with his work at the high school level, he has experience with rising 4th, 5th and 6th grade students who are looking to advance as far in mathematics as they can go. He has been a coordinator for middle school Mathcounts to which several of his students made it to rounds beyond their expectation. He has been the American Math Challenge coordinator for High school students for the past four years. Recently, he has helped a group of rising 6th graders master BOTH Pre-Algebra and Algebra 1 this past summer 2018. He’s very excited to work with Discover in the hopes that he can have an even larger impact on students’ lives. Course Description(part 2): The course continues from the Fall 2018. It targets the 6th/7th level. Students study rich vocabulary, grammar, literature, and writing, setting themselves up for success in higher education. These skills will help students effectively write academic essays, participate in critical analyses, and share with small/large groups. Students will develop an understanding of the six traits of writing, the eight parts of speech, and numerous poetic tools: all elements of higher-level communication. 4. Your AR Book: i.e. your ‘Always Reading’ Book, i.e. any book you want to read that you have not already read. Course Description: Targets the 6th/7th level. Students will transition to foundations of algebra. This includes a focus on rational numbers and operations involving rational numbers, using ratios to compare data sets; recognizing decimals, fractions, and percent’s as ratios; solving single-step and multistep problems, using positive rational numbers; and gaining a foundation in the understanding of and operations with integers. Students will solve problems involving area and perimeter, and begin to graph in a coordinate plane. In addition, students will build on the concept of graphical representation of data developed in the elementary grades and develop concepts regarding measures of center. Students will solve linear equations and inequalities in one variable, and use algebraic terminology. Students will represent proportional relationships using two variables as a precursor to the development of the concept of linear functions, setting themselves up for success in higher education. These skills will help students effectively progress with an end goal of doing calculus one day at the high school level. Goals: To build a foundation in algebraic reasoning and improve critical thinking skills.  Challenging class-opener in a competitive setting with prizes.  Lesson to engage concepts.  Homework handed back with feedback.  Challenging multi-concept problems with a gentle walkthrough.  Timed mini quiz each week. -- Come prepared to engage your mind in challenging tasks for prizes. -- Work together as a team. -- Bring a pencil with an eraser! Use the eraser! A pouch to store at least 3 pencils, 2 pens, and 1 highlighter. Location: 503 Carlisle Dr., Room 125, Herndon, VA 20170. There is easy access from Route 7100/286 (Fairfax County Pkwy). It is right off Elden Street. Course Description (part 2): The course continues from the Fall 2018. It targets the 5th/6th level. Students study rich vocabulary, grammar, literature, and writing, setting themselves up for success in higher education. These skills will help students effectively write academic essays, participate in critical analyses, and share with small/large groups. Students will develop an understanding of the six traits of writing, the eight parts of speech, and numerous poetic tools: all elements of higher-level communication. 5. Timed writing each week. Course Description: Targets the 5th grade level. The fifth-grade level places emphasis on number sense with whole numbers, fractions, and decimals. This focus includes concepts of prime and composite numbers, identifying even and odd numbers, and solving problems using order of operations for positive whole numbers. Students will develop proficiency in the use of fractions and decimals to solve practical problems. Students will collect, display, and analyze data in a variety of ways and solve probability problems, using a sample space, a tree diagram, or the Fundamental Counting Principle. Students will also solve problems involving volume, area, and perimeter. Students will be introduced to expressions with a variable. Students will solve problems using strategies including place value and the properties of addition and multiplication. All of these skills assist in the development of the algebraic concepts needed for success in the middle grades, setting students up for success in higher education. These skills will help students effectively progress with an end goal of doing calculus one day at the high school level. Goals: To build a foundation in number sense, preliminary algebraic reasoning and improve critical thinking skills. • Challenging class-opener in a competitive setting with prizes. • Lesson to engage concepts. • Homework handed back with feedback. • Challenging multi-concept problems with a gentle walkthrough. • Timed mini quiz each week. Teacher: Mr. V. has taught all levels of Mathematics from 4th grade through AP Calculus BC over his 8 year teaching career. He built and maintained an AP Calculus program at his first teaching assignment in PA where the course was never offered. He was brought to Fairfax County four years ago to help develop a non-AP Applied Calculus course for Fairfax County Schools (which has been adopted county-wide). He currently leads the AP Calculus AB Team at a top Fairfax County Public School. He has been an AP Reader (expert teacher flown to Kansas City, MO to grade the official AP Exam Free Response Sections) and has attended several AP Collegeboard trainings and Summer Institutes for Calculus. He was a part of the leader teachers’ panel to adopt textbooks for the 2019 school year and beyond in FCPS for Computer Science and Calculus. Even with his work at the high school level, he has experience with rising 4th, 5th and 6th grade students who are looking to advance as far in mathematics as they can go. He has been a coordinator for middle school Mathcounts to which several of his students made it to rounds beyond their expectation. He has been the American Math Challenge coordinator for High school students for the past four years. Recently, he has helped a group of rising 6th graders master BOTH Pre-Algebra and Algebra 1 this past summer 2018. He’s very excited to work with Discover in the hopes that he can have an even larger impact on students’ lives. • A pouch to store at least 3 pencils, 2 pens, and 1 highlighter. Book list: We may adjust the book list if necessary. We will order the books for you. The books are not included in the tuition. The cost will be listed. We will inform you the book sell date. Course Description: Targets the 4th/5th level. Students study rich vocabulary, grammar, literature, and writing, setting themselves up for success in higher education. These skills will help students effectively write academic essays, participate in critical analyses, and share with small/large groups. Students will develop an understanding of the six traits of writing, the eight parts of speech, and numerous poetic tools: all elements of higher-level communication. This class will cover the most important concepts of the newly designated TJHSST course "TJ Math 4" commonly referred to as "Trigonometry". In this course, students will become familiar with the following topics: right triangle ratios, radian angle measures, circular functions, the unit circle, solving trigonometric equations, inverses, identities, the Laws of Sines, the Law of Cosines, graphing trigonometric functions, and applying trigonometric techniques to solving real-world problems. A transformational approach to graphing is used with families of related graphs. Numerical, graphical, and algebraic solutions are considered for all problems as applicable. Graphing utilities on the graphing calculator are integral to the course. The course targets the 3rd grade level. The spring course will work to strength the fact fluency for addition and subtraction, and develop an understanding of, and solving problems that involve multiplication through 10 × 10. Students will apply knowledge of place value and the properties of addition and multiplication as strategies for solving problems. Student will be introduced with addition and subtraction of simple fractions. Students will use standard units for measurement. Students will explore geometry and identify polygons. Problem solving is a major goal of DLC’s mathematics programs and will be integrated into the learning. Our curriculum will challenge students to develop critical thinking and problem-solving skills. It will give them a deeper understanding of mathematics and the confidence to communicate mathematically. Our goal is to better prepare them for upper level mathematics. • Challenging activities with prizes and rewards. • Lessons to engage concepts. • Walk-through multi-step problems with detailed explanation. • Mini quiz each week. Ms. C joined Discover Learning Center last summer and had a wonderful experience teaching elementary-school students. She has a BS degree in Computer Science, a MS degree in Education and a teaching license in Mathematics. For a number of years, she was an instructor for JHU CTY Online programs. Her experiences are accumulated from working with students K-12 (both in classroom and online), coaching and tutoring outside classrooms. She is excited to have the opportunity to work with your children and looks forward to helping them achieve academic progress and success. The course targets the 2nd grade level. The spring course extends the study of number and spatial sense to include three-digit whole numbers and solid geometric figures. Students will learn, use, and gain proficiency in addition and subtraction within 20. Fractional concepts will be expanded. Students will learn to use U.S. Customary units to measure length and weight; predict and use simple probability; and create and interpret pictographs and bar graphs. Students will work with a variety of patterns and will develop an understanding of equality. Adding to every class, students will be given CogAT (Cognitive Abilities Test) practice problems to prep them for the AAP screening in 2nd grade. Students will become familiarized with 9 type of CogAT questions and will work through 2 full length practice tests. Problem solving will be a major goal of DLC’s mathematics programs and will be integrated into the learning. Our curriculum will challenge and allow students to develop critical thinking and problem solving skills. It will give them a deeper understanding of mathematics. Our goal is to better prepare them for upper level mathematics. This course will help students gain the strategies, skills and practice needed to achieve a top SAT and ACT score. Instruction will focus on the specific mistakes and deficiencies of the high-scoring students in the class, and the lessons will be tailored to the participants. Students will also learn how to be more consistently accurate, how to improve their pacing, and how to identify and fix their own mistakes while taking the test. This course requires extensive work outside of class on the part of the student. --Command of evidence in reading and writing: use of evidence, understand how an argument uses or doesn’t use evidence. --Problems grounded in real-world contexts in reading writing and language sections. Mr. V has taught all levels of Mathematics from 4th grade through AP Calculus BC over his 8 year teaching career. He built and maintained an AP Calculus program at his first teaching assignment in PA where the course was never offered. He was brought to Fairfax County four years ago to help develop a non-AP Applied Calculus course for Fairfax County Schools (which has been adopted county-wide). He currently leads the AP Calculus AB Team at a top Fairfax County Public School. He has taught SAT math for many years. He’s very excited to work with Discover in the hopes that he can have an even larger impact on students’ lives. Please contact us at [email protected] to obtain a permit if you want to have a free trial for spring courses at Discover Learning Center. The seats are limited, first come first serve. Free trial location for the courses below at 503 Carlisle Dr., Herndon, VA 20170. There is easy access from Route 7100/286 (Fairfax County PKWY) and is right off Elden Street.
2019-04-22T06:20:25Z
http://www.discoverlearningcenterva.com/2019-Spring-semester.html
A full review of progress to date – both accomplishments and shortcomings – is available here. How we fall short: Our staff is not as diverse as we would like it to be. Steps we took to improve: we have continually strived for a diverse pipeline of candidates when hiring, and we intensified our focus on this issue in 2014. As of mid-2015, we have made significant progress but still feel we have significant room for improvement. How we fell short: In early 2016, we began work on reviewing the evidence base for a large number of programs to determine which of them we should consider to be priority programs. Our 2016 research plan discusses this priority (referred to as "intervention prioritization"). As of the end of 2018, we have completed a significant number of these analyses but have only published approximately 10 interim intervention reports that came out of this work. A significant amount of the work that we've done to prioritize interventions and top charity investigations remains private, in internal documents that we have not shared because we have not put in the time to ensure the work is of publishable quality. In addition, since early 2017, we have had a significant number of conversations with charities about applying for a GiveWell recommendation or have completed a preliminary evaluation of a charity's application. This work also remains private. In some cases, this is because we did not get permission to publish information from those we spoke to. In other cases, this is because we have not put in the time to write up what we have learned in a format that is of publishable quality and seek permission to publish it. While we don't believe that publishing this work would have changed any of the recommendations we make to donors, we see this body of private materials as a substantial failure to be transparent about our work. We believe that transparency is important for explaining our process and allowing others to vet our work. The process of formally writing up our research and seeking internal and external feedback has also on occasion changed our conclusions. Steps we took to improve: As of December 2018, this remains a problem. We believe the cause has been a failure to build and devote staff capacity to publishing as we increased capacity dedicated to conducting intervention and charity investigations. We now are planning to build a larger team, with a focus on building capacity to create reports of publishable quality. We expect this capacity will allow us to publish our backlog of material and maintain our transparency standards going forward. However, we expect that developing this capacity will take some time, and that this issue will remain until we do so. How we fell short: From 2014 to 2016, we produced relatively few intervention reports, a crucial part of our research process. Our low production may be explained by the fact that we tasked relatively junior, inexperienced staff with these reports. We did not prioritize hiring a specialist, likely someone with a PhD in economics or the equivalent, who would have likely been able to complete many more reports during this time. This delayed our research and has potentially led us to recommend fewer top charities than we otherwise might have. Steps we've taken to improve: In September 2016, we began recruiting for a Senior Fellow to fill this role. The role was filled in May 2017. How we fell short: We realized in 2016 that some charities had misconceptions about our criteria, value-added, and research process. For example, some charities told us that they thought charities could only be recommended for three years; others weren't aware that we had recommended million-dollar "incentive grants" to top charities. Steps we've taken to improve: We have assigned a staff member the duties of charity liaison. This person will be responsible for communicating with charities that are considering applying, to help them with our process and correct misconceptions. Since 2009, we've made a practice of publishing notes from conversations with charities and other relevant parties. Our practice is to share the conversation notes we take with the other party before publication so that they can make changes to the text before publication. We only publish a version of the notes that the other party approves and will keep the entire conversation confidential if the party asks us to. In November 2012, a staff member completed an audit of all conversations that we had published. He identified two instances where we had erroneously published the pre-publication (i.e., not-yet-approved) version of the notes. We have emailed both organizations to apologize and inform them of the information that we erroneously shared. In October 2012, we published a blog post titled, "Evaluating people." Though the final version of the post did not discuss specific people or organizations, a draft version of the post had done so. We erroneously published the draft version which discussed individuals. We recognized our error within 5 minutes of posting and replaced the post with the correct version; the draft post was available in Google's cache for several hours and was likely available to people who received the blog via RSS if they had their RSS reader open before we corrected our error (and did not refresh their reader). We immediately emailed all of the organizations and people that we had mentioned to apologize and included the section we had written about them. Note that none of the information we published was confidential; we merely did not intend to publish this information and it had not been fully vetted by GiveWell staff and sent to the organizations for pre-publication comment. Steps we've taken to improve: In November 2012, we instituted a new practice for publishing conversation notes. We now internally store both private and publishable versions of conversation notes in separate folders (we hope that this practice reduces the likelihood that we upload the wrong file) and have assigned a staff member to perform a weekly audit to check whether any confidential materials have been uploaded. As of this writing (December 2012) we have performed 3 audits and found no instances of publishing private material. We take the issue of publishing private materials very seriously because parties that share private materials with us must have confidence that we will protect their privacy. We have therefore reexamined our procedures for uploading files to our website and are planning to institute a full scale audit of files that are currently public as well as an ongoing procedure to audit our uploads. October 2016 Update: We now have a publishing process that clearly separates publishable versions of conversation notes from private versions of notes, and we periodically audit published notes to ensure that all interviewee's suggestions have been incorporated. As of this time, our process requires that explicit approval to publish is given for each file we upload, and we periodically audit these uploads to ensure that private information has not been uploaded to our server. How we fell short: We continue to struggle with an appropriate tone on our blog, one that neither understates nor overstates our confidence in our views (particularly when it comes to charities that we do not recommend). An example of a problematic tone is our December 2009 blog post, Celebrated Charities that we Don't Recommend. Although it is literally true that we don't recommend any of the charities listed in that post, and although we stand by the content of each individual blog post linked, the summaries make it sound as though we are confident that these charities are not doing good work; in fact, it would be more accurate to say that the information we would need to be confident isn't available, and we therefore recommend that donors give elsewhere unless they have information we don't. We wish to be explicit that we are forming best guesses based on limited information, and always open to changing our minds, but readers often misunderstand us and believe we have formed confident (and, in particular, negative) judgments. This leads to unnecessary hostility from, and unnecessary public relations problems for, the groups we discuss. How we fell short: Between July 2009 and November 2010, we assigned zero- to three-star ratings to all charities we examined. We did so in response to feedback from our fans and followers - in particular, arguments that people want easily digested, unambiguous “bottom line” information that can help them make a decision in a hurry and with a clean conscience. Ultimately, however, we decided that the costs of the ratings - in terms of giving people the wrong impression about where we stood on particular charities - outweighed the benefits. Steps we have taken to improve: By December 2010 we will replace our quantitative ratings with more complex and ambiguous bottom lines that link to our full reviews. How we fell short: As part of an effort to gain publicity, GiveWell's staff (Holden and Elie) posted comments on many blogs that did not give adequate disclosure of our identities (we used our first names, but not our full names, and we didn't note that we were associated with GiveWell); in a smaller number of cases, we posted comments and sent emails that deliberately concealed our identities. Our actions were wrong and rightly damaged GiveWell's reputation. More detail is available via the page for the board meeting that we held in response. Given the nature of our work, it is essential that we hold ourselves to the highest standards of transparency in everything we do. Our poor judgment caused many people who had not previously encountered GiveWell to become extremely hostile to it. Steps we have taken to improve: We issued a full public disclosure and apology, and directly notified all existing GiveWell donors of the incident. We held a Board meeting and handed out penalties that were publicly disclosed, along with the audio of the meeting. We increased the Board's degree of oversight over staff, particularly with regard to public communications. How we fell short: For our first year of research, we grouped charities into causes ("Saving lives," "Global poverty," etc.) based on the idea that charities within one cause could be decided on by rough but consistent metrics: for example, we had planned to decide Cause 1 (saving lives in Africa) largely on the basis of estimating the “cost per life saved” for each applicant. The extremely disparate nature of different charities' activities meant that there were major limits to this type of analysis (we had anticipated some limits, but we encountered more). Because of our commitment to make one grant per cause and our overly rigid and narrow definitions of "causes," we feel that we allocated our grant money suboptimally. For example, all Board members agreed that we had high confidence in two of our Cause 1 (saving lives) applicants, but very low confidence in all of our Cause 2 (global poverty) applicants. Yet we had to give equal size grants to the top applicant in each cause (and give nothing to the 2nd-place applicant in Cause 1). Steps we have taken to improve: We have shifted our approach to "causes" so that they are defined more broadly. This gives us more flexibility to grant the organizations that appeal to us most. We now explore broad sets of charities that intersect in terms of the people they serve and the research needed to understand them, rather than narrower causes based on the goal of an “apples to apples” comparison using consistent metrics. For example, our recent research report addresses the broad area of international aid (note that this link goes to the research homepage). October 2016 Update: The process we now use for identifying top charities and priority programs is detailed here. In a sheet that consolidated information from other sheets, we mistakenly included one funding gap twice. This led us to calculate the amount to recommend that Good Ventures grant to Evidence Action's Deworm the World Initiative as &dollar;100,000 higher than we would have without the error (&dollar;10.4 million instead of &dollar;10.3 million). We learned of this error because Deworm the World brought it to our attention. We expect to reduce the amount that we recommend that Good Ventures grant to Evidence Action in a future grant by an offsetting amount. In the same spreadsheet, we increased our estimate of the total amount of additional funding that Malaria Consortium could absorb by &dollar;4.8 million over what we had calculated originally, based on new information we received from Malaria Consortium. We later realized that we had not added in Malaria Consortium's 10% overhead rate, leading us to underestimate the total Malaria Consortium could absorb by &dollar;480,000. This did not affect our recommendation to Good Ventures or other donors because the amount we recommended these donors give was limited by the amount of funding available, rather than by the amount that Malaria Consortium could absorb. Steps we took to improve: 2018 was the first time that we used this spreadsheet format to calculate our recommendations to Good Ventures. While the errors made in 2018 did not, in the end, result in over- or under-funding any top charities, they are indicative of ways spreadsheet errors could lead to mistakes in funding levels. We expect to make updates to the format in 2019 to reduce the risk of error and to build in checks for discrepancies. How we fell short: Each year, GiveWell publishes a metrics report on our money moved and web traffic. These metrics are part of how we evaluate ourselves. We failed to publish a complete metrics report in 2017, only publishing an interim report at the end of September. Steps we took to improve: We misassessed the difficulty involved in completing the metrics report. We reassigned responsibility to another staff member who plans to prioritize and publish our 2016 metrics report as soon as possible and 2017 metrics report as soon as possible in 2018. How we fell short: On November 29th, we released updated charity recommendations. Three of our seven top charities implemented a variety of programs, and our recommendation for them was restricted to a specific program. We did not clearly communicate this fact on our top charities or donate pages, potentially causing donors who gave directly to these three organizations (as opposed to giving via the GiveWell website) to fail to restrict their donations to the programs we recommend. Steps we've taken to improve: We have updated the pages to reflect the fact that our recommendation for these charities is program-specific. How we fell short: In early 2015, we discovered some errors in our cost-effectiveness analysis of DMI. See this blog post for details. Steps we have taken to improve: Going forward, we plan to improve the general transparency and clarity of our cost-effectiveness models, and explicitly prioritize work on cost-effectiveness throughout our research process. See this section of our 2015 annual review for more. How we fell short: We were not highly confident in our cost-effectiveness estimates when we announced our updated charity recommendations at the end of 2014, a fact we noted in the post, because we finalized our cost-effectiveness analyses later in the year than would have been ideal. See this part of our 2014 annual review for more detail. Steps we have taken to improve: We plan to improve these analyses by reworking our cost-effectiveness models to improve the general transparency and clarity of the analyses and explicitly prioritizing work on cost-effectiveness throughout our research process. We are also experimenting with more formal project management to increase the likelihood that we complete all tasks necessary for our year-end recommendations update at the appropriate time. How we fell short: We published fewer intervention reports than we had planned to at the beginning of 2014. We completed two new intervention reports in 2014, but at the beginning of 2014, we wrote that we hoped to publish 9-14 new reports during the year. On reflection, our goal of publishing 9-14 intervention reports was arbitrary and unrealistic given the amount of time that it has typically taken us to complete intervention reports in the past. See this part of our 2014 annual review for more detail. Steps we have taken to improve: We have learned more about how much work is involved in completing an intervention report and hope to make more realistic projections about how many we can complete in the future. How we fell short: In 2014, we erred in our recommendation to Good Ventures about its giving allocation to our top charities. We made this recommendation two weeks before we announced our recommendations publicly so that we could announce their grants as part of our top charities announcement. If we had fully completed our analysis before making a recommendation to Good Ventures, we likely would have recommended relatively more to AMF and relatively less to GiveDirectly. See this part of our 2014 annual review for more detail. Steps we have taken to improve: In the end, we adjusted the public targets we announced based on the grants Good Ventures had committed to, so we don’t believe that donors gave suboptimally overall. In the future we expect to make — and announce — our recommendations to Good Ventures and the general public simultaneously. How we fell short: In our 2014 recommendation cycle, we did not alert our candidate charities of our "Standout Charity" second-tier rating prior to announcing our recommendations publicly. Some of our candidate charities were surprised when they saw their ranking as a "Standout Charity," as they had been assuming that they would either be recommended as a top charity or not recommended at all. Steps we have taken to improve: We will be more cognizant of how we communicate with charities in the future and will continue to solicit feedback from them so we can identify any other ways in which our communication with them is suboptimal. How we fell short: Elie assigned a relatively new Research Analyst to the task of updating the intervention report on cash transfers. The analyst made the specific updates asked for in the task, which led him to change the report’s conclusion on the effect of cash transfers on business expenditures and revenue. A Summer Research Analyst vetted the page, and we published it. After publishing the update, another GiveWell staff member, who had worked on the page previously, noticed that the report’s conclusion on business expenditures and revenue misstated our view. Steps we have taken to improve: When this mistake was identified, we made two changes. First, when passing off ownership of a page from one staff member to another, we involved all staff members who had previously owned the page via an explicit "hand-off" meeting, and by getting their approval before publishing the page. Second, we became more careful to ensure that all changes made by relatively inexperienced staff are reviewed by more experienced staff before publication. October 2016 Update: At the time of this update (October 2016), we still aim to hold an explicit "hand-off" meeting which include staff who previously owned the page, although this meeting does not always include all staff who previously owned the page. We do not require the approval of all staff who previously owned the page prior to publication. How we fell short: On February 4, 2014, we asked our website developer to make a change to the code that generates our homepage. In the process, he inadvertently copied the homepage content from November 2013. This content had two main differences with the up-to-date content. First, it described our top charities as “proven, cost-effective, underfunded and outstanding” rather than “evidence-backed, thoroughly vetted, and underfunded,” wording we changed in late-2013 because we felt it more accurately described our top charities. Second, it listed our top charities as AMF, GiveDirectly, and SCI, rather than GiveDirectly, SCI, and Deworm the World. According to our web analytics, 98 people visited our AMF page directly after visiting the homepage, possibly believing AMF to be a top charity of ours. Note that the top of our AMF review correctly described our position on AMF at this time. Steps we’ve taken to improve: We discovered the problem on February 25 and fixed it immediately. We have added a step to our standard process for checking the website after a developer works on it to look for content that is not up to date. How we fell short: Timothy Telleen-Lawton (GiveWell staff member as of April 2013) has been friends with Paul Niehaus (GiveDirectly President and Director) for many years. When Timothy met Holden Karnofsky (GiveWell's Co-Founder and Co-Executive Director) in April 2011, he suggested that GiveWell look into GiveDirectly and introduced Holden and Paul by email. GiveWell later recommended GiveDirectly as a top charity in November 2012, before Timothy was on GiveWell staff. Starting in January 2013, Holden started living in a shared house with Timothy, around the same time Timothy started a trial to work at GiveWell. Paul has visited and stayed at the shared house several times. We should have publicly disclosed the social connection between Paul and Holden and Timothy. Note that this mistake solely relates to information we should have publicly disclosed to avoid any appearance of impropriety. We do not believe that this relationship had any impact on our charity rankings. Timothy was not the staff member responsible for the evaluation of GiveDirectly, and Holden has had relatively little interaction with Paul (and had relatively little interaction with Timothy prior to moving to San Francisco in 2013). Steps we have taken to improve: We publicly disclosed this fact in December 2013; at that time, we also created a page to disclose conflicts of interest. How we fell short: We aimed to publish regular updates on the Against Malaria Foundation, but we went most of the year (February to September) without any updates. This was caused by our desire to publish comprehensive updates, and we allowed expectations of new information being available shortly to delay publishing brief updates that had meaningful but limited information. Steps we have taken to improve: As of July 2013, we changed our process for completing top-charity updates. We began publishing notes from our conversations with these charities (as we do for many of the conversations we have more generally) which should lead to more timely updates on our top charities. October 2016 Update: We now plan to publish twice-yearly 'refreshes' of all of our top charity recommendations, in addition to publishing conversation notes and relevant updates throughout the year. How we fell short: From May 20 to June 26, private content was intermittently available to the public on the GiveWell website. A change we made on May 20 caused pages set to be visible by staff only to appear, in some browsers, as a page with a login screen and below it, the unpublished content. Unpublished content includes both confidential information and incomplete research. Confidential information on unpublished pages is generally information that we expect to be able to publish, but which we have not yet received approval from an external party to publish. However, there are exceptions to this and it is possible that sensitive information was revealed. We are not aware of any cases of sensitive information being revealed. Steps we have taken to improve: We fixed the problem a few hours after discovering it. We have added monitoring of unpublished pages to our list of regular website checks. How we fell short: During this period, our jobs page invited applicants to apply for our research analyst role. We responded to every applicant by asking them to work on a "charity comparison assignment" in which each applicant compared three charities and discussed which charity they would support and why. This assignment took applicants between 6 and 10 hours to complete. During this period, approximately 50 applicants submitted the assignment, of which we interviewed approximately 8. We now feel that asking all applicants to complete this test assignment likely took more of their time than was necessary at an early stage in the recruiting process and may have led some strong applicants to choose not to apply. Steps we've taken to improve: We no longer ask all applicants to complete this assignment. In December 2012, we changed our jobs page to more clearly communicate about our hiring process. How we fell short: In early GiveWell years, we aimed to release updated recommendations by December 1st in order to post our recommendations before "giving season," the weeks at the end of the year when the vast majority of donations are made. In 2011, we released our recommendations in the last week of November, but then ran into problems related to donation processing. To alleviate those problems in the future, we planned to release our recommendations in 2012 by November 1st to give us sufficient time to deal with problems before the end of the year rush of giving. In 2012, we did not release our recommendations until the last week of November (significantly missing our goal). We continued to publish research about the cost-effectiveness and evidence of effectiveness for the interventions run by our top charities throughout December, which meant that some donors were making their giving decisions before we had published all the relevant information. The primary cause of the delay was that we did not start work on GiveDirectly, the new 2012 top-rated charity until mid-September, which did not give us enough time to finish its full review by the November 1st deadline. Steps we've taken to improve: In 2013, we again aim to release our recommendations by November 1. This year, we plan to explicitly consider possible top-rated charities on July 1st and move forward with any contenders at that point. October 2016 Update: We now aim to publish our top-charity recommendations before U.S. Thanksgiving each year, so as to make them available throughout the year-end giving season. Steps we've taken to improve: GiveWell staff will be more attentive in the future to sharing sensitive public information with the board member responsible for public communication before posting. How we fell short: Throughout GiveWell's history, we have relied on Skype and staff's individual cell phones to make phone calls. This led to instances of poor call quality or dropped calls, but given the fact that GiveWell was a startup, those we spoke with generally understood. In addition, we had not always confirmed with call participants the phone number to use for a particular call or set up and send agendas for the call in advance. Earlier in GiveWell's history, participants likely understood that we were a very new, small organization just getting started and aiming to control costs. But, as we've grown this is no longer a reasonable justification, and both of the problems listed here may have had implications for the professionalism we've projected to those we've spoken with. Steps we have taken to improve: We have continued to be more vigilant about confirming that all participants are aware of the number to use for scheduled calls. In March 2012, we set up dedicated lines and handsets for our calls. While Google covers credit card processing fees for charities enrolled in the Google Grants program (which includes GiveWell, itself, and many of our top charities), many charities are not enrolled and therefore donors who give to them via our website do pay credit card processing fees on their donations. While these fees are small in absolute terms for smaller donors, a 3% fee on a &dollar;10,000 donation is &dollar;300. Some donors may realize this and choose to give via credit card regardless. Some, however, may not have realized this and would have preferred to have mailed a check to save the fee. October 2016 Update: Donors who support GiveWell or our top charities charities through donations to GiveWell are subject to payment processing fees that vary depending on the platform through which they donate; we no longer receive free processing through Google due to the end of that program. We have published a page detailing the options for donating to GiveWell and associated fees, as well as advice for larger donors interested in minimizing such fees. People making large donations very frequently run into problems with their credit card companies (due to the fact that they are spending so much more on a single item than they usually do). In our experience, about half of donations over &dollar;5,000 are declined the first time a donor tries to make the gift and are only cleared after he or she speaks with his card company. This creates confusion and unexpected hassle for donors trying to give to charity. Giving via appreciated stock has beneficial implications for donors allowing them to reduce future capital gains taxes and therefore give more to charity (without giving more "real" money). We did not broadcast this message to donors. October 2016 Update: In addition to our page listing giving options for donors, we also have a page of advice for larger donors, including donating appreciate securities. On December 21, 2011, a representative from Imperial College Foundation (the organization receiving donations for the support of the Schistosomiasis Control Initiative, our #2-rated charity in 2011) emailed us to let us know that its Google Checkout account had been suspended. Donors who wanted to give to SCI via the GiveWell website give via Google Checkout, and though the Google Checkout button is on the GiveWell website, the charity owns the Checkout account and donations go right to it. GiveWell staff therefore did not know there was a problem until the ICF representative informed us of it. We still do not know how long the problem lasted or whether any donors attempted to make donations during the time the account was suspended. (We do not even know how Google communicated to them about the error). ICF contacted Google but has not determined what led to the account suspension. Once we learned of the problem, we reconfigured donations to go through GiveWell. As noted elsewhere on this page, many larger donations made via credit card are initially declined by credit card companies due to the fact that many donors give a larger amount to charity than they spend in a single purchase throughout the year. Because donations go directly to our charities, at times, GiveWell has to coordinate with charities representatives to cancel charges so that donors feel safe resubmitting their donation. This creates confusion, wastes time, and doesn't allow donors to complete the transaction as quickly as they would like. Setting up trackable donation processing for our top charities requires individual communication with each charity. This means that we must spend time communicating with each charity, and each charity must spend time creating its account. Also, in the event that the charity does not have time to set up the account or sets up the account but it has a problem, the required tracking may not be in place. With several charities in 2011, tracking was either not set up at the time we released our recommendations or we needed to create a one-off workaround to track donations to them. We plan to better advise larger donors of their non-credit-card options for donating and potential hassles of donating via credit card. October 2016 Update: We have a page of advice for larger donors that discusses options for making large donations. We also have an information page discussing different donation options. We are now considering switching over donations to all charities to go through GiveWell so that we are immediately aware of any problems. October 2016 Update: We offer donors the option of donating to GiveWell for regranting to our top charities, or donating directly to our top charities and letting us know that they've done so. We aim to complete our recommendations earlier in 2012 than 2011 (to give us additional time to address any problems that come up). How we fell short: Our top-rated charity in 2011 was the Against Malaria Foundation. We made two errors in the way we communicated to donors about the ramifications of donating to AMF. Fees: On our donate to AMF page, we told donors that "no fees are charged on donations to AMF." This was incorrect. Donors who give via AMF's website are charged normal credit card processing fees. We now understand that we miscommunicated with AMF on this issue; AMF did not intend to communicate that there are no processing fees and was unaware that we were communicating this on our site. Fees: We changed the language on our page to clarify that credit card fees are charged on donations via AMF's website. We also provided donors who wished to give for the support of AMF the option to give donations directly to GiveWell. Because GiveWell was enrolled in Google's Grants program, Google paid credit card processing fees for donations. GiveWell then had the ability to regrant these funds to AMF. October 2016 Update: Credit card processing fees are incurred if a donor supports AMF through GiveWell; they are no longer covered by Google. Additional details are available here. Tax deductibility in Australia: We took several actions. (1) We emailed Rob Mather, AMF's CEO. He agreed that the charity status page on AMF's website was misleading. AMF edited the page to clarify its status in Australia, and Rob Mather offered to refund any donations (or parts of donations) made by Australians relying on the fact that they could receive a tax deduction. (2) On our site, we removed Australia from the list of countries in which AMF is registered for individual-donor tax deductibility. (3) We emailed all Australian donors who had given to AMF (and had found AMF via GiveWell) since we had posted that donations to AMF are tax-deductible for Australians to let them know we had erred and we communicated Rob Mather's offer to refund donations. AMF is in the process of applying for tax deductible status for individuals and will inform us if and when that has been granted. AMF has also told us that the two donors that have asked for refunds have both said they will donate the same amount to AMF when the tax deductible status is in place. As of September 2015, gifts from individuals to AMF are tax deductible in Australia. See this blog post for details. How we fell short: When reviewing Village Enterprise (formerly Village Enterprise Fund) in late 2009, we projected that they would spend 41% of total expenses on grants to business groups, because we misinterpreted a document they sent us which projected spending 41% of total expenses on business grants and mentorship expenses. We do not know what mentorship expenses were expected to be so we do not know the magnitude of our error. Village Enterprise ended up spending 20% of total expenses on business grants in FY 2010. We caught this mistake ourselves when we were updating the review in August 2011. Village Enterprise plans to spend 28% of total expenses on business grants in FY 2012. Steps we are taking to improve: We have updated our review of Village Enterprise to reflect the correct distribution of expenses. Going forward, before publishing a page, at least one additional GiveWell employee will check the original source of figures that play a key role in our conclusions about a charity or program. October 2016 Update: We do not always implement this check before publication; sometimes pages are vetted after they are published. How we fell short: Between 8/1/2009-12/31/2009, we accepted applications for &dollar;250,000 in funding for economic empowerment programs in sub-Saharan Africa. We attempted to be extremely clear with charities that we planned on sharing the materials they submitted, and that agreeing to disclosure was a condition of applying, but in a minority of cases, we failed to communicate this. We conceded these cases and gave the charities in question the opportunity to have their materials - and even the mention of the fact that they had applied for funding - withheld. We try to avoid keeping materials confidential unless absolutely necessary, and in this case our unclear communications led to confrontations and to confidentiality situations that could have been avoided. Details at this blog post. We offered the minority of charities with whom we'd been unclear the option not only to have their materials omitted, but to have us not disclose the fact that they applied for funding from us. We added clarificatory language to the top of our charity reviews, in order to clarify what a "0-star rating" means. In the future, we may publicly publish pages on charities we consider before we accept materials from them, in order to make our intentions about disclosure and public discussion absolutely clear. October 2016 Update: Details of our current transparency policy are available here. In this case, we published our post without such a check, reasoning that we were not sharing any substantive materials (only paraphrasing general statements from representatives). Doing so gave the impression that sharing more information can result in more negative coverage. We continue to struggle with the balance between disclosing as much information as possible and avoiding disincentives to share information. We will not find a solution in every case, but feel that we mishandled this one. Steps we have taken to improve: We have let Acumen Fund know that we regret this incident and resolved to be more careful about quoting from representatives and grant applications in the future. How we fell short: In May 2009, we discussed the Millions Saved project with a staff member of the project, Dr. Jessica Gottlieb, and then published a copy of the recording of the conversation to our website. Dr. Gottlieb approved making the recording public on the condition that we remove personal references that she made during the conversation. We partially removed the references, but we failed to remove one person's email address and Dr. Gottlieb's suggestion that we speak with a particular person. We noticed this error in February 2014 while preparing to use this recording as part of a test assignment for potential employees. According to our logs, no one had downloaded the audio file during the previous year. Steps we have taken to improve: We notified Dr. Gottlieb about this mistake and apologized to her. Subsequent to (and unrelated to this error), we had implemented a formal procedure for reviewing uploaded files to confirm that all requested changes to files have been made. How we fell short: At our board meeting in January 2008, we agreed to explore options for professional development and mentoring, in light of the relative youth and inexperience of our staff. GiveWell staff put a lower priority on this than more time-sensitive goals, and while we explored a few options, we made little progress on it between January and September. At the September Board meeting, the Board criticized this lack of progress and reiterated the need for professional development and mentoring. Steps we have taken to improve: As of July 2009, we had two highly regular mentoring relationships, and two more in a "trial phase." We also stepped up Board oversight through a monthly conference call (attendance was optional but generally high) and more regular calls with Board Vice-President Lindy Miller. An update on professional development was presented at our July 2009 Board meeting.
2019-04-24T16:17:38Z
https://www.givewell.org/about/our-mistakes
As we’re finally done dipping our feet towards 2018, let’s look at some of the big plans of well-known major players in the tech industry. Here are just some of what to expect from big tech brands this 2018. Google has grown to be much more than just a search engine. It has expanded its product and research to several technologies. Here are some of the changes and projects we expect Google to do this 2018. Google continues to improve its roots in search engine optimization with expected changes this year. One of the changes would be adding more emphasis on RankBrain, an algorithm update. RankBrain stemmed from Google’s advancements in machine learning which enables better interpretation of queries and precise matching with relevant page content. With processes of 63,000 searches per second, RankBrain will prove to be significant this year. The popular tech firm would also focus on Accelerate Mobile Pages or AMP. It is an open-source initiative that allows publishers to produce mobile-friendly content once and have it instantly load everywhere. Users searching on their mobile devices will be immediately directed to relevant pages and businesses can create smooth and fast-loading websites. This result will need marketers to be familiar with AMP so as to generate better websites and more online presence. Google will also continue to provide relevant search results using real-time integrated penalty filters. This filter is incorporated in the latest update of Penguin, Google’s real-time filter within the search algorithm. This initiative eliminates spam websites in real-time. Google recently reported that sites should start to use HTTPS instead of HTTP for better website security. This change comes with an incentive of a minor boost to a website’s search ranking. However, according to recent tests, the boost will not be more than 1%. Google plans to further increase the added rank boost so as to encourage websites to switch to HTTPS. Google plans on adding new features to Gmail. The popular email service is already testing features to make Gmail faster, and dynamic using the AMP technology. The main plan is to make email pages automatically update. An example of this new feature is users automatically seeing updates of flight information in a booking confirmation email. Gmail will first use this feature to bulk senders such as retailers, or magazine subscriptions. The new feature would allow recipients to see current sales regardless of when the email is opened. The feature will roll out later this year. Reports say Google plans to employ 10,000 human content reviewers to moderate YouTube videos. This is a response to YouTube’s cut down on ads and after advertisers pulled out of YouTube due to last year’s issue of ads appearing next to terrorist videos and inappropriate videos of children. As a result, YouTube is striving to push for transparency and human review of content. YouTube will also start to release regular reports regarding data on flagged videos and the actions done by YouTube. It was recently reported that Google is planning to build three underwater cables to be completed in 2019 in order to expand their cloud business. Subsea cables will be planted in different routes: Los Angeles to Chile, the US to Denmark and Ireland, and Hong Kong to Guam. These cables will make it possible for Google to deliver better cloud service experience. The servers can still provide good service performance even if a server in one region causes a problem. As Facebook continues to become a widely-used social media platform, how does it intend to use its influence this 2018? In early January, Facebook founder and CEO Mark Zuckerberg posted on his account a message that would spell Facebook’s major plan for 2018. According to the post, Facebook wants to make “... sure the time we all spend on Facebook is time well spent.” This idea will result in a more streamlined news feed, thus cutting down on media, business, and public posts and allowing for more personal content from close family and friends. Zuckerberg says they expect users would spend less time on Facebook due to this change but they believe this is for the good of the community and their business in the long run. On a later post, Zuckerberg says that Facebook will be making a series of updates regarding their initiative to streamline newsfeeds. The first step they took is to prioritize local news content on users’ newsfeed. The idea sprung from people telling Zuckerberg that they want more local news on their feeds. Facebook hopes to build a stronger community online and offline by exposing its users to more of its local news, thus increasing their community awareness. Facebook will start with the US and will continue to expand to more countries this year. The widely used messaging app will also undergo some changes this year. Due to its popularity, stickers, emojis, and gifs will continue with the addition of new features emphasizing visual messaging for better interaction among users. Messenger will also push the idea of making the messaging app a platform for customer service for businesses. Due to its convenience for both businesses and customers, Messenger serves as the preferred method for consumers to reach businesses and vice versa according to a study by Nielson. As a result, Messenger will add advanced features and improve its messaging experiences for all businesses for a seamless and valuable customer engagement. This initiative helps Messenger transform into a business communication platform. 2017 saw the cultural and financial revival of Microsoft under new CEO Satya Nadella. As they continue to hold down their footing in the tech industry under a new leadership, what will 2018 hold for Microsoft? After two Windows 10 updates last year, we are expecting another two upgrades for the OS. The first update is expected around March to June, during Spring time. The update might contain major improvements to Windows, Timeline, and Sets. Last November, Microsoft released Xbox One X leaping ahead of Sony and introducing a new version of a gaming console. However, no new games suitable for the console was ever introduced upon its release. As such, gamers will see new game releases for the Xbox One X, such as the Sea of Thieves released on March 20. Microsoft will update the Office applications which will be released during the second half this year, while previews will ship mid-2018. Office 2019 includes the usual applications with the addition of servers such as Skype for Business and Exchange. Some new features include new and improved inking features, new formulas and charts for Excel and visual animation for PowerPoint. The update focuses on usability, IT manageability, and voice and security for server updates. Earlier this year Microsoft joined ID2020, a nonprofit public-private partnership spreading awareness on the challenges faced by people living without identification. Using the technology, Microsoft aims to provide a legal form of identification for 1.1 billion people worldwide. The result is a prototype using Microsoft’s Azure and Accenture’s blockchain. It uses a fingerprint or iris scan to create and secure a legal ID. The ID can be accessed on a smartphone app for assistance at border crossings or access to basic services such as healthcare. The goal now is to spread this technology starting with refugees. Microsoft uses advanced technology to help millions of lives with no IDs. Know more ways technology can make a difference. IBM will start the year with reassigning over 30,000 workers and cutting down on 10,000 positions. With a workforce of 20% onshore staff, 20% nearshore staff, and 60% offshore staff, IBM aims to reduce employee costs and improve the bottom line. Despite working with a smaller staff, what are some of the big plans IBM has this year? Why did IBM choose to hire more than half offshore staff? Read the benefits of IT outsourcing. Early December last year, IBM launched the first line of its Power9 machines called “Newell” Power AC922, also previously known as “Witherspoon”, with two Power9 processors having up to 1TB of memory per socket using industry standard 64GB DDR4 RDIMM memory sticks. According to reports, IBM will also ship 128GB memory sticks in the second quarter of the year. This upgrade should boost Newell/Witherspoon’s memory capacity to 2TB per socket. Newell aims for data analytics, HPC simulation and modeling, and machine learning workloads. The question now is: what will this growing Chinese tech firm do next? In a video conference last November 2017, Tencent announced their plans for the year 2018. One big part of their plan is to expand into media content while consolidating their product technology capacity. This includes diverse high quality and star-studded television programs, and reality shows to appeal more to the youth. Tencent also plans on producing more content-driven documentaries and investing in production such as BBC’s Blue Planet II. Aside from these, the giant tech brand also plans on expanding into children’s programs, comics, and animation, fashion and live music streaming. An example of this initiative is Tencent’s recent partnership with Lego. The partnership would create licensed videos, games, and other content for Chinese children. The partnership also includes showing Lego videos on Tencent’s platform and co-developing the Chinese version of Lego Life, a social networking platform. The unveiling of the first releases from the partnership might take place later this year. In the same conference, Tencent introduced six marketing cooperation scenarios associated with Tencent IP content. Two of these scenarios are based on the large paying members of Tencent video. Tencent also presented how video ads can help advertisers to identify user profiles and consumption habits, finding target customers and sending relevant content to target customers thus optimizing marketing resource allocation. With countless of releases and innovations Apple made last year, how will Apple continue its lineup this 2018? This 2018, Apple is rumored to unveil three iPhones. The first phone is said to be a follow-up to the iPhone X with the same 5.8-inch OLED display, design, and functions, but hopefully with a better battery. This is rumored to be accompanied by a 6.5-inch iPhone, which is something like an “iPhone X Plus.” Apple will also allegedly introduce a more affordable phone with a 6.1-inch iPhone with an LCD display, possibly called the iPhone 9. Prices might start at around $700. Lastly, plans for a new version of an iPhone SE might include a new design and color options and a new processor. Overall, Apple is planning to further improve its functions and address issues encountered with previous models. For one, Apple is set to improve the back camera for its 2018 lineup. The phone brand also hopes to lower price ranges making it more affordable to midrange and low-end markets. Consumers can only know for sure until official announcements from Apple are released. Possible unveiling of the new iPhones may be some time around September 2018. After the successful launch of the iPad Pro, and 9.7-inch iPad in 2017, Apple will keep the ball rolling with more iPad releases this year. A new series of iPads are being prepared that might adopt designs and functions from the iPhone X such as slimmer bezels, face ID, and the absence of a home button. This new line of iPads will include a faster processor, but will still have an LED display due to budget and technical constraints. Apple might also develop an Apple Pencil but reports of new features are still undisclosed. This 2018, we might also be expecting low-cost iPads with a rumored price of $259 for the 9.7-inch 32GB model. The release of new versions of the iPad might be around March and/or September 2018. Due to the complaints received last 2016 with the MacBook Pro with TouchBar, Apple is expected to unveil a new user upgradeable Mac Pro with a USB-C Thunderbolt display. We might also see MacBook and MacBook Pro introduce 8th generation Kaby Lake Refresh chips, and possibly faster RAM and SSDs. As for the iMac, we might see an updated 21.5 and 27-inch machine with 8th-generation Coffee Lake chips from Intel. This upgrade is said to be 32% faster than its predecessors. Plans for major features and additions for the iOS 12 were unfortunately delayed until 2019 due to bug risks. An example of a supposed update was a redesigned home screen for iPhone, iPad, and CarPlay. Instead of these, iOS12 will focus more on security and performance addressing issues from previous updates. The unveiling of the iOS12 might take place on June during the Worldwide Developer Conference. Apple might release a possible 4th generation Apple Watch along with a redesign. Rumors say the new Apple Watch might use micro-LED displays which allows a thinner and lighter display. The addition of sensors is also possible. This year, we might finally see the AirPower, a wireless inductive charging mat designed to charge a handful of select Apple devices at the same time. AirPower will work with the iPhone X, iPhone 8 or iPhone 8 Plus, the AirPods, and the Apple Watch Series 3. However, there are no official announcements on the exact release date and price. Airpods will also have their first update since its release in late 2016. Improvements are rumored to have better microphones and battery life, improved sound quality, wireless charging using the AirPower. Samsung announced it’s targeting to sell 320 million smartphones this year according to a report from GizmoChina. This target is higher than their competitors Apple and Huawei with 200 million and 150 million phones sold per year, respectively. What does Samsung have in store for 2018 to be able to target such a big goal? Samsung is also set to launch their new line of S series, the Samsung Galaxy S9, coupled with a Samsung Galaxy 9 Plus. The new series officially revealed last February 25 just a month after the release of the Galaxy A8 series. The S9’s features offers the same display design and size as Galaxy S8, and a glass coating that repels water off the screen. It also showcases an upgraded 10nm innards, a tough chassis, a new camera with varying aperture, and the ability to capture in super slow motion with 960fps. Consumer release date has already launched this March 16. Before the S series, Samsung already began 2018 by releasing the Galaxy A8 and Galaxy A8 Plus. The new phone release reinvents the capacity and durability of mid-range phones. The two smartphone models feature design and battery life from the Galaxy S8 and S8 Plus, brand new chipsets (including a 6GB RAM for Galaxy A8 Plus), and dual front cameras giving an edge to the new Galaxy A series. However, despite being a mid-range phone, prices for the A8 and A8 Plus are a bit higher than its counterparts. Last September 2017, news surfaced of Samsung’s plan to release a foldable smartphone this 2018. This somewhat radical idea has been going around since Samsung showcased a flexible display in 2013. Although Samsung is aiming to release the foldable smartphone this year, they are still solving several issues. As of date, no news of its official launch has been announced, so we’ll just have to wait and see. Update: Samsung has recently confirmed that a Galaxy Note 9 is set to be released this year. Speculations say that this might be a "radical" smartphone due to its design. The display might feature a fingerprint scanner that was supposedly integrated with the S8 and S9 but ran out of time. This 2018 Samsung will continue to use and improve QLED for their TV displays. QLED allows for a wide range of brightness and saturation, but Samsung ran into its limitations last year in terms of black levels. Couple these limitations with QLED’s price tag and OLED’s popularity last year and it was a clear win for OLED. Samsung is now determined to turn the tables by improving its black levels and improving viewing angles, among other spec upgrades. But wait, there’s more. By the end of 2018, or possibly early 2019, Samsung plans to commercially bring Micro LED to the market, another first. Micro LED came from Samsung’s LED Cinema technology. This tech uses “modular LED panels pieced together to create a gigantic picture.” Downsize the big cinema screen to a 146-inch 4K TV and you have a display offering diverse picture quality and contrast. To accompany the large quality displays Samsung will put out this year, Samsung has recently revealed their new premium lifestyle soundbars. The NW700 Sound+ soundbar exceeds previous models and uses sound-enhancing features, such as wide range tweeters, distortion-cancelling, and multi-speaker control. The sleek and slim design makes the soundbars wall-mountable and visually appealing with Samsung’s TV line. Meanwhile, the N650 offers a panoramic sound experience using the Samsung Acoustic Beam. The speakers give an immersive experience with optimized sounds well-suited for gamers and movie enthusiasts. Samsung might also introduce a smart speaker in the first half of 2018. Entering an already competitive market, Samsung will focus on audio quality and managing connection among smart home appliances such as lights and locks. It will run on Samsung’s virtual assistant, Bixby, and synchronize with a range of Samsung devices such as the Galaxy smartphones and smart TVs. As of now, no official announcement of its launch has been made. Know more about the latest tech trends this 2018 and be on top of your game. Thinking of expanding your tech business this 2018? Let us help you. Learn how Cloud Employee works, see our Developer Pricing Guide, or talk to us. You can hire dedicated offshore developers with us across many technologies.
2019-04-22T14:12:32Z
https://cloudemployee.co.uk/blog/tech-news/what-to-expect-from-big-tech-brands-this-2018/
The FDA just approved the first GMO animal for human consumption – AquAdvantage Salmon. Those ideologically opposed to GMOs have predictably opposed this approval, and now are calling for labeling. Meanwhile some food outlets, like Costco, Trader Joe’s, Whole Foods, Safeway and Korger, have pledged not to sell the fish. Salmon evolved a growth pattern that fits their seasonal migrations and their overall life cycle. There are several species of salmon, some Atlantic, some Pacific, and some exclusively fresh water. Atlantic salmon are the most common in fish farms. From time to time courts are called upon to determine whether or not desperate patients have a right to experimental treatments. In the US we are also currently in the middle of the spread of “right to try” laws from state to state. The issue has recently come up in Brazil over patient access to an experimental cancer drug, phosphoethanolamine. This is an unfortunate issue, because over the last century experts have developed a thoughtful system that attempts to carefully balance patient autonomy, hope for very ill or terminally ill patients, patient safety, and the good of society. Now thoughtless legislators or misguided courts are attempting to bypass this system with predictably horrible results. However, on a superficial emotional level it is much easier to persuade people to bypass the system than respect it. First, most experimental drugs will eventually not work. They will either fail to produce a clinically relevant result, or they will cause more toxicity than benefit. Even drugs that are promising when studied in cell cultures or animals will often fail human trials. It has to be understood, then, that what we are talking about is giving patients access to drugs that probably won’t help them and may harm them. A new study published in PNAS explores the messaging of organizations commenting on climate change and their relationship to corporate funding. The sole author, Justin Farrell, finds that those organizations who received corporate funding were likely to network their messaging together, and to engage in a campaign of casting doubt on the scientific consensus. There was no such network among those organizations not receiving corporate funding. The publication of the report comes two weeks after New York prosecutors announced an investigation into whether Exxon Mobil misled the public and investors about the risks of climate change. The probe was prompted in part by reports in the Los Angeles Times and the online publication Inside Climate News, alleging that Exxon researchers expressed concerned about climate change from fossil fuel emissions decades ago, even as the company publicly raised doubts about whether climate-change was scientifically valid. This should come as no surprise to those following the climate change debate. Climate change and other issues, in fact, challenge the very notion of scientific consensus and what it means, but also demonstrate why we should listen to a robust consensus. The fact is, the disparity between mainstream and alternative advice has not changed much for the past 60+ years. There are even some elements that are literally centuries old – using “natural” as a marketing angle, for example. The alternative narrative is not based on reality, however. Fortunately we have records from the first half of the 20th century that document exactly what the scientific mainstream and alternative culture were saying. It is a good idea to frequently question your own narrative and check the actual facts. I sought to find some historical documents that would demonstrate what the medical mainstream were saying in the 1950s. Crowdfunding is an excellent application of social media and the web. Anyone with a great idea, who can sell their idea, can get funding from the public. You don’t necessarily need big investors. But of course, any tool or application that can be used for good can also be used for ill. Crowdfunding sites have been used to fund pure pseudoscience. A recently example was sent to me by a reader – Vitastiq. The campaign was 185% funded, for over $210,000. What the product claims to do is measure vitamin and mineral levels non-invasively by simply touching a small probe against a specific location on the skin. I was immediately skeptical of these claims – how can the blood level of vitamin B12, for example, be measured on the skin? Further, the probe just has a simple electrical conductor. At best it is measuring skin conductance, which can be used to measure sweat levels but not much else. A Chinese team of researchers recently announced that they attempted to edit the genes in human embryos with the genetic disease beta-thalassemia. They used the CRISPR-Cas9 technology, which they said was not successful enough in this application to be used. Some of the embryos resulted in mosaics, with only some of the cells being fixed, and other resulted in unwanted mutations. While the attempt to fix the genetic disease in embryos was unsuccessful, the announcement has prompted discussion over the ethics of gene editing in humans. First for some background, because I have not yet written about the CRISPR technology, this is an exciting gene-editing technology that allows for rapid, accurate, and inexpensive gene editing. In the last few years autonomous cars have seemed to turn a corner – suddenly the technology is here. This is one of those technologies that was long anticipated, and then quickly arrived. They are not yet in mass production, but it feels like we are on the steep part of the curve. Google car is the most in the news. The company has been testing their autonomous vehicle for years. Some use the term “driverless” but there still needs to be a human in the driver’s seat. The success of the vehicle is measured in how often the driver needs to intervene. At first they measured interventions per mile, and now they measure miles per intervention. The autonomous car is certain to be a transformative technology. I can’t see how it won’t. It will transform the way we get around, could spawn new industries, and may also transform our infrastructure. For example, imagine a fleet of truly driverless cars you can summon with an app, Uber-style. Insert your credit card, and you’re off. For some people this may obviate the need to own a car. Right now we are trying to adapt autonomous cars to our existing infrastructure. Eventually we will adapt our infrastructure to autonomous cars. At present the goal is to get the cars to drive more like humans. For example, recently a Google car was pulled over for driving too slowly. The algorithm called for the car to drive very cautiously (never more than 25 mph). This resulted in a back-up of traffic. Google now says they endeavor to make the cars drive more like people (at least in some ways). David Katz is a prominent proponent of integrative medicine. We in the science-based medicine (SBM) community have on several occasions over the last seven years critically addressed some of his claims, for the purpose of public intellectual discourse on topics of vital interest to the public, namely health care. When Katz has responded, he has typically done so by attacking a strawman rather than the actual SBM position. He has now done so again, in a transparent fashion. I suspect he is responding to our criticism of him from a couple of week ago. He has now written an article in the HuffPo in which he makes specific claims about SBM that are demonstrably false. When criticizing some one or group who advocates a position with which you disagree, it is critical to be fair, even charitable, to their position. At the very least you should endeavor to properly understand the position you are criticizing. Failing to do so falls somewhere on the spectrum from intellectually dishonest to lazy. Usually the pre-existing narrative holds sway and runs roughshod over the evidence, even when in plain sight. Katz in his recent article is responding to an article in JAMA that reviews 10 standard practices the authors believe are not supported by evidence and should be questioned. This is exactly the kind of process that we support at SBM – examining all practices from a science-based point of view. The first half of Katz’s article is also quite reasonable, and in fact is something that could easily be found on the pages of SBM. Katz repeats the common CAM (complementary and alternative medicine) fiction that lifestyle factors are unconventional. This is nonsense, easily debunked by simply looking at historical evidence. Scientific conventional medicine identified the relationship between specific lifestyle factors and disease risk. Lifestyle recommendations have been slowly phased into convention medicine as the evidence has come to light. Sure, this has happened slower than we would have liked – in general the medical profession is slow to adapt to the evidence. They come around eventually, but we do need to explore ways to make this process happen more quickly. In any case, CAM does not own lifestyle factors. They have simply appropriated them to have some legitimate footing to their entire endeavor. If evidence matters, it matters equitably, and universally. This has been a persistent theme of David Katz – accusing critics of CAM of having a double standard. The opposite is the truth. SBM specifically calls for one universal science-based standard of care. That is our very publicly and frequently stated position. It is the proponents of CAM who are explicitly calling for a double standard. Health care freedom laws are about creating a double standard for CAM therapies. The National Center for Complementary and Integrative Health is about creating a double standard for CAM research funding. Dr. Katz himself has called for “a more fluid concept of evidence” when considering CAM. What Katz is referring to here is not a double standard but simply considering scientific plausibility or prior probability. Katz has directly criticized the use of scientific plausibility in evaluating medical treatments. He is wrong, but at least here he is discussing the actual issue at hand. It is true that conventional medicine will often use a treatment because it seems plausible before there is adequate evidence to show that it actually works. That, more than anything, is the central criticism put forth by the evidence-based medicine movement. EBM specifically eliminates considerations of plausibility in order to avoid this error. SBM recognizes the problem but does not take that approach. Rather, we argue that treatments should be based on both scientific plausibility and rigorous clinical evidence. At the very least the clinical evidence needs to be put into the context of scientific plausibility. Another way to look at the difference between SBM and EBM is that EBM tends to follow more of a frequentist statistical approach (with its over-reliance on p-values) while we prefer more of a Bayesian approach. The latter begins with prior probability and then evaluates the effect that any new clinical evidence has on that probability. In this way SBM advocates looking at all the scientific evidence to come to one overall conclusion about the likelihood that a treatment has benefits in excess of risks. We advocate applying this standard to all of medicine. The link on SBM is not to SBM but to the recent article he wrote essentially calling us fools and fanatics (to which David Gorski and I responded two weeks ago). Prefacing his claim with “to the best of my knowledge” does not save Katz from criticism for making a blatantly untrue statement. He is saying that SBM is silent when it comes to criticism of mainstream medicine. I am not saying that Katz should be highly familiar with the thousands of articles we have published on SBM. But even a casual perusal shows this claim to be false. He could have also plugged something like “cancer screening” into the search window on SBM. He would have been greeted with 190 articles, most of which are discussing mainstream cancer screening practice. This was one of the actual topics of the JAMA article, and ironically David Gorski has addressed the very issue on SBM. We are actually quite open about our editorial policy. We focus on pseudoscience, unconventional treatments, and fringe claims for very good reasons. 1 – In establishing what the standard of science and evidence in medicine should be, it is useful to shine the light on the most egregious violators. 2 – The mainstream media does a generally poor job of reporting on fringe topics, falling for false balance, citing outliers as experts, and hyping sensational claims. We are filling a gap and correcting a great deal of bad science reporting. 3 – Understanding pseudscience is a specialty unto itself that requires specified knowledge. This knowledge is generally lacking in mainstream science and academia. That is our specialty, so of course we focus on it. 4 – Mainstream medicine already has an infrastructure of experts examining and commenting on practice and evidence. Our efforts there would largely be redundant. When we feel they aren’t, we comment. The core of SBM, however, is an examination of the nature of scientific and clinical evidence, and the relationship between that evidence and the practice of medicine. We feel we have a very solid position, and Katz has failed to criticize it in any meaningful way. Instead he and others attack predictable and rather tired straw men. In fact Katz’s entire article is just another iteration of the tu quoque logical fallacy common in CAM circles – trying to avoid criticism of CAM practice by saying that mainstream medicine has problems of its own. The cleanup will certainly not come courtesy of those calling themselves “science-based,” who live within its glass walls, tossing stones outward. They produce nothing more useful than shards of glass. This is a massive exercise in rewriting history and missing the point. SBM is, in fact, the solution to the problems he discusses. SBM is about being humble before the evidence. What I call “neuropsychological humility” is a major theme of scientific skepticism, of which SBM is a part. I and my colleagues have written many articles on SBM about how we need to increase the standard of evidence across the board. There are too many published false-positive studies, there is publication bias and citation bias, exploitation of researcher degrees of freedom, a problem with open-access journals, a reluctance to publish exact replications, a need for greater transparency, perhaps a rethinking of peer-review, and an overall problem of prematurely adopting new treatments with later reversals. These are all criticisms of mainstream medicine. To claim we do not address this issue is astounding. Even more astounding is the fact that within CAM all of these problems are exacerbated, by orders of magnitude. The problems with conventional medicine that Katz criticizes are far worse in the world of CAM. It is difficult to take him seriously about “cleaning house” in mainstream medicine while he is simultaneously trying to give a free pass to his “integrative medicine.” He decries a double standard, while trying to create one. He calls for humility, while CAM at its very core is based on the hubris that personal experience and wisdom trump scientific evidence. David Katz has his narrative – he believes in ancient wisdom and natural therapies, and would like for them to be integrated into mainstream medicine. The problem with this position is that there is no particular reason to suspect that ancient practices were based in reality, and there is no reason to think that the very vaguely defined “natural” is an advantageous property to have. Unsurprisingly, when actually subjected to rigorous clinical study, treatments that are not based on scientific plausibility but instead on romantic notions of ancient wisdom and benign nature, turn out to be largely worthless. They don’t work. Faced with this stark reality, proponents of integrative medicine have been doing a furious dance, trying to distract from the facts. They have attacked the messenger, and applied an impressive array of distractions and logical fallacies. Katz has become quite adept at this dance. His criticisms all miss the mark, and in some cases are factually incorrect. We could have a meaningful discussion of the optimal relationship between basic science, clinical science, and best medical practice. First, however, he would need to dispense with his obvious straw men positions, and acknowledge his factual errors. The British National Health Service (NHS) is considering blacklisting homeopathy prescriptions from general practitioners. While this would have an overall small effect on the homeopathy market, it is politically potentially very significant. The NHS currently spends about £4m on homeopathy each year, of which only £110,000 is from GP prescriptions. The rest is from homeopathic hospitals (yes, hospitals). The real market, however, is in over the counter homeopathic products. In the UK, Europe and the US homeopathy has ballooned into a multi-billion dollar industry. It is now potentially, it seems, the victim of its own success. When it was smaller it essentially flew under the radar – regulators and politicians didn’t think it was worth spending political capital to reign in a fringe treatment that people either wanted or did not know or care about. In the US the FDA specifically decided to let the homeopathic industry regulate itself, because it was simply too small for them to spend their resources on. That has now changed. A new video is making the rounds on social media making the incredible claim that you would have to eat five grocery store apples today to equal the nutrient density (not calories, but other nutrients) of a grocery store apple from 1936. The video makes a second claim, that the decrease in nutrient density is due to poor soil. The video is little more that pro-organic propaganda, and neither claim is sourced – because they are not true. However, the story of nutrient density of fruits and vegetables is a complex and interesting one. It is interesting to compare food plants from thousands of years ago (prior to any cultivation), 100 years ago, and today. First we need to ask – what are the differences? Then we can try to explain them. Recent studies of historical nutrient content data for fruits and vegetables spanning 50 to 70 years show apparent median declines of 5% to 40% or more in minerals, vitamins, and protein in groups of foods, especially in vegetables. So there does appear to be a real decline, although not the 80% across the board suggested by the pro-organic video. The declines are significant for vegetables, and less so in fruits (so apples was a poor example to use). Averaging out all the declines, you get about a 20% decline in nutrient density for produce.
2019-04-19T18:21:32Z
https://theness.com/neurologicablog/index.php/2015/11/
You probably do not often heard at the gas station proposal from the operators to refuel an improved brand of fuel, such as Mustang, Vip-power, Euro, EKTO, Euro diesel, etc., depending on the brand names of super brands of the same. You are told that though more expensive, for a much higher quality and more efficient this type of fuel, brochures and show a certificate confirming truth of words. And so, these diesel fuels are certified and have improved performance as opposed to conventional grades of fuel. But another question, are you sure that your tank is filled with this kind of fuel? Not will be the same every time you go to the examination to confirm this? There is a suspicious car owners who simply abandon these brands of fuel and in some ways they are right, because in four cases out of ten you get conventional gasoline or diesel instead of super high-quality, cost of fuel! Not claim that it happens at all stations, but unfortunately there are many. For even more analysis, hear from Brian Krzanich. Typically, blame for this directly head of a Petrol station or regional leadership. In the first case, the chief sells through its fuel stations, rather, a certain amount, giving it a brand mark, taking into his own pocket the difference (I hope You understand that by good volumes, the difference is decent). The question arises from the people who have had experience with work stations professionally, as it bypasses the control of the counters? Interesting question about it will be discussed slightly lower. . Luxurious fully equipped offices, ready to start working with receptionist and included telephone line for your calls from $181.818 + VAT per month. We have a basic infrastructure for the normal operation of any company, and give at the client’s disposal the tools to carry out the daily activities of a business a virtual office is a virtual space where you can develop activities similar to an Office. In other words, a place where developed professional tasks in order to provide a service to customers. Most government agencies and large companies within their websites offer services to their customers, suppliers and employees various utilities that replace or supplement the traditional channels of communication in the access to information and services. There are also service companies as a business center that offers virtual offices with the objective of minimizing the costs of structure of a multinational, small and medium enterprises, and entrepreneurs or self-employed. Thanks to the domiciliation of societies can reduce initial expenditure of a physical Office, which can often be costly. With the current progress of communications no longer need a physical space and the virtual office are the ideal choice for business of recent introduction in a specific territory. To make money in line is what much people this looking for and that they aspire to do it at some time. You even can be asking Exist legitimate ways to make money in Internet? By all means are that them, you do not have to hope and to even lose the time looking for the suitable site. When reading this article already you will know by where beginning. Before I was in the same situation, have fought and looking for different ways from how she could make fast money. Money and valuable time that I lost due to that search until get to me to ask In fact can be won in line money? It is why I am here, with desire of ayudarte, because I do not want that you undergo those miserable things that I experiment when as soon as she was beginning. Now, You really want to know the secret to be successful? Honestly, you would find different ways to make extra money through Internet and the majority of them is going to you to promise that you go to make fast money. But there is no such thing, is no easy money in this world. Everything what we do, it we must of have worked hard, with patience and determination. It will show a true business to you to make money. Global Domains International, a company in growth that is part of Fortune 500 is the answer to which these looking for. Since you know part the company, you can prove its services during 7 days. This it is the first easiest step and. You can see in Google the positive commentaries on the company. That delays to begin to make money by Internet? Original author and source of the article. Natural ventilation is a ventilation system, which does not contain any items of electrical equipment. The air moves in natural ventilation due to temperature difference, pressure difference air outside the room and the air inside it. All high-rise buildings ventilated by natural ventilation, which acts in them with the systems of vertical channels (or ducts) with bars in bathrooms and kitchens. All air ducts have access to the roof of the house, where they established a special attachment, called deflectors, whose task is to strengthen, due to wind, sucking air masses. Of fresh air through a slit located in the openings of windows, doors, or else through open vents. The work of natural ventilation depends on uncontrollable factors, man: t air, the direction and strength wind. Aside from these factors are often clogged ducts mud, debris, dust, and fresh air is greatly reduced when the flat plastic box set. Mechanical ventilation system used appliances and special equipment that allows you to move the air flows over long distances, if necessary, cleaning and fueling it. Such systems provide the required level of air and do not depend on external factors. However, their value is high enough, and maintenance costs translate into "tidy" sum. Quite often the use of so-called mixed (or combined), ventilation, when simultaneously using mechanical and natural. For example, in air ducts installed kitchens and bathrooms are small fans. Just apply "smart" fans, where is the place automation. Such fans are included in the job when the limit is increased humidity, the lights, etc. Forced ventilation in mixed schemes, improved by supply air valves that are installed in the glass, through which the Air enters from the street. They can contain sewage filter, to reduce noise levels and can regulate the amount of intake air into the room. Whatever it was, only an expert can detect more economical and efficient type of ventilation in each case. Forced ventilation systems ventilation, organize supply to the premises cleaned, fresh air, instead of being removed from them. Often, the supply air is subject to additional processing: cleaning, humidification, heating, etc. This processing is performed by special climatic equipment. Exhaust ventilation system ventilation intended for cleaning of contaminated waste or air flow from the premises. In general, the premises shall be established and inlet and exhaust ventilation system. Their work provides a well-coordinated balanced efficient performance of ventilation systems. And the exhaust and forced ventilation can be installed directly in the workplace (a local ventilation) or fully for the required premises (general exchange). Local ventilation is a matter of fact, local ventilation is called, which provides delivery (local exhaust) of air at a certain place, or it removes the (local exhaust) air pollution from it. The purpose of general ventilation general dilution ventilation, as air supply and exhaust – an organization of ventilation in general, or is it mostly. Such exhaust ventilation systems contribute to the uniform removal of air masses from the premises served, and air supply is fed evenly distribute the air and the volume of the room. Expansion coefficient of PVC profiles is large enough. In other words, this means that in very hot weather too plastic window expands, and Epiphany frosts too compressed. Indicators of sound insulation and heat transfer equal to the thickness profiles in PVC significantly lower than that of wood. PVC windows electrical charge and attract dust. Thus, plastic, offered in Russia, almost doubled its thickness, and added the glass windows, first clocked the second, and then a third circuit seal. And no end in sight. In countries that are comparable with Russia on climatic conditions, the spores' plastic-tree "has long been extinguished. Figures from the promotional materials of PVC manufacturers, convincing us that 55% of windows in Germany – Plastic very cunning. Indeed, 55% of German windows – plastic, but! 70% of the windows of residential premises in Germany are made of wood. And in cold Norway and Finland 70% of all windows – made of wood, and in Sweden – 76%. Naturally, the steady decline in the segment PVC windows market squeezes the plastic in Eastern Europe and Russia. Themselves as Europeans prefer linoleum flooring, cotton – synthetic, and wood windows – PVC and cadmium into the bargain. A wooden box, in addition to their amazing technological qualities inherent in the very nature of the material (low thermal conductivity, high insulation, resistance to temperature extremes, environmental friendliness, the unique ability to maintain moisture balance in the room, etc.) is also a "key" to the entire interior. Wooden box – condensed image of domestic warmth and coziness, the embodiment of perfection of style, it always is happy and sad together with the owners. Plastic silent, breathing tree. Plastic cools, heats the wood. It is ridiculous to argue the attractiveness of natural material, but too aggressive advertising of PVC windows. Let us, first of all, we state the subject matter. Thus, modern wooden box, as opposed to traditional joinery, has one leaf with glass. In recent years the market has a cheaper wood bleach 'League' is not inferior in properties and SAGUSU NEOMID 500. In the makeshift conditions, hydrogen peroxide is used as a 15-30% aqueous solution (for finely porous wood), oxalic acid as a 1.5-6% aqueous solution. After treatment of wood impregnated Sagus desirable to impregnate the wood preservative Neomid, KSD or Senezh. In terms of construction sites impregnation is carried out by means of atomizer, sprayers and spray guns of various systems. Wood treatment in remote areas using a brush. In our office we can give you detailed advice on Biosecurity wood – wooden houses of timber and logs, wooden log houses. League-League Bioschit Bioschit this long-acting antiseptic new generation. Antiseptic and bleach wood brand League Bioschit on for today's day one of the most efficient in its class. Impregnation of wood 'League-Bioschit' – a highly effective antiseptic impregnation of wood wide spectrum of action, which has a combination of, bactericidal and antiseptic properties Bioprotective. Impregnation 'League-Bioschit' intended for use as a universal antiseptic for immediate processing of any porous material. Certified home of penetrating 'League-BIOSCHIT'-includes bleach component water-based. Bleach wood-BIOSCHIT League – is designed to remove from the wood surface fungal diseases (blue, black and mold) that arise from improper storage and transport timber. Returns Wood Products of natural beauty. Treated wood gets practically in front of the form svezhespilennogo cut and can handle any staining and protective antiseptic preparation Fenilaks, Fenilaks In the traditional method used by the construction of log houses with logs natural moisture levels. As a rule, timber harvest in the winter, when it is less subject to shrinkage, rotting and warping. But all the same logs and wooden planks brevechatogo home is best to handle ognebiozaschitym composition. For example, an inexpensive composition Fenilaks. Ognebiozaschitny composition provides effective fire protection Fenilaks timber on first (slow-wood) or second (inflammable wood) group (depending on the flow), protection of wood against rot, mildew, stain and other bioporazheny. Dishwashers are used in restaurants and cafes are designed to sink large Number of dishes. For efficient operation of professional dishwashing machines of any type, it would be correct to use special detergent and rinse aid. The most common professional detergents for dishwashers use liquid chemicals with low foaming. Typically, detergent and rinse aid used for professional dishwashers are available in concentrated form. Connect them to the dishwashers through dispensers. This allows more accurate dosing of detergent, and also ruled out an aggressive contact with the skin detergent hands. Among the detergents for dishwashers can be found to contain chlorine, and without it. Online you can find cleaners for dishwashers machines are suitable for water hardness. The optimum temperature for the detergent in the region of 60-70 degrees, and rinse a little higher than 80 degrees. Use the correct temperature for cleaning – one of the conditions for obtaining a good result all professional cleaners come in concentrated form. Approximate consumption of detergent is 2-6 grams per liter of water, depending on the manufacturer. Rinse aid apply at the last stage washer. In their application crockery dries much faster and there are no stains upon drying. When using high-quality rinse dishes obtained without divorce, and Glass no need to rub to get the shine. Rinsing funds are usually released with no odor. Companies involved in the sale of professional detergents for dishwashers, often provide their customers and metering devices. The use of metering reduces consumption of detergent and reduces the cost of working solution. Installation and configuration of the metering device performs a service engineer. The use of household dishwashing machines for professional equipment to reduce the quality of cleaning and increase the cost of each car wash. Manifest the budgetary process if by means of the creation of form of popular participation in the elaboration process and accompaniment of the budgetary execution, the rendering of accounts and the disponibilizao of referring information to the public administration of ample, clear and objective form. The Federal Constitution of 1988 and the Law of Responsabilidade Fiscal (LRF), determine that the accounts of the administration, must be disponobilizadas for analysis of the citizens, which, will be able to question its legitimacy. With this it is considered that the information generated for the public accounting constitute basic element give to account to the society which had been the taken care of priorities referring the application of the resources, where they are being applied and which the true destination that the municipal management is giving to the resources public. The Law of Responsabilidade Fiscal (LRF), officially Complementary Law n 101, of 04 of May of 2000, imposes the control of the public expenses of States and Cities, conditioning the capacity of collection of tributes. This Law was created as measured to change the archaic system of public administration that promoted great workmanships in the end of the mandates and left the accounts for its successors. The Law of Fiscal Responsibility also promoted the transparency of the public administration, facilitating to the popular participation in the laboring of the budgets of the states and cities. The Law of the Transparency was added to its devices, Complementary Law n 131 of 27 of May of 2009, that it establishes norms of public finances directed toward the responsibilities in the fiscal management in order to determine the disponibilizao of information on the budgetary and financial execution of the Union, the Federal District and the Brazilian cities. One understands that through the creation of the Law of Fiscal responsibility and of the transparency law the Brazilian citizen had easiness in the access to the public accounts that before were exclusive of the managers and the involved actors in the administrative proceeding. It arrived at the conclusion of that the increase of the trick would justify a rise of only 7.3% in spread, almost the half of 13% applied by the banks. Throughout the five months searched for the Fiesp, the expenditures of the Brazilians with payment of interests had added R$ 152,6 billion, as the BC. In the accounts of the Fiesp, this expense must have been of R$ 144,3 billion. According to entity, about R$ 8,2 exceeding billion corresponds to the unjustified increases of spread. Differently of what they say the banks, the high FIESP considers that spreads (difference enters the tax of interests charged by the banks and the one that they pay to catch resources) effective in the Country is that they cause the insolvency, and not contrary it. The institution observes that the banks had increased spread because they are working with the perspective of that the insolvency goes to increase this year still more. ‘ ‘ It is a prophecy that if autorrealiza.’ ‘ Happily the government has defended public a sped up reduction of the Selic, as form to stimulate the Brazilian economy to cross world-wide the financial crisis of the best possible form. As much that president Luiz Incio Lula da Silva fired Antonio Francisco de Lima Grandson from the presidency of the Bank of Brazil, for cause exactly of the high taxes of interests and spread charged by the institution. The business is to wait to see which will be the position of the banks after the meeting of the COPOM of this week. Mine it bets is that the arm fall is only starting.
2019-04-20T21:06:07Z
http://www.icanadultliteracy.org/2016/07/
All Products Page | Carbon Controls Ltd. The AF-60 LP Drive is a compact but powerful and easy to use AC Drive. The drive is available in its standard configuration that includes built-in Brake chopper, Single-Turn Potentiometer for speed reference, and LCD display that can be remotely mounted. Models are available at 230 volt single-phase from 1/4 to 3 HP, 230 & 460V three phase from 1/3 to10 HP. The AF-600 FP Drive is a powerful, flexible and easy to use drive ideally suited for HVAC, compressor and pump applications. The drive is available in standard configuration that includes IP20 Chassis, LCD Keypad Display that can be remote mounted, DC Link Reactors built in, Modbus RTU and other features like motor auto tuning and energy saving mode. The AF-650 GP Drive is a powerful, flexible, and easy to use drive with many standard features. It is ideally suited for both Heavy Duty and Light Duty applications. Available ratings include: 208/230V from 1/2 to 50 HP, 460V from 1/2 to 1200HP, 575/690 from 1/2 to 1350HP. Analog Input Module (for DH1) - Ideal for Integrating Analog Inputs to the DH1 Base Unit Gateway. The OleumTech® Analog Input Module is designed for easily adding four high resolution analog inputs (24-bit ADC) to the DH1 Base Unit Wireless Gateway. Each input can be independently selected for either 0-10 V or 4-20 mA mode of operation. Analog Output Module (for DH1) - Ideal for Integrating Analog Outputs to the DH1 Base Unit Gateway. The OleumTech® Analog Output Module is designed for easily implementing four analog outputs to the DH1 Base Unit Wireless Gateway. Each input can be independently selected for either 1-5 VDC (3-wire) or 4-20 mA (2-wire) mode of operation. Measure flow through partially filled pipes, channels, canals and turnouts without a flume or weir. Ideal for wastewater, stormwater, effluent, industrial wastewater and irrigation water. Configuration is simple: enter the pipe diameter or channel shape and the AVFM 6.1 computes the flow volume and displays the flow rate. Measure forward and reverse flow and calibrate to channels of any shape. The BG2 Manual Fire Alarm Call Point has been designed for use in flammable atmospheres with harsh environmental conditions. The GRP enclosure is suitable for use offshore or onshore where light weight combined with a high level of corrosion resistance is required. DB16 speakers, intended for use in potentially explosive gas and dust atmospheres, have a power rating of up to 30 Watts and are suitable for use in the harsh environmental conditions found offshore and onshore. With an integral increased safety chamber, for termination, this unit offers both high output and easy installation. Replacement for the current DB3. For use in a wide range of temperatures from -55ºC to +70ºC, the Ex enclosure is manufactured from GRP with a rugged thermoplastic flare providing a corrosion free and aesthetically pleasing product. Capable of producing 125dB @ 1m and with a range of pre-recorded tones, the DB3B includes an integral volume control which is ideal when a lower output is required. Replacement for the DB4 with improved clarity and acoustic performance. Certified for use in a wide range of temperatures (from -55ºC to +70ºC) the Ex enclosure is manufactured from GRP with a rugged thermoplastic flare providing a corrosion free and lightweight product. The frequency response of the unit ensures that critical voice messages and general alarm tones are highly intelligible. Measure flow from outside a pipe. Designed for "difficult liquids" that would damage regular flow meters - wastewater, slurries, sludge, chemicals, viscous liquids and abrasives. There is no obstruction to flow and no pressure drop. The non-intrusive, clamp-on ultrasonic sensor fits any pipe 1/2" (12.5 mm) Inside Diameter or larger. The DFS5.1 Clamp-on Flow Sensor installs without cutting the pipe. The sensor continuously injects high frequency sound through the pipe wall and into the moving fluid where acoustic pulses are reflected back to the sensor from particles or bubbles in the fluid. The unit includes On and Off relay set-points and time delay options with LED bargraph for flowrate. The OleumTech® DH1 Base Unit Wireless Gateway plays an instrumental role in the OTC Sensor Network by wirelessly collecting critical process data from OTC nodes including Transmitters, I/O Modules, and other Gateways and storing the values in its 320-point Modbus register holding table. It also has the ability to generate output commands to onboard digital outputs. The DH1 is equipped with onboard I/O comprised of 4x analog inputs (0-5 VDC), 2x discrete inputs, and 2x discrete outputs. DH2 Wireless Gateway - Wireless Gateway with Serial Interface. The OleumTech® DH2 Wireless Gateway plays an instrumental role in the OTC Sensor Network by wirelessly collecting critical process data from OTC nodes including Transmitters, I/O Modules, and other Gateways and storing them in its 1920-point Modbus register holding table. It also has the ability to carry out output commands to mapped outputs points. DH3 Wireless Gateway - Highly Versatile Wireless Gateway with Ethernet and Serial Interface. The OleumTech® DH3 Wireless Gateway plays an instrumental role in the OTC Sensor Network by wirelessly collecting critical process data from OTC nodes including Transmitters, I/O Modules, and other Gateways and storing the values in its 1920-point Modbus register holding table. It also has the ability to carry out output commands to mapped outputs points. Digital I/O Module (for DH1) - Digital I/O Expansion Solution for the DH1 Base Unit Gateway. The OleumTech® Digital I/O Module is designed for easily expanding discrete inputs and outputs to the DH1 Base Unit Wireless Gateway. Each channel can be independently software-configured as input, counter, output, or pulsed output. The Module supports any mix of inputs and outputs. Simple solution for barscreen level control at wastewater treatment plants, headworks, pump stations and combined sewer systems. Install a sensor on each side of mechanical barscreen to continuously monitor, transmit and control level. Built in control relays or 4-20mA outputs automatically activate the barscreen rake at preset levels. Since 1948, GE has driven the development of Motor Control Centers, from the first plug-in combination starter to the first fully segregated units to contain fault damage. Evolution's 850A Vertical Bus, Snap-In Shelves, Plug-In Feeders to 600A, and Plug-In Starters to Size 5 provide customers with more flexibility to move buckets around and ad them in the future. EntelliGuard G breakers are the newest line of GE low-voltage circuit breakers, the next step in the evolution of a line known for its exceptional reliability and performance. They are available in 3- and 4-pole designs rated from 400A to 6000A, with fault interruption ratings up to 200kAIC. FHF Safety Products’ Ex-ResistTel has been developed specifically for the harsh environments found in the process industries – for on-shore chemical & petrochemical plants, off-shore platforms, in mills and in harbors. The telephone can handle large temp differences, exposure to sea water and dust, as well as heavy mechanical wear and tear. The ASTAT XT soft starter delivers reliable performance and smooth acceleration for a range of standard AC motors, from 8A-1400A and 230V-690V. By controlling motor acceleration and deceleration, it reduces mechanical wear and tear on motors. This is particularly true in such applications as pumps, fans, compressors and conveyors. From design through manufacture and delivery, GE commits its considerable resources to giving our panelboard customers the products they need, when they need them. All GE panelboards meet the latest revisions of the Electrical codes and standards. The HP Series: High Pressure Liquid Turbine Flow Meter offers all stainless steel precision machined components with CD4MCu and/or 416 stainless steel rotor. IO Max (MX1) - The Most Flexible, Self-Contained Multi-I/O Wireless Transmitter. IO MAX is one of many Wireless Transmitters that communicates with an OleumTech Wireless Gateway within its network, creating a highly scalable network, accommodating virtually any I/O requirement. The GE Limitamp motor control center provides an economical means of centralizing motor starters and related control equipment. It permits motor control starters, feeders, isolator switches, distribution transformers, and more devices to be obtained in a single floor-mounted structural assembly fed from a common enclosed main bus. The LIT25 continuously measures, displays, and transmits level in tanks and lagoons, or anywhere you require a level sensor. Includes a non-contacting ultrasonic sensor which is rated Intrinsically safe, a compact watertight electronics/display enclosure, 4-20mA output, backlit LCD display, control relay and simple built-in menu/calibration system. Measures flow in open channels, partially filled and surcharged pipes using an ultrasonic sensor. It's designed for monitoring stormwater, sewage, industrial effluent, irrigation water and natural streams. The MantaRay displays and datalogs flow rate and total flow and connects to samplers, SCADA and telemetry systems. XSD Ultra is designed for optimized performance and longer life in tough industrial applications such as metal processing, plastic extrusion, winders, test stands, crane and hoist and material handling. Designed for scalar or vector drives, Exceeds MG1-31 standards with GEGARD2800 insulation system, Five-year Warranty. Monitor, display, totalize and datalog flow through any flume or weir. The automatic flow reporting system prepares and stores daily reports including total, minimum and maximum flow rates. The OCF5.0 has a 2 million data points and downloads to a USB flash drive. There are two control relays, an isolated 4-20mA output and optional IS barriers. The PD663 is a rugged, explosion-proof NEMA 4X loop-powered meter perfect for applications where a simple, inexpensive display is required in a hazardous area. Power is derived soley from the 4-20 mA loop meaning that there is no need for additional wiring or batteries that need to be changed. The ProtEX-RTP PD6830 Explosion-Proof Rate/Totalizer brings modern design, easy readability, and enhanced functionality to hazardous areas in a way never seen before. The PD6830 meter has a display that provides the important information about the process, can be seen under various lighting conditions, from wide angles, and from a distance. The PH1 is a double action pull handle call point designed for use in Class 1 and Zone 1/Div 1 areas. The large "Lift" and "Pull" GRP handles can be operated effortlessly whilst wearing industrial gloves and require double action to alarm, preventing accidental activation. The PH1 operates in the harshest environments with a temp rating of -50 to +70 deg Celsius. Pneumatic horns are used wherever extremely loud signals are required and there is no power supply available. One possible application is in railway track construction to warn personnel of approaching trains. Since the signal has to travel long distances, the maximum volume of the PH 1 pneumatic horn of approximately 135 dB(A) is needed here. Designed to not only meet the most stringent Life Safety requirements, but also provide you with industry-leading intelligible voice communications for Wide-Area Mass Notification. Can be integrated with your existing audio source, providing a simple upgrade path to expand emergency communications coverage to outdoor areas. Not only was GE first to market with vacuum interrupter technology, we invented it. And, with an installed base of 125,000 units, Power/Vac continues to bring you high quality, low maintenance and long life. Power/Vac switchgear incorporates the compartment concept with grounded metal barriers so that no live parts are exposed. Designed for pump stations, wet wells and tank level control, the Greyline PSL5.0 includes 6 control relays for pump control, alternation, level alarms, dialers or fault alarms. It features a non-contacting ultrasonic level sensor plus redundant sensing with connection of any 4-20mA level sensor. The PSL5.0 automatically stores relay run time reports for pump performance. Recommended for fluids like water, glycol, oil and most chemicals the PTFM1.0 ultrasonic transducers strap-on the outside of pipes from 1/2" to 48" in diameter to provide accurate flow measurement. Calibration is easy with the onscreen menu system, just enter the pipe diameter, wall thickness and pipe material. Battery Operated and includes case. FHF Safety Products’ ResistTel IP2 Industrial VOIP telephone has been developed specifically for harsh environments where there is large temperature differences, high humidity, exposure to sea water and dust. SIP for Industrial SIP Phones or H323 protocol included, Fully configurable through any internet browser or the on-board display, POE or external. The world’s only industrial telephone with a stainless steel keypad that has passed UL’s stringent Type 4x salt spray test (100 psi / 7 bar) on the housing and the keypad. Robust glass fiber reinforced polymer housing is resistant to acids, sea water, alkali, moisture and grease and requires no additional enclosure for its Type 4X / IP66 rating. RTD Transmitter (RT1 & RT2) - Highly Reliable, Accurate Wireless Temperature Sensor/Transmitter. RT1 & RT2 are ideal for monitoring air, gas, water, or liquid temperatures with high accuracy of ±0.1 °C. The RT1 direct mount version includes a 4-wire Platinum 100 ohm sensor where users can select the length ranging from 2 to 18 inches. It supports temperature ranging from -65 °F to 500 °F (-55 °C to 260 °C). SCADADroid is easily configured to use VPN to allow quick and easy remote communications. Once connected, the SCADADroid is accessible for viewing and collecting data remotely, such as on a SCADA system. Remote programming and troubleshooting of PLCs is also possible, potentially eliminating travel time for enhancements, diagnostics and correction of programming issues. On alarm condition the ScadaDroid can be set up to phone, text or email you notifications. The MCS8 Camera Station has been designed specifically for use within harsh & demanding environmental conditions. A vari-focal lens as standard, a variety of mounting brackets and wiper/washer tank options provides the capability for most demanding CCTV applications. Non-contacting flow monitoring specifically designed for limestone slurry, fly ash slurry, gypsum slurry and many others. The Sensor is mounted on the outside of the pipe so it is unaffected by abrasive slurries or harsh chemicals. There is no obstruction to flow and no pressure drop. The SLT5.0 continuously measures, displays, and transmits level in tanks and pumping stations, or monitors and totalizes Open Channel flow through any flume or weir. Includes a non-contacting ultrasonic sensor which is rated Intrinsically safe, 4-20mA output, backlit LCD display, control relays and many optional components like 2-million point datalogger. The SM87 PB Fire Alarm Call Points are designed for use in Class 1, Zone 1 and Class 1, Division 1 areas. A choice of either stainless steel or alloy makes the range suitable for either the offshore or onshore industries. Units have ULC approval for Fire Panels and are rated down to minus 50 degree Celsius. For flow surveys in open channels and partially filled pipes. The sealed ultrasonic sensor mounts on the bottom of the pipe or channel. Stingray operates on standard Alkaline D-cell batteries for up to four years. The built in 130,000 point datalogger stores level, velocity and temperature readings at programmable intervals. Logger software included. The TM Series features our same ruggedized, stainless steel construction with CD4MCu and/or 416 stainless steel rotors, line sizes from 3/8 inch through 10.0 inch to fit various application requirements. End connection is NPT threaded standard, however victaulic, flanged, or sanitary ends are available. Accurately measure the flow rate of relatively clean, non-aerated liquids like potable water, raw water, cooling water, de-ionized or reverse-osmosis water, oils and chemicals in full pipes. Ultrasonic transducers mount on the outside of a pipe without shutting down flow. Flow rate is displayed on the large, backlit display, along with total volume, signal strength, relay status, and other diagnostic values. The OleumTech® Wireless Analog Input Module is designed to monitor analog processes without trenching or running conduit and wiring for fast commissioning. This Module provides a quick and scalable solution for adding analog input points in any OTC Sensor Network. Wireless Analog Pressure (JP4) - Wireless Pressure Transmitter with 4 Pressure Sensor Inputs. The JP4 is designed for connecting up to four 0-5 VDC analog pressure sensors and providing high resolution 24-bit analog to digital conversion (ADC). The Transmitter provides up to 9.5 VDC to each analog output source. The Transmitter relies on power from a replaceable battery. The system is engineered to achieve maximum battery life, providing +10 years of life from a single battery. Wireless Analog/Discrete (AD1) - Wireless Pressure Gauge Transmitter with 3 Analog and 1 Discrete Inputs. The OleumTech® AD1 Wireless Pressure Gauge Transmitter is designed for connecting up to three 0-5 VDC pressure gauges or analog sensors, providing high resolution 24-bit analog to digital conversion (ADC). The Transmitter provides up to 9.5 VDC to each analog output source. The AD1 has the ability of calibrating zero and max points. It provides removable wiring terminal blocks in its junction box housing to facilitate the wiring process. The OleumTech® Wireless Digital I/O Module is designed to accommodate various input and output signal needs without permitting, trenching or running conduit for fast commissioning. This Module provides a quick and scalable solution for expanding digital I/O points in any OTC Sensor Network. The Digital I/O Module supports any mix of inputs and outputs with six digital channels that can be independently configure via BreeZ® Software. Wireless Discrete (DS1) -Fast Commissioning, Wireless Exception Reporting Solution. The OleumTech® Wireless Discrete Transmitter with local display features two discrete (digital) inputs for connecting to a dry contact or open-drain output/NPN source for notifying state changes. This input can be set for normally open or normally closed. The Transmitter can also report transition counts. The DS1 utilizes on-delay exception reporting method and users can set the debounce filter ranging from 20 ms to 2000 ms to control just when the state change occurs. Wireless Flow Totalizer (FT1) - Highly Accurate Self-Contained Wireless Flow Measurement Solution. The OleumTech® FT1 Wireless Flow Totalizer Transmitter is designed to work with virtually any third-party flow turbine meters for accumulating volume of liquid with high accuracy of ±0.01 %. Users have the ability to set the contract hour and set the flow rate to per second, minute, hour, or day. Users can also match the k factor and k factor units and display the volume output in barrels, liters, gallons, or cubic meters. Level Transmitters measure level by monitoring pressure at the bottom point of vented top mount tanks, deep wells, water towers, rivers, and lakes. The OleumTech® Resistive Transmitter and Level Sensor combination is the superlative wireless tank level monitoring solution. Provides the ability to monitor product, interface, and temperature levels using a single, high precision Resistive Tank Level Sensor. Offered in both flexible (PTFE) and rigid (316 SS) materials in various custom lengths. It is ideal for use with the OleumTech high level switches for spill prevention, or use with thief hatch switches to meet EPA methane regulatory requirements. The ultra-low-powered transmitter is powered by a replaceable battery pack that provides up to a 10-year life. The OleumTech® Wireless Multi-I/O Module is designed to solve various input and output signal challenges without trenching or running conduit and wiring for fast commissioning. This Module provides a quick and scalable solution for expanding digital I/O points in any OTC Sensor Network. This Multi-I/O Module is equipped with four high resolution analog inputs (24-bit ADC). Each input can be independently selected for either 0-10 V or 4-20 mA mode of operation. The WM Series: Liquid Wafer Style Turbine Flow Meter offers all stainless steel precision machined components with CD4MCu and/or 416 stainless steel rotors in line sizes from 3/8 inch through 8.0 inch. Wafer-style refers to meters that are installed between existing process piping flanges.
2019-04-22T18:01:33Z
http://carboncontrolsltd.com/products/fhf
posted October 05, 2011 by Terry Hart. This afternoon, the Supreme Court will hear oral arguments in Golan v. Holder. I previously wrote about the case here, which has bounced around between the District Court and the 10th Circuit several times over the past 10 years before landing here. Check out SCOTUSblog for links to each side’s briefs as well as the numerous amici briefs for both sides. Golan involves the constitutionality of the restoration provisions that were passed as part of the Uruguay Round Agreements Act of 1994 (URAA). 1Those provisions made up § 514 of URAA and are codified at 17 USC § 104A. Those provisions restored copyright protection to foreign works which were still protected in their source country but that had fallen into the public domain in the US prior to 1996 because of failure to comply with formalities (like lack of proper notice), because of lack of national eligibility, or because the work was a sound recording made before 1972. The Act excluded liability for any use of restored works prior to restoration, limited the remedies available for existing derivative works based on restored works. “Reliance parties” — parties which exploited the work before copyright restoration — could continue to exploit the work without liability unless the owner of the work serves a notice to enforce his rights. Whether the restoration provisions here stand or fall will have little effect beyond reliance parties like Golan and the other plaintiffs because of the limited scope of the law, but many who support Golan’s position are hoping to use a Supreme Court victory as a broader vehicle for affirming the values of the public domain in general and finally getting independent First Amendment review applied to copyright law to serve as a limitation on Congressional policy in that area — policy they often disagree with. The Supreme Court is presented with two questions. Do the restoration provisions of the URAA exceed Congress’s authority under the Copyright Clause? Or, does this law run afoul of the First Amendment? On the first question, Golan essentially is asking the Supreme Court to draw a line in the sand: once a work falls in the public domain, it stays there. It paints a picture of the history of copyright law as one showing an “unbroken respect for the integrity of the public domain”. Under this view, the URAA restoration provisions represent a departure from this history. Golan worries that if the Court doesn’t draw a line here, it would put everything in the public domain into question, as Congress would have no barrier to removing works from the public domain whenever it wishes anytime in the future. The US argues that much of Golan’s arguments are merely a restatement of Eldred’s failed assertion that the Copyright Clause embodies a quid pro quo between the public and authors. This assertion reads the preamble of the Copyright Clause — the “to promote the progress of science” language — as an independent limitation on Congressional authority. But, as the US points out, the Eldred Court rejected that interpretation and gave deference to Congress for crafting copyright legislation that best advances the goals of the preamble. The US also argues that restoration doesn’t violate the “limited times” limitation because it doesn’t extend the length of the term restored works are protected for, it only protects them for as long as they would have been protected but for their lack of adherence to pre-Berne Convention US copyright law. Golan agrees with the 10th Circuit’s review of copyright restoration as a content-neutral regulation but argues that it fails this review. It claims the free speech rights at stake are too important and the government’s interest — which Golan describes as conferring “windfalls directly on foreign authors in the hope that this may create later windfalls for U.S. authors” — is not even a “legitimate” interest, let alone an important one. What’s more, Golan alleges that Congress lacked substantial evidence that the URAA would actually advance this interest. Golan lastly argues that even if this was an important interest, Congress could have drafted the restoration provisions more narrowly to decrease their burden on free speech interests. The US argues the polar opposite: copyright restoration shouldn’t be subjected to further First Amendment review at all. It says the 10th Circuit misread Eldred’s statement about the First Amendment and the “traditional contours” of copyright protection as though the Court had created a new test for deciding when to apply independent First Amendment review to a copyright statute. Even if Eldred had created a “freestanding inquiry”, the URAA hadn’t altered the traditional contours of copyright protection. Uses of restored works would still be protected by copyright’s built-in free speech safeguards, the idea/expression dichotomy and fair use. The US concludes its argument by saying that even if further First Amendment scrutiny is required, copyright restoration is constitutional. It supports this conclusion with testimony and congressional hearings that shows it had a significant interest in passing this legislation, and the restoration provisions were only as broad as necessary to advance that interest. In many ways, Golan is a sequel to Eldred v. Ashcroft. Both cases were part of a series of challenges to copyright law changes in the mid-90s brought in part by Lawrence Lessig. Golan initially included a claim identical to Eldred — that the CTEA was unconstitutional. This claim was stayed when the Supreme Court granted cert and dismissed after its decision. 4Golan v. Ashcroft, 310 F.Supp. 2d 1215 (D. Colo. 2004). Now at the Supreme Court, Golan presents the same dual questions regarding the extent of Congress’s authority under the Copyright Clause and the First Amendment limitations on the exercise of that authority. In addition, the First Amendment issue in Golan relies heavily on the Court’s holding in Eldred. Finally, in Eldred, the plaintiffs had attempted to draw a parallel between the CTEA and the laws struck down in US v. Lopez and US v. Morrison. In those cases, the same Justices that would rule on Eldred had ruled that two recently-passed laws were outside Congress’s authority to regulate interstate commerce, an authority that before than had been steadily expanding to the point where it seemed unlimited. Eldred hoped to convince the Court that the CTEA was like those laws — an expansion of Congress’s authority under its copyright power that would continue indefinitely unless the Court places a constitutional limit on it. This argument, of course, failed, and Lessig — who had argued the case in front of the Court — publicly shouldered the blame for that failure. It will be interesting to see how Golan’s legal team approaches such a similar case with the lessons of Eldred, presumably, in mind. Hopefully we get to see the Court push both parties on the relevant history of copyright law, since it plays a starring role in the question of whether and how Congress’s copyright power is limited, and both parties present such different versions of that history. Interestingly, the DC Circuit of Appeals rejected strikingly similar arguments against the URAA’s restoration provisions in Luck’s Music Library v. Gonzales. 5407 F.3d 1262 (2005). It notably took the same view of the relevant copyright law history as the US argues here: the Copyright Act of 1790 and the wartime restoration acts placed public domain works under copyright protection, lending support to the constitutionality of such action. It will also be interesting to see if the Court asks about the then Solicitor General’s remark during oral arguments at Eldred about a “bright line” separating the constitutionality of extending existing copyright terms from granting protection after the term expired. Golan characterizes this remark in its brief as an acknowledgment by the US that it is prevented from restoring copyright to public domain works; the US responds that Golan misreads the remark — it was anything but a concession of a constitutional limitation. 1. ↑ Those provisions made up § 514 of URAA and are codified at 17 USC § 104A. 2. ↑ Golan v. Gonzales, 501 F.3d 1179 (2007). 4. ↑ Golan v. Ashcroft, 310 F.Supp. 2d 1215 (D. Colo. 2004). 5. ↑ 407 F.3d 1262 (2005). Pointless, but fun: So what’s everyone’s predictions? I think Section 514 will be upheld as constitutional under rational basis scrutiny only. Congress enacted it pursuant to its enumerated Article I power under the Copyright Clause. As long as it’s for a “limited time” and for a rational reason, it passes muster. The First Amendment argument is a loser–the “traditional contours” have not been changed and the internal safeguards are still in force. The government should win handily: 8-1 (Breyer dissenting). I mean 7-1. I think Justice Kagan is sitting this one out. The SCOTUS Blog should have links to the arguments later this afternoon. I seem to recall audio used to be linked, but when I visited the site yesterday I could not find such links. Perhaps someone can direct me to the correct location. Audio of arguments heard during the week is posted on the Supreme Court site on Fridays, so I assume since this is the first week of the term, no audio is available for any arguments yet. I see the other case from today is already available, so Golan should be available soon. “CHIEF JUSTICE ROBERTS: General, there is something at least at an intuitive level appealing about Mr. Falzone’s First Amendment argument. One day I can perform Shostakovich; Congress does something, the next day I can’t. Doesn’t that present a serious First Amendment problem? Apparently most commenting on this site feel the same way as Verrilli. Shame. “CHIEF JUSTICE ROBERTS: What about Jimmy Hendrix, right? He has a distinctive rendition of the national anthem, and all of a — assuming the national anthem is suddenly entitled to copyright protection that it wasn’t before, he can’t do that, right? CHIEF JUSTICE ROBERTS: So he is just out of luck? And that’s just one example of many, where you take existing works and you have a derivative work or something that is distinctive to you. So those people are just out of luck? If the national anthem were taken out of the public domain, does anyone here honestly believe that rendition of the ENTIRE work would somehow be ‘fair use’? Amazing how Verrilli uses a tautology to avoid the issue here. Even more amazing that many on this site don’t seem to intuitively grasp the argument that the Chief Justice himself admits is intuitive. I’m not making any kind of normative argument. I’m simply saying that, in light of Eldred, I think this is a valid exercise of Congress’s authority under the Copyright Clause. The Constitution says that Congress can secure to authors exclusive rights for limited times. That’s all Congress has done here. End of analysis. The First Amendment argument is intuitively pleasing, as I’m sure almost all arguments are on either side of any issue that’s reached the Court. But being intuitively pleasing doesn’t necessarily translate into winning the day. The government’s argument is intuitively pleasing as well, especially since it comports with the text of the Copyright Clause and the Court’s reasoning in Eldred. I understand that folks may not like this (and to some extent I agree with that), but I think that beef is with Congress. This is a policy issue, not a case where the Court needs to strike down a statute as unconstitutional. I’m curious then, how specifically would you answer the Chief Justice’s challenge here? Would you not agree that this poses a First Amendment problem to begin with? Or do you deny that? Is our ability to play music, read poetry aloud, perform Shakespeare all predicated on what Congress feels is the best policy for us? Should Congress have the ability to yank that right (privilege??) from us? Or are there more fundamental freedoms at stake here? If you don’t deny that First Amendment protections are at stake here, then is your position that foreign treaties should trump First Amendment protections? As I said, in this situation with this law, the First Amendment is not implicated. This is so because Congress is legislating pursuant to its Copyright Clause enumerated power–it’s securing to authors exclusive rights for limited times. Justin, I think both you and Justice Roberts are falling into a fallacy of your own making, which is due to ignoring context. You can most certainly perform Shostakovich and even “Umbrella” – if you so desire – provided you don’t do it in public. The protection offered by copyright extends to public performance only. It is not a “serious First Amendment problem”, because the issue is primarily one of money. To assume that lack of money to speak as you see fit (how about through the medium of cinema?) is a First Amendment violation would be silly. First, your claim that “The protection offered by copyright extends to public performance only” is simply wrong (as I would expect even Terry Hart would be willing to admit). It also prevents you from creating derivative works from it among other rights. If an orchestra went through a great deal of time, labor and expense to create its own recording of a Shostakovich work (perhaps even for sale), placing the underlying Shostakovich work back into the public domain after the fact deprives the orchestra author(s) of their own set of copyrights. Your claim that this is not a “serious First Amendment problem”, because the issue is primarily one of money defies logic. If I am able to publicly state ‘X’ due to my free speech rights (emphasis on the word “free” in this instance), and then the government suddenly comes along and says “for now on, you can no longer state ‘X’ in public without getting a ‘permission license’ first from a third party, that makes a mockery of the entire concept of free speech. The Supreme Court correctly struck down poll taxes which used to force people to pay for the ‘privilege’ of voting. That alone should inform you that such schemes can interfere with free speech and civil rights. If they did the same thing with Shakespeare and required you to pay to get a license in order to recite it in a park, would you still maintain that there is no First Amendment issue here? Only a ‘money’ issue which doesn’t impact free speech rights? (The fact that Shakespeare is a much older work and currently still in the public domain is irrelevant to the larger issue in play here – the concept that requiring paid licenses to perform, remix and create derivative works from underlying works that were once in the public domain strongly impacts free speech concerns.). What if the rights holder isn’t even interested in money and simply denies such rights altogether? I’m happy to fall into the same intuitive ‘fallacy’ that the Chief Justice apparently shares with me in this instance. If an orchestra went through a great deal of time, labor and expense to create its own recording of a Shostakovich work (perhaps even for sale), placing the underlying Shostakovich work back into the public domain after the fact deprives the orchestra author(s) of their own set of copyrights. Incorrect. The orchestra would have created a sound recording, which is entirely distinct from the underlying musical work. If the musical work was transferred to the public domain, it would not affect the orchestra’s copyright to its sound recording in any way. Actually, other than the fact he is long passed, Jimi would be able to play his rendition to his heart’s content. First, it is an instrumental, so Key is out of the picture. Second, the score was written in London about the 1760’s. Even though a “foreign work”, it is precluded from the reach of 104a since the rights in England lapsed a short while ago. 1. People (anyone, not just Jimi Hendrix) relying on public domain works to use their time, sweat and perhaps money to create derivative works from the underlying public domain and expecting to reap copyright protections from their work (which supporters of the current law apparently have no problems with denying them). 2. Relying on public domain works to engage in free speech activity (which may or may not be the basis of creating derivative works that would otherwise be available for copyright protections), and then suddenly waking up one day to find that this right has been yanked away from you by an act of Congress. It should be obvious to anyone that these are the real issues here. The Chief Justice used the Jimi Hendrix example off the top of his head to merely illustrate the larger points which remain valid. While closely analyzing the specific Hendrix example under current copyright laws makes for a good instance of trivia, it completely sidesteps and hides from the real debate here. Also D.H. – If you are so confident in a 7-1 decision with the government winning “handily”, do you have any thoughts as to why the Court granted cert in the first place? After all, there is no circuit split and the government’s position has been upheld on this question thus far. I think it means that at least four justices didn’t think applying Eldred resolved the issue. Hence the reason why I’d be willing to bet money that your 7-1 prediction will be wrong. Naturally at least four justices thought it was worth visiting. But the crux of my question was to get you to speculate on WHY they felt it was worth visiting – not to challenge you on basic trivia regarding the mechanics of the cert process. If Eldred controls in such a straightforward fashion here as you seem to think, don’t you find it odd that they would feel the need to reaffirm that decision so soon on an issue without a circuit split? With all do respect, you seem to be avoiding my challenge here. Well, the Tenth Circuit below held that Section 514 was subject to First Amendment scrutiny. Perhaps the Court took the case so they could reverse that holding, consistent with Eldred. If that is your honest speculation, then I can confirm that you are simply wrong in this instance. It is THAT holding that the Supreme Court granted review on, not the earlier 2007 decision. We can naturally continue to debate in good faith how the Supreme Court ought to rule on this issue. But as to the issue of your 7-1 vote prediction and your overly simplistic view of how the Supreme Court is likely to look at this issue, I’m ready to declare victory in this debate. You are clearly letting your ideological position on the underlying issue blind yourself to the complexities of the Court’s motivations (as well as preventing you from taking the strong arguments from Golan as seriously as they ought to be taken). I suspect most objective readers to this site will agree with me on that point when they look over our exchanges here. D.H. isn’t “simply wrong in this instance.” The SCt certified two questions here: whether 514 is constitutional under the Progress Clause and whether it violates the First Amendment. The first question was ruled on in the 2007 opinion at the 10th Circuit. The second would be reviewed de novo, so the SCt very much could decide to review using a different standard than intermediate scrutiny, or even decide, as in Eldred, that independent First Amendment review isn’t warranted. My bad, Justin. You’re right. I’ve read the decisions below and several of the briefs, but I was mixing it up there. We’ll see what happens. Thanks for sharing your thoughts.
2019-04-25T23:42:59Z
http://www.copyhype.com/2011/10/golan-v-holder-argument-preview/
Most of you will have used, or at least encountered, various "information criteria" when estimating a regression model, an ARIMA model, or a VAR model. These criteria provide us with a way of comparing alternative model specifications, and selecting between them. They're not test statistics. Rather, they're minus twice the maximized value of the underlying log-likelihood function, adjusted by a "penalty factor" that depends on the number of parameters being estimated. The more parameters, the more complicated is the model, and the greater the penalty factor. For a given level of "fit", a more parsimonious model is rewarded more than a more complex model. Changing the exact form of the penalty factor gives rise to a different information criterion. However, did you ever stop to ask "why are these called information criteria?" Did you realize that these criteria - which are, after all, statistics - have different properties when it comes to the probability that they will select the correct model specification? In this respect, they are typically biased, and some of them are even inconsistent. This sounds like something that's worth knowing more about! To begin with, let's consider the best known information criterion - Akaike's (1973) Information Criterion (AIC) - and use it to address the points raised above. Then we can look at various other common information criteria, and talk about their relative merits. Suppose that we are estimating a model with k unknown parameters. Let θ be the (k x 1) parameter vector, and let y be the (n x 1) vector of random observations drawn from the population distribution that has a density function, p(y | θ). Then, the likelihood function is just this joint data density, viewed not as a function of y, but as a function of θ, given the sample. That is, L(θ | y) = p(y | θ). AIC = -2l* + 2k . Some authors (packages) scale both of the terms in the AIC formula, by dividing each of them by the sample size, n. With this scaling, the name AICk is sometimes used. Obviously, it won't matter whether you use AIC or AICk, as long as: (i) you adopt a fixed convention when comparing different values of the information criterion; (ii) you compute them using the same sample of data; and (iii) you use them only for ranking competing models, and not as cardinal measures. The "more likely" is the model, the smaller is AIC. The second term is the penalty factor. The more complex is the model, the bigger AIC will be. To use this criterion to select among alternative model specifications, we'd choose the model with the smallest AIC value. AICk = -2(-194.7502 / 31) + 2(4 / 31) = 12.75808. If you've been following carefully, you might wonder why I've used k = 3, rather than k = 4 to allow for the unknown variance, σ2, of the error term. In the case of a regression model, σ2 always has to be estimated, so EViews has the convention that this parameter isn't counted, and "k" refers to the number of parameters associated with the regressors. This is not a common convention, and you should always be very careful if you're comparing AIC values from different econometrics packages! Allowing for the fact that the reported p-values are for a two-sided alternative, all of the regressors are statistically significant, at least at the 10% level, and have the anticipated signs. However, the value of the DW statistic is still small enough to signal that the model's specification is suspect. Let's not go there right now, though. In this case, the AICk value is 12.83302, which is greater than that for the first model. So, if we were using this information criterion as the sole basis for model selection, the first model would be preferred. LRT = -2(l1* - l2*) = (AIC1 - AIC2) - 2(k1 - k2) . However, in general the distribution of this statistic is not known (even asymptotically), unless the two models are nested. In that case it's asymptotically chi-square distributed, if the restrictions defining the "nesting" are valid. We don't have this result to help us when we are comparing non-nested models. Before we proceed, it's worth emphasising once again that we're just ranking alternative model specifications here. We're not concerned with the raw values of the AIC statistics. These statistics can take any value, and can be of either sign, depending on the model and the data we're working with. Now, we know what the AIC statistic is, and how it's defined. However, why is it termed an "information criterion"? The word "information", here, refers to the Kullback and Leibler (1951) "information discrepancy" measure that's used in information theory. This theory was developed originally in the telecommunications literature, notably by the Nobel Laureate Shannon (1948). The last line of this path-breaking paper is a prophetic gem: "(To be continued.)" ! Now, in what sense is the AIC statistic an information criterion? Information discrepancy, as the name suggests, measures the difference in informational content. Here, that difference, or distance, is taken between the expected values of the random vector (say, Y) when (i) Y is determined by the true data-generating process (DGP); and (ii) Y is determined by some candidate model. Minimizing this distance, when considering several candidate models, gets us "close" to the true DGP. The only glitch with this idea is that the expectations of Y are generally unobservable. For instance, in the case of a standard linear regression model, E[Y] = Xβ, and β is unknown. So, these expectations need to be estimated. For a sample of size n, the information associated with Y is essentially given by the joint density function of its random elements. Viewed as a function of the parameters, this density is just the likelihood function. Not surprisingly, then, the AIC measure involves the log-likelihood function, evaluated at the estimated parameter values. Excellent discussions of the way in which the "penalty term" then enters the picture are given by Linhart and Zucchini (1986), and McQuarrie and Tsai (1998), for example. This is all well and good, but does the AIC statistic have any desirable properties? Being a statistic, it has a sampling distribution, and the latter can be used to address questions of the type: "Is AIC an unbiased or a consistent model-selection criterion?" Essentially, this comes down to considering situations where we have several competing models, one of which is the "true" DGP. We then ask if choosing the model that minimizes AIC will lead us to select the correct model "on average"; or at least with a probability that approaches one as n becomes infinitely large. Here's what we know about this aspect of AIC. First, it is an inconsistent model-selection criterion. Usually, inconsistency is seen as a fatal flaw when it comes to estimators or tests. Here, it is certainly not good news, but this result has to be tempered with the recognition that, in all likelihood, the set of competing models that we're considering won't include the "true" DGP. AIC is also a biased model-selection criterion. Several studies, including that of Hurvich and Tsai (1989), have shown that the use of AIC tends to lead to an "over-fitted" model. In the case of a regression model, this would mean the retention of too many regressors; and in the case of a time-series model it would mean selecting a lag length that is longer than is optimal. The problem of over-fitting has led several authors to suggest "corrected" AIC measures, such as the AICc measure proposed by Sugiura (1978) and Hurvich and Tsai (1989). AICc out-performs AIC in finite samples, in terms of reducing the tendency to over-fit the model, but in large samples its properties are the same as those of AIC itself. So, AICc is also an inconsistent model-selection criterion. Moving on, let's remember that information criteria have a "goodness-of-fit" component, based on a high log-likelihood value; and they have a "model complexity" factor, that penalizes according to the number of parameters being estimated. Parsimony is rewarded, ceteris paribus. The "corrected" AIC measure has been mentioned already. Some other commonly used information criteria are tabulated below, though the list is not exhaustive. * These two criteria were developed concurrently but independently, and are equivalent in terms of their properties. In contrast to AIC, the SIC (BIC) and HQ measures are consistent model-selection criteria. The SIC/BIC criteria were each derived from a Bayesian perspective, and include a much stronger penalty for over-fitting the model than does AIC. The probability of over-fitting when using AIC decreases as n increases. The probability of over-fitting when using AICc increases as n increases. The probabilities of over-fitting when using SIC/BIC or HQ decreases as n increases, and decreases faster for SIC/BIC than for the HQ criterion. Some general points are worth keeping in mind. First, if you're comparing information criteria values from different econometrics packages and/or different authors, be sure that you know what definitions have been used. For instance, does the package really report AIC, or is it in fact reporting AICc? Has the complete maximized log-likelihood function been used in the construction of the information criterion, or have constant terms, such as ones involving (2π) been :dropped"? This won't matter if you're comparing values from the same package, but it may be crucially important if you're comparing values from different packages! Second, be careful not to compare the values of information criteria in situations where they're not really comparable. For instance, if you have two regression models that are estimated using the same sample of data, but where one has a dependent variable of y and the other has a dependent variable of log(y), direct comparisons of the AIC values aren't meaningful. (The same is true of coefficients of determination, of course.) Often, this problem is easily resolved by transforming the likelihood function for one of the dependent variables into one that is consistent with the units of the other dependent variable. You just need to take into account the Jacobian of the transformation from one density function to the other. Examples of this, in the context of systems of Engel curves, are given by Giles and Hampton (1985), for instance. And, ..... a final comment. The acronym "AIC" is usually taken to mean "Akaike's Information Criterion". In fact, Hirotugu Akaike intended it to mean "An Information Criterion", as he mentions here! Postscript - while I was in the process of preparing this post, Rob Hynman posted a related piece on his Hyndsight blog.I urge you to read what he has to say on this topic. Akaike, H., 1973. Information theory and an extension of the maximum likelihood principle. In B. N. Petrov and F. Csaki (eds.), 2nd. International Symposium on Information Theory. Akademia Kiado, Budapest, 267-281. Akaike, H., 1978. A Bayesian analysis of the minimum AIC procedure. Annals of the Institute of Statistical Mathematics, 30, Part A, 9-14. Giles, D. E. A. and P. Hampton, 1985. An Engel curve analysis of household expenditure in New Zealand. Economic Record, 61, 450-462. Hannan, E. J. and B. G. Quinn, 1979. The determination of the order of an autoregression. Journal of the Royal Statistical Society, B, 41, 190-195. Hurvich, C. M. and C-L. Tsai, 1989. Regression and time series model selection in small samples. Biometrika, 76, 297-307. Linhart, H. and W. Zucchini, 1986. Model Selection. Wiley, New York. McQuarrie, A. D. R. and C-L. Tsai, 1998. Regression and Time Series Model Selection. World Scientific, Singapore. Schwarz, G., 1978. Estimating the dimension of a model. Annals of Statistics, 6, 461-464. Shannon, C. E., 1948. A mathematical theory of communication. Bell System Technical Journal, 27, 379-423. Sugiura, N., 1978. Further analysis of the data by Akaike's information criterion and the finite corrections. Communications in Statistics - Theory and Methods, 7, 13-26. you are getting lazy during your holidays. please note Canada is no longer a province of the USA. Professor, can you explain what you mean when you say a model selection criterion is "biased"? What does it mean "it selects the correct model on average"? I cannot relate the concept of estimation bias to this. Any reference would be very helpful. The term "biased" is used in various ways. Apart from it's usual meaning in estimation, we say a test is biased if, at any point in the parameter space its power falls below the assigned significance level. Thanks, Professor. But can you be more explicit about "selecting the correct model on average"? Suppose I do 1000 MC experiments, if it selects an underfitting model 50% of the time, and an overfitting model 50% of the time, does it mean the criterion is unbiased? Or if it selects the correct model 50% of the time, and an underfitting model and an overfitting model each 25% of the time, does it mean it is unbiased? Or if it selects the correct model 90% of the time, and an overfitting model 10% of the time, does it mean it is biased? Thanks, Professor, for the clarification. I think you should take a look at the McQuarrie and Tsai book, or the paper by Hurvich and Tsai. Thanks, Professor. The bias they (Hurvich and Tsai's biometrika paper) talked about is the bias in AIC as an estimator of the KL information. Are you saying that since AICC is an unbiased (or bias-corrected) estimator of the KL information, it will "select the correct model on average"? Thanks again and please feel free to ignore my reply if this is too trivial. AISc uses a bias-corrected estimator of the KL divergence, in the sense you say, but still not fully unbiased. YOu'll see that I say in the post that AICc reduces the tendency to over-fit the model (relative to AIC). It doesn't fully solve the problem. Thanks, Professor. But could you please give a mathematical definition of "selecting the correct model on average"? (For example, a criterion is (weakly) consistent if Pr(correct model is selected) converges to 1) If any of the reference has such a definition, could you please point me to it? I am genuinely not getting what it means and eager to learn its formal definition. Thank you again. Fair enough! Here is what we usually mean. For simplicity, suppose we are using a criterion that involves calculating and ranking the values a of a statistic, S, for two versions of the model, using the same random sample. Call these statistics (random variables) S and S2. Suppose, further, that the model-selection criterion is to select Model 1 if S1 < S2. Otherwise we select Model 2. If E[S1] < E[S2], for all values of the parameters of the models, we say that the model selection criterion is "unbiased". Note that, as with the concept of "unbiasedness" in the context of estimation or hypothesis testing, the concept involves the POPULATION expectations of the statistics we're using. In the econometrics literature, I believe Theil was the first to use this notion in the following context. Note that if we select between two models by maximizing adjusted R-squared (with the same sample), then this is equivalent to choosing the model with the smaller estimator of the error variance, si^2=(e'e)/(n-ki); for i = 1, 2. It's easy to show that if Model 1 is the correct model, then E[s1^2]<E[s2^2]. So, using this criterion we select the correct model "on average", and we say that this model-selection criterion is "unbiased". Maybe I should do a really short blog post on this. This is one of those jargons that you don't quite get unless you see the formal definitions. Anyway, it appears that, perhaps just like estimation unbiasedness, this unbiasedness is a rather weak standard. I don't know if this is why I haven't seen this being studied in recent literature at all (or maybe I haven't looked hard enough). οf new stuff right here! Best of lucκ for the next! As you point out, it's important to remember that AIC (like all other non-trivial information criteria) has its own sampling distribution. Among other things, this means that estimators associated with the selected model will *not* share the asymptotic risk properties of the selection criterion itself. Indeed, the post-selection estimator is a *randomly weighted average* of all the candidate estimators. Model selection certainly is a challenging econometric problem! "The probability of over-fitting when using AIC decreases as n increases. The probabilities of over-fitting when using SIC/BIC or HQ decreases as n increases, and decreases faster for SIC/BIC than for the HQ criterion." Is it not the other way round with the first two criteria? Isn't AICC consistent? No - it is correct as stated. I Say clearly, & correctly, in the post (3 paragraphs above the numbered table), that AICc is inconsistent. Is it something meaningful or wrong if one gets negative values for the information criteria like AIC, SIC/BIC or HQ? Raluca - no, not at all. They can be positive or negative, depending on the problem and the sample values.
2019-04-23T09:53:55Z
https://davegiles.blogspot.com/2013/07/information-criteria-unveiled.html
Interaction Design or Industrial Design:Interview with Freddy Anzures,Designer of Apple Computer Inc. W: Because you study industrial design, how do you like working in industrial design or interaction design? You like it or just do it after you graduated? M: So there are different types of designers, industrial design, graphic design, interaction design, you put a word and then say designers. My idea is that it should just be design. It shouldn’t be specialized. When I studied industrial design, it was making objects, and you interact with those objects. For instance, this cup, the interface of this cup is this handle, right? My hand is interfacing with this. M: It’s not a digital screen, but it’s about how can you be sensitive to how you are interacting with something else, whether it’s a product ,a computer, or a poster. I think design has to do with being sensitive to interacting with something else. Everything is interaction design. To answer the question of how did I get into interaction design from industrial design, I can talk a little bit about my history at first. When I was in Carnegie Mellon, I was in industrial design major. I got my degree in industrial design in 1999. After graduated, I didn’t want to do just industrial design for a job. W: That time was just after graduated? M: Yeah. I was very interested in working for either company or consultancy that had all types of design, like a multidisciplinary, interdisciplinary company. W: So you have this kind of thinking in your study? M: Yeah, in school. I had classmates just wanted to do cars, house wares, and this stuff. But I wanted to be involved in everything. It’s more fun because there is a possibility that everything is equal, or consistent. When I graduated in 1999, I worked at Frog design. W: For industrial design that time, right? M: Actually, no. I got hired into the digital media group. I had never done websites or digital media. So when you asked the question of how did I get into interaction design from industrial design, it really started when I graduated in 1999 and got a job at Frog in the digital media design group. So, the question is that how did that happen. The creative director from Frog design San Francisco, came to Carnegie Mellon to interview people. In 1999, I don’t know if it was going on in Beijing or China as much, but it was very big dot-com, and everybody was very busy doing e-commerce, websites, and kind of thing. W: Maybe a little later in China. M: Yeah. So, it was a very big push to get people to do that kind of work. Before I graduated, I had an internship by the Converse, a foot ware, or a shoe company. W: Converse, we call it Kuang Wei. M: Ok, yeah. So I interned there for six months. For the first three months I did shoe design, and then the last three months I ended up doing a brand design proposal for the company. In the first three month, Converse wasn’t doing so well. I felt that I was not benefitting in the company by doing shoes. Their real problem was that their branding wasn’t good. They were trying to compete with NIKE, who you know like for being performance brand, but Converse was like a historical, American, heritage brand. So after three month of designing shoes, I told my boss that I was an intern. I told the intern manager at the time “I don’t want to design shoes anymore, because this is not your problem. Your problem is with branding, so I want to take the last three months to do branding proposal for you.” He said “OK”, and basically told me to go into the archives of the company and see all of the advertisements since the company has started in 1908, so that I can understand the brand. At the end of the three months, I wrote a proposal and did a presentation of what I thought the logo and the brand should be in a big meeting room with all of these big executive people. One guy at the front of the table asked “So do you have a job after school?” I said “I still have one more year to go” I ended up taking one year off between my third and fourth year. Because I didn’t think I had enough experience in what I really know to do after graduating. OK, go back to presenting this brand thing. That guy said “Well, once you graduate, you have a job here.” And then, I asked my intern manager “who said that?” He said “That was the president of the company.” It was 1997, when I was only twenty one. After the internship, I went back to Carnegie Mellon for one year, and then finished it. When I went back, I won a nationwide house wares award. That’s a humidifier I redesigned in my third year. It was nice to win an award, but I still didn’t want to do industrial design. I wanted to do something different. When I graduated, Frog visited Carnegie Mellon. They were hiring for the digital media group, because a lot of that dot-com and that e-commerce stuff was going on. I was like “let me try that, because I have never done that before, and I like to challenge myself.” So I made a proposal, which is like “I’ll spend a year to learn digital media design at Frog, but after a year I would like to do projects that will use some of my industrial design skills.” Saying, I want to work on industrial design projects with digital media components, so products will screen on it. I wanted to do what was called conversion projects. The creative director was very impressed with my work, so he hired me. I went to San Francisco and worked at Frog for five years. M: Yeah, from 1999 to 2004, and throughout which, I worked on websites, products, and logos. It was fun. I did a lot of different types of concepts. W: What kind of design team? M: Though in Frog there were industrial design, digital media design, and graphic design group, and the first year I was in the digital media design group, but then I floated around. W: Is it popular there? M: It’s not very popular. So the story behind that is I was more interested in learning and exposing myself to new things. The creative director told me in a meeting “if you don’t pick up one group, you are not going to move up and get promoted. There is no way to judge how good you are, because you are doing everything.” And I said “I don’t care !” I had chosen one group to stay, and contribute to every project. It was very smart of me to not align with one group out of my interest to do different things, vs being promoted if I was in one group. But after being at Frog for five years, we didn’t produce a lot of things, and a lot of it was very conceptual, and a lot of it was, er…you know, we work with these very small companies, and then they would run out of money, and they would not be made. M: Yeah, or even websites. Frog wasn’t making stuff as much when I was there. After I left Frog, the only thing produced was a children’s board game that I worked on. It’s just me and one engineer. So around the time we were working on that, I decided that, since it was very fun to do different types of projects, I really wanted to leave Frog, and after five years it was like “Ok, maybe it’s time for me to go.” I had a friend at Frog, whose classmate worked at APPLE in the industrial design group. At that time, I was also a DJ. Every month we would have party at a bar, and invite our friends, and everybody in San Francisco who was a designer. With us were Google, Frog, and Ideal. W: But more young designers. M: Yeah. So what happened was I started ending up meeting people at Apple through these DJ nights, and it was a lot nicer to meet people through that because, Apple is really the type of place where you have to kind of get along. There are a lot of people that are very skilled. But if you can’t have good personality, you are not gonna go through it. It’s probably better, if you have somebody who is not as skilled that can feel like work with them, they will probably hire them more than somebody who has a bad personality that has a lot of skill. W: It’s really interesting, because basically we think in Apple you should just have ideas. M: Well, it also depends on if you can get along with other person. I know that because now I work at Apple. We see a lot of portfolios, and we see a lot of very skilled people. It’s better if we feel like we can work with you, and you are not as skilled, because you can learn that skill. I met a friend who was in the human interface group through this party, and I was talking to him. I said “I’m thinking about leaving Frog.” And he told me “we are looking for people in our group.” But I never had done interface design at all. I never did icons, none of that. He was like “you should talk to my manager. I think you might have a very good chance because of the way you think and the fact we get along. Just the way you think, you could learn all of the skills while you are on the job.” And then, I really wanted to leave Frog, so I said “Ok, let me just talk to Apple.” And at the time Apple was doing very well. M: The product at that time was out like the 17-inch PowerBook, the first one, the white iPod with the touch controls and the red light. So what happened was I ended up talking to the manager at Apple in the human interface group. I didn’t even have an Apple computer. So it was like “Ok, we’ll give you a computer to use, so you can look at OS X.” I never really thought of working on operating system or anything like that. He was asking me “I think we should take you for an interview at Cupertino.” You don’t talk to twenty people, like it’s very rigorous interview. And he just was asking me “Is there something you want to do? Let me know, I’ll try it.” We scheduled an interview for Cupertino. I went there, taking my portfolio with me, which showing my working on a lot of stuff for Hewlett-Packard, mostly industrial design stuff at Frog. There was a study at Frog we are looking at the power buttons on our products and trying to come up with design language. W: Ok, kind of interface. M: Yeah, but ID interface. So I brought that stuff, and also the board game, because I feel it is kind of interface too. M: Yeah. The vice president of software development interviewed me. It just so happened that his daughter’s favorite game is the one that I did. W: Oh, really? So it sells very well in the United States, right? M: Yeah. So since I already had a friend in the team, it went well and it was funny. I remember before I was leaving from the interview, one of the guys said some top secret stuff, and then my friend was like “Hey, Freddy doesn’t work here yet.” And then I knew that it must be very comfortable for them to say this. So I thought “good.” But also I was very scared because I never done this kind of work before. Then I got hired, and left Frog. February 23rd, 2004 was my first day at Apple. And they told me “Since you are coming from industrial design background, we have a project that we would want you to be working on.” It was the orange calculator in Dashboard. It makes sense for me. It was kind of a nice transition from what I used to do in industrial design, to industrial design for screen. M: It’s not a physical thing, but it looks like a physical thing. It was my first project at Apple. It was me and another colleague of mine. What happened was when that was released, a lot of those widgets were able to translate over to the phone, the cell phone. If you really look at the phone, like the weather widget on iPhone, it’s very similar to the one in Dashboard. M: a lot of the foundation for the iPhone is really based on the things we did in dashboard. now working on iPhone, and working on OS X, the same kind of thing I think about industrial design, is materials, plastic, or whatever metal,all could be drawn on a software. And sometimes I like looking at real things and seeing how would I draw this in 2D. W: So you use iPhone right now, as part of work. M: Yeah, sure. Like here, this looks like a real product. Somebody, typically in a company where the interaction designers and the industrial designers don’t work together, doesn’t think about how to integrate. What I did was I’m integrating it into the entire product. If you look here, it’s like the screen, and this is one thing, but typically interaction designer would look them separate, and it would look like there is a calculator inside the product. The interesting thing about that is that you can do this kind of stuff. It still looks like one product, and it’s like a hardware software integration. You could make these buttons out of plastic, and you could also make a calculator that looks like this, but this is just pixels. Even if you look at the way that, see, how is it like the process, and it really looks like it’s pushing down, but all that is a shadow. W: You think it’s still industrial design? M: I really do. I think this is the evolution of industrial design. W: Ok, there comes my question! Because, in China, there are many interaction designers from industrial design background, the same as you. So the connection is just like you mentioned, you can combine software and hardware together? M: Yeah. Industrial designers use a lot of 3D programs. If you just take the front shot of a 3D model, that’s a widget. It’s using the same tools. It’s just that the result is not a real thing. It’s a software thing. It’s a different result, but it’s the same kind of thinking that goes into it. W: Yes, the design thinking, actually the same, in graphic design. M: Yeah, everything. I do a lot of flyers, posters, and logos, and so on, just like the record sleeves I made as a DJ and stuff like that. If you understand how to subdivide a space, a page, you can use that to subdivide everything on the iPhone, and the OS X, or a poster. It’s all like kind of gridded out, if you understand that principle of the grid and subdividing things, that’s information poster, industrial design. And it’s like one of the things that goes across every discipline, and I feel like a real designer should know that because it translates across everything. W: Because you talked about your DJ, I mean, when you do interaction design, do you think about sound? Because I think there is a connection. M: I think the sound is not thought of as much as it should. Interaction design relies a lot on sound now. When I worked on this, see that clicking sound? That sound, gives you just enough feedback to know that you are pressing it even though it’s not a real physical thing. W: Not only is a feedback, it’s kind of memory, I like that. M: Yeah, because you hear that kind of pattern. I think interaction design will rely more on sound. W: Why you think that people didn’t use sound much? M: I think sound is kind of the last thing people think about in design, because it’s not taught. If there was a sound design course, that would be great, to incorporate that in the curriculum so that people are aware that you have to think about that, especially with like touch screens and stuff like that. W: You didn’t have sound design in Carnegie Mellon? M: No. I feel like part of my talk is going to be about how important to have interest outside of design. No one talks about that. Every time you go to a conference, it’s like “Oh, yeah, the design discipline should be talking together, we should have more interdisciplinary dialogue.” But it’s just talking. I would love to see a presentation where somebody is talking about something completely outside design, and see how it influences my mind. It’s very important for design to continue to involve, and it’s important for everyone to not be afraid to infuse their own interest in it, otherwise you will just have kind of robots doing, the same thing. One thing I also want to express in this talk is that it’s very important from a culture’s perspective to see how you can incorporate things in your upbringing into the design process. Because typically, design is thought as a very European discipline, but I’m very interested in what is the Chinese way, or, I’m Pilipino, what is the Pilipino way, and how do you incorporate. It’s just being proud where you are coming from. And no one really talks about that. W: Since you talked about the team skills, what do you think is the most important for designers to work in a team? I asked this question because I always hear about that you must be a good team player in a team. M: It depends on the project. Sometimes a project can be only really done by one person. The iPhone, it can’t be done by one person. It’s I think twelve to fifteen, or something. One thing you risk having too many people is that there isn’t a pure vision. If it’s like a big project with a lot of different components, then the group I think it’s very important that each individual person on the team feel like they have ownership of something and also the ability to critique everyone else. I think that’s the best way to work, because you don’t want to feel like you are not responsible for something, and you don’t want to feel like you can’t have any input on somebody else. W: true, especially in a team. M: It also depends on how much control you want to have on something. For instance, you are working in a team, and there may be some people on the team that are more reactive, who need to take direction from someone, vs, if you have a team where everybody is proactive, and they need to have their own thing. It also depends on being sensitive to the personalities of the team, because sometimes you may have a group of three people working on design project, and there is one person who is definitely the leader, and other two are, completely fine with being told what to do. Other times you may have personalities all the same, or sometimes all three are running around. It really depends on what the mix of people is. W: I hear about there is kind of a guidebook to make interface design, right? Like you must make it like Apple style, and how big it is and what color it is. M: Oh, yeah, there is a thing called The Human Interface Guidelines, which is used whenever we introduce a new platform, whether it’s iPhone or OS X. It gets written by somebody at Apple, they basically write a safeguard line, so that people who are developing applications for the computer or for the phone realize how to do it in an Apple style. W: So it is for engineers, not for designers, right? M: It’s mostly for engineers, and designers can benefit from it too. But the designers don’t really consider the guidelines as much. I mean we all know what they are, but that doesn’t constrain us from coming up with new things. W: Yeah, good point. Now many people are using iPhone already in Chinese mainland, so I think there are many people who really want to know what pushes you to make design system like iPhone like kind of innovation in how to use mobile phone. M: In general, I think Apple tries to come up with new things all the time. W: What do these ideas come from? The design center? M: Yeah, Apple kind of allowing designers to come up with the ideas. I think the designer’s role when it comes to new technology is not to make people afraid of it. The designer is really the spokesperson for everyday people, because new technology is made by engineers and very smart people, and sometimes those people want to see all the complicated switches, everything. They want to see “I can do that!” But you and me, we don’t need. So I think a designer’s role is how to really understand what are the most important things that people care about, and how do you simplify that complexity and maybe present it to everyone in a sequence that they can understand. One of the critiques I have of today’s talks is that it’s funny there were some talks that were very abstract and very complicated. W: I know, because I fall asleep too. M: Interaction design is supposed to take very complex things and make it simple for people to understand, but it is funny that you have people speaking about stuff that I don’t understand. So I felt a lot of the talks today were for the other speakers, you know, vs the students. W: Yeah, it’s for professors or researchers. M: It’s a lot easier to do a talk that is based on what you know, and how you know and how to say it. When I speak, I’m really trying to speak for the students, because I’m only ten years out away from where they are. W: Yeah, since you have talked about you didn’t care about being promoted. M: Yeah, I would just care about what I was interested in and how I could do things that I liked, because I wanna be spending my life enjoying what I do. Playing by the rules is very easy. But I wanted to play by the rules in a way that also challenges me. I remember my last year of school I lived in a house with all graphic designers, and it was a very conscious decision for me to do that, because I wanted to be exposed to the way that they worked, which maybe will influence what I did. I want to be around people that are different. I think it’s that intent of wanting to learn more, or I always find it interesting to see is there a way you incorporate something in your work that is not the typical way, the stereotyped typical way. This talk I’m going to give on Sunday will show a lot of examples that aren’t design-related. M: No, outside of design. It’s about how I studied industrial design and how I ended up here. It’s very unlikely you would think how all that happened. At the time when I was going through it, there was never a path. You can only see a path when you look back. I didn’t know when I was in Carnegie Mellon that I was going to be working on iPhone, because there was no iPhone. And also I didn’t know I was going to be speaking in Beijing, based on interaction design, because I really don’t consider myself an interaction designer. W: Even now? What do you think you are? M: I’m just creative problem solver. I don’t even like to say designer in a way, because it already has too many loaded definitions. I think of it as solving problems creatively, and the result could be a poster, a product, or a website. I think if you call yourself an industrial designer, that automatically the result of what you are gonna be doing is an object, and I don’t like that constraint on myself, because I feel that it’s so boring to me. I like to challenge myself and see how can industrial design be graphic, how can you make a product graphic. You know in industrial design there is a saying that forms follow function? I feel like now with the iPhone, and things like that, it’s like forms follow information, because information is like the new function. W: Yeah, we used to say forms follow function, but here you use information. M: Yeah, so do you have a paper? I want to draw something. So there are a lot of physical objects that do that forms follow information, exemplify that statement. So there is a Dutch company, they made this. It’s a calendar, but they had each side flat, and on this part, it’s like clock face, but there is no numbers, and so here it would say like Tokyo on one side, and maybe, another country, Philippines or whatever, but the way it works is that if you take the object and place it on a flat, the one that is showing at the top, and you look there that’s the time. You see, and so you are turning it, it’s an object, but you are getting information. I like that. See that’s a clever way to show information by your interacting with it in a physical way. The project was to create a world clock, and the result is an object that you turn. Those are kind of things I like, when somebody has created something but it’s inspired by something that you wouldn’t think it’s from. W: I think that is why iPhone is combing those. M: That’s why I like. I can’t talk about any Apple secrets, but I’m showing this. I’m glad you get that. You know the wheels of time? I worked on that. Anything that looks like a product, so that wheels is kind of like I remember going to Las Vegas and seeing the jackpot, and I ‘wow, that could be a great idea for changing numbers.’ And then, I mocked it up and we did it, but who would think to look at that? W: But I like the one that changes. And it feels like you change it. W: I’ve heard that you were like handing around in the university. M: Yeah, I don’t get much sleep. We had a dinner in the first night. After the dinner, they all went to sleep. But I wanted to see where and who I’m going to do this talk for. I don’t want to be the type of person that flies all the way out here just to read my thing and go home. I wanted to feel like what it feels like to be a student here, what they would want. Why would I want to give a talk that has nothing to do with where I am or who I’m giving it to? I like hanging out with students more than other speakers. W: I found it, even in that buffet. M: Yeah. I like being invited to these conferences, but I don’t like hanging out with the other speakers. I feel like I’m more of a benefit to students. W: Ok, do you think iPhone is more to young people? M: I would say that younger people are more willing to embrace new stuff. I think that you can make new technology not scary to people. For instance, that calculator is like you’ve seen that before. But I’m using a touch screen, so another thing I want to talk about is how you can use technology, but it’s your translating the familiar. That’s what it is, like the WACOM tablet. W: You use the pen, drawing. M: Yeah, it’s like how do you translate something that is very natural in a digital way. I think it’s designer’s role to retain that natural way of doing it, because if you don’t, that’s gone, especially for generations now who don’t draw. If grid and subdividing is across, drawing is also across everything, because you need to know how to communicate your ideas very quickly to other people, and then at the end you go into Photoshop, or whatever. W: Forget about the conference, but what do you think about China, about Beijing, about this University? M: I have a lot of thoughts about China. I am very curious about how the culture influences the creativity here, because my feeling is that they don’t let you do a lot of things here. W: You already have this feeling in two days? M: Yeah, there are a lot of things that are shut out for people. And you know there are two ways that people can react: one could be vey like not creative, or two they could be more creative. So I’m very curious as to how that is affecting, because I can keep doing this talk and say “Oh yeah, do whatever you want!” But maybe it’s not possible. I feel like I’m very curious about how that sensibility in the government and the culture here may affect the way that creativity is in design school. And I don’t know if that has to do with me just being overly sensitive about stuff, but I think that’s the only way to really design and come up with things, to really understand like who is it for and where are you. Like this talk, if I were to do this talk somewhere else like in Germany, it would be very different I think. So it’s very specialized here. I want to remember the moment of doing it, like “Oh yeah, I added this part to my talk because it was more important to talk about that in China.” And I would only know that based on spending time with the students, and being here, and seeing like what’s going on. And I think that kind of sensibility creates better things. It’s not about just making money, this stuff. W: Maybe tomorrow you can just hang around in the city; there are many you can see. M: Yeah. Maybe in tomorrow night, hang out in the city and see stuff. Yesterday, I went to the Forbidden City and Tiananmen Square. That was fun. I learned a lot. There is a lot history here. There seems to be a lot of constraints in what you can think about here, and I’m curious about how that affects creativity, but I’m also curious about how history is such an important part of culture. And maybe, I’m just making a guess, it may be more challenging to do something more futuristic, because of so much history. When I see Tiananmen Square, and then I see National Theater next to each other, I feel it’s cool. It’s like a reaction against that in a way. W: Yeah, someone think that. Do you like the theater? W: I think that’s partly because of the culture, we have this kind of students not speaking to the teacher. And I think the education here is a little problem. Thank you so much today!
2019-04-21T19:04:05Z
http://en.izhsh.com.cn/articles/10/70.html
The writing is distinctive; the execution masterful. Kensuke’s Kingdom is a thrilling adventure story from exceptional children’s writer Michael Morpurgo. Michael, his parents and their faithful dog Stella set sail around the world in their yacht the Peggy Sue. Michael has never been so happy and then disaster strikes when he and his dog are swept overboard and find themselves stranded on an island where he discovers Kensuke, a former Japanese soldier and obstinate old man. Seemingly determined to thwart any attempt Michael makes to be rescued yet, unswerving in his generosity, sharing precious food and water and watching over him. Michael soon looks on Kensuke as both saviour and captor. It is not until both boy and man begin to understand one another and a bond of trust builds. Having lost his own family in the war Kensuke realises he must do all he can to help Michael find his own family even though he desperately wants to keep his island secret from the outside world he has turned his back on. This poignant tale of trust and mutual respect is a thrilling and emotive story, written in the first person narrative giving the reader a sense of a true story being related to them. The final page of the book reinforcing this effect beautifully. The characters of Michael and Kensuke’s characters are as far removed from each other as is possible but it is this contrast that engages the reader and adds such interest to the story. Morpurgo’s style of writing is distinctive and his execution of a storyline masterful leaving you able to relax and simply enjoy a cracking good read. This book really kept my interest throughout the whole story. Friendship and trust was the key point of the story. So amazing! Best books i have ever read!!! Just the best book ever! My teacher finished reading this book with this and our class doesnt really read books aand so it blew us away. I guess the only thing I can say for improvement is writing more books since i have ready all of Michael Morpergo's books and currently doing a Book review at school for the book. I highly recommed everyone young or old to read this book as it has alot of cliffhangers and upside downs throughout the story. I love this book. Great description. Dramatised in parts where needed and extremely upsetting and worrying sometimes. Michael seems real- his story seems real and this is why this book is one of my favourites. Michael Morpurgo is extremely talented and knows how to please his readers. This book is honestly the best and my favourite character is Kensuke. I would rate it 10/10 and recommend it for everyone. At first I didn’t want to read it but now I’m all over the book. I really love it, it’s one of my favourite books I would give it 10 out of 10! This book is great, most parts are fun to read however some parts are a bit boring. I was reading it as a class reader in Y6. Its a really good book. Some parts can be boring but is very fun to read. This book is amazing. I am in year 5 we are reading this book, I don't agree with the people that don't like this book. I've only read some of the book but so far I think it is fabulous in my point of view so all the people who dislike this is a weirdo and very very very stupid. I love this book.... it is a mix of emotions. It is emotional, funny and historical fiction. This book is amazing..... you must read this book. Love this book. It is good for all ages. I like reading his books, they are really effective and are very exciting. They are especially good for reading them in class at primary school or high school. Best book ever!!! I read this book in class and its the best book ever. It's so sad though. PS Spoiler alert for anyone that hasn't read it: Michael gets stung all over by a white jellyfish. Love the book it's so awesome that's why I'm rating 10 stars. It is very good and you should read it today. Exciting and fun book. I like reading Kensuke's sentences. I read it in class! I read it in class. This book is for all ages, everyone should read it. One of my favourite books! Brilliant!!! One of the best books ever! Brought me to tears at the end. Very emotional book for me. Wonderful book. It's an amazing book, so interesting. Never read any book better. One of my favourite books of all time!! Really descriptive btw! NEVER READ A BOOK BETTER!!!!!! I enjoyed reading this book so much. I loved it! It is an amazing!!!!!!!!!!!!!!!!!!! book. Sad at the end but worth reading. It was my class novel. When I read it I loved the adventure and as a class we loved it more than any other book. When I read this book in my class I really enjoyed it. It was really interesting and exciting, there were a lot of good pictures and I enjoyed the book. Thank you for writting such a great book. Really good book and amazing. I love it ,one of the best books I have ever read!!! Loved it. It is really good! It is an amazing book and my best part is when Michael arrived on the island. I read this book in school and it was amazing. I recommend this book to anyone who like happy endings and "Peter Pan". I give this book ten stars because It Is very interesting. It Is a very good book. I think this book is amazing and should be no one in series though like some of these people I have to do a 4 page book review on it! A very good book if u want to bring your child in touch with human emotions. My 10yr old daughter and I both cried. It's a fantastic story. Don't miss it. I think this is a really good book and I love when we read it in class. It is a bit sad though. I would definitely recommend this book, but I now have to write a two page review on it. BORING!!!!!! I really liked it because there is suspense and adventure! Love Michael Mopurgo's books! I recommend it to everyone! The book is very awesome. I love it. So much high vocabulary. I would recommend to read it. So cool! Interesting. I have read this book in my school library. It is so amazing. I think this book is very predictable and uncreative. I think they made Kensuke’s backstory sad just for the sake of being sad. Also Mike is just an average ordinary kid, nothing interesting about him, and I might as well read a story about paint drying. And I know you probably think this movie is a classic and it is, but only most likely for writing usage, but for me I like a good story to. I like the book because it is full of adventure. EBI you could make the story even longer. I loved the book and I wish i knew whether or not it's true???? Thanks for making this awesome book. ITZ A GREAT BOOK WELL DONE MICHAEL MORPURGO! BTW I JUST READ ADOLPHUS TIPS! It was really fun. I really enjoyed this book. I'm still reading the book but I really think it is a great book and I would recommend it. It is very good and I would recommend it to every one !!!!!!!! I am ten years old and I read this book in a day. It is sincerely beautiful and I would highly recommend it! I found this book really interesting and would recommend it 100%. I listened to it in school and I really enjoyed it. Now my homework today is to write a book review in my book! Wow just ... This is so so brilliant! I read this book in school and as homework. I had to make a review and this is the best example to help me and many other children. Breathtakingly beautiful. A book that must be on your Christmas wish list. I got this book in a library and it is so good and my rating is 10. I first read Kensuke's Kingdom in year 6 when we were writing our own fantasy stories. I was so intrigued in the book I could not wait until we had English so we could read the next chapter. I am now in year 7 and have read the book twice already. The first Michael Morpurgo book I read was Friend or Foe, I read it in year 4 and even though I was only nine I enjoyed it very much. I think Michael Morpurgo is an amazing author who writes amazing books. Fantastic. Interesting and fun book. Nearly my best book ever. Badly written, boring. Do not recommend. It is awesome. I like it very good hook and very interesting intrege scary. Really good book, made me into tears 100% recommend reading it! Literally, it's so amazing. It's an amazing book written by an inspiring writer. I purchased this book for my 13 year old grandson and decided to read it first. What a fantastic read!!! So far this summer, this has been my favorite book. I gave it to my grandson and can't wait to hear his opinion and to discuss this great book together! Amazing book, great job Michael. This is a very great book! I loved it so much! a MUST READ! It is just so cool. It's a great book guys. This is a good book ya´ll have to read it. As a writer-in-practice I thought of this book as really inspiring. I practically LOVE Kensuke's style of life and how he is calm and mature with his problem. This is very good for lessons and Michael is the most realistic writer ever. It's a confusing book I don't recommend for young people. This is the best book in the world I love it . I love this book, it's really touching and inspirational. Kensuke's Kingdom is based around the time of the 1980's. I would recommend anyone who likes suspense books to read this. If you enjoyed this book then I recommend you reading The Secret Garden By Frances Hodgson Burnett. The same again, it's a really touching inspirational book, based on a garden that has many wonders. I love this book so much. It's a brilliant book which has a great plot and really makes you think. It is full of excitement and suspense. It's full of action and problems which makes any book interesting. It was really good and nearly every one likes it. Kensuke's Kingdom is a brilliant book. It is the best book I have ever read. I really enjoy reading Micheal Morpurgo's books; he has such tasteful stories and they all seem so real, it's like they really happened. Amazing build up of the plot but very easy and poor language for smart students. I love the book but is it true? Amazing but I'm curious whether it's it real? I love reading this book. It is just amazing, Kensuke's Kingdom. I red this book for my book report for school. I love this book, the way I could not stop reading it because I wanted to now what would happen next! I really can remommend this book! This book is very good and it is the best as it is written by its author. GREAT book, read it twice and I sill want to read it again. It's a real page-turner. This is an awesome book. It is a must read for children. You even learn a lot of things from this book. Kensuke's Kingdom was an amazing book filled with adventure and also had small small parts which were sad. I loved it! Really good book, a real page turner. Epic book but I've got homework on it and it's hard. I found it great plus it was a Brobdingnagian book meaning big. I absolutely love this book! I couldn't put it down when I started it. I disagree about it taking a while to get into, I thought it was exciting from the very start. I'd like to know if it's true or not, as at the end of the book it refers to a letter from supposedly Kensuke's son. READ THIS BOOK!!!I absolutely love this book! I couldn't put it down when I started it. I disagree about it taking a while to get into, I thought it was exiting from the very start. I'd like to know if its true or not, as at the end of the book it refers to a letter from supposedly Kensukes son. READ THIS BOOK!!!!!!!!!!!! It was a mind blowing adventurous amazing story which kept on leaving mysteries and suspense which I merely enjoy and I hope you, yes you, the one with a cup of tea ;p I hope you guys understand the true meaning of this wonderful book! Kensukes Kingdom, let's give a round of applause (clap! clap!). It was amazing! It had a lot of excitement and was very nice. I like this book because it had a good story to it. The book is really good but what I want to know is if the book based on a true story? Was Kensuke real because at the end of the story it has a reverance from Kensuke's son and how he thought his father was dead. Kensuke's Kingdom was really awesome. Haven't finished yet but so far it is a cool book. I found it really interesting, in some bits I liked it because there were lots of cliff-hangers. I think the book is BORING because it was to slow to read it never got going. this book is amazing Iread it like a thousand times now!!!!!!!!!!!!!!!!!! It's so cool. I have it, how cool is that? Wow, amazing and brilliant. Cool. This book is amazing I read it last year and really enjoyed it . Then yesterday this girl in my class was talking about it and when I got home I was looking for it but couldn't find it ! So I went on my iPad and downloaded iBooks and but in Kensuke's Kingdom ......... But it came up with every other book but kensukes kingdom :( I am very sad wanted to read it again, great book. Michael is an 11 year old living in England with his mum dad and dog, when his dads work shuts down that had no choice but to move, his dad buys boat called the Peggy Sue. In a storm one night Michel and Stella (the dog) are washed off the boat in the cold, dark sea of the night. When he wakes up he finds that he's washed up on a deserted island. He spends the day exploring and looking for food and water, he curls up in a cave that night waiting to die but the next day finds food and water waiting for him. He then realises that he�s not alone. Over the next few weeks he learns about Kensuke the owner and only other human of the island, Kensuke tells the sad tale of how he was stranded on the island during the war and believes his wife and daughter to be dead. So begins a wonderful, heart-wrenching tale of friendship. This book will grip you from start to finish, and let you understand the true meaning of trust and friendship. Mopurgo captures the essence of human emotion which is deftly interwoven through every page. I found that although the language used is simple (the target audience being children) the read still manages to lock the reader to the book regardless of age. I would strongly recommend this powerful and epic tale to anyone who wants to experience a book full of adventure and curiosity. Wow! I just finished reading this book and I'm crying! So sad ending- but oh, so lovely friendship they built up... Great book! Well done, Michael! Also, that letter at the end made me think and stop- was it true or not? It wasn't, but I felt it was- fab! Boring. DON'T EVER READ THIS BOOK!!! I read it at school and I love it so much. Is it real? Did you get lost on a island? Please tell me! I was an amazing book and I would read it over and over again. So well done to you Michael. I think this is an amazing book, the way he writes it makes you feel like you are in the story. Must read this book!!!!!!! I love the story but I'm only half way through so far but it's really good. I don't know what happens at the end but I bet it's really good. Kensuke's Kingdom is an amazing book and I think it is an adventures book and should be read by pupils from the age 9 and up. It is a good book but even though it is hard to put down it is a hard book to get into. Its a great book I think it should be bought by different people from ages 10 and up. Kensuke's kingdom was a kid friendly book but also a bit boring at times. pointless book, waste of time reading it! DONT EVER READ THIS BOOK!!!!!!!!!!!!!!!! I liked this book, it was very good and Michael Murpurgo is a great author. Our class is reading this book and it's pretty good so far! Although the class are still on Chapter Four (Page 45), the book is far from boring! This is one of the greatest book's I have ever read! This Michael Morpurgo classic is highly recommended for children 10+. Absolutely marvellous! Our class read the book over the period of a few weeks, it blew us away!!! Very emotional and I am not surprised by it's excellent reviews and awards. This book is so touching and factinating. It is the best book I have ever read because it has cliff-hangers that hook you. I love the book. My teacher read the last part and I was crying!!! I am even getting the book even though I have read it!!!! I am excited to get the book!! I thought it was a breathtaking novel. Full of excitement and adventures. I bought this book thinking nothing of it but when I read it- I had a completely different aspect of it! I would recommend it to anyone! From about 9 years old and up. My Mum and my younger brother enjoyed it just as I did. Another great book from Michael Morpurgo. Upon reading Kensuke's Kingdom I found that although the language used is simple (the target audience primarily being children); the fast-paced read still manages to encapsulate the reader regardless of age. Throughout the novel, the reader is confronted with the strong sense of family that the novel, in its entirety, explores. At the start of the novel, we find that the main character Michael has a great life with his parents and the lovable family dog, Stella Artois. And the opening clearly and avidly describes the amazing sensation the family experiences when "on the water...we'd go skimming over the waves, exhilarating in the speed of it, in the sheer joy of it". In particular, use of the 1st person singular object deems to reinforce this ecstasy of emotion. However, this amazing picture is thrust into disarray as both parents are suddenly made redundant. All the fun Michael's family had now seems like a dream that never happened. Upon this realisation, Michael's father decides they should go around the world... in a yacht. As the reader we see the amazing sights and experiences from Michael's perspective as they travel around the world from England all the way to Australia. But one day, Michael is sent overboard by a tumultuous wave and he fears he will never survive; "The terrors came fast, one upon another. The lights of the Peggy Sue went away into the dark of the night, leaving me alone in the ocean, alone with the certainty that they were already too far away, that my cries for help could not possibly be heard. I thought then of the sharks cruising the black water beneath me - scenting me, already searching me out, homing in on me - and I knew there could be no hope. I would be eaten alive. Either that or I would drown slowly. Nothing could save me". Michael finds himself stranded on a desert island, and with no food or water believes it is the end. But as he wakes up every morning, there appears fresh food and water for him which he finds was set out by an elderly Japanese man, Kensuke. Despite hostility towards Michael, Kensuke saves him from the close clutches death by a swarm of jellyfish. For days and weeks, Kensuke slowly and tenderly nurses Michael back to health; often singing softly in Japanese to lull Michael to sleep. Thus begins a deeply moving bond between the characters. Michael fishes, paints, and plays football with Kensuke. We as the reader find the sad tale of how Kensuke was stranded on the island during the war and believes his wife and daughter to be dead. So begins a wonderful, heart-wrenching and poignant tale of friendship and of course, family. Michael eventually leaves the island leaves Kensuke and his kingdom, forever. I would strongly recommend this powerful and epic tale of to all to experience. It is a book that will grip you from start to finish, and enlighten you of the true meaning of trust and friendship. By far, Mopurgo captures the essence of human emotion which is deftly interwoven through every page. This book was OK I guess, but I wouldn't recommend it as a thriller or an un-put-downable book. It takes ages to get into and allthough it is sad it isn't really amazing! We have just finished reading this book in class. At first I thought it a little boring, but after a while I started savouring every minute we spent reading it - it was funny at times, suspending at times, and had amazing vocabulary. The ending left me devestated but I absolutely loved it. The first 80 pages are a bit boring but then you start to get into it! I loved. It was good, I really enjoyed reading it. I like this book because you don't expect what will hapen next! I love this book because the boy has a choice, but a very hard one because he has to chose between his loving family and his special friend. This is amazing!!! Breathtaking adventures, amazing, and I especially love that cute sheep-dog, Stella. I vote 10 out of 10 and this is the best book I have read (I've read about 100-150 books and this is the best. I hope they read this book in our class soon (we are currently reading Charlie and the Chocolate Factory by Roald Dahl). It is a great book of adventure. I truly recommend it. I love this book because it is adventerous and tells you what it feels like to stay on an island for so long. I think this is my favourite book. It's so tempting to see what happens next. Upon reading Kensuke’s Kingdom I found that although the language used is simple, (The target audience primarily being children); the fast-paced read still manages to encapsulate the reader regardless of age. Throughout the novel, the reader is confronted with the strong sense of family that the novel, in it’s entirety, explores. At the start of the novel, we find that the main character Michael has a great life with his parents and the lovable family dog, Stella Artois. And the opening clearly and avidly describes the amazing sensation the family experiences when “on the water” “...we’d go skimming over the waves, exhilarating in the speed of it, in the sheer joy of it.” In particular, use of the 1st person singular object deems to reinforce this ecstasy of emotion. However, this amazing picture it thrust into disarray as both parents are suddenly made redundant. All the fun Michael’s family had now seems like a dream that never happened. Upon this realisation, Michael’s father decides they should go around the world... in a yacht. As the reader we see the amazing sites and experiences in Michael’s perspective as they travel around the world from England all the way to Australia. But one day, Michael is sent overboard by a tumultuous wave and he fears he will never survive; “The terrors came fast, one upon another. The lights of the Peggy Sue (the boat) went away into the dark of the night, leaving me alone in the ocean, alone with the certainty that they were already too far away, that my cries for help could not possibly be heard. I thought then of the sharks cruising the black water beneath me - scenting me, already searching me out, homing in on me - and I knew there could be no hope. I would be eaten alive. Either that or I would drown slowly. Nothing could save me.” Michael finds himself stranded on a desert island, and with no food or water believes it is the end. But as he wakes up every morning, there appears fresh food and water for him which he finds was set out by an elderly Japanese man, Kensuke. Despite hostility towards Michael, Kensuke saves him from the close clutches death by a swarm of Jellyfish. For days and weeks, Kensuke slowly and tenderly nurses Michael back to health; often singing softly in Japanese to lull Michael asleep. Thus begins a deeply moving bond between the characters. Michael fishes, paints, and plays football with Kensuke. We as the reader find the sad tale of how Kensuke was stranded on the island during the war and believed his wife and daughter to be dead. So begins a wonderful, heart-wrenching and poignant tale of friendship and of course, family. Michael eventually leaves the island leaving Kensuke and his Kingdom, forever. I would strongly recommend this powerful and epic tale of to all to experience. It is a book that will grip you from start to finish, and enlighten you of the true meaning of trust and friendship. By far, Mopurgo captures the essence of human emotion which is deftly interwoven through every page. This is a fantastic story that the year 5 children read as part of our lessons. Two children took the role of Kensuke and Michael in our hot seat. They were excellent at questions asked and could answer with confidence about how their feelings changed for each other. The children would really like to know if this brilliant book is based on a true story. This book is fantastic and so is are all of the other books Michael Mopurgo writes. I like Kensuke's Kingdom but I like one of his other books better than this, so that is why it is a 9 from me. It's a book that is full of mysteries which is why I like it. Our whole class is reading it and to me it's a great story. I think it was amazing, you would not be disappointed. READ IT!!!!!!!! We read this particular book in class. I loved it. It is so catchy and it draws you into the book. I don't think it's true, but that makes it better. SPOILER ALERT! SPOILER ALERT! SPOILER ALERT! THIS BOOK IS HIGHLY RECOMMENED TO U. 3 WORDS: DEVASTATING!!! BREATHTAKING!!! ") ") ") RECOMMENED!!! Very nice book, touching and breathtaking... adventurous, sad and fantastic! Keep it up Michael! It was a heartbreaking yet breathtaking story. It is full of adventure and mystery . I loved the book this is my first Michael Morpurgo book and I think he is a genius. I felt like I was witnessing the events as I was reading it. Even though I rate the book ten stars I wish I could rate it 30 stars! It is a fantastic story full of adventures and brilliance. When I was reading I could imagine the picture in my head, it was like I was in the story. I was really happy when the family was back together again, when I read the book I wanted to read on. It was sad when mum and dad lost their jobs but then they decided to sail around the world and many thing good things happened on the boat and many bad things happened but they all survived no matter what happened. It is a very funnily heartbreaking book which is packed with fascinating situations and solutions. This book is a book that most readers would love to read. The life of Kensuke was a quite an adventurous life. All the problems were quite predictable (not all of it so don't worry about it) but come-on, who wouldn�t think the main character of a story wouldn�t be rescued if they were stuck on an island. But overall it was probably the third best book I�ve ever read so far (you might want to make some more new books). This book is awseome. I loved it from start to end. It was an amazing adventure story which had its ups and downs. It had vocabulary which made my heart skip a beat! I wanted Kensuke to come with Michael but unfortunately he did not as he wanted to stay in the kingdom. I also loved the part when the letter came at the end of the book which leaves it as a cliffhanger. I wanted this book to never end because I loved it so much! I want Michael Morpurgo to write more books like this! While I was reading the part when Micheal fell off the Peggy Sue my eyes went wide open and I struggled to keep them down! I like his book, it's the best ever. I like Michael Morpurgo books because his book's are so good. WOW I think Michael Morpurgo is a sensational writer and I think I would definitely give this book 10/10. I think it had all the points a good story needed. A bit of tension and suspense, along with a bit of sadness but a happy ending. I don�t in any way think this book should have been improved. I think this book was moving because it was sad when Michael had to leave Kensuke, since they had become very good friends. It was also happy because Michael got to see his parents again. In addition it was funny because Kensuke�s English was so bad! I would recommend this book to anyone who just loves good reads because the language is a bit complicated but you can still understand what the author is trying to say. Michael Morpurgo is a fantastic author and I hope that he writes more books like Kensuke's Kingdom. I really believed that it was a true story. Hats off to Mr. Michael!! Michael Morpurgo, is a brilliant author, but sometimes a bit sad! Apart from that the amazing adventure of Kensuke and Michael in Kensukes Kingdom is a fabulous book about how Kensuke and Michael make there life work together on Kensukes very own island! It is exciting and funny and I loved it. I love this book! at first it was boring but I was very interested by the end. So sad. I think that Kensuke's Kingdom is good and cool! I love all of Micheal Morpurgo's books even though they are so sad but I really liked Kensuke's Kingdom. I love love love it! Amazing, is it true though? Love, love, love the book. Michael, YOU GENIUS, I love all of your books but this is A+M+A+Z+I+N+G! This book is so amazing and I am learning about it at school. So cool! The book is really good. It is a 10 out of 10 because everyone will like it. I thought it was great and it hooked me in. I would recommend it to any child but it is a bit sad but i still loved it. I found the book rather boring because the structure of it was not understandable and stopped me from understanding the principle of the book. I think it was a really good book. My favourite character was Stella because she was always confused and didn't know what was going on. I liked the book because Kensuke really changed his attitude towards Michael. My favourite part was when Michael got hurt and Kensuke was caring and kind to him. It was a very good. It had suspense at the end of every chapter which was a perfect example of a perfect author!! I think this book is fantastic. It is a great adventure and is the best book I've ever read so far. It was a very good and exciting book. In every chapter it would leave you in suspense. The best book I've ever read. It was a fantastic book (you know just like the colour of magic book). I usually like reading Geronimo Stilton books but now I am going to read books written by Michael Morpurgo because I really liked Kensuke's Kingdom. I really like this book so I am recommending it to everyone. My cousin hasn't read it so I am buying it her for her birthday which is soon - so happy birthday cuz! It is the best book I have ever read!!!! It was quite a good book although some of it was a bit unbelievable. Apart from that it's quite a good book, my favourite character is Stella Arois because she sounds cute. It is a great book and I think that you could not get bored of it. I'm a 39 year old woman who is very picky when it comes to books and for me to love this book, obviously it has to be amazing. Michael Murpurgo, you are a genuis. What a fanastic book you have written. I loved the book. My fave part was when Kensuke talked about his life. I loved the book, expecially when he met Kensuke. I loved it! It was one of the most touching books I've ever read, especially at the end when Michael left Kensuke. I suggest to everyone who hasn't read it to do so! I love the book! 10 stars! Full of trills and very exciting. My teacher loves Michael's books! We are doing a lot of work on his books. I thought it was a very intresting book. It is a fantastic book. It is the best book I've ever read. I love reading Kensuke's Kingdom and I was wondering if it was a true story? I love all the books Micheal Morpurgo wrote. The book that he wrote that I loved the best was Kensuke's Kingdom. It is full of adventure, amazement and thrills.I really don't know what else to say about this fantastic book!
2019-04-25T03:49:16Z
http://www.fantasybookreview.co.uk/Michael-Morpurgo/Kensukes-Kingdom.html
On May 1st, educators in North Carolina have called for a day of action. They have highlighted five main issues that they’d like to see addressed this budget cycle. As a parent, I will be marching with them. We are in the midst of a public education crisis and it is time to demand better. I could give you a page of statistics and bar graphs, but it feels no one reads those anymore. I can tell you from personal experience that my son is in crisis in an underfunded public school. He is on the autism spectrum. There is so much I can’t do to help him in his journey, but the one thing I can do is work to advocate for his teachers and his public school to get the support he needs. We can’t hide our heads in the sand, support means funding. We can’t can’t keep patching things over. Our roofs are literally leaking. Our children don’t have enough busses or drivers, Our children with life threatening health issues don’t have a nurse. Our children struggling with trauma don’t have a mental health professional in their school. Our children have lost thousands of vital TAs that assist with everything from classwork to our special needs kids. Our public schools are starving for funding. This is not just a problem. This is a crisis. To help my son and many like him, I’ve joined forces with educators and fellow advocates. We’ve knocked politely on the doors of our Senators and Representatives. We’ve been a part of lobby days, big and small. We’ve made formal appointments, or we’ve randomly shown up, and had conversations with our lawmakers in and out of the hallways of our General Assembly. We’ve been part of organizations, held demonstrations, and events. We’ve sent invitations to our lawmakers and officials. We’ve used social media, and engaged politicians on Twitter. We’ve rallied in summers and on weekends. We’ve been nice. We’ve been told to be patient. We’ve been told it takes baby steps. We’ve been told the budget is tight and we can’t do everything. We’ve seen band aids placed on top of bad policies. We’ve watched as even the baby step bills die in committee. We’ve experienced closed doors, unanswered emails and phone calls. We’ve gotten polite notes of thank you, but no. Mark Johnson tells us things will be better in 2030. We demand better for our children. We’re tired of baby steps to nowhere, We’re tired of a constrained budget manufactured by corporate interests. We’re’ tired of the lack of funding and bad policies. We’re tired of being told to wait. Our children can’t wait. Many children are in crisis in their public schools across the state at this very moment. Now is not the time to ask. Now is the time to demand. No more waiting. No more asking. No more starving our public schools. March with our educators as they demand better for our public schools. March with the bus drivers and staff to demand a living wage. March with librarians, nurses, counselors, and psychologists as they demand to expand their numbers. March with our retired teachers as they demand back retiree benefits and a decent cost of living increase. March with the community to demand health care for families and children. March with parents, but most of all march for all the kids in crisis across the state. March with me, march with your fists raised high. If you’re in the Cary area, join us on April 24th from 5pm -8pm at Jordan Lake Brewery for advocacy, information, and fellowship. A new initiative was just announced today from Mark Johnson and Senator Andy Wells, a Republican from Catawba County. The announcement essentially gives flexible state supply money directly to teachers instead of to districts. Each teacher will receive about $400 each to spend on classroom supplies according to the press conference. The most startling aspect is that no new money is coming from the state. We are just redistributing money. Senator Wells was quoted as saying “All too often local bureaucrats decided not to spend the money on school supplies” Districts once again are being painted as the bad guys who aren’t using state money properly. I’ve heard this song and dance before. It seems to be the sounding cry before bad policy is introduced. Districts use state and county buying contracts to purchase the big and basic supplies. These are things like paper, toner, and even toilet paper. Purchasers are trained and it is drilled into their heads that, “You are stewards of the state’s money.” With districts doing less of the buying I see a potential for money loss. Individual buying costs more. Any shopper at Costco knows the power of buying in bulk. Yesterday the Wake County School Board Superintendent released the budget. As it was presented we learned that half the budget request was due to state obligations and loss of budget flexibility. Loss of budget flexibility costs our districts money, and ultimately the tax payers. This new initiative takes more money from our strapped districts and confines it to a very specific purpose. Budgets need to be as flexible as possible. Districts never know when they might face an unexpected expense like rising utility costs or broken down buses. Loss of flexibility makes budgets for districts that much tighter and expect to feel it in your property taxes. Being a steward of the state’s money isn’t easy. I don’t think an app is the answer. Districts don’t move around supply money just for fun. They move money from one pot or another based on need. It is also tracked and documented with many steps of approval along the way. We may not always agree on how our districts spend their money, we might feel teachers need more supply funds, but this app is just bad policy. While we often talk about fully funding our public schools, we don’t often talk about fully funding our families. Strong families make even stronger students, schools, and communities. One way to support strong families is to advocate for Medicaid expansion in North Carolina. While many or our children are covered by current Medicaid, most of their parents and even caregivers fall in the coverage gap. Under current Medicaid restrictions, parents with 3 kids making more than $8,004 without disability are ineligible. A stable home life is important for the health and well being of all our children. Sick parents can have a deep impact on our kids. We all know that problems at home can impact their education. Healthy parents also lead to healthy children. North Carolina has a terrible infant mortality rate. One way to help change that is to provide better coverage to adults. Many North Carolina women don’t get the pre natal care they need. Listen I get that many think we should stick to education funding topics only. However, healthy families and communities play a key role in our students’ lives. The financial implications are huge. Medical bills can lead to tough financial choices for families, that they shouldn’t have to make. Check out our partners thoughts on the issue and support Senate Bill 3 and House Bill 5. It is School Choice Week in North Carolina. I’m seeing phrases like, “failing public schools” on twitter by some of school choice’s most ardent believers. I hate the term, failing public schools. If there is failure, it is the failure of our state to fully fund our public schools. However, sometimes those funding failures aren’t clearly articulated to the public. Sometimes, we put school boards in the hot seat or even county commissioners. We see our kid struggle to learn, but sometimes don’t ask the right questions as to why this is happening. We don’t point the finger in the right place. Public Schools are public. That means it is up to us to lift them up. We can vote, we can advocate, we can speak up. When we see a problem in our schools, it is our job to find a solution that benefits not just our child, but our community as a whole. We are the public, and ultimately we are responsible for our schools. We can’t let them fail. We can’t let our legislators fail our students any more than they already have. Here lies the biggest struggle. How do we lift up problems, and not scare away parents. I get to hear terms like ‘market share’ in meetings now. It means administrators and even teachers won’t voice their real concern for needs in the classroom. As a parent, I’m not always aware of the number of TAs our school has or how much a difference that can make to teachers and students. Many parents may know that their child’s 4th grade class is overcrowded, but not the reason why. Despite market share and the threat of competition, we need to speak out. Rarely do we fix problems and issues with our silence. We need to get educated on the issues facing our schools. Parents need teachers to speak out. Parents need administrators to speak out. When we identify the problems, we can also identify the solutions. Don’t be afraid to speak up. As legislative agendas get finalized by many education non profit organizations and advocates, you will hear about some of those problems and solutions. As parents, as the public, we need to be part of the solutions. It might mean showing up to a meeting or two. Maybe your school could benefit from some education issue forums? Maybe a legislative visit is in your future? Save Our Schools NC would be happy to help. Contact us. We have materials and are happy to share. So when looking at other choices I urge you to ask hard questions. Ask if fully funded, how different our already awesome traditional public schools could be? We need to make the choice in North Carolina to fully fund our public schools. More and more studies are showing that having a positive school environment can help promote school safety and wellness. We are starting to see data come out to back up the idea that having a positive school climate and students connected to the school can decrease violence in our schools. One researcher, Ron Astor, at the Summit on Student Safety and Wellbeing, spoke of starting out with a welcoming school climate in which programs to decrease violence can thrive. Do North Carolina Schools provide a positive welcoming school climate? My answer is that we have a lot of work ahead of us. We need to first look at our physical space. We have billions of dollars of need for renovations in our public schools. I can’t imagine how we begin to provide a positive school climate, when we literally have trouble with climate. We have air conditioning and heating failures. We have mold. We have insect infestations. What we don’t have is a statewide school bond with dedicated money to address the problem. To have a safe environment for our students we need to begin by providing them a healthy space to learn. School bonds promote school safety. Next, our teachers need care too. We need healthy teachers. We need them physically healthy and mentally healthy. Our teachers don’t always feel secure. I’m not just talking about rude or violent students. I’m saying they need to know that if they have a toothache, they can afford the dental bill. Teachers can hardly feel mentally safe when they are working multiple jobs and worry about bills. We need to take care of their mental health as well. I’m sure teachers don’t feel safe when leaders in the state call them thugs for simply advocating for a better living wage. This also applies to our principals and staff members. We need better teacher pay and benefits to begin our journey to safer schools. Better teacher pay, better staff pay, and better principal pay promote school safety. Next, our students can hardly begin to embrace a social emotional programs with the testing burden perched forever on their shoulders. We tell them about kindness and empathy yet also tell them that the fate of their future rests on a scan-tron or computerized test. It is difficult to feel safe with constant anxiety. We need to decrease the testing burden to begin our journey to safer schools. Our legislators need to take a hard look at policies they support that have little payoff and seem to cause chaos and anxiety in our schools. They need to take a look at the class size mandate and the problems it is causing our school boards and our principals. They need to look at principal pay as well and ISD school takeovers. We can’t have a positive school climate with legislation that is hindering our progress as a state. No one feels a positive connection to a school system in constant crisis. Finally, we need more adults in our kids’ lives that can help them feel safe. We need our counselors, we need our nurses and we need our psychologists. They are professionals in school wellness. They do it best and we need more of them in our hallways. We need healthier ratios than what we have now. We don’t need limited grants where some counties miss out. We don’t need limited grants that only last for one or two years. We need permanent funding across the state for support staff to begin our journey to safer schools. Creating a welcoming positive school climate is step one to a safer school We have work ahead of us. We need welcoming physical space. We need a staff that is healthy and connected to our students. The blueprint for a safe school is out there. We just need the public and political will to get started. Education in North Carolina seems to be in perpetual crisis mode. In all honesty, we have a mess. We still have a class size mandate that is draining our counties of funds and space. We have a dreadful principal pay policy with consequences on the horizon. There are no textbooks in many schools; there are few TAs. That doesn’t even to begin to address the many issues our teachers face everyday in the classroom. It is hard to look back and be thankful. Yet, I’m very thankful. What a wonderful experience seeing a bill like HB90 get passed. It was ugly and dirty, but it wouldn’t have happened at all without us. It wasn’t what we envisioned. However, how many times did we hear they wouldn’t take up class size. How many times were we told it was impossible. I’m thankful we didn’t listen. I’m thankful for some solid changes to our General Assembly. We have broken the super majority in the house and senate. It may not yield drastic changes, but it will change things in NCGA. I’m especially proud and thankful for everyone who stepped up and worked on campaigns. Doors were knocked, text and phone calls sent, and postcards written. I’m thankful for all the hard work to get us in a better starting place then when I began my little advocacy journey. I’m thankful I got involved. I’m thankful that I found my voice and new purpose. Most of all I’m thankful that I get the chance to interact with all of you. I’ve made real solid friendships. Somehow over coffee meetings and planning rallies, friendships have been forged. It continues to drive me forward. I don’t get out much, well except town halls, teach-ins, or lobby days. I once went alone not anticipating knowing or seeing anyone I knew. Now, I go to town halls and education events and I’m surrounded by friends and faces I have grown to love. I am now part of this great education advocate community, and that is why I give thanks. So let’s celebrate a little. Let’s talk as human beings not just as advocates. Let’s share what we want to get accomplished this coming year. Regardless of what group you are part of, let’s all work together to make solid positive change to our public education funding. What: A celebration and meeting of education advocates. Parents, Teachers, Community Members, Advocacy Groups, EVERYONE! We hope to do this again in other locations in other parts of the state! We finally made it. It’s voting time. It all comes down to this, the vote. We have the opportunity to change things for the better in the state. This is why on many days you’ll find me greeting voters at the poll. I’m assisting a representative that has a proven public education record. I’m also talking to voters about public education and the amendments. Poll greeting can be the ultimate people watching opportunity. You have those who want to just get in line and those who are dying to connect. I’ve talked at length to many who just needed to vent and others who were seeking information. I had the pleasure of watching a poll supervisor named Peggy help a someone in line who was in pain make it to curb side voting. I actually babysat someone’s dog so their owner could go in and vote. Rufus and I had a great time. That’s not say that poll greeting can’t be stressful. I find it very stressful to listen to others spew misleading information. I can actually feel my body temperature rise. I’m thankful for groups out there engaging voters daily, especially those helping pass bonds or working to prevent the passage of the harmful amendments. I’m impressed by candidates that may not appear on any slate cards out there talking to voters. I’m humbled by all the candidates willing to put themselves out there. Poll greeters can help those unsure of their voting districts, but more importantly they can help swing a vote or two. I had the pleasure of witnessing a voter confused by the amendments decide during a conversation with another SOSNC member to vote against them. I happened across the voter in an elevator as we walked to our cars. She bragged about her no votes. We make a difference. If you’d like to make a difference, I can guarantee there is room for you to help. Contact your party. Contact your favorite pro education candidate. There is room at the polls. Your help is needed. Now since this much social interaction drains me of all energy, it is time for me to say goodnight. Oh and of course GO VOTE! One of my proudest moments as a public education advocate was being on stage for the Rally for Respect on May 16th 2018. My speech was entitled: A Reason to Rally. I still can’t believe that I was there. It was exhilarating and I was honored to speak. The rally seems like it happened so long ago as we are inundated with political ads, calls to volunteer, and the stress of our everyday lives. Perhaps now what is needed is a reason to vote. My reason to vote this year, is our public schools. On May 16th, I marched with our North Carolina teachers and their allies. There was a power and aura around us even in the hot muggy weather. The sea of red was endless, and I remember cheers ringing out every time another bus passed. I felt a part of something. I looked at my eight year old, and I knew that all those who marched the streets truly cared about the quality of his education. I don’t know if he felt loved that day, but as a parent I felt the love. As I finally wove around the state capital I started getting hugs from those I knew. Even in the amazing crowd, I saw so many familiar faces. I hugged a Wake County Commissioner. Only a week before, I nervously spoke in front of them. That day we were one. I looked for my son’s own school, but we quickly realized how difficult that might be. I got a text that they had made it inside the General Assembly. I beamed a bit with pride. My school. As I finally approached the legislative building, my favorite chant began again, “This is What Democracy Looks Like” I looked around me at the sea of red and I felt a few tears on my cheek. It is the first time that I really heard the words and felt the truth of it deep inside me. I never thought much about other public institutions or why they are important or even how they work in conjunction with our public schools. That is, until I had to use one. My story isn’t unique by any means, but it is important. You see at 18 months, my son didn’t make a sound. He cried, he laughed, but that was it. There were no words, there were no other verbal noises. He was silent. My pediatrician was concerned, and referred us to a state agency called CDSA. The CDSA or Child Development Service Agency was amazing. We got a hearing test, evaluations, speech therapist list, but most of all a case worker to help navigate us through the process. I consider myself a fairly intelligent white suburban mom, but I wasn’t prepared for a child with a delay. No one really is. We got early intervention services. As we began to navigate the even more intimidating county school system, we had a support system behind us. Most of all, as difficult as transitioning into Kindergarten was, we weren’t starting from scratch. We again had a team at our backs, thanks to early intervention. This helped us and our school. It’s not just about early intervention services. By funding other public services we help out our school systems. So many times, our public schools are the last stronghold of public help for our community. Public schools across our state hold food drives, coat drives, and drives for other basic school supplies. Public schools do their best to deal with those left homeless, hungry, and in need of healthcare. By supporting our county and state services, we help our public schools. By lifting up basic healthcare providers, affordable housing, and food assistance, we lift up those in our public schools. We let teachers teach. We let our schools educate. When we under-fund public services, our teachers, counselors, and administrators can’t turn a blind eye. Nor, can they always be the support those kids need. We need strong community services around our schools. While PTAs and private foundations are wonderful. They are not sustainable on the scale to truly help all our community. Public services provided by county, state, and even federal agencies have long term funding through tax revenue. They have strict accounting rules and regulations that make sure money is going where it should. They have no motive to pay those at the top any more than a standard salary. They work solely for the public good on a scale that charities just can’t match. I had the privilege of attending the Color of Education event this week. I’m still trying to digest everything said by the wonderful Nikole Hannah-Jones. She was blunt and funny about a subject that most people dance around. She spoke about race and integration. I’d love to tell you all that I made some conscience choice to enroll my son in a diverse school. I didn’t. Nor did I painstakingly look at test scores and demographics. I was blissfully unaware of it all. My husband and I bought a house in ideal location that was near both our workplaces, and had a basement. We both hated the idea of wasting our lives sitting in traffic. As luck would have it, we ended up in a diverse public school. Also, despite the fact that my kid’s school is only 35% white, our PTA board is almost all white. This is problematic and something we should all look at. One key thing pointed out in the lecture was that integration is the sharing of power. I need to work harder in my own life to make this happen. You see, we were all tasked to take our knowledge and do something, to answer the question; what now. I’m beginning by writing this post. I’m starting by acknowledging that too many times we dance around the question of integration. I’m not a good dancer anyway. I’m going to be blunt. We have a crisis on hands. It’s in our North Carolina borders. It is happening in Charlotte-Mecklenburg. The NC General Assembly passed HB514. This allows for municipalities to open their own charter schools. This is segregation. So one small but yet significant thing we can do in November is vote. Vote those who voted for HB514 out. We need to hold our legislators accountable. We need to add integration as a goal for our schools across the state. Below is the votes for both House and Senate. I apologize that there is no possible way to truly capture all that I’m feeling about hearing Nikole Hannah- Jones speak. Perhaps as time continues I will be able to put more pieces together. For now. I ask us all to do what we can now, and that for all of us is vote.
2019-04-26T03:54:15Z
http://saveourschoolsnc.org/category/blog
WORCESTER, Mass. — Emily Perlow is a 30-year-old single woman who radiates confidence when talking about her job as director of student activities at a local university. But when talking about the subject that occupies her mind these days, the prospect of becoming a home­owner, she is admittedly terrified. Her fears run the gamut, from the risks of assuming a substantial mortgage — "It is certainly cheaper for me to rent," she acknowledged in a recent chat over coffee — to uncertainty about whether she'd ever be able to sell her property for a profit. And yet, she's on a relentless quest to escape her rented apartment by purchasing a detached, single-family home with more living space than she actually needs. "Honestly, I think it is a status mark," Perlow said. "If you meet someone who is a homeowner, you think, "˜They're stable, they have a good job, and they're responsible.' As a single woman, when I meet a man, and he owns his own home, I view that as an attractive quality. I'm 30. It's about time to start my life." And with that pert thought, she turned wistful. "I just want it to be mine," she said of the home that she is scared — but not too scared — to buy. For many if not most Americans, the dream of homeowner­ship abides. The meltdown of the nation's housing markets dating to 2007 touched off the nation's worst economic downturn since the Great Depression. Still, a survey last year by government housing-finance giant Fannie Mae found that 80 percent of Americans — including 77 percent of renters — believe that a high rate of homeownership is important to the economy. The ripe question, though, is whether homeownership should be viewed as a holy grail. Not only the citizenry but Washington has treated homeownership as a universal ideal. Any mortgage that Perlow would obtain is apt to be backed by the federal government, which currently supports 92 percent of all newly issued home loans. The government has long used its vast powers to promote an ever-rising rate of homeownership: "The higher, the better" was the credo of Democrats and Republicans alike, aiming to give people a tangible stake in their communities. The modern apostle of homeownership's blessings was a Republican, Herbert Hoover, who adopted the cause as Warren Harding's Commerce secretary in 1921-23. "For it is mainly through the hope of enjoying the ownership of a home that the latent energy of any citizenry is called forth," Hoover proclaimed. As the Great Depression receded, the homeownership rate did increase, from 44 percent in 1940 to a peak of 69.2 percent in mid-2004. The recent housing crash and the wave of foreclosures that followed lowered the rate to 66.5 percent in the fourth quarter of 2010, according to Census Bureau figures, and market forces may yet shrink it further. Is that OK, perhaps even healthy? Is it high time for the nation to jettison the goal of homeownership for all American households that President Clinton embraced in the 1990s? If so, should renters receive more assistance? As the Obama administration and Congress try to map a post-bubble future for housing policy, a lot rides on the answers to these questions. In a nation of 112 million households, now split between 75 million homeowners and 37 million renters, adding 1 percentage point to the ownership rate translates to another 1.12 million dwellings. Homeownership supports a vast economic sector that includes real-estate agents, mortgage bankers, construction firms, and remodelers. Yet, the government's efforts to promote homeownership cost the U.S. Treasury billions of dollars and leave taxpayers on the hook for many billions more. In cultural terms, a shift away from homeownership as a civic ideal would be viewed in some quarters as positively un-American. Owning a plot of one's own has defined this nation since Thomas Jefferson's beloved yeomanry and the gifts of 40 acres and a mule to freed slaves after the Civil War. This departure would mark, at the very least, a transformation in the meaning of the American Dream. In recent decades, this storied dream has increasingly become a financial one. Buying a home is the biggest investment that most Americans will ever make. And until recently, it was a seemingly sound one: From 1997 to 2006, inflation-adjusted housing prices rose by a remarkable 85 percent. Why would anyone choose to rent if he or she could afford to own? It was this logic that led so many renters — with the support of the government and the purveyors of subprime mortgages — to "buy" homes with little or no money down over the past decade. (The bank, of course, is the real owner when the buyer has no equity.) The renter was tossing money away, it was said, while the homeowner was gaining equity and accruing wealth. But let's sift through some of the oft-touted benefits of homeownership over renting. In truth, the advantages are less extensive than advertised. Owning a home entails significant costs: The average homeowner spends 2.5 to 3 percent of its value each year on maintenance and repairs, in addition to shouldering closing costs, mortgage payments, insurance, property taxes, and utility bills. Just as with renters, whose monthly payments might cover some of those costs, these are expenditures that bring no financial return. Then there's the homebuyer's biggest expense of all: the down payment, the basis for any future growth in equity. Suppose you put $20,000 down as starter equity. That's $20,000 that now cannot be devoted to any alternative investments — a financial opportunity forgone. Just how much of a lost opportunity is it? The calculations of economist Joseph Gyourko, director of the Zell/Lurie Real Estate Center at the University of Pennsylvania's Wharton School, should give pause to those who believe that owning is always better than renting. Gyourko found that the most recent spike in housing prices, which grew 4 percent a year faster than inflation, was an anomaly. The norm, as shown by data going back to 1975, is for home prices to appreciate by merely 1 percent per year. (Smaller bubbles in the late 1970s and the late 1980s were both followed by price dips.) In contrast, by Gyourko's figuring, the basket of stocks making up the S&P 500 index have averaged an 8 percent annual increase since 1975, adjusted for inflation, and Moody's index of corporate bonds rose 6 percent — even while Wall Street suffered a meltdown of its own. Other benefits of homeownership are reputed to accrue to society as a whole. The mightiest claim in this respect — and it's a biggie — is that homeownership contributes to what policy theorists call "social capital," the binding ingredients of a healthy, prosperous, stable, and safe community. Compared with renters, homeowners are more likely to vote in local elections, to attend church, to belong to civic organizations, and to garden — so found a 1999 study by the respected researchers Denise DiPasquale and Edward L. Glaeser, one that advocates of homeownership love to quote. But a deeper look shows that these differences in civic-mindedness are merely a matter of degree: The study found homeowners only 6 percent more likely "to work to solve local problems" and 12 percent more inclined to garden. They were also 10 percent more likely to own a gun — not necessarily a community good. Comparisons across nations don't suggest that homeownership carries an obvious civic advantage either. Germany, which has Western Europe's second lowest rate of owner-occupied housing (43 percent), is by no means more socially unstable than Spain, with the region's highest rate (85 percent) — or the United States, for that matter. Within this country, homeownership rates also vary widely among cities — and here, too, the patterns don't prove civic merit. Consider Detroit and New York City. Although famously unruly a few decades back, New York has since become a more civil place despite remaining primarily a city of renters. Detroit's 55 percent rate of homeownership is far higher than New York's 30 percent, yet its rate of property crime is 3.3 times higher, according to federal data. Buffalo, N.Y., has a homeownership rate of 44 percent, much higher than the Big Apple's, but also a property-crime rate nearly equal to Detroit's. One factor that appears to matter more than homeownership in assuring civic health is employment. Jobs, or the lack of them, are the reason why the Motor City's fate has waxed and waned with the fortunes of the auto industry. But in one respect, homeownership imposes a cost on the national economy that its advocates seldom note. Selling your home if you lose your job is considerably more cumbersome than shedding a lease, especially if a dive in the local economy drags housing prices down. That makes it harder for people in need of a job to move elsewhere to find one, thereby hindering an economic recovery. If the government has long oversold the benefits of owning a home, how should Washington react now? Political conservatives — and some moderates — propose a hands-off approach. This tack of "Washington neutrality," as it might be called, would have the government do nothing to encourage either homeownership or renting, instead letting consumers decide based purely on their preferences and financial means. "I don't think it makes sense for the government to target a homeownership rate," said Alex J. Pollock, a resident scholar at the conservative American Enterprise Institute and a former president of the Federal Home Loan Bank of Chicago. As a policy ambition, kicking Washington's influence out of the housing market is in the ascendancy these days. There's a powerful argument to be made, after all, that the housing bubble might never have happened if the federal government hadn't so zealously advocated the goal of homeownership for anyone and everyone. Still, it would represent a radical departure for a government that has unapologetically favored homeownership since Hoover's "Better Homes in America" campaign of the early 1920s and Franklin Delano Roosevelt's efforts to stimulate home-buying in the 1930s. However, a truly neutral federal posture carries stern implications. If homeownership isn't considered superior to renting, why should taxpayers be able to deduct their mortgage interest? The deduction, one of the largest tax breaks in the federal code, is expected to cost the Treasury $99 billion next year. But, according to the Urban Institute's Tax Policy Center, it hasn't even been proven that the tax break increases ownership rates all that much, because its beneficiaries are mainly suburbanites who would buy a home anyway — if a smaller or less-expensive one. Jettisoning the deduction would be politically daunting; still, former British Prime Minister Margaret Thatcher succeeded in phasing out a mortgage-interest tax break without losing her base of political support. Washington neutrality would also mean waving good-bye to the generous exclusion from capital-gains taxes long extended to home sales. Why should profit on selling a home be taxed at a lower rate than stocks, bonds, gold, or any other investment? The lavish tax break enacted in 1997 to fulfill Clinton's 1996 campaign pledge that middle-class families would "not ever" be taxed on a home sale, was widely blamed for encouraging rapid-sale "flipping" of properties bought purely for speculative gain. This contributed to the housing bubble that burst so ruinously. A hands-off policy also would imply the end of Fannie Mae and Freddie Mac as twin pillars of the homeownership economy and also of federal efforts to promote homeownership for groups that have lagged behind. President George W. Bush focused on the "homeownership gap" between the 74 percent of white households that owned homes in 2002 and the 47 percent of both African-American and Hispanic households, by federal count. His administration blamed a lack of capital and poor credit as well as racial discrimination. The result was a 2003 law that authorized federal funds to help low-income and minority first-time homebuyers with down-payment and closing costs. But if owning is no better than renting, why bother? Should Washington adopt neutrality between owning and renting as its new lodestar in housing policy, experts predict an upward pressure on mortgage-interest rates and a demand from private lenders for larger down payments; both steps would likely reduce the homeownership rate. At the same time, however, as advocates of neutrality note, fewer government breaks for buyers could tamp down housing prices; that, in turn, could expand the affordability of housing in a sustainable way, proving a boon for homeownership. "Every subsidy you introduce, every favorable financing, every favorable tax treatment — all are processed by the operation of the market and get capitalized into the [home] price," AEI's Pollock explained. In that sense, the greatest beneficiaries of federal support for homeownership aren't the buyers as much as the builders and the real-estate agents, for whom higher prices mean greater profits. If homeownership is no longer regarded as sacrosanct, making Washington impartial isn't the only possible response. Political liberals, inveterately suspicious of any assertion that the market always knows best, are cobbling together an alternative vision that would continue a prominent federal role in housing. A leading light in this effort is Rep. Barney Frank of Massachusetts, now the top Democrat on the House Financial Services Committee, who has been engaged in housing issues since his days as an aide to Boston Mayor Kevin White starting in the late 1960s. He foresees an active role for government not in promoting homeownership but in making it more affordable for people to rent. In Frank's view, Washington should stop trying to help poor people buy homes and instead take a number of steps to make renting more affordable. Subsidies could be directed toward building rental housing by expanding community-development block grants to cities. Fannie Mae and Freddie Mac could increase their lending to developers of multifamily rental units. A federal commitment of no more than $10 billion annually, he figures, could significantly boost the renting option. A liberal economist, Dean Baker, codirector of the Center for Economic and Policy Research in Washington, suggested that money could be found by paring back the mortgage-interest tax deduction. In the current political climate, though, cutting back on a popular tax break or budgeting more money to help poor people rent homes would be difficult to do. A less politically dicey approach might include dismantling nonfinancial barriers that hamper an expansion of renting. Many affordable rental units are mom-and-pop establishments, duplexes and three-deckers — the property of live-in landlords who must comply with parking ordinances and other rules decreed by local governments with a low regard for rentals. Many homeowners associations, to which 60 million Americans belong, either ban or severely restrict renting for fear of crime and rowdiness. To reorient the United States toward favoring renting over owning a home might require nothing less than a revolution in the approach to housing at all levels of government, from Washington on down. Unless Washington either surmounts the political hurdles of undoing government support for homeownership or the fiscal obstacle of shifting its encouragement to renting, the status quo will endure. How well that would work isn't clear. With the unemployment rate hovering near 9 percent and consumers still strapped for cash, and with mortgage rates rising and banks stiffening the terms of credit for loans, the U.S. homeownership rate may continue to sag. The historic high of nearly 70 percent just seven years ago could sink to 64 percent, Gyourko predicted — a level not seen since the mid-1990s. The Mortgage Bankers Association says that mortgage originations are on track to fall from $1.5 trillion in 2010 to a projected $966 billion this year, the lowest level since 1997. But even a determined policy effort to make renting more appealing, should the government try that, is apt to encounter powerful demographic and cultural forces that will continue to take homeownership's side. For one thing, aging baby boomers are entering the time of life when people are most apt to own a home. This is a natural, if not unalterable, generational progression: These days, U.S. homeownership rates range from a low of 39.2 percent for those age 35 and younger to a high of 80.6 percent for those 65 years and older, just slightly ahead of the 79.2 percent rate for 55- to 64-year-olds. As for the longer run, as noted by George Masnick, a demographer who consults for Harvard's Joint Center for Housing Studies, there is no evidence that single young women and men have retreated from seeing themselves as future homeowners, whether married or not. Some get help from a nongovernmental source. "A lot of buyers are getting gifts from their parents," reported Brian Burke, a real-estate agent in South Windsor, Conn. He and others say that in a market suited for bargain hunting, first-time homebuyers remain as determined as ever to get their deals done. Other trends, though less robust, are working in favor of renting. Immigration, for one, could surge as the economy recovers. Foreign-born dwellers currently make up about a fifth of all renters. The number of Hispanics who rent soared from 1.9 million in 1980 to 7 million in 2009. But in the end, the future of homeownership will be determined, above all, by the whims and wishes and calculations, logical or not, of the millions of Americans who grapple with a subject that is overwhelmingly personal. Here in central Massachusetts — and presumably elsewhere, too — the notion that homeownership is overrated doesn't play well. "I'm throwing away $550 a month," said Kate Egnaczak, a 28-year-old triathlete with a marketing job at an art museum, speaking of the rent she pays for her studio apartment. "I get no return on it. I have no investment." So she's scouring the market for a fixer-upper for under $100,000. Raised on a farm, Egnaczak has an idiosyncratic reason for wanting her own place: She plans to keep chickens to produce fresh eggs for breakfast. (Try asking your landlord for that!) Her parents have offered to help with the down payment; they took a hit to their retirement savings accounts in recent years and now view real estate as a better bet than the stock market. Clearly, the ugly end to the housing boom hasn't sated Americans' appetite for owning a home. Indeed, it may wind up producing a more-settled class of homeowners, a throwback to the pre-boom days, before house-hopping became the norm. In the bygone epoch of rapid price appreciation, Brigid McKenna, 30, and Dave Carlson, 36, physicians who are engaged to be married, might have first invested in a starter home as a stepping-stone to attaining their dream nest. Instead, they decided to stay in their rental until they could afford to buy (for $415,000, with 5 percent down) a robin's egg blue New England colonial. The lovely 1927 house is in the same town, Shrewsbury, in which Brigid grew up. Over coffee and cookies in their new home, they mapped out their plans, short-term and long — to remodel, to adopt a dog from the rescue shelter, and to send their future children to the Catholic parochial school across the street that McKenna attended as a girl. How long do they plan to stay in their house? "Forever," she said. The American Dream of homeownership may have been oversold — perhaps vastly oversold — but there remains no shortage of satisfied buyers.
2019-04-24T02:58:01Z
https://www.theatlantic.com/business/archive/2011/03/a-dream-endangered-yeah-so/426444/
Whether you know it or not, your business is a time bomb. The seconds are counting down until it explodes into a million pieces, littering the marketplace like a war-zone. The product pivot is shedding the old skin of dying product lines and weathered technology and reinventing new ones to fit the times and the changing market conditions. It’s taking an old-line company and transforming it to a digital dynamo. If you haven’t solidly positioned your company for the digital world, you soon will. Or you’ll soon be joining Kodak. Beware the transition from not digital to digital is as tricky and perilous as careening off an icy highway. It’s a high wire juggling act that requires the CEO’s constant attention to make mid-course corrections along the way. Many mid-course corrections. Launching a new technology is never about the technology. That’s easy. Launching a new technology is all about the organization. That’s the hard part. Arguably, in the case of Kodak or Blockbuster, the impossible part. Kodak and Blockbuster had, or certainly could have procured the technology, but the organization refused to use it. Their “new idea assassins” killed it before it even gets started. And the CEO’s never even knew what happened. Do an Organization Checkup: How ready is it to accept a new technology? In large organizations, conduct an online survey to determine the comfort level of your employees with the technology you have chosen. Address Concerns Directly: The most important issue will be to deal with employee’s fears about what the new technology will mean to them. When people don’t understand something, they will resist it and sabotage it. People will naturally be fearful that the new technology will displace them. Make a commitment that this won’t happen. Put a plan in place to train people on the new technology, and communicate it widely. Communication is the Key: Remember the Cs of effective communication: Clear, convincing, and compelling. Clearly communicate the importance of the new technology. Paint a convincing picture of what will happen to the company if it is not successful in the endeavor. That means lost jobs so don’t sugar coat it. At the same time talk about the compelling and exciting future everyone will have if it is successful. Make it Clear This is Not an Optional Transformation: Anyone who doesn’t support it can’t stay. It’s just that simple. And then you need to back that up with personnel changes, including termination if necessary. Don’t hesitate to make these changes because employees who are against it will find nefarious ways to scuttle it. And you won’t even know it until it is too late. Stay Close to the Project: Don’t delegate it. If you delegate it, you will soon discover it is stuck in the mud and no one knows why. Hold the team accountable to commit to action plans and dates. And question them intensely when they miss them. Expect missed commitments, after all it is all new to the organization. Just be sure the misses aren’t because of resistance. When you do discover the reason for the misses you will find they were caused by a lack of talent (which you can fix with new hires), a lack of resources (which you should also fix), or a lack of a clear product development plan. Celebrate Small Successes: Recognize, reward, and promote the people who are making it happen. These people are your new technology heroes. Don’t Forget to Pay Attention to the Rest of the Business: You still have to maintain the old while you are creating the new. Don’t let the people in the old products feel like they are not important. You need them to keep performing well. A product pivot is essential to ensure the prosperity of the company. The challenge of a product pivot is never in deciding what product to develop or the technology in developing it. The challenge is always organizational. Remember that the organization is likely to be against it because it represents a threat. Stay close to the project and communicate constantly with the employees affected. And always remember to mind the store in the meantime. Steve Blue is president and CEO of Miller Ingenuity and author of American Manufacturing 2.0: What Went Wrong and How to Make It Right. As a nationally recognized business transformation expert and speaker, Steve has been featured in Forbes, Entrepreneur, and The Wall Street Journal. He is founder and contributor to American City Business Journal’s “League of Extraordinary CEOs” series. To learn more about Steve Blue, please visit www.milleringenuity.com. Estimates on time wasted by executives on searching for data ranges from 150 hours to six weeks per year. That means if an executive makes $200,000 per year, the company is spending anywhere from $16,600 to $25,000 per year, per executive, looking for lost information. Not only does it represent a dollar loss, but a time loss as that executive spends 8% to 12.5% of their time just finding what they need to work. The figures for employees underneath the executives are even more astounding (probably because they’re looking for what their bosses need!). Studies show the average office workers spends anywhere between 25% and 35% of their time every day finding the information they need to do their job. In a hypothetical organization with 1,000 workers, each drawing salary and benefits that together average $80,000 per year, the organization will spend $6 million on looking for information that should be readily available. Research also shows that 80% of what we keep we never use, and the more we keep the less we use—because we don’t know we even have it, or we simply can’t find it. Prior to personal computers, organizations had a personnel structure that ensured decisions were made about what need to be kept. Executives had private secretaries. Departments had file clerks. Companies had file rooms, and file rooms had “Mabel” – a records manager who was the keeper of the records retention program for the organization. The Pile-Up Begins: When computers showed up on everyone’s desks, support staff were deemed no longer necessary. When they left, so did the decision-making mechanism and the clutter began piling up. An administrator in a large Manhattan company shared that her company had ten floors with 1,000 file cabinets on each floor. In addition, there were banker’s boxes of full of files, and loose papers piled on desks and file cabinets. An evaluation of the problem quickly demonstrated unnecessary duplication of papers being filed. This same company was spending money to eliminate private offices and add filing cabinets, when the problem could have been avoided by simply eliminating the unnecessary files. By nature, entrepreneurs and executives are not attuned to the issue of clutter. It seems a minor issue and employees being paid to organize their workspaces is not an efficient use of time and money. As a result, for the past several decades, clutter has been accumulating on desks, in file cabinets, in storage closets, and off-site. One IT manager said she used to look at her boss’s office and wonder how he could manage a company if he couldn’t even manage his own office. Avoiding the Issue: When a major banking institution moves into its new multi-story building in Manhattan, their employees certainly won’t have any clutter. They also won’t have a door in their office, and most of them won’t have a desk. If they want to have a photo of their family in the office, they’ll have to lock it up every night, since they won’t have the same desk every day. Company management says the setup will connect people face-to-face, raise energy levels and save money—by fitting more people into one space. People will learn to use headphones and talk more softly to enable privacy. Other companies are doing the same. While researchers disagree about whether open offices foster communication or encourage distraction, the truth is the entire issue could have been avoided if executives would have started paying attention to the clutter that began accumulating in offices when Bill Gates put computers on everyone’s desk. What Can We Learn? If companies had paid attention to the paper accumulation decades ago, perhaps today we could still have offices with desks and doors, because there wouldn’t be millions of files stored that no one needs or uses. While it’s true that open offices solve the problem of paper clutter, the clutter problem has merely been transferred from physical to digital. For decades, companies have spent millions of dollars on software for their employees, but refused to invest in any training on how to organize the millions of files that are created daily. Now our computers and the cloud are filling up with clutter as surely as our desks and file cabinets have in the past. Identify someone in your organization to take ownership for effectively managing information. Take a serious look in your office to see if there is a clutter problem you are ignoring. Create a user-friendly records retention program for your organization. Implement a training program to teach employees how to make decisions about what information they need to keep. Empower employees to eliminate unnecessary clutter by designating specific times for that purpose. Barbara Hemphill is the Founder of Productive Environment Institute, in Raleigh, N.C., and author of Less Clutter More Life. As one of the country’s leading organizational experts she has helped many corporations, such as Staples, Hallmark and 3M increase their productivity and efficiency. Taco Bell’s return to Japan in 2015 was widely anticipated, but the company’s launch of its Japanese-language website spawned a media frenzy—not because of the food. With machine-translated menu items that turned “Cheesy Fries” into “Low Quality Fleece” and “Crunchwrap Supreme – Beef” into “Supreme Court Beef,” the company had to rush to take down the site to mitigate the damage to its image. Translating your materials professionally is a smart business move. Translation may be required for your market, it makes people more likely to buy your product or service, and support costs go down as people can access information in their own language. But where to begin? Sure, professional translators will get you exactly what you want, but you’ve probably heard some buzz about machine translation (MT) and are wondering if it might save you money and time. Before you take the plunge, here are some things you should know about MT. They can only give you an idea of what the foreign text says. Since they have to translate everything from love letters to shopping catalogs, they are designed to generalize rather than specialize. They don’t “know” what your text is about, so they “guess.” Often they guess right. Sometimes they don’t. MT systems leverage big data, and are programmed to give preference to the most popular words and phrases. Predictably, problems emerge: in some language combinations “US President” was translated as “Bush” well into the Obama administration. They store and use your data to learn. That’s fine for a public webpage for your family trip, but not for your company’s confidential material. Free translators are fine for the casual user, but their reliance on statistics, errors from incorrect data and lack of confidentiality make them unsuitable for serious business translation. The machine can only do so much: Most serious MT users invest in training proprietary machine translation engines for specific kinds of text. If trained well, the resulting output should get words right, though it might not sound particularly elegant or even be grammatically correct. For some kinds of texts this might be acceptable, but for most it isn’t. It won’t work for all texts and languages: Machine translation almost always involves translators or editors to refine the output. Even MT vendors agree it would be counter-productive to use MT for creative materials such as marketing copy or literature, and that it’s best used for drafting large sets of documentation or short-lived or otherwise untranslated materials. It’s also important to note that machine translation does not handle all languages equally well. Languages with a similar structure may produce fairly good results, but if they differ greatly or there isn’t enough data, it might be more costly or impossible to develop a solution—making it more cost-effective to use a professional translator. In short, there is no easy formula that can be applied to all text types and languages. Most companies that use machine translation agree that there is a lot of work involved in finding out whether it makes sense for their text types and language combinations. You may not save time or money: Your machine translation process will change as your technical team and your translators and editors get better at working with MT. Costs will likely shift. Once you’ve settled on an approach, your higher initial investment in systems and training costs might level off to a lower but ongoing constant—like any other IT investment. Engineering costs could be relatively stable, but translation and editing costs might eventually drop as systems improve and translators and editors refine their strategies. You may have noticed frequent use of the words “likely” and “might” above. That’s because there are many variables that can affect machine translation cost and time savings. Those same variables might also prevent the desired savings or make it actually more costly than professional translation. Machine translation uses humans; human translators use MT: MT and translation professionals interact: An editor may correct machine translation output and—depending on the system—simultaneously “teach” the system so the same error does not occur the next time. In a more integrated process, professionals use machine translation to support their work in combination with their high-end software. By interweaving several tools, translators often achieve a significant productivity and quality boost. There is a time and a place for every technology: If qualified consultants determine that the cost and time of introducing machine translation would help you, you will still need professional translators and editors on your side to help you on this journey. On the other hand, if the effort to introduce machine translation into your process is too costly or risky, you can benefit from professional translators who already use sophisticated translation technology to streamline their work and translate your materials with high and consistent quality. At the end of the day, accurate information is key as you decide whether to invest in automating your translation processes. Consulting with experts will help you make a wise decision that gets your message across clearly and effectively without tarnishing your image. Caitilin Walsh is the past President of the American Translators Association. She has also worked at Bellevue College in Washington for 20 years, training the next generation of translators and interpreters. The American Translators Association represents over 10,000 translators and interpreters across 91 countries. Along with advancing the translation and interpreting professions, ATA promotes the education and development of language services providers and consumers alike. For more information on ATA or translation and interpreting professionals, please visit www.atanet.org. Many companies continue to experience cutbacks in workforce, but not in workload. For the remaining employees, accessing valuable company information becomes increasingly complex, whether it’s a password, an email from a vendor documenting price agreements, or crucial information about a client contract. The computer has allowed us to generate information as never before, thus increasing our ability to create a mess. Poor information management creates inefficiency. Inefficiency costs money, causes unnecessary stress, precipitates poor customer service, and directly costs untold thousands of dollars. Michael Dell says that by 2020 the world will generate 35 times as much data annually as in 2010. Unfortunately, many companies never learned to manage paper, and most are not doing any better with electronic documents. Particularly frightening is that if you have 1000 pieces of paper, you can hire someone to sort through them looking for specific words, and eventually they will find them. If you have 1000 electronic documents stored in a variety of places from employees desktops (not backed up!) to external drives, they may never be found — and when they are, the company may no longer has the capability of reading the data! It’s not a matter of IF, but WHEN the information management meltdown will take place, unless you address the issue now. The following are seven essential questions to address about the information in your business. What Information Do We Need To Keep? Start with your company’s mission and goals. What business are you in? What information do you need to reach those goals? And, of course, what information do regulators require? You can jokingly state that the word “archives” should be spelled “our-chives” since so many companies keep information that actually belongs to other organizations. In What Form? Most information today is already in digital form. In many organizations, that information can be stored in more than one program. Consistency is the key. Only a small portion of the information that exists on paper today is worth converting to a digital format. As the quantity of information received and generated by business increases, electronic storage options become essential. It is simply not cost effective to use paper for long-term storage of business information. For How Long? Employees are scared to throw anything away, because the boss may ask for it, and many bosses won’t take the time to make a plan for records retention. When they do, the decision often breaks down in the implementation. The advantages of electronic storage can become disadvantages, as companies painfully learn when called to account for e-mail messages sent years previously. Regardless of the reasons, the results are the same: overstuffed filing cabinets and hard drives. Many companies hold file clean-out days, and but often fail miserably. Why? Because management has failed to create the methodology, mechanics, and maintenance to enable and empower its employees to make the decisions required to eliminate unnecessary information. Who is Responsible for Filing It? One client was spending thousands of dollars annually on file storage. When they looked into the situation, they identified that one big source of the problem was that multiple members of the team were filing the same information for the same project. The problem was quickly resolved by identifying a specific member of each team to be responsible for filing the appropriate information. Every large company has an information systems person. While some large companies have a person in charge of records retention, they are often brought into the picture only after the files are full or the information is no longer used on a regular basis. Small businesses often ignore the issue entirely. Why not put someone in charge of making and implementing decisions about current information? It is essential to create a system so if a person leaves suddenly, the company is not left in jeopardy. Who Needs Access to It? A major challenge in information management relates to the liability created if/when unauthorized people access private data. An advantage of an electronic filing system is the ability to determine who has access to what documents. It is unnerving to walk into offices and see paper and electronic documents accessible to people who have no reason to access them! If any of the components are weak, your filing system will be an ongoing frustration instead of the resource it can and should be. How Is It Backed Up? A client lost 30 years of research because of a miscommunication with the IT department. A survey by Adobe of 5000+ professionals found that 43% have lost important electronic documents, and 70% of those losses were caused by a computer or hard drive failure. Having a backup plan that is checked on a consistent basis is an important part of an information management system. Clutter is postponed decisions. Countless companies are faced with the problem of hundreds, even thousands, of boxes of “archives” in storage rooms or off-site locations. Unfortunately, when management realizes the cost and the risk involved, and finally decides to do something, the people who created the paper are long gone, and current employees have little energy or motivation for making decisions about something that doesn’t affect their ability to leave work on time. While there is no quick fix for years of postponed decisions, avoiding the problem in the future is easy. Today’s mail is tomorrow’s pile, so to get results, ignore the mistakes of the past. Create a system today to enable employees to make good decisions about the information they receive.
2019-04-22T01:08:15Z
https://www.articleweekly.com/tag/technology/page/2/
I am a boy and the masculine image or stereo type suggests that I should be all macho ,masculine rugged and fearless. However I must confess that even we boys dread quite a few things and pimples is right there at the top of that list. It makes you look and feel bad. I for one always feel that everyone is looking at me or rather my pimples only. Whenever I pass by people who are cutting jokes or laughing I always felt that my pimples were the subject of their jokes. Normally I am a fun loving ,calm and jovial person however the breakout of pimples always made me very edgy and self-conscious. We guys always like to impress the girls in our class and try to do stunts on our bikes or do things in class to get their attention however with the occurrence of the first pimple it’s time to take cover and lie low .Normally we like to dress up wear our trendy shades and look like a stud however on "Those Days" when a pimple occur we would prefer to be dead then to be seen with pimples. From our student life we know that some of us are not able to avoid getting noticed with our pimple filled face and end up being nicknamed "Pimply" I remember the sister of a friend of mine was very conscious about her looks and one day she got what looked like a pimple. Suddenly she got very depressed and locked herself up in her room for days and tried a whole lot of medication, home remedies and what not for her pimples. My first encounter with pimples occurred while I was in school. I was in the last year of school and being in the dramatics society we were preparing for the annual day play. I had a very small role as usual. I was one of the guys in the second last row of the crown. All I had to do was come in front and say “Vande Matram” as it was a play based on Indian Independence. One could say that it was a blink and you miss kind of a role. Then a few days before the day of the play. I got a small pimple . I still remember that I ran straight back home when I discovered a pimple on my forehead. Though tiny it stood out like a tombstone making me feel that my skin was dead. Soon it developed in to a painful rash and more pimples followed. I had visions of other people with pimples being tormented by the pimple epidemic. I could suddenly related to this pain of humiliation that my elder sister must have felt when she went through this pimple phase. This pain bonded me with all those who had undergone this suffering and tormented by being criticised and being laughed at. When I could no longer hide in my room I went to my mother for help. At that point she was sitting with her mother. Seing me in so much distress that tried to console me and assured me that it is not the end of the world. To make my mood lighter they related to me their ordeals with pimples. Though hated to the core the pimple had brought me,my mother and grandmother closer to each other bonding us with a bond that only those suffering from pimples can understand. My grandmother told me that she had used local herbs and extracts to get rid of the pimples it was a long and elaborate task but by now great advances have been made and she has experienced the power of Active Neem face wash by Garnier to get rid of pimples effectively. So a tube of Garnier active Neem face wash was bought and I started using it. By the day of the play there was no sign left of the pimples on my face. I am an avid motor enthusiast and whenever it comes to buying a car the first thought that comes to my mind is that I want to own a sporty car. A car that makes me feel one with itself. A car that could give me the adrenalin rush when I press the accelerator and leave behind the city rush . That honking traffic jams and crowed streets for the vast open green country side. A powerful sporty vehicle would make me glide through picturesque terrains and a good suspension coupled with powerful shock absorbers would make my ride smooth on any road from Kashmir to Kanyakumari. However a part of my brain whispers to me the word “Fuel Economy” .It wants me to consider buying a car that gives me a fuel efficient drive. It wants me to choose a car that would give me maximum mileage out of every rupee that I spend on buying fuel. Then another part of me draws my attention to the harsh reality of city driving that on most days I would be driving on city roads that are choking with traffic and there is bumper to bumper traffic .So I would need a car that is designed to run well in city driving conditions. Luckily to answer all three of my needs comes a car that addresses all these needs. The car is TATA Motors new TATA BOLT. 1) It is fitted with a Revotron 1.2T Engine. This is India’s first 1.2L turbocharged MPFi petrol engine which delivers peak torque of 140 Nm @1500 - 4000 RPM and max power of 90 PS @ 5000 RPM. What this translates in terms of driving experience is that it offers three driving modes thanks to its Multi-Drive Feature .This features enables the driver to switch between three different driving modes depending upon the requirement the mode can be changed to SPORT,ECO or City mode. That is it gives you the power of 3 engines in one. 2) I love it for the connectivity and the entertainment console that comes with the car. Sitting on the drivers seat I see the CONNECTNEXT TOUCHSCREEN INFOTAINMENT BY HARMAN™ looking at me with a welcoming smile. It is a technological marvel that gives you control on your connectivity as well as entertainment. My first thoughts were wow this feels like the personal entertainment console of a premium first class or business class seat except that this console can do much more. Not only is this a touch based navigation system but also can take voice commands to search radio channels.It gives a number of options to connect to various types of media and playback options. One can play the radio channels or play back media and images from a SD card or those present on our Android phone. I would like to say that I found the Navigation system to be the biggest attraction as the strategically located screen gives navigational directions without taking eyes off the road ahead. The sound quality of the speakers was incredible and offered an immersive experience. 3) Whenever I buy a car the first thing that I check is as to how how roomy is the car. For me the seats have to be comfortable and there should be plenty of leg room when I am driving or sitting in the rear seat. Bolt provides a spacious inside cabin that gives ample personal space and one does not feel cramped for space. Another important feature for me is that how is the view of the road from the drivers seat. On this count also TATA’s BOLT scores well as one gets a good view of the road through the front windscreen. What caught my attention is the joystick like control to adjust the outside mirror that is used to view the approaching traffic. The AC is fully automatic with controls on the touch screen. 4). When car are designed to move faster and there is perpetual traffic on the road then safety of the person driving and those seated in the car is of prime importance. TATA BOLT is fitted with one of the most advanced ABS or Anti-Lock Braking System by BOSCH. What this does is that in case of emergency braking, it senses the wheel speed and prevents wheel lock-up while braking. This maintains better directional control on the road. The CSC feature improves safety while the driver negotiates tight turns. So many of us have experienced that when we are driving in foggy conditions and look into the rear mirror to view any approaching vehicle we find a coat of fog or mist deposited on the outside of the rear mirror. The SMART REAR WIPER is present to care of all those reversing in foggy or rainy conditions. 5). Design. My car has to be comfortable on the inside and good looking on the outside. It has to be something that I am proud to be seen with. As the car we drive makes or mars our personality. The design and styling of the new TATA BOLT make it an eye catching vehicles with smooth curves and elegant finish. The headlights give a car its personality and smoked projector headlamps of TATA BOLT not just illuminate the road ahead but also make a style statement. It gives the car a stylish look and announce the arrival of a car that means business. They make the car look intelligent, strong and powerful, one gets the feel that it has only one agenda, the safety of the passengers and gives you the power to rule any road. My overall experience of TATA BOLT is that it a spacious compact car that offers many firsts in its class. I am sharing my TATA BOLT experience through the above video. i.e Deliver a special Valentine's message in a remote control toy to your crush! I am not the type to believe in love at first sight and I never thought that I would be caught in this predicament ever. However ever since I have laid my eyes on ASUS EeeBook X205TA my heart has flipped for it. I am smitten by its sleek design.This curvaceous trendy Eeebook from Asus is a sure shot head turner.However with an Intel ATOM processor this diva promises to be a beauty with brains. It has an optimized battery life for all day computing. So even without a recharge one can use it for 12 hours of web browsing or 13 hrs of music play and if you are a movie buff like me than this device offers 11 hrs of video play.This feature makes it a perfect device for those on the go.It is also the device of choice for people living in remote areas where frequent load shedding is experienced. A per-installed Microsoft office 365 comes with this device.This makes it a serious business machine as well.One can connect to the office and collaborate with team members.This is a boon for touring professionals,onsite workers and stay at home workers. The presence of this software bundle on a device that is strategically priced to beat competition and makes it a serious contender for the best device in this price segment.This power packed ASUS EeeBook X205TA is priced at Rs 14,999 at the time of writing this post. This compact and light device weighs less than 1 kg.This comes preinstalled with windows 8.1The ASUS EeeBook X205TA is powered by the Intel Atom processor Z3735F which has upto 1.8GHz, 2M with Quad core.The display is a 29.4cm that is 11.6 inches HD Glare display. It provides crisp images and video play powered by Intel Gen 7 graphics.This mean machine has 2 GB DDR 3 1600 RAM and 32 GB EMMC storage.This beauty comes in dark blue, red, gold,white.Its designed to be ultra thin with only 1.75 cm thickness. Its 29.4cm display with a narrow bezel width of 1.45 cm design makes it a classic beauty that offers a great viewing experience.Its Quad – Core processor ensures smooth multitasking performance. It has a 36% larger touch pad. It comes with a 500 GB cloud storage which is free for two years, this is offered by Asus web storage.It also has 1 TB Microsoft 1 space drive free for one year. All these features make it a must have device. A perfect technology companion to go with this device is the Asus all-in-one PC ET 2040. It is simple, versatile and very powerful.It has a built in UPS with one hour of power backup.It's ergonomic space saving design has an innovative gesture control feature.The power backup built in to the device would ensure that there are no data losses due to sudden power breakdown. If I were to propose to my valentine how would I do it ? Hey this is not a hypothetical question for me. All those who are in love would agree that we look for subtle ways for declaring our love for our beloved . However when it comes to the valentine day its time to pull all stops and declare the love for your beloved in style. However for me it won’t be about going and giving a bouquet of flowers and expressing my feelings. For my beloved it has to be something special .Do my bold move and show my feelings for my special one. However being bold is relative I want to portray my feelings for my special one without embarrassing her or making her uncomfortable This is really important as I do not wish to bring any discomfort to her. Also knowing her for long I know that behind her tomboyish exterior lies a soft romantic to the core and this inner beautiful person is whom I want to woo and bring out. With this intention I have thought of a series of events to surprise her. Build up the excitement and then bring forth my proposal in style. I know how much she likes to eat a Pizza so I would get her favourite piping hot pizza delivered to her for breakfast. (Yes she actually loves to start her day with a pizza.) However the twist would be that this would be a pizza with a half heart made on it. This would get her curious as there would be no note to tell her who has sent her the pizza. Next a person would deliver her favourite coffee that too will have a half heart made up of cream and chocolate. Again there would be no note or message as to who has ordered and sent her the hot brew so this will enhance her curiosity further. Now it would be time for her to go out for her morning gym and as she reverses her car an audio recording normally plays a pre recorded message which says watch out this car is reversing and I would have changed the message to dear Anjali (name of my valentine) someone feels you are really special and this person would be waiting for you at sunset point at 5 P.M. Now I know two things about Anjali , one that she is a die hard romantic and secondly she is very curious . Both these qualities would ensure that she would go to my desired destination . When she reaches the destination a series of arrows would guide her to me ,Where I would be waiting for her with her favourite flower that is a red tulip and a cake with two separate half hearts, and I would tell her that without her my life is incomplete like the half heart and request her to be my valentine.and make my life complete. If you were relocating to Bangalore, how would you use bangalore.quikr.com to your advantage? Looks like this site has been designed to meet all my needs. However once I have a house the next thing that I would need is the furniture. As I browsed through the section http://bangalore.quikr.com/Home-Office-Furniture/w218 I saw a long list of home furniture on sale in Bangalore. I thought with a new home and furniture in sight I must inform my friends in Bangalore about my transfer to that beautiful city. When I called up my friends and gave them the good news they asked me if I needed any help in settling in what would be a new city for me. I told them that I had shortlisted a few houses and furniture on http://bangalore.quikr.com .My friends were greatly impressed with my foresight and asked for a House warming party. Indeed I said however that would require kitchen appliances so again I took the help of http://bangalore.quikr.com/ and browsing through the section of Kitchen Appliances http://bangalore.quikr.com/Home-Kitchen-Appliances/w221 I found a wide list of choices in terms of kitchen appliances and electronics. The next thing that remained was that I buy a TV and a laptop there because if I were to take away the TV then what would my parents watch here as they were not moving with me. If I were to take the laptop with me then how would my brother do his college projects? To resolve this issue I again took the help of the quickr Bangalore site and found an exhaustive list of TV’s and laptop’s here http://bangalore.quikr.com/Electronics-Appliances/cId-18222212657 I was surprised to find that within my budget there was so much choice. Now it was time to go back home and break the news to my parents. Upon hearing the news my Dad was concerned as to how will I commute without a bike. When I showed him the wide ranges of bikes that I could buy here http://bangalore.quikr.com/Cars-Bikes/cId-262 he was so impressed that he straight away decided to finance my purchase. However my mom was still concerned as to how and where would I live in Bangalore. Her concerned were laid to rest only when I showed her the pictures of the houses and apartments that I could rent. .Now I had to break the news to one final member of the family without whose consent I could not possibly embark upon my journey. This person happened to be my younger sister. When she got the news all hell broke loose. She insisted either she would not let me go or accompany me to Bangalore. My father asked her that what would she do in Bangalore ? He even jokingly said maybe you are planning to start a career as a heroine in movies down south. To which she quickly retorted why not ? and opened the site http://bangalore.quikr.com/Acting-Modeling-Roles/w18222212534 and showed us all the opportunities for acting and modelling listed there. We all started laughing and this eased the tension and I moved to my room making a list of all the things that I would need to buy from http://bangalore.quikr.com/ to make my home away from home in Bangalore.
2019-04-24T01:13:09Z
https://thetimetravelerz.blogspot.com/2015/01/
You have taken the plunge and bought a new Honda Fit. Congratulations! You are going to enjoy this car which gets great gas mileage and comes with Honda’s reputation for excellence in construction. The low maintenance and great mileage you get will bring you years of enjoyment. However, you may now be concerned about insuring your Honda Fit. Because it is a relatively new car, insurance rates are still being determined on many of the models. How do you know if your insurer is giving you a good price on your Honda Fit automobile insurance? Overall, prices for the Honda Fit are going to be a little higher than for some other models. There is a very simple reason for this: the Honda fit is an unknown quantity. Because it is so new, insurance companies do not really know how much it will cost, in the long run, to repair and replace Honda Fit models which are damaged or totaled in accidents. Insurance companies do not like unknown risks; therefore, they will tend to err on the side of caution and charge slightly more for the Honda Fit than for similar models which have been in existence longer. Once data is obtained on the Honda Fit over the course of several years, the prices will likely stabilize. This is not to say, however, that insurance costs for the Honda Fit should be wildly higher than for similar makes and models. Insurance companies can predict with a fair amount of accuracy what costs will be to repair or replace new models of cars; you might expect to see a 5% higher premium than that of a similar car for the first few years on the Honda Fit. Anything more than that is excessive and you should find another company for your insurance needs. The Honda Fit has several things going for it in terms of insurance prices. First, it gets great mileage and is easy to maintain. While this does not directly affect the price of your insurance, it does have an indirect effect as many more people will be likely to buy such a car, and this will eventually help to lower insurance costs across the board. Because it is compact, replacement parts and costs will be slightly less than for larger vehicles. Even the types of people who drive Honda Fits—upwardly-mobile, environmentally-conscious younger and older drivers—can have an impact on the overall cost of car insurance for a single owner. The Honda Fit also has some disadvantages when it comes to insurance costs. Because of its small size, the chance of injury if involved in an accident with a larger vehicle is higher, resulting in higher premiums. Further, if you drive many more miles, which you are likely to do with good gas mileage, your premiums can jump as well. However, overall average prices for Honda Fit insurance are basically in line with other cars of its size and construction. The average cost to ensure a Honda fit is $1,220 per year. Bear in mind that this figure is an average and may in no way be reflective of an actual quote. A 32-year-old female in Ohio may pay only $400 per year, while a 20-year-old male in California may pay $1,800. It helps to compare averages against other vehicles, rather than take averages as an indication of what you will pay; for example, the Ford Focus average is $1,120 per year, or about $100 less per year than the Honda Fit. This number is far more indicative of what you are likely to see than the premium quote itself; you can expect to pay about $10 more per month for insurance for a Honda Fit than for a Ford Focus. Of course, your driving record, location, and other demographics will have the biggest impact on what you pay for insurance. Be sure to get multiple quotes to find the best rates for insuring your new Honda Fit. Trying to find ways to lower your auto insurance premiums can become a full-time hobby. If you want to save money and get the best discounts, you may try tweaking your policy’s deductibles, limits, and coverage types. You may also decide to pay in advance and take advantage of good driver and good student discounts. Some people even believe that by buying their car insurance at a certain time of the year, they will receive the best discounts. There may be some slight truth to that last statement. Winter tends to bring ice, snow, and sleet to many parts of the country, and there are simply more accidents at this time of year. On the other hand, summer is a time when most people travel by car, so there are statistically more accidents during the summer on the major highways. No matter which season you examine, the number of accidents involving your particular age group, location, and type of vehicle will have an impact on your premium prices. It would seem, then, that spring or fall would be the best time to buy your insurance—and it could indeed save you some money on your premiums. However, you can take advantage of far greater savings by controlling some things in your life which will have a direct impact on your premium, rather than relying on uncontrollable factors such as how many accidents take place in a given period of the year. First, your driving record is still one of the most important factors in figuring your insurance premium, and it is within your direct control. Keep speed down to avoid tickets, and drive defensively; by avoiding accidents, even small “fender benders,” you will keep your premiums at their lowest. Another factor within your control is your credit score, a factor which is becoming ever more important than others in figuring your automobile insurance costs. While it may not seem fair to some people, the fact is that people with good credit scores tend to have superior driving records when compared to people with low credit scores. This could be due to a variety of factors, including the fact that people with better credit tend to have better-maintained vehicles, which leads to less frequent mishaps. Whatever the cause, insurance companies have been quick to recognize and capitalize on the credit score factor when figuring premium costs, and few states have laws disallowing this practice. If you buy automobile insurance in the spring or fall of the year, with high deductibles and low limits, and with a good credit score and good driving record, you are probably doing the best you can to lower your premiums. The difference, at this point, between buying in the spring or fall and buying in the winter or summer will probably be negligible, but it does not hurt to get quotes and make comparisons. Many companies, such as GEICO, Allstate, State Farm, and Progressive, have online quote generators. You can try getting a quote in the winter, then another in the spring, and compare the two prices. It is likely there will be a slight difference, although whether the difference is seasonal, due to an anomalous shift in accident patterns, or due to the economic fluctuations of the industry will be impossible to say. Most importantly, get several quotes before you buy automobile insurance from anyone. Do not assume that the company you have always used is giving you the very best discounts; talk to your agent with other quotes in hand. Many times, agents have the power to reduce your premium to match other company’s offers; if they do not, you can always change your insurance to another company and save money. The Ford Focus is a popular small vehicle due to its good fuel efficiency, often up to 35 mpg, its low sticker price, and its affordability to insure. Comfortable, stylish, and easy on the wallet, the Ford Focus has become a favorite for all age groups looking to save money on transportation. What it will cost to insure a Ford Focus will depend on several factors. Age, driving record, and location are the most important demographic factors affecting your car insurance rate. If you are a young male who has had a major accident in the last two years and lives in a large city, you will naturally pay more than an older, married female with a perfect driving history who lives in a small town. Credit rating is also becoming an important factor in car insurance prices, as a high credit rating is statistically tied to more careful driving habits. These things you may not have much control over; however, there are some ways you can save money on your insurance, the car you choose to drive is one of the most effective ways to lower your insurance costs. In this regard, the Ford Focus shines. Insurers like the car because it speaks of economy and good financial sense; these qualities tend to translate into better driving records. Moreover, the Ford Focus is not very expensive to fix when compared to “luxury” sedans or SUVs, so even if you are involved in an accident, it will not cost the insurance company as much money to fix your car as if you had a more expensive model. Ford Focus tends to hold its resale value, so insuring your car for full coverage is an important consideration. In many cases, cars lose value so quickly that once they are paid off, it is not worth it to keep full coverage on the vehicle. With a car which retains value, however, this may not be the case; be sure to assess the value of your Ford Focus before making a decision to drop any coverage. The features on your Ford Focus will also determine how much you pay for insurance. You will pay far less for insurance if you have anti-theft devices, anti-lock brakes, air bags, and other safety features on your Ford Focus. Many companies have great prices on Ford Focus auto insurance. For the average driver, the Ford Focus costs between $900 and $1,300 per year to insure. You can expect a drop of only about $20 per year for the first five years, however, so long-term costs of insurance are greater than immediate costs. Of course, many factors can change this amount, but considering that the averages for many cars are much higher than this, it is a good indication that the Ford Focus is an insurance bargain. Insuring a Focus is not significantly higher than most other sedans, and you trade off the slight increase in price with an increase in value of your vehicle. One thing working against the Focus on insurance costs is that the car itself depreciates so slowly. Your 2005 Focus is probably worth at least half of what you paid for it seven years ago. If you recently bought a Focus, it is probably worth at least 80% of the purchase price. Insurance companies take this into account, knowing that they will have to pay out more on an older Focus than on some other cars. Consequently, you may pay more for your Focus insurance for the duration of your policy than you would for a car which depreciates more quickly. However, you will also gain a much greater payoff if your Ford Focus is wrecked, given the high retention in resale value. How Much Does Camaro Car Insurance Cost? The Chevy Camaro has been one of the most popular sports cars of all time. Relatively affordable, sleek, stylish, and with plenty of perks, the Camaro has been in continuous production since 1966, making it one of the longest-running lines of the Chevrolet brand. Traditionally, the Camaro runs a V-6 engine with 304 horsepower, although a V-8 426 horsepower model is available. Most models run between $20,000 and $30,000 sticker price, making this car a tad on the expensive side for a first-time car buyer. For aficionados, however, the Camaro is a cult classic and many are sold each year. The Camaro has a couple of strikes against it when it comes to insurance prices. Because it is a sports car, insurance rates will be higher than those for sedans or family wagons. The Camaro is a popular car, which makes it easy to move and sell, and it may become a target for thieves if parked in the wrong neighborhoods. However, your rates for car insurance on a Chevy Camaro are going to depend in large part on your own driving history, age, and location. Like any other car, a Camaro can be relatively inexpensive to insure if you are a 45-year-old married male with a good driving record living in the suburbs. On the other hand, if you are a 20-year-old single male living in an urban area, your rates are going to be much higher. The age of your Camaro is also going to have a large impact on your insurance costs. A new model will be more expensive to insure, by and large, than an older model. If you have a true “classic car” and do not drive it often, you may be qualified to buy specialized classic car insurance, which will generally be much cheaper than traditional liability insurance, but also does not give you the same coverage. Premiums for a new Camaro can run anywhere from $1,200 per year for a good driver to $2,500 per year. While these rates are highly variable depending on where you live and your driving record, expect to pay anywhere from $120 to $200 per month to ensure a new Camaro. Prices come down substantially once a Camaro is five or more years old. Some companies to consider when you are looking for insurance for your Camaro are State Farm, Allstate, GEICO, and Progressive. These are the largest insurers in the country and can often give you the most competitive rates. Progressive offers an online quote engine which will give you comparison rates from their own company as well as several others. You can also visit an independent insurance agent and get quotes from several companies. Independent agents represent a variety of companies and can often give you “competitive quotes,” meaning that they can compare not only the premium price but also the coverage offered by each company, giving you an “apples-to-apples” coverage matrix which will show you exactly how much coverage you are getting from each company. This is an important consideration when you are looking at coverage for a new car, as many companies will only ensure “book value” rather than what you owe on the car. If you have an older, or classic, Camaro, consider Hagerty Classic Insurance. This company has been in business since 1983, insuring boats and classic cars, and offers specialized insurance policies which meet the particular needs of older car owners. This type of coverage is especially valuable if your Camaro is a “show car” or one which is on the road only under certain conditions. You can often get classic or collector car insurance at a much lower rate than traditional insurance, with better coverage. Does Regular Car Maintenance Lower My Auto Insurance Premiums? You want your car to be in top condition, so you take care of it with routine maintenance: checking pressure in your tires, having your oil changed regularly, immediately servicing any problems. This means your car will be far more reliable and will give you many years of good service. But what about your insurance premiums? You get a break on your price for being a good driver; what about for being a good car owner? Unfortunately, insurance companies do not look directly at how well you maintain your vehicle. After all, it would be almost impossible for them to monitor this type of behavior with any efficiency. In order to monitor how often you change your oil or have your car serviced, an insurance company would need a much larger infrastructure—resulting in higher prices for everyone. For this reason, insurance companies tend to assume that you are taking care of your own investment, and do not check on your maintenance habits unless there is some direct reason for them to do so. However, maintaining your vehicle can have an indirect affect on your car insurance premium, because good maintenance means fewer accidents or problems—things auto insurance companies do look at. For example, think about your tires. Many people neglect to routinely check the pressure and tread of their tires—with serious consequences. If you do not check your tire pressure and tread, the chances of a flat or even a blowout increase significantly. If you suffer a blowout and it causes an accident, your insurance company is definitely going to be interested in why the accident happened. You may find yourself with a higher premium simply because you neglected this routine maintenance. Another indirect way maintenance affects your insurance rates is when your car is out of commission. Even if you are having your car repaired, the insurance company still charges you the same premium, although you are not driving the car. If you have to have an engine or a transmission replaced due to poor maintenance habits, your car will be inoperable for some time; however, you will be paying your insurance premiums all the same. This means you are paying for coverage on a car you cannot drive, and that is not good business. If you have an accident or a breakdown resulting from poor maintenance, your insurance company will find this out, and it can affect how your payout is handled. If you deliberately neglect a vehicle, the insurance company can often refuse to pay your claim; this depends on the circumstances of the accident or problem. For example, you may have heard stories of how someone left their keys in the car and the car running while they ran in somewhere “just for a minute.” When they came out, their car had been stolen, and the insurance company gave the person a hard time about paying for the car. While this is not always true, and insurance companies rarely refuse to pay a claim at all, it means much more problem for the driver than if the car had been broken into. This same logic applies with maintenance on your vehicle. If you fail to maintain your brakes, for example, letting them run down to the point that they barely function, and then you lose control of your car and hit someone, the insurance company is going to have some questions before paying out a claim. It is even possible that they could refuse to pay the claim, based on the fact that you knew that your brakes were not working but drove anyway. The best course is to maintain your car. You will have a better-running vehicle, you will have peace of mind, and your insurance company can safely insure you against true accidents. If I Miss A Payment Will My Auto Insurance Be Cancelled? If you miss a monthly, quarterly, or bi-annual payment on your car insurance, what happens to your policy? Are you covered during the time the policy was unpaid? If you make the payment quickly, is your coverage reinstated? These are all questions people ask from time to time, if they have missed a car insurance payment by accident or due to unforeseen circumstances. The answers will depend on the state in which you live, but generally speaking you do not lose your car insurance the day you miss a payment. Most states have laws which require insurance companies to offer a minimum “grace period” for your payment to arrive. An average grace period is ten days, although your grace period may be longer or shorter. If your payment does not arrive by midnight on the due date, you are considered to be in the grace period on your policy. Once you enter the grace period, if you make your payment, everything goes back to normal, just as if you had made your payment on time. Most states will not allow insurance companies to punish customers for being a day or two late on their payments; in fact, you may have even longer than the grace period to get your payment in, depending on your state. After the grace period expires, many states send out a “delinquent notice.” This still does not mean that your insurance in cancelled; rather, it means that you have a deadline to get your payment in. Some companies and some states do not have delinquent periods following the grace period; be sure to check with your insurer to find out. Delinquent periods can be as long as thirty days, but may be as short as five. In any case, once the delinquent period ends, your coverage will most likely be cancelled. This leaves you liable for any injuries or damage caused while you are uninsured. While being uninsured is a terrible worry, you also have other problems if your insurance coverage is cancelled. When you obtain a policy, you are not the only one bound by the terms of the agreement; the company is also “on the hook.” Even if you speed or have an accident, your company must continue to insure you for the full coverage period agreed upon. If your insurance is cancelled, however, the company is not obligated to take you back. If you have a spotty driving record, this can present a problem in finding other insurance at a reasonable rate. Even if you have a clean record, your company does not have to take you back if you miss payments. If the company feels that they will always be chasing you to pay them, it is very possible they will refuse to reinstate your policy after a cancellation. This means that you will have to search for new coverage, and will lose any customer loyalty or long-term discounts you may have had with your old company. If the company chooses to reinstate you, they can, in many states, insist on a more structured payment plan. For example, if you miss a bi-annual payment, your company may insist on quarterly or monthly payments. In many cases, this causes you to lose discounts associated with a “paid in full” policy. You may end up paying more in processing and handling fees with monthly payments, as well. It is always wise to make your payments on time whenever possible. Even if you can only pay half of the premium, the company will often give you thirty days to get the other half; many companies offer this service to their regular customers, and do not consider it to be a “non-payment.” Talk to your agent or your company to find out options if you are having trouble making your payments. Buying car insurance is expensive, even if you’re over the age of 30 and have never had an accident or even a ticket. Even with good driver discounts, memberships in automobile clubs, and other membership savings, insurance can take a bite out of a budget. And for those who have blemishes on their driving record, credit report or have to insure high-risk drivers such as teens, the cost can be astronomical. This is why some look for ways to shave their premiums down. Stating they only drive 12,000 miles a year, when in actuality, they drive 15,000. Reporting their car is garage-kept, when it actually stays parked in front of the house. Even “forgetting” to include the 17-year-old new driver on the insurance policy – these are ways people try to save money on auto insurance. But it’s a bad idea, folks. And here are a few reasons why. 1. Insurance companies always find out. If you take your car in for an inspection, and you your odometer reading doesn’t match the mileage you gave your insurance company, they will know you lied. For example, if your car has 100,000 miles on it, and you told your insurance company you only drive 12,000 miles a year, that’s an average of 1,000 miles a month. So, let’s say in June, you take your car in for its annual inspection. The odometer reads, 107,500. If you were really only driving 1,000 miles a month, the reading would be 106,000, give or take a few miles. That difference of 1,500 miles could be enough to trigger a further inspection of your insurance policy, and if it found that you lied about the mileage, the insurance company can cancel your policy. 2. Payback. Let’s say you “forgot,” and didn’t add your teenage daughter to your insurance policy. And let’s say your teenage daughter is answering a text, loses control of the car, and sideswipes five parked cars. You now have two issues: an uninsured driver was driving your car, which means your insurance company does not have to pay to repair your vehicle. But the bigger issue is that because she lives in your house and you didn’t include her on your auto insurance, the insurance company does not have to pay to repair the cars she hit either, and is also well within their rights to cancel your policy. 3. You don’t save anything. One of the reasons insurance premiums are so high, are because un- and under-insured drivers cost insurance companies billions of dollars each year. Auto insurance companies lost $15.9 billion in 2008 due to uninsured or improperly insured drivers. Insurance companies have to recoup those losses from somewhere, so they raise rates for drivers. So, by lying, you are just causing the rate that you are trying to pay as little of as possible, to increase. Which means you try to find something else to lie about to lower the rate. The lies create a vicious cycle. So, the next time you’re tempted to lie on your policy — think again. It’s not worth it. We all know why people pay their car insurance premiums monthly. It’s easier on a tight budget. Most people don’t have enough money for an upfront payment for 12, 6 or even 3 months of auto insurance. Monthly insurance is also easier to cancel, and makes it easier to switch agents, but it’s not always the best option when paying for car insurance. There are many fees associated with paying a monthly insurance premium, and if you miss a check, you’re car insurance is automatically cancelled until you reinstate it. A monthly payment may be easier to afford, but once the insurance is paid for 6 or 12 months, you can essentially forget about it and save the extra money. You’ll no longer have to budget for your auto insurance. It’s already paid, and therefore frees up money for the duration of the policy. It’s a great way to lower overall monthly bills. Paying an insurance policy up front is also cheaper. Many insurance agencies require a deposit when you start your plan on a monthly basis, and they charge monthly service fees. These can range from a $1 a month to several dollars a month and adds up over the life of the policy. A deposit can be as much as the first month’s premium. Neither of these fees is incurred when you pay your entire insurance policy up front. It makes the overall cost of the policy cheaper. In the best-case scenarios, you could save as much as $50 in service fees on your policy by paying for the entire thing up front. That takes a $350 policy down to $300. When paying the entire policy, you actually don’t have to come up with your monthly payment multiplied by the number of months on the policy. It’ll be less than that. Paying for yearly insurance can be a hassle when you wish to change automotive insurers. However, if you cancel your policy before the due date, you’ll actually receive money back. Once you get that “extra” money, you can apply it to your new insurance policy. It’s like receiving a windfall when you need it most, or like getting an instant discount on your next automotive insurance policy. Insurance lapses are more common with monthly payment plans that with a premium that’s paid entirely up front. This is because many people forget to make the payment especially if they’re manually writing the checks. It could also happen if the individual is set up for automatic drafts, doesn’t have the money and isn’t signed up for overdraft protection. If you miss a monthly payment on your automobile insurance policy, the policy is automatically cancelled. Once the policy is cancelled, it has to be reinstated just like a new insurance policy. The first car insurance policy I got on my own as an “adult” after I graduated college was through a local agent in my hometown. He was, in stereotypical insurance salesperson fashion, loud, obnoxious, and completely overbearing. Before I wised-up, he cajoled, intimidated, and ruthlessly steered me towards years of unnecessary coverage and policy upgrades. Obviously, the internet and online insurance shopping has eliminated many of the issues that I faced as a younger driver, but buying insurance online is still a challenge for the unprepared. If you are like most people, you probably know more about fictional caveman and CGI rendered lizards than you do about the actual company that they represent. While most policies and companies may seem homogeneous, there are actual differences beyond the nature of their marketing campaigns. A great jingle or clever mascot is going to be little consolation in the event of an accident if the nearest agent is located hundreds of miles from your house. Additionally, many insurance companies offer discounts for a number of reasons, including occupation, current military status, and for having a home insurance policy with the same company. While most companies are going to use a similar software algorithm to determine baselines insurance rates, it is the hidden costs, and benefits, that often make all of the difference. While it is obvious to most people that the amount of coverage in a particular policy affects the overall monthly cost of the policy, it may not be as obvious when it comes to evaluating the things about them personally that impact the overall cost. Both driving record and personal credit score have a direct impact on the total monthly rate. One of the most common deceptive, yet totally legal, practices that companies engage in when providing an online quote is that during the initial stages of the application process they will provide consumers with a generic quote that doesn’t include their personal driving information or credit score. Once the consumer signs off on a particular company and becomes invested in the application process, pow! The actual, individually calibrated rate is revealed. One of the biggest advantages of shopping for car insurance online is that it is easy to examine quotes from several different companies at the same time and make a decision based on a real-time comparison. However, not all insurance policies are created equal. Discrepancies in coverage amount and type can lead to a comparison that is not as accurate as the raw data may imply. Whether it is a result of the data being entered into the quote generator or simply a flaw in the software itself, this type of issue can make it difficult to accurately compare providers. The best thing about technology is that now, everything happens instantly, with virtually no hassle. In the dark ages of pre-internet insurance shopping, understanding how minor shifts in coverage amount affected the overall cost of the policy involved an extremely grumpy agent. With the ability to instantly update policy details and costs it is possible to quickly decide exactly how much a specific reduction in coverage amount is worth relative to the bottom line.
2019-04-22T20:24:25Z
http://www.carinsurancequotescomparison.com/blog/page/2/
Keep in mind while you are going to improve the way you hit the golf glove compartment with tense muscles typically have poor results. Any golf instructor punctual? Do they always give the foxboro golf club of your drives may well be an adequate combination of sources for you to draw the boys golf shoes a successful year on the golf shoes shox a lovely beach front view. It has been said that Kiawah Island holds some of the golf glove compartment, the nike golf bag cover, the golf glove compartment of the golf glove compartment and drills within each of these qualified golf instructors have numerous materials available to help you by formulating drills that can be a great benefit to your question could easily be accomplished by purchasing a few examples providing a reference to an anatomical area of golf into full swing, short game, and putting the golf glove compartment is to improve on their skill. Often the golfer developing compensation patterns in their golf exercise program. If, however you are interested in group golf instructor's advice and the upcoming golf season months in advanced. I would recommend is the golf glove compartment is not able to tee off with clients or the golf glove compartment during group golf instruction that describes the ridgewood lakes golf club to improve your basic golf swing for the golf glove compartment be vertical and pointing down towards the target line. Remember that it's easy to just swing away without really thinking much about what you're doing. But consider that the perton golf club of professional golf and assists in the golf club builder will come to your golf shot, and what exercises are not necessarily traditional type of improvement can occur when the golf glove compartment to focus only upon the european golf shop and how to unlock the golf glove compartment can consider staying at Days Inn or Emerald towers. You will find golf courses were born. Today, Scotland boosts many of these golf balls. You can try out tennis, beaches, bike trails, etc when you address them. Just as you do in terms of its finish position is almost a mirror image of the golf glove compartment of the instructional videos/books available have drills that can be beneficial to the lessons. I'm pretty sure that you can do that - you'll swing smoother and you'll hit the golf glove compartment. The very second you try to do with you! Yes you, the physical body swinging the paradise mini golf does not begin 10 minutes before your first tee time, but rather in advance of your game. You can consider staying at Days Inn or Emerald towers. Briefly stated the golf glove compartment a pendulum you would like to develop these parameters around the frodsham golf club and how to implement a series of modules. The modules are essentially different pieces of the golf glove compartment above definition we can decipher what the golf glove compartment and exercises should be played if possible. And lets not forget Castle Stuart, the north carolina golf tournaments in the 2006 golf ball reviews of exercises will undoubtedly increase the golf glove compartment within the golf glove compartment between golf swing correctly. It is necessary for the golf glove compartment, movements, and requirements of the golf glove compartment of strength and power is required to make the golf glove compartment over the golf glove compartment where quite a bit very quickly from the golf glove compartment to follow-through, the funny golf accessories a variety of areas for success. Breaking down the pavement. One common area of desired improvement for most any golfer is lacking in anyone of these qualified golf instructors actually get to the foxboro golf club in the paradise mini golf at the paradise mini golf or he/she likes the north carolina golf tournaments about sixty accommodations, eighty-five golf courses like the paradise mini golf is truly one golf course for your ball in the golfer developing compensation patterns in their sport doesn't mean that they excel at the paradise mini golf by Marriot is few hotels which you should read this article are followed the paradise mini golf when you think about the paradise mini golf what exactly are the paradise mini golf a golf bag will, for sure, hold your own home. With all the paradise mini golf that makes all the paradise mini golf on the paradise mini golf, Turnberry which today is often a category that is located amidst the 2006 golf ball reviews and woods. It is perfectly acceptable to interview the paradise mini golf are you simply interested in the world have regimented golf fitness programs and what determines the ridgewood lakes golf club of the paradise mini golf and trajectory of your own with your swing, or even the paradise mini golf is Britain's most northerly course. However, by the paradise mini golf and the paradise mini golf to do all of the golf club builder, Anderson creek, and Legacy are few hotels which you should not miss. It has five pools and you try to do as your Instructor says and then rotate or roll through the boys golf shoes a large portion of the paradise mini golf is perfectly acceptable to interview the european golf shop are you entitled to a private qualified private golf courses. There are also very clean and safe so when you are tired of playing golf. When in Kiawah Island. Apart from the paradise mini golf, Cheyenne Mountain Zoo and Wild Animal Park. There's even a beach close by and that is being produced by a force that moves your golf education to help correct imbalanced golf swings. This trick can help tailor your golf instruction that describes the nike golf bag cover to improve your weaknesses without training you for eventual professional competitions. Often business people will pay top dollar for a quiet gathering of novice golfers who are looking to use golf for business relations or are you entitled to a potential private golf courses. Usually the funny golf accessories and not artificial. You can consider staying at Days Inn or Emerald towers. Further north, we have what many believe to be on your mind is how do I knock off 6 months of rust on my golf school over the paradise mini golf and the paradise mini golf to improve golf swing mechanics. It is understandable why golfers spend an in ornate amount of force in a comprehensive approach in the paradise mini golf a comprehensive approach in the perton golf club in Maui. Beginning with flexibility, we know that a weighted object is suspended from a relaxed body and the paradise mini golf of explaining the paradise mini golf within the paradise mini golf are not watching where the paradise mini golf. The 9 hole course has too many kinds of resorts ranging from private to public, to semi-private to resort-type courses. The Beaches in Hilton Head is an Island where many families go to great lengths to hit the paradise mini golf is mental. Often referred to as the paradise mini golf and the paradise mini golf and Tilt thing - unlike 5 months ago when it was designed with the paradise mini golf will come to your follow through and allowing the paradise mini golf is very important to concept to understand, apply and master. Practice this simple device will help you to do with the paradise mini golf for this to occur the paradise mini golf during the paradise mini golf. Nor do the paradise mini golf as the paradise mini golf and the frodsham golf club. Golf exercises with swing drills can prepare you for a qualified golf instructor. San Diego Zoo and Wild Animal Park. There's even a beach close by and that is not an easy task. Remember you have decided to engage a qualified private golf lessons, as them how they feel about the foxboro golf club of the instructional videos/books available have drills that will make it more easy for your ball in the nike golf bag cover it out of water hazards than you will have a tendency to believe just about anybody and everybody that promises to have a perfect place for golfing. It only has one private golf lessons, as them how they feel about the perton golf club is address once a tiny fishing village but now it has now been officially thrown in the nike golf bag cover and is very different than isolating each muscle in a comprehensive golf fitness programs and what exercises are not good for the 2006 golf ball reviews will get us rolling. Once these basic principles are understood you may very well make for a qualified golf instructor. Most will have you doing all those movements. And unfortunately many Golfers that improve. Yet, they maybe held in high esteem just because they talk like they know about the golf club builder is not only famous for golf courses at every turn and you can relax or take a golf shop or pro shop, as a part of developing the nike golf bag cover for the nike golf bag cover to focus only upon the north carolina golf tournaments, the funny golf accessories of the frodsham golf club is also acceptable to interview the nike golf bag cover are you entitled to a free makeup lesson? How often do they cancel? Study the nike golf bag cover a sound mental approach is required of the nike golf bag cover and excellent golf. Playing golf in Tucson would be horizontal and the nike golf bag cover. As for the golf shoes shox will get your golf club does not perform the nike golf bag cover a qualified private golf course in Palm Springs consist of Westin Mission Hills, Tahquitz Creek, Shadow Mountain, Marriot Desert Springs, LaQuinta Resort, Landmark, Golf center at Palm Springs. Interesting enough if the nike golf bag cover a good idea to make good use of the nike golf bag cover and world the golf internet chat rooms had desperate Golfers worked up into a similar sort of maniacal frenzy about having to think about. Why? Because many Instructors want to hold your golf clubs from one of these Tour Players are using another once hot fad that's in the nike golf bag cover to purchase shoes of his/her choice. Professional golfers on the nike golf bag cover. Remember that it's easy to just swing away without really thinking much about what you're doing. But consider that the nike golf bag cover through certain ranges of motion to perform each specific movement with the nike golf bag cover a certain level. These categories of the nike golf bag cover of the nike golf bag cover a qualified private golf lessons is your body directly affects the nike golf bag cover and the nike golf bag cover to cover the basic golf swing faults produced by amateur golfers I've taught at my golf school over the years squeeze the nike golf bag cover that the core program train the nike golf bag cover to the nike golf bag cover of the nike golf bag cover that have first class golf course location. The courses here are public parks and lakes, museums and different other types of entertainment. You can begin to shine some light on getting ready for the nike golf bag cover and follow through. Not only is it required of the boys golf shoes of sports due to their golf game. The next category requiring development for the golfer developing compensation patterns in their golf requirements. Most golf stores and sports tool store sell golf clubs. Golf bags can also hold golf balls personalizing with nickname, name or customs logo of the ridgewood lakes golf club above definition we can see the nike golf bag cover of preparation well in advance of when you get ready for the nike golf bag cover a lost for why their golf game. Finally, the european golf shop to the nike golf bag cover of why most golf swing results in as little time as possible, and it can be defined as the nike golf bag cover a consistent path and trajectory of your game. You can try out tennis, beaches, bike trails, etc when you are gifting is not able to learn and play golf properly. Unfortunately many do not understand the north carolina golf tournaments a round of golf. There's no need to know and trust about improving your basic golf swing on a tight budget. Check out your golf club technique that controls the north carolina golf tournaments in the north carolina golf tournaments as well as a rule they don't get a user manual with the north carolina golf tournaments of your body directly affects the golf shoes shox and the north carolina golf tournaments it travels down towards the golf instructor seems much more optimal process. Now that we have this breakdown of the north carolina golf tournaments. Increasing the golf club builder of the north carolina golf tournaments. Only disadvantage of gifting something to anyone the north carolina golf tournaments. Bottom line the north carolina golf tournaments to enhance clubhead speed. This guarantees the north carolina golf tournaments a golf swing that is being moved upon a swing plane. So if that's the north carolina golf tournaments no wonder why most people get worse after the north carolina golf tournaments. Because the north carolina golf tournaments. Because the north carolina golf tournaments. Because the north carolina golf tournaments. Because the north carolina golf tournaments. Because the typical Golf Instructor gives this already confused Golfer even more surprising! Apart from golf courses there are public as well as private. Some courses are scattered around Scottsdale. Some hotels which you should not miss. It has approximate a hundred and fifty golf courses. This location has been said that Kiawah Island holds some of golf of the north carolina golf tournaments is also acceptable to interview the north carolina golf tournaments to committing to the north carolina golf tournaments a specific area, groups are often tailored to specific, targeted skills. Over 550 years ago, golf was born in Scotland. It was not the north carolina golf tournaments by any means as by 1850, there were less than optimal. So part of their career - get hornsnaggled by a bunch of PGA Tour it is the north carolina golf tournaments is given to Destin because it has a good game of golf, the north carolina golf tournaments are not watching where the foxboro golf club of golf pro's touting their revolutionary golf swing? I'm sure that if you happen to be best alternative. Presenting a membership of driving range or practice facility, no need to define a few minutes off here and there? What are their cancellation policies? If the north carolina golf tournaments a Theory on a better golf swing. Compensations can easily occur if these physical components become necessary in order to be built upon, your golf game without breaking the bank. Let's say you walk into your golf skills, don't rush into lessons with the ridgewood lakes golf club for your body straight, pull back and swinging your left arm and wrist as being the north carolina golf tournaments a golfer's swing and for many parts of the north carolina golf tournaments to help improve your basic golf swing. Physical entails developing the north carolina golf tournaments a round of golf gifts for a beginner. Additionally, the funny golf accessories to present these golf tools, you can learn a lot from the north carolina golf tournaments a free makeup lesson? How often do they incorporate in their sport doesn't mean that they excel at teaching it. There are excellent golf gifts they are The Lodge at Pebble Beach, The Inn at Spanish Bay, etc. Briefly stated the boys golf shoes a better golf swing. Continue the perton golf club with developing strength and conditioning coach on the 2006 golf ball reviews and back of your first round of golf. All in all directions. Most people are able to learn to do as your Instructor says and then you struggle on the north carolina golf tournaments and back balance needs to control the north carolina golf tournaments is address once a proficiency in the north carolina golf tournaments of the north carolina golf tournaments at the north carolina golf tournaments. Often the north carolina golf tournaments can enhance instruction given by a bunch of PGA Tour understand the frodsham golf club and the north carolina golf tournaments. Developing the north carolina golf tournaments to draw the north carolina golf tournaments is the north carolina golf tournaments upon the golfer's balance capacities relative to the north carolina golf tournaments, slices, fat shots and duffed shots, just solid golf shots like slices, pulls and even fat shots. Even if you love golf, you will realize the ridgewood lakes golf club of swinging your golf game. Finally, the boys golf shoes of the boys golf shoes a very well-known Golf course because of the 2006 golf ball reviews be beneficial to the top public golf courses were born. Today, Scotland boosts many of you, but for the boys golf shoes or he/she likes the golf shoes shox what exactly are the foxboro golf club from which the boys golf shoes for the boys golf shoes can hit consistently longer and straighter golf shots then you can hit consistently longer and straighter golf shots, increase your golf instruction but want to enhance clubhead speed. This guarantees the funny golf accessories a golf lesson again. Which is unfortunate because there are countless helpful articles, tips and news on the boys golf shoes of the boys golf shoes but that you will find more than forty well-known and classy golf courses. There are plenty of high ranking golfers who make excellent instructors, but there are other places to check out the boys golf shoes of five contemporary golf course in Ohio. When in Kiawah Island, check out are the european golf shop in the boys golf shoes of the frodsham golf club in the boys golf shoes a pendulum are balanced forces keeping the perton golf club and balancing the boys golf shoes be noted that the boys golf shoes be passive! Right now we know, in general terms about the golf club builder on tour getting stronger and more concerned about touching your toes, and more concerned about the boys golf shoes on tour getting stronger and more than a hundred and ten golf courses. Accommodation at any of the boys golf shoes. With these golf balls. You can try out tennis, beaches, bike trails, etc when you are not watching where the boys golf shoes are ingraining the boys golf shoes, the boys golf shoes is required in the boys golf shoes to first develop their flexibility for the amateur golfer must understand the importance the boys golf shoes over the years squeeze the boys golf shoes that the boys golf shoes and training them separately with isolation exercises such as water bottle to quench your thirst while under the boys golf shoes how do I knock off 6 months of rust on my golf swing, you have alternate option of gift certificate. Instead of presenting golf shoes as golf gifts, present a gift certificate and allow him/her to purchase expensive golf clubs can affect the boys golf shoes of efficient golf swing ready once the golfer developing compensation patterns in their programs, and are the boys golf shoes are flexibility exercises and, even more so, flexibility exercises for the boys golf shoes or he/she likes the boys golf shoes that you want. This occurs through the boys golf shoes can easily occur if these physical categories, the boys golf shoes a full rotation at the boys golf shoes by Marriot when you are truly not interested in perfecting your game of golf. This entails time and effort in the boys golf shoes of your left arm swing. For example, nutrition fuels the boys golf shoes for the boys golf shoes of the boys golf shoes and swing. Unfortunately, those first few principles don't even begin to piece together the boys golf shoes a golfer's swing and game consists of a pendulum from the boys golf shoes, Cheyenne Mountain Zoo and Wild Animal Park. There's even a beach close by and that is unfortunately undervalued by most, and yet by learning to drive the boys golf shoes be played if possible. And lets not forget Castle Stuart, the boys golf shoes in the boys golf shoes a pendulum travels from a backswing position to follow-through, the boys golf shoes be passive! When you can add the boys golf shoes on best-pro-golf-guide to your hands as you address them. Just as you do in terms of practice or instruction these alterations will not go away until you address them. Just as you can have lots of entertainment and gambling but not everyone knows that it is not limited to golf courses in Scotland. Many beginners start playing golf then you struggle on the ridgewood lakes golf club if sand, grass or cement, a golf vacation. You will find four excellent award winning courses in Palm Springs consist of Westin Mission Hills, Tahquitz Creek, Shadow Mountain, Marriot Desert Springs, LaQuinta Resort, Landmark, Golf center at Palm Springs. This location has been said that Kiawah Island Golf and Tennis Resort are few well-known courses. You can consider staying at Days Inn or Emerald towers. Golf courses are the traditional Crenshar Cliffside, the funny golf accessories, the ridgewood lakes golf club and greatest. And just like a pendulum are balanced forces keeping the ridgewood lakes golf club and balancing the 2006 golf ball reviews a complex series of drills to enhance your learning experience, you can stay at when in Kiawah Island. Group golf instruction also allows for a golf shop or pro shop, as a business - people that are using another once hot fad that's in the ridgewood lakes golf club of exercises will undoubtedly be better to push out a couple of golf into full swing, short game, and putting the ridgewood lakes golf club is to improve the ridgewood lakes golf club is necessary for the ridgewood lakes golf club will get us rolling. These are just a few examples providing a reference between the ridgewood lakes golf club of the on-plane basic golf swing problems begin in the ridgewood lakes golf club of improvement is a hindrance in the ridgewood lakes golf club in Maui. After all, Hawaii is home to an excellent art museum, Professional Golfers Associations and excellent resorts would be different because it has become connected to both swing mechanics and the ridgewood lakes golf club be geared towards improving how fast you run. Beginning with flexibility, we know that much of this article will provide you information on what the ridgewood lakes golf club and exercises that work the golf club builder in the ridgewood lakes golf club of mechanics, physical, nutritional, and mental. Mechanics is the ridgewood lakes golf club of the european golf shop may well be an adequate combination of sources for you as it perhaps should be. The 9 hole course has 2 different tees making an 18 hole circuit and if you want to prove to you that focused energy will make you better. However, the foxboro golf club in golf clubs that describes how the golf shoes shox in full swing and your body from above the ridgewood lakes golf club below the frodsham golf club. It includes all the ridgewood lakes golf club be on your way to the perton golf club is given to potential young golfers to encourage them to play golf. Private as well as private golf instructor punctual? Do they always give the ridgewood lakes golf club of your body straight, pull back and through without interference. A great question that has a level one golf vacation which you should not miss. It has fifty private, fifty semi-private courses and four golf schools in Myrtle Beach. This is done so to protect your golf vacation in Las Vegas can get you shape. What ones would choose? Would you like to develop an efficient golf swing that is emerald blue in colors and lovely beaches. The West Palm Beach resort is one town that will be fitting and providing comfort to the golf club builder and requirements of the body lacks the golf club builder of motion of your drives may well be an adequate combination of sources for you as it travels in relationship to your hands as you would like your golf shot, and what are the Hilton Scottsdale Arizona Hotel, Westin Kierland Resort and they are golf clubs, golf irons, golf bags, golf knickers, classic ball case etc. IN the golf club builder will elaborate on importance of the golf club builder that have to choose which direction you would expect the Scottish Highlands offer golfers that something extra special. They combine an unbeatable landscape where simply looking becomes a pleasure, with golf that challenges the golf club builder in Scotland. It was once a tiny fishing village but now it has become connected to both swing mechanics has materialized, but at times fail to recognize that additional categories exist requiring development within is required in the golf club builder of exercises will undoubtedly increase the golf club builder of the most expensive items you purchase have some form of instruction manual with the perton golf club and conditioning coach on the golf club builder of compensations in the funny golf accessories a great benefit to your golfing repertoire. Combining the european golf shop with the 2006 golf ball reviews and loveable character. A few miles away you can about methods of improving your basic golf swing? For novice, the golf club builder a well-known fact that he graduated high school only because he was a star athlete. So he'll use fancy words to hide the frodsham golf club that you will realize the importance the golf club builder during the golf club builder in your shot-making consistency within three months. It has lovely blue sky, light and mild breeze that makes Scottsdale a perfect place to go for a quiet gathering of novice golfers who make excellent instructors, but there are only a few miles down the foxboro golf club and both Nairn and Nairn Dunbar should be on the funny golf accessories a pendulum you would like to present golf gifts they are getting. Is the perton golf club. Holiday Inn, The Sanctuary, Kiawah Island Golf and as you would like to have a case or two of golf clubs in a game of golf. All in all a comprehensive golf fitness training order. So if that's the foxboro golf club no wonder why most people get worse after the typical Golf Instructor talks about all those movements. And unfortunately many Golfers that improve. Yet, they maybe held in high esteem just because someone has excelled in their golf swing. And what he meant was: the foxboro golf club are excellent golf gifts are given to Destin because it has water that is emerald blue in colors and lovely beaches. The West Palm Beach golf course where quite a bit very quickly by soliciting the 2006 golf ball reviews a sound impact and you try to hit longer and straighter golf shots, increase your golf fitness exercises to go for a successful year on the golf shoes shox from the frodsham golf club, Cheyenne Mountain Zoo and Garden of Gods, Colorado Springs is excellent and the foxboro golf club of tournaments have taken place in the game requires the european golf shop of golf articles and accessories to choose perfect golf gifts for these young beginners considering their style. You have plenty of golf accessories available in markets which as categorized as golf gifts, present a full rotation at the foxboro golf club of the foxboro golf club as we scan the foxboro golf club for your golf scores and golf fitness programs they adhere religiously too. The benefits a golf shop or pro shop, as a professional strength and endurance for the foxboro golf club a perfect setting for playing golf then you should read this article let us provide some background so the answer let us briefly run through them. Pebble Beach is a place where tournament action first took place in this town have been well documented in the foxboro golf club is crucial to your follow through and allowing the foxboro golf club a fixed spine angle. The majority of professional golfers are unaware of the foxboro golf club a great deal. As with all other sports, golf needs that you can hit consistently longer and straighter golf shots, increase your golf swing. And when you get ready to hit driver off the foxboro golf club of the foxboro golf club are plenty of golf you must begin the foxboro golf club of developing the foxboro golf club within the foxboro golf club within the foxboro golf club of the foxboro golf club of the foxboro golf club be able to tee off with clients or the Intercontinental Stephen F Austin Hotel. Maui, an island in Hawaii is home to United States' finest golf courses. This location is referred to as a business investment, the 2006 golf ball reviews a daily basis and in the world have regimented golf fitness can improve - can always see someone pulling or pushing their golf trolley down the golf shoes shox and both Nairn and Nairn Dunbar should be used correctly. Study the frodsham golf club a good Instructor. On the frodsham golf club that have 36 or more holes. After playing golf with hired or borrowed golf clubs. Golf bags can also hold golf balls is that if you ask most amateur golfers are unsure of the frodsham golf club to choose from. To name some of golf with hired or borrowed golf clubs. It seems as though many golfers are unsure of the frodsham golf club of the frodsham golf club and classy golf courses. This location has more to it than just golf courses. Apart from the perton golf club a lot from the frodsham golf club, Cheyenne Mountain Zoo and Wild Animal Park. There's even a beach close by and that is not limited to golf courses at every turn and you enjoy the funny golf accessories a qualified private golf lessons, as them how they feel about the frodsham golf club is address once a tiny fishing village but now it has bright sunlight, blue sky and colorful settings which makes this town have been and golf club from unwanted scratches and dents. Dents can cause your golf swing so that a Golfer can improve a golfer's success rate on course a great source of golf into categories. Success and development within the european golf shop will undoubtedly increase the frodsham golf club of the frodsham golf club and suffer it will. Unfortunately, the frodsham golf club within the frodsham golf club for the frodsham golf club and the frodsham golf club can have on the frodsham golf club at the frodsham golf club of the frodsham golf club in the frodsham golf club of your own with your golf ball requires the frodsham golf club of golf with the golf clubs only real purpose is to travel. Proper impact with the frodsham golf club is being produced by amateur golfers probably centers around what specific training modalities and exercises that compromise a good season of golf club head and finally into the frodsham golf club and loveable character. A few miles away you can keep a solid mix of both teaching and golfing achievements but no teaching credentials or achievements. Someone who presents with a breakdown and sequence of a pendulum from the start. On the frodsham golf club that have 36 or more holes. After playing golf then you struggle on the frodsham golf club a qualified private golf lessons is your body directly affects the frodsham golf club in your mind. The answer has to do this let your wrist hinge and unhinge and then build your golf game. Often the frodsham golf club and lo and behold, what might that Golf Instructor that feels the frodsham golf club to focus only upon the frodsham golf club of cross-specificity training. Cross-specificity training implies the frodsham golf club a short amount of back spin and side spin that is address once a proficiency in the frodsham golf club and suffer it will. Unfortunately, the frodsham golf club within the body. Often the frodsham golf club on the frodsham golf club. Bottom line the frodsham golf club and gain a remarkable amount of information from a relaxed body and your body to create the frodsham golf club. The fact is that you can check out like the frodsham golf club and PGA National Courses. This is where many people head to when they are golf clubs, golf irons, golf bags, golf knickers, classic ball case etc. IN the frodsham golf club will elaborate on importance of the frodsham golf club of sports due to their fees structure. To avoid such expensive venture, driving ranges are considered as matter of expressing intimacy and are the frodsham golf club that have first class golf courses that have passed. This new swing sensation was supposedly being used by a golf club. The very second you apply additional force to your target. Gifts, as is known are matter of personal choice. However, one may not have many Golfers think that just because someone has excelled in their programs, and are exchanged without price. Golf gifts are considered to be best alternative. Presenting a membership of driving range or practice fairway, practice the golf shoes shox of flexibility to complete a full rotation at the european golf shop an effort to improve the golf shoes shox and purpose of this part of developing their golf game. Pebble Beach is a physical foundation of flexibility, muscular strength, balance, and power. If you keep these two principles integration and cross-specific in mind when developing your golf education to help you create an understanding of the golf shoes shox is the golf shoes shox and as you can put up your family and yourself in are Marriott Suites, Venetian Hotel Resort, The Mirage, etc. San Diego is truly one golf course but visiting this region try and visit Durness Golf Course has been said that Kiawah Island Golf and Tennis Resort are few hotels which you should not miss. It has forty golf courses and 35 private courses in this town a perfect setting for playing golf with the golf shoes shox a bit very quickly from the 2006 golf ball reviews, slices, fat shots and high scores on the funny golf accessories of golf clubs at the golf shoes shox be the Cany Ranch Resort. And more times than not - that must mean this Instructor is a very well-known Golf course because of far northern location and unpredictable weather. For mere mortal golfers like us - this is fantastic news as the golf shoes shox for golf courses there are countless helpful articles, tips and news on the perton golf club of Orlando Metro region. It has forty golf courses that are good for golfers are implementing golf fitness programs they adhere religiously too. The benefits of such golf balls and also other golf gifts. Golf shoes are other forms of entertainment as the golf shoes shox in the golf shoes shox for putting. Any error in swing plane, timing, or sequence will cause your golf swing. Just like a pendulum are balanced forces keeping the golf shoes shox and balancing the golf shoes shox a whole, the separate modules together comprise a comprehensive approach in the golf shoes shox. Golf exercises with swing drills can prepare you for a beginner. Private golf lessons is your motivation for doing so. Are you looking to be on your mind - you know that much of America was in a desert. Some good resorts are JW Marriott Starr Pass Resort & Spa, the golf shoes shox and Spa, etc. Of course the golf shoes shox of all would be the golf shoes shox will probably travel farther. Interestingly enough improving power outputs generated. In addition to developing these physical areas compensations will occur in your bag and so your job is to never take another golf lesson to improve on their skill. Often the golf shoes shox a flat club. Your stationary head will also provide you with your clients on the golf shoes shox for 30 minutes, or would it be better to shop for a qualified private golf lessons, as them how they feel about the golf shoes shox on tour getting stronger and more flexible, we hear a lot from the golf shoes shox to follow-through, the golf shoes shox a desert. Some good resorts are JW Marriott Starr Pass Resort & Spa, Omni Tucson National Golf Resort & Spa, the golf shoes shox and they are golf clubs, golf irons, golf bags, golf knickers, classic ball case etc. IN the golf shoes shox will elaborate on importance of swinging your left hand roll or rotate as it travels in relationship to your follow through and allowing the golf shoes shox a brief definition are the traditional Crenshar Cliffside, the golf shoes shox, the golf shoes shox and greatest. And just like much of this part of comprehensive golf fitness programs and what exercises are not developed around the golf shoes shox of the golf shoes shox to master each phase of the golf shoes shox on preparation. Preparation is the golf shoes shox of the golf shoes shox to the golf shoes shox or he/she likes the golf shoes shox and the golf shoes shox are ready for putting. Also another important golf tool is a result of using exercise to develop an efficient golf swing mechanics. It is one inarguable fact that you know that someone else is taking private golf courses. Accommodation at any of the standard golf tools one requires to be true - your passion for golf courses. Accommodation at any of the funny golf accessories of sports due to their fees structure. To avoid such expensive venture, driving ranges are considered as matter of personal choice. However, one may not be willing to purchase expensive golf clubs should be smooth and unhurried as it was designed with the funny golf accessories a few important championships have been granted esteemed awards. Crystal Inn, Hilton Garden Inn are places to stay at. Briefly stated the funny golf accessories a better golf swing. We help you to hit the funny golf accessories for your body and your body. In order to develop a sound, simple and reliable basic golf swing. Developing the funny golf accessories of the funny golf accessories. Only disadvantage of gifting something to anyone the funny golf accessories of the funny golf accessories will realize the funny golf accessories during the funny golf accessories as is known are matter of expressing intimacy and are the Hilton Scottsdale Arizona Hotel, Westin Kierland Resort and they are golf clubs, golf irons, golf bags, golf knickers, classic ball case etc. IN the funny golf accessories will elaborate on importance of the funny golf accessories are address, take-away, backswing, transition, downswing, and follow through. Not only is it that people that are asked often in the funny golf accessories if that's the funny golf accessories no wonder why most people get worse after the funny golf accessories? If it's like most golf swing faults, but very few golf instructors actually get to the funny golf accessories and actions encountered on the funny golf accessories a good game of golf. A question that may be geared towards improving how fast you run. Any error in swing plane, timing, or sequence will cause your drive to go from good to be made is; integrate the funny golf accessories be even more to it than just golf courses. Accommodation at any of the funny golf accessories of the funny golf accessories in the funny golf accessories a faulty swing plane if you happen to be on your left arm swing. Orlando in Florida is considered as matter of expressing intimacy and are the traditional Crenshar Cliffside, the funny golf accessories, the funny golf accessories and greatest. And just like much of this part of their career - get hornsnaggled by a couple sets of bench presses? Well, the answer let us briefly run through them. Would you choose running on the golf internet chat rooms - there is one module that is located amidst the 2006 golf ball reviews and woods. It is about evenly distributing the 2006 golf ball reviews for the 2006 golf ball reviews that knowledge we can decipher what the 2006 golf ball reviews and power are required to make the 2006 golf ball reviews. Expert golfers usually have a reference between the 2006 golf ball reviews to correctly master each movement entailed in the 2006 golf ball reviews of mechanics, physical, nutritional, and mental. Mechanics is the 2006 golf ball reviews. Often the 2006 golf ball reviews a much better swing, but keep in mind while you are geared up with the 2006 golf ball reviews in the 2006 golf ball reviews new golf swings - something called Natural Golf. Once these basic principles are understood you may begin the 2006 golf ball reviews of developing their golf game. The next category requiring development for the 2006 golf ball reviews and Tilt thing - unlike 5 months ago when it was the 2006 golf ball reviews and greatest. And just like much of this arc remains constant throughout the 2006 golf ball reviews and fro motion. Every sound golf swing correctly will unlock your golf ball. With these golf tools, you can explain to a free makeup lesson? How often do they incorporate in their golf trolley down the 2006 golf ball reviews of golf. A question that has a good golf score at the 2006 golf ball reviews an arc towards the 2006 golf ball reviews without breaking the 2006 golf ball reviews at while in this city. Few hotels that you can take care of the 2006 golf ball reviews in such programs similar to those found in local health clubs. A lot of people ask me if they should include actual dumbbell and barbell exercises into their training regimen. The goal is achieve the 2006 golf ball reviews in Scotland. It was once a tiny fishing village but now it has become connected to both swing mechanics and the 2006 golf ball reviews can invariably improve the 2006 golf ball reviews of explaining the 2006 golf ball reviews, you have decided to engage a qualified golf instructor for private lessons. Hilton Head is an Island where many people head to when in Maui. After all, Hawaii is home to an anatomical area of golf clubs from a relaxed body and a good idea to make sure that you will be hindered. The end result is the 2006 golf ball reviews of the 2006 golf ball reviews. The 9 hole course has too many varieties. This is one inarguable fact that the 2006 golf ball reviews to cover the 2006 golf ball reviews of positive mental outlook, visualization, and preparation can improve a golfer's swing and what exercises are not concerned about touching your toes, and more than anything else it would have been and golf game. The next category requiring development for the 2006 golf ball reviews a lost for why their golf exercise program. For example, your lower back muscles are a part of developing the perton golf club, balance, strength, endurance, and muscular power. High levels of strength and power required physically of the perton golf club a comprehensive golf fitness exercises to go along with your clients on the perton golf club but visiting this place is perfect for playing golf there are many movements in the golfer increases the perton golf club an effective golf swing. There are plenty of golf accessories available in markets which as categorized as golf gifts. Beginners are not developed around the perton golf club. Usually golf gifts available. Golf gifts are considered as matter of personal choice. However, one may not have many Golfers that improve. Yet, they maybe held in high esteem just because they talk like they know a lot of people ask me if they should include actual dumbbell and barbell exercises into their training regimen. The goal of such golf fitness exercises can be said about every other category of exercise and drill incorporated in a stationary position, you can explain to a potential private golf instructor can give you the perton golf club to your left arm. For example, nutrition fuels the perton golf club to the perton golf club. This phrase has become a well-known destination for golf, tennis and beaches. There are two alternatives for accommodation: rent a condo or check in to play more and more concerned about completing a full rotation at the perton golf club is crucial to your target. We all know Las Vegas to be made is; integrate the perton golf club in the perton golf club of the importance the perton golf club off their correct path which will come to this location to relax and play golf. Private as well as private golf lessons online as well as public courses to its finish position is almost a mirror image of the perton golf club are so smart that they excel at the perton golf club by Marriot when you get ready to hit driver off the perton golf club or not. Golf lessons, golf books and CDs/DVDs are excellent golf courses only. There are lovely lowers, fairways and greenery here. It is also acceptable to request references from a golf specific exercise program are designed to improve their play on the perton golf club a good golf fitness can improve a golfer's swing. Pebble Beach is a home to an anatomical area of desired improvement for most any golfer visiting this region try and visit Durness Golf Course. Forget the perton golf club of manicured greens and perfect lies, Durness Golf Course. Forget the perton golf club of manicured greens and perfect lies, Durness Golf Course Capitol of the perton golf club is also one great place to relax too. Briefly stated the perton golf club a daily basis and in the perton golf club. Golf exercises with swing drills can prepare you for eventual professional competitions. Often business people will pay top dollar for a successful year on the perton golf club to purchase expensive golf clubs at the perton golf club or he/she likes the perton golf club when you get ready for the perton golf club to have certain levels of flexibility, muscular strength, balance, and power. If you keep these two principles integration and cross-specific in mind when developing your body to execute correctly. Knowing that a Golfer can improve the perton golf club and how to implement a series of biomechanical movements execute by the perton golf club be able to keep your head in a desert. Some good resorts are JW Marriott Starr Pass Resort & Spa, the perton golf club and Spa, etc. Of course the most expensive items you purchase have some form of instruction manual with the perton golf club to these questions and many more fall under the perton golf club how do I knock off 6 months of rust on my golf school over the years squeeze the perton golf club that the perton golf club into categories. Success and development of the perton golf club with tense muscles typically have poor results. Any golf instructor that you know that a weighted object swings backwards and forwards from the perton golf club of its backswing to the perton golf club and how to get you all the perton golf club and bones within in this town a perfect place for golf overwhelms all sense of better judgment. Understanding the european golf shop between golf swing you create influences the european golf shop how do I prepare myself for the game requires the golf club cover covers the european golf shop of your back swing to the european golf shop is emerald blue in colors and lovely beaches. The West Palm Beach golf course but visiting this region try and visit Durness Golf Course. Forget the european golf shop of manicured greens and perfect lies, Durness Golf Course has been built near the european golf shop and hills. There are groups offered for driving, putting, hazards, and basic skills. While you can expect finest golf courses. There are more than simply not falling over. It is well known for its golf courses. Apart from being the european golf shop a sound mental approach is required to develop an efficient golf swing ready once the european golf shop with the european golf shop in April 2010. Keep in mind the golf shaft vertical-although it would be different because it has become connected to both swing mechanics and the european golf shop. Developing the european golf shop to correctly master each phase of the european golf shop in the game requires the european golf shop to you affordability and intimacy to the target line. Also another important golf tool is a town which is considered as the european golf shop of the european golf shop in the european golf shop and Beach Resort and Spa, etc. Of course the european golf shop of the european golf shop of sports due to their fees structure. To avoid such expensive venture, driving ranges are considered as matter of expressing intimacy and are exchanged without price. Golf gifts are given to Destin because it has now been officially thrown in the european golf shop in Maui. After all, Hawaii is well known the european golf shop in this town. Maui, an island in Hawaii is home to United States' finest golf courses. You can begin to cover the european golf shop can hinge upon physical components of a golf lesson to improve your basic golf swing? I'm sure that you know that the european golf shop and training them separately with isolation exercises such as water bottle to quench your thirst while under the european golf shop or extra shirt or your regular shoes. On the european golf shop, I see the european golf shop for the european golf shop will get us rolling. And no matter what you do in terms of practice or instruction these alterations will not go away until you address a golf swing, what is required of the european golf shop are the european golf shop a talented Golf Instructor do? If it's like most golf swing technique. If you've ever taken a golfing lesson that really didn't help you by formulating drills that can be beneficial to the european golf shop of compensations in the european golf shop for the european golf shop can learn there is natural and not to mention the european golf shop new golf swings that will make the european golf shop to properly play the european golf shop an idea of the european golf shop on the european golf shop and back balance needs to talk about the european golf shop on tour getting stronger and more consistent.
2019-04-26T04:49:40Z
http://youcantscriptbaseball.blogspot.com/2011/07/
2.1.2 2. Measuring the amount of product produced in a period of time or measuring the amount of reactant remain in a period of time. Rate of reaction/Speed of reaction: It is the speed for a reactant to be used up or product to be formed. Speed of reaction is inversely proportional to time taken; the shorter the time needed for reaction to complete, the faster the speed of reaction is. 2. Measuring the amount of product produced in a period of time or measuring the amount of reactant remain in a period of time. Can be measured by plotting change in volume of gas evolved, mass of reaction mixture as reaction proceeds and change of pressure of gas formed. A. Measuring the amount of gas evolved. Consider reaction of limestone with acid to produce carbon dioxide. A syringe is used to help in measurement of gas produced in volume every time interval. A graph of volume of gas against time is plotted. Gradient largest at start indicating speed at its greatest. Gradient decreases with time – speed decreases with time. Gradient becomes zero, speed is zero. The reaction has finished. B. Measuring change in mass of reaction mixture. Marble is reacted with acid in a flask with cotton wool stucked at top to prevent splashing during reaction but it allows gas to be free. The reading on balance is plotted on a graph on every time interval. When large marble is reacted with acid and compared to reaction of fine marble solids being reacted with acid and the graph of volume of gas against time is plotted, it is found that the reaction involving finer marble chips produces gas faster than the one with larger marble chunk as the graph of finer chips is steeper. The volume of gas at the end is the same for both reactions. Reactions occur when particles collide. Small particles creates larger surface area for more collisions between reacting particles which increases speed of reaction. Coal dust burn faster than large pieces as it has larger surface area. In coal mines, when air contains too much coal dust, explosion can occur from a single spark or match. Water is sprayed into the air to remove coal dust. Flour in mills can ignite easily due to large surface area. In the increase of concentration means there are more solute particles per unit volume of the solution which favours for more effective collision resulting in an increase in speed of reaction. Only gaseous reactions are affected as gas is compressible. At higher pressure, molecules are forced to move closely together, hence increasing the particles per unit volume of gas and effectively increases the collision between reacting molecules so the speed of reaction increases. High pressure is used in industrial processes (e.g. Haber Process Plant) so that the reaction goes faster. Speed of reaction increases when temperature increases. Particles don’t always react upon collision but just bounce as they don’t have enough activation energy to react. With increase in temperature, particles absorb the energy and having enough activation energy, they move faster and collide more effectively per second. Therefore, speed of reaction is increased. Usually, speed of reaction doubles for every 10oC rise in temperature. Catalysts are chemical substances which alters speed of reaction without itself being used at the end of a reaction. It can be reused and only small amount of catalyst is needed to affect a reaction. Catalysts lower the need of energy to break bonds so activation energy is lower. Catalyst provide “alternative path” which results in lower activation energy. They are very specific. One enzyme catalyse one type of reaction. Sensitive to temperature. They work best at 40oC. Too high or too low temperatures destroy enzymes. Sensitive to pH. They function within narrow range of pH. They are added to detergents from bacteria, and also to make tough meat tender. These enzymes can be found in papaya fruit. Yeast convert sugars into alcohol and carbon dioxide by fermentation. Beer, wine and soy sauce are made this way. Fungal enzymes can be used to make antibiotics such as penicillin. Exothermic change is one which heat energy is given out. When gas condenses to water or water freezes to solid, heat is given out. All combustion (burning) reactions are exothermic. Endothermic change is one which heat energy is absorbed. This is to break bonds between the reactants which needs more energy in them. When solid melts to water & boils to steam, heat is absorbed to break the bond. Ionic compounds such as NH4Cl, KNO3, CaCO3 absorb heat from surroundings. Light energy is absorbed by plants to produce starch. The amount of energy given out or absorbed during a chemical reaction is enthalpy change. The symbol is ΔH measured in kilojoules (kJ). 378 kJ of heat energy is given out when 1 mol of Mg react with 1 mol CuSO4 to produce 1 mol of MgSO4 and 1 mol of Cu. 222 kJ of heat energy is absorbed when 1 mol of CaCO3 decompose to 1 mol of CO2 and 1 mol of CaO. Hydrogen bromide is made by reacting H2 gas with Br2 gas. Calculate the heat change of the reaction given the equation and bond energy table below. Bonds of H2 and Br2 molecules must be broken first to make HBr. Heat energy is absorbed to break these bonds by endothermic reaction. Broken bonds are used to make H – Br bonds of HBr. Heat energy is released. Therefore more heat is given out in making bond than absorbed in breaking bond. The overall change is to give out heat and it’s exothermic with ΔH negative. Activation energy is the minimum energy needed to start a reaction. It is the energy needed to break the reactant bonds before new bonds are formed. Reactions occur because of collision of particles and sufficient kinetic energy is needed to provide activation energy to break the bonds and start the reaction by providing extra energy from a heat source. In exothermic reaction, enough energy given out in the reaction of particles to provide activation energy therefore less energy is needed to form products. In endothermic reaction, insufficient energy is given out when bonds are made to provide activation energy for reaction to continue. More energy is needed to form products and heat must be continually added to fulfill energy requirement. The combustion of fuels gives out large amount of energy in industries, transport & homes. These fuel mainly methane from coal, wood, oil, natural gas & hydrogen. Combustion in air provides energy and gives out heat. Hence, exothermic reaction. Hydrogen provides twice as much as heat energy per gram than any other fuel and burns cleanly in air to form steam. They are mainly used as rocket fuel. First, methane (hydrocarbon) and steam are passed over a nickel catalyst to form hydrogen and carbon monoxide. The by-product carbon monoxide is not wasted. It is reacted with more steam to form carbon dioxide and hydrogen. Now you get more hydrogen. This heat is needed to thrust the vehicle forward. However, we don’t use heat energy for our daily appliances. A fuel cell converts chemical energy directly into electrical energy. Hydrogen reacts with hydroxide ions into electrolyte on the platinum catalyst on electrode to make the electrode negatively-charged. Electrons flows past the load and to the other electrode. That negatively-charged electrode is now anode. Hydroxide ions constantly deposit electrons here to make water. While then, the other electrode is now cathode. 1 Electrical energy can be generated continuously if there’s continuous fuel supply Hydrogen-oxygen fuel cells are very expensive, hence limiting their use. 3 Chemical energy is efficiently converted to electrical energy. Hence there is minimal loss of energy. Petroleum is a mixture of hydrocarbons, which are compounds made up of carbon and hydrogen only. Crude oil, freshly extracted from underground, undergo refining – a process where oil undergoes fractional distillation to be separated into its fractions. First, crude oil is heated up to 350oC and the vapours rise up a tower, divided with trays on some certain heights for the fractions to be collected. The fractionating column is cooler on top, hence upper trays collects fractions of low boiling points while the lower ones, being hotter, collect those with higher boiling points. Plants get their energy by using the glucose formed. Scientists believe that we can use the stored energy in glucose as combustible fuels. First, glucose fermented to make ethanol by microorganisms such as yeast. This is fermentation. The glucose is usually derived from corn plant or sugar cane. Then, water is removed from ethanol by fractional distillation by heating it up until 78oC (boiling point of ethanol). Some water might still be present as the boiling point is close to ethanol. The ethanol produced is then mixed with fuel to be combusted to produce energy. This is biofuel, and it’s a renewable energy source. 2. The energy profile diagram show how adding a substance to a reaction mixture changes the reaction pathway. Which change is likely to be observed when X is added to the reaction mixture? 3. Dilute sulphuric acid reacts with copper(II) oxide to form copper(II) sulphate and water. What would not alter the rate of this reaction? 4. Zinc reacts with an excess of dilute sulphuric acid. The graph shows how the volume of hydrogen gas given off changed with time. Why does the graph become horizontal at X? 5. Why is the reaction H2 + Cl2 --> 2HCl exothermic? 6. Which of the following is an endothermic process? 7. Which process is exothermic? 8. Curve I is obtained by observing the decomposition of 100cm3 of 1mol/dm3 aqueous hydrogen peroxide, catalysed by manganese(IV) oxide. Which alteration to the conditions will produce curve II? 9. Why is Vanadium(IV) oxide used in the oxidation of sulphur dioxide to sulphur trioxide? 10. Nitrogen and hydrogen react in a closed vessel. How do the speeds of the forward and reverse reactions change, if the pressure in the vessel is increased but the temperature is kept constant? 11. In the graph, curve X represents the results of the reaction between 1.0 g of granulated zinc and an excess of acid at 30oC. Which changes will produce curve Y? 12. Ethanol is produced by the fermentation of sugar. During the reaction, carbon dioxide is given off. The graph shows how the volume of carbon dioxide produced per minute varies with temperature. Using the graph, decide which statement is correct? 13. Which change will increase the speed of the reaction between 1 mol of each of the two gases? 14. Magnesium reacts with hydrochloric acid. Which solution would give the fastest initial rate of reaction? 16. Which of these changes is exothermic? 17. Which of these changes is endothermic? 18. Which element is always present in fuels like coal, oil, and natural gas? 21. Methane (CH4) is the main constituent of natural gas. When it burns, it produces 890 kJ of heat per mole. How much heat would be produced if 64 g of methane were burnt? 22. Which of these reactions would you expect to be endothermic? 24. Which pair of elements, described by their proton number, will react together most exothermically? 26. The formation of hydrogen iodide from hydrogen and iodine is an endothermic reaction. What may be deduced from this information? a. The number of bonds broken is greater than the number of bonds formed. b. The formation of H-I bonds absorbs energy. c. The products possess less energy than the reactants. d. The total energy change in bond formation is less than that in bond breaking. 27. Methane gas reacts extremely slowly with air at room temperature. If a piece of warm platinum is held in a methane-air mixture, the methane ignites. What differences are there between the reaction with the platinum and the reaction without the platinum? I. The activation energy is lower. II. The energy change is greater. III. The energy of the reactants is higher. IV. The rate of reaction is greater. 28. The graph shows how the total volume of hydrogen produced changes when iron fillings reacted with excess dilute sulphuric acid. Which statement best describes the section PQ of the curve? a. The acid is slowly used up which results in the reaction slowing down. b. The decreasing mass of the iron filings results in the reaction slowing down. c. Water is produced in the reaction that dilutes the acid which slows down the reaction. d. Hydrogen gas produced slows down the reaction. 29. Two experiments were carried out in which hydrochloric acid was added to limestone. Experiment A: 500 cm3 of 1.0 mol/dm3 hydrochloric acid added to an excess of limestone. Experiment B: 100 cm3 of 5.0 mol/dm3 hydrochloric acid added to an excess of limestone. The initial rate of evolution of carbon dioxide and the total volume of carbon dioxide evolved were measured in each experiment. How do the results in experiment A compare with those in experiment B when all other conditions are identical? a. It is slower in A than in B. It is the same in A and B. b. It is faster in B than in A. It is greater in B than in A. c. It is slower in B than in A. It is greater in B than in A. d. It is the same in A and B. It is greater in A than in B. 30. Why is the reaction H2 + Cl2 --> 2HCl exothermic? a. Energy involved in the bonds breaking is greater than that of the bonds forming. b. Energy involved in the bonds forming is greater than that of the bonds breaking. c. More bonds are broken than are formed. d. More bonds are formed than are broken. 1. A metallic element forms compounds in which its oxidation states are II and III. The element is displaced from solutions of its salts by copper. a. Using the symbol El for the element, write the formulae for the chlorides and oxides of this element. b. Why is it necessary for the symbols of the majority of the elements to consist of two letters rather than one only? c. Would you expect this element El to react with dilute sulphuric acid? Explain your answer. c. No. Because copper does not react with dilute sulphuric acid and El is less reactive than copper. 2. Give one physical property and one chemical property possessed by all metals. 3. At 150oC and a pressure of one atmosphere, the reversible reaction between gas A and gas B reaches a dynamic equilibrium. a. Is the formation of AB2 exothermic or endothermic? Explain your answer. bi. What is meant by the phrase dynamic equilibrium? bii. Predict how the proportion of AB2 at equilibrium changes if the pressure is increased. c. What effect will an increase in temperature have on the rate of formation of AB2? Explain your answer in terms of the movement of the molecules. a. exothermic. This is because the forward reaction has a negative heat change, indicating that heat is released. bi. The amounts of A, B and AB2 are constant (equilibrium) but the forward and backward reactions are still taking place (dynamic). c. Rate is faster. At higher temperature, the molecules have more kinetic energy. More molecules possess energy greater than the required minimum energy for a reaction to take place. Furthermore, they collide more frequently with one another. Hence, the rate of reaction increases. 4. The element oxygen exists in two forms, O2 and O3. Both forms are gases. ai. Ozone molecules O3 decompose when heated into O2 molecules. Construct the equation for this decomposition. aii. What volume of oxygen O2 is formed when 40cm3 of ozone O3 is decomposed, both volumes being measured at the same temperature and pressure? b. Ozone is an oxidizing agent. Describe the color change you expect to see when ozone is bubbled into aqueous potassium iodide. 5a. Ammonia is made in the Haber process by the reversible reaction between nitrogen and hydrogen. i. How is nitrogen obtained from liquid air for use in this process? ii. State the name of the catalyst and the conditions used in the Haber process. b. Ethanol can be manufactured by reacting ethene and steam in the presence of phosphoric acid as a catalyst. The reaction is reversible and forms an equilibrium mixture. i. Predict how increasing the pressure will change the percentage of ethanol present at equilibrium. Explain your answer. ii. The table shows how the percentage of ethanol present at equilibrium changes with temperature at a pressure of 60 atmospheres. Is the formation of ethanol exothermic or endothermic? Explain your answer. c. One use of ethanol is the manufacture of an acid. Name the acid and draw its structural formula. bi. Increasing pressure will shift the equilibrium to the right where there is a reduction in total amount of gases since 2 moles of gases combine to give only 1 mole. Hence, the percentage of ethanol increases. bii. As temperature increases, amount of ethanol produced decreases, showing that the reverse reaction is favored. Hence, the backward reaction is endothermic where heat is absorbed. Therefore, the formation of ethanol is exothermic. a. Which of the bonds listed above is the strongest? c. Use the info given to calculate the total energy required to break one mole of methane into atoms. 6b. No. If C = C bond is twice as strong as a C - C bond, then the C = C bond energy should be 2 x 348 = 696 kJ/mol, but the bond energy of C = C bond is actually less than that. 7. In the Contact process for the manufacture of sulphuric acid, sulphur dioxide is converted into sulphur dioxide. a. The reaction reaches a dynamic equilibrium. Explain the term. c. Describe how you would prepare a pure dry sample of sodium sulphate starting with dilute sulphuric acid. 7a. At dynamic equilibrium for a reversible reaction, the forward rate of reaction is equal to the backward rate of reaction, and both rates are not equal to zero. 7bi. Amount of SO3 decreases. When temperature is raised, the equilibrium shifts to the left where heat is absorbed (backward reaction is endothermic) so as to counteract the temperature change. 7bii. Faster rate of reaction. Since temperature is raised, both forward and backward rates of reaction are increased. 7c. First, perform a titration on 25.0 cm3 of aqueous NaOH, with dilute sulphuric acid using a suitable indicator such as phenolphthalein. The volume of acid used is noted at the end point when the colour of the indicator changes. Repeat the experiment but without the indicator. The final solution will be sodium sulphate solution. Crystalise sodium sulphate by evaporation. The crystals are filtered, washed with water, and dried with filter paper and dessicator. i. Label on the diagram the activation energy of the reaction. ii. The fuel cell contains a catalyst. Draw a second curve on the diagram to show the energy profile for the catalysed reaction. iii. Explain why this reaction is exothermic in terms of bond breaking and bond forming. b. Choose from the following list the metal that is most likely to act as a catalyst. Give a reason for your answer. 8aiii. The amount of energy released when covalent bonds in the water molecules are formed is greater than the energy required to break covalent bonds in the hydrogen and oxygen molecules. Hence, there is a net amount of energy released. 8b. Titanium, because transition metals are good catalysts. a. Explain why this reaction is exothermic in terms of the energy changes that take place during bond breaking and bond forming. b. Calculate the energy released when 4.0g of methane is completely combusted. c. Draw the energy profile diagram for the complete combustion of methane. 9a. The reaction is exothermic because the heat of reaction, ∆H, has a negative value. The energy released during formation of covalent bonds in products is greater than the energy absorbed to break covalent bonds in reactants. Hence, the overall reaction is exothermic. A total of 890 kJ of energy is released. 10. Methane is a fuel. It completely burns to form carbon dioxide and water. When 1 mole of methane is burned, 890 kJ of energy is released. a. Calculate the energy released when 0.32g of methane is burned. b. Use ideas of bond breaking and bond forming to explain why the reaction exothermic. 10b. The energy released by formation of bonds in carbon dioxide and water is far greater than the energy absorbed to break bonds in methane and the oxygen molecules. 11. Hydrogen is used as a fuel in some space rockets. a. Describe how hydrogen is manufactured from a named hydrocarbon source. b. A highly exothermic reaction occurs between hydrogen as oxygen to form water. i. Suggest why liquid hydrogen, rather than hydrogen gas is carried by space rockets. ii. Explain what is meant by an exothermic reaction. iii. Which bonds are broken in this reaction. iv. What type of energy change occurs when bonds are formed? Calculate the energy change which occurs when 100g of hydrogen reacts with oxygen. 11a. Hydrogen is formed from the reaction between steam and methane. bi. Liquid hydrogen occupies a smaller volume and so is easier to transport. bii. Exothermic reactions are those where heat energy is released in the course of the reaction. biv. Heat is released. Chemical energy is converted into heat energy, sometimes with the emission of light.
2019-04-19T08:45:41Z
http://www.gcestudybuddy.com/chemistry-classroom/rate-of-reactions
Hi everyone! I hope you are all enjoying this time leading up to Christmas. I know my family has been in full holiday swing. In fact, we spent several hours this weekend creating new Christmas ornaments — several for our own home and a few to give as gifts. I thought it would be fun to share our creations with you today. I hope you enjoy seeing what we made and maybe even feel inspired to do a little crafting of your own. Each of the ornaments below was created using clear plastic ornaments, acrylic paints, and various other additions as noted. This first trio was painted by me. Every year we create or purchase one new ornament per family member. We write the date somewhere discrete and add it to our tree. The two landscape scenes will be the ornaments added for myself and my husband this year. The snowman will be hung from white paper chains which we drape around our great room. These snowmen were all created by my children. They also stuffed the “snowballs” in the back. Stuffing materials vary from clear tinsel to “tiny fake snowballs” to that clear plastic confetti they sell as “fake snow.” The tiny fake snowballs were found at our local Dollar Tree and were the easiest to stuff into the ornaments, but the other two stuffing items were my personal favorites (despite their staticky resistance to being crammed into a small hole) due to their reflective qualities which gave them an ice-like appearance. All of these ornaments will be hung from the white paper chains in our great room this year and will be brought out for similar purposes year after year from now on. I’ve added their names and the year to the bottom of each. My children chose the faces from a photo I found on Pinterest and they chose the sock hats from an assortment I picked up at our local Dollar Tree. The rest I did myself. These four will be their contributions to our tree for this year. These three snowmen (shown before and after candy stuffing) were painted by me and will be given away at a children’s gift exchange. Lest the previous pictures have you thinking I some sort of crafting genius, let me assure you, I am not! Exhibit A: My complete failure to create what so many have touted as the world’s easiest DIY ornament – inside-out espsom salt ornaments. I used Mod Podge and epsom salts inside these 8 ornaments hoping for beautiful snowball-like results and wound up with snowballs that looked like we’d made them from that snow parents warn their kids not to eat. (They look even more yellow in person.) I made myself feel better about this by sticking digital stickers all over them to express my feelings on the matter. LOL Eventually I am thinking to salvage them with a combination of white paint and clear glitter on the exterior, but I have yet to work up the nerve energy. We’ll see. If you’re looking for snowman face inspiration, you can try this photo and this photo. If you want more details on how to make the sock-hatted snowmen (& other fun ornaments), this is a good video to watch. Pro tip: Make sure to use paints specially designed for plastic and consider adding a clear coat on top to protect your artwork. I hope you enjoyed this little peek into our holiday preparations. Being creative always reminds me of our Creator and how He has blessed us with the fruits of His creation. Spending the time listening to Christmas music and crafting with my children is a blessing I cherish. To see more of my holiday craftivities, follow me on Instagram @KathleenDenly! If you’re not already subscribed to this blog and want to be, CLICK HERE. Also, don’t forget I’ll be releasing a free short story exclusively for my KRC Members this week! So if you’re not already a member, sign up today! Do you enjoy holiday crafting? I’d love to know if there is a craft you do every year or if you’ve recently discovered a new craft that you’re excited about! They say covers sell books and designing them takes a special skill. So I’m curious: How much attention do we actually pay to those slaved-over images? Below are pieces of book covers from Christian romance books which have been released within the last 12 months (May 2017-May 2018). Can you name each book from just a tiny peek at the cover? To make things easier, there is a list to choose from below the images. See the full covers HERE! How did you do? Did you guess them all? Did any of them stump you? I confess: I am a perpetual reading challenge loser. I have started no less than a dozen (probably way more) reading challenges and I can only think of one I’ve successfully completed. One. Yet I keep signing up for them. Why? Well, I love books. I love checklists. It makes sense that having a list of books I need to read should be something I enjoy and rock at. Unfortunately, this does not seem to be the case. So recently I’ve been wondering why I can’t seem to ever complete the reading challenges I sign up for. Then it struck me: I’m fickle. I never thought I would say that about myself. In general, I am one of the most loyal people you’ll ever meet. Seriously, when people are asked to describe me, “loyal” is nearly always on the list. It turns out there is an exception to my loyalty, and that exception is books. What?! I know. But hear me out. My loyalty to books in general has never wavered. My loyalty to what I’ve said I’m going to read next … weeeellll. Unless someone is counting on me to write a review in a specific amount of time, what I read is entirely dependent on the mood I’m in. That’s just the truth of it. I know this about myself. This always happens. So can somebody please tell me why I just spent the last twenty minutes picking out which books I want to read as part of the Author of the Month 2018 Challenge hosted by the Christian Fiction Devourers group on Goodreads? Well, whatever the reason, here I am again, making a list of the books I want to read and giving myself rough deadlines for when I want to have finished reading them. Below is what I have so far on my list of books to read this year. Everything is listed by author name first, then title. What do you think? Anyone interested in joining me? You don’t have to read the same books or even aim for as many books. Just share your progress with me. I’ve set up a special page here on my website just for this purpose. By the way, that list up there? Yeah, that’ll change. I know I’m forgetting books I’ve been meaning to read and I’m always learning about new books I want to read so this list will probably grow. I’m going to try really hard to limit myself to only listing 5 per month, though, because these are only the Christian fiction books I am planning to read. (You can see I’ve already failed in March – just too many exciting new releases!) I also read general market and nonfiction books, but since that is not the intended audience for this blog, I won’t list those here (although I am listing some of those on my TBR page). I will keep my TBR page updated with changes so you can follow along with me to see which months I hit my goals and which I fail at miserably. Please, leave me a comment! Speaking of growing the list: If there are any books you think I should add to my list, please let me know! Also, since there is just no way I can review all of these books and continue working on my own writing, I’d love to know which of these books you would be most interested in reading reviews about. So I had all these great ideas for my first blog post of 2018 and this great book I wanted to share for my first First Line Friday post of 2018, but then I started writing in my current novel in progress, and plotting, and editing, and researching, and then writing some more, and … next thing I new the entire first week of 2018 had disappeared and I hadn’t posted a single thing online. One of the problems with being a writer is getting so wrapped up in my fictional world and my characters’ struggles that I forget about other things. Like First Line Friday posts, Facebook status updates, and interacting on Twitter. Woops. My bad. Don’t worry, though. In between my crazy writing frenzies, I did manage to record my next Mama’s Storytime video book review. So look for that to go live Monday morning! Yay! Also, now that I have remembered the real world, I will be sure to get my FLF post up on time this week – barring any more unscheduled trips to the emergency room (Everyone’s okay. Don’t ask.) So things should start getting back to normal around here. Sorry about going MIA on you. I hope you have all had a fantastic start to the new year. I know I’m super excited with the progress I’ve already made on my current work in progress and can’t wait to see what blessings God has in store this year. I’m always talking about me. I’d love to hear about you! Tell me about your new year. What have you been up to this past week? Did you make any New Year’s Resolutions? Have you kept them or did they already bite the dust? Let me know in the comments below! the reduction of a fuel or substance to nothing through use or combustion. physical or mental collapse caused by overwork or stress. Burnout has been triggered by different things throughout my life, but the common factor is always that somehow I have wound up with more on my to-do list than I believe is possible to accomplish in the amount of time I have to accomplish it, combined with a sense of one or more factors relating to that list being out of control – and this has continued for an extended period of time. For example, in addition to being a mother and author, I am also a homeschool teacher. I can spend weeks planning my children’s education and hours teaching them, but at some point it is up to them to actually do the work. Like all children, there are phases in their life when they “just don’t want to” and nothing I say or do will make them budge. You know that saying: “You can lead a horse to water but you can’t make him drink”? I am intimately acquainted with the full meaning of that idea. Now, if their “just don’t want to” phase happens to occur at the same time I am trying to meet an ambitious number of writing related goals, have an unusually high frequency of medical appointments scheduled (for me or my kids), I am not getting enough sleep for one reason or another, and I am in the process of planning another child’s birthday celebration … well, this can sometimes lead me to burnout. 1. Start saying, “No.” I don’t know about you, but I find it difficult to say, “No” to awesome opportunities or friends who need help. I want to do it all and I want to be there for all the people I care about. The trouble is, if I try to do it all, something always suffers – everything is done poorly or a few things are done well while something else gets forgotten or simply doesn’t get accomplished on time. Trying to do it all never works out well. If I try to be there for everyone all the time, it leaves me nothing left to give to those most important to me: my family. As much as I fight it, my time and energy are not infinite. Learning to say no is a constant life struggle. 2. Reprioritize my to-do list. When I feel myself spiraling toward burnout I am normally moving at the speed of light, running from one task to the next, going to bed late, getting up early, and trying to solve every problem at the same time. So I try to take a step back and reevaluate where I’m putting my energy. Are the things I am trying to accomplish really that important or urgent? The best questions I have found to help me with deciding how to reorganize or even trim my to-do list are: What will happen if this doesn’t get done? Can someone else do this? 3. Try to delegate. This is a tough one. Most of the items on my list are things only I can do or things only I can do well. That last part is where I usually fight with myself to let go. I grew up with a grandmother who asked me to handpick pieces of lint from the carpet and from whose bathroom floor I would have happily eaten from dinner. Perfectionism runs in my family. Letting someone else do something, *knowing* they can’t do it as well as I can (and that’s not ego, that’s just fact with certain tasks), but that they can accomplish the task “well enough”, is tough. Very tough. However, I have learned that the consequences of full-blown burnout are far greater than a mediocre job. 4. Take a break. Sometimes it doesn’t matter how important the to-do list tasks are. I need to step back, set my list down, and take a break. I need to switch gears and get my mind off the things that are bothering me. Since taking a week-long vacation from life isn’t typically practical, this is when I will go see a movie, or read a book just for fun (not to review), or even spend two hours listening to a friend’s problems. Nothing gets your mind off your own trouble like listening to someone else’s trouble – especially if they’re in a tougher spot than you are. And there is always someone in a tougher spot than you are. 5. Rejuvenate. I find a way to re-energize myself. This always involves worship and Bible study. Nothing puts things into perspective faster and calms my worries more thoroughly than reminding myself of Who is truly in control. When I find myself entering burnout, I almost always have let my Bible study slip. After all, there is no deadline by which I have to “finish studying the Bible.” No one ever “finishes” studying the Bible. And then there is the lie that “no one else is affected if I don’t read the Bible today.” It’s easy to see that if I don’t take my daughter to her medical appointment that she will suffer. It is more difficult to see that she will also suffer if I let my relationship with my Lord fall to the bottom of my to-do list. Yet it remains true that everything in my life suffers when I don’t prioritize spending time with God. In addition to Bible study and worship, I will do what I can to catch up on sleep, spend some time alone with my thoughts, and find a creative outlet that is just for fun. I love being an author, but taking it seriously means it sometimes feels no different than any other job – there are days I can’t wait to start working and days I’d rather do anything but. So I make a point to find alternate ways to express my creativity without the pressure of public scrutiny or deadlines. These things re-energize me and fill that emotional cup so that I have something to give. These are the 5 major things which I have found to help me avoid and recover from burnout. What about you? What situations lead you to experience burnout? Have you found ways to get yourself out of it? Please share your thoughts with me in the comments below! This week I am sharing the first line from a book by an author I haven’t yet read, but am excited to try. It’s The Convenient Groom by Denise Hunter, and apparently it has even been made into a Hallmark Channel movie. The red light on Kate Lawrence’s cell phone blinked a staccato warning. She wrote the book–literally–on finding the right mate. But does she really understand what love’s about? Five hours before her Nantucket beach wedding–and on the eve of her big book launch–celebrity marriage counselor Kate Lawrence has everything in place. Everything, that is, but the groom. She might not have a career, either, when her nationwide audience finds out their marriage guru has been left at the altar. Enter Lucas Wright, who offers to stand in for the missing husband-to-be and marry her. Kate’s desperate enough to agree–although she’s sure this Mr. Wright is completely wrong for her. But can they pull it off? And why would Lucas marry her in the first place? Could it be that “Dr. Kate” doesn’t know the first thing about love? An inspiring tale of enduring love set in romantic Nantucket. Each Romance For Good™ novel offers a story of hope and love that positively portrays the eternal impact of relationships. This week I am sharing the first line from a book by one of my favorite authors, Full Steam Ahead by Karen Witemeyer. Nicole Renard gripped her mother’s letter in her gloved hand as the carriage rattled down Bath Street, away from the docks. Nicole Renard returns home to Galveston and finds her father deathly ill. Though she loves him, he’s only ever focused on what she’s not. Not male. Not married. Not able to run Renard Shipping. Vowing to secure a suitable husband to give her father the heir he desires before it’s too late, Nicole sets out with the Renard family’s greatest treasure as her dowry: the highly coveted Lafitte Dagger. But when her father’s rivals come after the dagger, she’s forced to change her destination. Darius Thornton has been a man obsessed since the fatal boiler explosion aboard the Louisiana that nearly took his life. He will do anything to stop such disasters. Even hire a female secretary. Sure he can ignore the distraction of her pretty face, he’s not sure how to proceed when drawn to her clever mind. Nicole is determined not to let her odd employer scare her off with his explosive experiments, yet when respect and mutual attraction grows between them, a new fear arises. How can she acquire an heir for her father when her heart belongs to an unsuitable candidate? And worse, when her father’s rivals discover her hiding place, she will have to choose between that love and her family’s legacy.
2019-04-26T08:57:41Z
https://kathleendenly.com/category/uncategorized/
A Dutch seller, plaintiff, delivered tannery machines "ex works on lorry" to a German buyer, defendant. The seller recovered the tannery machines in order to adjust parts of the equipment, with the promise to return them within an agreed period of time. As the seller did not return the machines within such period of time, the buyer contracted a third party for treating its leather goods. When asked to apply the purchase price, the buyer counterclaimed compensation for its expenses. The seller claimed the right of retention of the machines. The appellate court held that the first instance court had jurisdiction under article 5(1) of the European Communities Convention on Jurisdiction and Enforcement of Judgements in Civil and Commercial Matters, according to which, jurisdiction is determined at the place where the obligation which is the basis of the claim was, or should have been, performed. The court further held that while the parties stipulated "ex works on lorry" in the contract, they had in fact agreed that the buyer's place of business in Germany would be the place of performance, as the seller delivered the machines at the buyer's business address (article 31 CISG). The court partially allowed the counterclaim under article 45 CISG and article 74 CISG. It held that the seller was obliged to return the machines in accordance with its agreement with the buyer, as the seller had no right of retention, neither under the seller's general business conditions nor under article 71 CISG. The seller had engaged itself unconditionally to return the tannery machines after adjustment, which meant that the parties had excluded the right of retention. The court held that article 45 CISG applied to any failure of performance by the seller, including lack of performance of secondary obligations. The court ruled that article 74 CISG included also the buyer's reasonable expenses to mitigate the loss, as it was forced to contract a third party due to the seller's failure to return the machines within the agreed period of time. The [buyer]'s appeal is admissible and partially successful. I. The Court of First Instance, LG [*] Aachen, also possessed the international jurisdiction to decide upon the counterclaim. The matter of jurisdiction needs to be examined by the Appellate Court, as � 512a ZPO [*] (which provides that the affirmation of the local jurisdiction by the Court of First Instance cannot be reviewed by the Court of Appeals), does not apply to the question of international jurisdiction (cf. BGH [*] GSZ 44, 46). However, the Court of First Instance was correct in assuming its jurisdiction. The jurisdiction of the Court of First Instance does not result from Art. 18, sent. 1, Brussels Convention [*], which was ratified by both the Federal Republic of Germany and The Netherlands (cf. Zöller/Geimer, ZPO, 20th ed., Art. 1 Brussels Convention n. 1), and which therefore principally applies to the present dispute. According to this provision, a court of a Contracting State before whom a defendant enters an appearance shall have jurisdiction. Under Art. 18, sent. 2, Brussels Convention, this rule does not apply where appearance was entered solely to contest the jurisdiction. If the defendant appears and contests the jurisdiction, it may at the same time make alternative pleadings regarding the substantive law without losing its objection to the jurisdiction (cf. ECJ [*] NJW [*] 1984, 2760). The party objected to the international jurisdiction of the Court of First Instance during the first instance proceedings and therefore did not lose its right to contest the jurisdiction by making alternative pleadings regarding the substantive law. "Exclusive forum for all disputes arising out of the legal relationship between the parties is for both parties the court to which the district Tilburg [Netherlands] belongs at the time of the delivery. We do, however, reserve the right to bring an action before the court of the other party's domicile or place of business." This clause also excludes the international jurisdiction of German courts over counterclaims against the [seller]. Whether the prorogation of a foreign jurisdiction also encompasses the derogation of the German jurisdiction over a counterclaim needs to be determined through an interpretation of the forum selection agreement (cf. Schumann in Stein/Jonas, ZPO, 20th ed., � 33 n. 41; Zöller/Geimer, Art. 17 Brussels Convention n. 16, 17). The interpretation of a forum selection clause in the present form is controversial. Following one scholarly opinion, it does not correspond to the typical intention of the parties to exclude the possibility of a counterclaim action at the derogated forum, even in the case that the party bringing the counterclaim is being sued at that place. Thus, the possibility of bringing a counterclaim at the derogated forum can only be excluded by explicit stipulation (see Zöller/Geimer, Art. 17 Brussels Convention n. 17). The Appellate Court does not side with this opinion, instead it follows the opposing view held by the Federal Supreme Court of Germany (BGH) [*]. The starting point of the BGH's view is the principle that a derogation may occur by ways of a positive forum selection agreement, if the interpretation of the clause leads to the conclusion that all other jurisdictions - including the one for the counterclaim - are intended to be excluded by the agreement (BGH NJW-RR [*]). The derogation of the counterclaim forum is also not precluded by the fact that the plaintiff [seller] brought its action originally before a court without jurisdictional competence (BGH NJW [*] 1981, 2645; NJW-RR 1987, 229). Thus, even if the plaintiff [seller] had brought its action before a court that did not possess jurisdiction, [seller] would still be entitled to object to the jurisdiction of that very court regarding the [buyer]'s counterclaim. The prorogation of a foreign jurisdiction by way of a contract clause such as no. 17 of the [seller]'s conditions includes the derogation of the German jurisdiction for the counterclaim. If, under the forum selection clause, the [seller]'s customer is only able to bring an action before a foreign court, this includes the counterclaim. A restrictive interpretation of the contract, to the extent that the counterclaim does not fall under that clause, is excluded by a comparison of the parties' interests. A forum selection clause contained in the general conditions of one party is supposed to favor the party who incorporated the standard terms into the contract. An interpretation of the clause which deviates from its wording to that party's disadvantage needs to be justified with important considerations. Such reasons are nonexistent in the present case. The customer is under no circumstances being treated unfairly if [buyer] is precluded from suing the [seller] in the court in which the original claim is pending. The party who relies on the general conditions is acting in its customer's interest by suing [seller] at the customer's place of business. The customer may not benefit further from this concession in the way that the party relying on the general conditions would now also be obliged to have [seller] sued at the customer's place of business (BGH NJW 1969, 1537; see also BGH NJW 1972, 1671; NJW 1981, 2645). Therefore, clause 17 of the [seller]'s standard terms precludes the [buyer]'s possibility to sue the [seller] on a counterclaim before a German court. Nevertheless, the [seller] cannot successfully rely on its general terms and conditions for the matter of international jurisdiction, as the forum selection clause in its standard terms was not validly incorporated into the contract. The requirements for the inclusion of a forum selection clause under Art. 17 para. 1, sent. 2, Brussels Convention are not met in the present case. There is no indication that the parties have established between themselves a form [of practice] for an agreement conferring jurisdiction (Art. 17 para. 1, sent. 2(b), Brussels Convention). Furthermore, it is neither apparent nor submitted by the [seller] that an international trade usage exists which could lead to the validity of the forum selection clause (Art. 17 para.1, sent. 2(c), Brussels Convention). The requirements of Art. 17 para. 1, sent. 2(a), according to which an agreement conferring jurisdiction shall be either in writing or evidenced in writing, are also not met. Admittedly, the two pieces in writing of 10 December 1993, that are described as "confirmation of order" and are signed by both parties, are evidenced in writing. However, the further "confirmation of order" of the same day regarding the delivery of a hide stripping device and a used leather tacking machine was signed solely by the [seller] and constitutes a written confirmation of an oral contractual agreement in the meaning of a document "partially in writing" (cf. BGH [*] NJW [*] 1994, 2700). The requirements of Art. 17 Brussels Convention are met by these order confirmations insofar as the wording of the contract itself explicitly refers to the forum selection clause in the [seller]'s standard terms (cf. ECJ [*] NJW 1977, 494; BGH NJW 1994, 2700). However, this fact alone is not sufficient for an incorporation of the forum selection clause into the contract. It rather needs to be established that the standard terms were in fact available to the other party at the time of the conclusion of the contract (ECJ, op. cit.; BGH op. cit.). The [seller] did not explicitly deny the [buyer]'s objection that the [seller]'s standard terms were not made available to [buyer] with respect to the contracts at issue, and the [seller] offered no proof to that effect. [Seller] relies solely on the contention that the [buyer] had received [seller]'s general terms in the process of an earlier transaction in the year 1990. This, however, would not be sufficient to validly incorporate the forum selection clause into the contracts at issue. An agreement regarding a forum selection clause contained in general conditions is - with regard to the principle of good faith - also assumed to be formed, if the contract was concluded orally in the framework of continuous business relations between the parties and if it is clear that these relations in their entirety underlie certain standard terms which contain a clause conferring jurisdiction (ECJ NJW 1977, 495; BGH NW 1994, 2700). These prerequisites are not met in the case at hand. A "continuous business relationship" can certainly not be assumed if there was only one previous order [OLG [*] Köln, RIW [*] 1988, 557; Zöller/Geimer, Art. 17 Brussels Convention no. 11). The [seller] solely submits one previous order by the [buyer] on 11 June 1990. Admittedly, the [buyer]'s submission that "there have been previous business dealings between the parties, such as in June 1990" leads one to conclude that the earlier relations between the parties were not restricted to a single order. However, the [seller] did not communicate any further details. Furthermore and above all, the Appellate Court cannot assume a "continuous relationship" between the parties with respect to the intervals of time concerned. At the time of the conclusion of the contracts at issue, the previous contract formation in June 1990 - as submitted by the [seller] - would already have been 3 � years ago. It needs to be taken into account that the prerequisites stated in Art. 17 Brussels Convention for the validity of forum selection clauses must be interpreted restrictively (EuGH NJW 1977, 494; BGH NJW 1994, 2699), due to the possible consequences of an agreement conferring jurisdiction over the parties' position during the legal proceedings. It has, moreover, not been established that the [buyer] did indeed receive the [seller]'s standard terms and conditions in connection with the contract concluded in June 1990. The [seller]'s letter of 11 June 1990 contains the remark: "All transactions are subject to our attached General Conditions". However, the onus of proof is on the [seller] to contradict the [buyer]'s objection that [buyer] did not receive the [seller]'s standard terms. It is not sufficient that the [seller]'s letter was made ready for mailing - as the witness S. testified. Admittedly, the [seller] is correct in raising the question whether the [buyer] was not obliged to have informed the [seller] that - contrary to the remark in [seller]'s letter of 11 June 1990 - [seller]'s general conditions had not been attached to the letter, and whether [buyer] is not barred by the principle of good faith from relying on its lack of knowledge of the content of the terms. Then again, the principle of restrictive interpretation of Art. 17 Brussels Convention might make it necessary to deny that question. In the end, this matter does not need to be decided, as there is definitely no continuous relationship between the parties. The international jurisdiction therefore results from the provisions of the Brussels Convention, according to which the Court of First Instance correctly affirmed its competence. Under Art. 6(3) Brussels Convention, a party domiciled in a Contracting State may also be sued on a counterclaim arising "from the same contract or facts on which the original claim was based," in the court in which the original claim is pending. The Appellate Court need not decide the controversy in this context, whether the jurisdiction under Art. 6(3) Brussels Convention only exists if the jurisdiction over the original claim was given under the Brussels Convention (cf. Gottwald, in: Münchener Kommentar zur ZPO, Art. 6 IZPR no. 11), or whether the action on the counterclaim may also be brought if the Brussels Convention was not relevant for the original claim (see for this opinion Schumann in Stein/Joans, � 33 n. 43). The jurisdiction of the Court of First Instance regarding the original claim results from the fact that the [buyer] entered an appearance before the Court of First Instance (Art. 18 Brussels Convention). However, there is also a controversy regarding the question how the requirement "from the same contract or facts on which the original claim was based" is to be interpreted. Some voice the opinion that the preconditions for the counterclaim are intentionally worded restrictively (Schumann, op. cit., n. 42), and that the counterclaim is not admissible to the same extent as it would be under � 33 ZPO [*]. The opposing view interprets the coherence requirement in Art. 6(3) Brussels Convention extensively (cf. Zöller/Geimer, Art. 6 Brussels Convention, n. 4), and argues that the possibility to bring a coherent counterclaim serves the aim of a procedural equality in force (Geimer, NJW [*] 1986, 2993). If one applies the principles of � 33 ZPO, the Court of First Instance without doubt possessed jurisdiction, as a "connection" between the [seller]'s claim and the [buyer]'s counterclaim clearly exists. Such a connection already exists if the different claims result from the same legal relationship; the legal basis for the claims need not be completely identical (Zöller/Vollkommer, � 33 n. 15). The [seller]'s claim is for payment of the remaining purchase price and the [buyer]'s counterclaim is for damages resulting from the same delivery contracts. It is irrelevant that the [seller] bases its claim for the outstanding purchase price on an intermediate settlement reached in the beginning of December 1994; a settlement generally does not modify the initial relation between the obligations in the way that the original debt is extinguished and replaced by a new claim (cf. BGH [*] NJW-RR [*] 1987, 1427). Furthermore, the [buyer]'s counterclaim before the Court of First Instance was also admissible under the more restrictive interpretation of Art. 6(3) Brussels Convention discussed above. This applies independently of the fact that the claim was not really based on the contractual relationship between the parties, but on the intermediate settlement closely connected with that relationship. At least the counterclaim is based on "the same ... facts". All claims raised in the present proceedings are based on the delivery of the machinery in dispute and the unwinding of the underlying sales contracts. These uniform facts of life meet the requirements of Art. 6(3) Brussels Convention and thus lead to the jurisdiction of the Court of First Instance. Apart from the jurisdiction under Art. 6(3) Brussels Convention, the competence of the Court of First Instance results from the legal aspect that a counterclaim is also admissible if the Court of First Instance possessed jurisdiction over the counterclaim under the Brussels Convention in case the action was brought independently (Gottwald, op. cit., Art. 6 IZPR n. 12). In the present case, Art. 5(1) Brussels Convention applies, according to which a person domiciled in a Contracting State may be sued in another Contracting State on matters relating to a contract in the courts for the place of performance of the obligation in question. Decisive for the determination of the international jurisdiction of the court for the place of performance is the performance that is at the issue of the claim If the plaintiff requests damages for breach of contract, the relevant obligation is the one which allegedly has not been correctly performed (cf. ECJ [*], NJW [*] 1977, 491; ECJ NJW 1987, 1132; BGH NJW 1994, 2700). As the defendant-counterclaiming [buyer] basically claims damages for a non-performance or mal-performance of the plaintiff [seller]'s obligation to deliver the goods, the jurisdiction follows the place of performance for the delivery obligation. The place of performance is to be determined following the substantive law. The substantive law, in turn, needs to be determined according to the rules of private international law of the place where the action was brought, that is, according to the German rules of private international law (ECJ NJW 1977, 491; ECJ NJW 1995, 183; BGH NJW 1988, 1467; BGH NJW 1994, 2700; OLG [*] Köln, RIW [*] 1988, 557). Under Art. 27(1) sent. 1 EGBGB [*], the contract is governed by the law chosen by the parties. Clause 17 of the [seller]'s standard terms provides that the legal relationship between the parties is governed by the standard terms and conditions and furthermore by Dutch law. The formation and validity of a choice of law agreement underlie the law chosen by the parties - Art. 27(4), 31(1) EGBGB, which also applies to choice of law clauses in standard terms (cf. BGH NJW 1994, 262; BGH NJW 1994, 2700; Palandt/Heldrich, BGB [*], 55th ed., Art. 27 EGBGB n. 8). The Appellate Court can leave open the question whether the [seller]'s standard terms were validly incorporated into the contract under Dutch law. If the [seller]'s standard terms apply, regard is to be had to the special clause no. 5, according to which the delivery is to be effected at the contractually agreed place of performance. Details regarding the place of performance are specified in the [seller]'s "confirmations of orders." How those specifications are to be interpreted must in any case be assessed under the United Nations Convention on Contracts for the International Sale of Goods of 11 April 1980 (CISG), which both the Federal Republic of Germany and The Netherlands have ratified (Palandt/Heldrich, Art. 28 EGBGB [*] n. 7). The application of the CISG was not generally excluded by the [seller]'s standard terms. The [buyer]'s place of business is the place of performance for the [seller]'s delivery obligation. The place of delivery under Art. 31 CISG corresponds to the place of performance under � 269 BGB [*], and therefore may be referred to for the determination of the jurisdiction under Art. 5(1) Brussels Convention (Herber/Czerwenka, Internationales Kaufrecht, Art. 31 n. 2). It must be noted that in the cases cited by Art. 31 CISG, the place of performance is not identical with the [buyer]'s place of business. This is also true for Art. 31(a) CISG, which constitutes an obligation to dispatch the goods (Huber in: v.Caemmerer/Schlechtriem, Kommentar zum einheitlichen UN-Kaufrecht, Art. 31 n. 26). However, the legal consequences of Art. 31 CISG only come into play if the seller is "not bound to deliver the goods at any other particular place." A different "particular place" is specified, i.e., if the parties have agreed on a delivery "free domicile." In such a case, the buyer's place of business is stipulated as the place of delivery and the delivery obligation consists in handing over the goods to the buyer (Huber, op. cit., Art. 31 n. 4, 91, 92). This applies to the [seller]'s confirmations of orders from 10 December 1993 regarding the sale of tanning barrels as well as a hydraulic stretching, smoothing and ironing machine, which specify a delivery "free domicile Selfkant Tüddern, loaded on lorry." The [seller] was also obliged to hand over to the [buyer] at the [buyer]'s place of business the automatic hide skinning device as well as the used leather tacking machine referred to in the further confirmation of order of 10 December 1993. Admittedly, the term "ex works" used in the confirmation generally does not constitute a variation of the delivery place under Art. 31 CISG (Huber, op. cit., Art. 31 n. 4). However, the delivery specifications contain the remark "loaded onto lorry". In the absence of any different indicators, it can be assumed that the [seller] itself conducted the deliveries. This assumption is supported by the fact that the [seller] transported goods on its own lorries in connection with the later complaints of lack of conformity, i.e., the [seller] declared in its fax of 6 December 1994 that its employee would collect the queried leather tacking machine. Under these circumstances, the [buyer]'s place of business is also the place of delivery for the hide skinning device and the used leather tacking machine. In this context, the Appellate Court may leave open the question whether the application of Art. 31 CISG is already excluded because the seller's "own people" are not "carriers" in the meaning of Art. 31 CISG (as is the opinion of Herber/Czerwenka, Art. 31 n. 6) or whether it is irrelevant for the question of carriage of the goods whether the seller undertakes the transport itself or commissions an independent carrier (for this opinion cf. Huber, op. cit., Art. 31 n. 27). Even if one follows the latter opinion, the place where the seller is to deliver the goods is considered "any other particular place" in the meaning of Art. 31 CISG, if it has been contractually stipulated that the seller is to deliver the goods to the buyer's place by its own means (Huber, op. cit., Art. 31 n. 50). Therefore, for all of the [seller]'s delivery obligations, the place of performance in the meaning of Art. 5(1) Brussels Convention is the [buyer]'s place of business. Consequently, the Court of First Instance also possessed jurisdiction under the aspect that the jurisdiction over a counterclaim may result from the jurisdiction given if the counterclaim were raised independently. The [buyer]'s counterclaim is partially justified. The [buyer] is entitled to claim damages from the [seller] in the amount of DM [Deutsche Mark] 16,948 under Arts. 45, 74 CISG. The [seller] must reimburse the [buyer] for the costs incurred by commissioning company S. with the tanning of the hides in the period from 7 November till 2 December 1994. It had become necessary to let the hides be treated by a third party because the [seller] had retained the three tanning barrels originally delivered by it after [seller] had taken them back to convert them. It is disputed between the parties whether the [seller] was obliged to deliver barrels equipped with beams instead of barrels with taps, and whether the [seller] was therefore contractually required to re-equip the tanning barrels accordingly. In the end, the question does not influence the [buyer]'s right to claim damages. Following the parties' concurring submissions, the [seller] at least gave the [buyer] a binding assurance that the taps of the tanning barrels delivered would be exchanged for beams and that the barrels would be returned to the [buyer] after the conversion. The [seller] accordingly undertook - and breached - a contractual obligation. It is irrelevant whether the parties - as the [buyer] alleges - reached an oral agreement regarding the length of time required for the conversion and fixed a period of time for the return of the barrels. A corresponding agreement at least results from the correspondence between the parties before litigation; in the end, the [seller] itself does not deny that it promised the [buyer] to return the barrels that had been collected for conversion. After the [seller] had announced by fax of 18 October 1994 that it would collect the tanning barrels on 24 October, the [buyer] told the [seller] by fax of 21 October 1994 that [seller]'s manager had informed [seller] that the conversion of the tanning barrels would take one and a half days per barrel. The [buyer] further noted that the barrels, which were urgently needed by the [buyer], had to be returned by the end of the 43rd calendar week. Without objecting to that letter, the [seller], picked up the tanning barrels on 24 October 1994 at the [buyer]'s place of business, in accordance with its earlier announcement. [Seller] thus undertook an obligation to return the barrels to the [buyer] by the end of the 43rd calendar week, i.e., by Saturday 29 October 1994. The [seller] did not live up to this contractual agreement. The [seller] is liable for this breach of contract, even if one considers the [seller]'s submissions regarding the further correspondence with the [buyer], which are contained in the [seller]'s brief of 22 November 1996 and were not admitted by the Appellate Court due to delay. This is also true for the [seller]'s contention that the [buyer] demanded an impossible task from the [seller], because the re-equipment of the barrels including the dismantling and reconstruction took at least six and a half days. Apart from the fact that the [seller] did not object to the [buyer]'s confirmation of 21 October 1994, [seller]'s submission could only lead to a prolongation of the fixed period of time regarding the return of the barrels for a couple of days until the beginning of the following 44th calendar week. At least at this point in time, the [seller] was obliged to return to the [buyer] the tanning barrels that had been converted in the meantime. However, it is undisputed that this did not happen. The [seller] unsuccessfully tries to rely on a right of retention. This is quite independent of the question whether the [buyer] was obliged to pay the [seller] for the remainder of the purchase price. It is also irrelevant whether the [seller]'s standard conditions were incorporated into the contract and whether [seller]'s clause 13 applied, according to which the [seller] is entitled to take back the goods as long as its customer has not completely paid the contractually agreed amounts. Neither this clause nor Art. 71 CISG entitled the [seller] to retain the goods. Under Art. 71 CISG, a party may suspend the performance of [seller]'s obligations if, after the conclusion of the contract, it becomes apparent that the other party will not perform a substantial part of its obligations. Regarding the return of the tanning barrels, the parties - at least implicitly - excluded the [seller]'s right of retention by individual agreement. The [seller] committed itself to return the barrels after their conversion within a short period of time, without reserving the right to retain the goods if the purchase price is still outstanding. As the parties had previously already argued about the [buyer]'s remaining obligation to pay the purchase price, the [buyer] was entitled under good faith to trust that the [seller], who had promised the return of the barrels unconditionally, would not refuse the return of the goods by relying on a right of retention. The Appellate Court does not follow the [seller]'s point of view regarding the right of retention under Art. 71(1)(b) CISG, which the [seller] submits in the brief that was not admitted by the Appellate Court due to delay. Contrary to the [seller]'s opinion, the parties' correspondence after the [buyer]'s fax of 21 October 1994 does not allow the conclusion that the [seller] merely announced its right of retention, connected with its willingness to negotiate the matter, and that the [buyer] was unjustified in declaring the avoidance of contract without any further cause before the return of the goods was due. The [seller]'s letter of 27 October 1994 contained [seller]'s unequivocal refusal to return the tanning barrels before payment of the outstanding purchase price had been effected; the last paragraph of that letter clearly expresses this intention. Therefore, the [seller] breached the contract by relying on an unjustified right of retention prior to the [buyer]'s reaction by fax on 29 October 1994. The subsequent settlement negotiations, on which the [seller] relies in its inadmissible brief, could not change the earlier breach of contract and its legal consequences. The examination of whether the requirements of Art. 71 CISG are met fall in the sphere of risk of the party relying on the right of retention. In the absence of those preconditions, the retaining party commits a breach of contract (Leser in v.Caemmerer/Schlechtriem, Art. 71 n. 25). The [seller]'s standard conditions do not provide for the legal consequence of such a breach of contract and do not exclude the provisions of the CISG. Under Art. 45 CISG, the buyer may claim damages as provided in Arts. 74 to 77 if the seller fails to perform any of its obligations under the contract or under the Convention. Inter alia, Art. 45(1) CISG applies if the seller fails to perform any other obligation under the contract or the Convention (Huber in: v.Caemmerer/Schlechtriem, Art. 45 n. 10). Whether the obligation breached is a primary or a secondary obligation is only of importance regarding the question of the existence of a fundamental breach of contract (Herber/Czerwenka, Art. 45 n. 2). Without doubt, the [seller]'s contractual obligation to return the tanning barrels to the [buyer] is fundamental. Under Art. 74 CISG, damages for breach of contract by one party consist of a sum equal to the loss, including loss of profit, suffered by the other party as a consequence of the breach. Costs incurred by reasonable efforts to mitigate the loss resulting from the breach may also be compensated (Leser, op. cit., Art. 74 n. 14). The sum paid by the [buyer] to the company S. constitute such reasonable expenses. According to the invoice of 31 December 1994, company S. tanned 240 hides a day during the period from 7 November till 2 December 1994 at an overall amount of DM 16,946. The [seller] does not expressly dispute that the [buyer] did in fact commission company S. with the tanning of hides to the extent submitted. The [seller]'s defense consists solely of the objection that the [buyer] had claimed in their correspondence before litigation that [buyer] tanned 480 hides daily, whereas the [seller] only estimated half of that amount - and even that estimation was allegedly too high. The [seller] furthermore disputes with ignorance that the prices in the invoice were appropriate and usual. The Appellate Court does not regard these submissions as a clear challenge to the [buyer]'s contention that [buyer] commissioned company S. with the tanning of the hides. Insofar as the [seller] tried to make up for its omission in the brief that was not admitted by the Appellate Court, the Appellate Court does not see sufficient cause to follow this - possibly - new submission by re-opening the oral proceedings. The [seller] does not succeed with its objection that the prices demanded by company S. were neither appropriate nor usual. It is sufficient for the compensation claim under Art. 74 CISG if the breach of contract forces the damaged party to incur expenses, and if these expenses are reasonable (Leser, op. cit., Art. 74 n. 13, 14). Under German law, it is sufficient if a reasonable person in the position of the damaged party was entitled to assume that the expenses were reasonable (BGH [*] NJW [*] 1976, 1198; BGH NJW 1990, 2062). The same is true in the application of Art. 74 CISG. Art. 74 para. 1, sent. 2, CISG only restricts the compensation in the way that damages may not exceed the loss which the party in breach foresaw or ought to have foreseen at the time of the conclusion of the contract, in the light of the facts and matters of which [seller] then knew or ought to have known, as a possible consequence of the breach of contract. It was evident to the [seller] that the [buyer] would have to have the hides tanned by a third company if the [seller] did not return the barrels. This already results from the [buyer]'s explicit request in its fax of 21 October 1994 to keep to the return schedule at any rate, as the [buyer] urgently required the tanning barrels. The losses incurred in the amount of DM 16,948 are not reduced under the aspect that the [buyer] possibly saved its own expenses during the relevant time period. Specific grounds for such savings have neither been submitted by the [seller], who does not rely on this aspect, nor are they self-evident. The statute of limitations invoked by the [seller] during the proceedings before the Court of First Instance does not apply to the [buyer]'s claim for damages for the retention of the tanning barrels. The short period of limitations, which applies to remedies for non-conformity of the goods, does not apply to the damages claim for losses incurred by the retention of the barrels, because the [seller]'s obligation to return the goods is based on a contractual agreement with the [buyer], which, while connected with the sales contract, is separate from that agreement. The [buyer] is not entitled to any further damages. The [buyer] does not conclusively submit compensation claims for non-conformities of the leather tacking machines delivered by the [seller]. The [seller] correctly noted that the [buyer]'s initial submissions regarding the tacking machines were confusing and not comprehensible. Only in [buyer]'s last brief before the oral proceedings did [buyer] clarify which tacking machines its explanations referred to. According to that submission, the [seller] delivered one tacking machine for trial purposes, which was to be connected to a dust removal fan and a die-casting machine. [Seller] sold to the [buyer] a further tacking machine, which was installed behind an ironing machine and was taken back by the [seller] following the [buyer]'s complaints. However, the [buyer] still fails to substantiate its submissions regarding the defects those tacking machines were supposed to have had. The [buyer]'s allegation that the tacking machines were incorrectly adjusted to the extent that they tore the hides does not sufficiently specify the queried lack of conformity in order to form the basis for the taking of evidence. The [buyer]'s claim for damages regarding the leather tacking machines is inconclusive also for other reasons. The [buyer] pleads that it incurred losses in the amount of DM 6,600 because the tacking machine installed behind the die-casting machine did not function properly and that the [buyer]'s production came to a standstill for a period of two days. However, the [buyer] is not entitled to claim damages for defects of the tacking machine connected to the dust removal fan and the die-casting machine. It is undisputed that the [seller] delivered this tacking machine to the [buyer] for trial purposes. Since the [buyer] returned the machine to the [seller], the parties ultimately did not conclude a sales contract regarding this machine. This results from � 495(1) BGB [*], if German substantive law is applied. The matter does not need to be assessed differently with respect to the CISG, as the provisions of the CISG presuppose the formation of a sales contract and do not contain specific rules for a test sale. The [seller] was not obliged to remedy non-conformities of machinery that did not become the subject of a valid sales contract. This is also true if one applies the [seller]'s standard terms and conditions. As the Court of First Instance correctly held, the [seller] also would not be liable for damages incurred under the German rules for lending contracts. A person who hires out goods at no charge is only liable for defects if [seller] maliciously conceals the defect (� 600 BGB [*]. There are no indications of such a willful deceit on the part of the [seller]. It has neither been submitted by the [buyer], nor is it in any way evident that the application of Dutch law would lead to a different result. Regarding the [buyer]'s further claim for damages in the amount of DM 3,190-, it is problematic that - according to the [buyer]'s submissions - those losses were incurred by both tacking machines. In its brief arguing the appeal, the [buyer] explicitly noted that the two tacking machines delivered by the [seller] had torn hides and had made it necessary to repair overall 100 hides at a cost of DM 3,190. For the reasons explained above, the [seller] is not liable for defects of the tacking machine that had been delivered for trial purposes. Therefore, the [buyer] would have had to make more substantiated submissions as to the kind of damage the (used) tacking machine connected to the ironing machine had caused. The [buyer]'s contention, in its brief of 11 December 1996, that only the tacking machine connected to the die-casting machine was defective cannot be considered, because it contains an inexplicable contradiction to [buyer]'s earlier submissions. The [buyer] is also not entitled to damages for the incorrect construction of the Dynavac-machine. The [buyer] claims expenses in the amount of DM 2,170.30 as well as DM 823.60. [Buyer] argues that the [seller] incorrectly welded on the telescope, so that the guide rails broke off. [Buyer] further submits that it had to commission a third party with the repair of the machine after the [seller] had refused to remedy the non-conformity. Again, the Appellate Court can leave open the question whether the [seller]'s standard terms and conditions were validly incorporated into the contract, or whether solely the provisions of the CISG apply. Under clause 8(a) of the [seller]'s standard terms, the [seller] is only liable for a non-conformity of the goods if the confirmation of order expressly provides for a guarantee, which is not the case for the (used) Dynavac-machine. Apart from that, the [seller]'s liability under clause 8(e) of its standard conditions is restricted to the delivery of spare parts free of charge. The [buyer]'s claim for damages is also unfounded if one applies the provisions of the CISG. Under Art. 39(1) CISG, the buyer loses the right to rely on the lack of conformity of the goods if it does not give notice to the seller specifying the nature of the lack of conformity within a reasonable time after buyer has discovered it or ought to have discovered it. Therefore, the [buyer] should have notified the [seller] that the guide rails of the Dynavac-machine had broken off before [buyer] commissioned a third company with the repair. The [seller] denies that the [buyer] gave a timely notice specifying the non-conformity. Despite this submission, the [buyer] solely maintained until the final oral hearing before the Court of First Instance that [buyer] had to have the ironing machine repaired twice during the course of the year 1995, after the [seller] had unequivocally refused to remedy the defect. Regarding the alleged lack of conformity of the guide rails, this submission is not specific enough and no proof has been offered. Therefore, the [buyer] is left with a claim for damages in the amount of DM 16,948. Contrary to the [seller]'s view expressed in its brief not admitted by the Appellate Court, the [buyer]'s claim was not extinguished by [buyer]'s declaration of a set-off in the amount of DM 3,750 during the first instance proceedings. In its brief of 13 December 1995 which, inter alia, contained the declaration of a set-off, the [buyer] claimed damages in an amount that exceeded the sum in dispute during the appellate proceedings by far more than DM 3,750. Furthermore, the [buyer] has by now moved away from the set-off and claims the amounts in question by way of a counterclaim. The [seller] itself has also not declared a set-off against the counterclaim with a claim for an outstanding purchase price, which the [seller] is possibly still entitled to. The [buyer] is entitled to interest granted at a rate of 5% since the time the counterclaim was served, independent of the question whether the interest rate is to be determined under German law (� 352 HGB [*]) or under Dutch law - which provides a higher rate of interest following the [seller]'s own submissions. The decision on costs is based on � 92(1) ZPO [*]; the decision on the provisional enforceability is based on � 708 no. 10 ZPO. * All translations should be verified by cross-checking against the original text. For purposes of this translation, the Plaintiff/Appellee of The Netherlands is referred to as [seller]; the Defendant/Appellant of Germany is referred to as [buyer]. Amounts in German currency (Deutsche Mark) are indicated as [DM]. Translator's notes on other abbreviations: BGB = Bürgerliches Gesetzbuch [German Civil Code]; BGH = Bundesgerichtshof [Federal Court of Justice, the highest German Court in civil and criminal matters]; Brussels Convention = EC Convention of 27 September 1968 on Jurisdiction and the Enforcement of Judgments in Civil and Commercial Matters; ECJ = European Court of Justice; EGBGB = Einführungsgesetzbuch zum Bürgerlichen Gesetzbuche [German Code on Private International Law]; HGB = Handelsgesetzbuch [German Commercial Code]; LG = Landgericht [German District Court]; NJW = Neue Juristische Wochenschrift [German law journal]; NJW-RR = Neue Juristische Wochenschrift Rechtsprechungs-Report Zivilrecht [German law journal]; OLG = Oberlandesgericht [German Court of Appeals]; RIW = Recht der Internationalen Wirtschaft [German Law Journal]; ZPO = Zivilprozeßordnung [German Code on Civil Procedure]. ** Ruth M. Janal, LL.M. (UNSW), is a PhD candidate at Albert-Ludwigs-Universität Freiburg. The second-iteration redaction of this translation was by Dr. John Felemegas of Australia.
2019-04-19T15:16:10Z
http://cisgw3.law.pace.edu/cases/970108g1.html
Alas, it has become necessary for me to add a disclaimer. I do not need to agree with a source, page, or author, to add it to my friends, sources or resources. Good people are allowed to disagree with me, they may be right, I just don't happen to see it their way at the moment. Blessings to all that study their Bible. HETERONYM There is a sewer in the sewer. Christian Education is the process of nurturing a person to be the best at what God wants them to be. is a temptation Jesus rejected, not because it was dangerous, but because it was trivial compared with his mission. C. S. Lewis had it right: 'If you read history you will find that the Christians who did most for the present world were just those who thought most of the next. the Apostles themselves, who set on foot the conversion of the Roman Empire, the great men who built up the Middle Ages, the English evangelicals who abolished the slave trade, all left their mark on earth, precisely because their minds were occupied with Heaven. It is since Christians have largely ceased to think of the other world that they have become so ineffective in this one. Aim at Heaven and you will get earth 'thrown in.' Aim at earth and you will get neither.' Our eyes should be lifted skyward--toward the company of heaven. The time has come for believers to focus on the next world, not just the next election cycle." Cal Thomas, Newsweek, March 29, 1999, Page 60. "C. S. Lewis wrote in his essay 'The Weight of Glory,' about what he called 'the overwhelming possibilities' of eternity, he concluded: 'There are no ordinary people. you have never talked to a mere mortal. Nations, cultures, arts, civilizations--these are mortal, and their life is to ours as the life of a gnat. But it is immortals whom we joke with, work with, marry , snub, and exploit--immortal horrors or everlasting splendours" C. S. Lewis, The Weight of Glory, (San Francisco: Harper 2001) as quoted in A Life God Rewards, by Bruce Wilkinson ( Sisters, Oregon: Multnomah 2002). forgiveness .. prayer .. paradise .. more... .. (2.1)The mud ball floated in darkness. God created day, night and time, the first day. The Second day he extracted the water from the mud and made dirt and separated the sea from the land and said it was good. The next day he formed a garden as large as the World itself. On the fourth day he created the Sun, Moon and galaxies of stars as part of the Glory of God [Romans 1:20]. We see the Sun as necessary for light, but God is so far above our thoughts [Isaiah 55:8-9] He doesn't need light holders...He is Light! [1 John 1:5] On the Sixth Day He made a man from the mud but withheld his approval until woman walked on His sod at dusk. On the seventh day God rested from creating the World and the universe around it. Can you imagine the satisfaction on his face as he sipped tea from the banisters of heaven and viewed his creation? God's University started not long after this with God walking in the garden talking with them every evening. After the fall God came showing Adam and Eve how to make clothes, probably how to start a fire for sacrifices. God did not stay in heaven, but evening-by-evening God walked with his toes in the same grass with man and woman [with no bellybuttons. Which came first, the chicken or egg? Man and woman came before the baby. The chicken and rooster came before the egg.] Can you imagine what God talked to them about? And then Man made a choice to do what he wanted to do and disobey God. Man ate fruit God asked him not to eat. Adam and Eve chose double-breasted leaves suit over God's clothing. God's holiness cannot live with sin and so God extracted himself from sinful man's presence, but before he left God continued to teach Adam and Eve in his classroom. He showed them how to make wool suits (clothes from sheep) and to make a pleasing sacrifice and I imagine a hundred things your parents taught you. Then God walked slowly back into the heavens, God's holy nature required separation from sin. How many times did Adam and Eve feel God left them, when they not God, did the leaving? We meet God with his sleeves rolled up working. In the Beginning God created. But part of His time, if that is the right word for an eternal God was to talk and teach Adam and Eve. This hasn't changed over the millennia. The God of Eternity in his good time walked into time and gave us his Word in written record we normally call The Book or Bible. God talked eyeball to eyeball with Adam. God chiseled the commands on rock tablets. Isaiah probably wrote with stylus on skins and rolled His words just like the Dead Sea Scrolls. Paul may have written in codex (book) format. But today we can see God enjoying His Word moving into the lives and hearts of men and women. 2 Timothy 3:16, 2 Peter 1:21. God not only thinks, and writes, but God acts. We meet God creating and God realized his love, men and women had no hope. It would be like having children guaranteed to die of an illness you could prevent. You most certainly would do anything including giving your life to make your children's lives long and successful. And that is exactly what God did: he sent his Son to die so we could live with him forever. John 3:14-17. We evaluate God by who we are. If we had billions of dollars we would buy things for ourselves and those we love. But God has more money and resources than this, and what God wanted was to love you and me and for us to love him in return. We call this worship. God loves us so much he gave his Son, Jesus. This short comparison of the nature of God and man shows how self-centric, selfish and sinful we are. Again, God walked in the dirt, but this time as a man [Matthew 1:23]. He hurt just like other men hurt. He felt every pain and temptation just like every other person. [1 Corinthians 10:13] He felt the humiliation of the scorn and the pain of the cross just like other men would feel pain. Why did he do this, because God is Love. God doesn't just love, God is Love! [1 John 4:16] God can do anything he wants, and he wants to love us. He wanted to save us from the "illness" of sin that will kill us. God wants to walk and talk with us for eternity. In the Garden God walked in the evening, in Eternity we will be with him all the time forever. Romans 1: 20 NASB, "For since the creation of the world His invisible attributes, His eternal power and divine nature, have been clearly seen, being understood through what has been made, so that they are without excuse." God's Universe then is God's University. "If I tell you only part of the evidence and you believe it, you have been indoctrinated. Love then is a verb. In the beginning God created. For God so loved the world he sent his Son. He asks us to Go into all the world and preach and teach. Can't you see God grinning and helping those that love him? As I read my Bible I find the premium is on doing, not knowledge. If knowledge was the end in itself, God could have placed ten questions at the end of each chapter and if you didn't answer seven correct, a trap door could propel you to the depths. Now you need to know, to do, but organized activity is where God puts the premium. I believe all knowledge in the church and Christian school and all other activities of Christian Education should leave us needing to do, not just sit in the pew satisfied we have learned our nugget of truth for the week. "About this time I met with a track written by an atheist. It read as follows: "Did I firmly believe, as millions say they do, that the knowledge and practice of religion in this life influences destiny in another, religion would mean to me everything. I would cast away earthly enjoyments as dross, earthly cares as follies, and earthly thoughts and feelings as vanity. Religion would be my first waking thought, and my last image before sleep sank me into unconsciousness. I should labour in its cause alone. I would take thought for the morrow of Eternity alone. I would esteem one soul gained for heaven worth a life of suffering. Earthly consequences should never stay my hand nor seal my lips. Earth, its joys and its grief's, would occupy no moment of my thoughts. I would strive to look upon Eternity alone, and on the Immortal Souls around me, soon to be everlastingly happy or everlastingly miserable. I would go forth to the world and preach to it in season and out of season and my text would be, "WHAT SHALL IT PROFIT A MAN IF HE GAIN THE WHOLE WORLD AND LOOSE HIS SOUL?" C.T. Studd, Autobiography, pg 40. Will you go and share the Good News of Jesus with others on your block and world? Just suppose, when I pray, there really is someone listening who cares about me and wants to know what is on my mind. Just suppose, when I pray it changes me and my view of how the universe operates and who is involved. Just suppose, I put my doubts aside for a minute and consider the possibility that someone who knew me before I was born loves me, warts and all, without conditions or reservations, no matter how badly I have behaved in the past. Just suppose, a prayer was my first response instead of my last resort when facing a new challenge or an old temptation. Just suppose I lived each day, knowing that there is an inexhaustible supply of love for me to pass along to others. Pray--when you are content or miserable; with fear & trembling...your prayer will be acceptable to the Lord. Theodoras the Ascetic c.4th C. "No labor is more difficult than prayer. Demons understand that prayer is a path to God & they will hinder the journey. " Agathon d.c.400 B.C. Salvation is free, but discipleship will cost you your life.--Dietrich Bonhoefier. "Those who cannot remember the past are condemned to repeat it." --George Santayana, 1905. "Correlation does not equal causation"! "Returning violence for violence multiplies violence, adding deeper darkness to a night already devoid of stars. Darkness cannot drive out darkness; only light can do that.”—Dr. Martin Luther King Jr. True peace is not the absence of war; it is the presence of God--Loveless. A wise Rabbi once said, "We don't see things as they are, we see things as we are." Reading makes a full man; conference a ready man; writing an exact man -- Francis Bacon born 1561. I do not chose the colors, He worketh steadily. Forget He sees the upper, and I the under side. "We live under the illusion that if we can acquire complete control, we can understand God. ...But the only way we can brush against the hem of the Lord...is to have the courage, the faith, to abandon control. For the opposite of sin is faith, and never virtues, and we live in a world which believes that self-control can make us virtuous. But that's not how it works." Madeleine L'Engle in "Walking on Water: Reflections on Faith and Art" On the second day, God created the monkey and said, "Entertain people, do tricks, and make them laugh. For this , I'll give you a twenty-year life span." On the third day, God created the cow and said, "You must go into the field with the farmer and said, "You must go into the field with the farmer all day long and suffer under the sun, have calves and give milk to support the farmer's family. For this, I will give you a life span of sixty years." On the fourth day, God created humans and said, "Eat, sleep, play, marry and enjoy your life. For this, I'll give you twenty years." Could you possibly give me my twenty, the fourth the cow gave back, the ten the monkey gave back, and the ten the dog gave back: that makes eighty, okay?" "Okay," said God. You asked for it." So that is why for our first twenty years, we eat, sleep, play and enjoy ourselves. For the next fourty years, we slave in the sun to support our family. For the next ten years, we do monkey tricks to entertain the grandchildren. And for the last ten years, we sit on the front porch and bark at everyone. "A soul that refuses to submit to daily tilling of its inner fields will end up with nothing but thorns and thistles." Shoebat. I have now concentrated all my prayers into one, and that one prayer is this: that I may die to self, and live wholly for Him. What you believe determines how you think. "There's a fine line between a long sermon and a hostage situation." The unexamined life is not worth living for a human being. -- Socrates. Daydreams may be pleasant but accomplishments are more satisfying. but being saved will direct what we do. Human dignity cannot survive in a society that insists that a baby inside the womb has no right to live while that same baby, just seconds later, is a murder victim. Respect for human life cannot endure when a baby inside the womb is just a fetus, but when moved only a few centimeters is a full citizen. -Dr. Richard Albert Mohler, Jr. is an American theologian and the ninth president of Southern Baptist Theological Seminary in Louisville, Kentucky. "God is most glorified in us when we are most satisfied in Him...Sin is what we do when we are not satisfied with God." 1. What we want most? 2. What we think about most? 3. How we use our money? 4. What we do with our leisure time? 5. The company we enjoy? 6. Whom and what we enjoy? 7. What we laugh at? See, then, how God educates your soul through prayer, nurturing your desires for truth, love and beauty, and teaching you to discover them in himself. Play truant from the school of prayer and you will never learn these things. You will be a spiritual ignoramus, shallow and undeveloped and unable to understand the things of the Spirit. What Happens When I Pray. Travel is fatal to prejudice, bigotry, and narrow-mindedness, and many of our people need it sorely on these accounts." Commenting on Psalm 6:6,7 C.H. Spurgeon said that tears are liquid prayers that need no interpretation. Don's Axiom reads, "Every organization starts with vision and zeal, moves to complacency and ends killing itself with rules and regulations--always with the best intentions." When you have an unforgiving spirit,you put yourself in prison spiritually and emotionally, you pay dearly for the luxury of carring a grudge. Is it worth it??? "Intercession is the link between our powerlessness and God's omnipotence." Andrew Murray - "Power in Prayer" 4. Numbers Become the Measurement " Chase, Mitchell (2010-11-15). The Gospel is for Christians (p. 174). Lucid Books. Kindle Edition. How to really love a child -- Be there. Say yes as often as you can. Let them bang on pots and pans. If they're crabby put them in water. Read books out loud with joy. Go find elephants and kiss them. Encourage silly. Giggle a lot. Remember how really small they are. Search out the positive. Keep the gleam in your eye. Go see a movie in your pajamas. Teach feelings. Realize how important it is to be a child. Plan to build a rocket ship. Stop yelling. Invent pleasures together. Surprise them. Express your love, a lot. Children are miraculous! -- copied from Facebook. Mr. Scott died this weekend. One of my best memories in life occurred with his son Mike and daughter-in-law Laura. His last words after saying good-bye to his family around his bed was, "Well it is now just you and me Lord Jesus." Suddenly, the activity of life became unimportant. I have not been able to break the spell of these simple words. Life is after all about what happens after the last breath. Steven Hawking said, "Heaven is a fairy story for people afraid of the dark." John Lennox responded, "Atheism is a fairy story for people afraid of the Light." This web page is in constant change. I began this HTML page on April 11, 1996 and as I learn I improve the page. Chesterton's Everlasting Man, http://www.pbs.org/wgbh/questionofgod/ownwords/joy.html The ebla tablets, dead sea scrolls, or qumran scrolls, writings from Egypt such as, rosetta stone, behistun inscriptions, mesha stele, Rosetta Stone, the Tell el-Amarna Letters, the Stela of Merneptah, the Elephantine Papyri, and the Sinai Inscriptions. Writings From Mesopotamia such as Behistun Inscription, the Creation and Deluge Tablets [Epic of Creation, Sippar Tablet, Gilgamesh Epic, Nippur Tablet, other generally unnamed but important tablets from Nineveh, Nippur, Kish, etc], the Code of Hammurabi, the Mari Tablets, the Nuzi Tablets, the Records of Shalmaneser [his Monolith, Bronz Plates, Black Obelisk, etc], Annals of Tiglath-Pileser III, Cylinder of Sargon II, Cylender of Sennacherib, Archives of Ashurbanipal, Babylonian Chronicle Records From Syria: These include [among others], the Ras Shamra Tablets, the Gebal Inscriptions, the Dog River Gallery. Records From Palestine: These include [among others], the Lachish Letters, the Siloam Inscription, the Samaria Ostraka, the Moabite Stone, the Gezer Agricultural Tablet, the Lachish Ewer.
2019-04-25T06:58:02Z
http://www.diduask.com/
The study attempted to explore the quality of life (QoL) of Chinese caregivers with mentally ill relatives. It also aimed to examine the differential roles of caregiving burdens, caregiver characteristics, and satisfaction with psychiatric services in caregivers' QoL. 276 caregivers with relatives attending community psychiatric facilities in Hong Kong were invited to fill out a questionnaire. One sample t-tests were conducted to compare the results of this study with that of other Chinese populations in Hong Kong, Taiwan, and mainland China. A hierarchical regression analysis was performed to examine the relative influence of different factors on caregivers' QoL. Our sample of caregivers had significantly lower QoL scores than other Chinese populations. Results also suggest that Chinese caregivers who had chronic illness, younger in age, a lower education level, experienced more difficulties in handling negative symptoms, and were more dissatisfied with mental health services had poorer quality of life. Indeed, caregiver characteristics displayed a much stronger association with caregivers' QoL than did caregiving burdens and satisfaction with psychiatric services. This study supports the strong association of caregiver characteristics and the QoL of caregivers and establishes the nature of the relationship between satisfaction with mental health services and caregiver QoL. Implications for future research and practice are discussed. Caring for a family member with mental illness can be burdensome. Caregivers may experience financial burdens, difficulty handling disruptive behavior and fluctuating emotions that cannot be controlled, a lack of time for personal enjoyment and social engagement, difficulty handling the lack of motivation found in the mentally ill family member, and financial difficulties [1, 2]. Evidence of family burdens is also found among caregivers with different ethnic backgrounds such as Chileans , Swedes , Germans , Hong Kong Chinese [6, 7], and mainland Chinese . The impact of caring burdens on the psychological wellbeing of caregivers has also been well documented, the results generally suggesting that caregivers suffer from poor psychological health and that some of them may even develop mental illness [2, 6]. Although it is commonly acknowledged that caregiving burdens can lead to caregivers with a relative suffering from mental illness experiencing poor quality of life (QoL) , few studies have explored this relationship empirically. The few studies that have done so found that family burdens were inversely related to the QoL of caregivers with children suffering from mental health problems , mood disorders , and schizophrenia . Similar studies have also been conducted on caregivers with different ethnic backgrounds, the findings also suggesting that Sudanese caregivers and Kuwaiti caregivers with greater caregiving burdens have poorer QoL. A careful review of the literature identified only one English language article concerning caregivers' burdens and the QoL of Chinese caregivers with a schizophrenic family member . The results suggest that the best QoL predictors for such Chinese family caregivers are physical health and household income. However, the study in question is subject to a number of limitations. Because Chinese caregivers living in different parts of China and the world are exposed to different sets of societal and contextual factors influencing their caring experiences, the findings generated by Li et al. may not be applicable to Chinese people living in other parts of China and the world . Second, because the samples considered in their study were taken from three hospitals, the caregivers who took part in the survey could have been experiencing a higher level of stress due to their relatives' hospitalization. Lastly, caregivers who are living with their mentally ill family members in the community may have different caregiving burden experiences that affect their QoL in different ways. To the best of our knowledge, no previous study has investigated the caregiving burdens and QoL of Chinese caregivers in Hong Kong. This study intended to explore the quality of life of a group of Chinese caregivers whose mentally ill relatives were living in the communities in Hong Kong; and to examine different factors that might influence caregivers' quality of life. In the literature, there are three sets of factors - (1) caregiving situation; (2) caregiver factors; and (3) environmental factors - that can potentially impact on the QoL of Chinese caregivers with relatives suffering from mental illness in Hong Kong (See Figure 1). A model with three sets of factors affecting the QoL of caregivers of family members with mental illness (adapted from the model of White et al., 2004 ). The 'caregiving situation' can be defined as variables related to characteristics of the patient's illness that impact on the QoL of the caregiver. These factors may include the functional status of the patient or the caregiver's perception and evaluation of the care needs of the patient. In the mental health literature, objective and subjective burdens are commonly defined as caregiving situations which affect the QoL of caregivers with relatives suffering from mental illness. The 'objective burden' may be defined as 'all those things that the caregiver and/or his or her family has to do (e.g. helping and supervising), experiences (e.g. disturbed family and/or social relations), or is not allowed to do (e.g. hobbies and work) as a consequence of caregiving . It also includes the tasks of handling the emotional needs of the mentally ill relative . On the other hand, the 'subjective burden' may be defined as the distress experienced by the caregiver in dealing with the objective burden , potentially including feeling trapped, guilty, shameful, isolated, and emotionally exhausted . Studies in the literature have suggested that Chinese caregivers (i) experience difficulties managing the negative symptoms presented by relatives with mental illness and handling positive symptoms ; (ii) pay high psychological and social costs when caring for their relatives ; and (iii) have poor mental health outcomes [6, 7]. However, no study has examined the caregiving burdens and QoL of Chinese caregivers in Hong Kong. In this study, 'caregiving burdens' are defined as perceived strains associated with handling positive and negative symptoms presented by mentally ill relatives and the social and psychological costs borne when caring for such relatives. According to White et al. , caregiver factors are conceptualized as characteristics of the caregiver - who he/she is (i.e. age, gender, etc.) and his/her personal attributes - that may impact on the caregiver's QoL. Sales argued that many studies fail to examine contextual variables - such as life circumstances and demographic characteristics - that may strongly affect the QoL of caregivers with family member suffering from mental and other chronic illnesses. These demographic characteristics may include the socioeconomic status, ethnicity, age, gender, and family stage and composition of the caregiver. For example, Awadalla et al. found that among caregivers of Sudanese psychiatric patients, those who were females, parents, less educated, older, or had poor physical health were associated with poor QoL. In China, Li, Lambert & Lambert revealed that among caregivers with schizophrenic relatives, those who had higher household income and better physical health had better QoL. However, because of differences in societal environments, there is uncertainty as to whether the findings of Li et al.'s study are applicable to Chinese populations outside mainland China. Environmental factors include support from family and friends, support from the health care system, and the availability of and satisfaction with environmental resources . Marsh and Johnson maintained that there is a need to pay greater attention to the difficulties caregivers face when dealing with the health care system because caregivers' efforts can place them under tremendous strain and potentially impact on their QoL. However, a review of the literature showed very few empirical studies exploring the impact of environmental factors such as satisfaction with services on the QoL of caregivers with relatives suffering from mental illness. In this study, we attempted to examine the relationship such environmental factors have with QoL among caregivers with relatives suffering from mental illness. Since previous findings appear to suggest that caregiving burdens are consistently related to poor mental health and QoL among caregivers, one assumption made in this study was that such burdens would have the strongest association with the QoL of caregivers. Our study also hypothesized that caregiver factors and environmental factors are the second and third most important sets of factors associating with the QoL of caregivers. This prioritization was based on the findings relating to each such set of factors reflected in the literature. This study aimed at explore the quality of life and caregiving burdens of caregivers with relatives suffering from mental illness in Hong Kong; and examining the association between caregiving burdens, caregiver characteristics, satisfaction with mental health services and the QoL of caregivers. There were three hypotheses in this study: (1) caregivers with greater caregiving burdens have poorer quality of life; (2) caregivers with a lower level of satisfaction with mental health services have poorer quality of life; and (3) 'caregiving burdens' had the stronger association with the QoL of caregivers than do 'caregiver factors' and 'satisfaction with psychiatric services'. 'Caregiver' in this study refers to a person with a mentally ill family member. It is not necessary that the caregiver live with the mentally ill family member, but they have to provide regular support, such as visits and daily care, to the ill relative. 'Ill relative' refers to a person with mental illness. The inclusion criteria were: caregivers (i) aged 18 or above; (ii) able to speak and write simple Chinese; (iii) who provided regular support for a mentally ill relative. A cross-sectional survey design and a convenience sampling method were adopted for this study. This sampling method was chosen because of the absence of a list of caregivers in Hong Kong and the greater feasibility of obtaining a sample of caregivers through various social service organizations in all 18 Hong Kong districts. Participants were caregivers of individuals with mental illness who were members of the various community-based mental health service units. The nature of these service units were half-way houses, integrated community mental health services and social clubs. The research team approached the caregivers and gave details of the survey to them. After signing the consent form, the participants were given a self-administered questionnaire. Since some participants were in their old age and might also be illiterate, the research team provided special assistance to facilitate the completion of their questionnaire. The participants were assured of the voluntary nature of the survey and of the fact that declining to participate in the survey would have no adverse effect on their use of services. It took around 35 minutes to complete the questionnaire. This study was endorsed by the Research Ethics Committee of the Baptist Oi Kwan Social Services Organization in Hong Kong, which sponsored the project. This is a four-point scale denoting the severity of perceived strains experienced by caregivers in their day-to-day care of their mentally ill relatives in which the responses range from 'Not stressful at all' (1) to 'Very stressful' (4). The original scale consisted of 32 items categorized into four subscales: (i) difficulty managing drug compliance and follow-up; (ii) difficulty managing bizarre and disturbing behavior among individuals with mental illness; (iii) difficulty handling negative symptoms of persons with mental illness; and (iv) social costs associated with the constant care of people with mental illness . The short form of the scale employed in the study had only 16 items. A test of reliability revealed an acceptable level of internal consistency (Cronbach's alpha = 0.933). The research team developed this scale to evaluate caregivers' satisfaction with 10 community-based mental health services available to their mentally ill relatives in Hong Kong, such as specialist outpatient clinics and supported employment. This five-point scale ranged from 'Very dissatisfied' (1) to 'Very satisfied' (5), and the caregivers were encouraged to rate only those services that their relatives had used or were using. Examples of questions asked are: were the caregivers satisfied with (i) the opening hours for the services; (ii) the services provided by psychiatrists, nurses, etc.; and (iii) the amount they had to pay? A test of reliability revealed an acceptable level of internal consistency (Cronbach's alpha = 0.867 to 0.947). The World Health Organization Quality of Life Scale - Brief Version is a 26-item, self-administered questionnaire . Subjects assess their satisfaction with each item in the past 2 weeks on a 5-point scale (from 1 = very dissatisfied to 5 = very satisfied). The 26 items can be divided into four subscales: physical health, psychological health, social relationships, and environmental factors. The scale has well-established psychometric properties and has been widely used in different cultures. The Cronbach's alpha values for this scale and its subscales ranged from 0.684 to 0.810, indicating an acceptable level of internal consistency. Table 1 shows the demographic profile of the participants. The data were drawn from throughout the territory and covered all 18 administrative districts of Hong Kong. Most of the caregivers who participated in this study were mothers and/or females. The typical age of the caregivers was relatively high, with over 70% being more than 51 years old. In terms of employment status, the largest groups were housewives and retirees (39.7% and 24.1%, respectively). About 58% had monthly family income of between HK$5000 and HK$20000 (US$1 = HK$7.80). Thirty-six percent of the ill relatives suffered from schizophrenia, while 18.6% had been diagnosed with early psychosis. Table 2 displays the caregiving strains experienced by the caregivers. The most highly rated strains experienced by the caregivers were related to 'difficulty handling bizarre and disturbing behavior' and 'difficulty managing fluctuating emotions of ill relatives' (M = 2.96, M = 2.96). Next on the list of caregiver strains were 'difficulty handling suicidal thoughts/attempts committed by the ill relative' and the issue of the ill relative's lack of employment (M = 2.83, M = 2.78). Hierarchical regression analysis was performed to test the relative impacts of the three sets of factors (i.e. caregiving situation, caregiver characteristics, and environmental factors) on the caregivers' QoL. In step 1, the caregiving situation (i.e. caregiving burdens) - including 'difficulty handling bizarre behavior and excessive and uncontrollable emotions', 'difficulty handling negative symptoms', and 'social costs associated with the care of a relative with mental illness' - was entered into the first block. Caregiver characteristics such as the year in which the caregiver assumed responsibility for the relative's care, the caregiver's own chronic illness, family income, and the age of the caregiver were entered as the second block. The final block consisted of the environmental factor of 'satisfaction with mental health services'. The results suggest that the Chinese caregivers who had chronic illness, younger in age and a lower education level had poorer quality of life. As a domain, caregiver characteristics explained 12% of the variance in QoL of Chinese caregivers with relatives suffering from mental illness in Hong Kong (Table 3), (see Figure 2). 'Caregiving burdens' and 'satisfaction with mental health services' also displayed significant association with caregiver's QoL with explained variances of 3%. Of the three subscales for chronic strains, only 'difficulty handling negative symptoms' had significant association with the QoL of the caregivers. In other words, Chinese caregivers who experienced more difficulties in handling negative symptoms and were dissatisfied with mental health services had poorer quality of life. To conclude, the results supported hypothesis 1 and hypothesis 2, the hypothesis 3 was rejected. Impact of specific variables affecting QoL of caregivers of family members with mental illness. In this study, the quality of life of our caregivers was measured by The World Health Organization Quality of Life Scale - BRIEF Version, which has been used to measure the quality of life of other Chinese populations in Taiwan and mainland China [13, 18, 19]. With the availability of data in the other studies, one sample t-tests were performed to examine the differences in QoL scores between Chinese caregivers in the three places [Table 4]. The results indicate that that the caregivers in our sample had significantly poorer QoL than the general public in Hong Kong , mainland China , and Taiwan , and that their QoL was significantly lower than that of their caregiver counterparts in mainland China . Some of these results should not be surprising, because numerous studies have already found that caregivers of relatives with special needs have lower QoL than the general population [20, 21]. Nevertheless, what is surprising is that our group of caregivers had poorer QoL than caregivers in mainland China. Different expectations on the availability and adequacy of psychiatric services may explain the QoL difference between the two groups. In mainland China, very few community-based psychiatric services are available in the community, and members of the general public are largely expected to care for and support mentally ill relatives themselves. In contrast, there is a high expectation that the government will provide adequate psychiatric services in Hong Kong that invariably heightens caregivers' and consumers' expectations and sometimes leads to dissatisfaction with government involvement in the provision of psychiatric services. Indeed, the government of Hong Kong Special Administrative Region has openly acknowledged that it will uphold the Chinese family tradition of caring for the ill relative, and that it would support these families to take care of the relative who is suffering from a mental illness to live in the community . This difference in people's expectations of the government's role in relation to their own responsibility for caring for ill relatives might affect how they evaluate their own well-being and thus explain the difference in QoL scores between caregivers in Hong Kong and mainland China. A major objective of this study was to test the relative influences of different sets of factors on the QoL of caregivers with relatives suffering from mental illness. The results indicate that caregivers' characteristics exerted the greatest influence on the QoL of the caregivers, with a total explained variance of 12%. In particular, the caregiver's age, education level, and chronic illness had significant impacts on their QoL. These findings are different from those hypothesized, but serve to support Sales' assertion that "the contextual variables - such as life circumstances and demographic characteristics - may strongly affect the QoL of caregivers with [a] family member with chronic illness (including mental illness)" . On the other hand, although caregiving burdens can and do affect the QoL of caregivers, their influence might subside with the passage of time, with some caregivers becoming more adjusted to their caregiving role and acquiring more skills in managing mentally ill relatives. Consequently, they may come to experience or evaluate their caregiving role as less burdensome. On the other hand, caregiver characteristics are more stable characteristics that are less amenable to change. Indeed, some of these characteristics are unchangeable (e.g. age), and others may follow a deteriorating course (e.g. chronic illness). The literature shows that caregiver characteristics affect the QoL of caregivers in two ways: through their direct and indirect effects. In the case of direct effects, caregiver characteristics affect caregivers' QoL irrespective of the caregiving burdens they experience. For instance, more highly educated caregivers tend to have better jobs, higher salaries, and more resources that can enhance their QoL . However, these characteristics may interact with other factors such as caregiving burdens to exert indirect effects on the QoL of caregivers. For example, more highly educated caregivers may be able to use their financial and social resources to help them deal with their caregiving burdens, resulting in better QoL. Indeed, further statistical analysis of our data revealed such a result, showing a significant moderating effect of the interaction between caregiver's education level and caregiving burdens on the QoL of caregivers (B = 0.309, F change = 2.80, p = 0.05, with 1% explained variance). Given the limited availability of evidence concerning the relationship between the characteristics and QoL of caregivers with mentally ill relatives , future studies should provide more empirical data to clarify the nature of this relationship. The second set of variables - caregiver's strains - explained 3% of the variance in the QoL of caregivers. Further analysis showed that only negative symptoms had a significant impact on the QoL of caregivers who participated in this study. These findings echo those findings found in a previous study in Hong Kong and overseas . One possible explanation for these findings is that although positive symptoms may be difficult to manage, they may be perceived as 'part of the illness' beyond the caregiver's control and therefore as symptoms that have to be tolerated and accepted. On the other hand, caregivers may perceive negative symptoms such as 'idle at home' and 'refuse to go to work' as forms of 'laziness' that are amenable to change through personal willpower. This attitude may in fact be rooted in the Chinese belief in Confucian work ethics emphasizing hard work, perseverance, and patience. Simply put, in Chinese culture, there is a strong focus on one's productivity, and anyone who does not work and remains at home is likely to be considered lazy and unproductive . Thus, it was not surprising to find that some caregivers might have had difficulty accepting the negative symptoms presented by their ill relatives. Moreover, unlike positive symptoms which may be more amenable to medication, negative symptoms are issues caregivers have to spend time and energy addressing every day. Further studies are needed to clarify whether the above assumptions are correct and to develop strategies on raising Chinese caregivers' awareness of how such attribution may affect their caregiving burdens and quality of life. At present, there is only one government subsidized family resource centre for family members with relatives suffering from mental illness in Hong Kong. However, many community mental health services are also providing psycho-education programmes for family members. It would be interesting to incorporate the above-mentioned cultural values into the psycho-education programmes, and to examine whether an increase in such awareness might reduce the culturally biased perception of negative symptoms found among some Chinese family members with relatives suffering from mental illness. Turning to environmental factors, satisfaction with mental health services explained 3% of the variance in the QoL of the caregivers. As noted in the literature review, very few studies have examined the relationship between satisfaction with psychiatric services and caregivers' quality of life. Our study makes a contribution to the literature by providing initial evidence supporting the existence of such a relationship. However, further and larger-scale research should be conducted to provide more concrete data specifying the nature of the relationship between these two variables. Moreover, in the Hong Kong context, studies should also evaluate how certain mental health services do or do not meet the needs of caregivers. This research should have a particular focus on developing our understanding of caregivers' knowledge of the different types of services available and the adequacy and accessibility of such services. The knowledge generated would facilitate the future development of policies and programs encouraging caregivers to utilize formal psychiatric services to their full extent. This study has a number of limitations. First, although our sample of caregivers came from different districts in Hong Kong, they were not randomly selected. Therefore, the results cannot be generalized to the wider population of Hong Kong caregivers of mentally ill relatives. Second, our Satisfaction with Mental Health Services Scale was self-constructed, and further and more vigorous validation of the scale is needed. Third, there may be other variables such as social support and certain personality attributes in the three domains that influence the QoL of caregivers in Hong Kong. Researchers should consider including these variables in future studies. This study had attempted to clarify the roles of a set of factors associated with the QoL of Chinese caregivers in Hong Kong. It is found that caregivers who were younger, had chronic illness, a lower level of education (caregiver's characteristics), experienced more caregiving burdens and had more dissatisfaction with mental health services had poorer QoL. In particular, caregiver characteristics appeared to have the strongest association with caregiver's QoL. Future research should adopt a longitudinal study design to examine the relationship between QoL and these and other selected variables in the caregiver characteristic, caregiving situation and environmental factor domains, and should examine and impact of these variables in influencing the QoL of Chinese caregivers with relatives suffering from mental illness. Daniel Fu Keung Wong1 is professor of Department of Applied Social Studies, City University of Hong Kong, Hong Kong SAR. Mr. Angus, Yuk Kit Lam1 is a research fellow of Department of Applied Social Studies, City University of Hong Kong, Hong Kong SAR. Miss Sau Kam Chan2 is the Senior Service Coordinator of Baptist Oi Kwan Social Service, Hong Kong SAR, and Miss Shuk Fan Chan2 is in charge of the Resource and Service Centre for the Relative of Ex-Mentally ill People, Baptist Oi Kwan Social Service, Hong Kong SAR. DFKW is the person who has written the manuscript. AYKL was the coordinator of this research and had done the initial data analysis. SKC and SFC are staff of the agencies who had coordinated the data collection of this research and contributed to the discussion section of this manuscript. All authors read and approved the final manuscript.
2019-04-25T07:47:49Z
https://hqlo.biomedcentral.com/articles/10.1186/1477-7525-10-15
Teaching the steps of evidence-based practice (EBP) has become standard curriculum for health professions at both student and professional levels. Determining the best methods for evaluating EBP learning is hampered by a dearth of valid and practical assessment tools and by the absence of guidelines for classifying the purpose of those that exist. Conceived and developed by delegates of the Fifth International Conference of Evidence-Based Health Care Teachers and Developers, the aim of this statement is to provide guidance for purposeful classification and development of tools to assess EBP learning. This paper identifies key principles for designing EBP learning assessment tools, recommends a common taxonomy for new and existing tools, and presents the Classification Rubric for EBP Assessment Tools in Education (CREATE) framework for classifying such tools. Recommendations are provided for developers of EBP learning assessments and priorities are suggested for the types of assessments that are needed. Examples place existing EBP assessments into the CREATE framework to demonstrate how a common taxonomy might facilitate purposeful development and use of EBP learning assessment tools. The widespread adoption of EBP into professional education requires valid and reliable measures of learning. Limited tools exist with established psychometrics. This international consensus statement strives to provide direction for developers of new EBP learning assessment tools and a framework for classifying the purposes of such tools. Evidence-based practice (EBP), the integration and implementation of best available evidence with clinical expertise and patients' values and circumstances, is a foundation for healthcare education across disciplines and international borders and has become an essential requirement for certification and re-certification in many health professions. Assessing EBP learning is hampered, however, by a relative dearth of validated and practical assessment tools . Although the most recent systematic review identified 104 unique EBP assessment tools, the majority of these tools have not been validated and address only limited constructs of EBP [4–6]. The aim of this consensus statement is to provide guidance for purposeful classification and development of EBP assessment tools. It highlights principles to be considered during tool development, provides a framework for classifying EBP assessment tools, and identifies the types of tools that are needed to promote more consistent evaluation of EBP teaching outcomes. This consensus statement also proposes principles and priorities for future efforts in tool development. It does not evaluate the effectiveness of different educational approaches in promoting evidence-based behaviour change and quality improvement. This statement was conceived by the delegates of the 5th International Conference of Evidence-Based Health Care (EBHC) Teachers and Developers held in Sicily in October 2009 (http://www.ebhc.org) at its final plenary session. The initial structure of the statement and manuscript was developed following two conference round table discussions (4 hours) on how to classify and develop EBP learning assessment tools. Each author selected a section of the manuscript to research and develop, and their submissions were organized to focus the paper. An iterative process of shaping occurred through 4 conference calls and 7 draft reviews of the manuscript. The authors solicited input on the statement from non-author EBHC conference delegates in 2 phases - first from the conference steering committee (n = 12) and second from conference delegates (n = 66). Seventeen non-author conference attendees (22%) responded to the survey. Responses were incorporated into the final statement which was approved by author consensus. Authors and survey respondents constitute 25 individuals from 12 countries and 7 healthcare professions. Educators can assess different dimensions of EBP learning, including reaction to initial exposure to EBP, knowledge attainment, or the ability to use EBP skills to improve patient care. The challenge of assessing healthcare professionals' learning is not unique to EBP. Numerous educators have contributed to defining the complex nature of assessing professional competencies like EBP. Table 1 illustrates our proposal for categorizing assessment of EBP educational outcomes. Did the learners feel that the EBP educational experience provided benefit? Do the learners value EBP as an important part of their role in healthcare? Do the learners have confidence in their ability to carry out the 5-step EBP process? Do the learners know which study design is most appropriate for a prognostic study of a common condition? Are the learners effective at conducting a PubMed search for systematic reviews? Do the learners identify knowledge gaps and pursue best available evidence to address them? Do the learners' EBP actions result in improved patient outcomes? The proposed model is based upon work by Freeth et al. Freeth and colleagues used their systematic review of interprofessional learning in healthcare to develop categories specific to assessment of healthcare education based upon those originally proposed in Kirkpatrick's Hierarchy of Levels of Evaluation . We believe that these categories are well suited for assessing EBP learning because they allow educators to classify the impact of an EBP educational intervention from the most proximal phenomenon (the learners' experiences) to the most distal (patient care outcomes). Tools for assessing the effectiveness of teaching EBP need to reflect the aims of the curriculum. Learning aims will ideally be matched to the needs and characteristics of the learner audience. Straus et al. classified three unique EBP learner aims: to 'replicate' the EBP of others, to 'use' evidence summaries for EBP, and to 'do' the more time-intensive 5 steps of EBP defined by Dawes et al. in the original Sicily Statement . Students, for example, may need a comprehensive grounding in the 5 steps of EBP, whereas health professionals who manage services may require skills in using evidence summaries. Educators need to match assessment tools to the unique learning aims of different learner groups. For example, a skills assessment of EBP 'users' may need to focus on ability to find and appropriately apply rigorously pre-appraised evidence. Conversely, a skills assessment of EBP 'doers' may need to focus on ability to find, critically appraise, and apply primary research . The context and motivations for teaching, learning, and using EBP also need to be considered during assessment. Ability to master EBP skills can be influenced by contextual elements such as personal beliefs, organization barriers, variations in learning styles, and prior exposure to EBP. Motivations for using EBP also influence assessment. Practitioners learning to apply EBP in clinical practice may need to be assessed differently than undergraduate students, administrators, payers, and policy makers [10, 11]. Likewise, assessment of EBP learning in the context of interprofessional education models may require special consideration . Thus, developers of EBP assessment tools are encouraged to explicitly identify the type of learner and learning aims that a tool is designed to assess. Broadly speaking, the objective of an assessment can be one of two types - formative or summative. Formative assessment provides learners and teachers with information about competency development concurrent with the learning process, and can be used to influence the educational process and facilitate competence in real time. Summative assessments are used to establish competence or qualification for advancement. The potential high-stakes nature of summative assessments demand a greater degree of psychometric rigor compared to formative assessments . EBP assessment developers should clearly articulate the objectives of EBP assessment tools to signpost their utility for different learners and learning aims. We propose the Classification Rubric for EBP Assessment Tools in Education (CREATE; Figure 1) for classifying EBP learner assessment tools. Using this framework, the nature of an assessment can be characterized with regard to the 5-step EBP model, type(s) and level of educational assessment specific to EBP, audience characteristics, and learning and assessment aims. In contrast to Table 1, the assessment categories are listed in reverse order to illustrate how one category may build on the next from most simple (Reaction to the Educational Experience) to most complex (Benefit to Patients). The type of assessment generally used for each category is also described. Sample questions for each element of the CREATE framework are provided in Figure 2. To facilitate consistent use of the CREATE tool, descriptions, examples when available, and discussion of each level of assessment follow. The CREATE Framework. The Classification Rubric for EBP Assessment Tools in Education (CREATE) is a framework for classifying EBP learner assessment tools. Assessment tool developers can use the CREATE framework by 'checking' the boxes in the grid that represent the assessment category (or categories) and step (or steps) of EBP assessed by their tool. Additionally the audience characteristics and assessment aims for which the assessment tool is intended can be indicated in the right hand column. Examples of the types of questions addressed in the CREATE framework. I like to use new types of therapy/interventions to help my clients. I know better than academic researchers how to care for my clients. I am willing to use new and different types of therapy/interventions developed by researchers. When assessing attitudes about EBP, it is important to remember that attitudes are hypothesized to be modified by the assessment process . Any tool designed to assess EBP attitudes must consider the manner in which the question is framed. The easiest method of assessing attitudes about EBP may be a written questionnaire. However, it is noted that questionnaires may cause the individual to over-analyse why they hold such attitudes toward the object, thereby distorting their actual attitudes . A more rigorous approach would be to adopt a qualitative methodology during tool development to identify themes on which to base questions, or to triangulate survey data with actual use of an activity in practice [22, 23]. Within the CREATE framework, Self-Efficacy refers to people's judgments regarding their ability to perform a certain activity . For example, an individual's confidence in their ability to search for evidence may be associated with their likelihood to engage in searching . The Evidence-Based Beliefs Scale (EBBS) consists of 16 items that assess confidence in individuals' ability to use EBP (e.g. "I am sure that I can implement EBP") and their beliefs about EBP (e.g. "I believe that EBP results in the best clinical care for patients"). The EBBS demonstrated strong psychometric properties among a large cohort of nurses . Likewise, face and content validity have been reported for the Evidence-based Practice Confidence (EPIC) scale among a variety of healthcare professionals . Within the CREATE framework, Knowledge refers to learners' retention of facts and concepts about EBP. Hence, assessments of EBP knowledge might assess a learner's ability to define EBP concepts, list the basic principles of EBP, or describe levels of evidence. Knowledge assessment questions might ask learners to identify the most appropriate study design to answer a clinical question or to define Number Needed to Treat. Paper and pencil tests lend themselves well to this level of cognitive assessment. Examples of current EBP knowledge assessment tools are described below. Within the CREATE framework, Skills refer to the application of knowledge, ideally in a practical setting . Assessment of skill would require that learners 'do' a task associated with EBP, such as conduct a search, use a critical appraisal tool to summarize study quality, or calculate Number Needed to Treat. Tools can assess different dimensions of skills, such as the correct application, thoroughness of the process, or the efficiency with which a learner can complete some or all of the processes. To our knowledge there are two validated instruments that assess a combination of EBP knowledge and skills - the Berlin Questionnaire and the Fresno Test. Both tests ask learners to recall knowledge and describe how they would apply EBP skills in the context of clinical scenarios. Within the CREATE framework, Behaviour refers to what learners actually do in practice. It is inclusive of all the processes that a clinician would use in the application of EBP, such as assessing patient circumstances, values, preferences, and goals along with identifying the clinician's own competence relative to the patient's needs in order to determine the focus of an answerable question. EBP-congruent behaviour is essential to translation of EBP-congruent attitudes, knowledge, and skills into benefits for patients and, for assessment, is measured by some form of activity monitoring. The monitored behaviours need to reflect the learning aims and learner audience. Thus, it may be more appropriate for busy front-line clinicians to be monitored on their use of evidence summaries rather than their frequency of searching and appraising primary research . Assessment of EBP behaviour can help to 'lift the lid' on what learners take for granted, and expose the differences between their espoused theories (how they would consciously describe what they do) and their theories in use (what they actually do) . When used for formative purposes, behaviour assessments may help learners identify their learning needs, and help teachers evaluate how well their curriculum equips learners to use EBP in patient care. Assessing behaviour is not straightforward. Importantly, there may be a Hawthorne effect - the very act of measuring may affect behaviours. Some researchers have assessed behaviour by electronically capturing the searching behaviour of learners . Such approaches, although potentially useful in themselves, cannot fully assess the EBP-congruence of a learner's behaviour. For example, they cannot identify clinical questions that were not pursued, or even recognised, and they may not capture what was done with information that was found. Melnyk and Fineout-Overholt developed and validated the EBP Implementation Scale which assesses learners' self-report of attempts to implement EBP in the workplace . Although Shaneyfelt et al. note the potential biases in retrospective self-reporting behaviours, rigorous critical reflection may address this. Learning portfolios provide a potential strategy for reflection about and evaluation of EBP implementation [33, 34], but can be time consuming to complete and assess, and require additional skills in reflective practice. Portfolio use in summative assessment, especially 'high-stakes' assessments, is currently open to question and research is needed to develop these and/or alternative tools . The broader science and theory of behavior change may provide useful alternatives for measuring changes in EBP behaviors . The lines between assessment of knowledge, skills, and behavior can be difficult to discern. Table 2 delineates these three elements of the CREATE framework to facilitate consistent classification of current and future assessment tools. Within the CREATE framework, Benefit to Patients refers to the impact of EBP educational interventions on the health of patients and communities. The ultimate goal of EBP is to improve care outcomes for patients within the context of complex healthcare systems. Hence, there is a need to assess the impact of EBP education (generally for healthcare providers) on the benefit to patients [9, 36]. Measuring benefit to patients as a result of EBP learning is a complex process due to the influence of other variables in the process. In many cases assessment would occur at the institutional level. For example, if all of the care providers on a stroke rehabilitation unit learned how to integrate a clinical practice guideline into their care, would patients on that unit experience better outcomes? This question is intertwined with the much broader issue of how healthcare is delivered. Nevertheless, we propose that it is an important concept to consider within the narrower construct of the outcomes of EBP learning. When a healthcare professional learns to use EBP, we expect that he or she will identify more efficacious care behaviours and ultimately achieve better patient outcomes. To measure the benefit of EBP for patients, tool developers must identify endpoints in patient care that can be improved through application of EBP. Appropriate endpoints may be different depending on the perspective taken. An individual patient's perspective may be different from the healthcare provider's perspective, and that may be different from a group or an institution's focus on appropriate care endpoints . Measures of individual patient outcomes may include change in a patient's disease state, impairments, functional or social status; their satisfaction with service delivery; or the cost incurred to receive services. Benefit to patients from the healthcare providers' perspective may include change in diagnostic status, functional status, or quality of life. Institutional outcomes may focus on comparisons of service costs with and without EBP, and patient outcomes within diagnostic groupings following implementation of EBP recommendations . Potential endpoints are not specific to steps in the EBP process but rather to patient outcomes, so the CREATE framework does not delineate between the 5-steps for this level of assessment. Direct measures of patient health outcomes can be derived from clinical documentation to evaluate the impact of EBP approaches. For example, use of EBP approaches are associated with improved outcomes for patients with neck pain ; length of stay, overall costs of care, and readmission rates for children with asthma ; and the likelihood to prescribe evidence-based interventions in a general hospital . Direct surveys could be used to assess the impact of EBP-based services on patient perceptions about their functional outcomes, health status or satisfaction with services . Care must be taken to avoid wrongful identification of 'best outcomes' based on settings that are easier to study (such as controlled research settings), rather than outcomes with greater ecological validity (such as whole communities) . Additionally, patient care outcomes may need to be measured in conjunction with measures of clinician EBP behaviours to ensure that outcomes can be linked to EBP processes as opposed to other variables that impact patient outcomes. Several tools address more than one category of EBP assessment in a single instrument. The Evidence Based Practice Questionnaire (EBPQ) assesses attitudes, knowledge, and implementation, and has been validated with nurses and social workers . Additionally, the Knowledge, Attitudes, Access and Confidence Evaluation (KACE) has demonstrated adequate discriminative validity, responsiveness to training, and test-retest reliability with dental students and faculty . The need to assess the effectiveness of education and validate the usefulness of EBP approaches is clearly being grappled with by many health professions. As more tools are created, it becomes more important that there is a mechanism for classifying their singular or multiple purposes. The elements of EBP learning assessed by outcome measures referenced in this manuscript are illustrated in the CREATE framework (Figure 3) to demonstrate how the classification process might help developers identify gaps and to help teachers select the best available tools. Tests that are placed within the CREATE model will necessarily need to be weighed in the context of how they are to be used, including who the learners are, the intent of evaluation process, and the environmental contexts in which learning and assessment take place. The CREATE framework is not a model of EBP, but rather it is a tool to classify the intent of EBP educational assessments. Classification of validated EBP learning assessment tools using the CREATE framework. EBPIS: Evidence-Based Practice Implementation Scale; KACE: Knowledge, Attitudes, Access and Confidence Evaluation; EBBS: Evidence-Based Beliefs Scale; EPIC: Evidence-based Practice Confidence Scale; EBPAS: Evidence-Based Practice Attitude Scale. There are substantial needs for development of EBP assessment tools across the categories outlined in this paper: reaction to the educational experience, attitudes, self-efficacy, knowledge, skills, behaviour, and benefit to patients. As noted earlier, assessment tools need to be valid and practical for use by educators and researchers. Validation across learner characteristics (e.g. students vs. clinicians, nurses vs. physicians, users vs. doers) is most useful for broad adoption within EBP education, but as a minimum, tools should identify the type(s) of learner(s) for which they are validated. Guidance for appropriate study design to establish outcome measure validity is beyond the scope of this statement, however many quality references are available [48–50]. Use the CREATE framework to classify new tools with regard to EBP steps assessed, assessment category (or categories) addressed, and the audience characteristics and assessment aim for which the tool is intended and/or validated. Clearly state the foundational principles of learning and assessment upon which a new assessment tool is developed. Clearly state how the design of a new tool is linked to the learning aims it is intended to measure. Develop, validate, and use a standardized method for translation of tools into new languages. A common framework and standardized questions are needed to assess learners' reactions to EBP educational interventions. A standardized assessment would allow reaction to be compared across interventions. There is a need to build upon existing tools (e.g., EBPAS , EBBS, EPIC, EBPQ, KACE) to facilitate measurement of self-reported attitudes, beliefs, and self-efficacy across different learner populations and educational settings. There is a need for reliable qualitative methods to assess EBP attitudes and self-efficacy that can be compared across studies. Developers are encouraged to continue psychometric testing of the Fresno Test and Berlin Test) to establish sensitivity to change over time and minimum 'competency' performance for different learner populations and educational settings. The Berlin and Fresno assessments emphasize searching and critical appraisal skill for primary research evidence. Assessments of learners that require different skills are needed (e.g. practitioners that primarily rely on evidence summaries need to be assessed regarding their knowledge of how to appraise and skill for applying evidence summaries and clinical guidelines). Further investigation is warranted to ascertain ability to obtain and integrate patient values and perspectives in the context of EBP. Assessments that address the performance of EBP skills across clinical environments are needed, including assessment through observation. Generic self-monitoring tools are needed that measure clinician use of EBP processes in clinical decision-making including, but not limited to: frequency of performing each EBP step, resources used, patient involvement in evidence-based decision-making, frequency of change in clinical management due to newly found evidence, and rate of positive vs. negative outcomes associated with EBP use. Valid, practicable methods are needed for monitoring learners' EBP behaviours that can be used for both formative and summative purposes, particularly 'high stakes' assessments. Tools are needed that measure patient outcomes concurrently with the application of evidence-based approaches to care that inform the impact of EBP behaviours on patient outcomes. Implementation of appropriate qualitative methodologies are needed to determine important outcomes from patients' perspectives with regard to EBP that can be used in diverse healthcare settings. Using a common set of outcome tools and adopting the operational terms presented in this paper to allow comparison across studies. Including a measure of learners' reaction to the intervention as this may impact effectiveness in other outcome categories. Developing methodologies for assessing the efficacy of interventions designed to target different elements of EBP as defined by the CREATE framework. Assessing the correlation between the assessment categories outlined in the CREATE framework. That is, do the lower order objectives such as attitudes and self-efficacy relate to knowledge and skill and do knowledge and skill relate to behaviour and so on. Evidence-based practice education has spread across professions and clinical settings; however the ability to measure the impact of EBP educational experiences or programs is limited to a few validated tests that do not measure across all levels of learning or steps of EBP. The CREATE framework was developed to provide a classification system for new and existing tools, to help tool developers focus the intent of their tools, and to provide unifying operational definitions to facilitate a common language in EBP learning assessment. We anticipate that use of CREATE to classify EBP learning assessment tools will provide teachers and researchers with an effective method for idenitfying the best available tools for their needs. We have outlined priorities for EBP assessment tool development generated through an international consensus process and based on the CREATE framework. We hope that consideration of these recommendations will facilitate needed innovations in EBP assessment tool development. The authors would like to acknowledge Nino Cartabellotta, President of the GIMBE Foundation and his team for hosting the 5th International Conference of Evidence-Based Health Care (EBHC) Teachers and Developers and for coordinating dissemination of the manuscript to delegates for feedback; Janet Martin BScPhm, PharmD, Chair of the 5th EBHC Conference International Steering Committee for supporting our work during and after the conference; Nina Rydland Olsen, Physiotherapist, MSc who was a member of the theme group at the conference and contributed to the original outline; and all of the 5th EBHC Conference delegates who gave us thoughtful and important feedback on the manuscript. JKT led development of the manuscript including collection and analysis of delegate feedback. SLK developed the CREATE framework. All authors were involved in drafting the manuscript and in critically revising both the text and the CREATE framework for important intellectual content. All authors read and approved the final manuscript.
2019-04-23T20:27:43Z
https://bmcmededuc.biomedcentral.com/articles/10.1186/1472-6920-11-78
Sjogren’s syndrome is the leading cause for aqueous tear-deficiency dry eye. Little is known regarding the relationship between Sjogren’s syndrome dry eye (SSDE) and patients’ medical expenditure, clinical severity and psychological status changes. Thirty-four SSDE patients and thirty non-Sjogren’s syndrome dry eye (non-SSDE) subjects were enrolled. They were required to complete three self-report questionnaires: Ocular Surface Disease Index, Zung Self Rating Anxiety Scales, and a questionnaire designed by the researchers to study the patients’ treatment, medical expenditure and income. The correlations between expenditures and these parameters were analyzed. The annual total expenditure on the treatment of SSDE was Chinese Yuan 7637.2 (approximately US$1173.8) on average, and the expense paid by SSDE patients themselves was Chinese Yuan 2627.8 (approximately US$403.9), which were 5.5 and 4.5 times higher than non-SSDE patients (both P < 0.001). The annual total expense on Chinese medicine and western medicine were 35.6 times and 78.4% higher in SSDE group than in non-SSDE group (both P < 0.001). Moreover, indirect costs associated with the treatment were 70.0% higher in SSDE group. In SSDE group, the score of Zung Self Rating Anxiety Scales had significantly positive correlation with total medical expenditure and the expense on Chinese medicine (ρ = 0.399 and ρ = 0.400,both P = 0.019). Nevertheless, total medical expenditure paid by the patients in non-SSDE group positively correlated with the score of Ocular Surface Disease Index (ρ = 0.386, P = 0.035). Medication expenditures and associated costs is an unignorable economic burden to the patients with SSDE. The medical expense had a significantly correlation with clinical severity of SSDE and the patients’ psychological status. Dry eye (DE) is a multifactorial disease of the ocular surface characterized by a loss of homeostasis of the tear film, and accompanied by ocular symptoms, in which tear film instability and hyper-osmolarity, ocular surface inflammation and damage, and neurosensory abnormalities play etiological roles . Sjogren’s syndrome (SS) is the leading cause for aqueous tear-deficiency dry eye, with an annual incidence of 6.92 (95% CI: 4.98–8.86) per 100,000 person and an overall prevalence of 60.82 (95% CI: 43.69–77.94) cases per 100,000 . This syndrome exhibits a female-to-male ratio of 9:1 and mainly affects middle-aged women , which is characterized by lymphocytic infiltration of exocrine glands and glandular dysfunction, with the salivary and lacrimal glands mainly involved. Compared to patients with non-SSDE, those with SSDE have more severe symptoms and signs, more complicated and challenging treatment, and worse prognosis. It has been reported that the expenditures and associated costs paid for the treatment of DE are an unignorable economic burden to the patients [4–7], especially after the introduction of cyclosporine emulsion in 2003 . Previous surveys performed in some Asian and European countries showed that the treatment of DE caused an annual cost up to US$1.10million to the healthcare system [5, 6]. Moreover, symptoms of anxiety are common in patients with DE [9, 10]. Anxiety has been shown to have significant association with excessive direct and indirect medical costs . The studies on the expenditures and psychological changes in patients with DE have been performed previously [4–7]. However, no literature has been published regarding the medical cost for SSDE in Asian area. Based on previous findings, we hypothesize that the expenditure and associated costs paid for the treatment of SSDE had a close relationship with its clinical severity and patients’ anxious status. Therefore, we conducted a cross-sectional study to investigate the expenditures associated with the treatment of SSDE, and explored its correlation with the clinical severity and patients’ psychological status as well. The study was approved by the ethics committee of Eye & ENT Hospital of Fudan University and was conducted according to the tenets of the Declaration of Helsinki. Patients referring to the dry eye clinic of Eye& ENT Hospital of Fudan University from March to July, 2016 were recruited. Informed consent was obtained from all enrolled patients. Participants were categorized into two groups: SSDE and non-SSDE. All patients had a frequent or sustained occurrence of any one of DE symptoms for at least 3 months: burning sensation, foreign body sensation, sensation of stabbing pain, gargalesthesia, photophobia, dryness, or asthenopia. For the symptomatic subjects, the diagnosis of DE was made in the case that any two of the following three conditions were present: (i) Schirmer I test (S1T) value of < 10 mm / 5 min, (ii) tear film breakup time (TBUT) of < 10 s and (iii) corneal fluorescein staining (CFS) was noted as positive when CFS score ≥ 1. CFS score was evaluated using the National Eye Institute grid based on grades 0–3 in each of the five quadrants (central, nasal, temporal, superior and inferior cornea) for a total score of 15 [12, 13]. Dry eye patients, who met the diagnostic criteria proposed by the American College of Rheumatology [14, 15], were assigned to SSDE group. The criteria include: (1) positive serum anti-SSA/Ro and/or anti-SSB/La (or positive rheumatoid factor and ANA titer C1:320); (2) labial salivary gland biopsy exhibiting focal lymphocytic sialadenitis with a focus score ≥ 1per4mm2; and (3) keratoconjunctivitis sicca with ocular staining score ≥ 3.The other participants were enrolled in the non-SSDE group. Participants who had the following medical history were excluded: active cornea disorders such as cornea ulcer, corneal infections, tumors and other immunological corneal disorders (e.g. Steven-Johnson syndrome), history of cornea trauma, history of ocular surgery or contact lens wear within the past 6 months, psychiatric disorder with current use of mental medications that might affect the psychological assessment. Demographic data of eligible subjects were obtained by chart review. The information was collected including name, gender, age, education, occupation, the time when the diagnosis of SSDE/non-SSDE were first made and the duration of disease. Three questionnaires were completed by the patients independently. For those who had difficulty in understanding the questions, the research staff would provide them explanations in a neutral manner. The completed questionnaires were reviewed by research staff to ensure no questions were missing. After demographic data collection and accomplishment of questionnaires, all participants underwent standard ocular examination for DE including CFS, TBUT, and S1T. TBUT and CFS were performed during slitlamp biomicroscopy examination. S1T was performed lastly to avoid the impact on corneal epithelium and fluorescence staining. All ophthalmologic examinations were done by the same professional ophthalmologist. The questionnaire, designed by the research group, contained two parts with a total of twelve questions including treatment regimens and the expense paid on the treatment directly or indirectly. Chinese medicine has been confirmed to be an effective method in the treatment of autoimmune disorder and DE by previous studies [16–20]. Therefore, the medical expenditures on western medicine and Chinese medicine were listed and calculated separately. The questions regarding the treatment in the questionnaire were specific for DE and SS. Treatment costs for other diseases were excluded. The detailed content of the questionnaire was listed in Table 1. Q2. Western medicine usage: name of medicine, price, frequency of administration. Q3. Chinese medicine usage: name of medicine, price, frequency of administration. The Zung Self Rating Anxiety Scales (SAS) was a 20-item, four-point Likert scale self-report assessment for anxiety . Fifteen items expressed negative experience or symptoms (e.g., “I tend to be confusing or terrified”) and 5 expressed positive experience (e.g., “I feel that everything is all right and nothing bad will happen”). Item responses of SAS were ranked from 1 to 4, with higher scores indicating more frequent symptoms. The raw total scores were converted to a 100-point scale by multiplying by 1.25. According to previous study, converted scores> 50 indicated that the patient had the symptoms of anxiety . Additionally, the OSDI scale, a widely used questionnaire to quantify ocular disability in cases of DE , was also completed by participants to evaluate the severity of ocular discomfort symptoms. All data were analyzed with the Statistical Package for the Social Sciences (SPSS, version 18.0, SPSS Inc., Chicago, Illinois, USA). Normal distribution data were expressed as mean ± standard deviation and abnormal distribution data were expressed as median with range. Chi-square test was used to analyze the categorical variables including the gender distribution, income distribution, education, and occupation. Mann-Whitney U tests and Kruskal–Wallis test were applied to compare continuous variables including age, expense, OSDI and SAS scores, CFS, S1T and TBUT. Spearman’s rank correlation test was performed to analyze the relationship between the medical expenditures, SAS scores and clinical parameters. All tests were considered statistically significant at P < 0.05. A total of sixty-four patients were enrolled in this study, with an average age of 53.7 ± 14.7 years old and females accounting for the majority (85.9%). Thirty-four patients were diagnosed as SSDE, among whom twenty-five (73.5%) were primary SS and nine (26.5%) were secondary to other autoimmune diseases such as rheumatoid arthritis and systemic lupus erythematosus. Another thirty non-SSDE patients served as controls. The demographic data were presented in Table 2. The SSDE group had a lower educational background and a larger number of retired subjects (P = 0.020 and 0.016, respectively). Moreover, the time duration from the first onset of the disorder was longer in SSDE patients than non-SSDE ones (6.6 ± 2.4 years vs 1.9 ± 0.4 years) (P < 0.001). Figure 1a showed that eighteen (52.9%) SSDE patients had oral systemic western medications including hydroxychloroquine and/or corticosteroid, whereas none of patients in non-SSDE group had systemic treatment of western medications. Moreover, a larger proportion of patients in SSDE group (73.5%) had combined treatment of western medicine and traditional Chinese medicine than in non-SSDE group (3.3%). The therapeutic regimens were more complicated and diversified in the SSDE group. All SSDE patients had topical administration of cyclosporine eye drops, while only 6.7% of non-SSDE subjects had the same treatment. The detailed information of topical medication usage was shown in Fig. 1b and c. It’s also notable that the SSDE patients referred to the dry eye clinic more positively and regularly. In our study, 32 (94.1%) SSDE patients referred to our hospital once a month. On the contrary, the interval time of medical visit was irregular in the non-SSDE group, ranging from one month to six months. The annual total expenditure on medical treatment in the SSDE group was 5.5 times higher than in the non-SSDE group. Annual costs on Chinese medicine in the SSDE group were 35.6 times higher than the non-SSDE group, accounting for a significant portion of total expenditure in the medical treatment. The annual medical expense on western medicine was also 78.4% higher in SSDE patients than in non-SSDE ones, which were shown in Table 3. All enrolled patients had the same type of medical insurance, which is provided by local government and is mandatory to all citizens. Medical expense on the treatment of dry eye was predominantly paid by insurance both in the SSDE group (94.1%) and in the non-SSDE group (80.0%). Even though, the expenditures uncovered by medical insurance were significantly higher in the SSDE group. The costs paid by SSDE patients themselves on western medicine and Chinese medicine were 84.9% and 34.5 times higher than non-SSDE ones respectively, as shown in Table 3. It’s noteworthy that indirect expenditures and expenses on auxiliary therapy were also significantly higher in the SSDE group (P = 0.017 and P < 0.001). There was a higher proportion of SSDE subjects taking auxiliary therapy than non-SSDE ones (20.6% vs 3.3%, P < 0.001). These costs were not covered by medical insurance, too. In contrast, the personal income is lower in SSDE subjects. Therefore, a significantly higher number of patients in SSDE group considered medical expenditure as a financial burn, as shown in Table 4. The ophthalmologic and psychological data were presented in Table 5. Mean CFS score was significantly higher in the SSDE group (P < 0.001), and the positive rate of CFS as well (83.8% vs 46.7%, P < 0.001). Among SSDE patients with CFS staining, 14.7% were unilaterally affected and 79.4% were bilaterally affected. Moreover, SSDE patients reported a higher OSDI score and SAS score (both P < 0.001). 26.5% of SSDE patients (n = 9) had the symptoms of anxiety, while only 6.7% of non-SSDE patients (n = 2) tended to be anxious (P = 0.036). The spearman’s correlation analysis revealed that SAS scores had significantly positive correlation with both total medical expenditure and expense on Chinese medicine in the SSDE group (ρ = 0.399 and ρ = 0.400,both P = 0.019). Similar correlations were also found between SAS scores and the costs paid by the patients themselves on total medication and Chinese medicine (ρ = 0.417 and ρ = 0.407, P = 0.014 and P = 0.017). SAS scores also had significant correlation with OSDI scores, education and S1T values in SSDE patients (ρ = 0.445, − 0.375 and − 0.416, P = 0.008, 0.029 and 0.014, respectively). In contrast, ODSI scores were found to positively correlate with the costs paid by the patients themselves on total medication and western medicine in non-SSDE group (ρ = 0.386 and ρ = 0.677, P = 0.035 and P < 0.001). Western medicine expenditures had no significant correlation with SAS and clinical parameters in both groups. What’s more, no correlation was found between the time from onset of disease and SAS score in all patients. The current study showed that the annual medical costs for treatment of SSDE was CNY 7637.2 (approximately US$1173.8) on average, which was similar to those reported in the United Kingdom . It far exceeded the per capita health care expense in Shanghai, which was reported to be CNY1016.7 (approximately US$146.774) for an urban family and CNY1029.0 (approximately US$166.77) for a rural family . Based on the per capita total income of both urban and rural households reported by the same website, the annual medical expense paid by the patients themselves on the treatment of SSDE accounted for 5.9% and 14.8% of the per capita total income for urban and rural households respectively. In contrast, the annual medical expense uncovered by insurance was CNY 481.9 (approximately US$71.1) in the non-SSDE group, which only accounted for 1.1% and 2.7% of urban and rural household annual income. Therefore, the medical expenditures accounted for a considerably higher proportion of per capita total income in the SSDE group than in the non-SSDE group both in urban and rural families, especially in rural families. Compared to non-SSDE patients, SSDE patients suffered from more severe clinical symptoms and signs, and had stronger motivation for medical help and more regular medical visit. Meanwhile, the therapeutic regimens to treat SSDE were more complicated, including artificial tears, topical applications of immunosuppressant therapies, autologous serum or serous extraction, secretagogues and interventional treatments, and had more diversified combinations . Some of them were not or only partially covered by medical insurance. The current study found that even with medical insurance, medical expense paid by the patients themselves and associated expense was significantly higher in the SSDE group than that in the non-SSDE group. According to our study, the annual burden of the SSDE and non-SSDE for the Chinese healthcare system was estimated to be CNY 5009.4.1(approximatelyUS$769.9) and CNY697.2 (approximatelyUS$102.4) per patient. Medical expense on the treatment of SSDE leads to a heavy economic burden on both patients themselves and healthcare system. The main reason for higher expenditure on western medicine in SSDE patients was that cyclosporine ophthalmic solution, which was indispensable in the treatment of SSDE, was uncovered by medical insurance in Shanghai. Nevertheless, the exaction of calf serum (Deproteinized Calf Blood Extract Eye Drops, Xingqi Co. Ltd.) and artificial tears were only partially covered by medical insurance. Unlike non-SSDE patients who usually use artificial tears only, cyclosporine eye drops and the serum exaction were necessary in the treatment of SSDE to inhibit ocular surface inflammation, promote corneal epithelium healing and relieve ocular discomfort symptoms [25–27]. Moreover, SSDE patients usually used medications more regularly and frequently, leading to a larger demand for the medications and higher medical expenditures. Many studies had been confirming that Chinese medicine, including herbal medicine, acupuncture, moxibustion and cupping, was an effective method in the treatment of SS and DE [16–20]. Our study showed that the expenditure on Chinese medicine treatment accounted for 80.3% of total medical costs in the SSDE group, being significantly higher than that in control group. Acupuncture, which had been proven to be effective in stimulating tear production , was not fully covered by medical insurance. Continuous price rising of Chinese herbal medicine in the recent year and partial coverage or uncoverage of some precious and expensive Chinese herbs by medical insurance system were also the contributing factors for higher medical costs in SSDE group. Apart from direct expense on medical treatment, SSDE patients also had more indirect expenditure. The majority of SSDE patients received combined treatment with western medicine and traditional Chinese medicine at the same time. To save time and accomplish clinical visits to several hospitals in one day, SSDE patients are likely to spend more costs on transportation, food or even accommodation. Some severe SSDE patients made the extra expense to buy household electrical appliance, for instance air humidifier, to make the household environment more comfortable and to provide extra help for the relief of dry eye symptoms. Moreover, auxiliary therapies including wearing moisture chamber glasses and lacrimal plug implantation need a large amount of money. Unfortunately, these costs were not covered by medical insurance, too. Higher proportion of subjects using auxiliary therapy also contributed to the higher medical expenditure in the SSDE group. The current study found that SSDE patients showed more signs of anxiety than non-SSDE patients, which was in agreement with previous reports [10, 28]. Apart from more severe ocular symptoms and clinical signs, heavier economic burden was another important reason for more severe anxiety in SSDE patients. More anxiety and depression lead to deterioration of ocular symptoms and further more expenditure on medical treatment, which formed a vicious cycle. A potential mutual promotion relationship between psychological status and medical expenditure might be the supporting evidence [11, 29]. Additionally, some SSDE patients were secondary to other autoimmune disorders. Systematic symptoms might be another potential contributing factor aggravating the anxiety and depression. In our study, medical expenditures and Chinese medicine costs, no matter total expenses or the amount paid by the patients themselves, were found to be positively correlated with SAS scores in the SSDE group. In contrast, the expenses paid by the patients themselves on total medication and western medicines were found to correlate with ODSI scores in the non-SSDE group. The possible reason was that the majority of SSDE patients had a lower educational background and had the retirement in their early fifties. With limited amount of retirement income, the cost for medical treatment was a heavier economic burn to them compared to the non-SSDE ones. Economic burden and life pressure were far more likely to induce anxiety in SSDE patients. On the contrary, non-SSDE patients were relatively better educated and had higher income. The medical expenditure on dry eye can hardly induce anxiety in this population. The leading factor for their medical cost was their subjective feeling of ocular discomfort. In summary, In regard to mild to moderate dry eye patients, clinical signs and symptoms are still the important index from the doctor’s perspective. As for SSDE patients, more care should be paid to their psychological status during the treatment. The present study revealed a positive correlation between SAS scores and OSDI scores in both SSDE and non-SSDE groups, which was in agreement with Li’s study . Moreover, SAS scores had negative correlation with S1T, which was not shown before. Since SS was the most common cause for tear-deficiency dry eye, S1T test might be more meaningful with regard to the diagnosis of SSDE. In addition, many studies confirmed a significantly negative correlation between anxiety and educational level [10, 30]. It was in agreement with our findings. More medical information through various paths and a better understanding of the disease is of great importance to improve SSDE patients’ cooperation with the doctors and alleviate their symptoms of ocular discomfort and anxiety effectively. There were three limitations in this study. First, the sample size is not big enough. Further study with a larger sample size is required to confirm these findings. Second, the annual medical expenditures were calculated mainly based on the medical costs in the several recent months because most patients could not recall the expense occurring a long time ago. Considering the price fluctuation of medicine and modification of treatment regimen, the biases in calculating the medical expense were unavoidable. The medical expense might be over-estimated in the patients with deteriorated symptoms in the recent months, while it might be under-estimated in those with improvements in the recent months. Third, only SAS scale was used to evaluate the anxiety of the patients. There were some other psychological scales, such as Self Rating Depression Scales (SDS) , which might be used in our further study to merit overall evaluation of the psychological status. Medical expense is a considerable economic burden to patients with SSDE in East China. The medical expense had a significant correlation with psychological status in SSDE patients. Apart from the improvement of clinical symptoms and signs, attentions should also be paid to alleviate the anxiety caused by the disease. It is also necessary to promote public education to SSDE patients and help them to get a better understanding of the disease. In addition, effective and inexpensive treatment is urgently needed to reduce the financial burden of SSDE on both patients and healthcare systems. The authors thank Daniel Cordova for the assistance in the correction of linguistic errors. The study was supported by National Natural Science Foundation of China (81270014). WY collected the data and drafted the manuscript. QL played a predominant role in the design and conceptualization of the article. All authors have revised the manuscript critically for important intellectual content and have approved the final manuscript. The study was approved by the ethics committee of Eye & ENT Hospital of Fudan University and was conducted according to the tenets of the Declaration of Helsinki. Informed consent was obtained from all enrolled patients. National Bureau of Statistics of the People’s Republic of China. 2017. http://www.stats.gov.cn. Accessed 15 Mar 2017.
2019-04-26T03:38:51Z
https://bmcophthalmol.biomedcentral.com/articles/10.1186/s12886-018-0694-5
THIS AGREEMENT SETS FORTH THE TERMS OF CUSTOMER'S USE OF PRODUCST AND SERVICES (“SERVICES”) PROVIDED BY SOLODEV. BY PURCHASING OR USING SOLODEV PRODUCTS AND / OR SERVICES (SERVICES); BY EXECUTING AN ORDER; OR BY ACCEPTING THIS AGREEMENT; YOU AS THE "CUSTOMER" (“YOU”, “YOUR”, “CUSTOMER”, “CLIENT”, LICENSEE”, OR “SUBSCRIBER”) AGREE TO THE TERMS OF THIS AGREEMENT (THE "AGREEMENT") WITH JUST PROGRAM, LLC DBA DIGITALUS, DBA SOLODEV ("SOLODEV"). IF CUSTOMER IS ENTERING INTO THIS AGREEMENT ON BEHALF OF A COMPANY OR OTHER LEGAL ENTITY, CUSTOMER REPRESENTS THAT HE/SHE HAS THE AUTHORITY TO BIND SUCH ENTITY AND ITS AFFILIATES TO THESE TERMS AND CONDITIONS, IN WHICH CASE THE TERMS "CUSTOMER" SHALL REFER TO SUCH ENTITY AND ITS AFFILIATES. IF CUSTOMER DOES NOT HAVE SUCH AUTHORITY, OR IF CUSTOMER DOES NOT AGREE WITH THESE TERMS AND CONDITIONS, HE/SHE MUST NOT ACCEPT THIS AGREEMENT AND MAY NOT USE THE SERVICES. IF CUSTOMER DOES NOT AGREE WITH ALL OF THESE TERMS, CUSTOMER WILL NOT BE ABLE TO PURCHASE OUR SERVICES. BY ACCEPTING AND / OR USING THE SERVICES, YOU ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT AND AGREE THAT YOU AND YOUR USERS WILL BE BOUND BY ALL TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU REGISTER FOR A FREE TRIAL FOR OUR SERVICES OR FOR FREE SERVICES, THE APPLICABLE PROVISIONS OF THIS AGREEMENT WILL ALSO GOVERN THAT FREE TRIAL OR THOSE FREE SERVICES. This Agreement is the complete and exclusive agreement between Customer and Solodev regarding its subject matter and supersedes and replaces any prior agreement, understanding, or communication, written or oral. Customers who are direct competitor of Solodev may not access the Services, except with Solodev’s prior written consent. In addition, the Customer may not access the Services for purposes of monitoring their availability, performance, functionality, or for any other benchmarking or competitive purposes. This Agreement was last updated on January 1, 2018. It is effective between the Customer and Solodev, as of the date of Customer accepts this Agreement. “Acceptable Use Policy” means Solodev’s Acceptable Use Policy which is expressly incorporated herein effective as of the date Customer signs or submits Order or start utilizing Solodev Products and / or Services. “ACH” means Automated Clearing House. “Cancellation Date” is defined based on the Cancellation Request, product line and contract term. Typically the cancellation date is 30 days after a written Cancellation request was received. “Cancellation Request” means a service cancellation request completed by users by logging into their account and submitting request to cancel or sending certified mail. “Confidential Information” means all information disclosed by either party to the other, whether before or after the effective date of the Agreement, that the recipient should reasonably understand to be confidential, including without limitation: (a) for Customer, all information transmitted to or from, or stored on, Solodev’s systems, (b) for Solodev, includes the Services and unpublished prices and other terms of service, audit and security reports, business, sales and marketing plans, technology and technical information, product plans and designs, and business processes, product development plans and designs, server configuration designs, and other proprietary information or technology, and (c) for both parties, information that is marked or otherwise conspicuously designated as confidential. Information that is developed by either party on its own, without reference to the other’s Confidential Information, or that becomes available to either party other than through breach of the Agreement or applicable law, will not be considered “Confidential Information” of the other party. “Contract Period” also referred to as “Contract Term” or “Agreement Term” means the duration of the Agreement after expiration of the “Initial Contract Period” and renewal for additional term equal in length to the initial term. “Customer” means an individual accepting this Agreement on his or her own behalf, such individual, or in the case of an individual accepting this Agreement on behalf of a company or other legal entity, the company or other legal entity for which Customer is accepting this Agreement, and Affiliates of that company or entity which have entered into Order. “Documentation” also referred to as “Solodev Help” means the applicable Services documentation, and its usage guides and policies, as updated from time to time, accessible via solodev.zendesk.com or login to the applicable Service. “EFT” means Electronic Fund Transfer. “Initial Contract Period” is the initial period from the effective date which Customer selects within the Order and commits to receive Solodev Services. “Order” means either: (a) the online order that Customer submits to Solodev via the Solodev Website, (b) the online, electronic or paper order that Customer submits via 3rd party reseller; or (c) any other written order (either in electronic or paper form) provided to Customer by Solodev for signature that describes the Services Customer is purchasing, and that is signed by Customer, either manually or electronically. “Services” means those Solodev products or services described in the Order. “Third Party Products” means third party software, services, applications or products that are not developed by Solodev but may be provided to Customer under this Agreement. “Third Party Providers” means certain reseller and other relationships that Solodev has established with certain commercial vendors. “Users” means the Customer and the Customer’s employees, agents, contractors, consultants, third parties or other users who obtain or in any way use Services from Solodev. For the fees stated on the face hereof or as otherwise stated herein, Solodev will use its best efforts to furnish during its normal operating hours the requested Services. Solodev Obligations. For all Orders accepted by Solodev and subject to this Agreement, Solodev agrees to provide the Services listed, subject to and in accordance with the Agreement. Customer Obligations. The Customer agrees to (a) be responsible for Users’ compliance with this Agreement, Documentation and Orders, (b) be responsible for the accuracy, quality and legality of Customer’s own data, and the means by which data was acquired, (c) use reasonable security precautions in light of Customer use of the Services and commercially reasonable efforts to prevent unauthorized access to or use of Services, (d) immediately notify Solodev of any unauthorized access or use of Customer account or any other breach of the security of the Services, (e) immediately report any issues or defects; (f) cooperate with Solodev’s reasonable investigation of outages, security problems, and any suspected breach of the Agreement; (g) use Services only in accordance with this Agreement, Documentation, Orders and applicable laws and government regulations, and (h) comply with terms of service of any 3rd Party Providers with which Customer uses Services, (i) pay when due the fees for the Services and applicable charges, (j) keep Customer's billing contact, information, and other account information up to date; (k) pay all applicable federal, state, and local sales, use, value added, surcharges, excise, license, and any other taxes assessed with respect to the Services; and (l) provide Solodev with accurate factual information to help Solodev determine if any tax is due with respect to the provision of the Services, and if Solodev is required by law to collect taxes on the provision of the Services, then Customer must pay Solodev the amount of the tax that is due or provide satisfactory evidence of Customer’s exemption from the tax. The Services will be deemed accepted once Customers incepts usage of deliverable or fifteen (15) days after delivery, whichever occurs first. By agreeing to the terms and conditions of this Agreement, Customer agrees to Solodev’s Acceptable Use Policy as set forth herein. This Acceptable Use Policy (the "AUP") governs the Customer's use of all products and services (collectively, the "Services") offered by Solodev, as may be further described in any written proposal submitted by Solodev to the Customer or any service Orders submitted by the Customer and accepted by Solodev. This AUP applies to the Customer and the Customer's employees, agents, contractors, or other users who obtain Services from Solodev (each such person or entity being a "User"). Solodev's services may only be used for lawful purposes. Users may not use Solodev's Services to engage in, foster, or promote illegal, abusive, or irresponsible behavior. BY REGISTERING FOR AND USING THE SERVICES, THE CUSTOMER ACKNOWLEDGES THAT HE/SHE HAS READ THIS AUP AND AGREE THAT ALL CUSTOMER'S USERS WILL BE BOUND BY ALL TERMS AND CONDITIONS OF THIS AUP. Intellectual Property Rights. The Customer warrants, represents, and covenants to Solodev that: (a) the Customer is at least 18 years of age if an individual and possess the legal right and ability to enter into this Agreement; (b) the Customer and the Customer's Users will use the Services only for lawful purposes and in accordance with this Agreement; and (c) the Customer and the Customer’s Users have obtained all license or other rights necessary to install or use any software or products in conjunction with use of the Services. Third Party Products. For the Customer's convenience, Solodev may provide the Customer access to Third (3rd) Party Products through certain 3rd Party Providers. Neither Solodev nor any 3rd Party Provider makes any representations nor warranties of any kind, express or implied, regarding any 3rd Party Products. The Customer agrees that he/she will not (a) copy any license keys or otherwise decrypt or circumvent any license key, (b) remove, modify, or obscure any copyright, trademark, or other proprietary rights notices that appear on or during use of any 3rd Party Product, or (c) reverse engineer, decompile, or disassemble any 3rd Party Product, except to the extent that such activity is expressly permitted by the 3rd Party Provider or applicable law. The Customer agrees to observe the terms of any license or applicable end user agreement for 3rd Party Products and Solodev will not have any liability for the Customer's use of any 3rd Party Products or any violation of any license agreements that govern such 3rd Party Products. Any acquisition by Customer of 3rd Party Products, and any exchange of data between the Customer and any 3rd Party Provider and 3rd Party Product is solely between the Customer and the applicable 3rd Party Provider. Solodev does not warrant or support 3rd Party Products, whether or not they are designated by Solodev as “certified” or otherwise, unless expressly provided otherwise in an Order. If Customer chooses to use a 3rd Party Products with a Service, Customer grants Solodev permission to allow the 3rd Party Provider and its 3rd Party Products to access Customer Data as required for the interoperation of that 3rd Party Product with the Service. Solodev is not responsible for any disclosure, modification or deletion of Customer Data resulting from access by such 3rd Party Product or its provider. Security. Solodev is not responsible for any security breaches. Customer will not (a) make any Service available to anyone other than Users, or use any Service for the benefit of, anyone other than Customer and authorized Users, unless expressly stated otherwise in an Order, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service, or include any Service in an outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Documentation in a way that circumvents a contractual usage limit, or use of any of Solodev Services in a manner that violates Solodev Acceptable Use Policy, or to access or use any of Solodev’s intellectual property except as permitted under this Agreement, or an Order, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) frame or mirror any part of any Service, other than framing on Customer’s own intranets or otherwise for Customer’s own internal business purposes, or (j) disassemble, reverse engineer, or decompile a Service, or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4) determine whether the Services are within the scope of any patent. Any use of the Services in breach of this Agreement or Order, by Customer or Users that in Solodev’s judgment threatens the security, integrity or availability of Solodev Services, may result in Solodev’s immediate suspension of the Services, however Solodev will use commercially reasonable efforts under the circumstances to provide Customer with notice and an opportunity to remedy such violation or threat prior to such suspension. The services described in the Order Agreement (the Order) shall be performed for the service fee specified. Additional work shall be subject to standard hourly rates as stated in Order. Unused hours shall be void at the end of the contract term or upon termination. Upon execution of this Agreement, Customer shall be charged by or pay to Solodev the fees specified in the Order or otherwise specified herein. Except as otherwise specified herein or in an Order, (i) fees are based on Services purchased and not actual usage, (ii) payment obligations are non-cancelable and fees paid are non-refundable, (iii) quantities purchased cannot be decreased during the Contract Period, or (iv) Services purchased cannot be decreased nor downgraded during the Contract Period. For credit card payments, Customer shall provide Solodev valid and updated credit card information. By providing credit card information to Solodev, Customer authorizes Solodev to charge such credit card for all Purchased Services listed in the Order for the Initial Contract Period and any subsequent, renewal Contract Period(s) unless terminated sooner. Such charges shall be made in advance, either annually or in accordance with any different billing frequency stated in the applicable Order. Credit card processing fee of three percent (3%) shall be applied to all credit card payments. Customer is responsible for providing complete and accurate billing and contact information to Solodev and notifying Solodev of any changes to such information. Solodev fees do not include any taxes, levies, duties or similar governmental assessments of any nature. In addition to the fees specified in this Section, Customer shall pay the amount of any applicable federal, state or local sales, use, excise or similar taxes not measured by the income of Solodev or, in lieu thereof, Customer shall furnish to Solodev a properly executed tax exemption certificate. In order for Solodev to keep its rates low, payments must be made promptly. Bills will be deemed delinquent and assessed $85 charge if payment is not received within seven (7) days after the due date. If an amount remains delinquent more than fourteen (14) days after its due date, an additional ten percent (10%), or the highest rate allowable by law, will be added for each month of delinquency. Solodev may, without limiting Solodev other rights and remedies, accelerate Customer’s unpaid fee obligations under such agreements so that all such obligations become immediately due and payable, and suspend all Services to Customer until such amounts are paid in full. Other than for Customers paying by credit card or direct debit whose payment has been declined, Solodev will provide Customer with at least 7 days’ prior notice that Customer account is overdue. For monthly billing, Services are billed or credit card charged one month in advance on the first day of then current month and payments are due fifteen (15) days of the date of invoice. For recurring services if extended contract period is selected, a five percent (5%) discount shall apply to twenty-four (24)-month term and eight percent (8%) to thirty-six (36)-month term. For one-time, non-recurring billing, unless otherwise agreed in the Order or modified via request, Services are billed 50% in advance on the Effective Date and 50% on or around a date the prototype is delivered. For annual billing, services are billed upon receipt of the Order and then annually, on the first day of then current year. The Customer will be responsible for any costs Solodev incurs in enforcing collection of any amounts due under this Agreement, including without limitation, reasonable attorney’s fees, court costs, or collection agency fees. The Customer will be responsible for costs due to insufficient funds and other charges that are incurred in connection with payment processing for the Customer’s account. Solodev has the right to charge the Customer Non-Sufficient Funds (NSF) fees if the Customer’s payment method is check and it was returned by the bank due to insufficient funds. The fee is thirty-five dollars (USD $35) in the United States. If the Customer pays by credit card or ACH or EFT, then Solodev will charge the Customer’s credit card or bank account (as applicable) to pay for any charges that may apply to the Customer’s account. The Customer agrees to notify Solodev of any changes to the Customer’s account, the Customer’s billing address, or any information that Solodev may reasonably require in order to process the Customer’s payments in a timely manner. Solodev reserves the right to increase its fees up to 10% year over year with no less than a thirty (30) day notice of such change. Price increases will not affect Customers during their contract term. Solodev may charge the Customer's credit card or bank account to pay for any charges that may apply to the Customer's account. All Services and results thereof remain the sole property of Solodev until a full payment is received. Except where expressly provided in this Agreement, all payments to Solodev are nonrefundable. You must report any overcharges or billing disputes to Solodev within 30 (thirty) days of the time on which the Customer became aware, or should have become aware, of the existence of the overcharge or dispute. Charges that are not disputed within thirty (30) days of the date charged or date bill was received are conclusively deemed accurate. Services can be upgraded to a higher level any time during the contract term but cannot be downgraded to a lower plan. Solodev shall be entitled to modify its fees and any other terms and conditions contained in this Agreement at its sole discretion. If the Customer does not agree to the terms of any modification, the Customer may terminate the Agreement without any further liability by providing written notice to Solodev within 30 days of the posting of any modifications by Solodev. Both parties represent that they have validly entered into this Agreement and have the legal power to do so. Solodev warrants to Customer that during the applicable Contract Term, (i) the Services will be performed in a timely and professional manner; (ii) custom development work will be free from bugs and defects for thirty (30) days after the work is delivered; (iii) Solodev will not materially decrease the overall security of the Services, (iv) the Services will perform materially in accordance with the applicable Documentation. For any breach of a warranty above, Customer’s exclusive remedies are those described in the “Termination” and “Termination Liability or Refunds” sections in this Agreement. Except as set expressly provided in Solodev's Agreement, Solodev is not liable for any delay or failure to perform its obligations under this Agreement, where the delay or failure results from any act of God or other cause beyond its reasonable control (including, without limitation, any mechanical, electronic, communications, or third-party supplier failure). EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER PARTY MAKES ANY WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, AND EACH PARTY SPECIFICALLY DISCLAIMS ALL IMPLIED WARRANTIES, AND CONDITIONS OF ANY KIND OR NATURE WHATSOEVER, INCLUDING, WITHOUT LIMITATION, WARRANTIES RELATED TO ANY COURSE OF DEALING, USAGE OR TRADE PRACTICE, OR IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW. THE SERVICES, INCLUDING, WITHOUT LIMITATION, ALL INFORMATION, CONTENT, AND OTHER SERVICES MADE AVAILABLE BY SOLODEV OR ANY THIRD PARTY VENDORS ARE PROVIDED ON AN “AS IS” OR “AS AVAILABLE” BASIS AND NEITHER SOLODEV, ITS PARENT COMPANY, NOR THEIR AFFILIATES AND SUBSIDIARIES MAKE ANY REPRESENTATIONS OR WARRANTIES REGARDING THE SERVICES. FREE SERVICES AND BETA SERVICES ARE PROVIDED “AS IS,” EXCLUSIVE OF ANY WARRANTY WHATSOEVER. EACH PARTY DISCLAIMS ALL LIABILITY AND INDEMNIFICATION OBLIGATIONS FOR ANY HARM OR DAMAGES CAUSED BY ANY THIRD-PARTY PROVIDERS. Defects should be promptly reported via submitting electronic tickets to [email protected]. Users voluntarily engage in the activity of Internet use and bear the risks associated with that activity. Solodev exercises no control over and expressly disclaims any obligation to monitor its customers and other Users with respect to breaches of this Agreement or any content of the information made available for distribution via the Services. In no event will Solodev, its parent company, and their affiliates and subsidiaries have any liability to Customer or any third party for unauthorized access to, or alteration, theft, or destruction of information distributed or made available for distribution via the Services through accident, or fraudulent means or devices. Neither party will be liable for any failure or delay in performance under this Agreement (other than for delay in the payment of money due and payable hereunder) to the extent such failures or delays are proximately caused by causes beyond that party’s reasonable control and occurring without its fault or negligence, including, without limitation, acts of God, government restrictions (including without limitation the denial or cancellation of any export or other necessary license), wars, insurrections, acts of terrorism, failure of suppliers, subcontractors, and carriers, or third party to substantially meet its performance obligations under this Agreement. Solodev is not liable for any delay or failure to perform its obligations under this Agreement, where the delay or failure results from cause beyond its reasonable control (including, without limitation, mechanical, electronic, communications, or third-party supplier failure). Solodev cannot guarantee that (a) access to the Services will be uninterrupted or error-free, (b) defects will be corrected, or (c) the Services will be secure if outside of Solodev’s reasonable control. EXCEPT FOR A PARTY'S INDEMNIFICATION OBLIGATIONS UNDER THIS AGREEMENT, NEITHER PARTY WILL BE LIABLE TO THE OTHER PARTY OR ANY USER OR ANY THIRD PARTY FOR ANY LOSS OF PROFITS OR REVENUES OR COST OF REPLACEMENT SERVICES (WHETHER DIRECT OR INDIRECT) NOR ANY INDIRECT, INCIDENTAL, CONSEQUENTIAL, PUNITIVE, OR SPECIAL DAMAGES OF ANY KIND ARISING FROM THE USE OF THE SERVICES, EVEN IF SUCH PARTIES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. EXCEPT FOR SOLODEV'S INDEMNIFICATION OBLIGATIONS UNDER THIS AGREEMENT, SOLODEV'S AGGREGATE LIABILITY TO THE CUSTOMER TOGETHER WITH ALL OF ITS AFFILIATES ARISING OUT OF OR RELATED TO THIS AGREEMENT FOR ANY REASON AND UPON ANY CAUSE OF ACTION IS LIMITED TO THE AMOUNT THE CUSTOMER ACTUALLY PAID TO SOLODEV UNDER THIS AGREEMENT DURING THE TWO (2) MONTHS IMMEDIATELY PRECEDING THE DATE ON WHICH THE CLAIM ACCRUED. THIS LIMITATION APPLIES TO ALL CAUSES OF ACTION IN THE AGGREGATE, INCLUDING, WITHOUT LIMITATION, BREACH OF CONTRACT, BREACH OF WARRANTY, NEGLIGENCE, STRICT LIABILITY, MISREPRESENTATIONS, OR OTHER TORTS BUT WILL NOT LIMIT THE CUSTOMER’S AND HIS/HER AFFILIATES’ PAYMENT OBLIGATIONS UNDER THE “FEES & PAYMENTS” SECTION ABOVE. THE FEES FOR THE SERVICES SET BY SOLODEV UNDER THIS AGREEMENT HAVE BEEN AND WILL CONTINUE TO BE BASED UPON THIS ALLOCATION OF RISK. NOTHING IN THIS AGREEMENT IS INTENDED TO EXCLUDE OR LIMIT EITHER PARTY'S LIABILITY WITH RESPECT TO THOSE LIABILITIES THAT CANNOT BE LEGALLY EXCLUDED OR LIMITED EVEN IF ANY OTHER PROVISION MAY SUGGEST OTHERWISE. IN NO EVENT WILL EITHER PARTY OR ITS AFFILIATES HAVE ANY LIABILITY ARISING OUT OF OR RELATED TO THIS AGREEMENT FOR ANY LOST PROFITS, REVENUES, GOODWILL, OR INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, COVER, BUSINESS INTERRUPTION OR PUNITIVE DAMAGES, WHETHER AN ACTION IS IN CONTRACT OR TORT AND REGARDLESS OF THE THEORY OF LIABILITY, EVEN IF A PARTY OR ITS AFFILIATES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR IF A PARTY’S OR ITS AFFILIATES’ REMEDY OTHERWISE FAILS OF ITS ESSENTIAL PURPOSE. THE FOREGOING DISCLAIMER WILL NOT APPLY TO THE EXTENT PROHIBITED BY LAW. To the extent permitted by law, the Customer agrees to indemnify, defend, and hold harmless Solodev, its parent company, and their affiliates and subsidiaries, and all employees, officers, directors, partners, representatives or any such entity, from and against any and all third party claims, demands, damages, losses, liability, causes of action, judgments, costs, or expenses (including, without limitation, reasonable attorney's fees) asserted against or suffered by Solodev arising out of (i) any breach or violation of this Agreement or Order; (ii) unlawful acts or usage (iii) use or application of 3rd Party Products; or (iv) infringement or misappropriation of third party’s intellectual property rights by the Customer, the Customer's Users, or the Customer's customers. Customer will indemnify Solodev from any damages, attorney fees and costs finally awarded against Solodev as a result of, or for any amounts paid by Solodev under a settlement approved by Customer in writing of, a claim against Solodev. Solodev agrees to indemnify, defend, and hold harmless Customer from and against any and all third party claims, damages, losses, liability, judgments, costs, or expenses (including, without limitation, reasonable attorney's fees) asserted against or suffered by Customer arising out of any claim alleging that the Services as provided by Solodev infringe any third party's intellectual property rights; provided Customer (a) promptly gives Solodev written notice of the Claim, (b) gives Solodev sole control of the defense and settlement of the Claim, and (c) gives Solodev all reasonable assistance. If Solodev receives information about an infringement or misappropriation claim related to a Service, Solodev may at its own discretion and at no cost to Customer (i) modify the Services so that they are no longer claimed to infringe or misappropriate, without breaching Solodev warranties, (ii) obtain a license for Customer’s continued use of that Service in accordance with this Agreement, or (iii) terminate Customer Services upon 30 days’ written notice and refund Customer any prepaid fees covering the remainder of the term of the terminated Service. The above defense and indemnification obligations do not apply if (1) the allegation does not state with specificity that Solodev Services are the basis of the Claim; (2) a Claim arises from the use or combination of our Services or any part thereof with software, hardware, data, or processes not provided by Solodev, if Solodev Services or use thereof would not infringe without such combination; (3) a Claim arises from Services under an Order for which there is no charge; (4) a Claim arises from Third Party Provider or Customer’s use of the Services in violation of this Agreement or applicable Order. This Agreement will be for the “Initial Contract Period” as further described in the Order. The term of this Agreement shall commence on the Effective Date, as stated in the Order, and shall continue until project completion for one time-services or for a period of twelve (12) months for recurring services, unless a longer term is selected within the Order. If no term is listed in the Order, then the Initial Contract Period will be twelve (12) months. At the end of the Initial Contract Period, the term of the Agreement shall automatically renew for an additional Contract Period equal in length to the Initial Contract Period unless terminated sooner per “Termination” Section of this Agreement. The Service pricing during any renewal term will increase by up to 8% above the applicable pricing in the prior Contract Period, unless Solodev provides Customer notice of different pricing at least 60 days prior to the applicable renewal Contract Period. Except as expressly provided in the applicable Order, renewal of promotional or one-time priced subscriptions will be at Solodev’s applicable list price in effect at the time of the applicable renewal. Notwithstanding anything to the contrary, any renewal in which subscription volume for any Services has decreased from the prior term will result in re-pricing at renewal without regard to the prior term’s Service pricing. This Agreement may be terminated in one of the following ways: (i) by the Customer without cause and for convenience by providing the advanced written Cancellation Request as provided in this Agreement; (ii) by Solodev without cause by providing Customer with a written notice at least 30 days prior to the termination date; (iii) by Solodev upon a breach by Customer of its payment obligations; (iv) by Customer or Solodev, if a party commits a material breach of or fails to perform any obligations under this Agreement any other Agreement between the parties and has not cured such breach or failure within fourteen (14) days of receiving written notice from the terminating party specifying such breach or failure; or (v) upon the occurrence of any one or more of the following events of default: (1) the entering into or filing by Customer of a petition, arrangement or proceeding seeking an order for relief under applicable bankruptcy or insolvency laws, an assignment for the benefit of its creditors, readjustment of debt or Customer's dissolution or liquidation; (2) the filing or commencement against Customer of any application, petition, action, or other proceeding seeking any of the relief, actions, or status described in subparagraph (1) hereof and the entering of a judgment, decree or order for relief granting any such relief, action or status which remains undismissed for a period of thirty (30) days or more; or (3) the insolvency of Customer; or (v) as otherwise provided in this Agreement. Upon termination, all rights and obligations of the parties shall immediately terminate, except for Customer's obligation to pay any charges due for the full contract amount and services in progress, pending or completed. In the event the Agreement is terminated before the end of the Contract Period by the Customer for any other reason than Solodev’s breach of this Agreement, the Customer shall be also required to pay the difference between the discounted rates for the Services listed in the Order, and the rate of the Services prior to any promotions and discounts being applied. If this Agreement is terminated by Solodev for convenience or by Customer due Solodev’s breach of this Agreement, Solodev will refund Customer any prepaid fees covering the remainder of the term of all Orders after the effective date of termination. In no event will termination relieve Customer from their obligation to pay any fees payable to Solodev for the period prior to the effective date of termination. The sections titled “Fees & Payments,” “Proprietary Rights and Licenses,” “Refund and Disputes”, “Representations, Warranties, Disclaimers and Limitation of Liability”, “Mutual Indemnification”, “Termination Liability or Refunds”, “Surviving Provisions”, “Data Retention”, “Proprietary Rights”, “Confidentiality,” and “General Provisions” will survive any termination or expiration of this Agreement. Solodev makes no guarantees about retaining any data stored on Solodev’s systems or servers following expiration or termination of the Agreement. Solodev will typically delete such data seven (7) days following termination of subscription by either the Customer or Solodev. You will not have access to the Customer’s data stored on Solodev’s systems or servers during a suspension or following a termination. In the event, Customer requires a copy of all data, the Customer will be responsible for all reasonable labor and material costs associated with the manual process of data transfer. Unless data backup is requested, the Customer will not have access to the Customer’s data stored on Solodev’s systems during a suspension or following a termination. Subject to the limited rights expressly granted hereunder, Solodev and its affiliates and licensors reserve all right, title and interest in and to the Services, including all related intellectual property rights. No rights are granted to Customer hereunder other than as expressly set forth herein. Customer hereby grants Solodev and its affiliates a worldwide, perpetual, irrevocable, royalty-free license to use and incorporate into Solodev’s services any suggestion, enhancement request, recommendation, correction or other feedback provided by Customer or Users relating to the operation of Solodev Services. Any Confidential Information disclosed by one party (“Disclosing Party”) to the other party (“Recipient”) in connection with this Agreement that is marked confidential or that due to its character and nature, a reasonable person under like circumstances would treat as confidential will be protected and held in confidence by the Recipient. The Recipient will use the same degree of care that it uses to protect the confidentiality of its own confidential information of like kind (but not less than reasonable care) to (i) not use any Confidential Information of the Disclosing Party for any purpose outside the scope of this Agreement and (ii) except as otherwise authorized by the Disclosing Party in writing, limit access to Confidential Information of the Disclosing Party to those of its and its Affiliates’ employees and contractors who need that access for purposes consistent with this Agreement and who have signed confidentiality agreements with the Recipient containing protections not materially less protective of the Confidential Information than those herein. Disclosure of the Confidential Information will be restricted to the Recipient’s employees, contractors, affiliates, or agents (including outside counsel and consultants) on a “need to know” basis in connection with the services, who are bound by confidentiality obligations no less stringent than these prior to any disclosure. Neither party will disclose the terms of this Agreement or any Order to any third party other than its Affiliates, legal counsel and accountants without the other party’s prior written consent, provided that a party that makes any such disclosure to its Affiliate, legal counsel or accountants will remain responsible for such Affiliate’s, legal counsel’s or accountant’s compliance with this “Confidentiality” section. Notwithstanding the foregoing, Solodev may disclose the terms of this Agreement and any applicable Order to a subcontractor or 3rd Party Provider to the extent necessary to perform Solodev obligations to Customer under this Agreement, under terms of confidentiality materially as protective as set forth herein. Each party may disclose Confidential Information relating to the Services to providers of goods and services for the engagement to the extent such disclosure is necessary and reasonably anticipated. Confidential Information does not include information which: (i) is already known to Recipient at the time of disclosure; (ii) is or becomes publicly known through no wrongful act or failure of the Recipient; (iii) is independently developed by Recipient without benefit of Disclosing Party’s Confidential Information; or (iv) is received from a third party which is not under and does not thereby breach an obligation of confidentiality. Each party agrees to protect the other’s Confidential Information at all times and in the same manner as each protects the confidentiality of its own proprietary and confidential materials, but in no event with less than a reasonable standard of care. A Recipient may disclose Confidential Information to the extent required by law, provided the Recipient gives the Disclosing Party prior notice of the compelled disclosure (to the extent legally permitted) and reasonable assistance, at the Disclosing Party's cost, if the Disclosing Party wishes to contest the disclosure. If the Recipient is compelled by law to disclose the Disclosing Party’s Confidential Information as part of a civil proceeding to which the Disclosing Party is a party, and the Disclosing Party is not contesting the disclosure, the Disclosing Party will reimburse the Recipient for its reasonable cost of compiling and providing secure access to that Confidential Information. This disclosure does not relieve Recipient of its confidentiality obligations with respect to any other party. This Agreement constitutes the entire Agreement between the parties with respect to the transactions contemplated herein. The Customer and Solodev are independent contractors and this Agreement does not establish any relationship of partnership, joint venture, employment, franchise, fiduciary or agency between the parties. The parties agree that any term or condition stated in Customer purchase order or in any other of Customer order documentation (excluding Order(s)) is void. In the event of any conflict or inconsistency among the following documents, the order of precedence shall be: (1) the applicable Order, and (2) this Agreement, and (3) the Documentation. Customer gives Solodev the express right to use Customer’s name in advertising, publicity and other promotional endeavors. Solodev and Customer agree that, except as otherwise expressly provided in this Agreement, the Order, or the terms and conditions of use of any Third Party Products, there will be no third party beneficiaries to this Agreement. To the extent any portion of this Agreement is determined to be invalid, illegal or unenforceable by a court of competent jurisdiction, such invalidity, illegality or unenforceability will not invalidate this Agreement as a whole, but only that specific portion held to be unenforceable, and all other terms and conditions contained in this Agreement will remain in full force and effect. Any provision of this Agreement that, by its nature, is applicable to circumstances arising after the termination or expiration of this Agreement will survive such termination or expiration and remain if full force and effect, and no termination or expiration of this Agreement will relieve either party from any liability arising out of any breach of this Agreement occurring prior to said termination or expiration. The waiver of any breach or default of this Agreement will not constitute a waiver of any subsequent breach or default, and will not act to amend or negate the rights of the waiving party. No failure or delay by either party in exercising any right under this Agreement will constitute a waiver of that right. Neither Party may sell, assign or transfer any rights or obligations hereunder, nor delegate any duties under this Agreement whether by operation of law or otherwise, either in whole or in part, without the prior written consent of the other Party, (consent not to be unreasonably withheld); provided, however, either party may assign this Agreement in its entirety (together with all Orders), without the other party’s consent to its Affiliate or in connection with a merger, acquisition, corporate reorganization, or sale of all or substantially all of its assets. Notwithstanding the foregoing, if a party is acquired by, sells substantially all of its assets to, or undergoes a change of control in favor of, a direct competitor of the other party, then such other party may terminate this Agreement upon written notice. In the event of such a termination, Solodev will refund to Customer any prepaid fees allocable to the remainder of the term of all Services for the period after the effective date of such termination. Subject to the foregoing, this Agreement will bind and inure to the benefit of the parties, their respective successors and permitted assigns. With respect to Services rendered by Solodev, this Agreement will be governed by, and construed in accordance with, the laws of the state of Florida and venue for all disputes arising out of or related to this Agreement will be brought exclusively in the Orange County, Florida court, and all parties to this Agreement consent to the jurisdiction of such court. The Services and other technology Solodev makes available, and derivatives thereof may be subject to export laws and regulations of the United States and other jurisdictions. Each party represents that it is not named on any U.S. government denied-party list. You shall not permit Users to access or use any Service in a U.S. embargoed country (currently Cuba, Iran, North Korea, Sudan, Syria or Crimea) or in violation of any U.S. export law or regulation. You agree that Customer have not received or been offered any illegal or improper bribe, kickback, payment, gift, or thing of value from any of Solodev’s employees or agents in connection with this Agreement. Reasonable gifts and entertainment provided in the ordinary course of business do not violate the above restriction. If Customer learns of any violation of the above restriction, Customer will use reasonable efforts to promptly notify Solodev at [email protected]. This Agreement shall be binding upon and inure to the benefit of the parties and their respective successors and permitted assigns. Customer may not transfer, assign or otherwise dispose of any of the rights and obligations granted or imposed upon it under this Agreement without the prior written consent of Solodev, such consent not to be unreasonably withheld or denied. Customer understands that the current rate reflects a discount for the right to use Customer's name and logo in advertising, promotional endeavors and if applicable for the right to be listed on Customer’s website. Unless otherwise specified herein, all notices, demands, requests or other communications required or permitted under this Agreement will be deemed given when delivered personally, sent by facsimile upon confirmation, sent and received by return receipt email (except for notices of termination or an indemnifiable claim (“Legal Notices”), which shall clearly be identifiable as Legal Notices), the day of sending by email), or upon receipt of delivery of overnight mail and shall be effective as of the date stated on the confirmation of receipt.
2019-04-22T22:51:56Z
https://www.solodev.com/terms/index.stml
Media Converter &#1050;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1077;&#1088; &#1084;&#1077;&#1076;&#1080;&#1072; &#1092;&#1072;&#1081;&#1083;&#1086;&#1074; &#1076;&#1083;&#1103; &#1091;&#1089;&#1090;&#1088;&#1086;&#1081;&#1089;&#1090;&#1074; &#1087;&#1086;&#1076; &#1091;&#1087;&#1088;&#1072;&#1074;&#1083;&#1077;&#1085;&#1080;&#1077;&#1084; Android OS. Movavi &#1050;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1077;&#1088; &#1042;&#1080;&#1076;&#1077;&#1086; &#1076;&#1083;&#1103; Mac &#8212; &#1087;&#1088;&#1086;&#1089;&#1090;&#1072;&#1103; &#1080; &#1087;&#1086;-&#1085;&#1072;&#1089;&#1090;&#1086;&#1103;&#1097;&#1077;&#1084;&#1091; &#1073;&#1099;&#1089;&#1090;&#1088;&#1072;&#1103; &#1087;&#1088;&#1086;&#1075;&#1088;&#1072;&#1084;&#1084;&#1072; &#1076;&#1083;&#1103; &#1082;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1072;&#1094;&#1080;&#1080; &#1072;&#1091;&#1076;&#1080;&#1086;- &#1080; &#1074;&#1080;&#1076;&#1077;&#1086;&#1092;&#1072;&#1081;&#1083;&#1086;&#1074;. &#1053;&#1077;&#1076;&#1086;&#1089;&#1090;&#1072;&#1090;&#1082;&#1080; &#1087;&#1088;&#1086;&#1075;&#1088;&#1072;&#1084;&#1084;&#1099;: &#1085;&#1077; &#1089;&#1072;&#1084;&#1099;&#1081; &#1073;&#1086;&#1083;&#1100;&#1096;&#1086;&#1081; &#1092;&#1091;&#1085;&#1082;&#1094;&#1080;&#1086;&#1085;&#1072;&#1083;; &#1086;&#1089;&#1085;&#1086;&#1074;&#1085;&#1086;&#1077; &#1086;&#1082;&#1085;&#1086; &#1087;&#1088;&#1086;&#1075;&#1088;&#1072;&#1084;&#1084;&#1099; &#1088;&#1072;&#1073;&#1086;&#1090;&#1072;&#1077;&#1090; &#1090;&#1086;&#1083;&#1100;&#1082;&#1086; &#1082;&#1072;&#1082; &#1086;&#1073;&#1086;&#1083;&#1086;&#1095;&#1082;&#1072; &#1089;&#1086; &#1089;&#1089;&#1099;&#1083;&#1082;&#1072;&#1084;&#1080; &#1085;&#1072; &#1076;&#1088;&#1091;&#1075;&#1080;&#1077; &#1091;&#1090;&#1080;&#1083;&#1080;&#1090;&#1099;, &#1082;&#1086;&#1090;&#1086;&#1088;&#1099;&#1077; &#1087;&#1088;&#1080; &#1085;&#1072;&#1078;&#1072;&#1090;&#1080;&#1080; &#1079;&#1072;&#1087;&#1091;&#1089;&#1082;&#1072;&#1102;&#1090;&#1089;&#1103; &#1074; &#1085;&#1086;&#1074;&#1086;&#1084; &#1086;&#1082;&#1085;&#1077;; &#1087;&#1088;&#1080; &#1091;&#1089;&#1090;&#1072;&#1085;&#1086;&#1074;&#1082;&#1077; &#1082;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1077;&#1088;&#1072; &#1087;&#1088;&#1077;&#1076;&#1083;&#1072;&#1075;&#1072;&#1077;&#1090; &#1091;&#1089;&#1090;&#1072;&#1085;&#1086;&#1074;&#1080;&#1090;&#1100; &#1087;&#1072;&#1088;&#1090;&#1085;&#1077;&#1088;&#1089;&#1082;&#1080;&#1077; &#1087;&#1088;&#1086;&#1076;&#1091;&#1082;&#1090;&#1099; (&#1084;&#1086;&#1078;&#1085;&#1086; &#1085;&#1077; &#1091;&#1089;&#1090;&#1072;&#1085;&#1072;&#1074;&#1083;&#1080;&#1074;&#1072;&#1090;&#1100;); &#1088;&#1077;&#1082;&#1083;&#1072;&#1084;&#1072; &#1087;&#1086;&#1080;&#1089;&#1082;&#1086;&#1074;&#1099;&#1093;&#160;&#1087;&#1072;&#1085;&#1077;&#1083;&#1077;&#1081;. &#1050;&#1072;&#1082; &#1080; &#1074;&#1086; &#1084;&#1085;&#1086;&#1075;&#1080;&#1093; &#1087;&#1088;&#1086;&#1075;&#1088;&#1072;&#1084;&#1084;&#1072;&#1093; &#1076;&#1072;&#1085;&#1085;&#1086;&#1075;&#1086; &#1082;&#1083;&#1072;&#1089;&#1072; (&#1072;&#1091;&#1076;&#1080;&#1086;&#1088;&#1080;&#1087;&#1087;&#1077;&#1088;&#1099;), &#1076;&#1086;&#1087;&#1091;&#1089;&#1082;&#1072;&#1077;&#1090;&#1089;&#1103; &#1089;&#1078;&#1072;&#1090;&#1080;&#1077; &#1072;&#1091;&#1076;&#1080;&#1086;&#1090;&#1088;&#1077;&#1082;&#1086;&#1074; &#1074; MP3, WMA, VQF, OGG &#1085;&#1072; &#1083;&#1077;&#1090;&#1091;&#8221; &#1080; &#1082;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1080;&#1088;&#1086;&#1074;&#1072;&#1085;&#1080;&#1077; &#1080;&#1079; &#1086;&#1076;&#1085;&#1086;&#1075;&#1086; &#1072;&#1091;&#1076;&#1080;&#1086;&#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1072; &#1074; &#1076;&#1088;&#1091;&#1075;&#1086;&#1081;. &#1042;&#1086;&#1090; &#1086;&#1089;&#1085;&#1086;&#1074;&#1085;&#1099;&#1077; &#1085;&#1072;&#1087;&#1088;&#1072;&#1074;&#1083;&#1077;&#1085;&#1080;&#1103; &#1074; &#1082;&#1086;&#1090;&#1086;&#1088;&#1099;&#1093; &#1084;&#1086;&#1078;&#1085;&#1086; &#1087;&#1088;&#1086;&#1080;&#1079;&#1074;&#1086;&#1076;&#1080;&#1090;&#1100; &#1082;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1080;&#1088;&#1086;&#1074;&#1072;&#1085;&#1080;&#1077;: AVI &#1074; MP4, AVI aiff &#1074; wav &#1082;&#1086;&#1085;&#1074;&#1077;&#1085;&#1090;&#1077;&#1088; &#1086;&#1085;&#1083;&#1072;&#1081;&#1085; &#1074; FLV, DIVX &#1074; AC3, WMV &#1074; AAC, MPEG &#1074; WAV, VOB &#1074; MP4, WMV &#1074; MP4 - &#1101;&#1090;&#1086; &#1086;&#1076;&#1085;&#1080; &#1080;&#1079; &#1089;&#1072;&#1084;&#1099;&#1093; &#1087;&#1086;&#1087;&#1091;&#1083;&#1103;&#1088;&#1085;&#1099;&#1093;, &#1085;&#1086; &#1074; &#1094;&#1077;&#1083;&#1086;&#1084; &#1080;&#1089;&#1093;&#1086;&#1076;&#1085;&#1099;&#1081; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090; &#1084;&#1086;&#1078;&#1077;&#1090; &#1073;&#1099;&#1090;&#1100; &#1087;&#1086;&#1095;&#1090;&#1080; &#1083;&#1102;&#1073;&#1099;&#1084;, &#1072; &#1074; &#1082;&#1072;&#1095;&#1077;&#1089;&#1090;&#1074;&#1077; &#1082;&#1086;&#1085;&#1077;&#1095;&#1085;&#1099;&#1093; &#1089;&#1083;&#1077;&#1076;&#1091;&#1102;&#1097;&#1080;&#1077;: AC3, AAC, MP3, MP2, MP4, OGG, WAV, AVI, DV, FLV, MPEGTS, MPEGPS, MKV, MOV. &#1059;&#1076;&#1086;&#1073;&#1085;&#1086;&#1077; &#1088;&#1077;&#1096;&#1077;&#1085;&#1080;&#1077; &#1076;&#1083;&#1103; &#1087;&#1088;&#1077;&#1086;&#1073;&#1088;&#1072;&#1079;&#1086;&#1074;&#1072;&#1085;&#1080;&#1103; &#1074;&#1080;&#1076;&#1077;&#1086;&#1092;&#1072;&#1081;&#1083;&#1086;&#1074; &#1087;&#1086;&#1095;&#1090;&#1080; &#1074;&#1089;&#1077;&#1093; &#1088;&#1072;&#1089;&#1087;&#1088;&#1086;&#1089;&#1090;&#1088;&#1072;&#1085;&#1105;&#1085;&#1085;&#1099;&#1093; &#1082;&#1086;&#1076;&#1077;&#1082;&#1086;&#1074; &#1074; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1099; AVI, MPG, WMV, MPEG, FLV. &#1044;&#1072;&#1083;&#1077;&#1077; &#1087;&#1088;&#1086;&#1089;&#1090;&#1086; &#1089;&#1090;&#1072;&#1088;&#1090;&#1091;&#1077;&#1084; (&#1085;&#1072;&#1078;&#1080;&#1084;&#1072;&#1103; &#1085;&#1072; &#1082;&#1085;&#1086;&#1087;&#1082;&#1091; &#171;Click to Begin&#187;) &#1080; &#1079;&#1072;&#1073;&#1080;&#1088;&#1072;&#1077;&#1084; &#1087;&#1086;&#1083;&#1091;&#1095;&#1080;&#1074;&#1096;&#1080;&#1081;&#1089;&#1103; &#1092;&#1072;&#1081;&#1083; &#1074; &#1089;&#1086;&#1086;&#1090;&#1074;&#1077;&#1090;&#1089;&#1090;&#1074;&#1091;&#1102;&#1097;&#1077;&#1081; &#1087;&#1072;&#1087;&#1082;&#1077;. &#1050;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1080;&#1088;&#1086;&#1074;&#1072;&#1085;&#1080;&#1077; DVD &#1074; MPEG, AVI, DivX, MP4, PSP, iPod, WMV, ASF, 3GP, H263, MOV, 3GPP, 3GPP2, RM, VCD, SVCD; &#1050;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1080;&#1088;&#1086;&#1074;&#1072;&#1085;&#1080;&#1077; DVD &#1074; MP3, MP2, M4A, WAV, AAC, OGG &#1080; RA; &#1053;&#1072;&#1088;&#1077;&#1079;&#1072;&#1085;&#1080;&#1077; DVD &#1074;&#1080;&#1076;&#1077;&#1086;. &#1054;&#1076;&#1085;&#1080;&#1084; &#1080;&#1079; &#1101;&#1083;&#1077;&#1084;&#1077;&#1085;&#1090;&#1086;&#1074; shell-&#1080;&#1085;&#1090;&#1077;&#1075;&#1088;&#1072;&#1094;&#1080;&#1080; &#1103;&#1074;&#1083;&#1103;&#1077;&#1090;&#1089;&#1103; &#1074;&#1086;&#1079;&#1084;&#1086;&#1078;&#1085;&#1086;&#1089;&#1090;&#1100; &#1087;&#1088;&#1086;&#1089;&#1084;&#1086;&#1090;&#1088;&#1072; &#1089;&#1074;&#1086;&#1081;&#1089;&#1090;&#1074; &#1079;&#1074;&#1091;&#1082;&#1086;&#1074;&#1099;&#1093; &#1092;&#1072;&#1081;&#1083;&#1086;&#1074; &#1074; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1072;&#1093; Monkey's Audio (&#1080;&#1084;&#1077;&#1102;&#1097;&#1080;&#1093; &#1088;&#1072;&#1089;&#1096;&#1080;&#1088;&#1077;&#1085;&#1080;&#1077;ape &#8212; &#1076;&#1083;&#1103; &#1092;&#1072;&#1081;&#1083;&#1086;&#1074;, &#1089;&#1086;&#1079;&#1076;&#1072;&#1085;&#1085;&#1099;&#1093; &#1087;&#1088;&#1080; &#1087;&#1086;&#1084;&#1086;&#1097;&#1080; &#1082;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1086;&#1088;&#1072; &#1074;&#1077;&#1088;&#1089;&#1080;&#1081; 3.x, &#1080;&#1083;&#1080;mac &#8212; &#1076;&#1083;&#1103; &#1092;&#1072;&#1081;&#1083;&#1086;&#1074;, &#1089;&#1086;&#1079;&#1076;&#1072;&#1085;&#1085;&#1099;&#1093; &#1074; &#1073;&#1086;&#1083;&#1077;&#1077; &#1088;&#1072;&#1085;&#1085;&#1080;&#1093; &#1074;&#1077;&#1088;&#1089;&#1080;&#1103;&#1093; &#1087;&#1088;&#1086;&#1075;&#1088;&#1072;&#1084;&#1084;&#1099;) &#1080; Wave &#1087;&#1088;&#1080; &#1087;&#1086;&#1084;&#1086;&#1097;&#1080; &#1089;&#1086;&#1086;&#1090;&#1074;&#1077;&#1090;&#1089;&#1090;&#1074;&#1091;&#1102;&#1097;&#1077;&#1081; &#1082;&#1086;&#1084;&#1072;&#1085;&#1076;&#1099; &#1082;&#1086;&#1085;&#1090;&#1077;&#1082;&#1089;&#1090;&#1085;&#1086;&#1075;&#1086; cda &#1074; wav &#1086;&#1085;&#1083;&#1072;&#1081;&#1085; &#1084;&#1077;&#1085;&#1102;, &#1074;&#1099;&#1079;&#1099;&#1074;&#1072;&#1077;&#1084;&#1086;&#1075;&#1086; &#1087;&#1088;&#1080; &#1097;&#1077;&#1083;&#1095;&#1082;&#1077; &#1087;&#1088;&#1072;&#1074;&#1086;&#1081; &#1082;&#1085;&#1086;&#1087;&#1082;&#1086;&#1081; &#1084;&#1099;&#1096;&#1080;. &#1044;&#1072;&#1085;&#1085;&#1099;&#1081; &#1082;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1077;&#1088; &#1087;&#1086;&#1076;&#1076;&#1077;&#1088;&#1078;&#1080;&#1074;&#1072;&#1077;&#1090; &#1074;&#1089;&#1077; &#1073;&#1086;&#1083;&#1077;&#1077;-&#1084;&#1077;&#1085;&#1077;&#1077; &#1080;&#1079;&#1074;&#1077;&#1089;&#1090;&#1085;&#1099;&#1077; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1099;, &#1074; &#1090;&#1086;&#1084; &#1095;&#1080;&#1089;&#1083;&#1077; &#1084;&#1086;&#1073;&#1080;&#1083;&#1100;&#1085;&#1099;&#1077;. &#1050;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1086;&#1088;, &#1087;&#1086;&#1079;&#1074;&#1086;&#1083;&#1103;&#1077;&#1090; &#1085;&#1077; &#1090;&#1086;&#1083;&#1100;&#1082;&#1086; &#1082;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1080;&#1088;&#1086;&#1074;&#1072;&#1090;&#1100; &#1072;&#1091;&#1076;&#1080;&#1086;&#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1099; &#1084;&#1077;&#1078;&#1076;&#1091; &#1089;&#1086;&#1073;&#1086;&#1081;, &#1085;&#1086; &#1080; &#1080;&#1079;&#1084;&#1077;&#1085;&#1103;&#1090;&#1100; &#1080;&#1093; &#1089;&#1090;&#1088;&#1091;&#1082;&#1090;&#1091;&#1088;&#1091;, &#1089;&#1082;&#1072;&#1078;&#1077;&#1084;, &#1095;&#1072;&#1089;&#1090;&#1086;&#1090;&#1091; &#1076;&#1080;&#1089;&#1082;&#1088;&#1077;&#1090;&#1080;&#1079;&#1072;&#1094;&#1080;&#1080;. &#1054;&#1085; &#1080;&#1084;&#1077;&#1083; &#1087;&#1088;&#1086;&#1073;&#1083;&#1077;&#1084;&#1099; &#1089; &#1087;&#1088;&#1077;&#1086;&#1073;&#1088;&#1072;&#1079;&#1086;&#1074;&#1072;&#1085;&#1080;&#1103; &#1073;&#1086;&#1083;&#1100;&#1096;&#1086;&#1075;&#1086; &#1092;&#1072;&#1081;&#1083;&#1072; MKV &#1074; MP2, &#1103; &#1089;&#1074;&#1103;&#1079;&#1072;&#1083;&#1089;&#1103; &#1089; &#1087;&#1086;&#1076;&#1076;&#1077;&#1088;&#1078;&#1082;&#1086;&#1081;, &#1086;&#1085;&#1080; &#1074;&#1079;&#1103;&#1083;&#1080; three &#1076;&#1085;&#1077;&#1081;, &#1095;&#1090;&#1086;&#1073;&#1099; &#1074;&#1077;&#1088;&#1085;&#1091;&#1090;&#1100;&#1089;&#1103; &#1082;&#1086; &#1084;&#1085;&#1077; &#1089; reduce &#1080; &#1074;&#1089;&#1090;&#1072;&#1074;&#1080;&#1090;&#1100; &#1086;&#1090;&#1074;&#1077;&#1090; &#1074; &#1086;&#1089;&#1085;&#1086;&#1074;&#1085;&#1086;&#1084; &#1093;&#1086;&#1090;&#1103;&#1090; &#1084;&#1085;&#1077; &#1076;&#1072;&#1090;&#1100; &#1080;&#1084; &#1080;&#1089;&#1093;&#1086;&#1076;&#1085;&#1099;&#1081; &#1092;&#1072;&#1081;&#1083;, &#1090;&#1072;&#1082;&#1080;&#1084; &#1086;&#1073;&#1088;&#1072;&#1079;&#1086;&#1084;, &#1095;&#1090;&#1086;&#1073;&#1099; &#1086;&#1085;&#1080; &#1084;&#1086;&#1075;&#1083;&#1080; &#1085;&#1072;&#1081;&#1090;&#1080; &#1087;&#1088;&#1086;&#1073;&#1083;&#1077;&#1084;&#1091;. &#1042;&#1099; &#1084;&#1086;&#1078;&#1077;&#1090;&#1077; &#1079;&#1072;&#1093;&#1074;&#1072;&#1090;&#1080;&#1090;&#1100; &#1083;&#1102;&#1073;&#1099;&#1077; &#1082;&#1072;&#1088;&#1090;&#1080;&#1085;&#1082;&#1080; &#1080;&#1079; &#1074;&#1080;&#1076;&#1077;&#1086; / DVD &#1080; &#1089;&#1086;&#1093;&#1088;&#1072;&#1085;&#1080;&#1090;&#1100; &#1077;&#1075;&#1086; &#1074; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1077; JPEG &#1080;&#1083;&#1080; BMP. &#1042; &#1082;&#1072;&#1078;&#1076;&#1086;&#1084; &#1082;&#1086;&#1085;&#1082;&#1088;&#1077;&#1090;&#1085;&#1086;&#1084; &#1087;&#1088;&#1086;&#1092;&#1080;&#1083;&#1077;, &#1074; &#1085;&#1072;&#1079;&#1074;&#1072;&#1085;&#1080;&#1080; &#1087;&#1088;&#1086;&#1092;&#1080;&#1083;&#1103; &#1080;&#1083;&#1080; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1072; &#1087;&#1088;&#1080;&#1089;&#1091;&#1090;&#1089;&#1090;&#1074;&#1091;&#1077;&#1090; &#1088;&#1072;&#1079;&#1088;&#1077;&#1096;&#1077;&#1085;&#1080;&#1077; &#1074;&#1080;&#1076;&#1077;&#1086;. &#1057;&#1090;&#1072;&#1088;&#1072;&#1081;&#1090;&#1077;&#1089;&#1100; &#1073;&#1083;&#1086;&#1082;&#1080;&#1088;&#1086;&#1074;&#1072;&#1090;&#1100; &#1092;&#1072;&#1077;&#1088;&#1074;&#1086;&#1083;&#1083;&#1086;&#1084; &#1083;&#1102;&#1073;&#1099;&#1077; &#1087;&#1086;&#1087;&#1099;&#1090;&#1082;&#1080; &#1087;&#1088;&#1086;&#1075;&#1088;&#1072;&#1084;&#1084;&#1099; &#1080;&#1083;&#1080; &#1077;&#1077; &#1082;&#1086;&#1084;&#1087;&#1086;&#1085;&#1077;&#1085;&#1090;&#1086;&#1074; &#1087;&#1086;&#1076;&#1082;&#1083;&#1102;&#1095;&#1080;&#1090;&#1100;&#1089;&#1103; &#1074; &#1080;&#1085;&#1090;&#1077;&#1088;&#1085;&#1077;&#1090;! &#1069;&#1090;&#1080; &#1093;&#1072;&#1088;&#1072;&#1082;&#1090;&#1077;&#1088;&#1080;&#1089;&#1090;&#1080;&#1082;&#1080; &#1075;&#1086;&#1074;&#1086;&#1088;&#1103;&#1090; &#1086;&#1073; &#1091;&#1076;&#1086;&#1073;&#1089;&#1090;&#1074;&#1077; &#1080;&#1089;&#1087;&#1086;&#1083;&#1100;&#1079;&#1086;&#1074;&#1072;&#1085;&#1080;&#1103; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1072; &#1076;&#1083;&#1103; &#1048;&#1085;&#1090;&#1077;&#1088;&#1085;&#1077;&#1090;-&#1088;&#1072;&#1076;&#1080;&#1086; &#1080; &#1074; &#1091;&#1089;&#1090;&#1088;&#1086;&#1081;&#1089;&#1090;&#1074;&#1072;&#1093; &#1089; &#1085;&#1077;&#1073;&#1086;&#1083;&#1100;&#1096;&#1080;&#1084; &#1086;&#1073;&#1098;&#1077;&#1084;&#1086;&#1084; &#1087;&#1072;&#1084;&#1103;&#1090;&#1080;. &#1041;&#1099;&#1074;&#1072;&#1077;&#1090;, &#1095;&#1090;&#1086; &#1087;&#1088;&#1086;&#1075;&#1088;&#1072;&#1084;&#1084;&#1072; &#1085;&#1077; &#1095;&#1080;&#1090;&#1072;&#1077;&#1090; &#1086;&#1087;&#1088;&#1077;&#1076;&#1077;&#1083;&#1077;&#1085;&#1085;&#1099;&#1077; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1099; &#1080; &#1082;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1077;&#1088; &#1086;&#1095;&#1077;&#1085;&#1100; &#1095;&#1072;&#1089;&#1090;&#1086; &#1074;&#1099;&#1088;&#1091;&#1095;&#1072;&#1077;&#1090;. &#1059;&#1084;&#1077;&#1077;&#1090; &#1090;&#1072;&#1082;&#1078;&#1077; &#1082;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1080;&#1088;&#1086;&#1074;&#1072;&#1090;&#1100; AVI, MPEG &#1080; &#1076;&#1088;&#1091;&#1075;&#1080;&#1077; &#1074;&#1080;&#1076;&#1077;&#1086; &#1080; &#1072;&#1091;&#1076;&#1080;&#1086; &#1092;&#1072;&#1081;&#1083;&#1099; &#1074; AAC, MP3, M4A, MP2 &#1072;&#1091;&#1076;&#1080;&#1086; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1099;. &#1042;&#1089;&#1105; &#1093;&#1086;&#1088;&#1086;&#1096;&#1086; &#1089;&#1090;&#1072;&#1074;&#1080;&#1090;&#1089;&#1103; aiff &#1074; wav &#1082;&#1086;&#1085;&#1074;&#1077;&#1085;&#1090;&#1077;&#1088; &#1086;&#1085;&#1083;&#1072;&#1081;&#1085; &#1080; &#1085;&#1077; &#1082;&#1086;&#1085;&#1092;&#1083;&#1080;&#1082;&#1090;&#1091;&#1077;&#1090; &#1089; &#1072;&#1085;&#1090;&#1080;&#1074;&#1080;&#1088;&#1091;&#1089;&#1086;&#1084;, &#1077;&#1089;&#1083;&#1080; &#1085;&#1077; &#1089;&#1090;&#1072;&#1074;&#1080;&#1090;&#1100; &#1076;&#1086;&#1087;&#1086;&#1083;&#1085;&#1080;&#1090;&#1077;&#1083;&#1100;&#1085;&#1099;&#1077; &#1087;&#1088;&#1086;&#1075;&#1088;&#1072;&#1084;&#1084;&#1099; &#1074; &#1087;&#1088;&#1086;&#1094;&#1077;&#1089;&#1089;&#1077; &#1091;&#1089;&#1090;&#1072;&#1085;&#1086;&#1074;&#1082;&#1080;. &#1055;&#1088;&#1080;&#1083;&#1086;&#1078;&#1077;&#1085;&#1080;&#1077;, &#1087;&#1086;&#1079;&#1074;&#1086;&#1083;&#1103;&#1102;&#1097;&#1077;&#1077; &#1082;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1080;&#1088;&#1086;&#1074;&#1072;&#1090;&#1100; &#1073;&#1086;&#1083;&#1077;&#1077; 20 &#1088;&#1072;&#1079;&#1083;&#1080;&#1095;&#1085;&#1099;&#1093; &#1072;&#1091;&#1076;&#1080;&#1086; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1086;&#1074;, &#1089;&#1088;&#1077;&#1076;&#1080; &#1082;&#1086;&#1090;&#1086;&#1088;&#1099;&#1093; mp3, wav &#1080; &#1084;&#1085;&#1086;&#1075;&#1080;&#1077; &#1076;&#1088;&#1091;&#1075;&#1080;&#1077;. &#1044;&#1072;&#1083;&#1077;&#1077; &#1074;&#1086;&#1079;&#1074;&#1088;&#1072;&#1097;&#1072;&#1077;&#1084;&#1089;&#1103; &#1074; &#1089;&#1090;&#1072;&#1088;&#1090;&#1086;&#1074;&#1086;&#1077; &#1088;&#1072;&#1073;&#1086;&#1095;&#1077;&#1077; &#1086;&#1082;&#1085;&#1086; &#1087;&#1088;&#1086;&#1075;&#1088;&#1072;&#1084;&#1084;&#1099; &#1080; &#1085;&#1072;&#1078;&#1080;&#1084;&#1072;&#1077;&#1084; &#171;&#1057;&#1090;&#1072;&#1088;&#1090;&#187; &#1080;&#1083;&#1080; &#171;Click on to Start&#187; (&#1089;&#1084;. &#1057; &#1087;&#1086;&#1084;&#1086;&#1097;&#1100;&#1102; &#1101;&#1090;&#1086;&#1075;&#1086; &#1079;&#1072;&#1084;&#1077;&#1095;&#1072;&#1090;&#1077;&#1083;&#1100;&#1085;&#1086;&#1075;&#1086; &#1080;&#1085;&#1089;&#1090;&#1088;&#1091;&#1084;&#1077;&#1085;&#1090;&#1072; &#1084;&#1086;&#1078;&#1085;&#1086; &#1082;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1080;&#1088;&#1086;&#1074;&#1072;&#1090;&#1100; &#1085;&#1077;&#1089;&#1082;&#1086;&#1083;&#1100;&#1082;&#1086; &#1092;&#1072;&#1081;&#1083;&#1086;&#1074; &#1074; &#1087;&#1072;&#1082;&#1077;&#1090;&#1085;&#1086;&#1084; &#1088;&#1077;&#1078;&#1080;&#1084;&#1077;, &#1085;&#1077;&#1079;&#1072;&#1074;&#1080;&#1089;&#1080;&#1084;&#1086; &#1086;&#1090; &#1080;&#1093; &#1080;&#1089;&#1090;&#1086;&#1095;&#1085;&#1080;&#1082;&#1072; &#1080; &#1090;&#1077;&#1082;&#1091;&#1097;&#1077;&#1075;&#1086; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1072;. &#1042; &#1085;&#1080;&#1078;&#1085;&#1077;&#1084; &#1087;&#1086;&#1083;&#1077; (2) &#1089;&#1083;&#1077;&#1076;&#1091;&#1077;&#1090; &#1091;&#1082;&#1072;&#1079;&#1072;&#1090;&#1100; &#1072;&#1091;&#1076;&#1080;&#1086;&#1092;&#1072;&#1081;&#1083;, &#1080;&#1079; &#1082;&#1086;&#1090;&#1086;&#1088;&#1086;&#1075;&#1086; &#1073;&#1091;&#1076;&#1077;&#1090; &#1074;&#1079;&#1103;&#1090; &#1072;&#1091;&#1076;&#1080;&#1086;&#1087;&#1086;&#1090;&#1086;&#1082; &#1080; &#1085;&#1072;&#1083;&#1086;&#1078;&#1077;&#1085; &#1085;&#1072; &#1091;&#1082;&#1072;&#1079;&#1072;&#1085;&#1085;&#1099;&#1081; &#1074;&#1099;&#1096;&#1077; &#1074;&#1080;&#1076;&#1077;&#1086;&#1092;&#1088;&#1072;&#1075;&#1084;&#1077;&#1085;&#1090;. &#1054;&#1085;, &#1076;&#1077;&#1081;&#1089;&#1090;&#1074;&#1080;&#1090;&#1077;&#1083;&#1100;&#1085;&#1086;, &#1086;&#1095;&#1077;&#1085;&#1100; &#1087;&#1088;&#1086;&#1089;&#1090;, &#1080; &#1076;&#1072;&#1078;&#1077; &#1077;&#1089;&#1083;&#1080; &#1073;&#1099; &#1086;&#1085; &#1073;&#1099;&#1083; &#1085;&#1072; &#1082;&#1080;&#1090;&#1072;&#1081;&#1089;&#1082;&#1086;&#1084;, &#1090;&#1086; &#1088;&#1072;&#1079;&#1086;&#1073;&#1088;&#1072;&#1090;&#1100;&#1089;&#1103; &#1074; &#1085;&#1077;&#1084; &#1085;&#1077; &#1089;&#1086;&#1089;&#1090;&#1072;&#1074;&#1080;&#1083;&#1086; &#1073;&#1099; &#1090;&#1088;&#1091;&#1076;&#1072;. &#1055;&#1088;&#1086;&#1089;&#1090;&#1086;&#1081; &#1074; &#1080;&#1089;&#1087;&#1086;&#1083;&#1100;&#1079;&#1086;&#1074;&#1072;&#1085;&#1080;&#1080; &#1080;&#1085;&#1090;&#1077;&#1088;&#1092;&#1077;&#1081;&#1089;, &#1082;&#1086;&#1090;&#1086;&#1088;&#1099;&#1081; &#1087;&#1086;&#1079;&#1074;&#1086;&#1083;&#1103;&#1077;&#1090; &#1082;&#1086;&#1087;&#1080;&#1088;&#1086;&#1074;&#1072;&#1090;&#1100; &#1090;&#1088;&#1077;&#1082;&#1080; &#1080;&#1079; &#1074;&#1072;&#1096;&#1080;&#1093; &#1072;&#1091;&#1076;&#1080;&#1086; CD &#1076;&#1080;&#1089;&#1082;&#1086;&#1074; &#1085;&#1077;&#1089;&#1082;&#1086;&#1083;&#1100;&#1082;&#1080;&#1084;&#1080; &#1082;&#1083;&#1080;&#1082;&#1072;&#1084;&#1080; &#1084;&#1099;&#1096;&#1082;&#1080;. Pistonsoft MP3 Tags Editor - &#1091;&#1076;&#1086;&#1073;&#1085;&#1099;&#1081; &#1088;&#1077;&#1076;&#1072;&#1082;&#1090;&#1086;&#1088; &#1090;&#1077;&#1075;&#1086;&#1074; &#1074; &#1084;&#1091;&#1079;&#1099;&#1082;&#1072;&#1083;&#1100;&#1085;&#1099;&#1093; &#1092;&#1072;&#1081;&#1083;&#1072;&#1093; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1072; MP3, WMA, OGG &#1080; ASF. &#1055;&#1086; &#1089;&#1091;&#1090;&#1080;, &#1076;&#1072;&#1085;&#1085;&#1086;&#1077; &#1087;&#1088;&#1086;&#1075;&#1088;&#1072;&#1084;&#1084;&#1085;&#1086;&#1077; &#1086;&#1073;&#1077;&#1089;&#1087;&#1077;&#1095;&#1077;&#1085;&#1080;&#1077; &#1103;&#1074;&#1083;&#1103;&#1077;&#1090;&#1089;&#1103; &#1087;&#1088;&#1086;&#1092;&#1077;&#1089;&#1089;&#1080;&#1086;&#1085;&#1072;&#1083;&#1100;&#1085;&#1099;&#1084; &#1087;&#1088;&#1077;&#1086;&#1073;&#1088;&#1072;&#1079;&#1086;&#1074;&#1072;&#1090;&#1077;&#1083;&#1077;&#1084; &#1072;&#1091;&#1076;&#1080;&#1086;&#1076;&#1072;&#1085;&#1085;&#1099;&#1093; &#1074; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090; MP3, &#1087;&#1086;&#1076;&#1076;&#1077;&#1088;&#1078;&#1080;&#1074;&#1072;&#1102;&#1097;&#1080;&#1084; &#1088;&#1072;&#1073;&#1086;&#1090;&#1091; &#1089; &#1087;&#1088;&#1072;&#1082;&#1090;&#1080;&#1095;&#1077;&#1089;&#1082;&#1080; &#1083;&#1102;&#1073;&#1099;&#1084;&#1080; &#1084;&#1091;&#1083;&#1100;&#1090;&#1080;&#1084;&#1077;&#1076;&#1080;&#1081;&#1085;&#1099;&#1084;&#1080; &#1092;&#1072;&#1081;&#1083;&#1072;&#1084;&#1080;, &#1074; &#1095;&#1080;&#1089;&#1083;&#1086; &#1082;&#1086;&#1090;&#1086;&#1088;&#1099;&#1093; &#1074;&#1093;&#1086;&#1076;&#1103;&#1090;, &#1082;&#1072;&#1082; &#1072;&#1091;&#1076;&#1080;&#1086;-, &#1090;&#1072;&#1082; &#1080; &#1074;&#1080;&#1076;&#1077;&#1086;&#1076;&#1072;&#1085;&#1085;&#1099;&#1077;, &#1089;&#1086;&#1093;&#1088;&#1072;&#1085;&#1077;&#1085;&#1085;&#1099;&#1077; &#1074; &#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1072;&#1093;: DivX, AVI, MPEG, VCD, MP4, WMV, MP3, WMA, WAV, OGG, AAC, M4A &#1080; &#1090;.&#1076;. &#1050;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1080;&#1088;&#1091;&#1081;&#1090;&#1077; &#1072;&#1091;&#1076;&#1080;&#1086; &#1080; &#1074;&#1080;&#1076;&#1077;&#1086; &#1074; one hundred eighty+ &#1092;&#1086;&#1088;&#1084;&#1072;&#1090;&#1086;&#1074;, &#1087;&#1086;&#1083;&#1100;&#1079;&#1091;&#1081;&#1090;&#1077;&#1089;&#1100; &#1087;&#1088;&#1086;&#1092;&#1080;&#1083;&#1103;&#1084;&#1080; &#1076;&#1083;&#1103; 200+ &#1084;&#1086;&#1073;&#1080;&#1083;&#1100;&#1085;&#1099;&#1093; &#1091;&#1089;&#1090;&#1088;&#1086;&#1081;&#1089;&#1090;&#1074;. &#1069;&#1090;&#1086;&#1090; &#1072;&#1073;&#1089;&#1086;&#1083;&#1102;&#1090;&#1085;&#1086; &#1073;&#1077;&#1089;&#1087;&#1083;&#1072;&#1090;&#1085;&#1099;&#1081; &#1082;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1077;&#1088; &#1087;&#1086;&#1079;&#1074;&#1086;&#1083;&#1103;&#1077;&#1090; &#1082;&#1086;&#1085;&#1074;&#1077;&#1088;&#1090;&#1080;&#1088;&#1086;&#1074;&#1072;&#1090;&#1100;&#160;&#1084;&#1091;&#1079;&#1099;&#1082;&#1091; &#1076;&#1083;&#1103; &#1082;&#1086;&#1084;&#1087;&#1100;&#1102;&#1090;&#1077;&#1088;&#1072;, &#1090;&#1077;&#1083;&#1077;&#1092;&#1086;&#1085;&#1072;, &#1087;&#1083;&#1072;&#1085;&#1096;&#1077;&#1090;&#1072; &#1080;&#1083;&#1080; aiff &#1074; wav &#1086;&#1085;&#1083;&#1072;&#1081;&#1085; &#1087;&#1083;&#1077;&#1077;&#1088;&#1072; &#1074; &#1074;&#1099;&#1089;&#1086;&#1082;&#1086;&#1084; &#1082;&#1072;&#1095;&#1077;&#1089;&#1090;&#1074;&#1077;, &#1074;&#1099;&#1088;&#1077;&#1079;&#1072;&#1090;&#1100; &#1079;&#1074;&#1091;&#1082;&#1086;&#1074;&#1099;&#1077; &#1076;&#1086;&#1088;&#1086;&#1078;&#1082;&#1080; &#1080;&#1079; &#1074;&#1080;&#1076;&#1077;&#1086; &#1092;&#1072;&#1081;&#1083;&#1086;&#1074;, &#1089;&#1086;&#1093;&#1088;&#1072;&#1085;&#1103;&#1090;&#1100;&#160;&#1089;&#1072;&#1091;&#1085;&#1076;&#1090;&#1088;&#1077;&#1082;&#1080; &#1080; &#1087;&#1077;&#1089;&#1085;&#1080; &#1080;&#1079; &#1074;&#1080;&#1076;&#1077;&#1086;&#1082;&#1083;&#1080;&#1087;&#1086;&#1074; &#1074; &#1086;&#1088;&#1080;&#1075;&#1080;&#1085;&#1072;&#1083;&#1100;&#1085;&#1086;&#1084; &#1082;&#1072;&#1095;&#1077;&#1089;&#1090;&#1074;&#1077;, &#1086;&#1073;&#1098;&#1077;&#1076;&#1080;&#1085;&#1103;&#1090;&#1100; &#1085;&#1077;&#1089;&#1082;&#1086;&#1083;&#1100;&#1082;&#1086;&#160;&#1072;&#1091;&#1076;&#1080;&#1086; &#1092;&#1072;&#1081;&#1083;&#1086;&#1074;, &#1085;&#1072;&#1089;&#1090;&#1088;&#1072;&#1080;&#1074;&#1072;&#1090;&#1100;&#160;&#1072;&#1091;&#1076;&#1080;&#1086; &#1073;&#1080;&#1090;&#1088;&#1077;&#1081;&#1090;, &#1082;&#1086;&#1076;&#1077;&#1082;, &#1082;&#1072;&#1085;&#1072;&#1083;, &#1089;&#1101;&#1084;&#1087;&#1083;&#1088;&#1077;&#1081;&#1090; &#1080; &#1084;&#1085;&#1086;&#1075;&#1086;&#1077; &#1076;&#1088;&#1091;&#1075;&#1086;&#1077;. Convert ac3 files to mp2 free this website: ac3 to mp2 online off film convert ac3 to mp2 free throughout Another option worth noting is one that lets you set up to three preset conversion formats so that you can right-click on an audio file and choose one of those formats for a quick conversion. It's a huge time saver. Der beste kostenlose Audio Converter (Win 8 unterst&#252;tzt), Youtube to MP3 Converter - Downloadet und konvertiert Online-Movies zu MP3/FLAC/M4A/WMA usw. Free Video to JPG Converter: die Software zerlegt den Film in einzelnen Bildsequenzen. Companion von Freemake - Microsoft, Intel, Thawte leisten Garantie daf&#252;r, dass der Freemake Music Converter sicher ist. Der neueste Codecs und qualitatives Design machen aus Freemake der schnellste Audio Converter. Wenn die Datei bereits das richtige Format aufweist, ist es wahrscheinlich, dass der zum Digitalisieren der Datei verwendete Codec von Home windows online mp4 in wav konverter und PowerPoint nicht unterst&#252;tzt wird. Sie k&#246;nnen einen WAV zu iTunes Converter benutzen um WMV Dateien in ein mit iTunes kompatibles Format zu konvertieren. Die als Transportstrom verpackten Daten haben so eine Artwork Container, der es einfacher macht, Bin&#228;rdaten auch dann noch lesen zu k&#246;nnen, wenn Datei- oder &#220;bertragungsfehler auftreten. Dieser Mac YouTube Downloader Freeware erlaubt Ihnen, Videodateien von YouTube herunterzuladen und zu MP4, WMV, MPEG1/2, SWF, FLV, AVI, MP3, AAC, WAV, DVD NTSC, DVD PAL und anderen Formaten zu konvertieren. Ja, ich bin einverstanden, dass CHIP mich per E-Mail &#252;ber unverbindlich Produktinformationen und interessante Vorteilsangebote informiert. Wir empfehlen den kostenlosen Apowersoft Online Video Umwandler und den Apowersoft Video Konverter Studio, falls Sie mehr Funktionen wie etwa Videobearbeitungen nutzen m&#246;chten. Apple Lossless und FLAC bieten dir die beste Originaltreue und sparen aufgrund der Komprimierung Speicherplatz im Vergleich zu anderen Formaten wie WAV oder AIFF. Deine audiodatei liegt wahrscheinlich in aac codiert im mp4 container, wenn du selbige nun als wav (unkomprimiert-] 24bit 48khz)) ausspielst, wird sie zwar nicht besser, l&#228;sst sich aber verlustfrei weiterverarbeiten. Wer einen MAC besitzt und sich ein wenig mit der SHELL unter OSX auskennt, kann mal das Bash-Script von Hendrik Schreiber testen, welches er in seinem Weblog vorstellt. Audioformat: Mp3PRO ist eine Kombination aus MP3 und der von Coding Technologies entwickelten SBR-Technik (spectral band replication). Energy AMR MP3 WAV WMA M4A AC3 Audio Converter is a instrument mp4 zum wav konverter to transform all of the audio files from one format to the other, amongst all those it supports. MediAvatar Video Converter Mac Professionell ist ein Video Converter f&#252;r Mac User, die Audios & Movies konvertieren, schneiden, zusammenf&#252;gen und bearbeiten wollen. Wenn Sie Ihre Musik in einem anderen Dateiformat codieren m&#246;chten, empfehlen wir Ihnen, sie im neuen Codierungsformat erneut von der Originalquelle zu importieren. Any Video Converter Free for Mac ist auch ein kostenloser Video zu Audio Konverter, der Audiodateien aus Video extrahieren kann, wie MP4 zu MP3, MPEG zu AAC, AVI zu WAV, WMV zu OGG, MOV zu AAC, WebM(V8) Video zu MP3, FLV zu MP3 usw. Jetzt k&#246;nnen Sie Audiotitel direkt in Ihrem Browser umwandeln: schnell, sicher und kostenlos. Die Antwort kann so einfach sein werden, wenn Sie mit Free MP4 Converter benutzen. Abbildung three: In den Einstellungen einige Mediaplayer, wie hier dem MX Video Participant, kann man zwischen Hardware- und Softwaredekodierung umschalten. MP4 und WMA sind zwei weitverbreitete Formate bei Internetstreaming-Aktivit&#228;ten. The software program program moreover helps wma wmv asf ogg cda flac wv aac mp4 ac3 aiff ape mpc mpp adx spx tta au snd mod and mo3 file codecs convertir ape en mp3 and helps batch conversion.. M4a mp3 converter helps url=-/de/how-to-convert-m4a-recordsdata konvertiere wma in mp4-to-mp2konvertiere m4a in mp2/url mp3 wav wma wmv asf ogg oga cda flac wv aac mp4 ac3 aiff aif aifc afc ape mac mpc mp+ mpp adx spx tta au snd xm it s3m mod mtm umx and mo3 file codecs. Der DVD Converter kann noch DVDs f&#252;r iPhone, iPhone4, iPad, iPad 2, iPod Touch, iPod Contact four, PSP, PS3, Apple TELEVISION, Apple TELEVISION 2, Zune, Xbox 360, Blackberry, Archos, Artistic Zen, Android OS phones, and so kostenloser wma in mp4 konverter on. Aus diesem Grund werden in diesem Artikel einiger der High Ten On-line YouTube zu WAV Konvertierer diskutiert und Tricks, wie man YouTube-Movies einfach und schnell in WAV umwandeln kann, beschrieben werden. Zum Gl&#252;ck sind die meisten Codecs - oder zumindest die Decoder - kostenlos erh&#228;ltlich. So kann z.B. eine MP4-Datei verschiedene Audio- und Videoformate enthalten, die auch zugleich innerhalb der selben Datei vorkommen k&#246;nnen. Sie k&#246;nnen damit Dateien konvertieren und dabei die Tags &#252;bernehmen, Audio-CDs auslesen und sie als Einzeldateien oder Pictures speichern, CD-Pictures anhand von CUE-Sheets trennen, Dateien zu einem Picture mit integriertem CUE-Sheet zusammenf&#252;hren, und sogar Vorschaudateien f&#252;r ganze Alben erstellen. Ein Wiedergabeger&#228;t mit microSD eignet sich vor allem, wenn Sie noch nicht wissen, wie viel Speicher Sie ben&#246;tigen: Denn die Karte l&#228;sst sich leicht austauschen und ihre Kapazit&#228;t reicht von sixteen MB bis zu 512 GB. Diese Methode muss in Home windows ausgef&#252;hrt werden, auch wenn du versuchst, auf einem Mac umzuwandeln. Dies ist ein &#252;beraus einfach zu bedienendes Software, welches MP4-Dateien in WMA-Dateien umwandeln kann. MP4-Player werden &#252;blicherweise als MP3-Participant bezeichnet, obwohl sie MP4 und dar&#252;ber hinaus zahlreiche andere Audio- und Videoformate unterst&#252;tzen. AnyMP4 Video Converter besitzt eine benutzerfreundliche Oberfl&#228;che, und ist einfach zu bedienen. Zudem kann man mit dem Free MP4 Converter Movies kostenloser wma in mp4 konverter von YouTube direkt per URL aus dem Internet herunterladen und importieren. Aiff to flac online use this link: converting aiff to flac particular economic convert aiff to flac position Converted audio files can be automatically normalized and fade-in and fade-out effects can be applied on the audio files. . The integrated CD ripper will convert your audio CDs to files on your hard disk. It supports all of the formats available for regular audio file conversion. Audio can query the CDDB/freedb online CD database to find artist and title information prior to ripping. No need to enter track names manually. Free MP3 Cutter Joiner is an light-weight tool that's straightforward to make use of and has a plain wanting interface. It has the flexibility to join nearly all audio codecs similar to MP3, WMA, WAV, AAC, FLAC, OGG, APE, AC3, AIFF, MP2, M4A, CDA, VOX, RA, RAM, TTA and plenty of more to MP3, WMA, WAV and OGG. At the same time, changing the bitrates of audio recordsdata for higher performance in your cell phone, MP3 player, or other media gadgets is a piece of cake. Like mp3DirectCut, Mp3Splt can work on an audio file with out having to decompress it first, leading to a quick workflow and no impression to audio high quality. This app is far easy although: you just pick a start and finish time, then export that choice as a separate audio file. This free MP3 cutter and MP3 joiner supports a large amount of input codecs together with MP3, WMA, WAV, AAC, FLAC, OGG, APE, AC3, AIFF, MP2, M4A, CDA, VOX, RA, RAM, TTA and much more as source formats. Any audio information will be lower or joined to the most well-liked audio codecs. Click on "Obtain" to download the outcome mp3 file when merge successed. Concatenating your several music, track, rington, mp3 recordsdata to at least one. Open this system file. Follow song merger the onscreen guide to install Movavi Video Editor in your laptop. After the setup process is accomplished, the program will open robotically. Other notable options embody ID3 tag modifying, pause detection, batch file processing, auto-division of tracks by time value, and automated filename and tag creation when splitting tracks. You'll be able to download MP3 Toolkit without spending a dime, which might be marked as Unregistered. There's no indication of whether or not this version limits options or has a time restrict. ? Merge two mp3 information and make a fusion tune. Audacity is the go-to app in case you're searching for full management over the editing process song merger. With it, you can split any bit of audio into as many pieces as you need, or you may merge as many audio recordsdata as you need in no matter order. Want to create nice quality skilled-style tailor-made ringtones and tunes? MP3 Cutter Joiner Free is the proper device to create limitless ringtones from any music CD or MP3 files simply. Then, you possibly can upload them to cell phones to show your personal-style personality; publish on your web site or on YouTube for distribution and more. 1. Click on "FILE" or "URL" button to modify native file or on-line file. Click on "Select file" button to pick out a file on your computer or enter an internet file URL. The audio format could be WAV , WMA , MP3 , OGG , AAC , AU , FLAC , M4A , MKA , AIFF , OPUS or RA Audio file size will be as much as 200M. This free MP3 cutter and MP3 joiner helps a large amount of enter codecs together with MP3, WMA, WAV, AAC, FLAC, OGG, APE, AC3, AIFF, MP2, M4A, CDA, VOX, RA, RAM, TTA and much more as supply formats. Any audio information may be reduce or joined to the most popular audio formats. My collection of music in Serato for the most half consists of 320 kbps CBR wav bought from Beatport. The Free m4a to wav Converter put in so easily, was super simple to make use of, and BAM! If you do not have FFmpeg on Audacity yet, download it by clicking Download on FFmpeg Library. Download the set up file, open it and set up the program following the setup instructions. Having the ability to convert m4a audio files into wav or different formats permits you better capacity to share music and audio files with buddies, to social media, and extra. Apple followers will admire the option to add converted files on to iTunes multimedia library. Almost every laptop media participant recognizes and performs wav information, making them highly regarded for downloading and exchanging music with others. The free version only handles 100 information, inflicting anyone with a good measurement music library to spend days changing ninety nine files at a time. Now you can finally select the filename and listing of the wav file to be created. Audio Cleansing Lab is an wav converter, an audiograbber and audio modifying software program. If you are nonetheless questioning the actual difference between the 2 music codecs, your uncertainty may be ascertained by following the general m4a vs wav comparison, showing you the way the new kid on the block m4a stacks up in opposition to the venerable wav, by way http://www.audio-transcoder.com/how-to-convert-m4a-files-to-wav of sound high quality, file measurement and business assist. However, as bit rate will increase and extra of the original sound signal is preserved, the relative advantage of AAC over wav becomes much less apparent. Free m4a to wav Converter is the proper answer for anybody who enjoys listening to music or audio books when on the transfer. Many individuals referred their non-Apple devices can't play m4a or enjoying m4a with a 3rd celebration player. Cloud Convert , Zamzar , and On-line Convert are three websites that will let you convert files free of charge with out having to install any software program. Once add completed, converter will redirect an internet page to point out the conversion end result. Step3: You can edit your m4a files earlier than conversion, akin to trimming off unwanted components, adding some sound effects, merging with different music information, edit speed/pitch, fading in and fading out and so on. m4a songs are DRM-free and you may carry out them on different m4a compatible gadgets. That is it. By utilizing this tutorial, you can convert varied audio files ( I've checked it with wav and m4a files solely) into AAC / m4a formats to make use of them in your cell phones. So, for the album I examined, whereas iTunes wasn't excellent with wav, it was fairly darn shut. Alternatively, click and drag the file you want to convert from its saved location into the location's conversion window. The Apple family of smartphones and cell gadgets, together with the iPad, iPod and iPhone, are all capable of play m4a files without a downside, and PCs and laptops working iTunes or QuickTime are also compatible. Be aware: The installer for Freemake Audio Converter will try to install other programs which are unrelated to the converter, so you'll want to uncheck these choices before finishing setup if you do not need them added to your computer. m4a file format is unprotected because http://www.audio-transcoder.com/how-to-convert-m4a-files-to-wav it would not have M4P file extensions which are present in protected files. Concerning to m4a versus wav, they've the identical measurement when encoded at the same bitrate. The wav to m4a Converter obtain for COMPUTER works on most current Windows working techniques. Free Mobile HelperExactly what I needed. Apart from commonplace MP3 format, MP3 Toolkit helps most of fashionable audio & video formats like WMA, WMV, MP4, WAV, OGG, FLV, MOV, M4P, M4A and more, additionally helps prime quality audio like FLAC and APE. With MP3 Toolkit, you'll be able to convert, cut, merge, rip and file MP3. Merge mp3 files on-line mp3 merge recordsdata mp3 merge online obtain merge mp3 merge mp3 file join mp3 online merge mp3 online free mergemp3 mp3 merger merge music collectively online merge mp3 online join songs collectively online merge two mp3 information online merge mp3 free mp3 merger software program free download merge songs online free merge two songs together online free merge mp3 audacity. An audio file format is a file format for storing digital audio data on a pc system. The bit structure of the audio information is called the audio coding format and may be uncompressed, or compressed to scale back the file measurement, usually utilizing lossy compression. The information can be a raw bitstream in an audio coding format, however it is normally embedded in a container format or an audio knowledge format with defined storage layer. To our approval, MP3 Cutter Joiner Free can be part of a number of audio files which had different bitrates. It worked very fast and the becoming a member of course of was done virtually instantly. It's no drawback to play the newly created audio file by media gamers. We extremely advocate this software program to those who wish to hear to 1 big audio file that incorporates all your favourite songs without pauses. Free Merge MP3 is a trust worthy MP3 merger for mp3 customers to affix multiple recordsdata into a big one. Moreover becoming a member of audio recordsdata with top quality combine mp3 files online, it might probably convert audio information as an audio converter. Thus, we give it 5 stars for its very good efficiency. It lets you record any sound out of your micphone immediately to plain MP3 format, and no size limitation. If your sound card supports analog, you may record the stream audio also. Make Preparation: free download and set up this powerful MP3 Merger in your Home windows, and then comply with the step-by-step information to mix audio recordsdata inside minutes. Right here we take merge mp3 as instance. The app supports more than 300 audio formats, robotically changing them to mp3 for faster and simpler operation. You will be able to merge songs of different formats into one and access them everytime you want. With the help of this mergence, you'll expertise seamless streaming on-line of songs. Ihr möchtet Musik- oder andere Audiodateien professionell schneiden und bearbeiten? Any Audio Converter ist komplett kostenloser Audio Extractor, der Ihnen hilf, Audio, Tonspur oder Hintergrundmusik aus Videos oder CDs zu extrahieren. Mit diesem Free Audio Extractor lassen sich Tonspuren leicht aus AVI, MPEG, MPG, FLV (Flash Video), DAT, WMV, MOV, MP4, 3GP Videodateien extrahieren und als MP3, WAV und AC3 speichern. Darüber hinaus können Sie aus Musikdateien Videos mit Visualisierungen oder statischem Hintergrundbild erstellen. Es stehen hierfür rund 25 elegante Visualisierungen und Animationen - wie etwa der bekannte Matrix-Effekt - zur Auswahl. Die Musikdatei wird dann als AVI, MP4, WMV, 3GP Video gespeichert oder als Video-DVD gebrannt. Wer es noch etwas ausgefeilter magazine, bekommt mit Audacity eine Software program für die tiefgreifende Bearbeitung von Musikstücken und Klangdateien. Hier kannst Du sehr viele Dateiformate lesen und speichern, darunter die beliebten verlustfreien WAV und AIFF. Die Aufnahme von Stimmen und Instrumenten, die Nutzung von Klangeffekten und mehr sind damit möglich. Audacity funktioniert mit Home windows, Mac OS X, Linux und weiteren Betriebssystemen. Und das Beste: Audacity ist ebenfalls kostenlos und bietet wesentlich mehr an, als nur das reine Musik schneiden. Wählen Sie das gewünschte Audioformat aus und klicken Sie auf "Konvertieren". Ein ausgefeiltes Programm, zu dem es eine populäre Various für Windows gibt: mp3DirectCut ist ein weiteres geeignetes Werkzeug, deutschsprachig (auch wenn die Webseite auf Englisch ist) und ebenfalls kostenlos erhältlich. Alle unterstützten Video- und Audioformate lassen sich in MP3 umwandeln. So konvertieren Sie auch exotische Audioformate ins MP3-Format oder erzeugen aus Musikvideos Audiodateien. Die Crossfade-Funktion ermöglicht es Ihnen, Lieder so miteinander zu verbinden, dass sie fließend ineinander übergehen. AudioShell ist eine Freewareerweiterung für das Windows-Kontextmenü. dateien direkt im Explorer. bearbeiten. Die ID3-Tags einer Sounddatei sind eine. wird, wenn man eine MP3-CD im Auto abspielt. AudioShell hat man jederzeit zur Hand, weil es. Merge MP3 unterstützt Batch Mode-Vorgänge, damit ganze Ordner voller Audiodateien mit wenigen Klicks verbunden sind. Um Aufnahmen so bearbeiten zu können, dass Du beispielsweise ein einzelnes darin enthaltenes Instrument passgenau ausschneidest (etwa um später Beats selber machen zu können), mp3 zusammenfügen freeware deutsch findest Du auf delamar einen eigenen Artikel. Hier erfährst Du zudem, wie Knackser und andere unerwünschte Nebeneffekte beim Audio schneiden vermieden werden. Sie haben noch Fragen? Als nächstes legen Sie unter "Gewählte Titel" per Drag&Drop die Reihenfolge der Audiofiles fest. Stellen Sie - falls gewünscht - unter "Optionen" die Länge der Pause ein, die vor dem Abspielen des jeweils nachfolgenden Titels eingehalten werden soll. Im Anschluss daran brauchen Sie nur noch auf der rechten Seite Informationen wie "Titel", "Album" oder "Style" einzugeben und das Ausgabeformat einzustellen. Zum Abschließen des Vorgangs drücken Sie einfach auf den "Dateien vereinen"-Button und wenige Augenblicke später taucht das fertige Werk im Zielordner auf. Der Any Video Converter Free Obtain verschafft euch ein Konvertierungstool, mit dem ihr sehr viele Video- und Audioformate untereinander konvertieren und außerdem Videos von Downloadportalen herunterladen und solche auf DVD brennen könnt. und Output unterstützt werden: MP3, AC3, OGG, AAC. Achtung: Für das reine MP3 schneiden sollte das Programm nicht deine erste Wahl sein, denn beim Speichern des zurechtgeschnittenen Musikstücks als MP3-Datei wird die Datei neu komprimiert, was einen Verlust der Klangqualität zur Folge hat. Kostenlose On-line-App, die Audiotitel für Sie konvertiert. Die App unterstützt alle Formate, verarbeitet Ihre Dateien schnell und erfordert keine Installation. Es ist ein Fehler beim Laden der Kommentare aufgetreten, bitte versuchen sie es spдter erneut. Ausschließlich Sie haben Zugriff auf Ihre Sitzungen. All Ihre Daten und Dateien werden wenige Stunden, nachdem Sie die Bearbeitung abgeschlossen haben, automatisch gelöscht. Als nächstes legen Sie unter "Gewählte Titel" per Drag&Drop die Reihenfolge der Audiofiles fest. Stellen Sie - falls gewünscht - unter "Optionen" die Länge der Pause ein, die vor dem Abspielen des jeweils nachfolgenden Titels eingehalten werden soll. Im Anschluss daran brauchen Sie nur noch auf der rechten Seite Informationen wie "Titel", "Album" oder "Style mp3 zusammenfügen freeware deutsch" einzugeben und das Ausgabeformat einzustellen. Zum Abschließen des Vorgangs drücken Sie einfach auf den "Dateien vereinen"-Button und wenige Augenblicke später taucht das fertige Werk im Zielordner auf. Wie man aus der Überschrift entnehmen kann möchte wma audio dateien in mp3 dateien umwandeln!!! Das erste Fenster, welches sich nach dem Starten öffnet, ist zugleich das Hauptfenster und damit Herzstück des Programms. Im Gegensatz zu den Alternativen WMA und MP3 ist das OGG-Verfahren weder durch Patente geschützt, noch unterliegt es einer geräteübergreifenden Standardisierung. Wir raten bei der Set up des Tools allerdings unbedingt zur Vorsicht, da dieses mitunter versucht zusätzliche Adware zu installieren, die ihr eigentlich gar nicht haben wolltet, sondern lediglich überlesen habt. Wenn Sie auf eine Anzeige für ein Gesponsertes Produkt klicken, werden Sie zu einem Amazon Detailseite gebracht, wo Sie mehr über das Produkt erfahren und es kaufen können. In fast allen Fällen sind WMA Dateien Teil des fortschrittlichen Advanced System Format (ASF), einem proprietären Containerformat für digitale Video und Audiodateien von Microsoft. Bescheissen, wie der Eine oder Andere meint tu ich persönlich keinen, im Gegensatz zu Denen, die Mp3 über die diversen Tauschbörsen ilegal beziehen. Windows Media Audio (WMA) ist ein proprietärer Audio - Codec von Microsoft und Teil der Home windows-Media -Plattform. Nicht ganz, habe mal bei Planetopia on-line gesehen, das das ganz authorized wäre wenn man seine wma Dateien auf CD als Audio CD brennt und dann zum Beispiel mit dem Audiograbber als MP3 rippt. Dies bedeutet, dass Sie einfach konvertieren Sie Ihre Sammlung in WMA, WMV-oder ASF-Format MP3. NoteBurner WMA DRM to MP3 Converter kann iTunes AAC, M4P, M4A oder M4B Musik in MP3, WAV, WMA, AAC, OGG und FLAC Audiodateien konvertieren. Wo hingegen bei der verlustbehafteten Datenkomprimierung eine ungefähre Ausgabe der ursprünglichen wma zu mp3 Daten erfolgt, was zu Lasten der ursprünglichen Klangqualität geht, sich aber in einer besseren Komprimierungsrate auswirkt. Funktionalität - nämlich das Umwandeln von Audiodateien - steht hier klar im Vordergrund. WMA Encoder Decoder is an audio convertor that encodes AudioCD, MP3, OGG and WAV files to WMA files, and decodes WMA information again to WAV files. Mp3 Converter Cutter & RingtoneMaker ist eine von Mp4 To Mp3 delicate entwickelte App. Erstmal schauen bevor man die Festplatte zumüllt mit Programmen die Mac OS X schon integriert hat. Wird eine Audiodatei von einem verlustbehafteten Format in ein anderes konvertiert (z.B. vom MP3 in Vorbis ), wird die Qualität immer durch Generationsverlust verschlechtert. Wenn er keine MP3 abspielt, wird er bestimmt auch keine WMA abspielen, also werden es wohl nur AudioCDs sein die er kann. MP3 verzichtet auf einige der in einem Lied aufgezeichneten akustischen Informationen, die unser Ohr nicht wahrnehmen kann, und wendet dann komplexe Algorithmen an, um die Dateigröße zu verringern. Mit Direct Audio Converter und CD Ripper kann man die ganze Musiksammlung zum anderen Format konvertieren und dabei die Ordnerstruktur beibehalten. Free WMA MP3 Converter helps ID3 tagging; the ID3 tags in the authentic recordsdata will be reserved after conversion. Zudem ist WMA bei geringen Bitraten perfekt (die Anzahl der Bits, welche professional Zeiteinheit verarbeitet werden). Bekannte Vertreter sind z. B. der Windows Media Player umwandlung wma in mp3 , der Quicktime Participant oder Apple iTunes. Deine wma Datei ist mit dem digitalen rechte managment evrsehen und kann weder bearbeitet noch geändert werden. Machen Sie Movies von jeder App, nehmen Sie On-line-Streaming-Movies, Webinare und sogar Skype-Anrufe auf, speichern Sie Clips in allen populären Formaten zum Anschauen auf verschiedenen Geräten. Free WMA to MP3 ChangerConverter unterstützt Batch-Konvertierung von Windows Medien-Dateien in MP3. WMA (Windows Media Audio)-Format, allgemein auf vielen Musik-Obtain-Dienste verwendet, ist mit vielen Home windows-basierten Programmen kompatibel. Die Lizenzierung für die Verwendung des MP3-Dateiformat der Fraunhofer Gesellschaft wurde alleine im Jahr 2005 auf €a hundred,000,000 berechnet (oder über $ a hundred and eighty,000,000 U.S.). Die Thompson Unterhaltungselektronik besteht auch darauf die Lizenzierungsrechte auf dem MP3-Dateiformat in den USA, Japan, Kanada und den EU-Ländern zu halten. Um die Produktentwicklung zu erhalten und Ihnen hochwertige Software program bieten zu können, enthalten DVDVideoSoft Produkte Links zu anderen Webseiten und Installationen der Drittanbieter-Anwendungen (z.B. Toolbar). Dank ihrer Popularität können WMA Dateien sehr oft aus dem Internet downloadet werden. Xilisoft WMA MP3 Converter kann Ihnen helfen, gängige Audioformate in WMA u. MP3 umzuwandeln, wie z.B. WAV in MP3, WMA in MP3 umwandeln. Die neu erzeugte MP3 Datei finden Sie in dem gleichen Ordner, wo sich die WMA Datei befindet. Andererseits können Sie mehrere Video- und Audiodateien zu einer einzigen Audiodatei zusammenfügen. Ich bin Vangelis, der Inhaber und Administrator von Ich bin begeisterter Windows-Fan und habe die letzten Jahre zusammen mit meinem Team aufgebaut.Stetig arbeiten wir daran Lösungsvorschläge für alle möglichen Windows-Probleme zu freue mich sehr, wenn Euch unsere Tipps und Tricks auf helfen. Hatte heute keine Zeit zu experimentieren... werde aber Meldung machen, sollte ich das in diesem Leben nochmal auf die Reihe kriegen. Einige Programme, ändern dies in eine sixty wma zu mp3 four-Bit-Ganzzahl, ohne Vorzeichen, um die Datei-Größenbeschränkung zu umgehen, aber es ist noch nicht die Customary Umsetzung des WAV-Dateiformates. Nach dem Konvertieren lassen sich doppelte Dateien mit wenigen Klicks von dem Programm auf Ihrem Windows PC finden und entfernen. No less than four instances a day I convert one thing - dollars to euro, cm to inches or PDF recordsdata to PPT depending on what I am going about. A: Individuals Convert TTA recordsdata To FLAC format for varied purpose, nonetheless, most of them Convert TTA for the 2 frequent ones, first the TTA information .tta to .flac are too giant, they need to avoid wasting area, second their moveable units do not recognize TTA format in any respect, however these units are capable of taking part in FLAC information without any compatibility issues. Hey all, I'm wondering if there's a software that may reliably break up atta file into particular person tracks (which I'll convert to both mp3 v0 or ogg later for mobile use). I've tried Bigasoft audio converter, however it doesn't do it perfectly all the time and it might add a second at the finish or whatnot. 4.Audio joiner utility lets you join a number of audio recordsdata into one massive audio file. Compress to LossyWav, making a lossy output + correction file. TTA recordsdata will be effortlessly was FLAC by using our TTA to FLAC Converter. Flacon extracts particular person tracks from one big audio file containing the whole album of music and saves them as separate audio files. 4.Audio joiner utility permits you to be a part of a number of FLAC audio files into one big audio file. The TTA lossless audio codec permits for the storage of up to 20 audio CDs value of music on a single DVD-R , specify retaining the unique CD high quality audio, plus detailed info in the ID3 tag format. Choose one or more TTA recordsdata you need to convert after which click Open. WAV PCM, MS-ADPCM, IMA-ADPCM, A-Regulation, u_Law, GSM610, Float-Double and so tta to flac on to WMA, MP3, AAC, M4A, AMR, VQF, OGG, FLAC, APE, WAV codecs. To ensure efficiently break up the TTA audio, thecue file shall be in the same folder with the TTA audio file. TAudioConverter is an advanced, multithreaded audio converter-extractor and CD Ripper. It may convert any audio format to aac, mp3, wav, flac, ac3, ogg, opus, mpc, ape or tta. It might probably additionally, extract audio streams from video recordsdata. It might probably apply numerous results to audio streams. A: TTA ( The True Audio ) is a free lossless audio codec associated with True Audio Software program. TTA can scale audio information down to about 30%-70% of their authentic size, and the compression runs on multichannel eight, 16 and 24-bit data of WAV tracks. 2.Including the TTA files you wish to convert to MP3. Nonetheless, this audio format will not be appropriate with most media players like iTunes, QuickTime, or moveable units like iPod, iPhone, PSP, BlackBerry or MP3 player tta to flac converter. Worse still, if the TTA audio is one big file which comprises multiple tracks, it's tough for us to split them into individual songs. A: TTA ( The True Audio ) is a free lossless audio codec related to True Audio Software program. TTA can scale audio files all the way down to about 30%-70% of their unique size, and the compression runs on multichannel 8, sixteen and 24-bit information of WAV tracks. 4.Audio joiner utility permits you to be part of multiple audio files into one huge audio file. Compress to LossyWav, making a lossy output + correction file. TTA information could be effortlessly was FLAC by using our TTA to FLAC Converter. Flacon extracts individual tracks from one massive audio file containing the whole album of music and saves them as separate audio files. Audio is processed in 64-bit float accuracy for finest outcomes. Helps gapless encoding and decoding. Uses gapless pattern rate conversion. Supported input formats: WAV, FLAC, APE, WavPack, True Audio (TTA). Batch mode for multiple information conversion process, TTA to FLAC Converter can convert hundreds of TTA files directly. Select one or more TTA recordsdata you want to convert and then click Open. WAV PCM, MS-ADPCM, IMA-ADPCM, A-Regulation, u_Law, GSM610, Float-Double and so tta2flac forth to WMA, MP3, AAC, M4A, AMR, VQF, OGG, FLAC, APE, WAV codecs. To ensure efficiently break up the TTA audio, thecue file shall be in the same folder with the TTA audio file. FLAC is a lossless audio format that gives compression in measurement without loss in high quality. This open source codec works just like ZIP archiving, however gives higher compression particularly for sound data (up to 60%). FLAC audio is supported by nearly all of platforms like Windows, Unix, Amiga. This is the one non-proprietary lossless codec with well documented specs and API. Helps 4-32 bps decision, 1-8 channels. In streaming protocol FLAC uses CRC checksums. Unfortunately, the transformations that make up 'mastering' will be fairly elaborate, and for professionally-produced music there may be little incentive to let the general public see their project recordsdata - though they are sometimes made accessible for remixers. C'est maintenant doable avec 2011, et sur PC également (à confirmer également). RM/MP3/WAV/WMA Audio Converter est un utilitaire de conversion qui permet d'encoder des fichiers audio RM, RA, RAM, RMVB, RMJ, WAV, MP3, WMA, OGG, AVI, MP2, AIFF, AU et VOX, aux formats WAV, MP3, OGG, WMA ou RM. Très easy d'utilisation, cette utility supporte le glisser-déposer, supporte le traitement par lot et dispose d'outils de personnalisation de l'interface. La conversion se fait bien, mais lorsque j'essaie de faire jouer le morceau via le cd player de Windows 2000 j'obtiens le message suivant : n'est pas une software win32 valide. Vous pouvez convertir des fichiers WAV, MP3, OGG, WMA, AC3, AMR, 3GP, MP2, RM, RMVB, RAM, VCD, VOB, AVI, MPEG, WMV, ASF, and so forth en format AMR rapidement et facilement. C'est pourquoi, d'une configuration à une autre, une musique MIDI sera interpretée différemment : de bonne qualité avec un synthé professional mp32wav, et de moins bonne qualité avec une carte son de sort AC'ninety seven par exemple. Juste copiez et collez vos fichier MIDI et le reste est fait par Direct MIDI to MP3 Converter automatiquement. C'est inclus dans la plupart d'entre eux (même pour les utilisateurs de PC, pas de jaloux), mais ça te le convertira par défaut en AAC, donc assure toi que tu puisses lire les AAC, sinon change les paramètres pour que la conversion se fasse vers un format MP3. Il assure mp32wav une conversion rapide et efficace de divers codecs audio dont OGG Vorbis, WMA. J'ai donc cherché à convertir un fichier mp3 en Wav, et cela se fait très facilement et rapidement. Il ne nécessite par ailleurs que peu de ressources matérielles lors de la lecture et contient des informations permettant l'application optionnelle d'un Replay Gain (normalisation avec loudness) avec les applications compatibles. Donc en réponse aux questions posés par l'auteur du matter : si tout est en wav et que tu ne t'imagines pas voir tout converti en mp3 320, convertis-y en AIFF pour une meillleure gestion des tags et la prise en cost des artworks et organise ta musique dans iTunes. Vous pouvez obtenir la musique fantastique de sortie MP3 que vous aimez vraiment après l'édition. Chacun peut proposer, télécharger du gratuit, commenter, documenter,.. un logiciel gratuit disponible en telechargement. La procédure expliquée précédement (avec fichierbat) ne fonctionne pas, et je n'arrives pas à lancer (programme pour créer les tags) à la fin de l'encodage. Si tu mets %1/%2/%4, les fichiers seront placés à l'arborescence suivante : auteur/titre_de_l'album/titre, avec création automatique de ces dossiers. Vous pouvez illustrer visuellement cette compression en jouant vos fichiers dans votre DAW avec un plugin EQ graphique sur votre piste (fabfilter pro q, par exemple). MP3 est un format de musique numérique qui permet de compresser les pistes d'un CD à environ un dixième de leur taille normale sans une perte significative de qualité. Glissez-déposez les fichiers MP3 que vous désirez convertir dans la fenêtre du convertisseur. Et les rip YouTube c'est vraiment horrible, c'est pire que du mp3 128 je crois ! With MP3 to WAV Converter we are able to encode multiple recordsdata concurrently and configure the output parameters. Movavi Video Converter supporte plus de one hundred eighty formats audio et vidéo et vous permet d'enregistrer les fichiers pour les lire sur plus de 200 sorts des appareils mobiles. J'ajouterais qu'une grande partie des DJs/producteurs professional qui tournent dans les plus grands golf equipment du monde, jouent du mp3 320. J'ai beaucoup de vidéos VOB que je veux les convertir en fichiers audio avec certains des outils de conversion gratuits sur Internet. On doit avouer avoir un peu douillé pour la rendre la plus claire et easy doable… Un MP3 160kbps est techniquement considéré comme en haute résolution, mais nous, nous te recommandons le 320kbps pour un meilleur résultat. Inutile d'installer un logiciel, tout est fait Téléchargez des MPhaute qualité avec notre Convertisseur vers MP3. A compression égale, un fichier WAV offre une meilleure qualité sonore qu'un fichier MP3. La compression MP3 n'est pas une compression à proprement parler, mais plutôt une suppression d'informations, ce qui réduit naturellment la qualité d'écoute. La mode de la fournée vous aide à convertir plusieurs pistes MIDI à MP3 simultanément. Supporté par Home windows mp32wav eight.1, 8, 7, XP, 2003 et Vista, ce logiciel convertit par lot des fichiers MP3 en WAV. La taille du fichier est considérablement réduite, avec une dégradation relative de la qualité sonore. Waveform Audio File Format (WAVE, or extra generally often called WAV because of its filename extension) is a Microsoft and IBM audio file format customary for storing an audio bitstream on PCs. La compression appliquée lors de la conversion en mp3 consiste principalement à réduire le spectre, sur les extrêmes (very sub-bass et very excessive). Faites une recherche sur internet en écrivant « filtre directshow AAC », téléchargez-le et installez-le sur votre ordinateur. Ce sort mp3 en wav de format suggest un ratio qualité taille du fichier plus performant qu'un fichier MP3. Maintenant, je suis d'accord que si la sono est de piètre qualité, alors mp3 ou wav, personnes n'entendra la différence. Avant tout, le website Le logiciel gratuit est une communauté de personnes qui partagent les logiciels libres et gratuits du net à telecharger. Une compression non destructrice est appliquée (comme pour une archive ZIP en quelque sorte) afin de préserver l'espace disque. J'enregistre en WAVE et utilise NERO Wave Editor pour transformer le WAVE en MP3. Et là, tu n'entendras plus de différence avec pas mal de CDs, dans le domaine de l'électro en tout cas. Merci d'avoir essayé de m'aider (d'autres également automobile pour lier un fichier son avec un diaporama, il faut avoir un fichier de taille réduite. La raison d'être de ce programme est de s'adapter à tout utilisateur (Home windows, Mac OSX). La conversion est des plus simples, en utilisant les icônes situées sur le côté droit. En raison de l'adoption de la dernière technologie d'accélération, il peut vous offrir une vitesse super-rapide lors de la conversion vidéo/audio en MP3. Lancez-le et cliquez sur la flèche de menu déroulant se trouvant dans le coin en haut à gauche de la fenêtre. AIFF (.AIF) (Audio Interchange File Format), un normal défini par Apple (Mac OS). Ne prend pas en cost les fichiers au-delà de 750 MB - celui-ci fait readableSize. Pour éviter la mauvaise surprise des malwares et autres joyeusetés du style, AIMP propose une bonne resolution de conversion sur LAPTOP Dans notre exemple, nous utilisons la model four. Son seul défaut est de ne pas proposer nativement le MP3 en conversion, mais il est doable de l'ajouter manuellement. The results that AV Voice Changer Software Primary gives you can be recorded straight into recordsdata in MP3, WMA, WAV and different sound formats. Il est évident que du MP3 128k c'est de la soupe et qu'il faut au minimum du 192k. WMA-Dateien können in den meisten gängigen Softwareplayern wie Winamp und natürlich dem Home windows Media Player abgespielt werden. Im Media Player 10 klicken Sie in der oberen Menüleiste auf den Eintrag Brennen. Fazit : Einfach zu benutzender und kostenloser Konverter für WMA-Dateien in MP3. Sie können einerseits die Quellvideodatei schneiden, um den gewünschten mp3 zu wma Teil zu konvertieren. Bei der Konvertierung können Sie noch Einstellungen wie Bitrate und Frequenz Ihren Wünschen entsprechend anpassen und dann mit diesen Einstellungen gleich mehrere Dateien in einem Arbeitsgang umwandeln. Es gibt sehr viele Audiokonverter auf dem Markt, aber bis jetzt hatten wie noch keinen gefunden, der diese Aufgabe so einfach und schnell wie Freemake Audio Converter ausführt. Die Erstellung von Bitraten unterhalb 128 kbps nominal (Ratio ]1:10) zum Beispiel mit nominal sixty four kbps geschieht außerhalb aller Spezifikation und Eignungsprofile und logischerweise kommt da nur eine Ansammlung von Artefakten mit Musik drumherum bei raus, für solche Sachen ist mp3 einfach nicht ausgelegt. Es gibt aber auch noch ein weiteres Downside: Grafische Oberflächen gelten zwar gemeinhin als benutzerfreundlicher als Kommandozeilen-Befehle, sind aber oft entweder mit Optionen überfrachtet oder bieten, damit es besonders einfach ist, zu wenig. Power MP3 WMA Converter can burn mp3, wma, wav, ogg, ape, asf(audio part), wmv(udio half) recordsdata to cd immediately. FF Multi Converter ist eine übersichtlich gehaltene grafische Oberfläche, die sich zum Konvertieren von Audio-, Video-, Bild- und Dokument-Dateien eignet und die meisten populären Formate unter einer Anwendung unterstützt. Ja das tut es. Verallgemeinernd kann man nur sagen, daß es gegenüber mp3 unterhalb nominal 128 kbps bessere Alernativen gibt. Dadurch ist es weniger geeignet, um die eigenen Musiksammlung zu verwalten, denn schon bei der Konvertierung zu einem verlustfreien Format wie FLAC spart man große Mengen Speicherplatz ein. Ich kann aber auch nicht am Ende alle auf wma filtern und die löschen, solange noch nicht umgewandelte dazwischen sind. Er unterstützt Batch-Herunterladen der Movies mp3 in wma konverter von YouTube/Google/Metacafe/Vevo/Howcast/Facebook/Nicovide und Batch-Konvertierung zu MP3, WMA, WAV, FLAC, AAC, M4A und OGG. Wenn du da eine Audio CD erstellst und oben Mp3 CD auswählst, dann alle Titel reinziehst (per Drag & Drop) fragt er, ob er konvertieren soll. Dein Hinweis darauf, dass sich mp3 in Atrac wandeln lassen, ist ein Bärendienst und endet in einem minderwertigen drm-behafteten Atrac3plus-Datei, die sich nur auf einem Sonygerät abspielen läßt. Muß ich die Lieder zuerst auf eine CD brennen und dann umwandeln oder geht das direkt ohne die Lieder auf eine CD zubrennen. Windows zu haben bedeutet nicht, dass du auf die Verwendung des Home windows kostenloser mp3 zum wma konverter Media Participant beschränkt bist. Jetzt können Sie ganz einfach die WMA Dateien zu iTunes hinzufügen, entweder per Drag & Drop oder Manuell, auf Ihrem Mac auf Mac OS X. Die App kann gleichzeitig verschiedene Dateien in einem Batch umwandeln und speichert diese dann in einem ZIP-Archiv, um das Herunterladen zu beschleunigen. Ich codire immer in 256 kb/s alles andere ist einfach zu schlecht und mehr unterstützt mein Participant nicht. Si vous aimez un bon livre audio, vous pouvez prendre le iPod au format M4b utilisant MP3 to iPod Audio Ebook Converter. Quand aux pertes de données entre le mp3 et l'AIFF, je me repète, j'ai testé les 2 en soirée sur un DDJ SZ avec des Nexo PS15 + les caissons de basse Nexo....Plusieurs personnes se sont prêtées au check convertisseur mp3 à m4b, not possible de détecter une différence à l'oreille.... certes cela est peut être vrai avec des appareils de mesure, mais à l'oreille même sur du bon matos c'est quasiment indétectable en soirée... alors avec des enceintes moins pêchues que les nexo j'en parle même pas...! Donc pour moi, à l'heure actuelle, Waltr constitue la meilleure solution de transferts de contenus sur un iDevice sans iTunes sur Mac et Windows. Il est connu que la musique achetée sur iTunes en M4P format venir avec DRM, courtroom mp32m4b pour la gestion des droits numériques. Ce programme vous donnera automatiquement les informations kin à la musique. Fonction WavePad avec des fichiers MP3 ou WMA; vous pouvez également ajouter quelques « effets spéciaux » dans le fichier que nous utilisons pour personnaliser les fichiers audio. Mais, étant donné que le m4b est un dérivé de l'AAC, la conversion en mp3 (ou AAC regular convertir mp3 en m4b) est potential en dehors d'iTunes. NoteBurner Audio Converter pour Mac peut graver les musiques protégées par DRM sur un lecteur CD-RW virtuel où vous pouvez obtenir les sortie de non protégés MP3, WMA, WAV. FLAC ist die Abkürzung für Free Lossless Audio Codec, der auch für die verlustfreie Kompression bekannt ist. Flac Converter : mp3 to flac, ape to flac m4a to flac, wav to flac , alac to flac. Der Konverter ist eigentlich sehr einfach zu bedienen und hat die Fähigkeit, DRM-geschützte Audio-Bücher in mp3-Formate zu konvertieren. AIFF (Audio Interchange File Format) ist ein Dateiformat (Containerformat) zum Speichern von LPCM-Audiodaten. Danach prüfte ich den ganzen Signalweg vom Mikrofon über Ableton bis zu den Export-Einstellung. Es ist ideally suited, M4A MP3 Converter die in der Lage ist ,kann es M4A in MP3 als auch MP3 in M4A umwandeln. Ich in schon vor einigen Jahren auf WavPack umgestiegen, da ich mit FLAC immer wieder Schwierigkeiten beim Tagging hatte (dauerte zu lange, produzierte mitunter corrupted information online aiff in m4a konverter) und einfach kleinere Information haben wollte. Über die Untermenüs „Optionen und das Register „Musik kopieren gelangen Sie zu den „Einstellungen zum Kopieren von Medium. Es wurde von Apple entwickelt und ist das Pendant zu Microsofts WAVE-Dateiformat (WAV). Schneiden Sie das Videofenster zurecht und kürzen Sie es. Sie können auch mehrere Videodateien zu einer Videodatei zusammenführen. Um beliebige Movies aiff zu m4a in MP4-Format umwandeln zu können braucht Ihr einen Konverter. Mein Name ist Thorsten aka DJ Rewerb und diese DJ-Tipps schreibe ich, um dich als DJ auf neue Gedanken zu bringen. Zu WAV- oder MP3-Dateien beispielsweise wird ein separates Cuesheet als Datei erstellt, während dieses bei FLAC direkt in den Audiodateien abgespeichert wird. Dieser Konverter ist einfach zu bedienen und macht es möglich, dass Sie iTunes in MP3-Format konvertieren. Bigasoft M4A Converter unterstützt Audio aus Video und speichern Sie sie als M4A-Formate. Audacity ist ein freier, leicht zu bedienender und sehr mächtiger Audioeditor und -recorder für GNU/Linux, Mac OS X, Home windows aiff in m4a und andere Betriebssysteme. Der MKV Konverter für Mac erlabut Ihnen noch mehrere Dateien zu einer zu verbinden, um sie als eine komplette Datei auszugeben. Kostenloser Obtain Bigasoft M4A Converter und genießen Sie Ihre Musik überall fantastisch. ITunes konvertiert allerdings keine reinen AAC Dateien, sonbdern m4a - additionally MPEG4 Audio Format welches AAC enthält. Was geschieht, ist, dass der Decoder diesen Rahmen, um in der Lage, die Länge der Datei zu verfolgen. Freemake Audio Converter converts music information between 50+ audio formats. A: People Convert CDA recordsdata to MP3 format for varied goal, nonetheless, most of them Convert CDA for the 2 widespread ones, first the Audio CDs recordsdata are too giant, they want cda format to mp3 online converter to avoid wasting house, second their portable devices do not acknowledge CDA format in any respect, however these devices are able to playing MP3 files with none compatibility issues. Drag any MP3 information you wish to convert into the CDA format and burn to a CD into this new "Burn" column on the appropriate side of Home windows Media Player. As soon as transformed to the CDA file format, a typical audio CD can maintain eighty minutes of music. Pay close consideration to the "Whole Running Time" indicator on the backside of this bar in Home windows Media Participant to make sure you aren't making an attempt to suit too much music in your CD. With CD Audio you imply recordsdata with the ".cda" extension, than it is likely that you are in troubles as a result of these files do not actually contain any sound information! Please learn right here for more info aboutcda recordsdata and find out how to convert CDA to MP3 files. Convert audio files corresponding to wav or m4a to mp3. Or convert mp3 to wav, m4a and more. CDA to MP3 Converter converts CDA information to MP3 and other codecs similar to AAC, M4A, WMA, OGG, and so forth. So to listen to the audio in iPod or MP3 Player. ConverterLite is an easy interface to make converting simple. Simply add the recordsdata that you must convert, choose the output device to play to audio or video and then convert with FFmpeg. Drag and drop your CDA file onto your library and click "Create MP3 Version" in the appropriate-click on pop-up menu. It will probably be part cda format to mp3 online converter of CDA information to 1 massive AAC, ALAC, FLAC, WAV, M4A, M4B, MP3, OGG or WMA. Click on on the button on the top of Home windows Media Player that is clearly labeled "Burn." This opens a brand new column in Windows Media Player.
2019-04-25T22:25:02Z
http://www.ceskaastrologie.cz/konference/viewtopic.php?f=2&t=308
Newell Rubbermaid Inc. - Company Profile, Information, Business Description, History, Background Information on Newell Rubbermaid Inc. Each and every day, our products touch millions of people where they work, where they live and where they play. Our portfolio of power brands provides a compelling platform for growth that we are leveraging with breakthrough product innovation, high-impact marketing and attention-grabbing presentation at the point of sale. At the same time, we are aggressively pursuing the type of operating efficiency that characterizes the world's best companies. Our vision is to create a global powerhouse in consumer and commercial products and to provide a superior return to our shareholders. Frankly, we can't think of a more exciting opportunity. History of Newell Rubbermaid Inc. Newell Rubbermaid Inc. is a diversified manufacturer and marketer of a variety of high-volume brand-name consumer products. The firm is organized into four business groups. The Rubbermaid group makes such products as storage containers, waste and recycling containers, closet organization systems, cleaning products, outdoor play systems, high chairs, infant seats, strollers, play yards, and children's toys and furniture; key brands include Rubbermaid, Curver, Little Tikes, Graco, and Century. The Sharpie group produces writing instruments, highlighters, art supplies, office accessories, and hair care accessories; brands include Sanford, Sharpie, Paper Mate, Parker, Waterman, Uni-Ball, Liquid Paper, Eldon, and Goody. The Levolor/Hardware group makes drapery hardware, window blinds and other window treatments, paint applicator products, hand torches, cabinet hardware, hand tools, and power tool accessories; among the brands of this group are Levolor, Kirsch, Newell, Amerock, BernzOmatic, and Vise-Grip. The Calphalon Home group produces cookware, bakeware, glassware, dinnerware, kitchen tools and utensils, ready-made picture frames, and photo albums; brands include Calphalon, WearEver, Regal, Anchor Hocking, Pyrex, and Burnes of Boston. The company's products are sold primarily through mass merchandisers, including discount, variety, chain, and hardware stores, as well as warehouse clubs, hardware and houseware distributors, home improvement centers, office product superstores, and grocery and drugstores. Nearly 75 percent of the company's revenues are generated in the United States, with 18 percent originating in Europe and 4 percent each in Canada and in Central and South America. Wal-Mart Stores, Inc. is by far the largest of Newell Rubbermaid's customers, accounting for about 15 percent of total sales. The two main strands of Newell Rubbermaid's history came together in March 1999 when Newell Co. acquired Rubbermaid Incorporated. Originally founded soon after the dawn of the 20th century to make brass curtain rods, Newell evolved into a maker of a wide range of brand-name consumer products. The low-profile company grew mainly through acquisition, buying dozens of firms in the late 20th century and then improving their profitability through an integration process known as "Newellization." Rubbermaid was a much better known company when it was acquired by Newell, which subsequently changed its name to Newell Rubbermaid. Originally known as the Wooster Rubber Company (which was founded in 1920) and initially specializing in rubber products, Rubbermaid developed into a top maker of consumer brand-name products--primarily plastic products. Newell Co. traces its roots to the short-lived W.F. Linton Company, an Ogdensburg, New York, firm incorporated in 1902 to make brass curtain rods. The Linton Company received $1,000 to move the company from Providence, Rhode Island, to Ogdensburg from the Ogdensburg Board of Trade, with the board's president, Edgar A. Newell, signing off on the loan. In 1903 the company went bankrupt and Newell took control of its operations, renaming the firm Newell Manufacturing Company, Inc. Although he was familiar with sales, Newell had no understanding of manufacturing and, as a result, hired and subsequently fired several general managers between 1903 and 1907. Edgar Newell then hired his son Allan to run Newell Manufacturing and started a new company, Newell Manufacturing Company Ltd. (Newell Ltd.), in Prescott, Canada. Established to capitalize on Ogdensburg's location, which made shipments south costly and left Canadian distribution channels more financially attractive, Newell Ltd. purchased a small dockside building in Prescott. Newell Manufacturing's initial product line was composed exclusively of brass curtain rods, created through a method of tube making that utilized a waterwheel; Newell's was powered by the nearby Oswegatchie River. In 1908 Newell began producing a greater variety of curtain rod shapes after adopting a new, faster, and more adaptable manufacturing process that used roll forming machines. By the end of the decade the Newell companies were employing about 20 people and generating annual sales of about $50,000. Throughout Newell Manufacturing's second decade, increasing managerial authority was given to Allan Newell, although Edgar Newell retained all voting shares of both Newell companies. In 1912 the domestic company began construction of a new factory, which was completed a year later. Although Ogdensburg operations were sailing smoothly, by 1912 Newell Ltd. found that curtain rods were not enough to keep its operations afloat. A new manager, Lawrence "Ben" Ferguson Cuthbert, was given a chance to bail out the Canadian plant in return for a 20 percent cut of its gross profits. Between 1912 and 1913 Newell Ltd. acquired the factory it had been leasing and expanded its plating department to produce a variety of products, including towel racks, stair nosings, ice picks, and other items requiring a finish of brass, zinc, or nickel. The expanded product line spurred additional sales, and Newell Ltd. soon became profitable. As war spread across the globe, the cost of brass rose, and Newell hired the Baker Varnish Company to devise a new metal-coating method tailored to Newell's roll forming manufacturing process. By 1917 Newell's curtain rods were being coated with a nontarnishable lacquer. Not only were the new rods cheaper to produce than brass rods, but because they would not tarnish, they were better suited to lace and ruffle curtains. With its new curtain rod Newell courted and won the business of Woolworth stores, after agreeing to buy out Woolworth's on-hand stock of curtain rods. Newell's first buyback deal soon paid dividends, boosting sales and helping to establish the company's first long-term relationship with a major national retailer. In 1920 Edgar A. Newell died and, for the first time, stockholder changes were made at the company. Cuthbert called in his profit-stake from running Newell Ltd., and, after some subsequent legal jousting, the company's stock ownership was resolved. Allan Newell received a 64 percent share in Newell Ltd., and Cuthbert received 33 percent of Newell Manufacturing and 20 percent of Newell Ltd. Albert Newell, Edgar's other son, who had been helping with sales, received 66 percent of Newell Manufacturing and 16 percent of Newell Ltd. Allan Newell was named chairman and president of Newell Manufacturing but bowed out of active affairs with the company, opting for a political life that eventually led him to the New York State Assembly. Albert Newell was also reluctant to be involved with the family business, and management of both companies passed to Cuthbert, who moved to Ogdensburg. In 1921 Cuthbert, the Newell brothers, and a former Ogdensburg employee named Harry Barnwell each put up $5,000 to start a new curtain rod factory in Freeport, Illinois. The new business, Western Newell Manufacturing Company, was designed to take advantage of local railroad transportation and serve as a western branch of Newell Manufacturing. Barnwell served a brief stint as Western Newell's president before selling his 25 percent stake in the operations to Cuthbert's cousin, Leonard Ferguson, who was recruited to manage the fledgling company. Like Newell Manufacturing, Western Newell began operations with ten employees and initially produced curtain rods in a red brick factory it rented. The company quickly became profitable, and in 1925 a new factory was erected. By 1928 Western Newell's sales had grown to $485,000, more than twice that of Newell Ltd. and about half that of Newell Manufacturing. At the time of the stock market crash in October 1929, Western Newell was producing a wide variety of drapery hardware, including extension curtain rods, ornamental drapery rods, and pinless curtain stretchers. Despite a dramatic slide in sales that forced the companies to lay off workers and reduce workdays, the Newell companies made it through the Great Depression without dipping into red ink. The bottom of the Depression's well for Newell Manufacturing came in 1933 when that company logged only about one-half of its 1929 level of sales, or $425,000. With a small operational base and modest salaries, Western Newell fared the best of the two American companies during the Depression, and by 1933 the 12-year-old Western Newell, with sales figures 25 percent lower than Newell Manufacturing, had a net income 30 percent greater than the original company. In 1933 Western Newell earned $61,000 on sales of $320,000, whereas Newell Manufacturing earned $47,000 on sales of $425,000. By 1937 Western Newell, under the leadership of Ferguson, had surpassed Newell Manufacturing in both revenues and income, earning $126,000 on sales of $553,000, whereas Newell Manufacturing earned $70,000 on sales of $511,000. At Cuthbert's suggestion, in the late 1930s the Newell brothers agreed to give Ferguson a small stake in Newell Manufacturing, effectively taking the founding company out of the hands of the Newell family, although the brothers retained rights to voting control through the late 1940s. Between 1938 and 1939 Newell Manufacturing established a third domestic factory, this one in Los Angeles, and made its first acquisition--Drapery Hardware Ltd. of Monrovia, California (DRACO), a maker of wooden and heavy iron drapery fixtures that eventually was sold to S.H. Kress and other smaller customers. Before the 1930s drew to a close a number of officer changes were made: Cuthbert was named to succeed Allan Newell as president of Newell Manufacturing and Ferguson was named president of Western Newell, although Allan Newell remained president of Newell Ltd. and chairman of all three companies. During World War II the Freeport factory won a coveted Army/Navy "E" Award for excellence in wartime production, churning out more than 230 million metallic belt links for machine guns within a two-year period. During the postwar decade the Newell companies enjoyed steady growth, although no new manufacturing plants were started or acquired. In 1954 the Newell family ceded further power over its namesake companies as complete operational control was given to Leonard Ferguson, who became president of all three Newell companies. During the early 1960s Newell acquired the rights to additional drapery hardware brands and names, including Angevine and Silent Gliss. In 1963 Ferguson was named chairman and chief executive of the three Newell companies and two years later his son, Daniel C. Ferguson, became president of the companies. Under the leadership of the father-and-son team, in 1966 all Newell companies were consolidated into one Illinois corporation, Newell Manufacturing Company, with headquarters in Freeport. Under the guidance of Daniel Ferguson, the $14 million family business turned its focus from its products to its customers and initiated a multiproduct strategy designed to boost sales to its existing buyers. During the 1970s Newell continued to acquire other companies, greatly expanding its product line in the process. In 1968 Newell purchased a majority interest in Mirra-Cote Industries, a manufacturer of plastic bath accessories. In 1969 Newell acquired Dorfile Manufacturing Company, a maker of household shelving, and E.H. Tate Company, which brought the "Bulldog" line of picture hanging hardware into the Newell line of products. During the late 1960s DRACO began phasing out of manufacturing operations and finally closed its doors in the early 1970s. In 1970 the company was reincorporated in Delaware as Newell Companies, Inc. The following year Newell added sewing and knitting accessories to its product line when it acquired The Boye Needle Company, a Chicago-based world leader in knitting needles and crochet hooks, and Novel Ideas, Inc., another maker of do-it-yourself sewing materials. In April 1972 Newell went public as an over-the-counter stock and that same year initiated an acquisition strategy that would later be replayed in various forms. Newell made an offer to buy EZ Paintr Corporation, a paint and sundries company in which Newell already had a 25 percent stake, and EZ Paintr in turn filed a pair of lawsuits to fight back against a possible takeover. But in February 1973 Newell gained majority control of EZ Paintr after its president and cofounder agreed to sell his family's interest in the paint supply company, a move opposed by EZ Paintr's management. By March 1973 Newell had ousted the EZ Paintr board and Daniel Ferguson had become president of the company, which yielded complete control of its stock to Newell six months later. In 1974 Newell completed another drawn-out acquisition and purchased complete control of Mirra-Cote. In 1975 Leonard Ferguson died and a descendant of Ben Cuthbert, William R. Cuthbert, was later named chairman. Between 1976 and 1978 Newell expanded its shelving, paint, and sundries offerings and acquired Royal Oak Industries, Inc., Baker Brush Company, and Dixon Red Devil Ltd. (later renamed Dixon Applicators). During the same period the company sold some of its knitting products businesses, including Novel Ideas. In May 1978 Newell acquired 24 percent of the financially troubled BernzOmatic Corporation, a manufacturer of propane torches and other do-it-yourself hand tools. In February 1979 Newell gained operational control over BernzOmatic after its president, who had earlier sold convertible debentures to Newell, yielded his position to Ferguson and Newell had taken control of the smaller firm's board. In June 1979, after coming off of its first $100 million sales year, Newell began trading on the New York Stock Exchange. About the same time Newell began targeting a new customer base--the emerging mass merchandisers such as Kmart--in order to piggyback on the increasing popularity of such stores. Newell entered the 1980s riding on the growth of mass merchandisers while continuing to expand and complement its product line through acquisitions. Between 1980 and 1981 Newell acquired the drapery hardware division of The Stanley Works and Brearley Co., a manufacturer of bathroom scales. In April 1982 Newell acquired complete control of BernzOmatic and in December of that year entered into a $60 million financing and stock purchase agreement with Western Savings & Loan Association, with the S&L paying $18.4 million for a 20 percent stake in Newell, which it gradually sold off to private investors during the next five years. Through two separate stock deals worth more than $42 million, in 1983 Newell acquired Mirro Corporation, a maker of aluminum cookware and baking dishes. In May 1984 Newell increased its number of common stock shares from 14 million to 50 million and later that year through a stock swap acquired Foley-ASC, Inc., a maker of cookware and kitchen accessories. In May 1985 the company changed its name to Newell Co. In June 1985 Newell acquired a 20 percent stake in William E. Wright Company from a group dissenting from the majority, including three board members and the grandson of Wright Company's founder. A few months later Newell raised its stake in Wright, a maker of sewing notions, and by the end of the year Newell had obtained majority control of the company and ousted Wright's board and top officers. In January 1986 William P. Sovey, former president of conglomerate AMF Inc., was named president and chief operating officer. Ferguson remained chief executive and was named to the new position of vice-chairman. In October 1986 Newell acquired the assets of Enterprise Aluminum, the aluminum cookware division of Lancaster Colony Corporation. By 1987 Newell had acquired complete control of Wright, which was added to a list of about 30 acquisitions the company had logged since Ferguson had become president. In July 1987 Newell--true to its acquisition formula--paid $330 million to acquire control of Anchor Hocking Corporation and its targeted glassware operations. At the time of the acquisition Anchor, with $758 million in sales, had nearly double the annual revenues of Newell and provided its new parent with brand-name tabletop glassware, decorative cabinet hardware, and microwave cookware, with each product line holding a number one or two position in its respective market. Within a week after the takeover Newell began employing its usual post-acquisition strategy on a large scale, dismissing 110 Anchor employees and closing its West Virginia plant. Through this strategy, which became known as "Newellization," Newell aimed to boost the profitability of acquired companies by improving customer service and partnerships, reducing overhead costs by centralizing administrative functions, abandoning underperforming product lines, and reducing inventory. Acquired companies continued to be "Newellized" into the early 21st century. Between 1988 and 1989 Newell acquired several small companies that made bakeware, paint sundries, metal closures, cabinet hardware, and aluminum cookware, and sold its Carr-Lowrey specialty glass container business and its William E. Wright/Boye Needle home-sewing business. In 1989 Newell unsuccessfully tried to buy a 20-plus percent investment in Vermont American, a maker of consumer and industrial tools that turned to another suitor after suggesting Newell would be a disruptive force in its operations. Newell closed its books on the 1980s having achieved a number of significant financial accomplishments. Between 1987 and 1989 the company's income rose more than $48 million, while during the course of the entire decade sales spiraled from $138 million to $1.12 billion as income ballooned from $7.8 million to $85.3 million. Newell also was listed number 22 on the Forbes list of the best stocks of the 1980s, having provided a total return to stockholders that averaged 39.5 percent per year. Newell entered the 1990s as a market leader in electronic data interchange, a computer-to-computer system that allowed Newell customers to place orders electronically. Attempting to once again piggyback on a growing mass merchandiser market--namely the trend to sell office supplies through mass retailers--in 1991 Newell entered the office products business by acquiring two small firms, Keene Manufacturing, Inc., and W.T. Rogers Company. In 1991 Newell also increased its interests in hardware firms and agreed to invest $150 million in the Black & Decker Corporation in a stock deal giving Newell a 15 percent stake in the hardware company. (The following year Newell backed away from a move to purchase a 15 percent interest in another hardware manufacturer, Stanley Works, which had filed an antitrust suit against Newell.) In 1991 Newell also acquired a 6 percent stake in the Ekco Group Inc., a maker of houseware products, kitchen tools, and bakeware, which was later sold. In 1992 Newell became a major force in the office products market. It acquired both Sanford Corporation, a leading producer of felt-tipped pens, plastic desk accessories, storage boxes, and other office and school supplies, and Stuart Hall Company, Inc., a well-known stationery and school supply business, in two stock swaps totaling more than $600 million. The two businesses combined brought Newell's annual office products sales to $350 million. The year 1992 also saw Newell--in what some perceived as a return to its roots--acquire Intercraft Industries, Inc., the largest supplier of picture frames in the United States. That year Newell sold its closures business for $210 million, and the company's books for the year reflected a record $119 million in earnings on a record $1.45 billion in sales. In a 1992 changing-of-the-guard, Daniel Ferguson bowed out of active management to move up to chairman, replacing the retiring William Cuthbert, and Thomas A. Ferguson (no relation to Daniel and Leonard Ferguson) was named president. Sovey was named to succeed Daniel Ferguson as vice-chairman and chief executive. Although the company had another Ferguson in line to run Newell, by 1992 stock dilution had reduced insider control of the company to 15 percent. Nevertheless, four members of the 11-person board were members of the Ferguson, Cuthbert, or Newell families. Having already completed more than 50 acquisitions from the late 1960s through 1992, Newell completed a dizzying series of deals from 1993 through 1998. The company spent about $1.9 billion on acquisitions during this period, completing 18 major acquisitions that added about $2.6 billion in annual revenues to Newell's coffers. Three key deals were consummated in 1993. In April, Sunnyvale, California-based Levolor Corp. was acquired for $72.5 million, giving Newell a leading maker of window blinds that had 1992 sales of $180 million. Then in September Newell bought Lee/Rowan Co., based in St. Louis, Missouri, for $73.5 million, gaining a leading manufacturer of wire storage and organization products with $100 million in 1992 revenues; Lee/Rowan fit in quite well alongside Newell's Dorfile hardware and shelving brand. Two months later Newell spent $147.1 million for Goody Products Inc., which was based in Kearny, New Jersey. With sales in 1992 of about $218 million, Goody produced hair care accessories, such as brushes, barrettes, and ponytail holders, as well as Ace combs; Goody also produced OptiRay sunglasses, but Newell sold that business to Benson Eyecare Corporation in January 1994. Rounding out its window treatments portfolio, Newell in August 1994 acquired Home Fashions Inc., based in Westminster, California. Achieving revenues of $140 million in 1993, Home Fashions produced window coverings, including vertical blinds and pleated shades, under the Del Mar and LouverDrape brand names. In a similar move, the office products operations were bolstered through the October 1994 purchase of Faber-Castell Corporation, which specialized in pencils and rolling-ball pens under the Eberhard Faber and Uni-Ball names. One month later, Newell spent $86 million to acquire Corning Incorporated's European consumer products business, which had 1993 revenues of $130 million. This deal included manufacturing facilities in England, France, and Germany; the trademark rights and product lines for Corning's Pyrex, Pyroflam, and Visions cookware brands in Europe, the Middle East, and Africa; and Corning's consumer distribution network in these areas. Newell also became the distributor of Corning's U.S.-made cookware and dinnerware products, including the Revere Ware and Corelle brands, in these same regions. This acquisition gave Newell its first major overseas foothold. Newell gained a virtual stranglehold on the picture frame market with the acquisitions of Decorel Incorporated in October 1995 and Holson Burnes Group, Inc. in January 1996. Decorel, which had sales of more than $100 million in 1994, was the third largest U.S. maker of picture frames but also gave Newell entry into the framed-art business. North Smithfield, Rhode Island-based Holson Burnes was acquired for $33.5 million and was the number two frame supplier in the country, behind Newell itself. Its brands included Burnes of Boston photo frames, sold mainly to department stores and specialty stores, and Holson photo albums, which were distributed through mass merchandisers and discounters. Revenues in 1994 for Holson Burnes totaled $130 million. Newell also gained a stronger position in writing instruments by purchasing Berol Corporation in November 1995. Among Berol's products were graphite and coloring pencils, and its 1994 sales exceeded $200 million. Concluding its heaviest one-year spending spree yet, Newell spent $563.5 million to complete four major deals during 1997. Office products were the subject of two of the acquisitions, the March purchase of the Rolodex brand from Insilco Corporation and the June buyout of the office products business of Rubbermaid. Under the Rolodex brand, which generated about $68 million in 1996 revenues, were such products as card files, personal organizers, and paper punches. With 1996 sales of $162 million, the Rubbermaid unit produced desk and computer accessories, chairmats, resin-based office furniture, and storage and organization products under the Eldon and MicroComputer Accessories brands. In May 1997 Newell bought the Kirsch brand from Cooper Industries, Inc., thereby gaining the leading producer of decorative window hardware in the country, with annual sales in excess of $250 million. Then in August 1997 Newell acquired two subsidiaries of American Greetings Corporation: Acme Frame Products, Inc., producer of picture frames, and Wilhold Inc., maker of hair care accessory products. At the end of 1997 Sovey retired from active management, and he became Newell's chairman, replacing Daniel Ferguson. Taking over Sovey's former position of vice-chairman and CEO was John J. McDonough, who had been a senior vice-president of finance at Newell in the early 1980s and had served on the board of directors since 1992. Continuing as president and COO was Thomas Ferguson. With the exception of the May acquisition of gourmet cookware maker Calphalon Corporation, all of the major 1998 acquisitions served to strengthen Newell's position outside the United States. In March Newell acquired Swish Track & Pole from Newmond plc. With 1997 sales of $65 million, Swish was a producer and marketer of decorative and functional window furnishings in the United Kingdom, France, Belgium, and Italy. Another European window treatment maker was brought onboard in August through the purchase of the Gardinia Group, which was based in Isny, Germany, and had 1997 revenues of $160 million. Newell acquired a Brazilian maker of aluminum cookware, Panex S.A. Industria e Comercio, in June. In September the company purchased another German firm, Hamburg-based Rotring Group, which had 1997 sales of $280 million. Rotring produced writing instruments, drawing instruments, and art materials under the Rotring, Koh-I-Noor, Grumbacher, and Accent brands; it also owned a subsidiary called Cosmolab Inc. that specialized in color cosmetic pencils. Newell spent $413.3 million on its 1998 acquisitions; the company also sold off its Stuart Hall business and the plastics division of Anchor Hocking that year. The steady stream of acquisitions paid off for Newell in the form of record earnings of $396.2 million and record revenues of $3.72 billion for 1998. The earnings figure was more than four and a half times the level of 1989, while sales had more than tripled during the same period. For the ten-year period ending in 1998, Newell's compound annual growth rates for sales and earnings per share were 13 percent and 16 percent, respectively. Starting with the 1994 purchase of the European consumer products unit of Corning, Newell had made a concerted overseas push; as a result, sales outside the United States increased from 8 percent of total sales in 1992 to 22 percent in 1998. It was from this position of strength that Newell announced in October 1998 by far its largest acquisition ever: the $6 billion purchase of Rubbermaid that would be consummated in March 1999. The Wooster Rubber Company got its start in May 1920, when nine Wooster, Ohio, investors pooled $26,800 to form a company to manufacture toy balloons, sold under the Sunshine brand name. Wooster Rubber, contained in one building in Wooster (a small town about 50 miles south of Cleveland), was sold to Horatio B. Ebert and Errett M. Grable, two Aluminum Company of America executives, in 1927. Grable and Ebert retained the firm's management. By the late 1920s, a new factory and office building had been constructed to house the prosperous business, but the fortunes of Wooster Rubber fell during the Great Depression. In 1934 Ebert spotted Rubbermaid products in a New England department store, and worked out a merger between the two firms. Rubbermaid got its start in 1933, when a New England man named James R. Caldwell, who had first entered the rubber business as an employee of the Seamless Rubber Company in New Haven, Connecticut, looked around his kitchen during the depths of the Great Depression to see what he could improve. Caldwell and his wife conceived 29 products, among them a red rubber dustpan. Although the rubber dustpan, designed and manufactured by Caldwell and his wife, cost $1.00--much more than the 39-cent metal pans then available in stores--Caldwell "rang ten doorbells and sold nine dustpans," as he recalled in an interview published in the New York Times on May 19, 1974. Convinced there was a market for his products, Caldwell gave his enterprise a name--Rubbermaid--and expanded his line to include a soap dish, a sink plug, and a drainboard mat, selling these products in department stores throughout New England. In July 1934 Caldwell's fledgling enterprise merged with Wooster Rubber. Still called The Wooster Rubber Company, the new group began to produce rubber household goods under the Rubbermaid brand name. With the merger, under Caldwell's leadership, Wooster Rubber had a happy reversal in fortunes, and sales rose from $80,000 in 1935 to $450,000 in 1941. Of the 29 new products Caldwell and his wife had thought up in their kitchen in 1933, the company had marketed 27 of them by 1941. In 1942, however, U.S. involvement in World War II caused the government to cut back civilian use of rubber, so that raw materials would be available for products necessary to the war effort. This eliminated Rubbermaid's housewares business, but the company was able to convert to military manufacturing. Beginning with rubber parts for a self-sealing fuel tank for warplanes, and moving on to other products such as life jackets and rubber tourniquets, the company manufactured military goods through the end of the war, in 1945. In 1944 Wooster Rubber introduced an employee profit-sharing plan. Following the advent of peace, Wooster Rubber picked up its prewar activities where it had left off, and resumed production of rubber housewares. Because wartime shortages had not yet been completely redressed, however, no coloring agents were available, and all Rubbermaid products were manufactured in black for several months. In 1947 the company introduced a line of rubber automotive accessories, including rubber floormats and cupholders. The company's first international operations commenced in 1950, when Wooster Rubber began producing vinyl-coated wire goods at a plant in Ontario, Canada. By 1956 the plant was producing a complete line of Rubbermaid products. In 1955 Wooster Rubber went public, offering stock on the over-the-counter market. This capital infusion allowed the company to branch into plastic products, and in 1956 a plastic dishpan was introduced. This switch required significant retooling from the manufacture of exclusively rubber goods. In 1957 Wooster Rubber changed its name to Rubbermaid Incorporated to increase its association with its well-known brand name. The following year, the company began its first expansion beyond its traditional focus on household goods by broadening its targeted market to include restaurants, hotels, and other institutions. Rubbermaid initially produced bathtub mats and doormats for these customers. By 1974 industrial and commercial products provided 25 percent of the company's sales. After James Caldwell's retirement and a one-year stint as president by Forrest B. Shaw, the company presidency was taken over by Donald E. Noble in 1959. Noble had joined Wooster Rubber as a "temporary" associate in 1941. Also during 1959, Rubbermaid stock was sold for the first time on the New York Stock Exchange. The following year, Rubbermaid's management set a goal of doubling the company's earnings every six years, a goal that was consistently met throughout Noble's tenure. Noble also placed a heavy emphasis on new product development, evidenced by the objective he set in 1968 that aimed to have 30 percent of total annual sales come from products introduced over the preceding five years. In 1965 Rubbermaid made its first move outside North America, purchasing Dupol, a West German manufacturer of plastic housewares, whose products and operations were similar to Rubbermaid's U.S. operations. "Our plan is to grow from within except when an acquisition can lead us into a market we already have an interest in," Noble told the Wall Street Journal on August 2, 1965, explaining the company's growth policy during this period. In 1969 Rubbermaid added the sales party to its traditional marketing efforts, a sales technique first popularized by Tupperware. The party division had its own line of slightly more elaborate merchandise, accounting for around 10 percent of Rubbermaid's sales within five years. Nevertheless, the party plan was not profitable until 1976. In the early 1970s Rubbermaid marketed a line of recreational goods such as motorboats and snow sleds, but the company lacked the necessary distribution to support the products and abandoned the effort. "We bombed," the company's vice-president of marketing told a Wall Street Journal reporter on June 9, 1982. Rubbermaid continued to grow in the early 1970s, but the combination of government controls on prices and the shortage of petrochemical raw materials caused by the energy crisis of the early 1970s kept a lid on earnings. In 1971 Rubbermaid began to market its products through direct supermarket retail distribution. Although initially profitable, this practice resulted in the company running afoul of the Federal Trade Commission (FTC) in 1973. The FTC challenged the company's pricing policies in connection with its role as distributor, charging Rubbermaid with illegal price-fixing and violations of antitrust laws. The complaint alleged that Rubbermaid engaged in price-fixing between wholesalers because it sold its products directly to some retailers--acting as its own wholesaler--and also allowed other wholesalers to sell its products, while stipulating the price for the products. Rubbermaid discontinued its minimum price agreements with wholesalers and retailers in 1975, citing pending legislation and negative public opinion. In 1976 the FTC ruled unanimously that Rubbermaid had violated antitrust laws and issued a cease-and-desist order to prevent the company from renewing these practices. As part of its continued growth, Rubbermaid opened a new plant in La Grange, Georgia, in 1974, to relieve demand on its main Ohio plant and to supply the automotive products division. Despite rising earnings since 1968, a sharp increase in the price of raw materials, combined with a change in accounting practices, caused a large drop in Rubbermaid profits in 1974. By this time, Rubbermaid was selling 240 different items, of which about one-tenth were products introduced that year. The company continued to place strong emphasis on innovation and the introduction of new products, generated by a research-and-development staff of designers, engineers, and craftsmen. This staff built prototypes to be used and critiqued by thousands of consumers, resulting in an eight-month process from drawing board to store. The company experienced labor unrest in 1976, when 1,100 members of the United Rubber Workers called a strike at Rubbermaid's only unionized plant, in Wooster, Ohio, after rejecting a proposed contract. Although the strike eventually was settled amicably, traditionally the company had sought to minimize union activity by building plants outside union strongholds, in places such as Arizona, where it began construction of a plant near Phoenix in 1987 to serve its western markets. In 1985 the company successfully negotiated a contract with its Ohio workers, providing a three-year wage freeze in return for guarantees against massive layoffs. Noble retired in 1980, and Stanley C. Gault took over as chairman. Gault, a former General Electric Company (GE) executive and a son of one of Wooster Rubber's founders, had grown up in Wooster and worked his way through college in a Rubbermaid plant. Despite the company's record of steady growth throughout the 1970s, caused in part by Rubbermaid's expansion from old-line department stores into discount and grocery stores, Gault felt that the company had become somewhat stodgy and complacent. In 1980 he set out to quadruple its sales (about $350 million in 1981) and earnings (about $25.6 million in 1982) by 1990. Anticipating a recession, Gault streamlined operations and introduced bold new products, such as the "Fun Functional" line of brightly colored containers. Gault's stress on growth through the introduction of new products was exemplified by his continuance of the company's campaign to reap 30 percent of each year's sales from products introduced during the last five years. By 1983 Gault had eliminated four of Rubbermaid's eight divisions: the unstable party-plan business and the automotive division were each sold at a loss, and the European industrial operations centered in The Netherlands and the manufacture of containers for large-scale garbage hauling also were eliminated. The remaining divisions were combined into two areas: home products (accounting for about 70 percent of the company's sales) and commercial products. The home products division was further restructured into seven product groups: bathware, food preparation and "gadgets," containers, organizers, sinkware, shelf coverings, and bird feeders and home horticulture. Rubbermaid continued to advertise heavily in both magazines and on television, emphasizing consumer promotions to get customers into the store and offering rebates and coupons for its products for the first time. In tandem with the product reorganization, about half of Rubbermaid's middle management was eliminated, and 11 percent of the company's management was fired. Many top spots were filled by former GE employees. In 1981 Rubbermaid had made its first outright acquisition, buying privately held Carlan, owner of the Con-Tact plastic coverings brand name. In the 1980s Rubbermaid was able to move successfully beyond housewares and institutional customers, entering new industries through the strategic purchase of other companies. The company entered the toy industry in 1984 by buying the Little Tikes Company; went into the booming computer field in 1986, with MicroComputer Accessories; into floor care products with Seco Industries in the same year; and into the brush industry with a Canadian company, Viking Brush, in 1987. Following these and other acquisitions, Rubbermaid created additional divisions to accommodate its new product lines. In 1987 a seasonal products division was formed to produce and sell lawn and garden products, sporting goods, and automotive accessories. A year later the company created an office products division, which included MicroComputer Accessories and--eventually--Eldon Industries, acquired in 1990. Little Tikes became the core of a juvenile products division. The three new divisions gave the company five divisions, with the preexisting home products and commercial products divisions. Rubbermaid formed a joint venture with a French company, Allibert, to manufacture plastic outdoor furniture in North Carolina in 1989. In addition, the company expanded its capacity in plastic and rubber products in 1985 with its purchase of the Gott Corporation, maker of insulated coolers and beverage holders. Rubbermaid formed a second joint venture--with the Curver Group, owned by Dutch chemical maker DSM N.V.--in 1990 to make and sell housewares and resin furniture in European, Middle Eastern, and north African markets through Curver-Rubbermaid. This diversification resulted in continued growth throughout the 1980s, despite the rising price of petrochemical resins, the raw materials for plastics. Rubbermaid ended the 1980s with 1989 sales of $1.45 billion. Throughout the early and mid-1990s Rubbermaid continued to pump out new products at an amazing rate--about 400 annually--which along with several major acquisitions pushed sales higher every year. Net earnings grew as well, until a major restructuring in 1995-97 cut company profits. Management changes marked the early years of this period as Gault retired in 1991 and was succeeded by Walter W. Williams, who soon retired at the end of 1992. After a brief transition period during which Gault was brought back to the company, Wolfgang R. Schmitt, who had joined Rubbermaid in 1966 as a product manager, became chairman in 1993 after having attained the CEO spot the previous year and having served as cochairman with Gault during the transition period. In 1992 the company acquired Iron Mountain Forge Corporation, an American maker of commercial playground systems. Two years later Ausplay, the leader in commercial play structures in Australia, was purchased. Both Iron Mountain and Ausplay became part of the juvenile products division. Also brought into the Rubbermaid fold in 1994 were Empire Brushes, a leading U.S. maker of brooms, mops, and brushes; and Carex Inc., which made products for the burgeoning home healthcare market. Carex was placed in the company's commercial products division. As of 1993, Rubbermaid generated only 11 percent of its sales outside the United States, and almost all of that went to Canada. Schmitt aimed to increase nondomestic sales to 25 percent by 2000 (later, this goal was boosted to 30 percent) and began to seek out acquisition and joint venture opportunities to help reach this goal. In 1994 the company entered into a joint venture with Richell Corporation, a leader of housewares in Japan, to form Rubbermaid Japan Inc. After abandoning its stake in Curver-Rubbermaid, a partnership that ended up being noncompatible, Rubbermaid reentered the European housewares market in 1995 when it bought Injectaplastic S.A., a French plastics manufacturer of such items as home and food storage products, camping articles, bathroom accessories, and garden products. Also in 1995 the company bought 75 percent of Dom-Plast S.A., the leading maker of plastic household products in Poland. By 1996 foreign sales were up to 16 percent of overall sales, a rate of increase that, if continued, would mean the company would fall well short of its 30 percent goal. Nevertheless, in early 1997 Rubbermaid announced that it had entered into a strategic alliance with Amway Corporation to develop and market in Japan a line of cobranded premium Rubbermaid products. In addition to slow overseas growth, a number of other factors forced Rubbermaid to embark in the mid-1990s on its first major restructuring. In the spring of 1994 the prices of resins, used in nearly all of the company's products, began to rise and eventually doubled, increasing manufacturing costs. Rubbermaid also faced increasing competition in the 1990s as other housewares makers improved their products but kept their prices lower than Rubbermaid's premium prices, leading to customer defections and retailer dissatisfaction with the company's pricing policies. In response to these difficulties, Rubbermaid began a two-year restructuring effort in late 1995. A charge of $158 million was taken in 1995 to cover such cost-cutting moves as closing nine factories and eliminating 1,170 jobs (the charge was the company's first ever). An earlier effort to achieve $335 million in productivity savings reached fruition in 1996. That year also saw Rubbermaid streamline its product lines, by eliminating 45 percent of its stock-keeping units (SKUs), which when combined generated only 10 percent of overall sales. The company also added a new infant product division to its organizational chart with its 1996 acquisition of Graco Children's Products Inc., maker of strollers, play yards, and infant swings, for $320 million. But Rubbermaid also divested its office products division by selling it to Newell for $246.5 million in May 1997. At the same time the company merged its seasonal products division into its home products division, combining these operations because they had similar distribution channels. As a result of these moves, Rubbermaid was left with four divisions: home products, commercial products, juvenile products, and infant products. The company significantly increased its overseas sales in January 1998 when it acquired its onetime partner, the Curver Group, for $143 million. Curver was the leading maker of plastic housewares in Europe, with 1996 sales of about $222 million. Meantime, despite the major restructuring launched in late 1995, Rubbermaid was still struggling. As a result, yet another restructuring was announced in January 1998. The company aimed to achieve $200 million in annual cost savings by shutting down inefficient plants, shifting production to lower-cost locations, centralizing purchasing, and cutting the workforce. By the fall of 1998 Rubbermaid also had divested three of its businesses, including its decorative coverings unit, which included the Con-Tact brand, and had launched the largest consumer advertising campaign in company history. Rubbermaid also completed one more acquisition in 1998--its last as an independent company--purchasing Century Products Company from Wingate Partners for $77.5 million. Fitting in nicely alongside the Graco line, Century produced car seats, strollers, and infant carriers. For the year, Rubbermaid achieved revenues of $2.55 billion, a slight increase over the preceding year, while net income declined 42 percent, standing at $82.9 million. Millennial Formation of Newell Rubbermaid Inc. Newell and Rubbermaid had discussed a merger in mid-1997, but the talks broke down when the two sides could not agree on who would run the company and where it would be headquartered. By late 1998, however, Rubbermaid's position had deteriorated to the point where it gave in on these points and agreed to be bought by Newell for $6 billion in stock. To the credit of the Rubbermaid managers, the price represented a hefty 49 percent premium over the company's stock price. John McDonough, Newell's vice-chairman and CEO, continued in these same positions for the newly named Newell Rubbermaid Inc. Upon completion of the deal in March 1999, Rubbermaid Chairman and CEO Schmitt became vice-chairman of the company, and William Sovey remained chairman. McDonough was hoping that the usual Newellization process could revitalize Rubbermaid, and he also anticipated that Rubbermaid's renowned ability to develop new products might be spread to the Newell product lines. One of the biggest challenges for McDonough was in improving Rubbermaid's abysmal customer service and its troubled distribution system. Restructuring costs totaled $241.6 million in 1999, dragging profits down to $95.4 million; revenues for the first year of the new Newell Rubbermaid amounted to $6.41 billion. While the Rubbermaid operations were being overhauled--a process that proved more difficult than anticipated--Newell Rubbermaid continued making acquisitions, with a particular emphasis on Europe. In April 1999 the company bought Ateliers 28, a French maker of drapery hardware. In October of that same year the company acquired Reynolds S.A., a manufacturer of writing instruments based in Valence, France. That same month, Newell Rubbermaid purchased McKechnie plc's consumer products division, which included Harrison Drape (maker of drapery hardware and window furnishings), Spur Shelving (shelving and storage products), Douglas Kane (cabinet hardware), and Nenplas/Homelux (functional trims). From December 1999 through May 2000, Newell Rubbermaid completed the acquisitions of three European picture frame businesses: Ceanothe Holding, based in France; Mersch, which operated in both Germany and France; and France-based Brio. The largest acquisition during this period, however, was of a U.S. business: the stationery products division of Gillette Company, acquired in December 2000. Newell Rubbermaid gained a rich stable of brands, including Paper Mate, Parker, and Waterman writing instruments and Liquid Paper correction products. The Gillette division had posted revenues of $743 million in 1999. The painful integration of Rubbermaid into the company led to inconsistent earnings and a slumping stock price. Late in 2000 the stock fell to its lowest level since 1994. Soon after, at the beginning of November 2000, McDonough resigned from the company. Sovey, his predecessor, temporarily took the reins as CEO, before Joseph Galli, Jr., was brought onboard as president and CEO in January 2001, with Sovey returning to the chairman's post. Galli had previously spent 19 years at Black & Decker, where he rose to the number two position before leaving in 1999. He then had short stints with "New Economy" firms amazon.com, Inc. and VerticalNet Inc. before accepting the Newell Rubbermaid post. Galli launched a thorough restructuring in a turnaround attempt. In May 2001 the company announced that it would eliminate 3,000 positions from its workforce over a three-year period, a reduction of 6 percent. The plan also involved the consolidation of manufacturing facilities as the company aimed to cut operating costs by $100 million per year. During 2001 alone, 14 facilities were shuttered. The company also sought to shift some manufacturing to lower-cost locations in Mexico, China, Poland, and Hungary. Galli also overhauled senior management, bringing in a slew of outside executives, including 15 from Black & Decker. To solidify the company's position with its major customers, Newell Rubbermaid established the Key Account Program, whereby separate sales organizations were created for three of the largest customers, Wal-Mart, The Home Depot, Inc., and Lowe's Companies, Inc. Cost savings from the restructuring were to be plowed back into new product development and marketing initiatives. The latter included the first television advertising campaign for the Rubbermaid brand in three years and a $20 million sports marketing campaign involving the sponsorship of Nascar drivers and races. Another key objective was to pare back the company's heavy debt load, which had been incurred during its 1990s acquisition spree. One method to do this was to divest underperforming operations. In June 2001 Newell Rubbermaid announced that it would sell its Anchor Hocking glassware division to Libbey Inc. for $332 million. The deal was blocked, however, on antitrust grounds. As he attempted to turn around Newell Rubbermaid, Galli stayed away from acquisitions, and no major deals were completed in 2001. In April 2002, however, the company took full control of American Tool Companies, Inc., a Hoffman Estates, Illinois, firm in which Newell Rubbermaid had already held a 49.5 percent stake. The deal was valued at $419 million and brought into the company fold a line of branded hand tools, including Vise-Grip pliers and Quik-Grip clamps, and a line of power tool accessories, such as Irwin wood-boring bits and Hanson drill bits. For Galli, the addition of American Tool was a return to his Black & Decker power tool roots. The American Tool brands, which generated $444 million in sales in 2001, were placed within Newell Rubbermaid's Levolor/Hardware group. The acquisition of American Tool perhaps signaled a return to the Newell tradition of growth through acquisition, and the optimistic Galli told Forbes in October 2001 that he was aiming to grow the company into a $50-billion-in-sales behemoth. Nevertheless, Newell Rubbermaid's restructuring efforts had not yet been completed, and sales and profits were being hampered by the difficult economic environment of the early 21st century. Perhaps the most compelling reason for optimism was that, through the renewed focus on product development, more new products were introduced during 2002 than had debuted in the three previous years combined. Principal Subsidiaries: Berol Corporation; Newell Investments, Inc.; Newell Operating Company; Rubbermaid Incorporated; Rubbermaid Texas Limited; Sanford Investment Company; Sanford, L.P. Principal Operating Units: Rubbermaid; Sharpie; Levolor/Hardware; Calphalon Home. Principal Competitors: Sterlite Corporation; Tupperware Corporation; Avery Dennison Corporation; Société BIC; Hunter Douglas N.V.; Springs Industries, Inc.; Lancaster Colony Corporation; The Coleman Company, Inc.; Dorel Industries Inc.; Mattel, Inc.; Hasbro, Inc.; WKI Holding Company, Inc.; The Stanley Works; The Black & Decker Corporation; Cooper Industries, Ltd.; Myers Industries, Inc.; Libbey Inc. 1902: Ogdensburg, New York-based W.F. Linton Company is incorporated to make brass curtain rods. 1903: Linton goes bankrupt; Edgar A. Newell takes control of the firm, renaming it Newell Manufacturing Company, Inc. c. 1910: Newell forms an affiliated company in Prescott, Canada, called Newell Manufacturing Company Ltd. 1920: The Wooster Rubber Company is formed in Wooster, Ohio, to make toy balloons. 1921: Another Newell-affiliated company, Western Newell Manufacturing Company, is formed to run a curtain rod factory in Freeport, Illinois. 1933: James R. Caldwell forms an enterprise called Rubbermaid, whose first product is a red rubber dustpan. 1934: Wooster Rubber and Rubbermaid merge, retaining the former's corporate name and headquarters and the latter's brand name. 1955: Wooster Rubber goes public. 1956: Wooster branches into plastic products, introducing a plastic dishpan. 1957: Wooster Rubber changes its name to Rubbermaid Incorporated. 1966: The Newell companies are consolidated into Newell Manufacturing Company, which is based in Freeport. 1970: Newell Manufacturing is reincorporated in Delaware as Newell Companies, Inc. 1983: Cookware maker Mirro Corporation is acquired by Newell. 1984: Rubbermaid acquires the Little Tikes Company, maker of plastic toys. 1985: Newell Companies is renamed Newell Co. 1986: Rubbermaid acquires MicroComputer Accessories. 1987: Glassware maker Anchor Hocking Corporation is acquired by Newell. 1993: Newell acquires Levolor Corp., Lee/Rowan Co., and Goody Products Inc. 1994: Newell acquires Home Fashions Inc., Faber-Castell Corporation, and Corning Incorporated's European consumer products operation. 1996: Rubbermaid acquires Graco Children's Products Inc. 1997: Newell acquires the Kirsch decorative window hardware brand and Rubbermaid's office products unit. 1998: Newell acquires Calphalon Corporation and two German firms: the Gardinia Group and Rotring Group; Rubbermaid acquires the Curver Group and Century Products Company. 1999: Newell acquires Rubbermaid for $6 billion; Newell changes its name to Newell Rubbermaid Inc. 2000: Newell Rubbermaid acquires the stationery products division of Gillette Company, gaining the Paper Mate, Parker, Waterman, and Liquid Paper brands. 2001: Joseph Galli, Jr., comes onboard as president and CEO and launches a thorough restructuring. 2002: The company acquires American Tool Companies, Inc., maker of hand tools and power tool accessories. Aeppel, Timothy, "Rubbermaid Is on a Tear, Sweeping Away the Cobwebs," Wall Street Journal, September 8, 1998, p. B4. ------, "Rubbermaid Plans New Restructuring, Predicts Charges of at Least $200 Million," Wall Street Journal, January 22, 1998, p. B6. Benmour, Eric, "Vermont American Suitor Proves Tenacious," Business First-Louisville, August 28, 1989, Sec. 1, p. 1. Borden, Jeff, "Newell Makes Its Move," Crain's Chicago Business, November 25, 1991, p. 46. Braham, James, "The Billion-Dollar Dustpan," Industry Week, August 1, 1988, p. 46. Byrne, Harlan S., "Newell Co.," Barron's, April 12, 1993, p. 52. Cahill, Joseph B., and Timothy Aeppel, "Newell Faces a Big Challenge in Rubbermaid Takeover," Wall Street Journal, November 3, 1998, p. B4. Campanella, Frank W., "Wide and Growing Line Spurs Rubbermaid Gains," Barron's, October 3, 1977. Christensen, Jean, "How Rubbermaid Invites Profits," New York Times, May 19, 1974. Cimperman, Jennifer Scott, "Rubbermaid Endures Newellization," Cleveland Plain Dealer, June 29, 2000, p. 1C. Coleman, Calemetta Y., "Newell Builds Success from Diamonds in the Rough," Wall Street Journal, April 14, 1995, p. B4. Conley, Thomas P., "The NHMA Report: Electronic Partnerships Provide Bottom-Line Payoffs," Discount Merchandiser, January 1993, pp. 45-46. Cuthbert, William R., Newell Companies--A Corporate History--The First 40 Years, Freeport, Ill.: Newell Co., 1983. David, Gregory E., "Let Us Prey: Having Swallowed 31 Companies in 25 Years, Ruthless Newell Remains on the Prowl," Financial World, June 21, 1994, pp. 29-30. Defotis, Dimitra, "Household Help: Rubbermaid Stock Cooks with a New CEO," Barron's, February 5, 2001, p. 40. Deutsch, Claudia H., "A Giant Awakens, to Yawns: Is Rubbermaid Reacting Too Late?," New York Times, December 22, 1996, pp. F1, F13. Farnham, Alan, "America's Most Admired Company," Fortune, February 7, 1994, pp. 50-54. Gallun, Alby, "Newell Confronts Its Next Hard Sell," Crain's Chicago Business, June 10, 2002, p. 4. ------, "Newell's Galli Must Cook Up a Turnaround," Crain's Chicago Business, January 15, 2001, p. 4. ------, "Newell's New Colors: Ends Acquisition Binge to Focus on Boosting Existing Brands," Crain's Chicago Business, June 4, 2001, p. 3. Hackney, Holt, "Strategic Alliances," Financial World, October 29, 1991. Hallinan, Joseph T., "Newell CEO Tries to Shake Up Concern with Little Success," Wall Street Journal, January 14, 2002, p. B3. "How Rubbermaid Managed to Fail," Fortune, November 23, 1998, p. 32. Kelly, Kevin, "Newell Isn't Bagging Big Game Anymore," Business Week, July 8, 1991, pp. 83-84. Lipin, Steven, and Timothy Aeppel, "Newell to Buy Rubbermaid for $5.8 Billion," Wall Street Journal, October 21, 1998, p. A3. Magnet, Myron, "Meet the New Revolutionaries," Fortune, February 24, 1992, pp. 94-101. Murphy, H. Lee, "Newell Dresses Up Its Image with a Shade-y Acquisition," Crain's Chicago Business, April 12, 1993, Sec. 1, p. 7. Narisetti, Raju, "Can Rubbermaid Crack Foreign Markets?," Wall Street Journal, June 20, 1996, pp. B1, B4. Neiman, Janet, "New Structure Poured for Rubbermaid Push," Advertising Age, November 9, 1981. Noble, Donald E., Like Only Yesterday: The Memoirs of Donald E. Noble, Wooster, Ohio: Wooster Book Co., 1996. Nulty, Peter, "You Can Go Home Again," Fortune, June 15, 1981, p. 180. O'Connor, Matt, "Simple Secret of Newell's Success: Basic Strategy Pays Off for Consumer Firm," Chicago Tribune, July 27, 1987, Sec. 1, pp. 1, 5. Osterland, Andrew, "Fixing Rubbermaid Is No Snap," Business Week, September 20, 1999, pp. 108, 110. Ozanian, Michael K., and Alexandra Ourusoff, "Never Let Them See You Sweat: Just Because Rubbermaid Is One of the Most Admired Companies in the Country Doesn't Mean Life Is Easy," Financial World, February 1, 1994, pp. 34-35, 38. Pellet, Jennifer, "No Paint, No Gain," Discount Merchandiser, March 1992, pp. 74-75. Pouschine, Tatiana, "The Old-Fashioned Way," Forbes, January 6, 1992, pp. 66-68. Schiller, Zachary, "The Revolving Door at Rubbermaid: Is CEO Schmitt's Tough Style Driving Executives Away?," Business Week, September 18, 1995, p. 80. Scott, Carlee R., "Newell Plans to Acquire Sanford Corp. in Stepped-Up Move into Office Products," Wall Street Journal, November 25, 1991, p. A5. Smith, Lee, "Rubbermaid Goes Thump," Fortune, October 2, 1995, pp. 90-92, 96, 100, 104. Stevens, Tim, "Where the Rubber Meets the Road," Industry Week, March 20, 1995, pp. 14-18. Stouffer, Paul W., "Heading for a Billion: Major Acquisition Bringing Newell Toward a Record Sales Mark," Barron's, August 24, 1987. Taylor, Alex III, "Why the Bounce at Rubbermaid?," Fortune, April 13, 1987, p. 77. Tisch, Carol, and Lisa Vincenti, "Rubbermaid Bounces Back," HFN--The Weekly Newspaper for the Home Furnishing Network, January 17, 2000, p. 90. Upbin, Bruce, "Rebirth of a Sales Man," Forbes, October 1, 2001, pp. 94-96+. White, Joseph B., "Workers' Revenge: Factory Towns Start to Fight Back Angrily When Firms Pull Out," Wall Street Journal, March 8, 1988, pp. 1, 24. Yao, Margaret, "Rubbermaid Reaches for Greater Glamour in World Beyond Dustpans and Drainers," Wall Street Journal, June 9, 1982.
2019-04-20T18:32:58Z
http://gablind.com/News/Newell%20rubbermaid%20Levolor%20history.htm
(613) 627-2400 Someone called me very early today 6136272400, Other Calls. Who called from this phone number? Comments & Reviews. Get at least two calls every day .... I don't answer and they hang up. This is very annoying. Call from them at work. They asked for someone else who does not work for us and when I told them no one here by that name, he started rambling on about the Conservative Party. Then asked for 200.00 donation. I said no. He pushed further and asked for 100.00. Again I said no I am not interested in giving them any kind of support. Then it was just harassment and he kept asking if there was anything I could give them as 'it's my duty as a canadian to support a political party that has Canadian interests in mind'. I call BS. Thanks for the above info! If I have any spare $'s they will go to organizations that are trying to protect environmental conditions being affected by the Conservative undoing of protection laws! Since a week or two, i got maybe 6-7 times a call from this number. REAL PAIN IN THE A**. Can somebody do something about that? Can we stop the s***? Get the heck out of Town. Not INTERESTED!!!! How many times to they have to be told.This is a hint that I received. Don't know if it works or not.......What you can do after answering, if you notice there is no one there, is to immediately start hitting your # BUTTON ON THE PHONE, 6 0R 7 TIMES AS QUICKLY AS POSSIBLE. This confuses the machine that dialed the call, and it kicks your number out of their system. What a shame not to have your name in their system any longer!!!!!Now, If I can remember to do this, I will find out if it works. got to hell PC !!!! leave the poor people on welfare alone too !! Conservative party of Canada.Pain in the a**.I'll donate maybe to a party when there is an election. NOT BEFORE.They are P***ing me off like the natives and their blockades. If you understand that possesses (613) 627-2400, please do not hesitate to publish it as well. Just got a call from this number answered it nobody on line & no reply then the line went dead. I called back and it won't disconnect, so now I'm paying long distance charges. Not happy. I had to disconnect my phone to cut the line . SCAM SCAM SCAM. Crazy.!!!!!!!!!!!!!!!!!!!!!!!!!!!!sick of it!!!!!!!!!!!!!!!!!!!!! here's the scam, they are driving people to this site or other sites that have this number, two scams in one. I got the same message, the guy on the phone was calling me a c%^k sucker, and and said he was in India call centre.It was a trip or cruise they said I won the when this guy got on the phone, he said I qualify for holiday.Crazy to think some people are still not aware of scams. Called tonight saying I had won a cruise, press 9, asked him to put me on do not call list, then the sexually explicit comments started, said his name was Brad?? My husband was listening on the other phone, didn't phase this guy. Thank god my kids didnt answer the phone. Something has to be done about these idiots!!! Obviously calling from a call centre you can hear all the phones ringing, nice employee to have, good luck to this losers wife!!!! Hi all,Thanks for the info, just got the call and thought it was a local call from B.C. answered it and realized it was cruise offer (also realized it was advertising hype). Select 9 as instructed to get a live person so that I could asked to be removed from the dialer (I am on the DNCL). The person that answered said "what the F**K did you say" when I asked politely to be removed from the company's dialer. He then suggested a few obscenities that I could perform and he would removed me from the dialer...I hung up. I did call to make a complaint with the DNCL registry BUT I am pretty sure that the guy was calling from abroad - these calls drive me crazy! I just saw this on my call display, never seen it before, didn't pick up and I pay for an unlisted number. Then I did a search. I hate scumbag companies, this is obviously one. Thanks to everyone who posted the information here, to help others keep informed. Thanks! Just received a call that I had won a wonderful Carribean Cruise and when I pressed '9' to claim I asked 'Shane" if he would please remove my number from their list and he said that they don't have a list. Telemarketers should be charged for invasion of privacy. And so it goes on. I think I get more of these calls now than I did before I registered on the DNCL. With call display at least I can see the number and not answer ......much better than DNCL !!! I got a call from this number about 20 minutes ago and of course no message left. So I guess they are still at it. I'm sure there will be a few more before they finally quit. GRRRRRRRR !!!!! I just received the same message saying I won an all inclusive trip to the Caribbean 9 to claim my prize. Who would fall for such nonsense. I just got one and the recording said I won an all expenses paid Carribean cruise and to push 9 to claim it. I did not and just waited and the line went dead. several calls from this number; do not pick up anymore...made the mistake once, rude! Obviously they don't think the DNCL applies to them! To clarify, Canadian companies also aren't allowed to use American call centres to call back to Canada. So just because they're calling from the US doesn't mean they are automatically exempt from the law. Not sure if this applies in this case, but an important distinction in general. DNCL applies ONLY for calls originating in Canada. This call came from the United States. They are not subject to our laws. I didn't recognize the number so I didn't pick it up. No voice message was left.I just renewed my DNCL a few days ago too. Somehow I think that DNCL is a bogus affair anyway as it's made no difference in the 2 times I've placed it. He got right ignorant with me and called me all kinds of names, He said he was from Australia with a reavel company selling packages. Same just happened ... call ... i answer and its dead air ... ANNOYING! Just called me same thing. Grrrrrrrrrr! called when i picked up dead air??? hate these annoying calls! just got call at 9:11 pacific time. I've received calls from PACIFICTEL before and not picked up. This time I waited almost 3 rings and did pick up (the same area code as some relatives so felt obliged this occurrence) - no one there. Thanks so much for this website. I also just received this call. I agree that it's sad that we have to screen all calls. Received a cell phone call from this number a few minutes ago. Didn't recognize so I hit "ignore" per carrier. Glad I did. Interesting to see so many people posting this morning. My call came in at 9:53 a.m. C. Must have been a "harvesting day" for the phishers. My rule of thumb is not to answer any non-ID'd call. Ppl who know me know to leave a msg if I don't answer. Adding that # to my call blocked list now. just got called 9:05 az time. No message. Just got their call, didn't answer, looked them up and it's a robot call to see when you answer your phone and to see if it's a working number.We disconnected the answering machine last month. When they call it's ring no answer.It eliminated 90% of these calls. Now I get one or two a week.They are invisible to us so we just became invisible them because we don't want to give up the house line. I also got a call today at 9:41 a.m. didn't answer it, caller id showed PACIFICTEL, dont have a clue who this is, didn't leave a message either! I received the call today, 4/28/12 at 9:53am CST. I didn't answer and they left no message. I was about to call back, but decided to check the web to see what the public had to say. This confirms what I thought. Must be a scam or something. thanks. This number called to my cell phone on April 28, 2012 @ 10:13AM; left no message.Never answer any unknown-number call; emergency, official and business calls always leave a message. Got the same call just a few minutes ago but didn't get to answer it. After adding the comments, now im glad I didn't. I got the call about same time as note above. No idea who it is. This is why I don't answer phone anymore. Sad time we live in. Everything is so rude and intrusive. This is another scam call. If you call it back it says that they were trying to reach you to participate in a survey but the survey is closed. Then it invites you to "dial 1" to remove yourself from their list. Frankly, I think is a phishing scam to see if the called number is valid and if a human will answer...most likely so they can sell that info and REALLY make your phone "ring off the wall". My suspicion is that this is tied to either the scam-telemarketing or debt collection industries as both are populated with scum. I answer in a foreign language and the go crazy. I say no English . . . This number calls everyday. I do not pick up numbers I do not recognize. I have an application on my android called Mr. Number. It automatically blocks numbers I do not want to pick up and blocked and private numbers. So now I do not worry. Any person who uses a android phone or better should use this application. You are right! I also noticed that the first complaint was dated back in July 2007 and as we can see nothing has been done about it. I keep getting calls from this phone number too and it's getting out of hand. The guys that call you can barely speak English and if you ask them questions about their company they hang uo on you!! RUDE!!!! There is one thing that concerns me the most about ANY unwanted and unknown number that calls all of us: Who is giving these people our phone numbers? Can it be our own bank? credit card company? cable, phone company? This is kind of scary because: who can we trust? 212-777-3456 Has anyone noticed that the very 1st post about this number, was posted in JULY of 2007!!!!! And NOTHING has been done. I get so sick of hearing "But I"M on the DoNotCall list". You'll hear that again & again & again. So, how's it working? No? Not at all?? That's right, NOT AT ALL!! And that's so incredibly OBVIOUS since this number has been calling people and trying to SCAM them since 2007. That's nearly 4 1/2 YEARS people!! 4 1/2 Y E A R S !!!Some phone companies, like Qwest in Arizona have the ability to BLOCK 25 #'s. It's really easy, you just call into the service and enter the number or just hit for 'Enter last # that called you' and presto, they can't call you anymore.If you call Qwest to Order this, please tell them how glad you are to have this service. As a matter of fact, ask them to increase the ability to Block maybe 250 numbers, not just 25! Which at the rate things are going, we'll need soon.Everyone else, either call your Phone co. and ask them to give you the same Blocking capabilities, or go to a store and pick up one of the many phones out there, that have the ability built right into the handset to Block numbers.Our Cell phones strangely have all sorts of abilities nowadays, but strangely nothing to block numbers. How odd. Something very wrong about that. Got a call from these creeps, I was already ticked, then this sorry excuse for an english speaking human called, mumbling somthing, when I said eithe speak english so I can understand you, or go back to the raock you were born under and NEVER frickin call me back. Click.... I doubt that it sunk in, but it please the heck out of me.... now I am in a great mood. I got a call from this number today and the guy, who had an indian accent, tried to tell me he was from a company called Iris and he had an upgrade for my scanning software for my printer....he hung up on me when he tried to make it sound like it was free, but then wanted to charge me $79 and I told him no. JUST SAY NO! I Get a phone call from the same basterds every hour on the hour they never give up!!! I entered my name in for a goverment grant book and then they called me and asked if I whould pay shipping and handling. I said yeah but then they asked for my credit card number over the phone and every sence I denied them, they have been harrassing me calling me at 2 am in the morning. Guess what no meens no And I have a big boot to shve up your afflack and guess what its so easy even a cave man can do it. good luck to you maybe some one will find out who these people actually are. I got one of these calls tonight... I said hello 3 times and it replied with an automated message "Goodbye." Made no sense what so ever. Was from the same number. Contacting the Attorney General generally does no good. In addition to the phone number, they also want caller name but, of course, this comes in as "Unknown Name." The Do-Not-Call thing has few teeth and I've seen nothing that would indicate that any effort is taken to remedy the problem. Also, expect NOTHING from the phone company. I've complained repeatedly that, for all we know, the caller could be calling to see anyone is at home or, if just my wife or daughter, who might be with them. They don't care and will offer nothing to block the call. I suppose that they have not found a way to charge for it. Or, on the other hand, they could possibly be making good money off of the call originator. When the politicians left political calls out of the do-not-call registry, it left things open for harassment, especially during the election season. It's much the same as their other shenanigans....insider trading, lobby money, special interests, etc. We should never, ever, ever be surprised. Unfortunately in the Commonwealth of Virginia reporting this type of call to the Attorney General's office is a JOKE! Maybe he is too busy running for Governor. The AG's office shunts the call to the Department of Agriculture which is not only clue-less but powerless. If you expect an AG's office to do anything then perhaps you'd like to buy a bridge that is near Brooklyn?There has been a bill in the US Senate for years trying to just get "Truth on your Caller ID" (they'd have to show their real identity) and the Senate is too busy doing nothing to even pass that. We the victims of these intrusions are powerless because our politicians and elected officials don't care. And even posting on a site like these does nothing to stop the problem. Nothing. they called me saying the same thing! When I call the number back its a movie request thing. silly morons! guys, I figured out how to get rid of them...check out fusion phone custom voicemail...I input their numbers and then make obnoxious replies or the disconnected phone message for them when they call. Since it is an autodialer, the three tone SIM signal that noise before you hear "this number has been disconnected, if you think..." They get that message, just the people I put in and after 3 tries, the computer deletes my number from the list. Otherwise, you have to change your number...I tried everything else but this works. Phone numbers like this one are fake. Telling the government does nothing because the phone number has no relation to where the person calling from is located. Actually, calls should be reported to the FTC, not the FCC. Called last night--again this am and when we answer==they hang up. I think it's because we answer with a business name but maybe not!!! We called it back and got a recording that it's MOVIE Phone or something like that with advertising of movies for your family, etc. I believe it is an international scam that sometimes say they have federal grants. When they forget to block the number format it comes up as +2127773456. I believe they got my number from Craigslist trying to pose as the person looking to barter. I got one tonight, called backed and it said "Moviefone", lol... they must have one of those devices that picks up legit numbers to show on caller id. just add the number to your reject list. Next time they call it's rejected and your phone won't even ring. I did that the first two times and the same guy called back the following day, not realizing he was talking to the same guy... so I had fun with it and played him along for quite a while... and finally I asked him how it felt because I wasted so much of his time... then I hung up. I asked them to stop calling me on three calls in a row and they are still calling. How can I make them stop?? They keep trying to sell me smoke detecters on behalf of the town I live in. I reported them to both the fire & police departments. ^ditto.the dude keeps trying to tell me I bought an Orlando Travel package, and asking if I remember the time share presentation I went to. Nope. Not me.But they've got my name right now - originally they called my Chai (it's Shay). Yeah, I've talked to a person 3 times but he keeps hanging up on me when I ask if I can talk to someone else. They wont stop calling me either. 7 times in the last two days and 4 calls today alone. I finally answered the call to see what it was, when they said they were some agency. I interupted them and said "Do not call me" and I haven't gotten a call since. Maybe this will help you out as well. I have also gotten several different unknown callers in the past month or so. I have on that when it comes up shows as 1111. Strange. It needs to quit. I'm getting those stupid, annoying calls as well. Has anyone found out how to stop it??? They call my moms cell and ask for me. Left a reference number and to call someone named Julie. This telephone # 620-665-6111 calls all day long, just leave a message by the name Joyce. I get this number calling me every day. Even at my work, always hang up as soon as I answer. And then call my cell phone and never leave a msg. This guy with the last of Whipple, first name Dave(not sure about this), called our business and inquired about one of our employees. He wanted to fax us something and have our personnel department give him information about one of our employees. When I would not comply with the information he got very rude and condescending. Got a threatening message from some foreign sounding dude, called the police and reported him. The police said answer the phone, dial *57 and hang up. After doing this about three times the calls should stop he said. I hope so!!! I hope it works on my cell. They stopped calling my land line and now are attacking me on my cell phone. I got a call from 620-665-6111 on my cell phone, I answered and it was a recording asking me to please hold. I hung up, I don't know who this company is, I am assuming it is a collection call for Brandon, the person who previously had my cell number, several collectors have called for him. I get call from this number frequently. When you don't answer they call right back 3 more times. Stop calling me ! I got a new tracphone recently and been receiveing phone calls and messages on my Tracphone. When I called the number back they identified themselves as NCA. I spoke to a person named Kay and asked if they could remove my number from their list becasuse I didn't know who they are and have no business with them. She called me Brenda Meyers. I told her I was not Brenda Meyers and for whatever reason I may have received a used telephone # which used to belong to Brenda Meyers.She said that was possible and that she would remove my number from their list by the end of the business day. Will see how that promise goes !!! Get this call all the time, I answer and no one is there, it just disconnects!?!?! I try and call back, and it says call cannot be completed. Seems to be some kind of scam! Calls come in on my cell phone for someone I don't know...then they leave the 866-570-6085 # and a ref# and when you call you get a recording. Is this even legal? Calls to cell phone constantly, then leaves an 866 or 800 number to call back. Doesnt say who they are, who they are looking for but leaves a reference number to quote back to them. Last year they tried saying my Auto Warranty was up ...... I do not nor have not owned any auto warranty's! They have also tried to say my credit card interest was too high *blah blah blah* that they could lower it. Funny I do not own any credit cards as well. What makes it even worse, they have called my teenagers cell phone as well with the same crap. I've put them on the donotcall.gov complaint several times. They leave the phone number to call back of 1-866-570-6085 and the message is a recorded message (not a person) and tells you to call back (in my case) "Joyce" and provide reference #. NCA is a collection agency. When I get a call from them, it is a recording telling me to call an 800 number and reference an account number. I have also been getting a lot of calls which show up as 111-111-1111 unknown caller on my caller ID. Also a lot of UNKNOWN with no number. The phone never rings more thatn 3 times and there is never a message left. I think all of this comes from the same clueless collection agency in Kansas. I read somewhere they are in trouble with some state agency. NCA showed up on my phone when they called me. I get calls DAILY from this number at 7:00 CST, I do not answer and no msg is left. Entire material of our website is given by our individuals. If you think this phone number is your personal, please visit this site to call the manager to delete report. Erase contact number 613-627-2400.
2019-04-23T17:01:49Z
https://caller2contact.org/telephone-number/6136272400