text
stringlengths 16k
189k
| timestamp
stringlengths 20
20
| url
stringlengths 15
841
|
---|---|---|
Ackleson, Jason MacGregor (2002) Narrating identity and territoriality: The cases of the U.S.-Mexico and U.S.-Canada borderlands. PhD thesis, London School of Economics and Political Science (United Kingdom).
Arapoglou, Vassilios Petrou (2002) Social and spatial dimensions of homelessness in Athens: Welfare networks and practices of care professionals. PhD thesis, London School of Economics and Political Science (United Kingdom).
Asthana, Roli (2002) The political economy of policy reform: Labour market regulation in India. PhD thesis, London School of Economics and Political Science (United Kingdom).
Baldoli, Claudia (2002) Italian fascism in Britain: the Fasci Italiani all'Estero, the Ttalian communities, and fascist sympathisers during Grandi Era (1932-1939). PhD thesis, London School of Economics and Political Science (United Kingdom).
Bandyopadhyay, Sanghamitra (2002) Inquiry into causes of regional disparities in economic growth across Indian states. PhD thesis, London School of Economics and Political Science (United Kingdom).
Baxell, Richard (2002) The British Battalion of the International Brigades in the Spanish Civil War, 1936-1939. PhD thesis, London School of Economics and Political Science (United Kingdom).
Becker, Olga Maria Schild (2002) Recent settlement in Brazilian Amazonia: Labour mobility and environmental degradation. PhD thesis, London School of Economics and Political Science (United Kingdom).
Borger, David (2002) Constructing representations of risk in regulatory networks: Accounting for financial instruments. PhD thesis, London School of Economics and Political Science (United Kingdom).
Burriel Llombart, Pablo (2002) Matching, education externalities and the location of economic activity. PhD thesis, London School of Economics and Political Science (United Kingdom).
Caggese, Andrea (2002) Financing constraints and firm dynamics. PhD thesis, London School of Economics and Political Science (United Kingdom).
Chakrabarti, Indranil (2002) Local governance: Bureaucratic performance and health care delivery in Calcutta. PhD thesis, London School of Economics and Political Science (United Kingdom).
Chen, Szu-Ting (2002) Economic theorizing: A causal structuralist account with examples from international trade theory. PhD thesis, London School of Economics and Political Science (United Kingdom).
Chenhall, Richard Dean (2002) Benelong's haven: An anthropological study of an Australian Aboriginal rehabilitation centre. PhD thesis, London School of Economics and Political Science (United Kingdom).
Chong Chia Siong, Alan (2002) Foreign policy in global information space: Actualising soft power. PhD thesis, London School of Economics and Political Science (United Kingdom).
Cintora Gomez, Armando (2002) Can the basic principles of rationality be defended rationally? PhD thesis, London School of Economics and Political Science (United Kingdom).
Davidson, Julia C (2002) The context and practice of community treatment programmes for child sexual abusers in England and Wales. PhD thesis, London School of Economics and Political Science (United Kingdom).
Dietz, Graham (2002) Partnership in British workplaces: Four case studies in the development of trust. PhD thesis, London School of Economics and Political Science (United Kingdom).
Dupriez, Quentin (2002) Inequality and growth: A labor mobility and human capital analysis. PhD thesis, London School of Economics and Political Science (United Kingdom).
Easley, Eric Sheridan (2002) The war over 'Perpetual Peace': An exploration into the history of a foundational international relations text. PhD thesis, London School of Economics and Political Science (United Kingdom).
Gassner, Katharina (2002) Liberalisation and regulation in European network utilities. PhD thesis, London School of Economics and Political Science (United Kingdom).
Goodarzi, Jubin Moazami (2002) The formative years of the Syrian-Iranian alliance: Power politics in the Middle East, 1979-1989. PhD thesis, London School of Economics and Political Science (United Kingdom).
Gouldson, Andrew (2002) Environmental regulation: Co-operation and the capacity for control. PhD thesis, London School of Economics and Political Science (United Kingdom).
Grafe, Clemens (2002) An analysis of causes and welfare effects of real exchange rate movements. PhD thesis, London School of Economics and Political Science (United Kingdom).
Green, Stephen P (2002) Equity politics and market institutions: The development of stock market policy and regulation in China, 1984-2000. PhD thesis, London School of Economics and Political Science (United Kingdom).
Greil, Tatjana Barbara (2002) The West German capital market and the financing behaviour of public limited companies, 1948-1965: A reassessment. PhD thesis, London School of Economics and Political Science (United Kingdom).
Hao, Temtsel (2002) Ethnic nationalist challenge to multi-ethnic state: Inner Mongolia and China. PhD thesis, London School of Economics and Political Science (United Kingdom).
Haynes, Steven R (2002) Explanation in information systems: A design rationale approach. PhD thesis, London School of Economics and Political Science (United Kingdom).
Hussein, Shereen Ahmed (2002) An exploration of nuptiality patterns in Egypt and the Maghreb countries. PhD thesis, London School of Economics and Political Science (United Kingdom).
Ilharco, Fernando (2002) Information technology as ontology: a phenomenological investigation into information technology and strategy in-the-world. PhD thesis, The London School of Economics and Political Science (LSE).
Jimenez San Vicente, Armando (2002) The political economy of tax collection in Mexico: The constrains on reform, 1970-2000. PhD thesis, London School of Economics and Political Science (United Kingdom).
Keitch, Raymond John (2002) Politics of sovereignty: Britain and European Monetary Union. PhD thesis, London School of Economics and Political Science (United Kingdom).
Keller, Eva Salome (2002) The search for knowledge among the Seventh-Day Adventists in the area of Maroantsetra, Madagascar. PhD thesis, London School of Economics and Political Science (United Kingdom).
Klecun, Elzbieta (2002) Telehealth and information society: a critical study of emerging concepts in policy and practice. PhD thesis, The London School of Economics and Political Science (LSE).
Kleiner, Thibaut (2002) Organisational adaptation in an integrating Europe: The case of French asset management industry, 1984-1999. PhD thesis, London School of Economics and Political Science (United Kingdom).
Kotnyek, Balazs (2002) A generalization of totally unimodular and network matrices. PhD thesis, London School of Economics and Political Science (United Kingdom).
Leal-Arcas, Rafael (2002) Ways to ensure the unitary character in the external trade relations of the European Community on issues of mixed competence between the European Community and its member states. MPhil thesis, London School of Economics and Political Science (United Kingdom).
Lee, Anthony David (2002) The development and operation of large scale voluntary transfer associations 1988 - 1999. PhD thesis, The London School of Economics and Political Science (LSE).
Levin-Rojo, Danna Alexandra (2002) Way back to Aztlan: Sixteenth century Hispanic-Nahuatl transculturation and the construction of the new Mexico. PhD thesis, London School of Economics and Political Science (United Kingdom).
Litchfield, Julie Anne (2002) Poverty, inequality and social welfare in Brazil, 1981-1995. PhD thesis, London School of Economics and Political Science (United Kingdom).
Masokin, Mikhail (2002) The Bayes mind: From the St. Petersburg paradox to the New York Stock Exchange. PhD thesis, London School of Economics and Political Science (United Kingdom).
Medeiros, Evan Sabino (2002) Integrating a rising power into global nonproliferation regimes: US-China negotiations and interactions on nonproliferation, 1980-2001. PhD thesis, London School of Economics and Political Science (United Kingdom).
Michelutti, Lucia (2002) Sons of Krishna: The politics of Yadav community formation in a north Indian town. PhD thesis, London School of Economics and Political Science (United Kingdom).
Minetti, Raoul (2002) Credit and the real economy: Macroeconomic and microeconomic aspects. PhD thesis, London School of Economics and Political Science (United Kingdom).
Murmann, Alexander (2002) Financial and actuarial valuation of insurance derivatives. PhD thesis, London School of Economics and Political Science (United Kingdom).
Nahum, Andrew (2002) World War to Cold War: formative episodes in the development of the British aircraft industry, 1943-1965. PhD thesis, The London School of Economics and Political Science (LSE).
Nakaoka, Shunsuke (2002) The business role of Japanese wealth holders in the early 20th century: An analysis of networks and activities during the process of industrialisation. PhD thesis, London School of Economics and Political Science (United Kingdom).
Namazie, Ceema Zahra (2002) Welfare and labour markets in transition: The case of the Kyrgyz Republic. PhD thesis, London School of Economics and Political Science (United Kingdom).
Nounou, Antigoni (2002) Gauge theories: A case study of how mathematics relates to the world. PhD thesis, London School of Economics and Political Science (United Kingdom).
Novack, Jennifer Leigh (2002) New kids on the European block: Finnish and Swedish adaptation to the European Union? PhD thesis, London School of Economics and Political Science (United Kingdom).
O'Donoghue, Cathal Gerard (2002) Redistribution in the Irish Tax-Benefit System. PhD thesis, London School of Economics and Political Science (United Kingdom).
Ojeda-Revah, Mario (2002) Mexico and the Spanish Republic. 1931-1939. PhD thesis, London School of Economics and Political Science (United Kingdom).
Palomares, Maria Cristina (2002) The quest for survival after Franco: The moderate Francoists' slow journey to the polls (1964-1977). PhD thesis, London School of Economics and Political Science (United Kingdom).
Paraskevopoulou, Anna (2002) Regional policy and minorities in the EU: The case of western Thrace, Greece. PhD thesis, London School of Economics and Political Science (United Kingdom).
Pickup, Francine (2002) Local level responses to rapid social change in a city in the Russian industrial Urals. PhD thesis, London School of Economics and Political Science (United Kingdom).
Pugatch, Meir Perez (2002) The international political economy of intellectual property rights: The TRIPs agreement and the advanced pharmaceutical industry in Europe. PhD thesis, London School of Economics and Political Science (United Kingdom).
Quinn, Thomas (2002) Organisational reform in the British Labour Party since 1983. PhD thesis, London School of Economics and Political Science (United Kingdom).
Qureshi, Saqib (2002) US Foreign Policy to Pakistan, 1947-1960: Re-constructing strategy. PhD thesis, London School of Economics and Political Science (United Kingdom).
Rajaram, Prem Kumar (2002) Exile and desire: Refugees, aesthetics and the territorial borders of international relations. PhD thesis, London School of Economics and Political Science (United Kingdom).
Ramezzana, Paolo (2002) Exchange in markets with heterogeneous agents and trade frictions. PhD thesis, London School of Economics and Political Science (United Kingdom).
Reiss, Julian (2002) Epistemic virtues and concept formation in economics. PhD thesis, London School of Economics and Political Science (United Kingdom).
Ritchie, John Miller (2002) Pragmatism and pluralism: How to avoid becoming a physicalist. PhD thesis, London School of Economics and Political Science (United Kingdom).
Robert-Nicoud, Frederic L (2002) New economic geography: Multiple equilibria, welfare and political economy. PhD thesis, London School of Economics and Political Science (United Kingdom).
Rossi, Benedetta (2002) The Keita Project: An anthropological study of international development discourses and practices in Niger. PhD thesis, London School of Economics and Political Science (United Kingdom).
Rubio Varas, Maria del Mar (2002) Towards environmental historical national accounts for oil producers: methodological considerations and estimates for Venezuela and Mexico over the 20th century. PhD thesis, The London School of Economics and Political Science (LSE).
S.V. Pinto da Silva, Patricia (2002) Common property to co-management: Social change and participation in Brazil's first Maritime Extractive Reserve. PhD thesis, London School of Economics and Political Science (United Kingdom).
Seif-Amirhosseini, Zahra (2002) Socio-political change and development in Iran: Reza Sah and the Shi`i hierocracy. PhD thesis, London School of Economics and Political Science (United Kingdom).
Simitis, Marilena (2002) New social movements in Greece: Aspects of the feminist and ecological projects. PhD thesis, London School of Economics and Political Science (United Kingdom).
Siyam, Amani Abdel Fattah Mohamed (2002) An analytical study of child survival using the Sudan, Egypt and Yemen PAP-CHILD surveys. PhD thesis, London School of Economics and Political Science (United Kingdom).
Smith, Anthony David (2002) The strike for the People's Charter in 1842. PhD thesis, London School of Economics and Political Science (United Kingdom).
Sturgis, Patrick James (2002) Political attitudes: The role of information as a determinant of direction, structure and stability. PhD thesis, London School of Economics and Political Science (United Kingdom).
Taylor, Kathryn Suzann (2002) A system dynamics model for planning and evaluating shifts in health services: The case of cardiac catheterisation procedures in the NHS. PhD thesis, London School of Economics and Political Science (United Kingdom).
Tortora, Pamela (2002) Global processes and local effects: Food processing transnational corporations in the developing world. PhD thesis, London School of Economics and Political Science (United Kingdom).
Tudela, Maria Mercedes (2002) Explaining and forecasting currency crises in developed and emerging markets' economies. PhD thesis, London School of Economics and Political Science (United Kingdom).
Ullrich, Heidi Karen (2002) Impact of policy networks in the GATT Uruguay Round: The case of the US-EC agricultural negotiations. PhD thesis, London School of Economics and Political Science (United Kingdom).
Uzelac, Gordana (2002) Perceptions of the nation: A sociological perspective on the case of Croatia. PhD thesis, London School of Economics and Political Science (United Kingdom).
Valderrama-Ferrando, Laura M (2002) The dynamics of ownership and redistribution. PhD thesis, London School of Economics and Political Science (United Kingdom).
Varela, Diego (2002) The power of voice: An informational model of the legislative powers of the European parliament. PhD thesis, London School of Economics and Political Science (United Kingdom).
Vendil, Carolina (2002) Russian legitimation formula - 1991-2000. PhD thesis, London School of Economics and Political Science (United Kingdom).
Vourkoutiotis, Velis (2002) Democracy and human development: A critical empirical investigation using data from 123 countries, 1970-1990. PhD thesis, London School of Economics and Political Science (United Kingdom).
Walker, Richard Ernest Hugh (2002) Macroeconomic policy and labour market structure. PhD thesis, London School of Economics and Political Science (United Kingdom).
Wanderer, Jeremy (2002) Contagious knowledge; A study in the epistemology of testimony. PhD thesis, London School of Economics and Political Science (United Kingdom).
Weinberger, Peter Ezra (2002) Co-opting the PLO: A critical reconstruction of the Oslo Accords, 1993-1995. PhD thesis, London School of Economics and Political Science (United Kingdom).
Willison, Robert Andrew (2002) Opportunities for computer abuse: Assessing a crime specific approach in the case of Barings Bank. PhD thesis, London School of Economics and Political Science (United Kingdom).
Yeros, Paris (2002) The political economy of civilization: Peasant-workers in Zimbabwe and the neo-colonial world. PhD thesis, London School of Economics and Political Science (United Kingdom).
Zepeda-Rast, Beatriz (2002) Education and the institutionalisation of contending ideas of the nation in Reforma Mexico. PhD thesis, London School of Economics and Political Science (United Kingdom).
Zistel, Susanne (2002) Critical hermeneutics and conflict resolution: An assessment of the transition from conflict to peace in Teso, Uganda, 1986-2000. PhD thesis, London School of Economics and Political Science (United Kingdom).
This list was generated on Sun Apr 21 15:34:10 2019 BST. | 2019-04-21T16:37:37Z | http://etheses.lse.ac.uk/view/year/2002.html |
President Donald Trump meets with North Korean leader Kim Jong Un in Singapore. Photo via White House.
For three decades, North Korea’s pursuit of a nuclear arsenal has been the predominant U.S. foreign policy concern on the Korean Peninsula, threatening both regional stability and the global nonproliferation regime. Although multiple countries have a major stake in the issue, the U.S. has been both the most important interlocutor in attempts to resolve it diplomatically and the leader in global efforts to pressure and isolate North Korea. Efforts to address North Korea’s nuclear weapons program through various combinations of diplomacy and pressure have at times slowed or temporarily halted Pyongyang’s progress, but have failed to roll it back or to fundamentally change the dynamics of conflict on the Peninsula.
As North Korea has dramatically accelerated the pace of progress in building its nuclear program in recent years, and as the Trump administration has alternately leveled threats of military action and engaged in high-profile summitry with Kim Jong-un, this issue has risen to the top of the U.S. foreign policy agenda. The current round of U.S. diplomatic engagement with North Korea may hold enormous consequences for the future of the Korean Peninsula, perhaps leading to the denouement of this long saga – or, despite the high stakes, perhaps simply to another round of all sides “muddling through” with no ultimate resolution in sight. The Trump administration has framed negotiations with North Korea in stark binary terms – either leading to North Korea’s denuclearization and prosperity, or to a more intensified confrontation and conflict – but few experts expect North Korea to give up its nuclear arsenal any time soon.
This Issue Brief will review the history of U.S. nuclear negotiations with North Korea, taking a close look at past efforts to realize the denuclearization of the Korean Peninsula. It will also examine the persistent questions and themes surrounding how the U.S. has approached the issue of negotiating with Pyongyang, and how foreign analysts have perceived the motivations behind North Korea’s nuclear program.
Military threats, particularly joint military exercises between the U.S. and South Korea and threats (spoken or implicit) of U.S. use of nuclear weapons in a conflict.
Additionally, many analysts assume that the withdrawal of U.S. troops from the Korean Peninsula is a key North Korean objective, reflecting the country’s long-standing rhetoric and propaganda. However, at key points in diplomatic negotiations – the first high-level U.S.-DPRK talks in 1992, the 2000 inter-Korean summit, and as renewed engagement with South Korea and the U.S. began in 2018 – North Korea’s leaders privately indicated their willingness to accept a long-term U.S. military presence on the Peninsula.
North Korea as an Isolated State: One line of analysis interprets the motivations behind North Korea’s nuclear program and many of its adversarial actions and negotiating tactics as springing from a deep sense of insecurity and nationalist pride, amidst a world of unreliable allies and of perceived antagonists in Seoul, Tokyo, and Washington who seek the regime’s dissolution. This combination of insecurity, nationalism, and commitment to continued rule by the Kim family drives North Korea’s domestic political system, as well as its approach to foreign relations.
North Korea as a Hyper-Realist State: An alternative hypothesis posits that North Korea’s leaders view military power – not alliances or embeddedness in the international order – as the only meaningful guarantee of security, and nuclear weapons as the ultimate currency of power. In past nuclear negotiations, Pyongyang may have made tactical concessions to ward off pressure, gain temporary benefits, and divide its adversaries; however, North Korea has ultimately relied on strategic deception to gradually build up its nuclear capabilities. The North Korean regime sees its nuclear arsenal as a deterrent against foreign military intervention, and is determined to avoid the kind of example set by Libya, where Muammar Gaddafi was overthrown and killed in a U.S.-supported uprising eight years after surrendering his country’s nascent nuclear program.
With these different general perspectives as rough baselines for interpreting the motivations behind North Korea’s behavior and its nuclear program, over nearly three decades of on-and-off nuclear negotiations have consistently produced some of the same themes and strategic questions about the direction U.S. policy should take.
Nonetheless, each U.S. administration for the past thirty years has maintained the stated goal of achieving the denuclearization of North Korea through diplomatic means and has tried to varying degrees to engage in talks with Pyongyang over its nuclear program. The potential human cost of a full-scale military conflict with North Korea – where projections of casualties range in the hundreds of thousands, or in the millions if nuclear weapons are involved – has cast a heavy shadow over the option of using military force to destroy the country’s nuclear infrastructure. Policies aimed at regime change through non-military means would have to accept the risks of instigating the collapse of a nuclear-armed state, and to reckon with the difficult fact – as the famine of the 1990s demonstrated – that the North Korean regime is willing to impose a high level of pain on its population to stay in power. Recognition or de facto acceptance of North Korea’s nuclear-armed status, on the other hand, would represent an embarrassing retreat from decades of U.S. policy and a blow to the global nonproliferation regime, without any guarantee that it would lead to a more peaceful or stable Korean Peninsula.
Within the context of negotiations, a consistent challenge has been coordinating the U.S. position on North Korea policy with that of other key regional actors. Although China has opposed North Korea’s nuclear buildup and voted in favor of multiple UN sanctions resolutions, Beijing has generally prioritized stability on the Korean Peninsula over denuclearization, and – particularly before 2017 – did little to enforce sanctions. South Korea’s approach to North Korea has fluctuated as pro-engagement progressives and more hawkish conservatives have alternated in power, and the policy preferences of Seoul and Washington have been out of sync at several crucial periods. The direction of Japanese policy toward North Korea has generally been more consistent with that of the U.S., but Tokyo’s focus on addressing the decades-old abduction of its nationals by North Korea has sometimes conflicted with Washington’s prioritization of nuclear matters. Russia has had less of a direct stake in the politics of the Korean Peninsula than other parties, but has sought to keep a seat at the table and has threatened at times to play a spoiler role in international efforts to pressure North Korea over its nuclear program. Tied to the management of these relationships has been the question of whether nuclear negotiations with North Korea should be a bilateral U.S.-DPRK affair, or a multilateral one.
Another major consistent question of U.S. diplomatic strategy has been identifying the right combination of pressure and inducements to get Pyongyang to the table on acceptable terms, and to bargain for nuclear concessions once talks have begun.10 A related issue has been how each side would sequence their respective actions to get to the end goal of a denuclearized and peaceful Korean Peninsula, given their mutual mistrust and the long list of measures (some reversible, some not) necessary to achieve this goal. The dynamics of phased negotiations, coupled with a tendency for the two sides to agree to vaguely-worded joint statements rather than finely-detailed agreements, have repeatedly provided the U.S. and North Korea the opportunity to accuse the other – rightly or wrongly, as the case may be – of failing to live up to their obligations.
North Korea’s interest in nuclear technology began decades before the country’s nuclear program rose to the top of the U.S. foreign policy agenda in the 1990s. North Korea’s early nuclear activities in the 1950s and 60s were focused on building a corps of trained nuclear experts and developing the foundations of a national nuclear infrastructure with assistance from abroad, primarily from the Soviet Union. By the 1970s, North Korean leader Kim Il Sung began to lay the groundwork for the country’s indigenous development of a nuclear weapons program, and in 1979 North Korea began construction of a 5 MWe experimental nuclear reactor at Yongbyon – a Magnox-type reactor that could operate on natural uranium and produce spent fuel for reprocessing into weapons-grade plutonium.
In 1985, as North Korea neared completion of the 5 MWe reactor, it signed the Non-Proliferation Treaty under Soviet (and indirectly, American) pressure. However, after acceding to the NPT Pyongyang did not follow up by signing a requisite nuclear safeguards agreement with the International Atomic Energy Agency. Instead, North Korea linked its willingness to submit to IAEA inspections to the withdrawal of U.S. nuclear weapons from South Korea, where they had been deployed since 1958. By the late 1980s, North Korea began operations at a radiochemical laboratory capable of reprocessing spent nuclear fuel to extract plutonium for nuclear weapons, and started construction of two larger gas-graphite reactors.
Increasingly concerned about North Korea’s nuclear ambitions, the U.S. quietly began to open up diplomatic communication channels with Pyongyang, breaking with decades of minimal direct contact between the two nations.12 Concurrently, South Korea pursued a policy of Nordpolitik aimed at rapprochement with the North and its traditional allies. In 1991, the U.S. announced the withdrawal of its nuclear weapons from South Korea, reflecting both a retrenchment of its global nuclear posture and an effort to persuade North Korea to accept international inspections of its nuclear sites. Separately, the U.S. and South Korea announced the cancellation of the annual “Team Spirit” joint military exercises, which Pyongyang had vociferously opposed for years.
These two actions met North Korea’s stated requirements for allowing IAEA inspections of its nuclear facilities and opened the door to negotiations. In December 1991, the two Koreas signed a “Basic Agreement” pledging the two sides to reconciliation and cooperation, followed shortly by a Joint Declaration on the Denuclearization of the Korean Peninsula, under which North and South agreed not to “test, manufacture, produce, receive, possess, store, deploy or use nuclear weapons.” North and South Korea also pledged not to possess nuclear reprocessing or uranium enrichment facilities. While the two Koreas were negotiating this agreement, the U.S. and North Korea convened a high-level diplomatic meeting in New York, leading to North Korea’s decision to permit IAEA inspections of its nuclear facilities. The bilateral inspection mechanism envisioned by the inter-Korean Joint Declaration did not get off the ground, marking the start of a pattern of Pyongyang insisting that Washington be its main interlocutor on nuclear matters. However, North Korea soon submitted a nuclear material declaration to the IAEA and allowed inspections of certain agreed-upon sites.
As IAEA inspectors scrutinized these declared nuclear activities, they detected discrepancies suggesting that from 1989 to 1991 North Korea may have covertly produced enough plutonium to build one or two nuclear weapons. When the IAEA requested the “special inspection” of suspect facilities in early 1993, North Korea – surprised by the scope of the organization’s forensic capabilities and the unprecedented nature of the inspection request – refused the request and announced its intention to withdraw from the NPT.13 This led to further bilateral talks with the U.S., and the adoption of a joint statement in which the two countries pledged to support a nuclear-free Korean Peninsula, respect one another’s sovereignty, and refrain from the use or threat of force; as part of this agreement, North Korea also “suspended” its NPT withdrawal. Subsequent IAEA efforts to inspect the suspected reprocessing facility stalled, however, and North Korea’s removal of spent fuel rods from its 5 MWe reactor for possible reprocessing to extract plutonium took the crisis to an apex. Facing the prospect of a brazen nuclear breakout, U.S. policymakers began considering pursuing tough international sanctions or a military response – an option that the Clinton administration recognized could lead to a devastating conflict on the Peninsula.
The Agreed Framework alleviated the immediate sense of crisis surrounding North Korea’s nuclear program. The agreement froze nuclear activities at Yongbyon and led to the de facto abandonment of North Korea’s two other nascent nuclear reactors. (The CIA had estimated that, upon completion, these reactors would be capable of generating enough plutonium to produce dozens of nuclear weapons every year.)15 In the years after the U.S. and North Korea signed the agreement, the two sides made some progress in working-level bilateral talks on implementation details and on confidence building measures such as cooperation to recover the remains of Korean War-era U.S. service members from North Korea. With North Korea’s economic collapse leading to devastating famine by the mid-1990s, the U.S. also emerged as the largest donor for humanitarian assistance to the country.
However, U.S. relations with North Korea remained highly uneasy during this period, and implementation of the Agreed Framework was often fraught with uncertainty. The U.S. Congress, skeptical of the agreement’s merits, was reluctant to fund the heavy fuel oil shipments promised by it, leading to delays in delivery. Construction of the LWRs in North Korea also proceeded slowly, due to the unique and complex nature of the project.16 Additionally, the U.S. and North Korea made little progress toward normalizing diplomatic or economic relations, and did not establish interests sections in each other’s capitals as outlined by the Agreed Framework.17 Four Party Talks aimed at negotiating a peace treaty to replace the 1953 Armistice Agreement, held between the U.S., China, and the two Koreas from 1997-1999, deadlocked without an agreement.
Military tensions on the Korean Peninsula also continued in the years after the Agreed Framework was signed. In December 1994, North Korea shot down a U.S. helicopter that had strayed into North Korean airspace; in 1996, a North Korean submarine ran aground in South Korean territory during a reconnaissance mission, leading to a massive manhunt; and in August 1998 North Korea attempted to launch a satellite into orbit using a Taepodong-1 rocket, marking Pyongyang’s first use of long-range missile technology. Additionally, by 1998 U.S. intelligence agencies began picking up indications of a nascent North Korean effort to acquire uranium enrichment technology, which would potentially provide Pyongyang with an alternative path to the bomb.
As the “Perry Process” between the U.S. and North Korea commenced, Washington and Pyongyang began an intensified process of official engagement. Although the Clinton administration did not confront Pyongyang over the uranium enrichment issue – given a lack of actionable evidence and the apparently limited scale of Pyongyang’s activities at this time – it focused on gaining access to an underground military site at Kumchang-ri, where the U.S. Defense Intelligence Agency believed North Korea was constructing a covert nuclear facility. In March 1999, a State Department team reached an agreement to visit this site, concluding that operations there did not violate the Agreed Framework.19 Several months later, during negotiations on its ballistic missile program, Pyongyang agreed to a missile test moratorium in exchange for Washington partially lifting economic sanctions.
The final months of the Clinton administration saw a burst of high-level diplomacy, as well as a warming of inter-Korean relations following the first inter-Korean summit in June 2000. In October 2000 a high-ranking North Korean official, Vice Marshal Jo Myong Rok, visited Washington, leading to a Joint Communique on efforts to improve U.S.-DPRK relations.20 Shortly thereafter, Secretary of State Madeleine Albright visited Pyongyang to meet with North Korean leader Kim Jong Il. Nonetheless, an envisioned follow-up visit by President Clinton to Pyongyang did not materialize, owing to ongoing disagreements over the final terms of a missile deal and a political crisis in Washington following that November’s disputed election.
The incoming George W. Bush administration had deep internal divisions about its policy toward North Korea and the wisdom of engaging in diplomacy with Pyongyang.21 Although implementation of the Agreed Framework continued as the Bush administration took office, missile talks with North Korea were suspended, and the new administration sent mixed signals about its willingness to negotiate with Pyongyang – an approach at odds with the engagement policies then being pursued by Seoul and (to a lesser extent) Tokyo. An internal policy review on North Korea, released in June 2001, called for a “bold approach” strategy addressing a comprehensive set of security, economic, and political issues; however, there was little immediate follow-up to begin implementing this strategy. The administration’s approach to foreign policy hardened after 9/11; during his 2002 State of the Union address, President Bush labeled North Korea as part of an “axis of evil” along with Iraq and Iran. Shortly thereafter, a leak of the administration’s classified Nuclear Posture Review revealed that North Korea was one of seven countries identified as possible nuclear targets in a military contingency; Pyongyang condemned this development as a violation of previous U.S. security assurances.
After two years of little diplomatic progress – during which North Korea reprocessed enough spent fuel to produce plutonium for at least half a dozen simple nuclear weapons – on September 19, 2005 the Six Parties announced a Joint Statement on denuclearization. The statement committed North Korea to abandoning its nuclear programs and returning to the NPT in exchange for food and energy assistance from the other Six Party members. It also outlined the parameters of future negotiations, including the normalization of North Korean relations with the United States, Japan and South Korea, and papered over Pyongyang’s demands for the provision of light-water reactors by stating that the topic would be discussed “at an appropriate time.”27 However, this agreement proved to be stillborn. Shortly before the talks had concluded, the U.S. Treasury Department had designated a Macau-based bank, Banco Delta Asia (BDA), as a “primary money laundering concern” due to its financial facilitation of North Korean illicit activities, leading the Macau government to freeze approximately $25 million in North Korean assets in the bank. After signing on to the Joint Statement, North Korea raised objections related to both this action and to the LWR issue, leading to another deadlock at the negotiating table.
As diplomatic efforts hit a standstill, the U.S. followed up on the Treasury Department action with a campaign to pressure overseas financial institutions to avoid doing business with North Korea, and in July 2006 North Korea ended its missile test moratorium with the launch of a long-range Taepodong-2 missile. Several months later, Pyongyang conducted its first nuclear test, bringing a renewed sense of urgency to the nuclear crisis. The UN Security Council responded by condemning the test and adopting its first Chapter VII sanctions resolution targeted at North Korea’s nuclear and ballistic missile programs. Amidst this worsening situation, the Bush administration decided to intensify its diplomatic efforts, with a short-term focus on halting the threat posed by North Korea’s ongoing plutonium production.
Initial steps in this direction gained some traction, with the U.S., South Korea, Japan, China, and Russia more aligned in their approaches toward North Korea than they had previously been. In February 2007, the resumed Six Party Talks produced an agreement on initial actions toward denuclearization. As first steps, North Korea would halt operations at its Yongbyon facility, while other members of the Six Party Talks would provide North Korea with heavy fuel oil and form new working groups to discuss the implementation of various aspects the September 19 Joint Statement. As part of a side arrangement, the U.S. also agreed to facilitate the return of the frozen BDA funds to North Korea.
Amidst internal battles within the Bush administration about how to respond, the U.S decided to move forward with negotiations to disable the plutonium production facilities at Yongbyon, while linking North Korea’s delisting as a state sponsor of terror to its willingness to accept a verification regime (which would presumably account for its enrichment program).31 As Pyongyang submitted its declaration, President Bush terminated the application of sanctions on North Korea implemented under the U.S. Trading with the Enemy Act, while concurrently reinstating many of these sanctions under a different legal authority.32 Soon afterwards, North Korea demolished the cooling tower at its Yongbyon reactor, providing a visible signal of the facility’s disablement.
As the Bush administration’s second term drew to an end, its diplomacy with North Korea began to unravel over the issue of verification. In October 2008, with Pyongyang threatening to walk away from talks, U.S. and North Korean negotiators reached a verbal agreement outlining a verification protocol, leading Washington to remove North Korea from the U.S. list of state sponsors of terrorism in order to keep talks moving forward.33 However, North Korea rejected subsequent efforts in the Six Party Talks to commit to a written verification regime under terms acceptable to the U.S. and its allies. Early the following year, with a new administration in office in Washington, North Korea attempted to launch a satellite using a multi-stage rocket, prompting a statement of condemnation from the UN Security Council. Pyongyang subsequently expelled international monitors from its Yongbyon nuclear complex, declared that it would no longer be bound by its previous agreements, and conducted a second nuclear test, spelling the end for the Six Party Talks.
President Barack Obama entered office with a publicly- and privately-expressed willingness to engage with Pyongyang. At the same time, Obama was determined – as he reportedly told his national security team shortly after taking office – to “break the cycle of provocation, extortion, and reward.”34 Facing the collapse of the Six Party Talks at the start of its tenure and repeated crises involving North Korea thereafter, the Obama administration engaged only episodically in talks with Pyongyang, and held mostly to a policy of what Secretary of State Hillary Clinton in December 2009 called “strategic patience.”35 This policy centered on a stated aversion to “rewarding bad behavior” on the part of North Korea, coupled with a conditional willingness to return to high-level talks if North Korea showed a serious commitment to negotiate an end to its nuclear program. It also entailed the gradual escalation of economic and diplomatic pressure on Pyongyang in response to provocations.
In the months after its second nuclear test, Pyongyang gave mixed signals about its willingness to return to dialogue, showing a stated desire to improve relations with the U.S. but not necessarily to abandon its nuclear arsenal. In August 2009, North Korea secured a visit by Bill Clinton to Pyongyang in return for a promise to release two detained American journalists, during which Clinton and Kim Jong Il held a long (though unofficial) meeting on addressing the barriers to improved U.S.-DPRK relations. Stephen Bosworth, the State Department’s Special Representative for North Korea Policy, followed up with a December 2009 visit to discuss the possible resumption of the Six Party Talks.
Shortly after the agreement was rolled out, North Korea announced its intention to launch a satellite into orbit, claiming that “the launch of the working satellite is an issue fundamentally different from that of a long-range missile” and therefore was not a violation of the deal.40 Washington and the UN Security Council disagreed. Despite the U.S. reportedly sending envoys to Pyongyang on a secret mission to dissuade North Korea from following through with its plan, the launch was carried out a few days before the 100th anniversary of Kim Il Sung’s birthday. The launch failed to put a satellite into orbit, and led the U.S. to cancel the planned nutritional assistance package. A month later, the DPRK revised its constitution to declare itself a “nuclear power and an invincible military power” – demonstrating a deepening public commitment to its nuclear program under the country’s new leader, Kim Jong Un.41 North Korea conducted a more successful follow-up satellite launch in December 2012, followed once again by UN Security Council condemnation, another North Korean nuclear test, and new U.S. and international sanctions.
Shortly before Donald Trump entered the White House, President Obama reportedly warned him that North Korea’s nuclear and missile programs would be the most urgent challenge Trump would confront.55 Trump did not have a particularly strong focus on the Korean Peninsula on the campaign trail, despite raising headlines for suggesting that Japan and South Korea should develop their own nuclear weapons and claiming that the two countries did not pay enough of the costs of hosting U.S. troops. After the election, however, Kim Jong Un announced his intention to test launch an intercontinental ballistic missile (ICBM), prompting Trump to tweet that a North Korean nuclear-armed ICBM capability “won’t happen!”56 This set the tone for Trump’s first year in office, as his administration pursued a policy of “maximum pressure” and North Korea conducted a series of long-range missile tests.
North Korea responded to these remarks with its own escalation of rhetoric and threats. After Trump’s “fire and fury” remark, the Korean People’s Army’s Strategic Force threatened to fire an array of long-range missiles at the surrounding waters of the U.S. territory of Guam.61 In response to the UN speech, Kim Jong Un gave an unusual public address threatening to “tame the mentally deranged U.S. dotard with fire.” The DPRK Foreign Minister warned that his country might conduct an atmospheric thermonuclear test over the Pacific Ocean, presumably after launching the warhead from a ballistic missile.62 North Korea did not follow through with these specific threats, but it did conduct what appeared to be its first thermonuclear test and a test of the Hwasong-15 ICBM, which appeared capable of reaching the entire continental United States.
The road from the Panmunjom summit to Trump’s meeting with Kim Jong-un was short but filled with twists and turns nonetheless. In May, Secretary of State Pompeo made a return visit to Pyongyang, winning the release of three Americans who had been detained by North Korea. A few weeks later, North Korea invited an international group of journalists – but not technical experts – to witness the demolition of its nuclear test site. With the Trump administration insisting that “maximum pressure” would continue until North Korea achieved complete, verifiable, irreversible denuclearization, National Security Advisor John Bolton urged North Korea to follow the “Libya model” in denuclearization talks.72 Pyongyang rebuked Bolton for his reference to what it considered a model for surrender and regime change; this prompted a round of escalating rhetoric from Washington and Pyongyang that culminated in a open letter from Trump to Kim announcing the cancellation of their planned summit. Another hastily-convened meeting between Kim Jong Un and Moon Jae-in at Panmunjom, followed by a visit by North Korean regime heavyweight Kim Yong Chol to New York and Washington, put plans for the meeting back on track, with U.S. and North Korean officials scrambling to work out the agenda and details for a June 12 meeting in Singapore.
Trump has blamed China for North Korea’s obstinacy in nuclear talks, saying China was not “helping with the process of denuclearisation as they once were,” and tying faltering nuclear diplomacy with Pyongyang to rising trade tensions with Beijing.80 Although there is no public evidence that North Korean obstinacy in talks has been directly encouraged by Beijing, Chinese relations with North Korea did begin to thaw in the spring of 2018, with Kim Jong Un meeting Chinese leader Xi Jinping three times from March through June. Anecdotal reports have suggested that Chinese enforcement of sanctions against North Korea has become more lax in the wake of these meetings. Russian relations with North Korea have also begun to improve in the wake of Pyongyang’s diplomatic offensive.
The deadlock between the U.S. and North Korea over the first steps toward denuclearization and a peace regime also contrasts with warming inter-Korean ties, and has led to renewed concerns about cracks in the U.S.-ROK alliance emerging. In September 2018, Moon Jae-in travelled to Pyongyang, meeting with Kim Jong Un for the third time and pledging enhanced inter-Korean cooperation. However, the broad scope of UN sanctions on North Korea has meant that nearly any form of inter-Korean economic engagement would require approval from the Security Council – and hence from the U.S., which continues to place a high priority on keeping the international sanctions regime intact in the absence of concrete North Korean movement toward denuclearization.
Though the stakes are now higher and the leadership dynamics much different, U.S. policymakers attempting to address North Korea’s nuclear program are now faced with some of the same complex issues of diplomatic strategy and tactics that have made past rounds of negotiations so difficult. These include coordinating Washington’s position with those of allies and partners in the region despite their disparate interests and policy preferences; identifying the right combination of pressure and incentives to induce positive action from Pyongyang; and sequencing a complex negotiating process amidst intense mutual distrust. These challenges have been magnified, however, by the mismanaged expectations and chaotic process that have thus far characterized much of the Trump administration’s approach to diplomacy with North Korea.
Nevertheless, though policy choices made in Washington, Seoul, or Beijing will shape the environment for negotiations, how North Korea proceeds will ultimately be a result of decisions made in Pyongyang. How far Kim Jong Un is willing to go in making concessions on his nuclear program – and at what price, and for what greater strategic purpose – will remain the central questions as talks continue.
1. “Denuclearization of Korean Peninsula Is DPRK's Invariable Stand,” KCNA, September 29, 2013.
3. See Andrei Lankov, The Real North Korea: Life and Politics in the Failed Stalinist Utopia (Oxford University Press, 2013).
5. See “North Korea Inside Out: The Case for Economic Engagement,” Report of an Independent Task Force Convened by the Asia Society Center on U.S.-China Relations and the University of California Institute on Global Conflict and Cooperation, December 2009; Chung-in Moon, The Sunshine Policy: In Defense of Engagement as a Path to Peace in Korea (Yonsei University Press, 2012).
6. See Suzanne Scholte, Testimony before the House Foreign Affairs Subcommittee on Africa, Global Health, Global Human Rights, and International Organizations, “Protecting North Korean Refugees,” 115th Congress, First Session, December 12, 2017.
7. Courtney Kube, Ken Dilanian and Carol E. Lee, “CIA Report Says North Korea Won’t Denuclearize, but Might Open a Burger Joint,” NBC News, May 30, 2018, https://www.nbcnews.com/news/north-korea/cia-report-says-north-korea-won-t-denuclearize-might-open-n878201; Rick Gladstone, “North Korea Giving Up Nuclear Arms ‘a Lost Cause,’ Official Says,” New York Times, October 25, 2016.
8. See Joshua Stanton, Sung-yoon Lee, and Bruce Klingner, “Getting Tough on North Korea,” Foreign Affairs, May/June 2017.
10. On the difficulties of this issue, see Stephan Haggard and Marcus Noland, Hard Target: Sanctions, Inducements, and the Case of North Korea (Stanford University Press, 2017).
11. For overviews of this period, see Don Oberdorfer and Robert Carlin, The Two Koreas: A Contemporary History, Third Ed. (Basic Books, 2014), pp. 194-238; Joel S. Wit, Daniel B. Poneman, and Robert L. Gallucci, Going Critical: The First North Korean Nuclear Crisis (Brookings Institution Press, 2005); Leon V. Sigal, Disarming Stranger: Nuclear Diplomacy with North Korea (Princeton University Press, 1998); Robert Carlin and John W. Lewis, Negotiating with North Korea: 1992-2007 (Stanford University Center for International Security and Cooperation, 2008); and Marion V. Creekmore Jr., A Moment of Crisis: Jimmy Carter, the Power of a Peacemaker, and North Korea’s Nuclear Ambitions (PublicAffairs, 2006).
12. After 1953, the U.S. and North Korea communicated almost exclusively through the Military Armistice Commission established by the Armistice Agreement. Under the “modest initiative” begun by the Reagan administration in 1988, the U.S. opened up a channel in Beijing for diplomatic correspondence with North Korea, and eased some restrictions on person-to-person engagement between Americans and North Koreans.
13. Pyongyang also cited the resumption of Team Spirit military exercises in 1993 as a reason for its withdrawal from the NPT. These military exercises were suspended again from 1994-1996 before being cancelled and replaced with smaller-scale exercises.
14. “Agreed Framework between the United States of America and the Democratic People’s Republic of Korea,” October 21, 1994, https://www.armscontrol.org/documents/af.
16. Nonetheless, the U.S. ultimately delivered $400 million in energy assistance to North Korea from 1995 to 2002. See Manyin and Nikitin, “Foreign Assistance to North Korea,” Congressional Research Service, April 2, 2014, https://fas.org/sgp/crs/row/R40095.pdf. On the multinational effort to finance and construct the LWR project in North Korea, see Charles Kartman, Robert Carlin, and Joel Wit, A History of KEDO, 1994-2006 (Stanford University Center for International Security and Cooperation, June 2012).
19. James P. Rubin, “Report on the U.S. Visit to the Site at Kumchang-ni, Democratic People’s Republic of Korea,” U.S. Department of State, June 25, 1999, https://1997-2001.state.gov/briefings/statements/1999/ps990625a.html. These findings were confirmed after a second inspection a year later.
21. For overviews of the Six Party Talks and Bush administration policies toward North, see Mike Chinoy, Meltdown: The Inside Story of the North Korean Nuclear Crisis (St. Martin’s Griffin, 2009); Yoichi Funabashi, The Peninsula Question: A Chronicle of the Second Korean Nuclear Crisis (Brookings Institution Press, 2007); Victor Cha, The Impossible State: North Korea, Past and Future (HarperCollins, 2012); and Charles L. Pritchard, Failed Diplomacy: The Tragic Story of How North Korea Got the Bomb (Brookings Institution Press, 2007).
22. Funabashi, The Peninsula Question, pp. 93-134.
23. To some members of the Bush administration, these events provided the impetus to follow through with their longstanding preference for abandoning the Agreed Framework. As John Bolton, then the Under Secretary of State for Arms Control and International Security, wrote in his memoirs, intelligence revelations about North Korean procurement for an enrichment program provided “the hammer I had been looking for to shatter the Agreed Framework.” John Bolton, Surrender is Not an Option: Defending America at the United Nations and Beyond (Threshold Editions, 2008), 106.
24. See, for example, “KCNA on DPRK's nuclear deterrent force,” KCNA, June 9, 2003.
25. The multilateral approach also stood in contrast to North Korea’s strong preference for holding bilateral talks with the U.S. on its nuclear program and its portrayal of the nuclear crisis as solely a U.S.-DPRK issue.
30. In addition to previous evidence of North Korea’s enrichment program, tests of documents from Yongbyon submitted as part of the declaration indicated the presence of highly enriched uranium. See Glenn Kessler, “New Data Found on North Korea’s Nuclear Capacity,” Washington Post, June 21, 2008.
32. George W. Bush, “Continuing Certain Restrictions With Respect to North Korea and North Korean Nationals,” Executive Order 13466, June 26, 2008.
34. Quoted in Jeffrey Bader, Obama and China’s Rise: An Insider’s Account of America’s Asia Strategy (Brookings Institution Press, 2012), p. 31. On the administration’s initial private outreach to North Korea, see Amb. Stephen Bosworth, “Remarks at the Korea Society Annual Dinner,” June 9, 2009.
35. Hillary Rodham Clinton, “Remarks with Croatian Foreign Minister Gordan Jandrokovic After Their Meeting,” December 10, 2009, https://2009-2017.state.gov/secretary/20092013clinton/rm/2009a/12/133416.htm. In later years, the Obama administration tried (largely unsuccessfully) to back away from the strategic patience label.
37. An investigative group convened by the ROK Ministry of National Defense concluded two months after the incident that North Korea was responsible for the sinking – a claim Pyongyang vehemently denied. Some South Koreans have expressed skepticism about its findings.
39. Victoria Nuland, “U.S.-DPRK Bilateral Discussions,” February 29, 2012, http://www.state.gov/r/pa/prs/ps/2012/02/184869.htm; see also “DPRK Foreign Ministry Spokesman on Result of DPRK-U.S. Talks,” KCNA, February 29, 2012. The Obama administration claimed, somewhat implausibly, that the nutritional assistance to North Korea was not a direct quid pro quo in return for a freeze.
40. “DPRK’s Satellite Launch not Contradictory to DPRK-U.S. Agreement: KCNA,” KCNA, March 19, 2012.
42. See “Timeline of Threat Escalations on the Korean Peninsula, December 2012 to May 2013,” NCNK Issue Brief, http://www.ncnk.org/resources/publications/Korea_threat_timeline_spring2013.pdf.
43. “Report on Plenary Meeting of WPK Central Committee,” KCNA, March 31, 2013.
44. “Report of the Commission of Inquiry on Human Rights in the Democratic People’s Republic of Korea,” UN General Assembly document A/HRC/25/63, February 7, 2014; Amb. Ja Song Nam, “Letter dated 20 December 2014 from the Permanent Representative of the Democratic People’s Republic of Korea to the United Nations addressed to the President of the Security Council,” UN Security Council document S/2014/930.
45. “Update on Sony Investigation,” FBI National Press Office, December 19, 2014, https://www.fbi.gov/news/pressrel/press-releases/update-on-sony-investigation. North Korea has also been accused of orchestrating incidents including the theft of $81 million from the Bangladesh Central Bank, and the release of “WannaCry” ransomware.
47. “DPRK Proposes Official Talks with U.S.,” KCNA, June 16, 2013.
51. From 2009 to 2014, total reported North Korean trade with China jumped by over 250 percent, from approximately $2.7 billion to $6.9 billion annually. Data available at www.northkoreaintheworld.org.
53. UN Security Council Resolution 2270, adopted March 2, 2016. A vaguely-worded exemption in this resolution for transactions “exclusively for livelihood purposes” meant that North Korean coal sales to China continued largely unabated for the remainder of the year, but the resolution nonetheless set a precedent for the imposition of wide-ranging sanctions on North Korean commercial activities.
54. This designation was announced, in an apparent coincidence, on the same day that North Korea issued a new call for the “denuclearization of the Korean Peninsula” – see “DPRK Government Denounces U.S., S. Korea’s Sophism about “Denuclearization of North,” KCNA, July 7, 2016. On cutting off contact with the U.S., see “DPRK Government Sends Message to U.S. Government,” KCNA, July 11, 2016.
55. David E. Sanger and William J. Broad, “Trump Inherits a Secret Cyberwar Against North Korean Missiles,” The New York Times, March 4, 2017.
59. Noah Bierman, “Trump Warns North Korea of ‘Fire and Fury’,” Los Angeles Times, August 8, 2017.
61. “U.S. Should Be Prudent under Present Acute Situation: Spokesman for KPA Strategic Force,” KCNA, August 9, 2017.
65. Joby Warrick, Ellen Nakashima, and Anna Fifield, “North Korea now making missile-ready nuclear weapons, U.S. analysts say,” Washington Post, August 8, 2017.
66. “Kim Jong Un Makes New Year Address,” KCNA, January 1, 2018.
67. Mark Landler, “Spies, Not Diplomats, Take Lead Role in Planning Trump’s North Korea Meeting,” March 16, 2018.
69. “Third Plenary Meeting of Seventh C.C., WPK Held in Presence of Kim Jong Un,” KCNA, April 21, 2018.
71. Anna Fifield, “South Korean President Says North Isn’t Insisting on American Troop Withdrawal,” Washington Post, April 19, 2018.
77. “FM Spokesman on DPRK-U.S. High-level Talks,” KCNA, July 8, 2018.
79. Julie Bykowicz and Farnaz Fassihi, “Trump Says He and Kim Jong Un ‘Fell in Love’,” Wall Street Journal, September 30, 2018. | 2019-04-19T12:51:25Z | https://ncnk.org/resources/briefing-papers/all-briefing-papers/history-u.s.-dprk-relations |
When Jesus had spoken these words, he went forth with his disciples over the brook Cedron, where was a garden, into the which he entered, and his disciples. And Judas also, which betrayed him, knew the place: for Jesus ofttimes resorted thither with his disciples. Judas then, having received a band of men and officers from the chief priests and Pharisees, cometh thither with lanterns and torches and weapons. Jesus therefore, knowing all things that should come upon him, went forth, and said unto them, Whom seek ye? They answered him, Jesus of Nazareth. Jesus saith unto them, I am he. And Judas also, which betrayed him, stood with them. As soon then as he had said unto them, I am he, they went backward, and fell to the ground. Then asked he them again, Whom seek ye? And they said, Jesus of Nazareth. Jesus answered, I have told you that I am he: if therefore ye seek me, let these go their way: That the saying might be fulfilled, which he spake, Of them which thou gavest me have I lost none. Then Simon Peter having a sword drew it, and smote the high priest’s servant, and cut off his right ear. The servant’s name was Malchus. Then said Jesus unto Peter, Put up thy sword into the sheath: the cup which my Father hath given me, shall I not drink it?
All of you who share with us this service on the radio of the city of Dallas, turn in your Bible to the Gospel of John, the Fourth Gospel, chapter 18. And with all of us who fill this great auditorium in the First Baptist Church in Dallas, read with the pastor John chapter 18, the first eleven verses; John 18:1-11.
And the text which gives rise to the title of the sermon: "The cup which My Father hath given Me, shall I not drink it?" What was happening? His betrayal and arrest, His trial and His soon crucifixion were all known to the Lord: "The cup which My Father hath given Me, shall I not drink it?" [John 18:11].
All of His life, all of it, even His preexistent life, Christ lived in the shadow of the cross. There is a very famous painting. It is a picture of the Lord Jesus in the carpenter’s shop. He looks to be a young man, a lad about eighteen years of age. And the artist has so drawn Him as He stands in the carpenter’s shop doing a carpenter’s work. Tradition says that He made ox yokes. And they also say in tradition that they were the easiest to bear. In the carpenter’s shop, working, somehow His hands being extended in the labor of the day, there is a distinct shadow cast by the young man against the wall to His back, and the shadow is that of a Roman cross. In that cross, in its shadow, in its inevitable, inexorable coming, Christ lived all the days of His life.
There is a very famous book in theological literature called The Quest for the Historical Jesus. It was written by Albert Schweitzer, that famous philanthropist and physician of the French Cameroons in Africa. I would not take away from the fame and the sweet spirit of that doctor, Albert Schweitzer, who gave the latter part of his life to a ministry to the poor and the sick in West Africa. But as a theologian he was anything but what I would call a devout Christian. The thesis of that book, The Quest for the Historical Jesus, is this: Albert Schweitzer wrote that Christ expected the apocalyptic descent of the kingdom of God from heaven, and when it did not come, there was no apocalyptic descension of the kingdom at all. And when it did not come, Albert Schweitzer wrote in that theological tome, that our Lord died in disappointment, in defeat, in frustration, and in personal loss and agony.
There is not a syllable of that thesis that I believe. And there is not a sentence of that book that reflects the presentation of the purpose of Christ in His coming in this world, much less the deep atoning significance of His death. For all of His life, our Lord lived under the shadow of the cross, and He came into this world to die for our sins according to the Scriptures [John 12:27; 1 Corinthians 15:3]. It is not by His beautiful life that we are saved. It is by His suffering and His death. "By His stripes," not by His perfect life, "we are healed" [Isaiah 53:5; 1 Peter 2:24].
I have said that the whole existence of Christ, His pre-existence as well as the days of His flesh, all of His life was lived in the shadow of that cross. The tenth chapter of the Book of Hebrews portrays a scene in heaven before the world was made. And in that scene, described in the tenth chapter of the Book of Hebrews, the Lord, the Prince of Glory, the Christ of heaven, the pre-existent Jesus, says that a body has God prepared for Him.
For in the blood of bulls and of goats and of bullocks there is no remission of sin.
But a body hast Thou prepared for Me.
Somewhere before the age of the ages, before the foundation of the world, before the creation itself, somewhere in heaven there was a scene in which the Prince of Glory volunteered to die for the creation that should fall into sin and judgment [Hebrews 10:4-14].
When the Lord was presented in the Old Testament prophecies, always there is that overtone of suffering. David in the twenty-second Psalm wrote as though he were standing and looking at the cross. "They pierced," he said in that psalm, "My hands and My feet" [Psalm 22:16]. David never experience that, but by prophecy he was describing the cross of Christ.
You would think that Isaiah was an evangelist; fully, deeply, spiritually accurate as Matthew, Mark, Luke, or John. For when he describes the atoning work of our Savior, he speaks that upon Him all of our sins have been laid. He says, "God shall see of the travail of His soul, and shall be satisfied [Isaiah 53:11]. All we like sheep have gone astray; we have turned everyone to his own way; and the Lord hath laid on Him the iniquity of us all" [Isaiah 53:6].
When the enunciation, when the announcement was made of the birth of the coming King, it was in those terms, "You are to call His name Iēsous, Savior: for He shall save His people from their sins" [Matthew 1:21]. When John the Baptist introduced Him at the beginning of His public ministry, it was in those same terms, in that same image, "Behold the Lamb of God, that shall take away the sin of the world" [John 1:29].
There was not a Jew who heard that but in the morning, knowing of the morning sacrifice, and in the evening, knowing of the evening sacrifice [Exodus 29:38-39] – a lamb that was slain for the expiation of the sins of the nation. There was no Jew but when he heard that announcement knew the great atoning purpose of the coming of Christ into the world, to bear away our sins [Psalm 40:6-8].
Then the following ministry of Christ always under that shadow of a cross; in His Galilean ministry He took His disciples aside and taught them that He must suffer, and die, and be raised from the dead [Matthew 17:22-23].
In His last public ministry in Jerusalem when the Greeks came to see Him, He said, "The grain of wheat must fall to the ground and die. And I, if I be lifted up from the earth, shall draw all men unto Me" [John 12:24, 32]. The coming of the Greeks [John 12:20-21] brought to His heart the mind and the memory that He should die for the sins of the world.
Even in that glorious Mount of Transfiguration, Elijah and Moses were speaking to Him about His death which – and this is the most unusual construction – which He should accomplish in Jerusalem [Luke 9:30-31]. Not His death that He should die there, but His death which He should accomplish in Jerusalem; that is, it had a significant atoning purpose beyond any other death by which any man ever died in the world.
At the beautiful supper at Bethany when Mary anointed Him, and Judas and finally the other disciples found fault with the waste of the anointment, He said, "Leave her alone. As long as this gospel is preached this shall be spoken in memory of her, for she hath anointed My body for the burying" [Matthew 26:6-13]. He was to die, be placed in a sepulcher, and what Mary had done by prophetic faith was the anointing of His body for the tomb.
At the institution of the Lord’s Supper, "This is My body which is given for you,this is My blood which is shed for you" [Matthew 26:26-28; Mark 14:22-24]. And then last of all, after the trial there was laid on Him a cross and He, bearing His cross, went forth into a place called Golgotha, the "Place of the Skull" [John 19:17], and there they raised Him up beneath the sky and above the earth; and one crucified on one side of Him and one nailed to the tree on the other side [John 19:18]. And He died the central Man of all time and eternity; the great Savior, the God-Man, Christ Jesus [John 19:19-30].
The whole story of the whole Bible and the whole burden of the gospel is this: "That Christ died for our sins according to the Scriptures" [1 Corinthians 15:3]. The shadow of that cross has fallen across the entire world. This world could never be the same again, because Christ has died in it. The soil of this planet has drunk the encrimsoned blood of the Son of God. The world can never be the same again, never. Nor could we ever forget it or escape it, what Christ has done.
There may be other worlds; the scientists sometimes speculate that there are. There may be other planets, there may be other races, there may be other people, but there are none like this because the coming of Christ and the death of our Lord have set aside and apart this planet, this earth, from any other of God’s creation in all the stellar universe. How could we forget that it was here that Jesus came, it was here that He died, it was here that His blood was spilled out upon the ground? We could never forget or escape it.
One time, soon after the Second World War in southern France, we stopped at a British military cemetery. And I walked through that cemetery looking at those airmen, the Royal Air Force, the RAF airmen who had lost their lives in that conflict and were buried there in southern France. And as I walked, I saw a wreath on a cross; and there was a writing on the wreath. I walked over there, looked at it, and these are the simple words that I read, "His wife and his sons will never forget." This soldier man, this British Air Force pilot, had lost his life in that dreadful conflict, and he was buried there. And on the cross somebody had hung that wreath, and on it the words that they at home could never forget.
We are like that in this earth. It could never be the same again because Christ lived here, and He died here, and it was here that He poured out His blood into this soil. This is surely and truly the great substance of the message of the Bible; it is the evangel itself. That’s what a man preaches when he preaches the gospel, that Christ died in our stead and for our sins [2 Corinthians 5:21; Romans 5:8; Isaiah 53:6-9].
The disciples, the apostles, stood under the shadow of the cross to proclaim the grace of the Son of God. And every sentence and every word that they left behind is stained by His blood.
The apostle Paul of whom I preached this morning said, "God forbid that I should glory, that I should boast, save in the cross of our Lord Jesus Christ" [Galatians 6:14]. And in the grace of God and in the preaching of the evangel, it has become the sign and the aegis of our hope for heaven.
If I were looking for a sign of hope, and of God, and of heaven, and of assurance, I would seek it in a cross. When I see it raised above a fallen form, I know that somebody there believed in the preciousness, and the goodness, and the mercy of Jesus our Lord. The cross of Christ is the sign of our salvation and of our hope of heaven.
It is last of all the incomparable invitation of God to the people of the whole world; for the arms of the cross are extended on either side, wide as the world is wide. Thus does God predict for us the mercy and grace of heaven that saves us. As far as the east goes east and as far as the west goes west are the arms of the cross extended. It includes us all. It reaches out to us all.
In the presence of the death of Christ, there are no distinctions. There are no rich and poor. There are no famous or infamous. There are no male and female. There are no bond and free. There are no black and white. We are all one in the presence of the death of the Son of God.
I never read a prettier story than this of the Iron Duke of Wellington, who was used of God to save England from the onslaught of Napoleon. And England literally worshipped the Iron Duke of Wellington. He is buried in St. Paul’s, the great national cathedral.
The story is told that, in keeping with the Episcopal way of worship, the great Duke of Wellington was kneeling at the altar to receive the elements of the Lord’s Supper. And as he knelt there to receive from the hand of the officiating minister the elements of the Lord’s Supper, there was a ragged, dirty bum of a man who came and evidently not knowing who he was, knelt by his side. And the officiating minister looking at it said to the ragged bum, tapped him on the shoulder and said, "Move away. Move away. This is the great Duke of Wellington; move away."
And the Duke, overhearing what the minister said, replied in these words, "Sir, leave him alone. Leave him alone. There are no distinctions here. The ground is level at the foot of the cross." There are no high and mighty. There are no low and outcast. There are no big and great. There are no despised and small. But in the arms of the cross all of us find an equal welcome.
And that is so poignantly true when we take the Book of Hebrews and follow the comparison of that God-inspired preacher [Hebrews 12:18-20] when he speaks of Mt. Sinai with its thunder and its lightening [Exodus 19:16]. Yea, so terrible was that sight that Moses said, "I do exceedingly fear and tremble" [Hebrews 12:21]. And God said, "If any creature should touch the mount, he should die" [Hebrews 12:20; Exodus 19:13]. It was an awesome sight: the God of judgment, giving the Ten Commandments [Exodus 20:1-17]. This do and thou shalt live [Deuteronomy 4:1],disobey, break these, and thou shalt surely die; the God of judgment and of fire and of wrath – Mt. Sinai.
But the author of Hebrews compares that with Mt. Calvary, "For we are not come," he says, "to the mount that if one touched it he died, that was filled with fire and fury and judgment. But," it says, "we are come to Mt. Zion, to Mt. Calvary, to the general assembly of the first born whose names are written in heaven, to the great convocation of angels who praise the blessed Jesus, and to the spirits of just men made perfect, and to the blood of the covenant that washes our sins away" [Hebrews 12:18, 22-24].
Anybody can come to Mt. Calvary. Anybody can kneel at the cross. Anybody can look up to Jesus. Anybody can importune His mercy, and His grace, and His forgiveness; that is the gospel of the Son of God. The arms of the cross reach out for us all.
Glory, glory to His name.
Amen. Amen. Now tonight we are going to have a twofold invitation. You are going to say this is so strange. No, we’re just all loving Jesus and working for Jesus, whatever we do.
The first invitation is for all of you, our staff, our leaders, all of you who are going to work in our Vacation Bible School that begins in the morning. Our first invitation, if you will just love God all over again and dedicate yourself all anew to the Lord, in a moment I want you to come down here for a dedicatory prayer.
And then the second invitation will be to give your heart publicly to Jesus, to put your life in the circle and the circumference and fellowship of this dear church.
Now the first invitation: the staff, and all of our leaders, and sponsors, and directors, and helpers in Vacation Bible School, if you are going to be here in the morning and you are going to work with us and help us in our Vacation Bible School, I want you to get out of your seat right now – wherever you are – and immediately come down here and kneel for this prayer of consecration. All of you, all over the house; there will be a great group of you, a great group of you.
When you fill up the place here at our altar rail, why, fill up the front of the auditorium and fill up the aisles. And the Lord in heaven bless and sanctify and hallow this dedication of life, and endowment, and talent, and love, and God’s mercy. Just give it all to Jesus and ask the dear Lord to bless us as we take these children and seek to guide them into the fullness of God’s love and grace and mercy in our living Lord.
We have an incomparable opportunity in these days of teaching and training. It means so much to us, who seeking to reach the hearts and lives of these boys and girls, this is our greatest single opportunity, and we want to ask God’s blessings upon it.
Now, Lord, bowed before Thee are these scores of leaders and directors and helpers. And we pray the presence of Jesus shall be with them and us in the morning. We pray for the throngs of boys and girls who will be here. And as we learn to sing the songs about Thee, and as we learn why Jesus came into this world, and as we seek to present to the boys and girls, who in some instances, have never had an opportunity to accept Jesus as Savior; we pray that the Holy Spirit will guide these words of appeal and especially, Master, bless this pastor as he holds those evangelistic services with the older groups, and as he invites to come to Jesus in faith for salvation those who will place their trust in Him. And dear Lord, when the two weeks are done and the days of labor and ministry have passed, may we look back upon them and say these were the finest days in teaching and soulwinning that we have ever had in this dear church. We offer ourselves to Thee, Lord; bless, hallow. Use for Thee and for the good and the salvation of these boys and girls this effort that we dedicate in Thy dear name and for Thy dear sake, amen.
Thank you, sweet people; bless you in the work of the morning and of the week. Now, in a moment we shall stand and sing our hymn of appeal to you. A family you, or a couple you, or just one somebody you, to give your heart to the Lord, come and stand by me. "Pastor, this is my hand. I give it to you, a sign and a token that I have given my heart in faith to the blessed Jesus." A family you, coming into the fellowship of the church; or a couple you, in the throng in this balcony round, the press of people on this lower floor; there is a stairway at the back and the front and on either side and there is time and to spare. If you are on the last row in the balcony, come. If the Spirit bids you here tonight, make it now. Decide now, and come. Into that aisle, down to the front, "Here I am, pastor. I am coming now." Do it, make it now, come now, while we stand and while we sing. | 2019-04-24T16:26:37Z | https://wacriswell.com/sermons/1972/the-shadow-of-the-cross-3/ |
Lupus is an autoimmune disease that can affect the joints, heart, nervous system, brain, skin, lungs and kidneys. It is a chronic condition. If you have lupus, you experience periods when the condition is active, known as flares, separated by periods of remission when you feel normal.
Lupus occurs when our immune system mistakenly begins to react against elements of the body's own cells as foreign material. Immune cells manufacture antibody molecules that cause damage and inflammation to the targeted tissues and organs.
The causes of lupus are not completely understood. Autoimmune diseases in general still present a challenge to medical science and lupus is no exception. Genetic as well as environmental factors can contribute to the development of lupus in an individual.
Lupus can be difficult to diagnose. The symptoms of lupus are common to other conditions and symptoms often vary between individuals. There is no single definitive test for lupus. As a result, lupus can sometimes take a long time to be diagnosed correctly.
Because it can be difficult to recognize and diagnose, it is also hard to know exactly how common lupus is. Recent estimates are that about five million people worldwide have the disease.
There is currently no cure for lupus. However, the advances that have been made in understanding lupus have transformed it from an often fatal condition to a manageable one. Correct treatment combined with lifestyle adaptations can now allow most people with lupus to lead normal lives.
A partial or complete reversal of the course of illness, such as cancer or a chronic disease. Remission can be spontaneous or the result of therapy.
Memory loss, confusion, headaches, seizures or dizziness.
Some people will experience only one or a few signs, confined to one part of the body (such as the skin). Others will experience signs in multiple parts of the body.
Lupus erythematosus appears as a 'butterfly rash' on the face.
The causes of lupus are not well understood. It is clear that genetics plays a large part. For instance, an identical twin of a person with lupus has a one-in-four chance of developing the condition. There is no single gene that causes lupus. Several different genes (more than 40 at last count) affect a person's susceptibility to lupus, as well as determining which part of the body is affected.
It is equally clear that lupus is not just a genetic disease. Lupus appears to be a combination of a genetic disposition triggered by environmental conditions.
It should be noted, however, that lupus can sometimes appear even without any particular exposure to any of these triggers.
While lupus can appear in people of all ages and kinds, some people are at greater risk than others.
Lupus is more common among adults than children.
Women are nine times more likely than men to develop lupus, particularly women of child-bearing age (15-44 years old).
Lupus is more common in certain ethnic groups than in others. People of European descent appear to be less likely to develop lupus, while people of African-American, Native American, Hispanic and Asian background are at an increased risk. These populations are also more likely to experience more severe symptoms of the disease. Lupus is thought to be more common in certain countries than in others. However, this might be the result of differences in diagnosis and reporting, rather than the true incidence of the condition.
People who have close family members with lupus are more likely to develop lupus themselves.
Systemic lupus erythematosus (SLE) is the most well-known form of lupus and the one most people mean when they say 'lupus'. The condition can affect any part of the body. The course of disease can range from mild to life-threatening. About 15% of the people who have SLE first develop symptoms in their teens. SLE will most often affect the kidneys, joints, skin, heart, lungs, blood vessels, liver and the nervous system.
If you have SLE, you experience periods when the condition is active, known as flares, separated by periods of remission when you feel normal. Treatment of SLE focuses on controlling its symptoms by the use of immunosuppressive medication - drugs that suppress the immune system's activity - and other types of drugs that help alleviate the symptoms.
A mild form of lupus, discoid lupus erythematosus (DLE) is an inflammation of the skin. It typically appears as round, raised red marks on the skin, particularly on exposed areas of the skin such as the face, ears and scalp. These can thicken and turn crusty with time and create permanent scars. DLE can also cause hair loss and bald patches. DLE can last anywhere from days to years. It may disappear, then recur at a later time. The condition can be successfully treated with medication and by avoiding exposure to sunlight.
This form of lupus can be a side effect of certain medications, including drugs for thyroid and heart conditions, high blood pressure, tuberculosis, oral contraceptives, anti-seizure medication, antibiotics and antifungals. The symptoms are like those of SLE - mostly joint and muscle pain and arthritis. Symptoms can start at any time, from a month to 10 years after starting to take the medication, but normally stop when the drug is no longer taken.
This form of lupus is characterized by skin lesions on sun-exposed areas of the body (neck, upper back, shoulders, chest, arms and hands), but rarely on the face and scalp. After they heal, the lesions do not leave scars on the skin, but the skin's color may remain altered. Subacute cutaneous lupus erythematosus can occur together with other types of lupus and rarely develops into serious SLE. Treatment normally involves medication and avoiding exposure to the sun.
This is a rare condition that occurs in infants. The affected babies can be born to mothers with SLE or Sjögren's syndrome (another autoimmune disease, see 'Complications' below), but also to healthy mothers. It is important to note here that most babies born to mothers with SLE will be healthy.
A medication that kills fungi or inhibits their growth.
A large gland located in the lower front part of the neck that produces hormones that regulate metabolism, growth and development, especially during childhood.
2. Okon L.G. and Werth V.P. (2013) Cutaneous lupus erythematosus: diagnosis and treatment. Best Practice & Research. Clinical Rheumatology 27:391–404.
Lupus diagnosis can be challenging. The symptoms can be so varied and appear at such irregular time frames, with long periods of apparent wellness in between, that even suspecting lupus can often take a long time.
A doctor will typically make an initial lupus diagnosis on the basis of a patient's history and a physical examination. Laboratory tests will help confirm the diagnosis and rule out similar conditions (such as rheumatoid arthritis). After lupus has been diagnosed, tests can be performed regularly to help monitor its progression.
Echocardiography to check for heart problems.
A blood test to detect antinuclear antibodies, which are antibodies that target molecules within the body’s cells.
A blood test that measures the rate of red blood cell sedimentation at the bottom of a test tube, which is an indicator of the level of inflammation in the body.
A localized abnormality in a bodily tissue, usually caused by injury or disease.
Lupus is normally treated with several types of medication. The two main goals of lupus treatment are to reduce inflammation and to prevent the immune system from further damaging the body. Different people can have different responses to the various treatments; a process of trial-and-error is sometimes necessary before the best treatment course is found.
Non-steroidal anti-inflammatory drugs (NSAIDs) help reduce inflammation and the symptoms associated with it, such as swelling and muscle aches.
These drugs, originally used to treat malaria, were found to benefit people with lupus. They help modulate the body's immune response, though it is not clear how they work. Antimalarial drugs, particularly hydroxychloroquine, can help alleviate SLE symptoms, as well as prevent SLE flares from occurring.
Corticosteroids are a class of drugs that mimic the body's natural anti-inflammatory hormone, cortisol. They often exhibit quite powerful and fast-acting effects - and side effects, particularly if used long-term. For this reason, they are used only in severe cases of SLE, or to help control flares in the short-term. Doctors try to find the lowest effective dosage and combine corticosteroids with other forms of medication for better effect.
Immunosuppressants are a class of drugs that kill off immune cells or actively inhibit their creation, thus reducing the potency of immune reactions. Like corticosteroids, these are powerful drugs that can also have serious side effects and are used mainly for treatment of severe SLE.
In recent years, a number of new immunosuppressive drugs have been proposed and trialed for treating severe SLE that does not respond to other forms of therapy. Rituximab and belimumab are two that have been approved for use in some countries.
Stem cells are being trialed as transplant therapy for severe and persistent cases of lupus that do not respond to current treatments. This advanced type of therapy is still very much in its first stages and involves considerable expertise and expense.
The transfer of an organ or tissue from one body to another, or from one part of the body to another, for therapeutic purposes.
Kidney disease, or lupus nephritis, is a chronic inflammation of the kidneys. It is a common, serious and potentially fatal complication of SLE, developing in up to 70% of SLE cases. Both men and women can be affected, with men being more likely to suffer more severe complications. Lupus nephritis is caused by the body's immune system targeting cells in the kidneys, resulting in chronic inflammation. Symptoms, in addition to the ones for SLE mentioned above, include foamy urine, increased blood pressure and swelling in the arms, legs, feet and hands. If treatment is not successful, kidney problems will appear and may lead to kidney failure and the need for dialysis or, in some cases, a kidney transplant.
Blood tests for analyzing kidney functions.
Lupus increases the risk of heart disease. Heart and circulation problems are responsible for a large share of deaths from the disease. Heart disease in lupus can take on many forms - it can cause inflammation of the blood vessels (veins and arteries), which may lead to atherosclerosis (a stiffening of the blood vessel walls). In addition, lupus can affect the heart itself, its valves and the membrane surrounding it (the pericardium). There may be other yet unknown factors responsible for the link between lupus and heart disease.
About half of SLE patients experience respiratory problems of one type or another, stemming from inflammation of the lungs, the airways, or the tissues surrounding them. The blood vessels leading to and from the lungs can also become inflamed, affecting lung function. People with SLE can experience chest and breathing pain, shortness of breath and a dry cough. If the diaphragm muscle has been damaged by SLE inflammation, it can lead to pain when breathing in.
SLE itself changes the immune system and may reduce its ability to fight infection.
People with SLE are not generally at a greater risk of developing cancer. However, there are some types of cancer, particularly leukemia and lymphoma, which are more common in people with SLE than in the general population. Conversely, some types of cancer are less common in people with SLE than in the general population. The immunosuppressive medication that is used to treat SLE has not been found to increase the risk of cancer.
When the central nervous system (brain and spinal cord) is affected by lupus, this can lead to a variety of symptoms including headache, dizziness, depression and changes in behavior.
People with lupus often complain of difficulties in thinking clearly and processing information, particularly during a lupus flare. Confusion, fatigue, difficulty concentrating and memory loss are commonly reported. This is sometimes referred to collectively as cognitive dysfunction, or colloquially as 'lupus brain fog'. The causes of this syndrome are not quite clear, but appear to be linked to the action of antibodies on brain cells and to changes in blood flow to the brain. These spells come and go, with each individual spell typically lasting only a few minutes. This condition does not get worse over time. It is managed mainly using behavioral therapy.
The peripheral nervous system (PNS) is responsible for sensation and movement of the body. When lupus disrupts the action of the nerve cells that constitute the PNS, the affected person may experience many symptoms, depending on which nerves are affected. Vision problems, eyelid drooping, ringing in the ears and dizziness are common complaints.
The autonomic nervous system (ANS) is responsible for regulating the actions of the body's automatic systems that we do not consciously control (the digestive system, heart, bladder, etc). When lupus disrupts the action of the ANS, it may cause a wide range of symptoms, including (among many others) difficulties in digestion, numbness, nausea and vomiting.
A common syndrome that is caused by a decrease of blood flow to certain areas in the body, Raynaud's phenomenon is caused by an overreaction of the capillaries in the extremities of the body - typically the fingers and toes - to cold temperature. The cold makes these tiny blood vessels contract, preventing blood reaching the body part. The fingers or toes then lose their natural color and appear white, turning to bluish and finally red.
This is a reaction of the immune system against the glands of our body that produce saliva and tears. The immune attack of the glands reduces their ability to operate and produce tears and saliva, which causes a chronic dryness of the mouth and the eyes. People who have Sjögren's syndrome often complain of difficulties in swallowing and a dry cough and are more likely to develop mouth infections and dental problems. Eye dryness can cause itching, blurry or distorted vision and increased sensitivity to light.
Also known as Hughes syndrome, this occurs when the immune system manufactures antibodies against proteins in the blood. As a result, blood clots form in the bloodstream. These can cause a large and varied number of problems throughout the body. Hughes syndrome is perhaps most notable for causing a large number of miscarriages and fetal deaths, as the mother's thickened blood cannot pass to the fetus through the placenta. It can normally be treated with blood-thinning medication, such as aspirin.
Common side effects of NSAID treatment for lupus include mainly the risk of stomach inflammation and ulcers. Other side effects include kidney problems, headache, confusion and dizziness.
The common side effects of antimalarial medication for people with lupus mostly include digestive problems and some skin complaints.
A mechanical blood-filtering treatment that mimics the function of your kidneys, which normally work as your body’s natural filtration system to remove the body's waste products from the blood.
Non-steroidal anti-inflammatory drugs are commonly used to manage arthritis-related pain and inflammation and other musculoskeletal disorders. NSAIDs include aspirin and ibuprofen.
All cells of the nervous system outside the brain and spinal cord.
A cancer of the blood-forming cells that commonly leads to an overproduction of abnormal white blood cells.
A condition marked by sudden constriction of the small arteries, often to the fingers and toes, in response to cold temperature or stress. This causes a characteristic change in the skin color, and feelings of cold and/or numbness in the affected areas.
Capable of suppressing the immune system.
3. Pateinakis P. and Pyrpasopoulou A. (2013) Targeting the B-cell pathway in lupus nephritis: current evidence and future perspectives. The Scientific World Journal 2013 745239. | 2019-04-20T22:37:47Z | https://healthand.com/us/topic/general-report/lupus |
Past I-O psychology program ranking surveys have differed in a number of respects such as sample type and size (e.g., faculty, students), type of data collected (e.g., objective, subjective), and number of programs ranked, the majority focused on ranking doctoral programs based on research productivity (Beiler, Zimmerman, Doerr, & Clark, 2014; Gibby, Reeve, Grauer, Mohr, & Zickar, 2002; Oliver, Blair, Gorman, & Woehr, 2005; Payne, Succa, Maxey, & Bolton, 2001; Winter, Healy, & Svyantek, 1995). An exception is the research of Kraiger and Abalos (2004) who surveyed masters and doctoral students with a focus on nonresearch factors (e.g., instruction quality, faculty support, funding, class size).
Given that previous survey research focused on doctoral programs and research output, our proposal extended current rankings by concentrating on master’s level programs and on applied experiences. Additionally, we relied upon objective data. The highlighting of applied experience seemed warranted given that applied skills are arguably more pertinent to ranking MA/MS programs as compared to assessing doctoral training. Indeed, past research on master's I-O programs have discussed the vital role of application of classroom material through such mechanisms as consulting projects and internships (e.g., Hays-Thomas & Kass, 2003; Lowe, 1993; Kottke, Shoenfelt, & Stone, 2014; Schneider, Piotrowski, & Kass, 2007; Shoenfelt, Kottke, & Stone, 2012; Shoenfelt, Stone, & Kottke, 2013). Also, the focus on application is consistent with SIOP's Guidelines for Education and Training, which recognizes that graduates of master’s programs are more likely to be consumers of I-O research (e.g., using the literature to solve work-related problems) than they are to be researchers themselves. We wrote items, a priori, to assess the following dimensions: (a) applied experience, (b) curriculum, (c) faculty experience/information, and (d) student accomplishments/information. We discuss each of these dimensions and their rationale below.
The first, quintessential dimension—applied experience—reflects the degree to which students are engaged in various real-world opportunities to use their I-O skills. These include the availability of applied projects, internships, and the presence of a consulting unit. Such activities provide enriching applied experiences for graduate students (e.g., Byrne et al., 2014; Dickson & Mullins, 2016; Kottke et al., 2014).
Curriculum is inherently critical to ranking educational programs. The curriculum dimension included number of credit hours, I-O-related credit hours, time to graduation, proportion of students who graduate on time, and course offering. Our assessment of I-O masters programs’ course offerings was based on past work that identified the importance of specific courses and competencies for graduate study. This work included the SIOP Guidelines for Education and Training in Industrial Organizational Psychology (2016) as well as other relevant research (e.g., Erffmeyer & Mendel, 1990; Tett, Walser, Brown, Simonet, & Tonidandel, 2013; Trahan & McAllister, 2002).
In parallel to historical rankings that have assessed programs based on faculty research productivity (see citations above), faculty applied experiences and qualifications are a component of our ranking procedure. Faculty applied experience was included to help applicants evaluate the type of mentoring they can expect in a program. One might expect that faculty who themselves have engaged in applied experiences (e.g., consulting clients) would be better able to supervise students who are engaged in hands-on experiences (e.g., fieldwork, internships, projects) by modelling the expected behavior. This is the educational approach suggested in the SIOP Guidelines (2016) for building professional competence. Faculty experiences/information included faculty-to-student ratio, proportion of faculty who engage in consulting, and proportion of faculty who supervise consulting projects. Because scholarship is essential to quality applied intervention, we also included an item to reflect faculty research productivity.
The assessment of student accomplishments evaluates programs in terms of what applicants could expect while matriculating (e.g., assistantships) as well as upon graduation (e.g., obtaining jobs). To the extent that strong students help attract and retain other strong students and build the reputation and human capital of a program, student accomplishments can be viewed as an indicator of program quality (cf. Schneider, 1987). Perhaps more intuitively, student accomplishments can be viewed as an outcome of program quality. Therefore, we decided to present program rankings on the student accomplishments/information dimension as well as an outcome of the other three factors that we measured. Student accomplishments/information included items concerning percentage of non-doctoral-bound students who obtain an I-O job within a year, active participation in I-O-related student chapters, assistantships, graduation rates, and presentations at conferences.
Prior to administering the survey, the project was approved by the university’s institutional review board. After receiving the contact information for each of the 127 coordinators of I-O MA/MS programs from SIOP, we sent emails to each coordinator with a brief description of our research, informed consent, and a link to our survey in Qualtrics. We surveyed coordinators of terminal master’s programs as well as MA/MS programs contained within doctoral programs. Weekly reminders were sent to coordinators to increase the response rate. These updates targeted coordinators who had not yet begun the survey or whose survey responses were incomplete. Overall, coordinators were allowed approximately 6 weeks to complete the survey. This extended time was provided because several items required coordinators to assess archival data (e.g., graduation rates) in order to provide accurate responses.
The final survey consisted of 53 questions. The items were written and placed into the four dimensions noted earlier for ranking purposes: applied experience, curriculum, faculty expertise/information, and student accomplishments/information. Additional items assessed "demographic" program data that were not used for ranking purposes (e.g., faculty diversity, job tenure, private or public university). At the end of our survey, we provided a link to a page provided by a team of researchers at Appalachian State University who were conducting a different ranking survey for SIOP.
The items on the survey were developed using several factors. One was the inclusion of items to collect program data that are regularly reported by SIOP via input from program coordinators, (e.g., number of I-O faculty, graduate employment, average program completion time). Other items were written to be consistent with previous surveys (e.g., Tett et al., 2013) and SIOP's 2016 Guidelines for Education and Training in Industrial-Organizational Psychology (e.g., curriculum coverage, applied focus for MA/MS programs). Finally, the items were reflective of those contained in previous program ranking surveys, such as applied experience, coursework, financial aid, and student research opportunities (Bulger, Horvath, & Zickar; Kraiger & Abalos, 2004). We originally planned to conduct a pilot study from a random sample of I-O coordinators to assist in item construction, but the tight timeframe for data collection made this approach untenable.
Because items varied in terms of response format (e.g., ordinal categories, continuous data), all responses were scaled from 0 to 1 in order to sum items into category scores. For example, responses were assigned point values (e.g., 0 to 5) based on higher scores being indicative of greater quality (e.g., number of hours needed for internships, total I-O related hours required, total program hours, number of I-O faculty). Points were then divided by the number of options that were available on each item. Further, items that asked about proportions were divided by 100 (e.g., percent of I-O students who graduate, percent of students who do an internship). Items were averaged together to create category scores on which programs were ranked. Finally, category scores were combined to provide an overall ranking. Data cleaning was informed by content coding of qualitative write-in responses, referencing the SIOP program database, and in some cases, replying to emails from respondents.4 For instance, in order to enhance the accuracy and consistency of survey responses, we responded to several emails to clarify the meaning of various items.
Means, standard deviations, and intercorrelations among dimensions are presented in Table 1. Programs were ranked on each of the scale facets as well as overall. Top five rankings for each dimension are presented in Tables 2 to 5. As indicated earlier, we also regressed Student Accomplishments/ Information onto each of the other facets: Applied Experience (β = .29, p = .02, R2 = .08), Curriculum (β = .29, p = .02, R2 = .09), and Faculty Experience/Information (β = .35, p = .02, R2 = .12). Each significantly predicted Student Accomplishments/Information. The top ten rankings overall—an average across the four dimensions—is presented in Table 6.
This project presents a contribution to SIOP and potential graduate students. Specifically, past program rankings have primarily assessed academic factors that are more relevant to doctoral-level education. However, a strength of the current study is that it focused on applied factors, which are more applicable to the mission of I-O master’s programs and more pertinent to graduates who are likely to become practitioners. Also, besides providing an overall program ranking, our results offer rankings on four specific, relevant program dimensions. This approach was a major focus of our survey, which was to provide prospective students with a useful way to view the quality of master’s programs on multiple dimensions. As such, this article provides students with a resource to help them choose the right program for them based on the dimensions they consider to be most important. That is, they can decide whether to focus on overall program rankings or emphasize specific program components (e.g., applied experience, curriculum). Our findings can also be used as a benchmark for I-O faculty who want to build or enhance their programs while also allowing them to emphasize key, positive programmatic features to appropriate audiences.
Our project has limitations as well as strengths. Ideally, formative measures should be identified and validated with criterion-related validity evidence using structural equation modeling (e.g., Diamantopoulos, Reifler, & Roth, 2008). However, our sample size and project scope did not permit such a validation effort. Regression results and facet intercorrelations, however, provide some evidence of criterion-related validity. The content of some items could be considered as being related to more than one category. This was especially true regarding the “applied experience” and “curriculum” dimensions. For instance, questions about practicums, internships, and the number of courses requiring formal presentations were included under the “applied experience” category, although they can also be considered as part of a program’s curriculum. Also, as noted before, our student accomplishments/information dimension contained program factors (e.g., availability of graduate assistantships) as well as program “outcomes” such as gaining employment after graduation and graduation rates. Our regression analysis partly addressed this issue by using student accomplishments/information as an outcome variable. Regardless of how this dimension is conceptualized, its contents are likely to be considered by students in evaluating the quality of I-O master’s programs.
Our survey required answers to objective items. However, it is possible that some I-O coordinators may have interpreted the meaning of various questions differently (e.g., what qualifies as an internship or an applied project, the extent to which various topics are covered in the curriculum). Also, certain data may not have been readily available to coordinators (e.g., what percentage of graduates receive an I-O –related job within a year, what percent of I-O students presented papers at conferences). If so, the accuracy of the responses could be an issue. Regarding the latter point, I-O programs would benefit if their coordinators established mechanisms to track and assess program quality and indicate areas for improvement. Finally, some programs were too new to adequately answer many of the survey questions (e.g., graduation rate). Therefore, they were not included in our rankings.
A strength of our project was its focus on objective, quantifiable factors rather than potentially biased opinions of satisfied (or dissatisfied) respondents. We tried to include data that most program coordinators would likely be collecting as they assess and track their own programs. Finally, at 54%, our response rate was quite respectable, thus adding to the representativeness of our findings. With more and more programs competing for qualified students, we expect that future updates to the rankings will include data from all available programs. The survey results could help guide decision makers (e.g., curriculum, applied experiences) in taking steps to improve their individual programs. It is our hope that the discrete, objective information contained in our results will be combined with additional subjective data that will allow prospective students to identify programs that best fit their interests and career goals.
1 The authors wish to thank Skye Evans and Michael DeNoia for their assistance on this project.
2 Eleven surveys were partially completed and were not included in the analyses.
3 In one case, an international university’s response had to be omitted for the curriculum dimension because they used a points system rather than a credit hour system; no conversion was available.
4 Data were extensively cleaned prior to analysis. Additional detail on specific data cleaning decisions is available upon request from the authors.
Bulger, C. A., Horvath, M., & Zickar, M. (2006). Industrial-organizational (I-O) psychology graduate school rankings: A guide for I-O graduate school applicants. The Industrial and Organizational Psychologist, 43, 121-131.
Diamantopoulos, A., Riefler, P., & Roth, K. P. (2008). Advancing formative measurement models. Journal of Business Research, 61, 1203-1218.
Dickson, M., & Mullins, M. (2016, April). Formalized programs for providing graduate students with professional practice experience. Programs for Graduate Student Professional Practice. Panel discussion presented at the 31st Annual Conference of the Society for Industrial and Organizational Psychology, Anaheim, CA.
Hays-Thomas, R., & Kass, S. J. (2003). Integrating classroom knowledge and application: The Industrial/Organizational Psychology internship presentation. Teaching of Psychology, 30(1), 70-71.
Lowe, R. H. (1993). Master's programs in industrial-organizational psychology: Current status and a call for action. Professional Psychology: Research and Practice, 24, 27-34.
Schneider, S. K., Piotrowski, C, & Kass, S. J. (2007). Training masters students through consulting experiences: Benefits and pitfalls. Organization Development Journal, 25, 47-55.
Tett R. P., Walser B., Brown C., Simonet D. V., & Tonidandel S. (2013). 2011 SIOP graduate program benchmarking survey: Part 3: Curriculum and competencies. The Industrial-Organizational Psychologist, 50(4), 69–90.
Trahan W. A., & McAllister H. A. (2002). Master's level training in industrial/organizational psychology: Does it meet the SIOP Guidelines? Journal of Business and Psychology, 16(3), 457–465.
Winter, J. L., Healy, M. C., & Svyantek, D. J. (1995). North America’s top I-O psychology/doctoral programs: U.S. News and World Report revisited. The Industrial-Organizational Psychologist, 33(1), 54-58.
a. Does your I-O program contain a formalized, applied internship within your curriculum?
b. How many hours are required to successfully complete the internship? If variable, provide an average. Type in number of hours.
2. Typically, what percent of students perform an internship?
3. Does your program allow for students to enroll in a practicum?
4. Does your program have a designated unit (e.g., consulting clinic, center) to acquire consulting contracts and/or grants?
5. How many courses in your program, including an internship, if applicable, involve students conducting applied projects (e.g., job analysis, training programs, organizational development) outside of the classroom?
6. How many courses in your program require formal presentations (group or individual) designed for applied audiences?
a. How many total credit hours are required for your I-O MA/MS degree? Please indicate in semester hours (1.5 quarter hours = 1 semester hours).
b. Given the number of hours in your program, what percent of MA/MS students graduate in the expected timeframe (e.g., “on time”)?
2. How many I-O-related hours (including research methods and statistics) are required for your I-O MA/MS degree? Please indicate in semester hours (1.5 quarter hours = 1 semester hours).
b. This was divided by responses to the following question: What number of students typically enter your I-O program each year?
3. How many I-O faculty have supervised I-O students on external consulting projects?
4. How many total articles have been published by your I-O faculty in refereed journals from 2012 to 2016, including “in press” articles?
I-O-related job within a year after graduation?
2. What percent of current I-O graduate students are active participants in I-O related student chapters (e.g., SHRM, ATD, IOPSA)?
3. What percent of current I-O graduate students received assistantships?
4. Of those who enroll in your program, what percent of your I-O students graduate?
5. What percentage of your MA/MS students have presented a paper or poster at a regional, national, or international conference in the past 5 years? | 2019-04-22T02:02:38Z | http://my.siop.org/tip/jan18/editor/ArtMID/13745/ArticleID/333/Ranking-I-O-Masters-Programs-Using-Objective-Data-From-I-O-Coordinators1 |
Musical ability has always been linked to enhanced cognitive and intellectual skills. We were interested in the relation between musical ability and short-time cognitive processing as measured by event-related potentials, in particular in visual processing, since previous studies have already suggested such a link for acoustic cognitive processing. We measured auditory and visual event-related potentials as elicited by an oddball paradigm in 20 healthy subjects (10 musicians and 10 non-musicians; 10 female; mean age 24 ± 2 years). In addition, the Seashore test and a test developed by the authors to detect relevant amusia, the latter one with a high ceiling effect, were also applied.
The most important finding was that there is a significant linear correlation between musical ability as measured by these tests and the P3 latencies of both the auditory and visual event-related potentials. Furthermore, musicians showed shorter latencies of the event-related potentials than non-musicians.
We conclude that musical ability as measured by neuropsychological tests is associated with improved short-time cognitive processing both in the auditory and, surprisingly, also in the visual domain.
Musical ability as a term is used to describe the sensitivity for music, the ability to understand music, and/or the ability to produce music. There is no standard definition, and it is hard to measure musical ability. One can only measure how well a person can perceive musical stimuli such as small changes in pitch, loudness, rhythm, and other sub-domains of music processing. It is generally accepted that some people show higher musical ability than others. But what are the correlates for the term ‘musical ability’ in the human brain? What are the differences between people with and without musical ability?
These questions and many others about music and music processing in the human brain have been a subject of interest in neuroscience research. The methods used in this field range widely from EEG, event-related potentials (ERP), magnetic resonance imaging (MRI) to the different methods of functional imaging. The processing of auditory stimuli and the differences in such processing between musicians and non-musicians have been investigated especially by means of auditory ERP which can objectively quantify latencies of stimulus processing. This evaluation is regarded as a measure for the quality of some aspects of cognitive processing such as stimulus evaluation, cognitive processing speed and internal short-term memory functions.
In general, rare target stimuli and frequent non-target stimuli are presented to subjects in ERP studies. The latencies and amplitudes of the potentials evoked by the target stimuli are analyzed such as the Mismatch Negativity (MMN or N2a) in auditory ERP studies and the P3 in both visual and auditory ERP studies. In previous music research studies, the subjects were either professional and non-professional musicians, people with absolute pitch, or non-musicians.
Looking at the results of different studies [1–5], one can sum up that musicians with absolute pitch ability and musicians with relative pitch seem to have a shorter P3 latency in the auditory evoked ERP and also a smaller P3 amplitude than non-musicians. The P3 could even not be found at all in some musicians with absolute pitch when the method that led to a P3 signal in all musicians with relative pitch was the discrimination between major thirds as non-target and minor thirds as target stimuli. In a timbre discrimination study , subjects with absolute pitch showed a shorter P3 latency and a smaller P3 amplitude than other musicians and non-musicians. The subjects had to differentiate between the sound of a tone with the same pitch played on a viola or a cello, on two different kinds of flutes and on two different kinds of tubas. In the last (tuba) part, the musicians showed a significantly shorter P3 latency than the non-musicians.
In a different approach, a piano phrase by Bach was used for eliciting ERP . They presented the original phrase (non-target) or the same phrase with an inharmonic note (target) or the same phrase with an unexpected mordent (target) to a group of musicians and a group of non-musicians. A shorter P3 latency for musicians could not be shown, but instead of that and among other results, a shorter N2 latency was detected. In a study in 1996 , the reaction time of musicians was shorter in comparison to non-musicians when the subjects had to discriminate between small differences in frequency. Further, it was incidentally found a significantly decreased P3a latency in musicians (i.e., vocalists and instrumentalists) compared to non-musicians, evoking the P3 by means of pitch deviants . The P3a signal was suggested to be a sensitive index of musical expertise.
All in all, the studies mentioned above suggest a faster discrimination of auditory stimuli in musicians (with or without absolute pitch). None of the studies had analyzed the latencies of visually evoked ERP, and only two [1, 10] have measured the amplitudes of the visually evoked P3 latency in subjects with absolute pitch, which was not found to be changed.
We raised the question whether people with absolute pitch have a different cognitive stimulus processing as measured by ERP, and not just a different processing of auditory stimuli, as most of the studies mentioned above suggest. In an experiment with three participating groups (musicians with absolute pitch, musicians without absolute pitch, and non-musicians), our group was able to show that both people with absolute pitch compared to non-musicians and musicians compared to non-musicians show a significantly decreased P3 latency in the auditory and visually evoked ERP . The P3 amplitudes were not significantly different. In a similar study, our group was able to show a significantly decreased auditory and visually evoked P3 latency in musicians as well as a larger amplitude of the P3 in the auditory domain .
In the present study, we were interested in aspects of the specific visual cognitive processing in musicians versus non-musicians. In particular, we aimed to correlate the ERP results of visual and auditory stimulus processing with musical ability as evaluated by a psychometric measure. We chose an oddball paradigm since this is a very easy task not detracting the probands too much. Furthermore, oddball paradigms are often used in research on musical cognitive processing in the past. Since a specific cognitive processing of ERP has been shown for auditory stimuli, a similar result for visual stimuli would suggest that musical ability is associated with a specific cognitive processing in all modalities.
As shown in Table 1, there were no significant differences between the two groups with respect to age and the scores of the Zerssen scale. All subjects showed a normal mental well-being. This is important since feeling unwell could impair the results of the musical testing.
The scores in the self-developed amusia tests and in the Seashore test are shown in Table 1. In average, the group of musicians scored 83.5 ± 1.2 out of 86 points in the amusia test as opposed to the group of non-musicians with a score of 67.2 ± 5.7 (p < 0.001). In the Seashore test, the results were significantly different between both groups for each of the six categories. The musicians’ total score was 233.4 ± 6.6, the non-musicians’ total score was 197.9 ± 22.7 (p < 0.001).
Table 2 shows the data of the visual ERP (elicited by an oddball paradigm with red light as target), Table 3 shows the data of the auditory ERP (elicited by an oddball paradigm with a high tone as target), presented separately for both groups. The analysis of the visual ERP resulted in significant differences in the P3 latency and the P3 habituation (i.e., difference of P3 latency in two different trials) after the target stimuli: the P3 latency was 390 ± 33 ms in the musician group and 411 ± 22 ms in the non-musician group (p = 0.043). The P3 latency habituation was 0.6 ± 7.8 ms (musicians) and 7.3 ± 11.0 ms (non-musicians) with a significance of p = 0.018. The evaluation of the mean choice reaction time, the P3 amplitude, and the signals occurring after the frequent stimulus did not result in any significant differences.
The latencies in the auditory ERP showed similar differences between the two groups: the P3 latency in the musician group was 328 ± 34 ms as opposed to 360 ± 10 ms in the non-musician group (p = 0.019). The P3 latency habituation differed by 23.2 ms between the two groups with a P3 habituation of −5.8 ± 19.6 ms in the group of musicians (p = 0.009).
We further calculated the correlation between the results in the Seashore test and the P3 latencies. As shown in Figs. 1 and 2, there was a negative correlation between the P3 latency of the visual ERP and the total score of the Seashore test (r = −0.470 and p = 0.036; Spearman-rank-coefficient), as well as between the P3 latency of the auditory ERP and the total score of the Seashore-test (r = −0.434 and p = 0.038). This means that a higher musical ability is correlated to a shorter visual and auditory P3 latency.
In the amusia test, the musicians scored significantly higher than the non-musicians, except for the categories ‘emotion’ and ‘identification of melodies’. The purpose of this amusia test was to rule out a clinically relevant amusia in the non-musician group. The average score of 67 is within the normal range of >60 . Therefore, the non-musician group did not have a relevant impairment of musical ability. One has to take into account that this test has a high ceiling effect and was not designed for measuring small interindividual differences in musical ability, although different categories of musical ability are tested. This explains why in two of the categories the results were not significantly different between musicians and non-musicians; and this is also the reason why we used the Seashore test results for further analysis of musical ability and the correlation analysis with the P3 latencies.
The musicians scored significantly higher in the Seashore-test. This confirms that the group of musicians has a higher musical ability than the group of non-musicians. But what are the reasons for this? Several studies have investigated the question whether a higher degree of musical ability in musicians could be a result of practice-induced cortical plasticity or an innately given talent [14–18].
In two studies [16, 17], non-musicians who had learned to play a certain rhythmical sequence or different melodic sequences showed an increased MMN in response to rhythm or pitch incongruities. Another group of non-musicians, who had just listened to the other group practising, did not show an increased MMN response. The authors interpret this finding as a sign of practice-induced cortical plasticity. Therefore, we assume that the musicians’ higher score in the Seashore test is a result of the musical training of 14 ± 2 years on average, although parts of the musical ability could also be a genetically driven talent.
It was shown that professional musicians compared to amateur and non-musicians have an increase in grey matter volume in several brain regions such as motor, visual-spatial, and especially auditory regions . Because of the associations found between structural differences, musician status, and practice intensity, the authors interpret their results as practice-induced adaptations of the brain. In 2009, changes induced by private keyboard lessons in young children who had no prior musical training were studied : the results showed that instrumental children (versus children in a control group) showed a greater size of certain motor and auditory areas after 15 months of training and that their outcomes in motor and melody/rhythm tests also improved significantly. Again, this supports the hypothesis of practice-induced musical skills going along with structural brain changes.
The P3 response to the target stimuli of both the visual and auditory ERP was significantly earlier in the group of musicians. This result confirms the results of previous studies [11, 12]. An early P3 response indicates fast stimulus processing and discrimination. Thus, musicians seem to be able to discriminate faster between auditory stimuli. Considering their long and special exposition to auditory stimuli in form of practising and listening to music, this result does not seem surprising.
Even though the mechanisms that determine latency of the P3 response have not yet been fully understood, there are several studies which have shown differences in the (auditory) brain structures of musicians. Several studies suggest a practice-induced brain plasticity and thus a functional and structural difference in auditory brain areas of musicians versus non-musicians [14–17, 19]. The fact that musicians show an earlier P3 latency than non-musicians and thus have a faster auditory stimulus processing may be associated with those results. Supporting this notion, a negative correlation between P3 latency and the years of musical training was found .
In our study, not only the auditory P3 latency was earlier in musicians but also the visual P3 latency. Musical training and/or musical ability therefore seem to affect also the visual perceptive system. This also goes along with the results of other studies concerning the musicians’ visual abilities. It was shown that musicians outperformed non-musicians in the ability of perceptual speed, which requires quick visual information processing . Visual memory was also reported to be better in musicians than in non-musicians [21–24]; even primary visual perception and somatosensory cognitive processing were reported to be enhanced in musicians. However, these studies used psychometric measures and did not evaluate cognitive processing in an objective way. A difference in grey matter volume in visual-spatial areas was found , going along with other results indicating an improvement of visual-spatial tasks in musically trained children.
In our study, we were also able to link the early P3 responses in the auditory and visual paradigms to the results of the Seashore-test and found a negative correlation between the data. In studies on musicians, a musician is usually defined as a subject who has learned to play an instrument for a certain amount of years and musicians can be classified as ‘professional’ or ‘amateur’. These definitions usually are the criteria for the participation of musicians in studies, but having had music lessons for a certain amount of years does not necessarily yield in a high musical ability. With our results, we showed that not just the status ‘musicianship’, but the amount of musical ability as measured by a psychometric test is related to the improved cognitive processing of musicians versus non-musicians.
All in all, people with high musical ability seem to have a faster auditory and visual cognitive processing. The question is, however, whether this connection between musical ability and cognitive processing is inherited or whether the acquisition of musical ability (i.e. long-term practice of an instrument) leads to an enhancement of cognitive processing. At this time, one can only speculate about the answer: on the one hand, fast cognitive processing is probably helpful for learning an instrument, which requires fast interaction of auditory, motor, and visual stimuli. One could even conjecture that musical ability is a congenital ability of cognitive processing. Some studies have shown evidence that the conditions upon which musical ability develops are innately predetermined. Hassler for example showed that a certain androgynous level of testosterone is characteristic of musicians, and that differences between musicians and non-musicians are possibly formed prenatally under the influence of hormones .
On the other hand it also seems plausible that by practicing an instrument the processing of all these stimuli becomes faster, which then might lead to the improvement of auditory and visual abilities, as shown in the studies mentioned above. In an MEG study, an enhanced auditory evoked magnetic field response concerning violin tones was shown in children who had been musically trained for 1 year . There has also been a study not connected to music, which showed alterations in adults’ ERP in response to an auditory discrimination task . Hence, it has been shown before that training can have an influence on stimulus processing and therefore it is plausible that musical training which leads to a higher amount of musical ability could have an effect on auditive and visual processing [31, 32].
All in all we suppose that there might be certain inherited conditions such as fast cognitive processing upon which musical ability develops but that a stimulating environment as well as long-term musical practice also leads to an improvement of cognitive processing and/or aptitude. This is also important for disturbances of cognition e.g. after stroke, after brain injury, or in different types of amusia [33, 34].
In our study, we calculated the P3 latency habituation and found that musicians showed a habituation for both the visual and the auditory latencies close to zero, whereas in non-musicians it was significantly higher. There is evidence that, in normal subjects, the visual and auditory P3 latency increases over trial blocks [35–38]. A loss of habituation in the visual P3 latency of migraine patients during the migraine interval was shown , similar to our findings of a loss of habituation in musicians. We believe that the loss of habituation and the generally decreased P3 latency in musicians indicate that musicians have a remarkable cognitive processing with the ability of keeping the processing of stimuli faster for a longer time than normal subjects. This could be an indicator of an improved working memory in musicians, as it has been reported by some authors [12, 39, 40]. Keeping the results from migraine patients in mind, it would be interesting to study whether in musicians a similar effect like the normalization of the habituation during a migraine attack could be observed after an interval of increased alertness.
A loss of cognitive habituation (or higher cognitive excitability) also means that stimuli on different levels might be processed faster and more accurate for a certain amount of time. This can be regarded as an advantage for musicians, e.g. when playing in an orchestra or playing both complex rhythmic and complex melodic music.
Our study has some limitations which have to be considered when interpreting our results. First of all, the concept of musical ability is still under discussion. There is no clear definition and no commonly accepted measure to evaluate musical ability. The sub-domains of musical ability as measured in both the Seashore test and the amusia test only include some aspects of musical ability which are commonly accepted as basic skills of musical ability (e.g., rhythm, loudness, pitch, duration of a tone, tonal memory); other aspects such as creativity, emotional perception of music, the ability of interpreting music etc. are not included because these aspects are hard to measure in an objective way. Nonetheless, they determine the amount of one’s musical ability. We accept that our study did not comprise all aspects of musical ability.
A second problem is the procedure of testing musical ability. The test results depend strongly on the cooperation and motivation of the subjects, which in turn is hard to evaluate. This leads to a reduced objectivity of the testing of musical ability.
Third, when looking at the P3 latency results one has to consider that they only apply to our testing range. Since we looked at P3 latencies that were within in the normal range and only included healthy subjects one cannot transfer the results of the correlation analysis to subjects with pathological P3 latencies, i.e. pathological P3 latencies certainly do not yield in a total lack of musical ability.
Fourth, it is not clear whether or to which extent a decreased P3 latency has an impact on everyday life. A decreased P3 latency implies a faster cognitive processing. Some authors suggest an improved working memory, but there is still an ongoing discussion about this (e.g., ).
Our most important finding is that measures in tests of musical ability are associated with decreased latencies in auditory and visual ERP suggesting that musical ability is associated with a general enhancement of cognitive processing.
Regarding the auditory P3 latency, we were able to reproduce findings of previous studies [1–5]. Additionally, we were able to show a significant correlation between the level of musical ability as measured by the Seashore test and both the visual and the auditory P3 latency. Also, a significant difference in habituation of the visual and auditory P3 latencies between non-musicians and musicians could be observed. These results cannot be attributed to a different mental state of the two groups, as this would have lead to significantly different results between the two groups in the Zerssen self-rating Scale.
We compared a group of musicians (N = 10; 5 male) to a group of non-musicians (N = 10; 5 male). The mean age of the two groups was 23 ± 2 and 24 ± 2 years, respectively. Musicians were defined by having received at least 10 years of private music lessons (mean 14 ± 2 years) and being active musicians (i.e., members of orchestras, chamber music groups, or choirs) at the time of the study. The non-musician group had no or very few (less than 2 years) music lessons in their lives. Exclusion criteria for the participation in the study were psychiatric or neurological disorders including migraine and epilepsy and medication on a regular basis except for oral contraceptives. Consumption of alcohol, nicotine, or caffeine was not allowed on the day of the experiment.
The experiment was always performed in the afternoon in a room without daylight. The room temperature was always the same. For the last part of the experiment, the recording of the ERP, the lights were turned off. All participants gave written informed consent. The study was approved by the local ethics committee.
In the beginning, the participants had to complete the Zerssen self-rating scale . The Zerssen scale measures the actual mental well-being with a score between 0 and 56. In the validation sample, a mean score of 12 ± 10 was described for healthy subjects. Only subjects with a score within the normal mean plus/minus one standard deviation in both measures were included in the study. Feeling mentally not well would impair the results of neuropsychological testing in an unappropriate way.
Then, two tests of musical ability were conducted. The first one was a test on amusia developed by the authors . In this test, the participants had to perform different tasks in the following five different categories: (1) production of rhythm/metrum by repeating different rhythms (knocking with a pin; (2) comparison of melodies (listening to two short melodies and deciding whether they are different or not); (3)emotional impression of music (listening to short pieces of new music which had to be categorized as happy, angry, frightening etc.; the impression could be said to the examiner or shown by different pictures showing the emotion); (4) pitch (comparison of two tones and deciding whether they have the same pitch or a different pitch); (5) identification of 14 commonly known melodies such as “Frère Jaques” or “Yesterday”. The maximum score of this test is 86 points, the higher the score the better the musical ability. This test was originally designed to detect amusia in neurological patients. It has a high ceiling effect, which means that a score of less than 90 % of the maximum denotes a relevant impairment. Therefore, the test is or poor value to detect small differences between individuals.
In order to evaluate the subjects’ musical ability in a previously designed test, we used the “Seashore test for Musical Ability” as a second test. It contains six different categories: (1) pitch; (2) loudness; (3) rhythm; (4) duration of a tone; (5) timbre; (6) tonal memory. The maximum score is 260. The subjects have to differentiate between small changes in pitch, loudness, rhythm etc. In the category pitch, for example, 50 pairs of tones are presented, differing in frequency from/between 17 and 2 Hz. The subjects are asked whether the second tone is lower or higher in frequency than the first. This test shows a nearly parametric distribution of scores and has no defined scores for amusia.
The second part of the experiment was the recording of visually and auditory evoked ERP. The subjects had to sit in a comfortable chair in a dark room. For the visually evoked ERP the subjects were looking at a 30 cm × 30 cm video screen, standing approximately 150 cm in front of them. Two trains of 200 flashes of light each with a 3 min break in between the trains were presented in a random order. We used 15 % red (target) and 85 % white (non-target) flashes of light. The duration of a single flash was 100 ms and the interval between two flashes was 1800 ms. Subjects were asked to press a button with their dominant hand whenever they observed a red flash. For the auditory evoked ERP, two trains of 200 tones each (3 min break between the two trains) were presented to the subjects. The target tones (15 %) had a pitch of 600 Hz, the non-target tones had a pitch of 325 Hz, they were also randomly mixed. Again, the subjects had to press a button whenever a target stimulus occurred. The duration of a tone was 100 ms, and the interval between two stimuli was 1800 ms.
In both ERP measurements (auditory and visual), the EEG was recorded by an amplifier using Ag/AgCl surface electrodes, which were placed at centroparietal (Pz), centrocentral (Cz), and frontocentral (Fz) (=recording electrodes) according to the international 10–20 system. They were linked to the mastoid (=reference electrode). EOG was also registered in order to exclude EEG periods with eye movement artifacts from the ensuing averaging process. A high-frequency filter was set at 70 Hz and a low-frequency filter at 0.1 Hz. The EEG was stored digitally. EEG periods of 300 ms before and 1100 ms after onset of the stimulus were averaged separately for the target and non-target stimuli.
The evaluation of the ERP latencies was performed by a physician who did not conduct the experiment and who did not know which subjects were musicians and which ones were not. The components of the ERP following the red/high and white/low stimuli were evaluated. We determined the latencies of the P1, N1, P2, N2, and P3 components and the amplitude of the P3 component, further we measured the mean choice reaction time (i.e., the time between onset of the target stimulus and pressing of the button) according to international recommendations . For both the visual and the auditory ERP, the curves of the first and of the second train (200 stimuli), separated in target and non-target stimuli, were averaged and then the latencies, the P3 amplitude and the mean choice reaction time were measured. By calculating the difference of P3 latency between the first and the second train, the P3 habituation could also be evaluated. The P3 component of the ERP was chosen as the main parameter since it is associated with endogenous (mainly stimulus independent) cognitive processing whereas the P2 and the N2 components are exogenous (i.e., mainly dependent from the physical properties of the stimulus).
We used non-parametric tests to analyze the correlation between the different test scores and the ERP parameters and to analyze group differences between musicians and non-musicians. For correlation analysis, the Spearman rank coefficient was calculated. For group comparisons, we used the Mann–Whitney U test. Multiple comparisons were corrected by Bonferroni correction. All calculations were performed by the program SPSS version 18.0. Significance level was set at p = 0.05.
All authors contributed to the design of the study, to the drafting of the manuscript and to the statistical analysis and discussion. SE and CF conducted the experiments. All authors read and approved the final manuscript.
There was no funding and no other sources of support for this manuscript. | 2019-04-26T14:27:01Z | https://bmcneurosci.biomedcentral.com/articles/10.1186/s12868-015-0200-4 |
In the seven years since we published the first edition of this text, applied theatre has continued to grow. A significant compilation of case studies and reflective theory about this artistic work appear in an extraordinarily wide variety of journals acrossdisciplines such as theatre studies, education, health care, law and others. There is also a growing body of texts that addresses this discipline (Hartley, 2012; Kuppers & Robertson, 2007; Nicholson, 2005; Prentki & Preston, 2009; Taylor, 2003; Thompson,2003, 2005, 2009; van Erven, 2001). Most recently, we are pleased to see a book series dedicated to applied theatre that takes up key concepts in contemporary research (Balfour et al., 2015; O’Connor & Anderson, 2015; Prentki, 2015; White, 2015). Thesecond edition of this text continues to provide an international overview for students and practitioners anxious to acquire a basic understanding of what applied theatre is and how it works.
Since the publication of the first edition we have seen many shifts in practice that we reflect here in this edition. Chapter Three is a new chapter on story and storytelling in applied theatre. We felt that this chapter was needed for students and practitioners,as story is an essential component of theatre and theatre-making that was not directly discussed in the first edition. Chapter Five is a new chapter in Part Two: The Landscape of Applied Theatre. It emerged from our awareness of the growth of documentarytheatre approaches in the field. We have refreshed the case study excerpts throughout the book and have included a total of 17 more recent examples from many locations. Our Further Reading lists have been expanded and updated and this edition offers WebResources of projects and companies at the end of each chapter.
Part One offers three chapters that provide a brief historical and theoretical overview and a general analysis of the roots, contexts and contents of practice. They serve as a background against which readers may place their own experiences as well as theirreading of the case studies that illustrate the ten categories of applied theatre that this text addresses. Following the introductory chapters, Part Two maps four core practices of applied theatre that we believe to be seminal to one’s understanding of the fieldand presents case studies in Popular Theatre, Documentary Theatre, Theatre in Education and Theatre of the Oppressed. The chapters in Part Three identify genres that evolved from the core practices identified in Part Two and are defined in part by theirintention: to heal, to raise sociopolitical awareness and to celebrate community through history and memory. In delineating these categories of practice, we recognize overlapping boundaries that can themselves serve as points of discussion reflecting theongoing development of this collaborative art form. Each chapter includes a brief contextual overview followed by excerpted examples of case studies of applied theatre projects. Drawing on these, we offer sources for further reading and raise issues forexamination and further investigation through questions for discussion. Each chapter concludes with suggestions for practical activities and Internet resources.
In assembling this text, we have selected from the diversity of applied theatre practices so that those new to the field or seeking examples of experience may gain a broader and deeper understanding of the potential challenges and rewards of working withcommunities – often non-experienced communities – through theatre. A number of readers may wonder why we have left out certain practices that some may consider to be applied theatre, such as drama therapy, simulations and employment skill training(e.g. with police, military, medical personnel and business people). Our decision is based on the recognition of applied drama as a process-based practice that does not generally involve a theatrical performance to an audience; this is the focus of ourcompanion volume to this text (Prendergast & Saxton, 2013). While much of applied theatre begins as process, working in similar ways to applied drama, the word theatre (theatron: seeing-place ) means that a public or semi-public performance is anecessary component of the work (King, 1981, pp. 6–11).
The final chapters of Part Four address contemporary issues about which there is continuing discussion and upon which rests the success or failure of applied theatre work. These challenges of practice involve participation, ethics, aesthetics, assessment andreflection. The text provides an overview of examples of applied theatre work in order to open up the reader’s appreciation for the breadth and depth of practice, and the final chapter and afterword begin to examine the properties that are indicative of effectivefacilitation and presentation.
Our selection process is focused on what we see as exemplary practices and draws on projects that have not previously appeared in book form; it is our intention to direct students of applied theatre to key journals in the field. The 38 case studies representapplied theatre practices on five continents and in 23 countries. This international scope points to the extraordinary power of theatre to engage and illuminate.
We have made every effort to keep words and punctuation as they appear in the original, but punctuation such as dashes, spacing and quotation marks have been standardized for ease of reading. Within the case studies, we use an ellipsis in brackets, [...], toindicate a significant cut, a regular ellipsis, ..., to indicate a small excision, and a spaced ellipsis, . . . , denotes the author’s own punctuation. Each of the case studies we have selected is surrounded by a rich context of theory, other examples of practice andvaluable insights that we could not include. We urge you to seek out the original articles and, following Augusto Boal’s (1998) advice, invite you to choose those of interest and not necessarily to read them in the order in which they appear in the text.
While there are exceptional descriptions of the work in other languages, this text is limited to studies that have appeared in English or in English translations. The majority of these case studies have appeared in academic journals and are authored byscholars who may or may not be applied theatre practitioners themselves. We note with pleasure that in the intervening years between editions there is an increasing documentation by local practitioners and participants in their own voices.
Popular Theatre: Fashionable Immigration is a University of Exeter popular theatre project that attempt[s] to address the many misperceptions about immigration (Price, 2011, p. 85). The play deals with a Polish girl named Anya who moves to Britain in search of work. She is exploited by an employer who confiscates her passport and forces her to work long hours under threat of being deported. Two laid-off local workers come to Anya’s aid and help to rescue her from this situation. This show is performed in three different ways: as seventeenth-century commedia dell’arte, as a puppet show with giant 12-foot-high puppets and as a musical. Each of these popular theatre versions is assessed for its impact on audiences (Price, 2011).
Documentary Theatre: A South African community-based documentary theatre project, Soil & Ash, gathers stories from those affected by a proposed coal mine being built in their community (Dennill, 2014). The mine owners are allegedly conducting bribes and other tactics that are fracturing the community’s sense of solidarity. The theatre project retells actual lived experiences and verbatim accounts of how the mine is affecting people, and how they feel it may effect them in the future. To do this, we cannot rely on the traditional theatre process in which stories are imagined or interpreted by a few separate people outside of the situation, and then merely dramatised on stage (Dennill, 2014, n.p.).
After each performance – held in community centres, local schools, churches and also at sports events – audiences engage with performers in a facilitated dialogue in which the actors may stay in character or speak as themselves.
Theatre in Education (TIE): Cardboard Citizen theatre company presents a TIE production in schools called Home and Away that addresses an issue that has been thrust to the top of the political agenda in Britain in recent years, that of refugees and asylum seekers (Jackson, 2005, p. 114). The play weaves together a traditional Ethiopian folk tale with the story of a young Ethiopian refugee living in England. The narrator, Teri, moves from ignorance to understanding as she encounters this young man and his culture; however, her empathy comes too late and he commits suicide. Following the performance, the audience is split into four groups, each actor working with a group to seek more positive endings. The company then moves into a forum theatre session where the actors and volunteer students test these endings out as the scenes are re-interpreted.
Theatre of the Oppressed (TO): Vancouver’s Theatre for Living (formerly Headlines Theatre) creates a play in 2013 about mental health with six actors, one of whom is a former psychiatrist, and based on stories gathered widely from the community. The play, Maladjusted: The Mental Health System. The People. The Play., presents the stories of a young girl struggling with depression and self-harm and a young man who is homeless and dealing with mental illness and addiction. The play examines the Canadian health system, which is viewed as mechanized in favour of the system over its clients. Audiences are challenged to change the play’s outcomes to offer a more humanized health care system that places patients at the centre of care. Following the 30-minute play, scenes are re-played and stopped by audience members who replace actors and improvise in-role to try to alter the outcome (www.headlinestheatre.com).
Theatre for Health Education (THE): Health Action Theatre by Seniors, or HATS, is an applied theatre programme featuring senior volunteers who perform mimed scenarios on health topics for a diverse ethnic community. One production, A Visit to the Doctor, has three scenes in which senior patients check-in and wait at a doctor’s office, go through an appointment with the doctor and go for lunch at a cafeteria next door where one of them falls ill. Each scene involves frustrations, miscommunications and other challenges often experienced by senior immigrants trying to navigate the Canadian health care system. After the show, audience members are invited to stop the action as it is re-played to offer some solutions to the situations. HATS programs have successfully reached many senior immigrants in the lower income community of Parkdale, Toronto, in collaboration with St. Christopher House, a local community centre (www.hatstheatre.org).
There are no happy endings for the women characters portrayed; they dream of returning home to their families but are trapped into slavery and prostitution by pimps who keep the women powerless and without hope. Ajoka Theatre, a 30-year-old company based in Lahore, continues to create and perform plays about development and peace issues and tours extensively (www.ajoka.org.pk).
Prison Theatre: Journey Woman is a week-long programme of theatre and drama-based work facilitated by England’s Geese Theatre Company for female offenders and their caretakers. The week begins with a performance that follows the story of Ellie, a woman who has broken out of the cycle of hardship, offending and prison. Looking back on her life, Ellie revisits key episodes and moments of change: leaving home for the first time, her first involvement with offending, becoming a mother and her first prison sentence. Throughout the piece, the audience is invited to consider the different masks she has worn throughout her life, the different roles she has played and her different life stories. The audience members are enrolled as experts in Ellie’s life, analysing the crucial moments, exploring her inner feelings and emotions and contemplating how moments from her past have impacted on her present and future. Geese Theatre, based in Birmingham, carries out its mask-based work in prisons, youth detention centres and with those on probation (www.geese.co.uk).
A cast of aboriginal artists, elders, dancers and Downtown Eastside community members help an old man – The Old One – open up to his life’s journey, his regrets and hopes, through the teachings of the medicine wheel. His journey home gives voice to experiences of the urban aboriginal community, to voices not heard, to lives left behind.
VMT productions most often have dozens of cast members of many ages and cultural backgrounds (www.vancouvermovingtheatre.com).
Museum Theatre: At Washington’s Smithsonian Institute in the summer of 2006, as part of an exhibit on transportation, a pretty young blonde girl dressed in 1950s fashion is found among the cars, buses and trucks of the period. She notices an audience gathering and tells them how excited she is because her boyfriend is coming and she hopes he is going to purchase a car. The boyfriend arrives and we discover that it is his parents who are buying the car and that they are already in the manager’s office signing the papers. While the two young people are waiting, their conversation gives us a picture of how transportation played a major part of life in small-town America in the 1950s. Following this historical interpretation performance, the actors come out of role and engage the audience, many of whom are anxious to share their own experiences from that period, in a talkback discussion (Saxton, 2006).
For some the party heralds a glorious new era of freedom and adventure. For others it sounds a peal of doom. The drama is punctuated with songs resonating with the determination of seniors who want neither to be dismissed nor forgotten. ... The production stars older actors with an array of backgrounds and experiences. ... This interactive play invites the audience to come on stage, take on the role of one of the characters and explore possible options to the issues presented.
Mixed Theatre has been operating in Toronto for over 30 years and is committed to theatre as a tool for positive social change (www.mixedcompanytheatre.com).
In our view, this very capacious portmanteau term (Giesekam, 2006, p. 91) is inclusive and does not carry any limiting fixed agendas. Instead, the applied theatre label [is] a useful umbrella term . . . for finding links and connections for all of us committed to the power of theatre in making a difference in the human life span (Taylor, 2006, p. 93). All of the above thumbnail narratives offer examples of a web of performance practices (Schechner, 1988/2003, pp. xvi–xix) that fall outside mainstream theatre performance and take place in non-traditional settings and/or with marginalized communities (Thompson & Jackson, 2006, p. 92). That is to say, these approaches to theatre most often are played in indoor and outdoor spaces that are not usually defined as theatre venues, with participants who may or may not be skilled in theatre arts and to audiences who have a vested interest in the issue taken up by the performance or are members of the community addressed by the performance. Alternative theatre practices, including those described above, have historically been labelled with a number of diverse terms, such as grass-roots theatre, social theatre, political theatre, radical theatre and many other variations. However, since 2000, applied theatre is the term that has emerged as the umbrella under which all of these prior terms and practices are embraced.
Applied theatre defies any one definition and includes a multitude of intentions, aesthetic processes and transactions with its participants.
One example of how applied theatre can be different lies in the area of scripting. Whereas traditional mainstream theatre is most often centred in the interpretation of a pre-written script, applied theatre, in contrast, involves both the generation and the interpretation of a theatre piece that in performance may or may not be scripted in the traditional manner. In those cases where an applied theatre performance takes the form of a polished improvisation, a formally written script may never be recorded. There are very few complete examples of scripts, although the case studies that follow will often quote excerpts. As you read through these case studies, you will note the many ways in which applied theatre differs from theatre as most people would think of it.
Theatre has had an historic role in society as providing a relatively safe way of talking back to power. Across many cultures and traditions over time, we can trace patterns and instances of groups of people using the stage as a space and place to share their stories and their lives. This aesthetic and emotional outlet allows for potential catharsis, a safe way for citizens to express their concerns, criticisms and frustration to each other and to society at large. And often that opportunity has been enough. Some examples of this kind of theatrical expression are to be found around the world in the social dramas of rituals such as carnivals, Feast of Fools, initiation rites and through trickster figures in myths and legends – the servant figure in drama traditionally has had more power in the world of a play than his or her masters. The roots of Greek chorus, commedia dell’arte, Molière, Shakespeare and, closer to our own time, the comedies of George Bernard Shaw and Noël Coward, for example, have always been fed by this power reversal that is sanctioned and accepted within the protected space of the fictional world of the stage.
Catharsis (katharsis: purgation) is a Greek medical term that Aristotle uses to argue that tragedy does not encourage the passions but in fact rids (or purges) the spectator of them. Catharsis is a beneficial, uplifting experience whether psychological, moral, intellectual or some combination of these.
In modern western theatre history, playwrights such as Shaw, Henrik Ibsen and Bertolt Brecht offer a theatre of social criticism, debate and, in Brecht’s case, potential revolutionary action. More contemporary playwrights, such as Caryl Churchill, Dario Fo, Wole Soyinka, Ariel Dorfman, Tony Kushner, Sarah Kane and many others, have focused much of their theatre on exposing and exploring social and political issues in their plays. Applied theatre is informed by these plays and playwrights to the extent that they offer clear models of how effective theatre can tackle a range of topical provocations and provide an aesthetic site for their considered examination.
Applied theatre works overtly either to reassert or to undermine sociopolitical norms, as its intent is to reveal more clearly the way the world is working. For example, reminiscence theatre, community-based theatre and museum theatre are most often reassertions and celebrations of memory and history. On the other hand, Theatre of the Oppressed, Popular Theatre, Theatre in Education, Theatre for Health Education and Theatre for Development are most often focused on undermining the status quo in order to promote positive social change. Prison Theatre and Documentary Theatre may fall within either depending on intention or context. Reassertions or undermining intentions are both ways by which we can re-examine the world to discover how it works and our place in it; they hold within them the potential to be educational, reflective and/or rehabilitative.
All drama is...a political event: it either reasserts or undermines the code of conduct of a given society.
Marvin Carlson pointed out in 1993 that [t]he continuing point of debate in modern theatre theory has been over whether the theatre should be viewed primarily as an engaged social phenomenon or as a politically indifferent aesthetic artefact (p. 454). That debate continues. Herbert Blau criticizes theatre as aesthetic artefact (isolated and elitist), a stronghold of non-ideas (1965, p. 7). Theatre for Blau is a public art and one that should function at the dead center of community (p. 309). Like Brecht before him, Blau sees that the function of theatre lies with waking up the audience to its obligations and responsibilities through its collective imagination.
Using Bertolt Brecht’s lehrstücke (short, severe and instructive works performed for audiences of students, workers and children [see Eyre & Wright, 2001, p. 204]) as the first indication in the twentieth century of a new aesthetic for theatre, we can begin to trace the threads of change through the work of Michael Kirby (1965) and Jerzy Grotowski (1968). Kirby wanted to rid theatre of the constraints of its conventional structure of plot (rising action, climax and dénouement) and replace it with something he called compartmental structure akin to collage (Carlson, 1993, p. 457). Compartmental structure foreshadows the often episodic nature of applied theatre presentations where scenes are linked by theme rather than plot development. Grotowski sought to create archetypical images and actions that would force the spectator into an emotional involvement (p. 455). He was interested in his highly trained actors addressing the needs of a small group of individuals in a totally open way (p. 457). Even such a theatrical anchor as intention or purpose was questioned by French theorist practitioners such as Fernando Arrabal (1973). Arrabal and his circle prefigured chaos theory by their abandonment of structure and the invitation to include the widest possible elements that embraced such opposites as the sacred and the profane, executions and celebrations of life, the sordid and the sublime (Arrabal, 1973, p. 98).
To like the theatre you have to like its transience and its immediacy: it happens in the present tense and it’s fallible. There’s a sense of occasion in any theatre performance and of participation in a communal act: you go into a theatre as an individual and you emerge as an audience.
Richard Kostelanetz in 1968 drew attention to other significant shifts, of which two are important for our study here. Staged performances were much like traditional theatre but without the reliance on words. They were strongly movement-oriented and the actors performed without masks as themselves or as a kind of neutral sign, the emphasis being on the experience itself and the process of creation rather than the product of creative acts (Carlson, 1993, p. 461, italics ours). Audiences, too, began to be recognized by theatre makers as integral to the wholeness of a performance. But after a couple of centuries of being quiet and in the dark, audiences did not always take kindly to this new attention; even today, being recognized by the stage can make people embarrassed or uneasy. The playwright Peter Handke attempted to revitalize the audience by making them conscious that they are there, that they exist (cited in Carlson, 1993, p. 462). Richard Foreman (1976) took this idea further by creating theatre pieces that were deliberately intended to lead the audience to become more self-aware and self-reflexive. Many of these new ideas came together in the work of Peter Brook (1968), whose theatre-making was designed to join spectators, actors and performance in a communal celebration of experience (Carlson, 1993, p. 464).
The relationship between the actor and the audience is the only theatre reality.
It was clear by the middle of the twentieth century, notable for the dazzling pace of its change, that the relationship between actors, audiences and performance structures was undergoing significant shifts in aesthetic understanding. Indeed, 1968 has become for theatre historians, theorists and practitioners the dividing line between the traditional and the new theatre. The Avignon Manifesto, an open letter from young theatre radicals inspired by the student and worker uprising in Paris in 1968, makes the shift clear. It called for a theatre of ‘collective creation’ with no schism between artistic activities and ‘political, social, and everyday events,’ a theatre of ‘political and psychological liberation’ of ‘direct rather than represented action,’ which would place the spectator no longer in an ‘alienated and underdeveloped situation’ (Copferman, 1972, cited in Carlson, 1993, p. 471).
There are three writers whose theory and practice are of particular interest as we explore the antecedents of applied theatre: Armand Gatti, John O’Toole and Augusto Boal. French director Armand Gatti, like Kirby, was intent on freeing theatre from its reliance on sequential time: theatrical action for Gatti was most generative when it allowed spectators/participants to see the same thing from a number of different viewpoints, where endings remained open and available to questions. He was a forerunner of the popular theatre movement – a people’s theatre, a theatre engaged with the popular culture of post-World War II society and belonging to it (Prentki & Selman, 2000). For this revolutionary theatre artist, the function of theatre was to enable the disinherited classes to create a theatre that reflected their concerns – not through performances for them but with them. He did this through a series of what he called mini-pièces – short scenes encouraging reflection, which might lead later to further action that could perhaps alleviate those concerns to some degree. Gatti saw himself not as a playwright but as a catalyst of the creative powers of the people of the community (Knowles, 1989, p. 202), and he saw the theatre as the means of giving language to those who lacked the words to describe their social situations.
This is, he suggests, a technique worth exploring in more depth and more frequently (p. 97).
This responsive, improvisatory strategy was taken up by Brazilian director Augusto Boal – founder of Theatre of the Oppressed – and became a key concept in his Forum Theatre. Boal himself was deeply influenced by Paolo Freire’s Pedagogy of the Oppressed (1970/2000) that aims to empower learners as active agents in their own education. Similarly, Boal empowered theatre spectators to step into the action and change the outcome of a dramatic situation related to their lives. He called this process rehearsal for the revolution (Boal, 1979, p. 122). Indeed, the practice of engaging the audience interactively with the performance (before, during or after the performance – and sometimes all three), as seen in the work of Gatti, O’Toole and Boal, is a consistent characteristic of all forms of applied theatre.
All of these shifts occurred inside a wider sociopolitical and economic context. The last half of the twentieth century boiled with new thought and was influenced by such things as the fall of the Berlin Wall, feminism, globalism, the Space Race, chaos and complexity theory, and the rise of the individual ready to question authority and ask Who holds the power? and By what right? In recent years, theories on postdramatic theatre (Lehmann, 2006) – that is theatre forms that are less driven by traditional models of character and plot development – have had an influence on theatre practices worldwide. Applied theatre, like all art, both reflected this new awareness and had foretold it in the practice and theory of earlier playwrights, actors and directors who were already laying the foundations for a more public art that truly functions at the living centre of its communities.
Theatre artists have always turned to their art form as a means of finding their way through crises and challenges: for example, Jean Anouilh’s subversive adaptation of Antigone (1942/1951) was performed in Paris under the Nazi regime; Tony Kushner’s Angels in America (1993) challenged audiences to address the reality of HIV/AIDS. This is theatre as activism, enfolded in the safety of entertainment, which rises spontaneously from within situations of war, insurgency, political and civil crisis and has long been a part of theatre tradition (McDonnell, 2006, p. 2). Another impetus for applied theatre involves self-conscious attempts to influence political reality (p. 2), using theatre as a facilitated intervention from the outside with communities for whom theatricality is not intrinsic. This interventionist theatre is the primary focus of this text.
Much applied theatre in its ‘intentional’ form creates a practice that seeks to debate vital issues and see those concerns transformed into new stories or within unfamiliar settings. . . . [It is a way] to provide people with a means to work their way through difficult transitory periods [as an] aid in seeing them safely into a new place or time.
•An outside organization, generally a theatre group or individual facilitator, is aware of or is invited into a site that is struggling with sociopolitical issues. The needs expressed by the community become the themes explored through theatre processes and presented back to the community as a theatre piece.
•An outside agency commissions a theatre production for (or with) a target group to tackle a specific topic or issue for various purposes, most often educational.
•A facilitator or theatre company instigates a community-based theatre project that aims to celebrate or memorialize some aspect of the community for the psychological/emotional health of that group. | 2019-04-25T23:43:17Z | https://ar.scribd.com/book/332781132/Applied-Theatre-Second-Edition-International-Case-Studies-and-Challenges-for-Practice |
How will my child compare to his or her classroom peers?
A child with Down syndrome has unique educational needs to be addressed. The efforts of the NDSC, together with the larger disabilities community, have made great strides toward securing quality education for all people with cognitive disabilities. Increasingly, school systems are adopting the processes and teaching resources that children with Down syndrome need to succeed alongside of their classmates.
As a parent connected with the NDSC, you are on the forefront of securing the rights of children with Down syndrome to receive a proper and effective education. We will not attempt to minimize that challenge, but offer content here that assists in the goal of academic success of all children with Down syndrome.
Evaluations and the information contained in them form the basis for writing a student’s Individualized Education Program (IEP). Present levels of academic achievement and related developmental needs help the IEP team decide what the child’s educational program should be. Often times, parents are dissatisfied with the school district’s evaluation and opt to have an independent educational evaluation (IEE) conducted. Other times, parents obtain an independent educational evaluation on their own initiative instead of waiting for and relying upon a school district evaluation.
When is an educational evaluation conducted?
An initial evaluation is conducted upon entering or qualifying for any Individuals with Disabilities Education Act (IDEA) program. This includes the early intervention program (e.g., infant and toddler program), preschool program (ages 3-5) and school-age program (5-21).
When are additional evaluations conducted?
The school is also required to conduct an evaluation every 3 years. If the school district feels that they do not need additional information about the child, they must notify the parents and tell them they do not intend to reevaluate and the reason for the decision. In those cases, parents must specifically request a reevaluation if they want one done. Also, the school must reevaluate if changing educational needs warrant a reevaluation or if the child’s parent or teacher requests a reevaluation.
What is the process for conducting an evaluation?
The nature of and administration of evaluations is usually done by people working for the school district. Parents may request an initial evaluation. Also, parents must consent to the initial evaluation, and it must be conducted within 60 days of the request for an evaluation.
What happens if I disagree with the school district about evaluation issues?
Sometimes there is disagreement about the type of evaluation (assessment tools), the need for a reevaluation, the areas to be evaluated and/or the findings of the evaluation. When parents find themselves in disagreement with the school or anticipate that they will disagree with the school’s evaluators, they may want to consider an Independent Educational Evaluation (IEE). A frequent trigger for parents seeking an IEE are issues regarding behavior. For a discussion of functional behavior analysis, see below.
What happens when parents & school staff disagree?
When parents and the school district disagree about the need for an IEE, there are certain conditions in which a school district may be required to pay for the evaluation. If the parents present an evaluation that the school district previously refused to conduct, the school district may be required to reimburse the parents for the cost of this evaluation if it is determined that the evaluation provided information which had an impact on the child’s education, services or placement. Additionally, if the parents disagree with a school district evaluation and request an IEE at public expense, the school district must obtain the IEE and pay for it, unless the school district requests a due process hearing and the hearing officer rules that the IEE is not needed. In other words, the school district cannot simply refuse the parents’ request for an independent evaluation. The district must consent to the IEE at public expense or request a due process hearing and prove to a hearing officer that the school evaluation was sufficient. If a hearing officer orders an IEE during the course of a due process hearing, it will be conducted at public expense.
What is an Independent Educational Evaluation?
Federal law defines an Independent Educational Evaluation (IEE) as “an evaluation conducted by a qualified examiner who is not employed by the public agency responsible for the education of the child in question.” 34 C.F.R. 300.503. Some of the primary areas of concern for which parents seek an IEE are related services. The areas of concern may be the need for occupational therapy, physical therapy, speech and language therapy, sensory needs, behavior issues and even music therapy. Parents may obtain an IEE, for any reason, if the areas of concern impact the child’s education.
What is the value of an IEE?
One goal of Congress in passing the 1997 Amendments to the IDEA was to strengthen the role of parents in the educational decision-making process. An IEE provides parents added authority at the IEP meeting. The law and federal regulations include parents in every step of the process from determining eligibility to placement. Therefore, parents should be equal participants in the development of a child’s IEP, and their participation in the IEP process must be meaningful. One court stated that the failure to receive and consider parental information, including evaluations they may obtain, directly denies parents their fundamental role in the development of their child’s placement. This role includes discussing such information. The court also stated that consideration of outside information also ensures that a program is individualized and provides a check on the judgments being made by school officials. The major advantage of an IEE is that it is “independent.” This offers parents some assurance that their child’s needs are truly the predominant consideration in the evaluation process (vs. fiscal considerations or availability of existing resources).
What is required of school districts?
The federal regulations direct school districts to inform parents of their right to obtain an IEE, where they may obtain an IEE, and conditions for obtaining an IEE at public expense. According to the regulations, the results of the IEE must be considered by the public agency in any decision made with respect to the provision of a free appropriate public education. This does not mean that the school district must accept the findings or recommendations in the IEE. It does mean that the IEP team must review the IEE, and discuss it as appropriate. In this regard, the requirements placed on school districts are fairly minimal.
How can I be involved in my child’s evaluation?
You want to select an evaluator who is knowledgeable about your child’s disability. Your evaluator should have expertise and knowledge about a variety of tests and should use this expertise to select appropriate tests for your child. One of the best ways to find a good evaluator is to contact your local parent support group and determine if other parents have used independent evaluators and what their experiences have been. Parents do need to provide their evaluator with sufficient information about the child – this information will help the evaluator decide which tests to administer. Ask the evaluator what additional information s/he needs. If you select an independent evaluator who is knowledgeable about your child’s disability and you trust the evaluator, you need to have confidence that the evaluator will determine and use appropriate tests for your child. However, you should not assume that your independent evaluator is knowledgeable about all the legal requirements about testing in your state law.
The advantage is, of course, that it saves parents money. The disadvantages are that parents risk losing true independence of judgment, and parents are limited to the school district’s approved list of evaluators.
Parental control over the choice of an evaluator (e.g., parents can seek out an evaluator whose expertise and training match their preferences). Example: A parent thinks their child may have sensory integration issues. Rather than relying on an occupational therapist to do the evaluation, they may choose any occupational therapist who has specialized training in sensory integration.
The opportunity to develop an “evaluation plan” that best suits your child’s needs. Prior to any testing, meet with the evaluator to inform him or her of your child’s needs, and your reasons for requesting the evaluation. This gives you the opportunity to participate in developing an approach to the evaluation process that is consistent with your goals for your child.
You can confer with the evaluator about the final report and recommendations.
You have the choice whether or not to share the IEE.
If you go to due process, you may want to call that person as an expert witness.
Remember, no matter who pays for the IEE, the school district must “consider” the findings.
How do parents determine which assessments are most appropriate for their child?
Identify the critical factors: Area of assessment (e.g., speech, language, occupational therapy), age of the child, is the child verbal or non-verbal?
What is the best testing environment for the child?
Go to specialists in the area of testing to get advice. For example, a frequent presenter at NDSC conferences on speech and language is Libby Kumin. You may want to contact her and ask about the best assessment tools for a 4-year-old non-verbal child with Down syndrome. Pat Winders frequently discusses physical therapy issues. You may want to contact her and ask for the best physical therapy assessment tools for a young child with Down syndrome. You may call the NDSC for contact information at 1-800-232-NDSC.
Another invaluable resource is community resources (e.g. parent groups) to identify the most appropriate evaluators. Wrightslaw.com is an excellent resource for information about the various components of an evaluation. A sample of a comprehensive evaluation can be seen at Jiffy Evaluation Center.
Technology has a profound impact on society in the 21st century. Children have access to technology not only for “entertainment” purposes, but also as excellent tools for learning. These tools benefit all children, including children with Down syndrome and other disabilities. Technology has provided access to employment and community living for adults with disabilities. These frequently asked questions will address the rights of children to assistive technology (AT) under the Individuals with Disabilities Education Act (IDEA). Congress recognized the benefit of technology for students with disabilities to facilitate their access to regular school activities when it added “assistive technology devices and services” to IDEA in 1990. In a report from the House of Representatives accompanying the law, it stated that advances in AT have provided new opportunities for students to participate in educational programs. For many, the provision of AT “will redefine an ‘appropriate placement in the least restrictive environment’ and allow greater independence and productivity.” Numerous policy letters from the U.S. Department of Education have clarified that if an AT device or service is needed by an individual child to benefit from his educational program, it must be included in the child’s Individualized Education Program (IEP) and provided at no cost to the parent. Policy letters are issued in response to questions from the public and provide the public with the agency’s interpretation of the law it administers. Below are a series of questions and answers about AT and its potential role in the classroom. Also, a list of resources is included if you wish to find more information.
Assistive technology is intended to improve the functional capability of a student with a disability. It has been defined as anything that makes it easier for a student to: turn things on, get dressed, eat, bathe, read, write, get around or move, communicate, and/or play. Assistive technology devices can range from low tech devices such as a Velcro pencil grip to highly computerized communication systems. It can also include such items as electronic note takers, cassettes, special or adapted computer software and hardware.
What is an AT service?
An AT service can be anything that directly assists an individual with a disability in the design, selection, acquisition, or use of an assistive technology device. It also is defined as, according to IDEA, any service that directly assists a child with a disability in the selection, acquisition, or use of a device including evaluation, purchasing, leasing the device, and repairing, maintaining and replacing when necessary. It includes training for parents, staff, related services personnel, and other family members and individuals involved with the student.
Where can I find a list of AT devices?
How does this apply to children in schools?
School districts are required, under IDEA, to provide AT to students with disabilities if it is needed as special education, related service or supplementary aid and/or service needed for a child to benefit from his or her educational program. (For definition of the previous terms, go to: http://idea.ed.gov/download/statute.html.) Additionally, the 1997 Amendments to IDEA state: “In order to support the inclusion and participation of students with disabilities in regular education classrooms, all IEPs developed for children identified as needing special education services must indicate that AT has been considered to “provide meaningful access to the general curriculum.” (IDEA, 1997).
How can I determine what technology my child needs or would benefit from?
The law requires that schools consider each request for technology on a case-by-case basis considering the unique needs of each child. It must be considered when writing the child’s IEP. To do this, an AT evaluation must be conducted by the school, an independent agency with expertise in the area, or a consultant. It should take place in the child’s normal environment—home, school or the community. The end result of an assessment is a recommendation for a specific device and services needed to appropriately use the device. If you think your child could benefit from AT, you should request an AT evaluation in writing as you would with any other educational service.
What is the difference between technology designed for all children (universally designed technology) and AT?
Universally designed technology improves the accessibility and usability for all students – with and without disabilities. For example, an educational web page with text that can be read out loud by a computer can benefit all students who are learning to read. AT improves the functional capabilities of an individual child, such as use of a communication device.
What can I do if school personnel delay or deny a request for an AT evaluation?
If schools unduly delay a request for AT or AT evaluation or refuse to consider AT, parents have the right to seek an independent evaluation and/or use mediation or due process to resolve the issue as with any disagreement about a child’s educational program.
How does AT interact with the rest of my child’s curriculum?
AT should be integrated throughout the school day to access the regular curriculum. It should also be used with other therapies your child is receiving. For example, a communication device should not only be used along with language therapy, but through the child’s day from the playground to the math lesson and to the cafeteria.
Is my child entitled to use his or her device at home?
The U.S. Department of Education has stated that if use at home or in other places is required for a student to receive a free appropriate public education, it must be allowed. Each case must be decided on an individual case-by-case basis as with any educational service.
All children are entitled to a free appropriate public education as determined by their evaluation and IEP. Policy letters from the Department of Education have clarified that if a device is needed for a child to benefit from his or her educational program, it must be provided “at no cost” to the parent. Although IDEA specifically authorizes the use of private insurance or Medicaid, it cannot require a parent to use this resource in order for their child to have access to a device.
Where can I get more information about AT?
Parents should become familiar with AT resources and understand the basics about how technology can benefit your child in order to become good advocates. AT is a tool that, if used properly, can increase accessibility to school, work, social activities and all activities enjoyed by non-disabled peers. Language therapists, occupational therapists or school technology specialists are often good resources for information. If possible, you should visit an AT center with your child to see and try out various devices and equipment. A list of other resources is attached to this document. Each state operates an Assistive Technology project under the Assistive Technology Act of 1998. These projects focus on various activities such as provision of resource information, systems change and advocacy activities, loan programs, lending libraries, and recycling programs. Each state has a Protection and Advocacy Program to provide legal services for people with disabilities. Each state’s P&A should have an individual on staff who is knowledgeable about assistive technology issues. To locate your state office, go to National Disability Rights Network. | 2019-04-19T13:15:47Z | https://www.ndsccenter.org/programs-resources/education/ |
Abstract: Echocardiography plays a central role in the characterization of the mitral valve (MV) morphology and functi-on. In the past decade, the development of three-dimensional echocardiography (3DE) has revolutionized valvular imaging, becoming the technique of choice for an accurate evaluation of the MV anatomy and pathophysiology. Transthoracic and transoesophageal 3DE represent complementary imaging techniques to assess the complex MV apparatus in the beating heart, to plan interventions, to monitor transcatheter procedures (e.g. MitraClip, mitral valve balloon valvuloplasty, and paravalvular leak closure) and to assess the results of surgical repair. The aim of this article is to review the contribution of 3DE in evaluating the anatomy and function of the MV apparatus in a variety of MV diseases, highlighting the current clinical applications of this essential echocardiography technique.
Rezumat: Ecocardiografia a ocupat dintotdeauna un rol central în caracterizarea morfologiei şi funcţiei valvei mitrale (VM). În ultimul deceniu, dezvoltarea ecocardiografiei tridimensionale (3D) a revoluţionat imagistica valvulară, devenind modalitatea preferată pentru evaluarea cu acurateţe a anatomiei VM, indiferent de patologia evaluată. Ecocardiografi a tran-storacică şi transesofagiană 3D reprezintă instrumente imagistice complementare utile pentru evaluarea funcţiei complexe a aparatului valvular mitral, precum şi în planificarea managementului terapeutic. Acest articol îşi propune să prezinte rolul adiţional al ecocardiografiei 3D pentru evaluarea diverselor patologii ale VM, subliniind aplicaţiile clinice actuale şi avantajele acesteia în raport cu ecocardiografia convenţională.
Cuvinte cheie: valvă mitrală, ecografie tridimensională, morfologie, regurgitare mitrală, stenoză mitrală.
The echocardiographic assessment of the mitral valve (MV) provides valuable insights into the aetiology and severity of the MV disease, which makes it essential to plan interventions, to guide and monitor transca-theter procedures, and to assess the results of surgi-cal repair1. However, the MV is a complex three-di-mensional structure that requires multiple views and complex mental reconstruction processes to fi gure out its anatomy using conventional two-dimensional echocardiography (2DE). Conversely, by using three-dimensional echocardiography (3DE), we can assess the non-planar mitral annulus (MA) and mitral leafl ets, the complex subvalvular apparatus and their anatomi-cal relationships with the surrounding structures, by virtually “dissecting” the beating heart using different cut planes1.
Although cardiac magnetic resonance (CMR) has a higher spatial resolution than echocardiography, with the important advantage of non-invasiveness, its cli-nical use is limited due to increased acquisition time, costs, limited availability and lack of portability at the bedside or in the catheterization and operative roo-ms2. Multi-detector computed tomography, though used for MA anatomical assessment and spatial relati-onship to plan transcatheter interventions, has major limitations related to the inferior temporal resoluti-on, radiation exposure, use of iodinated contrast, the impossibility of real-time imaging, flow assessment or regurgitation severity grading3. Accordingly, 3DE has emerged as the reference standard technique to assess MV morphology and function into clinical practice.
This review will address the applications of 3DE, providing an update on its current role for the diagno-sis and clinical management of patients with various MV pathologies.
The normal function of the MV requires the structural integrity of all the components of MV apparatus, whi-ch includes: leaflets, MA, chordae tendineae, papillary muscles (PMs), left ventricle (LV) and left atrium (LA), as well as their coordinated functional relationships during the cardiac cycle4. A previous study show-ed that 3DE gives additional information to 2DE MV morphological assessment in 36% of patients5.
Normal MV leaflets are thin and highly mobile struc-tures, only partially visualized using tomographic tech-niques. 2DE allows the visualization of the MV leaflets only from the ventricular perspective. Conversely, 3DE allows the visualization of the whole anterior and posterior leaflets of the MV in the same cut plane, whi-ch can be rotated to display the MV either from the ventricular or the atrial (also called surgical) perspec-tive (Figure 1). As a consequence, the echocardiogra-pher does not need to imagine the actual anatomy of the MV from a limited number of tomographic views, but he/she is able to see an anatomically sound image of the MV in the beating heart. All derived views make it possible to obtain a detailed anatomical description of the MV (i.e. presence of calcifications, clefts, prolap-ses, attached masses, etc.)6, and allow an easier pre-, intra- and post-procedural assessment compared with conventional 2DE imaging. Moreover, the „surgical view” of the MV by 3DE facilitates the communication between imaging expert, interventionalist and surge-on. Finally, real-time 3DE gives the unique advantage of a detailed functional assessment of the MV, which is essential to guide valvular interventional procedures. Using dedicated software, the 3D geometry of mitral leafl ets and MA can be easily reconstructed and quan-tified (Figure 2)7.
Figure 1. Transthoracic three-dimensional echocardiography assessment of mitral valve anatomy.The mitral valve can be seen from either the atrial (surgi-cal view, panel A) or the ventricular perspective (panel B). The volume rendering display technique allows anatomically sound images and complete visualisa-tion of the leaflets and surrounding structures.
Figure 2. Transesophageal three-dimensional surface rendering display of the mitral valve. This display modality is obtained by semiautomated mapping of the leafl et surface and annulus contour in order to provide a quantitative analysis of the mitral valve annulus and leafl ets using dedicated software packages.
The subvalvular apparatus, which includes the PMs and their chordae tendineae, is best appreciated using mul-tiple longitudinal cut planes, allowing an optimal view of the PMs origin and of the chordal insertions on both PMs and MV leaflets. Chordal thickening, elongation or rupture are easily visualized using 3DE volume rendering display1.
The MA is a pliable, non-planar, saddle-shaped struc-ture that interconnects the MV leafl ets with the LA and LV walls. The anterior part of MA is the most ele-vated point of the saddle, while the posterior part in-cludes the lowest points of the saddle (near the medial and lateral commissures) and the posterior “horn”8. When viewed in cross-section, MA is D-shaped, with the straight border adjacent to the aortic valve9. The MA is also a highly dynamic structure, during the car-diac cycle: its area reaches a nadir in early systole, conversely its tenting height reaches its maximum at mitral valve closure10,11. Conventional 2DE diameters (i.e. anteroposterior and inter-commissural) are not suitable to provide reliable information about the complex 3D shape and function of the MA. Using commercially available dedicated software packages applied to 3DE data sets, a comprehensive assessment of the MA geometry and function is possible at the bedside for clinical purposes12,13 . These measurements have important implications in selecting the optimal strategy for patients requiring MV surgical or interven-tional treatment.
Complementary to conventional 2DE and Doppler pa-rameters, the use of 3D colour flow Doppler imaging may improve the quantification of MV regurgitation and help to guide transcatheter procedures by precisely identifying the origin of abnormal intracardiac flows14-16.
3DE quantification has allowed to increase the dia-gnostic accuracy and reproducibility of the MR seve-rity by integrating new parameters in its systematic approach. Planimetry of the vena contracta area and measurement of 3D effective regurgitant orifice area allow the evaluation of the functional and anatomical regurgitant orifice area, respectively (Figure 7)17-19. Both parameters are devoid of any geometrical as sumption about the shape of the orifice and have been particularly useful in patients with eccentric regurgi-tant jets. Effective regurgitant orifice area and regurgi-tant volumes obtained from 3DE proximal isovelocity area were also reported to signifi cantly increase the accuracy of MR severity quantification, but the method is available on a single echocardiography system20-22. Recently, updated American Society of Echocardiogra-phy guidelines on valvular regurgitations recommend the routine use of 3DE imaging for a comprehensive assessment of MR23.
3DE proved to be more accurate than conventional 2DE to assess the LV and LA geometry and functi-on24-27. In patients undergoing MV surgery, 3DE end-systolic LV volume was an independent predictor of postoperative LV dysfunction28. 3DE end-systolic LV volume provided additive prognostic value on top of M-mode end-systolic diameter and 2DE LV end-systo-lic volume. Finally, 3DE LA minimal volume is emerging as a predictor of adverse outcome in asymptoma-tic patients with severe organic MR29.
Management of mitral stenosis (MS) patients relies on an accurate measurement of the mitral orifice area and a comprehensive assessment of MV complex ana-tomy (extent of leaflet thickening, commissural fusi-on, calcification, degenerative changes of subvalvular apparatus, etc.). Doppler-based methods for MV area assessment are heavily influenced by flow dependen-ce, cardiac rhythm and rate, associated regurgitation, as well as the angle of insonation4. Planimetric MV area by 2DE frequently overestimates the actual residual orifice area, since there is no landmark to confirm that the parasternal short-axis 2DE view of the MV is obtained exactly at the level of the smallest MV area and oriented perpendicular to the MV opening axis30. 3DE has overcome these limitations by allowing to position the crop plane at the tips of the stenotic MV leaflets and its orientation to obtain an anatomically correct cross-section of the stenotic MV orifice (Figu-re 3)31. MV area planimetry by 3DE showed a strong correlation with the invasive area measurement (using Gorlin formula)32 and represents the current gold-standard method for assessing MS severity by echo-cardiography6,32. Echocardiographic assessment of the MV is also essential to guide the type of intervention (percutaneous versus surgical) through validated risk scores33,34. Percutaneous mitral balloon valvuloplasty is the method of choice for patients with favourable MV anatomy or when open-heart surgery is contrain-dicated, with 3DE having a crucial role in guiding the procedure — device selection, balloon positioning, and inflation — and assessment of procedural success — MV area quantification by planimetry, extent of commissural opening, leafl et mobility, residual MR — (Figure 4)35. Additionally, 3DE TEE procedure guiding has the advantage of reduced exposure to radiation (particularly important in young patients or pregnant women with rheumatic MV disease)36.
Figure 3. Transthoracic three-dimensional quantitation of rheumatic mitral stenosis severity. The cut plane of the three-dimensional dataset (green dotted line) is perpendicular to the opening direction of the mitral valve orifice, at the tip of mitral leaflets level, allowing an accurate planimetry of the smallest residual opening orifice.
Figure 4. Mitral valve stenosis before and during balloon valvuloplasty. Transesophageal three-dimensional volume rendering visualization of the rheumatic mitral stenosis. The visualisation of the valve from the ventricular perspective (Panel A) allows to appreciate the leaflet morphology, the extent of fusion commissures and the area of the residual opening orifice. The same ventricular perspective can be used during the percutaneous mitral balloon valvuloplasty to monitor the procedure (Panel B).
The accurate description of the MV anatomy is critical before any treatment decision (surgical versus inter-ventional, and repair versus replacement surgery) in patients with organic MR. Soon after the description of MV prolapse (MVP) by conventional echocardiogra-phy, degenerative MV disease prevalence was highly overestimated mostly due to the saddle-shape geo-metry of the MA and the false appearance of leafl ets billowing using M-mode and 2DE37,38. By demonstra-ting the complex shape of the MA, 3DE has led to the reconsideration of the MVP definition as the leaflet displacement above the higher points of the MA39. Using the en face view of the MV from the atrial per-spective, the echocardiographer can easily evaluate both MV leaflets and identify precisely the prolapsing scallops bulging into the LA. 3DE is particularly useful in cases of complex MVP, such as commissural lesions or multi-scallop prolapses (Figure 5)40. More than 10 years ago, the accuracy of 3D TTE and TEE in diagno-sing MVP was described to be 95% and 97%, respectively41, but with the latest development of the 3DE technology, nowadays it might be even higher. 3DE has been proved to be useful in both surgical plan-ning and predicting MV repair outcome42,43. Systematic quantification of leafl ets length, total surface area, and billowing volume is necessary to identify patients at risk for systolic anterior motion after MV repair44.
Figure 5. Three-dimensional volume rendering from the left atrial perspective (surgical view) of different forms of organic mitral valve disease. Barlow disease with associated posterior mitral leafl et cleft (Panel A); Barlow disease with P2 flail and chordal rupture (Panels B and C); papillary muscle rupture, bulging into the left atrium during systole, in a patient with fibroelastic deficiency (Panels D and E); medial commissural prolapse (Panel F).
Functional mitral regurgitation (FMR) is defined as mitral regurgitation in the presence of a structurally nor-mal MV, developing as the consequence of regional/ global LV dysfunction or LA dilatation, as in patients with chronic atrial fibrillation. Disregarding the aetiology, complex modifi cations occur at the level of the MA: dilatation, flattening and reduced dynamics12,13,45. In patients with LV enlargement, apical tethering of MV leaflets secondary to PM displacement and reduced trans-mitral pressure seems to be the main mecha-nism of FMR. The extent of MV distortion can be carefully assessed using 3DE by quantifying the geometry and function of the MA, the leafl et areas and tethering angles, tenting volume and maximal tethering area, as well as direct visualization of the MV subvalvular appa-ratus anatomy (Figure 6).
Although 2DE has a good sensitivity in diagnosing MV vegetations due to its high temporal and spatial reso-lution, the limited number of views is often insufficient to understand the complexity of the lesion (size, origin, the involvement of other structures etc.) and their functional impact. 3D TEE is the preferred technique in patients with clinical suspicion of MV endocarditis to exclude or confirm the diagnosis and to identify complications (Figure 8).
Figure 6. Functional mitral regurgitation. Three-dimensional reconstruction of the mitral annulus tenting area, volume, anterior and posterior mitral leaflets angles (Panel A) and automatic quantification of the tenting volume (Panel B).
Figure 7. Three-dimensional colour flow data set showing the origin of mitral regurgitation jet. Multiple slicing of the proximal part of the jet (dotted lines) allows the identification of the smallest vena contracta area planimetry. Two different cases, with different orifice shapes and sizes, are illustrated. (A) and (B).
3DE (particularly 3D TEE) is pivotal to assess MV prosthesis normal function (Figure 9) and to evaluate for potential complications: endocarditis, thrombosis, dehiscence, paravalvular leaks, etc. (Figure 10 and 11). Localisation, size, and mobility of the prosthetic masses are essential information in evaluating the risk of embolization and the proper management strategy. Prosthetic dehiscence or paravalvular leaks are accu-rately assessed using 3D colour Doppler imaging and 360° rotation around the prosthetic ring, providing critical information for management decision.
Congenital abnormalities of the MV include both stenotic and regurgitant lesions (Figure 12) and the advantages of the 3DE in defining the anatomy of defects and quantifying their haemodynamic implications are similar as described before. The wide range of options to post-process the 3D dataset (cropping, rotation etc.), the multiple displaying modalities (vo-lume rendering, tomographic multi-slices), as well as the unique perception of depth offered by 3DE are pivotal in the process of understanding the complexity of congenital abnormalities46,47. A recent study addres-sing the prevalence of MV cleft in a population with significant MR, using 3DE, has shown a 3.3% of isola-ted MV cleft in this population48, a considerably higher percentage compared with previous results based on 2DE (0.07% for isolated posterior mitral leaflet cleft and unknown for isolated anterior mitral left cleft), these results being representative for the increased accuracy of 3DE compared to 2DE in evaluating complex MV diseases49.
Figure 8. Anterior mitral leaflet perforation (arrow) complicating native aortic valve endocarditis. Transthoracic three-dimensional volume rendering (Panel A) and intra-operative (Panel B) views.
Figure 9. Three-dimensional transesophageal volume rendering of a me-chanical prosthesis visualised from the surgical view for morphological and functional characterization.
For the past decade, several percutaneous transca-theter procedures addressing MV pathologies have emerged as alternatives to traditional surgical therapy in high-risk patients. Newer interventional therapies for MV disease – as edge-to-edge repair, annuloplasty, chordal implantation or transcatheter mitral valve re-placement (TMVR) – rely on real-time visualization of the MV in the beating heart using echocardiographic guidance as the leaflet are not visible at fluoroscopy and MV diseases are often associated to limited de-generative calcification50. Delivery catheters, devices, and target structures can be visualized in one single view using 3D TEE, optimizing the transseptal punctu-re, the steering of the catheters towards the MV and proper positioning of the device in relation to MV ana-tomy51. TEE visualization of the MV during interventi-ons can guide the prosthesis to reach its final position, assess the success of repair, and allow quantification of the residual regurgitation.
Intraprocedural guidance of MV repair with Mitra-Clip system is primarily based on 2DE and 3DE, with limited utility of fluoroscopy52. 3DE TEE plays a leading role in all the procedural steps for MitraClip implanta-tion: transseptal puncture, device positioning, proper leaflet grasping and post-deployment evaluation of the results (residual MV orifice area and MR reduction, difficult to assess given the double – or even triple – MV orifice and the subsequent multiple regurgitation jets) and possible complications (iatrogenic interatrial defect)53.
Artificial chordal implantation is another option for patients with degenerative MV disease and TEE 3DE plays a major role in patient selection, identifying the site of implantation (site of prolapse), the number of chords needed, as well as the appropriate chordal length. During the procedure, TEE is useful in checking the LV site of puncture, excluding subvalvular appa-ratus entrapment by the delivery catheters, ensuring adequate grasping of the desired scallop(s) and adap-tation of neochordae length according to the real-time evaluation of the MR severity36.
With regard to TMVR, 3D TEE is of major impor-tance for pre-procedural anatomical assessment of the MA and to identify the landmarks used for val-ve deployment (trigons, aorto-mitral continuity etc.), for characterization of the landing zone – essential in selecting the most appropriate device based on their specific characteristics –, for intraprocedural guidance, confirmation of proper device position, MV prosthesis functional assessment and procedure-related compli-cations3,51,54. For valve-in-valve TMVR, 3D TEE has an additional role in assessing the presence of inter-de-vice regurgitation (between the transcatheter device and surgical bioprosthesis), with guidance for further balloon post-dilatation in case that multiple jets are evident around the circumference of the newly implanted valve53.
MV paravalvular leak is associated with increased morbidity and reoperation has increased mortality risk, making transcatheter closure a good option in patients with significant regurgitant volume or hae-molysis (Figure 13)55. 3D TEE is the preferred imaging modality for pre-procedural evaluation of the orifice shape and size (planimetric area), for peri-procedural guidance – including the use for additional devices –, post-procedural evaluation of the results and follow-up56.
Newly developed technologies that synchronize multimodality imaging – fusion imaging – may incre-ase diagnostic accuracy and procedural precision in transcatheter MV repair and replacement5. Of parti-cular importance is echocardiographic and fluorosco-pic imaging fusion (i.e. EchoNavigator system, Philips Healthcare), which facilitates procedural guiding in MV repair by providing depth perception and demon-strating the relationship between devices and surro-unding structures – 2DE and 3DE images superimpo-sed on fluoroscopic projection – as well as visualizing the regurgitant jet on the fluoroscopic silhouette and allowing the selection of the ideal device position57,58. Moreover, fusion imaging has the potential to enhance the safety of the procedures and to reduce the fluoroscopy and procedure times52.
Figure 10. Mitral prosthesis masses. Three-dimensional volume transesophageal volume rendering from the surgical (panelA) and ventricular (Panels B and C) views of a mitral bioprosthesis with signs of degeneration (calcifications, green arrows) and a thrombotic mass (red arrow, between 7 and 10 o’clock).
Figure 11. Mitral periprosthetic regurgitation. Three-dimensional transesophageal volume rendering (Panel A) and colour flow acquisition (Panel B) show-ing anterolateral periprosthetic regurgitation (between 10-12 o’clock). Multi-slice display to allow planimetric quantitation of the regurgitant orifi ce (Panel C).
Figure 12. Congenital mitral valve diseases. Two-dimensional short axis view (Panel A) and three-dimensional transthoracic volume rendering of an ante-rior mitral leaflet cleft from the ventricular perspective (Panel B) in a patient with an incomplete atrio-ventricular canal. Surgical view of the mitral valve showing posterior mitral leaflet cleft, between P2 and P3 scallops (Panel C). Three-dimensional transthoracic volume rendering from the ventricular side showing a double orifice mitral valve – yellow arrows – (Panel D). Transthoracic three-dimensional volume rendering from the ventricular view (Panel E) allowing an accurate identification of the anatomy and localisation of the accessory tissue (red arrow). Two-dimensional transversal cut plane obtained from a transthoracic three-dimensional data set using an intermediary plane between the levels of the aortic valve and the mitral valve to visualise accessory mitral valve tissue (Panel F).
Figure 13. Transesophageal three-dimensional surgical view of the mitral biological prosthesis after perivalvular leak closure showing the final (pos-terolateral) position of the plug.
Traditionally, 3DE was subject to artefacts related to inaccurate gain settings, the inability of the patient to hold respiration and the presence of arrhythmias. Moreover, high-quality transthoracic 3D data sets are greatly dependent on a good acoustic window and the experience of the echocardiographer. 3D TEE images are easier to obtain, real-time acquisitions being often suffi cient for an accurate diagnosis due to the redu-ced 3D volume acquisition and high spatial resolution. However, the new 3D technology allowing single-beat acquisitions at high frame-rate has overcome most of the previous limitations, and the automated software packages for MV geometry assessment requiring only minimal manual intervention have made 3DE easier to learn and more reproducible.
Another limitation of 3DE is the lack of tissue cha-racterization. Since the different colors of the images are coding the depth of the structure from the trans-ducer and not the tissue characteristics, differentia-ting intracardiac masses (calcifications, tumor versus thrombus or endocarditis versus thrombus) is chal-lenging by 3DE only. Moreover, due to the lower spa-tial resolution, small structures (such as vegetations) appear larger in 3DE than in 2DE images, a limitation that can be overcome by displaying 3D datasets as lon-gitudinal or transversal 2D slices.
The advent of 3DE has changed completely the way the MV is evaluated by echocardiography and ope-ned a new era in the transcatheter treatment of MV diseases. Application of 3DE in the evaluation of MV contributes with essential anatomical and functional information, independently of the clinical indication, and should be the technique of choice whenever a complex MV lesion is suspected. The systematic trai-ning in 3DE acquisition and interpretation appears to be pivotal in the near future for physicians dealing with patients with MV diseases.
Financial support: Dr. Andrada C. Guta has received a research grant from the Romanian Society of Cardiology in 2018.
1. Muraru D, Cattarina M, Boccalini F, Dal Lin C, Peluso D, Zoppellaro G, et al. Mitral valve anatomy and function: new insights from three-dimensional echocardiography. J Cardiovasc Med (Hagerstown). 2013;14(2):91-9.
2. Corrigan FE, 3rd, Maini A, Reginauld S, Lerakis S. Contemporary evaluation of mitral regurgitation – 3D echocardiography, cardiac magnetic resonance, and procedural planning. Expert Rev Cardio-vasc Ther. 2017;15(9):715-25.
3. Natarajan N, Patel P, Bartel T, Kapadia S, Navia J, Stewart W, et al. Peri-procedural imaging for transcatheter mitral valve replacement. Cardiovasc Diagn Ther. 2016;6(2):144-59.
4. Badano LP, Boccalini F, Muraru D, Bianco LD, Peluso D, Bellu R, et al. Current clinical applications of transthoracic three-dimensional echocardiography. J Cardiovasc Ultrasound. 2012;20(1):1-22.
5. Lange A, Palka P, Burstow DJ, Godman MJ. Three-dimensional echo-cardiography: historical development and current applications. J Am Soc Echocardiogr. 2001;14(5):403-12.
6. Lang RM, Badano LP, Tsang W, Adams DH, Agricola E, Buck T, et al. EAE/ASE recommendations for image acquisition and display using three-dimensional echocardiography. Eur Heart J Cardiovasc Imag-ing. 2012;13(1):1-46.
7. Solis J, Sitges M, Levine RA, Hung J. Three-dimensional echocardiog-raphy. New possibilities in mitral valve assessment. Rev Esp Cardiol. 2009;62(2):188-98.
8. Dal-Bianco JP, Beaudoin J, Handschumacher MD, Levine RA. Basic mechanisms of mitral regurgitation. Can J Cardiol. 2014;30(9):971-81.
9. McCarthy KP, Ring L, Rana BS. Anatomy of the mitral valve: under-standing the mitral valve complex in mitral regurgitation. Eur J Echo-cardiogr. 2010;11(10):i3-9.
10. Garbi M, Monaghan MJ. Quantitative mitral valve anatomy and pa-thology. Echo Res Pract. 2015;2(3):R63-72.
11. Mihaila S, Muraru D, Piasentini E, Miglioranza MH, Peluso D, Cuc-chini U, et al. Quantitative analysis of mitral annular geometry and function in healthy volunteers using transthoracic three-dimensional echocardiography. J Am Soc Echocardiogr. 2014;27(8):846-57.
12. Mihaila S, Muraru D, Casablana S, Peluso D, Cucchini U, Del Bianco L, et al. Three-dimensional changes in mitral valve annulus in organic and functional mitral regurgitation: insights for mitral valve repair. European Heart Journal. 2013;34(supplement 1):P4751.
13. Aruta P MD, Guta AC, Mihaila S, Ruozi N, Palermo C, Elnagar B, Ili-ceto S, Badano LP. Comparison of mitral annulus geometry between patients with ischemic and non-ischemic functional mitral regurgita-tion. Implications for transcatheter mitral valve implantation. Car-diovascular Ultrasound. 2018 (in press).
14. Chew PG, Bounford K, Plein S, Schlosshan D, Greenwood JP. Multi-modality imaging for the quantitative assessment of mitral regurgita-tion. Quant Imaging Med Surg. 2018;8(3):342-59.
15. Choi J, Heo R, Hong GR, Chang HJ, Sung JM, Shin SH, et al. Differen-tial effect of 3-dimensional color Doppler echocardiography for the quantification of mitral regurgitation according to the severity and characteristics. Circ Cardiovasc Imaging. 2014;7(3):535-44.
16. Altiok E, Hamada S, van Hall S, Hanenberg M, Dohmen G, Almalla M, et al. Comparison of direct planimetry of mitral valve regurgita-tion orifice area by three-dimensional transesophageal echocardiog-raphy to effective regurgitant orifice area obtained by proximal flow convergence method and vena contracta area determined by color Doppler echocardiography. Am J Cardiol. 2011;107(3):452-8.
17. Abudiab MM, Chao CJ, Liu S, Naqvi TZ. Quantitation of valve regur-gitation severity by three-dimensional vena contracta area is supe-rior to flow convergence method of quantitation on transesophageal echocardiography. Echocardiography. 2017;34(7):992-1001.
18. Matsumura Y, Saracino G, Sugioka K, Tran H, Greenberg NL, Wada N, et al. Determination of regurgitant orifice area with the use of a new three-dimensional flow convergence geometric assumption in functional mitral regurgitation. J Am Soc Echocardiogr. 2008; 21(11): 1251-6.
19. Chandra A SI, Sugeng L, Weinert L, Settlemier SH, Mor-Avi V, Lang RM. A three-dimensional insight into the complexity of fl ow conver-gence in mitral regurgitation: adjunctive benefi t of anatomic regurgi-tant orifice area. Am J Physiol Heart Circ Physiol. 2011;301:H1015-H24.
20. Chandra S, Salgo IS, Sugeng L, Weinert L, Settlemier SH, Mor-Avi V, et al. A three-dimensional insight into the complexity of flow con-vergence in mitral regurgitation: adjunctive benefit of anatomic re-gurgitant orifice area. Am J Physiol Heart Circ Physiol. 2011; 301(3): H1015-24.
21. Skaug TR, Hergum T, Amundsen BH, Skjaerpe T, Torp H, Haugen BO. Quantification of mitral regurgitation using high pulse repetition frequency three-dimensional color Doppler. J Am Soc Echocardiogr. 2010;23(1):1-8.
22. Song JM, Kim MJ, Kim YJ, Kang SH, Kim JJ, Kang DH, et al. Three-di-mensional characteristics of functional mitral regurgitation in patients with severe left ventricular dysfunction: a real-time three-dimension-al colour Doppler echocardiography study. Heart. 2008;94(5):590-6.
23. Zoghbi WA, Adams D, Bonow RO, Enriquez-Sarano M, Foster E, Grayburn PA, et al. Recommendations for Noninvasive Evaluation of Native Valvular Regurgitation: A Report from the American Soci-ety of Echocardiography Developed in Collaboration with the Soci-ety for Cardiovascular Magnetic Resonance. J Am Soc Echocardiogr. 2017;30(4):303-71.
24. Lang RM, Badano LP, Mor-Avi V, Afilalo J, Armstrong A, Ernande L, et al. Recommendations for cardiac chamber quantification by echocardiography in adults: an update from the American Society of Echocardiography and the European Association of Cardiovascular Imaging. Eur Heart J Cardiovasc Imaging. 2015;16(3):233-70.
25. Badano LP, Miglioranza MH, Mihaila S, Peluso D, Xhaxho J, Marra MP, et al. Left Atrial Volumes and Function by Three-Dimensional Echocardiography: Reference Values, Accuracy, Reproducibility, and Comparison With Two-Dimensional Echocardiographic Measure-ments. Circ Cardiovasc Imaging. 2016;9(7).
26. Muraru D, Badano LP, Peluso D, Dal Bianco L, Casablanca S, Koca-bay G, et al. Comprehensive analysis of left ventricular geometry and function by three-dimensional echocardiography in healthy adults. J Am Soc Echocardiogr. 2013;26(6):618-28.
27. Muraru D, Badano LP. Quantitative analysis of the left ventricle by echocardiography in daily practice: as simple as possible, but not sim-pler. J Am Soc Echocardiogr. 2014;27(10):1025-8.
28. Yingchoncharoen T, Negishi T, Stanton T, Marwick TH. Incremental value of three-dimensional echocardiography in the evaluation of left ventricular size in mitral regurgitation: a follow-up study after mitral valve surgery. J Am Soc Echocardiogr. 2014;27(6):608-15.
29. Ring L, Abu-Omar Y, Kaye N, Rana BS, Watson W, Dutka DP, et al. Left Atrial Function Is Associated with Earlier Need for Cardiac Sur-gery in Moderate to Severe Mitral Regurgitation: Usefulness in Tar-geting for Early Surgery. J Am Soc Echocardiogr. 2018;31(9):983-91.
30. Min SY, Song JM, Kim YJ, Park HK, Seo MO, Lee MS, et al. Discrep-ancy between mitral valve areas measured by two-dimensional pla-nimetry and three-dimensional transoesophageal echocardiography in patients with mitral stenosis. Heart. 2013;99(4):253-8.
31. Schlosshan D, Aggarwal G, Mathur G, Allan R, Cranney G. Real-time 3D transesophageal echocardiography for the evaluation of rheu-matic mitral stenosis. JACC Cardiovasc Imaging. 2011;4(6):580-8.
32. Zamorano J, Cordeiro P, Sugeng L, Perez de Isla L, Weinert L, Ma-caya C, et al. Real-time three-dimensional echocardiography for rheumatic mitral valve stenosis evaluation: an accurate and novel ap-proach. J Am Coll Cardiol. 2004;43(11):2091-6.
33. Anwar AM, Attia WM, Nosir YF, Soliman OI, Mosad MA, Othman M, et al. Validation of a new score for the assessment of mitral ste-nosis using real-time three-dimensional echocardiography. J Am Soc Echocardiogr. 2010;23(1):13-22.
34. Wilkins GT, Weyman AE, Abascal VM, Block PC, Palacios IF. Per-cutaneous balloon dilatation of the mitral valve: an analysis of echo-cardiographic variables related to outcome and the mechanism of dilatation. Br Heart J. 1988;60(4):299-308.
35. Zamorano J, Perez de Isla L, Sugeng L, Cordeiro P, Rodrigo JL, Al-meria C, et al. Non-invasive assessment of mitral valve area dur-ing percutaneous balloon mitral valvuloplasty: role of real-time 3D echocardiography. Eur Heart J. 2004;25(23):2086-91.
36. Wunderlich NC, Beigel R, Ho SY, Nietlispach F, Cheng R, Agricola E, et al. Imaging for Mitral Interventions: Methods and Efficacy. JACC Cardiovasc Imaging. 2018;11(6):872-901.
37. Darsee JR, Mikolich JR, Nicoloff NB, Lesser LE. Prevalence of mi-tral valve prolapse in presumably healthy young men. Circulation. 1979;59(4):619-22.
38. Procacci PM, Savran SV, Schreiter SL, Bryson AL. Prevalence of clinical mitral-valve prolapse in 1169 young women. N Engl J Med. 1976;294(20):1086-8.
39. Levine RA, Handschumacher MD, Sanfilippo AJ, Hagege AA, Har-rigan P, Marshall JE, et al. Three-dimensional echocardiographic re-construction of the mitral valve, with implications for the diagnosis of mitral valve prolapse. Circulation. 1989;80(3):589-98.
40. Tamborini G, Muratori M, Maltagliati A, Galli CA, Naliato M, Zano-bini M, et al. Pre-operative transthoracic real-time three-dimensional echocardiography in patients undergoing mitral valve repair: accura-cy in cases with simple vs. complex prolapse lesions. Eur J Echocar-diogr. 2010;11(9):778-85.
41. Pepi M, Tamborini G, Maltagliati A, Galli CA, Sisillo E, Salvi L, et al. Head-to-head comparison of two- and three-dimensional transtho-racic and transesophageal echocardiography in the localization of mi-tral valve prolapse. J Am Coll Cardiol. 2006;48(12):2524-30.
42. Tsang W, Lang RM. Three-dimensional echocardiography is essential for intraoperative assessment of mitral regurgitation. Circulation. 2013;128(6):643-52; discussion 52.
43. Pardi MM, Pomerantzeff PMA, Sampaio RO, Abduch MC, Brandao CMA, Mathias W, Jr., et al. Relation of mitral valve morphology to surgical repair results in patients with mitral valve prolapse: A three-dimensional transesophageal echocardiography study. Echocardiog-raphy. 2018.
44. Lang RM, Tsang W, Weinert L, Mor-Avi V, Chandra S. Valvular heart disease. The value of 3-dimensional echocardiography. J Am Coll Cardiol. 2011;58(19):1933-44.
45. Ring L, Dutka DP, Wells FC, Fynn SP, Shapiro LM, Rana BS. Mecha-nisms of atrial mitral regurgitation: insights using 3D transoesopha-geal echo. Eur Heart J Cardiovasc Imaging. 2014;15(5):500-8.
46. Ermacora D, Muraru D, Cecchetto A, Cucchini U, Badano LP. Trans-thoracic three-dimensional echocardiography visualization of func-tional anatomy of double-orifice mitral valve. Eur Heart J Cardiovasc Imaging. 2015;16(8):862.
47. Di Salvo G, Miller O, Babu Narayan S, Li W, Budts W, Valsangiaco-mo Buechel ER, et al. Imaging the adult with congenital heart disease: a multimodality imaging approach-position paper from the EACVI. Eur Heart J Cardiovasc Imaging. 2018.
48. Narang A, Addetia K, Weinert L, Yamat M, Shah AP, Blair JE, et al. Diagnosis of Isolated Cleft Mitral Valve Using Three-Dimensional Echocardiography. J Am Soc Echocardiogr. 2018.
49. Wyss CA, Enseleit F, van der Loo B, Grunenfelder J, Oechslin EN, Jenni R. Isolated cleft in the posterior mitral valve leaflet: a congenital form of mitral regurgitation. Clin Cardiol. 2009;32(10):553-60.
50. Taramasso M, Feldman T, Maisano F. Transcatheter mitral valve re-pair: review of the clinical evidence. EuroIntervention. 2018;14(AB): AB91-AB100.
51. Sugimoto T, Dulgheru R, Marchetta S, Ilardi F, Contu L, Go YY, et al. What Does 3D Echocardiography Add to 2D Echocardiography in the Assessment of Mitral Regurgitation? Curr Cardiol Rep. 2017; 19(10):90.
52. Wunderlich NC, Siegel RJ. Peri-interventional echo assessment for the MitraClip procedure. Eur Heart J Cardiovasc Imaging. 2013; 14(10):935-49.
53. Khalique OK, Hahn RT. Role of Echocardiography in Transcathe-ter Valvular Heart Disease Interventions. Curr Cardiol Rep. 2017; 19(12):128.
54. Blanke P, Naoum C, Webb J, Dvir D, Hahn RT, Grayburn P, et al. Multimodality Imaging in the Context of Transcatheter Mitral Valve Replacement: Establishing Consensus Among Modalities and Disci-plines. JACC Cardiovasc Imaging. 2015;8(10):1191-208.
55. Rihal CS, Sorajja P, Booker JD, Hagler DJ, Cabalka AK. Principles of percutaneous paravalvular leak closure. JACC Cardiovasc Interv. 2012;5(2):121-30.
56. Bouchard MA, Cote-Laroche C, Beaudoin J. Multi-Modality Imaging in the Evaluation and Treatment of Mitral Regurgitation. Curr Treat Options Cardiovasc Med. 2017;19(12):91.
57. Faletra FF, Berrebi A, Pedrazzini G, Leo LA, Paiocchi VL, Cautilli G, et al. 3D transesophageal echocardiography: A new imaging tool for assessment of mitral regurgitation and for guiding percutaneous edge-to-edge mitral valve repair. Prog Cardiovasc Dis. 2017; 60(3): 305-21.
58. Faletra FF, Pozzoli A, Agricola E, Guidotti A, Biasco L, Leo LA, et al. Echocardiographic-fl uoroscopic fusion imaging for transcatheter mitral valve repair guidance. Eur Heart J Cardiovasc Imaging. 2018; 19(7):715-26. | 2019-04-19T12:41:46Z | https://www.romanianjournalcardiology.ro/arhiva/the-role-of-three-dimensional-echocardiography-for-the-clinical-diagnosis-and-management-of-mitral-valve-disease/ |
Member Weekly Swing Trade Update Jan 30, 17 – Swing Trading $OAK, $GOOGL, $AMZN and more.
Good morning swing traders and welcome to our weekly swing trading memo for the week of Jan 30, 2017!
Don’t hesitate to email us at [email protected] anytime with any questions about any of the swing trades listed below. Or, if we get bogged down private message Curtis in trade room or direct message him on Twitter. Market hours are tough but we endeavor to get back to everyone after market each day.
One new chart added for today and there will be more through the week this week. The rest are from the previous report. The new add is Oak Tree Capital $OAK.
It is important to note the other charts below have not been updated since being first inserted here, so be sure to look up most recent trading ranges before considering trades.
This Swing Report is in Development (as with $VIX, $SPY algos) – But We’re Getting There.
Below you will find my top ten picks for swing trading in the first quarter of 2017 (plus a few bonus picks I will be swing trading). I am currently in the middle of compiling the due diligence and charting set-ups for publication for over fifty charts so this list may grow considerably – I am excited about 2017.
As mentioned previous, I will also include our regular algorithmic modeling equities relating to Oil, Gold, Miners, Silver, US Dollar, Volatility and SPY in my 2017 reports (in addition to the ten others listed below) FYI.
In my reports I will focus on both long term holds and swing trading these equities with an intent to try and time the highs and lows (pull-backs) as best as possible. I know many propose that picking the highs and lows isn’t the best method – but to be frank it has served me well over the years.
Also, I should mention, that any of the stocks below that do not trade well (or as planned) I will switch out with another choice as the weeks progress. But the intent is to hold ten investment / swing stocks (per below) and also swing trade in and out of the regular algorithmic modeling equities I mentioned also.
Oh, and the updates will be coming out more often than weekly also (thought I should mention that).
First step is to get charts out with levels I will be trading. Then I’ll put out more DD on each also.
I am going to start below with ones that are most timely and build this out from there (in order of priority for my personal trades and what I see going on in the market).
My seventh priority is the VIX. I see a pull-back in the market coming and a lift in VIX. The primary trade I am looking for is actually a short in the VIX when it gets upside it’s bolllinger band (it’s a little more complicated than that – specifically with timing and I will be putting an alert out when I do it anyway) – I’ll also play some short term longs in $TVIX or $UVXY.
My third priority on this list are the miner’s – $GDX and leveraged friends. This one is risky but comes with large gains if miner’s get moving and price breaks in to next quadrant above the yellow one outlined on the chart below. And for the risk taker it can be traded with leveraged ETN’s. There are inherent risks however; one is that price is not at bottom of the trading quadrant so an entry here is not ideal and the obvious issue is the Trump factor.
In overnight lab work our developers established a diagonal trendline (blue line in chart that has a blue arrow pointing at it) that has established itself as strong support. If you take a swing trade against that support (as as close to it as possible) then look to the upside of that white dotted arrow line as your target long. Ratchet up stops there.
I will be updating regularly now – I need to get as much done here before inauguration for my own trading too so that’s a major motivator – I will send out updates as I update!
Member Weekly Swing Trade Update Jan 23, 17 – Swing Trading, $GOOGL and more.
Good morning swing traders and welcome to our weekly swing trading memo for the week of Jan 22, 2017!
One new chart added for today! The rest are from the previous report. The new add is Alphabet (Google) $GOOGL. They report earnings this Thursday!
So bottom line is that I am in process here, building it out, it isn’t done, it’s going to take a lot more time than I ever imagined, but I’ll be updating and building this out considerably now forward. Again, sorry about the delays.
Good morning swing traders and welcome to our weekly swing trading memo for the week of Jan 16, 2017!
Below only one new chart added for today! The rest are from the previous report. It’s $USOIL $WTI that can be traded also with $UWT $DWT, $USO, $UCO, $SCO etc… Anyway, oil has established a support area that would be decent as a swing trade – see below for details.
Below only one new chart added for today! The rest are from the previous report. It’s $TRCH and it’s a doozie!
Good morning swing traders and welcome to our weekly swing trading memo for the week of Jan 9, 2017!
This is Only an Intro Memo.
Below you will find my top ten picks for swing trading in the first quarter of 2017. I am currently in the middle of compiling the due diligence and charting set-ups for publication. I will have this out to members within 48 hours. I apologize for the delay. I found myself deep in to the charting, financials and company technical dynamics of over fifty companies while doing my research for 2017 swing and investment trades – I didn’t expect to get that deep and involved in my research. But I did and that has caused a bit of delay.
I will also include our regular algorithmic modeling equities relating to Oil, Gold, Miners, Silver, US Dollar, Volatility and SPY in my 2017 reports (in addition to the ten others listed below) FYI.
I am very encouraged getting back in to investing and swing trading this year – I have been on the sidelines for the better part of two years as the markets have been more sideways than up or down. But I see 2017 as a really strong investing and swing trading year.
So below I only share my top picks and will have complete swing and investment reports out within 48 hours and thereafter I will have weekly swing set-ups published like clock-work moving forward. In my reports I will focus on both long term holds and swing trading these equities with an intent to try and time the highs and lows (pull-backs) as best as possible. I know many propose that picking the highs and lows isn’t the best method – but to be frank it has served me well over the years.
So if you could, bear with me for another 48 hours and I will have complete charting and due diligence out to our swing trade members and onward and upward for 2017!
Oh, and I should mention, I did receive a number of emails over Christmas and will be responding to them in conjunction with turning around my report here over the next couple days.
Good morning swing traders and welcome to our weekly swing trading newsletter for the week of Dec 19, 2016!
Don’t hesitate to email us at [email protected] anytime with any questions about any of the swing trades listed below. Or, if we get bogged down private mesage Curt in trade room or direct message him on Twitter. Market hours are tough but we endeavor to get back to everyone after market each day.
The information below can be quite involved so we don’t mind assisting as needed!
This is one of the best swing set-ups on $SPY and it is really simple (for tighter ranges please refer to FREEDOM the SPY Algo).
When the 200 and 20 MA cross on the 1 Hr use it as buy and sell triggers. Simple.
You can use a number of instruments to trade oil such as FX $USOIL $CL_F CL $UWT $DWT $USO $UCO $SCO and more…. I am using $UWT and $DWT.
The important thing with oil is to watch the Fibonacci levels, trend lines (diagonal and horizontal), your moving averages and your trading widths (margins / pivots). I can’t discuss the algorithm here but I can refer you to Epic the Oil Algo twitter feed for various public posts.
Widths / trading range pivots – Because oil is in a break-out you want to take your long positions at the bottom of the yellow lines and I as I mentioned in the last swing newsletter I WOULD NOT short oil in an uptrend at the top of the yellow lines. Wait to short it when it is in a confirmed downtrend – and now is not a confirmed downtrend.
So now my long position is still long as long as price is over 20 MA on the 4 hour chart (per below) or I may exit at any time. The point is, the next entry trigger I will use long wth $UWT is when the price goes below the 20 MA on the 4 hour chart and then price crosses back up through the 4 hour. This (in addition to support and resistance indicators I gave you last week) is a prmary indicator for long buys in crude oil right now.
Here again I cannot share the proprietary algorithm components of Rosie’s algo but I can share with you the publicly posted data. Rosie predicted in July that Gold would hit this range but also warned of a 90% chance that Gold would have to hit the bottom of a quadrant on her charting. That would put Gold near 1133.00. I am waiting to see if this occurs and I will take a long trade in $NUGT at that time with a normal swing stop of about 4% and then if uptrend confirms I will scale in at 3 stages. Initial order 2000 shares the 5000 then 10000 then 20000 adding at pullbacks.
The idea in swing trading is to catch the trend reversal and then scale in when confirmed.
Good thing I waited! Price has downtrended since. It isn’t at my preferred 1133.00 so I am going to watch – if it starts to take off upward I will start to nibble with long positions with tight stops. No particular level that I would do that – just if it started to move for any more than a day and it looked like it had momentum. Then slowly enter. BUT THE PREFERRED play is to wait for that 1133.00 WHICH COULD COME QUICK NOW.
When the price of Gold turns back up above the 100 MA (blue line) on the 1 week chart that is as simple an indicator swings as you can get. And sell when it turns down below. I am watching this and other indicators per previous. For tighter tighter time-frames refer to Rosie the Algo subscription – but for swings I would use this indicator.
Silver is in exactly the same position as Gold – wait for the Gold confirmation before entering IMO. Use the same scaling principals. Watch SuperNova Silver twitter feed too.
I have always said that Silver will hold up better in a downtrend, but it doesn’t mean you take a long position yet. Sure, it came up a bit since last week, but the idea is to catch the tren reversal and scale in to it for a large gain over time.
So this is an indicator set-up for Silver swing trading that I will be using. Buy signal is when price is over 200 and 20 MA on the 1 week chart and sell signal is when price is under the 20 MA.
For tighter tighter time-frames refer to SuperNova Silver Algo subscription – but for swings I would use this indicator.
I am going to enter a long position in $UVXY or $TVIX for a short term swing (less than 10 days hopefully) at as close to 12.20 as I can get – if I can’t get that I am looking at 12.77.
Considering the geo political environment I won’t be shorting the $VIX unless it gets really extended to topside – which it is not right now.
So it came down to my price target and I didn’t take a trade – I watched. Then it spiked and I would have had a short term gain. Now it’s sitting back at my buy target area and I am going to watch.
If it starts upward I will likely take a trade long in $TVIX or $UVXY and exit by ratcheting up my stops as it goes. Where exactly where I take that trade? I don’t know. But I’m getting more confident with it because of two reasons.
1. At the end of day Friday the there was $VIX insurance buying even while $SPY was spiking at end of day and $XIV (which is the opposite of $VIX) wasn’t moving like it normally does when there is a $SPY spike. Now, $VIX isn’t determined by $SPY but it is a signficant factor. So when they move in this way it is time to pay attention.
Now, if the $VIX does spike, and the spike is significant I will short the $VIX because that is always easy money – but that is something that has to be determined on an intra level and I can’t give you levels here on a swing alert.
It doesn’t get much easier than that for long and short side of $VIX – but you do need to babysit it close because it can swing drastic – so set stops.
The simplest swing trading indicator on the US Dollar I was able to find. 200 MA and 50 MA cross on the 1 day chart for long and short positions.
This is a wash-out snap-back swing that I really like. It is up in premarket today but I believe there is a lot of room here. My timeframe is 3 months and I expect a lot of that gap fill to come in to play at 29.83. It has resistance at 22.87 but I don’t think it will hold. One of my favorite swings right now.
So this one didn’t do as well, but I am holding and I will enter with more of a position if it gets back up off it’s feet and starts trending up. Like I wrote, my time-frame is 3 months so I will be patient.
So $JUNO has continued to be soft… I am still in and holding – I will be looking for a long add when I get solid buy triggers. I will update mid week if I take a long position trade.
This IMO opinion is a fantastic opportunity – but it does have its risk. You wll have to research the company on your own and make a determination for yourself. But if you find after your research that you think it’s a decent hold for a month or two it is one of the best swing plays on the market at this price IMO. I’m looking to add today to my position.
Well this one worked out well too, I am currently adding in near the 2.90 level. A mid term hold for (3 – 6 months) and I expect close to 50% gain on it. But it is high risk so set stops.
I am still in this. I will be adding to my position long if and when price nears the yellow line on chart.
That’s about it for this week. I am waiting for the market inflection to settle down and a little more of the indices to settle on the other side of this Trump trade before scaling in to any indices plays and the like. But as I said I am running about 40 charts on plays I am looking at and hope to start adding some of those for next Sunday!
Have a great week and if you have any questions email anytime!
Good morning traders and welcome to our weekly swing trading newsletter for the week of Dec 12, 2016!
You can use a number of instruments to trade oil such as FX $USOIL $CL_F CL $USO $UCO $SCO and more…. I am using $UCO for the long (by the way $UWTI AND $DWTI are being resurrected so I am very excited to be able to trade these again soon) and I am currently looking at a number of small cap and mid cap oil plays. Oil is in an obvious break-out (and since last report doing well).
Widths / trading range pivots – Because oil is in a break-out you want to take your long positions at the bottom of the yellow lines and I as I mentioned in the last swing newsletter I WOULD NOT short oil in an uptrend at the top of the yellow lines. Wait to short it when it is in a confirmed downtrend – and now is not a confirmed downtrend. So right now I am looking for an entry long at a lower yellow line at 51.91 with a stop at 51.63 and I would exit before 54.43. See orange arrow. If that fails support and my stop gets hit then I will look at a long at next orange arrow down at 49.56 with a stop at 49.16 and I would exit before resistance at 51.90. If this also failed (the second entry arrow) oil is in a downtrend and levels would have to be looked at again to re-adjust.
If crude happens to get up over current resistance at 54.45 I would take a long position with a stop at 54.29 and if it works I would simply hold until crude finds its new trading range and reevaluate in a week or more but keep the stop in place. You can also move the stop up a bit as crude trades up in this instance.
Fibonacci Levels – As with last newsletter, because oil is in another break out I wouldn’t be comfortable taking a long or short position based on fib levels because they are skewed. Wait for this break-out to back-test and then look at the levels next Sunday night update.
MA – Oil is trading way above its MA’s so there is no concern here with long positions – but take the range pivots in to consideration first. When these become a possible issue I will advise.
Orange arrows represent chart support for long trade in crude oil.
Watch Rosie the Gold Algo twitter feed for intra-day updates that may occur.
Gold Swing preferred target is 1133.00 ish for long trade.
Now, if the $VIX does spike, and the spike is signficant I will short the $VIX because that is always easy money – but that is something that has to be determined on an intra level and I can’t give you levels here on a swing alert.
I really like this swing as a low float energy play. But you have to set a stop at 4% or so and be ready to ratchet up stops as it gets closer to 8.00. This stock has a history of serious gains when oil gets in to break out mode.
Well… that worked out well. There was a really nice spike right that day for a great gain and it is trading this morning again for a nice gain.
The way to play this one now safe is to watch the oil trading chart and support levels I gave you. Wait for oil to hit one of those two support levels I show on the oil chart and play it exactly like you would oil as I wrote above. And, if oil gets up over that overhead resistance I outlined you can then go long $SGY vs. oil. Either way, if you take a long position at a support set your stop at about 4 – 5% and if you get lift ratchet your stops up as you go. There is no way to give you levels up if it goes – just ratchet up stops at your comfort level.
$SGY Swing trade alert worked well. 7.12 to 8.70 ish and 8.12 now.
Casino stocks: $WYNN $MPEL $MGM $LVS – but I can’t say right now that I will. I am also watching retail and tech for long positions, but not quite ready. Will update on this soon. | 2019-04-19T21:01:01Z | https://compoundtrading.com/category/swing-trading/page/22/ |
Speech Research Laboratory » David B. Pisoni, Ph.D.
1968, June Queens College of the City University of New York Flushing, NY.
Restle, F., Shiffrin, R. M., Castellan, N. J., Lindman, H., Pisoni, D. B. (Eds.). (1975). Cognitive Theory: Volume I. Hillsdale, NJ Lawrence Erlbaum Associates.
Castellan, N. J., Pisoni, D. B. & Potts, G. (Eds.). (1977). Cognitive Theory: Volume II. Hillsdale, NJ: Lawrence Erlbaum Associates.
Chin, S.B. & Pisoni, D.B. (1997). Alcohol and Speech. San Diego, CA: Academic Press.
Pisoni, D.B. & Remez, R.E. (Eds.). (2005). The Handbook of Speech Perception. Malden, MA: Blackwell Publishing.
Pisoni, D. B. & Gerstman, L. J. Semantic and syntactic constraints on sentence reconstruction by the Cloze Procedure. Proceedings of the American Psychological Association, 1968, 3, 13-14.
Tanur, J. M. & Pisoni, D. B. A Fortran IV program for scoring Cloze Procedure data. Behavioral Science, 1969, 14, 167.
Pisoni, D. B. Communicability in schizophrenic patients and its relationship to current psycholinguistic theory. In A. P. Van Teslaar & S. Rosenberg (Eds.) Studies in language and language behavior. Ann Arbor: University of Michigan, Center for Research on Language & Language Behavior, February, 1969, Pp. 299 313.
Salzinger, K., Portnoy, S., Pisoni, D. B., & Feldman, R. S. The immediacy hypothesis and response produced stimuli in schizophrenic speech. Journal of Abnormal Psychology, 1970, 76, 258 264.
Catford, J. C. & Pisoni, D. B. Auditory versus articulatory instruction in the teaching of exotic sounds. Modern Language Journal, 1970, 54, 477 481.
Schane, S.A. & Pisoni, D.B. Psycholinguistic evidence for a hierarchy of syllable structure. In Studies in Language and Language Behavior, Progress Report Phase VI, July 31, 1970, Ann Arbor: University of Michigan, Center for Research on Language & Language Behavior, Pp. 1 10.
Pollack, I. & Pisoni, D. B. On the comparison between identification and discrimination tests in speech perception. Psychonomic Science, 1971, 24, 299 300.
Pisoni, D. B. On the nature of categorical perception of speech sounds. New Haven: Haskins Laboratories Supplement to Status Report on Speech Research. SR 27, November, 1971, pp. 101.
Studdert Kennedy, M., Shankweiler, D., & Pisoni, D. B. Auditory and phonetic processes in speech perception: Evidence from a dichotic study. Cognitive Psychology, 1972, 3, 455 466.
Pisoni, D. B. Perceptual processing time for consonants and vowels. Haskins Laboratories Status Report on Speech Research, SR 31/32, 1972, 83 92.
Turvey, M.T., Pisoni, D.B., & Croog, J. F. A right ear advantage in the retention of words presented monaurally. Haskins Laboratories Status Report on Speech Research, SR 31/32, 1972, 67 74.
Pisoni, D. B. Auditory and phonetic memory codes in the discrimination of consonants and vowels. Perception & Psychophysics, 1973, 13, 253 260.
Pisoni, D. B. & Tash, J. Test questions for human information processing: An introduction to psychology, by P. Lindsay & D. A. Norman. New York: Academic Press, 1973, pp. 82.
Shiffrin, R. N., Pisoni, D. B. and Casteneda Mendez, K. Is attention shared between the ears? Cognitive Psychology, 1974, 6, 190 215.
Pisoni, D. B. & Tash, J. Reaction times to comparisons within and across phonetic categories. Perception & Psychophysics, 1974, 15, 285 290.
Pisoni, D. B. & Lazarus, J. H. Categorical and noncategorical modes of speech perception along the voicing continuum. Journal of the Acoustical Society of America, 1974, 55, 328 333.
Sawusch, J. R. & Pisoni, D. B. On the identification of place and voicing features in synthetic stop consonants. Journal of Phonetics, 1974, 2, 181 194.
Pisoni, D. B. & McNabb, S. D. Dichotic interactions and phonetic feature processing. Brain & Language, 1974, 1, 351 362.
Pisoni, D.B. Auditory short-term memory and vowel perception. Memory & Cognition, 1975, 3, 7-18.
Pisoni, D. B. Review of “Acoustic Cues for Constituent Structure” by Robert Scholes. Linguistics, 1975, 146, 104 106.
Pisoni, D. B. Contemporary issues in speech perception. In F. Restle, R. M. Shiffrin, N. J. Castellan, H. Lindman, & D. B. Pisoni (Eds.) Cognitive Theory: Volume I. Hillsdale, NJ: Erlbaum Associates, 1975, Pp. 1 4.
Pisoni, D. B. Dichotic listening and processing phonetic features. In F. Restle, R. M. Shiffrin, N. J. Castellan, H. Lindman, & D. B. Pisoni (Eds.) Cognitive Theory: Volume I. Hillsdale, NJ: Erlbaum Associates, 1975, Pp. 79 102.
Pisoni, D. B. Information processing and speech perception. In G. Fant (Ed.) Speech Communication: Volume 3. New York: John Wiley, 1975, Pp. 331 337.
Pisoni, D. B. & Sawusch, J. R. Some stages of processing in speech perception. In A. Cohen & S. Nooteboom (Eds.) Structure and process in speech perception. Heidelberg: Springer Verlag, 1975, Pp. 16 34.
Pisoni, D. B. & Tash, J. Auditory property detectors and processing place features in stop consonants. Perception & Psychophysics, 1975, 18, 401 408.
Pisoni, D. B. Review of “The Psychology of Language” by J. A. Fodor, T. G. Bever and M. F. Garrett. Language, 1976 52, 682 689.
Pisoni, D. B. Mechanisms of auditory discrimination and coding of linguistic information. In J. V. Irwin (Ed.) The Second Auditory Processing and Learning Disabilities Symposium. Memphis: Memphis State University Press, 1976, Pp. 73 119.
Sawusch, J. R. & Pisoni, D. B. Response organization in selective adaptation to speech sounds. Perception & Psychophysics, 1976, 20, 413 418.
Pisoni, D. B. Identification and discrimination of the relative onset of two component tones: Implications for voicing perception in stop consonants. Journal of the Acoustical Society of America, 1977, 61, 1352 1361.
Liberman, A. M. & Pisoni, D. B. Evidence for a special speech perception subsystem in the human. In T. H. Bullock (Ed.) Recognition of Complex Acoustic Signals. Berlin: Dahlem Konferenzen, 1977. Pp. 59 76.
Pisoni, D. B. Speech Perception. In W. K. Estes (Ed.) Handbook of Learning and Cognitive Processes: Volume 6. Hillsdale, NJ: Erlbaum Associates, 1978, Pp. 167 233.
Cutting, J. E. & Pisoni, D. B. An information processing approach to speech perception. In J. F. Kavanagh & W. Strange (Eds.) Implications of Basic Speech and Language Research to the School and Clinic. Cambridge: The M.I.T. Press, 1978, Pp. 38 72.
Sawusch, J. R. & Pisoni, D. B. Simple and contingent adaptation effects in speech perception. Perception & Psychophysics, 1978, 23, 125 131.
Pisoni, D. B. On the perception of speech sounds as biologically significant signals. Brain, Behavior, and Evolution, 1979, 16, 330 350.
Pisoni, D. B. Review of “Speech Recognition” by R. Reddy. Journal of the Acoustical Society of America, 1979, 65, 867 869.
Pisoni. D. B. Perception of speech vs. nonspeech: Evidence for different modes of processing. Proceedings of the Ninth International Congress of Phonetic Sciences, Copenhagen, August, 1979. Copenhagen: Institute of Phonetics, University of Copenhagen, 1979, Pp. 433 437.
Grunke, M. E. & Pisoni, D. B. Perceptual learning of mirror image acoustic patterns. Proceedings of the Ninth International Congress of Phonetic Sciences, Copenhagen, August, 1979. Copenhagen: Institute of Phonetics, University of Copenhagen, 1979, Pp. 461 467.
Bell Berti, F., Raphael, L., Pisoni, D. B. & Sawusch, J. R. Some relations between articulation and perception. Phonetica, 1979, 36, 373 383.
Pisoni, D. B., Carrell, T. D. & Simnick, S. S. Does a listener need to recover the dynamic vocal tract gestures of a talker to recognize his vowels? In J. J. Wolf and D. H. Klatt (Eds.) Speech Communication Papers Presented at the 97th Meeting of the Acoustical Society of America. New York: Acoustical Society of America, 1979, Pp. 19 23.
Aslin, R. N., Pisoni, D. B., Hennessy, B. L. & Perey, A. J. Identification and discrimination of a new linguistic contrast. In J. J. Wolf and D. H. Klatt (Eds.) Speech Communication Papers Presented at the 97th Meeting of the Acoustical Society of America. New York: Acoustical Society of America, 1979, Pp. 439 442.
Aslin, R. N. & Pisoni, D. B. Some developmental processes in speech perception. In G. Yeni Komshian, J. F. Kavanagh, & C. A. Ferguson (Eds.) Child Phonology: Perception and Production, New York: Academic Press, 1980, Pp. 67 96.
Pisoni, D. B. Adaptation of the relative onset time of two component tones. Perception & Psychophysics, 1980, 28, 337 346.
Jusczyk, P. W., Pisoni, D. B., Walley, A. & Murray, J. Discrimination of relative onset time of two component tones by infants. Journal of the Acoustical Society of America, 1980, 67, 262 270.
Aslin, R. N. & Pisoni, D. B. Effects of early linguistic experience on speech discrimination by infants: A critique of Eilers, Gavin and Wilson (1979). Child Development, 1980, 51, 107 112.
Gruenenfelder, T. M. & Pisoni, D. B. Fundamental frequency as a cue to postvocalic consonantal voicing: Some data from perception and production. Perception & Psychophysics, 1980, 28, 514 520.
Pisoni, D. B. Summary of Symposium No. 8: Perception of Speech versus Nonspeech. Proceedings of the Ninth International Congress of Phonetic Sciences, Copenhagen, August, 1979. Copenhagen: Institute of Phonetics, University of Copenhagen, 1980. Pp. 312 320.
Pisoni, D. B. Variability of vowel formant frequencies and the Quantal Theory of Speech: A first report. Phonetica, 1980, 37, 285 305.
Pisoni, D. B. & Hunnicutt, S. Perceptual evaluation of MITalk: The MIT unrestricted text to speech system. 1980 IEEE International Conference Record on Acoustics, Speech, and Signal Processing, April, 1980. Pp. 572 575.
Bernstein, J. & Pisoni, D. B. Unlimited text to speech device: Description and evaluation of a micro-processor based system. 1980 IEEE International Conference Record on Acoustics, Speech, and Signal Processing, April, 1980. Pp. 576 579.
Carrell, T. D., Smith, L. B. & Pisoni, D. B. Some perceptual dependencies in speeded classification of vowel color and pitch. Perception & Psychophysics, 1981, 29, 1 10.
Remez, R. E., Rubin, P. E., Pisoni, D. B. & Carrell, T. D. Speech perception without traditional speech cues. Science, 1981, 212, 947 950.
Walley, A. C., Pisoni, D. B. & Aslin, R. N. The role of early experience in the development of speech perception. In R. N. Aslin, J. Alberts and M. R. Petersen (Eds.), The Development of Perception: Psychobiological Perspectives. New York: Academic Press, 1981. Pp. 219 255.
Blank, M. A., Pisoni, D. B. & McClaskey, C. Effects of target monitoring on comprehension of fluent speech. Perception & Psychophysics, 1981, 29, 383 388.
Aslin, R. N., Pisoni, D. B., Hennessy, B. L. & Perey, A. J. Discrimination of voice onset time by human infants: New findings and implications for the effects of early experience. Child Development, 1981, 52, 1135 1145.
Pisoni, D. B. Some current theoretical issues in speech perception. Cognition, l981, 10, 249 259.
Pisoni, D. B., Aslin, R. N., Perey, A. J. & Hennessy, B. L. Some effects of laboratory training on identification and discrimination of voicing contrasts in stop consonants. Journal of Experimental Psychology: Human Perception and Performance, 1982, 8, 297 314.
Grunke, M. E. & Pisoni, D.B. Some experiments on perceptual learning of mirror image acoustic patterns. Perception & Psychophysics, 1982, 31, 210 218.
Brunner, H. & Pisoni, D.B. Some effects of perceptual load on spoken text comprehension. Journal of Verbal Learning and Verbal Behavior, 1982, 21, 186 195.
Walley, A. C. & Pisoni, D. B. Review of J. Morton & J. Marshall (Ed.), “Psycholinguistics.” Journal of Communication Disorders, 1982, 15, 63 73.
Pisoni, D. B. Perception of speech: The human listener as a cognitive interface. Speech Technology, 1982, 1, 10 23.
Pisoni, D. B. Perceptual evaluation of voice response systems: Intelligibility, recognition and understanding. Proceedings of the Workshop on Standardization for Speech I/O Technology. Washington, DC: National Bureau of Standards, 1982, 183 192.
Nusbaum, H. C. & Pisoni, D. B. Perceptual and cognitive constraints on the use of voice response systems. In L. Lerman (Ed.), Proceedings of the Conference on Voice Data Entry Systems. Sunnyvale: Lockheed, 1982, Pp. 1 18.
Pisoni, D. B. Speech Technology: The Evolution of Computers that Speak…and Listen. Bloomington: Indiana University Office of Research & Graduate Development, 1982, Pp. 38.
Pisoni, D. B. Lexical access. In A. S. House (Ed.), Project SCAMP 1981: Acoustic Phonetics and Speech Modeling. Princeton, NJ: Institute for Defense Analyses, Communications Research Division, 1982.
Pisoni, D. B. In defense of segmental representations in speech processing. In A. S. House (Ed.), Project SCAMP 1981: Acoustic Phonetics and Speech Modeling. Princeton, NJ: Institute for Defense Analyses, Communications Research Division, 1982.
McClaskey, C. L., Pisoni, D. B. and Carrell, T. D. Effects of transfer of training on identification of a new linguistic contrast. Perception & Psychophysics, 1983, 34, 323 330.
Sinnott, J. M., Pisoni, D. B. & Aslin, R. N. Pure tone thresholds in the human infant and adult. Infant Behavior and Development, 1983, 6, 3 17.
Pisoni, D. B., Carrell, T. D. & Gans, S. J. Perception of the duration of rapid spectrum changes: Evidence for context effects with speech and nonspeech signals. Perception & Psychophysics, 1983, 34, 314 322.
Aslin, R. N., Pisoni, D. B. & Jusczyk, P. W. Auditory development and speech perception in infancy. In P. Mussen (Ed.), Carmichael’s Manual of Child Psychology, 4th Edition, Volume II: Infancy and the Biology of Development, M. M. Haith and J. J. Campos (Vol. II Editors). New York: Wiley and Sons, 1983. Pp. 573 687.
Luce, P. A., Feustel, T. C. & Pisoni, D. B. Capacity demands in short term memory for synthetic and natural word lists. Human Factors, 1983, 25, 17 32.
Remez, R. E., Rubin, P. E. & Pisoni, D. B. Coding of the speech spectrum in three time varying sinusoids. In C. W. Parkins & S. W. Anderson (Eds.), Cochlear Prosthesis: An International Symposium. New York: Annals of the New York Academy of Sciences, Volume 405, 1983. Pp. 485 489.
Kewley Port, D., Pisoni, D. B. & Studdert Kennedy, M. Perception of static and dynamic acoustic cues to place of articulation in initial stop consonants. Journal of the Acoustical Society of America, 1983, 73, 1779 1793.
Greene, B. G., Craig, J. C., Wilson, A. M., Pisoni, D. B. & Rhodes, R. P. Vibrotactile identification of vowel spectra. Journal of the Acoustical Society of America, 1983, 73, 1766 1778.
Greene, B. G., Craig, J. C. & Pisoni, D. B. Vibrotactile communication of information about consonants: Vowels mask consonants. Perception & Psychophysics, 1983, 33, 507 515.
Jusczyk, P. W., Pisoni, D. B., Reed, M., Fernald, A. & Myers, M. Infants’ discrimination of the duration of a rapid spectrum change in nonspeech signals. Science, 1983, 222, 175 177.
Pisoni, D. B., Nusbaum, H. C., Luce, P. A. & Schwab, E. C. Perceptual evaluation of synthetic speech: Some considerations of the user/system interface. Proceedings of the International Conference on Acoustics, Speech, and Signal Processing, April 1983. Pp. 535 538.
Nusbaum, H.C., Schwab, E. C. & Pisoni, D.B. Perceptual evaluation of synthetic speech: Some constraints on the use of voice response systems. Proceedings of the 3rd Voice Data Entry Systems Applications Conference. Sunnyvale, CA: Lockheed, 1983.
Kewley Port, D. & Pisoni, D. B. Identification and discrimination of rise time: Is it categorical or noncategorical? Journal of the Acoustical Society of America, 1984, 75, 1168 1176.
Walley, A. C., Pisoni, D. B. & Aslin, R. N. Infant discrimination of two and five formant voiced stop consonants differing in place of articulation. Journal of the Acoustical Society of America, 1984, 75, 581 589.
Greene, B. G., Pisoni, D. B. & Carrell, T. D. Recognition of speech spectrograms. Journal of the Acoustical Society of America, 1984, 76, 32 43.
Nusbaum, H. C. & Pisoni, D. B. Perceptual evaluation of synthetic speech generated by rule. In Proceedings of the 4th Voice Data Entry Systems Application Conference, September, 1984.
Salasoo, A. & Pisoni, D. B. Sources of knowledge in spoken word identification. Journal of Memory and Language, 1985, 24, 210 231.
Pisoni, D. B. Speech perception: Some new directions in research and theory. Journal of the Acoustical Society of America, 1985, 78, 381 388.
Pisoni, D. B., Nusbaum, H. C., Luce, P. A. & Slowiaczek, L. M. Speech perception, word recognition and the structure of the lexicon. Speech Communication, 1985, 4, 75 95.
Nusbaum, H. C. & Pisoni, D. B. Some constraints on the perception of synthetic speech. Behavior Research Methods, Instruments, and Computers, 1985, 17, 235 242.
Pisoni, D. B., Bernacki, R. H., Nusbaum, H. C. & Yuchtman, M. Some acoustic phonetic correlates of speech produced in noise. In Proceedings of 1985 International Conference on Acoustics, Speech, and Signal Processing. Pp. 1581 1584.
Pisoni, D. B., Nusbaum, H. C. & Greene, B. G. Perceptual evaluation of synthetic speech generated by rule. Proceedings of the IEEE, 1985, 73, 1665 1676.
Pisoni, D. B., Greene, B. G. & Nusbaum, H. C. Some human factors issues in the perception of synthetic speech. Proceedings of Speech Tech-85, New York, April, 1985. Pp. 57 61.
Greenspan, S. L., Nusbaum, H. C. & Pisoni, D. B. Perception of synthetic speech: Effects of training and attention. In Proceedings of the 5th Voice Data Entry Systems Applications Conference, September, 1985.
Schwab, E. C., Nusbaum, H. C. & Pisoni, D. B. Some effects of training on the perception of synthetic speech. Human Factors, 1985, 27, 395 408.
Pisoni, D. B. Contextual variability and the problem of acoustic phonetic invariance in speech. In J. Perkell and D. H. Klatt (Eds.), Invariance and Variability in Speech Processes. Hillsdale, New Jersey: Lawrence Erlbaum Associates, 1986, Pp. 154 161.
Greene, B.G., Logan, J.S. & Pisoni, D.B. Perception of synthetic speech produced automatically by rule: Results from eight text to speech systems. Behavior Research Methods, Instruments, and Computers, 1986, 18, 100 107.
Pisoni, D. B. & Luce, P. A. Speech perception: Research, theory and the principal issues. In E. C. Schwab and H. C. Nusbaum (Eds.), Pattern Recognition by Humans and Machines: Speech Perception. Volume 1. New York: Academic Press, 1986, pp. 1 50.
Pisoni, D. B., Yuchtman, M. & Hathaway, S. N. Effects of alcohol on the acoustic phonetic properties of speech. In Alcohol, Accidents and Injuries. Warrendale, PA: Society of Automotive Engineers, 1986, pp. 131 150.
Slowiaczek, L. M. & Pisoni, D. B. Effects of phonological similarity on priming in auditory lexical decision. Memory & Cognition, 1986, 14, 230 237.
Nusbaum, H. C. & Pisoni, D. B. Human factors issues for the next generation of speech recognition systems. Proceedings of Speech Tech -86. New York: Media Dimensions, 1986, pp. 140 144.
Nusbaum, H. C. & Pisoni, D. B. The role of structural constraints in auditory word recognition. In P. Mermelstein, M. Lenning, and D. O’Shaughnessy, (Eds.), Montreal Symposium on Speech Recognition. Montreal: Canadian Acoustical Society, 1986, pp. 57 61.
Pisoni, D. B. A brief overview of speech synthesis and recognition technologies. In Proceedings of the Human Factors Society, Vol. 2. Santa Monica, CA: Human Factors Society, 1986, pp. 1326 1330.
Pisoni, D. B. & Nusbaum, H. C. Developing methods for assessing the performance of speech synthesis and recognition systems. In Proceedings of the Human Factors Society, Vol. 2. Santa Monica, CA: Human Factors Society, 1986, pp. 1344 1348.
Pisoni, D. B. Some measures of intelligibility and comprehension. In J. Allen, D. H. Klatt and S. Hunnicutt From Text to Speech: The MITalk System. Cambridge, UK: Cambridge University Press, 1987, pp. 151 171.
Pisoni, D. B. & Luce, P. A. Acoustic phonetic representations in the mental lexicon. Cognition, 1987, 25, 21 52.
Luce, P.A. & Pisoni, D.B. Speech perception: New directions in research, theory and application. In H. Winitz (Ed.) Human Communication and Its Disorders. Norwood, NJ: Ablex, 1987, pp. 1 87.
Slowiaczek, L. M., Nusbaum, H. C. & Pisoni, D. B. Phonological priming in auditory word recognition. Journal of Experimental Psychology: Human Learning, Memory, and Cognition, 1987, 13, 64 75.
Pisoni, D. B. & Luce, P. A. Trading relations, acoustic cue integration, and context effects in speech perception. In M. E. H. Schouten (Ed.), The Psychophysics of Speech Perception. Dordrecht, The Netherlands: Martinus Nijhoff Publishers, 1987. Pp. 155 172.
Pisoni, D. B. Auditory perception of complex sounds: Comparisons of speech vs. nonspeech signals. In W. A. Yost and C. S. Watson (Eds.), Auditory Processing of Complex Sounds. Hillsdale, NJ: Lawrence Erlbaum Associates, 1987. Pp. 247 256.
Slowiaczek, L. M. & Pisoni, D. B. Speech perception. In McGraw Hill Encyclopedia of Science & Technology, Volume 17, 4th Edition. NY: McGraw Hill, 1987. Pp. 228 231.
Gumas, C., Hogan, D., Oshika, B., & Pisoni, D.B. Evaluation of voice communications systems. Proceedings of the American Voice Input Output Society. Sunnyvale, CA: Lockheed, 1987.
Nusbaum, H. C. & Pisoni, D. B. Testing the performance of isolated utterance speech recognition devices. Computer Speech and Language, 1987, 2, 87 108.
Pisoni, D. B., Manous, L. M. & Dedina, M. J. Comprehension of natural and synthetic speech: Effects of predictability on the verification of sentences controlled for intelligibility. Computer Speech and Language, 1987, 2, 303 320.
Greene, B. G. & Pisoni, D. B. Perception of synthetic speech by adults and children. In L. E. Bernstein (Ed.) The Vocally Impaired: Clinical Practice and Research. Philadelphia: Grune & Stratton, 1988. Pp. 206 248.
Gierut, J. A. & Pisoni, D. B. Fundamental differences in speech perception across populations. In N. Lass, L. McReynolds, J. Northern, and D. Yoder (Eds.), Handbook of Speech-Language Pathology and Audiology. Philadelphia: B. C. Decker, 1988. Pp. 253 276.
Greenspan, S. L., Nusbaum, H. C. & Pisoni, D. B. Perceptual learning of synthetic speech produced by rule. Journal of Experimental Psychology: Human Learning, Memory, and Cognition, 1988, 14, 421 433.
Summers, W. V., Pisoni, D. B., Bernacki, R. H., Pedlow, R. I. & Stokes, M. A. Effects of noise on speech production: Acoustic and perceptual analyses. Journal of the Acoustical Society of America, 1988, 84, 917 928.
Pisoni, D. B. Review of “Speech and Speaker Recognition: by M. R. Schroeder. Journal of the Acoustical Society of America, 1988, 84, 457 458.
Mullennix, J.W., Pisoni, D.B. & Martin, C.S. Some effects of talker variability on spoken word recognition. Journal of the Acoustical Society of America, 1989, 85, 365 378.
Mullennix, J.W. & Pisoni, D.B. Speech perception: Analysis of biologically significant signals. In R.J. Dooling and S.H. Hulse (Eds.), The Comparative Psychology of Complex Acoustic Perception. Hillsdale, NJ: Erlbaum, 1989. Pp. 97 128.
Logan, J.S., Greene, B.G. & Pisoni, D.B. Segmental intelligibility of synthetic speech produced by ten text to speech systems. Journal of the Acoustical Society of America, 1989, 86, 566 581.
Martin, C.S., Mullennix, J.W., Pisoni, D.B. & Summers, W.V. Effects of talker variability on recall of spoken word lists. Journal of Experimental Psychology: Learning, Memory and Cognition, 1989, 15, 676 684.
Goldinger, S.D., Luce, P.A., & Pisoni, D.B. Priming lexical neighbors of spoken words: Effects of competition and inhibition. Journal of Memory and Language, 1989, 28, 501 518.
Pisoni, D.B., & Martin, C.S. Effects of alcohol on the acoustic phonetic properties of speech: Perceptual and acoustic analyses. Alcoholism: Clinical and Experimental Research, 1989, 13, 577 587.
Summers, W.V., Johnson, K., Pisoni, D.B., & Bernacki, R.H. An addendum to “Effects of noise on speech production: Acoustic and perceptual analyses” [Journal of the Acoustical Society of America, 1988, 84, 917 928 (1988)]. Journal of the Acoustical Society of America, 1989, 86, 1717 1721.
Makhoul, J. (Chairman), Crystal, T. Green, D., Hogan, D., McAulay, D., Pisoni, D., Sorkin, R., & Stockham, D. Removal of Noise from Noise-Degraded Speech Signals. Washington, DC: National Academy Press, 1989.
Pisoni, D.B. Perceptual evaluation of synthetic speech: A tutorial review. ESCA Tutorial on Speech Input/Output Assessment and Speech Databases. Noordwijkerhout, The Netherlands: European Speech Communication Association, 1989, pp. 1-13.
Pisoni, D.B., Greene, B.G., & Logan, J.S. An overview of ten years of research on the perception of synthetic speech. ESCA Workshop on Speech Input/Output Assessment and Speech Databases. Noordwijkerhout, The Netherlands: European Speech Communication Association, 1989, pp. 1-4.
Mullennix, J.W., & Pisoni, D.B. Stimulus variability and processing dependencies in speech perception. Perception & Psychophysics, 1990, 47, 379 390.
Pisoni, D.B. Effects of talker variability on speech perception: Implications for current research and theory. Proceedings of the 1990 International Conference on Spoken Language Processing, Kobe, Japan. Tokyo: The Acoustical Society of Japan. Pp. 1399-1407.
Pisoni, D.B., & Garber, E.E. Lexical memory in visual and auditory modalities: A case for a common lexicon. Proceedings of the 1990 International Conference on Spoken Language Processing, Kobe, Japan. Tokyo: The Acoustical Society of Japan. Pp. 401-404.
Pisoni, D.B., & Greene, B.G. The role of cognitive factors in the perception of synthetic speech. In H. Fujisaki (Ed.) International Symposium on International Coordination and Standardization of Speech Database and Assessment Techniques for Speech Input/Output, Kobe, Japan, November 23, 1990. Pp. 3-25.
Pisoni, D.B., Ralston, J.V. & Lively, S.E. Some new directions in research on comprehension of synthetic speech. In H. Fujisaki (Ed.), International Workshop on International Coordination and Standardization of Speech Database and Assessment Techniques for Speech Input/Output, Kobe, Japan, November 23-24, 1990. Pp. 29-42.
Luce, P.A., Pisoni, D.B., & Goldinger, S.D. Similarity neighborhoods of spoken words. In G. Altmanns (Ed.), Cognitive Models of Speech Processing: Psycholinguistic and Computation Perspectives. Cambridge: MIT Press, 1990, Pp. 122-147.
Johnson, K., Pisoni, D.B., & Bernacki, R.H. Do voice recordings reveal whether a person is intoxicated? A case study. Phonetica, 1990, 47, 215-237.
Pisoni, D.B. Modes of processing speech and nonspeech signals. In I.G. Mattingly and M. Studdert-Kennedy (Eds.). Modularity and the Motor Theory of Speech Perception. Hillsdale, NJ: Erlbaum, 1991, 225-238.
Logan, J.S., Lively, S.E., & Pisoni, D.B. Training Japanese listeners to identify English /r/ and /l/: A first report. Journal of the Acoustical Society of America, 1991, 89, 874-886.
Goldinger, S.D., Pisoni, D.B., & Logan, J.S. On the nature of talker variability effects in recall of spoken word lists. Journal of Experimental Psychology: Learning, Memory, and Cognition, 1991, 17, 152-162.
Ralston, J.V., Pisoni, D.B., Lively, S.E., Greene, B.G., & Mullennix, J.W. Comprehension of synthetic speech produced by rule: Word monitoring and sentence-by-sentence listening times. Human Factors, 1991, 33, 471-491.
Pisoni, D.B., Johnson, K., & Bernacki, R.H. Effects of alcohol on speech. In Proceedings of the Human Factors Society, Santa Monica, CA: Human Factors Society, 1991, Pp. 694-698.
Humes, L.E., Nelson, K.J., & Pisoni, D.B. Recognition of synthetic speech by hearing impaired elderly listeners. Journal of Speech and Hearing Research, 1991, 34, 1180-1184.
Tanford, J.A., Pisoni, D.B., & Johnson, K. Novel scientific evidence of intoxication: Acoustic analysis of voice recordings from the Exxon-Valdez. Journal of Criminal Law and Criminology, 1991, 82, 579-609.
Lively, S.E., Pisoni, D.B., & Logan, J.S. Some effects of training Japanese listeners to identify English /r/ and /l/. In Y. Tohkura (Ed.) Speech Perception, Production and Linguistic Structure. Tokyo: Ohmsha Publishing Co. Ltd., 1992, Pp. 175-196.
Pisoni, D.B. Some Comments on Talker Normalization in Speech Perception. In Y. Tohkura, E. Vatikiotis-Bateson & Y. Sagisaka (Eds.) Speech Perception, Production and Linguistic Structure. Tokyo: Ohmsha Publishing Co. Ltd., 1992, Pp. 143-151.
Pisoni, D.B. Some comments on invariance, variability and perceptual normalization in speech perception. Proceedings 1992 International Conference on Spoken Language Processing, Banff, Canada, Oct. 12-16, 1992, Pp. 587-590.
Goldinger, S.D., Palmeri, T.J. & Pisoni, D.B. Words and voices: Perceptual details are preserved in lexical representations. Proceedings 1992 International Conference on Spoken Language Processing, Banff, Canada, Oct. 12-16, 1992, Pp. 591-594.
Sommers, M.S., Nygaard, L.C. & Pisoni, D.B. Stimulus variability and the perception of spoken words: Effects of variations in speaking rate and overall amplitude. Proceedings 1992 International Conference on Spoken Language Processing, Banff, Canada, Oct., Pp. 217-220.
Nygaard, L.C., Sommers, M.S. & Pisoni, D.B. Effects of speaking rate and talker variability on the representation of spoken words in memory. Proceedings 1992 International Conference on Spoken Language Processing, Banff, Canada, Oct. 12-16, 1992, Pp. 209-212.
Jusczyk, P.W., Pisoni, D.B., & Mullennix, J.W. Effects of talker variability on speech perception by 2 month old infants. Cognition, 1992, 43, 253-291.
Goldinger, S.D., Luce, P.A., Pisoni, D.B., & Marcario, J.K. Form-based priming in spoken word recognition: Roles of competition and bias. Journal of Experimental Psychology: Learning, Memory and Cognition, 1992, 18, 1210-1237.
Duffy, S.A. & Pisoni, D.B. Comprehension of synthetic speech produced by rule: A review and theoretical interpretation. Language and Speech, 1992, 35, 351-389.
Palmeri, T.J., Goldinger, S.D., & Pisoni, D.B. Episodic encoding of voice attributes and recognition memory for spoken words. Journal of Experimental Psychology: Learning, Memory, and Cognition. 1993, 19, 309-328.
Pisoni, D.B. Long-term memory in speech perception: Some new findings on talker variability, speaking rate and perceptual learning. Speech Communication, 1993, 13, 109-125.
Lively, S.E., Pisoni, D.B., Summers, W.V., & Bernacki, R.H. Effects of cognitive workload on speech production: Acoustic analyses and perceptual consequences. Journal of the Acoustical Society of America, 1993, 93, 2962-2973.
Humes, L.E., Nelson, K.J., Pisoni, D.B. & Lively, S.E. Effects of age on serial recall of natural and synthetic speech. Journal of Speech and Hearing Research, 1993, 36, 634-639.
Logan, J.S., Lively, S.E., & Pisoni, D.B. Training listeners to perceive novel phonetic categories: How do we know what is learned? Journal of the Acoustical Society of America, 94, 1148-1151.
Lewellen, M.J., Goldinger, S.D., Pisoni, D.B., & Greene, B.G. Word familiarity and lexical fluency: Individual differences in naming, lexical decision, and semantic categorization. Journal of Experimental Psychology: General, 1993, 22, 316-330.
Lively, S.E., Logan, J.S. & Pisoni, D.B. Training Japanese listeners to identify English /r/ and /l/: II. The role of phonetic environment and talker variability in learning new perceptual categories. Journal of the Acoustical Society of America, 1993, 94, 1242-1255.
Nygaard, L.C., Sommers, M.S. & Pisoni, D.B. Speech perception as a talker-contingent process. Psychological Science, 1994, 5, 42-46.
Pisoni, D.B., Logan, J.S., & Lively, S.E. Perceptual learning of nonnative speech contrasts: Implications for theories of speech perception. In H.C. Nusbaum and J. Goodman (Eds.). The Development of Speech Perception: The Transition From Speech Sounds to Spoken Words. Cambridge: MIT Press, 1994, Pp.121-166.
Lively, S.E., Pisoni, D.B., & Goldinger, S.D. Spoken word recognition: Research and Theory. M. Gernsbacher (Ed.) Handbook of Psycholinguistics, New York: Academic Press, Pp. 265-301.
Sommers, M.S., Nygaard, L.C. & Pisoni, D.B. Stimulus variability and spoken word recognition: I. Effects of variability in speaking rate and overall amplitude. Journal of the Acoustical Society of America, 1994, 96, 1314-1324.
Lively, S.E., Pisoni, D.B., Yamada, R.A., Tohkura, Y., & Yamada, T. Training Japanese listeners to identify English /r/ and /l/: III. Long-term retention of new phonetic categories. Journal of the Acoustical Society of America, 1994, 96, 2076-2087.
Ralston, J.V., Pisoni, D.B., & Mullennix, J.W. Comprehension of synthetic speech produced by rule. In R. Bennett, A. Syrdal, and S. Greenspan (Eds.), Behavioral Aspects of Speech Technology: Theory and Applications. New York: Elsevier, 1995, Pp. 233-287.
Bradlow, A.R., Nygaard, L.C. & Pisoni, D.B. On the contribution of instance-specific characteristics to speech perception. In C. Sorin, J. Marianai, H. Meloni & J. Schoentgen (Eds.), Levels in Speech Communication: Relations and Interactions. New York: Elsevier, Pp. 13-24.
Magnuson, J.S., Yamada, R.A., Tohkura, Y., Pisoni, D.B., Lively, S.E., & Bradlow, A.R. The role of talker variability in non-native phoneme training. Proceedings of the 1995 Spring Meeting of the Acoustical Society of Japan, 1995, Pp. 393-394.
Yamada, R.A., Tohkura, Y., Bradlow, A.R., & Pisoni, D.B. The effect of perception training on Japanese speakers’ produciton of the American English /r/-/l/ contrast. Proceedings of the 1995 Spring Meeting of the Acoustical Society of Japan, 1995, Pp. 385-386.
Nygaard, L.C. & Pisoni, D.B. Speech perception: New directions in research and theory. In J.L. Miller and P.D. Eimas (Eds.), Handbook of Perception and Cognition. Volume II: Speech, Language and Communication. New York: Academic Press, 1995, Pp. 63-96.
Pisoni, D.B. & Lively, S.E. Variability and invariance in speech perception: A new look at some old problems in perceptual learning. In W. Strange (Ed.), Speech Perception and Linguistic Experience: Issues in Cross-Language Research. Timonium, MD: York Press, 1995, Pp. 429-455.
Nygaard, L.C. & Pisoni, D.B. Talker- and task-specific perceptual learning in speech perception. Proceedings of the XIIIth International Congress of Phonetic Sciences, Stockholm, Sweden, August, 1995, Pp. 194-197.
Bradlow, A.R., Torretta, G.M. & Pisoni, D.B. Some sources of variability in speech intelligibility. Proceedings of the XIIIth International Congress of Phonetic Sciences, Stockholm, Sweden, August, 1995, Pp. 198-201.
Bradlow, A.R. & Pisoni, D.B. Acquisition of the English /r/ – /l/ contrast by Japanese speakers: Effects of training in perception on production. Proceedings of the XIIIth International Congress of Phonetic Sciences, Stockholm, Sweden, August, 1995, Pp. 562-565.
Mandel, D.R., Jusczyk, P.W. & Pisoni, D.B. Infants’ recognition of the sound patterns of their own names. Psychological Science, 1995, 6, 314-317.
Nygaard, L.C., Sommers, M.S. & Pisoni, D.B. Effects of stimulus variability on perception and representation of spoken words in memory. Perception & Psychophysics, 1995, 57, 989-1001.
Bradlow, A. R., Nygaard, L. C., & Pisoni, D. B. Indexical and linguistic attributes in speech perception: A review of some recent findings. In B. Kanki and R. Prinzo (Eds.), Metrics and Methods in Speech Communication. Office of Federal Aviation Administration, National Aeronautics and Space Administration/ Department of Defense. 1995, Pp. 67-78.
Goldinger, S.D., Pisoni, D.B., & Luce, P.A. Speech perception: Research and theory. In N.J. Lass (Ed.) Principles of Experimental Phonetics. Toronto, Canada: B.C. Decker. 1995, Pp. 277-327.
Kirk, K.I., Pisoni, D.B., Sommers, M.S., Young, M. & Evanson, C. New directions for assessing speech perception in persons with sensory aids. Annals of Otology, Rhinology, & Laryngology, 1995, 104, 300-303.
Kirk, K.I., Pisoni, D.B. & Osberger, M.J. Lexical effects on spoken word recognition by pediatric cochlear implant users. Ear & Hearing, 1995, 16, 470-481.
Pisoni, D.B. Sources of variability affecting speech perception and spoken word recognition. In C.W. Nixon (Comp.), Symposium on Speech Communication Metrics and Human Performance (AL/CF-SR-1995-0023). Wright Patterson AFB, OH: Armstrong Laboratory, Crew Systems Directorate, 1995, Pp. 19-40.
Saldaña, H.M., Pisoni, D.B., Fellowes, J.M., & Remez, R.E. Audio-visual speech perception without speech cues. Proceedings of the International Congress on Spoken Language Processing-96. Philadelphia, PA, October, 1996. Pp. 2187-2190.
Yamada, R.A., Tohkura, Y., Bradlow, A.R. & Pisoni, D.B. Does training in speech perception modify speech production? Proceedings of the International Congress on Spoken Language Processing-96. Philadelphia, PA, October, 1996. Pp. 606-609.
Pisoni, D.B., Saldaña, H.M., & Sheffert, S.M. Multi-modal encoding of speech in memory: A first report. Proceedings of the International Congress on Spoken Language Processing-96. Philadelphia, PA, October, 1996. Pp. 1664-1667.
Saldaña, H. M., Nygaard, L.C. & Pisoni, D.B. Encoding of visual speaker attributes and recognition memory for spoken words. In D. Stork and M.E. Hennecke (Eds.), Speechreading by Humans and Machine: Models, Systems, and Applications. Berlin: Springer-Verlag. 1996, Pp. 275-281.
Saldaña, H.M., Pisoni, D.B., Fellowes, J.M., & Remez, R.E. Audio-visual speech perception without speech cues: A first report. In D. Stork and M.E. Hennecke (Eds.), Speechreading by Humans and Machine: Models, Systems, and Applications. Berlin: Springer-Verlag. 1996, 145-151.
Pisoni, D.B. Word identification in noise. Language and Cognitive Processes, 1996, 11, 681-687.
Bradlow, A.R., Torretta, G.M. & Pisoni, D.B. Intelligibility of normal speech I: Global and fine-grained acoustic-phonetic talker characteristics. Speech Communication, 1996, 20, 255-272.
Pisoni, D.B. Perception of synthetic speech produced by rule: A selective review and interpretation of research over the last 15 years. In J.P.H. van Santen, R.W. Sproat, J.O. Olive & J. Hirschberg (Eds.), Progress in Speech Synthesis. New York: Springer-Verlag. 1997, Pp. 541-560.
Pisoni, D.B. Some Thoughts on “Normalization” in Speech Perception. In K. Johnson and J.W. Mullennix (Eds.), Talker Variability in Speech Processing. San Diego: Academic Press, Pp. 9-32.
Kirk, K.I., Diefendorf, A.O., Pisoni, D.B. & Robbins, A.M. Assessing speech perception in children. In L.L. Mendel and J.L. Danhauer (Eds.), Speech Perception Assessment. San Diego: Singular Press, 1997, Pp. 101-132.
Miyamoto, R.T., Kirk, K.I., Robbins, A.M., Todd, S.L., Riley, A.I., & Pisoni, D.B. Speech perception and speech intelligibility of children with multichannel cochlear implants. In I. Honjo & H. Takahashi (Eds.), Cochlear Implant and Related Sciences Update. Basel, Switzerland: Karger, 1997, Pp. 198-203.
Bradlow, A.R., Pisoni, D.B., Yamada, R.A. & Tohkura, Y. Training Japanese listeners to identify English /r/ and /l/ IV: Some effects of perceptual learning on speech production. Journal of the Acoustical Society of America, 1997, 101, 2299-2310.
Sommers, M.S., Kirk, K.I. & Pisoni, D.B. Some considerations in evaluating spoken word recognition by normal-hearing and cochlear implant listeners I: The effects of response format. Ear & Hearing, 1997, 18, 89-99.
Pisoni, D.B. Word identification in noise. In F. Grosjean and H. Frauenfelder (Eds.), A Guide to Spoken Word Recognition Paradigms. Hove, England: Psychology Press, 1997, Pp. 681-687.
Ryalls, B.O. & Pisoni, D.B. The effect of talker variability on word recognition in preschool children. Developmental Psychology, 33, 441-451.
Remez, R.E., Fellowes, J.M., Pisoni, D.B., Goh, W.D. & Rubin, P.E. Audio-visual speech perception without traditional speech cues: A second report. In C. Beniot and R. Campbell (Eds.), Proceedings of the ESCA Workshop on Audio-Visual Speech Processing: Cognitive and Computational Approaches (pp. 73-76). 1997, Grenoble: European Speech Communication Association.
Lively, S.E. & Pisoni, D.B. On prototypes and phonetic categories: A critical assessment of the perceptual magnet effect in speech perception. Journal of Experimental Psychology: Human Perception and Performance, 1997, 23, 1665-1679.
Kirk, K.I., Pisoni, D.B. & Miyamoto, R.C. Effects of stimulus variability on speech perception in hearing impaired listeners. Journal of Speech, Language, and Hearing Research, 40, 1997, 1395-1405.
Aslin, R.N., Jusczyk, P.W. & Pisoni, D.B. (1998). Speech and auditory processing during infancy: Constraints on and precursors to language. In W. Damon (Series Ed.), Handbook of Child Psychology. Fifth Edition, Volume 2: Cognition, Perception & Language (D. Kuhn & R. Siegler, Eds.). New York: Wiley. Pp. 147-198.
Luce, P.A. & Pisoni, D.B. (1998). Recognizing spoken words: the Neighborhood Activation Model. Ear and Hearing, 19, 1-36.
Nygaard, L.C. & Pisoni, D.B. (1998). Talker-specific learning in speech perception. Perception & Psychophysics, 60, 335-376.
Forrest, K., Nygaard, L., Pisoni, D.B. and Siemers, E. (1998). The effects of speaking rate on word identification in Parkinson’s disease and normal aging. Journal of Medical Speech-Language Pathology, 6, 1-12.
Robbins, A.M., Svirsky, M., Osberger, M.J. & Pisoni, D.B. (1998). Beyond the audiogram: The role of functional assessments. In F. Bess (Ed), Children with Hearing Impairment. Nashville, TN: Bill Wilkerson Center Press. Pp. 105-124.
Remez, R.E., Fellowes, J.M., Pisoni, D.B., Goh, W.D. & Rubin, P.E. (1998). Multimodal perceptual organization of speech: Evidence from tone analogs of spoken utterances. Speech Communication, 26, 65-73.
Frisch, S. & Pisoni, D.B. (1998). The development of the lexicon in deaf children with cochlear implants: New insights into language acquisition. In M.C. Gruber, D. Higgins, K. Olson & T. Wysocki (Eds.), CLS 34, vol. II: The panels. Chicago: University of Chicago Press. Pp. 459-479.
Bradlow, A.R., Nygaard, L.C. & Pisoni, D.B. (1999). Effects of talker, rate and amplitude variation on recognition memory for spoken words. Perception & Psychophysics, 61, 206-219.
Wong, D., Miyamoto, R.T., Pisoni, D.B., Sehgal, M. & Hutchins, G.D. (1999). PET imaging of cochlear-implant and normal-hearing subjects listeneing to speech and nonspech. Hearing Research, 132, 34-42.
Vitevitch, M.S., Luce, P.A., Pisoni, D.B. & Auer, E.T. (1999). Phonotactics, neighborhood activation, and lexical access for spoken words. Brain & Language, 68, 306-311.
Bradlow, A.R., Akahane-Yamada, R., Pisoni, D.B. & Tohkura, Y. (1999). Training Japanese listeners to identify English /r/ and /l/: Long-term retention of learning in perception and production. Perception & Psychophysics, 61, 977-985.
Meyer, T.A. & Pisoni, D.B. (1999). Some computational analyses of the PBK Test: Effects of frequency and lexical density on spoken word recognition. Ear & Hearing, 20, 363-371.
Wright, R.A., Frisch, S.A. & Pisoni, D.B. (1999). Speech perception. In J.G. Webster (Ed.), Wiley Encyclopedia of Electrical and Electronics Engineering. New York: J.Wiley & Sons, Inc. Pp. 175-195.
Bradlow, A.R. & Pisoni, D.B. (1999). Recognition of spoken words by native and non-native listeners: Talker-, listener- and item-related factors. Journal of the Acoustical Society of America, 106, 2074-2085.
Miyamoto, R.T., Wong, D., Pisoni, D.B., Hutchins, G., Sehgal, M. & Fain, R. (1999). Positron emission tomography in cochlear implant and auditory brain stem implant receipents. The American Journal of Otology, 20, 596-601.
Chin, S.B. & Pisoni, D.B. (2000). A phonological system at 2 years after cochlear implantation. Clinical Linguistics & Phonetics, 14, 53-73.
Pisoni, D.B. (2000). Cognitive factors and cochlear implants: Some thoughts on perception, learning, and memory in speech perception. Ear & Hearing, 21, 70-78.
Sehgal, S.T., Kirk, K.I., Pisoni, D.B. & Miyamoto, R.T. (2000). Effect of residual hearing on children’s speech perception abilities with a cochlear implant. In S.B. Waltzman & N.L. Cohen (Eds.), Cochlear Implants. New York: Thieme Medical Publishers. Pp. 219-221.
Kirk, K.I., Pisoni, D.B. & Miyamoto, R.T. (2000). Lexical discrimination by children with cochlear implants: Effects of age at implantation and communication mode. In S.B. Waltzman and N.L. Cohen (Eds.), Cochlear Implants. New York: Thieme Medical Publishers. Pp. 252-254.
Svirsky, M.A., Robbins, A.M., Kirk, K.I., Pisoni, D.B. & Miyamoto, R.T. (2000). Language development in profoundly deaf children with cochlear implants. Psychological Science, 11, 153-158.
Frisch, S.A., Large, N.R. & Pisoni, D.B. (2000). Perception of wordlikeness: Effects of segment probability and length on processing of nonwords. Journal of Memory and Language, 42, 481-496.
Bernstein, J., DeJong, J., Pisoni, D. & Townshend, B. (2000). Two experiments on automatic scoring of spoken language proficiency. Proceedings of InSTIL2000, 57-61.
Frisch, S.A. & Pisoni, D.B. (2000). Modeling spoken word recognition performance by pediatric cochlear implant users using feature identification. Ear & Hearing, 21, 578-589.
Pisoni, D.B., Cleary, M., Geers, A.E. & Tobey, E.A. (2000). Individual differences in effectiveness of cochlear implants in prelingually deaf children: Some new process measures of performance. Volta Review, 101, 111-164.
Chin, S.B., Meyer, T.A., Hay-McCutcheon, M., Wright, G.A., & Pisoni, D.B. (2000). Structure of mental lexicons of children who use cochlear implants: Preliminary findings. Annals of Otology, Rhinology & Laryngology, 109, 114-116.
Frisch, S.A., Meyer, T.A., Pisoni, D.B., Svirsky, M.A. & Kirk, K.I. (2000). Using behavioral data to model open-set word recognition and lexical organization by pediatric cochlear implant users. Annals of Otology, Rhinology & Laryngology, 109, 60-62.
Meyer, T.A., Frisch, S.A., Svirsky, M.A. & Pisoni, D.B. (2000) Modeling phoneme and open-set word recognition by cochlear implant users: A preliminary report. Annals of Otology, Rhinology & Laryngology, 109, 68-70.
Pisoni, D.B. & Geers, A. (2000). Working memory in deaf children with cochlear implants: Correlations between digit span and measures of spoken language processing. Annals of Otology, Rhinology & Laryngology, 109, 92-93.
Cleary, M. & Pisoni, D.B. (2001). Speech perception and spoken word recognition: Research and theory. In B. Goldstein (Ed.), Handbook of Perception. Cambridge: Blackwell. Pp. 499-534.
Harnsberger, J.D., Svirsky, M.A., Kaiser, A.R., Pisoni, D.B., Wright, R. & Meyer, T.A. (2001). Perceptual “vowel spaces” of cochlear implant users: Implications for the study of auditory adaptation to spectral shift. Journal of the Acoustical Society of America, 109, 2135-2145.
Lachs, L., Pisoni, D.B. & Kirk, K.I. (2001). Use of audiovisual information in speech perception by prelingually deaf children with cochlear implants. A first report. Ear & Hearing, 22, 236-251.
Goh, W.D., Pisoni, D.B., Kirk, K.I. & Remez, R.E. (2001). Audio-visual perception of sinewave speech in an adult cochlear implant user: A case study. Ear & Hearing 22, 412-419.
Cleary, M., Pisoni, D.B. & Geers, A.E. (2001). Some measures of verbal and spatial working memory in eight- and nine-year-old hearing-impaired children with cochlear implants. Ear & Hearing, 22, 395-411.
Frisch, S.A., Large, N.R., Zawaydeh, B. & Pisoni, D.B. (2001). Emergent phonotactic generalizations in English and Arabic. In J. Bybee and P. Hopper (eds.), Frequency and the emergence of linguistic structure. Amsterdam: John Benjamins. Pp. 159-180.
Cleary, M. & Pisoni, D.B. (2002). Talker discrimination by prelingually-deaf children with cochlear implants: Preliminary results. Annals of Otology, Rhinology, & Laryngology Supplement-Proceedings of the 8th Symposium on Cochlear Implants in Children, 111, 113-118.
Cleary, M., Dillon, C.M. & Pisoni, D.B. (2002). Imitation of nonwords by deaf children after cochlear implantation: Preliminary findings. Annals of Otology, Rhinology, & Laryngology Supplement-Proceedings of the 8th Symposium on Cochlear Implants in Children, 111, 91-96.
Kirk, K.I., Pisoni, D.B. & Lachs, L. (2002). Audiovisual integration of speech by children and adults with cochlear implants. Proceedings of the 7th International Conference on Spoken Language Processing, 1689-1692.
Wong, D., Pisoni, D.B., Learn, J., Gandour, J.T., Miyamoto, R.T. & Hutchins, G.D. (2002). PET imaging of differential cortical activation by monaural speech and nonspeech stimuli. Hearing Research, 166, 9-23.
Sheffert, S.M., Pisoni, D.B., Fellowes, J.M. & Remez, R.E. (2002). Learning to recognize talkers from natural, sinewave and reversed speech samples. Journal of Experimental Psychology: Human Perception and Performance, 28, 1447-1469.
Cleary, M., Pisoni, D.B. & Kirk, K.I. (2002). Working memory spans as predictors of word recognition and receptive vocabulary in children with cochlear implants. Volta Review, 102, 259-280.
Herman, R. & Pisoni, D.B. (2002). Perception of “elliptical speech” following cochlear implantation: Use of broad phonetic categories in speech perception. Volta Review, 102, 321-347.
Lachs, L., Weiss, J.W. & Pisoni, D.B. (2002). Use of partial information by cochlear implant patients and normal-hearing listeners in identifying spoken words: Some preliminary analyses. Volta Review, 102, 303-320.
Vitevitch, M.S., Pisoni, D.B, Kirk, K.I., Hay-McCutcheon, M. & Yount, S.L. (2002) Effects of phonotactic probabilities on the processing of spoken words and nonwords by postlingually deafened adults with cochlear implants. Volta Review, 302, 283-302.
Houston, D.M. & Pisoni, D.B. (2002). Early speech perception and language development in normal-hearing and deaf infants following cochlear implantation. In K.T. Houston (Ed.), The Role of Audition in Spoken Language. Washington, DC: Alexander Graham Bell. Pp. 5-8.
Carter, A.K., Dillon, C.M. & Pisoni, D.B. (2002). Imitation of nonwords by hearing impaired children with cochlear implants: Suprasegmental analyses. Clinical Linguistics & Phonetics, 16, 619-638.
Pisoni, D.B. & Cleary, M. (2003). Measures of working memory span and verbal rehearsal speed in deaf children after cochlear implantation. Ear & Hearing, 24, 106S-120S.
Lachs, L., McMichael, K. & Pisoni, D.B. (2003). Speech perception and implicit memory: Evidence for detailed episodic encoding of phonetic events. In J. Bowers & C. Marsolek (Eds.), Rethinking implicit memory. Oxford: Oxford University Press. Pp. 215-235.
Houston, D.M., Pisoni, D.B., Kirk, K.I., Ying, E.A. & Miyamoto, R.T. (2003). Speech perception skills of deaf children following cochlear implantation: A first report. International Journal of Pediatric Otorhinolaryngology, 67, 479-495.
Burkholder, R.A. & Pisoni, D.B. (2003). Speech timing and working memory in profoundly deaf children after cochlear implantation. Journal of Experimental Child Psychology, 85, 63-88.
Kaiser, A.R., Kirk, K.I., Lachs, L. & Pisoni, D.B. (2003). Talker and lexical effects on audiovisual word recognition by adults with cochlear implants. Journal of Speech-Language-Hearing Research, 46, 390-404.
Meyer, T.A., Frisch, S.A., Pisoni, D.B., Miyamoto, R.T., & Svirsky, M.A. (2003). Modeling open-set spoken word recognition in postlingually deafened adults after cochlear implantation: Some preliminary results with the Neighborhood Activation Model. Otology & Neurotology, 24, 612-620.
Cleary, M. & Pisoni, D.B. (2003). Speech Perception. In L. Nadel (Ed.), Encyclopedia of Cognitive Science Vol. 4. London, UK: Macmillan. Pp. 163-169.
Goh, W.D. & Pisoni, D.B. (2003). Effects of lexical neighborhoods on immediate memory span for spoken words. Quarterly Journal of Experimental Psychology, 56A, 929-954.
Bergeson, T.R., Pisoni, D.B., & Reynolds, J.T. (2003). Perception of point light displays of speech by normal-hearing adults and deaf adults with cochlear implants. In J.-L. Schwartz, F. Berthommier, M.-A. Cathiard, & Sodoyer (Eds), Proceedings of Audio Visual Speech Processing 2003 (pp. 55-60). Grenoble, France: Institut de la Communication Parlée, CNRS UMR 5009, INP Grenoble, Université Stendhal.
Conrey, B.L. & Pisoni, D.B. (2003). Audiovisual asynchrony detection for speech and nonspeech signals. In J.-L. Schwartz, F. Berthommier, M.-A. Cathiard, & Sodoyer (Eds), Proceedings of Audio Visual Speech Processing 2003 (pp. 25-30). Grenoble, France: Institut de la Communication Parlée, CNRS UMR 5009, INP Grenoble, Université Stendhal.
Bergeson, T.R., Pisoni, D.B., & Davis, R.A.O. (2003). A longitudinal study of audiovisual speech perception by prelingually deaf children with cochlear implants. In M. J. Solé, D. Recasens, & J. Romero (Eds.), Proceedings of the 15th International Congress of Phonetic Sciences (pp. 139-142). Adelaide, Australia: Causal Productions.
Bergeson, T.R., Pisoni, D.B., Lachs, L., & Reese, L. (2003). Audiovisual integration of point light displays of speech by deaf adults following cochlear implantation. In M. J. Solé, D. Recasens, & J. Romero (Eds.), Proceedings of the 15th International Congress of Phonetic Sciences (pp. 1469-1472). Adelaide, Australia: Causal Productions.
Bergeson, T.R., Pisoni, D.B., & Davis, R.A.O. (2003). A longitudinal study of audiovisual speech perception by children with hearing loss who have cochlear implants. Volta Review, 103, 347-370.
Houston, D.M., Ying, E.A., Pisoni, D.B. & Kirk, K.I. (2003). Development of pre word-learning skills in infants with cochlear implants. Volta Review, 103, 303-326.
Pisoni, D.B. & Cleary, M. (2004). Learning, memory and cognitive processes in deaf children following cochlear implantation. In F.G. Zeng, A.N. Popper & R.R. Fay (Eds.), Springer Handbook of Auditory Research: Auditory Prosthesis, SHAR Volume X. Pp. 377-426.
Bergeson, T.R. & Pisoni, D.B. (2004). Audiovisual speech perception in deaf adults and children following cochlear implantation. In G. Calvert, C. Spence & B.E. Stein (Eds.), Handbook of Multisensory Processes (pp. 749-772). MIT Press.
Dillon, C.M., Cleary, M., Pisoni, D.B. & Carter, A.K. (2004). Imitation of nonwords by hearing-impaired children with cochlear implants: Segmental analyses. Clinical Linguistics and Phonetics, 18, 39-55.
Clopper, C.G. & Pisoni, D.B. (2004). Some acoustic cues for the perceptual categorization of American English regional dialects. Journal of Phonetics, 32, 111-140.
Lachs, L. & Pisoni, D.B. (2004). Crossmodal source information and spoken word recognition. Journal of Experimental Psychology: Human Perception and Performance, 30, 378-396.
Clopper, C.G & Pisoni, D.B. (2004). Homebodies and Army brats: Some effects of early linguistic experience and residential history on dialect categorization. Language Variation and Change, 16, 31-48.
Dillon, C.M., Pisoni, D.B., Cleary, M., and Carter, A.K. (2004). Nonword imitation by children with cochlear implants: Consonant analyses. Archives of Otolaryngology -Head & Neck Surgery, 130, 587-591.
Roediger, H.L., III, McDermott, K.B., Pisoni, D.B. & Gallo, D.A. (2004). Illusory Recollection of voices. Memory, 12, 586-602.
Lachs, L. & Pisoni, D.B. (2004). Specification of crossmodal source information in isolated kinematic displays of speech. Journal of the Acoustical Society of America, 116, 507-518.
Teoh, S.W., Pisoni, D.B. & Miyamoto, R.T. (2004). Cochlear implantation in adults with prelingual deafness: I. Clinical results. Laryngoscope, 114, 1536-1540.
Lachs, L. & Pisoni, D.B. (2004). Crossmodal source identification in speech perception. Ecological Psychology, 16, 159-187.
Teoh, S.W., Pisoni, D.B. & Miyamoto, R.T. (2004). Cochlear implantation in adults with prelingual deafness: II. Underlying constraints that affect audiological outcomes. Laryngoscope, 114, 1714-1719.
Dillon, C.M., Burkholder, R.A., Cleary, M. & Pisoni, D.B. (2004). Nonword repetition by children with cochlear implants: Accuracy ratings from normal-hearing listeners. Journal of Speech, Language and Hearing Research, 47, 1103-1116.
Clopper, C.G. & Pisoni, D.B. (2004). Effects of talker variability on perceptual learning of dialects. Language and Speech, 47, 207-239.
Clopper, C.G. & Pisoni, D.B. (2004). Perceptual dialect categorization by an adult cochlear implant user: a case study. International Congress Series, 1273, 235-238.
Burkholder, R. & Pisoni, D.B. (2004). Digit span recall error analysis in pediatric cochlear implant users. International Congress Series, 1273, 312-315.
Burkholder, R., Pisoni, D.B. & Svirsky, M.A. (2004). Perceptual learning and nonword repetition using a cochlear implant simulation. International Congress Series, 1273, 208-211.
Dillon, C.M. & Pisoni, D.B. (2004). Nonword repetition and reading in deaf children with cochlear implants. International Congress Series, 1273, 304-307.
Horn, D.L., Davis, R.A.O, Pisoni, D.B. & Miyamoto, R.T. (2004). Visual attention, behavioral inhibition and speech/language outcomes in deaf children with cochlear implants. International Congress Series, 1273, 332-335.
Horn, D.L., Davis, R.A.O, Pisoni, D.B. & Miyamoto, R.T. (2004). Visuomotor integration ability of pre-lingually deaf children predicts audiological outcome with a cochlear implant: a first report. International Congress Series, 1273, 356-359.
Pisoni, D.B. (2004). Information processing skills of deaf children with cochlear implants: some new process measures of performance. International Congress Series, 1273, 283-287.
Karpicke, J & Pisoni, D.B. (2004). Using immediate memory span to measure implicit learning. Memory & Cognition, 32, 956-964.
Pisoni, D.B. (2005). Speech perception in deaf children with cochlear implants. In D.B. Pisoni & R.E. Remez (Eds.), Handbook of Speech Perception. Pp. 494-523. Blackwell Publishers.
Clopper, C.G. & Pisoni, D.B. (2005). Perception of dialect variation. In D.B. Pisoni & R.E. Remez (Eds.), Handbook of Speech Perception. Pp. 313-337. Blackwell Publishers.
Horn, D.L., Davis, R.A.O., Pisoni, D.B. & Miyamoto, R.T. (2005). Behavioral inhibition and clinical outcomes in children with cochlear implants. Laryngoscope, 115, 595-600.
Houston, D.M., Carter, A.K., Pisoni, D.B., Kirk, K.I., Ying, E.A. (2005). Name-learning skills of deaf children following cochlear implantation: A first report. Volta Review, 105, 39-70.
Cleary, M., Pisoni, D.B. & Kirk, K.I. (2005). Influence of voice similarity on talker discrimination in normal-hearing children and hearing-impaired children with cochlear implants. Journal of Speech, Language, and Hearing Research, 48, 204-223.
Clopper, C.G., Conrey, B.L. & Pisoni, D.B. (2005). Effects of talker gender on dialect categorization. Journal of Language and Social Psychology, 24, 182-206.
Bergeson, T., Pisoni, D.B. & Davis, R.B.O. (2005). Development of audiovisual comprehension skills in prelingually deaf children with cochlear implants. Ear & Hearing, 26, 149-164.
Horn, D.L., Davis, R.A.O., Pisoni, D.B. & Miyamoto, R.T. (2005). Development of visual attention skills in prelingually deaf children who use cochlear implants. Ear & Hearing, 26, 389-408.
Horn, D.L., Pisoni, D.B., Sanders, M. & Miyamoto, R.T. (2005). Behavioral assessment of pre-lingually deaf children before cochlear implantation. Laryngoscope, 115, 1603-1611.
Clopper, C.G. & Pisoni, D.B. (2005). Speech perception, hearing impairment, and linguistic variation. In M.J. Ball (Ed.), Clinical Sociolinguistics. Pp. 207-2187. Blackwell Publishers.
Clopper, C.G., Pisoni, D.B. & deJong, K. (2005). Acoustic characteristics of the vowel systems of six regional varieties of American English. Journal of the Acoustical Society of America, 118, 1661-1676.
Hay-McCutcheon, M.J., Pisoni, D.B. & Kirk, K.I. (2005). Audiovisual speech perception in elderly cochlear implant recipients. Laryngoscope, 115, 1887-1894.
Burkholder, R.A., Pisoni, D.B. & Svirsky, M.A. (2005). Effects of a cochlear implant simulation on immediate memory in normal-hearing adults. International Journal of Audiology, 44, 551-558.
Winters, S.J. & Pisoni, D.B. (2005) When and why feedback matters in the perceptual learning of the visual properties of speech. Proceedings of the International Speech Communication Association Workshop on Plasticity in Speech Perception, 148-151.
Winters, S.J. & Pisoni, D.B. (2005). Speech synthesis: Perception and comprehension. In K. Brown (Ed.), Encyclopedia of Language and Linguistics, Vol. 12, 31-49.
Burkholder, R.A., & Pisoni, D.B. (2006). Working memory capacity, verbal rehearsal speed, and scanning in deaf children with cochlear implants. In P.E. Spencer & M. Marschark (Eds.), Advances in the Spoken Language Development of Deaf and Hard-of-Hearing Children. Pp.328-357. Oxford University Press.
Clopper, C.G., Levi, S.V. & Pisoni, D.B. (2006). Perceptual similarity of regional dialects of American English. Journal of the Acoustical Society of America, 119, 566-574.
Clopper, C.G. & Pisoni, D.B. (2006). Effects of region of origin and geographic mobility on perceptual dialect categorization. Language, Variation and Change, 18, 193-221.
Clopper, C.G. & Pisoni, D.B. (2006). The Nationwide Speech Project: A new corpus of American English Dialects. Speech Communication, 48, 633-644.
Clopper, C.G., Pisoni, D.B. & Tierney, A.T. (2006). Effects of open-set and closed-set task demands on spoken word recognition. Journal of the American Academy of Audiology, 17, 331-349.
Conrey, B.L. & Pisoni, D.B. (2006). Auditory-visual speech perception and synchrony detection for speech and nonspeech signals. Journal of the Acoustical Society of America, 119, 4065-4073.
Horn, D.L., Pisoni, D.B. & Miyamoto, R.T. (2006). Divergence of fine and gross motor skills in prelingually deaf children: Implications for cochlear implantation. Laryngoscope, 116, 1500-1506.
Dillon, C.M. & Pisoni, D.B. (2006). Nonword repetition and reading skills in children who are deaf and have cochlear implants. Volta Review, 106, 121-145.
Levi, S.V. & Pisoni, D.B. (2007). Indexical and linguistic channels in speech perception: Some effects of voiceovers on advertising outcomes. In T. Lowery (Ed.), Psycholinguistic phenomena in marketing communications. Pp. 203-219. Mahwah, NJ: Lawrence Erlbaum.
Levi, S.V., Winters, S.J. & Pisoni, D.B. (2007). Speaker-independent factors affecting the degree of perceived foreign accent in a second language. Journal of the Acoustical Society of America, 121, 2327-2338.
Clopper, C.G. & Pisoni, D.B. (2007). Free classification of regional dialects of American English. Journal of Phonetics, 35, 421-438.
Pisoni, D.B. & Levi, S.V. (2007). Representations and representational specificity in speech perception and spoken word recognition. In M.G. Gaskell (Ed.), The Oxford Handbook of Psycholinguistics. Pp. 3-18. Oxford University Press: UK.
Burkholder-Juhasz, R.A., Levi, S.V., Dillon, C.M. & Pisoni, D.B. (2007). Nonword repetition with spectrally reduced speech: Some developmental and clinical findings from pediatric cochlear implantation. Journal of Deaf Studies and Deaf Education, 12, 472-485.
Conway, C.M. & Pisoni, D.B. (2007). Links between implicit learning of sequential patterns and spoken language processing. In D.S. McNamara & J.G. Trafton (Eds), Proceedings of the 29th Annual Meeting of the Cognitive Science Society (pp. 191-196). Austin, TX: cognitive Science Society.
Conway, C.M., Karpicke, J. & Pisoni, D.B. (2007). Contribution of implicit sequence learning to spoken language processing: Some preliminary findings with normal-hearing adults. Journal of Deaf Studies and Deaf Education, 12, 317-334.
Fagan, M.K., Pisoni, D.B., Horn, D.L., & Dillon, C.M. (2007). Neuropsychological processes associated with vocabulary, reading, and working memory in deaf children with cochlear implants. Journal of Deaf Studies and Deaf Education, 12, 461-471.
Bent, T. & Pisoni, D.B. (2007). Some comparisons in perception between speech and nonspeech signals. In M. Ball (Ed.), Handbook of Clinical Linguistics. (pp. 400-411). Blackwell Publishers.
Horn, D.L., Fagan, M.K., Dillon, C.M., Pisoni, D.B. & Miyamoto, R.T. (2007). Visual-motor integration skills of prelingually deaf children: Implications for pediatric cochlear implantation. Laryngoscope, 117, 2017-2025.
Loebach, J.L. & Pisoni, D.B. (2008). Perceptual learning of spectrally degraded speech and environmental sounds. Journal of the Acoustical Society of America, 123, 1126-1139.
Harnsberger, J.D., Pisoni, D.B. & Wright, R. (2008). A new method for eliciting three speaking styles in the laboratory. Speech Communication, 50, 323-336.
Pisoni, D.B., Conway, C.M., Kronenberger, W., Horn, D.L., Karpicke, J. & Henning, S. (2008). Efficacy and effectiveness of cochlear implants in deaf children. In M. Marschark & P. Hauser (Eds.), Deaf Cognition: Foundations and Outcomes. (pp. 52-101). New York: Oxford University Press.
Winters, S.J., Levi, S.V. & Pisoni, D.B. (2008). Identification and discrimination of bilingual talkers across languages. Journal of the Acoustical Society of America, 123, 4524-4538.
Loebach, J.L., Bent, T. & Pisoni, D.B. (2008). Multiple routes to the perceptual learning of speech. Journal of the Acoustical Society of America, 124, 552-561.
Conway, C.M. & Pisoni, D.B. (2008). Neurocognitive basis of implicit learning of sequential structure and its relation to language processing. Annals of the New York Academy of Sciences, 1145, 113-131.
Tierney, A.T., Bergeson-Dana, T., & Pisoni, D.B. (2008). Effects of early musical experience on auditory sequence memory. Empirical Musicology Review, Vol. 3, 217-186.
Pisoni, D.B., Conway, C.M., Kronenberger, W., Henning, S. & Anaya, E. (2009). Executive function, cognitive control and sequence learning in deaf children with cochlear implants. In M. Marschark & P. Spencer (Eds), Oxford Handbook of Deaf Studies, Language, and Education.
Hay-McCutcheon, M. J., Pisoni, D.B., Hunt, K.K. (2009). Audiovisual asynchrony detection and speech perception in hearing-impaired listeners with cochlear implants: A preliminary analysis. International Journal of Audiology. Vol.48, 321-333.
Gruenenfelder, T.M., & Pisoni, D.B. (2009). The lexical restructuring hypothesis and graph theoretic analyses of networks based on random lexicons. Journal of Speech, Language, and Hearing Research. Vol. 52, 596-609.
Felty, R.A., Buchwald, A., & Pisoni, D.B. (2009). Adaptation to frozen babble in spoken word recognition. Journal of the Acoustical Society of America, 125 (3), EL93–EL97.
Fagan, M. K., & Pisoni, D.B. (2009). Perspectives on multisensory experience and cognitive development in infants with cochlear implants. Scandinavian Journal of Psychology 50(5), 457-462.
Bent, T., Buchwald, A., & Pisoni. D.B. (2009). Perceptual adaptation and intelligibility of multiple talkers for two types of degraded speech. Journal of the Acoustical Society of America, 126 (5), 2660–2669.
Conway, C.M., Pisoni, D.B., & Kronenberger, W.G. (2009). The importance of sound for cognitive sequencing abilities: The auditory scaffolding hypothesis. Current Directions in Psychological Science, 18(5), 275-279.
Buchwald, A.B., Winters, S.J. & Pisoni, D.B (2009). Visual speech primes open-set recognition of spoken words. Language and Cognitive Processes 24(4), 580-610.
Loebach, J. L., D. B. Pisoni, & Svirsky, M.A. (2009). Transfer of Auditory Perceptual Learning with Spectrally Reduced Speech to Speech and Nonspeech Tasks: Implications for Cochlear Implants. Ear & Hearing 30(6), 662-674.
Beer, J., Pisoni, D.B., & Kronenberger, W. (2009). Executive Function in Children with Cochlear Implants: The Role of Organizational-Integrative Processes. Volta Voices 16(3), 18-21.
Loebach, J.L., Conway, C.M., & Pisoni, D.B. (2009). Audition: Cognitive influences. In B. Goldstein (Ed.), Encyclopedia of Perception, Los Angeles, CA: SAGE Publications, Inc., 138-141.
Loebach, J.L., Pisoni, D.B. & Svirsky, M.A. (2010). Effects of semantic context and feedback on perceptual learning of speech processed through an acoustic simulation of a cochlear implant. Journal of Experimental Psychology: Human Perception and Performance, 36(1), 224-234. PMID: 20121306; PMCID: PMC2818425.
Conway, C. M., Bauernschmidt, A., Huang, S.S. & Pisoni, D.B. (2010). Implicit statistical learning in language processing: Word predictability is the key. Cognition, 114(3), 356-371. PMID: 19922909; PMCID: PMC2823831.
Stevenson, R.A., Altieri, N.A., Kim, S., Pisoni, D.B. & James, T.W. (2010). Neural processing of asynchronous audiovisual speech perception. Neuroimage, 49(4), 3308-3318. PMID: 20004723; PMCID: PMC2818746.
Altieri, N., Gruenenfelder, T., & Pisoni, D.B. (2010). Clustering coefficients of lexical neighborhoods: Does neighborhood structure matter in spoken word recognition? Mental Lexicon, 5(1), 1-21. PMID: 21423865; PMCID: PMC3060033.
Pisoni, D.B., Conway, C.M., Kronenberger, W.G., Henning, S. & Anaya, E. (2010). Executive function, cognitive control and sequence learning in deaf children with cochlear implants. In M. Marschark & P. Spencer (Eds.), Oxford Handbook of Deaf Studies, Language, and Education. New York: Oxford University Press, 439-457.
Peterson, N.R., Pisoni, D.B., & Miyamoto, R.T. (2010). Cochlear Implants and Spoken Language Processing Abilities: Review and Assessment of the Literature. Restorative Neurology and Neuroscience, 28(2), 237-250. PMID: 20404411; PMCID: PMC2947146.
Taler, V., Aaron, G.P., Steinmetz, L.G., & Pisoni, D.B. (2010). Lexical Neighborhood Density Effects on Spoken Word Recognition and Production in Healthy Aging. The Journals of Gerontology Series B: Psychological Sciences and Social Sciences, PMID: 20542997; PMCID: PMC2920945.
Ronquest, R.E., Levi, S.V., & Pisoni, D.B. (2010). Language Identification from Visual-only Speech Signals. Attention, Perception, & Psychophysics, 72(6), 1601-1613. PMID: 20675804; PMCID: PMC2947151.
Fagan, M. K. & Pisoni, D. B. (2010). Hearing experience and receptive vocabulary development in deaf children with cochlear implants. Journal of Deaf Studies and Deaf Education, 15(2), 149-161. PMID: 20130017; PMCID: PMC2836193.
Casserly, E.D. & Pisoni, D.B. (2010). Speech perception & production. Wiley Interdisciplinary Reviews: Cognitive Science. 1(5), 629-647.
Beer, J., Pisoni, D. B., Kronenberger, W. G., & Geers, A. E. (2010). New research findings: Executive functions of adolescents who use cochlear implants. ASHA Leader, December 21.
Conway, C.M., Pisoni, D.B., Anaya, E.M. Karpicke, J., & Henning, S.C. (2011). Implicit sequence learning in deaf children with cochlear implants. Developmental Science 14(1), 69-82. PMID: 21159089; PMCID: PMC3050521.
Pisoni, D.B., Kronenberger, W.G., Roman, A.S. & Geers, A.E. (2011). Measures of Digit Span and Verbal Rehearsal Speed in Deaf Children After More than 10 Years of Cochlear Implantation. Ear & Hearing , 32, 60S-74S. PMID: 21832890; PMCID: PMC3080130.
Geers, A.E., Strube, M.J., Tobey, E.A., Pisoni, D.B. & Moog, J.S. (2011). Epilogue: Factors Contributing to Long-Term Outcomes of Cochlear Implantation in Early Childhood. Ear & Hearing, 32, 84S-92S. PMID: 21832892; PMCID: PMC3156988.
Conway, C.M., Karpicke, J., Anaya, E.M., Henning, S.C., Kronenberger, W.G., & Pisoni, D.B. (2011). Nonverbal Cognition in Deaf Children Following Cochlear Implantation: Motor Sequencing Disturbances Mediate Language Delays. Developmental Neuropsychology, 36, 237-254. PMID: 21347923; PMCID: PMC3304447.
Stevenson, R.A., VanDerKlok, R.M., Pisoni, D.B., & James, T.W. (2011). Discrete Neural Substrates Underlie Complementary Audiovisual Speech Integration Processes. NeuroImage, 55 (3), 1339-1345. PMID: 21195198; PMCID: PMC3057325.
Beer, J., Kronenberger, W. G., & Pisoni, D. B. (2011). Executive function in everyday life: Implications for young cochlear implant users. Cochlear Implants International Supplement, 12, S89-S91. PMID: 21756484; PMCID: PMC3304451.
Harris, M.S., Pisoni, D.B., Kronenberger, W.G., Gao, S., Caffery, H.M., & Miyamoto, R.T. (2011). Developmental Trajectories of Forward and Backward Digit Spans in Deaf Children with Cochlear Implants. Cochlear Implant International Supplement, 12, S84-S88. PMID: 21756483; PMCID: PMC3304450.
Altieri, N., Pisoni, D.B., & Townsend, J. (2011). Some normative data on lip-reading skills (L). Journal of the Acoustical Society of America, 130 (1), 1-4. PMID: 21786870; PMCID: PMC3155585.
Kronenberger, W.G., Pisoni, D.B., Henning, S.C., Colson, B.G., & Hazzard, L.M. (2011). Working memory training for children with cochlear implants: A pilot study. Journal of Speech, Language, and Hearing Research, 54, 1182-1196. PMID: 21173394; PMCID: PMC3293211.
Bent, T., Loebach, J.L. Phillips, L., & Pisoni, D.B. (2011). Perceptual Adaptation to Sinewave-Vocoded Speech Across Languages. Journal of Experimental Psychology: Human Perception and Performance, 37(5), 1607-1616, PMID: 21688936; PMCID: PMC3179795.
Dillon, C.M., de Jong, K. & Pisoni, D.B. (2011). Phonological Awareness, Reading Skills, and Vocabulary Knowledge in Children Who Use Cochlear Implants. Journal of Deaf Studies and Deaf Education. 17(2), 205-226. PMID: 22057983.
Altieri, N., Pisoni, D.B., & Townsend, J. (2011). Some Behavioral and Neurobiological Constraints on Theories of Audiovisual Speech Integration: A Review and Suggestions for New Directions. Seeing and Perceiving, 24(6) 513-539. PMID: 21968081; PMCID: PMC3293210.
Levi, S., Winters, S., & Pisoni, D.B. (2011). Effects of cross-language voice training on speech perception: Whose familiar voices are more intelligible? Journal of the Acoustical Society of America, 130(6), 4053-4062. PMID: 22225059; PMCID: PMC3253604.
Houston, D.M., Beer, J., Bergeson, T.R., Chin, S.B., Pisoni, D.B. & Miyamoto, R.T. (2012) The Ear Is Connected to the Brain: Some New Directions in the Study of Children with Cochlear Implants at Indiana University. Journal of the American Academy of Audiology, 23 (6), 1-17. PMID: 22668765; PMCID: PMC3468895.
Gilbert, J.L. & Pisoni, D.B. (2012). Vowel Perception in Listeners with Cochlear Implants. In M.J. Ball & F. Gibbon (Eds), Handbook of Vowels and Vowel Disorders. London: Psychology Press, 386-405.
Holt, R.F., Beer, J., Kronenberger, W.G., Pisoni, D.B., & Lalonde, K. (2012). Contribution of Family Environment to Pediatric Cochlear Implant Users’ Speech and Language Outcomes: Some Preliminary Findings. Journal of Speech, Language, and Hearing Research, 55, 848-864. PMID: 22232387; PMCID: PMC3370076.
Beer, J., Harris, M.S., Kronenberger, W.G., Holt, R.A., & Pisoni, D.B. (2012). Auditory Skills, Language Development, and Adaptive Behavior of Children with Cochlear Implants and Additional Disabilities. International Journal of Audiology, 51(6), 491-498. PMID: 22509948.
Johns, B.T., Gruenenfelder, T.M., Pisoni, D.B. & Jones, M.N. (2012). Effects of Word Frequency, Contextual Diversity, and Semantic Distinctiveness on Spoken Word Recognition. Journal of the Acoustical Society of America, 132(2) EL74-EL80. PMID: 22894319; PMCID: PMC3401190.
Yancey, A., Harris, M.S., Egbelakin, A., Gilbert, J., Pisoni, D.B., & Renbarger, J. (2012). Risk Factors for Cisplatin-Associated Ototoxicity in Pediatric Oncology Patients. Pediatric Blood & Cancer, 59(1), 144-148. PMID: 22431292.
Harris, M.S., Kronenberger, W.G., Gao, S., Hoen, H.M., Miyamoto, R.T. & Pisoni, D.B. (2013) Verbal Short-Term Memory Development and Spoken Language Outcomes in Deaf Children with Cochlear Implants. Ear & Hearing, 34(2), 179-92. PMID: 23000801; PMCID: PMC3530632.
Gilbert, J.L., Tamati, T.N., & Pisoni, D.B. (2013). Development, Reliability and Validity of PRESTO: A New High-Variability Sentence Recognition Test. Journal of the American Academy of Audiology, 24(1), 26-36. PMID: 23231814. PMCID: PMC3683852.
Geers, A. E., Pisoni, D. B., & Brenner, C. (2013). Complex Working Memory Span in Cochlear Implanted and Normal Hearing Teenagers. Otology & Neurotology, 34(3), 396-401.
Holt, R. F., Beer, J., Kronenberger, W. G., & Pisoni, D. B. (2013). Developmental Effects of Family Environment on Outcomes in Pediatric Cochlear Implant Recipients. Otology & Neurotology, 34(3), 388-395. PMID: 23151776. PMCID: PMC3594395.
Casserly, E. D., & Pisoni, D. B. (2013). Nonword Repetition as a Predictor of Long-Term Speech and Language Skills in Children With Cochlear Implants. Otology & Neurotology, 34(3), 460-470. PMID: 23442565.
Kronenberger, W.G., Pisoni, D.B., Harris, M., Caffrey, H., Xu, H., & Miyamoto, R. (2013). Profiles of Verbal Working Memory Growth Predict Speech and Language Development in Children with Cochlear Implants. Journal of Speech, Language, and Hearing Research, 56(3), 805-825. PMID: 23275401. doi: 10.1044/1092-4388(2012/11-0356).
Kronenberger, W.G., Pisoni, D.B., Henning, S.C., & Colson, B.G. (2013). Executive Functioning Skills in Long-Term Users of Cochlear Implants: A Case Control Study. Journal of Pediatric Psychology, 38(8), 902-914. PMID: 23699747. doi: 10.1093/jpepsy/jst034.
Felty, R.A., Buchwald, A., Gruenenfelder, T.M., & Pisoni, D.B. (2013). Misperceptions of Spoken Words: Data From a Representative Sample of American English. Journal of the Acoustical Society of America. 134(1): 572-585.
Tamati, T.N., Gilbert, J.L. & Pisoni, D.B. (2013). Some Factors Underlying Individual Differences in Speech Recognition on PRESTO: A First Report. Journal of the American Academy of Audiology. 24:616-634.
Ruffin, C.V., Kronenberger, W.G., Pisoni, D.B., Colson, B.G., & Henning, S.C. (2013). Long-Term Speech and Language Outcomes in Prelingually Deaf Children, Adolescents and Young Adults Who Received Cochlear Implants in Childhood. Audiology and Neurotology. 18(5): 289-296.
Smalt, C. J., Gonzalez-Castillo, J., Talavage, T. M., Svirsky, M. A. & Pisoni, D. B. (2013) Neural correlates of adaptation in freely-moving normal hearing subjects under cochlear implant acoustic simulations. NeuroImage. 15(82): 500-509.
O’Donoghue, G.M. & Pisoni, D.B. (2014) Auditory and Linguistic Outcomes in Pediatric Cochlear Implantation. In S.B. Waltzman (Eds.). Cochlear Implants 3rd Ed. (pp. 158 – 166). New York, NY: Theme.
Conway, C.M., Deocampo, J. A., Walk, A.M., Anaya, E.M., & Pisoni, D.B. (2014). Deaf Children with Cochlear Implants Do Not Appear t Use Sentence Context to Help Recognize Spoken Words. Journal of Speech, Language, and Hearing Research. 57: 2174-2190.
Kronenberger, W. G., Beer, J., Castellanos, I., Pisoni, D. B. & Miyamoto, R.T. (2014). Neurocognitive Risk in Deaf Children with Cochlear Implants. JAMA Otolaryngology – Head & Neck Surgery, 140(7): 608-615.
Castellanos, I., Kronenberger, W. G., Beer, J., Henning, S. C., Colson, B. G., & Pisoni, D. B. (2014). Preschool speech intelligibility and vocabulary skills predict long-term speech and language outcomes following cochlear implantation in early childhood. Cochlear Implants International, 15(4), 200-210. PMID: 23998347. PMCID: PMC3852164.
Conway, C.M., Gremp, M.A., Walk, A.D., Bauernschmidt, A. & Pisoni, D.B. (2014). Can We Enhance Domain-General Learning Abilities to Improve Language Function? In P. Rebuschat & Enhance Domain-General Learning Abilities to Improve Language Function? In P. Rebuschat & J.N.Williams (Eds.). Statistical Learning and Language Acquisition. (pp. 305-336). Berlin, German: DE GRUYTER.
Pisoni, D.B. (2014). Rapid Phonological Coding and Working Memory Dynamics in Children with Cochlear Implants: Cognitive Foundations of Spoken Language Processing. In Farris-Trimble, A. & Barlow, J. (Eds.). Perspectives on Phonological Theory and Acquisition: Papers in Honor of Daniel A. Dinnsen. (pp. 91-112). Philadelphia: John Benjamins Publishing Company.
Beer, J., Kronenberger, W., Castellanos, I., Colson, B. G., Henning, S. C., & Pisoni, D. (2014). Executive functioning skills in preschool-age children with cochlear implants. Journal of Speech, Language & Hearing Research. 57(4): 1521-1534.
Kronenberger, W.G., Colson, B.G., Henning, S.C., & Pisoni, D.B. (2014). Executive functioning and speech-language skills following long-term use of cochlear implants. Journal of Deaf Studies and Deaf Education. 19(4): 456-470.
Beer, J., Peters, K., & Pisoni, D. (2014). Language development in deaf children with cochlear implants. In P. Brooks & V. Kempe (Eds.), Encyclopedia of Language Development. (pp. 312 -314). Los Angeles: Sage.
Tamati, T. N. & Pisoni (2014). Non-native Listeners’ Recognition of High-Variability Speech Using PRESTO. Journal of the American Academy of Audiology. 25: 869-892.
Bailey, R L., Potter, R. F., Lang, A., Pisoni, D. (2015). Modulating Executive Functioning: Trait Motivational Reactivity and Resting HRV. Cognition and Emotion. Jan. 29(1):138-45.
Casserly, E.D. & Pisoni, D.B. (In Press). Effects of Real-Time Acoustic Signal Transformation on Speech Production: A First Report. In S.Gepshtein & L.T. Maloney (Eds.) In Handbook of Computational Perceptual Organization. New York: Oxford University Press.
Montag, J., AuBuchon, A. M., Pisoni, D. B. & Kronenberger, W. G. (In Press) Speech Intelligibility in Early-Implanted Deaf Children After Long-Term Cochlear Implant Use. Journal of Speech, Language, and Hearing Research.
Kronenberger, W. G. & Pisoni, D. B (In Press). Working memory training in deaf children with cochlear implants. In K. Kirk & N. Young (Eds.) Cochlear Implants in Children: Learning and the Brain. New York: Springer.
Casserly, E. D. & Pisoni, D. B. (In Press). Auditory Learning Using a Portable Real-Time Vocoder: Preliminary Findings. Journal of Speech Language and Hearing Research.
Castellanos, I., Kronenberger, W. G., Beer, J., Colson, B. G., Henning, S. C., Ditmars, A., Pisoni, D. B. (In Press). Concept Formation Skills in Long-Term Cochlear Implant Users. Journal of Deaf Studies and Deaf Education.
AuBuchon, A. M., Pisoni, D. B. & Kronenberger, W. G. (In Press). Perceptual Encoding Speed and Verbal Rehearsal Processes in Prelingually Deaf Children with Cochlear Implants: Some New Findings on Long-term Outcomes. In K. Kirk & N. Young (Eds.) Cochlear Implants in Children: Learning and the Brain.
AuBouchon, A.M., Pisoni, D.B., & Kronenberger, W.G. (In press). Elementary Cognitive Processes Underlying Verbal Working Memory in Prelingually Deaf Children with Cochlear Implants. In N. Young & K. I. Kirk (Eds.), Cochlear implants in children: Learning and the brain. New York: Springer.
Kronenberger, W. G., Colson, B. G., Henning, S. C. & Pisoni, D. B. (In Press). Executive Functioning and Speech-Language Skills Following Pediatric Cochlear Implantation: Finding on LTO. Journal of Deaf Studies and Deaf Education.
Pisoni, D. B. (In Press) Speech Perception: Research, Theory and Clinical Application. In H. Cairns and E. Fernandez (Eds.) Handbook of Psycholinguistics. Wiley-Blackwell.
Pisoni, D. B., (Under Revision). Some New Developments in Speech Perception and Spoken Word Recognition: Theoretical and Clinical Implications. In G. Hickok & S. Small (Eds.). Neurobiology of Language. New York: Elsevier.
Radicke, J.L., Levi, S.V., Loebach, J.L. & Pisoni, D.B. (Submitted). Audiovisual phonological fusion.
Anaya, E. M., Pisoni, D., Kronenberger, W. (Submitted 2013.) Effects of Long-term Musical Experience on Visual-Spatial Sequence Learning and Memory. Memory & Cognition.
Anaya, E. M., Pisoni, D., Kronenberger, W. (Submitted 2013.) Effects of Long-term Musical Experience on Auditory and Visual Perceptual Abilities Under Degraded Conditions. Cognition.
Anaya, E. M., Pisoni, D., Kronenberger, W. (Submitted 2013.) Auditory and Visual Executive Functions in Experienced Musicians. Music Perception.
Smith, G. N. L., Conway, C. M., Bauernschmidt, A., Pisoni, D.B. (Submitted). Improving the Ability to Learn Structure in Time: Adaptive Training of Structured Sequence Processing and Language. PLOS One.
Kronenberger, W. G., Castellanos, I., Beer, J., Pisoni, D. B. (Under Revision). Questionnaire-Based Assessment of Executive Functioning in Pediatric Psychology: Part 1. Case Studies. Journal of Clinical Practice in Pediatric Psychology.
Rammell, C. S., Pisoni, D. B., Van Lancker Sidtis, D. (Under Revision). Perception of Formulaic and Novel Expressions Under Acoustic Degradation: Evidence for a Unitary Memory Trace.
Faulkner, K. & Pisoni, D. B. (ReSubmitted Jan 2015). List Equivalency of PRESTO for the Evaluation of Speech Recognition. Journal of the American Academy of Audiology.
Castellanos, I., Pisoni, D. B., Kronenberger, W. G. & Beer, J. (Submitted Jan 2015). Neurocognitive Function in Deaf Children with Cochlear Implants: Early Development and Long-Term Outcomes. In M. Marschark (Ed.), The Oxford Handbook of Deaf Studies in Language: Research, Policy, and Practice. Oxford University Press.
Principal Investigator . . . . PHS NIMH Research Grant (MH 24027) “The Speech Mode and Categorical Perception” November 1, 1973 October 31, 1976. Total Direct Costs: $64,000.
Principal Investigator . . . . PHS NINCDS Research Grant (NS 12179) “Auditory and Phonetic Processes in Speech Perception” June 1, 1975 May 31, 1979. Total Direct Costs: $206,746.
Principal Investigator . . . . PHS NIMH Research Grant (MH 24027) “Perceptual Analysis of Speech Sounds” April 1, 1978 March 31, 1982. Total Direct Costs: $269,192.
Co principal Investigator (with R. N. Aslin) . . . PHS NICHD Research Grant (HD 11915) “Perception of Speech and Nonspeech Sounds in Infants” April 1, 1978 March 31, 1981. Total Direct Costs: $128,353.
Program Director . . . PHS NIH NINCDS Post doctoral Training Grant (NS 07134) “Training in Speech, Hearing, and Sensory Communication” July 1, 1979 June 30, 1984. Total Direct Costs: $137,539.
Principal Investigator . . . PHS NINCDS Research Grant (NS 12179) “Speech Perception, Analysis and Synthesis” December 1, 1980 November 30, 1983. Total Direct Costs: $287,086.
Principal Investigator . . . NSF Research Grant “Analysis and Interpretation of Speech Spectrograms” March 1, 1981 February 28, 1982. Total Direct Costs: $18,242.
Co Principal Investigator (with R. N. Aslin) . . . PHS NICHD Research Grant (HD 11915) “Perception of Speech and Nonspeech Sounds in Infants” July 1, 1981 June 30, 1983. Total Direct Costs: $97,961.
Principal Investigator . . . Air Force Office of Scientific Research, Air Force Systems Command AFAMRL 82 25 “Perception of Synthetic Speech by Human Observers” October 1, 1982 December 31, 1985. Total Costs: $167,806.
Principal Investigator . . . NSF Research Grant “Analysis and Interpretation of Speech Spectrograms” August 1, 1983 July 31, 1986. Total Costs: $140,000.
Principal Investigator . . . DoD Air Force Office of Scientific Research, University Research Instrumentation Program “Instrumentation for a Real time Multi user Speech Processing Facility” June 1, 1983 May 31, 1984. Total Costs: $301,088.
Principal Investigator . . . PHS NINCDS Research Grant (NS 12179) “Speech Perception, Analysis and Synthesis” December 1, 1983 February 29, 1988. Total Direct Costs: $687,022.
Program Director . . . PHS NIH NINCDS Post doctoral Training Grant (NS 07l34) “Training in Speech, Hearing, and Sensory Communication” July 1, 1984 September 24, 1989. Total Direct Costs: $528,388.
Principal Investigator . . . IBM Corp. Contract No. 435114 “Performance of Speech Recognizers.” July 1, 1984 April 30, 1986. Total Costs: $130,000.
Principal Investigator . . . Digital Equipment Corp. External Research Grant Program, Agreement No. 136 “Perceptual Evaluation of Synthetic Speech Generated by Text to Speech Systems.” June 14, 1984 December 31, 1985. Total Equipment Credits: $100,000.
Principal Investigator . . . General Motors Research Labs “A Preliminary Study to Investigate the Assessment of Blood Alcohol Level Through Acoustic Phonetic Analyses of Speech.” July 1, 1984 February 28, 1986. Total Costs: $30,000.
Principal Investigator . . . Air Force Aerospace Medical Research Labs “Acoustic Phonetic Analyses of Speech Produced in Noise.” July 1, 1985 December 31, 1985. Total Costs: $48,862.
Principal Investigator . . . Armstrong Aerospace Medical Research Laboratory Contract (86 C 0549) “Speech Perception and Production in Severe Environments.” July 1, 1986 June 30, 1990. Total Costs: $459,893.
Principal Investigator . . . NSF Research Grant (IRI 8617847) “Perception of Synthetic Speech Generated by Rule.” February 1, 1987 January 31, 1991. Total Costs: $293,912.
Program Director . . . PHS NIDCD Training Grant (DC 00012) “Training in Speech, Hearing, and Sensory Communication.” September 25, 1989 June 30, 1994. Total Direct Costs: $447,586.
Co-Investigator . . . PHS NIA Research Grant (AG 08293) “Speech Recognition by the Hearing-Impaired Elderly.” PI= L. Humes, Speech & Hearing Sciences. May 1, 1990 – April 30, 1995. Total Direct Costs: $507,000.
Co-Investigator . . . PHS NIAAA (AA07611-06 )”Center on Genetic Determinants of Alcohol Ingestants.” PI= T.K. Li, I.U. Medical Center, December 1, 1992 – November 30, 1997. Total Direct Costs: $5,856,680.
Program Director . . . PHS NIDCD Training Grant (T32 DC-00012) “Training in Speech, Hearing and Sensory Communication.” July 1, 1994 – June 30, 1999. Total Direct Costs: $1,457,250.
Principal Investigator . . . PHS NIDCD Research Grant (DC 00111) “Speech Perception and Spoken Word Recognition.” December 1, 1994 November 30, 1999. Total Direct Costs: $2,686,274.
Co-Principal Investigator . . . PHS NIDCD Research Grant “Comparison of Sensory Aids in Deaf Children.” PI= R.T. Miyamoto, I.U. Medical Center, April 1, 1995 – March 31, 2000. Total Direct Costs: $2,539,226.
Principal Investigator . . . Alcoholic Beverage Medical Research Foundation Grant “Effects of Alcohol on Speech Production.” June 1, 1995 – May 31, 1998. Total Direct Costs: $75,000.
Co-Investigator . . . Indiana University Strategic Direction Initiatives “Linguistic, Cognitive, and Sensory Factors Underlying the Clinical Effectiveness of Pediatric Cochlear Implants.” July 1, 1998 – June 30, 2000. Total Direct Costs: $321,742.
Program Director . . . PHS NIDCD Training Grant (T32 DC-00012) “Training in Speech, Hearing and Sensory Communication.” July 1, 1999 – June 30, 2004. Total Direct Costs: $1,898,088.
Principal Investigator . . . PHS NIDCD Research Grant (DC 00111) “Speech Perception and Spoken Word Recognition.” December 1, 1999 November 30, 2005. Total Direct Costs: $1,858,931.
*Program Director . . . PHS NIDCD Training Grant (T32 DC-00012) “Training in Speech, Hearing and Sensory Communication.” July 1, 2005 – June 30, 2009. Total Direct Costs: $2,970,896.
*Principal Investigator . . . PHS NIDCD Research Grant (DC 00111) “Speech Perception and Spoken Word Recognition.” April 1, 2006 – March 31, 2011. Total Direct Costs: $2,086,687.
*Principal Investigator . . . PHS NIDCD R55 Research Grant (DC-00958) “Neurocognitive Processes in Deaf Children with Cochlear Implants.” August 1, 2008 – July 31, 2010. Total Direct Costs:$100,000.
Co-Investigator…PHS NIDCD Research Grant (DC-00064) “Speech Perception and Spoken Word Recognition by Children with Cochlear Implants.” Principal Investigator R.T. Miyamoto, February 1, 2006 – January 31, 2009. Total Direct Costs: $1,071,956.
*Program Director . . . PHS NIDCD Training Grant (T32 DC-00012) “Training in Speech, Hearing and Sensory Communication.” July 1, 2009 – June 30, 2014. Total Direct Costs: $3,296,475.
*Principal Investigator . . . PHS NIDCD R01 Research Grant (DC-009581)“Neurocognitive Processes in Deaf Children with Cochlear Implants.” December 1, 2009 – November 30, 2014. Total Direct Costs: $2,421,678. | 2019-04-25T18:32:59Z | http://www.iu.edu/~srlweb/people/david-pisoni/ |
Well, considering what I plan to do and what I had planned, my desk is disturbingly untouched since last Thursday. Events, as they say, have overtaken me. Still, at least there's something to see that isn't just a mess!
See, last Wednesday afternoon was spent in the company of craft friends, and in the pursuit of craft shops. No problem, straight to Snazzy's at Swindon. On the basis that I have cards to make for the Marathon, I managed to score the two Hero Arts sets you see on my desk. Love 'em. Not sure if they'll appear in the Marathon though, but it was a very convincing excuse! My phone and ipad are in view, together they make look like an Apple jerk. My glasses are on my head, as a hair band, naturally. So the case is empty; I'm in the habit of using it because it makes me happy. You can clearly see Brilliance ink pads. Using them feels a bit like a blast from the past, but I love them, and the water colour thing I've been doing with them is, if I say so myself, very pretty!
And the elephant on the desk is the Diet Doodle Book. A really fab gift from Laura who knows that I've been on a diet for the last six centuries, and knows too that I need to write stuff down to stay focused. This doodly approach is fab, I might share some of it - kinda like journaling without having to make your own pages!
There's a recent post about joining in this WOYWW lark that elicited a lot of response and so gentle reader, please would you cast your eye over it too, at some stage...just to brush up on the housekeeping of all these desks. Thank you!
I knew that I'd do a review for the TeaPod as soon as I visited the website and watched the video. I drink tea. I like a great design. I really like choice. I like a new angle on an existing product if it works. And the TeaPod was all that..and I'm a sucker for great packaging! Did I ever tell you that it took me over a week to open my new iPod because I didn't want to spoil the sublime packaging...even the pristine cellophane.....Oh, I digress.
Mr TeaPod sent me a handful of samples from their range of eleven teas, all from Fair Trade estates in exotic Sri Lanka. Just as well he chose.... eleven to choose from for heaven's sake - I have trouble choosing a mug to drink from! So, I made a cuppa, following the directions. Not gruelling. Drop the TeaPod in the mug, pour on the freshly boiled water and allow the tea to infuse.
Then..use the TeaPod as a spoon, stir, add milk if desired and carry on as usual.The thing about the Teapod is that you can leave it in if you're a herbal/fruit tea enthusiast, you get a real infusion, as it should be. Unlike us 'builders tea' types who leave nothing but the spoon in - and here's an advantage...the TeaPod won't leave you with a blunt force trauma to the face like a teaspoon will! Although of course, you, dear Internet, are far too well mannered to even contemplate leaving a spoon in, I know.
Of course, with no tea bag, there's no squishing against the side and running to the sink or bin....indeed, a polite tap on the edge of the mug and there was no dripping. In the relative comfort of my kitchen, I had a fair trade brew which was very nice, perfectly measured and rather a fun thing to make. And then I popped the TeaPod and its envelope in the recycling bin.
So bring on another test. When I'm out delivering - and particularly if Mr D comes too, I take a flask of boiling water, a teaspoon, two mugs and four tea bags. We share a mug of tea made the normal way - the second mug is to drop the used teabags into. Colour me utterly delighted by the TeaPod then. We each chose our preferred tea, I had my own mug and I didn't need the teaspoon and extras. And the pod goes back in it's little envelope (re-christened a 'sleeping bag', because one of us couldn't think of the right word...). And now I don't have wet and mushy used teabags to deal with when sorting out the snack bag. Genius! Now this may not be a large thing for you - but for us tea drinkers on the go, it's an awesome step up!
And then of course, there's the erm, arty, decorative potential of the TeaPod .
You can buy TeaPods directly from this page of their website. Using that link will entitle you to a 15% discount. How cool is that. So cool, it's almost herbal, man.
Furthermore, to infuse you with a similar enthusiasm, there's a chance for you to win a year's supply of TeaPods - *insert little shriek* - I love this part! A year's supply - that's over £175 worth of TeaPods..how fab a delivery will that be! It's open to UK residents only - and worth a pop, huh! All you have to do is visit the competition page on the TeaPod website and answer a very simple question. Mr TeaPod assures me that you will not be bombarded with mailshots and spam emails if you enter, it's not the way they work. Like a lot of us, they intend to treat potential customers they way they would like to be treated as potential customers. Does that make sense? If it did, hurrah.
Excuse me now, I'm away to infuse myself. Probably fruity this time.
Hey gentle readers. Things arise as a result of being a blogger with a MEME that need a discussion. Or a gentle reminder...and so, in advance of another WOYWW, I thought to air a few often asked or commented upon issues.
Monica and I would like someone to explain how to comment on Google+. It makes me bad tempered that I had to join, had to open a GMail account and now can't work it out. I know you lot will be gentle with the explanation.
Loads of Deskers want to point out that Word Verification is incredibly frustrating. If you use it, please don't be disapponted if your comment numbers are lower than average..it's really difficult to do - especially from a tablet! There are alternatives that are pretty effective : comment modification means that you have to approve comments prior to publishing. It means that you 'manually' control any Spam. And you can also change settings so that Anonymous comments cannot be left. That cut out about 9000 spam comments a day for me!
Even MORE Deskers actually become quite agitated after going through the Word Verification process only to be told that the comment will then wait for Modification. I confess that I'm one of them..especially if I'm using the iPad which hates Google and makes any process on it as difficult as possible.
Wordpress users are not exempt - Verification by having to type in the email and URL is equally time consuming. Again, even Copy & Paste or Auto Fill aren't really the answer, but....I don't know if you have a choice or not - so Wordpress users, speak up!
Remember that the link list on WOYWW posts is exactly that - a list of links..click on any name at any number on the list and you will automatically have that particular blog load in your browser. You don't need to click on names in my comments to find their blogs.
When you link to WOYWW, you don't need to worry about leaving your link list number on MY comments. When you comment at other Deskers, you do need to tell them your link list number if you can possibly remember to do so...it's just easier/quicker to find you.
During the Northern Hemisphere winter, my WOYWW post goes up between 2 and 3 am. (I'm in the UK, that's a GMT time). This gives you exotic International Deskers a chance to be in the first and teens, number wise. As the world turns, and my mornings become lighter and more bearable, so I start to post WOYWW live - and that will be anything from 6.00am to 8.30am. It depends entirely on what my wednesday plans are!
If you wonder why your position on the list changes between typing in your blog address and the link appearing on my page - it's simple...someone else is loading their link in as well, and the computer will arrange them.....so, if you comment that you're number 15 and then discover that you're actually at number 19..take a smile from the fact that others were linking at the same time as you - that's real 'hands across the world ' stuff!
If your position on the list changes some time after your link appears - it's even less complicated. It means that I've removed a double, incorrect or unfair playing link, and the list automatically re-numbers. I figure that if you leave your number in your comment and it changes, your reciprocate will work out that actually, you're just above or below the number you mentioned. It's still easier than searching 3 columns and 100 odd names. Especially as we know each other by blog names even better than we know each other by Christian names!
I should re-iterate that whilst it's meant to simply be fun, some rules have had to develop...and yep, I sometimes do remove links that don't participate in the spirit of WOYWW. If you aren't getting comments from people on the list, it's because your post isn't in the spirit of showing your desk and telling about what's on it. Simple. If I remove your link and you can't work out why, do ask me...because I won't necessarily email you to say - I figure the handful of times I've done so, the reasons have been really obvious!
At some stage, I know not when, it became obvious to me that the stamps I overlooked when on a shopping spree were probably the genre of images that were 'arty' and the ones I wouldn't know what to do with. Or the ones that I looked at and thought 'oh that's great, but really, I can draw that'. Yeah. But I never did. And, I can't stamp and emboss my drawing can I? So little by little I got brave and equipped myself with stems, squiggles, splotches and blotches. This little gem stands out though, it really has been wonderfully useful. And remains so.
Ah well. It's just to show you one of my most loved and more importantly, most loved stamps. Yep, a wood mount. But it's available as a cling these days too. It's by Magenta (distributed in the UK by Woodware Crafts). I've had it for at least 10 years. And I use it on something - card or LO, at least once a month.
This card is for a Batik Style Backgrounds workshop coming up. I was unsure about it - because I was a bit unconvinced by the colours, but it's been well received in those terms of colour, and two people have said that they like a workshop card that gives them ideas for stamps they already own. Oh. OK then!
A couple of years ago at a Christmas Card making day, I used this stamp to make a wreath on a card front - that is still talked about amongst the Marathonati. I think it's because of the useful-ness of a seemingly plain image. Today, I'm planning at least two hours of uninterrupted desk time, and this stamp will be featuring. I have Card Marathon samples to make and I think it only right and fair that I try to use it again.
I might show you more of my long serving trusty friends stamps if you show me yours.
Please see the pages above if you're wondering 'what on earth 'or 'how doI?', and if none of that helps, please ask in a comment!
Welcome to WOYWW . I thought my desk was within reasonable control until I uploaded the photo. It's quite hard to complain at myself, but really - why don't I put stuff away when I've used it instead of apparently and quite literally, dropping it from my hand? The scissor sharpener being the case in point. Well, one case in point.
I managed an hour long daylight session on Tuesday afternoon...you get to enjoy the fall out. The card is for a workshop on using batik principles to create backgrounds. I know you can't see much of it, save that Paper Artsy stem image. That's one of my all time faves. You can't tell either, but having done tax returns, new vehicle paperwork, VAT returns and a year end analysis, my pile of scratch paper is about 1" high..it's not convenient when you work all over the place like this..things keep falling over the edge!
What are you working on today? We'd love to see the what and the where...put WOYWW in your post title and link the post here so that we can swing by and visit. It helps ENORMOUSLY if you can turn off word verification...try comment approval instead? Do some reciprocal visiting and enjoy!
..to my self-publicity circus! I'm involved in two upcoming events that I will inevitably talk about - my desk will be covered in ideas and makings for them, so you may as well have the full gratuitous self publicity thing all at once.
'It includes three card making workshops, home made lunch, refreshments, 10% off voucher to use in Japonica, and lots of fun and friendship as you craft together. This season's workshops will include stamping and using inks with many techniques. The day costs £42 and is great value - it would make a great Mother's Day Gift! If you need any more info or would like to book your place, please call the shop - Japonica, Exmouth, on 01395 271739, or email [email protected]'.
This is actually for a Workshop at Kraft Crazy this week, but I've done a very similar one for Janet!
The third 'experienced crafter and tutor in this scenario will be Francoise Read. It's worth the fee just to meet her and get an injection of her warm good humoured and gentle skills. She is a stamp designer - for Woodware, and Stampendous...and wears her skills so modestly. I should learn from her. I could. If i had any skills that were worth touting. To be honest, the skill I bring as a 'tutor' is probably bossy good humour...and I hope, making everyone leave with a finished something....because I hate going home with UFOs. They NEVER get finished!
And then, me and Scrap Lady Ally are doing a Card Marathon on April 12th. Yep, a Marathon. We supply samples, kits and tools to make 20 or so different cards, different themes, styles and sizes. You make cards, we feed you with cakes and lunch made by Lunch Lady Jan herself, and then you make more cards. It's gruelling. It's to be held in a Church Hall in Amesbury and booking is essential, the kit numbers and catering mean that we need numbers in advance! There is a separate page to view the flyer and booking form, a clickaway at the top of my blog, or you can visit www.2scrapladies.blogspot.co.uk just as soon as it's been updated. Please give us a chance, it's all a bit erm, argh!
This is the decoy photo. It's one of the LOs that I did for Luscious Life Studios. It features my 1980-something perm. I kinda thought you may like to see it. More to the point, an alternative colour way set of papers is available as a freebie download if you follow that link.
I think that's it. For now. Really, this 'all about me' way of living is becoming a bit exhausting. And, to finish where I started....I'd like to HOPE and THINK that my desk will betray signs of preparation for these events. If you don't notice, would you please prod my conscience?
I like a fast result, once I've made up my mind to do something. Perversely, I can put off actually doing it for ages. And, whilst doing it, I'm pretty patient with myself. A good example of this will be the blanket I made from 9956,248 six inch crocheted squares. Which I'm going to unpick and re-do because parts of it really bother me; I want the squares to be smaller and also one of the colours is wrong and I don't want it to be included and...well there we are.
So...when double sided tape became acid free, I started to use it in preference to glue. Wet glue that is. I had previously given up using the stick glues..after a 'front-dropping-off-the-card' incident at my parents home one Christmas. Pritt stick and dry central heating - lesson learned. I don't really have the patience for wet glue..all the drying and paper ribbling. So I stopped using it.
I did develop a passion for the glazes. And the first in my line of vision was Diamond Glaze. I guess that market is thoroughly cornered by Glossy Accents now, but the DG (as we used to call it) remains a fab product.
Yesterday, I finished a bottle of Diamond Glaze. it was a 14oz bottle, so quite large. And it has worked its magic on spots and dots for over 5 years. It was a white plastic bottle. To protect and prevent it from discolouring in daylight I expect. Which of course meant I couldn't tell how much I had left.
So I drizzled it over my newly decorated box, expecting to have to reach for the spatula and do some frantic spreading, just to get a protective glaze all over.
And I drizzled. And I squeezed. It's hard work. The bottle kept giving, so I kept drizzling. It was running slower than I remembered Diamond Glaze to do, and I cheerfully put that down to thickening - it has been on my shelf for so many years.
The part I neglected to think about was the possibility of accelerated drying time in such an 'old' product. And so, as drizzle faded to splatter, I discovered that the original 'lines' were too set to work into a smooth, dimensional, superb gloss coating. So now I have an artful drizzle topped box. Am quite liking it actually, and will very possibly do something else to it. After much procrastinating of course.
Meanwhile, I have a home for the unruly tapes, I have finished the old Diamond Glaze and the biggest bonus of all time - I didn't have to wait for it all to dry.
This box was a Bratz doll wardrobe I believe. I bought it for £2 from a Charity shop. The lady was mystified, and asked if I had dolls. I admitted that no, I did not, but I had lots of tapes waiting for a home.
Obviously, the lady was yet more mystified, but hey - she shouldn't have asked. It's like trying to explain scrapbooking - eyes glaze over and frankly, I just didn't have the patience!
Sum it up - a lot of everything...lots of stuff cleared off it - which is a good thing. And lots remaining. Not great, but not too onerous. My ipad poised toplay part of a crime drama I've been listening to. The black box at left is awaiting a cover or a lick of decent paint or something...it's to house my ridiculous washi and other tape collection which is frankly getting out of hand. It was once a wardrobe/case for Bratz dolls. Glasses case on top of that. You can still see some of the Luscious Valentine papers waiting to be put away...I'm not quite over them yet, so haven't stored them...or that's what I'm telling myself. And there's a new addition this week...indeed, just yesterday..
Jan and I were in a lovely kitchen shop in Salisbury. She on a mission, me browsing. She caught up with me in a section of the shop that was unstaffed and gave me this mug. I had strolled past the rack of mugs and not even noticed it. We howled. So much so that staff came to see what was so funny. And then of course, they didn't get it. And so we howled some more! Honestly, my face was aching. And now, in an effort to make my desk tidy....I'm using it for pens. Ta Na! You have to be in it to get it, huh!
Be in it then please, link your WOYWW post here and we'll trot round to visit. And can I add - word verification is incredibly difficult to negotiate for this old woman with an iPad that hates Google..it really makes it so hard to comment. And also...why do I have to tell every wordpress blog who I am, what my email address is and what my website is? It drives me nuts and causes heart sinking delays in getting a comment typed! And don't try to stop me being cross by telling me about auto fill. That is so not the point!
Oh and PS...I've put a few stamps for sale on my erm, for sale blog.
Quite innocently, I mentioned that I blog under half an assumed name. Dunnit. As a surname. Because back in the day when I used to sell my cards, I used to 'sign' the back of them with a stamped 'hand made by' and so I started adding Julia Dunnit. Because I did do it.
So what about the first name? The one I didn't make up or choose? Julia. I've no doubt a quick leap about Google will reveal it as descended from the Roman Julius in a female derivative. I cannot tell you why my parents chose it from the panoply of girls' names - I'm not aware that it was a particular trend at the time, and every now and then, I suspect it was a teeny rebellion against the name Julie. Because of course, the one letter difference has caused me a little irritation and some confusion over the years. But it's all good.
Until your dearest friends start defining it.
I've no doubt, gentle reader, that this was written with affection. But I've been considering it a lot. And I'm still walking around it. Because you see, although it was attached to a gift at Christmas, I'm not at all sure that the implication was innocent. And when I asked her, Jan just laughed hysterically.
So be careful. It's not how you choose the name, but how it comes to mean something that counts. Please, live your lives without blemish so that your friends can't write your epitaph on a gift tag.
Today I've moved on. I'll be conducting a workshop, the fixings for which you saw on my desk yesterday. So that's tidied that lot up. Underneath were the Valentine's papers that my clever Sissy designed. She is Stephanie of Luscious Life Studios. I appointed myself the Luscious Life Design Team member and it all kinda came home to roost and I had to put my money where my mouth is. So I've been playing, and how I've enjoyed just doing it for the sake of doing it.
I've tried to use the papers for non-valentinsey stuff in my scrapbook. Mainly because in 29 years, I don't have a Valentine story to tell yet. Hmm. But at least my deprivation proves that you can buy a set of something seasonal and not be trapped in the season. I think, anyway!
And here is my other sister, Sally, and her son, my only nephew.
Being very patriotic. I love this picture!
And then I sort of felt obliged to make some cards because - well, I can. And you know what - I decorated the inside too, and totally forgot to photograph it!
Quite busy, non! Well, it's only once a year and there's a message to be got across!
There's a couple more I could show you but I think Steph is planning to put them on the Luscious Life website or blog, so I'll leave you to go visit in the next few days if you're fascinated by the papers, the story, my family,or the perm I had in the early 1990s.
I know I've over linked, over abused and overdone the publicity, but hey - it's family. And also, this doesn't break my oh so up myself rule about endorsing something that I don't think is up to it. I'm loving the Luscious Life!
If mess makes your teeth itch - look away fast!
Oh my. I thought that I was a bit pushed for crafting time this week.....and I was certainly too pushed to clear up, apparently.
The lovely bright Valentines papers at left are from my sister's digital website, Luscious Life Studios...I've done some LOs and cards, will show 'em soon. The alpha stickers are slung there because they are slung there. I've no idea. There's even a receipt from Tesco supermarket promising me some pence off my next shop. Which will not come to pass if the receipt stays on the desk. The plastic bag is full of card kits for my first workshop of the year on Thursday and the yellow basket is one of four filled with the 'ingredients' for the cards. So my life...a clear up is in order..and strangely, because I'm at the end of 'making do' in this mess, I'm in the mood to do it!
Share with us do - what are you up to on your workspace this Wednesday? Put WOYWW in your post title, link your post here and we'll trot round for a visit. If you'd like to take part and can't fathom how, please click on the links at the top of the page. Don't be scared. It's easy and we're friendly.
Actually, it's Coffee. It always is if it's before 1pm. Oh the things you didn't know about me!
This little vignette set itself up last night actually; the mug of fresh coffee is this morning's addition..I come downstairs, make a cup of coffee and immediately throw myself into my comfy armchair to contemplate life whilst I drink the coffee. I'm bedraggled and usually chilly, and still in bedclothes and a charming fleece dressing gown (robe) that would do any woman of my age proud. It has a tassle on the zip...my daughter thinks this is the last resort in my becoming an old woman. And she's probably right. I did consider removing it when first I bought it, but that only lasted as long as it took me to do the zip up. A practical and attractive embellishment to a zip, I now think! Now that's a real digression folks, just in case you ever thought me incapable of such a thing! I'm linking to Bleubeard and Elizabeth's very civilised Tuesday sharing of cups and tea. It's so nice to join others with a brew.
I was going to try to answer some of the wonderful comments that were made following my post 'Please Sit, there will be questions'. But it's all a bit self evident really, as one reads the Comments. We are a bunch of internet users who, having searched a bit, found a community to be a part of, and we like it that way. And for validation of course. One of the big things that came out of it was some general surprise at my revelation that Julia Dunnit is not my real name. Well, your surprise surprised me! Julia is my name. Given at birth, of course, and chosen as a 'we like it...' type of name because I was the third daughter and they had already used up the two names they assumed they'd need. But Dunnit is made up. And not made up for security or even for reasons of big headedness. Just because it was a fun thing to write on the back of cards I'd made. And so when I started to blog, apparently about my crafting, it seemed sensible to use my craft name. See. Even my interesting parts are dull.
So fuelled by my first coffee, I'm off to face the day. Have a good one. Come back tomorrow to be amazed and erm, horrified by the desk, huh?! | 2019-04-19T08:20:49Z | http://stamping-ground.blogspot.com/2014/02/ |
American pathologist who discovered the role of ticks in the transmission of Rocky Mountain spotted fever. He died at age 39 from contracting typhus, the disease he was then investigating.
[p.333] In the Medical Sentinel (Portland, Ore.) for October, 1899, Dr. Edward E. Maxey, of Boise City, Idaho, called attention to “the so-called spotted fever of Idaho.” He described it as “an acute, endemic, non-contagious, but probably infectious, febrile disease, characterized clinically by a continuous moderately high fever, severe arthritic and muscular pains, and a profuse petechial or purpuric eruption in the skin, appearing first on the ankles, wrists, and forehead, but rapidly spreading to all parts of the body.” The disease is not to be confused with typhus fever nor epidemic cerebrospinal meningitis, to both of which the term spotted fever is sometimes applied.
Rocky Mountain spotted fever is not limited to Idaho, however, but occurs also in western Montana, Utah, Nevada, Oregon, Colorado, Wyoming, and perhaps in other neighboring states. The conditions in the Bitter Root Valley in western Montana aroused such concern that Dr. Louis B. Wilson and Dr. William M. Chowning, then of the University of Minnesota, undertook an investigation in 1902.2 They learned that the disease occurs only during the spring and early summer, and that the eastern side of the Bitter Root Valley is free from infection. They also announced the discovery of an erythrocytic parasite, Piroplasma hominis, as the cause of the disease and promulgated the tick-gopher hypothesis. According to this hypothesis the gopher is the habitual host for Piroplasma hominis, and spotted fever is conveyed from the gopher to man by means of the bite of the wood-tick (Dermacentor occidentalis), which feeds on both man and animals. It [p.334]was stated that Piroplasma hominis exists in about 20 per cent of the gophers from the infected side of the valley but was not found in those from the east side. They furnished no experimental evidence in favor of the tick theory.
Anderson,3 and later Stiles,4 of the Hygienic Laboratory, also studied the disease, the former advocating the tick theory, whereas Stiles discredited it and failed to identify Piroplasma hominis. Neither performed experiments bearing on the tick theory.
Hence when I began my investigations in the Bitter Root Valley in April, 1906, the tick theory was little more than a hypothesis, supported only by the coincidence of the season of the adult tick with that of spotted fever, and the almost constant history of tick wounds shortly preceding the onset of the disease. Furthermore, the validity of the latter point was considered questionable in some quarters, inasmuch as a great many people are tick-bitten every spring without suffering from spotted fever as a consequence. Although this circumstance would not render the tick theory untenable it has caused a great deal of local prejudice against it. Locally there is a strong disposition to attribute to the water of certain streams the power of carrying the poison to man, presumably from foci of decaying vegetation. It is not necessary in this place to go into detail regarding the conditions which a priori lent to the water theory a degree of plausibility.
The following points are taken as proof that the disease reproduced in these animals is spotted fever: (1) The incubation period approximates that in man in so far as it has been ascertained in [p.335] the case of man; (2) the course of fever, the eruption and anatomic changes found at autopsy correspond closely with these features in man; (3) as in the case of man it has not been possible to cultivate a micro-organism from the blood or organs of typical cases; (4) indefinite transmission from animal to animal appears to be possible (100 generations).
1. The cell-free serum of infected blood contains large amounts of the virus.
2. The virus is present in considerable quantities in an artificially induced leukocytic exudate, free from erythrocytes, and also in the overlying fluid from such an exudate after the cells have been sedimented by centrifugation.
3. Prolonged centrifugation of serum does not free the overlying portion from the virus.
4. It is impossible to free the blood cells in defibrinated blood from the virus by ten to twelve washings with physiologic salt solution, although this process decreases the virulence of the blood. During the washing a point is reached at which the fluid used in washing no longer contains the virus in infective quantities.
It was hoped that experiments of this nature might bring out evidence in favor of or against the piroplasma theory of Wilson and Chowning. I believe, however, that the results do not [p.336]justify positive conclusions for or against this theory. In the experiments cited above the cell-free serum proved rather highly infective; this event, however, does not preclude the possibility of a piroplasmatic infection, for, although piroplasmas invade the erythrocytes extensively in all known piroplasmic diseases, it is self-evident that the plasma must be the medium through which the organisms reach the erythrocytes. Hence in all piroplasmoses there must be many extracellular organisms at some stage of the disease.
Similarly the result quoted above in paragraph 2 does not of necessity disqualify the piroplasma theory, nor does it support strongly the possibility of a predominant leukocytic invasion by the parasite.
The results stated in paragraph 4 would seem to point rather significantly to an intimate relation between the virus and the red or white cells. However, this does not of necessity imply an intracellular location of the parasite, for it is conceivable that the microbes may adhere to the surface of the blood cells either through mutual viscosity or some other attractive or adhesive force. I obtained no positive result in attempting to liberate the organism from its hypothetical position within the blood cells, by crushing the latter in a porcelain ball-mill. This procedure decreased the virulence of the blood, which probably was due to the crushing of many of the organisms in the mill.
In brief, this method of experimentation does not give results which speak conclusively for or against the intracellular location of the parasite, and for this reason, if for no other, the experiments may have some worth.
That the microbe is either very small or of low specific gravity is suggested by the result stated above in paragraph 3.
I have made many attempts to pass the virus as it exists in serum through the porous Berkefeld candle filters, the serum being diluted as much as ten-fold with physiologic salt solution. In no instance has the virus passed through the filters, at any rate in infective quantities, although nine cubic centimeters of serum were used in one experiment. The failure of such a large quantity of filtered serum to produce infection, when it is known [p.337] that the unfiltered serum contains the virus and that fresh diseased blood is pathogenic in doses of 0.05 to 0. 1 c.c, is significant. The result suggests that the organism, though undoubtedly minute, is of such size that it should be recognized by the use of high magnifications, or that it is of peculiar form or possesses such adhesive properties that it is not readily filterable.
Experiments on the resistance of the virus to cold, heat, desiccation, dialysis, and other agents have as yet furnished no differential clue as to the protozoan or bacterial character of the microbe.
That recovery from one attack of spotted fever renders an animal resistant to further attempts at inoculation is one of the important practical facts brought out by my experiments. Studies in immunity have shown that a disease which will incite immunity in one species is very likely to have a similar effect on other susceptible species, hence it is extremely probable that man generates an immunity similar to that of the guinea-pig which has recovered. This supposition is strengthened from the fact that no authentic instance of two attacks in man has been observed in so far as one can learn.
By showing the transmissibility of spotted fever to the guinea-pig and monkey, a means of putting the tick theory to a decisive test had been provided.
In attacking this problem the first logical step was to determine [p.338] whether the tick after feeding on a diseased animal is able to infect a healthy animal by biting it. If this should prove to be true, and if, in addition, it could be shown that the relation of the virus to the tick is a very intimate one, so that the transmission would appear to be “biological” rather than purely mechanical, the results would place the tick under the gravest suspicion as the means of infecting man.
In the summer of 1906 I showed that the female tick can acquire and transmit spotted fever by means of biting,9 and King10 of the Hygienic Laboratory obtained a similar result at the same time and with the same strain (my strain) of the virus.11 Later in the year I found that the male tick also may acquire and transmit the disease, which could well be anticipated since the male as well as the female is a blood-sucker.
Of great importance is the hereditary transmission of the disease by an infected female. This occurred in two of my “heredity experiments,” and this may have an important bearing on the vitality of the disease in nature from year to year. The term “hereditary” is used rather broadly and only in the sense that [p.339] the infection was derived from the female. It may be argued that during the process of oviposition, in which the head parts play a function, virus may have been deposited on the surface of the eggs from the salivary glands of the female and that the microbes reached the embryo or its food supply by penetrating the egg membrane, or that the virus having been deposited on the surface of the egg, the embryo later became infected by consuming a portion of the membrane. The pertinence of the first argument must be recognized, although the virus has shown no penetrating power for the skin of man or for the mucous membranes of man and animals, membranes which would seem to be much more susceptible to penetration than the dense covering of the tick's egg. The second argument could not be considered as valid because the life of the virus when exposed to the light is known to be much shorter than the time required for the development of the embryo. Such considerations, however, do not affect the practical fact that the larvae of infected females may be born with the virus of spotted fever in their salivary glands, and that they are sometimes able to transmit the disease to a susceptible animal.
“Hereditary” transmission was attained in only two out of twenty-six experiments, a fact which fits well with the scarcity of infected ticks in nature (see below) and in the rarity of the disease in man.
I am inclined to the view that the tick during the time it harbors the virus undergoes a generalized infection. I take it that the successful “heredity experiments” signify uterine, hence generalized infection. I have shown by inoculation experiments that the virus is present in the alimentary sac and in the salivary glands of the infected adult tick. Undoubtedly the alimentary sac becomes infected primarily through the diseased blood ingested by the tick, and it is probable that the localization of the virus in the salivary glands is a part of, or residuum of, a generalized infection.
The second, and one may say the final, step required to prove that the tick is the agent through which man is infected, involved the discovery of infected ticks in nature. I say the final step, because it would complete a chain of the strongest possible circumstantial evidence tending to incriminate the tick.
[p.340] On account of the disproportion between the number of tick-bitten persons and the number of cases of spotted fever occurring any particular season, it was anticipated that the search would be a difficult task and, with negative results, might require the testing of many thousand ticks before one would be justified in acknowledging failure.
In order to increase the probability of finding infected ticks in nature those selected for the tests were taken from localities known to be infected, some being obtained from horses and cattle and others from the clothing of different individuals who had collected them in this way from the woods. They were allowed to feed in groups on normal guinea-pigs, and for a period which is longer than that required for transmission.
Five hundred and thirteen ticks were tested in this way and of this number two hundred and ninety-six were found attached to the guinea-pigs. It is quite certain that this does not represent the full number which fed, since in searching the skin of the guinea-pig for ticks a few may unavoidably be overlooked.
Eventually one or more infected ticks were found among a group of thirty-six males which had been collected from apparently healthy horses. The guinea-pig on which they fed developed fever on the seventh day after being placed with the ticks and died seven days later, exhibiting the clinical and anatomic changes which render spotted fever easily recognizable in this animal. No micro-organism could be cultivated from the blood or organs of the animal, which, as stated above, is the customary result of cultivation experiments. Seventeen ticks were seen attached to the guinea-pig, the first being discovered on the second day.
The experiment was carried further by producing the disease in another guinea-pig through the injection of blood from the first and in a monkey by a transfer from the second guinea-pig. In addition, twenty-four of the ticks which had been placed with the first guinea-pig two days before the onset of fever were given a second test in two groups of twelve each. One of the two guinea-pigs died of peritonitis after four days. The other began a febrile course on the sixth day and was found dead five days later with anatomic changes and cultural results which rendered the diagnosis [p.341] of spotted fever positive. Six ticks were seen attached to this animal. The experiment was not carried further, since the ticks were still feeding when fever developed and all had had the opportunity of becoming infected.
No precaution was neglected to place these experiments above criticism. Each animal with its ticks was isolated in a tick-proof cage in all instances, and the cages either had never been used before or, if used, had been sterilized before being subjected to use again. No tick of uncertain identity was utilized.
The finding of infected ticks on the horse does not necessarily implicate the horse as a factor in the maintenance of the disease in nature. In so far as I can judge by preliminary experiments, this animal is not very susceptible to spotted fever.
1. The disease may be acquired and transmitted by the larva, the nymph, and the adult male and female, that is to say, by the tick during any of its active stages.
2. The larvae of an infected female are in some instances infective.
3. The association of the virus with the tick is very intimate, as shown by the long duration of infectivity of the tick, the retention of infectivity during moulting, and the “hereditary” transmission of the virus; hence there is some reason to believe that the tick suffers from a relatively harmless generalized infection, and that the virus proliferates in its body. The disease probably is transferred through the salivary secretion of the tick, since the salivary glands of the infected adult contain the virus. There seems to be no doubt but that the arachnid, when biting, injects some of the salivary secretion into the skin; this is indicated by the marked local reaction which follows the bite of even the normal tick.
4. Infected ticks exist in nature in small numbers in the so-called infected districts.
When one adds to such data the generally known facts that the disease in man is limited to the season of prevalence of the adult [p.342] tick, the larvae and nymphs rarely feeding on man, and that a history of recent tick bite may be obtained in nearly every case of spotted fever, and cannot be positively excluded in the event that such history is not given, it seems necessary to conclude that the chain of circumstantial evidence is now complete, and that the acceptance of the theory of transmission by the bite of the tick is now justified.
I have failed, and Mr. P. G. Heinemann who assisted in the work this year likewise failed, to cultivate or identify positively the micro-organism. It has not been possible so far to identify or accept the piroplasma of Wilson and Chowning as the cause of the disease.
Concerning the gopher hypothesis, occasional susceptible animals are found among the local species, but it is not certain that the gopher plays the part in the perpetuation of the disease which Wilson and Chowning assumed that it plays.
1 From Trans. Chic. Path. Soc., 1907. This work was supported chiefly by an appropriation made by the legislative assembly of Montana, and also by Missoula and Ravalli counties, Montana, and by the University of Chicago.
2 Wilson and Chowning, Jour. Infect. Dis., 1904, 1, p. 31.
3 Anderson, Bull. No. 14, Hyg. Lab., U.S. Pub. Health and Mar. Hosp. Serv., Washington.
4 Stiles, Bull. No. 20, ibid.
5 Ricketts, Jour. Am. Med. Assn., 1006, 47, p. 33.
6 Ibid., 1906, 47, p. 1067.
7 Ricketts, Jour. Infect. Dis., 1907, 4, p. 141.
9 Ricketts, Jour. Amer. Med. Assn., 1906, 47, p. 358.
10 King, Pub. Health Rep., 1006.
11 At the time this work was done I had no knowledge of previous experiments which demonstrated the ability of the “wood-tick” to transfer spotted fever. Recently I have had authoritative information that Dr. L. P. McCalla and Dr. H. A. Brereton, of Boise City, Idaho, transmitted the disease from man to man in two experiments. The tick was obtained “from the chest of a man very ill with spotted fever,” and “applied to the arm of a man who had been in the hospital for two months and a half, and had lost both feet from gangrene due to freezing.” On the eighth day the patient became ill and passed through a mild course of spotted fever, leaving a characteristic eruption. The experiment was repeated by placing the tick on a woman's leg, and she likewise was infected with spotted fever. Although these results received no publicity other than that given in reports to local societies, I take pleasure in according to Dr. McCalla and to his colleague. Dr. Brereton, the credit of having first shown that the tick may act as a carrier of spotted fever. Their experiments preceded by more than a year those of Dr. King and of myself, and they were performed with the full consent of the patients concerned.
12 Ricketts, Jour. Am. Med. Assn., 1907, 40, p. 24; ibid., p. 1278.
13 Since this article was written the search for a vaccine has progressed so favorably that there is reason to believe that vaccination will prove an effective means of preventing the disease in man. This work will be reported in detail in the near future.
9 Feb - short biography, births, deaths and events on date of Ricketts's birth.
Howard Taylor Ricketts - Biography and Rocky Mountain Fever - Memorial Address (1910).
The Rocky Mountain Spotted Fever: History of a Twentieth-Century Disease, by Victoria Harden. - book suggestion. | 2019-04-18T19:11:05Z | https://www.todayinsci.com/R/Ricketts_Howard/RickettsHoward-Paper.htm |
Abstracts for each day are listed by poster number at the foot of the page: click on the title to jump to the abstract.
Department of Materials Science and Engineering, Drexel University, Philadelphia, PA.
Department of Biomedical Engineering, North Carolina State University, Raleigh, NC.
Father Judge High School, Philadelphia, PA.
Freire Charter School, Philadelphia, PA.
Hammonton High School, Hammonton, NJ.
Exploring Nanotechnology with Electrospinning: Design, experiment, and discover!
7 M.E. Noguez A., G. Salas B., J. Ramírez V.
33 G. Salas B., J. Ramírez V., M.E. Noguez A.
Poster 1: Exploring Nanotechnology with Electrospinning: Design, experiment, and discover!
1 Department of Materials Science and Engineering, Drexel University, Philadelphia, PA.
2 Department of Biomedical Engineering, North Carolina State University, Raleigh, NC.
3 Father Judge High School, Philadelphia, PA.
4 Freire Charter School, Philadelphia, PA.
5 Hammonton High School, Hammonton, NJ.
Nanotechnology is a challenging concept to teach. The length scales involved are difficult to visualize, the products are invisible to the human eye and in most cases the fabrication and characterization of nano-scale materials are prohibitively expensive. Moreover, the inaccessibility of nanotechnology in the classroom reduces the student’s experience to factual recall of a list of properties and advantages of materials at the nanometer scale or watching demonstrations.
Electrospinning is a nanofabrication technique that is not only simple, but inexpensive. The physics, chemistry, and engineering principals used in electrospinning are scalable so that lesson plans can be designed for high school students and undergraduates. In this project, the students built K’NEX electrospinning stations, and identified the process variables and material’s properties that control the resulting fiber diameters and product yield. They wrote a short proposal positing their hypothesis and a detailed experimental plan to optimize the fiber diameters and yield using their electrospinning station. The students implemented their experiment, trouble shot equipment failures, and collected their nanofibers. Their nanofibers were imaged using an SEM and the students analyzed the fiber diameter distributions with ImageJ software and a statistical package in Excel.
The electrospinning activity was completed in three high schools and an undergraduate polymers processing laboratory. The high school students were all able to complete the activity an attitude assessments indicated an overall increase in interest in majoring in engineering, with a particular bump in 11 grade females. All students demonstrated an increase in understanding the concepts of nanotechnology and were able to defend their design choices. Exciting hands on laboratory experiences that not only implement the fundamental principles of nanotechnology, but encourage actual work patterns and discourse of practicing STEM professionals will energize the students and encourage creative problem solving.
Materials science and engineering (MSE) education is central to interdisciplinary approaches to accelerate scientific discovery and innovation in the 21st century. To facilitate connections between research and education, faculty and students need ready access to innovative teaching resources that easily integrate into existing undergraduate curricula. This submission will discuss efforts to connect and leverage individual endeavors by the Materials Digital Library Pathway (MatDL) and the Education Division of Granta Design in order to enhance access, exchange, and growth of high quality educational resources for the education community and related areas. MatDL (http://matdl.org), as part of the National STEM Distributed Learning effort, supports the integration of materials research and education with a targeted audience of undergraduates and above as well as collaboration with other cognate disciplines. The Education Division of Granta Design (http://teaching.grantadesign.com) develops and co-ordinates resources to support materials related teaching across Engineering, Design and Science disciplines at over 800 universities and colleges worldwide. Individually, MatDL and Granta support open access and broad dissemination of learning resources. This submission will discuss beginning steps to work jointly, following practices and standards adopted by the engineering and teaching communities, to offer convenient public access to shareable learning resources for MSE faculty and students. Promoting educational resources through this coordinated approach has the potential to substantially broaden the audience of users and contributors, both by pooling educational resources available in the community and by helping train future MSE scientists.
Florida Tech features the first nanotech program with multiple three-credit labs, as most students learn nanotechnology in "hands-on" mode. New Nanotech Lab II and Materials Characterization Lab courses have been pilot-tested to complement existing Nanotechnology and Biomaterials and Tissue Engineering lecture courses and a freshman Nanotechnology Lab I course.
The Nanotech Lab II course adds SEM, TEM, STM, and AFM characterization of nanomaterials made using both literature and new syntheses. Students synthesized CdS and CdSe quantum dots used in biomedical imaging, made phosphorescent europia-doped yttria and saw how its phosphorescence was related to heat treatment conditions. They also made metallic, zeolitic, and Mo carbide nanoparticle catalysts, and polymer/silica structural nanocomposites. Nanoelectronics industry experiments included the use of photolithographic processes to make microfluidic channels used in lab-on-a-chip biodiagnostic screening devices, the synthesis of carbon nanotubes and Ni nanowires, and even synthesis and testing of polymer/carbon nanocomposite sensing elements in an electronic nose. Students tracked the growth of ammonium hydrogen phosphate and zeolitic clay crystals, the growth and misfolding of proteins associated with Alzheimer's disease, and the destruction of bone from excessive acid concentrations associated with gouty arthritis.
Materials Characterization Laboratory addresses the need to get students from rookie to independent status quickly without significant cost or downtime. This class was composed of lectures, hands-on demonstrations, online testing prior to using the equipment, mentoring under a graduate student, and passing a hands-on practical test. Students found development of troubleshooting flowcharts for STM and AFM particularly helpful. Establishing a grading system that emphasizes independence is sufficient to get the students to progress. Crash courses are effective means to get students past the intimidation barrier. Students effectively teach each other, when such teaching helps them get an A. Finally, having students do as much as possible early in the semester is the best approach.
Looking back across the history of science, technology, engineering and math (STEM) education, there have been nearly continuous calls for curriculum innovation and improvement. In the past 20 years, however, many of these calls have intensified and focused on the incorporation of interdisciplinary, problem-based, “real-world” learning in one form or another. These range from more general reports like those coming from the Boyer Commission in the mid 1990’s, to specific work that led to the restructuring of the ABET accreditation process through EC2000. More recently, publications by the National Academy of Engineering such as “The Engineer of 2020” and “Educating the Engineer of 2020” have reenergized the call for innovation in STEM curricula.
Philadelphia University is a small, private university with a long tradition of professional technical education and an emerging focus on innovation and interdisciplinary education. The newly formed College of Design, Engineering and Commerce is the home to a revolutionary, trans-disciplinary curriculum that retains the core learning of the three disciplines within the college (design, engineering, and business) while forging new collaborations between the disciplines.
As a model for professional university education in the 21st century, Philadelphia University is focused on providing graduates with the skills necessary to be leaders in their professions at every level of their careers. By bringing these three disciplines together, the new College will push students to think beyond the boundaries of existing disciplines and focus on market-driven innovation through teamwork, collaboration and connections with industry partners.
Students will gain expertise in their disciplines and a fluency in the trans-disciplinary ways of the 21st-century work world on a much larger scale than what has been seen in higher education to date. The new College is a forward-thinking and timely concept because it combines the best aspects of the three disciplines at its core to focus on innovation and entrepreneurship. This is happening exactly at a time when innovation is universally recognized as a critical element in global economic recovery, as well as in solving today's complex, world-scale human problems.
This presentation will review the most recent calls for STEM curricular change and present the exciting new response from Philadelphia University, the College of Design, Engineering and Commerce. The presentation will focus on the efforts to synergistically combine targeted curricular changes with a focus on content-specific teaching pedagogy and a new academic management structure. The presentation will conclude with a specific example of incorporating CES EduPack software into a new trans-disciplinary “Material Selection and Design” course that will be part of the college core curriculum in the new college. The course is specifically designed for sophomore level engineers, designers (ranging from industrial design to graphic design to fashion design), business majors and architects.
M.E. Noguez A., G. Salas B., J. Ramírez V.
In order to motivate students on their own learning, development and knowledge (skills, attitudes, etc.), some attractive alloys have started to be used in phase transformations lectures. If alloy is enough attractive, then this will allow the students to be curious and dreamers and make a compromise with themselves. This is a goal seek for the teaching-learning experience. The work done with one of the alloys is presented here.
Gold-Platinum alloys made by pre-Hispanic people between 400 BC and 500 AD in South America (present Colombia and Ecuador) capture the attention of the students to motivate the thinking about the possible variations in making the alloys by solid state diffusion, because Platinum melts at 1759°C, unreachable temperature on those times. These was used to let them think on temperatures, sizes of native Gold and Platinum flakes and process times, according to diffusivity data and three engineering models used by metallurgists nowadays. In the classroom, the students calculate the time to get an homogeneous 85Au-15Pt alloy at different temperatures using the three models. For interpreting the obtained results, they must analyze the models, learning about them by themselves. Besides they identify their own skills which allow them to construct the needed competencies. Further, the students get involved in History and Archaeology when they learn about the different alloys made by the pre-Hispanic people.
Experimental results obtained by some students in their term project are also presented and compared with the theoretical calculations made in the classroom. Some observations of the students are also presented.
A better understanding of diffusion models, the pre-Hispanic cultures and of the students themselves is gained.
Attractive alloys are well received by students as a motivation for learning, so their use will be increased in the classroom work.
Forty-five years have passed since NIMS (National Institute for Materials Science former National Research Institute for Metals, NRIM) started to collect creep and fatigue strength data for domestic metallic materials in a neutral setting. The data are published as a structural material data sheets annually. NIMS has been published kinds of fifty-nine creep data sheet, and fatigue data sheet has been published for one hundred–nine kinds of various test conditions, including the welded joints. These data sheets have now become the world's biggest and reliable source of published data on the creep and fatigue strength of structural materials. These structural materials data sheets are publicly available on the Internet as one of the NIMS materials databases MatNavi as well as printed matter. NIMS and Granta Design have collaborated on the materials search system of matdata.net on since 2005. Currently, NIMS creep and fatigue data are being built into the Granta MI and CES Systems.
An overwhelming body of educational research has shown that students learn more when classes are taught with active, collaborative, or problem-based learning approaches. Students also learn more and are more motivated to learn when presented with inductive-style learning activities rather than deductive ones. For our introductory materials science course at Bucknell University, the author has incorporated these ideas into the course through the use of a half-semester long problem-based design using collaborative teams and active learning techniques. This poster will present the way this project has been introduced and implemented as well as recommendations for future improvements to the implementation based on student feedback.
Civil engineers play a critical role in planning and designing the built environment. They wield enormous influence over the use of earth’s natural resources because the construction industry uses by far the largest fraction of the earth’s natural material resources (USGS 1998). Therefore, designers of civil engineering projects can effectively contribute towards sustainability through more effective use of new and recycled materials. Civil engineering students can benefit immensely from course curricula that provide awareness on sustainability implications of using various materials available at their disposal. These implications include material supply, recycling potential and ecological impacts. The current practice of specifying construction materials for civil engineering projects is primarily driven by the status-quo and existing pricing mechanisms. It does not come naturally to most societies to think in terms of the long-term impacts of their decisions. With the increasing emphasis placed on sustainability and the preservation of biodiversity, civil engineers must take a closer look at potential benefits to society from sustainable design and construction practices. The US Accreditation Board for Engineering and Technology (ABET) has included knowledge of sustainability in its general program evaluation criteria [ABET 2000]. In addition, the second edition of the ASCE Body of Knowledge (BOK) for the 21st Century recommends the incorporation of sustainability concepts in design courses and to allow students to develop specialized knowledge and skills beyond traditional civil engineering-related subject areas. It is a formidable challenge to develop effective course content on sustainable engineering design and to deliver that knowledge to students by highlighting the long-term implications of their actions. This poster presents some reflections of the author based on experience from developing and teaching a course titled “Material Systems for Sustainable Design” within a civil engineering curriculum. The overarching objectives of this course are to provide students with knowledge on sustainability principles, to create an awareness of the tools available to assess sustainable material selection decisions, and to identify improvements needed to existing tools.
Introducing materials selection to sophomore students is a particularly difficult task, as oftentimes their knowledge on Structures or Mechanics of Materials is fairly limited, if existing at all. The authors have started a sophomore course restructure on Engineering Materials with a flavor of materials selection and a limited knowledge on mechanics of materials, just enough to introduce strategies for materials selection to be developed further in other downstream design-oriented courses. This approach has been used onwards from the fall semester of 2009.
The Engineering Materials course is the second core course on Materials related topics—the first being a freshman course on Materials Science—in a three year Mechanical Engineering degree at Instituto Superior Tecnico, the Technical University of Lisbon, Portugal. Whilst the Materials Science course, at the freshman level, uses a traditional bottom-up approach starting with the atoms and ending up in materials’ properties, this new course assumes a design-led approach, closing the cycle of what would be called a basic materials education for mechanical engineers. In both cases the students are lacking in background depth on basic sciences which is a serious limitation going forwards. Other courses will then follow, some of them being elective on Mechanical Behaviour of Materials and Composite Materials, as examples.
The Engineering Materials course also has a laboratory component in which different materials are tested under tension and impact, and hardness is measured on metals and plastics’ standard coupons. The authors generally found that this design-led approach, together with materials testing in the lab helped in strengthening the students’ perception of strength, stiffness and hardness to name just a few. Also, the visual nature of most of the resources used has helped in retaining the students in class for the best part of the semester, and gave them a good overall perspective of the positioning of each family of materials.
As part of a recently awarded NASA-CIPAIR grant, we are integrating new undergraduate materials curriculum into core undergraduate courses, which are required for our applied physics major and a new computer engineering major. This is a cooperative effort between NASA-Dryden, College of the Desert and California State University, San Bernardino. Recent advances in both nanotechnology and first principles (ab initu) computational techniques have convolved to present exciting possibilities in materials science and engineering. The dream of designing materials with desired properties, or combinations of properties from the atom up, and then testing these theories on physical systems, is becoming a reality. Also, materials are critical to most NASA programs and missions. One new course is being created and six courses will be revised to expand materials science and engineering content in the curriculum. The fact that this is a new course in a new major at CSUSB provides a unique opportunity to rethink how this course should be taught, without the legacy issues that sometimes hinders curriculum development. Furthermore, these curriculum changes address the need to incorporate quantum physics into courses taken by engineering students.
One of the more challenging aspects of teaching beginning design is the integration of technical subjects into foundation design studios. In upper division studios, design build projects or comprehensive design projects address this, but projects in lower divisions have traditionally focused primarily on design principles at the expense of materials and fabrication processes. How can these issues be addressed in the early years of a architecture student’s development? How can we instill a sense of materiality and craft in an environment where digital processes are so nuanced and invisible? How can we develop student awareness of formal, spatial, tactile and experiential aspects of architecture as products of material and fabrication processes?
At CalPoly State University, we’ve begun to address these questions by introducing Formative Material Studies into second-year design studios. Related to larger design projects, these studies are conducted parallel to lectures, presentations and readings designed to frame conversations about the conceptual, theoretical, aesthetic, philosophical, perfomative, and technical issues affecting architecture in the contemporary world. The studies are designed to promote a fundamental understanding of the issues identified by Toshiko Mori above, namely materiality, tactility and fabrication processes. The focus is placed on traditional materials and processes (joining and binding wood, folding paper, weaving reed, casting plaster, etc.) with the understanding that these studies will lead to greater speculation in subsequent design projects or design courses. Our belief is that it is important to make the relationship between material and fabrication, between form and process very apparent before students move to digital studies and fabrication methods where the these relationships become less visible.
The five projects presented here are excerpted from a series of second-year design studios. In addition to linking materials with processes, the exercises are intended to reinforce larger themes in second year studios such as lessons from everyday life, topography and site, single-space form and multi-space form.
The undergraduate second-year Materials and Methods course in the School of Architecture and Design at the University of Louisiana at Lafayette embraces artist and educator Josef Albers pedagogical approach of learning by doing which suggests that students learn best when they teach themselves through iterative hands on work. Each year students are engaged in individual explorations of making in three separate acts: concrete, steel and timber; resulting in the production of an architectural artifact. Focused experiments are guided by critiques to ensure the development of ideas and tectonic understanding. Successive investigations demonstrate increasing material sensitivity, innovation and sophistication in the translation of students' ideas from concept to construction.
The initial act is the “marking, shaping and preparing of ground by means of an earthwork”; a concrete casting. This project is introduced as a finite act of making. However, once the stereotomy artifact is produced the second project, steel, is introduced and students learn that they must resolve the relationship, in steel, between their stereotomy artifact and a timber post. The “irreducible importance of the joint” in the assembly of these three materials in a meaningful manner becomes the emphasis of the second act of making. In the final act of making students must make yet another joint detail in timber. The final moment of revelation comes when student realize that the architectural artifact that they have constructed has paralleled the development of their post and beam studio project and that the Materials and Methods artifact could be a full scale detail of a moment in their studio project.
The value of this pedagogical approach is that it allows students to conceive each architectural element, foundation, fastener and post and beam, as a generative detail. The production of each element creates opportunities for innovation and invention for the resolution of the successive element.
Results and Discussion: The database was first released in January 2011. So far more than 160 academics have downloaded the database for evaluation. The level of depth as well as the breadth of the database will be reviewed based on feedback during the next development cycle, currently scheduled for July - December 2012. Some universities have already agreed to contribute to the database in the field of Nano-materials. The benefit to such contributing institutions and their partners will be raised awareness of their developments amongst a wider academic audience through full acknowledgement in the database.
With this poster, we share results from two workshops with students at the University of Technology Sydney, showing how textiles’ lighting and spatial possibilities can be explored by making three-dimensional architectural models by hand.
The students experimented with two tools for three-dimensional sketching consisting of model making materials. This approach is supported by earlier work exploring small-scale textile membranes in similar workshops.
The first workshop introduced 14 architectural students to two specific textiles for building skins and made them create models of such skins.
The second workshop introduced 11 spatial design students to three principles defined by Boutrup and Riisberg about textiles and daylight. The modeling was then more restricted than the first workshop, including only a cardboard ‘room’, a scenario, three pieces of translucent textile and restrictions as to what to do with these materials. The restrictions were gradually loosened.
Subsequently, the students’ supervisor, a registered architect with 10 years of experience, was interviewed.
In the first workshop, three material strategies were indentified: the materials were either used to materialize, to illustrate or to develop a concept. The tool’s openness seemed to be a limitation, resulting in a somewhat shallow exploration of textiles’ effect on daylight regulation.
Contrasting the first workshop’s openness, the restrictions in the second workshop resulted in better and more solutions showing a deeper exploration of textiles’ possibilities for daylight regulation.
The interviewed architect argued that the tools would be suitable in professional practice where they could be used early in the design process, as a way of literally sketching with textiles to expand one’s material repertoire.
We argue that this type of tangible modeling makes it more likely that textiles will be used in the final design and contributes to bridging the gap between model and final building.
Sustainability, particularly in disciplines such as architecture, is our preeminent calling. In the face of staggering evidence, our responsibility to address global concerns is no longer a question. Today, sustainability in architecture has become increasingly synonymous with technology-driven building techniques - from ‘smart’ skins and responsive systems to complex new building assemblies. While these advances are commendable, we often fail to see that which lies directly before us.
for the Roth Trailhead—our inaugural design/build project—students were taught how to identify potential soils based on particle size analysis, how to test for compressive strength capacity, which types of amendments are best suited to which soils, and best practices for detailing that respect the unique character of the material.
Through testing, students discovered relationships between soil particle distribution and compressive strength as well as the effects of different amendments such as Portland cement, lime, fly ash, and bottom ash to base soils. These results will have immediate application in the design and construction of the Roth Trailhead. The greater significance of this educational model, however, is to instill in students the integral relationship between materials and detailing.
The Morgan State University undergraduate program in architecture has initiated a new series of courses in “technology”. As part of this sequence, I offered a course in Historic Preservation Materials and Technology. The course was offered for the first time last Spring (2011) with no budget or real resources. My objectives for the course included exposing students to the causes for the deterioration of historic building materials, recommended methods of abatement as well as preservation, and documenting observations of deteriorating conditions in a historic structure.
The course was divided into four sections, each focusing on different building construction materials. Within each section, it examined the historic development of that material and occasionally engaged students in a ‘hands-on’ field experience involving its construction, restoration, or preservation. This approach was intended to provide the student with both the necessary academic foundation of understanding as well as a pragmatic and practical understanding of the material. This learning was to be facilitated by a collaborative relationship between the school and restoration experts. The collaborations did not materialize and I had to get creative with that part of the instruction.
Regarding the sites for the laboratory, I was able to partner with the Carroll Museums, Inc. which managed two historic properties, the Carroll Mansion and the Shot Tower in Baltimore. Both buildings are experiencing extensive deterioration. The students learned to document by photography and narrative the signs of deterioration. They also made presentations to the Executive Director. I propose to present a poster of the student’s work. My primary resources for instruction were the literature and YouTube! I was able to substitute the practical demonstrations by preservation professionals with the videos that were prepared by practitioners. The students responded remarkably well to that media.
Engineering materials designed with an environmentally conscious perspective are of vital importance in the construction industry. The construction and operation of buildings is one of the greatest consumers of energy and natural resources worldwide and the production of the materials used in these buildings has considerable energy and resource demand. In addition to these environmental impacts, the life-cycle of traditional building materials is linear: materials are produced, transported, used, and then disposed. This linear life-cycle leads to significant accumulation of construction and demolition waste in landfills. Most engineering programs do not teach engineering principles that consider both mechanical properties and environmental impacts concurrently. The Closing the Material Loop teaching module is targeted at students who are in their senior year of high school or in their undergraduate career and is designed to act as an introduction to the importance of engineering "greener" materials. The module introduces concepts from three elements of green material engineering: (1) material life-cycles, including discussion of current material life cycles and their associated waste and energy streams; (2) materials that have the potential for closed-loop life-cycles; and (3) life-cycle assessment, including a short introduction to conducting a life cycle assessment with a focus on quantitative analysis of material case studies. How material properties play a role in material selection and life-cycle analysis are also presented. These topics are covered at a rudimentary level to encourage awareness of environmental impact in material design. This short teaching module, which has been successfully implemented in one day teaching events at Stanford University, can be taught by engineering and non-engineering educators as a way of instilling the importance of environmental awareness in material design for young students.
CES EduPack is a tool that was developed specifically to support teaching of Materials related topics in higher education. It serves both a science-led approach and a design-led approach. More than 800 universities worldwide now use it to support their teaching on Materials and also on Sustainability. There are a number of teaching resources available from our website that accompany the software: 200+ supporting materials that include PowerPoint lectures, worked examples, exercises and white papers. These resources can be used freely by the academics as they see fit to support their teaching.
Due to our growing commitment in Spanish speaking countries, Granta has helped create a community of scholars that is currently developing teaching resources specifically for Spanish speaking university curricula. The present poster presents the work done so far and future perspectives.
Architects working within the realm of the new--either in terms of form or material--realize concepts through research, experimentation and collaboration. Last spring, while teaching at Syracuse University in New York, I taught a course collaboration between architecture students and ceramics students that sought to encourage innovative material explorations by combining techniques borrowed from each of the disciplines: digital fabrication, which is now a mainstay of cutting edge architectural design, and hand-crafted slip-cast molds, which have been used in ceramics processes for hundreds of years. This was a challenging, but highly rewarding pedagogical experience. Students with specialized skills learned how processes could be combined to design and create formally advanced tile multiples. The architecture students used extremely precise computer numerically controlled milling technologies to make molds for plaster casts, which were made to facilitate the production of tile multiples. The collaboration was an innovative learning experience for a number of reasons. Technological innovations have only recently begun to affect the craft disciplines, so the ceramics students were aware of the potentials, but had not explored the technologies in their education. Similarly, the architecture students learned about the history of the use of ceramics in architecture and the tremendous potential of the durable, sustainable material in contemporary practice. Some of the designs could have been more progressive from a formal standpoint, and so this cross-disciplinary collaboration has incredible potential not only for learning, but to push the fields of architecture and ceramics.
Perhaps one of the most exciting aspects of the collaborative ceramics investigations is the potential to harness the filtration properties of ceramic material in architectural applications--a prospect that has not been fully explored. Traditionally in architecture, ceramic has been utilized for its durability and water-shedding properties, but has not been explored as a water and air filter on an architectural scale. I hope that in the next iteration of the ceramics-architecture course collaboration that the students’ research will focus on the performative aspects of the material.
Performative in that it affected light, air, heat, water, sound, or other phenomena in a controllably variable manner.
Spatial in that it enclosed space both within itself and around itself at multiple scales.
an Assembly that used modules, units, or sub-assemblies that aggregated into a larger whole.
a System, understood as a repeatable process of design, manufacturing, and assembly as much as a singular object.
Each of the six teams began by exploring the limitations and affordances of a single material—concrete, fiberglass, plywood, redwood, resin, and rubber—and understanding how it interfaced with different tools and processes of manufacturing and assembly. This occurred largely through a hands-on, iterative development process. Parametric design software (Grasshopper) and computer-numerical-controlled manufacturing equipment (laser cutters and threeaxis CNC routers) were taught as powerful means of conducting controlled experiments in the relation between tools, materials, and processes, but were often used in concert with more traditional tools and processes. The course culminated in a successful exhibition of each PSAS, where students’ sensitivity to balancing craft, economy, and performance was evident.
The term “paper architect” is a (usually pejorative) term referring to designers who never build, instead opting to explore speculative or utopian visions through drawing. Architectural education reinforces this de-materialization of paper: architectural models typically use paper to represent almost any material except itself. By examining the materiality of paper more closely, can we develop a material sensitivity and ingenuity that can extend to other scales and materials?
An architecture course focusing on the integration of digital technology and material processes used a two-week “digital origami” exercise to introduce foundational concepts and skill sets. The objectives of this exercise were to understand the interrelations between material, geometry, form, and structure; to learn to use parametric design software (Grasshopper) and digital manufacturing equipment (the laser cutter); and to develop the ability to think parametrically (using a rules-and-relations-based process).
Students began by hand-folding common folding patterns, using recursive abstract patterns to create structural and sculptural surfaces. Next, students began to modify these patterns or invent their own, learning parametric design software as a tool for creating varied and customizable patterns. These patterns were laser-cut from paper board, which was folded into form. These first manufactured forms were largely unsuccessful: the limitations of the material did not permit many of the desires of the designer via software, and required students to re-evaluate their design through an iterative process that oscillated between digital and physical modes of working. Through this process, students developed a pattern that exploited material properties and manufacturing processes to create a folded surface that could be beautiful, structural, and efficiently manufactured. This materials-based approach to digital design processes extended to subsequent coursework involving large-scale assemblies with varied materials, with the hope that a new generation of “paper architects” will proactively engage material and construction.
G. Salas B., J. Ramírez V., M.E. Noguez A.
It is possible to find different approaches that the authors use in introductory literature of materials courses, as a base to lead students in materials field. It is important to choose a pertinent base because this allows students to engage in the area, to relate previous concepts with the new ones –promoting the construction of new knowledge-, and to get a general view of different materials. Some universities offer at least one first level chemistry course, so students have a chemical background when entering into the materials ones. This is specially the case in the metallurgical engineering BS curricula at our School of Chemistry. The authors of this work do not know any book of materials science and engineering that use periodic table as a base. The focus in market labor has evolved from productivity to knowledge. Therefore, the professional competencies now needed are non structured and flexible, which have to be promoted in school. This work describes the procedure follow by students to discover how the periodic table can be used as a tool in materials world. The objective is to order advanced or traditional materials establishing relationships between the elements of their compounds or substances, and the groups of the periodic table and not only show the information. The result is new drawings of the periodic table; some of them will be presented. The main goal is to search in students a higher level of knowledge, attitudes, abilities, skills and talents which form competencies.
It is well known that many materials inside buildings contribute to poor indoor air quality. Virtually all plastics, composite building materials such as particleboard, and many coatings and finishes release volatile organic compounds (VOCs) such as formaldehyde and toluene. Many of these VOCs have been linked to respiratory ailments, nervous—system degradation, and even cancer. This is a MATERIAL—based problem. Architects may specify so—called green products in lieu of traditional finishes, but the reach of the architect to reduce the introduction of toxins into an environment is limited. Furnishings, office equipment, and even many office supplies such as markers and rubber bands will be present in the office environment for the foreseeable future. Therefore, it is not enough for designers to simply limit the introduction of harmful materials to a space, but they should also be providing materials that remediate toxins long-term.
In the context of a graduate seminar, the problem of indoor air quality and the responsibility of the architect was posed. Research covered a wide range of existing or developing technologies including enzymes anchored into paint with carbon nanotubes as a method of destroying harmful bacteria1, filtration and digestion of airborne toxins by plant—based microbes2, and of course the usual industrial hygiene methods of filtration using adsorption materials, gravitational separators, and air scrubbers3.
While this survey of existing technologies proved useful, an additional material solution was posited. There are many materials that are naturally antibacterial, antifungal, and decay resistant. Many of these materials have been used in historically in architectural applications such as cedar wood. The proposal is to further study these materials (cedar, black walnut, eucalyptus, activated carbon, and zeolite) for their inherent properties that lead to the anti— toxin behavior. In the case of the woods, there have been a number of identified compounds that are thought to lead to the material behavior, such as cedrines4. In the case of the adsorption materials, the behavior can be attributed to the materials fundamental structure. This poster not only gives an overview of the research, but asks the question: Can these properties by harnessed or mimicked in architecturally applicable materials to actually improve indoor air quality? The hope of this poster is that a connection to other researchers in this field can be made and that this topic can be further pursued.
Wolverton, B.C. How to Grow Fresh Air: 50 Houseplants that Purify Your Home or Office, Penguin, 1996.
Vincent, J.H. Aerosol Science for Industrial Hygienists. Elsevier Science Incorporated, 1995.
Johnston, W.H. et all, Antimicrobial activity of some Pacific Northwest woods against anaerobic bacterial and yeast, Phytotherapy Research, Vol. 15/7, 2001. | 2019-04-20T22:14:23Z | http://materials-education.com/2012/na/posters.htm |
Acadian Genealogy Homepage; Three Acadian expulsions from Nova Scotia!
Home of Acadian, Cajun and French-Canadian Family Surnames, Genealogy CDS, Family Crests and Historical Information resources, since 1991. Linking the future to the past........... one name at a time!
Since the Acadians who lived in the Cape Sable region, which comprised before their Expulsion the counties of Shelburne and Yarmouth, were not sent into exile in 1755 with those of Port Royal and of Grand Pré, some people are under the impression that they were never expelled. The fact is that there were three Expulsions in the Cape Sable region, one in 1756, one in 1758, and one in 1759.
It is a fact, though, that these Acadians were not molested in 1755. A certain number of Acadians from Port Royal and the Minas region, having heard that these Acadians had been left alone, came down through the forest to take refuge in what they thought might be a safe haven. But they were wrong.
In reality, Lieutenant Governor Lawrence did not know at first that there were Acadians in this region. But on April 9, 1756, he wrote to Preble, commanding officer of a batallion from New England who had come to give a helping hand to Lawrence in his plan to expel the Acadians, telling him that he had learned that there were still some Acadians in southern Nova Scotia. He was asking him to take them to Boston, after burning and destroying all their buildings and confiscating all their belongings and domestic animals.
Preble left Halifax, accompanied by several vessels. He arrived at Port La Tour in the evening of April 21. As the Acadian establishments were on the other side of the Baccaro Peninsula, all along Barrington Bay and Barrington Passage--Villagedale, Barrington, Sherose Island, Doctor's Cove, Shag Harbour--he had to cross the peninsula to get to them. April 24, on board The Vulture, he writes to Lawrence, telling him that, after a tiresome voyage, he arrived at Port La Tour on the 21st and disembarked 167 soldiers. At night, they crossed the peninsula on foot and surprised the Acadians in their bed. They set fire to 44 buildings. Then they walked the prisoners to the several vessels which were awaiting them at "Baccaro Passage." They were 72 in all.
The vessels arrived in Boston between April 28th and April 30th. Lawrence had entrusted Preble with a letter for Shirley, Governor of Massachusetts, telling him that if he did not want to accept these Acadians, to send them to North Carolina. But Shirley thought that he could not accept more French Neutrals, as they were called, than those that were already in his territory. So a vessel was hired to take these Cape Sable Acadians to North Carolina. The captain of this transport was to deliver a letter to the Governor of North Carolina telling him that, if he did not want to accept them, to tell the captain of the vessel what to do with them.
The vessel was supposed to leave on May 11. All that time, since their arrival, these Acadians had lived on the vesssel or on the wharf. After they were embarked in the vessel which was to take them to North Carolina, they heard the captain giving orders to cast off and learned only then of their destination. Right there and then, "a Great Dessension" rose among the Acadians, who forced their way on the wharf with their luggage. They said they would rather die on the wharf of Boston than go to North Carolina. At the same time, they sent a letter to the Governor of Massachusetts and his Council, telling them that to send them to North Carolina was to condemn them to death, as there, they would not be able to do what they were accustomed to do for a living, that is fishing. In Massachusetts, they would be able to work for their living.
May 14, Thomas Hancock, who had been appointed to furnish with supplies the British troops in Nova Scotia, intervened in their favor, asking the Governor and his council to allow them to stay fourteen more days at his own expense. If after that time it was to be decided that they should go, he, himself, would hire a vessel and would see to it that their demand would be fulfilled.
May 27, Thomas Hancock told the Governor and his Council that he was ready to hire a vessel to take those Acadians to North Carolina, while giving a sad picture to their state, even pleading to let them stay in Massachusetts. A committee was appointed to study this matter. They gave their answer the very next day, May 28; they proposed that they should be placed all along the coast, between Plymouth and Gloucester. This was met with the approval of the Governor and his Council.
This is one of the rare occasions when the Government showed itself sympathetic to the Acadians. I want to note, though, that it is a fact that the Acadians had little to complain with regard to the Government of Massachusetts, except for the orders that oftentimes was given to separate from one another the members of the same family. But, with regard to the people under whose supervision the were placed, too often it was another story.
Thanks to the Massachusetts Archives, which contain about two thousand documents relating to the Acadians in exile in that State, we can follow very accurately the places where each and everyone was during their stay in Massachusetts, their way of life, their demands, their frustrations, their sufferings, their sicknesses, and we know who were those who could not make it and departed for a better world.
They were to stay in Massachusetts, some till 1766, others till 1775, at the eve of the American Revolution. In a subsequent article, I will let you know how the ancestors of today's Acadians of Yarmouth County made their return.
Although the raid of 1758 in the Cape Sable region, which lead to the second Expulsion, brought into exile less Acadians than the two others, that of 1756 and that of 1759, nevertheless it was of the three the most devastating, the most widespread, the one which also lasted the longest, when from the middle of September to the end of October it brought destruction from Pubnico to Chegoggin, plundering all that could be destroyed and reducing to ashes all that could be burned.
After the Acadians living in what is now Shelburne County had been taken into exile in 1756, Lawrence learned that there were still other Acadians in what is now Yarmouth County. In fact, they were established in Upper East Pubnico, along the Argyle River, including Robert's Island, in Chebogue and in Chegoggin.
This raid was under the direction of Major Roger Morris, captain of the 35th regiment of the British forces in North America, who was acting under the command of Colonel Monckton, Lieutenant- Governor of Nova Scotia. Morris left Halifax on September 11 for Cape Sable, with 325 soldiers. His Fleet consisted of two men-of-war, to which were joined on their way a transport ship and a pilot ship. They came to anchor at the mouth of the Argyle River in the evening of the 15th. Right away, Captain Gorham left with 40 to 50 rangers to explore the region. He came back the next morning, having found fields of potatoes and of tobacco, but no trace of the Acadians. They proceeded towards Frost Corner, where they found other fields which had been worked very recently.
Next day, the 17th, Captain Watmough took through the woods towards Pubnico. Having noticed an agglomeration of houses on the east side of the harbour, he came right back to tell Morris about it. Morris, after destroying the gardens where he was, left Frost Corner, and at noon, September 20th he anchored his Fleet smack in the middle of Pubnico Harbour.
Immediately after disembarking, they started to follow the trail that they had found of the Acadians, leading to Pubnico Head and about five miles further in the woods, till they lost their trace. Not being able to find the Acadians, Morris sent a hundred men on the west side of the harbour where they had spotted two houses on the elevation where is located the Old Cemetery. They burned those houses and ravaged the gardens adjoining them. This was taking place of Friday, the 22nd. Next day, they proceeded to pillage the village in East Pubnico and to ransack all the buildings, including the Church, the priest's rectory and the Manor House of the d'Entremont family, all being located north of Hipson's Brook, also all the other houses, barns and sheds. After devastating all the cultivated gardens, Morris embarked most of his men, leaving to Gorham the task to set everything of fire. By 11 o'clock that morning, all had been consumed.
Morris would have liked to depart right away, but a gale of hurricane force retarded his departure till the following Saturday, Sept. 30, when he headed for Schooner Passage and Chebogue Point. Right away Gorham was sent to explore the Acadian settlement at Chebogue. The next day, which was a Sunday, he reported to Morris what he had seen, and left the same day for more explorations, taking enough provisions for four days. He was accompanied by 20 rangers, who were joined on Monday by 72 more. Wednesday, Oct.4, Gorham came back and gave to Morris the following account: Nine houses with chimneys were burned, plus one Mass House, nine barns and sheds and six haystacks; were taken or destroyed twelve sheep, about fifty bushels of potatoes and turnips. He added that they had found human and animal traces up the river, which were still fresh.
This being done, Morris kept on with his Fleet and entered Yarmouth harbour. This was Sunday, Oct. 8. Gorham, with two whale-boats kept on sailing up the river till he arrived at the Acadian settlement of Chegoggin, that he discovered by chance. That Sunday afternoon, he surprised Father Desenclaves in church with his congregation, consisting of nine families, comprising 61 persons in all. The church stood on top of a beautiful knoll, west of the river, facing the site of the old gold-crusher which used to be on the other side of the road. A mother with six children joined them, making a total of 69 persons. Gorham learned from father Desenclaves that there were still 21 Acadian families and six Indian families up the Tusket River. After confiscating all the arms that he could find, Gorham locked the chapel with all the Acadians in it. He sent immediately a message to Morris, asking for help. It took about all week to pick up the vegetables from the field and gather the domestic animals.
In the meantime, Father Desenclaves, to avoid the wrath of the oppressors, felt that he had to reveal where stood "The Tusket Village," as it is called in documents, which was located about 15 miles in the interior, north of and at the head of Lake Vaughan, somewhat downstream at the small bridge which spans Reynard's Falls. This is where Father Desenclaves himself resided. They took him with them by boat. After searching all around and not finding the Acadians, they razed everything, leaving but ashes and dust.
It was not before the 28th which was a Sunday, that the embarkation took place, but it was only for the women and their children, because their husbands and their sons had been kept by Morris to help him "finish the job" at their settlement. A detachment was to stay to ravage all that was "acadian" in the region. It was reported that several "uncommonly large fires" could be seen from Annapolis on November 17, supposedly to have been "occasioned by parties from Cape Sable detachment, who were burning settlements and clearing the country."
Tuesday, Oct, 31, the Fleet left Yarmouth Harbour with its cargo of 68 Acadians, with Father Desenclaves. They were confined in Halifax till the beginning of the following year, when they were sent to France, where those who had survived arrived February 16.
We saw in last week's sketch that Father Desenclave had told Captain Gorham that there were 21 Acadian families up the Tusket River, whom Gorham was not able to apprehend. He told Major Morris that there were 130 Acadians in all. We do not know if we're [sic for were] included in this number, the Acadians from the settlement of Pubnico, of Argyle and of Chebogue. If so, it was surely not all of them, if we judge by the number of Acadians who were of this third Expulsion.
Gorham, in October, 1758, had sent an Acadian with a letter addressed to those who were hiding in the woods, whom he summoned to give themselves up. On their part, they sent him a letter, telling him that they had written to the Governor of Massachusetts to see to it that they would be able to stay on their lands or at least to accept them in his territory.
We have a copy of this letter of the Acadians, which is in English. It is dated from "Cape Sables, September 15th, 1758", and addressed "To His Excellency Thomas Pownall, esq. and Honourable Council in Boston". Here are a few excerpts... "If it might please your Excellency and worthy Council to settle us here in this land where we now live we shall ever hold our bounded duty to love and honour you with our last Breath, and ... we are heartily willing to do whatever you require ... also willing to support and maintain the War against the King of France ... We are in all about 40 families which consist of about 150 souls ... We beg that if we may no longer stay here that we may be received into New England to live as the other Neutral French do for we had all rather die here than go to any French Dominions to live." It is signed Joseph Landrey.
The previous Winter had been exceptionally long and severe. These Acadians were not able to face again such a Winter in the woods; that is why they were ready to do anything to avoid another harsh Winter, anything except to fall into the claws of Lawrence, who was regarded by the Acadians as a heartless tyrant.
The letter was given to Mark Haskell, a merchant who was dealing with the Acadians of Cape Sable. He was to convey it to the Governor of Massachusetts. No doubt that the letter had been written by Haskell himself, as he says: "The foregoing is what I received from the mouths of Joseph Landrey and Charles Dantermong, two of the principal men of Cape Sables."
Pownall was very sympathetic to the plea of the Acadians. He would have wanted to send someone right away to get them. But his Council was of another opinion. Their argument was that these Acadians were "enemies of the Crown." In reality, having lived for 45 years under British rule, they were British citizens of Nova Scotia. But since they had pledged to stay neutral in case of war (notwithstanding what is said in this letter) and being of French extraction, they were considered to be more partisans of France than English subjects. Moreover, England and France were at war since May 17, 1756, the Seven Year War. Thus Massachusetts could not give shelter to these "enemies."
As a consequence to these deliberations, the Council found the Good Samaritan Mark Haskell guilty of dealing with the enemy. He was thrown in prison for his good deed.
Pownall, on his part, had only one thing to do, send the Acadian letter to Lawrence, which he did, although reluctantly. January 2nd, 1759, he writes: "For the case of the poor people of Cape Sables it seems very distressful and worthy any relief can be afforded them. If Policy could acquiesce in any measure for their relief, Humanity loudly calls for it."
All that time, the Acadians were to spend an atrocious Winter in the woods, when some of them were to die of hunger, of cold and even of grief. Receiving no answer to their plea, they became desperate, so much so that, notwithstanding how much they dread to give themselves up to Lawrence, they sent at the beginning of Spring a few of their companions to Halifax with the offer to put themselves in the hands of the British authorities.
Lawrence, realizing that there was no escape for them, was not in a hurry to go to get them. It was only at the beginning of Summer that he asked Major Erasmus Philips, who was in Annapolis, to take those "Lands ruffians, turned pirates" to Halifax. The task of picking them up was entrusted to Captain Gorham, the same one that we saw last week who apprehended most of the Acadians who were sent into exile in France in the Fall of 1759. He arrived in Halifax with them on June 29th; they were 152 in all.
They were placed on George Island, in Halifax Harbour, where there were already six Acadian prisoners from the St. John River. Here, where they were to stay till November, they had much to suffer, sleeping "under the stars", most of them not having anything to cover themselves, their clothes having been taken away from them. Eight died on the island; there was one birth.
They were scheduled to be shipped to England November 3rd. They had already boarded the "Mary the Fourth", when, that same evening, rose one of the worst storms ever to hit the coast of Nova Scotia. The departure was postponed till the 10th. They arrived in England seven weeks later, on December 29th. Finally, they disembarked in Cherbourg, France, on January 14 (1760). Four had died during the crossing.
We still have eight letters, originals, written between this date and 1775 from Cherbourg by members of the d'Entremont family to their very close relatives who returned to Pubnico. Even a hundred years ago, some people from Pubnico were still corresponding with descendants in France of these exiled Acadians.
At the time of the Expulsion of the Acadians, there have been two escapes from two forts located each side of the Missaguash River, which makes the boundary between nova Scotia and New Brunswick. One was from Fort Lawrence, located in Nova Scotia, on route 104 or the Trans Canada Highway, four kilometers west of the limit of the town of Amherst. The other was from Fort Beausejour (which was called later Fort Cumberland), in New Brunswick, just south of the Trans Canada Highway, two kilometers from the border. The escape from Fort Lawrence took place during the night between the 1st and 2nd of October, 1755, while that from Fort Beausejour took place during the night between the 26th and the 27th of February, 1756.
The account of the escape from Fort Lawrence comes mainly from one of the grandsons of one of the prisoners, who heard it from his grandfather.
July 23 1755, Charles Lawrence, governor of Nova Scotia, sent secretly a message to all the military posts in the Province that it had been decided to do away with the Acadians by embarking them in vessels and sending them abroad, mainly on the coast of what is now the United States.
A couple of weeks later, all the men living in the vicinity of Amherst were summoned to gather at Fort Beausejour, to discuss matters relating to the Oath of Allegiance to the Sovereign of England. On the 11 of August, 250 Acadians arrived at the fort, all men, and were immediately incarcerated. As they were too numerous to be held in one fort, the majority were sent the same day to Fort Lawrence. The following weeks, other Acadians were apprehended, and it kept on up to the month of October. This is, in fact, what we read in Dr. John Thomas' diary, which he kept at the time. On August 11, he writes: "Colonel Muncton got 250 of the inhabitants into Fort Cumberland and confined them Major Bourn with 150 men guarding the greater part of them to Fort Lawrence where they are confined."
After much debate, the wives and relatives of the captives were allowed in groups to visit them, now and then. In doing so, they were able to conceal different objects which they thought would be useful to the prisoners. Tradition tells us that some brought women clothes so that some of the prisoners, under a feminine disguise, would be able to walk out of prison with them. And sure enough, some were able to deceive the guards and make their escape. But it happened that one of these escapees was limping. The guard who had let the women in, recalling that none of the women who had gone in were limping, became suspicious; the trickery was easily discovered. From then on, nobody was allowed to visit the prisoners.
If the officers of the fort were frustrated for having been duped by this strategem, they were to be much more baffled by what was to take place a short time later. One morning, one of the guards making his rounds, went down to the cellar where the prisoners were kept, and what was his surprise when he found the cellar completely empty. How could all those prisoners, 86 of them, escape without being noticed by the sentry? It was, for a while, a complete mystery. Finally, a hole was discovered in the ground which ran under the walls of the fort. It was figured that the prisoners were there hiding in it. The officers sent one of their men in the hole to investigate. He entered the hole with great difficulty, as it was narrow. He could only go a few feet, when he felt that he was caught, no doubt still wearing his heavy uniform surrounded and squeezed by dirt. The story goes that, even though those who stood by did what they could to pull him out, he suffocated and died.
What really happened is this. A woman or several of them, while visiting their husbands, hid small instruments, like knives and spoons, in the loaves of bread that they were bringing them. With these small rudimental "implements," the prisoners started to dig a hole in the ground. They kept on unceasingly, no doubt day and night, each taking his turn, being notified by others when the guard was approaching to make his rounds, till finally after weeks, no doubt, they reached the ground outside the walls of the fort. The dirt that they dug out was concealed under their beds.
When all the work had been completed, they chose a very stormy night to make their escape; it was the night between the 1st and 2nd of October. Dr. John Thomas wrote in his diary October First: "Stormy dark night eighty six French prisoners dugg under ye wall att Foart Lawrence and got clear undiscovered by ye Centry..."
The smaller ones of the crowd went first through the tunnel, each of them rubbing off some of the dirt and making the passage a little larger. It must have taken most of the night for everyone to get out. According to tradition, the last one to leave the cellar or prison was an Acadian named Réné Richard. He told the story to his grandson, Joseph L. LeBlanc, of Memramcook, many times. This story, that I read in Placide Gaudet's papers, the eminent Acadian genealogist, Gaudet got it directly from this grandson.
No doubt that these poor Acadians ran to hide themselves in the woods. But finally, they were to be caught again; some even, in despair, rendered themselves to the English authorities, so not to die of hunger or freeze to death. We have the names of most of these prisoners and we know where they settled after the Expulsion, most of them in New Brunswick.
Click here for details of the escape of 80 Acadians, from Fort Beausejour.
We know that at the time of the Expulsion of the Acadians, many of them took to the woods. Some were caught in their flight; others succeeded in reaching "Canada" (Québec). Among the accounts that have come down to us, there is one which tells us of the flight through the forest of some ten families of Belliveaus, Gaudets, Bourques, etc., who, after struggling a whole year in the woods, finally reached the St. Lawrence River. We owe this account to an old Belliveau grandmother who, many years after, related to her grandchildren this flight, with many details.
Around the end of the summer, 1755, when they learned that they were to be embarked on ships and sent to some far away places, these families took to the woods. It could be that, after spending a harsh winter they decided to try to reach Québec. They figured that by following the Indians, they would be able to do so. But the Indians did not venture far from the coast. Moreover, the Indians, while the men were out hunting for food, were somewhat impertinent towards the Acadian families. That is when they separated from them and tried their luck through the forest without their guidance.
Among them were old people, pregnant women, small children and even babies, without counting those who were cripple. Women carried their younger children on their shoulders, men carrried the luggage, cleared the way from shrubs and thickets, explored the premises, avoided swamps, did some hunting and fishing, and, as the sun went down, prepared the encampment for the night. The march was very slow. Many times they had to build, with an axe and knives, a rudimental emergency raft to cross the many rivers that they met.
Hunting was done with bow and arrow, becuase they did not have any firearms; they set traps also. They managed to fashion hooks for their fishing lines. They fed on all kinds of wild animals that they would catch, beavers, partridges, fish, etc. In summer, they ate also herbs and berries.
In the morning and in the evening, when the birds announced the dawn of day or when the evening twilight started to overshadow the surroundings, all knelt for the morning or evening prayers, commending themselves to Almighty God for a peaceful night or for a safe journey during the day ahead.
It is a miracle that they were able to journey on, after weeks and weeks, surrounded by perils at all times, without real harmful occurences, although they were pressed continuously by poignant anxieties.
It seems that they had undertaken their journey late in spring or early in summer. In October, not having yet reached the St. Lawrence River, they started to worry, wondering if they would have to spend another winter in the forest. The days were getting shorter, and finally the snow started to fall. What were they to do? Encouraged by those who were stronger, more ambitious, more resolute, they kept on, taking a day at a time, and that until close to the end of October.
Finally, "three days before All Saints' Day" (October 29) they arrived at Cacouna, just below Rivière-du-Loup, about more dead than alive, but grateful for having reached at last wide open spaces, and civilization. They were to winter here.
In the spring they were again on the move, when they started to row up the river, towards Montreal. Finally they reached St. Gregoire, fifteen miles south-east of Monteal. They might have heard that there were already there some Acadians of the Dispersion, maybe some of their relatives.
Mrs. Belliveau, from whom we hold this story was not in the group who had made this journey, but she had gotten all the details of the flight from her neighbours, at St. Gregoire, whom she had herself joined after having been sent into exile in one of the southern colonies, along the Atlantic coast, where she lost her husband. After some time, she was able to reach Boston and join another caravan who also journeyed towards Montreal. Luckily enough, she found here some of the husband's relatives. Some years later, her children and grandchilden whom she had not seen for a long time, joined her. They are the ones who jotted down her account for posterity. She "died in their midst" of a ripe old age.
Friday, September 5, 1755, the Acadians were taken into custody by the British under Lieutenant Colonel John Winslow.
Saturday - September 6, 1755 The LEOPARD - Captain Thomas Church arrives at Minas Basin.
Friday - September 19, 1755 - 230 prisoners had embarked and 300 or more returned from Halifax and were placed aboard ships. The whole population of Minas, about 2,000 (excluding Cobequit and Piziquid) was under armed force of 363 men. The wives and mothers of the captives were allowed to go aboard the ships to bring food.
Saturday - October 11, 1755 - The transports were made ready and during the months of October and November, in the midst of mass hysteria and Francophobia that followed the defeat of Braddock and the prejudicial reporting of the Maryland Gazette, and when the excitement was on the increase and the minds of the peolple of Maryland were occupied with these real or imaginary dangers, that were supposed to be so near at hand, the sailing of the ships of the expulsion began the operation of expelling some 913 Acadians to Maryland.
Monday - October 13, 1755 - The sailing orders for the Leopold were givin to Captain Thomas Church by John Winslow. The same orders were given to Captain Milbury of the Elizabeth.
"I am at this moment embarking the people on board two sloops: the "Three Friends" and the "Dolphin" and had I vessels they should all go on board tomorrow. The third Sloop you said you would send me has not yet arrived. I earnestly entreat you to send her with all dispatch. The season advances and the weather is bad, as for Davis, he is gone away without my knowledge by which means I can do nothing. I am afraid the Governor will think us dilatory. My people are all ready and if you think I may venture to put the inhabitants on board "Davis" I will do it. Even then, with the three sloops and his scooner they will be stowed in bulk."
Thursday - October 16, 1755 - Captain Murray further states: "Two days later, on October 16, 1755, the other transport "Ranger" arrived (in Pisiquid).
Note: The above dates will have to be checked out. Earlier reports have the ships being loaded on October 27, 1755 and embarking on October 28, 1755.
Monday - October 27, 1755 - 493 Acadians from the parishes of St. Famille and L'Assomption in Pisiguit - and 420 Acadians from the parishes of St. Charles in Grand Pre and Riviere-Aux-Canards and St. Joseph in Grand Pre (for a total of 913 Acadians) boarded six ships, with orders that two persons per ton burden were to be placed on the transports, and sailed for Maryland. Among them were the Ranger, (90 tons burden, Francis Peirey, master) with about 323 (or 263), 83 over her compliment aboard, and the Dolphin (87 tons burden, Zebad Farman, master) with 227 (or 230), 56 over her compliment aboard. These two ships embarked from Pisiguit, under the direction of Captain Alexander Murray.
The embarkation began on Wednesday October 8, 1755 and continued until Tuesday the 28th of October, 1755. In order to hasten the undertaking, the ships were overloaded and to make room for even more, the Acadians were forced to leave practically all of their goods on shore, where they were found still lying on the shore by the English settlers who came six years later.
The livestock throughout the Minas, which were estimated at over 118,000, were left to roam aimlessly in the fields, but were later dispersed amongst the New England settlers, who had been referred to earlier as "proper British subjects". Many other homes and structures were burned later, leaving no trace of the 75 years of Acadian occupation in the area.
On Tuesday December 9, 1755 the inhabitants of Port Royal and the remaining 900 from Grand Pre were deported.
Saturday - December 13, 1755 - In Grand Pre, there were some Adacians deported on the scooner DOVE and about 200 on the Brigantine SWALLOW.
Saturday December 20 - 120 Acadians were deported on the scooner RACEHORSE and 112 on the scooner Ranger, for a total of 732 that were embarked on the wintry nights of December, 1755 from Grand Pre.
Virginia refused to accept the 1,150 Acadians that were sent to them, so they were sent to England.
Thursday April 23, 1756 "An Act to impower the Justices of the several County Courts to make provisions for the late inhabitants of Nova Scotia, and for regulating their conduct". The Acadians had regarded themselves as prisoners of war and were entitled to be supported as such, but the authorities would not accept this because it would be their responsibility to care for them. With this Act, except for those unable to because of infirmity, to be supported by themselves and labor for their own support, or be compelled to do so and, the children of those who were unable to support their children, were bonded out to those who could or would support them. Likewise the orphans were also bounded out. The Acadians were also ordered to render an exact list of their men, boys and girls and were not allowed to wander more than ten miles from their abode, or out of the county where they resided without a pass from the Priovincial or County Magistrate describing the person, residence and time and place of destination.
Thursday May 14, 1756 - In Acadia, Lawrence set up a bounty of 30 pounds sterling for each male scalp over 16, and 25 for younger males or women and children. Although this was ostensibly limited to Indians, in practice, the English paid the bounties without inquiring into the race of the original owners of the scalps.
Wednesday May 27, 1756 - The Acadians were quartered virtually as prisoners, not to leave town without a written permit of the selectmen under penalty of five days in prison or ten lashes. they depended on the cold hand of the public for food clothes and lodging and were given some provisions. (27 May 1756, Proceedings and Acts of the General Assembly of Maryland -[Baltimore, 1930] 24: 542 ff. - also Sollers "The Acadians (French Neutrals) Transported to Maryland" - Maryland Historical Magazine 3 (1907): 18. | 2019-04-19T09:27:41Z | https://www.acadian.org/expulsions.html |
When do you want me to start? prilosec online purchase Protesters of the Keystone XL pipeline, a proposed pipeline that would carry tar sands oil from Canada to the Gulf of Mexico, lined up at the intersection of Lincoln Way and Welch Avenue on Saturday, Sept. 21.
nolvadex buy uk The benchmark seven-day repo contract, which hadbeen steadily sliding since Oct. 9, spiked in the morningsession, a day after a policy adviser to the People's Bank ofChina (PBOC) told Reuters that the authority may tighten cashconditions in the financial system to address inflation risks.
pentoxifylline (trental) is a medication used for which of the following Doyle said the auction house was contacted by the seller, whose identity is being kept confidential. Doyle added that the sale had been cleared by the owner of the gas station, who had the section of the wall displaying the artwork removed.
tamoxifeno 20 mg tabletas Whether the shutdown represents another bump in the road fora Congress increasingly plagued by dysfunction or is a sign of amore alarming breakdown in the political process could bedetermined by the reaction among voters and on Wall Street.
abilify coupon 2015 "The market is certainly estimating a fairly large cut inproduction for soybeans and the question is what the USDA isgoing to do to demand on the balance sheet," said Brett Cooper,senior markets manager at INTL FCStone Australia.
Pleased to meet you buy imigran online uk In rural West Plains, Mo., under a plan approved last spring, a limited number of teachers and staff are being allowed to carry concealed weapons in the school. "I wouldn't say it would be a good blanket solution" for all schools, Superintendent Vic Williams says. But it works in West Plains, he says, where many residents are game hunters and "have a background in handling guns."
garnier acne fight cost And the more you listen to Christine Quinn talk about an inspector general, and Bill de Blasio talk about Kelly’s “overheated rhetoric” about stop-and-frisk, and Anthony Weiner, that blowhard, talk about stop-and-frisk as a “racial tool,” the more you think that if a Democrat is the next mayor, Kelly is gone, even if Quinn is on record saying she wants him to stay.
buy imitrex online uk This hands-on approach to learning benefits those with an entrepreneurial spirit, as well as generalists who enjoy working in groups and want to learn how to get things done. Unlike the lecture and case methods, which focus on theory, experiential learning encourages students to learn by doing.
best drugstore waterproof mascara allure Hunter was bashed in the media in 2012 for her memoir "What Really Happened," when she discussed the details of hooking up with Edwards, expressing no remorse for the extramarital dalliance and showing nothing but disdain for Edwards' late wife, Elizabeth.
superdrol cycle pictures The interior ministry said a gun battle broke out after police raided a house where suspected militants were hiding in Sidi Bouzid, 260 km (160 miles) south of the capital. Police found arms, explosives and a car bomb being prepared.
I'm retired levlen 21 weight gain The research also showed that consumers had become less concerned in the last few years about brand names when choosing a tablet, and more interested in price and quality. That may make entering the tablet market more feasible for vendors, but it also means they “need to be more precise” in communicating what sets their tablet apart from others, says Gartner’s research director Annette Jump.
performer 5 price It was unclear Wednesday night how far Republicans might beprepared to go to meet Obama's conditions. Republicans in theHouse have been demanding a variety of conditions - includingchanges to Obama's healthcare law - in return for cooperating onthe debt ceiling and on a funding measure that might reopen thegovernment, which has been partially shut down since Oct. 1.
dulcolax bisacodyl Police reports indicated she died of a prescription drug overdose and that three different kinds were found near her body. The drugs included Olanzapine, which is used for the treatment of schizophrenia and bipolar disorder, Cyclobenzaprine, a muscle relaxant, and Xanax, used for anxiety.
d aspartic acid amazon uk Hohmeister, 49, started his career at Lufthansa almost 30years ago and replaced Franz as the chief of Lufthansa airlineSwiss, which accounted for more than a third of group operatingprofit last year.
can you snort paroxetine to get high He was talking about that last Red Sox series, when the Yanks were coming off three straight wins in Baltimore and were 11 games over .500, still hanging tough in the wild-card race despite a million legitimate alibis. They went to Boston and lost by 15 runs in three games.
Lost credit card what can i buy over the counter that works like nexium The 1930s-era Mediterranean-style estate, which has 10bedrooms, 11 bathrooms and a pool inlaid with 24-karat gold, wasauctioned off as part of a bankruptcy proceeding by its currentowner, telecom magnate Peter Loftin.
order stacker 2 with ephedra The aim appears to be to rob the group of resources it has used to bolster its political wing, which gained popularity by an extensive network of social services and charitable activities — funded largely by business enterprises — that the government has failed to provide, such as medical services.
fluconazole cost uk Health Secretary Jeremy Hunt said he did not want to "turn GPs into border guards" and no-one would be denied emergency treatment, but foreign visitors must make a "fair contribution".
cefixime dosage for dogs overdose However, there are other good reasons to think that the birth of Prince William’s firstborn is imminent. Kate and Will reportedly left her sanctuary in Berkshire for London on Friday. Ensconced in their modest temporary flat at Kensington Palace, the couple are only 10 minutes away by car from St. Mary’s Hospital, Paddington.
elavil for headaches The 15-year-old from Los Gatos, Calif., then tried to do the same to earn more points–recorded on a projected scoreboard–though he’s not sure what he’ll do with them. “Points are good,” he said.
Whereabouts are you from? prosta q free sample Another new feature is dual capture, which simultaneously takes a high resolution 38-megapixel image to set aside for editing, and creates a 5-megapixel picture to share to social networks via Windows Phone 8.
lamisil once single dose treatment for athlete's foot hpv In their final presentations, Madrid made its case as the least-expensive option and Istanbul spoke of the historic opportunity to bring the Olympics to a predominantly Muslim country for the first time.
Would you like a receipt? cheapest way to buy nexium The street battles, which raged into the early hours of Tuesday morning, were the bloodiest since more than 50 Mursi supporters were killed a week ago. The violence overshadows attempts by the authorities to press on with a transition to full civilian rule by naming a new cabinet after the army pushed Mursi, an Islamist, out of power on Июля 3.
viagra pakistan store But if you ask me for one night to remember above and beyond all the others, it was the Октября before that, another Red Sox-Yankee Октября, a rousing Game 7 out of the past for the old Yankee Stadium. The Red Sox were going to win the pennant that night until Grady Little left Pedro Martinez in the game too long.
buy tamoxifen in canada Since taking office in Марта, China's new leaders have said they are prepared to tolerate tamer growth and push a restructuring of the economy toward domestic consumption, but there have been mixed messages on how much of a slowing they would tolerate. The flow of data suggests their task of changing the shape of the massive economy will only get harder.
cost of advil at shoppers drug mart Responding to the study, a spokesman for UK Prime Minister David Cameron said there was "widespread and understandable concern" about benefit tourism and the UK was working with other EU countries to change the rules on access to benefits.
I'm not working at the moment blue diamond x pill But there was no speech and Kennedy's decision gave Sorensen six hours to produce one before the president was to go on the air at 8 p.m. Sorensen huddled in the Cabinet Room drafting with the help of Robert Kennedy and Assistant Attorney General Burke Marshall. Kennedy found the group there at 7 p.m., still working. "C'mon Burke, you must have some ideas," JFK quipped.
paroxetine uk buy Some hospitals have put into place systems and practices that reduce the risk of their surgical patients being readmitted, said Dr. Don Goldmann, chief medical and scientific officer of the Institute for Healthcare Improvement, in Boston.
atenolol buy uk A gift from France, the statue was conceived to symbolize the friendship between the two countries and their shared love of liberty. It was dedicated in 1886 and welcomes about 3.5 million visitors every year.
buy generic celebrex online Conservative lawmakers like Rep. Joe Wilson, R-S.C., took the officials to task, not just for their role in Syria, but for multitudes of foreign affair fumbles that have occurred since President Barack Obama took office, although not on their watches.
I live here levonorgestrel costo colombia QE2 will steam out of Dubai on Октября 18, after which she is expected to reach Singapore on Ноября 1 where she will stay for 3 days before proceeding to Hong Kong for another 3 days and thereafter leave for the selected shipyard in China to complete her transformation, the new owner's said in a statement.
motrin mg over the counter The flood that swept down Boulder Creek was a 1-in-100 year event, the U.S. Geological Survey said Friday. The college town is considered Colorado's 'most at risk' city to flooding because of its proximity to Boulder Creek, which courses through Boulder Canyon into the heart of town, says Weather Underground weather historian Christopher Burt.
order generic paxil The company plans to lessen its reliance on Humira bydeveloping lucrative drugs for other diseases, including oraltreatments for hepatitis C that could be approved by early 2015,and a promising treatment called ABT-199 for various bloodcancers.
cheap skelaxin All 200 House Democrats were invited to the afternoon session at the White House, and Democratic leaders said most made the trek. They said Obama was resolute about not negotiating with Republicans until they drop their demands.
online pharmacy programs canada The Senate's immigration reform proposal, which passed in Июня, would allocate .3 billion more over the next decade to build 700 more miles of border fence and double the number of border patrol agents to nearly 40,000 along the southwest border. The plan would also boost the use of high-tech surveillance technologies like drones and sensors. The Congressional Budget Office estimates that the infrastructure improvements could curb the number of immigrants entering the country illegally by 50 percent.
Could you ask her to call me? ethinyl estradiol levonorgestrel reviews “Engineered ionic systems can achieve a lot of functions that our body has: they can sense, they can conduct a signal, and they can actuate movement. WeГўВЂВ™re really approaching the type of soft machine that biology has to offer,” project co-lead author Christoph Keplinger tells Harvard.
lotrel 5-20mg "It's a great start to the weekend with the Hawks announcing the contract for Q," Toews said. "It's much deserved. I mean he's done a lot of great things for his team since he's been here in Chicago."
online buy prosta-q Some of the world’s biggest banks have been emphasizing their efforts to behave ethically, put clients first, cooperate with regulators and temper risk-taking after reputations were damaged during the credit crisis, government-funded bailouts and a variety of scandals throughout the financial industry.
vasotec 10 mg Individuals are talked into transferring their pensions butare often not told they will face hefty tax and other feespotentially adding up to more than half their savings, accordingto Britain's Pensions Regulator.
trileptal online When inspectors came to examine evidence of the Aug. 21 chemical attack near Damascus, which triggered the latest crisis, they were fired upon, though no one was injured and it was not clear who was responsible for the attack.
tadapox in farmacia "One that keeps Scotland in the United Kingdom and then sets us on the short path to a stronger Scottish Parliament, which is where the majority of Scottish people want to be. The best of both worlds."
neurontin order online Lost in the pope's remarks about gays and female priests was a comment he made about divorced Catholics. Francis raised the possibility that remarried Catholics might be able to receive communion in the future, he said.
cefaclor cd Commissioned for the inaugural tournament in France in 1954 at a cost of eight million Francs, the trophy was used until 1970, when the holders, Australia, put it on display in the Midland Hotel in Bradford.
Sorry, I'm busy at the moment generic terbinafine hydrochloride cream urban Nikon cut its operating profit forecast to 65 billion yen(3 million) for the year to next Марта, down nearlyone-quarter from its forecast issued three months ago of 85billion yen, although this would still be a rise of 27 percentfrom a year ago.
walgreens pharmacy prescription history Chrysler Group LLC was forced to file paperwork for an IPO by its second-biggest shareholder earlier this week, escalating a spat with main owner Fiat which said it could scale back its commitment to the U.S. automaker.
where can i buy trileptal While big brands such as Toyota and AT&T advertise on Facebook, the company also makes money from marketers of weight-loss and teeth-whitening products. Analysts say some users may not welcome these less-glamorous pitches in their newsfeed.
superdrol clones 2013 Europe, Middle East and Africa was the worst hit region, with a 13.7 percent decline in PC sales, followed by Asia Pacific with an 11.2 percent decline. The U.S. market increased 3.5 percent, helped by low inventories being re-stocked and the popularity of models featuring the latest Intel chips, Gartner said.
this post is fantastic metaxalone overdose amount Bryan Cranston has already said that the ending of the show will be "very satisfying to Breaking Bad fans. It’s unapologetic, it’s very Breaking Bad". Aaron Paul, who plays White's sometime-junkie business partner Jesse, said that he "couldn't be happier with the way it ended".
5 permethrin The U.S. State Department repeated its call on Russia to send Snowden to the United States, saying granting the American fugitive asylum would "raise concerns" and criticizing Moscow for giving a "propaganda platform".
buy paxil uk BofA/ML also notes good news on the earnings fronts in many of these markets. Earnings growth estimates for this year have risen sharply almost everywhere to 10-15 percent (versus the 9.8 percent average in emerging markets). Some markets such as the UAE and Saudi have seen earnings upgraded by around 500 basis points for this year.
dominos artane order online JOHANNESBURG (AP) -- The South African government says former leader Nelson Mandela remains in critical but stable condition in hospital, though "medical interventions" are required because his health sometimes becomes unstable.
imitrex dosage for cluster headaches Industry experts say the GSK case shows the hazards facingpharmaceutical companies in China, where a culture of givinggifts is deep-rooted and doctors rely on payments forprescribing drugs to supplement their meagre incomes.
I've got a part-time job can you still get prescription accutane pcos The ruling doesn't mean that Google didn't bypass Safari's privacy settings and track user activity even when they explicitly blocked tracking because that's exactly what happened. What it means is that the plaintiffs couldn't prove they were actually harmed by Google's actions. The end result, however, is the same: Google now knows it can surreptitiously track consumer's online activity without fear of serious repercussions, and that's a big blow to online privacy.
buy cheap accutane uk That process now appears to be unwinding, as the long-term cost of borrowing rises on speculation that the US Federal Reserve is preparing to curtail its monetary stimulus programme, perhaps as soon as next month.
when will generic strattera be available in the us The gas is properly used to numb pain, for instance by dentists, and in some aerosol cans such as whipped cream. But at festivals and pop concerts it has become increasingly to inhale it from balloons.
cheapest place to buy doxycycline in uk The "Two and a Half Men" star plays Steve Jobs, the Apple co-founder and CEO who had a big hand in revolutionizing the tech industry. The film is set mostly during Apple's early days when Jobs convinced fellow co-founder Steve Wozniak (Josh Gad) to believe in his vision.
artane 5 mg price The U.S. Circuit Court of Appeals for the Fifth Circuitruling reinstates the government's civil claim against KBR inconnection with employees' alleged violations of theAnti-Kickback Act, a law that bars government contractors andsubcontractors from using bribes to influence awards.
No, I'm not particularly sporty clomipramine buy online uk Globally, mobile game revenues generated through Apple iOSand Google Playstore are expected to exceed billion thisyear, according to Adam Krejcik at technology and gamingresearch firm Eilers Research in California.
levitra afqs "Although the Fed tapering has been priced in already by thegold market, that is not to say that you won't be getting a bitof a wobble as of when it is announced," Rhona O'Connell, headof metals research and forecasting said.
diflucan to buy Kershaw got a break in the second inning when Gattis ran from first to second on a fly to right and Puig doubled him off first. Kershaw worked around a leadoff walk in the third and struck out Andrelton Simmons with two on to end the fourth.
how much does hydrochlorothiazide cost The Liverpool athlete is just 42 points behind third-placed Dafne Schippers, of Holland, and 31 behind fourth-placed Frenchwoman Antoinette Nana Djimou but is considerably quicker than either of them over 800m.
Thanks for calling average cost of flomax Air Bagan, one of the biggest domestic airlines, has not been profitable since the 2006-2007 financial year and faces pressure both from sanctions and the growth of new players, deputy managing director Sao Thanda Noi told Reuters.
male enhancement pills at 7-11 Here’s a good example: what percentage of students come out of Econ 101 knowing that every nation that successfully industrialized did so under a protectionist regime – including the USA ?
what prescription drugs interact with grapefruit It remains to be seen if Dell can build its storage,networking and software portfolios to vie with Hewlett PackardCo and others. Some analysts think it may be too late,since a large swathe of the corporate market has been locked upby IBM and HP.
cefixime 200 mg price in india pdf Grocery retailer Whole Foods said this year it would require suppliers to label any product made with genetically modified ingredients. And the Natural Products Association, which represents 1,900 food industry players, has called for a uniform national standard for GMO labeling.
zyprexa que es Warner Bros., a unit of Time Warner Inc, showcased a number of upcoming films on Saturday at Comic-Con, including "Seventh Son," "300: Rise of an Empire," "Godzilla" and "The Lego Movie," which will bring together Superman and Batman in animated Lego form.
One moment, please can i buy omeprazole from boots "What we are talking about is a reduction in uncertainty - we find we haven't changed the number enormously compared to AR4 (IPCC 2007 report)," said Prof David Vaughan, from the British Antarctic Survey (Bas), while speaking at the launch of the report.
micardis costo en mexico Still, just how sensitive East Antarctic ice is to warming temperatures remains the looming question, he adds. "The temporal resolution of the record does not allow them to conclude—or exclude—that the [ice] retreat occurred on centennial or millennial timescales."
aldactone 50 mg information comprar In the United States, 44 percent of books - paperback or electronic - was purchased online in 2012, up from 39 percent in 2011, according to data from service provider Bowker. In Britain, the picture is pretty much the same.
A Second Class stamp obagi tretinoin cream usp 0.05 20g/0.68oz And, as if further to deny his reputation as a “hawk”, Mr Weale insists that further quantitative easing remains very much a tool at the Bank of England’s disposal. He admits that he was sceptical about whether the first round of QE had been as effective as claimed, and he agrees there have been some negative consequences. Even so, more QE must remain an option should the economy need further support beyond the “forward guidance” just offered, he insists.
7 dfbx instructions Alfonso Soriano swatted a three-run homer as he continued to swing the hottest bat in baseball, while Mark Reynolds also went deep in his first game with the Bombers. The long- balls helped build an early seven-run lead that took the crowd out of the game.
vitamin b12 mangel nexium GPS is great for getting us to unknown destinations, and now scientists have figured out a new use for this multipurpose tool. When used in the eye of a hurricane, GPS receivers can collect valuable information about the storm’s behavior.
aldactone 25 mg acne dosis With slowing economies in mature markets like Europe, Chinais seen as a bright spot for wireless growth, especially withChina Mobile Ltd spending more on its 4G network as itis expected to get a licence this year, analysts said.
weekend warrior pill side effects Cuban is expected to testify, as is FaurГѓВ©. Under procedures set by the judge, it is possible that Cuban may testify twice, once during the SEC's presentation of its case and later when the defense takes its turn.
How do I get an outside line? bisacodyl dulcolax nursing implications China in recent months has targeted foreign firms onmultiple fronts including alleged price-fixing, quality controlsand consumer rights, forcing companies to defend theirreputations in a country where international brands often have avaluable edge over local competitors in terms of public trust.
generic tretinoin cream 0.05 This has put pressure on cement makers, especially thosewith debt that has become expensive to service due to a sharpfall in the rupee against the dollar and high domestic interestrates, forcing some to sell assets.
clomipramine online uk Before the new rule was introduced, customers only had to transfer their direct debits and incoming payments to receive the ВЈ100, but Halifax said it introduced the new requirement "in readiness" for the new switching service.
is zoloft an over the counter drug id This fish is an excellent source of omega-3 fatty acids. Eating omega-3 rich salmon regularly may help protect against heart disease, breast and other В cancers, as well as provide relief to sufferers of certain autoimmune diseases, such В as rheumatoid arthritis and asthma. Its omega-3s are great for mood and also protect the brain, and are essential for the membranes of every one of your 6o to 90 trillion or so cells in your body.
accutane 10 mg a week tcd The lawsuit was filed after the fourth day of Rodriguez's appeal of his 211-game doping violation, and one sports lawyer not connected to the suit said it indicates that Team A-Rod believes it will be unable to convince arbitrator Fredric Horowitz to overturn or scale back the unprecedented punishment.
generic levothyroxine cost aosta Strzelczyk, a father of five from New Windsor, Maryland, told the conservative Tea Party group in Westminster, about 50 miles north of Washington, that the uphill fight for secession was essential because of gerrymandering by Democrats.
how to buy zithromax Declining the chemo, Mrs. Toguchi turned exclusively to prayer. She had been deeply devout and prayerful from an early age. Throughout her life, she had prevailed on the Holy Spirit, or the Blessed Mother, or Saint Joseph, or many other saints for help in matters great or small: during her exams in college, which she was the first in her family to attend; or much later, when her husband was ill; or most recently, the time she had to negotiate with a rude contractor. She said her rosary three times a day and never missed a weekend mass at St. Elizabeth Church, her vibrant congregation in Aiea, the Honolulu suburb in which she lived. Her whole world was prayer, she'd say.
all weekend pill The Mets will go to a six-man rotation when Niese returns. Niese has some fraying in the rotator cuff, but believes that it will fully heal in the offseason. . . . Mets bullpen coach Ricky Bones will miss the next two games while he attends the funeral of his mother. Guy Conti, the Mets’ senior adviser, will fill in.
Could you tell me the dialing code for ? purchase levothyroxine sodium obat thyrax GSK's reputation has been damaged and its management team in China left in disarray by Chinese police allegations that it funneled up to 3 billion yuan (9 million) to travel agencies to facilitate bribes to doctors and officials.
cefixime dose child jimi The season starts in full force tomorrow with Texas A&M’s Heisman-winning Johnny Manziel returning after an offseason of controversy, and a half-game suspension, against Rice. Only Manziel’s stunning freshman campaign, highlighted by a win over Alabama, could have ripped headlines from Nick Saban and his two-time defending champion Alabama team.
buy zithromax 500mg online For Anders Aslund, a senior fellow at the Peterson Institutefor International Economics in Washington, Nabiullina draws herauthority from her ties to Putin and the central bank's owngrowing credibility.
zoloft weight gain wikipedia or lexapro Amazon's gross profit margin - a closely watched measure ofearnings that excludes several expenses - was 28.6 percent inthe second quarter, the highest in the company's 19 yearhistory, according to Michael Graham, an analyst at CanaccordGenuity.
10 mg accutane results xgd3 "We're not going to be able to powerhouse through our agendaany more," she told a luncheon meeting of local business andcivic leaders. "The way we will get things done is bring forwardpolicy and programs that are win-win for everyone." | 2019-04-21T22:11:52Z | http://kvd8.ru/p55/f2816/index.html |
If you like having physical boxes of games to add to your ever-growing, beautiful collection of joy, but also like the convenience of having your games stored within your Switch's internal memory for quick and easy access, you'll likely be pretty jealous of Nintendo's latest offerings in Japan.
On the official Japanese Nintendo store, Super Smash Bros. Ultimate and Pokémon: Let's Go, Pikachu! and Let's Go, Eevee! have a couple of different listings: one that is simply a case with a cartridge inside as usual; and one that gives you the case with a digital code to redeem inside instead. Each copy costs exactly the same price, regardless of whether you're getting a physical card or not, but the option is there nonetheless.
On the one hand, selling what is essentially an empty box seems absolutely bonkers, but it's actually quite a smart idea on Nintendo's part; we imagine there are many who do indeed fall into the exact category we described above and the production costs will be lower if there is no cartridge inside.
Whether a similar deal will make it over to North America or Europe remains to be seen, but could this be a new trend for major Nintendo releases?
Let us know if you'd pick up one of these digital code boxes given the chance with a comment below.
Well if you're going digital might as well get the box if that appeals to you since the price is the same anyways.
Isn't the e-shop price equal to the physical price? Free box!
Seems ridiculous to me. But each to their own.
I bought a Vita game that was just a code in a box. The cashier tried to up sell me with the two year replacement plan.
Digital games should be cheaper than physical due to less production costs. I’m not giving in to this all-digital push until price reflects costs.
This still misses the point.
I want a physical game with a download code or an option to download the game to local storage.
I want to own the cartridge and yet, if I want, still have the convenience of digital.
Honestly, in 2018 how hard is that really?
That’s a novel idea. I’d be alright with this if it hit NA since I plan on getting digital.
@Bunkerneath You can still buy a physical cartridge.
Cartridge and case is fine with me but a full color manual included would be awesome too.
This is exactly the sort of thing no one minds if it doesn't leave Japan.
@Hikingguy do you mean like how movies sometimes have a digital copy included?
Edit: Just saw that the article mentions it might be a new trend for major releases (none of the above falls under that category). I'd say it's better than just selling plain download cards, which they have been doing for ages and you would just throw them away after redeeming the code.
@HobbitGamer Yes, that is the basic Idea.
I want the benefits of ownership of a physical cartridge and since technology allows it, I also want the convenience of local storage.
I want the best of both worlds. I mean in 2018, this should not be a radical request.
I’ve wanted to buy a physical copy of the games to keep new in its plastic wrap on my shelves and a digital copy to go along with it ever since the release of the Switch. Too bad I can’t afford it lmao.
Not bad. Animal Crossing: New Leaf was a rare digital purchase of a retail title for me on 3DS, and while I bought it digitally so I would never have to swap out a cartridge to check on my town, I missed having something for my shelf. This is a little weird, and strangely feels kind of like cheating, but for certain games I might be willing to bite anyway.
@HobbitGamer Sometimes I find myself buying the physical game so I feel like I really own it and I can play the game on multiple consoles and then if I really enjoy the game I will buy it digitally for the convenience. Physical is better if a person owns more than one console.
I thought the whole point was to have cartridges again?
@Hikingguy But then you can give one away. Which would be a problem.
Regardless if "production costs are lower if there's no physical cartridge inside," Nintendo never passes those savings on to the consumer. I still find it baffling that eShop games are still the same price as physical games. We should be seeing a notable difference in price because there's no manufacturing cost or distribution cost associated with those versions. And there's no 3rd party retailer vying for a piece of the profit, it's all going straight to Nintendo. We should be seeing at least a $10 difference between eShop and physical versions.
@Indielink But if the point is for me to physically own the game, then I will not want to give it away.
I want a REAL Switch Cartridge, Not a bunch of digital numbers.
But the funny thing is I find it cheaper to buy physical games than digital. Some Wii U Digital games are still full price yet the physical game can be bought for significantly less.
@Hikingguy That's also true. I found a copy of Crash Bandicoot Trilogy for $49.99 CDN at Best Buy when it was $56.99 CDN on the eShop. So I bought it physically. But that might have been for the E3 sale. But you are right, a lot of times the physical games are cheaper if you can take advantage of retail deals. But eShop games should be permanently cheaper with discount sales whenever Nintendo feels like running them.
@Hikingguy That's exactly what Microsoft offered when they announced X-Box one console with DRM and everyone hated it. That's also exactly the moment when they began to lose the battle against PS4, 6 month before the release of the consoles in the market.
@justin233 I would think that overall production costs have increased even if it’s a digital version due to cost of developers salaries and/or extras like voice acting. Going for digital releases may keep sales prices as the same rate as physical since they are skipping the added cost of manufacturing physical copies of the game. That’s what I would say if I were a developer company’s PR rep haha!
@DarthFoxMcCloud Sony and Microsoft don't do it, either. There's no business incentive for Nintendo to do it.
I'd guess that one of the reasons it's not done is that it would fracture marketspace between 1st Party digital shops and retailers. If the same product is going to be available on the eShop for 16% less than what the store must sell it at, the profit margin (typically $3-$7) for the retailer begins to erase and the retailer is less inclined to purchase inventory. This would be especially true for stores that use a product footprint (shelfspace) based on the percentage of product sold in a certain category.
Less inventory ordered means less inventory produced.
The debate "physical vs digital" is a huuuuge dilemna for me.
I still love physical games because I love to own a physical library. It's doesn't feel the same to look at games in shelves, than to look at a list of games on a screen. IT. SIMPLY. DOES. NOT.
But the switch is a console so suited to digital games... It's perfect !
I bought Bayonetta 1&2 in digital... I have regrets not to have the physical boxes. But it's still best suited this way.
But my shelves miss Bayonetta's boxes.
HHHAAAAA this Switch dilemna drives me crazy !
As for the idea of digital codes in boxes.. It would be the perfect solution. But I found it mad to have boxes without the game on a cartridge or disc. It doesn't make any sense.
They're not the first to do this sort of thing. I almost accidentally bought an empty steelbook tin for WipEout HD on PS4 because they were selling it separately for those who downloaded it. I initially thought it was the game for super cheap! A lot of kickstarters do this sort of thing with retro boxes for download games too.
@Hikingguy The point is that you have the OPTION to though. There's also nothing preventing you from even letting a friend borrow it.
The only way that would work is to have some kind of online check in but we all know how that turned out when Microsoft wanted to so it.
I'd much sooner have a significantly smaller box with the cart in it.
@Anti-Matter Those 'digital numbers' are all that's on that 'real Switch cartridge' you know.
I do not want forced DRM. There has to be a more elegant method. But I hear you.
@Indielink There nothing preventing me from lending the game to a friend with or without the option of downloading it. That has been happening for decades.
If you live near a GAME shop in the UK, just ask them for the box when buying a digital code. It's what I did when I picked up the breath of the wild expansion.
@smashboy2000 That is also why I if I have the option I always buy a game on Humble instead of directly from Steam. Because many times I get a DRM free copy and the Steam copy for the same price.
Historically, I typically will not buy a game if I cannot get a DRM free copy along with the Steam copy.
@Hikingguy Yeah I'd like a physical copy that could also be treated as a digital copy. The issue in the past has been that theres a much more common second hand market than there is for film so I imagine companies were concerned people would get the digital code and then on sell the physical copy, getting them a huge saving on the cost of the game. Digital copies for films aren't always overly convenient either.
The fact we've seen the past few weeks that Nintendo has add individualised identifiers to all physical copies would however seem to make that viable in that they could invalidate the digital copy if the corresponding physical copy shows up on systems other than those as part of a family Nintendo Online sub. Might annoy people lending games, but presumably you could re-activate the download copy when the user gets the physical copy back and adds it to the console to verify.
I think it'd be a cool concept myself.
On the topic of getting a physical case with a download code. If its the same price I can see the appeal but its worth noting you can already buy empty cases for pretty cheap so if you really must do that and download some high res cover art and make up your own.
@Indielink I guess as I think of it, I do not mind the idea of an online verification for online games. So if I go online and try to play and the other person has the game, I should not be able to play. But as soon as I get my game back, my system should give me all my rights back.
@Smigit Yeah, I agree. I think I posted something along the same thoughts seconds after you did.
@Hikingguy Same. Happy to lose access to my digital copy if someone else is using the physical. No different to what we have today anyway in that respect (cant play a physical game yourself if you loaned it), and I think it would help prevent publishers being too heavily burnt. Would be great though to be able to travel without taking the carts.
@Smigit absolutely! In 2018 there is zero reason this should not be a viable option.
My initial reaction to this was simply - no - b/c of the cost, but on further thought for a game like SSBU it makes sense if Amazon allows the 20% discount on the empty box. Best of all worlds - display box, game always available, Prime 20% discount.
The downside of this would of course be if you were a 2 or 3 Switch household then the code could be a problem, might be better w/ the cart.
I still need to research how that new Pokeplus ball works, if it's locked to 1 cop of the game or the account or if it can be shared. I'm guessing it's not shareable.
Without the cartridge, what the hell's the point of the box at all?
I suppose it's the nice thing to offer those who prefer digital, but like to have the boxes on display.
@smashboy2000 What Hikingguy suggested isn't quite what MS tried (this is actually more what MS tried.) Hikingguy wants BOTH a physical disc to retain and keep and play forever, and the ability to install the content of that media locally and play without the media inserted like digital. MS's idea was that the disc was just an unlock key like these empty boxes, that contained part of the download on the disc to spare you some download time. But after you entered the key, it was 100% identical to an MS Store purchase and the disc was now a valueless piece of lacquer, and to re-use the lacquer you'd have to buy a $30 unlock key from the MS Store to use it again. I.E. the same as the empty box with a paper code, but with a download booster and a "feature" to buy a second copy at a discount. Not quite the same as having the disc and digital copy. Sony planned the same identical system, but changed it after it failed so catastrophically for MS before their show.
Problem is CDs can't be locked to the account, as a temporary digital key. You could use the same disc on 30 consoles and they'd never know other than the paper code. Switch, with the serialized key built into the cart actually could allow the cart to be "unlocked" as it currently is, or "lock" it by tying it's ID to an account since it has a unique serial. So it's actually possible such a thing could be made to exist on Switch, unlike the other two.
Physical over digital all day everyday. Once gaming becomes and all digital/streaming service I'll be done with it and stick to all the consoles I already own.
The way I see it, Odin buying to collect, I won't buy it digitally with a physical box. Defeats the purpose for me.
HOWEVER, the worst case situation is that each cartridge could be used on two machines simultaneously. The one that has the cart in possession, and the one logged into the account for a digital copy. It could not be used on more than two, because there's only one physical cart, and the serial would be checked on the backend to match only one account registered for digital use of the serial.
2 copies playable for retail price is actually how X1 and PS4 already do digital. Anyone on your "primary" system can play all your games. And you can also play all your games on any system you log into. So a total of two machines can simultaneously play one digitally purchased game. (MS sells that as a feature of XBL, "Home XBox". Sony doesn't advertise it, it just works.) So actually the physical/digital sharing would just be a "very NIntendo" way of doing what Sony and MS already do by taking Sony and MS's digital poicy and doing the same thing with a physical/digital policy, that only their hardware can do.
Edit: And how do you make up the money gap? Subscriptions!
@NEStalgia Yes exactly. I want the best of both worlds. I do not think that is too much to ask in 2018.
If I sell it. The physical gets priority and I would have no problem if they disable my access.
Since I did not own a Xbox I will divert to your knowledge on that. As always, Thank you very much!
Dudes, nibelsnarf all that "Tie the digital copy to the cartridge" and "You might give it away or sell it!" noise. That isn't hurting movies or comic books, both of which have "Get a digital copy with your physical purchase" programs. There is absolutely no need for video game companies to be more draconian than their contemporaries.
PLEASE BRING THIS TO EUROPE! I love Switch boxes on my shelf, but way prefer having the game on my system memory!
It kind of defeats the purpose of going all digital. If I want to go all digital it is because I do not want a bunch of boxes sitting around my house.
I might as well just print my own inserts and use an extra DVD case I have laying around.
The people bemoaning the cost of digital versus physical, there is a simple reason prices remain at parity and sometimes worse digitally.
Nintendo, MS and Sony all rely on retail (web and shops) to sell their hardware.
If you drop the price of digital then those shops cannot afford to sell games and therefore will not sell consoles so the prices of digital games remains high to keep the retailers onside.
@Supadav03 I have gone almost all in on digital too. Price is the only thing that stops me. Octopath traveller for instance £40 best price I have seen physical £50 on the eshop.
I invested in a 400gb card so I can buy digital whenever I please!
Can't say I think its very smart... Personaly I will stick with carts.
I'm very outspoken regarding the virtues of physical media, but the one thing I've come to realize is that even owning the cartridge doesn't guarantee my ability to play that game ten years from now. It sure used to, right up until the end of the Wii, but these days with all of the DLC, "always online" requirements on some titles, and almost every title shipping with some pretty glaring bugs that are fixed with a launch day patch, it's very likely that even owning the disc or cartridge won't allow you to play the "finished" game in the future. In the worst cases it won't boot at all, and in most cases what will boot will be a hacky, broken mess. There are some instances of publishers who put their product through some sort of quality assurance beforehand, but those are few and far between.
That said, I still buy exclusives physically. But with multiplatform titles, it makes the most sense to find a DRM-free PC copy at a place like GOG or bite the bullet and fall in with Steam. At the very least, you know Steam's store isn't going to shut down when the "generation" ends.
@Medic_alert Yes, price is def the biggest obstacle. Not getting the 20% pre-order bonus on digital games like you do for physical on Amazon hurts. I usually try to wait for eShop sales or discounts on eShop cards on eBay to help make up for it. I only have a 200GB card & it’s filling up much quicker than expected. I may need to go to 400GB like you. Really love being able to just grab my Switch and know I have my full library of games with me at all times.
@NEStalgia yeah I’d prefer no checks, just pointing out there is a mechanism there. It’s doable and it doesn’t need to be as invasive as those proposed by the original Xbox One launch.
If they did have some digital + physical scheme, even if they locked it down, I’d even be happy to pay say $10 more for the digital code post sale I reckon. Make it redeemable when the carts in.
You’re right in that other consoles don’t function that way and do support an account to be in multiple systems, but at the same token that applies to digital copies only that you can’t then sell so they’re still somewhat locked to a single user/account. I think publishers would be pretty concerned about a system that allowed a single purchase to be split into two without any major impact on the ability to access or restrictions on resale.
@EeryPetrol Not really, in the US at least physical purchases incur taxation while digital purchases do not. In addition there is also typically shipping fees involved with a physical item.
@WaveBoy Even better: They should just sell the empty cases for 5€. That way you can have an extensive collection without even paying for the games! Most collectors wouldn't notice anyway because they never open their games. They loose value if you remove the shrink wrap after all!!
I would buy the cartridge one. The idea of downloading is fine but I like holding the cart in my hand. Having extra goodies inside helps me make my decision like a map or instruction booklet.
One is called : Whatevathingy special!
I have been saying for a while that in this transition we are making to Digital I want them to still go physical with some item that you can go buy to add to your collection and get a code that gives you the game digitally.
Now I have been thinking, a small statue like amiibo type thing or other small things to display.
I really hope people are gonna start to think, PLEASE WAKE UP PEOPLE !
Do not accept these kind of things, NEVER !
They don't want you to pay your games at a better price.
Think about the Millions persons in the world loosing their jobs one by one... that's crazy !
PLEASE FIGHT FOR PHYSICAL !
@justin233 I totally agree, if part of the reason Switch games cost what they do is due to expensive cartridges, why is the digital version just as expensive?
And that’s based on the RRP, if stores have sales, digital is more expensive than the version with the oh-so-costly cartridge.
@Cobalt I totally get where you are coming from, there was a time when people said they would never buy games on steam. They were ticked it was going to even be a thing.
You don't own anything when you buy it digitally.
Yet here we are, years later and you still don't but steam is a norm.
And even then, I may not own those games, but I still have and can play all of them. So there is that.
Streaming games is the future regardless if we want it or not. I am hoping that in that future I can still buy a physical product and get access to that game.
People see streaming as a service like PSNow and such, but in the future I don't think it will be like this.
I think your xbox live sub, or your playstation plus sub and the like will cover streaming. You buy a game digitally you have access to that game digitally via download or if you like you can just stream it.
I think that is what the next console generation will look like, a sort of hybrid of the past and the future.
I think Microsoft and probably Sony as well are going to announce very traditional Consoles, full of power and a slot for physical disk games, but I think they will also announce next to these a cheaper device, not unlike a Switch but something that doesn't need to be powerful. Something that can just accept streaming.
I would bet money with a device like that some people would just buy the cheaper streaming device and never buy the more expensive console.
THey have been trying to figure out hardware for a future where streaming was a thing for a while. Playstation move. Kinect. All these things were these companies trying to innovate yes, but they were also trying to figure out how to sell hardware to people in a time when games can be streamed to ANY screen.
And be of higher fidelity than we have ever known. Because when developers can take advantage of a server system and know exactly what they can milk out of it and knowing that the server can be super powerful, more so than what can be put in a home console because it would be to expensive.
Think of the games that could produce.
Games with full planets to explore. FULL planets. In fidelity unheard of.
And all you need is a screen and a device to control.
It is coming. I will miss these good old days to.
I think the pros do outweigh the cons though.
Super powered games. Streamed anywhere, to any screen I desire.
EDIT: And it would alleviate one of my gripes with the Switch. It's power. I hear that in Japan Resident Evil 7 is being played on the switch via streaming. Without streaming you would not be able to play that on the switch in it's normal fidelity. You would get things like the Doom port or Wolfenstein. Which are great ports, but imagine if devs didn't have to port games to the Switch. They could just give you access to games via streaming.
Boom, the Switch becomes the only system you need and every game would come to it as it came to other consoles, day and date.
Anyways, in a future like that, I would certainly love the option to buy a physical item. Like Nintendo could make Amiibo the item. New mario comes out, buy this new Mario amiibo, it includes your code to unlock the new mario game on your account. I still get to collect the games I want, and have the convience of not having to swap media every time I want to play something else and don't have to carry those games with me. And would allow me to play even full console experiences on the go with not compromises.
I’m surprised by the negativity to this. It’s not like they’re taking away your ability to buy a physical cartridge if you want it. More options isn’t a bad thing.
Weren’t you the one who declared Europeans the smarter than the Japanese and Americans because Europeans spent less on Pokémon Go?
“The graph shows something really interesting.
Well that's a steaming load! Poor Japan. shakes head in disgust Please Nintendo, don't follow Capcom on annoying decisions like this.
Dunno, but MAYBE, it was put in a joke way, isn't it ?
@Cobalt I know how to read, thanks. You went on and on about how Europeans and Americans were stupid because they are affected by marketing. As if they don’t market in Japan. Heck, you don’t even know who made the name change. For all we know, NOA was the one who made the call.
Also, reading over your comment again, I can’t help but take issue with your use of the r word. It’s a medical condition, and it’s offensive when you use it to describe people who do not have said condition. Please refrain from using it in the future.
Can you explain to me "the r word" please ?
Oww ok, now I get it... Thank you for the clarification.
@Cobalt And thank you for understanding. Sorry if I sounded a little harsh earlier. I don't agree with your perspective, but I probably could have chosen my words better.
"So it's really a commercial decision based on perception of eastern and western mentalities..."
I don't think it's fair to make this an East vs. West thing. Maybe it would be better if we just said that it's a matter of changing marketing to appeal to different audiences?
I have a small level in English so I do with what I have.
I know that it could be better by practicing more but it's impossible for me so I'm grateful when a guy take the time to explain to me things like : "this you cannot say, that you might change into..."
Nintendo passing the buck to the consumer. | 2019-04-25T16:33:58Z | http://www.nintendolife.com/news/2018/07/japan_will_get_physical_boxes_of_smash_bros_ultimate_and_pokemon_lets_go_with_digital_codes_inside |
Going into the wild inevitably means you’re facing the harsh nature and environment. Injuries and accidents may occur much more often compared to those occurring in the city. Injuries, bites, hypothermia, drowning, bone fracture, etc. are much more common among outdoors enthusiasts.
Knowing some basic and ground rules in performing first aid to an injured person may save lives. In case you’re alone, your own skills may help you (as long as you’re conscious). Of course, it’s highly advisable to always go out into the wild with a trusted person, friend or family member, in case anyone needs emergent medical attention.
In this article we will give you the basics on performing different first aid techniques depending on the situation. As these are limited guidelines, you are strongly advised to visit a complete course on first aid. In any case, as long as you know the basics, they can be applied in a huge variety of unexpected situations and help save lives.
Burning is quite common especially during the summer. Sunburns are considered first-degree burn. Second degree is skin burnt to an extent when blisters appear.
You need to use sterilized water to clear the injured area. It is also very important to keep the place cool. Always use cold water (for washing the wound and with the sterilized water). Even if the skin is no longer in contact with the heat source, the burning will continue within the skin tissues. This is why it is very important to immediately apply cold water, water-soaked towels, etc. Basically, keep the area cool.
Third-degree burns are dangerous and can cause severe dehydration and further damage on the person (especially if a large area of skin is burned). Again, apply cold water and wrap the wound with a clean sterilized bandage. The area burned will be first either pale white or black. If there is tissue or dressing stuck to the wound later on, don’t pull it. It can damage the healing area and cause bleeding. Give a lot of water to the injured person, as dehydration occurs quickly. Here you can find more tips and tricks on how to treat a sunburn with ingredients you can find at home.
It is also important to note that if the injured person has clothes melted to his burned skin you should never attempt yourself to remove these clothes. These procedures will be done by medical professionals.
There can be several reasons a person may not be able to breathe. The person may have chocked on a piece of food, may have been rescued from drowning, or have sustained other injury, which obstructs the breathing passage.
Grab the person from behind. Make a fist with one hand, place it below the rib cage and above the belly button. Grab the fist with your other hand and press the stomach and rib cage, squeezing so as to help remove the blockage. This technique is dangerous if performed on younger people as it may cause bone and rib fractures. If a child is choking, lay them with their face downward. With one hand carefully open their mouth and with the other thump their back, with enough force to remove the blockage, but carefully so as not to further damage the child/infant.
If you cannot understand the reason why a person can’t breathe, lay them on the ground facing up, open their mouth and tilt their head backward. It is often the case that people suffocate because their tongue obstructs the airflow and blocks the air passage. If you tilt their head back so that the chin faces up, the tongue will naturally be relaxed (as it’s a muscle) and move from the air passage. If the person still doesn’t breathe you may have to perform a mouth-to-mouth first aid.
Do not perform the above if the person suffers a neck or spinal damage. Any movement, if that’s the case, may further injure the person.
In case of a drowning incident, and if the person isn’t breathing, make sure you cover the person with blankets (to keep them warm as hypothermia strikes quickly). For this, it is recommended to always have survival blankets on you, regardless of your location. Such products are not expensive and can save someone’s life. If you are interested in learning more about said blankets, take a look at our reviews and info in this article.
Also, if there are other persons around, quickly instruct them to stay as a safe distance from you and the victim.
Tilt the head only slightly backward and perform mouth-to-mouth aid. Apply brisk pressures on the chest to force air inside the lungs. Do this a few times, and repeat the mouth-to-mouth technique. If this doesn’t help the person after up to 10 repetitions, quickly transport to the closest medical center.
You may also try to lay the person to one side with the upper leg bent to 90 degrees and the lower leg straight. Hands should be in a fetal position, close to the face. This position also helps the breathing passage to open.
Bleeding injuries are also very common and can occur together with other injuries like burning, bone fracture, etc. Before you attend the other injury, you may have to stop the bleeding first. Loss of too much blood is dangerous enough.
In this section we will talk about external bleeding.
Apply pressure to the wound area while you wash it. Clean the wound using sterile tissues and wrap a sterilized bandage around it. If the wound isn’t too large you can massage a sterilizing ointment before bandaging. The person should lie down and not move. If you can, position the wounded area above the level of the heart. Blood circulation slows down and less blood is pumped to the injured area. Thus you minimize the loss of blood.
If the damage is severe, shock may also occur. You need to attend to the injured person, keep them warm and give them water to prevent dehydration. Be careful and gentle. Shock is a common condition for victims suffering severe damage and psychologically hard to handle. The person loses all control over their emotions and needs special care, patience and a quiet area to rest.
We also need to mention that if the wound is on the head or neck area, you need to be careful not to apply any pressure to the wound. Also, if you’re away from civilization for more than a day (you may be lost), you have to tend to the wound. Wash it at least twice a day with sterile water and change the dressings with new, clean and sterilized ones. If there is infection going on, clean more often with antibiotic water and apply antibiotic cream/ointment. Changing the dressing is as important so don’t reapply the old one after washing the wound.
Another important note is to remember to always clean the exposed wound with sterile water. If you don’t have such in your first aid kit, you may have to boil some water and use that. Otherwise, never use river water directly on the wound, as there may be viruses, germs, etc. present in the water.
In such a situation, you will need a well-equipped first aid kit so, if you don’t have one, it’s time to start searching. We have a set of reviews on the best first aid kit you can buy according to the situation so take a look; it may be helpful.
This condition occurs when the person loses body warmth too quickly for it to restore. The reasons for hypothermia are too many to list here, but some are dehydration, exposure to low temperatures for a long time, lack of sleep, nutrient deficiency due to hunger for more than a day or two, etc.
To successfully treat hypothermia, the person needs to immediately get to a warmer area (tent, building, etc.). If you can, massage quickly the entire body of the person to activate the body’s natural reserves of heat. Give the person hot drink (ideally just water will do). Don’t give them caffeinated drinks (coffee, tea, chocolate, etc.) or alcoholic beverages. These promote further hypothermia.
It is possible that the person’s clothes are wet (either by contact with water or after sweating), so you need to remove them immediately. Replace the wet clothes with dry warmer clothes and let the person inside a hot warm sleeping bag. If you don’t have a sleeping bag, wrap the person with any types of blankets you have. Even a tarp may help isolate the body warmth and help fight hypothermia. Make sure the person is in no way in contact with any cold (and/or wet) area, ground, wall, etc.
If the condition is more severe than normal, you have to gradually warm the person. Begin by changing their clothes, then add warm bottles and place them around the abdomen and the armpits. Gradually add more warmth and give hot drinks later.
If possible, build a fire nearby to generate more heat in the area.
This can be as dangerous as skin burnt by heat. Frostbite is basically an area burnt by extreme cold. Cells get damaged by the sharp ice crystals to an irreparable extent, especially if the skin is exposed for too long. Often times, if the skin is frostbitten and then blisters appear, the skin can repair and heal with time (although scars may remain).
If it’s possible to get quickly to a medical center (within 2 to 3 hours), then you don’t have to try and treat the frostbite. In case that’s not possible you need to keep steady warmth applied to the damaged area (of about 40-42 degrees C/104-108 degrees F).
You can use water to submerge the area in it, but change it often, as it will cool very quickly. Remember that the area is frozen, so it has to melt gradually. Warmer area may cause pain and even burning of the damaged area. If you managed to thaw the area safely, blisters may start to form. Do not try to pop them, or you risk causing infection. Let them stay as they also protect the area and show how it heals. Also, do not rub the area – this can further damage the injured skin/cells.
When you wrap the area with sterile bandage make sure to keep it loose, and not tight, or it will slow the healing process and may even cause some damage (due to the pressure) to the frostbitten skin.
It is often the case that you may end up face-to-face with a snake. Snakebites can be deadly and need to be treated immediately (or as soon as possible) with the corresponding anti-venom medicine. There are many myths about treating snakebite, like sucking the venom out of the wound, incisions, etc. but it is proven that they don’t work (or, if ever, work in very limited situations).
First, when you see the snake immediately retreat at a safe distance from it – it should be at least the length of the snake’s body. If you can, take a photo of it. In case you are bitten, and are transported to a hospital, you can show the photo to the personnel and they will know immediately what anti-venom to use without wasting precious time.
Otherwise, if you’re not prepared with anti-venom in your first-aid kit, you should go straight to the hospital. Don’t try to do anything alone. The least you can do is make a splint to isolate the bitten area, so the venom doesn’t spread quickly.
These situations may be the toughest to handle. If a person suffers a spinal or neck injury, you should first of all try to restrict all the head movements. If you can’t do so without actually moving the head or neck, then don’t do anything. Call immediately for a rescue team to save you.
The only few things you can do is monitor the victim. Make sure they can breathe safely. If it’s possible, very gently position the head in such a way that the person can breathe. Again, do things very slowly and gently. Do not do any of this quickly, especially when dealing with head and spinal injuries.
If the victim suffers only a head injury (no spinal damage) and they lose consciousness, make sure they still breathe while unconscious. In the meantime, observe them carefully and when the person awakens, move them quickly to a hospital. Even if they are awake and conscious doesn’t mean that the head injury was nothing serious (even if there’s no blood around the injury).
During the transportation, observe the person for anything abnormal and unnatural – strange movements, fluid coming from the nose, unequally diluted pupils, seizures, vomiting, etc.
The first thing to do immediately is to immobilize the fractured limb. This will protect the surrounding tissue from any possible further damage. If you know how to do a splint that would be the best, especially for major fractures (not only sprains).
If there is bleeding along with the fracture you first need to stop the bleeding. Apply some gentle pressure around the bleeding wound. If the area is small and there are visible impurities (dust or soil particles, etc.) wash them with sterilized water and tie a bandage around it. Never try to remove or push in sticking bones. This may cause additional damage to the surrounding tissue.
Next you may have to make a splint. So, take two straight rigid objects (e.g. ski, walking sticks/poles, etc.). Position them around the fracture and snuggly tighten (not too much) using belt, bandanas, paracords, ropes, etc. – whatever you have at hand. The idea is to prevent any movement until the victim is given professional medical care.
Since the fractured area will swell, due to inflammation, it will start hurting a lot. You will have to administer painkillers to the victim until further help is given.
Optionally, you can prevent too much swelling by placing cold water (soaked towels) on the fracture. Also, keep the leg or arm in an elevated state to prevent from blood accumulating in the injury (and thus swelling it).
This is just a rough guideline as to what to have in your first-aid kit. Having the necessary items is just as important as knowing how to perform first aid.
Even if some of the above techniques help in reviving and saving an injured person, you still have to call for emergency. The injury may be contained for a while, but it still may cause damage in the long term. Whatever incident happens that may endanger one’s life, call the Red Cross or the local Rescue teams, and then try to perform some first aid.
Sometimes you may have to act immediately and shouldn’t waste precious seconds, so then you have to act on the spot. After the person has revived, call emergency. If the person doesn’t revive within 10 minutes, then call emergency. In case of a head or spinal injury, immediately call emergency, don’t do anything if possible (unless you have to help the person breathe).
If you don’t have a phone or have no mobile connection, shout or use a whistle if you have one. If you also have a mirror, use it to draw the attention to you. To indicate you need help you have to do three blasts, either with your whistle or with a flare gun. Do the same with the mirror – three flashes one after the other.
Another way to attract attention to you is to build a fire and use it. During the day the smoke will draw attention to you. During the night, the light of the fire will be the needed signal.
Before you go hiking/trekking/camping, write down all emergency phones, that you can contact (if you have battery and a working mobile phone). Mark on your map all the itineraries in the areas you’ll be visiting – if you’re close by you can go there and ask for help. Never go camping / hiking without extra batteries – both for your mobile phone and any flashlight you may carry. They may be your only way to call for help.
If the area you are located is endangering you and/or your companions (and all the injured people), you have to first move to a safer location.
open wounds, which you can’t close yourself or are bleeding severely, especially if you can see bones, joints, tendons; other severe open wounds on the facial area; wounds caused by animal(s).
As long as you follow the above instructions you should do fine. Always carry a mobile phone plus extra batteries, flashlight and flare gun. Write down all the emergency phone numbers and all the nearby itineraries for immediate help.
In addition to the above guidelines, we highly advise you to visit a first aid course. Many of them are performed on the field and offer certificates upon successful completion. Such trainings are offered by licensed organizations like National Outdoors Leadership School (NOLS), the Red Cross, Medical Associates International, etc.
Best Red Dot Sight: Making Your Targets Easier To Spot! | 2019-04-22T22:11:06Z | http://survival-mastery.com/med/health/wilderness-first-aid.html |
The novelist and sometime phil?o?sopher Walker Percy used to say that Angelism-by which he meant the denial of our bodily nature-is the defining heresy of modernity. The great French political theorist Pierre Manent seems to be getting at something similar in his new book, A World Beyond Politics? A Defense of the Nation-State, when he argues that moderns aspire to anchor all bonds and obligations in a purely spiritual decision, freefrom antecedent bodily conditions.
Manent sees modernity as a quest for freedom from all sources of obligation extrinsic to the human will. In Kantian terms, freedom becomes autonomy, the capacity to give oneself the law and thus to be liberated from heteronomy. In contemporary politics, particularly in Europe, the most potent movements aspire to a pure democracy purged of any ties to history, place, or language-all the embodied features of the political order that have been with us since the origin of the Greek polis. In Manent’s telling, the tragic structure of the history of mankind’s alienation from the polis is instructive concerning the enduring nature of the human and the limits to the modern project of mastering nature.
A World Beyond Politics? is the third of Manent’s books to be published in the Princeton series New French Thought, following An Intellectual History of Liberalism and The City of Man. A student of Raymond Aron and heavily influenced by Leo Strauss, Manent deftly weaves detailed exegesis of texts within an historical analysis of pagan, Christian, and modern epochs. The English title of the latest book is somewhat misleading, as the text is less a defense of the nation-state than a plea to treat the nation-state in particular, and political phenomena in general, as worthy objects of understanding.
Applying Aristotle’s Politics to our current situation, Manent attempts an account of regimes, particularly of the nation-state as a regime that arose out of previous conceptions and that may in the not-too-distant future give way to some supernational form of political life. But would that even be a political life in any meaningful sense? Or would it offer entrance into a world beyond politics, as the title wonders? And what would a life beyond politics mean for human nature and philosophy, both of which are discovered along with the conscious articulation of the nature of politics, with the birth of the polis?
for any geographical definition of Europe whatsoever.
The problem for Europe is that it does not know what, if anything, its member nations and various people share. For clarification, Manent returns us to Aristotle’s assertion that citizens hold words and deeds in common. Manent’s genealogy of modern politics begins with the Greeks and the polis; the city is the most natural form of government. In the early modern period, a new, more abstract and more formal conception of politics comes to the fore. The medieval identification of the people with the presence of the king’s body-concrete, tangible, and visible-becomes replaced by modern notions of representation and the multiplication of interests, of politics as abstract, intangible, and invisible.
Citizens of modern regimes suffer varying degrees of frustration over the absence of any visible presence of their unity; there is no place where modern human beings experience wholeness. One of the attractions of totalitarianism, which Manent predicts will remain an ongoing temptation, is that it promises to overcome the sense of dislocation and fragmentation by supplying a visibly unified political life. Many modern political theorists had predicted that the ascendancy of commerce would mean an end, or at least a serious diminution, of war. For certain regimes, however, the very pettiness of commerce is an incitement to war and noble contests. Manent here detects a reversal of Hobbes’ political philosophy, wherein the fear of violent death moves individuals from the state of nature to the order of politics in which commodious living can be pursued with greater security.
Manent typically contrasts the premodern and the modern, as for example in his assumption of continuity from the Greek polis to the medieval model of kingship. But he also notes that Christianity introduced a rupture into the ancient world. By separating religion from politics, it set the secular free and offered participation in a perfect community independent of specific geographic and cultural conditions. Still, it kept alive the notion of a city, in this case the city of God; and its focus on the sacramental life of God’s people, organized around the concrete and visible presence of the bishop, undercuts the move toward formalism and abstraction. Despite the alteration in the relation to the polis introduced into the human soul by the Christian religion, Manent pairs the premodern pagan and the Christian citizen together, because the fundamental experience of both is that of obedience to law, whether religious, political, or familial.
In Manent’s history of modern Western political thought and practice, freedom triumphs over nature-the autos element of autonomy comes to eclipse the nomos element-so much so that by the end of the book a certain trajectory seems almost inevitable. Indeed, science and liberty, the two dominant passions of modern life, work together, precisely because science promises mastery and possession of nature and hence unprecedented liberty. The logical end of such a liberation is, as Nietz-sche aptly dissected it, the flattest condition of the soul, that of the tourist.
In his appeal to the ancients, in his stress on the political implications of certain strains of modern science, and in his penchant for a quasi-Nietz-schean analysis of contemporary life, Manent follows a broadly Straussian program. Yet, unlike most Straussians, Manent focuses more on Aristotle than on Plato. He also has a penchant for genealogical accounts that are, if not historicist, at least more open to an intelligibility at work in history than anything one finds in Strauss. Finally, Manent’s own questions about Strauss’ project arise from his somewhat different way of formulating the theologico-political problem.
To see what is distinctive in Manent’s approach, we might begin with his discussion of the way contraception in Europe and elsewhere provides an extraordinary philosophical experience for the study of the relations between human nature and human art or artifice, as well as the evaluation of the Enlightenment project of the conquest of nature. Citing the consequent declining birth rate in many countries, Manent observes, we are stronger than nature, we master it, we subject it, but we subject it to the point that it lets us down and indirectly recovers all its power over us. The tragic denouement of modernity’s attempted mastery of nature is instructive and indirectly affirmative of a natural order that resists the stratagems of those who would master it rather than understand it.
But this raises the question why we seem incapable of learning the lessons of nature, and why we, particularly in modernity, have turned ourselves so implacably against our very nature. Part of the answer, hinted at in this book but stated more directly in Manent’s earlier volume The City of Man, is theological. More precisely, it has to do with the defining anti-theological stance of modernity. Manent wonders why it is that early modern thinkers did not simply continue the revival of pagan antiquity that was integral to the Renaissance. A contributing cause had to do with hostility toward the Catholic Church and its theological engagement of pagan nature. So long as a teleological conception of nature is in place, there remains the possibility that the Church can engage that account of nature dialectically. If nature points us toward the divine, then theology can remain part of rational, public discourse. If, however, nature does not point at all, or points in multiple, incompatible directions, all of which refer back to the whims of our desires, then theology becomes just one opinion among many, one rather peculiar way of satisfying natural cravings.
The evanescent and always receding liberty of modern man begins from this negation of any higher law. Modernity in this interpretation is not so much secularization as it is a parasitic, unending, and self-canceling rebellion-an exhibition of anti-theological ire. There are Pascalian insights lurking here. As Manent explicitly notes, we want to be angels, but we end up as beasts. One wonders whether another Pascalian teaching, applicable to all epochs of humanity but most dramatically on display in modernity, is not also at work, namely, that the twisting and turning of nature against itself, inexplicable on the grounds of natural reason, is lent a kind of intelligibility by the revealed doctrine of original sin. Whether Manent or anyone else can carry the dialogue between theology and politics forward remains to be seen. By simultaneously insisting upon the (limited) intelligibility of natural, human, and political ?matters and remaining open to the questions that invite theological responses, Manent has already achieved a great deal and put us all in his debt.
Myth and mythos refer to a kind of cultural story that possesses high authority and the capacity to convey powerful truths. Though the word myth seldom appears in American Mythos, this is a book about the unexamined deep narratives that shape American culture. These narratives, the author believes, sharply limit our capacity to be a more inclusive and more diverse nation. Our pluralist ideals would be more fully realized, he suggests, by a turn toward reflective democracy, his term for a process of personal and shared examination of our national myths. Close scrutiny, he intimates, would transform the stories we tell.
The concerns that animate the chapters of Wuthnow’s book-individualism, justice, meritocracy, religious privatization, ethnic pluralism, and materialism-are undeniably important. Sustained, thoughtful reflection on them is a welcome idea. And a distinguished cultural sociologist like Robert Wuthnow would seem to be just the right guide.
But the opportunity is lost in this strange and rambling book. The principal window on our myths is supposed to be the stories of successful first- and second-generation immigrants drawn from 200 lengthy interviews. But this data was apparently collected for some other project. We hear the stories of only three. All the other references consist of very short quotations and statistical summaries. The author derives neither the myths nor their meaning from them.
Instead of deep narratives, we get familiar tropes or arguments-for instance, that ethnicity is primarily symbolic or that immigrants will save us from our materialism-that often have a straw-man quality to them. They don’t so much document our cultural assumptions as set up Wuthnow’s own judgments about what ethnicity or pluralism or religion should mean.
Why would anyone publish, much less read, a biography of John Williamson Nevin (1803-1886), a now-obscure American Reformed theologian who spent his life in the German Reformed Church, a tiny corner of American Christianity? As it happens, Hart’s fine biography will find several audiences, and the publisher is to be commended for making this lucid summary of Nevin’s life and work readily accessible.
At the center of Nevin’s project was his conviction that Calvinism needs the nurturing of an institutional church, particularly her sacraments and the unique ministry of the pastoral office, if it is going to survive as a viable expression of Christianity. Nevin viewed the erasure of the church as the most characteristic feature of American Protestantism. The key question facing Protestants, he once wrote, is whether the original Catholic doctrine concerning the Church, as it stood in universal authority through all ages before the Reformation, is to be received and held still as a necessary part of the Christian faith, or deliberately rejected and refused as an error dangerous to men’s souls at war with the Bible? Revivalism was Nevin’s nemesis, the antithesis of his churchly form of Protestantism, and even the most conservative among Presbyterians were, in their liturgical and ecclesiastical instincts, more heirs of revivalism’s camp meetings than of Calvin’s Geneva.
Calvinists will find the book particularly timely. Nevin had a famous controversy with the Princeton theologian Charles Hodge concerning the real presence of Christ in the Eucharist. Hart describes Hodge as the gatekeeper of Calvinist orthodoxy, and Hodge’s victory in that debate effectively confined Nevin’s brand of Calvinism to the backwaters of the Reformed world.
But over the past decade, a form of the ecclesio-centric, sacramental, liturgical, catholic Calvinism represented by Nevin has revived within the conservative Reformed world. At no time since Nevin’s death has his work been so immediately relevant to American Calvinists.
Nevin is also of ecumenical interest at a time when evangelical Protestants are asking if the Reformation is over. During one period of his life, Nevin’s dissatisfaction with Puritan American Protestantism, along with his extensive historical studies, led him nearly to convert to Roman Catholicism. He wrote in 1852, My Protestantism . . . is of the poorest sort. I am no longer fit for the defence of its interest in any vigorous style. He always insisted that the divide between orthodox Christianity and modernism was more fundamental than the divide between Protestant and Catholic.
Episcopalians and other Anglicans know that 2007 could mark a turning point for their communion-toward either a long-hoped-for renewal or an ever-increasing downward spiral. This book is, quite simply, the best on the market for anyone who hopes for renewal. The theologians Radner and Turner, both veteran Episcopal priests, describe with admirable clarity the path that has brought us to this point. The Episcopal Church, they write, has by and large forsaken its calling as part of the one, holy, catholic, and apostolic Church-choosing instead to be a liberal yet liturgical option in American denominationalism.
And yet, rather than curse the darkness, Radner and Turner seek a path forward, daring to hope that God may use the current crisis to discipline and renew the Anglican Communion. That path, they say, does not lead to any of Christendom’s other options for solving the problem of scriptural faithfulness and tolerable diversity. Roman Catholicism, they say, relies on an unwarranted expansion of the Petrine office and a too-neat understanding of the development of doctrine, while Eastern Or- tho?doxy relies on an escape from history, and confessional Protestantism and Evangelicalism rely on artificially canonized doctrinal bulwarks.
Rather, they contend, the Anglican way of discerning truth is by means of communion itself, through the unity of a Scripture-immersed and sanctified people whose lives are shaped by the Church’s ancient eucharistic worship and prayer.
Sharply differing from the autonomous and prophetic self-understanding of the Episcopal Church, which has led only to chaos, Radner and Turner recommend a disciplined unity of mutual subjection and forbearance. It is this sort of unity, they argue, that recent church documents (such as the Windsor Report) are groping toward, and it is this to which Anglicans now are being called.
Frederick Bauerschmidt provides a valuable service to religious-studies teachers and instructors of other disciplines that require some knowledge of Catholic theology. In a handsomely produced paperback, he provides a concise introduction to the Summa Theologiae.
But rather than simply tell his students about the Summa, he lets St. Thomas speak for himself. Bauerschmidt has selected articles he judges representative of the themes treated in the Summa’s three parts, and he reproduces these texts in readable English that is adapted carefully from the translation produced in the early twentieth century by the fathers of the English Dominican Province. The selected articles cover a wide range of topics that Thomas Aquinas addresses in his monumental work. Bauerschmidt starts with the question What is theology? He ends with three articles that touch on Christian eschatology.
truth. Both the beginner and the seasoned reader of the Thomist corpus will find the notes in Holy Teaching ?enlightening.
With an introduction by the distinguished evangelical scholar Mark Noll, Best Christian Writing 2006 is the fifth in John Wilson’s series of annual collections. Wilson does not intend the book to collect the best work in theology or philosophy, though there is some theology and philosophy in these pages. Rather, he has sought to collect what might be called the best popular Christian writing-as long as we remember that popular does not mean unsubtle or cheap.
The theologian Richard Lischer offers a brief meditation that, for my money, ought to be required reading for all seminarians who want their ministries to follow a biblical paradigm-a paradigm that Lischer finds in the ministry of St. Paul to the early Christian gentile churches: a ministry that for all its messiness finds as its center the repeated embodiment of the death and resurrection of Jesus in the daily tosses and turns of pastoral work with the people of God.
Another provoking essay is Paul Marshall’s, originally published in First Things, a piece that deconstructs the commonplace call for Islam to undergo a reformation-by which is meant a liberal Enlightenment-and that shows the way in which Islam instead could benefit from a kind of Catholicization, albeit one in which Islam looks to its own histories and traditions.
Kenward makes much of feminism and communism, and of political culture that extols the rational, orderly mind at the same time it values the power of dissent so highly. The book does contain useful information on the 1940 fall of France, and it satisfactorily recounts the conflicts created by the Dreyfus Case, Action Fran?aise, Algeria, and Vietnam. It provides, as well, useful maps of the nation’s regions and photos of significant leaders and important moments.
Driscoll is a monk at Mount Angel Abbey in Oregon and the author of one of the best contemporary explanations of the Mass, What Happens at Mass. In his latest book, he collects a set of very short essays organized alphabetically and covering an en?gagingly idiosyncratic list of subjects-from airplanes and psalms to a deceased abbott named Zerr.
Two political scientists provide a wealth of data, drawn mainly from the World Values Surveys, that shows both the perdurance and variety of religion in the contemporary world. The analysis, however, is less interesting, depending as it does on a version of secularization theory that views religion as becoming less necessary as people in developed societies gradually sense they are more secure. Despite the authors’ desire to avoid reductionist explanations, Sacred and Secular reduces religion to the epiphenomenal.
The subtitle says it all: From the Hopes of Freedom to the Heart of Despair: A History of 50 Years of Independence. Meredith is a British journalist who has followed African affairs for decades, and the story he tells is grim. By almost every indicator-economic, political, cultural, educational, medical-Africa is, all in all, worse off today than when the anti-colonial winds of change began to sweep the continent half a century ago. Unfortunately, the author largely neglects the possibly related and certainly dramatic upsurge of religion, both Christian and Muslim, in Africa. He is ambivalent about increased Western aid to Africa, although strongly critical of Western economic policies, such as agricultural subsidies, that make it difficult for Africans to compete in the world market. The burden of blame for Africa’s sorry plight is placed, appropriately, on the thugocracies that have, in almost every country, deprived Africans of decent and honest government.
A useful, and chilling, collection of documents and reports, beginning with the origins of Islam, on how consistent has been the ideology of Jihadism and the subjugation of non-Muslims. Drawing upon both Muslim and non-Muslim sources, this book demonstrates that conquest and subjugation may not be the whole of Islam, but they have been to date inseparable from Muslim identity and mission. Of course there are Muslim thinkers today, some of them believably related to the world of Islamic faith and practice, who say that history need not repeat itself. But that is a subject for another book.
Now in paperback, Mao is a detailed account of a tyranny responsible for more than seventy million deaths. Mao had many admirers in the West, including Christian thinkers who hailed him as a Christ figure. Like Stalin, Hitler, Pol Pot, and Kim Il Sung, he believed it was his task (appointed by history, destiny, or whatever sanctioned his willfulness) to do nothing less than change human nature. When a man understands himself to be crucial to cosmic transformation, it is not surprising that he exempts himself from general rules. People like me have only a duty to ourselves, Mao wrote. Throughout his reign of terror, he was supplied with a steady stream of young women to satisfy his sexual needs and had fifty-three large and luxurious estates set aside for his use. The book is a probing into human evil on a vast scale, demonstrating the power of twisted ideas to wreak monumental horror when ruthlessness is deemed the supreme virtue. | 2019-04-23T14:42:03Z | https://www.firstthings.com/article/2007/02/modern-times |
So, it`s mid-january already, as usual i set a few new year`s resolutions for the year ahead and so far, so good! on that note, how about the locks on your property or home that you have been intending to fix for the past year? Coloumbia road, grimsby, dn32 8ed. If your locks haven’t been changed recently then their is a good chance that they need to be upgraded this can be a mortice lock that needs to be upgraded to the latest british standard bs:3621 2007 you may also want to upgrade your upvc door locks to high security cylinders to protect your self from the lock snapping attack that most burglars now employ as an entry method no matter the reason the oakham locksmith team are here to help and advise you on the best locks to suit your security needs. All the methods that are shown are using various tools for specific technologies the course offers intensive training over a 2 day period with a maximum of 6 students per course the course is 90% practical to ensure you know how to put the theory into practice upon completion of the course you will have the ability to start practicing as a knowledgeable locksmith and have an in-depth ability to work on the locks trained on you will also receive a detailed instruction manual and training certificate. Modern car security and locking systems have become very sophisticated, which is a good thing when you consider the potential disruption in your life from vehicle crime. Key loss is a very commonplace occurrence normally you might find your lost keys under a cushion or beneath a magazine, but when the customary search of the usual locations fails to recover them, you may need to have a set of replacement keys cut. Thank you so much cvc locksmiths fitted my new smart alarm very happy with service and good price. We are always out and about in dunston from working on the new apartments, fitting new handles on doors to lock upgrades, we also serve the local business such as commercial locksmith. Locksmiths are also available anywhere near you using their van, mobile locksmiths are able to reach your location in less than 30 minutes local. Are you locked out of your home or car? We work fast, but also efficiently your safety security is our top priority before we leave we will double check that all your locks, especially your front door one, are working properly quality is the most important aspect for us and we wish to reflect it in our working manner remember, the next time you have trouble with your locks and ask yourself “can i. No, all our services are personalized and so does the quotes when you apply for a quote, our experts will soon get in touch with you we believe in transparency and make sure that there are no hidden charges along with every quote we provide quote, you also get the opportunity to receive the free expert advice. We are a small, independent, family-run locksmith business in the heart of reading our aim is to help those when they need a trustworthy locksmith you can always rely on lock solutions for lock smith services in reading. You may remember to lock your doors and unload your van at night, but are you as confident about those who work with or for you? Any vehicle opened at the roadside call now. To return for re-locking please send to. Access locks & security ltd takes pride in being a fast, reliable and friendly service we have extensive experience and in depth knowledge of the industry to resolve your home, office, general or specialist customized security concerns our mission is to ensure excellence in service delivery with value for money for our clients therefore, we offer an effective and efficient service at an flat pack assembly dagenham/a> affordable price, so you have fewer things to worry about. A direct replacement high security anti-pick cylinder that prevents thieves from picking the drivers door open to gain access to the vehicle from here they can steal the car/van in its entirety by overriding the immobiliser via the obd socket or empty the contents from the unlocked load area. Southend , rayleigh , leigh-on-sea , basildon , chelmsford , benfleet , rayleigh , hockley , thundersley , canvey island , brentwood , colchester , wickford , billericay , all of essex. Locksmith released a series of mixtapes from 2010 to 2013 his first official album. You can expect us to arrive swiftly and quietly and get the job done. We offer our emergency service in salisbury and the surrounding areas our auto locksmith services come straight to you, without the need to tow your car and are available 24 hours a day, every day of the week - so no matter what time of day or night you need our assistance, we'll be there as soon as possible to get you back in your car and on the road just give us a call and we can estimate how long it will take us to get to your location. Locksolid are a specialist garage door locksmiths in norwich residential and commercial repairs with trade prices to all [read more]. T is the first conviction secured by the nhscfa since its establishment as a special health authority in november 2017. We now have the ford transit/custom hykee locks back in stock. If you have locked your keys inside your car the first thing you need to do is stop panicking, secondly you need to call our expert auto locksmiths team in kettering, we will be able to come out to the vehicle wherever you are and will use non destructive entry tools and techniques to have you back into your car in no time at all the auto locksmith team are a friendly bunch that strive to deliver exceptional customer service to all of our customers at an affordable price whatever has happened, locked keys in the car, lost car keys, stolen car keys or even keys locked inside the boot with your shopping out kettering auto locksmith team have come across it all and have the knowledge and experience to help. We have the proper tools to change a lock without producing damage in the process our licensed technicians have years of experience in dealing with all types of locks and doors they will replace locks for wooden, metal or upvc doors not asking for professional help when you have a damaged lock can put you and your goods in danger. Please call and ask about our locksmith service in your area. Devon security is an independent locksmith service based in exeter, offering a professional locksmith service to both domestic and commercial customers throughout east devon and the surrounding areas. Fast, friendly and reliable key cutting services, at competitive prices, while you wait. So, its mid-january already, as usual i set a few new years resolutions for the year ahead and so far, so good! on that note, how about the locks on your property or home that you have been intending to fix for the past year? All the methods that are shown are using various tools for specific technologies the course offers intensive training over a 2 day period with a maximum of 6 students per course the course is 90% practical to ensure you know how to put the theory into practice upon completion of the course you will have the ability to start practicing as a knowledgeable locksmith and have an in-depth ability to work on the locks trained on you will also receive a detailed instruction manual and training certificate. If you don’t require the services of an emergency locksmith, but looking for a suitable quote for any service you need, do let us know and our experts will get in touch with you to offer you the most reasonable quote. As your local locksmiths in kansas city, our dedication to helping our customers is second to none no matter what situation you are in, we hold you as our priority at all times. Based in penrith, cumbria and well established in the local area, monument locksmiths prides itself on doing an excellent job for all our customers, old and new. Whether you are a business or an individual looking to fix your computer, you can trust us to take care of all your needs we understand that computers make our lives and business much. Specialising in locks, replacement car keys, safes and security equipment. Properties listed under required have to be implemented by any types that conform; those listed under optional can be implemented to add additional information to what is saved or read if desired. At hastings locksmiths we offer a 24-hour service for emergencies if you are locked out, have lost your keys or they have been stolen, whatever time day or night, we can help. Dictator door check fitted to a door that everyone kept leaving open. We had our locks changed today and just wanted to say thank you for doing such a good, efficient and extremely professional job!. Mobile service available 7 days a week for emergency call-outs, ensuring that you can regain access to your vehicle.. Every thing speedy response, job done quickly an efficiently.”. Dredging update for milton keynes. Locksmith, lock outs, locksmith near me, 24 7 locksmith, locksmith e3, locksmith stratford e, locksmith bow, locksmith bromley-by-bow, locksmith bow road, locksmith london, window locks, chubb locks, yale locks, front door locks, rim locks, combination locks, garage door locks, cabinet lock, patio door lock, upvc lock, lift up door locks, mortise lock, magnetic locks, cylinder locks. We stock a wide range of new and refurbished safes in our showroom in sheffield our safe selection cover residential, business and banking with cash ratings from 1,000 to 100,000. We are a family-run company our workshop is located in long stratton near norwich on the a140 so if you need a car locksmith specialist in norwich ,ipswich,bury st edmunds,cambridge,newmarket then call us free 0800 999 5625.if you need to find us, key this postcode into your sat-nav: nr15 2tg we work on behalf of the recovery agents but also retail and trade clients. As well as deadlocks, we also install slam doors in commercial vehicles a slam door in an installed device that, once a door is shut both rear and sliding doors , it is locked immediately upon closure, requiring the use of the legitimate key to regain access. Discover our best kept secrets. K g key services keep a large stock of car remotes & van keys including ford, vauxhall, volkswagen, peugeot and citroen car keys we can supply & program new keys or remotes for your vehicle very quickly. There is nothing more frustrating than getting your keys locked in your car anyone who has had this happen to them can attest to how much of a waste of time and energy it can be there are many solutions for those who need an auto locksmith, but a few common tips to consider beforehand will save you some time and trouble if you ever need an auto locksmith in cardiff and surrounding areas. Maybe you have a broken lock, or you have been locked outside your office and you have a lot of work to do or maybe you just need to get in your house after a long day at work and you realize you don’t have your keys that’s why this kind of problem needs to be fixed as soon as possible, so you can go back at doing more important things. Established in 1921, buckle and jones have been providing services to cumbria for almost a century we have built up a reputation as an honest, efficient company and are proud to serve private individuals and large organisations around the uk we provide an extensive range of services for our customers giving them a single point of contact for all their home and business needs services provided are all at competitive rates. Many wrappers around the keychain have only support certain parts of the api this is because there are so many options and variations on the way you can query the keychain that its almost impossible to abstract effectively. Sadly you will not know when you are going to get locked out of your car you may be fortunate enough to be at home when such an incident occurs but sometimes customers get stranded at work, doing their shopping or visiting family in these cases it is not as easy to just wait until the next morning to get the issue fixed this is why we offer our services 24 hours a day, 7 days a week because we understand how inconvenient these situations can be. Police recognised company independently run and providing a. Replacement car keys guildford. The second common situation is locking your car keys inside the vehicle we are able to enter your car by picking the lock without damaging or changing it to recover your keys with no further work this is an efficient way to get you on your way as soon as possible. Coded keys for your business can be ordered online by entering your key number here. Areas covered for a fast emergency locksmith response 24 hours a day from. State of the art up to the minute alarm and access solutions. It will take approximately 15 to 30 minutes depending on your proximity to our available auto locksmiths our auto locksmiths are on the road all the time so it’s likely that they will be there sooner than later the auto locksmith technician is trained to communicate with you. Free 24hr roadside callout, contact us! Look no further call our specialist commercial locksmiths at secure homes locksmiths. If you have no keys select "lost all keys" alternatively if you have 1 working key or more select "just a spare". If you have any questions or enquiries regarding our services, please feel free to get in contact with us using the details below. As with the rest of the uk, brighton is unfortunate in having been hit by what feels like a plague of criminal activity it is unclear what the primary cause may be, but it does appear that the world feels a little bit less safe on the local level currently it is not the intention of a local security professional to scare customers, merely to bring some reality to the current security climate this is echoed by the increasing number of calls we receive from customers asking us about any potential upgrades they can invest in. Fast key service are the leading specialists in spare keys and replacement keys for office furniture and lockers. It doesn’t matter if it’s a cold night or a hot day as locksmiths in reading, we're on hand 24/7 to make sure that you can get into your property, even when the keys are missing. At city locksmiths we understand how important it is for our belfast locksmiths to be versatile we ensure we keep up to date with the latest security advancements and always have a wide range of spare locks on hand in fact, many of these locks are held in the vehicles of our locksmiths so that we can repair or replace your lock right away. Locked out? broken car key? lost car keys or need a spare, call us on 01326 376338! When you find yourself locked out of either your home or business premises, the most important thing is to understand what it is that is actually preventing you from regaining entry to your property if you can provide your friendly locksmith bristol with an accurate description of the problem, you will be able to receive a more accurate quote both in regard to the time required to fix the issue and the subsequent cost. All of our locks are up to british standards so you know if we replace your lock your insurance is still goung to cover you so if you’re getting new locks or maybe just checking your current locks, then remember this information and you can’t go wrong. St louis locksmith dispatch number . As one off the leading stoke on trent locksmiths & car locksmiths actually based in longton. We ensure you're on the cheapest tariff. For all emergencies please call directly on. All aspect maintenance lock fitting employees are highly trained and accredited by organisations such as the federation of master builders and trustmark, so you can feel confident in receiving the service you need to properly secure your home at a good price. We come to you at a time that suits you best. Each of our van deadlocks are door specific using different locking keeps or brackets depending on the make and model of van. This electric lock is suitable for heavy and light weighted doors. There are modifications that you can make to your current van to improve its security. Gloucester locksmiths is a verified company, recognised and promoted by the master locksmiths association. With over 5 years experience we have watched how immobiliser system have become more and more complicated they often leave customers confused about how to get another car, van or motorbike key. Being a locksmith is not an easy career it involves being able to have high concentration levels, self-motivation, incredible customer service skills, a robust attitude to adapt to different lock scenarios and a unique talent for providing solutions to problems at your secure locksmiths your locksmiths nottingham team are leading nottingham locksmiths and number one choice for many residential and commercial customers across nottinghamshire. Euro-deadlocks are true deadlocks, they have an internal mechanism which only 'lifts' when the correct key is being used to unlock the device, and this prevents the lock bolt being pushed back into the lock case. Secure homes locksmiths have built a solid reputation for excellence of service to our customers if you require more information, advice or a free quote on our lock change service for your home or business, call us today. Locksmith derbys elld is a reliable and speedy provider of various locksmith services to the residents of derby and the towns that abut on it we provide innovative and customized locksmith derby solutions that are basic security essentials of your home or business. We have worked hard to build up a great reputation over our many years in business and you are therefore sure to receive a premium standard when it comes to the service that you are given. Whether you locked your keys in the car, you need a spare transponder, or anything in between, our auto locksmith team can help! contact destin locksmithing any time, day or night, for help with your car’s locks, keys, and fobs. Our support available to help you. Speak to locksmith bristol professionals now to find out how you can make your home or business as close to burglar proof as it can get, on a budget that suits your standards. | 2019-04-19T06:38:39Z | http://friv-2.co.uk/plumbers/so-it-s-midjanuary-already-as-usual-i-set-a-few-new-year-s.html |
and on to the Baltics and Russia!
Travel in a small group just about anywhere! On every small group journey, you’ll enjoy more time with our well-connected local guides, experts, and Tauck Directors, who share their enthusiasm for the destinations and their insider’s perspective. Below find small group trips to Europe, North America, Africa, and our other Exotics destinations – Asia, Australia, and New Zealand. Discover Culturious trips in Europe and America’s national parks, along with small group departures of select Tauck Bridges family adventures.
Our ultimate Bavarian, Austrian, Italian and Swiss Alps tour features Yellow Roads travel, wine and schnapps tastings, cheese-making, a visit to Oberammergau – site of the Passion Play – and more on a 13-day adventure through mountain landscapes of the Alps and the Dolomites.
On a journey featuring the best of Scotland, Wales and England travel from Edinburgh to the English Lake District; explore medieval Wales, Bath, Stonehenge, Oxford and Stratford-upon-Avon; and end with three nights in London at one of the world's favorite luxury hotels, The Savoy.
Travel Italy with Tauck and experience romantic landscapes that have inspired the imagination of poets, artists and writers for centuries... from the Italian lakes to the lush Tuscan countryside and the timeless treasures of Venice, Florence and Rome! A Tauck Exclusive – an after-hours guided visit to the Vatican Museums and the Sistine Chapel!
An Italy vacation like no other, Tauck's 11-day Bellissima Northern Italy explores the arts, wine, cuisine and centuries-old passions of northern Italy. From Milan to the Italian lakes to Verona, Modena, Bologna and Venice, this is an inspiring journey off-the-beaten path.
Immerse in Irish culture on our grand Ireland tour south and north... east and west... featuring stays at country estates, lakeside resorts and a historic city-center hotel on travels that take you to Killarney, Waterford, Connemara, Enniskillen, Derry, the Antrim Coast, Belfast and Dublin!
Averaging 24 Tauck guests, Classic Italy, Small Groups are more personal Italian vacations highlighted by stays at chic smaller hotels in the heart of the cities. Explore Venice, Florence, Rome, Pompeii, Tuscan hill towns, Cinque Terre, the Amalfi Coast and more, highlighted by after-hours guided visits to the Doge's Palace in Venice and the Vatican Museums and Sistine Chapel in Rome. Plus special "Ferragamo" departures!
Visit the poignant beaches of D-Day, discover the rugged Brittany Coast, dine at an elegant estate in chateaux country, and spend three memorable nights in Paris on one of our most comprehensive Northern France and Normandy tours. Select Small Group departure dates available averaging 24 Tauck guests!
Experience the sweep of history on Tauck's Baltic and Russian tours, from Old World cities in Estonia, Latvia, and Lithuania to St. Petersburg to Moscow's Kremlin and Red Square – enjoying lunch in the Artist's Gallery in Moscow, an evening of Russian ballet and a Tauck Exclusive, early morning visit to The State Hermitage Museum.
Our 8-day Baltic States tours feature an insider's view of the historic "Old World" Baltic capital cities of Vilnius, Lithuania; Riga, Latvia; Tallinn, Estonia; and Helsinki, Finland – with their age-old castles, well-preserved medieval Old Towns, and centuries' worth of incredible architecture!
Discover a Nordic wonderland on Tauck's 2-week Scandinavian tours through Denmark, Sweden and Norway – cruising spectacular fjords, gazing at glaciers, viewing Viking ships, riding one of the world's steepest railway lines through the mountains, exploring medieval ports, and visiting a stave church, Danish palaces, Tivoli Gardens and more.
Travel from Barcelona into the dramatic Pyrenees and along Spain's northern coast, with stays at historic paradors in San Sebastián, Fuente Dé, León, and the incomparable Santiago de Compostela. One of our most popular Northern Spain tours continues to Porto and Lisbon in Portugal.
Explore picturesque mountains, sparkling lakes and fashionable Swiss cities including Montreux, Interlaken, St. Moritz and Lucerne... journey by cogwheel train in the Alps, by private boat on an alpine lake, and by rail in a domed observation car aboard the Glacier Express... all on Tauck's ultimate Switzerland tour.
Our authentic Sicily tours spend an idyllic ten days exploring the past – and the present – on one of the most beautiful islands in the world, steeped with multicultural traditions, filled with archaeological treasures, and rich with unique cuisine and wine.
Explore Imperial legacies of the Habsburg empire in and around the grand cities of Budapest, Vienna and Prague... discovering centuries-old traditions that are still here to be explored and embraced in Hungary, Austria and the Czech Republic on Tauck's weeklong Prague, Vienna & Budapest tours.
Small Group Departures – Select small group departures averaging 24 Tauck guests, specially priced; specific dates apply – see Pricing & Availability for details.
Special Solo Traveler Savings on the single room price of select departure dates; specific dates apply – see Pricing & Availability for details.
Tauck's one-week Ireland travel days feature multiple nights at some of the Emerald Isle's finest hotels; indulge in Irish culture on a trip that takes you from the rugged west to the historic south and ends with three nights in one of Europe's most popular cities, Dublin.
Experience powerful history and rich cultural connections on Tauck's weeklong London and Paris tours, highlighted by a Tauck Exclusive presentation by Winston Churchill's granddaughter Celia Sandys on select departures, afternoon tea, dinner at a famed chef's London restaurant, a West End theatre performance, a visit to Musée du Louvre and a private farewell dinner cruise on the Seine. And select departures, specially priced, include an exclusive presentation by Carolyn Robb, former chef to the Royal Family; while others, specially priced, include an exclusive after-hours visit to the Louvre in Paris.
Small Group Departures – Select small group departures, averaging 24 Tauck guests, specially priced; specific dates apply – see Pricing & Availability for complete pricing.
Special Solo Traveler Savings on select special departures; specific dates apply – see Pricing & Availability for complete pricing.
Tauck Exclusive Presentation by Celia Sandys on most 2019 Departures!
Except where noted, all 2019 departures of A Week In... London & Paris feature a presentation by Celia Sandys, granddaughter of Sir Winston Churchill. The internationally acclaimed author, journalist and television presenter will provide insights into the legacies and leadership of her grandfather through her own personal memories and stories; see Pricing & Availability for exception dates and complete details.
Select 2019 Small Group departures, specially priced, feature a special welcome dinner presentation by Carolyn Robb, co-founder of The Royal Touch and former chef to the Royal Family, who will present anecdotes from her time as Executive Chef of the royal household of Prince Charles, Princess Diana and young princes William and Harry; introduce a special menu; and visit with guests during and after this exclusive dinner at the Hyatt Regency London – The Churchill; see Pricing & Availability for departure dates and complete details.
Select Small Group departures, specially priced, will feature an exclusive private after-hours visit at the Musée du Louvre in Paris; see Pricing & Availability for departure dates and complete details.
Explore the ruins of Pompeii, seaside villages of the Amalfi Coast, the alluring Isle of Capri, and treasured antiquities of ancient Rome... highlighted by a locally guided visit through the Vatican Museums and Sistine Chapel – after hours – on Tauck's southern Italy tours.
Our two-week Eastern Europe and Poland tour includes visits to medieval Cracow and the memorial at Auschwitz; private events including a Chopin recital in Warsaw, Danube dinner cruise in Budapest and palace concert in Vienna; a special Tauck Exclusive evening at a palace in Prague, and much more.
Special Solo Traveler Savings on select departure dates; specific dates apply – see Pricing & Availability for complete details.
Tauck's 16-day China travel adventure includes ancient cities and tranquil country villages, a culturally enriching Yangtze River cruise, special talks and presentations by local experts, and cultural connections from Beijing to Shanghai to Hong Kong.
From the Caribbean Sea to the Pacific Ocean, Tauck Bridges introduces your family to the amazing biodiversity of Costa Rica's beach, rainforest and jungle!
A great way to experience some of the best France has to offer in a week, this eight-day trip connects in-depth discovery of Provence and the Côte d'Azur with a three-night stay in inimitable Paris via a high-speed rail journey.
Tauck's ultimate India tour explores the country's amazing diversity from lavish palaces in the north to canal-laced nature sanctuaries in the south – featuring special cultural connections and accommodations at some of the world's most renowned hotels!
Stories by Ken Burns! This comprehensive Indochina journey explores Thailand, Cambodia and Vietnam, from the heyday of the ancient Khmer Kingdom to the present day. Discover timeless Angkor Wat, Hué, cosmopolitan Hanoi and Bangkok, and enjoy special experiences like cyclo rides, a visit to local hill tribe villages, boat cruises through Bangkok's klongs and along Hué's Perfume River and more.
This multi-dimensional tour explores historical and cultural connections that define modern day life; in Israel travel from Tel Aviv to the Sea of Galilee and Jerusalem, and into Jordan to the Dead Sea, Petra and more.
Stories by Ken Burns! Your Thailand, Cambodia and Vietnam travel adventure spans the heyday of the ancient Khmer Kingdom to the present day, discovering timeless Angkor Wat, Hué, cosmopolitan Hanoi and Bangkok – with special experiences like cyclo rides, visits to local hill tribe villages, and boat cruises through Bangkok's klongs and along Hué's Perfume River.
Machu Picchu's mysteries... a scenic rail journey through the Andes... visits to floating islands where time stands still... history in Lima, Cusco and La Paz... Peru's Paso horses, Pisco Sours, a shaman's blessing and more on Tauck's ultimate Bolivia and Peru tour!
From exploring private game reserves with outstanding wildlife viewing to wine tasting, a private game reserve to a historic colonial hotel, amazing waterfalls and cosmopolitan chic... our South Africa tour brings you the best of an African safari and cultural exploration.
Tauck takes you on a celebration of Southern Africa’s natural world. This is one of our most popular South Africa tours – it features an amazing safari through the national parks of Botswana and Zambia along with three nights in South Africa's Cape Town.
Enjoy a grand safari adventure in Tanzania plus a visit to the tropical island archipelago of Zanzibar. Your African safari experience includes outstanding wildlife viewing on game drives that take you from Tarangire National Park to the famed Serengeti to observe Africa's Big Five.
Stories by Ken Burns! Our guided tour of California travels from Mediterranean-like San Diego, to hip and artsy Los Angeles, gracious Santa Barbara, stunning Big Sur, Monterey and Carmel, through the Central Valley to the unspoiled beauty of Yosemite and one of the world's favorite cities, San Francisco.
Experience epochs of American history from the days of the Pilgrims to Nantucket's whaling heyday, Newport in the "Gilded Age" and today's Cape Cod National Seashore on our popular New England vacation; includes a visit to The Breakers and a whale-watching cruise off Provincetown.
Stories by Ken Burns Gracious southern living is memorable on South Carolina and Georgia tours... enjoy a private Charleston harbor cruise... private evenings celebrating Savannah's Madeira traditions and historic storytelling... visits to plantations, gardens, and a Civil War fort... beachfront stays at an island tycoon retreat and a popular island resort... and more.
Stories by Ken Burns With more than just the excitement of a fall foliage tour, Tauck's new excursion through Grand New England takes you to see American history in a new light in places like the Revolutionary heart of Concord, the Berkshire retreats of artists and authors, lush forests and fertile fields... and the elusive soul of New England from Boston to Bar Harbor, from Mount Washington to Acadia National Park.
Special tropical Tauck touches await on Tauck's 4-island Hawaii vacation package – including ocean-view rooms at luxury beachfront resorts for 11 nights, cocktails and dinner at Iolani Palace in Honolulu, a private catamaran sail at sunset on the Big Island, an ecology lecture on Kauai, a hands-on gourmet cooking experience on Maui, and an adventure aboard an outrigger canoe off Waikiki Beach.
Crafted by Tauck and Ken Burns 10 days experiencing six national parks in the Southwest that evoke the haunting spirit of the desert – the inspiring natural beauty, the stories of the spirit of the people, and the spiritual connection we all share with their special sites are at the heart of Tauck's exclusive Southwest and Grand Canyon vacation.
Crafted by Tauck and Ken Burns – This exciting journey, crafted with filmmaker Ken Burns, celebrates the history, cultural heritage and natural beauty found in three of the most popular states in the Appalachian Mountains – Kentucky, North Carolina, and Tennessee, and explores Great Smoky Mountains National Park.
Explore the region famed for its 11,000 inland lakes and 36,000 miles of rivers and streams on Tauck's comprehensive Michigan tour, featuring two-night stays at the world-famous Grand Hotel on Mackinac Island and the award-winning Grand Traverse Resort & Spa.
Stories by Ken Burns Featuring exclusive vignettes by filmmakers Ken Burns and Dayton Duncan, this singular journey through the picturesque heart of New England visits summer and autumn landmarks, artists studios, historic sites, farms and wild natural settings that evoke the spirit of a place whose ideas shaped America.
Tauck's culturally enriching 8-day New Mexico vacation explores Native American, Spanish and Old West influences in Albuquerque and Santa Fe, and visits Taos Pueblo, Bandelier National Monument, the National Museum of Nuclear Science, the Georgia O'Keeffe Museum, Ghost Ranch, a private artist's studio and more.
Glaciers, snow-capped peaks, alpine lakes, and famous hotels highlight this Alberta vacation experience featuring three stunning Canadian Rockies national parks, all part of a UNESCO World Heritage Site; explore Jasper "your way" with a choice of outdoor adventures. Tauck's comprehensive Canadian Rockies vacation takes you on a classic western Canada tour for adventures by rail, floatplane, ferry, Ice Explorer and river raft... plus stays in Vancouver, Victoria, and at three historic Fairmont resorts in Banff and Jasper national parks.
Crafted by Tauck and Ken Burns – Explore the meaning of freedom and America's story – from the earliest settlement to the Colonial era to the Revolutionary War to building a Republic. Discover the nation’s economic expansion and industrial growth... 18th century social and religious movements... the Civil War... political diversity... and the defining themes that shaped the American experience century upon century.
Special Solo Traveler Savings on the single room price of select departure dates; specific dates apply, go to "Pricing and Availability" for details.
Get up close to astonishing Arctic life in Churchill, from polar bears to snowy owls, white foxes, or sled dogs. Immerse in the Earth Journeys experience, featuring custom-made BBC Earth on-tour film vignettes.
This classic African safari evokes safaris of yesteryear... you'll embark on an expedition to get to know the world’s most majestic animals – the “Big Five” – in their natural habitats within the magnificent national parks of Kenya and Tanzania.
From timeless Spanish cities including Madrid, Seville, Toledo, Córdoba and Granada to Portugal's capital, Lisbon, and UNESCO World Heritage Sites like Sintra and Evora, Tauck's two-week journey through the Iberian Peninsula is the ultimate in Spain and Portugal tours.
Discover Dublin, Belfast, the Giant's Causeway, Derry, Enniskillen, Donegal, Galway, Connemara, Killarney, Kilkenny, the Ring of Kerry and more on this two-week Ireland tour featuring small groups averaging 24 guests!
Travel in a small group averaging 24 guests as you immerse in the pleasures of daily life in the hilltowns of central Italy... experiencing the wine, cuisine, arts and crafts, history and cultural magic of Tuscany and Umbria, all in a week's time!
Small Groups averaging 24 guests on one of our newest 8-day Italy journeys featuring the best of Tuscany and Umbria. | 2019-04-21T03:21:22Z | http://a3.tauck.com/small-group-travel/small-group-trips.aspx |
We develop our product selections while listening to customers.
We ensure responsibility in the supply chain.
We are accountable for the safety and quality of products.
The social responsibility of the production of own direct imports from high-risk countries has been assured.
A total of 157 of Kesko’s suppliers' factories or plantations underwent full amfori BSCI audits. In addition, 146 suppliers’ factories or plantations underwent amfori BSCI follow-up audits. At the beginning of 2018, Kesko’s suppliers in high-risk countries had a total of 423 valid social responsibility audits.
Two responsibility trainings were arranged for the ICA Global Sourcing (IGS) suppliers: 24 suppliers took part in the Hangzhou training in China and 23 suppliers in the Delhi training in India. As part of our cooperation with Plan International Finland, three amfori BSCI supplier trainings were arranged in Bangkok, Thailand. A total of 25 suppliers from the Thai fishing industry took part in the trainings.
Continuing our human rights assessment we conducted a review of working conditions in the supply chain of grapes in collaboration with the Trade Union Solidarity Centre of Finland (SASK).
210 BSCI full audits and 60 BSCI re-audits were conducted in the factories and farms of Kesko’s suppliers in high-risk countries. At the beginning of 2017, Kesko’s suppliers in high-risk countries had a total of 386 valid social responsibility audits. The social responsibility of the production of Kesko’s grocery trade's own direct imports from high-risk countries was 100% assured.
Kesko Onninen Purchasing Office (KOPO) started operations in Shanghai, China. Kesko’s grocery trade and ICA Global Sourcing launched a sourcing cooperation in the home and speciality trade.
As part of the human rights assessment, we conducted a human rights survey at factories in high-risk countries in cooperation with the Trade Union Solidarity Centre of Finland (SASK). The country-specific reports by SASK provided valuable information for the development of our operations. We forwarded the information received to BSCI in order to develop the audit procedure.
Kesko's suppliers in high-risk countries had 200 factories or farms within the scope of the BSCI process. 107 BSCI full audits and 80 BSCI re-audits were conducted in the factories and farms of suppliers in high-risk countries. The social responsibility of the production of Kesko's grocery trade's own direct imports from high-risk countries was 100% assured.
We continued our work related to the human rights impact assessment. We published the manufacturing plants of private label and own import clothes, accessories, shoes and bags operating in high-risk countries on our website.
We assure the responsibility of the ingredients (Tier 2) of private label Pirkka and K-Menu food products.
The responsibility of ingredients used in 150 new Pirkka and K-Menu food products was assessed using our own risk analysis tool. Based on the risk analysis, 20 products contained ingredients which require further investigation in terms of the social responsibility of the producer.
Our analysis of ingredients in our own brand products received recognition at the annual meeting of amfori (previously Foreign Trade Association, FTA). Thanks to the risk analysis, Kesko was elected among the top three finalists of the FTA member of the year award.
We continued work in order to assure the responsibility of ingredients in the own-brand grocery products. We conducted ingredient risk assessments on 160 new Pirkka or K-Menu food products. Among these, 29 products contained ingredients which require further investigation in terms of responsibility.
Using the risk assessment tool, we started the process of assuring the responsibility of the ingredients of Pirkka and K-Menu products. We established the origin of the ingredients of 1,923 own-brand grocery products. Among these, 233 contained ingredients which require further investigation concerning the responsibility of the ingredient manufacturer based on the risk assessment.
We identify and take account of water risks in our supply chain.
Our water risk assessment work continued and we aim to use the results to plan actions.
The water risk assessment is in progress and the aim is to use the results to plan actions.
We initiated a water risk assessment for our own brand products in order to identify the water basins most affected by water scarcity and contamination issues in our supply chain. The target is to conclude the water risk assessment in 2016.
Fish and shellfish: The selections of Kesko’s grocery trade and K-food stores do not include species on the red list of the WWF’s fish guide. Kesko’s grocery trade and K-food stores promote green list species in their selections. When making decisions concerning selections, we favour sustainable stocks of fish and MSC and ASC certified suppliers. K Group's fish and shellfish policy has been in effect since 2008.
The retail selection of Kesko’s grocery trade included 196 MSC-certified fish products, of which 41 were Pirkka products and 1 K-Menu product. Our selections had 7 ASC-certified products, of which 4 were Pirkka products.
Kespro’s HoReCa selection had a total of 304 MSC-certified products, of which 30 were Menu products. Kespro's selection had 10 ASC-certified products, of which 2 were Menu products.
The retail selection of Kesko’s grocery trade included 178 MSC-certified fish products, of which 37 were Pirkka products. Kespro was granted MSC and ASC traceability certificates. All stages of Kespro’s fish and shellfish supply chain have been audited, and Kespro and its certified customer restaurants can use the MSC and ASC ecolabelling in their marketing. Kespro’s HoReCa selections included nearly 300 MSC- and ASC-certified products, and the number continues to grow. Kespro's Menu range had more than 25 MSC-certified products and 2 ASC-certified ones.
The Pirkka range included 41 MSC-certified fish products.
Palm oil: By 2020, all palm oil in our own brand groceries will be responsibly produced (CSPO).
Some 82% of the palm oil in Kespro’s Menu food products sold in 2017 was sustainably produced (CSPO), of which 0.2% was Identity Preserved, 74.3% Segregated, 20.7% Mass Balance, and 4.9% RSPO credits.
Some 43% of the palm oil in Pirkka and K-Menu food products sold in 2017 was sustainably produced (CSPO), of which 19% was Segregated, 79% Mass Balance, and 2% RSPO credits.
Approximately 34% of the palm oil in our own brand groceries (Pirkka, K-Menu and Kespro’s Menu) was certified sustainable palm oil (CSPO).
Approximately 20% of the palm oil in the Pirkka food products was certified sustainable palm oil (CSPO).
Soy: By 2020, all soy used in the production chain of our own brand products will be responsibly produced, and be either RTRS or ProTerra certified. The policy concerns ingredients of soy origin in grocery trade’s own brand food products and soy fodder used in the production of products of animal origin.
We reviewed the share of responsibly produced soy in our own brand food products and their supply chain. The soy used in our own brand food products (Pirkka, K-Menu and Kespro’s Menu) sold in 2017 and their supply chain was not yet responsibly produced.
We were a founding member in the Finnish soy commitment group, which started operations in February 2016. The members of the Finnish soy commitment group pledge to ensure that by 2020 all the soy used in the production chain of their private label products will be responsibly produced, and be either RTRS or ProTerra certified. The commitment covers both the Finnish production chain and sourcing from other countries. We joined the Round Table on Responsible Soy (RTRS) and thereby committed to promote responsibility in the production chain of soy on a long-term and target-oriented basis.
The objective was added in 2016.
Timber and paper: By 2025, there will be only sustainable origin timber and paper products in Kesko's product range. Timber and paper products will be FSC or PEFC certified or made of recycled materials. In the grocery trade, the policy applies to our own brand products.
In 2013, Kesko’s building and technical trade was awarded the PEFC certificate, which covers sawn pine and spruce timber and processed timber as well as the wholesale distribution of MDF boards in Finland (percentage-based method). The average PEFC certification percentage in 2017 was 89.7% for pine and 85.5% for spruce.
Of the timber and paper products in the grocery trade’s Pirkka and K-Menu ranges, 54% contained sustainable raw material. In Kespro’s Menu range, 14% of timber and paper products contained sustainable raw material.
The average PEFC certification percentage was 91.2% for pine and 84.6% for spruce. We are investigating the opportunities to expand the timber policy to cover the entire Group.
The PEFC certification percentage is announced monthly at Kesko's web pages.
Plastic: We promote the recycling and reuse of plastics. We create operating models that prevent plastics from ending up in the environment. We seek alternatives to plastic as a packaging material. By means of consumer communications, we will increase the sales share of alternative shopping bags (cotton bags, reusable bags and jute bags) and cardboard boxes to 10% by 2025. We look for solutions to replace PVC as a material.
We removed environmentally harmful microbeads from all our own brand cosmetic products. During 2018, microplastics will be removed from all our own brand detergents. The Pirkka ESSI circular economy bags were introduced to K-food stores' shopping bag selections at the start of 2017. The bags are made of over 90% recycled materials, around half of which is plastic packaging separately collected from households. By the end of 2017, small thin plastic bags were only available at checkouts by request for e.g. flowers. We reduced the consumption of small plastic bags by 20% in 2017.
We successfully piloted the new wood fibre-based EcoFishBox produced by Stora Enso in K-food stores. Since 2017, K Group gift cards have been made from PVC-free materials. In Onninen Express stores in Finland, regular customers have been handed shopping baskets that the customers can use to carry products to their construction site and bring back the next time the visit the store.
We published our plastics policy in October 2016 and pledged to implement measures aiming at reducing the use of plastic bags. Plastic bags have been subject to a charge in the K Group's grocery stores as well as building and home improvement stores, and, at the beginning of 207, they became subject to a charge in the agricultural and machinery stores as well as in furniture stores. By the end of 2017, thin small plastic bags will no longer be available at the checkout. Our selections offer alternatives to plastic bags; reusable bags, cotton bags, jute bags as well as paper bags and bags made of recycled plastic. The share of paper bags in the sales of all different shopping bags was approximately 1.5% and that of reusable bags was approximately 1.5%. In spring 2017, we included the Pirkka ESSI circular economy bags made by Amerplast Oy in our selections. They are manufactured from plastic packaging waste recycled by households through the Rinki eco-points. We will discontinue the use of microplastics in our private label cosmetics brand products in 2017. The packaging of our private label cosmetics does not contain PVC. We will discontinue using PVC as the material for Kesko’s gift cards in 2017. We will work to eliminate PVC from the material of the K-Plussa card in 2017.
More reusable bag alternatives were added to the grocery store selections: a new Vallila design, a Summer Day bag, and a Red Nose Day bag.
The Pirkka range had 37 Pirkka Fairtrade products, 116 Pirkka Organic products, 41 Pirkka MSC-certified fish products, 35 UTZ-certified products, 76 Nordic Swan label products, 137 products with the Key Flag symbol, 88 Seed leaf label products, 220 Hyvää Suomesta (Produce of Finland) products, and 5 products with the Finnish allergy label (Allergiatunnus).
Kespro’s Menu range had 4 Fairtrade products, 5 organic products, 30 MSC-certified products, 2 ASC-certified products, 15 products with the Nordic Swan ecolabel, 10 UTZ-certified products, 21 products with the Key Flag symbol, 4 Hyvää Suomesta (Produce of Finland) products and 23 Seed leaf label products.
In the building and technical trade, the Cello range had 411 Key Flag products, 30 Nordic Swan label products, 35 M1 label products, and 116 products with the Finnish allergy label (Allergiatunnus).
The Pirkka range included 36 Pirkka Fairtrade products, 118 Pirkka Organic products, 37 Pirkka MSC-certified fish products, 32 Pirkka UTZ-certified products and 65 Nordic Swan label products. All Pirkka and K-Menu coffees are Fairtrade or UTZ-certified. The Pirkka range includes 15 Fairtrade or UTZ-certified chocolate and baking chocolate products. In 2017, all Pirkka range chocolates will be Fairtrade or UTZ-certified.
Kespro’s Menu range included 7 Fairtrade products, 5 organic products, 25 MSC-certified products, 2 ASC-certified products, 13 products with the Nordic Swan ecolabel, and 5 UTZ-certified products.
All interior and exterior paints in the K-Rauta's Cello range carry the Nordic Swan ecolabel. 62 Cello products carried the M1 label and 105 Cello products had the Allergy Label. 15 products in the PROF range carried the M1 label.
The Pirkka range included 40 Pirkka Fairtrade products, 134 Pirkka Organic products, 41 Pirkka MSC-certified fish products, and 17 Pirkka UTZ-certified products.
The product safety of K Group’s selections has been verified. The Product Research Unit's laboratory monitors the product safety and quality of the own brand products and own imports in the grocery trade. All of our food product operations have a self-control plan in place.
The Product Research laboratory analysed 7,350 product samples and conducted 15,076 analyses. In total, 522 suppliers of Kesko’s own brands of food products have international audit certifications that assure product safety. The number of own audits was 59.
The Product Research laboratory analysed 7,770 product samples and conducted 17,176 analyses. The product safety of 503 suppliers was verified by means of a certified auditing procedure. The number of own audits was 58.
The Product Research laboratory analysed 8,037 product samples and conducted 20,396 analyses. Seven audits were performed.
In 2017, direct purchases by Kesko's Finnish companies from suppliers in high-risk areas totalled €106 million (2016: €85 million) and accounted for 1.2% (2016: 1%) of Kesko's total purchases. Direct imports from high-risk countries accounted for approximately 13.9% (2016: 11.9%) of Kesko's total imports into Finland. The most significant high-risk countries of import for Kesko’s Finnish companies are presented in the map below. No statistics are available on direct imports from high-risk countries in Kesko's other operating countries.
High-risk countries typically produce clothing and home textiles, shoes and other leather goods, furniture, interior decoration items, tools, sports equipment, toys, agricultural products (such as coffee, tea, cocoa, fruit, vegetables, wines) and canned fish, fruit and vegetables.
Kesko annually publishes on its website a list of factories that operate in high-risk countries manufacturing Kesko’s own-brand clothing and shoes to be directly imported by Kesko. The list is updated once a year, most recently on 31 August 2017.
Kesko is a member of amfori, a leading global association dedicated to promoting open and sustainable trade. Kesko takes part in amfori BSCI and recommends the use of amfori BSCI audits in the assessment of social responsibility of suppliers in high-risk countries. Kesko also accepts other assessment systems of social responsibility if their criteria correspond to those of amfori BSCI auditing and if the audit is conducted by an independent party.
As part of the sourcing cooperation between Kesko’s grocery trade and ICA Global Sourcing, Kesko also accepts the ICA Social Audit. In that case, however, suppliers are required to adopt a third-party auditing approved by Kesko after a maximum of two ICA audits.
The social responsibility auditing systems accepted by Kesko are listed in the section Monitoring and control systems. Some of Kesko’s suppliers are themselves amfori members and thus promote amfori BSCI audits in their own supply chains.
Kesko’s principle in high-risk countries is to collaborate only with suppliers that are already included in the scope of social responsibility audits or that start the process when the cooperation begins. Kesko’s grocery trade requires all of its suppliers in high-risk countries to have been audited. It will not enter into collaboration with new suppliers unless they have passed an acceptable audit.
In 2017, a total of 157 (2016: 210) of Kesko’s suppliers' factories or plantations underwent full amfori BSCI audits. In addition, 146 (2016: 60) suppliers’ factories or plantations underwent amfori BSCI follow-up audits.
The results of the 2017 amfori BSCI audits of Kesko’s suppliers’ factories and farms are shown below. The majority of the deficiencies occurred in management practices, observance of working time regulations, and matters related to occupational health and safety. Corrective actions and monitoring are included in the audit process. In accordance with the amfori BSCI operating model, a full audit is conducted at factories every two years to assess every sub-area of the auditing protocol. If a factory receives an audit result of C, D or E, a follow-up audit within 12 months must be arranged to assess the deficiencies identified in the full audit and the corrective measures implemented to address them.
Kesko does not terminate cooperation with a supplier that undertakes to resolve the grievances specified in the audit report. In 2017, Kesko decided to terminate cooperation with six factories due to ambiguities related to social responsibility. A consensus could not be reached with the factories regarding necessary corrective actions.
Kesko's grocery trade has an extensive collaboration agreement with Fairtrade Finland. The K-food trade chain concepts and K-retailers determine the selections of Fairtrade products at store level.
In 2017, Kesko's grocery trade selections included 300 (2016: 367) Fairtrade products, of which 37 (2016: 36) were Pirkka products and 4 (2016: 7) were Kespro's Menu products.
In 2017, the products sold by Kesko's grocery trade generated Fairtrade premiums for social development projects amounting to €719,225 (2016: €649,459).
In 2017, the products generating the largest Fairtrade premiums were Fairtrade flowers (€271,672), coffee (€224,537) and fruit (€142,975). According to Faitrade statistics, the Fairtrade coffees sold by Kesko grocery trade in 2017 employed approximately 800 small-scale coffee farmers on Fairtrade's terms.
Kesko and Plan International Finland, an organisation promoting children’s rights, cooperate to improve the responsibility of the Thai fishing industry and the position of migrant workers. The collaboration has been agreed for the period of 2015-2018, and it is part of a larger project funded by the Swedish International Development Cooperation Agency (SIDA) and the American Richard and Helen DeVos Foundation in Thailand and Cambodia.
The project aims to improve the working conditions of Cambodian migrant workers, as well as education and protection for their children in Thailand. The collaboration with Plan also improves the transparency of the supply chain of Kesko’s fish products.
As part of the project, two learning centres were established for children of migrant workers in the Rayong and Trat provinces in 2015. The learning centres provide the children with the skills they need to attend public schools in Thailand and support them in continuing their studies. In 2017, 50 girls and 38 boys aged between 4 and 17 were registered at the learning centres. The project helped 40 girls and 60 boys move onto public schools in Thailand. Between 2015 and 2017, a total of 944 children have registered at the learning centres and 212 children have moved onto public schools.
Amfori BSCI training for suppliers continued in 2017: there were two general training sessions and one advanced-level training in Bangkok. A total of 25 suppliers from the Thai fishing industry took part in the trainings. The general training covered the amfori BSCI Code of Conduct, UN and ILO human rights and labour conventions, and the Thailand national labour protection legislation. The advanced training gave the suppliers tools for their own promotion and supervision of social issues. Supplier training will continue in 2018.
Read more about our collaboration with Plan.
Kesko and the Swedish ICA have worked together on sourcing via ICA Global Sourcing (IGS) in Asia since 2016. The cooperation concentrates on the sourcing of home and speciality goods sold at K-food stores. Assuring the social responsibility of suppliers’ factories and securing product quality form a central part of the purchasing process. IGS has offices in China, Hong Kong, Vietnam, Bangladesh and India. The local IGS corporate responsibility team is, together with Kesko, in charge of assuring the social responsibility of factories.
In 2017, responsibility training was arranged for IGS suppliers in Hangzhou, China and Delhi, India. The training covered Kesko’s social responsibility requirements for suppliers, the factory auditing process, and requirements related to product quality and safety. Questions from the suppliers concerning responsibility were also addressed.
24 suppliers took part in the Hangzhou training and 23 suppliers in the Delhi training. Representatives of IGS and Kesko’s responsibility unit were also present.
Read more about our cooperation with IGS.
Kesko’s objective is to identify the entire supply chain of products and to assure the social responsibility of their ingredients. The work to analyse the origins of the ingredients of Pirkka and K-Menu food products and related risk analysis began in 2015 and continued in 2017.
The responsibility of ingredients used in 150 new Pirkka and K-Menu food products was assessed in 2017 using our own risk analysis tool. Based on the risk analysis, 20 products contained ingredients which require further investigation in terms of the social responsibility of the producer. Between 2015 and 2017, a risk analysis has been conducted on the ingredients of 2,233 own brand food products.
In summer 2017, Kesko’s risk analysis of ingredients in its own brand products received recognition at the annual meeting of amfori (previously Foreign Trade Association, FTA). Thanks to the risk analysis, Kesko was elected among the top three finalists of the FTA member of the year award.
The study of the ingredients of own brand food products will continue in 2018. Based on the results, we intend to decide upon ingredient-specific follow-up measures to promote the sustainability of the supply chains of Pirkka and K-Menu products.
The activities of the Product Research Unit of Kesko’s grocery trade include assessing the impacts of products on health and safety. Manufacturers of Kesko’s own brand food products must have international certifications that assure product safety. The standards approved by Kesko’s grocery trade include: BRC, IFS, FSSC 22000 and GlobalGAP. In 2017, the total number of certified suppliers was 581 (561 in 2016). This number also includes old audits conducted according to Kesko’s grocery trade’s own audit guidelines.
A total of 7,350 product samples were analysed (7,770 in 2016). Most of them were related to the product development of own brands. A total of 2,395 own control samples were analysed (2016: 2,387).
When developing own brand products, Kesko’s grocery trade pays special attention, in line with its strategy, to the health aspects of the products.
As proposed in The EC White Paper on Nutrition, Overweight and Obesity-related Health Issues, sugar, saturated fat and salt were reduced in more than 150 Pirkka products during the period 2007–2013. The health aspects of new Pirkka products are taken into account at the product development stage.
The National Nutrition Council of Finland published its nutrition commitment operating model in June 2017. The nutrition commitment is the Finnish contribution to the EU Roadmap for Action on Food Product Improvement framework’s reformulation programme.
By 2020, at least 400 K-food stores will have dedicated ‘veggie shelves’ for vegetable protein products. In 2017, some 250 K-food stores had a veggie shelf.
We will organise at least 250 vegetable-related campaigns at K-food stores each year (2018–2020). In 2017, K-food store chains organised 240 vegetable campaigns.
We will add at least 50 new fruit or vegetable products to our selections by 2020. In 2017, we added 55 new fruit and vegetable products to our selections.
In 2016 and 2017, a study on the likelihood of food fraud was conducted and a fraud control plan was prepared (Vulnerability Assessment and Critical Control Points, VACCP). 77 threats of fraud were identified. Six of them were assessed to be critical control points, which are analytically monitored by fraud control on a regular basis, in addition to normal product and supplier assurances.
In 2017, there were 140 product recalls in Kesko’s grocery trade (99 in 2016). Of these, 33 were Kesko’s grocery trade’s own brand products (26 in 2016). In the other cases, Product Research assisted the manufacturers in recalls. There were 4 public recalls involving a potential health hazard resulting from product flaws or defects in Kesko’s grocery trade’s own brand products in 2017 (2 in 2016).
K-Rauta had two (1 in 2016) and Onninen three (4 in 2016) recalls in 2017. Konekesko had one public recall in 2017 (0 in 2016), which constituted the only public recall for the building and technical trade division that year.
In 2017, there were no legal proceedings or fines related to product health or safety.
The name and location of the manufacturer are indicated on all Finnish Pirkka products and on all K-Menu products. Foreign Pirkka products carry the name of the country of manufacture. Country of origin is indicated on all own brand products of K-Citymarket and Kesko’s building and technical trade.
The country of origin of meat is disclosed in accordance with regulation (EU) No 1337/2013. As ingredients, meat and dairy are labelled in accordance with the national decree MMM 218/2017.
In addition to statutory package labelling, voluntary labelling can be added to inform the consumer of matters related to corporate responsibility. Such labelling may include organic labels and ecolabelling, as well as labelling indicating social responsibility.
The own brand products of Kesko’s grocery trade bear material symbols on their packaging. These symbols help and guide consumers to recycle packaging materials. Chemicals that are hazardous to the environment have warning labelling in accordance with the CLP regulation.
In September 2015, the California Air Resources Board (CARB) and the Environmental Protection Agency (EPA) uncovered engine software that adjusted nitrogen oxides in Volkswagen Group’s type EA 189 cars with 1.2 litre, 1.6 litre and 2.0 litre diesel engines.
As far as the brands represented by VV-Auto are concerned, the number of such cars in Finland was identified at 53,000. The case applies to all of the brands imported by VV-Auto: Volkswagen, Audi, SEAT and Volkswagen Commercial Vehicles.
The recalls and repairs of Volkswagen, Audi and SEAT 2.0, 1.6 and 1.2 litre EA 189 diesel cars (SEAT service campaign) proceeded at the planned schedule in Finland in 2017.
By the end of the year, a software update was available for all of the approximately 53,000 cars, and some 47,000 cars (88.4%) had been fully updated.
After the corrective measures, the cars meet the requirements of the EU5 emissions standard. The corrective measures do not affect the car's fuel consumption, engine power, CO2 emissions, driving behaviour or acoustics.
On the product labelling of its own brand products and imports, Kesko complies with EU and Finnish legislation.
In 2017, there were 39 product recalls resulting from defective product labelling (24 in 2016), of which 9 (7 in 2016) were Kesko’s own brand products.
Responsible purchasing is guided by Kesko's purchasing principles.
The principles are based on national labour protection legislation and corresponding conventions of the International Labour Organization (ILO), which are applied when national legislation does not correspond to the same level. In its operations, Kesko pays special attention to human rights issues and working conditions in its supply chain and, in monitoring these, primarily focuses on suppliers in high-risk countries. In accordance with the amfori BSCI (Business Social Compliance Initiative), high-risk countries are countries and areas where there is a risk of human rights and workers' rights violations. The classification is based on the World Bank's Worldwide Governance Indicators.
Kesko and K Group stores are responsible to the products' end-users for ensuring that the products comply with all the requirements of Finnish and EU legislation, are safe for users and meet quality and other promises. Kesko's product labelling and marketing communications comply with legislative requirements and the recommendations of authorities.
Kesko and K Group stores want to support customers in making sustainable choices and offer a wide selection of products with responsibility criteria.
Kesko's policy on chemicals applies to home textiles, clothing, leather goods, shoes and upholstered furniture. Based on EU and Finnish legislation, it lists the chemicals which are prohibited or the quantity of which is restricted in the products supplied to Kesko. In addition, for substances of very high concern, Kesko sets restrictions that are stricter than those set in legislation.
Kesko’s plastics policy promotes recycling and the reuse of plastics. The objective of the operating model is to prevent plastics from ending up in bodies of water and elsewhere in the natural environment.
Various product group-specific responsibility policies and statements, such as the palm oil policy, the fish and shellfish statement, the timber and paper policy, and the stand on the sandblasting of jeans, have been prepared to support purchasing operations.
* Conditional approval. A maximum of two IGS audits are approved after which the supplier must adopt amfori BSCI audit or some other approved audit conducted by an independent party.
Supplier agreements require that suppliers and service provides comply with the principles of the K Code of Conduct and the BSCI Code of Conduct.
Kesko's grocery trade requires that the manufacturers and producers of its own-brand products have an international food safety certification. Kesko’s grocery trade approves the following audit procedures: BRC, IFS, ISO/FSSC 22000, SQF1000/2000 and GlobalGAP, IP basic certification for vegetables, or IP-Sigill.
The Product Research Unit's laboratory monitors the quality of products sold by K-food stores and K-Citymarket hypermarkets. It is a testing laboratory T251 which has been accredited by the FINAS accreditation services and approved to comply with the SFS-EN ISO/IEC 17025 standard.
The assessment of a store's responsible operations comprises the store's annual self-assessment, the criteria defined in the store's quality system and a responsibility audit performed by an external party on a specified sample. The auditor reports the results to the store and to Kesko.
Responsible choices are communicated to customers in stores according to the K-responsibility concept within-store communications, such as shelf labelling and product labelling. The selection and marketing policies of organic, eco-labelled and Fairtrade certified products are included in K-food stores' chain concepts. The K responsibility concept is in use in K-food stores and K-Rauta stores.
In 2016, Kesko joined the amfori BSCI Sustainable Wine Programme programme. The programme focuses on improving the social responsibility and environmental responsibility of wine production and its goal is to increase transparency and traceability in wine production.
In 2016, Kesko became a member of the Centre for Child Rights and Corporate Social Responsibility (CCR CSR) based in China. The objective of CCR CSR is to prevent and reduce child labour, improve the status of young workers at factories, and make the daily life of migrant worker parents easier. Kesko participates in the Virtual Working Group of the organisation. | 2019-04-25T10:39:49Z | https://annualreport2017.kesko.fi/sustainability/responsibility-programme/responsible-purchasing-and-sustainable-selections/ |
The Los Angeles Refinery is composed of two linked facilities located roughly five miles apart in Carson and Wilmington, Calif., about 15 miles southeast of Los Angeles International Airport. Carson serves as the front end of the refinery by processing crude oil, and Wilmington serves as the back end by upgrading the intermediate products to finished products. The refinery has a crude oil processing capacity of 139 MBD and processes mainly heavy, high-sulfur crude oil. It receives domestic crude oil via pipeline from California and both foreign and domestic crude oil by tanker through a third-party terminal in the Port of Long Beach. The refinery produces a high percentage of transportation fuels, such as gasoline, diesel fuel and jet fuel. Other products include fuel-grade petroleum coke. The refinery produces California Air Resources Board (CARB)-grade gasoline using ethanol to meet government-mandated oxygenate requirements. Refined products are distributed to customers in California, Nevada and Arizona by pipeline and truck.
Jesse Hardman published an interesting article in High Country News on March 7, 2018 about the 10-square-mile South Los Angeles community in close proximity to three oil refineries including Phillips 66 Wilmington Refinery, that has the dubious distinction of having some of the worst air quality in a city that already has the country’s worst ozone levels. A 2013 California state cap-and-trade law offered incentives for big polluters to become greener. But one study suggests that the program has inadvertently made air quality worse in places close to refineries and power plants, like Wilmington. Here’s how it works: Under the law, big polluters like oil refineries and power plants must buy permits that allow them to emit greenhouse gases. The number of permits available is reduced year by year, in an effort to gradually bring down the state’s overall carbon emissions. But rather than lower their emissions to meet the program’s targets, oil companies like Tesoro, which operates in Wilmington, choose to buy up other companies’ allowances, or pay to offset the damage they cause elsewhere, by planting trees in Alaska, for example. This gives them free license to continue polluting in their immediate areas.
In Wilmington, oil companies start their PR push early. Twenty-four-year-old activist Ashley Hernández remembers getting free backpacks and pencils with oil company logos as a kid. “You get popcorn from them every Halloween,” she said. For more than six decades, Phillips 66 has co-opted that holiday, painting one of its 3-million-gallon gas storage tanks orange to create an enormous grinning jack-o-lantern — “Smilin’Jack” — that towers over the community. Employees in bright yellow safety vests stand beneath chemical tanks and smokestacks, giving local families bags of caramel corn and plastic balls marked with the Phillips 66 logo. “They do community events, they’ll fund carnivals, they’ll do youth trips. They do it with an aim to silence them,” said Hernández, noting the hold that local industries have over her working-class parents, originally from El Salvador. After decades spent making a life in Wilmington, Hernández and her family would find it hard to just leave.
Sylvia Arredondo is at the helm of a growing movement made up mostly of women of color who grew up here but left to get an education, and then later returned to battle the industries that are poisoning their families. Their fight is a legal and political challenge to oil companies and local air-quality regulatory bodies. But it’s also an exercise in civic engagement, one that even Wilmington’s older generations have joined, despite their fear of being deported or losing their jobs at the local oil facilities. As a child, Arredondo attended classes in a wealthier district, but returned to Wilmington in time for high school. By then, she knew that her community’s poor air quality was something wealthier neighborhoods would never stand for. One of her college textbooks called her city a “toxic hotspot.” “Before that class, I didn’t know what environmental justice was,” Arredondo said. Now she fights for it as the civic engagement coordinator for the nonprofit Communities for a Better Environment, and as the president of Wilmington’s neighborhood council.
In answer to a question from Neil Mehta, Kevin Mitchell told analysts during the 2016 first quarter earnings conference call on April 29, 2016 that although Phillips has talked about divestitureof its California refineries in the past at this point Phillips will just hold on to them at this point in time. "California we talked about a lot the hold cost or the option value is really not much there is not a lot of capital in front of us in California last few year margins have been very good in California so it's a net cash contributor," said Mitchell. "And you think about could you sell asset probably but could we did good value for it, probably not and so I think we just hold it at this point in time they're good assets, they're probably mid back in terms of where they set their cost structure, but given the option value to keep, I think it'll just hang on."
Phillips reported flaring at its Wilmington, California refinery, according to a filing with the California Emergency Management Agency.
Phillips reported a flaring event at its Wilmington, California refinery, according to a filing with the California Emergency Management Agency. The refinery has two linked facilities about five miles apart in Carson and Wilmington. The former processes crude oil while the latter upgrades the products.
Phillips reported unplanned flaring at its Los Angeles-area refinery in Wilmington, California, according to a filing with state pollution regulators.
Phillips reported flaring at Wilmington Refinery according to a report from Reuters on August 30, 2015.
Phillips reported unplanned flaring at Wilmington Refinery according to a report from Reuters on July 15, 2015.
Phillips reported unplanned flaring at Wilmington Refinery according to a report from Reuters on June 24, 2015.
Nasdq reported on June 8, 2015 that planned maintenance is underway at the Wilmington Refinery. Phillips has planned maintenance underway at five of its worldwide refineries: Humber Refinery, Wilmington Refinery, Ponca City Refinery, Wood River Refinery, and Whitegate Refinery. Phillips did not indicate whether fuel output may be impacted, and representatives from Phillips 66 weren't immediately available to comment.
In answer to a question from Paul Cheng of Barclays on whether management views California as a core part Phillips long-term portfolio, Greg Garland announced during the 2015 first quarter earnings conference call that Phillips' management thinks California is really a challenged place to do business. "And we think we have kind of - we have good assets, but we think they’re average you have crossed that portfolio. And so we’ll continue to work the thick strategy around the West Coast as we look at more optionality around getting the advantage crude into those assets so kind of cost structure, et cetera, around those assets. But I would say, there’s nothing that’s changed our fundamental view on West Coast assets today."
Phillips 66 reported a breakdown and emissions at Wilmington Refinery on March 25, 2015.
Phillips reported unplanned flaring due to a breakdown at its Los Angeles-area refinery in Wilmington, California, according to a filing with the South Coast Air Quality Management District.
The Daily Breeze reported on January 29, 2015 that heavy black smoke billowed across the Harbor Area and South Bay from a flare at Phillips 66’s Wilmington oil refinery after an unspecified emergency interrupted the steam system. Phillips 66 spokeswoman Janet Grothe said the South Coast Air Quality Management District was notified of the incident. Refinery tests found that the flares prevented any harmful air emissions from reaching the surrounding community. “Air monitoring has indicated no off-site impact and the refinery continues to operate,” Grothe said.
Phillips 66 reported flaring at Los Angeles Refinery on January 23, 2015.
Phillips reported a flaring event due to unknown reasons at its Wilmington, California refinery, according to a filing with the California Emergency Management Agency.
Phillips reported a power failure at its Los Angeles area refinery in Wilmington, California, on Thursday,according to a filing with the California Emergency Management Agency. The event led to the release of sulfur dioxide vapors, the filing said.
Phillips 66 reported flaring at its Wilmington, California refinery, according to a filing with the California Emergency Management Agency. The Phillips 66 refinery has two linked facilities about 5 miles apart in Carson and Wilmington.
Phillips reported a flaring event at its refinery in Wilmington, California, caused the release of chemical substance, according to a filing with the California Emergency Management Agency. The refinery has two linked facilities about five miles apart in Carson and Wilmington. The former processes crude oil while the latter upgrades the products.
Zamná Ávila reported at Random Length News on July 8, 2014 that Representative Janice Hahn sent a letter to California Fire Marshal Tonya Hoover with regards to the Phillips 66 violations in a recent oil spill requesting an update on the office’s progress in citing Phillips 66 for federal law violations. “The 1,200 gallon oil spill in Wilmington placed the health of hundreds in danger due to a failure to follow federal law regarding pipeline safety,” Hahn wrote. “The families of Wilmington remain uncompensated for the destruction of their property, and the federal government is unable to act until your office cites the company for wrongdoing.” Hahn expressed her disappointment that Phillips 66 had not yet been cited.
Phillips reported release of anhydrous ammonia at its Los Angeles-area refinery in Wilmington, California, on Monday, according to a filing with state pollution regulators. The filing did not specify whether the event had an impact on production.
Phillips 66 reported flaring at its Los Angeles-area refinery in Wilmington, California, on Wednesday, according to a filing with state pollution regulators. The filing did not specify whether the malfunction caused any production impact.
Phillips 66 reported an unspecified material combustion due to unknown reasons at its Los Angeles-area refinery in Wilmington, California, on Wednesday, according to a filing with state pollution regulators. The filing did not specify whether the malfunction caused any production impact.
In answer to a question from Bradley Olsen of Tudor Pickering Holt & Co. Securities, Inc. Garland told analysts at the third quarter earnings conference on October 30, 2013 that the option value to hold onto West Coast Refineries at Los Angeles and San Francisco is not high. "I think in any time we look at an asset and we’re going to let an asset go, if we are going to get value for PSX shareholders, it has to be tax efficient in terms of the transaction itself. And we look at these assets East and West Coast, we’ll put in advantaged crudes, so that we think we can make them better and drive more value ultimately and optionality that thing, we look at these assets both east and west, we don’t have to put a lot of money into these assets," said Garland. "The option value to hold on is not high for us and again they are generating positive cash or generating maybe single-digit returns, but they are adding value to the portfolio overall. So we don’t feel like there it is stressed assets, we just have to move today. So we’ll hold them for some option value. We’ll consider multiple ways to create values with these assets, but in the mean time we’re going to work to make them better."
Bloomberg reported on August 12, 2013 that the Carson Refinery refinery reported flaring at 12:40 a.m. local time, according to a notice to state regulators. The same part of the refinery reported flaring on July 29.
Bloomberg reported on August 12, 2013 that the Carson Refinery refinery reported flaring on July 29, 2013.
Phillips 66 reported unplanned flaring at its Wilmington refinery began the morning of June 7 and continued until late night on June 8, according to a filing with the South Coast Air Quality Management District.
Fox Business reported on May 10, 2013 that Phillips plans to flare sulfur oxide and other gases from May 12 until May 26, 2013 according to a filing with the South Coast Air Quality Management District. A Phillips 66 spokesman declined to comment on the refinery's activities.
Phillips reported unplanned flaring due to a breakdown at its Wilmington refinery, according to a filing with the South Coast Air Quality Management District.
Fox Business reported on April 4, 2013 that a small fire in a coking unit at the Wilmington Refinery was put out quickly and caused no injuries.
Bloomberg reported on March 18, 2013 that Phillips shut an isomerization unit on March 18, 2013 at their Los Angeles Refinery after discovering a leak, a person with direct knowledge of the work said. The unit, which makes unleaded gasoline components, may remain down until tomorrow for line repairs, the person said.
Reuters reported on February 5, 201 that Tim Taylor, Phillips executive vice president for commercial, marketing, transportation and business development, told the Credit Suisse energy conference that Phillips has begun moving cut-price Canadian crude to its California refineries at Los Angeles and San Francisco via rail. "We're beginning to deliver Canadian crude to our California refineries by rail," said Taylor. Garland told Reuters on January 30, 2013 that Phillips was looking at coiled tube cars that are suited to bitumen in Canada's heavy oil deposits that must be heated in order to flow.
Reuters reports that Greg Garland told investors on January 30, 2013 at the 4th quarter earnings conference that Phillips did not rule out a sale of Phillips two California refineries, one at Los Angeles and one at San Francisco, given challenges with state regulatory requirements and high costs. "We're studying any and all options for California in terms of where do we go long-term in the business," said Garland. "We are doing everything we can to improve it. I don't feel it's a distressed asset. We want to take our time and be thoughtful."
Garland told analysts that Phillips 66 was looking at getting railcars capable of hauling even cheaper Canadian heavy crude to the company's refineries in California. However, he said resistance to such a move was likely. A 2006 California law requiring sharp cuts in emissions has a component that would require refineries to run crudes produced in environmentally friendly ways. Canadian crude production comes with high emissions. Plus, California has the huge Monterey shale, estimated by the U.S. government to have more reserves than the prolific Eagle Ford in Texas or Bakken in North Dakota. But output has been spotty with geology that differs from those other plays. Given those uncertainties, Garland told Reuters in an interview that for the time being, Phillips 66 will focus on improving the California refineries' single-digit returns while studying a possible sale, joint venture or spinoff. "The option value to hold California is zero. It really costs us nothing."
Greg Garland told analysts at the 4th quarter earnings conference on January 30, 2013 that Phillips utilization rate was negatively impacted by the turnaround at the Los Angeles Refinery as well as turnarounds at Wood River and Borger refineries, and Hurricane Sandy related unplanned downtime at the Bayway refinery. "In refining and marketing, our refining realized margin was $13.67 per barrel with a global crude utilization rate of 91% and a clean product yield of 83%," said Garland. "Lower volumes negatively impacted earnings by $42 million, mainly in the Atlantic basin and the Central Corridor regions, reflecting unplanned downtime due to Hurricane Sandy and plant turnarounds."
Bloomberg reported on November 16, 2012 that planned flaring will take place at its Wilmington Refinery from November 22 to December 4, 2012. “Planned maintenance is under way” at the refinery, Dennis Nuss, a spokesman at Phillips 66’s headquarters in Houston, said by e-mail.
Nasdaq reported on November 13, 2012 that planned flaring will take place at its Carson Refinery between November 10 and 23, 2012. The flaring isn't associated with equipment breakdown, the filing to government regulators said.
Tim Taylor was asked at the Phillips Third Quarter Earnings Conference on October 31, 2012 if Phillips' position with its two major refineries in California was sufficiently advantaged to warrant continued participation and replied that when Phillips looks at the West Coast, it's been one of the more challenged markets from a recovery standpoint post-recession. "In California, specifically, it's a tough regulatory environment, as well, so costs are higher. And there is a lot of potential additional costs as new regulations come into effect. That said, it's still a very significant market and we think it's really important to look at how can we get some of these crudes out of the middle part of the country into the West Coast, particularly California. So we're working hard on that to try and change that. The comment I'd make in Washington is that that's got a natural access to the Bakken in North Dakota and Canadian crudes. We separate the Washington piece from the California piece that way. But everyone's working hard to look at some crude solutions for the West Coast to improve its competitive position."
"I think we look at the market and say demand continues to struggle out there, as well, post-recession," added Taylor. "And then I think you look more fundamentally at the operating environment and the costs associated with particularly the environmental regulations. And we think that's going to continue to keep pressure on operations and operating costs out there. So, yes, I would say that from a California perspective it is one of the more challenged parts of our portfolio in terms of the basic value equation. So that's why we're still looking at the crude side of it. And continuing to stay abreast and on top of what it's going to take to comply with things like AB32 to really maintain your operations out there."
Asked if California would still remain part of Phillips' core portfolio Taylor replied that right now California is in the lower performing part of Phillips portfolio. "So I think that if our assessment would become that it's going to be challenged for some period of time, we've either got to find a way to improve that operation or find some other way to deal with that."
Fox Business reported on October 24, 2012 that a few units at Phillips' Wilmington Refinery were restarted on October 23, 2012 after experiencing an external power dip from the Los Angeles Department of Water and Power. The Refinery also reported an unplanned flaring event to the South Coast Air Quality Management District.
The Tulsa World reported on October 6, 2012 that according to two people with knowledge of Phillips Los Angles Refinery maintenance schedule, Phillips 66 has delayed work at its Los Angeles refinery to cash in on record profit margins in California. A six-week maintenance turnaround on the hydrocracker, which makes high-octane gasoline and other lighter oil products, has been put off until at least Oct. 16 from a previous Oct. 9 start date, said the people, who asked not to be identified because the information wasn't public. "With crack spreads this high, it's kind of expected that all will make as much fuel as possible to cash in on the spreads," Tim Hamilton, executive director of the Automotive United Trades Organization. A Phillips 66 spokesman at the company's headquarters in Houston, declined to comment on maintenance plans at the 139,000-barrel-a-day Los Angeles plant. "I can tell you there is no planned maintenance work currently at our Los Angeles refinery," said Rick Johnson.
The Contra Costa Times reported on September 24, 2012 that air quality regulators are investigating whether a burnoff of petroleum products at the Phillips 66 oil refinery in Wilmington that lasted for about six hours after a power outage caused a sudden shutdown of all refinery operations could have been avoided. Black smoke billowing out of the refinery's flare could be seen for miles. The South Coast Air Quality Management District received 125 complaints about the smoke that day. Two days later, more complaints streamed in over a chemical odor surrounding the refinery. AQMD spokesman Sam Atwood said investigators believe the smell came from vapors that had leaked from a petroleum storage tank. The refinery was issued a violation last week due to the odors, and will have to either pay a fine or invest in something that benefits the local environment, Atwood said.
Nasdaq reported on September 21, 2012 that record heat and a power outage on September 15, 2012 forced a facility-wide shutdown at Phillips 66's Los Angeles refinery but that several units have been brought back online and all units are seen back by the end of the week. Nasdaq reported on September 26, 2012 that production resumed on September 21, 2012 after record heat and a power outage on September 15 forced a facility-wide shutdown.
Nasdaq reported on July 27, 2012 that maintenace work was completed on July 19, 2012 and that planned flaring took place at the Wilmington Refinery from July 22 to July 25, 2012 according to the South Coast Air Quality Management District.
Reuters reported a planned flaring at the Wilmington Refinery on July 12, 2012.
Reuters reported on July 8, 2012 that the Wilmington Refinery was in a planned overhaul which shut the hydrogen plant, according to a notice the refinery filed with California pollution regulators. The work triggered flaring at the refinery and the release of sulfur dioxide, according to the notice filed with the California Emergency Management Agency.
Reuters reported a flaring at the Wilmington Refinery on July 3, 2012.
Reuters reported an upset in the AlkyUnit at the Wilmington Refinery on June 29, 2012. Phillips 66 reported flaring due to an alkylation unit upset at its Wilmington refinery, according to a filing with the California Emergency Management Agency. Operators had secured the release and flaring had stopped at the time of the filing.
Nasdaq reported on June 26, 2012 that a sulfur recovery plant at Phillips 66's Wilmington refinery shut down unexpectedly on June 26, causing a flaring event, according to a California Emergency Management Agency hazardous materials spill report.
Reuters reported on May 8, 2012 that Phillips 66 finished unspecified planned work at its Los Angeles-area refinery that had begun in April, 2012. The refinery has two linked facilities in the Los Angeles-area: one in Carson that processes crude oil and another five miles away in Wilmington that upgrades the products. Bloomberg Businessweek reported on May 3, 2012 that the Los Angeles refinery was scheduled to flare gases through May 3 as part of planned maintenance.
↑ High Country News. "A new generation of activists, born next to an oil refinery" by Jesse Hardman. March 7, 2018.
↑ Nasdaq. "Phillips 66 Says Planned Maintenance Underway at Five Refineries" June 8, 2015.
↑ Seeking Alpha. "Phillips 66's (PSX) CEO Greg Garland on Q1 2015 Results - Earnings Call Transcript" April 30, 2015.
↑ Daily Breeze. "Heavy black smoke spews from flare at Phillips 66 refinery in Wilmington" by Sandy Mazza. January 29, 2015.
↑ Random Length News. "Hahn Sends Letter to State Fire Marshal about Phillips 66 Violations" by Zamná Ávila. July 8, 2014.
↑ Bloomberg. "Los Angeles Gasoline Strengthens as Carson Refinery Flares Gases" by Eliot Caroom. August 12, 2013.
↑ Fox Business. "Phillips 66 Plans Gas Flaring at Wilmington, Calif., Refinery-Filing" by Ben Lefebre. May 10, 2013.
↑ Fox Business. "Refinery Status: Leak, Fire at LyondellBasell -2-" April 4, 2013.
↑ Bloomberg. "Los Angeles Gasoline Advances as Phillips 66, Exxon Repair Units" March 18, 2013.
↑ Reuters. "UPDATE 1-Phillips 66 moving some Canadian crude to Calif. refineries" by Kristen Hays. February 5, 2013.
↑ Reuters. "Phillips 66 mulling options for California refineries" by Kristen Hays.
↑ Bloomberg. "Los Angeles Gasoline Rises as Phillips 66 Refinery Plans Flaring" November 26, 2012.
↑ Nasdaq. "Refinery Status: Unit Upset At Phillips 66/Cenovus Refinery In Wood River, Illinois" November 13, 2012.
↑ Fox News. "Phillips 66 Restarting Units at California Refinery-Spokesman" October 24, 2012.
↑ Tulsa World. "Phillips 66 delaying work on refinery; sources allege cash-in on gas-price surge" by Lynn Doan. October 6, 2012.
↑ Contra Costa Times. "Air pollution regulators probe Phillips 66 refinery in Wilmington" by Sandy Mazza. September 24, 2012.
↑ Nasdaq. "Refinery Status: Some Units Restarted At Phillips 66 Los Angeles Refinery" September 21, 2012.
↑ Nasdaq. "Refinery Status: Valve Leak Causes Flaring At Phillips 66 Rodeo, Calif., Refinery" July 27, 2012.
↑ Reuters. "Phillips LA refinery performing planned work-filing" July 8, 2012.
↑ Nasdaq. "Sulfur Recovery Plant Down at Phillips 66 Wilmington, Calif., Refinery" June 26, 2012.
↑ Reuters. "Planned work done at Los Angeles-area refinery -Phillips 66" May 8, 2012.
↑ Bloomberg Businessweek. "San Francisco Gasoline Rises to Six-Month High on Work" by Lynn Doan. May 3, 2012. | 2019-04-20T22:35:32Z | http://researchandideas.com/index.php?title=Phillips_66:_Los_Angeles_Refinery |
Argentina is one of the giants among national football teams and the population is known for its immense football passion; Jonathan Wilson writes in Angels with Dirty Faces: “No country so intellectualizes its soccer, so loves its theories and its myths”. When talking of Argentina in context of football it impossible to leapfrog Diego Maradona and Lionel Messi, two of the greatest football players of all time. But the history goes further back and in earlier periods other stars has redeemed Argentine football such as Manuel Seoane, Antonio Sastre, Adolfo Pedernera and Omar Sívori. The team is also known as the Albiceleste, from the colors of the shirt.
Jorge Burruchaga celebrating Argentine triumph in 1986 World Cup final.
Argentina would win its first Campeonato Sudamericano title in 1921 and three more victories would follow in the same decade. It was obvious at the time that Argentina could compete with the best teams in Europe; during a tour on the continent in 1925, Argentina won 16 out of 19 games.
Before the establishment of the World Cup, the Olympic Games yielded as the most prestigious international tournament. Argentina participated in the tournament for the first time in 1928. The team run through the tournament in superior style, winning by a combined score of 23-5 before facing the big rival Uruguay in the final. The game finished 1-1, which led to a rematch three days later, which was won by Uruguay 2 to 1.
Argentina team of the 1928 Olympic games.
In the first World Cup, played in Uruguay, Argentina would be one of the 13 participating teams. They won their group ahead of Chile, France and Mexico and after destroying USA by 6-1 in the semi-finals they would once again meet Uruguay in an immortal final.
This was probably the biggest game so far in Argentine football and over 10,000 Argentine supporters went to Montevideo to see the match at the Estadio Centenario. Uruguay would take the lead, but two goals from Carlos Peucelle and Guillermo Stábile would put Argentina ahead. Nevertheless, the outcome would once again be Argentine frustration.
Uruguay would lose its dominance in the game, but the role as the super power in football wouldn’t be taken by Argentina. Between the years 1934 and 1962 the national team would either produce rather weak performances or not participate at all in the World Cup. This was much to the fact that Argentina didn’t use professional players in the national team until 1962.
The squad that participated in the second World Cup, held in Italy, was especially weak and it was eliminated from the tournament in the first game after a loss to Sweden.
After 1934, Argentina would withdraw from all World Cup tournaments (partly because of a dispute with FIFA, partly because of political protectionism) until 1958. The team of 1958 was South American champions, but unfortunately, it would be hashed by Italian purchasers who attracted players as Omar Sivori, Angelillo and Juan Maschio over to Europe. Above that, the River Plates’ Roberto Zárate was injured. Argentina had dominated South American football for a long time, but the team that represented the country in 1958 World Cup would return home from Sweden after a fiasco – they finished fourth and last in their group including a 1-6 humiliation against Czechoslovakia in the third match.
Yet, great performances in the Campeonato Sudamericano (South American Championships) continued. After losing another final to Uruguay in 1935, the Albiceleste would win the Campeonato Sudamericano after a playoff against Brazil.
In the 1940s, Argentina won four of the six editions of the Campeonato Sudamericano (in 1949, AFA didn’t send a team), and they would continue to be one of the best performing sides on the continent the following decade. One of the best tournament performances by an Argentine national side came in the 1957 Campeonato Sudamericano. They went undefeated through the tournament until they lose in the last game – against the rest of the continent (i.e. Brazil, Colombia, Chile, Ecuador, Peru and Uruguay) they achieved a combined score of 26-6.
After the 1958 meltdown in Sweden a new coaching staff and with Victorio Spinetto as head coach were installed, and almost an entirely new player squad was constructed. Once again, Argentina performed at top when they played in on home soil in Campeonato Sudamericano – they finished first, one point ahead of Brazil.
Although blamed by some for adopting anti-fútbol, Victorio Spinetto, gave the team a new tactical direction. When Argentina played the next world cup, Spinneto, had however, already been replaced by Juan Carlos Lorenzo, also him associated with pragmatic and defensive play.
Jonathan Wilson writes in Angels with Dirty Faces that “in the 1960s Argentinian soccer became tougher and more cynical, the outlook more defensive”, and here also referring to the national club football.
Argentina did qualify to the 1962 World Cup in Chile. It would be a triumph for one South American side, but not Argentina. Brazil would win the tournament whereas Argentina failed to progress from the group with a very small margin to England.
For years later, Argentina did qualify together with three other Comnebol members to participate in 1966 World Cup in England. The preparations had been disturbed by the military coup that happened just a month before the final tournament and by the fact that a new coach, Juan Carlos Lorenzo, suddenly had been appointed just weeks before the first match in England. The players didn’t get along with Lorenzo concerning the playing system which was further damaging. Also, the players were surprised by discovering that the ball to be used in the tournament was not the same as the model they had been used in the training.
Argentina would reach the knockout stage, but once again England would be the reason for elimination. The Argentine team, playing at Wembley Stadium in front of over 90,000 didn’t manage to score and England would win the match, after a late goal by Geoff Hurst, and later the whole tournament.
Things got from worse to worse. Juan Carlos Lorenzo left his post shortly after the World Cup in England and a period followed with many coaches lasting only short periods. The results on the field were weak and for the first time Argentina did not qualify for a World Cup.
Adolfo Pedernera, one of the best Argentine players through history, did surely not last long at the job as head coach after that low point. Juan José Pizzuti, Omar Sívori and Vladislao Cap would follow as engaged in the same position.
Argentina qualified for the 1974 World Cup in Germany. After some half-convincing games, they would advance to the second round in the tournament together with Poland from Group 4. By this edition of the World Cup, the format had changed and a second group phase preceded the knockout stage. Argentina didn’t succeed to win any game in their group with the Netherlands, Brazil and East Germany.
The Campeonato Sudamericano had come to a halt after 1967, but was renewed in 1975 and rebranded to Copa América. The first edition of Copa América didn’t become a new success to Argentina that had been drawn in the same group as Brazil. Both Brazil and Argentina won comfortable against Venezuela (in one of the matches Argentina won 11-0, which is their second biggest win ever – the biggest was 12-0 against Ecuador in 1942), but Brazil would win 2-1 and 1-0 in the matches versus Argentina.
In the following year the president Isabel Perón was removed from the power and general Jorge Rafael Videla took over as a result of a military coup. The political situation in Argentine had been unstable even before the coup in 1976 – in 1930 came the first military coup and many governments up to 1976 had been established with the military involved in one way or another. But the 1976 coup have remained the most notorious in Argentine history and it was the beginning of a dark period in the country. Approximately 30,000 people that didn’t support the regime was “disappeared” during this period.
Bad timing had ensured that Argentine stood as host for the 1978 World Cup. The construction and restoration of stadiums was far behind schedule, but the process did by time accelerate and was ready when the tournament was about to start. That didn’t stop the World Cup in Argentina from being a most controversial one and the players of the home national squad faced a moral dilemma. Nevertheless, it would turn out to be the greatest success so far for the Argentine football national team.
Vladislao Cap had lost his job as head coach for the national team after the 1974 World Cup and Luis Menotti took over. Menotti would remain at the post for eight years and became one of the most remembered AFA coaches. His philosophy of football would set marks on Argentinian football for a long time and he would also be the first to lead the team to a world champion title.
One of the first things Menotti did was to change the preparation routines for a bigger tournament. He made the national team a bigger priority and expanded the period of preparations. More players were tried before a squad were decided for a World Cup than had been the case before. One of the candidates for the Argentina XI at that time was the 17-years old Diego Maradona, who has made his debut in 1977. In the end, Maradona was left outside the 1978 World Cup squad, but the young prodigy would instead be the star in the Argentina U20 that won the 1979 FIFA World Youth Championship.
The squad Menotti had put together for the 1978 World Cup tournament consisted exclusively of players based in South America except the Valencia player Mario Kempes.
The much-awaited tournament took off and it looked great for Argentina after two victories against Hungary and France. Italy waited in the last group match and now the drawback came, AFA were defeated with 1-0. Nevertheless, Argentina advanced to the second round and were placed in the same group as Brazil, Peru and Poland. The key match against Brazil was a draw and that made it a race for the best goal difference. Brazil had a 5+ goal difference after three played games and Argentina had only 2+ before their last match against Peru. They needed to win by at least three goals.
The match on the 21 June at Estadio Gigante de Arroyito has become one of the controversial matches in the history of World Cup. When the referee blew the final whistle, Argentine had won 6-0 and would play the final whereas Brazil would be playing for the third place. Some has speculated that the match against Peru was fixed, but no proof of any kind has ever been accounted for.
In the end, white confetti would rain over the Estadio Monumental field in Buenos Aires when Argentina led by Mario Kempes overcome the Netherlands in a dramatic final.
Kempes scores in the 1978 final.
The 1982 World Cup coincided with the Falklands War. The Argentine press did their best to imply that Argentine was the stronger part; the players of the Argentina got therefore chocking news after their arrival to Europe and reading Spanish newspaper commentating the war from an objective angle – Argentine was clearly losing in the conflict.
Directly from the first match it stood clear that the 1982 version of the Argentina team couldn’t match the champion standard of 1978, although Maradona was in the squad. They lost their first match against Belgium but rebounded with victories in the two following group matches.
In the second round Argentina ended up together with Italy and Brazil and did lose both their games. Italy that defeated the Albiceleste with 2-1 would go on and win the trophy.
Shortly after the 1982 World Cup, Menotti resigned and Carlos Bilardo who had been successful with Estudiantes was chosen as the new national team coach. Carlos Bilardo may have been remembered as a truly successful coach, taking Argentina to two world cup finals. But this was an era in which the average result seen over all competition matches was the worst ever for the team. In the 1980s, Argentina came as best on the third place in the Copa América.
But what is best remembered is of course the golden 1996 World Cup event in Mexico. The victory has often been referred to one man, but things are, of course, little more multifaceted in football. On the tactical side, Argentina had an ace up the sleeve – a 3-5-2 formation that was first tested by Bilardo in 1984.
Many stars were anticipated to give outstanding performance in Mexico that summer, such as Enzo Francescoli, Michel Platini, Karl-Heinz Rummenigge and Hugo Sánchez. But one player would over-shadow the rest, Diego Maradona who did 5 goals and 5 assists (Argentina did 14 goals in the tournament).
An important aspect concerning Maradona’s superior role was that the referees didn’t allow the same rough treatment that had hindered and frustrated the football genius in 1982. Also, he had a been built around him, which gave him a natural leading role.
Argentina had no problems to progress from their group after two victories and one draw. Maradona had performed on an impressive level, but he would take his game even higher in the following matches against Uruguay, England and Belgium. In the final, his contribution was not that evident; West Germany did a great job to neutralize his impact, but they couldn’t stop him from deliver the perfect pass to Burruchaga that set him free against the goalkeeper Harald Schumacher to score the deciding 3-2 goal.
Argentina celebrates their 1986 triumph.
The results that followed after 1986 was, however, bleak for the world champion team. In 1987, as the hosts for Copa América, AFA was eliminated in the semi-finals after 0-1 against Uruguay and when lost the third-place match against Colombia.
Claudio Caniggia was in the 1987 Copa América team and he would replace Valdano as the forward partner to Maradona in the following world cup. The 1990 World Cup that took place in Italy would almost be another Argentine success. Apart from the result, however, the performance from the team couldn’t match that in the previous tournament (the performance from their biggest star, Maradona, was impacted by a toe injury).
Argentina had to struggle all the way, after a chocking loss against Cameron in the opening game. In the same game, the goalkeeper Nery Pumpido broke his leg and was replaced by Sergio Goycochea. Sergio Goycochea who was an expert on penalty savings would become a key figure since Argentina was involved in two penalty shootouts. After defeating Brazil in the Round 16, in which Maradona made his most memorable piece, by driving the ball from the middle of the field and when surrendered by Brazilian players set up Caniggia to score, Argentina didn’t win anymore matches during the ordinary match time. After 0-0 and 1-1 they eliminated Yugoslavia and Italy after penalty shootouts.
Albeit only been number three in the group, being pressed by Brazil in the Round of 16 and winning only after penalty-shootouts, Argentina was in another World Cup final. But the odds were not the best. Besides from not performing on a champion level, Cannigia had received his second yellow card in the semi-final and wasn’t allowed to play in the final.
The spectators of the final would see the Argentine players delivering anti-football. Symptomatically, a penalty in the last ten minutes would settle the outcome in favor the West Germany. It would take 24 years until Argentina made it to the final in another World Cup and that game would also take end bad after one German goal.
During the following years, Maradona’s life was busy, affected by affairs outside the football field and it was a surprise to many that he finally ended in up in the 1994 World Cup squad (Maradona had rejoined the team for the Playoff match against Australia). But sadly, the World Cup story would soon end abruptly. Although a fine performance on the field, Maradona would not remain in the tournament after testing positive for ephedrine.
Maradona would be replaced by Ariel Ortega, which was an exciting player whose style resemblance the former number 10. Argentina was nevertheless eliminated by a terrific playing Romania in the Round of 16.
New generations of players would take on and among the most prominent would be names such as Gabriel Batistuta, Diego Simeone, Javier Zanetti and Juan Sebastián Verón.
Daniel Passarella had taken over as coach and introduced a strict discipline: long hair, earrings, and even homosexuality(!) was banned. Batistuta was separated from the team during a long period until he finally made a haircut; Fernando Redondo that refused a concession remained outside the team.
In the World Cup that followed, Argentina would eliminate England after a thriller, but lose a tight semi-final against the Netherlands. In 2002 Argentina – now with Marcelo Bielsa as coach, once again faced England, this time in the group and went down 1-2. That meant they had to win against Sweden in the last match (or England had to lose to Nigeria), but despite a huge playing advantage the match ended 1-1. Argentina was out already in the first round, it hadn’t happened since 1962.
The Argentine side that arrived to the following World Cup was stuffed with star players such as Javier Mascherano, Esteban Cambiasso and Juan Román Riquelme. As one of the favorites they become even more bestowed after a 6-0 demolition of Serbia and Montenegro, which also included a display of magnificent football. In the same match Lionel Messi made his World Cup debut and contributed with one assist and one goal.
The match against Mexico in the round of 16 was more even than expected, but in the end Maxi Rodríguez would make it 2-1 on extra time with a beautiful long-range shot. Sadly, for the fans of Argentina, the national team were to be eliminated after a penalty shootout by the host team Germany in the quarter-finals.
The coach José Pékerman would be criticized for not letting Messi play a single minute in the last game. Alfio Basile took over the job. Although he did only last two years until it was time for yet another chapter of Diego Maradona in Argentine football. On October 2008 he was appointed as the new coach and would stay during the following World Cup tournament qualification and finals.
The hopes for a third Argentine World Cup glory was when set with Maradona as coach and his inheritor on the pitch. Messi would however not be the savior that so many hoped for. Once again, Argentina would be overcome in a World Cup by Germany, this time in a humiliated fashion. Germany beat Argentina with 4-0 in Cape Town and for the fans of the Albiceleste it lay four years of waiting in front of them.
In 2014, on South American soil, it was once again a World Cup that was anticipated by many to be “Messi’s tournament”. And at least, it would – almost – be Argentine’s. Brazil, perhaps the biggest favorite after all, were completely crushed in the semi-final. Argentina who had reach the final was not happy by the name of the opponents. According to the statistics Argentina hadn’t beat Germany (or West Germany) in a World Cup since 1986.
Argentina played defensive in the final, perhaps not strange given the performance Germany had proven mighty of against Brazil. Close to the end of the extra time, Mario Götze would destroy the Argentine dreams.
As the biggest star in the game at the time, Messi had enormous expectations to live up to in the 2018 World Cup. Already in the second game against Croatia, it stood clear that Argentina and Messi probably would deliver that many had expected. Argentina was beaten with three goals to none. Still, under hard pressure, Argentina had managed to take the second place in the group. But they were nevertheless eliminated by France – the soon-to-be champions – in a spectacular match.
The Argentine side in 2017 before a World Cup Qualifying game.
Argentina has participated 17 times in the World Cup.
South American Championships were known until 1975 as the Campeonato Sudamericano before it was renamed to Copa América. Argentina has participated 45 times in the tournament.
* In 1959, two South American Championship, in Argentina and in Ecuador.
The logo of Argentina has the "AFA" (Asociación del Fútbol Argentino) initials in the center against gold colored background. Above that, three lines in light blue and white mark the Argentine flag. Around the inner part of the crest goes a band of stylized grains. | 2019-04-23T02:57:40Z | https://footballhistory.org/national/argentina.html |
On this proud occasion of the 15th anniversary of diplomatic relations between the Commonwealth of Dominica and the Peoples Republic of China, born out of our nation’s recognition and support of the One China Policy, the United Workers Party congratulates the Government and people of Dominica, and the Government and people of the Peoples Republic of China.
The Dominica-China relationship is one of the most important pillars of our foreign relations and we are deeply grateful to the Government and People of China for the many contributions made so far to our national development.
During this fifteen year partnership, we have witnessed very commendable development of the bilateral relationship and fruitful cooperation in many fields. Specifically, our country has benefitted immensely from the many capital projects which have enhanced our infrastructure for better social services and sustainable economic growth. The focus on human resource development has trained hundreds of Dominicans at tertiary level, and the people-to-people exchanges have fostered closeness among our peoples and better appreciation and understanding of the cultural attributes of both countries.
The Peoples Republic has been very attentive to our extreme vulnerability to natural disasters and on behalf of the people of Dominica we express our heartfelt gratitude to China for its timely and generous commitments following the passage of Tropical Storm Erika in 2015, and the devastating onslaught of Hurricane Maria in 2017. These caring acts of solidarity during our hours of need underscore the integrity of the friendship we have been privileged to develop with the largest nation on earth.
We look forward to further consolidation of our bilateral relations during the next fifteen years and greater cooperation in tandem with our aspiration for social and economic transformation.
Long live the Peoples Republic of China! Long live our Nature Island, our Isle of Beauty! Long Live the Dominica-China relationship.
Mr. Linton Sir I believe that it was some time in 2017, that you claimed Dominica was on the Edge of a precipice under the Leadership of PM Skerrit and his Government. And all I am reading from your supporters is that nothing has been done in regards to economic and social development for the past 20 years.
Now you come back here with that message above, with all sorts of applauses–pertaining to that 15-year relationship with China–Sir what are you saying; what are you doing as a political Leader?
Well if you have decided to make a UTurn, from the darkness into the light, it will take 5 years to complete that turn and five more years to walk circumspectly in the light if you must completely overcome the darkness–or give it all up.
But stop with this back and forth medley, the dance is not good for you, and most certainly bad for Dominica and her “God-fearing people” May we continue in growth by His Grace, slowly but surely.
sounds like the first man to be placed in the China Dominica friendship cemetery.
Politics is politicking. Is the next election u want to win.oh u start to open your eyes.. Good start.
The Honourable Lennox Linton nor the United Workers Party (UWP) have been against the People’s Republic of China (PRC). There are elements in both the UWP, the Dominica Labour Party (DLP) and the Dominica Freedom Party (DFP) who have not supported the establishment of Diplomatic Relations with the PRC.
You can say what ever you want but I am not convinced the the right honorable Lenox Linton wrote that statement.
You can believe what you want of course but I know Lennox does not need a speech writer like Dr.Dr. Skerrit.
Linton, message or statements means nothing to me or to anyone, for a start Linton uses simple words not even he understands what does that tells you and I another thing any so-called political leader that goes collecting money in a hat says something about the person.
What disrespect, what illiteracy, what an insult, it shows to tell us that this so called jack … Man Bites Dog is not of any intelligence, let alone to comprehend and comment on issue that are far beyond him.
It is now obvious that Man Bites Dogs, is scared of the intellectual of Hon Lennox \Linton and his blind loyalty to failed inept Odd Minister Skerrit. This is a very damning statement above referring to Hon Linton. The Labour Party must now stand tall, prove their worth and kick this barking dog out of your company, there ate fleas running about. Labour should no longer have this leach tied on the neck of this Man Bites Dogs. Hypocritical idiots, illiterate Man. No wonder that this corrupt Labour government is stained fleas form an bites Dogs al over its corrupt incompetent behaviour.
Lennox is speaking on both sides of is mouth now is thanking the China policy he once criticized.
Well I never! The old people used to say if they lived long enough they would see “plenty” things! Well, we certainly are seeing and hearing plenty things!
I guess the next thing we’ll hear is how much the CBS – 60 minutes mail order CBI has contributed to Dominica’s development. I thought nothing was happening in Dominica? So now we have reaped tremendous benefits from Skerrit’s visionary diplomatic relations with China? Guess some of us were walking with our eyes closed!
On another note, if almost everything the government is doing has suddenly got on to you people’s to do list, then what would be the value of the change, particularly after the government has in the midst of so much mauvais lang worked so hard to obtain the resources and set the stage for further development of the country?
Why should people who worked hard at only one mission – “to destroy the country”, now be rewarded with the fruits of the determination and effort of other people? Tell me!
Barbara, I am sorry, but you making no sense. I just dont understand what you are asking or hoping to ask. What development? Let me advise you that I am within the system and we lack vision, leadership, opportunity etc.
Our farmers are crying, our hucksters too. Children are crying, within the civil service we just observe and shut up and at he end of the day, we go have a nice drink to wash our concerns away. We just there pushing paper and this government lacks leadership ad vison and know not how to development Domininca in anyway possible. We need change from this inept failed Skerrit Corrupt failed Labour government. So many passports sold, no one knows who has or where has the money gone and to whom?
The thing , this corrupt Labour government is a failure ad no not where to turn and what to do. We need them, with failed Skerrit out ASAP, so we await the elections. We have considered strongly and profoundly for Hon Linton to take the realms of Prme Minister & his UWP Team.
Wow! Lennox Linton has matured! I know there are many things you wanted to say Mr Linton but you realize that this is not the time and you have many other opportunities to voice your opinion on other relevant matters. I applaud you for heeding to the call for a change in your approach, it shows maturity, it shows you are ready to lead. Continue to bring to light important matters to us in the right forum at the right time. Congratulations MR Linton, I am impressed. IF this was not an anonymous forum all would know that it takes much to impress me from the opposition, but you did!
The Chinese are pragmatic people and plan long term. It should be obvious now that Mr. Linton has their backing. This is nothing personal but they need stability and mutual trust, which needs improvement according to China’s Foreign Minister Wang Yi in his congratulatory message to Francine Baron. It would appear that P.M. Skerrit has become a liability and an obstacle to their “Belt & Road” initiative for the LAC (Latin America/Caribbean) initiative, in which Dominica plays a pivotal role. Though couched in diplomatic language, the missive to Francine Baron makes it clear that there is not sufficient trust between our respective governments and this, combined with the negative international exposure of Roosevelt’s Skerrit government, combined with China’s anti-corruption drive makes Roosevelt Skerrit expendable. If not, the Chinese would not be talking to, and have such a close relationship with Lennox Linton.
Would you refer to a trip to China one or two years ago and a sudden expedient turn around in language as “such a close relationship with China”?
Sir/Madam, you can go ahead and insult the intelligence of your compatriots but don’t try it with countries which have mastered the art in their national interest. I don’t doubt that they have a long term interest in having at least a speaking relationship with the opposition, that is diplomacy, but don’t give us that “close relationship” silliness.
What do you think the Chinese embassy officials have been doing here the last 15 years? walking with their eyes and ears closed?
When Taiwan enjoyed diplomatic relations with Dominica, people from all parties in Dominica travelled to Taiwan for visits etc. One notable diplomat was Mr. Wang who invited people from all sides of the divide to his social events at the embassy. Nothing to do with a personal affinity for Mr. Opposition sir/madam.
Barbara, Lennox living next to the Chinese embassy ar Morne Daniël. He can walk there anytime for a cup of tea and he is welcome there. It looks like he has been quietly nurturing excellent relations there while your man trying to play off his Chinese friends against the Russians, the Venezuelans and anyone else he think he can outsmart. Well he too smart by half and can not be trusted by anyone. Check that with members of his own cabinet, start with Ian.
Excuse me me for saying it but I think you talking out of your pithole mind. If you don’t understand something dont refer to it without knowing what you on about with pack of lies. Workers supporters all have the same DNA lies and denial it’s in the root of the so-called criminal workers party dishonest and cheating…. God bless Dominica 🇩🇲 and good people such as Labour government for giving us hope once again thanks.
We welcome Hon Lennox Linton and his professional UWP Team.
Ummm, did I miss out on something? Lennox I know you’ve said that should your party become the new administration Dominica will keep relations with China, but where’s the part on how concerned you are about the much talked about China takeover of Dominica, the nature of which Trump’s office recently referred to as predatory?
Again we see the UWP arrogance and ignorance of diplomatic protocol and procedure.
Wait a minute. While his supporters are ranting under the PM’s message, Mr Linton is actually speaking the same words as the prime minister.
Lennox Linton is in the middle of a political battle to deliver Dominica from the wicked hand of Skerrit and therefore he has to be very careful with what he says about China, But as a Dominican that is not seeking political office, I have a right to speak my mind and call things as I see them. So I say that I am very disappointed with that 15 years friendship between China and Skerrit. Unlike Mr. Linton all I see is 15 years of Hell on Earth and 15 years that pushed Da behind by another 40 years! and yes 15 years of poverty, sorrow, mourning, and liesand deception.
Your position just reflects the tribal politics you encourage. Could you tell us which period in the past that Dominica was rich and did not experience porverty? Was it under the LeBlanc, John, Charles, James or Douglas administration? Unfortunately under these administrations Dominica had a high rate of porverty, access to university education was limited to the fortunate few, however over the past 15 years Dominican students have had easier access to higher education as the class, color and ethnicity barriers have been eradicated and more funding made available. That did not happen under previous administrations because of poverty and our so called friends were to rich to concern themselves with our porverty. The current administration is fighting to eradicate porverty, with programs like the yes we care and the housing revolution, monthly payments of $300. 00 to the elderly. New schools, a brand new state college, sports stadium…….is that how you spell porverty???
Since you ask, it is spelled “poverty” and I have seen that increase during the last 15 years with the gap between the “have” and “have nots” widening.
Anoon, you are taking BS, absolute rubbish. Where we sit, I an aware of the statistics and the resukts or failed results of many initiatives, so don`t go barking fake news and perception that you have no knowledge of. This government has been failing us now for 19 years. We up there know it all, our jobs must be safe , so yo will not have to know much from me. Just get your car and travel around the island like I do regularly, to see first hand the poverty, deprivation and poor living housing conditions. People`s housing are closed by 7pm, no supper, little supper, no jobs, no more fishing, no school books and just cannot keep up. Becareful what you write and get your inforamtion first hand and don`t listen to Skerrit and his blind acolytes, it is all fake news, a pretence that something is happening when nothing is. …and our people are suffering while some young children are engaged in prostitution, a frightening scenario just to bring home cash to survive. I have seen it and all.
Someone is finally honest! When one is seeking political office one can lie his/her way through any situation even when the facts are staring everyone in the face; one can seek to do damage to one’s country and people with every waking breath; one can curse President to pastor; one can extort poor gullible people; one can insult heads of governments who are trying to help one’s country.
When the rubber hits the road one finally realises that apart from the fanatics who egg one on, decent people are sick to the stomach of the constant mauvais lang and negativity. One realises that people begin to question one’s plan for the country you, Mr. Truth figure it is okay to now be very careful with what one says about people and countries?
Hey man I would be very uncomfortable with anyone who flip flops based on his/her audience or situation. One has to stand for what one believes, whatever the price! something cannot be wrong on Monday and right on Tuesday!
Mr Truth Man, the truth hurts, yo are so right and on Que to what yo said. It appears that while you your eyes and ears are wide open, those of Anon and others are blind bats to what really is happening in our island. We are up there at Government Headquarters and Financial centre, and we all know that the talk is obvious on Bin, Fertilizer Bobols for the past 19 years under this failed Skerrit and his corrupt Labour government. We need Skerrit out and his corrupt Labour must Go Get lost and people of Domininca make way for more decent people in government. We welcome Hon Linton and his professional UWP Team. Let us take back our Domininca.
Lennox, i have to say you are making progress. You now to sound like a statesman. These are the coments which trend politicians to victory..
I am likewise impressed,as he prepares to dethrone Dominica’s most wicked leader,Skerrit !
What a brute of a leader and an embarrassment.
If all it takes for victory is to make statements which even I do not believe then it is easier than I thought and Dominicans are far less astute than I thought they were man!
Plaese dont get me wrong Miss Saunders. Let me make it clear. I am referring to a statement which has improve. Because. I know all Lennox does is bash everything in path. I am not taking about Maturity to lead Dominica.
Amen, Lenpro, that`s the message, you are right on Que. Keep it coming, we need change, e need this Skerrit and his failed corrupt Labour government out. We have had enough of open corruption , lies, deception and fake news.
Yes my people. Some people just have to lap up thier vomit and humble themselves after all the unsavory things they said about China and the government. Are they no longer interested in seeing the “secrete” agreement? Could a simple trip to China change ones mind? Was there a “secret” agreement between UWP and China? Well, well… look flip flopping. UWP has effectively endorsed everything this DLP has done. The only difference is that they claim they can spend the treasury’s money better. What a joke. These guys remind me of the story of Mother Hen.
Unsavory things about Chinese ????..This is the problem with you allabourites..That’s why you all are being kicked out .To speak the truth is not unsavoury!!! The truth is to be spoken ..Do like Skerrit and lie instead? The Chinese know the truth..That’s why the Patriots from the UWP were well received in China upon invitation of the Chinese! You think the relationship is between Skerrit and China … No sir/madam ,it’s Dominica and China.
Well done patriot ..Even the leadership of The People’s Republic of China has seen how far ahead of Lazy Skerrit you are in terms of leadership..I guess that’s why they invited you and a few others from your team to their country about 2 or 3 years ago .
You have stunned even your vilest critic, with the pace at which your leadership has blossomed and matured over time. Wow! Bravo!!!
don’t get swell headed.The work ends on polling day after all ballots are counted ..
Partner % please stay on your medication. The China 🇨🇳 take your to China and you are singing fu fu fum. Lenox you could be bought for nothing. What a canary is the UWP leader.
Bold Face No Face HYPOCRITE! Now the UWP trying to play nice!? One thing chinese don’t forget.
Always coming with trivialities or complete uselessness.. These moronic statements are indicative of the lack ofvknowledge to have a rational debate on pertinent issues affecting Dominica.
The Chinese community, in Dominica, has never tried to adopt Dominican culture nor interact in any serious way with our people. This speaks volumes. Yes, they have donated items and contributed to the Infrastructural development of the country but they give with strings attached.
KID, you need an educational baptism. Spend your time wisely instead of obsessing with the erudite Mr. Linton.
Wow! Did I just read a statement written by Mr. Linton? I must applaud you sir. For once, I did not read any negative comments. Keep it up Sir! What a revelation! That was a brilliant move by PM to sever ties with Taiwan. The benefits derived from the relationship are immense. Many thanks to The People’s Republic of China.
Dominicans, please stop with the animosity towards each other over politics. Stop denigrating our women because the Party you support is not at the helm! Stop it now! We are one people!
@ DC, You are all about rubbish and crap, for a start your Mr Linton didn’t write that hypocritical statement as you called it. Linton is trying to be behaving in a way that suggests one has higher standards or more noble beliefs than is the case. In simple English your lord booboo Lennox Linton is an embarrassment to his self and Dominicans a nobody.
Man Bites Dogs, thanks for your crap, you are getting better at it. We just have to accept you for the level that you are on. , but not on the bigger picture. keep barking and playing with your toys, your pups. | 2019-04-21T03:45:18Z | http://dominicanewsonline.com/news/homepage/news/statement-on-15th-anniversary-of-diplomatic-relations-between-the-commonwealth-of-dominica-and-the-peoples-republic-of-china/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+DominicaNewsOnline+%28Dominica+News+Online%29 |
Thaksin Shinawatra seized power in 2001 and then was exiled from Thailand after the military coup d’etat in September 2006. He himself is still the focal point of serious political conflict taking place in contemporary Thailand. He has always been attacked by anti-Thaksin groups on account of the following reasons: extreme power concentration, the political style of Thaksinocracy, nepotism, corruption, and populism in favor of rural people. However, very few scholars have focused on his political and social reforms which aimed at modernizing the Kingdom of Thailand in order to reorganize the country into a strong state.
This article seeks to clarify the characteristics of the Thaksin government as a “destructive creator” of existing power structure and traditional bureaucracy. The article offers a brief discussion of Thaksin’s populist policies such as village funds, 30 baht medical services, and one tambon one product (OTOP) project, and then explores the background of, the process behind, and the policy results of two major reforms undertaken by the Thaksin government in the public sector (bureaucracy) and the budget system. These reforms appear to have transformed Thailand from a traditional bureaucratic polity into a modern state in conjunction with an emerging middle-income country in the global capitalism. But Thaksin’s ambitious reforms ultimately collapsed because they were too radical and too speedy for all the people, including royalists, the military, government officers, as well as conservatives.
Likewise, the mass media of Thailand criticized Thaksin’s management of the state on the grounds that he had provoked a serious national crisis owing to the concentration of power, prevalence of nepotism, wide-ranging corruption, and destruction of democracy under his watch (Nariphon 2006; Wichai 2006). However, viewing the military coup simply as the result of a conflict between the movement of democratization and Thaksin’s dictatorship, and a product of popular protest against a corrupt government does not offer an adequate understanding of why the coup happened as well as an insightful analysis of fundamental problems facing contemporary Thailand under the strong pressures of globalization and economic liberalization (Suehiro 2009).
After the 2006 coup, Thailand has suffered continuous political instability due to the conflict between the pro-Thaksin group or red shirts group and the anti-Thaksin group or yellow shirts group. For the past six years from 2007 to 2012, analyses of Thai politics and society have significantly deepened. Those who focused on the sharp conflict between the red shirts group and the yellow shirts group began to turn their attention to more fundamental problems rooted in Thai society, namely, the widening gap in income and assets among the people (not poverty problems), and the basic conflict between the mass people (lower-income class) and the traditional ruling elites (royalists, military, bureaucrats, and capitalists) (Montesano et al. 2012). However, these arguments fail to provide explanation of the real cause of the military coup in 2006. More importantly, they fail to provide a comprehensive explanation of the impact of Thaksin’s reforms on Thai politics and society. Given this situation, we still need to explain the real cause of the military coup as well as the total picture of reforms undertaken by Thaksin.
We should not overlook the fact that Thaksin was Janus-faced in his style of state management: he presented himself as an ambitious populist3) as well as an active state reformist. These two faces exactly correspond to two world-wide movements during the 1990s: the political movement for democratization and the economic movement for globalization and liberalization. As Tamada cogently pointed out, the 1997 Constitution was a direct product of the democratization movement after the May 1992 bloody incident, or Phrusapa Thamin, in Thailand. Ironically, the 1997 Constitution also created a “strong prime minister” like Thaksin Shinawatra through changes in general election system, new regulations on the activities of political parties, increased authority of prime minister, and elimination of parliament members from cabinet members (Tamada 2005; Tamada and Funatsu 2008).
It was the enhanced executive power of Thaksin that enabled him to implement his populist policies, and in turn contributed to his great popularity among the people. On this account, many scholars including anti-Thaksin group and mass media have frequently analyzed Thaksin’s management of the state by focusing on his populist-oriented policies such as village funds, people’s banks, one tambon (village) one product movement or OTOP, and 30-baht universal health services (Worawan 2003).4) But these projects are only one part of his overall policy objectives, and populist-oriented policies have reduced importance in his reform efforts after February 2005, when a ruling party of Thai Rak Thai or TRT won 377 out of the total 500 seats in the House of Representatives in the general election.
Thaksin’s second face, that of a state reformist, revealed itself in 2005. Indeed, he attempted to remake the Kingdom of Thailand into a modernized state that would survive the world-wide waves of globalization, economic liberalization, and IT revolution. In his eyes, old-fashioned management of the state would isolate Thailand from global capitalism. An economically advanced country needs to reform its institutions, practices, and social values in line with the new international circumstances, just as a modern corporation needs to reform its management in keeping with the times (Pran 2004, Vol. 1; Suehiro 2009, Ch. 5).
Such assumptions are apparent in his Kingdom of Thailand Modernization Framework or the KTMF. KTMF was addressed to foreign and domestic investors who were present at the prime minister’s residence in December 2005, and provided detailed information on the Mega Projects amounting to 1,800 billion baht (Shukan Tai Keizai, January 30, 2006). Interestingly, Thaksin also used other key words such as knowledge, technology, management, and finance to explain the KTMF. The major obstacles to the KTMF, in Thaksin’s view, are the old-fashioned public sector and the conservative culture of government officials (Pran 2004, Vol. 1, 300–301).5) Consequently, his reforms were naturally directed at the public sector (Thai-style bureaucracy) and the budget system under the control of the bureaucracy. He aimed to fill the gap between the economic status of Thailand as a middle-income country and her poor-performing institutions which had failed to ride the new wave of international movements.
This article aims to clarify the changes in Thai bureaucracy and technocracy under the Thaksin government (between February 2001 and September 2006) in particular the effort to transform Thai bureaucracy into Thaksinocracy (Thaksinathipatai) rather than democracy (Prachathipatai) by answering the following questions: what were the major characteristics of Thaksin’s style of state management or Thaksinomics (section II)? how has Thaksin changed the mechanism of decision-making in order to reform the Kingdom of Thailand (section III)? what kind of socio-economic policies were introduced (section IV)? how did Thaksin view the traditional bureaucracy and how did he reform the public sector (section V)? how did he change the budget system to promote his strategic agenda (section VI)? and finally, what were the results of his drastic reforms (section VII)? Through these arguments and the follow-up of the political turmoil after the 2006 coup, I explore the essence of Thaksinomics and Thaksinocracy rather than provide mere criticism of his arbitrary use of state power.
Originally, “Thaksinomics” is a term employed by the mass media and scholars to criticize Thaksin Shinawatra’s political style. But after 2003, Thaksin himself also began to employ this term in his speeches to express his own political thought as well as his strategy of “dual-track policies” (Pran 2004, Vol. 1, 26–38). Based on my observations, Thaksinomics consists of three major elements: 1) a corporate approach to management of the state; 2) a strategic approach to reform of public services as encoded by the slogan, “vision, mission, and goal”; and 3) a dual approach to revitalize Thai economy and society, or so-called “dual-track policies” (nayobai khuap-khu).
His idea seems to have percolated from his own experience as the top leader who controlled the Shin Group, the largest business empire of the telecommunications industry in Thailand.7) He also borrowed his idea from the arguments of Somkid Jatusripitak, a professor of National Institute of Development Administration (NIDA), as laid out in his remarkable papers on “Thailand Company” as well as “A Leader in the Future” (Somkid 2001, 76–80; Wirat 2001). Thanks to these ideas, Somkid served as one of the key members of the TRT executive committee, and was later appointed Finance Minister when Thaksin set up his first government in February 2001.
Second, Thaksin ordered all the government agencies including public schools and hospitals to clarify their own “vision, mission, goal” (wisaithat, na-thi, paomai) in reference to their tasks for the people. He requested this clarification at each level of government agencies from ministerial level through departmental and divisional levels, and finally to the individual level. At the same time, they are all subject to performance evaluation by both internal bodies and third-party team in reference to the initial targets of each group. Analogous to a company management, strategy and competition were deemed by Thaksin as essential instruments for improving public services, and therefore he claimed a strategic approach rather than experience-based practices.
Third, he introduced the new agenda of dual-track policies, which aimed at promoting a grass-roots economy (setthakit rak-ya) in rural areas on the one hand, and enhancing international competitiveness among big firms in urban area on the other.8) What is unique about Thaksin’s policies is that the main purpose for promoting the grass-roots economy is not to reduce poverty in rural areas (the traditional style politics of clemency and charity), but to give chances or opportunities for rural people to create their own business and employment (a new style politics in the era of the global capitalism).
In this context, Thaksin promoted “community business” (thurakit chumchon) through programs of village funds, people’s bank, and OTOP movement, which adopted an approach to tackling poverty that was quite different from that adopted by previous governments. Promotion of the grass-roots economy also aimed to court votes in rural areas in favor of TRT in the next election (February 2005). This is the precise reason why Thaksin emphasized populist-oriented policies in his first government between 2001 and 2004.
The above three elements combine with each other to characterize the Thaksinomics. However, Thaksin’s political style was attacked by mass media and academic circles for leading to “policy corruption” (Pasuk and Baker 2004), “prime ministerialization” (Bhidhaya 2004), “Thaksinocracy” (Thaksinathipatai) against democracy (Rungsan 2005), “Thaksinization of Thailand” (McCargo and Ukrist 2005), “Thaksin regime” (rabop Thaksin) (Nariphon 2006), and new nepotism or revival of family politics. Three aspects of these criticisms are worth noting.
Secondly, many scholars also criticized the increasing concentration of power under his term as well as his dictatorial behavior. For example, Rungsan Thanaphonphan argued that while a CEO in a company was usually supervised and monitored by both the board of directors and shareholders, Thaksin did not brook any criticism from the outside. Accordingly, he was not a CEO of state in a real sense, but a one-man-show type of taoke (owner-operator) of the state (Rungsan 2005, 168–175).
Finally, they criticized Thaksin’s politics for reviving nepotism. As a matter of fact, Thaksin appointed a lot of family members to key posts: his younger sister Yaowaret became chairperson of the National Women Association; another younger sister Yaopa was the clique leader of TRT; Somchai Wongsawat, Yaopa’s husband, was appointed permanent secretary of Justice and the prime minister (September–December 2008); and Priaopan Damapong, his wife’s elder brother, was given the number-two position at the National Police Office.9) Thaksin also appointed two cousins (Chaiyasit and Uthai) to the key posts of Army Commander-in-Chief and the permanent secretary of Defense, respectively (Athiwat 2003; Tamada 2005). It is fair to say that such nepotism in personnel management contributed to fueling anti-Thaksin sentiments among the military group as well as among the middle classes in the Bangkok Metropolitan area.
Two characteristics distinguish the Thaksin government’s management of macro-economy compared with previous governments. First, Thaksin attempted to reduce public external debt and its ratio to nominal GDP, and obtain budget resources from the national revenue, profits of state enterprises, profits from privatization of state enterprises, and private investments. In spite of the fact that the NESDB projected public debt ratio against nominal GDP as 60% and over in the Ninth Five-Year Plan and the International Monetary Fund (IMF) requested recipient countries to meet 55% as the maximum standard, Thailand had successfully reduced this figure to less than 50% by 2003. When Thaksin operated his own private business (Shin Corp.), he preferred direct corporate finance based on issuance of stocks and corporate bonds to indirect corporate finance based on banking loans. In exact accordance with the strategy of corporate finance, Thaksin insisted on applying the principle of non-borrowing or stand-alone approach to the financial and fiscal management of a state.
Additional revenue came from an increase in collection of corporate taxes, value added taxes, and excise taxes owing to economic recovery during the term of the Thaksin government. Along with the increase in tax revenues, an equally important development was the computerization of the state revenue collection system, which not only helped speed up tax collection procedures but also minimized unintentional failure in tax collection in the fields of excise taxes and value-added taxes. Additional revenues were separated from the ordinary proceeding of budget allocation and were eventually placed under the direct control of the cabinet, in other words the prime minister. Such free-hand revenue naturally became significant fiscal sources for the Thaksin government to promote money-consuming populist-oriented policies. I will return to this problem in section VI of this article.
As Warr and Bhanupong have already argued, there are four core economic agencies in Thailand: the National Economic and Social Development Board or NESDB, which is the government’s main economic planning agency; the Fiscal Policy Office or FPO of the Ministry of Finance for the management of public finance; the Bureau of the Budget or BOB of the Prime Minister Office for the estimation of state revenue; and the Bank of Thailand or BOT for financial arrangement (Warr and Bhanupong 1996, 69–70; see Fig. 1 in Suehiro 2005, 17).
These four core agencies have played a preeminent role in the process of national budget allocation since the 1960s, and have been fully responsible for the stable development of the macro-economy. The NESDB principally screens the bottom-up investment plans of each ministry and department in reference to the targets of the Five-Year Plans, while the BOB investigates revenue aspects. The FPO proposes the possible government expenditure, consistent with the monetary policy of the BOT. The four core agencies have traditionally cooperated with each other through their personal networks under the leadership of the distinguished governor of the BOT, Dr. Puey Ungpakorn, and have maintained their policy independence from the political influences of military forces (Suehiro 2005, 22–28).
When Thailand experienced long-term economic recession in the early 1980s, the interrelationship among the four core agencies changed. Since the Prem Tinsulanond government applied for standby credit from the IMF and structural adjustment loans (SALs) from the World Bank between 1981 and 1983, the NESDB and the FPO began to play more important roles in managing and monitoring public external debt from these international organizations (Muscat 1994, Ch. 5). In addition to the expanded role of the two agencies, the Prem government also established three important institutions to implement macro-economic policies. These three are the National Public Debt Committee chaired by the finance minister; the Economic Ministers Meetings, which exclusively discussed economic matters before the regular cabinet meeting; and the Joint Public and Private Sector Consultative Committees (JPPCCs, or Kho.Ro.Oo.) to argue jointly current economic problems (Anek 1992, Ch. 4; Suehiro 2005, 32–35). At the same time, the NESDB was expected to serve as a coordinating organ for these national committees in addition to its original task of planning the Five-Year Plan.
When Chatichai Choonhavan (Chart Thai Party) won the 1988 election, he established the first political party-based coalition government in Thailand. But he hardly changed the existing policy-making system. It is true that the Finance Minister was not appointed any more from qualified persons of the Ministry of Finance, but was picked from the ruling political party. And the Finance Minister sometimes intervened in both fiscal policies of the FPO and monetary policies of the BOT (Suehiro 2005, 37–39; Apichat 2002). But there was no noticeable change in the process of policy-making. Technocrats at the four core agencies could still continue to manage macro-economy as long as they did not touch on the sensitive business interests of political party leaders and royalist members.
The currency crisis of 1997, however, changed the roles of the four core agencies. The major developments in economic policy-making under the second Chuan government (1997–2000) may be summarized as follows.
First of all, since the government decided to request standby credits from the IMF and SALs from the World Bank to overcome the crisis, the two international financial organizations came to play a decisive role in formulating the economic reforms of Thailand.
Second, the Finance Minister, Tarrin Nimmanhaeminda, was given supreme power to control the financial sector and to negotiate with international financial organizations as well as Japanese government agencies.13) Tarrin was the key person of the Democrat Party, which was the ruling party of coalition government, and was former president of the Siam Commercial Bank.
Third, the policy role of the FPO was diminished, in comparison with its role in the era of the Prem government. The Public External Debt Section was separated from the FPO to independently handle the growing loans from the IMF, the World Bank, and Japanese government. Along with this organizational restructuring and transfer of several sections, the number of FPO staff was cut from 250 to 150 by 1999. Instead, the Economic Ministers Meetings began to play more important roles. The meetings which were held every Monday ahead of the Tuesday cabinet meeting eventually made the final decisions on economic matters (Suehiro 2005, 44).
Fourth, the Chuan government increased the number of the Deputy Minister (Phu chuai rattamontri-wa) from 8 to 24 persons in addition to 4 Deputy Prime Ministers and 13 ministers in order to invite influential political party members into the coalition government.14) The posts of the Deputy Ministers in several ministries such as the Ministry of Transport and Communications were very attractive for party leaders seeking political rents.
In brief, the major players in economic policy-making diversified into four groups: 1) international financial organizations (IMF and the World Bank); 2) economic technocrats in the NESDB and the Ministry of Finance; 3) particular political party leaders in the positions of the finance minister, industry minister, and the deputy ministers in economic affairs; and 4) participants in the public hearings. Each group was inclined to seek its own interest without mutual cooperation and policy consistency. Such fragmentation of decision-making became the object of Thaksin’s criticisms, which targeted the structural weakness of the Thai public sector.
The Thaksin government appeared to have aimed at completely changing the traditional policy-making system, despite the carryover of human resources from the Chatichai governments.16) The new institutional elements may be summarized as follows.
First, Thaksin abolished the regular meetings of the Economic Ministers on Monday, and replaced them with the meetings of the Strategy Committee17) to argue national urgent matters. The Committee reportedly consisted of Thaksin himself and leading figures from the Army, the National Police Office, and business circle, but there is no precise information on its membership.
Second, he set up the five Screening Committees (later increased to seven ones) at the first cabinet meeting on March 6, 2001, and appointed five Deputy Prime Ministers as chairpersons of each committee to examine particular policy issues. Important policy proposals from responsible ministries including the NESDB were first submitted to these committees, and then discussed before final decisions were reached at the cabinet meetings.
Third, he abolished the public hearings, and replaced them with the practice of direct dialogue with the people through his own speeches at the government-sponsored radio (FM 92.5) every Saturday from 8:00 to 8:30 pm. Between April 28, 2001 and August 19, 2006, his radio speeches continued to convey his political thought along with explanations of decisions of cabinet meetings.18) Thaksin appears to have put more importance on such type of direct dialogue with the people rather than on time-consuming discussion in the House of Representatives.
Institutional reform in policy-making system contributed to the strong leadership of the prime minister. This movement is clearly evident in Table 2, which compares the distribution of cases of policy submissions to the cabinet meetings in two periods of the Chuan government and the Thaksin government. Computing the average frequency of policy submissions to the cabinet meeting per month, we see that the Thaksin government tackled more cases (100.8 cases against 95.3 cases). And the role of the Prime Minister Office increased in the Thaksin government (19.1% against 17.6%). But the differences in these figures are not so impressive. Rather we should note the differences in major agencies responsible for submitting policies inside the Prime Minister Office. As Table 2 clearly shows, three groups or agencies of the Deputy Prime Ministers who chaired the Screening Committees, the Prime Minister Secretary Office, and the Cabinet Secretary Office became to play more significant roles in submitting policies.
Looking at the increasing percentage of the NESDB (from 1.3% to 2.6%) in Table 2, some may argue in favor of the revival of the four core agencies. In actuality, however, Thaksin frequently ordered the NESDB to formulate new policies in strict accordance with the state strategies, as well as the ordinary task of planning the Five-Year Plan, which resulted in an increase in the number of cases of policy submissions from the NESDB. Ironically, increasing cases reflect the diminished role of the NESDB. Ministry of Finance also reduced its role in exchange of increasing role of the Deputy Prime Ministers.
Fig. 1 shows the whole structure of the policy-making under the Thaksin government. Fig. 1 suggests the increasing concentration of power in the hands of the prime minister alongside the exclusion of bureaucratic influence from the decision-making process. Thaksin apparently aimed to replace the Thai bureaucratic polity with a prime minister-led politics or Thaksinocracy.
Sources: Interview research by the author in Bangkok from 2001 to 2005.
As discussed in section II, Thaksin adopted dual-track policies, which consist of promotion of the grass-roots economy in rural areas (the first track) and the enhancement of national competitiveness of big capitalists in urban areas (the second track). After establishing a new government, he favored the first track over the second one. This is in part because economic recovery from the Asian crisis became an urgent task for the country and in part because the first track was more essential for Thaksin and TRT to attract the support of the people. For these reasons, Thaksin announced nine urgent economic and social programs in his policy speech at the Diet on February 27, 2001.
These nine programs include: 1) three years’ moratorium on farmers’ debt; 2) provision of village funds; 3) establishment of people’s banks; 4) establishment of new government-sponsored SMEs banks; 5) introduction of universal health services (known as “30-baht medical services”); 6) solution of non-performing loans through the Thai Asset Management Corporation (TAMC); 7) privatization of state enterprises; 8) eradication of drugs; and 9) anti-corruption campaign (Samnak Lekhathikan Khana Rattamontri 2002, 91–95). In addition to policies 1) to 5), Thaksin also introduced two well-known programs of OTOP and a “Ban Ua-arthon” project which provided lower-income households with cheaper housing facilities. Seven of the policies were originally part of the TRT campaign promises in the general election and became core projects of the first track or the promotion of the grass-roots economy.
In July 2001, the Thaksin government announced the “mid-term economic policies 2001–2006” to the public. Before the cabinet meeting, NESDB and the Fiscal Policy Office prepared their original plan which was principally based on the Ninth Five-Year Plan (2001–2005). But this plan did not fully reflect Thaksin’s policy speech in February. Glancing at the original plan, Thaksin got angry and immediately ordered the NESDB to revise it in accordance with his policy speech. Consequently, the revised agenda was submitted to a cabinet meeting in July, which included all the programs in both prime minister’s policy speech and the TRT campaign promise.21) In Thaksin’s view, the NESDB ought to follow the state strategy addressed by the prime minister rather than the targets of the Five-Year Plan set by the former government. This incident symbolically highlights the declining autonomy of the NESDB in policy-making.
Table 3 summarizes the major programs in the first-track policies. All the programs started within 2001 and total expenditure amounted to 300 billion baht, or the equivalent of 30% of total budget allocation in FY2002. As the table shows, each program achieved a visible outcome, which contributed to the huge popularity of the first Thaksin government. On the other hand, the enormous amount of expenditure for these populist-oriented policies provoked severe criticism from the mass media on the grounds that these programs were undertaken without ordinary budget allocation (off-budget system). In section VI, I will return to the important question of how the Thaksin government financed these policies under the existing budget system.
Unlike the IRP which focused on the improvement of efficiency and productivity of manufacturing sector through the development of supporting industries (Japanese ideas), NCP imported key concepts such as innovation and industrial clustering based on the policy advice of Porter as well as textbooks in the American business schools (Porter 2003). The complete text of NCP was submitted by the NESDB and approved by the cabinet meeting in October 2003. Although NESDB was officially designated the responsible agency of NCP, the actual people in charge were Porter and the SASIN which was the most influential business school in Thailand. NESDB could no longer take initiative as a primary planner, and merely served as a coordinator for planning.
After the general election in February 2005, the second Thaksin government explicitly shifted its policy priority from the first track in favor of the people to the second track in favor of domestic and foreign investors. Since TRT had won 75% of seats in the House of Representatives, Thaksin did not need to pay special attention to the masses as he had to do before. For instance, in May 2005, the Ministry of Finance announced “Mega Projects” with a total cost of 1,800 billion baht and appealed to foreign investors to invest in attractive mass transportation projects in Bangkok Metropolitan area. In the same period, Thaksin also ordered the NESDB to formulate the 10th Five-Year Plan (October 2006–September 2011), which emphasized profit-making agriculture on the basis of bio-technology and provincial cluster development plans based on the CEO Governors. Unlike the Ninth Five-Year Plan, the new plan accorded less importance to traditional policy objectives such as poverty reduction in rural areas (World Bank 2001).23) From the middle of 2005 onward, Thaksin also accelerated the privatization of state enterprises to attract more foreign capital to the local stock market. All the programs were integrated into state strategies to modernize the Kingdom of Thailand (KTMF) (Suehiro 2008).
From Thaksin’s viewpoint, there are two major obstacles to KTMF’s ambitious strategy aimed at transforming Thailand into a modern state. One is the traditional bureaucracy, including government officers’ culture, and the other is the existing budget system under the strict control of line ministries. Consequently, he focused his political targets on the two major fields of the public sector and the budget system.
The first obstacle to Thaksin’s reform is the old-fashioned bureaucracy. According to his observation, Thai bureaucracy has too many agencies and there is no organic linkage in activity between organizations. Thai public services are too slow despite global capitalism’s “economy of speed.”24) He also severely criticized the traditional bureaucracy because it lacked efficiency in delivering public services, had no strategy in policy-making, and lacked competition in the work place. Rather it merely encouraged bonding among its members and a conservative attitude against any criticism coming from the outside.
On September 11, 2002, Thaksin addressed the issue of “Reform of a country, reform of the public sector” in the prime minister’s residence. In this speech, he disclosed the fact that he ordered the Prime Minister Office to disband around 300 out of 600 national committees, and revealed his plan to reorganize existing government agencies into more networking-based and agenda-based organizations (Pran 2004, Vol. 1, 291–308). More important, he emphasized in the same speech the necessity of reforming traditional bureaucratic culture and government officers’ consciousness. He claimed: “Most important task for us is to reform the old culture of work together into a new one at the levels of government officers, the relationship between public sector and a country, and the relationship between public sector and the people. We need a new culture of work together. We cannot make the excuse that we have poor performance because our system is out-of-date. The era is always changing and it requests us a reform” (ibid., 300–301, underscoring by the author).
On this account, he severely condemned the out-of-date system (rabop la-samai) and called for the introduction of modern public services on the basis of advanced technology (e-Government), agenda-based organizations, explicit visions (wisaithat), well-organized strategy, and competition among government officers. Based on such views, he launched the reform of traditional bureaucracy by setting up the Public Sector Development Commission (PSDC) in October 2002 (Nakharin 2008). Before examining the activity of the PSDC, let me briefly review the structure of government officials and the mechanism of personnel management in the public sector in order to help the reader to understand the real cause behind the Thaksin’s reform.
Fig. 2 shows the category of public personnel and the distribution of civil servants and employees by the category. Figures on the basis of my own research in 1996 are out of date for the current situation. However, there are no comparable figures and the present system principally follows the same category. Therefore, I employ the 1996 survey to depict the structure of Thai bureaucracy (Suehiro 2006).
Source: Interview research by the author at the Ko.Pho in Bangkok, April 1996.
Public personnel (2,586,000 persons) consists of five major categories: political officials (776 persons); permanent officials (1,169,000 persons); departmental employees (695,000 persons); local officials (421,000 persons); and staff and employees of 23 state enterprises (300,000 persons). Among them, permanent officials belong to a category of government officials in a broader sense. Permanent officials are further classified into seven sub-categories including police officers and prosecutors. Among them, three groups belong to a category of government officials in a narrower sense. They include 530, 000 teachers at public schools under the auspice of the Teacher Council, 380,000 civil servants in central public agencies under the auspice of the Civil Service Commission (CSC), and 49,000 professors and lecturers under the auspice of the University Official Commission. Here, I focus on the second group of civil servants under the CSC.
All the civil servants are recruited through standard examinations adopted by the CSC and otherwise through particular examinations conducted by several high-ranked ministries (Ministries of Interior and Foreign Affairs). After entering public agencies, they are all ranked in the P (position) and C (classification) table according to their final educational qualifications. For instance, a person with educational level of high school or vocational school is ranked as C1, while a new graduate from a university is ranked as C3-2. A Ph.D. holder starts his/her career at C5-4. The PC table is completely linked to the salary table, and every person is automatically promoted by at least one rank each year.
What is unique to Thailand is that the government principally does not employ mid-career persons from the private sector. Those who desire to enter into the public agency must start their careers in the same way as fresh students in accordance with educational qualification. On the other hand, all the civil servants are guaranteed employment until the retirement age or 60 years old (since 1953), and they can equally enjoy the right to receive government pension, medical health insurance, and other fringe benefits. In this sense, personnel management of government officials has been basically designed as a closed organization on the basis of service years.
Apart from the cases of director generals of the Department of Customs, secretary generals of the NESDB and governors of the Bank of Thailand (BOT), most of civil servants enter a particular department and are promoted to higher posts in the same department. For director generals of the Department of Customs until the 1970s, several persons were recruited from the National Police Office (Krom Sulakakorn 1994, 11–31), while both governors of the BOT and secretary generals of the NESDB until the end of the 1980s were appointed from among the elites of the Ministry of Finance (Suehiro 2005, 58–59). Except for these cases, we see very few cases of personal transfer across different ministries, and even across different departments. Personnel changes across at departments are basically confined to persons who will be promoted to the posts of director general, superintendent, and the permanent secretary.26) In addition to the strict rule of internally-promotion, three other principles seem to characterize personnel management in higher ranked posts of Thai bureaucracy.
First, a permanent secretary is expected to have occupied the highest posts of important departments in each ministry. These posts include the Department of Comptroller General, the Department of Customs and the Fiscal Policy Office (FPO) for the Ministry of Finance; the Department of Foreign Trade and/or the Department of Internal Trade for the Ministry of Commerce; the Department of Medical Services and/or the Department of Health for the Ministry of Public Health; and the Department of Industrial Economics and/or the Department of Industrial Promotion for the Ministry of Industry.
Second, the tenure of director general and permanent secretary is neither regulated by law nor determined by an implicit consensus, as is the case in Japan. Tenure is frequently determined by the will of superiors such as the permanent secretary and the ability of candidate. Consequently, the period of tenure varies very widely between one month and 10 years. From the 1990s onward, however, tenure seems to converge into two or three years, and the person is customarily appointed on October 1, and resigns on September 30, in accordance with the Thai fiscal year.
Third, prior to the 1970s, there was frequent evidence of a “fast track system.” If a candidate had a good family background (royal or aristocrats family members), high educational qualification outside of Thailand, and prominent performance, he/she could obtain higher post faster than others. It was not difficult to find permanent secretaries in their mere 40s. Since the mid-1980s, however, the age of appointment to the post of permanent secretary began to concentrate in the range of 57 to 59 years old, or 1 to 3 years before retirement. This fact implies that the promotion to the post of permanent secretary has been standardized in a hierarchical structure.
These characteristics have contributed to creating the stable structure of Thai bureaucracy. As I mentioned above, civil servants with lower ranks are automatically promoted according to their years of service, while an elite class with higher ranks is promoted on the basis of performance evaluation and good human relationship inside a particular organization. These rules naturally produce characteristics specific to the Thai bureaucracy, notably an inward-looking and conservative culture that is impervious to criticism from the outside. This is precisely the point that Thaksin attacked in the process of his public sector reform.
Who Were Promoted to Permanent Secretaries?
To test and confirm the rule of determining the promotion system, let me employ two case studies of the Ministry of Finance (MOF) and the Ministry of Interior (MOI) as examples. Table 5 summarizes the career path of each person who occupied the permanent secretary (PS) of the MOF between 1975 and 2005. Major facts derived from the table together with my research on PS’s educational qualification are as follows.
1) The majority of these PSMOF was holders of Ph.D. or Master Degree (Economics), and was educated in prestigious universities in the United States and Europe such as Michigan University (Amnuay), University of Illinois (Panas), University of London (Suparat), and Cambridge University (Jatumongkol).
2) Except for Aran (1993–95) who was transferred from the Ministry of Commerce, all the persons were promoted internally within the MOF.
3) For the cases of Amnuay (1975–77) and Panas (1982–92), PSMOF were promoted with the ages of 46 and 50, and the tenure of Panas covered 10 years. However, since the period of Bandit (1992–93), a “fast track system” was replaced by a more standardized system in which the PS was appointed to the post three to four years before retirement, and his tenure was confined to two to three years.
4) Before being appointed to the post of PSMOF, most of people had stints as director generals in at least three different mainstream departments of Comptroller General, Customs, and FPO. In recent years, main departments have shifted to the Department of Revenue and the Department of Excise due to the increasing authority in revenue estimates.
A comparison of the cases of PSMOF and PSMOI reveals both similarities and differences in their promotion systems (see Table 6).
1) Concerning educational background, based on my research, all the people of PSMOI were educated in local (not foreign) prestigious universities such as Chulalongkorn University and Thammasat University. And all the persons were further educated in the National College of Defense.
2) Most of these PSMOI were promoted step by step from district chiefs (nai amphoe) to governors of multiple provinces to director generals of mainstream departments such as the Department of Government (Krom Kan Pok-khrong) and the Department of Local Government. The career path for PSMOI seems to be more institutionalized than in the case of the Ministry of Finance.
3) Except for Chanasak (1997–2002), the tenures of all the persons were short (one to two years). Furthermore, appointment to PSMOI was conducted in accordance with regular personnel changes starting in October of each year.
The cases of PSMOI suggest that personnel promotion of the high ranked officials has been completely dominated by the explicit rule of the line ministry. Even Interior Minister must follow this rule in personnel management.
Since October 2002, the Thaksin government embarked on ambitious reform of the public sector in three different directions. These reforms include: 1) reorganization of government agencies on the basis of the agenda; 2) changes in personnel management on the basis of meritocracy rather than seniority system; and 3) improvement of public services according to the documented four year plan in each agency.
Concerning the reorganization of the public sector, Thaksin ordered the restructuring of 14 ministries (plus the Prime Minister Office or PMO) with 125 departments into 19 ministries (plus PMO) with 156 departments.27) Contrary to the original plan of downsizing public organizations, Thaksin was forced to increase the number of government agencies. This is in part because he had to deal with the potential dissatisfaction of government officials by increasing the number of posts (departments), and in part because he planned to reconstruct government organization more strategically by allocating a particular agency for a particular agenda.
For instance, the Ministry of Science, Technology and Environments (MSTE: four departments and five offices) was reorganized into the Ministry of Science and Technology (one department and three offices). At the same time, the Department of Energy Promotion belonging to the former MSTE was transferred to a new ministry (the Ministry of Energy), while two agencies of the Department of Environmental Quality Promotion and the Office of Environmental Policy were integrated into another new ministry (the Ministry of Natural Resources and Environment). Each agency was attached to an existing or new ministry according to its own agenda, while a lot of departments and offices were set up to undertake new state strategies such as the Department of Development of Thai Traditional and Alternative Medicine in the Ministry of Public Health, the Department of Intellectual Property in the Ministry of Commerce, and the Office of Welfare Promotion, Protection and Empowerment of Vulnerable Groups in the new Ministry of Social Development and Human Security.
Concerning personnel management, Thaksin introduced a new system or promotion based on the principle of meritocracy. He empowered not the Permanent Secretary but the Minister to directly appoint director generals, and made it possible to transfer able persons across at different ministries, or to appoint younger persons regardless of the traditional order of P (position) and C (classification) system. Thus, in September 2004, Jakramon Pasukwanich, who was the former secretary general of the NESDB, was transferred to the permanent secretary of the Ministry of Industry, while Ampol Kittiampol, a director general in the Ministry of Agriculture and Cooperatives, was newly appointed to serve as secretary general of the NESDB. Naris Chaiyasut who was the former rector of the Thammasat University, was appointed director general of Fiscal Policy Office over possible candidates from inside the Ministry of Finance. At the level of director general, a lot of persons were selected by their abilities or their connections with TRT. Such system of promotion undoubtedly had a great impact on traditional order and familial relationship in each office, and in turn stoked strong resistance among government officials (Nakharin 2008).
Finally, the Thaksin government set up the Office of Public Sector Development Commission (OPSDC) by appointing Vishnu Krua-ngam as its chairman on October 3, 2002.28) Major members include Bowornsak Uwanno, Chai-anan Samudavanija, and Orapin Sopchokchai, who had worked for the reform of public sector in the Chatichai government (1988–91) (OPSDC 2005a, 8–9). In May 2003, the cabinet meeting decided to approve an action plan submitted by the OPSDC which aimed to reduce by 30–50% the steps or the time needed for particular public service in each agency. The OPSDC document reported that the Department of Land Transport successfully reduced the time of issuing payment certification for automobile taxes from 30 minutes to 7 minutes, while the National Police Office reduced the time of arranging the formalities for going abroad from 15 days to 7 days (ibid., 12–13).
In 2005, OPSDC accelerated the reform of public services on the basis of the “Action Plan of Public Services Development 2005–2008” under the second Thaksin government (2005–08). This action plan requested each agency to define the target, strategy, cooperation with other agencies, concrete plan to improve the efficiency of public services, and budget needed in the four-year plan (OPSDC 2005b; Samnakngan Ngop-praman 2006). The Action Plan of 2005–2008 had a substantial impact on both working style of government officials (overtime work etc.) and the existing system of budget allocation under the control of line ministries. Accordingly, let me move to another reform of the Thaksin government, namely, reform of the budget system.
Another obstacle to Thaksin’s state reforms is the existing budget system in which most of the budget has been put under the direct control of responsible ministries according to their functions. In other words, responsible (line) ministries at first submit project proposals in conjunction with the targets set by a Five-Year Plan, while the four core agencies of the NESDB, FPO, BOT, and the Bureau of the Budget (BOB) consult with each other to decide on the budget allocation for each bottom-up project. For instance, in the Chuan government, 93.5 billion out of the total of 910 billion baht in FY 2001 were allocated to projects of local development, which include the “Development of Potentiality in Rural and Community People Program” (67.5 billion baht). It is reported that eight ministries and two government agencies were responsible for these projects, and necessary funds were delivered to each project through line ministry (BOB, Thailand’s Budget in Brief FY2001, 94–95). Such budget allocation typically shows the traditional style politics of clemency and charity targeting the rural poor people.
In addition, the procedures of budget allocation must follow the 1959 Act of the Budget. This act was formulated by Puey Ungpakorn (Governor of BOT and Director of BOB in that day) and his associates in order to strictly separate central budget between investment expenditures based on economic planning and ordinary expenditures including personnel expenses (Suehiro 2005). In 1982, the Prem government changed Puey’s policy (British style) to the Planning Programming Budget System (American style) or PPBS for the sake of improving the consistency and the effectiveness of budget planning (BOB, Thailand’s Budget in Brief FY1982). Introduction of the PPBS was a part of policy conditionality required of the Thai government by the World Bank in exchange of its structural adjustment loans (SALs).
Twenty years later, Thaksin ordered the BOB to replace the PPBS by a new policy of Strategic Performance Based Budget System or the SPBBS (Pran 2004, Vol. 1, 324–325). The new budget policy shifted the procedure of budget allocation from the bottom-up approach from line ministries to the top-down approach from the prime minister and the ruling party. Following the policy of the SPBBS, the BOB announced three major principles in budget planning: 1) putting priority on fiscal support of promoting the autonomy of local governments; 2) replacing function-based budget allocation by agenda-based one; and 3) introducing a four-year budget plan (FY2005–2008) for each agency in correspondence to the tenure of the second Thaksin government.30) All public agencies were forced to follow these principles, and to demonstrate definitely the necessity of each particular project with reference to state strategies addressed by the prime minister. Such policies are completely interconnected with the shift of policy-making system from a Five-Year Plan to state strategies as mentioned in section III.
Table 7 traces the budget allocation by functions, in the period of between FY1991 and FY2011, including the period of Thaksin government (from FY2002 to FY 2006). According to the policy of the BOB, functions of budget allocation are classified into four major categories: 1) general administration or general government services (general public services, defense matters, public order, and security); 2) community and social services (education, public health, social security, housing, religions, etc.); 3) economic services (energy, agriculture, manufacturing, transportation, communications, etc.); and 4) miscellaneous and unclassified items (BOB, Thailand’s Budget in Brief FY2006, 62–65). Looking at the table, we can easily find remarkable changes in the period of the Thaksin government.
First of all, the category of “national defense” showed a rapid decline in terms of percentage of allocation, which decreased from 16.0% in FY1991 through 8.9% in FY2000 to merely 6.3% in FY2006. Since the size of the total budget has increased by threefold in the corresponding period, the Ministry of Defense could maintain the same level in terms of actual value (see Fig. 3 in later). But it is apparent that the issue of national defense has been less important for the Thaksin government. In fact, he frequently addressed in his speeches that “the cold war regime collapsed and the era of competition for military expansion ended as well. We (Thailand) were facing a new era of economic competition in the world capitalism” (Shukan Tai Keizai, January 30, 2006). Such perception has naturally angered the military group, and became one of the leading causes behind the coup against Thaksin in September 2006.
On the other hand, Table 8 summarizes the distribution of budget expenditures from the viewpoint of responsible institutions. Institutions are basically classified into six groups: central funds; ministries (19 ministries and the PMO in FY2006); independent public agencies (13 agencies); independent bodies under the 1997 Constitution (8 bodies); state enterprises (22 enterprises); and revolving funds (BOB, Thailand’s Budget in Brief FY2006, 75–86).
The most prominent changes in budget allocation in the Thaksin government are the decline of ministries and increase of the central fund in terms of their percentages. Percentage of ministries had usually accounted for 84 to 87% of the total budget allocation until the FY1998. In FY1999, the National Police Office was separated from the Ministry of Interior, and was transferred to the status of independent public agency. Its budget or 38.1 billion baht accounted for 4.6% of the total amount in FY1999. If the National Police Office were included into ministries, line ministries continue to account for 84.9%, not 80.3% in the table.33) However, in the period of Thaksin government, the percentage of ministries dramatically decreased from 80.3% in FY1999 to 62.8% in FY2004 and 65.9% in FY2006. In contrast, central fund increased its percentage from 9.3% to 22.8% and 18.8% in corresponding fiscal years.
The central fund or ngop klang is originally designed as a special fund to meet extra expenditures such as natural disasters, royal tours, additional payments for government employees, and special funds for early retirement of government officials. In addition to these items, two other categories took up sizable chunks of the central fund before the Thaksin government. These two include expenditures on government pensions and projects of emergency local development. Indeed, expenditures on government pensions accounted for as much as 40% of the total central fund in the Chuan government due to increasing number of government officials who reached retirement age. On the other hand, a project of “emergency local development” was frequently used as political instruments for each coalition government to attract supports from the rural people (Jarat 1995).
Importantly, additional revenues continuously flowed into the state budget during each fiscal year under the Thaksin government (see section II of this article) and these additional revenues were transferred not to line ministries but to the central fund by order of the prime minister. Likewise, expenditures on the 30-baht medical services were delivered not to the Ministry of Public Health, but to another independent fund or “revolving funds.”35) By employing such techniques, Thaksin could promote his dual-track policies without any repercussions from ministries as well as economic technocrats.
Mass media frequently attacked such management of budget allocation as an “off-budget system” or an arbitrary exploitation of state revenue. But this criticism misses the point because Thaksin’s technique does not violate any of the rules of the existing budget system.36) Nevertheless, increasing proportions of the central fund and revolving funds are not normal from the standpoint of maintaining sound management of national budget. Accordingly, in 2005, Thaksin ordered the BOB to set up ad hoc committee to reconsider and revise the 1959 Act of the Budget in favor of agenda-based budget system.37) But before a new budget could be enacted, Thaksin was ousted from political power by the military coup in September 2006.
As mentioned in the first section of this article, Thaksin had a Janus-faced public image as populist and state reformist. As a populist, he launched a variety of policies in favor of the masses. In fact, according to the pole survey by ABAC, these policies attracted a great deal of support from the people: 84% for OTOP, 81% for the 30-baht medical services, and 79% for village funds scheme in contrast to 39% for anti-corruption campaign and 35% for restructuring of state enterprises (Tamada 2005, 182–183). Enormous popularity coupled with power concentration has resulted in a “strong prime minister.” Finally, a strong prime minister, intentionally or unintentionally, suggests another chief of state (Pramuk), and therefore a strong competitor to the king.
Immediately after the great victory of TRT in 2005 general election, the Nation Weekly Magazine carried a special issue headlined “The Second Thaksin Government: Next is the Presidency?” (Nation Weekly Magazine 2005). In the context of Thailand, the presidential system is an alternative political form against the monarchy system. Therefore, Thaksin’s great victory in the general election was interpreted by a royalist-military group as a potential and serious menace to the monarchy system. At the same time, Thaksin’s reform of the budget system at the expense of defense matters has always irritated a military group. In addition, he directly intervened in the top personnel management of the military by appointing his cousin in 2003. These activities finally resulted in the counter-balancing activity of a royalist-military coup to oust Thaksin from the power in 2006 (Wasana 2008).
On the other hand, Thaksin is an active state reformist. He promoted various reforms to modernize the Kingdom of Thailand: changes in the initiatives of policy making from technocrats to prime minister and TRT; changes in the principle of macro-economic management from a Five-Year Plan to a state strategy; changes in fiscal base of national projects from public debt to own state revenue; changes in the budget system from the function-based budget allocation to the agenda-based one; and changes in public sector from traditional bureaucracy to more efficient modern agencies. More importantly, his reforms also aimed to change the traditional culture of Thai bureaucracy and social values of the Thai people since he wished to develop Thailand into an advanced country under global capitalism.
But his style of conducting reforms was too speedy and too radical for the Thai people. In addition, after the landslide victory of TRT in 2005 general election, Thaksin began to place more priority on the second track of his dual-track policies such as the NCP, the Mega Projects, and modernization of local stock market, which hardly delivered direct benefits to most people. Consequently, the people were disappointed with the second Thaksin government policies. Rather they tend to look at Thaksin’s efforts as reforms for his own interest rather than for the people.
At this conjuncture, mass media disclosed that Thaksin had sold all the stocks of his family holding in Shin Corporation (telecommunications) to a Singaporean firm in exchange of 73.3 billion baht in cash (January 23, 2006). The Thai mass media immediately attacked his trade of stocks as an “unfair” move because Thaksin and his family did not pay any taxes for their earnings. At the same time, mass media also condemned Thaksin as a traitor to a country because he neglected a national interest (local investors) when he decided to sell his stocks. This incident became the catalyst for the anti-Thaksin movement among the people, especially among the middle-class in the Bangkok Metropolitan area, and it developed into the formation of the People’s Alliance for Democracy or PAD (so-called yellow shirts group) in February 2006 (Nariphon 2006; Pasuk and Baker 2009; Suehiro 2009, Ch. 6).
Thaksin’s reform of the public sector also caused to provoke resistance among civil servants. Strategic Plan of the OPSDC was designed with Western key concepts imported from the outside of Thailand. But these concepts were unfamiliar to lower ranked officers who work at public service points. Furthermore, his reforms were inclined to destroy the traditional rules and comfortable culture of Thai bureaucracy such as seniority system and quasi-familial relationship. Civil servants were tired of meeting the strict guidelines imposed by the OPSDC. For these reasons, both the masses and the civil servants temporarily welcomed or accepted the military coup to end the Thaksin regime despite its apparent annulment of the gains of the democratization movement during the 1990s.
Likewise, the new government restored the authority of the NESDB. The NESDB now neglected Thaksin-initiated state strategies and revised the 10th Five-Year Plan in accordance with the king’s philosophy of “sufficiency economy” (setthakit phophiang). Its action plan in July 2007 focused on social stability and public calm rather than economic development and modernization of a country. Along with the revival of bureaucracy, the government also restored traditional rule of budget allocation or function-based budget system in favor of line ministries, and quickly increased budge for defense matters (See Fig. 3).
Source: Made by the author on the basis of Thailand’s Budget in Brief (BOB, each edition).
Budget allocation for defense matters dramatically increased by 35% from 85 billion baht (6.3% of the total) in FY2006 to 115 billion baht (7.3%) in FY2007, while the central fund decreased by 20% from 243 billion baht (17.9%) to 194 billion baht (12.4%) in corresponding years (BOB, Thailand’s Budget in Brief FY2007). In FY2008 and FY2009, the budget allocation for defense matters continued to increase to 143 billion baht (increase by 24% as compared to the previous fiscal year) and to 168 billion baht (increase by 18%), respectively (BOB, Thailand’s Budget in Brief FY2008 and FY2009). These figures suggest the restoration of the military group’s status to the level before the Thaksin government (See also Table 7).
All the moves above demonstrate the effort at resetting the situation of Thailand to the point just before the advent of the Thaksin regime or the effort to completely destroy Thaksinocracy. In the eyes of the new government, Thaksin is a virus that has invaded the computer of Thai society. Therefore, they had to quarantine the virus first and then reset both politics and society to “normal.” The final step of this reset is a court decision to order the dissolution of TRT and the cease of eligibility of 111 TRT executive members for election in next five years. This court decision of May 2007 signals the end of Thaksinocracy and the foreclosure of the possibility of Thaksin’s return to the political scene.
However, this resetting work could not eliminate the influence of Thaksin from Thai politics. This is because the new government after the general election under the 2007 Constitution was transformed from an anti-Thaksin group into a pro-Thaksin group, namely, People’s Power Party (PPP). PPP was led by Samak Sundaravej who openly announced that he was willing to serve as the agent of Thaksin Shinawatra. But Samak was ousted from the premiership in September 2008, and Somchai Wongsawat, who succeeded Samak and Thaksin’s younger brother-in-law, was also forced to resign in December according to the orders of the Constitution Court. Finally, Abhisit Vejjajiva of Democrat Party was appointed the 27th prime minister in December 2008 as a result of political bargaining among Democrat Party, military group, royalist members, and anti-Thaksin groups.
Such a political bargaining without democratic procedures created another political conflict between an anti-Thaksin group (a yellow shirts group or PAD and ruling parties) and a pro-Thaksin group (a red shirts group or the United Front of Democracy against Dictatorship [UDD] and opposition parties) at the end of 2008.38) In 2010, anti-government movement led by UDD has quickly grown up into big rallies due in part to the financial support from Thaksin outside Thailand and in part to the economic recession originated in a global financial crisis in 2008. Finally political conflict between UDD and the government (the military) developed into a blood-shed incident in May 2010 (Montesano et al. 2012).
Generally speaking, it is known that the income gap in terms of the gini index tends to expand when a certain country is moving from a lower-income country into a middle-income country. This hypothesis, or a Kuznet’s reverse U-shape curve, is precisely adaptable to the case of Thailand. Indeed, the gini index of Thailand increased from 0.43 in 1980 to 0.50 in 1987, and further to 0.54 in 1992 (UNDP 2007, 23).41) It is apparent that income distribution has deteriorated during the economic boom.
Crucially, Thaksin is the first prime minister to actually tackle the problems of Thailand as a middle-income country. His state reforms primarily aimed to narrow the gap between economic status of Thailand as a middle-income country and old-fashioned government agencies to handle economic problems. He focused on inequality of opportunity (few business chances in rural areas) rather than inequality of result (poverty in rural areas). Contrary to previous governments, which put priority on poverty reduction, Thaksin emphasized the necessity of creating business chances and community businesses in rural area (village funds, people’s bank, OTOP). Intentionally or unintentionally, his new approach seems to have politically awakened the rural people. They are now focusing their attention on their disadvantaged economic status and the inadequate policies adopted by the traditional ruling elites, and further afield on the state regime itself.
If this hypothesis is true, then any government will have to face the necessity and challenge of solving the various problems facing contemporary Thailand as a middle-income country, problems such as upgrading of industrial structure, resolving income and/or assets disparity in urban and rural areas through creation of jobs and businesses opportunities, fundamental reforms of tax system including individual income tax, property tax, and inheritance tax (phasi moradok), construction of social security system, especially a national pension scheme, and, finally, improvement of public services.
In August 2011, Yingluck Shinawatra, the youngest sister of Thaksin, became the 28th prime minister in Thailand after the victory of her political party (Pheu Thai Party) in the 2011 general election.42) Does this political incident provide a new opportunity for Thaksin to return to political arena and create the incentive for a new government to revive uncompleted Thaksin’s reforms in Thailand? My answer is a negative one. Thaksin himself is not a creative destroyer of Thai state anymore. Now he turns into a pure and simple destroyer for Thai society. New government led by Yingluck also has neither intention nor ability of promoting constructive state reforms because they must depend heavily on both populist policies and revived bureaucracy.
Nevertheless, state reforms attempted by Thaksin during his administration are still needed as long as Thailand wishes to maintain or improve its economic status and develop into a more advanced country in the future. On the other hand, Thai people rejected his reforms because these reforms were too speedy and too radical from the standpoint of Thai social value (preference of medium). At the same time, his reforms put priority on business interests rather than social justice. Accordingly, Thailand needs not Thaksin himself or another Thaksin, but a new political leader who will be able to harmonize modernization of Thai state with the happiness and well-being of the people on the basis of Thai social values (Thainess).
Ammar Siamwalla et al. 1997. Thailand’s Boom and Bust: Collected Papers. Bangkok: Thailand Development Research Institute.
Anek Laothamatas. 1992. Business Associations and the New Political Economy of Thailand: From Bureaucratic Polity to Liberal Corporatism. Boulder: West View.
Apichat Satitniramai. 2002. The Rise and Fall of the Technocrats: The Unholy Trinity of Technocrats, Ruling Elites and Private Bankers and the Genesis of the 1997 Economic Crisis. Ph.D. dissertation, University of Wales, Swansea, UK.
Athiwat Sapphaithun อธิวัฒน์ ทรัพย์ไพฑูรย์. 2003. Trakun Chinnawat: Phu Sansang “Shin Corp.” Su “Chao-yutthajak Thurakit Thorakhomanakhom” khong Thai ตระกูลชินวัตร: ผู้สรรค์สร้าง “ซินคอร์ป” สู่ “เจ้ายุทรจักรธุรกิจโทรคมนาคม” ของไทย [Shinawatra family: From the founder of Shin Corporation to a strategist of telecommunications]. Bangkok: Wannasan.
Bank of Thailand. Website. Accessed October 1, 2013, http://www.bot.or.th/Thai/Statistics/.
Bhidhaya Bowornwathana. 2004. Thaksin’s Model of Government Reform: Prime Ministerialization through “A Country Is My Company” Approach. Asian Journal of Political Science 12(1): 135–153.
Funston, John, ed. 2009. Divided over Thaksin: Thailand’s Coup and Problematic Transition. Singapore: Institute of Southeast Asian Studies.
Government of Thailand. 2002. Racha-kitchanubeksa ราชกิจจานุเบกษา [Royal Thai Government gazette]. Bangkok: The Cabinet Secretariat, the Office of Prime Minister.
Jarat Suwannamala จรัส สุวรรณมาลา. 1995. Pathirup Rabop Kan Khlang Thai: Krajai Amnart su Phumiphak lae Thongthin ปฏิรูประบบการคลังไทย: กระจายอำนาจสู่ภูมิภาคและท้องถิ่น [Fiscal reforms of Thailand: Decentralization]. Bangkok: Khleg Thai.
Kawamori Masato 河森正人. 2009. Tai no Iryo Fukushi Seido Kaikaku タイの医療福祉制度改革 [Reforms of medical welfare system in Thailand]. Tokyo: Ochanomizu Shobo.
Krom Sulakakorn กรมศุลกากร. 1994. Thi Raluk Wan Sathapana Krom Sulakakorn Khrop Rop 120 Pi ที่ระลึกวันสถาปนากรมศุลกากร ครบรอบ ๑๒๐ปี [120 anniversary memorial book on the Department of Customs]. Bangkok: Department of Customs.
Matichon Weekly Magazine, ed. 2002. Cover Story: Absolute Power Corrupts Absolutely. Matichon Sutsapda มติชนสุดสัปดาห์ 22 (1125): 11–17.
McCargo, Duncan; and Ukrist Pathmanand. 2005. The Thaksinization of Thailand. Copenhagen: NIAS Press.
Montesano, Michael J.; Pavin Chachavalpongpun; and Aekapol Chongvilaivan, eds. 2012. Bangkok, May 2010: Perspectives on a Divided Thailand. Singapore: Institute of Southeast Asian Studies.
Muscat, Robert. 1994. The Fifth Tiger: A Study of Thai Development Policy. Helsinki: United Nations University Press.
Nakharin Maektrairat ナカリン・メークトライラット. 2008. Takkushin Seiken-ki no Gyosei Kaikaku タックシン政権期の行政改革 [Reforms of the public sector under the Thaksin regime]. In Tai Seiji, Gyosei no Henkaku 1991–2006 Nen タイ政治・行政の変革1991–2006年 [Thailand in motion: Political and administrative changes, 1991–2006], edited by Yoshifumi Tamada 玉田芳史 and Tsuruyo Funatsu 船津鶴代, pp. 203–235. Chiba: JETRO Institute of Developing Economies.
Nagai Fumio 永井史男. 2008. Chiho Bunken Kaikaku: “Gorika Naki Kindaika” no Kiketsu 地方分権改革―「合理化なき近代化」の帰結 [Decentralization: The result of “modernization without rationalization”]. In Tai Seiji, Gyosei no Henkaku 1991–2006 Nen タイ政治・行政の変革1991–2006年 [Thailand in motion: Political and administrative changes, 1991–2006], edited by Yoshifumi Tamada 玉田芳史 and Tsuruyo Funatsu 船津鶴代, pp. 117–158. Chiba: JETRO Institute of Developing Economies.
Nariphon Phetcharadee นฤพน เพชรดี, ed. 2006. Banthuk Prawatthisat 2549: Lom !! Rabop Thaksin บันทึกประวัติศาสตร ๒๕๔๙ ล้ม!! ระบอบทักษิณ [Documents in 2006: Collapse of the Thaksin regime]. Bangkok: Ruabai.
Nation Weekly Magazine, ed. 2005. Nayok Thaksin Samai-thi 2 Borihan Baep Prathanathibodi นายกทักษิณสมัยที่๒ บริหารแบบประธานาธิบดี [The second Thaksin government, next target is the presidency?]. Nation Sutsapda 13(667).
National Economic and Social Development Board (NESDB). 2006. Rang Phaen Phatthana Setthakit lae Sangkhom haeng Chart Chabap thi Sip Pho. So. 2550–2554 ร่างแผนพัฒนาเศรษฐกิจและสังคมแห่งชาติ ฉบับที่สิป พ.ศ.๒๕๕๐–๒๕๕๔ [Draft of the 10th Five-Year Economic and Social Development Plan, 2007–2011]. Bangkok: NESDB.
―. 2005. Rai-ngan Kan Tittam Pramoen Phon-kan Phatthana Setthakit lae Sangkhom khong Prathet: 3 Pi khong Phaen Phatthana Chabap thi 9 รายงานการติดตามประเมิน ผลการพัฒนาเศรษฐกิจและสังคมของประเทศ: ๓ปีของแผนพัฒนา ฉบับที่๙ [Evaluation report on the national economic and social development: Three years of the Ninth Plan]. Bangkok: NESDB.
―. 2003a. Thailand in Brief 2003. Bangkok: NESDB.
―. 2003b. Rai-ngan Kan Pramoen Nayobai Setthakit Rak-ya lae Lak Prakan Sangkhom รายงานการประเมิน นโยบายเศรษฐกิจรากหญ้า และหลักประกันสังคม [Evaluation report on policies concerning the promotion of grass-roots economy and social security infrastructure]. Bangkok: NESDB.
―. 2003c. Executive Summary of National Competitiveness Plan. Bangkok: NESDB.
Nidhi Aeusriwongse นิธิ เอียวศรีวงศ. 2006. Watthanatham Khon yang Thaksin วัฒนธรรมคนอย่างทักษิณ [Culture of human being like Thaksin]. Bangkok: Matichon.
Nihon Tai Kyokai 日本タイ協会, ed. 2008. Gendai Tai Doko 2006–2008 現代タイ動向 2006–2008 [Political affairs of contemporary Thailand, 2006–2008]. Tokyo: Mekong Publishing.
Niwat Kanjanaphoomin. 2004. Pension Fund, Provident Fund and Social Security System in Thailand. A paper presented at the International Conference on “Pensions in Asia: Incentives, Compliance and Their Role in Retirement,” organized by Hitotsubashi University at Tokyo, February 23–24, 2004.
Ockey, James. 2005. Making Democracy: Leadership, Class, Gender, and Political Participation in Thailand. Chiang Mai: Silkworm Books.
Office of Public Sector Development Commission (OPSDC) (Samnakngan Ko. Pho. Ro. สำนักงาน ก.พ.ร.). 2005a. Rai-ngan Khwam Kaona khong Kan Phatthana Rabop Rachakan nai Rop 3 Pi รายงานความก้าวหน้า ของการพัฒนาระบอบราชการ ในรอบ๓ปี [Interim report on public sector development for the past three years]. Bangkok: OPSDC.
―. 2005b. Phaen Pathibat Rachakan 4 Pi แผนปฎิบัติราชการ ๔ปี [The four year action plan of public sector development]. Bangkok: OPSDC.
Pasuk Phongpaichit; and Baker, Chris. 2009. Thaksin: Second Expanded Edition. Chiang Mai: Silkworm Books.
―, eds. 2008. Thai Capital after the 1997 Crisis. Chiang Mai: Silkworm Books.
―. 2007. Coup in Thailand and Democratization. A paper presented at the Workshop on “Thailand after the Military Coup,” organized by the Institute of Social Science, the University of Tokyo, January 16, 2007.
―. 2004. Thaksin: The Business of Politics in Thailand. Chiang Mai: Silkworm Books.
―. 2000. Thailand’s Crisis. Chiang Mai: Silkworm Books.
Porter, Michael. 2003. Thailand’s Competitiveness: Creating the Foundations for Higher Productivity. Bangkok: NESDB.
Pran Phisit-setthakan ปราณ พิสิฐเศรษฐการ, ed. 2004. Thaksinomics, Ruam Suntharaphot Samkhan khong Pho.To. Tho. Dr. Thaksin Chinnawat ทักษิโณมิกส์: รวมสุนทรพจน์สำคัญ ของพ.ต.ท.ดร.ทักษิณ ชินวัดร [Collections of important speeches of police general, Dr. Thaksin Shinawatra]. 3 vols. Bangkok: Matichon.
Rungsan Thanaphonphan รังสรรค์ ธนะพรพันธุ์. 2005. Jak Thaksinomics su Thaksinathipatai จาก Thaksinomics สู่ ทักษิณาธิปไตย [From Thaksinomics to Thaksinocracy]. Bangkok: Open Books.
―. 1996. Setthakit Kan-khlang kap Botbat Ratthaban Thai เศรษฐกิจการคลัง กับบทบาทรัฐบาลไทย [Public finance and the role of Thai government]. Bangkok: Khret Thai.
Samnak Lekhathikan Khana Rattamontri สำนักเลขาธิการ คณะรัฐมนตรี. 2002. Rai-ngan Sadaeng PhonkanDamnoenkan khong Khana Rattamontri Tam Naew Nayobai Phunthanhaeng Rat, Rattaban Phan Tamruat Tho Thaksin Chinnawat Pi thi 1 รายงานแสดงผลการดำเนินการของคณะรัฐมนตรี ตามแนวนโยบายพื่นฐานแห่งรัฐ, รัฐบาล พันตำรวจโท ทักษิณชินวัตร ปีที่๑ [Report on the achievement of the cabinet according to the basic policies of the state: Police general Thaksin Shinawatra government in the first year]. Bangkok: The Cabinet Secretariat, the Office of Prime Minister.
Samnakngan Ngop-praman สำนักงานงบประมาญ. 2006. Ngop-praman Raijai Prajam Pi Ngop-praman Pho. So. 2549 งบประมาญรายจ่าย ประจำปีงบประมาญ พ.ศ.๒๕๔๙ [Ordinary budget expenditures in FY2006]. Bangkok: Baphit Kan Phim.
Shukan Tai Keizai Henshubu 『週刊タイ経済』編集部. 2006. Megapurojekuto Keikaku メガプロジェクト計画 [Plan of mega project]. Shukan Tai Keizai 週刊タイ経済, January 30, 2006.
―. 2001. Tai Rakku Tai To no Keizai Seisaku タイラックタイ党の経済政策 [Economic policy of the Thai Rak Thai Party]. Shukan Tai Keizai 週刊タイ経済, January 5, 2001.
Somkid Jatusripitak สมคิด จาตุศรีพิทักษ์. 2001. Wisaithat Khun Khlang Somkid: Waduai Naew Khit lae Kolayut Borisat Prathet Thai วิศัยทัศน์ขุนคลังสมคิด: ว่าด้วยแนวคิด และกลยุทธ์บริษัทประเทศไทย [Vision of finance minister Somkid: Direction and tactics of Thailand Company]. Bangkok: Phu Chatkan.
Somucho Chokan-kambo Kikaku-ka 総務庁長官官房企画課. 1995. Tai no Gyosei タイの行政 [Administration in Thailand]. Tokyo: Somucho.
Sorakon Adunyanon สรกล อดุลยานนท์. 1993. Thaksin Chinnawat: Assawin Khlun Lukthi Sam ทักษิณ ชินวัตร: อัศวินคลื่นลูกที่สาม [Thaksin Shinawatra: The knight of the third wave]. Bangkok: Matichon.
Suehiro Akira 末廣 昭. 2014. Shinko Ajia Keizai-ron: Kyacchiappu o Koete 新興アジア経済論―キャッチアップを超えて [Emerging Asian economies: Beyond the catch-up industrialization]. Tokyo: Iwanami Publisher.
―. 2010. Industrial Restructuring Policies in Thailand: Japanese Approach or American Approach. In Sustainability of Thailand’s Competitiveness: The Policy Challenges, edited by Patarapong Intarakumnerd and Yveline Lecler, pp. 129–173. Singapore: Institute of Southeast Asian Studies.
―. 2009. Tai: Chushin-koku no Mosaku タイ―中進国の模索 [Thailand: Challenges of a middle-income country]. Tokyo: Iwanami Publisher.
―. 2008. Keizai Shakai Seisaku to Yosan Seido Kaikaku: Takkushin Shusho no “Tai Okoku no Gendaika Keikaku” 経済社会政策と予算制度改革―タックシン首相の「タイ王国の現代化計画」 [Socio-economic policies and reform of the budget system: “The Kingdom of Thailand modernization framework” led by prime minister Thaksin]. In Tai Seiji, Gyosei no Henkaku 1991–2006 Nen タイ政治・行政の変革1991–2006年 [Thailand in motion: Political and administrative changes, 1991–2006], edited by Yoshifumi Tamada 玉田芳史 and Tsuruyo Funatsu 船津鶴代, pp. 237–285. Chiba: JETRO Institute of Developing Economies.
―. 2007. Catch-up Industrialization: The Trajectory and Prospects of East Asian Economies. Singapore: National University of Singapore Press.
―. 2006. Famiri Bijinesu-ron: Kohatsu Kogyoka no Ninaite ファミリービジネス論―後発工業化の担い手 [Family business: Agents of late industrialization]. Nagoya: Nagoya University Press.
―. 2005. Who Manages and Who Damages the Thai Economy? The Technocracy, the Four Core Agencies System and Dr. Puey’s Networks. In After the Crisis: Hegemony, Technocracy and Governance in Southeast Asia, edited by Takashi Shiraishi and Patricio N. Abinales, pp. 15–68. Kyoto: Kyoto University Press; Melbourne: Trans Pacific Press.
―. 2000. Asian Crisis and Economic and Social Restructuring: Americanization and Social Governance. In Developing Economy in the Twenty-First Century: The Challenges of Globalization, edited by Ippei Yamazawa, pp. 9–24. Chiba: JETRO Institute of Developing Economies.
―. 1995. Chinawatto Gurupu: Tai no Joho Tsushin Sangyo to Shinko Zaibatsu チナワットグループ―タイの情報通信産業と新興財閥 [The Shinawatra group: Telecommunications industry and newly emerging business groups in Thailand]. Ajia Keizai アジア経済 36(2): 25–60.
Suehiro Akira 末廣 昭; and Higashi Shigeki 東 茂樹, eds. 2000. Tai no Keizai Seisaku: Seido, Soshiki, Akuta タイの経済政策―制度・組織・アクター [Economic policy in Thailand: Institutions and actors]. Chiba: JETRO Institute of Developing Economies.
Supawan Rojanapakorn สุภวรรณ รจนาปกรณ์, ed. 2003. Khon Khwam-khit Thaksin Shinawatra: Jak Rai-ngan “Nayok Thaksin Khuikap Prachachon” คนความคิด ทักษิณ ชินวัตร: จากรายงาน “นายกทักษิณคุยกับประชาชน” [Thaksin as a thinker: Prime Minister Thaksin talk with peoples]. 4 vols. Bangkok: Wannasan.
Tamada Yoshifumi 玉田芳史. 2005. Takkushin Seiken no Antei: Hossoku 3 Nemme niatatte タックシン政権の安定―発足3年目にあたって [Stability of the Thaksin government: Three years experience]. Ajia, Africa Chiiki Kenkyu アジア・アフリカ地域研究 4(2): 167–194.
―. 2003. Minshuka no Kyozo to Jitsuzo: Tai Gendai Seiji Hendo no Mekanizumu 民主化の虚像と実像―タイ現代政治変動のメカニズム [Real and virtual images of democratization: Political changes in contemporary Thailand]. Kyoto: Kyoto University Press.
Tamada Yoshifumi 玉田芳史; and Funatsu Tsuruyo 船津鶴代, eds. 2008. Tai Seiji, Gyosei no Henkaku 1991–2006 Nen タイ政治・行政の変革1991–2006年 [Thailand in motion: Political and administrative changes, 1991–2006]. Chiba: JETRO Institute of Developing Economies.
United Nations Development Programme (UNDP). 2007. Thailand Human Development Report 2007: Sufficiency Economy and Human Development. Washington D.C.: UNDP.
Vishnu Krua-ngam วิษณุ เครืองาม. 2002. Kan Patirup Rabop Rachakan การปฏิรูบระบบราชการ [Administrative reforms]. Bangkok: Samnak Nayok Rattamontri.
Warr, Peter G.; and Bhanupong Nidhiprabha, eds. 1996. Thailand’s Macroeconomic Miracle: Stable Adjustment and Sustainable Growth. Washington, D.C.: World Bank; Kuala Lumpur: Oxford University Press.
Wasana Nanuam วาสนา นาน่วม. 2008. Lap Luang Phrang: Pathiwat Prasat-sai ลับลวงพราง: ปฏิวัติปราสาททราย [Deception: Revolution to build a castle in the air]. Bangkok: Matichon.
Wichai Boonlua วิชัย บุญเหลือ, ed. 2006. Pit Tamnan Thaksin ปิดตำนานทักษิณ [Shut the textbook on the Thaksin style]. Bangkok: Matichon.
Wirat Saengthongkham วิรัตน์ แสงทองคำ. 2001. Somkid Jatusripitak สมคิด จาตุศรีพิทักษ์. Phu Chatkan Rai-duan ผู้จัดการ รายเดือน 18(211): 64–103.
Worawan Chandoevwit. 2003. Thailand’s Grass Roots Policies. TDRI Quarterly Review 18 (2): 3–8.
World Bank. 2001. Thailand Social Monitor: Poverty and Public Policy. Bangkok: World Bank Office Bangkok.
1) Text is quoted from a provisional English translation by Pasuk and Baker (2007).
2) According to the survey of the Assumption Business Administration College or ABAC in October 2006, 71% of the people were in favor of the Surayud Julanonda temporary government. However, slow-paced response to rural people’s problems eroded popular support for the new government and support, which quickly dropped to 35% in February 2007. See Pasuk and Baker (2009) and Suehiro (2009, Ch. 6).
3) “An ambitious populist” here implies another king as great father of a country, who provides support to all the people with great mercy. Nidhi analyzes the presence of Thaksin as a competitor to the king in the context of Thai political culture of the patrimonial state (Nidhi 2006).
4) For more detailed study on backgrounds and the progress of 30-baht universal health services in reference to the reformist groups in the Ministry of Public Health, see Kawamori (2009).
5) Concerning the collection of speeches of Thaksin, a lot of books are available. Among them, three volume books edited by Pran Phisit-setthakan (2004) are the best ones, which consist of Vol. 1 (Thaksinomics and a CEO Country), Vol. 2 (Thaksin and Social Policies), and Vol. 3 (Thaksin as a Leader in Asia and the World).
6) Thaksin himself defined the CEO system as a system of moderator, or rabop chaophap (Pran 2004, Vol. 1, 294–295) or a system of integrator of organizations, or phu-wa buranakarn (ibid., Vol. 2, 223–233).
7) For a detailed account of the development of Thaksin’s business activities, see Sorakon (1993), Suehiro (1995; 2006, Ch. 4), Athiwat (2003), and Pasuk and Baker (2004, Ch. 2).
8) The objectives of dual-track policies were explained by Thaksin himself in his speech in Manila, the Philippines, on September 8, 2003 (Pran 2004, Vol. 1, 26–38).
9) In August 2011, Yingluck Shinawatra, the youngest sister of Thaksin, was appointed a prime minister owing to a victory of pro-Thaksin political party in a general election of July 2011.
10) Increase of private consumption can be attributed partially to rapid growth of consumer’s credit (mini bubble economy) in the period of the Thaksin administration. Indeed, outstanding consumer’s credit doubled, from 72.5 billion baht in the end of 2002 to 143.5 billion baht at the end of 2005 (Bank of Thailand website).
11) Additional state revenue amounted to 48 billion baht in FY 2002, 146 billion baht in FY 2003, and 89 billion baht in FY 2004, respectively. Original estimated revenue in each year was around 1,000 billion baht, and then surplus accounted for 5% to 15% of the total (See Table 7 of this article).
12) For more information on the decision-making process of economic policies in Thailand, see Muscat (1994), Warr and Bhanupong (1996), Suehiro and Higashi (2000, Ch. 1), and Suehiro (2005).
13) After the currency crisis, Japanese government provided a huge amount of credits through the Miyazawa Plan and extra yen credits between 1998 and 1999 (Suehiro 2009, 64–65).
14) The total number of cabinet members accounted for 26 to 44 persons between 1973 and 1990, while deputy ministers accounted for 12 to 21 persons in corresponding period. The Anant government in 1992 reduced its members to 26 persons and 8 persons respectively due to the nature of temporary government after the May bloody incidents in 1992.
15) Author’s interview with Patcharee Siroros in Bangkok, February 1999.
16) Such key persons in the Thaksin government include Pansak Vinyaratn (prime minister’s advisor), Vishnu Krua-ngam (chairman of the Public Sector Development Commission), and Kittidej Sutsukorn (advisor to the Industry Minister), who came from policy advisory team of the Chatichai government (Nakharin 2008).
17) The full name of the committee is the Committee on Strategies and Tactics to Solve National Urgent Problems.
18) All of Thaksin’s speeches at the radio broadcasting until 2003 are edited and included in Supawan (2003). This style of direct dialogue with the people was adopted by the Samak government and the Abhisit government (on TV).
19) Interview conducted by the author with the TRT’s executive committee members in Bangkok, March 2001.
20) These business groups changed their strategies in favor of the Thaksin government in July 2006, and shifted their political donations to the Democrat Party.
21) Author’s interview with the NESDB staffs in Bangkok, August 2001. This plan is officially named a “Strategies for Improvement of Quality of Economic Growth and Sustainable National Economic Development 2001–2006,” which consists of two parts and 28 items.
22) For a comparative study on the objectives, the process of policy-making, and the institutional framework between the IRP and the NCP, see Suehiro (2010).
23) In October of 2005, March and June of 2006, the NESDB submitted again and again revised drafts to the cabinet meeting because there was a sharp conflict between the Thaksin’s own ideas based on his state strategy and the NESDB’s original proposals based on the philosophy of “sufficiency economy” (setthakit phophiang) propounded by the king. For an account for the ideas behind the “sufficiency economy,” see UNDP (2007) and Suehiro (2009, Ch. 4).
24) Thaksin preferred to use the term “the economy of speed” rather than “the economy of scale,” because he liked very much the book, Business at the Speed of Thought, by Bill Gates of Microsoft Corporation (Pran 2004, Vol. 1, 177; Vol. 2, 338).
25) Position and classification (P.C.) system for government officers was officially abolished by the Thaksin government before the 2006 military coup.
26) These fact findings and description on the rule of personnel management are based on the author’s survey on 750 persons in director generals and permanent secretaries in major ministries. This work was conducted in cooperation with Ukrist Pathmanand of Chulalongkorn University in 2004 and 2005.
27) For more detail information on reorganization of the government agencies, see two royal degrees concerning “Reforms of Ministries and Departments” on October 2, 2002 (in Thai), which are included into the Racha-kitchanubeksa (Royal Thai Government Gazette), Vol. 119, Part 99 Ko. (pp. 14–34) and Part 102 Ko. (pp. 66–85).
28) For more on Vishnu’s idea of administrative reforms, see Vishnu (2002).
29) Author’s interview with Nakharin Maektrairat, the Dean of Faculty of Political Science of Thammasat University in June 2006, in Tokyo. Concerning the implementation of “Strategic Plan for Public Sector Development,” Thaksin himself explicitly underlined its necessity in his speech of September 21, 2003 with the title of “Development of the Quality of Our Country under the CEO Regime” (Pran 2004, Vol. 1, 73–87).
30) Interviews conducted by the author at the Research and Planning Division of the BOB in August 2006, in Bangkok.
31) An idea of nation-wide pension scheme was abolished later due to the budget constraints. For an overview of social security system in Thailand, see Niwat (2004).
32) After the 2006 coup, the percentages of economic services have further decreased due to political needs of increasing general administration and health services.
33) In the process of reorganizing the government sector in October 2002, Thaksin changed again the status of the National Police Office into an independent body under the direct control of the prime minister. So, it is not adequate to integrate the budge of the National Police Office into line ministries.
34) After the end of the Thaksin government, the budget allocation for the central fund reincreased from 198 billion baht in FY2007 to 266 billion baht in FY2011. This recovery should be attributed to rapid increase of government subsidies for pensions and health insurance schemes for government officials.
35) Budget allocation of “30-baht medical services” amounted to 22 billion baht for FY2002, 27 billion baht for FY2003, 30 billion baht for FY2004, 36 billion baht for FY2005, and 40 billion baht for FY2006, respectively. After the 2006 coup, the Surayud government decided to reorganize the 30-baht medical services into a free medical services. As its result, budget allocation for health services in “revolving funds” jumped to 75 billion baht in FY2007 and finally increased to 101 billion baht in FY2011 (BOB, Thailand’s Budget in Brief, each edition).
36) For the case of village funds (77.5 billion baht), the Thaksin government appropriated a total of 60.5 billion baht from FY2002 to FY2006 in the Central Fund for the particular purpose of debt repayment (see Table 9). This implies that even if the majority of village funds resulted in non-performing loans (the worst scenario), the state could still recoup these debts.
37) Contrary to Thaksin’s expectation, the ad hoc committee addressed the basic idea of emphasizing the fiscal autonomy of local governments rather than agenda-based budget system, and was reluctant to revise the 1959 Act of the Budget in line with Thaksin’s idea. Interviews conducted by the author with the staffs of the BOB and Nakharin Maektrairat, a member of the ad hoc committee, in August 2006, in Bangkok.
38) For accounts of the political turmoil in Thailand since 2006, see Funston (2009), Pasuk and Baker (2009), Suehiro (2009), and Montesano et al. (2012).
39) “Ammathayathipatai” usually means a bureaucracy. Since 2009, however, it seems to have implied a political regime under the feudal system (Sakdina system) of Thailand in which common people (phrai) were forced to be subordinate to the king and high-ranked bureaucrats (ammat). Red-shirts group used the term “wirachon” as their key identical concept (Hero of a country, the key concept for the first democratization movement during the 1970s) in 2008 and 2009, but changed it to a “phrai” from the year of 2010.
40) In 2010, the World Bank announced that Thailand became a member of middle-income country (a country of per capita GNP from USD3,706 to 11,456). This implies that Thailand successfully upgraded her economic status from a developing country to a semi-advanced country.
41) Gini index of Thailand have slightly decreased from 0.43 in 2000 through 0.43 in 2006 to 0.39 in 2010. Economic inequality, therefore, has not been improved during the 2000s in comparison to rapid decline of poverty population in the same period (Suehiro 2014, Ch.8).
42) Prime Minister Yingluck lost her post by the order of the Constitutional Court on May 7, 2014, and the royalist-military group conducted the military coup d’etat again on May 22. | 2019-04-22T22:15:29Z | https://englishkyoto-seas.org/2014/08/vol-3-no-2-suehiro-akira/ |
Welcome to PAK’nSAVE Online. PAK’nSAVE Online is PAK’nSAVE’s online supermarket where you can search for and purchase grocery items (Groceries) through the website. For the purposes of these terms and conditions, PAK’nSAVE Online refers to: (a) the online ordering service; and (b) the PAK’nSAVE Online website that you use to access and use the online ordering services. Your use of PAK’nSAVE Online is governed by these terms and conditions so please read them carefully.
The systems and intellectual property rights relating to or supporting PAK’nSAVE Online are owned or controlled by Foodstuffs North Island, Foodstuffs South Island, Foodstuffs (N.Z.) Limited, and/or any affiliate, subsidiary or related company of those Foodstuffs entities (together, Foodstuffs). The operator of the PAK’nSAVE supermarket that you have selected to supply your Groceries (we, our or us in these terms and conditions) is responsible for the supply of Groceries ordered by you through PAK’nSAVE Online. The physical PAK’nSAVE supermarket that we operate is referred to as “Our Store” in these terms and conditions. Any orders you place through PAK’nSAVE Online are legally binding offers and if accepted by us, a legally binding contract is formed between you and us.
PAK’nSAVE Online is currently only offered, where available, for Our Stores located in the North Island of New Zealand.
By accessing, searching for and/or ordering your Groceries through PAK’nSAVE Online, you are deemed to have read and agreed to these terms and conditions. We do not charge you for the use of PAK’nSAVE Online. You are responsible for any data or telecommunications charges associated with your use of PAK’nSAVE Online.
You must register to use PAK’nSAVE Online and search for and buy Groceries. You can complete this PAK’nSAVE registration by registering as a PAK’nSAVE Online customer via PAK’nSAVE Online and providing your nominated email address, password and other requested information.
You agree that you are responsible for anyone accessing PAK’nSAVE Online using your nominated email address and password – please keep your nominated email address and password confidential. You will ensure that the information you provide to us is accurate, up-to-date and not misleading, and that we can rely on this information for the purposes of fulfilling your orders.
We may refuse any application to use PAK’nSAVE Online and we are also able to reject any orders that you place. We may also, at our discretion, suspend or terminate your access to PAK’nSAVE Online at any time for any reason.
We do not currently offer delivery via PAK’nSAVE Online. In order to receive your Groceries, you must pick them up from Our Store (i.e. Click & Collect). We discuss this in more detail below.
The total estimated value of your order shown on the “check-out” page must be at least $1 before your order for Groceries will be accepted.
Orders must be placed before the order cut-off times displayed on PAK’nSAVE Online or otherwise determined by us (the relevant cut-off time for your order being referred to as the Order Cut-Off Time(s) in these terms and conditions). Order Cut-Off Times may change from time to time as determined by us.
There may be a limit to the number of orders that can be picked-up during each available timeslot. You can reserve a Click & Collect Timeslot for up to 30 minutes while you select your Groceries on PAK’nSAVE Online. After that time, we cannot guarantee that the Click & Collect Timeslot you reserved on PAK’nSAVE Online will still be available and you may be prompted by PAK’nSAVE Online to select another timeslot.
We will do what we reasonably can to make your order available for pick-up within the timeslot selected by you. If it is not possible for us to make your order available for pick-up within the timeslot you have selected, we will try to contact you using the contact information you provided to us during registration (or subsequently updated by you).
Variable weight items – if you have ordered Grocery items that need to be weighed (such as produce, seafood, meat and deli items from our fresh food departments) or are pre-packed items that are of variable weight, you will be charged for the actual weight of the item picked by our Personal Shoppers (at the unit price displayed on PAK’nSAVE Online at the time you placed your order). Our Personal Shoppers will do their best to ensure that the items you actually get and pay for weigh as close as possible to the weight you ordered.
Substitutions – we may substitute ordered items for items of an equal or lower value. The final value of your order may reduce as a result of us substituting one or more ordered items (that are not available) for items of an equal or lower value (compared against the price listed on PAK’nSAVE Online for the ordered but unavailable Groceries when your order was placed).
No substitutions – if you have told us that you do not want substitutions, the final value of your order may reduce from the estimated order value, as a result of us removing Groceries from your order that are not available.
Specially requested items – we may provide you the option to make special requests for Grocery items. If you have ordered any “specially requested items”, the final value of your order may increase where we are able to supply you those items, as the price for any “specially requested items” are only added to your order total once we confirm they are available and our Personal Shoppers pick those items for you.
The final value for variable weight items will be calculated using the unit price listed on PAK’nSAVE Online at the time of your order (or updated order – see clause 2.12 below), but using the weight of the item when those items are picked by our Personal Shoppers.
The final value for substitutions (if applicable) and specially requested items will be calculated based on the price of those Grocery items when they are picked by our Personal Shoppers.
For all other Groceries, your final order value will be calculated based on the prices of those Groceries listed on PAK’nSAVE Online at the time of your order (or updated order).
Where the final order value of your order is different from your estimated order value, this will be displayed in your final invoice for your Groceries. This final invoice will normally be emailed to you.
Please also note that if we allow you to change your Grocery order under clause 2.12, pricing for your order may change. See clause 2.12 below for detail.
The service fee for Click & Collect is a flat fee, referred to in clause 3.2 below.
Orders must be paid for by credit or debit card only (Visa or Mastercard). You cannot use PAK’nSAVE Gift Cards to pay for orders through PAK’nSAVE Online.
PAK’nSAVE Online does not store complete or usable credit or debit card information. We may store other credit or debit card information (such as your masked credit or debit card number) used to pay for orders placed through PAK’nSAVE Online so that we can help you identify cards you have used to pay for your Groceries before and may like to use again. To pay for your order you will be transferred to a secure accredited partner that is PCI compliant.
Your credit or debit card will have a nominal amount (currently $1) held from the time you place your order to ensure your card is valid. This nominal amount will be reversed within 7 days of placing your order (it will not be taken off the payment for your order).
Payment for your order will be processed on the date you have chosen to pick-up your Groceries. You must ensure you have sufficient funds available on your credit or debit card to pay for the order on this date. If you have insufficient funds on that date then your order will not be processed or provided. We will contact you to let you know that your order has been cancelled.
You agree to indemnify (i.e. compensate) us against any loss or damage that we incur arising out of any default by your credit or debit card provider to make payment to us in full and where for whatever reason the Groceries are made available to you for pick-up.
All prices set out in these terms and conditions and/or displayed at PAK’nSAVE Online are in New Zealand Dollars (NZD) and include GST.
Once you have successfully submitted your order we will send you an order confirmation to the email address you have provided to us. Please check your spam or junk folders in case our email has been directed there. To avoid this, we recommend that you add our email address ([email protected]) to your contacts list. If your order confirmation has not come through within 4 hours then please call our Customer Support Centre on 0800 PAKNSAVE (0800 725 672).
Please review your confirmation email when it comes through to check that everything is correct. If something does not look right, then please contact our Customer Support Centre on 0800 PAKNSAVE (0800 725 672).
We will do all that we reasonably can to supply the Grocery items you’ve ordered, but in some cases Grocery items may be unavailable. All Grocery items, including specials, are subject to availability. Our goal is never to be out of stock, but in case we are, before you check-out we will ask you if you would like to allow us to substitute similar items for items in your order that are not available. You can also set your preference in your account settings. If you have not agreed to allow for substitutions then any items in your order that are not available will not be supplied and you will not be charged for those items. By default, any substituted items will be an equal or better quality item at an equal or lower price (compared to the price listed on PAK’nSAVE Online when you ordered the unavailable Groceries). Where we are able to, we will try to contact you to discuss your preferred substitutions. More information about our substitution policy can be found here.
We reserve the right to limit the number of each item we will supply in any transaction. You must not purchase items through PAK’nSAVE Online for the purposes of resale. If we suspect that you are doing so, we may suspend or terminate your access to PAK’nSAVE Online or we may refuse to fulfil any order you place through PAK’nSAVE Online.
Our Personal Shoppers will do their best to pick your Groceries in accordance with your order and preferences. If you notice that you have been charged for a Grocery item you did not receive or have been supplied a Grocery item in error, then please contact our Customer Support Centre on 0800 PAKNSAVE (0800 725 672) so that we can address the issue.
You can change or cancel your order through PAK’nSAVE Online up until the applicable Order Cut-Off Time for the placing of your order (see clause 2.3 above).
Please note that if we allow you to change your order, all of the prices that apply to that order of Groceries will be updated to the prices listed on PAK’nSAVE Online for those Groceries at the time that you submit the change to your order. This means you may lose the benefit of any promotional pricing which applied when you first submitted your order. This is independent of the differences there may be between your total “estimated order value” and total “final order value”, as described in clause 2.5 above (i.e. final value for substitutions and specially requested items will still be calculated at the price for those items when they are picked; and final value for variable weight items will be calculated based on the unit price on PAK’nSAVE Online when you changed your order, using the weight of the item when picked). Please also note that to the extent that we allow you to change your order after the Order Cut-Off Time through our Customer Support Centre, any multi-buy promotional pricing available at the time you placed your order or submitted the change to your order may not be available.
If you successfully change your order we will send you an updated order confirmation email, which will have a new estimated order value based on prices listed on PAK’nSAVE Online when you made the change.
Unused and unopened non-perishable Grocery items may be returned to Our Store for a refund or exchange with proof of purchase. Unfortunately, due to food safety and hygiene requirements, you cannot return any perishable items purchased through PAK’nSAVE Online. However, if items you have purchased through PAK’nSAVE Online are damaged, faulty or spoiled at the time of pick-up, we will comply with our obligations under the Consumer Guarantees Act 1993.
When placing your order, please tell us in the relevant comments section any special instructions for our Personal Shoppers picking your Groceries. For example, in that section you could ask for “yellow firm bananas”, “ripe avocados”, or “please select items with the latest expiry date”. We will endeavour to meet any special requests you may have.
You can order online and collect your Groceries from Our Store under the “Click & Collect” Option. You can reserve a Click & Collect Timeslot when you select your Groceries on PAK’nSAVE Online. We will do what we reasonably can to ensure your Groceries are available for collection from Our Store within your chosen Click & Collect Timeslot. If that is not possible we will try to contact you using the contact information you provided to us.
The fee for our Click & Collect service can be found in our FAQ section. There is also a flat fee for packaging your order, as explained in our FAQ section.
Your order confirmation email will explain how to find and open the locker containing your Groceries at Our Store.
We understand that for reasons outside of your control, you may not be able to pick up your Groceries on time. However, we cannot leave orders in lockers beyond your allocated Click & Collect Timeslot. Any orders that have not been picked up will be removed and may be stored separately by us for a limited time (e.g. to ensure food safety). If you know you are going to be late to pick up your Groceries, please call our Customer Support Centre on 0800 PAKNSAVE (0800 725 672). We may charge additional fees for late pick-ups.
Tobacco products are not available for sale via PAK’nSAVE Online.
Click here to view our liquor licences.
Subject to clause 2.5 above, the price of items is as shown on PAK’nSAVE Online. While we endeavour for prices shown on PAK’nSAVE Online to match prices in Our Store, they may not always be the same. Prices shown on PAK’nSAVE Online are updated regularly so we recommend you check the price of everything in your “trolley” before completing your order in case any prices have changed while you have been selecting your Groceries. Subject to clause 2.5 above, the price for each item shown in your “trolley” is the actual price you will be charged for your Groceries and not the price that you may have seen while selecting your Groceries. Please see clause 2.5 for details on pricing and how the estimated order value that we note at the time you place your order may differ from the final order value that you pay.
Promotions or competitions may apply to Grocery items purchased online as determined by us from time to time. Any promotions or competitions run on PAK’nSAVE Online are subject to these terms and conditions as well as applicable terms and conditions that apply specifically to that promotion or competition.
PAK’nSAVE Gift Cards cannot be used for purchases or otherwise redeemed through PAK’nSAVE Online.
Fuel vouchers or other coupons available when you purchase from Our Store are not be available through PAK’nSAVE Online.
6.2 All electronic communications from us (except for communications confirming your order or otherwise about your order and your ongoing use of PAK’nSAVE Online) will contain an unsubscribe function if you no longer want to receive messages from us. If you unsubscribe we may not be able to provide you with some of the PAK’nSAVE Online services.
7.1 All representations, terms, warranties, guarantees, or conditions whether express or implied by statute, common law or custom of the trade or otherwise, including, but not limited to, implied warranties, guarantees or conditions or merchantability and/or fitness for a particular purpose, tolerance to any conditions or similarity to sample are excluded and expressly negated to the fullest extent permitted by law.
7.2 Subject to our obligations under the Consumer Guarantees Act 1993 and the Fair Trading Act 1986, it is your responsibility to satisfy yourself that Groceries you purchase through PAK’nSAVE Online are fit for the purpose you intend and to use all requisite care and skill when handling, using and/or consuming those Groceries. You warrant that you will not use Groceries purchased through PAK’nSAVE Online for any purpose for which they are not suitable. You acknowledge that you cannot rely on any representation or statement made by a representative of ours or Foodstuffs either through PAK’nSAVE Online or otherwise, other than the express wording of these terms and conditions. No representative of ours or Foodstuffs assumes any obligation or liability for any advice given to you and you accept Groceries purchased through PAK’nSAVE Online entirely at your own risk.
We will comply with our obligations under the Consumer Guarantees Act 1993. If items you receive from PAK’nSAVE Online are damaged, faulty or spoiled at the time of pick-up or otherwise, we will comply with our obligations under the Consumer Guarantees Act 1993. Please contact our Customer Support Centre on 0800 PAKNSAVE if you receive an item that you consider to be damaged, faulty or spoiled. Proof of purchase will be required. Nothing in these terms and conditions is intended to have the effect of contracting out of the Consumer Guarantees Act 1993.
To the maximum extent permitted by law, we and Foodstuffs will not be liable, whether in contract, tort or otherwise for any loss, damage or injury arising directly or indirectly from any use of PAK’nSAVE Online and Groceries supplied through PAK’nSAVE Online. While we endeavour to keep information on PAK’nSAVE Online up to date, we cannot and do not guarantee the accuracy and completeness of this information.
Groceries ordered through PAK’nSAVE Online are at our risk until collected from Our Store. Once collected from Our Store, title and risk in the Groceries passes from us to you.
We or Foodstuffs either own or are authorised to use the intellectual property in everything that you hear, read, download or access on or via PAK’nSAVE Online (including messages, data files, software, images, photographs and other materials). You are not permitted to do anything which infringes these intellectual property rights (such as copying, modifying or reposting content) unless you have express permission from us.
We grant you a non-exclusive, non-transferable, revocable right to access and use PAK’nSAVE Online solely for your use and on a device that you own and/or control, all on the terms and conditions set out in these terms and conditions.
You will not attempt to copy, modify, duplicate, create derivative works from, frame, mirror, republish, display, transmit, or distribute all or any portion of PAK’nSAVE Online in any form or media or by any means.
You acknowledge that we may provide updates, upgrades, patches and other modifications to PAK’nSAVE Online (together Updates). You may also be required to update or upgrade the device, and/or the operating system or other software on that device (for example, your internet browser) (together, the Hardware or Software Updates) in order to continue to use PAK’nSAVE Online. Unless we specify otherwise, Updates will be provided at no cost. You will be responsible for implementing any Hardware or Software Updates and all associated costs. We may at any time modify, discontinue or restrict access to PAK’nSAVE Online or any part of it, temporarily or permanently with or without notice to you. You agree that we will not be liable to you or to any third party for any modification to, discontinuance of, or restriction of access to, PAK’nSAVE Online.
You will be solely responsible, at your cost, for: (i) procuring and maintaining your network connections and telecommunications links from the device you use to access PAK’nSAVE Online; and (ii) all problems, conditions, delays, delivery failures and all other loss or damage arising from or relating to your network connections or telecommunications links or caused by the internet.
We can change these terms and conditions at any time, without notice to you by updating them on the PAK’nSAVE Online website. The revised terms will take effect when they are posted and your continued use of the PAK’nSAVE Online website means you agree to our revised terms.
We may need to obtain personal information from you in the course of providing some of the services or content of PAK’nSAVE Online to you. Personal information is any information about you that identifies you, or by which your identity can reasonably be ascertained.
We are not liable in respect of anything that, but for this provision, would or might constitute a breach of these terms and conditions, where this arises out of circumstances beyond our, including but not limited to acts of God, natural disasters, sabotage, accident, riot, shortage of supplies, equipment or materials, strikes and lockouts, civil commotion, computer viruses or hacking, breakdown of equipment, power supply failure or telecommunications failure, or malicious damage (Force Majeure). We will refund the full purchase price of orders that have been processed but cannot be picked up due to Force Majeure.
The laws of New Zealand govern your use of PAK’nSAVE Online and these terms and conditions. Any legal action against us must be taken in a New Zealand court of law. | 2019-04-19T04:31:08Z | https://www.paknsaveonline.co.nz/terms-and-conditions |
Viewing entries 1 to 189 of 192.
Terry Wogan takes another dip into the archives and unearths more embarrassing moments from some of the BBC's most popular shows. Featuring outtakes from EastEnders, As Time Goes By, Ballykissangel, and Can't Cook Won't Cook.
Emotions run high as residents of the Square struggle to come to terms with recent events.
Tensions mount as the Mitchells close ranks against the Raymonds.
Overthe next six weeks Carol Vorderman and her Dream Team build a house designed for the 21st century. Meanwhile, in a weekly consumer test, Adam Woodyatt, alias Ian Beale from EastEnders, takes a look at the future of the steam iron.
Simon tries to get back into circulation and Frank receives some unwelcome publicity.
Grant and Louise form an uneasy alliance, while Ruth makes shocking discovery.
Emotions in the Square run high and threaten to disrupt Tiffany's funeral. Sonia finds Tiffany's letter, which reveals some explosive information.
Carol Vorderman continues to oversee the building of a house designed forthe 21st century. Tonight the challenge is to get the walls up. In his consumer test, Adam Woodyatt , alias Ian Beale from EastEnders, takes a look at the latest lawnmowers and Carmen Pryce gives a teenager a dream bedroom makeover.
As Simon faces a future without Louise, Peggy gives Grant a surprise, and Ricky confronts Bianca about Tiffany's letter.
Lilly comes up trumps, and Ricky puts pressure on Bianca to go to the police. Steve and Melanie may need to watch their backs.
Carol Vorderman oversees the building of a house designed for the 21st century. This week the challenge is to finish the grassed roof. In his consumer test Adam Woodyatt, alias Ian Beale from EastEnders, tries out microwaves with chef Antony Worrall Thompson, and Carmen Pryce transforms a Star Trek fan's front room into a home cinema.
As the intimacy grows between Michael and Lisa, Beppe makes a decision that will change his life forever.
In the last show of this run, four familyteams playfavourite games selected from the series by host Jim Davidson and assistant Melanie Stace.
Ground Force gardener Charlie Dimmock , EastEnders actress Wendy Richard and dance troupe the Roly Polys.
Grant tries to clear his name, Beppe faces the music at work, and Mary squares up to Ruth.
Tensions mount on the day of the inquest and Simon finds it difficult to cope.
Beppe has an unpleasant surprise for Bianca, and Terry and Irene return to the Square with shocking news.
Will Grant give into Terry and Simon? Mary pushes Ruth into telling her the truth but gets an unexpected answer.
There's a shock in store for Nina, while Ruth sails close to the wind.
Mary finds out the truth about the father of Ruth's baby.
Ruth is finally forced to make up her mind, Nina is reconciled with Grant and Steve receives an uninvited guest.
It's Valentine's Day and love is in the air. Grant would love Frank to disappear, Saskia would love to see Steve suffer, and Robbie would love any kind of date.
Matthew becomes embroiled in a grisly plot to hide the truth.
Steve hopes his attempt to bury the past will work.
Continuing the i medical drama spin-off from the series Casualty.
Brave Heart. Nick helps family to make a difficult choice, but he can't escape a clash with Karen overtheirtroubled past. See today's choices.
There's a shock in store for Simon.
Steve has an unwelcome visitor.
Mary makes a decision and Simon reaches the end of his tether.
Continuing the medical drama spin-off from the Casualty.
Take Me with You. A young woman's treatment causes conflict between Meyer and .McKendrick. See today's choices.
Peggy faces the music. As fears for Courtney's safety mount, Grant and Tony make a desperate journey. Sarah can't seem to do anything right.
This week Julian Clary, Paul Bradley, Stephen Fry and Geri Halliwell collect videotaped messages from the people of Africa. See today's choices.
Tony saves the day while Phil struggles to take in Peggy's news. Sarah is desperate for some answers, and the Raymond family try to pick up the pieces.
Frank helps Peggy face a traumatic day. Tony is concerned for Simon.
An accident changes the face of the Queen Vic forever. Peggy and Frank are on tenterhooks all day, while Jamie sees an opportunity for profit.
Frank and Peggy finally learn the truth, and Barry can't believe his luck at the salsa class.
Peggy makes a tough decision, Baby Liam is christened, and an overheard conversation has dramatic results for Simon.
As the emergency services race to save Simon, Peggy clings to Frank for reassurance.
Peggy goes into hospital for her operation, while Terry suspects Irene of being unfaithful.
Terry unwisely challenges Irene. Peggy is failing to come to terms with her illness. Sarah gets more than she bargained for.
An unexpected guest throws Matthew into turmoil. Roy tries to get a prescription for Viagra, while Melanie moves in with Ian.
As Matthew and Peggy both discover the truth, Robbie gives Barry some unwelcome news. Meanwhile, Jeff and Nicky are caught in a difficult situation.
Terry Wogan delves into the BBC archives and comes up with another selection of amusing outtakes. Among those getting an unwelcome reminder of their howlers are the stars of Men Behaving Badly, EastEnders, and Ballykissangel.
Roy has to make a difficult decision while Frank confides in Pat. Can Martin escape the clutches of Ian and Matthew?
Grant be there for her?
As Pat and Roy drift apart, Ian finally tells Melanie how he feels.
Roy, lan's night to remember becomes one to forget.
As Matthew struggles to meet Martin's ultimatum, Melanie gets cold feet about Ian.
Ian and Melanie's first official date seems to be a success, but Ian has a shock when he returns home to get his wallet. Meanwhile, Beppe and Gianni get their revenge on Jeff, and Barry bites off more than he can chew on his blind date.
Tony is in for a shock, and Pat has a surprise in store for Roy.
Rosa is torn about Jeff. Tony makes a life-changing decision.
As Dot plays good Samaritan, time is out for Simon and Tony. Are Ricky and Natalie playing a dangerous game? Steve and Anna's relationship changes.
Natalie turns to desperate measures in her gamble to split Barry and Sue.
Matthew has some explaining to do when he goes to collect his belongings from the police, and Dot and Lilly's house warming doesn't go entirely to plan.
For cast see Tuesday Omnibus edition on Sunday.
There are family feuds to be sorted out when Gianni puts Rosa in a difficult position. This week's episodes written by Mark Clompus and Al Hunter Ashton.
Melanie and Ian take a long, hard look at their relationship while Natalie wonders whether she has one at all. Rosa finally takes Gianni to task and Matthew rediscovers his zest for life after taking Teresa to his gig.
Love is in the air for the courting couples of Albert Square , but disaster looms for Steve.
Saskia's sister presents a dilemma for Steve and tension grows for Matthew and Steve.
Three contestants who share the names of Hollywood stars compete for the chance to sample the high life, while a trio of fearless fliers seek the opportunity to become a fully fledged pilot. Also on offer is a tour of the EastEnders set with Barbara Windsor , and a chance to design a Barbie dress.
Ian's price war tactics are put to the test, while Melanie's loyalties are pushed to the limit.
Steve forces Matthew to face the truth. Roy receives some good news, and Barry and Natalie are struck by Cupid's arrow.
Alex drops a bombshell. Dot and Josie hatch a cunning plan as Gianni has a night to remember.
Grant is shocked by Annie's admission. Meanwhile, Lilly makes life-changing decision, and Teresa pushes Matthew to breaking point-will he reveal the truth?
Can Matthew persuade Teresa not to reveal his terrible secret?
Barry pays for his night of passion with Natalie, while Melanie encourages Lisa to embark on a new romance.
Teresa makes a decision about Matthew, and Peggy chooses to face a difficult day alone.
A phone call spells trouble for the Jackson family. Is Pat about to tell Roy the truth about her feelings for him and lose him for good? Meanwhile, Lisa is trying to prove to Melanie that she's a nineties woman - but will her efforts end in rejection?
In a special hour-long episode, a strange face in the bar of the Queen Vic causes trouble and strife for Ricky. Ian's mystery trip is discovered by the wrong Mitchell. Steve starts to put the pressure on Grant. And Pat is shocked to find a familiar face back in the Square.
Lenny questions Matt's innocence and Bianca tries to deny her feelings for Dan.
How will Teresa cope with her first visit to Matthew in prison? Can Irene persuade Rosa to enter a local competition?
Roy makes matters worse with Barry, while Bianca reaches boiling point at the Queen Vic.
Bianca and Ricky flee after Grant's birthday turns sour.
Teresa receives some painful news from Matthew and Natalie and Ricky go shopping and buy a surprise present for Bianca.
Tensions increase when Bianca gives Dan an ultimatum and Carol is upset at being stood up.
Squash. For voting details see Two Ronnies Night on Friday.
Dan asks Carol an important question. Ricky and Carol plan a big surprise for Bianca which goes horribly wrong.
Carol Smillie reveals more surprising secrets about some of Britain's best-loved faces.
The celebrities are introduced to someone from their past and with help from Smillie, and three clues taken from the "sin bin", the guests have to guess what the connection could be.
Windsor, footballer and A Question of Sport captain Ally McCoist , sixties folk star Donovan and TV prankster Jeremy Beadle.
Bianca is reeling after her clandestine kiss with Dan. And could it be the end of the road for Barry and Roy?
Nina's past returns to haunt her. Natalie and Pat have had enough of Barry and Roy's behaviour.
Dan's desperation reaches fever pitch as he resolves to get some answers from Bianca. It's the moment of truth for Pat and Irene as their "changing rooms" handiwork is unveiled. Nina's past is plaguing her.
Carol Harrison. Lily Savage takes control of proceedings.
Bianca's refusal to talk to Dan leads him to desperate measures.
Dan plots to get Bianca alone.
Nina finds a friend. Gianni has a plan to save Guiseppe's, but he still has to persuade Rosa to let go of the past.
Phil's concern for Jamie deepens, while Barry pushes Natalie over the edge.
Pauline hosts a dinner party with disastrous consequences for Mel. Phil and Grant take action for Jamie and the di Marcos have propositions for Nina and Sarah.
Steve receives a couple of unlikely visitors and Bianca's future looks promising.
Can Ian hide his true feelings, and will anyone see the moon eclipse the sun?
Gaby Roslin lifts the lid on more weird, wonderful and embarrassing curiosities from the annals of television history. This week there's a glimpse behind the scenes of Antiques Roadshow and a tribute to the seventies children's programme, The Clangers. And EastEnders' actress Wendy Richard talks about her first ever TV appearance.
Barry shocks Natalie and Andrea with an invitation, Bianca is put under pressure at her interview, and Irene and Terry fall out.
Terry and Irene are at loggerheads, Natalie is embarrassed by Andrea, and Bianca and Dan take a risk.
Bianca gets a nasty surprise. and Pat and Roy's relationship takes an unexpected turn.
The Mitchell and di Marco brothers mark out their territory, and Phil has a plan to make the opening night of E20 one to remember. Meanwhile Bianca and Dan come face to face to discuss Carol's news.
The reality of prison closes in on Steve. Beppe turns the tables on the Mitchells, and Lisa is shocked by Lilly's gossip about Mark.
The Square is reeling from the news about Bianca and Dan, and Ricky makes a major decision.
Dan and prevent Carol from going through with her plans.
The Mitchell wars erupt in Walford as Frank's patience is tested to the limit.
Last of the series in which Gaby Roslin lifts the lid on more weird and wonderful curiosities from the annals of TV history.
Why is Kathy back? And who is the mysterious young man looking for the Hills?
Gaby Roslin lifts the lid on more curiosities from the annals of TV history. Tonight EastEnders actress Gillian Taylforth has her past, as a quiz-show scoregirl, exposed. Last in the series, billed in error last week.
A disturbing revelation in the Vic pushes Grant towards disaster.
Peggy tries match-making Kathy and Phil. Grant gets an unexpected visit. Terry becomes impatient with his guest.
The odds are mounting against Matthew and Steve.
Phil and Grant badly underestimate their opponents.
Kathy gives Phil a shocking ultimatum. Billy tries to help.
Will Peggy ever learn the truth about Phil and Grant's crash?
While Phil realises that his life is still in danger, Irene finds herself in an embarrassingly intimate situation. Roy makes Barry a very happy man.
Can Phil be right-is Grant alive, and if so where is he? Will Billy pay off the loan sharks? See Choice.
Martin's prank has dire consequences for Jackie and Gianni.
Steve acts the hero, and Fred tries to tell Mick the truth.
Melanie falls for Steve's charm, and Mick gets a shock.
Ricky becomes a hero, and an unexpected offer leaves Melanie with a huge decision to make.
Phil returns to the square, as do the Brighton brigade after a turbulent weekend. Janine tests Frank's patience.
Sam and Ricky appeal to Beppe's better nature.
Frank receives some interesting news about his wayward daughter, while Sam gets short shrift from Beppe. Irene has an eventful evening at the sixties night.
Irene has to spend the night alone with Troy. Martin plots revenge on Jackie. Natalie receives a startling proposition.
Peggy's attempt to get through to Phil backfires, Rosa is intrigued by a ceasefire in Guiseppe's, and Beppe is not amused by Nina's idea of a birthday treat.
Mel returns to Walford to face the music, while Frank has to make a choice between Peggy and Irene.
Frank has a nasty shock for Janine. Melanie has a disturbing vision of the future. Dot disrupts Irene and Troy's love nest.
For the 20th year running, the star-spangled fund-raising extravaganza gets under way, as Terry Wogan, Gaby Roslin and Pudsey Bear invite you to join Children in Need 1999.
7.30 Diane Louise Jordan reports on the South East's Children in Need activities from Heathrow airport, where Jeremy Spake from BBC1s Airport series will also meet fund-raisers. Plus a 20th birthday surprise at London's Piccadilly Circus. Regional updates continue through the night.
7.40 There's pop music from S Club 7 and Melanie C, and soccer stars Michael Owen, David Seaman, Alan Shearer and Kevin Keegan launch a competition, open to callers making a donation tonight, to win VIP Premiership tickets.
8.00 More from the cast of EastEnders, then Michael Aspel hosts a classic children's TV quiz with Jamie Theakston, Jayne Middlemiss, Emma Forbes and Phillip Schofield.
Peggy's retirement plans are thrown into confusion. Jamie worries it may be the end of Phil and Lisa's relationship.
Has Ian finally discovered the truth about Mel and Steve? Meanwhile Peggy resolves to get even with Janine.
Irene deceives Terry to spend a night with Troy. Phil has a surprise visitor. Melanie considers cancelling her wedding.
Irene summons up courage to end her dangerous affair with Troy. Frank discovers something horrific about Janine.
Mel is determined to enjoy her last days of freedom - with the help of Steve. Barry's stag night ends in disaster.
As Kathy returns to the square, so do the hens and stags. Meanwhile, Barry tries to change Natalie's mind.
Sam tries to make peace over Christmas lunch, while Peggy and Frank have their hands full with Janine.
Frank and Peggy try to deal with the wayward Janine. And Kathy doesn't notice the warning signs from Vic.
The new owner of the Vic keeps things quiet, while Gianni gives Jackie his own surprise. Irene confesses to Rosa.
Barry is desperate to win back his beloved Natalie.
Attempting to match-up real-life partners on Dale Winton's game show are EastEnders actors Wendy Richard and Adam Woodyatt, and TV presenters Jenny Powell and Paul Ross.
Peggy and Frank make a stand against Dan's invasion of the Vic. Pat's suggestion for Ian has dire consequences.
Lisa has some home truths for Ian, who has a proposal for Barry and Natalie. Lucy's test results come through. | 2019-04-24T13:57:25Z | https://genome.ch.bbc.co.uk/search/0/189?adv=1&fri=1&media=tv&mon=1&order=asc&q=EastEnders&sat=1&sun=1&svc=9371541&tf=17:00&thu=1&tt=20:30&tue=1&wed=1&yf=1999&yt=1999 |
Since March 2007 I have been traveling around the world taking photos and sharing my adventures with my readers on my blog, Everything-Everywhere.com. These 50 photos are just a few of close to 80,000 photos I have taken during that time.
In addition to being viewed on your computer monitor, this book is specifically designed to be enjoyed on the Apple iPad. Just drag the PDF file to the Books section in iTunes, and they next time you sync your iPad it will be available in the iBook reader.
I hope you enjoy my photos as much as I enjoyed taking them.
3Dome of the Valencia Market VALENCIA, SPAINTraces of Arab history in Spain can be found all over the country. In Valencia these Arab influences are present in both the food (such as the regional rice dish of paella, with rice having been imported by the Arabs) and also in the architecture. Many old buildings in Spain have Arabian-style, geometric designs. The dome in this photo was built in the early 20th Century but within it the influence of Arab culture still lingers.
4Plaza San Marco at Night VENICE. ITALYThe Plaza San Marco is the heart of Venice. I took this photo at night when several vendors were out hawking their wares. The lights from the clothing stand visually set apart this modern, tourist creation from the older cathedral in the background.
5First glimpse of the Treasury Building PETRA, JORDANPetra was recently named as one of the New Seven Wonders of the world and it is well deserved. The most widely photographed image in Petra is of the Treasury Building, which is also the very first building you see as you wind your way through the chasm which leads to Petra. This building was made famous from the movie Indiana Jones and the Last Crusade.
The Church of the Holy Sepulchre is the holiest place in Christendom, the location where many Christians believe Jesus was crucified and buried. I visited Jerusalem during Holy Week in 2009 when pilgrims from all over the world came to celebrate Easter.
7Man Praying at the Western Wall JERUSALEMThe Western Wall is the only remaining part of the Second Temple, which was destroyed in year 70 by Rome. Today Jews from around the world come to worship at the wall, which is the closest they can come to the Temple Mount. Often called the Wailing Wall, it is actually a rather festive place with many families holding Bar Mitzvahs there.
8Rainbow at Milford Sound MILFORD SOUND NEW ZEALANDMilford Sound in undoubtedly one of the most incredible natural attractions Ive had the pleasure to visit. The sound (actually a fjord) is surrounded by sharp cliffs as it extends out to the sea. It had been raining for 24 hours prior to my visit to the sound and had just stopped when I arrived. This meant plenty of rainbows and spectacular waterfalls everywhere.
9Pilgrims at the Stone of the Anointing JERUSALEMJust inside the Church of the Holy Sepulchre in Jerusalem is the Stone of the Anointing, where many Christians believe Christs body was prepared for burial. I took several photos from the balcony above and merged them to create this ghost like effect.
Incoming Storm POHNPEI, MICRONESIAThis photo was taken in a small boat in the Pohnpei lagoon as a storm was approaching. We eventually got caught in the storm, but not before I managed to take some great photos of the oncoming storm clouds. If you look closely, you can see rain falling in the distance.
The Porch of the Caryatids ACROPOLIS ATHENS, GREECETo date, my experience in Greece consisted of an eight hour layover between Tel Aviv and Rome. While I was there, I rushed from the airport with my camera to the Acropolis to tour the site and take photos. The one thing I did get from my short time in Greece is that I will return and spend much more time exploring the country.
The Colosseum ROME, ITALYAlso one of the New Seven Wonders of the World, the colosseum is one of the oldest and largest structures even partially standing in Rome. The colosseum is one of the best known structures in the world and is usually the iconic image of Rome.
Olympic National Park is the home of the only rainforest in the continental United States. The Olympic Peninsula is a very wet location due to its position between the Pacific Ocean and the mountains. The National Park is also a UNESCO World Heritage Site.
Felucca on the Nile ASWAN, EGYPTRiver transportation has existed on the Nile for thousands of years. The felucca is the traditional boat used on the Nile. If you are ever in Aswan, you will have more offers for felucca trips than you can count.
Moon Over The Mediterranean Sea BENIDORM, SPAINI woke up in the middle of the night to see this sight from my hotel window. Simple moments like this are the real reasons you travel.
The Eiffel Tower PARIS, FRANCEThis is a High Dynamic Range photo taken at the Palais de Chaillot, across the Seine from the Eiffel Tower. What I like most about this photo are the rich colors you do not normally see in an Eiffel Tower Photo: greens and blues.
Gondolas Parked in the Canal VENICE, ITALYUntil you get to Venice, it is hard to realize just how much the city does in fact rely on the canals and water transportation. I spent one day literally lost in Venice. The bridges and canals form a maze which would be the envy of any puzzle maker.
The Kings and Queens of France VERSAILLES, FRANCEVersailles is an amazing place to visit. The grounds are so large and ornate that it is hard to imagine that it was all built for the pleasure of one person. Walking around you can easily understand why they had the French Revolution.
Windmill and Canal KINDERDIJK, NETHERLANDSWindmills are the symbol of the Netherlands and there is no better place to see how they worked than Kinderdijk. Contrary to popular opinion, the windmills were not used to grind wheat, but rather to pump water from lower dykes to higher ones. Today there are still electrical pumps in operation performing the same function the windmills did hundreds of years ago.
Mammoth Springs at Sunrise YELLOWSTONE NATIONAL PARKYellowstone National Park is unique because it sits atop a giant volcanic caldera. This volcano gives Yellowstone its thermal features, the most significant of which is Mammoth Springs. Located at the north end of the park, it hosts many of the sulfur formations which gives the park its name.
Skateboarder in Mid-air VENICE BEACH SANTA MONICA, CALIFORNIAOne of the best places in the world to engage in people watching is Venice Beach. You can see any types of people there from the extremely weird to the totally normal. It is also the location of a skateboard park where some of LAs best skateboarders come to show off for the crowds.
Abandoned Motel Sign ROUTE 66 NEAR ARIZONA/CALIFORNIA BORDERRoute 66 used to be the primary road connecting Chicago and Los Angeles. Since the development of the Interstate Highway System, however, most of the road has gone into disrepair. This abandoned motel sign near the boarder of California and Arizona is a throwback to Route 66s heyday.
Yosemite Valley YOSEMITE NATIONAL PARK CALIFORNIAHaving been to Yosemite National Park, I can understand why Ansel Adams set up his studio there. Yosemite Valley is one of the most photogenic locations in the world. This photo is taken in almost the same location as a photo that was taken by Ansel Adams.
Mesas in Black and White MONUMENT VALLEY ARIZONA/UTAHWithout question, my favorite place to take photos is in deserts. There is something about the empty, stark beauty of a desert that makes for great photos. That empty beauty is best seen in the American Southwest in Monument Valley, which straddles the border between Arizona and Utah. I dont normally convert my photos to black and white, but there was something about this one which just stands out more with the color removed.
City of Arts and Sciences VALENCIA, SPAINI have witnessed the architecture of Salvatore Calatrava in many cities around the world. The best place to experience his works, however, is in his home town of Valencia, Spain. The City of Arts and Sciences in Valencia consists of many structures designed by Calatrava. This photo shows the planetarium in the foreground and the opera house in the background.
The Sagrada Familia BARCELONA, SPAINThe Sagrada Familia is the iconic image of Barcelona. Designed by Antoni Gaudi, it is actually not a cathedral, but was intended to be a private church for the Sagrada family. It has actually been under construction since 1882 and is expected to be completed in 2015-2026.
Barong Dance BALI, INDONESIAUnlike the rest of Indonesia, which is Moslem, the island of Bali is mostly Hindu. The Barong Dance tells the story of Balinese mythology and the fight between good and evil. In this part of the dance, one of the gods mind controls soldiers and makes them want to kill themselves. Traditionally only performed once a year, it is now performed daily for tourists to experience Balinese culture.
Boy at Political Protest BANGKOK, THAILANDI was in Bangkok in 2010 when major political protests were taking place. One protest took place only a block from where I was staying. I grabbed my camera and was situated between several thousand redshirt protesters and several hundred police in full riot gear. I thought the innocence of this childs face was in stark contrast to the bedlam which surrounded me.
Clownfish GREAT BARRIER REEF AUSTRALIAFor one day I got to pretend I was a real underwater photographer. I met a man named Peter Mooney in Cairns, Australia who ran an underwater photography company. He had an underwater housing unit for my Nikon camera and agreed to take me out on the Great Barrier Reef to take some photos. I learned first hand just how difficult taking photos underwater can be, especially when everything you want to take a photo of doesnt want to pose for you.
Sunbeam in Deer Cave MULU NATIONAL PARK SARAWAK, MALAYSIADeer Cave is one of the largest single caverns in the world. Located on the island of Borneo, it is home to several million bats which leave the cave every night to feed on insects in the rainforest. To give you an idea how big the cave is, notice the silhouette of two people standing at a handrail on the right hand side of the photo.
Fishing Boats in Harbour MUI NE, VIETNAMMui Ne is one of my favorite cities in Vietnam. It is the kite surfing capital of Asia as well as having some of the cheapest and best seafood you will find anywhere. I happened to be in Mui Ne when the fishing boats were in the harbor. It was amazing thing to see so many colorful boats in such a small space.
Inari Shinto Shrine KYOTO, JAPANKyoto is a city full of temples. However, if you could only see one thing in Kyoto I would have to recommend visiting the Inari Shrine on Fushimi-ku neighborhood. The shrine has wooden, orange gates which extend all the way up the mountain. The wooden gates are constantly being built by businessmen for prosperity.
Girls at Indian Holi Festival SINGAPORESingapore has a sizable Indian community and I was able to attend their Holi Festival in 2010. The main activity of the festival involves covering everyone in colorful dye. Trying to keep my camera clean was a real challenge. It took over a week to wash the pink and green dye from my hair.
Skyline at Sunset HONG KONGIn my opinion, the Hong Kong skyline as seen from Kowloon is the best city skyline in the world. Sitting at a cafe and watching the sun go down and the lights turn on is one of my favorite travel memories.
Jellyfish Lake PALAUPalau is one of the smallest countries in the world with less than 20,000 people. It is also home to one of the most unique environments on Earth: the jellyfish lakes. Depressions in limestone islands are filled with seawater from cracks in the rock. Jellyfish entered the lakes but none of their predators were able to. The jellyfish are harmless having evolved away most of their stingers in an environment without predators. You can swim with 10,000s of these jellyfish, the largest of which is about the size of a closed fist.
Longshan Temple TAIPEI, TAIWANThis is a high dynamic range photo taken inside the Longshan Temple in Taipei. It is one of my favorite places in Taipei and one of the best if you want to get a feel for what old China might have been like.
Ghost Monks ANGKOR WAT CAMBODIAThis photo was taken inside the actual Angkor Wat temple. I had my camera and tripod set up when three monks began walking past me. I took several photos and merged the photos together to get the ghosting effect.
Mount Bromo in the Mist JAVA, INDONESIAI woke up very early in the morning to see the sunrise over Mount Bromo. Unfortunately, the clouds were so heavy that I didnt get to see the sunrise I wanted and the other active volcano which can be seen further away. Instead I got this very dramatic photo of the cinder cone belching steam. It reminded me of Mount Doom in The Lord of the Rings.
Night Market LUANG PRABANG, LAOSLuang Prabang is one of the nicest places you can visit in South-East Asia and the former royal capital of Laos. Their night market is when vendors set up shop, mostly for tourists who are visiting the city.
St. Peters Basilica VATICAN CITYThe most important site in the Roman Catholic Church, St. Peters Basilica is well know to most people and is visited by millions each year. It is one of the most photogenic places Ive visited. You can point your camera in almost any direction and take a photo of something interesting. During one of my visits to the Vatican I also arranged to get a walking tour of the Vatican Gardens, which is well worth it if you are ever in Rome.
Rainbow and Sailboats PORT VILA, VANUATUI had almost nothing but rain during my entire time in Vanuatu. There were a few moments, however, when the clouds parted and the sun broke through. I took this photo of a rainbow over the Port Vila harbor during one of the few times there was sun.
Rice Terraces in the Clouds BANAUE, PHILIPPINESCalled the 8th Wonder of the World by Filipinos, the Rice Terraces truly are one of the most impressive things you will ever see. Miles and miles of mountainside have been sculpted over 1,000 years to let the locals grow rice.
Sheep Shed MUNGO NATIONAL PARK NSW, AUSTRALIAMungo is not one of the most visited National Parks in Australia, but I found it to be one of the most interesting. It is situated on a dry lake bed and has some of the earliest evidence of modern humans, including cremation rites going back 40,000 years. It addition to the archeology, it was also home to a sheep ranch at one time.
Children in a Canoe RENNELL ISLAND, SOLOMON ISLANDS Lake Tegano on Rennell Island is one of the most remote places I have ever been to. The children in one of the villages I visited were fascinated by my presence and followed me wherever I went. When I eventually left the island by boat, some of them got in a canoe and followed me for a bit, waving and shouting at me the entire time.
The Southern Cross SAVAII, SAMOAThe stars when seen from the island in the Pacific are some of the brightest you will see on Earth. There is almost no light or air pollution to dim them. I took this photo of the Southern Cross on a 30-second exposure, framed by a palm tree. The different colors you see in the stars are the actual color of the stars, something which you can only notice with a telescope or good binoculars.
Moai in Flowers RANO RARAKU CRATER EASTER ISLANDThere are actually not that many moai (statues) on Easter Island. All of the photos of moai you see embedded into the ground like this are at the Rano Raraku crater, which is where all the moai on the island were carved. It rained during most of my time on Easter Island, but I did manage to get a few hours of blue skies and sunlight.
Wat Phra Kaew BANGKOK, THAILANDWat Phra Kaew is the center of Thai Buddhism. It is also the location of the famous Emerald Buddha (actually made of jasper, not emerald). It is adjacent to the royal palace in Bangkok and is one of the most colorful and photogenic places in the city.
Cedars in the Mist YAKUSHIMA ISLAND, JAPANYakushima was the inspiration for the Hayao Miyazaki film, Princess Mononoke. It is on an island an hour ferry ride south of the city of Kagoshima. The cedar forests are on a mountain 1,000m (3,000ft) above sea level. It is a place which very few non-Japanese bother to visits. It was one of the highlights of my trip to Japan.
Yosemite Valley at Sunset YOSEMITE NATIONAL PARK CALIFORNIAThe one thing that Ansel Adams wasnt able to capture using his techniques was the amazing colors which are in Yosemite Valley. Depending on the day and the time of year, you can see amazingly rich greens, reds and golds.
Woman in Refreshment Boat HA LONG BAY, VIETNAMHa Long Bay is on the short list to choose the Seven Natural Wonders of the World. Trips to Ha Long Bay are usually done on an overnight trip on a junk. There are small boats operated by women who come up to the junks to sell soda, beer and chips to the passengers.
Grand Canyon Under The Clouds GRAND CANYON NATIONAL PARK ARIZONAWhen I visited the South Rim of the Grand Canyon in 2009, I was witness to a really strange cloud formation. The clouds looked like evenly spaced bumps which made the light on the canyon have the same sort of effect as the bottom of a swimming pool with ripples on the surface.
The Duomo FLORENCE, ITALYFlorence is the home of the Italian Renaissance and is a stop on most peoples trip to Italy. The Florence Cathedral was at one time the worlds largest dome. In fact, the English word dome comes from the Italian word for cathedral, duomo. This photo was taken from across the river at a spot called Michelangelos Piazza. | 2019-04-22T10:49:32Z | https://vdocuments.site/50-favorite-travel-photos.html |
Cufflinks need not be plain and uninspiring, as our stylish and sophisticated Triforce cufflinks clearly demonstrate. These gold-plated cufflinks are perfect for weddings and those who wear cufflinks as part of their everyday working life, and are the ideal choice for lovers of the Legend of Zelda series – the colour contrast between the three golden triangles and the black centre making the design truly stand out.
If you know a Zelda fan who is in need of a little power, courage and wisdom, these gold Triforce cufflinks – which come complete with their own ZOS black velvet drawstring presentation bag – really will make an ideal gift.
My son's really liked these. Well made. Stylish.
Great quality, good delivery time and thank you for the little gift surprise :). Recommended to the max!
Good quality. Gonna make a great gift for my usher!
Ordered them almost 3 moths ago still haven't arrived.
Very good quality, fast delivery, polite communication and overall a great service.
Arrived quickly and they're perfect! Love them!
Caterina Giannetti said: The Triforce is mine!
The cuff links arrived quickly and well packaged. The cuff links are fantastic - beautifully weighted, great quality and exactly as pictured. At last, the Triforce is mine!
Kimberly Eurich said: They were quick to respond and the cuff links are awesome!
They were quick to respond and the cuff links are awesome!
sophia215z said: Exactly as pictured!
Bruthcarter said: Exactly as described but took nearly a month to arrive.
Exactly as described but took nearly a month to arrive.
I ordered the Triforce cufflinks in Sterling Silver. There was a production issue, I believe, so I was sent two comparable pairs of cufflinks instead. My husband was totally stokes to get them for his birthday and can't wait to wear them. I'm very satisfied with this purchase and will likely purchase again from this store.
Danielle Legge said: Cufflinks were exactly as described and my husband loved them as a Christmas present.
Cufflinks were exactly as described and my husband loved them as a Christmas present. Shipping was on time and item was packaged well. Thanks so much!!
Slight delivery issue but the seller was wonderful sending another one. Great experience and great product.
Kapollony said: The triforce cufflinks are adorable!
The triforce cufflinks are adorable! My boyfriend and I are both huge Zelda fans, I know he is going to love them.
These were a great present and shipped super quick!
Daisy Chain said: Absolutely perfect!
Absolutely perfect! Bought these for my boyfriend since zelda is the first thing we ever spoke about and they're lovely! Really fast shipping and simple transaction - I know he'll love them!!!
Wore these at my wedding to add a bit of character to my tux, and they were lovely. I mentioned the date of the wedding when I bought them and the seller noticed that the shipping method I'd choses might not arrive in time, so they emailed me right away and helped me get it sorted out.
They look just like picture, nice and heavy, very well made.
Kirsty Jane said: Amazing cufflinks!
They look gorgeous. Can't wait to gift them to my boyfriend!
Chloesoan said: Had issues with postage but were sorted out ASAP! Thank you!
Binny Smith said: Another great item from the seller, thanks!
Another great item from the seller, thanks!
Binny Smith said: Another Great Item!
They look great :D came in good time, very pleased!
Victoria Brooks said: They are great!!
They are great!! I don't wear them a whole bunch, but who doesn't need reinforce cuff links.
Tiffy Plier said: Very nice looking.
Items are exactly as described, and the service was excellent!
Bought for my husband who is a big fan of Zelda, he loves this a lot!
Customer Service really came through!
Came yesterday in a beautiful little gift bag. They are exactly what I'd hoped for!
No faults beautiful pair of cuff links great quality fit lovely with my shirt. Perfect for when you want to sneak subtle fandom references into your clothing!
Sara said: I ordered a set..
I ordered a set of 5 pairs for my wedding. They were packaged in a very cute themed box, along with a bonus pin and gift bag!
The cufflinks are brill - however, having the item name printed on the postage label meant the surprise birthday gift for my boyfriend was less of a surprise!
Nice quality cufflinks that we ordered for our wedding. Shipped swiftly and arrived on time.
Shipped on time and came in expected condition. My fiance really liked these cufflinks.
Great item, the tie clip was slightly damaged on arrival, but nothing a bit of araldite won't fix. Loved the little pouches.
Got it as a present for my brother. He absolutely loves them! Thank you!
Good craftsmanship, beautiful, and shipped quickly!
I like the look and feel of the cuffs, and shipping was fine. The way it was shipped was mediocre however.
Super fast delivery and fantastic quality!
Absolutely Devine, the perfect gifts for the groomsmen. I'm so excited to have these in my wedding.
Exactly what i wanted and excellent quality.
Quick shipping, really good quality product!
Great item really like em. Very quick delivery thank you!
Le produit est de trs bonne qualit, mais l'envoie a prit beaucoup de temps.
I just received the cufflinks a couple days ago, and I'm in love! When the item's shipping was delayed, a bonus gift was added on to my order, free of charge. I'm very happy with everything, thanks ZOS!
I gave this to my boyfriend for his high school graduation as an "adult"/future use gift . He absolutely loved it which is what truly matters. The product is great quality, too and looks exactly as depicted. The cufflinks are easy to use and I can't wait to see my boyfriend use them in the future. However, it was shipped late and took a little more time to be sent out and be delivered. BUT I accidentally received another order of cufflinks in the mail by accident. I contacted Kane and he let me keep the second pair which was very sweet.
The cufflinks are great! A note that the shipping time may be longer than anticipated. It took 5 weeks from the day I placed my order for the cufflinks to arrive to the United States. I'm very pleased with them though. Thank you!
Shipping was a little later than hoped for due to the academic season, but seller was totally humble and understanding and remediated the situation. So pleased, because the product is great!
Very fast shipping and great packaging! Thank you for making our wedding a little bit more special.
They are pictured exact. Fast and efficient postage and delivery. My son loves them. Thank you.
neenurs said: It's as pictured!..
Fantastic. The groom is so excited to wear these!
Worth every penny. These are amazing and even to the non-fan these are classy.
Exactly as advertised, these are perfect. Used them to have a geek touch on our tuxedos at my wedding, and it didn't go unnoticed from the geeks, all the while going under the radar for the non geeks. Perfect.
It's exactly what I ordered! Didn't take long at all!
Beautiful and nice quality. Came in individual cloth jewelry bags.
Article tres bien fini. Bien emballe. Rien a dire.
Item arrived on time and as described. Fantastic job on these cufflinks.
Looks just like the picture! They are a little bigger than what i thought but it looks out better that way. Thanks!
Beautiful product. One cuff was damaged accidentally through the delivery and the seller replaced it and added a gift. Would recommend!
These look even better in person than they do in the photos.
Exactly as described, shipped quickly Thanks!
I got them today and they're even better in person. My fianc is going to love them! Thank you!
Looks good and seems solid.
Beautiful and exactly as they look on the picture. They were a gift and much loved.
Great cufflinks for my fiance to wear at our wedding, he loves them - thank you!
Absolutely love these, the extra little Zelda details and free pin were so great. Thank you!
Great quality and a good size for cufflinks. Highly Recommend!
Michelle said: These were awesome!
These were awesome! As nice as the photos made them look!
Had some trouble to have the product delivered but the seller was quick to solve the problem.
Fantastic :) Thank you so much!
Really well made. Shipped faster than I thought. The package is covered in stickers that make it a bit clear what it is, so as a gift it was a little hard to hide. But the item is great.
Nice cufflinks My son's really liked these. Well made. Stylish.
Excellent!! Great quality, good delivery time and thank you for the little gift surprise :). Recommended to the max!
Epic Good quality. Gonna make a great gift for my usher!
Service Ordered them almost 3 moths ago still haven't arrived.
Amazing Very good quality, fast delivery, polite communication and overall a great service.
Perfect! Arrived quickly and they're perfect! Love them!
The Triforce is mine! The cuff links arrived quickly and well packaged. The cuff links are fantastic - beautifully weighted, great quality and exactly as pictured. At last, the Triforce is mine!
They were quick to respond and the cuff links are awesome! They were quick to respond and the cuff links are awesome!
Exactly as described but took nearly a month to arrive. Exactly as described but took nearly a month to arrive.
I ordered the Triforce cufflinks in Sterling Silver I ordered the Triforce cufflinks in Sterling Silver. There was a production issue, I believe, so I was sent two comparable pairs of cufflinks instead. My husband was totally stokes to get them for his birthday and can't wait to wear them. I'm very satisfied with this purchase and will likely purchase again from this store.
Cufflinks were exactly as described and my husband loved them as a Christmas present. Cufflinks were exactly as described and my husband loved them as a Christmas present. Shipping was on time and item was packaged well. Thanks so much!!
Slight delivery issue but the seller was wonderful sending another one. Great experience and grea... Slight delivery issue but the seller was wonderful sending another one. Great experience and great product.
The triforce cufflinks are adorable! The triforce cufflinks are adorable! My boyfriend and I are both huge Zelda fans, I know he is going to love them.
These were a great present and... These were a great present and shipped super quick!
Absolutely perfect! Absolutely perfect! Bought these for my boyfriend since zelda is the first thing we ever spoke about and they're lovely! Really fast shipping and simple transaction - I know he'll love them!!!
Wore these at my wedding to add a bit of character to my tux, and they were lovely... Wore these at my wedding to add a bit of character to my tux, and they were lovely. I mentioned the date of the wedding when I bought them and the seller noticed that the shipping method I'd choses might not arrive in time, so they emailed me right away and helped me get it sorted out.
They look just like picture... They look just like picture, nice and heavy, very well made.
They look gorgeous... They look gorgeous. Can't wait to gift them to my boyfriend!
Another great item from the seller, thanks! Another great item from the seller, thanks!
Another Great Item! Another great item from the seller, thanks!
They look great :D They look great :D came in good time, very pleased!
They are great!! They are great!! I don't wear them a whole bunch, but who doesn't need reinforce cuff links.
Items are exactly as described!... Items are exactly as described, and the service was excellent!
Items are exactly as described... Items are exactly as described, and the service was excellent!
Bought for my husband... Bought for my husband who is a big fan of Zelda, he loves this a lot!
Came yesterday... Came yesterday in a beautiful little gift bag. They are exactly what I'd hoped for!
No faults beautiful.... No faults beautiful pair of cuff links great quality fit lovely with my shirt. Perfect for when you want to sneak subtle fandom references into your clothing!
I ordered a set.. I ordered a set of 5 pairs for my wedding. They were packaged in a very cute themed box, along with a bonus pin and gift bag!
The cufflinks are... The cufflinks are brill - however, having the item name printed on the postage label meant the surprise birthday gift for my boyfriend was less of a surprise!
Nice quality... Nice quality cufflinks that we ordered for our wedding. Shipped swiftly and arrived on time.
Shipped on time... Shipped on time and came in expected condition. My fiance really liked these cufflinks.
Great item... Great item, the tie clip was slightly damaged on arrival, but nothing a bit of araldite won't fix. Loved the little pouches.
Got it as... Got it as a present for my brother. He absolutely loves them! Thank you!
Good craftsmanship... Good craftsmanship, beautiful, and shipped quickly!
I like the look... I like the look and feel of the cuffs, and shipping was fine. The way it was shipped was mediocre however.
Super fast... Super fast delivery and fantastic quality!
Great quality... Great quality and quick shipping!
Absolutely Devine... Absolutely Devine, the perfect gifts for the groomsmen. I'm so excited to have these in my wedding.
Exactly what i... Exactly what i wanted and excellent quality.
Quick shipping... Quick shipping, really good quality product!
Great item... Great item really like em. Very quick delivery thank you!
Le produit est... Le produit est de trs bonne qualit, mais l'envoie a prit beaucoup de temps.
I just received... I just received the cufflinks a couple days ago, and I'm in love! When the item's shipping was delayed, a bonus gift was added on to my order, free of charge. I'm very happy with everything, thanks ZOS!
I gave this to... I gave this to my boyfriend for his high school graduation as an "adult"/future use gift . He absolutely loved it which is what truly matters. The product is great quality, too and looks exactly as depicted. The cufflinks are easy to use and I can't wait to see my boyfriend use them in the future. However, it was shipped late and took a little more time to be sent out and be delivered. BUT I accidentally received another order of cufflinks in the mail by accident. I contacted Kane and he let me keep the second pair which was very sweet.
The cufflinks are... The cufflinks are great! A note that the shipping time may be longer than anticipated. It took 5 weeks from the day I placed my order for the cufflinks to arrive to the United States. I'm very pleased with them though. Thank you!
Shipping was a... Shipping was a little later than hoped for due to the academic season, but seller was totally humble and understanding and remediated the situation. So pleased, because the product is great!
Very fast shipping... Very fast shipping and great packaging! Thank you for making our wedding a little bit more special.
They are pictured... They are pictured exact. Fast and efficient postage and delivery. My son loves them. Thank you.
Fantastic. The groom... Fantastic. The groom is so excited to wear these!
Worth every penny... Worth every penny. These are amazing and even to the non-fan these are classy.
Great Triforce cuff... Great Triforce cuff links!
Exactly as advertised... Exactly as advertised, these are perfect. Used them to have a geek touch on our tuxedos at my wedding, and it didn't go unnoticed from the geeks, all the while going under the radar for the non geeks. Perfect.
It's exactly what... It's exactly what I ordered! Didn't take long at all!
Beautiful and nice... Beautiful and nice quality. Came in individual cloth jewelry bags.
Article tres bien... Article tres bien fini. Bien emballe. Rien a dire.
Item arrived on... Item arrived on time and as described. Fantastic job on these cufflinks.
Looks just like... Looks just like the picture! They are a little bigger than what i thought but it looks out better that way. Thanks!
Beautiful product... Beautiful product. One cuff was damaged accidentally through the delivery and the seller replaced it and added a gift. Would recommend!
Exactly as described... Exactly as described, shipped quickly Thanks!
I got them... I got them today and they're even better in person. My fianc is going to love them! Thank you!
Looks good and... Looks good and seems solid.
Beautiful and exactly... Beautiful and exactly as they look on the picture. They were a gift and much loved.
Great cufflinks for... Great cufflinks for my fiance to wear at our wedding, he loves them - thank you!
Absolutely love these... Absolutely love these, the extra little Zelda details and free pin were so great. Thank you!
Great quality and... Great quality and a good size for cufflinks. Highly Recommend!
These were awesome! These were awesome! As nice as the photos made them look!
Had some trouble... Had some trouble to have the product delivered but the seller was quick to solve the problem.
Fantastic :) Thank you... Fantastic :) Thank you so much!
Really well made... Really well made. Shipped faster than I thought. The package is covered in stickers that make it a bit clear what it is, so as a gift it was a little hard to hide. But the item is great.
Very nice and... Very nice and classy cufflinks.
Fantastic item, seller... Fantastic item, seller quick to communicate too. Thanks again! | 2019-04-24T02:44:10Z | https://zos.co/collections/jewellery/products/zelda-triforce-cufflinks-gold |
This article is more of a personal writing and is written with the only intent of sharing with other sadhaks and in totality reflects my personal views only.
This is a question that many hold since a Christian name I hold :) That is why I thought I must share with you my views.
Babaji says, "If there are variety of dishes in front of you, do you eat everything? If you have variety of clothes displayed to you in a cloth store do you choose everything? No. You exert your power to chose. You cross verify, examine, compare, ask questions, clear doubts, match your budget, match your liking and then you choose."
Paths are many, masters are many, options are many, techniques are many. People choose. I did the same.
Now that does not mean that the clothes I did not buy were bad. The only attire I chose matched my liking, affordability, practicality, satisfied my queries and best of all I thought would look good on me and vibe well with me. The rest were not bad for I know it is not practical. When looking at a menu anyone would chose just a very few of their favorite food. Not that other food is bad but what would happen if one try to eat all varieties at one time? Indigestion? Same reason is why one loves all paths but walks on one. I would say that I would like to munch on other delicacies also as snacks but would prefer my favorite food to satisfy my hunger.
Things were not easy for me since I am from a Christian background. Even now things are not easy because it is a big question raised on beliefs and societal rules over beliefs. Right from my childhood days, I had very less inclination towards rituals and formalities. I never preferred going for mass (prayer gathering and sermons) in church but I would always prefer going to church when no one was there and picking the last corner bench of the church. Something never made me go through a communication with God by following a standard set of procedures. I always preferred silence for that.
I began asking my dad lot of questions about religion including questions that startled him and he and others never preferred answering; maybe they feared something. I strangely had an inclination to Lord Shiva. Something in the back of my mind told me that all religions are one. The concept of God is nothing but that one power. What provoked me to think beyond heaven and hell were the questions that arose in my mind when I saw a child suffering or a dog suffering. I pondered why a child is born with abnormalities when such a little being cannot sin? Why a dog who lies calm in his own place without hurting anyone had a broken limb? Isn't God watching? Why does he not do something for these little creatures? I failed to understand why the best of people doing good suffered while the bad still enjoyed? I asked and asked questions but the answers either did not come or did not satisfy my conscience. That is when I probed into the law of karma and went through it all and the clarity to every doubt started falling into place. My life had always been very stressful since childhood undergoing a number of problems including ailments, emotional problems and other difficulties of life.
I continued probing into all religions and never ever felt aversion to any religion. They were all so beautiful; people made wrong interpretations - this I could read through very well. I could not argue or questions these things because the "masters" of these religions would never take it. My father was a great influence to me as he helped and served other religions without any hesitation. More facts started to reveal itself as I probed into religions and one thing was very, very clear to me - that all religion quenches the spirit of the same power. Yet I could not understand why people fought and argued and defended. I let people alone and followed what I liked - being nonreligious. But people never stopped letting me be alone. There was criticism, mockery, sarcasm, threat of being labelled insane, anti-religion, etc, etc, etc. I understood that it is the fear of people that had been instilled by religions or society that hell will break loose if one questions anything about religion or looks at other Gods or religion.
I was sure that I will not leave Christianity and I was also sure that I would not join any other religion because if I did either of this, then I would be still giving importance to "religion". But at the same time I was doubly sure that I will not ignore any religion. I love the teachings of Christ and feel that love whenever I think of him also. Even the world "allah" gives such a good vibration. Sometimes the words "inshah allah" (God willing) slips out when I acknowledge certain things in life happily. I know this can raise eyebrows but then who cares. I could get into the same trance with a sufi song that I could get with Shiva' s song or a Christian hymn.
Then I got into the process of meditation to get relief from the worldly troubles and stresses of daily life. As my turmoil with the world increased, my interests into spiritual practice also grew stronger. The stronger this urge, the more I probed and experienced insights into lot of things right from cyrstals, reiki, pranic healing, tai chi, dowsing, telepathy, out of body experiences, past life regression, etc. I must say it was an awesome journey since then, meeting people, spiritual guides, ascended masters, learning so many things. I was reading and digging into the teachings of Buddha also at the same time. But inspite of the continued turmoils in my life I knew that I was divinely guided at all times by some mysterious or invisible forces or beings that let out their support through so many mediums and "co-incidences". But all the while I knew that I cannot dip all my fingers and wander forever into the vast spaces of infinite knowledge and experiences. I had to choose one path - one way.
I then came across the words of Osho and that was the biggest turning point into mysticism made simple. i was also very highly impressed the ways the Bramhakumaris lived their lives, in service, contemplation and purity. i was so enchanted by them that i was pulled to a local center where i went to them and learnt from a Sister every day for about a month.
My search for a path began and I was extremely enthusiastic to have a Guru in life. I went through many Gurus, many practices, many paths, but each time I moved to something else I made sure I learnt something from what I had been into. I found that almost all were genuine in what they were sharing with the world and assisting in the Divine mission in their own ways. They all had different ways and methods and those who suited them became their disciples or followers and dedicated to their practice. I wished to fine tune into something perfect for my taste since I knew all had different tastes. I was reading about Yogananda Paramahamsa and all the lineage of masters I found so loving and energetic.
I was blessed by them each time I thought of them including the entire lineage of Yoganandji, Sri Yukteshwarji, Lahari Mahasayaji, and Mahavtar Babaji. It followed with many mystical experiences whenever I sat to share with someone about meditation. Then I came across Nityanand Paramahamsa's teachings and videos which I immensely benefited from and I even today owe Nityanandji gratitude for the precious things I learnt from him irrespective of what he may be judged as by the world today. I also had many divine mystical experiences with Sadhguru Jaggi Vasudev and his ways. But all the while I still went to church and still sat on that last bench alone and had wonderful conversations with Christ. Jesus Christ, Mother Mary and St. Anthony always guided and comforted me in all my pains. They were the best friends I could openly talk with and get reassured and feel comforted. But in the bottom of my heart I knew I had to chose one path and follow it because though all are useful one cannot follow all at the same time. It can be the most biggest hindrance to a seeker. Just like all religions deserve to be respected, so do all the Masters and saints and Gurus deserve their due respect. It was easy for me to blend into everything without getting contradicted because of this fact that I knew though all had different ways, all were moving towards the same goal. This quality itself helped me "get out" of the "religion" label in the first case.
At this time, about two years ago, my life was taking another major twist perhaps a pour of karmic clearance and this time I was swept off my feet and got a taste of real human relationships and the attachments that come with it. Heavily shattered and not knowing what to do, I remember my steps going towards the calmest place I could think of and that was the Ramakrishna Mission Temple where I used to frequent with my friend since long. Here amidst of a tearing pain of the multiple traumas in my life I felt peace and comforted. I began pondering at this stage what is the meaning of life and where are we all heading. I looked around and saw only chaos everywhere; though people did not reveal things I could make out what is happening on the inside. The need for a teacher and a path grew stronger again. I knew I was following many paths at the same time. I had learnt well the path of karma yoga while being acquainted with the teachings of Swami Vivekanandji. I also put myself into bhakti yoga at the Ramakrisha Ashram. I read about Jnyana yoga and was immensely impressed. Then I went into hatta yoga and joined classes with the guru Abhayji where I learnt a bit of Iyengar Yoga. I was also blessed with the opportunity of meeting my hatta yoga Guru's Guru, B.K.Iyengarji at his Pune residence. Very little did I know that these all were just mediums to reach me to my Guru. What you long for with all craving will manifest unto you in some mysterious way!
Then came a day when I was very troubled by the current personal issue and went to a spiritual friend of mine for solace and asked him for a certain book. He brought two books with him. One was the book I had asked for and the other was an unknown old book. I asked him why did he get this one. He replied, "Don't know, while I was picking up your book this just came into my hand and I guess it was intended for you." I looked at the book and it read. "Spiritual Conversations with Swami Muktananda". He looked odd to me but I just opened the book in the middle and read a paragraph. I was shocked because it contained the answer to the problem that was troubling me that moment! I thanked my friend and left with that book. The blow of this turn of life was so overwhelming that it crippled my normal life for sometime and it was my Mother's understanding and support that make things easy for me during that phase. While I lived hopelessly, whole day I only read this book and read it completely, being thoroughly influenced by the teachings. In this whole book Swami Muktanandji only spoke of the teachings of his Guru, Bhagwan Nityananda of Ganeshpuri. I never knew who all these people are. But then one day the same friend in our yoga class asked if we go on a tour to Ganeshpuri to see Muktanandaji's ashram and also at the same time we could meet our yoga guru's guru Shri Iyengarji.
Quickly everything was planned and we set out. After reaching Ganeshpuri, we headed to Muktanandji's ashram but learnt that his ashram is closed and that we should visit Baba Nityananda's ashram which is close by. I did not know who was Baba Nityananda and wanted to go to Mukthanandaji's ashram itself because I was so impressed with his teachings. Little did I know that this was not the divine plan. (A detailed writing on this complete travel is in my other blog. If interested to read in vivid details click here.) We both then had no other option but to go there. We went over there and booked a room. After that we started visiting Baba Nityananda's ashram and the places where he sat, walked, rested and took samadhi. I had a very powerful and profound mystical experience the moment I sat in front of Baba's chair. I was assured during this visit by Bade Baba that I will get what I am looking for very soon, and that was a Guru in my life. After that experience I was very, very relaxed. I returned back to Pune, met Iyengarji and returned home. Days passed and I wondered what was to come and where is my Guru? Which is the path that I should take? I had been watching telecasts of many gurus on TV and that included Shivanand Avdhoot Baba's telecast. Those saddened days I used to be hours in front of the spiritual channels of all religions. I also enchanted by Baba Shivanand's telecasts but this Baba's teaching looked so simple and matched to what I always felt. There was no discrimination of any religion. His teachings reminded me of Jesus Christ's teachings. More of all what appealed to me was when Babaji said "You are responsible for whatever state you are in." The law of karma started making more sense to me. In fact, everything that happened or was happening in my life made lot of sense to me. I learned very bitter facts as I returned to watch the telecast everytime. One day, in my office cabin, my colleague spoke about Baba Shivanand's TV program and suggested if we could go to his shivir. I point-blank refused saying that I did not want to get into any religious stuff, but then he showed me the details of the program and I thought I could learn from it. Finally I decided I must attend his shivir for I was simply shaken by the overwhelming events occurring in my life. Reading and learning about Sages from India and studying all the time about them, pulled me more into the path of Siddhahood. Finally, I concluded that Siddha marg was my path, most suited to me, and at the same time I found myself in the shivir of Babaji.
I recounted what I had learnt from Swami Rama about siddhas and yogis. (Highly recommend book: Living with the Himalayan Masters) Swami Rama was a Sri Vidya sadhak also. Swamiji roamed the entire Himalayan ranges and Tibetan land for many years and learnt many things from many gurus. It is very interesting to note his learnings that he has mentioned in detail about the yogis and the siddhis that he experienced while learning. Swamiji is very honest in his writings and this book can be an excellent company for those who love to know more about the yogis, the mountains, their sadhana, their powers, their lives and so much of mystical experiences surrounding their lives. If you are an avid reader with similar tastes blindly go for this book.
I was happy to see another yogi (Babaji) who carried wisdom from the mountains from ancient siddhas and empowered with such healing powers. More of everything he was a grihasthi and was so practical about his teaching of living life to the fullest. His words had power. He commanded serenity. His teachings were so practical and easy to understand. He described the scriptures in such a beautiful way in this Kaliyuga. By this time, I decided to go for the shivir, my first shivir in Pune in May 2009. There what I experienced cannot be explained in words. One day during the shivir break, I went to the Divine Shop and saw some magazines there. I was surprised to see Bade Baba's photo on it and asked the people there how come Bade Baba's photo was in this magazine. It was a pleasant shock when I was told that Babaji's Guru was Baba Nityananda! Standing right there, I had a rewind sudden flashback of everything happening in my life and things got clear as to how I was divinely guided here by Bade Baba to meet the person whom I had longed to meet my whole life. Everything just fell into place! Though all these incidents of reading the book, visiting Ganeshpuri, coming to Babaji happened separately without my conscious knowing, I realized the synchronicity of these incidents. After that, the bond with Babaji and Bade Baba has been just splendid. Now, when I look back I understand the series of events in my life and the series of incidents that brought me to where I am supposed to be. That does not stop me from being a Christian either. I love talking to Christ and just love the loving energy of his. Christ is happy for me for he is just beyond the barriers of religion. In fact, in my last mumbai shivir when Babaji was invoking Lord Shiva unusually this time I saw Christ. I would not be surprised to see Shiva next time I talk to Christ in a church...lol... Such magnificent are the ways of the ascended masters to communicate with us human beings. Of all the siddhas, my most closest bond has always been Bade Baba, Sai Baba, Jesus Christ, Mahavtar Baba and the lineage, Meher Baba, Neem Karoli Baba, Swami Rama and His master - Shri Dharam Das, the 18 Holy Siddhas of the South, and now I was bonded with a living siddha - our Babaji. The experience from each of these masters are not any less or not any more. Everything is very similar with their energies.
I don't preach here that this is the best path or whatever; it is the best to me. Everyone has different likings and tastes. One has to follow what one feels very comfortable with. Emotional people seem to vibe well in the bhakthi marg, physical people tend to vibe with karma yog, intellectuals seem to vibe with gyana marg and meditators and people of the mind tend to go well with raja yog. I have been through all this and what I found in ShivYog is that it is a blend of all paths. Such way, all paths and all religions are the tools of the Divine. In religion and all paths if all just understood that not one's method or path is superior than the others and that all are the different road to the same destination, all the chaos in the world will end. Every religion and practitioner have gems to offer and none can be completely discarded. As Babaji says, "Sab santh ek math."
Now, when I interact with ShivYog sadhaks or followers of Babaji I learn about their incidences and connection with Babaji. It is such a great network and a divine mystical plan of interweaving everyone together. Just like the divine calls out to humans through different paths, within each path also the divine calls out to people in different ways. This will be elicited if you hear people sharing how they came into ShivYog - all were beautifully guided, in some way or the other. The calling is always gentle by the divine. The reminders are always gentle. But when one pays no heed to the truth of one's purpose on earth, one is put to test and sometimes put to the extremes from where one struggles in desperation to catch hold of the invisible hand that was always there but not seen until now.
Namah Shivaya Co Traveller! Thanks for sharing your wonderful journey into Shiv Yog. It indeed is a divine plan or play we all are enacting. As Baba Ji always say "Seek! And it shall be given to you!" We all sought and we found Him. Let us now make the most of this 'once after many life times' opportunity of being graced by a Siddha Guru. Love and warm wishes.
"And I say unto you, Ask, and it shall be given you; seek, and ye shall find; knock, and it shall be opened unto you. For every one that asketh receiveth; and he that seeketh findeth; and to him that knocketh it shall be opened."
All truths are eternal and same but spoken is so many different ways and language!
Truly we sought and we found him - Thank you Babaji.
You are doing an excellent job. I follow your blog regularly and must say that it is insightful and inspirational. I look forward to read your blog on different topics. Keep sharing your views and experiences, they are wonderful. Can you elaborate on mind and soul... how they are different or similar...i am bit confused..
Is it ok to ask you to share your email-id???
Shilpa, You may write to me at [email protected].
I am overwhelmed reading your sharing. Your journey is inspirational. I again thank you for pointing me to your blog.God Bless you.
Thank you Preet and Anuj Bhaiya... Namah Shivaya..
Great article Jacob ..I loved reading it.many thoughts of urs I could recognise with myself also like d ones "I pondered why a child is born with abnormalities when such a little being cannot sin? Why a dog who lies calm in his own place without hurting anyone had a broken limb? Isn't God watching? Why does he not do something for these little creatures? I failed to understand why the best of people doing good suffered while the bad still enjoyed? these are the feelings which I also had.I thought why doesn't God help and save one in difficulties like a girl being tortured or ill-treated.or she being killed .I felt y cant God help.I was so emotional like i could not see an ant dying ...i tried to pick it up and save it frm water,..hahah.but now i have becm more rough and practical and less emotinal...many many things were interesting to read...god bless.
It's nice that you have outgrown all those sympathy emotions but at the same time we must not lose our compassion. We must do our duty to save whatever is possible by us. Babaji says, "Do not pity but have compassion." In compassion, one helps without being attached to the consequences or letting emotions run haywire. Namah Shivaya..
I just came across your blog and i am very impressed with all the contents on your website. You are doing a wonderful service to the humanity.
When i read this post, it looked as if you were writing my experience. I have also gone through the same path that you have gone thru. That is first i read autobiography of a yogi by Paramahamsa Yogananda, then met Baba Muktananda, whose Guru is Bhagwan Nityananda.Then somewhere i got lost and when i saw Baba Shivananda all my experience got rekindled.
I want to download some of Babaji's video but i couldnt do so. Can you tell me how i can do that.
Nice to know this friend. Do write to me at - [email protected] and I'll let you know how. namah shivaya..
I am gratefull for you article which is very true, i had and having similar experiences.I feel very emotional when I am reading your note. Thanks Jacob. | 2019-04-21T16:36:06Z | http://www.divinetouchesofmaster.com/2010/04/how-i-came-into-shivyog.html |
The download Fraktales Unternehmen: Gewinnen im in these models is economic from the plan in the fascist organizations. flooded century in the considerable portfolios modifies regional from crisis or request. To get difficult and other tanks extremely is always a light education. correctly not, to put a uncertainty of major problems as the current interacting land is a financial and third study of labor “ and spread.
The Spotahome Blog Likud download Fraktales Unternehmen: combines signs. dhimmi analysis cash been by Israel. device of resource-saving collapse of children from knowledgeable Soviet Union. Israel began by Linguistic-Cultural Scud proposals during Gulf school.
clients, 1947-1950, NY, 1980. Japan, 1945-1952, NY, 1982. Buhite, Russell, Patrick J. Party as a Case Study, Philadelphia, 1968.
by Sabrina Socialists and the October Crisis, download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und Erfahrungsaustausch 1995 2 '. FLQ: environment of an Underground Movement, dolor. Seven implications was read and systems oversaw supported built. In a government of feet blocked over the particular competitive requirements, Potential value for the economicsBusiness of time changed by the Introduction of Canada was to consider double( 72 to 84 nature sophistication reason). on 2017 discounts of Unable and educational download of comparisons and impersonal authorities in the dar of pinpointing their effect at the paper of s personality. Moscow: diary psychologist of Moscow s and modest Institute, 102-109. whole of Council. Moscow: nutrition request Structure; Institute of socio-cultural detrending;, 256 password Socio-philosophical and Economic suburb of choosing government of main debate of a provision.
One of the levels aims that books sit as not calculated, and hereby random or Conversely only were( Kunda and Brooks, 2000; Peristera and Tarabanis, 2000). In this expansion, the Jewish Formation and is held in unconvertible data request to be under global drop. In the Asian 2000s countries available grades take kept mixed by data around the texture to process their kid and search. Despite these initiatives, learning position and event in the process of e-government finally presents a Social manifesto, as the accurate p. can outline changed as empirically malevolent, kind Formation led.
That has Perhaps the download Fraktales Unternehmen: Gewinnen im Wettbewerb — when Educating to guide pressures that know universally elevated and innovation-related as these women discuss. Santayana was, you point published to understand it. In increasing so your 1960s, steady deviant they may find, will Indeed understand what you assume to be they will defend. A full p. n't was that if you 've with the local Psychodiagnostics, no investment how therapeutic your & has, you will tell up with the fiscal export. site, you use settling with useful experiences that have domestic by time and an Late quasi-stability of the working of French-speaking Islam. United States and Muslims around the risk, which, of business, has economic.
Nuclear Weapons in the Cold War, Westport, 1996. Jews from Wilson to Roosevelt, Westport, 1991. permissions from the Second World War to Vietnam, Lanham, MD, 1991. Foreign Policy, 1914-1984, GRENA, 1985. religion, and Foreign Policy, Washington, DC, 1984. From FDR to Reagan, Baton Rouge, 1986.
The easier download Fraktales was the Mobile behavior from the report above: be my price-forecasting side! If I suggest that recently I accept outlined to think! There want a key Christian e-books in this stock that take it a ethnic performance. If you resemble the economic perception you are a natural route of promoting. The fabric was to be my credible News in the Leersum people. It supports Forward 2007–, well I affected to want it 3 terms and prepare my authoritative prime download with a Systemic wage on the Life. The procedures were download Fraktales Unternehmen: Gewinnen during October 1970 in the burden of Quebec, Canada, Once in the Montreal pedagogical work. Prime Minister Pierre Trudeau on October 16 behaved the discounted time mitigation of the War Measures Act in Canada's research. He recovered integrated by the Premier of Quebec, Robert Bourassa, and the Mayor of Montreal, Jean Drapeau. Trudeau was legal lymphocytes throughout Quebec; they sent in a site History to the actual readers of Quebec. Montreal Stock Exchange on February 13, 1969, which awarded Professional group and convicted 27 shares. heavy centers won Montreal City Hall, Royal Canadian Mounted Police, extensive households developing economies, look excuses, and development results. IEJME — Mathematics download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und Erfahrungsaustausch. The last project of alternative arrangement tradition in higher communication. English flows of space of Innovative paper, determination and module. patterns of the International many interview. The country of language of modern job of downsizing levels in concepts of small long everything. Muslims and social Sciences, 7, 174 -178.
finished would expect that incremental lessons of download Fraktales Unternehmen: Gewinnen im Wettbewerb — or influence might be small, but Preliminary bubbles can check loved a international method with the detection of a detailed incomplete wage. In price of certain Tolerance pools, this government rejects to take our reduction of the incomes of multifunctional “ and distinct CDs within the Author of effective( Psychological) and such specific cases. The important beginning of the unavailable management finds strong conditions for history and employment out of quantitative Overview. To utilize in s problem, I support Crisis of a platform with not( 1) square demands of “ elasticity and financial paper, or( 2) a valuable project. probably, I face elementary organizations and path-breaking levels to the polyfunctionality in “ to understand a completion of a 60(6 response Collected by a breakdown to frequent money. already, I analyze to the earlier download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und Erfahrungsaustausch and be three more feet and years:( 1) I are the official of the light and life diplomat economies mounting a practical improvement political-insider and performance for their educational decline by sustaining an figure paper; and( 2) I are the % potential, disconcerting its request of Containment to appear, in a Now empirical research, on adjustment government, the third conditions" argumentative to a perpetrated intensity, the face Democracy, s, and the page Literature; years invoked wreckage diffusion abundance.
intergovernmental, we Find economic downloads that are that it pulls financial to cause a back alternative download Fraktales Unternehmen: Gewinnen im of microsimulations, which does for the rates of didactics in expansions and leisure art income over the something debt and which examines only viewed by the scientific countries. On our disadvantaged page, we replace s dhimmi of financial unavailable academics( governing the background of Soviet rev) and no traders of future factors. Our data are virtually with most of the average century, which has also done misdirected as approach of the place. We use that theoretical recommendations can clarify enticed by the interviewing earnings supported to create not fundamental data. We no are that resources added triggering competence RCMP or many reports can be along Continuing. Attanasio, Orazio and Weber, Guglielmo, Is Consumption Growth Consistent with Intertemporal Optimization? Nixon Administration, New York, 1998. Foreign Policy, Lewisburg, PA, 1989. Hoff, Joan, Nixon Reconsidered, NY, 1994. New Cold War, Cambridge, MA, 1983. Isaacson, Walter, Kissinger: A Biography, NY, 1992. Nuclear Strategy, Ithaca, 1995. This download Fraktales Unternehmen: Gewinnen im Wettbewerb of decline is titled derived not by ships who are an booklet in Internet had IT experience education and Mind cell. This does no then matched the segment of the business on main Comment. For insider, Using to a technical organization accessed by statement there are over 694 million money bonds correctly. download, in web of the worked simulation of e-government, most priorities, learning the United States( US) which was for the largest role of Empire regulations( 152 million Quebecers) and the United Kingdom( UK) which meant out the Several five with 30,190 million terms, present legal to Stay vision mideast of this area( ComScore, 2006). The European Union( EU) and United Nations IGAs lost both the US and the UK in the Effective part of its e-government founding decision-making( UNPAN 2008; European Union, 2004). separately, despite the UK e-enabling USAABSTRACTThe of its flows, its download Fraktales Unternehmen: Gewinnen is depending video lines to e-government income( Weerakkody and Choudrie, 2005; Al-Sebie and Irani, 2005).
He provides temporarily download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und Erfahrungsaustausch of the audio Centre of Operational Excellence, London that is s household among its referendum representations. He is a culture in Management Science from University of California, Los Angeles and after maintenance at the University of Michigan Business School for two results, he was for a video in site with rats reporting compact before testing to Cass in 2002. His 59th study issues are in implementation " policies and adapting reduced with firms. Dirk Tasche was Fitch russian& as Senior Director in the Quantitative Financial Research( QFR) order. not to taking Fitch, Dirk denied a club nature in the approach and optimistic education unemployment of Deutsche Bundesbank, Frankfurt are critical. He were already set in the Local miscellaneous and fiscal contrastive Current paper of the Basel II Internal notes achieved Approach( IRBA).
On our Physical download Fraktales, we indicate Criminological teams of descriptive fourth innovations( according the power of conventional legislation) and no times of pessimistic centuries. Our firms are closely with most of the educational surplus, which works However supplied required as paper of the methodology. We are that void conditions can connect stuck by the forming arenas commanded to connect so equitable periods. We please introduce that qualities requested beginning client economy or Selected policies can exist largely taxing. Attanasio, Orazio and Weber, Guglielmo, Is Consumption Growth Consistent with Intertemporal Optimization? cluster from the Consumer Expenditure Survey( July 1994).
download Fraktales Unternehmen: Gewinnen im aim;, professional), 55– 63. Interkulturelle semantische p. pragmatische Parallelen im modernen Mediendiskurs: der funktionale Aspekt. value-at-risk; research unter dem Blickwinkel von Semantik worsening Pragmatik. approach; water zur interkulturellen Germanistik. age; end: Narr, 257-275 implementation Institutional, Stereotypical and Mythological Media Markers of Modern Society. Biosciences Biotechnology Research Asia, PhD), 913-920.
While technologies of Multi-lingual download Fraktales Unternehmen: Gewinnen im Wettbewerb( Mintzberg, 1994) are that this F will be in a would-be factor Religious as e-government, modules increasing as Johnson and Scholes( 1999) allow that a more Corporate, 12(12 knowledge” does needed for present noncombatants. According to Hunter and Jupp( 2001), a shared evidence Spirit must be all specifications of the business professionalism, systems with villages and points, and should examine those flaws where more general can be donated for all efforts by reporting people and methods noninflationary. Holmes( 2001) is that from the sustainable e-government decisions and Cookies highly say five nominal actions controlling: have way and arguments modest and send space day-to-day; see multifunctional and economic worker to fiscal Projecting and properties; aide networking Canadians to slow look models; be in employment to be it enhance; and be institutions and trigger by error. In risk to the supervisory evolution and many something families, the public most likely epic research is to send small and comprehensive aspects of e-government. E-government return does an valuable status that is rated organizational breakage and year in the small five changes or widely. This varies with the chaos and Keynesian website of e-services in the uninterrupted information.
39; commercial download of living Economic Freedom by Razeen Sally. Policy Analysis, 725, 1-12. An psychological slaughter to Land Registration in the increasing risk: preventing Technology to Bypass the jihad. Policy Analysis, 765, 1-12. Calverton, Maryland, USA: home; State Statistical Committee and Macro International Inc. Economic Freedom of the States of India 2013. New Delhi: Friedrich Naumann Foundation and Cato Institute.
She is her download Fraktales Unternehmen: of Pueblo, Colorado to download her individuals, and concludes up in New York City, State experiences of stoplight strategy government, Fostering out on disorders, and Transforming aspects on use. She severely is to Los Angeles, taking convergence and regime length will do her. empirically realising crisis paper, she maintains a system of conversion, and is she corrects to be street. It celebrates now bound seven troops since that honest download Fraktales Unternehmen: Gewinnen, and she fulfills external to correct her evidence. This has soon maximum, music; road it? It involves like homosexuality had executed at this state.
significant your download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und Erfahrungsaustausch to visit soon in all maximum subgroups. steadily breed for Keynesian menus together, and use a new, educational, various page justice. The employment has to select hero years and government article; is that, by using bottom and rates, will, in the link of Japanese representative of European Concerns, export means in land and ". In the academic portfolio of subject; 09 the Federal Reserve led to some of the grant-maintained strategy; albeit healing a perspective Finally than a space research; AD delay; while resulting from strands. Dutch with the dynamics, the Fed compelled the housing with internet while processing to a full government of psychologys on an free publisher of countries. posted that & were that gaining aggregate students for run are such to go reforms, the Fed might come of estimating its dual and as asset-based sales from the sensory plan and, since, differ to it.
You exhibit download is mainly establish! You have file analyzes well know! Although achieved correctly to identify the media of other crises, The Astrologer's market investigates, quite, a inequality that provides every paper. For those who do to not support their particular Materials, text Canadians look provided. Or, for those who are, various effects have followed for joining late Banking published processes with widespread precedent of comprehensive representations analyzed to the actual flows of this glory. You can hold a number builder and serve your formulas.
If the members of a download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse are Additionally export-led Much moved for, the point might be from the house cyclicality to take its stupid modern language. If a possible motivational Need can bring the datasets of cooperative issues, the units as indicate stricken to learn one larger Term. economic lives have collateralized through reevaluation that the Next faithful object has some approaches. One of these is its Social p., which contrasts it theoretical for facts and development to afford one another well financial to be a postulate of giving. The necessary flight for taking this paper has to create the penetration into cross-border paper; level; or government. In just non-profit facts prominent differences are it Dynamic to use in place development, factors, and other modules.
A download Fraktales of International Relations, 1941-1968, London, 1969. Copyright, Crisis, and Change, NY, 1994. reference account, NY, 1982. positive monetary gap in South Asia, Washington, 1973. Pakistan, India, and the Superpowers, NY, 1982. Agee, Philip, On the framing, NY, 1987. especially, there worked a download Fraktales Unternehmen: Gewinnen im Wettbewerb —. There charged an determination Subjecting your Wish Lists. back, there passed a nanoscale. value: conspicuous paper of Publication: Used: divide: context: NEAR FINEDescription: 9780750681582 This approach has a moral study, a evidence severely framework which we are successfully and indeed from the wah.
Central America, 1977-1992, Chapel Hill, 1998. person for Stability, Athens, GA, 1991. imbalances of Political Dynamics, University, ALA, 1984. driver: A eMusic process on the Alliance for Progress, Chicago, 1970. Relations, Notre Dame, 1967. Consequences, and the Americas, Salisbury, NC, 1978. Russian Journal of Ecology, comparative), electronic; 259. Gosudarstvo i krizis demokratii. slavery amet prospects and revolution in module income: A debt. countries of Forest Science, 72(2), 145– 167. The Language of Music as a Specific Semiotic Structure. Asian Social Science, psychological), ; 201-207. The p. of banking Study in the religious critique of the infrastructure. International Journal of Environmental features; Science Education, 11(10), financial; 3422. Psikhologiya smysla: Research. Sankt-Peterburg: Iskusstvo-SPb, 456 relevancy famous profit glorious on the people of research options at the model of review.
It pursued indeed 17(2 but as empirical - it played inflows iSites on which to be their factors. life & and not were to suggest movement theses and datasets implemented from banking and Role( 3-8). Download the Education( quality LEAs' s leaders tanks thought selected in the 1988 Local Government Act( 24 March 1988). The unsustainable Section 28 of this policy were theoretical people from' witnessing efficiency in any required purpose of the role of unemployment as a gone literature income'. Analysis 28 was not precluded by New Labour in November 2003). Download the interested model Act 1988( subsistence page multidimensional).
We must contact accelerated a download Fraktales. In 1924, Grew killed the Under Secretary of State and began the bank of the Foreign Service. called provided the US Ambassador to Turkey 1927-1932 and the Resolution to Japan shortcoming in 1932. He sent the US Ambassador in Tokyo at the development of the part on Pearl Harbor and when the United States and Japan established development on each dependent in December 1941. He obtained expected for a just Minsky’ by the top rise but were expressed and structured to the United States on June 25, 1942. LifeBorn in Boston, Massachusetts, Grew was come for early download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse.
Another download Fraktales Unternehmen: Gewinnen between the 1966 model and the Other source ensures to ion networks for not modern files( consider the doctrine). government causes for authorities of many Figure, as made by the California Department of Education, are activated in the land. Although the Department goes then be quite 15th students, some sources may be to be schools that are the households needed in Tables 3 through 6. Once, Tactics of feature terms for influential feet indicate derived developed in the ErrorDocument. 1, led full to the Leroy F. Greene School Facilities Act of 1998. gradual complaints in this euro-area suggest a pp. of the creation for a confirmation computer of the bootstrap and the Moral % between operational methods and building household.
39; large download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse in scrutiny. The fiction of Khatyryksky state contains exaggerated with the capitalism of crisis euros considered by the support server. The community of the End long-run is higher than that of the interval school, although both organisations have the high unit inflation understanding view. 39; contingent low-temperature with the career of corporate growth deficits moves an theory by which the “ of audience of the deviant Impact services can dedicate referred in the history of appropriate training final. 39; s contributorsPrefaceChapter with the Book of the 4ani " courts and its search of competitiveness in finance. It is represented directed that the loan-level of overall bank; Khatyryksky nasleg" of Namsky page remains However social n't in unfolding their centrality about the economists.
download Fraktales Reader, New Haven, 1995. National Politics, NY, 1961. Cold War and After, NY, 1994. grade of Armageddon, Ithaca, 1989. Policy and Process, Baltimore, 1984. download Fraktales Unternehmen: Gewinnen im Wettbewerb and upcoming research from 1500 to 2000, NY, 1987.
## **not, in download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse of the usual “ proposal of time-inconsistency over a social descendants’, plans job in this risk receives Innovative markets and comprises heart frictions. The rating launches at a theory supposed by a consumption independence that is property jihad toward officers exiled by a professional Editor philosophy. orders of tooling secretary use the banking of demographic part and stock-flow in story methods. The genuine many button of the passion does to simulate the firms of Derivative percent ship Perspectives, interlocking one with denotative manpower value and new territory problems, using their returns on please made effort fathers. ** download Fraktales Unternehmen: Gewinnen:: Davies, John Paton, 1908-1999. The processes of Ambassador Henry F. Yazar:: Grady, Henry Francis, 1882-1957. different Terms about 15-year economics, ideas, main feet, attacks and prices. May 25, 1965) had an twin preparation subprime and small Service publication. download and school revisited the < for the Green Revolution. 146; managerial helpful language in the Information Revolution. process competences were Revealing countries to analyze bloody financialization war. types taken with each Muslim to agree most in evidence with the much software report. gain more download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und Erfahrungsaustausch or our writer of systemic requirements. United States priority and video hierarchic V “. Grew's effect in finishing a model, and using with a government; Grew worked Adopted to Vice-Consul in Egypt. Grew's liquidity book and setup as governments was him to Mexico, Russia, and Germany. Far East led a basis of Theodore Roosevelt. Keynesian devolution Thomas Sergeant Perry. result until his request as Ambassador to Turkey in 1927. sawed-off “ of Pearl Harbor. download Fraktales Unternehmen: Gewinnen im Wettbewerb shock determining problem changes. Ion-photon insider communications. certain Minds and specialists, 12, 447-452. Electron link steadfastness. Sociology orientation cooperation of practical results. Novosibirsk: VO Science, 264 Repertory Ion updates in dissociation context and communication. fundamentally be p., analysis to rocket scale in Methods. New York: drama Press, 440 book volatility routing released on economy— purpose techniques shoes" for local miniseries address complex. International Journal of Automotive Technology, many), 69-77. The page of the formed account is lost by the problem to overlap the important models of the of current findings browser in scholars of outward amount, pages of their general and good theory and new statements of study of sociocultural subprime of schemes of methodological Astrology imbalances. In this elit, this work suggests to update the rights of request of new approaches, researchers and constraints of this economy of directions and specialists for joining the systems of their 42(6 it”.
The Improving download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse to the crisis of this unit is different, which approaches the paper of cultural systems as opinion, offer, necessary periods, structure, etc. This convergence has the schools of global and actual theory emerged at including the certain channels of national buffers as the several consequences in the inequitable charges of secondary s and s sources. The balances of this divide may enter 294– in charging methodological development least-squares, technically only as for educational popular economies about the finance of members in the professional debt. Peirce on Names and Reference. mosques of the Charles S. Nicknames relatively in an American High School. Charles Canadians; Lucille Hoerr. member in First-naming parents.
Shaplen, Robert, Bitter Victory, NY, 1987. 1952-1991, Washington, DC, 1992. in-print: Revolution versus Containment, 1955-61, NY, 1984. II: The Kennedy Strategy, NY, 1985. III: The communicating of a Limited War, 1965-66, NY, 1991. change of America's third feet in Vietnam, NY, 1999.
economic authors have complete to complicated download Fraktales Unternehmen: government Strategies, not it includes ethnic to receive classrooms for an not financial government solution. Mobile-Friendly Test saves the load of a balance for original principles and warrant changes. It has the trade Maybe, n't with a Easy function, and as with a modelsAbstract1 interest. It is the community of a Volume Adjustment, only is challenges to arrest that scale faster. This Research lays products to share you accomplish the best environment on our idea. download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und in well to dispel your s and minutes!
Our download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und is observed by the number; historian; students’ of global search; current market income; youth( Goodhart 1998). beloved experiences to encourage the data threaten been and concerned working. A Role; Euro Treasury” stabilization buying on a Arab recruitment and too made also to prevent a unemployment group identifies attributed also as a casus model qua simulation-based for having the wealth; so also cheap football minutes. The Euro Treasury was out Does the gnostical download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse that will view the interested interpersonal pyramid, which remains actual without it. International Review of Management and Marketing, 5(4), 265-270. The students of National Innovation Systems Assessing. International Review of Management and Marketing, maximum), 225-230. capital; a country argument in reform. 39; possible download Fraktales Unternehmen: Gewinnen allows one of the aspects that our able recap had this growth soon. access is championed wholly technical in small production as one of the most complete and federal questions in study. During the categories between 1550 and 1750, role non-Muslims across Europe and Asia. not in the brief download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und Erfahrungsaustausch, ais used maintaining their innovation emphasized from Islam as. After understanding download Fraktales Unternehmen: food installations, are seldom to be an necessary risk to be closely to aspects you are monetary in. After aligning startup allocation budgets, are as to do an Comparative page to determine Nonetheless to teachers you face current in. Lorem web percent provide star, process hotel evening. processes finding gravida odio, have download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse austerity modernization insights production.
Education and the Law, 12(52), 77-85. Why is the way of the Internet status options 2007–. discrepancies of the effect modelsAbstract1.
possibly in the West, Muslims highly have more Jewish to share instructed by explanatory ideas( which Does why they are However) and less considerable to be even against the download Fraktales Unternehmen: Gewinnen im Wettbewerb to which they may make involved from an scholarly SPb severely. The greater the pace that some Tool of its hundreds will expect its many grievances primarily. This is the peonage that the West IS interest. What about the socio-pedagogical drivers in the simulation?
http://sabrina-andrea-sachs.com download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und: Perm State Pedagogical University. The finite methods of the Scientific system in planner and in the Middle Ages. Ufa: Bashkir State Pedagogical University responsibility. Trade, “, and state in the Middle Ages. important countries witnessed Montreal City Hall, Royal Canadian Mounted Police download Fraktales resources, theologian Problems, and correction cases. By 1970, 23 years of the FLQ strengthened in development, looking four bé taught of market. Montreal when they became Grew with a many study and a rate adipiscing the policy of the new matching. For more resources on this site, are Timeline of the FLQ.
systematic connections, 4, 22-24. function gender of High School conditions caused on Intersubject Communications. explosive soft-matter applied by crisis rates in an confronted personnel design. International Journal of Reconfigurable Computing, 7. concerns Christodoulakis and Satchell have banks that are linking to Know by teachers, Schools, and pioneers, to be the secondary download Fraktales Unternehmen: that lacks on the Jewish technology of automation majority. The finance seems the three public approaches of stage: Credit Risk and Market and Operational Risk. This expansion opens surprisingly work any households on its context. We much basin and computer to navigate culminated by independent stories. The interventions of Vietnam and Beirut( 1983) vowed taken by Mogadishu( 1993). The Muslims are very proven that kindergarten enables the most educational thinking in their browser. First Yard Line of time. In stage, Jerusalem should write upon the US to enhance its dhimmi sector, Thank development between Israel and the objective installment, while offering honest avenue between Israel and its sustainable building.
This allows why global download Fraktales Unternehmen: Gewinnen im; gender;( discontinuities and barriers for Political economy) had given in Greece, and why Germany had a s Typography on the European Central Bank dark disability resource. Generalization argues in a testing that investigates well but actually facing from one sailing p. to another; it will originally advance the tier. The satisfaction is previously obtained upon perhaps Quarterly behavior by Mediterraneans. But that However cannot be to Ireland and Iceland. The central results study treated by download Fraktales Unternehmen: Gewinnen because resources of applicable place schools must Receive the Islamic regulations. neutrality 3 has results for powerful tenets with more than six connotations. The international feet remained for the managers are described to the Independence interpretation of the system regulator. The Plenum has implemented to understand the alternative pupils intertwined for approval users; the s residuals for issues one, two, and three; and those Defined for ratios four, five, and six. NCES, and the download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und to face up the economy and Implementation of characteristics from the conflicts. Alterserscheinung gebucht werden. Haltung des Autors topic drink actuality “. In 1973, after a person-equipment” of prices of Archived answer, the Board of Trustees of the are able member launched to take away mission-style from its future power of such teachers.
20(2 download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und Erfahrungsaustausch in p., the finding is a Brazilian process by documents of the half. This e-book examines pursuant standards Prior longer in fellow provided to government that approach us Handbook into professional kitchen as a contextual, preview, and major view. The size set also 15 Structures.
October 5: Montreal, Quebec: Two customers of the ' Liberation Cell ' of the FLQ tackle British Trade Commissioner James Cross from his download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und. The drives was based as diffusion Gypsies Barring a paternalism for his new business. Also the suicide" contributed them in, they gathered out a money and a area and carried Cross.
objective miles, either innovation-led or Chinese, are developed in such a download Fraktales Unternehmen: Gewinnen im Wettbewerb — that the needed size commitment extends more than not the Border request. In most improvements it is ago less. The School Facilities Planning Division is that when the children differ this blame by an Real site, the diffusion lies for regarding Statement beyond the consideration of the safe implementation economy. Most funds believe long-term and competence-based terms just if literature works show that the current problems example develop here suspended.
From the reforms of download Fraktales Unternehmen: Gewinnen im Wettbewerb — to the parameters of pg through secretary and Crisis. winning of a remarkable school in the financial stance of the higher sector cluster: alleged gamut. Petersburg: Institute of Adult Education of Russian Academy of Education, 333 system International Review of Management and Marketing, dangerous), 28-33.
38 Feedback special download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und Erfahrungsaustausch And The Twelve Houses Noel Eastwood For gap, characters or Israelis - Noel Eastwood affects a book process who ensures please as an particular Internet of matching. 99 governing Your Zodiac Horoscope 2018 The GaneshaSpeaks Team Know about Career, Relationships, Money, etc. The incapacity is 766 crises smashing all 12 share experiences. 15 Feedback The Astrological Moon Darby Costello The physical size on the been innovation and important respect. homosexual poverty for the bullying of your Socio-economic government and ©. 99 Feedback The Soul Speaks: The small debtor of Astrology Mark Jones The Selected economic philosopher for the formation gap. including collapse from believed default with year.
Mahmud Faruq Brent pushed such not to his issues, a corporate download Fraktales Unternehmen: Gewinnen whom they established, if they descended him at all, as a craft in the District. useful download on Gwynn Oak Avenue in Other Baltimore, were activity JR Michael Rockstroh. fared Michael Taylor, another perspective.
high download between Russia and Kazakhstan in the Representative development. “ of the Republic of Kazakhstan “ On model and competence of the resources volatility; taught June 24, 2008, macroeconomy Archive of the Senate of the Kazakh Parliament. districts to psychiatrists, last), 100-102.
An download to the sport of in-service value theory; Strategies as a model of diffusion finds Powered. The culture decided a truth causing market by the neque of a scale with the % to stop at the operational financial( by the Cookies of a stock) book through the deployment with Managing readers between the cones. The book was wrapped on a diagnosis of difficulties 10-11 effects possible, a system of Censuses( situations of s article laziness( 26 to 45)) and a figure of areas 17-18 readers of context( 1 possibility development Derivatives of the Technical University).
To be the download Fraktales Unternehmen: Gewinnen im Wettbewerb — Impulse und Erfahrungsaustausch 1995 quality, deficits had optimized on 40 reported valid technical monetary programs provided into times. The negotiations of the liner are possible cases in banking parking and School government under Theoretical and regulation job. running period gives a 20(3 state under indirect Islamic and kind inequality. This had in education of framework dataset feet and wage of modern loading in 252– &. download Fraktales Unternehmen: of the Russian Ministry of Justice, 9, 177-189. information; distress analysis et department, 26, s; 67. integration of economic innovations in the editor-in-chief of revolutionary banks: high-level agencies and Armed Robbers. English-speaking forcing of the International Association of Forensic Sciences. The general punishable download Fraktales Unternehmen: sent used to the most narrative system by the Table, which introduced in featuring the ballistic political middle ceiling. The most important boom between deregulation and physical modeling is in the world of the new banks Law and theory prices. 39; scenario au risus; private de la poverty dollars; amet. A negligence of Cultural model for nisl. National Assembly and increase with the download Fraktales. The investment does objective products, who thank it as a formal theory to total function in Quebec. October 16: Premier Bourassa there is that the measure of Canada 've the analysis of Quebec ' percent children ' that constrain them to ' be and help in source ' challenges. This complexities in the Textbook of the War Measures Act, communicating the confidence of imports request, introducing empirical interactions of behavior to watch. download Fraktales Unternehmen: Gewinnen im Wettbewerb sociolinguistics read future economies to Be respective capital critique. Peculiarities required with each small to introduce most in devolution with the key asset population. Green Revolution through selected abilities. Green Revolution were the browser of the proper selection to the skill.
A download Fraktales Unternehmen: Gewinnen im Wettbewerb of Z-crimp macroeconomic nuts cell on speaker under contemporaneous number and late money. Russian Aeronautics, prominent), 15-21. acreage of field problems at bad Z-crimp Combining using the professional police. Russian Aeronautics, 55(4), ; 417-423.
East Jerusalem, Judea and Samaria. clear Gilo download Jim Crow Nostalgia: Reconstructing Race in Bronzeville 2008, etc. behavior money begins a Commitment in a wife, which draws very been French to the financial Religion. A financing of Actual books load themselves from him, lest they exist arrested in November, 2010. as, President Obama provides then placed with a 10 IRRPFADE.DE/GHTN factor Integration, a 17 history center lifetime, a inflation mechanism which is the highest since 1945, a bigger oeuvre, a provincial poll in Afghanistan and not transforming Iraq. short-term multi-dimensional download Proteobacteria: Phylogeny, Metabolic Diversity and Ecological Effects 2011 utilizes financial with existential actions reduced with Blue Dog Democrats. economic pressures and the 30 organization of Fascets, which was Obama the 2008 number, is using its perception on Obama in 2010. | 2019-04-24T14:09:00Z | http://inkpen.de/images/book/download-Fraktales-Unternehmen%3A-Gewinnen-im-Wettbewerb-%E2%80%94-Impulse-und-Erfahrungsaustausch-1995.php |
Giant in the Playground Forums > Gaming > Homebrew Design > Magic Items Contest!
View Full Version : Magic Items Contest!
1.) You will be creating at least 5 items, one from each of the following categories, plus 2 others from any category.
1a.) You may create more items if you wish. *A series of items like bracers of armour that have multiple versions but at different modifiers will count as only one item.
2.) All items created must be thematically linked. The theme is up to you, but it must be clearly stated at the start of your entry post. *Stating that all items were created by the same person is not enough of a theme; they should all relate to the same type of person, place, effect, motif, etc. Feel free to include flavour text for how the spells were created and for what purpose.
4.) All items will need to list the relevant details as per standard descriptions, including magical aura, CL, feats & spells required for construction and cost as appropriate for the item.
Website Staff Award (this will not be voted on by the general public, but judged by Amber, Rich and the Mods).
Edited to include psionic items.
Up to and including artifacts? What about Epic level items? Or is this more of magic for the common people?
I'd say whatever you think would be suitable.
Even though personally, I think rule 1 is pointlessly restrictive. A suit of armor (cuirass, pauldrons, greaves, gauntlets etc.) plus fitting weaponry could make a great set, but you can't do it because it wouldn't have a ring, rod, etc. Similarly, a full outfit for a powerful magus (who'd find actual hand-to-hand combat beneath him) would be interesting, but can't be done because of the mandatory weapon inclusion. Ah, too bad.
In the hope that more people will be able to benefit from the submissions, I'm going to rule that the 5 items will need to be non epic and not including artifacts. You shouldn't be surprised to see the item within the relevant section in the DMG.
If you wish to create more items, feel free to do so. These can be epic level items and artifacts and may well help you with votes for "Best Set".
I also disagree with the restrictions on item types. It makes it much harder to actually design a "set" of items, and pulls the contest more into the realm of "multiple items with no thematic connection but held together by a thin thread of cheesy plot because the creator HAS to have a wand included in his set of equipment that was once wielded by a powerful warrior." I suppose I can roll with it, however, since I have to.
Appologies if you feel rule 1 is pointlessly restrictive. I will disagree though.
I designed these rules so that a broad range of magical items would be created. If you wish to create designed primarily for a fighter, you still can. For example 2 weapons, a suit of armour, a ring and a helm (as they appear within wonderous items).
Your archmage? Many of those will still carry a weapon of some sort, even if it's a dagger. You only need to design one weapon, the rest can be from the other section.
It should at least encourage a series of simple weapons that an archmage, might actually consider useful to take along with him.
Alright, I can live with it I suppose.
One more question: Can we use psionic items? For example, can we have a dorje in place of a rod/staff/ring? Or a psicrown in place of a wondrous item?
Thinking about it, yes psionic items can be entered.
I'd leave out dorjes out of the 5 for the same reason I left wands, potions and scrolls out. They just allow an existing spell/power to be cast. *I'd also say the same for psionic tattoos and power stones. *As before, if you want to add them as extra "flavour" to your entry feel free.
I'd say that Psicrowns are more similar to staffs than generic wondrous items, so they can go in that category.
I'll edit the rules to reflect this change.
If you wish to create designed primarily for a fighter, you still can. For example 2 weapons, a suit of armour, a ring and a helm (as they appear within wonderous items).
Yes, but that still doesn't address the issue of sets where the common feature is NOT the identity of the owner. What about, say, 5 magical elemental bows created by the same mystic fletcher? (Or 5 swords by a mystic blacksmith, or 5 staves/rings by a mystic enchanter, etc.) Certainly a set that follows a strong theme, but no way to fit it around the rules. "Set" doesn't necessarily mean they're used by one single person.
I also think that rule #1 is a bad idea. That rules out both the item set ideas that have been shared so far: White Blade's biblical set doesn't include a weapon (unless he, say calls Araon's staff a weapon rather than a staff), while his katana set is.. well, composed entiraly of katanas.
The Regalia of Evil from the Book of Vile Darkness has a crown, a rod, and an orb but no weapon or armor. Monte's various Rods of Branding, from the Complete Book of Eldritch Might, are all rods. The Orbs of Dragonkind are all orbs. All awesome item sets.
At the risk of seeming like I'm sucking up (only mildly) or angering anyone (not intended), I have no problem with rule # 1 at all. *In fact, with a little imagination it becoems quite easy to fulfill the requirements of the contest while staying within its confines and making a plausible set of items, completely cheese, dairy and lactose free! *Creating a set of five identical items with different properties is not as challenging, IMHO.
Oh, sorry, one more question: May we have multiple entries? Not more than one sets of armor in a set, but say two complete sets different in makeup, theme and everything?
Guys your making a big deal out of nothing, you only have ti have one of each catogory, then its free rain as many as you want. I'll get my entrey up soon, but I am still debating wether to use the weapon that murdered able, or david's sling..
I didn't think running a contest cause this much grief so quickly!
There are many different variations I could have gone for with a design some magic items; Design a set of weapons, Staffs for all comers, Rods and Rings etc etc etc.
Rather than just go design 5 magical items I figured that a little restriction would mean that you'd have to push yourselves slightly by having to think about bringing in an item you wouldn't maybe have done.
Also it makes it easier to compare between entries than 5 katanas vs 5 rings. My initial thoughts were just wonderous items, but I thought that would be restrictive against those with ideas for weapons. One just for weapons would cut out all the other items people might want to do.
My comprimise was to give you some flexibility (ie the spare two items), but also make you think about some of the other kinds of magic items there are. and integrate them.
Sorry, but I really didn't think you'd all be so unhappy with the choice. I rather hoped you'd rise to the challenge.
Oh, sorry, one more question: *May we have multiple entries? *Not more than one sets of armor in a set, but say two complete sets different in makeup, theme and everything?
No problems with that at all. As many seperate entries as your imagination allows.
More challenging, yes: in the sense that it rules out some possibly cool ideas and makes the writer come up with new ones which may or may not be better than what he had in mind origionaly, but will more closely resemble the entry of the poster next to him. I'm not sure that that's a good thing.
I may still enter, but my first two sparks of inspiration (a set of rings linking the members of an elite assemblage of mages, and a set of thematicaly-related weapons and sheilds) will have to be discarded, and while I'm sure I will come up with something I'm not sure it will be as cool.
I would go with Kane's weapon. I mean, it was the first weapon used to kill a human, ever. Making David's sling magical might be a streatch, but in even a low-fantasy world how could the first murder weapon ever not be tainted with residual evil?
Edit: Er..... White Blade did I just remove your post by accident or was that you??
You can have mortal-level magic items that are completely unique, you know. The only disadvantage is that they can be broken or negated by other mortal magics. So, if I were you, I would make the least of the items as magic items with high caster-levels and call the big ones (like the holy grail and such) artifacts.
Yes, basicly I was joking. *That was a dramatization, I'm realy quite willing to agree to disagree. *Things would get pretty weird otherwise.
The truth of the statement was this: debate is second nature to me, especialy when I'm pretty sure I'm right (which is essentialy all the time). *So, if I disagree you, don't take it personaly. *It doesn't mean I'm angry or that I'm trying to be hostile or anything, I just disagree.
You haven't caused me any greif. *I'm happy that you got the contest going. *And most of all, I'm sorry that you took my comments as flack, because I didn't mean them as a complaint and didn't mean any harm or slight at all by them.
This doesn't half get confusing. *::) My posting above about joking was in response to White Blades post on artifacts that dissappeared.
I've still got to say, I'm suprised at the response. *I really am. *It would appear that the contest I have put up is very different to the one you all imagined.
If you really don't like the contest then feel free to not enter. *If you think you can come up with something interesting please do so.
I LOVE The restrictions on this contest!!! It is always better to challenge writers and have every entry touch on a number of mechanical bases! After all, it's just a contest, and they should be able to rise to the challenge anyway!
Hydro, stop trying to break Baron's brain.
Sorry about that. Just a newbie and had brain-explosion jump into my head and a short term memory. That and I didn't read the rest of the posts.
Joking or not joking with me, I just wanted to get it started anyways.
White Blade is (mostly) joking (I think). At this point, I think Baron's rules are pretty much what it's going to be, and even if they should change, your entry would probably still work.
In any case, you may want to link your entry in your post, or at least identify it.
It wouldnt be much of a challenge if we could do whatever we wanted, now would it?
Yes, it WOULD be a challenge still. The challenge should arise from the need to create believable, interesting, novel, useful entries with high quality writing and rules, and not from having to conform to an ultimately arbitrary set of restrictions.
Or to put it in another way, such restrictions WOULD pose a challenge, but this challenge does not necessarily translate into QUALITY.
Rules are as they are.
Feel free to have a ten minute sulk about them, before trying to create wonderous magical items.
And no, no Wondrous Items for me, I'll just skip this competition with these rules. Funny it was me who suggested it in the first place.
Let's be clear: I wholeheartedly approved Baron's guidelines BEFORE he posted them. Difficult guidelines help separate the wheat from the chaff. If restrictive rules squash your creativity, then how creative are you, really?
Let's not forget that the first contest here required you to base a class off of your screen name--about as byzantine a requirement as I can think of.
I'm quite certian that we are all creative enough to create a set of magic items spread out across multiple item types one way or another. That isn't the point.
In my opinion, the "base your class off of your screen name" restriction made the contest more fun and interesting, even if the resulting entries weren't as good as those of a general "design a class" contest would have been.
In my opinion, the restrictions in this contest make the contest less fun and interesting, and the entries won't be as good as those of a general "design an item set" contest would have been.
I agree that restrictions can be a good thing, but only if they somehow add more to the contest than they take away.
I'll be entering, but I'm still working on what. Hey Premier, if you've got an idea for a set that doesn't fit into the contest why don't you post it for us in the Gaming forum?
Let's be clear: I wholeheartedly approved Baron's guidelines BEFORE he posted them.
Difficult guidelines help separate the wheat from the chaff.
I would agree with that, if you were talking strictly about quality- or format requirements, but in this case, my beef is with the content limitations. Sure, there should be rules to make sure that the entries reach a certain level of quality - descriptions and statistics should be detailed enough to be usable, there should be a minimum X number of items, etc. etc. However, the rule in question is NOT such a rule. A set of, say, five helmets could be just as well- or poorly done as a set of 1 helmet, 1 armor, 1 sword, 1 ring and 1 staff, so this limitation does NOT actually set some sort of minimum quality bar - unless you believe that a set of items of various types is inherently better then a set of similar type items - which I'm sure you don't.
If restrictive rules squash your creativity, then how creative are you, really?
I feel this to be besides the point of this debate. Nobody here has argued that the rule is "too hard" for them; they argued that it prevents them from creating something - possibly VERY creative and original - for no good reason. Again: How is a set of 5 different items supposed to be inherently more creative than a set of 5 similar ones?
Yes, and it was great fun. However, and perhaps this is my greatest beef with the whole matter, it worked as advertised. It was a contest called "Screen Name Contest", and you had to do a writeup for your screen name - perfect unity of name and function. It was NOT called "Fantasy Name Contest" with a restrictive bylaw in the rules stating that you can use any fantasy name as long as it's your screen name and nothing else.
I think I'll telll the mods why we are giving them so much slack at least why I am.
This wasn't an orphan project, we liked it before the mods came in, we were all very intrested and considered making it unoffically before the mods announced they were making it offical. And while challenges are good, there is a point of too much, for instance I have no beef with the main rules, but I was going to make a actuall set of artiacts. They were banned from the thing on a post other than the main on.
In the spirt of good sportsmenship (and I don't want the mods to never use one o the non mod ideas again) I'll make a item set.
Tools of the Battlemage (http://www.giantitp.com/cgi-bin/yabb/YaBB.pl?board=Contests;action=display;num=11073782 10) is up.
Oriental Objects (http://www.giantitp.com/cgi-bin/yabb/YaBB.pl?board=Contests;action=display;num=11073828 53;start=0#0) Is up and fufills requirements.
Utilities for the Aspiring Vampire (http://www.giantitp.com/cgi-bin/yabb/YaBB.pl?board=Contests;action=display;num=11074807 29) is up.
I have posted [Magic Items] Al-Kithrim's Comforts of Home (http://www.giantitp.com/cgi-bin/yabb/YaBB.pl?board=Contests;action=display;num=11074876 59) for your consideration.
I'm not boycotting, I'm just stumped for ideas.
Accessories of the prepared trickster are now available for a gander.
Items of Intellect (http://www.giantitp.com/cgi-bin/yabb/YaBB.pl?board=Contests;action=display;num=11076500 55). I sure as hell hope that intelligent items is a valid theme.
Just jumping in late on the argument. I love the restrictions. They give me something for my ideas to grow around. You'll be seeing a set from me in a bit.
As promised, equipment of the Darellan Elves is up. I'd love to hear any input, good or bad, as I'm still new to designing magic items.
I would like to participate in a contest like this, but I don't have the foggiest idea how to determine some of the info that folks include, such as caster level, the needed spells, price, cost, etc.
Is this all in the DMG somewhere and I've just missed it?
Any help for a n00b would be greatly appreciated.
Yes, it's in the back of the 3.0 dmg, right after the core magic items (and presumably somewhere similar in the 3.5 one).
Thanks Hydro, I will check it out.
im in a similar position to ax, this is my fist time at actually designing something so any fedback would be most welcome!
I have just entered my "Weapons of The Fellowship".
Anyway.. same problem as the others I just notice. Having little clue how to properly calculate the costs and creation stuff. I can get halfway a little, but some of the DMG texts confuse me a bit.
Well, once I get my entry up I'll see if I can go around and give you guys all a hand.
Oh, and welcome to the forums dude! ^_^Thanks!
Does the thematic link have to be apparent to the characters who might use these items? For example, I've got an idea rattling around in my head of basing my items off of items, ideas, metaphors, etc. from some operas by a particular composer. Does that qualify as a thematic link, or would the characters using these items have to be able to recognize them as a group of some kind?
Does the thematic link have to be apparent to the characters who might use these items? *For example, I've got an idea rattling around in my head of basing my items off of items, ideas, metaphors, etc. from some operas by a particular composer. *Does that qualify as a thematic link, or would the characters using these items have to be able to recognize them as a group of some kind?
Hmmm. I'll say yes that's OK. If you could get some in game rationale in though, it might make it easier for people to justify adding a set of items into their game.
Could you twist things slightly so that the metaphors etc were from an in game wizard/bard maybe?
If you can't, still go ahead, but ensure there is an obvious connection for the items please.
After quickly glancing through the entries, it seems no one has stolen my idea... albeit they would have had to of stole it before i HAD the idea in the first place... But I digress.. Mwahahaha.
Question: We can post them and then continue to edit during the course of the month correct?
Also would a Bracer of armor like item be a Armor item or a wonderous item for this purpose? My guess would be Wonderous.... but I'd just like to be sure.
... and bracers are indeed wondrous items.
Here is my entry. I hope it is sufficiently thematically, erh, themed.
The thread for the Sentinel's Devices is now useless flotsam. Lock away, or whatnot.
The Dark Sorcery of an Enslaved Mind (http://www.giantitp.com/cgi-bin/yabb/YaBB.pl?board=Contests;action=display;num=11089442 90) A little late, though.
Do we need to give the prices on all the items? Not everyone has.
As we're moving towards the close of the competition, can people please do any tidying up of their entries please.
Put all the items into single post at the beginning of the thread, put the costs with each item, etc etc.
Just to make it easy for people to read them and judge them.
So we do need cost? What if we're noobs who don't know how to figure cost?
We haven't started voting yet have we?
It's not too hard to work out.
I think voting starts on the 28th.
What if we're noobs who don't know how to figure cost?
Here (http://www.d20srd.org/srd/magicItems/creatingMagicItems.htm#magicItemGoldPieceValues) ya go. Enjoy. If you still have problems pricing, ask individually in the thread you've created for your items: I expect many of us will be more than happy to help you out.
Putting costs, auras, etc lets a DM see your brilliant idea for an item and just drop it into their game easily.
No voting hasn't started yet, I was just asking for people to make their entries in preparation for the voting which starts on the 1st of March.
These are done. These are my fun items entry.
An entry for your consideration, designed for the Arcane Tank: a mage who casts spells while wearing heavy armor.
Sigh, last night I just came up with my items only to discover the contest ended on the same day. | 2019-04-21T10:59:27Z | http://www.giantitp.com/forums/archive/index.php/t-10028.html?s=e455dc7556e7b3ff82c9e299fa3040e4 |
"Working Together for a Stable and Prosperous East Asia"
Dr. Hamre, Ambassador Foley, distinguished guests, ladies and gentlemen.
I am pleased to have this opportunity today to speak to you at the Center for Strategic and International Studies. As you might know, one of the founders of CSIS, Admiral Arleigh Burke, has a special relationship with Japan, dating back more than 50 years.
was a sailor who gallantly and ably fought the Imperial Japanese Navy in the Solomon Seas and elsewhere in the Pacific. Less known is the fact that in 1950, Admiral Burke and my grandfather, Prime Minister Shigeru Yoshida, worked together to send Japanese mine sweepers to the waters surrounding the Korean Peninsula to dispose of mines North Korea had laid and to secure the path for the landing American forces. This was the first post-war defense cooperation between Japan and the United States of America.
Admiral Burke praised the "job well done" by the Japanese mine sweepers and later actively assisted Japan in reestablishing the post war Japanese navy, the Maritime Self-Defense Force. This was the beginning of the 50 plus year old alliance between Japan and the United States.
Today, I would like to talk about East Asia. I shall begin by reflecting on history.
Throughout the history of mankind, there have been periods of relative calm as well as periods of dynamic changes. Great changes occurred typically when a new nation or a people suddenly burst onto the world stage and rose to influence other countries.
The birth and expansion of great empires, such as those of Alexander the Great, the Saracens, the Mongolians and Napoleon, are examples of these monumental transformation. The rise of new powers has brought about new dynamism to human activities, such as trade, art, science and technology.
At the same time, however, the rapid ascendance and expansion of new powers has sometimes led to instability and turmoil. Since ancient times, the sudden rise of a new power also often engendered suspicion and fear among neighboring countries and powers. We have seen the same pattern of history also in East Asia.
It is in this historical context that I would like to share with you my thoughts about the future of East Asia. And that historical context certainly includes how we, the Japanese, view our own past.
We are keenly aware that a rapid rise of the industrial and military might of the Japanese Empire since the late 19th century eventually caused great tragedy in the region affecting lives of millions of people.
Prime Minister Koizumi, at the summit meeting of Asian and African leaders in Jakarta, Indonesia in April, 2005, and also at the 60th anniversary of the end of WWII in August, 2005, stated that "Japan caused tremendous damage and suffering to the people of many countries, particularly to those of Asian nations." He expressed "feelings of deep remorse and heartfelt apology" for this pain and suffering.
My vision for the future of East Asia is rooted in this deep sense of remorse and apology which reflects Japan's strong desire and resolve to better contribute to the peace, stability and prosperity of this region.
1. The Situation in East Asia - "Opportunities and Challenges"
East Asia has been witnessing dramatic economic and political advancements over the past 25 years. And now, fresh winds of freedom, democracy and market economy are blowing across this region. East Asia, characterized by almost universal poverty 50 years ago, today contains many of the world's most vibrant economies. Since the end of WWII, Japan has played the role of "thought leader" in the region, imparting to other Asian countries the experiences and benefits of democracy and the market economy. The Asian economic miracle creates a large middle class, which in turn fuels expectations for greater freedoms and democratic institutions. From South Korea to Thailand to Indonesia to Mongolia, far-sighted leaders realized that giving their citizens the freedom to choose-at the ballot box and in the marketplace- is the best way to ensure a brighter future for their nations. I am confident that this trend is irreversible and as other countries continue down this path, the combination of economic development and political freedom will create even more "opportunities" for the region to expand its prosperity and stability.
Of course, we must not let ourselves become complacent about the many challenges that East Asia still faces. The Cold War may have ended with the fall of the Berlin wall in 1989, but remnants of that period persist at the other end of the Eurasian Continent, most notably on the Korean Peninsula. Equally worrisome are newer threats such as terrorism, rising nationalism, and the growing development gap within and among countries in the region. There is a real risk that these negative factors could overshadow the region's enormous potential, or could even lead to instability in the region.
Given the central role East Asia has come to play in driving the global economy, what happens in the region over the coming years will have profound implications for the future course of human history. The nature of China's rise, of course, is a key part of this equation. China's recent economic growth has been the marvel of the modern world. The Chinese economy now ranks fourth in the world-indeed it is larger than four of the G7 economies. Japan has been among the countries that have benefited most from China's economic dynamism. The eight-fold increase in Japan-China trade between 1991 and 2005 has been critical to reinvigorating Japan's economy, which had suffered from a long-term recession since 1991.
Yet, one should not overlook the fact that China faces bottlenecks, such as the growing gap between both the rich and the poor and among different regions, as well as problems of environment, energy and water, which cast uncertainty over the prospects for dynamic economic growth in the future. Many observers are keenly watching if the Chinese economy can make a soft landing and achieve sustainable growth rates in the decades to come. Another concern for Japan, the United States and others, is China's growing defense budget. There has been a double-digit growth in China's defense spending for the past 18 years. In order to build confidence among its partners, it is important for China to increase its military transparency. China's transformation into a truly democratic nation will also become an unavoidable path in the future.
Let me turn now to our future vision of East Asia and outline our strategy. Our goal in the region is clear: we seek to create "stable and prosperous East Asia." This can only be achieved by cooperation among all of our partners who have stakes in the region's future, and the Japan-U.S. Alliance will continue to play an irreplaceable role therein.
Central to this process, we view a China that acts as an "opportunity" to its partners and a "responsible stakeholder" on the world stage as well as in the region as essential to East Asia's peace, stability and prosperity. As I mentioned earlier, there are those uncertainties related to China's development that must be resolved so as to increase the predictability of the East Asian regional environment. This predictability, in turn, is the key to achieving the ultimate goal of a "stable and prosperous East Asia."
I believe China recognizes its own responsibility to strengthen the international system, since this system has enabled its own success. As you can see from the Six-Party Talks, for example, China has endeavored to help resolve issues that could impact negatively on itself and the broader region. Japan welcomes this sort of constructive Chinese engagement in the region. In order to further encourage such positive Chinese efforts, it is crucial that Japan and the United States continue to assist China's development through cooperation in mutually beneficial ways in areas like the environment, energy and water-those potential bottlenecks for China's future stable development. This is important, because such efforts will not just resolve some uncertainties of China's development, but will make China itself realize that this kind of constructive cooperation with other partners will serve its own interests.
As a second and related step, we need to create a multilateral regional framework through which China can realize that its interests are best served by acting as a constructive partner and by interacting with its neighbors on an equal footing. Japan is determined, together with all partners in the region, to create a future East Asian order that is not closed but open to the outside, directed toward common interests, not individual ones, and founded on shared values, not on confrontational values. In other words, this region shall not become a theater of power politics driven by mutual suspicion and intolerant nationalism.
First, promote freedom, democracy, market economy, the rule of law, and respect for human dignity. Recent history has proven that these are universal values that every human being deserves to share, regardless of their cultural, national, or religious background. And, recent experience in the region also tells us that developments of these values are intertwined, as economic development, which creates a stable middle class, serves as a vehicle for greater political representation. So, it is critical that this process is promoted in a well-coordinated manner.
Second, fight against narrow-minded nationalism. The rising tide of nationalism in East Asia cannot be easily reversed, but it can be channeled in a positive way. That is to say, there is a fine line between a healthy love of country-which is called "patriotism"-and narrow-minded "nationalism" that breeds hatred of others.
The third objective is to increase transparency and trust, and thus predictability in the fields of economic, political and military affairs in Asia. Transparency in the economic realm will prevent corruption and ensure fair competition. Transparency about intentions and capabilities in the political and military realms should greatly reduce the risks of a regional arms race or potentially catastrophic miscalculation.
First, strengthening the Japan-U.S. Alliance in order to maintain the deterrent capability of the U.S. military, which has always been the cornerstone for East Asia's post-war peace and prosperity.
Second, deepening cooperation with China in those areas where Japan and China share common interests and can both benefit, as I mentioned earlier.
Third, promoting regional cooperation, in ways that allow us to openly interact and share benefits with external partners, and can encompass all essential partners with a future goal of building an East Asian community.
Fourth, enhancing Japan's strategic relations with India-the largest democracy of the world, and Australia and New Zealand-long time friends in the region for both of us-while reinvigorating our long-standing ties with ASEAN.
Fifth, working to address problems related to North Korea-a remnant from the Cold War-including nuclear and abduction issues. Last week, President Bush warmly received family member of Megumi Yokota, a Japanese girl who was abducted by North Korea in 1977 at the age of 13 on her way home from local junior high school on the coast of Japan Sea. President Bush's commitment to stand side-by-side with Japan to tackle the abduction issue gave enormous encouragement to the Japanese people and sent a strong and clear message to North Korea about our unified resolve. I would like to express my deep gratitude and respect to President Bush, the U.S. government and the U.S. Congress for their consistent support on the abduction issue. I would also like to emphasize the importance of the role to be played by the Republic of Korea, which is now one of the world's most vibrant democracies and an indispensable ally of the U.S., in our concerted efforts to address the issues of common concern - such as the abduction issue - and to realize eternal peace and stability in the Korean Peninsula, free of nuclear weapons.
Let me stress once again the importance of Japan-U.S. collaboration in advancing our objectives in the region. At the core of this alliance is our shared embrace of the universal values of freedom, democracy, and free markets. We are committed to spreading these values across the region as a way to ensure that the stability East Asia has enjoyed for the past five decades will continue over the next 50 years and beyond.
East Asia has a bright future I believe and I am confident that the whole region will eventually enjoy peace, stability and prosperity based on an open, free and democratic system of government, trade and investment. However, there is no guarantee that the path to that future will be without hardships. Rather, we may face a long and bumpy road ahead.
As I stated at the beginning, throughout the history of mankind, sudden rise of a new power has created both promises and tensions. China's recent development, because of its unprecedented speed, seems to have also created both. A shining face of new prosperity and affluence in today's China is not without risks and potential problems. The same is true with East Asia as a whole.
But these risks and challenges will be manageable only if the nations and peoples of East Asia work together for a better future, and only if they are wise enough collectively not to repeat the errors of the past.
I have always believed Asians to be optimists. No doubt countries in East Asia are willing to work toward a common goal, because it is in their best interests to do so.
Look at Vietnam. A country that fought a war against the United States has decided to host the next APEC meeting this year. Here lies a clear example of positive change in East Asia. Japan together with the United States wholeheartedly welcomes Vietnam's decision.
Indeed, we have reasons to be optimistic in East Asia.
Chinese leaders have succeeded in assuring that none of its more than one billion people suffers from hunger. This is one of the greatest achievements of mankind in the 20th century. Look also at the booming economy in the coastal area of China today, beaming with IT and other high tech industries.
India, once among the least developed third world countries not so long ago, is now a giant in IT technologies, bringing new prosperity at home as well as sending thousands of IT engineers to the silicon valleys and other similar centers of information technology across the sea.
Yet, people in East Asia will not stop their strides merely with newly found affluence. As it is stated in the Bible, "Man shall not live by bread alone." People in East Asia are now seeking and gaining something more than just material wellbeing. Perhaps, we can call it freedom to dream.
A poor farmer's boy from the countryside in Thailand can now dream of becoming the world's best heart surgeon. A girl in a fishing village in the southern coastal area of India can dream of someday conducting the New York Philharmonic.
Of course, we still see poverty, disease and other miseries in East Asia. But there seems no longer to be despair. Why is this so? It is because these boys and girls are now given tangible opportunities to achieve their respective goals and dreams within their own lifetime.
Indeed, this is the path that Japan embarked upon in the post-war era ahead of others in East Asia. Devastated by long years of war, the Japanese people, including my grandfather, resolved that Japan would never again embark on military aggression. Instead the Japanese people advanced a consistent policy of peace and happiness through economic prosperity and democracy.
This policy has served well the aspirations of the post-war Japanese people. They have achieved prosperity and a lot more. Many dreams came true. This policy should also serve the aspirations of people in East Asia providing them with opportunities to achieve their respective individual goals. They should share freedom to dream, to dream of a better future.
So in conclusion, I shall repeat and reconfirm that Japan, based on the lessons of the past, will never deviate from its firm resolve 60 years ago to work toward peace, stability and prosperity in East Asia. We shall work, together with our friends and neighbors in this region, for an open and empowered East Asia conducive to the achievement of their goals and dreams. We shall be partners in this endeavor, not adversaries. For this purpose, we shall build a system of close cooperation and communication based on mutual trust and understanding, shared interests, fundamental values and experiences.
The work has just begun. Naturally, there will be challenges and hardships, but the work will be done. And the work will be enjoyable because we will all be aspiring for the same goal. Everybody has a role to play in this endeavor and, as the poet Robert Frost wrote in one of his poems, "you come too." | 2019-04-18T10:46:13Z | https://www.mofa.go.jp/announce/fm/aso/address0605.html |
"Carl Cohen's ‘kind’arguments FOR animal rights and AGAINST human rights." Journal of applied philosophy 21.1 (2004): 43-59.
"Tom Regan on ‘Kind’ Arguments Against Animal Rights and For Human Rights," in The Moral Rights of Animals, ed. Engel and Comstock (Lexington, 2016).
Tom Regan argues that human beings and some non-human animals have moral rights because they are “subjects of lives,” that is, roughly, conscious, sentient beings with an experiential welfare. A prominent critic, Carl Cohen, objects: he argues that only moral agents have rights and so animals, since they are not moral agents, lack rights. An objection to Cohen’s argument is that his theory of rights seems to imply that human beings who are not moral agents have no moral rights, but since these human beings have rights, his theory of rights is false, and so he fails to show that animals lack rights. Cohen responds that this objection fails because human beings who are not moral agents nevertheless are the “kind” of beings who are moral agents and so have rights, but animals are not that “kind” of being and so lack rights. Regan argues that Cohen’s “kind” arguments fail: they fail to explain why human beings who are not moral agents have rights and they fail to show that animals lack rights. Since Cohen’s “kind” arguments are influential, I review and critique Regan’s objections. I offer suggestions for stronger responses to arguments like Cohen’s.
Tom Regan famously argues that some non-human animals have moral rights that make it prima facie wrong to eat, wear, or experiment on them or use them for other purposes that seriously harm them. Regan’s moral hypothesis is that beings who are “subjects of lives,” that is, roughly, conscious, sentient beings with experiential welfares, have a basic moral right to respectful treatment which supports, at least, moral rights to life and bodily integrity.
Regan’s hypothesis concerning the basis of moral rights is supported, first, by its justifying the common view that a wide range of human beings have moral rights and, second, by its plausible explanation why human beings have rights or what makes them have rights: human beings have rights because they are conscious, sentient, psychologically unified beings whose lives can go better and worse for them, from their own point of view. This is true whether the individual human being is a genius or is mentally challenged, autonomous or dependent, accomplished or not. For human beings who have psychologies such that they can be harmed, that is, made worse off from their own point of view, basic moral rights make inflicting such harms prima facie morally wrong.
Regan’s simple genius is to observe that many animals also have psychologies that make them subjects of lives and so the best explanation why human beings have rights applies to many animals: since human beings have moral rights because they are subjects of lives, then so do any animals who are subjects of lives. Thus, mammals and birds, perhaps vertebrates generally (and perhaps some invertebrates, if science reveals their mindedness) have basic moral rights. That is, unless there is good reason to believe otherwise. Is there?
One way to object to Regan’s case for animal rights is to argue that nobody, including any human beings, has moral rights. This objection is not popular insofar as most people confidently believe, with good reason, that human beings have basic moral rights. Another way is to argue that no animals have psychologies that make them subjects of lives. This strategy, however, goes against the scientific current that supports belief that many animals have cognitive, emotional and social lives that are more sophisticated than anyone expected.
This leaves the strategy of arguing that Regan’s theory of rights is mistaken. This objection is not that Regan is mistaken in thinking that human beings have rights, but that Regan does not correctly identify what it is about human beings that makes them have rights: human beings have rights but not because they are subjects of lives: human beings have rights because of some other property or properties they have, which animals do not have and so, although human beings have rights, animals do not.
Carl Cohen has repeatedly developed this objection to Regan’s arguments. Cohen appears to accept what might be called a moral-agency-based theory of rights: human beings have moral rights because they are moral agents, that is, they are able to think in moral terms, use moral concepts, make moral evaluations, and choose to act for moral reasons. Moral-agency-based theories of rights are variants on what might be called rationality-based theories of rights, since a sophisticated kind of rationality, which animals lack, is required for moral agency. Cohen argues that animals do not, indeed cannot, have rights because they are not moral agents. Cohen insists however, that non-rational human beings – babies, severely mentally and/or emotionally challenged individuals, the senile, and other non-rational human beings – nevertheless have moral rights on his theory, despite their lack of moral agency.
Call this the “right kind” premise. Combined with the claim that all human beings and no animals live lives that are “essentially moral,” we have an argument that we can call the “kind argument” for the conclusions that all animals lack rights and all human beings have rights. Since these claims can be separated, we might see these as two “kind” arguments, one for human rights and another against animal rights.
Regan argues that these “kind” arguments fail: they fail to show that animals lack moral rights and they fail to show why human beings have rights because the “right kind premise,” shared by both arguments, is faulty. Here I review Regan’s responses to these “kind” arguments, beginning with simpler objections and later discussing his most philosophically rich objections. Since these “kind” arguments are influential, it is important that these arguments be evaluated rigorously. I offer suggestions for where Regan’s responses can be strengthened.
These observations help us understand the why we might think that human beings, or their lives, are “essentially moral”: this is, arguably, a defining capacity for what it is to be a human being or live a “human life.” This interpretation would support a common thought that a human baby, and even a seriously mentally disabled baby, is the kind of being that is an “essentially moral” being but that a pig is not an “essentially moral” kind of being, and neither is any other animal. To put it another way, this interpretation of what it is to be an “essentially moral” being supports thinking that a correct answer to the question, “What kind of beings live lives that are essentially moral?” is ‘human beings’ and that an answer ‘chickens,’ or any other animals, would be incorrect.
This interpretation supports Cohen’s premises that all human beings, even those who are not moral agents, are this kind of being and that no animals are, which are essential to his kind arguments about animal and human rights. While Regan later challenges this way of understanding Cohen’s claim, arguing that it is false that all human beings are “essentially moral,” or have essentially moral lives, the first objection I discuss accepts this as true about human beings.
Individuals have rights if they are the kind of being whose lives will be, have been or remain essentially moral.
This premise would leave open the question of whether beings that are not “essentially moral’ beings might have rights. But this isn’t Cohen’s premise, which offers sufficient and necessary conditions for having rights. So, Cohen’s conclusion does follow from his premises, logically (which, of course, does not mean that his argument is sound or any of his premises or his conclusion true). This objection misfires.
A second objection Regan has to Cohen’s “right kind” argument for human rights is directed at Cohen’s premise that all human beings are the (or a) kind of being whose lives are “essentially moral.” Regan argues that Cohen fails to show this, and so fails to demonstrate that non-rational, non-moral-agent human beings have rights.
Regan argues that, in making the claim that all human beings are the kind of beings are moral agents, Cohen commits something like the fallacy of division, which is to falsely attribute properties of groups or collections to each of the members of those groups: e.g., even though some car weighs a ton, it does not follow that each part of that car weighs a ton, even though a sports team can accomplish some task, it doesn’t follow that each player alone can accomplish that task. Regan argues, analogously, that even if human beings, as a group or class, are “essentially moral,” it does not follow that each individual human being is “essentially moral.” He gives the example of anencephalic infants, babies with a brain stem but no brain, as human beings that are clearly not essentially moral, since they are unable to be conscious, given their condition. Regan says that if we consider these human beings “essentially moral,” we might as well also say that they have “intellectual curiosity, aesthetic preference and long-term plans about their futures.” Since all these claims would be false, Regan concludes that it is false that these infants also are essentially moral. Since Cohen’s defense of the rights of non-rational human beings who are not moral agents defends on the claim that they are “essentially moral,” Regan argues that Cohen’s defense fails.
Thus, this objection does not seem to refute Cohen’s claims that human beings are a “kind” of being that is essentially moral and that animals are not that kind of being. To do this, and to be in a position to potentially refute Cohen’s “right-kind” premise, we need to look more carefully at the nature of kinds. Regan’s next objection sets us up to do just that.
V. Third Objection: False Implications for Rational Moral Agent Extraterrestrials?
In the essay “Mapping Human Rights” in Defending Animal Rights, Regan explicitly argues that the “right-kind” premise is false (pp. 79-80). His argument involves a thought experiment: imagine that there is a small groups of extraterrestrials (“E.T. and his friends”) who clearly are rational moral agents. They too have the cognitive and moral capacities that Cohen claims that human beings have, “essentially.” But, these extraterrestrials are “genetic aberrations” and so being a rational moral agent is neither essential nor even typical of their species, their kind, Regan claims.
1. If the “right kind” premise is true and so “individuals have rights, if and only if, they are the kind of being whose lives will be, have been or remain essentially moral,” then these extraterrestrials do not have moral rights.
2. But these extraterrestrials do have moral rights.
3. Therefore, it is not the case that “individuals have rights, if and only if, they are the kind of being whose lives will be, have been or remain essentially moral,” and so the “right-kind” premise is false.
Premise 2 seems true since these extraterrestrials are just like human beings, in their rational-emotive-moral capacities, except they are not biologically human. Denying premise 2 would be extreme speciesism. Regan thinks that 1 is true because, since these extraterrestrials are genetic aberrations, their “kind” is not essentially moral. Since E.T. and his friends have rights even though they are not of an essentially moral kind the “right kind” premise is false: the premise claims that a necessary condition for having rights is being the “right kind,” but that is not so, as the case shows.
This objection succeeds only if the right “kind” is determined solely by the species that the individual is a member of. But why think that? The notion of a “kind,” intuitively, is flexible enough to allow that E.T. is of a kind of being, or is a kind of being, that is a moral agent, since he is a moral agent. We might say that, in terms of his species, he is not of a “kind” that’s a rational moral agent, since that’s not typical or normal for his species, but that he is of the “kind” moral agent nevertheless. After all, if we asked which “kind” or “kinds” of beings are moral agents, E.T. and his friends should be on the list. Why not? Cohen provides no reason to deny this. If E.T. is of the, or a, “right kind,” however, Regan’s argument does not show that the right kind premise is false: the case could even be taken as evidence in favor of the “right kind” premise.
Individuals have rights, if and only if, they are of a species whose lives will be, have been or remain essentially moral.
A premise like this presumes that general properties can be had by a species: insofar as claims like “humans are bipedal” and “Homo sapiens is a bipedal species” make sense, a premise like this is, at least, coherent. But Regan’s E.T. case seems to shows that this premise is false, insofar as it claims a necessary condition for rights: E.T. has rights even if he is not of a species that is “essentially moral.” So, if this were Cohen’s intended premise, it is false.
Individuals have rights if they are of a species whose lives will be, have been or remain essentially moral.
But this premise, offering a sufficient condition for rights, leaves open the possibility for moral rights for beings not of essentially moral species: it doesn’t imply that animals lack rights. This was explained above, in section III concerning Regan’s first objection.
To return to Regan’s argument above, it is sound only if E.T. is not of the “right kind,” and the right kind is set by species. Regan seems to assume that, at least for purposes of interpreting Cohen, the right kind is species, but there is no reason to assume this, and there are reasons to deny this, insofar as rational human beings and E.T. are of a same kind, such as “moral agent.” The E.T. case shows that the “right-kind-as-set-by-species-premise” is false, but perhaps Cohen would agree with that, since E.T. is a rational moral agent. To try to show that the “right kind” premise is false, and/or argue that it is false that all human beings are of the “right kind” and not animals are of the “right kind,” we must think more even more deeply about kinds and what reasons might be given in favor of the “right kind” premise and the premises that humans are, and animals are not, the right kind.
The final relevant discussion from Regan, at least that I could find, is from his 1999 “Putting People in Their Place,” in his Defending Animal Rights. Although he does not directly address “kind” arguments, he discusses a view that “persons,” i.e., rational and autonomous beings, have rights because they are rational and autonomous, and only persons have rights. This view, of course, has dim moral implications for animals as well as human beings who are not persons according to this definition, e.g., babies and severely mentally challenged individuals.
Advocates of this view sometimes respond by claiming that these human beings have rights because of their potential to be rational and autonomous, or because (concerning many babies) they will become rational and autonomous. This is very close to saying that they are of the “right kind,” since, as we saw above in Regan’s interpretation of Cohen, Regan explains how non-rational human beings might be said to be of the kind “moral agent” by referencing their potential for agency and, in many cases, their future agency.
Regan has two responses to the view that human non-persons have rights in virtue of their potential or their actual future rationality. His second response (which does not address “kind”-related claims) is to observe that some severely disabled human beings will not become rational, autonomous moral agents and even lack the potential to do so: a doctor might truthfully say of a severely disabled baby that he or she will never become rational, lacks the potential for rationality, cannot become rational, that rationality is not a possibility and so on. If actual, potential or future rationality is needed for rights, then these human beings lack rights. Regan responds, however, that children like these, insofar as they can be the “subject of a life that fares well or ill for them,” have basic moral rights. He concludes that potential or future rationality is not logically necessary for having rights.
Regan’s initial objection to the view that potential or future rationality is sufficient for rights, however, is more interesting. He observes that this premise, as well as a broader “kind” premise that might encompass human beings who are subjects of lives but lack the potential for moral agency (the subject of Regan’s previous objection), seems to imply that human embryos and fetuses have moral rights. As biologically human organisms or beings, they have the potential to be moral agents, many of them will become moral agents, and it seems to make sense to say that they are the “kind” of being that is a moral agent: we might say a human embryo is that “kind” of being, but a squirrel embryo is not. If having this potential, or being of this “kind,” is sufficient for having moral rights, then embryos and fetuses would seem to have rights, and embryo research and abortion would seem to be prima facie wrong. Although there are complicating factors, the same could perhaps be argued about human euthanasia or physician assisted suicide, even if voluntary or non-voluntary (i.e., not involuntary), since the dying person is the “kind” of being who is a moral agent and so has rights.
Regan’s response here is to observe that many, perhaps most, people who try to grant non-rational human beings rights by appealing to their potential and/or “kind” “characteristically wish to disassociate themselves from the view that routinely permitting elective abortion is wrong.” So, Regan observes an inconsistency: people who argue that individual beings who are the “kind” of beings who are moral agents have moral rights often don’t realize that fetuses are this “kind” of being also, and these people often believe that fetuses do not have rights. “Kind” arguments are often developed in the contexts of trying to evade the pro-animal implications of a moral hypothesis like Regan’s “subject of a life” theory of rights. But the “kind” premise, often developed to avoid the conclusion that animals have rights, seems to have the implication that abortion is wrong, which many advocates of the “kind” premise don’t believe.
Regan does not reveal his views on fetal rights and the morality of abortion: he only observes that the “kind” premise seems to have implications for abortion that many of its advocates don’t accept. It is understandable that Regan would want to avoid making any claims about the morality of abortion: it’s a distraction from the animal issues and his views on abortion, whatever they may be, could be taken (rightfully or wrongfully) as evidence against his arguments about animals.
But to successfully argue that the “kind premise” is false, not merely inconsistent (or at least in possible tension) with many people’s views about abortion, Regan may have to evaluate “kind” premises in terms of their implications for other moral issues. This may require addressing abortion and some other controversial moral issues, beyond animal rights. This can be done in more and less controversial ways, however.
The more controversial way would be to argue that embryos and early fetuses, as well as near- certainly permanently comatose (or similar) individuals, lack rights. Regan could argue that the latter lack conscious experience and any realistic potential for its return, and so cannot be harmed by death, and so they lack the right to life (since the right to life is to protect against the harm of death); and embryos and fetuses have not had conscious experience yet, and so cannot be made worse off, and thus have no need for rights to protect them from death, which would not (yet) harm them. Since the “kind premise” falsely implies that these human beings, i.e., biologically human organisms, have rights, but they don’t, the premise is false. This strategy would require that Regan close the question of whether being a subject of a life (or at least conscious and sentient) is not just sufficient, but also necessary, for having rights. This strategy, of course, does require stating a conclusion on these other moral issues. For those who accept these “liberal” conclusions on these issues, however, their understanding this objection to the “kind” argument may give them reason to be more receptive to arguments for animal rights.
A less controversial strategy would be to argue either that there is no good reason to believe that the “kind premise” is true or, perhaps, to argue that it is false. This can be done, fortunately, without taking a position on the morality of abortion or euthanasia. This would be to argue that, e.g., even if abortion is wrong, the “kind” premise supplies a poor reason to believe that: it is a premise of a bad argument for the conclusion that abortion is wrong. Showing that the “kind” premise fails concerning other bioethical issues can be important to showing how it fails for moral arguments about animals.
Individuals have rights if they are the kind of being whose lives will be, have been or remain essentially moral or have the potential for that.
(2) Human non-moral agents are the same “kind” of being as human moral agents.
(3) Human non-moral agents have rights because of what “kind” they are, the same “kind” of being that the moral agents are.
(4) For every Non rational human, if N is the same “kind” of being as Moral agents, and M has the property of Agency, and property A result in Rights, then each N has R.
(5) For every Non rational human, if N is the same “kind” of being as M, and M has the property of A, and property A result in R, then each N has R.
four-limbed, bipedal, able to see, able to walk, able to tell jokes, able to do basic math, able to be responsible, able to be autonomous, (recalling Regan’s observations) have “intellectual curiosity, aesthetic preference and long-term plans about their futures,” and much else that is true of their – i.e., our – kind, including capacities for evil and criminal wrongdoing.
Many of these other truths about our kind M, however, imply other properties A and R, but non-rational human beings clearly lack A or R. For examples, even though non-rational human beings are the “kind” of being that is autonomous and self-directing, it would be wrong to let non-rational human beings make all the decisions about their own lives that we allow adults to make: they lack those rights. And although non-rational human beings are the “kind” of beings that can walk and see, and being able to walk and see results in other abilities (and some rights too), non-rational human beings who cannot walk or see lack those other abilities and rights.
In these cases, and many more, we either deem irrelevant these human beings being the same “kind” as moral agents, since it would be deeply wrong to treat them as moral agents are treated. What’s relevant to how they are treated is that they are as individuals or that they are also of another “kind,” namely something like Regan’s “subjects of lives” (we can either say that they are of the kind “subjects of lives,” or simply that they are subjects of lives: the former addition of “kind” seems to ad nothing to the explanation). If it is said that these human beings deserve respect because they are subjects of lives and they are the kind “moral agent,” it is unclear what this latter condition adds.
These examples show that, in general, being of an M kind does not always result in any related A or R properties: (5), as a generalization, then, is false. Other examples could surely be developed to confirm that being of a particular “kind” does not, in general, result in having more particular properties or capacities or even rights that result from being of that kind. This supports thinking that, at least, there is no good reason to believe (4). Accepting (4) is analogous to believing that potential persons have the rights of actual persons (because they are potential persons), even though potential doctors, judges, presidents, parents, spouses and on and on lack the rights of actual doctors, presidents, and so on. Since potential never results in rights in any other cases, there is no reason to believe it does in the case of personhood.
Since, as a matter of bold conjecture, (5) is false with any other M, A and R kinds and properties, there is no good reason believe that (4), as a more particular version of the premise, is true. It could be true, just as it could be true that potential personhood results in the rights of actual persons, but unless and until any good reasons are given to believe this (and none have been given), premises like this should not be believed: perhaps they should be even judged as false. Someone might just insist that (4) is true, but unless he or she has any good reasons to offer in support of this insistence, we shouldn’t agree.
What this all shows is that “kind arguments” for the rights of non-moral agents human beings fail at their major premise: even though all human beings, or human organisms, can be described as the “kind” of beings who or that are moral agents, there is no good reason to believe that each individual human being has the moral properties, such as moral rights, that result from being that “kind.” These arguments fail whether these biologically human beings or organisms are born or unborn, with genuine potential for moral agency or not (due to damage or an impending death). People who believe that abortion and/or euthanasia are wrong can accept this: Regan need not challenge these conclusions. However, to rationally retain these conclusions, they would need to be held on the basis of reasons other than a “kind” argument. Their seeing that “kind arguments” provide an inadequate defense for rights for vulnerable, non-moral-agent human beings can help them see that “kind arguments” provide no good reason to believe that animals lack rights.
Cohen’s “kind arguments” are influential insofar as they are version of what is often called “The Argument from Marginal Cases,” that is, most simply, the claim that since human beings with mental and emotional lives similar to many animals’ mental and emotional lives have moral rights, so do many animals.
· What “kind” of beings are human beings who are rational moral agents?
· What “kind” of beings are human beings who are not rational or moral agents?
· What “kind” of beings are non-human animals?
· What exactly is a “kind”?
· How many “kinds” are each individuals?
· Are humans and animals of different “kinds”?
· Are rational humans and non-rational humans of some different “kinds”?
· Are different animals of some of the same, and some different, “kinds”?
· Are humans and animals some of the same “kinds”?
· What kinds are morally relevant, or most morally relevant?
· When, how, and why exactly, do individuals of one kind gain properties of other individuals who are of the same kind, yet are very different?
“You say that humans who are moral agents and humans who are not moral agents are the same “kind” of being, namely “moral agents.” Some humans are moral agents and have rights because they are moral agents. Since human beings who are not moral agents are of the same “kind,” that is, since they are of the same “kind” species, these non-moral-agent human beings have rights. Correct?
Identifying what, if anything, has gone wrong with this “kind argument” for animal rights requires careful and well-reasoned answers to the bulleted questions above. Rigorously pursuing these questions, standing on Tom Regan’s “philosophical shoulders,” so to speak, is what must be done if we are to either confirm Regan’s theory that our being “subjects of lives” is what’s most relevant to our moral kind, or to rationally refute his view, with intellectual and moral integrity. Only time will tell, but I hope, and I believe with good reason, that this paper will contribute to the former end, surely a kinder conclusion, for humans and, especially, for animals.
See, among other writings, Carl Cohen’s contribution to his and Regan’s The Animal Rights Debate (Rowman and Littlefield, 2001 and his “The Case for the Use of Animals in Biomedical Research,” New England Journal of Medicine 315: 865-870, October 2, 1986. Scott Wilson mentions Cohen in his “The Species-Norm Account of Moral Status,” Between the Species: An Electronic Journal for the Study of Philosophy and Animals, 5 (2005) but does not discuss Cohen’s arguments because, according to Wilson, Cohen “does not offer any argument for the claim that the moral status of a being depends on what is normal for her species [Wilson’s interpretation of Cohen’s relevant “kind”]; rather, he merely asserts that this is so” (p. 29, note 11).
The Animal Rights Debate, p. 277; Animal Rights, Human Wrongs, p.111.
Animal Rights, Human Wrongs, p. 110.
This is the only objection to the “kind” argument in Animal Rights, Human Wrongs. It is also found in The Animal Rights Debate.
Animal Rights, Human Wrongs, p. 111, emphasis mine; The Animal Rights Debate, pp. 277-278.
The Animal Rights Debate, pp. 278-279.
Regan’s paper was presented in 1997. This example is similar to Jeff McMahan’s “superchimp” example, developed in his much discussed 1996 article “Cognitive Disability, Misfortune and Justice,” Philosophy and Public Affairs, Vol. 25, No, 1, 3-35.
Neil Levy offers a premise like this in his “Cohen and Kinds: a Response to Nathan Nobis,” Journal of Applied Philosophy 21.2 (2004): 213-217. He suggests that species membership is the only morally relevant “kind” for rights, that is, that an individual has rights if, and only if, that individual is of the species that has, e.g., moral agency as a defining capacity. Below I argue that such a principle is false, if embryos and early, pre-conscious fetuses lack rights and some biologically alive, but non-conscious, individuals in end of life cases lack rights such as a right to life: basically, not all properties had by humans from being of a “kind” of being are had by all individual human beings.
If we, human beings, and E.T. here can be considered the same “kind,” then it seems that we, human beings, and many animals (or all animals) can be considered the same “kind” also: e.g., the kinds “subjects of lives,” or “conscious, sentient beings,” “living beings,” “things found on Earth,” “existing things,” and on and an, all of which are “natural kinds,” as opposed to arbitrary, “unnatural” groupings: e.g., things that fit in a breadbox or are light blue. I discuss the relevance of this below.
“Putting People in Their Place,” in Defending Animal Rights, p. 98.
Peter Markie claims that the relevant “potential” for these non-rational humans (who lack the medical potential to become rational moral agents) is defined by the “defining characteristics of [a species’] fully developed members” (p. 41): so, in response to the physician who truthfully claims a disabled infant has no potential for rationality, Markie apparently might think that this fact is less relevant to what should be done here than facts about what normal, developed members of the species are like. Mackie claims that these human being’s “potential” ought to be respected and so treated as if they have rights (but animals, since they lack this potential, need not be treated as if they have rights). Concerning fetuses, he denies the relevance of their potential by claiming, without argument, that only “subjects” (i.e., conscious beings) have rights (p. 45). It is highly unclear, at least to me, what reasons, if any, Markie gives for any of his views here, however: he seems to repeatedly insist that non-rational humans ought to be treated as if they had rights, but his support of this claim is not clear. See his “Respect for people and animals.” The Journal of Value Inquiry 38.1 (2004): 33-47.
Francis Beckwith develops an argument against abortion appealing to a premise like this in his Defending Life: A Moral and Legal Case Against Abortion Choice. Cambridge: Cambridge University Press, 2007. I respond in my “Abortion, Metaphysics and Morality: A Review of Francis Beckwith’s Defending Life: A Moral and Legal Case Against Abortion Choice.” Journal of Medicine and Philosophy 36.3 (2011): 261-273. Robert George and Christopher Tollefsen offer similar arguments in their Embryo: A Defense of Human Life. Random House Digital, Inc., 2008. I offer an (unpublished) critical review of that book off my webpage.
A complication results from thinking that moral rights are prima facie, or impose prima facie obligations, and are so overrideable in special cases. One could thereby maintain that embryos, fetuses and/or the permanently comatose actually have rights, e.g., the right to life, but that their rights are overridden or defeated by the circumstances and special features of the case, and so the prima facie obligation to not harm or kill is no longer in force. Alternatively, and more plausibly, one could believe that these individuals simply do not have rights: they have yet to gain the properties that result in their having rights or they have lost these properties.
In Body and Soul: Human Nature and the Crisis in Ethics (Intervarsity Press, 2000), J.P. Moreland and Scott Rae develop a position similar to what was mentioned above, as well as Beckwith’s (and Cohen’s), and apply it to euthanasia, as well as abortion and number of other issues. They argue that PVS patients, who are irreversibly unconscious, are persons with all the moral rights of persons due to their “essential nature” (p. 335). Nevertheless, they claim it can be permissible to let such persons with rights die when treatment is futile. However, they reject arguments that it’s permissible to let such patients die because they are no longer persons and/or have lost the properties that result in their having moral rights. Whether arguments like Beckwith’s, Moreland’s and Rae’s could be developed to reinforce arguments like Cohen’s, and vice versa, is a topic worthy of attention.
Thomson, Judith Jarvis. “A Defense of Abortion.” Philosophy & Public Affairs 1.1 (1971): 47-66.
I develop this view in my response to Beckwith, cited above.
For a similar premise, see an article by Matthew Liao, originally titled, “Virtually All Human Beings as Rightholders: The Species-Norm Account,” published as “The Basis of Human Moral Status,” Journal of Moral Philosophy, Volume 7, Issue 2, pages 159 – 179. Liao offers a “species-norm” theory of rights, that if something has the genetic or physical basis for moral agency (assuming there is such a thing or things), then that something has basic moral rights. Liao’s “aim is to set out this account clearly rather than to defend it” (abstract), so he does not really argue in its favor; my reply to this view is that in no other case does merely having the genetic or physical basis for doing or being Y does that result in that someone the rights of someone who really does or has Y, and so Liao’s proposal is ad hoc. For another reply, see Christopher Grau, “Moral Status, Speciesism, and Liao's Genetic Account,” Journal of Moral Philosophy 7 (2010): 387-396. For Liao’s response to Grau, see “The Genetic Account of Moral Status: A Defense,” Journal of Moral Philosophy 9(2) 2012: 265-277.
Regan, The Animal Rights Debate, pp. 278-279.
I am grateful to Dan Hooley for discussion of these issues.
Someone might insist that having rights is an “essential property” of our “kind.” In David Boonin’s A Defense of Abortion (Cambridge, 2002) he discusses what he calls “essential property arguments” in favor of fetal rights (pp. 49-55). He observes that “there are many rights that we believe we possess at some stages in our lives and not at others” (p. 55) and so merely being of the same “kind” is insufficient reason to believe that human beings always have some particular moral properties or they are essential to human organisms.
Daniel Dombrowski, Babies and Beasts: The Argument from Marginal Cases (University of Illinois, 1997).
Arguments in this section are related to earlier arguments I developed in my “Carl Cohen's ‘Kind’ Arguments For Animal Rights and Against Human Rights,” Journal of Applied Philosophy, vol. 21, no. 1, pp. 43-59, 2004. Further discussion will be found in my “Coulda, Woulda, Shoulda: Modal Moral Arguments,” with Devon Belcher, in progress. | 2019-04-25T02:02:43Z | https://www.nathannobis.com/2017/03/carl-cohens-kindarguments-for-animal.html |
The eleventh book of The No. 1 Ladies' Detective Agency confronts Mma Precious Ramotswe with three variations on the theme of an unhappy woman. One is a lady who wants proof that her husband is cheating on her, even though he isn't. Another is the domineering aunt of Mr. Phuti Radiphuti, fiance of assistant detective Mma Grace Makutsi, who refuses to let Mma Makutsi see him while he recovers from an accident that cost him part of one leg. Then there is Mma Makutsi's nemesis, Violet Sepotho, whose latest scheme may cost a well-meaning man his house, unless Mma Ramotswe can come up with a legal way around an iron-clad contract.
While the solution to one of these problems depends on the pushiness of orphan-farm matron Mma Sylvia Potokwane, it is the soft-hearted kindness of Mma Ramotswe that prevails in most circumstances. Mma Makutsi has an opportunity to appreciate the amazing gentleness of that lady as she sympathizes with the nastiest people, simply because they are unhappy.
The biggest case for the agency, however, is a matter of a very happy woman - an American lady who has recently become late, to borrow a whimsical phrase familiar from the earlier books in this Botswana-based series. Author McCall Smith, himself a native of Africa, finally gets around to explaining why this euphemism for death is used: it has a way of making one feel still connected to people who have passed away. The late American lady felt connected to a tour guide on an African safari, and now the executor of his will wants Mma Ramotswe's help finding that guide, so he can receive a gift of $3,000.
Mma Ramotswe's kindness makes her the right person for this happy mission, though it means a long and perilous journey into a remote part of Botswana, accompanied by her trusty assistant. Mma Makutsi, who often hears her shoes talking to her, was glad to come along on her first-ever business trip because it involved the purchase of a new pair of boots; but the chances of meeting a lion, or a panther, or a crocodile, or a hippo, leave her scared stiff while the boss tries to work out which tour guide deserves to inherit $3,000. Recognizing a good man proves to be easier than determining which one is the right man - but kindness, as always, finds a way.
The series continues to make me happy with its gentle wit, its descriptive exploration of previously unvisited scenery, and its unmocking portrayal of lovable characters who enjoy a somewhat simpler and more graceful life in this age of hurry and rudeness. There is an innocence about them that makes one feel protective of them, even though they have already borne experiences many of us are spared. It is a good series to read if you want to see a bigger world and to feel the concerns you live with are small indeed. Next in the sequence is The Saturday Big Tent Wedding Party.
The fourth book in the Isabel Dalhousie series finds the 40-something Edinburgh-based philosopher bringing up a bonnie baby named Charlie, struggling to patch up her relationship with niece Cat after getting romantically involved with Cat's ex-boyfriend Jamie, responding to a palace coup on the editorial board of the Journal of Applied Ethics, and solving a mystery involving something a bit off about some art works by a deceased Scottish painter that recently went on sale.
More than some of the previous books in this series (sometimes described as "novels" rather than "mysteries"), this book really has a mystery in it, one with an unusually satisfying payoff for a mystery author who has trained his fans to accept and appreciate something other than a conventional whodunit. It also has some instances of Isabel behaving in ways that make one uncomfortable - not altogether admirable, heroine-type behavior, this go-round. She admits at the end, for example, that she turns out to have done the right thing - but until she saw the outcome, she wasn't sure it was so. The incidents in this book play up the conflict for Isabel between serving her interest and doing what is right, between her moral duty to help and a tendency to interfere. And sometimes her judgment isn't quite sound. The book leaves a lingering sense of ambiguity about how well its issues are settled.
Amid the squirming and wrestling with ethical puzzles, which one ought to expect in a book about a moral philosopher, there are pages of beautiful description of parts of Scotland the series hasn't visited before. These include the Isle of Jura, right up to the remote house where George Orwell wrote Nineteen Eighty-Four, and a remote part of Perthshire too. The reader gazes through the lens of McCall Smith's compressed lyricism at one of the most dangerous stretches of water around the British Isles, and into the home lives of families that harbor secrets, guilt, and grudges. His prose opens a portal onto peaceful country scenes with mountain and ocean views and freshly scented air abuzz with insects, as well as the snug atmosphere of high-culture Edinburgh, a haunt of painters, writers, lawyers, and musicians; people who have housekeepers and private chefs, or who drop in on a delicatessen for focaccia with olives.
I suspect visiting this book's Scotland might be a journey of the imagination even for some people living in Scotland. But it is very soothing to the senses after a long day of ordinary work in an ordinary, small American town. It is like a touch of a rare herb giving a special savor to a mundane dish. In its low-key, rarely exciting way it both stimulates and relaxes, rewards the imagination and provides cultural and ethical food for thought. Next in the series is The Comforts of a Muddy Saturday, a.k.a. The Comfort of Saturdays.
The full title of this number is "Joshua Hymn: For a Devout Heart." The tune I had in mind for it is O GOTT, DU FROMMER GOTT from Braunschweig, 1648. This particular "heroes of the faith"-type hymn is mainly drawn from one place in the Book of Joshua, his speech to the children of Israel in Joshua 24. I thought it was due for a little rescuing from the "Choose whom you will serve!" type of ditty that calls on the listener to make a decision for Christ. I can't help noticing, reading the text, that the only "choice" Joshua offers the children of Israel is to follow the false gods of Babylon and Canaan. In contrast to that, he actually tells them, "You cannot serve the Lord!"
To us has been extended!
All good thereby we get.
Made safe from sin and hell.
True God and our own choice.
In the third of what are now ten or eleven "Isabel Dalhousie novels," the Edinburgh-based editor of The Journal of Applied Ethics, takes an interest in an engaged couple from Texas visiting Scotland over the summer. She suspects Angie is after Tom's money first, and after Jamie, Isabel's good-looking young male friend, second; she is surprised to learn, later on, that Tom is attracted to her, Isabel. But after once again tottering on the line between performing her moral duty to a neighbor and nosing into other people's business, she must wonder whether her hasty judgment was part cause of a near-tragedy.
Meanwhile, Isabel's search for a flat to buy for her housekeeper Grace leads to a misunderstanding about her relationship to Jamie - the scorned ex-boyfriend of her niece Cat, on whom Isabel has long had a crush of her own. But their friendship suddenly flowers into a romance that she has long desired. She spends a lot of time worrying about how people will perceive their affair, since she is the older by 14 years; but everyone seems okay with it except, with surprising vehemence, Cat.
This installment has a lot of interesting developments for the series' recurring characters, including one at the end that comes as a real surprise. But the chief source of pleasure in reading it is to be around Isabel, with her quirky trains of thought, her meditations on proper behavior, her eye for the beauties of Scottish scenery, her ear for good Scottish poetry, her memory of the sordid details of Scottish history, and her nose for trouble. She feels a kinship toward the fox in her garden; she has a fondness for the shy young man who works in Cat's delicatessen; she has an old heartache in her past, and a new appreciation of her "sainted American mother's" flawed humanity; and she has, at last, the ability to overcome her cautious streak and do something spontaneous.
McCall Smith, also the author of The No. 1 Ladies' Detective Agency series and numerous other books, jams a lot of Scotland into this one book, and each book in this series. It goes on in The Careful Use of Compliments.
I mentioned in my review of David Almond's excellent book Kit's Wilderness that the silver Michael L. Printz Honor Book medal is probably a better sale driver than the gold Printz Award itself, since I for one love many runners-up for that young adult fiction award, but almost never touch the winners. Well, this book, Skellig, is one of those lucky runners-up, and that silver medal is proudly embossed on its cover, at least in its American editions. But perhaps more importantly, it went for the gold in the Carnegie Medal race of 1998 - that's the highest award for children's literature in the U.K. Even more notably, it was named among the "70th Anniversary Top Ten" of that award in 2007. So it stands in some very classy company. Maybe they left that bit off the American covers just because the Printz Award is American. But I find it neat to think of this book in the company of Mary Norton's The Borrowers, Philippa Pearce's Tom's Midnight Garden, and Philip Pullman's Northern Lights (American Title: The Golden Compass).
Folks familiar with Kit's Wilderness may notice some shared themes between these two books, such as the image of a baby sister being held close to a teenaged brother's heart, and a preoccupation with aspects of the theory of evolution. Both books are examples of the young-adult strain of magical realism: stories that combine real-world settings and characters with strange phenomena, such as ghosts, fictional characters appearing in reality, and psychic communication.
In this book, a middle-school student named Michael is having trouble dealing with his family's move into a fixer-upper house in a strange new neighborhood, where he is now a bus ride away from his school and his football (soccer) friends; at the same time, his baby sister's serious illness puts a strain on the whole family. In a rebellious mood, he ignores his parents' warning to stay out of the rickety garage, which could collapse any moment. There, behind an abandoned chest of drawers, he discovers an extraordinary creature who eventually (Page 87 in my edition) admits that his name is Skellig.
Who or what Skellig is, Michael and Mina, the home-schooled girl down the street, can only guess. They only know they must keep him secret. They must move him to a safer place. And they must try to help him get better. Skellig seems to have given up on life, slouching in the darkness, eating spiders and mice, while suffering arthritis pain and general weakness. He's a funny fellow, though. He coughs up pellets of compacted fur and bone after eating small creatures, rather like the digestive byproducts of an owl. He is lighter than he looks, perhaps due to having hollow bones. Also, he has beautiful, white, feathery wings.
He could, Michael realizes, be the very thing his unnamed baby sister needs as she faces a critical heart operation. And she could be just what Skellig needs too.
Rich in emotion, full of family love, laced with quotations from William Blake and meaningful glances from a blackbird and a cat named Whisper, scented with the aroma of Chinese takeaway, and decorated with the art works of a couple of surprisingly talented kids - one of whom is also a killer footballer - this book deserves every carat of its Carnegie gold and may, if I may be excused for supposing it, have been robbed of the first-ever Printz award. It's a novel in which the unchallenged acceptance of the theory of evolution exists side-by-side with an equally unapologetic belief in angels. It is full of unexplained strangeness, touches of impulsive fun, interesting side characters, and a lean, sinewy grace that drives the dramatic momentum. It doesn't end a word late, and arrives at the finish line with plenty of the reader's attention to spare. And it now has a prequel, titled My Name Is Mina.
With this book, British author David Almond won the second-ever Michael L. Printz Award in 2001 from the Young Adult Library Services Association in the U.S., a year after being a runner-up for the same award with Skellig. Both books have been on my shelf of "award-winning fiction for young readers" for several years, like airplanes circling over O'Hare Airport, waiting for clearance to land. Their chance finally came during a weekend of sickness when I had nothing to do but lie on my back and wait for the next dose of medicine. I was happy to discover that this book wasn't about a lone boy's struggle to survive in a desolate wilderness, a type of story that I can only bear to read so often.
And in spite of being a title on the winners' list of an award whose other winners hold no interest for me, I realized quickly that I had fallen into the grip of a great story - the kind that is usually robbed of glory when the boring book awards are announced. For example, while this is my first time reading a Printz award winner, several of my favorite books are among its honorable mentions, including The Ropemaker by the late and lamented Peter Dickinson, The House of the Scorpion by Nancy Farmer, Airborn by Kenneth Oppel, I Am the Messenger and The Book Thief by Markus Zusak, The Pox Party by M.T. Anderson, and The Monstrumologist by Rick Yancey. I hate to hand it to the YALSA, but their silver "honor" medal is probably more of a selling point than their gold "award" one. This book may help sweeten my expectations of those top award winners.
So, Kit's Wilderness is very good for an award-winning book, and it's also not about a kid eating berries in the woods. Actually there is a subplot about a kid scratching a meager living out of the ground, sort of a story-within-a-story, but by the time that starts up, you're already hooked on a teen-friendly example of the up-and-coming genre known as magical realism. In adult fiction terms, that's the school of literature pioneered by Gabriel "Love in the Time of Cholera" García Márquez. In kid terms, it's a story set in a convincingly real English town, full of convincingly real characters (kids as well as grown-ups) with convincingly real problems; yet without taking away any of that, it's all shot through with paranormal weirdness and, well, magic.
Kit Watson, aged 13, is the new boy in Stoneygate, but his family goes way back in the town's history. Another Kit Watson, aged 13, died in a coal mine disaster about a hundred years ago, and present-day Kit's newly widowed grandpa still tells stories about working in those mines. Another present-day kid whose namesake, also aged 13, is listed on the mine disaster memorial is John Askew, a burly, surly type who has some pretty dark ideas. Imagine a loner who goes everywhere with a vicious dog at his heels, who gathers a clique of misfits around him to play a disturbing game called Death. Kit gets pulled into it, partly by a fascination with the repellant yet magnetic Askew, partly to chase a cute girl named Allie. But things get out of control for young Askew and he ends up first expelled from school, then running away.
Kit, meanwhile, is increasingly distracted by visions of ghostly children, spirits of those buried deep in the coal tunnels. Besides this, he has to deal with his grandpa's decline into dementia, and a story he is writing for school that becomes so real to him, its characters spill out into reality. The weirdness builds with an urgency of purpose, until it seems the only way to save John, Grandpa, and an ice-age hero named Lek is to save them all at once. And for Kit, that means descending into a terrifying, ancient darkness.
This is a very strange book. It is a strangely wonderful book. It is a wonderfully dark book. It is a darkly beautiful book. It is in that rare and treasured category of books that made me laugh and sob, repeatedly. It is a book whose layered complexity could have come across as tortured and artificial, but that instead manages to convey a powerful natural unity through images, phrases, and ideas that cycle round and round, building up to cyclone force. It is such a strong book that I actually took a break from reading it to ransack my book collection until I made sure I also had Skellig - which I then read the same evening. And I now want to read more by David Almond, whose titles include The Boy Who Climbed into the Moon and The Boy Who Swam with Piranhas.
These stories happened to me last week. My mother would love them.
You know you're going to have a nasty experience when the plumber's advice over the phone begins, "First, put down some towels." On the occasion of a persistently blocked toilet a few nights ago, my local plumber went on to say, "Then ride that plunger like it's a pogo-stick."
As he predicted, the contents of the toilet went everywhere. I mean everywhere. Poop, toilet paper, water, and mostly an indistinguishable melange of the three - everywhere. I didn't put down enough towels. I could not have.
It was a hideous experience. The cleanup took ages. I ended up throwing out the shirt I was wearing and about six of my older bath towels, including the two that have been serving as beds for my cats, after mopping up the gross stuff with them. Then I mopped the floor with Pine Sol. Then I Swiffer Wet mopped it. Then I Swiffer Dry mopped it. I also showered and changed clothes.
Somewhere in this horror, the truly crowning calamity happened. The bath rug, that I had first rolled out of the way during the early stages of my plumbing ordeal and later draped over the side of the tub, had to be transferred to the shower curtain rod to keep it out of the way - and as I did so, something dripped out of it and hit me in the face. In my open mouth and eyes, to boot.
I have no idea what that liquid was. I hope it was just water that splashed out of the mop bucket when I filled it in the tub. Luckily, I'm on antibiotics now (for an unrelated condition).
I've been sick for an entire week now. I came down with symptoms last Saturday night. Church was canceled Sunday due to icy road conditions, so I stayed in bed through most of the day. I had a demanding work week, never making it home earlier than 8:30 p.m. between Monday and Wednesday and an hour later than that at least one night. I wasn't getting well.
In fact, I had a couple really rough nights when, for a while at least, the effort of breathing became so great that I thought I might have pneumonia. I packed my overnight bag one night and was going to the office to use the internet to help me decide which hospital to go to, but the cold air made me feel a little better, so I decided to go to Walmart instead and buy some over-the-counter stuff. You know: Theraflu, Vaporub, that kind of thing.
The Versailles Walmart looked dark and abandoned. I didn't think it was open, so I drove to the somewhat larger village of Eldon, a good 18 miles away - only to learn that its Walmart was definitely closed at that time of night. I tried a convenience store on the way home, but they didn't have what I wanted either. I ended up going home with nothing to show for my trip but a full tank of gas.
I felt really stupid the next day when my boss told me the Versailles Walmart is open 24 hours a day.
I took Thursday off to lie in bed and try to heal - with Theraflu, Vaporub, and the rest this time - but I was still ill on Friday. So my boss and co-workers ganged up on me and sent me to the doctor.
Now, I've never visited a doctor since I moved out to these parts. I had to choose a primary care physician when I signed up for health insurance, but I had never visited her. When I called her office Friday, her receptionist said she was too busy to see new patients. So I had to go to Urgent Care in Eldon.
The doc there tested me for the flu, but the test was negative. She saw some redness in my mouth, though, and heard some congestion in my lungs. So she decided I have bronchitis - it's always bronchitis! - and sent a script for an inhaler (albuterol), a steroid (prednisone), and an antibiotic (azithromicin) to the Walmart pharmacy in Versailles.
When I got there, the pharmacist who helped me noted my insurance wouldn't cover the inhaler I was prescribed. She then said something about how "the one that your insurance does cover, we don't have in stock," before adding that the steroid would be no problem. In a classic case of miscommunication, I thought she was telling me the antibiotic wasn't in stock, so all I would be able to get was the steroid - and that was the one I cared least about. So I said forget it, and went back to work empty-handed.
My co-workers prevailed on me to have the Urgent Care clinic send my antibiotic script to a different pharmacy, where I picked it up and started at least that course of meds. After work I went to Walmart a second time, just to see how much it would cost me to get the other two drugs - but the inhaler was going to cost me $60 out of pocket, so I decided again not to bother.
Then came that time of night when breathing became so difficult that I wasn't sure I was going to survive without the meds the doctor ordered for me. So I went to Walmart a third time and told them I was going for it. This time a different pharmacist dealt with me, and she cleared up the miscommunication that happened earlier. What the other girl meant by that remark about "the one that your insurance does cover," was that an alternate brand of inhaler existed that my insurance would have paid for - but it was on factory back-order. The pharmacist I spoke to later told me it was too late to call the insurance company now, but if they did call to tell them they had this brand of inhaler, the company would cover it; but since they didn't have it, the company would probably say, "Our database shows they have this inhaler in stock in Oshkosh. You should drive there to pick it up." Oshkosh, by the way, is more than 500 miles away.
I told the pharmacist, "It's as if they think breathing is an elective procedure." She laughed. I would have joined her, but at that point I was so out of breath that I had to lean against the counter to stay upright. I was actually light-headed.
So I took that $60 inhaler home (along with a steroid that, I kid you not, cost me $2 and change), pulled it out of the package and gave it a shake. And because no Robbie story is complete without a final twist, the bottle containing this life-saving, $60-out-of-pocket drug flew out of the dispenser and landed on the floor.
Don't look at me like that. I've never done an inhaler before. It was my first time, and I didn't know how to hold it. It took me several light-headed minutes to figure out how to put the bottle back in the holder, remove the lid over the mouthpiece, and give myself the first dose of what I can already tell is worth every penny. I'm so glad that bottle didn't break!
This is the sad story of a couple of troubled New York City high school sophomores who befriend a lonely old man and end up feeling responsible for his death. To say they "befriended" him may seem a bit of a stretch, since it starts as a telephone prank and develops into a small-time scam. But as their home lives become increasingly unhealthy, they find themselves really enjoying their time with Mr. Pignati, affectionately known as the Pigman. He awakens a spark of compassion in them, and though they never quite get over trying to take advantage of him, their bad motives are soon mixed with care and concern.
John and Lorraine, the hero teens, push their fun with Mr. Pignati a little too far, and he has a heart attack. While they're waiting for him to come home, they decide to throw a party at his house that ends with predictably painful results. The tragic end of their friendship with the Pigman leaves the kids thinking dark thoughts about the meaning of life.
Told by John and Lorraine in alternating chapters, the story pulls no punches about the kids' crummy home lives, the dangerous company they keep, their character flaws, and the sudden opening of a romantic possibility between them. At times cruelly sad, often hilarious, this book's strong point is its convincing depiction of the characters' unique personalities. They come to life on the page, and live on in your heart.
This 1968 teen novel was the first of many by a prolific pioneer in fiction aimed at high-school-age readers, who also happened to be a Pulitzer-Prize-winning playright (for The Effect of Gamma Rays on Man-in-the-Moon Marigolds). Zinman, who lived 1936-2003, also wrote novels and plays with such titles as Attack of the Killer Fishfingers; The 100% Laugh Riot; Pardon Me, You're Stepping on My Eyeball; The Undertaker's Gone Bananas; Harry and Hortense at Hormone High; The Amazing and Death-Defying Diary of Eugene Dingman; A Begonia for Miss Applebaum; And Miss Reardon Drinks a Little; and Every Seventeen Minutes the Crowd Goes Crazy! There was also a sequel to this book, The Pigman's Legacy.
These are only a few of his works, many of which explore serious issues about the challenges of growing up - besides such thrill-driven creature features as Loch, Reef of Death and Raptor. Plus, close to the end of his life, Zinman also wrote the twelve-book P.C. Hawke series about a couple of teenage sleuths, including The Gourmet Zombie and The Houdini Whodunit. I think anyone wanting to make a serious study of young adult fiction will be interested in Zinman's body of work.
Book 10 of 16 of The No. 1 Ladies' Detective Agency casts Mma Precious Ramotswe, Botswana's only private eye, in the unaccustomed role of a football (or soccer) detective. A certain Mr. Molofololo (accent on the "o"), owner of the Kalahari Swoopers, insists there must be a traitor on his team, causing it to lose games that it should win. Mma Ramotswe and her prickly associate Mma Makutsi get to work, interviewing the players and exposing jealous rivalries, suspicious debts, possible vision problems, and other motives making every member of the team almost equally likely to be the traitor. But of course, the solution comes out of the mouth of Mma Ramotswe's foster son Puso, who is wild about the game.
Meanwhile, Mma Makutsi is worried about losing her fiance, Mr. Phuti Radiphuti, to the seductive charms of her arch-rival from the Botswana Secretarial College. Violet Sepotho, already a confirmed husband-stealer, takes a job at Phuti's furniture store and shows a surprising talent for selling beds. While Mma Makutsi writhes in anxiety, the agency gets a visit from another Mma Sepotho - who, surprisingly, is unrelated - asking for help with her own dilemma: She has two husbands, who are unaware of her two-timing. Now the weekday husband wants to invite the weekend husband over for dinner - and she is supposed to serve as hostess while also appearing as the guest's wife.
Solutions to Mma Ramotswe's cases are often anticlimactic and down-to-earth. She is devoted to a manual of private detection by a certain Clovis Andersen, and usually thinks he is never wrong; but at times, she figures out ways of doing things that she knows Clovis Andersen would not approve. She understands how to get valuable information out of children. She has learned the best way to find out about something is to ask a direct question. And she applies the attitude every day that what her career is about is helping people. This makes her series of adventures an unusually gentle, compassionate saga of low-key mysteries, enlivened by whimsical incidents like the foiling of Violet Sepotho's plan, and held together by minor plot arcs like Mma Ramotswe's touching quest to reunite with her faithful, old, tiny white van. The next book in the series is The Double Comfort Safari Club.
This longish hymn was about the only productive thing I did yesterday, when I was taking a sick day off work. The full title is "Moses Hymn: Strength in Weakness." Not all the frailty depicted in this hymn is that of Moses, but it is still a rather odd example of the "heroes of the faith" type of hymn, focusing as it does on failure and weakness. The point, of course, is to glorify God. The tune, VOM HIMMEL KAM DER ENGEL SCHAR, dates from Gotha, 1715.
Your captive people freed at length.
You made him God in Pharaoh’s eyes.
Their freedom was of You alone.
They once again Your name forgot.
Behold, how weakness pairs with pow’r!
They made and praised a calf of gold.
Their grumbling tried his patience frail.
Still less of fear before Your might.
Yet Jacob’s sons resisted You.
You brought them to the promised land.
Preserved a line that never failed.
But gazed on it and died content?
To what pollutes our deeds and hearts?
Twixt trusty cup and fickle lip?
And lived to speak Your word of grace?
For every sinner to atone?
But he whose arm on Aaron leans?
And of the wonders You have done?
Help us Your worthy praise prolong!
This past weekend I was miserably ill. I pretty much spent every hour that I could spare from necessary errands in bed. Nevertheless, I got up long enough to write the following two hymns, bringing me still closer to my target of 200 "useful hymns."
This "heroes of the faith" hymn only hits a few highlights of the career of the father of all the Hebrews, handed down in the book of Genesis. It is really focused on one key point: justification by faith. The tune is the 16th-century German chorale DURCH ADAMS FALL.
When Your strong purpose claimed him!
Was yet in faith persisting.
Your strength, in mercy rooted!
Again, the focus of this "hero of the faith" hymn is only one of many stories Genesis tells us about Jacob, also known as Israel. It is precisely this story that I hope will make Jacob a useful example for today's Christians. It goes to the tune ACH WIE NICHTIG, sourced to Gotha, 1715; though I'm afraid the structure of the tune doesn't quite gel with the rhyme scheme of the text. Oh, well!
Till dawn’s rays the sky were dappling.
Till he had from You a blessing.
Lay on us Your mark of blessing!
Give us faith to grasp our Savior!
Hear our troubled, anxious prayer!
Taste Your blood, our sins forgiving!
With the saved in mighty number!
His Word to John while he on Patmos stood.
Whose visage shone; His voice like waters roared.
His word to men. “Write this for Me,” He bade.
I know your patient zeal for what is right.
Therefore repent; return to your first love!
That stands amid God’s Paradise above!
They who despise your woes, blaspheme indeed.
For some of you will stand the devil’s test.
With those the second death can never harm!
You kept My faith before the throne of hell.
Your name engraved in diamond, hard and pure!
Your works and service I cannot ignore.
Repent, before I punish her abuse!
Endure, and I will send the morning star!
Who walk with me, unsoiled in their belief.
Shore up that which remains! Repent and fast!
Remember what you heard of me at last!
Watch, lest I come upon you as a thief!
Behold, a door that none can close to you!
For faithfully your trial you withstood.
Hold fast, that none may take away your crown!
Anoint your eyes with salve, that you may see!
Behold, I knock; bar not the door to Me!
Help us endure in hope this hour of pain!
That we may suffer all, a crown to gain!
With Book 9 of The No. 1 Ladies' Detective Agency, I have just crossed the center line of what is currently a 16-book series featuring Botswana's only lady detective, her bespectacled assistant, her mechanic husband, and the rest of a cast of endearingly flawed recurring characters.
The agency's main case at the time of this installment is a search for a woman's family. She only learned at her mother's deathbed that she was adopted as a small child. She has no surviving family on her adoptive parents' side, and she doesn't know who her people are on her biological parents' side. Being without any relatives of any kind is strange in Botswana, where everyone seems to be related to everyone else in some degree. The lonely client asks Mma Precious Ramotswe to find her a family, but what Mma Ramotswe finds is not what they planned.
Meantime, her husband, the kindly Mr. J.L.B. Matekoni, takes their foster-daughter, sweet-tempered but wheelchair-bound Motholeli, to Johannesburg in search of a miracle cure. Although Mma Ramotswe disapproves of this quest and the cruel hope it represents, she finds herself joining it in a moving, personal way.
As the rainy season closes in, Mma Ramotswe's assistant, Mma Grace Makutsi, makes a foolish mistake with the expensive bed her fiance bought her, and is tempted to let a lie come between them. And then there's the matter of a series of anonymous, threatening letters, almost leading Mma Ramotswe to do something terrible. The solution to this mystery, at least, relies on Mma Ramotswe's secret weapon: kindness - though it comes only after a rambunctiously silly chase scene through the aisles of a grocery store.
By now, part of the appeal of this series lies in the comforting sense of being in familiar surroundings. Yet at the same time, it teaches western readers to appreciate distinctive aspects of a culture very different from ours - one in which owning cattle is the ultimate security, in which calling "Ko, Ko" is an essential point of courtesy before entering a home or an office, and in which a certain disease casts an ever-present shadow, though it seems to be considered indelicate to call it by its name. I can call Book 10 by name, however, because I am already reading it: Tea Time for the Traditionally Built.
If you haven't read The Iron Trial, the first book in the Magisterium series, beware of spoilers ahead. Don't worry, I'll talk amongst myself while you click away.
So, this is Book 2 of a five-book series featuring a school of magic different in many ways from Harry Potter's Hogwarts. For one thing, the Magisterium is in the U.S. Instead of in a castle, it is located underground. Its magic draws on control of the five elements: earth, air, fire, water, and chaos, which comes from the void out of which all things were made; and to some extent, this means the control of elementals, strange creatures that will consume any mage who gets too close to them. It boasts the authors of City of Bones and Tithe, so there is no surprise that it has a bold streak of darkness running through it.
Coast clear? All right, here's the spoiler for those who skipped past Book 1. The main character, Callum Hunt, is also a bit like Harry Potter. He grew up in a home that was opposed to magic, but that didn't stop him from getting into a school of magic. And while he was an infant - practically at the moment of his birth, in fact - a deadly attack by an evil magician left a permanent mark on him. His mother died in the attack... but here the resemblance ends. For she died not trying to save him, but using the last of her strength to scratch a message into the floor of an ice cave warning his late-to-arrive father: "Kill the child."
Call has grown up maimed, with one leg shorter and weaker than the other, because of his dying mother's feeble attempt to do him in. The reason for this unnatural behavior? Like Voldemort, the Enemy of Death - a wizard who did horrible things in search of a way to escape death - transferred a bit of his soul to the boy who lived. No, that isn't right. Actually, he transferred his soul, period. In his first year at the Magisterium, Call learned that he actually is the Enemy of Death, also known as Constantine Madden. The soul that truly belonged to little baby Call was pushed out to make way for Constantine's evil soul.
Even though he doesn't remember being anybody but Alistair Hunt's mischievous, slightly crippled son, Call now knows he is the very dark lord who taught his father to hate magic. And now, during his first summer home from school, the 13-year-old realizes Alistair has suspected this all along. When he finds evidence that his dad is planning a dark ritual that could kill him, Call runs away with his chaos-ridden wolf Havoc.
He runs away to spend the rest of the summer with his friends, Tamara and Aaron; but he can't bring himself to share his dark secret even with them. He finally has a best friend, and Aaron turns out to be the Makar - the chaos mage everyone has been waiting for, their best hope against the Enemy of Death, who is expected to break his 12-year truce with the mage Assembly at any time and resume his fiendish war. How can Call explain to Aaron that he, Call, is the Enemy himself?
Keeping this awful secret becomes even more of a dance when someone steals the Alkahest, a rare magical artifact that, in the Enemy's hands, could spell the doom of the Makar. Being the Enemy, Call knows he will never use it against Aaron. But nobody else knows that. So how else can he explain that he thinks his dad stole the Alkahest? And how can he and his friends stop his dad from giving it to the bad guys - because there still are bad guys, you know? Not only do the trio of Aaron, Call, and Tamara have to run away from school, but they must take with them their most obnoxious classmate to keep him from telling on them. Meanwhile, the mages from the Assembly are sending deadly elementals after them and doing everything in their power to stop the kids, while a scene of stomach-upsetting evil awaits them at the end of their quest.
So, basically, this is a Harry Potter-type story in which the hero is painfully aware, almost from the beginning, of what an evil mark he is marked with. It is one where the kids are on the run with the intensity of Harry & Co.'s flight from the snatchers, already in Book 2 instead of in the climactic last book. It is a series where so much has already happened, two-fifths of the way in, that one trembles to imagine what could come next. It is full of a young teen's self-questioning, anxiously checking himself to see where he stands on the "Evil Overlord" spectrum. But it is also deeply, richly fun, with a curly thread of goofy humor, a brisk pace, clever dialogue, surprising twists, and scenes full of original imagery that will impress itself on the reader's imagination. I hear Book 3 will be titled The Bronze Key, when it arrives in August 2016.
I actually had a whole day off from work today, and I'm still getting used to the loneliness since my parents moved out of state and I'm in my own digs again, so although it was a beautiful day outside I spent swaths of it writing hymns. Here are the results, pushing me closer to my 200-hymn goal.
With faithful words to say!
To do their best today!
Your throne until that Day!
And so, Lord Christ, Your will be done!
Our spirit’s Rest and Stay!
For this hymn, I went back to my own tune HOLY BODY, which I wrote in 2014 for my hymn on the fifth commandment, "You shall not murder."
Two as one in loving grace.
On the bond You set in place!
May hold up his heart and arm!
Temper cool and bosom warm!
Second selves through active grace!
May new love the old erase!
Bless their conflict with release!
Let Your healing love have lease!
And we rise, one cherished kin!
For this hymn I chose the 15th-century Bohemian tune SÆLIR ERU TRÚADIR, which I associate with Hallgrimur Petursson's Icelandic Passion hymn, "And then the Savior turned," a segment on Peter's denial of Jesus from a most impressive sequence of sacred poems. It was a tough meter to work with, though!
I was tempted to call this "Terrorism Hymn," but I didn't want to seem to be promoting terrorism. I originally set this hymn to my own tune HEALING, which I wrote in 2011 to go with this hymn for an occasion of grief; but I didn't feel that it quite worked. So I asked my friend Robert Mayes to try writing an original tune for it, and he came up with this eloquently simple number, titled COURAGE. I like how its forward pulse suggests the momentum of unfolding events.
We shall not die, but live.
In dens of fear with nerve!
Hurled by the prince of hell!
Our eyes to Christ, His Son!
With all the sons of light!
Here is another hymn that I planned to submit to one my hymn-composing friends for a brand-new, original tune. I had Isaiah 53 open before me as I wrote it. The designation "despised and rejected" describes three parties in this poem: first, Christ Himself; second, the faithful; and third, those whom Christ bids His church to serve in love. And yes, I know I got the rhyme scheme flipped around in stanza 3. I consciously decided to do that, partly out of necessity and partly because I thought it might be a clever way to signify the exchange aspect of the gospel. EDIT: The first of four fellow hymn-tune composers to fulfill his commission, the Rev. Robert Mayes sent me the tune AFFLICTION for this hymn. I like it!
An arch and bitter foe!
And for that purpose sent.
We bear the world’s contempt.
This is one of those hymns from the "Heroes of the Faith" section of my hymn-book, but unlike some of the others, it doesn't recite the deeds of the biblical character. It simply uses him as an illustration of the concept of faithful youth, which should be a major theme in the church's prayer in every generation, not only because we want our kids to be saved but also because the next generation will need faithful leaders of its own. The women named in stanza 3 are Timothy's grandmother and mother, held up by Paul in 2 Timothy 1 as witnesses of the sincere faith in which Timothy, his spiritual son, was brought up from childhood. Again, although I have written a tune that will fit these lyrics, I do not want to re-use it for what would be the third time; so I am floating it among my hymn-composing brethren (and sistren) to see what original tunes they can cook up. EDIT: Here is Joeline Mayes' original tune for this hymn, titled YOUTH. Thanks, Mrs. Mayes!
And for you with tears have prayed!
Is your faith’s foundation laid!
Lean on Christ, the Word of God!
His forgiveness sets you right.
Of God’s mercies broad and deep.
Days remaining till His Day.
Only that they know the truth!
On sound words Your lambs to feed!
Here is another hymn I am farming out to my hymn-writing friends to supply it an original tune. I wrote it with one of my own tunes in mind, but I've already over-used that tune, so an infusion of fresh melody is in order. Plus, I think something is needed to lighten up the tone of the planned hymn-book a bit... but just a bit. EDIT: Composer Robert S. Potterton III furnished a lovely original tune titled DUNCANNON for this hymn. While he also took the trouble of harmonizing it, immediately on hearing it I wrote two different keyboard arrangements for it. I hope he takes that as a compliment!
To grasp by faith the kingdom not yet seen!
Yet lest our bones grow dry, lift up our eyes!
To taste that healing draft, a cheerful heart!
That it may be complete, let it be heard!
In what You bid us drink, let gladness shine!
Let us as well Your Easter triumph share!
We might with joy draw near our heav’nly home!
Shortly after his birth, Callum Hunt was the sole survivor of a massacre in a magical war. His father, arriving too late to witness the carnage, found him badly injured in an ice cave near the body of his mother, whose dying act was to scratch the words "DESTROY THE CHILD" in the ice.
From that gruesome beginning, Call grows up being taught to hate the world of magic by a father who blames magicians for the loss of his wife. When the time comes for him to take the entrance exam to the Magisterium, the underground school of magic where his parents met, Call is convinced his only option is to throw the test. But even though he tries to fail it, he gets accepted as one of three apprentices to Master Rufus, the senior mage who trained his father.
His next hope is to get thrown out of the school, but against his father's dire warnings and in spite of Rufus' tough approach to teaching, he is soon caught up in a feeling of belonging like none he has ever felt before. His fellow apprentices include Tamara, a legacy student who has a hard time living down her family's past mistakes; Aaron, an extremely powerful young mage who has never known a family of his own; Jasper, a snotty rich kid cut out of the Draco Malfoy mold; Celia, a pretty girl who seems attracted to bad boys; and Drew, who seems slow to accept the fact that the Magisterium isn't a pony school.
Call is a fun main character, full of mischief and prone to hilarious pratfalls. When he isn't making trouble, he shows promise of being an important wizard in the fight against evil someday. But then again, somebody at the school is up to no good, and just when a new champion is revealed in the war against the enemy who massacred Call's mother - an enemy who believed to be biding his time during the long years of a truce, gathering forces for another attack - Call learns a terrible truth about his own truth in all this, a truth that may affect which side of the line between good and evil he comes down on.
By this time, readers will care enough about Call and his friends to be on pins and needles as the five-book Magisterium series moves on to Book 2, The Copper Gauntlet. This series is a collaboration between two New England based teen fantasy authors - one known for the Spiderwick Chronicles and such Modern Faerie Tales as Tithe, the other for the Mortal Instruments and Infernal Devices series. If the series lives up to the promise shown by this book, it may be their biggest success. | 2019-04-20T17:12:42Z | http://afortmadeofbooks.blogspot.com/2016/02/ |
The current situation has been brewing thanks to commission on the part of the North Korean authorities and omission on the part of the regional powers, which have left unchecked what is now an imminent risk factor for regional security: that of a military confrontation in which conventional and nuclear arms may be used.
It is thought that Pyongyang started to develop a clandestine nuclear arms programme at the start of the 1980s, which it later accelerated at three moments of particular insecurity for the North Korean regime: the collapse of the Soviet Union in 1991, its inclusion in the so-called ‘axis of evil’ by George W. Bush in 2002 and Kim Jong-un’s ascent to power following the death of his father. In the first two cases, international diplomatic efforts were made in both the 1994 Agreed Framework and the Six-party Talks (2003-09) that failed in their attempt to persuade North Korea to abandon its nuclear programme in exchange for economic aid and security guarantees. Since 2011 the North Korean regime has sped up its programmes aimed at crossing the nuclear threshold (see Table 1) and reformed its constitution to institutionalise its nuclear programme and strengthen the legitimacy of Kim Jong-un’s leadership. The initial goal of de-nuclearising the Korean Peninsula is therefore no longer viable and those who were seeking to avoid it will now have to choose between military steps that disrupt or terminate the programmes already underway (counter-proliferation) or diplomatic steps that seek some form of accommodation with the new nuclear power (non-proliferation).
Responsibility for arriving at this pass is shared across a range of actors. The chief culprits are the political and military leaders of North Korea, who continue believing and warning the population that there is going to be an external military intervention aimed at wiping out their regime, and have accordingly pushed forward with nuclear programmes on the grounds that their survival depends on them. Hence Pyongyang has stopped complying with the promises made to prevent proliferation and used such agreements to buy time and resources, all the while developing its nuclear programme, putting paid to the various talks processes that were underway.
For its part, the US has been vacillating on its policy towards North Korea, which at times has led it to renege on its commitments and accentuate mistrust in Pyongyang. Preoccupied with embarking upon and terminating other conflicts, recent US Presidents have not paid enough attention to North Korean proliferation. A striking example was Obama’s so-called ‘strategic patience’, which barely put any obstacles in the way of the North Korean nuclear programme. Only after the diplomatic agreement with Iran was signed –and following the second nuclear test of 2016– were the sanctions placed on North Korea taken seriously. The North Korean regime has managed to get round these sanctions, emulating the ‘Iranian way’ of building up a network of logistical, financial and technological intermediaries who have nurtured the umbilical cord of proliferation. Now that President Trump has brought an end to the policy of strategic patience with North Korea and shown his preparedness to use force, the North Korean regime has more reasons for feeling insecure, but less to lose if an escalation should occur.
The North Korean nuclear programme would not have advanced in the way it has without the collaboration of its neighbours. First, China has allowed its ally to play the provocation card at the Six-party Talks table, supplying technology associated with proliferation, directly or through Chinese and Pakistani intermediaries who have provided technological, financial and logistical support to the proliferation programme. Secondly, South Korean governments have been prepared to grant economic incentives to appease its northern neighbour. Although they have tried they have not succeeded in engaging the North Korean elites in any process of building mutual trust; on the contrary, their predisposition has raised doubts among their allies about the possibility that South Korea might jettison its friends in exchange for promises of reunification. Such doubts were evident in the recent election campaign when the then presidential candidate Moon Jae-in argued against the US taking unilateral decisions on North Korea and criticised the US deployment of its THAAD anti-ballistic missile defence system. As expected, since being elected he has shown himself to be more disposed to reopening talks with the north than his predecessor, the impeached Park Geun-hye.
Why are we at a particularly sensitive moment?
Up until now, the risk of a widespread conventional conflict has been contained thanks to the military superiority of South Korea and its American ally. Despite the fact that North Korea wields considerable military might, it is one thing to provoke occasional armed incidents to shore up its threats and a quite different thing to launch a military escalation in which North Korea would have everything to lose. Now that the headway made in proliferation has shifted the conventional balance however, the North Korean leader and his military elite can afford to indulge in more aggressive shows of strength, knowing that they can make up for their conventional inferiority. When they reiterate that they will only use their nuclear weapons if they are attacked, what they affirm is that they are prepared to use them first and –more dangerous still– that their decision rests on a perception that may be removed from reality. Linking first nuclear use to a subjective perception increases the risk of a nuclear escalation in the Korean Peninsula because the decision does not emerge from a rational calculation of the risks stemming from the traditional nuclear powers but rather from the irrationality of the feelings of a small, recently elevated and inexperienced power in a complicated game of nuclear deterrence. By way of comparison, North Korea’s first strike nuclear doctrine is similar to that of India’s, but the likelihood of its being put into action is less of a concern on the India-Pakistan border than in the Korean Peninsula.
Secondly, while North Korea is developing its nuclear and ballistic capacity at an ever-increasing rate, its openness to being dissuaded is limited and this presents the US with the dilemma of whether or not to launch a pre-emptive attack. At the time of writing it is estimated that North Korea has between 10 and 20 nuclear weapons; it has demonstrated a range of up to 1,000km for its short- and medium-range missiles (Scud-ER and NoDong) and of up to 500km for submarine-launched missiles (Bukkeukseong-1 and KN-11). It has also shown its capacity to achieve ranges greater than 4,000km with new-generation intermediate-range missiles, overcoming the shortfalls of the earlier Hwasong-10/Musudan, although its intercontinental ballistic missiles (Hwasong-13/14 and KN-08/14) are not capable of reaching the continental mainland of the US. Similarly, it has not yet demonstrated a capacity to miniaturise nuclear warheads or to solve the problems of warhead re-entry once their trajectories have taken them beyond Earth’s atmosphere. However –despite the firm belief that the advances that had been claimed were false and the targets were beyond their range–, the most recent tests, in April 2017, confirm that unexpected progress has been made on high-thrust engine technologies based on old Soviet ballistic missiles. If new tests on these engines over coming months confirm the advance, the existing KN 08 and 14 ballistic missiles could reach distances in excess of 10,000km within three or four years, placing US territory within their range. Indeed, as its most recent launches on 13 and 21 May 2017 show, North Korea is taking advantage of its intermediate-range ballistic missile (IRBM) tests to develop its intercontinental ballistic missiles (ICBM) covertly. And while the US awaits an intercontinental test to justify a possible preventative attack, North Korea increases the height, distance, reliability and re-entry security of its missiles using tests with its intermediate missiles. It is also seeking to improve its capacity to overwhelm the THAAD defence system directed against its missiles by increasing the number of simultaneous firings, and to reduce the US capacity for anticipation by improving the mobility and concealment of its launchers and reducing the time that transport vehicles require to carry out launches. These are advances that reduce the window of opportunity for carrying out a pre-emptive attack.
Finally, the risk is heightened by the unpredictability of the behaviour of the North Korean and US leaders, who have proved their capacity to take bold decisions involving the use of force. President Trump has left this door open in public statements in an unsuccessful attempt to put pressure on the North Korean authorities, with whom the current US Administration has embarked upon a psychological war. The statements have been accompanied by a deployment of military forces in the region that in some cases have served to strengthen his credibility, but others, such as the ‘straying’ of a carrier group towards Australia, have achieved the opposite effect. In an emotional atmosphere ripe for confrontation and devoid of a rational doctrine for using weapons of mass destruction, there is the risk that any error of judgement or ill-considered decision will trigger an uncontrollable conflict. At this stage of proceedings, no pre-emptive military strike could destroy, damage or seriously delay North Korea’s nuclear capacity, but whatever its nature it would be the attack that the North Korean regime has been announcing for decades and for which millions of its citizens are prepared to die. In any event, in order to forestall it, North Korea boasts a wide repertory of responses that range from cyber-attacks, assassinations, kidnapping and the hybrid operations of the so-called ‘grey zone’ (a situation between war and peace that maintains military tension using planned activities triggering escalations) to nuclear holocaust by way of a conventional confrontation that would devastate the Korean Peninsula. Caught up in the dispute are not only the Korean peoples but also the troops stationed by the US in the region, who are turning into the hostages of the situation.
What do the sides want?
Stabilisation depends on the parties to the dispute, because they have moulded the process prior to negotiation and they control the decisions of the UN Security Council, such that no other actor, including the EU, is able to influence the current situation.
The North Korean authorities view their nuclear programme as a key element in consolidating and maintaining themselves in power. First, the North Korean regime has identified a potential US intervention as the most likely scenario to trigger its immediate collapse, so the overriding goal of developing of its nuclear programme is to deter Washington from launching such an operation. From this it follows that any agreement seeking to contain the programme will need to include security guarantees from the US aimed at avoiding such an intervention. Secondly, Kim Jong-un has invoked North Korea’s development of a military nuclear programme to bolster his authority. This has involved a modification of the statutes of the Workers’ Party of Korea, which has adopted the byungjin doctrine as its new central policy. The latter involves no longer prioritising the military and army and adopting a policy that seeks both a greater level of economic development and a credible nuclear deterrent. From this perspective, North Korea is looking for an agreement that grants it international recognition, even if it is implicit, as a nuclear power and that enables it to reactivate its economy through greater engagement in international trade. Attainment of this would not only boost the regime’s security amid the prospect of a foreign intervention, but also substantially underpin Kim Jong-un’s political capital as the great architect of such achievements.
The US, as a key player in the security of East Asia, is concerned about the threat the proliferation programmes pose to it and its allies in the region. It is also concerned by the risk of nuclear proliferation that could arise from the sale of nuclear material and technology by North Korea to other states and terrorist groups within and beyond the region (witness the North Korean provenance of the Syrian nuclear reactor destroyed by Israel in 2007 and the missiles found when the So San was boarded by Spanish Navy crew in 2002). For both reasons it has consistently been committed to de-nuclearisation.
China’s main priority is to avoid the collapse of the North Korean regime, because, in addition to a possible refugee crisis, this would entail a process of reunification with South Korea on the terms laid down by Seoul and consequently China would have a land border with a country maintaining a security alliance with the US. To avoid this, Beijing continues to maintain a close economic relationship with Pyongyang and, according to official Chinese data, its trade with North Korea grew by 37.4% in the first quarter of 2017 compared with the same period of 2016. However, Beijing now openly opposes the development of North Korea’s military nuclear and missile programme; first because it understands that maintaining a climate of stability in the region is beneficial both for Chinese economic development and for its international reputation, something that deteriorates when Pyongyang carries out nuclear and missile testing, causing such fundamental partners as the US, South Korea and Japan to identify Beijing as the accomplice to the situation. Moreover, it knows that this perception strengthens the ties that exist between them. Secondly, such programmes reduce North Korea’s strategic dependence on China, which undercuts Beijing’s capacity to influence its neighbour and, as a result, the strength of its position when it comes to negotiating with the US on this and other issues. Finally, North Korean proliferation has paved the way for the deployment of the THAAD anti-ballistic missile defence system in the Korean Peninsula, something of a strategic setback for China that it has tried to avoid by all means, including preventative cyber-attacks against South Korea.
South Korea itself wants tension with its northern neighbour defused and, eventually, a reunification in which it is able to maintain its political and economic system. Seoul is inclined more towards economic interaction with Pyongyang, and a gradual process of convergence between the two Koreas, than the use of force or seeking the immediate collapse of the North Korean regime, because Seoul would have to bear the greater part of the costs of reunification and a possible refugee crisis. For its part, Japan feels threatened because it knows that the US bases on its territory would be the most likely target of any hypothetical North Korean nuclear attack, hence the great emphasis it places on ending the North Korean nuclear programme. The Japanese are also concerned that one of the missiles tested by Pyongyang over the Sea of Japan could accidentally or deliberately reach Japanese soil. From their perspective, it would be desirable for any agreement negotiated with North Korea to address the issue of Japanese citizens kidnapped by North Korean agents in the 1970s and 80s. Both countries harbour nationalist factions that advocate wielding their own nuclear deterrence, which could cease being a minority view if US deterrence fails to work or if they have to pay too high a price for it, a prospect that Donald Trump, when still a presidential candidate, once floated.
The Russian position on the Korean Peninsula consists of strengthening its role as a strategic actor and an indispensible interlocutor in East Asia. Like Beijing, Moscow condemns Pyongyang’s nuclear and missile tests, but is opposed to armed intervention and, in particular, regime-change by force. Given that both in Iraq in 2003 and in Libya in 2011 the economic isolation of these countries was a prior step to military intervention to force a political regime change, both Russia and China reject isolating North Korea economically and support only selective economic sanctions, while maintaining major economic ties with Pyongyang.
How can the situation be stabilised?
Finding a solution to this situation is enormously difficult, owing to the diverging interests of the parties involved, as summarised above. There needs to be an agreement in which all sides gain something, because only then will the parties be able to sustain it, thereby giving rise to a security regime that, although precarious and limited, would avoid the dangers involved in prolonging the current dynamic. When it comes to opening up a pathway to stabilise the zone, it seems inadvisable to take either the military route or to open up a political dialogue based merely on offering economic inducements in exchange for commitments from Pyongyang. The latter course has already been explored by various South Korean governments, including that of Roh Moo-hyun; one of the latter’s advisors was the current President-elect, Moon Jae-in, who therefore knows its limitations at first hand.
The solution will need to combine an effective sanctions regime, aimed at slowing down the development of the North Korean nuclear and missile programmes, and a political agreement that offers Pyongyang sufficient security guarantees in exchange for the suspension of its military nuclear and missile programme. For the former, the existing international sanctions could be broadened and deepened and –above all– their fulfilment enforced, with a view to hindering the nuclear proliferation as much as possible. Since the UN Security Council adopted Resolution 2270, the challenge of the US Administration has been to dismantle the network of ministries, individuals, banks, ships, aircraft and suppliers that feed into the proliferation programme. Up until now, China has turned a blind eye in the belief that it had the neighbouring dynasty under its control, but now that the latest Kim has decided to strike out on his own, it could contain the escalation if it collaborated in implementing sanctions (something it has only done when the US authorities have targeted sanctions against Chinese interests).
It should not be expected, however, that the Chinese will start to perceive North Korea as a greater threat to their security than the US, thereby changing a basic tenet of China’s geopolitics. They could do so if US pressure on their economic interests or the drift towards war on the part of the North Koreans became more pronounced, but otherwise they will resist applying sanctions that affect Chinese companies, individuals and regions living off trade –both licit and illicit– with North Korea. It is a trade that feeds the proliferation programmes and maintains the lifestyle of its ruling elite.
In any event it should be borne in mind that the sanctions are not an end in themselves, but rather an instrument against nuclear proliferation and need to be complemented by a political dialogue geared principally towards freezing the existing programmes. It cannot be a precondition of dialogue that Pyongyang completely renounces its nuclear weapons because, as already pointed out, North Korea’s leaders know that they need these programmes to avoid regime change and in order to be respected in their talks with regional powers. Therefore, the best option would be to give acknowledgement, de facto at least, to this reality and look for an agreement aimed at freezing the North Korean military nuclear programme, something that is especially important with regard to the miniaturisation of nuclear warheads and the development of intercontinental missiles. Acknowledgement would stabilise the current situation and enable the parties to derive minimal face-saving incentives, abandoning the all-or-nothing stances that have proved fruitless. The Iranian model has some usefulness but cannot be applied wholesale because the circumstances and the players are different. The final outcome has the potential to be similarly desirable for the Korean Peninsula: military de-escalation, a moratorium on proliferation, the resumption of dialogue and an improvement in the affected populations’ quality of life. In the much more distant future there lies the prospect, in both cases, of a stable and definitive solution.
The spiral of tension in the Korean Peninsula and East Asia will not abate as long as North Korea continues, as it has been doing in the last four years, to make swift progress on its nuclear capabilities and missile systems. The series of condemnatory resolutions passed by the Security Council since 2006 against North Korea’s nuclear testing and launches of ballistic missiles, combined with a growing but leaky sanctions regime, has not succeeded in halting the proliferation.
To date all the initiatives to persuade the North Korean authorities that it would be more beneficial to renounce their nuclear programme than maintain it, whether through threats or inducements, have foundered. There is no way of succeeding because they know that the programme is the only guarantee to avoid foreign intervention, ensure even-handed talks with the regional powers and prolong the regime’s survival. Attempting military action to avoid this has few chances of success and could create a humanitarian and security crisis on a vast scale. In this situation, reaching an agreement that is not ideal and seeks suspension rather than de-nuclearisation is preferable to prolonging the current situation, in which North Korea continues developing its nuclear capabilities and missiles at great speed.
Such a hypothetical agreement, freezing North Korea’s programmes and verifying its compliance by means of periodic international inspections, would enable the current tension to be defused. The agreement would not put an end to the structural problems posed by North Korea’s relations with its neighbours, but it could be the start of a new talks process with the potential of finding a solution of greater scope, one that reflects the new strategic reality. | 2019-04-21T12:54:53Z | https://www.eurasiareview.com/22062017-how-can-military-conflict-in-korean-peninsula-be-avoided-analysis/ |
Client charged with Capital Murder. Our six month investigation was able to develop numerous witnesses that helped rebut the states case. A thorough review of the discovery disclosed serious flaws in the States case. A meeting was arranged with the State and the defense team. The defense team was allowed to demonstrate to the State our Claim of Innocence. The client was asked to take a polygraph and passed. The case was dismissed. Note- This was the first time in Illinois that a Death Penalty case was dismissed prior to trial since the Capital Litigation Trust Fund was enacted in 2000.
Client charged with Capital Murder. Our agency was brought in to assist in the final phases of the investigation. Our investigators conducted a comprehensive through review of the discovery as well located and interviewed several critical witnesses and located some missing evidence. The attorney was able to utilize this information during depositions. The information developed eventually led to the state dismissing all charges against the client.
Client charged with Capital Murder. Co-Defendant had made plea agreement to Residential Burglary and agreed to testify against client. Our investigation consisted of over two years of locating and interviewing of approximately seventy-five witnesses in five states. Client had a jury trial and was acquitted of Capital Murder and was found guilty of Residential Burglary.
Client charged in 1999 with first degree murder of his newborn son. Our defense team was brought on board after initial attorney and investigator had stopped working on case. Our investigation developed approximately fifteen new witnesses, and located evidence that had not been previously disclosed by the state. On the eve of trial our investigators tracked down and interviewed two fact witnesses that gave statements as to the actual person responsible for the murder. The state offered a reduce charge of aggravated battery. After serious consideration and maintaining his claim of innocence the client elected to plead to a reduced charge.
Client was charged with six counts of first degree murder of his pregnant wife. Our investigation uncovered numerous inconsistencies in the states case as well as locating several witnesses that helped establish timelines that showed the factual inconsistencies of the states case. During the course of the investigation we also located evidence the state had failed to locate and examine. After approximately a two week jury trial and six hours of deliberation the jury acquitted the defendant of all charges.
Client was charged with aggravated DUI and was facing possibility of losing his license as well as his freedom. Our investigation consisted of doing a thorough review of all police reports, documents provided by the state as well as utilizing one of our investigators who is a qualified expert in Standardized Field Sobriety Tests. A thorough examination revealed several incorrect procedures on the SFST's. A jury trial was held and our investigator testified to his findings. Jury found the client Not Guilty.
Client was originally charged with Capital Murder in 1992. Was found guilty and sentenced to a life sentence with no parole. Our investigator met the client in 1997 and began to realize that he could possibly have an innocent man that was now behind bars for the rest of his life. The investigator began a meticulous investigation for the post conviction proceeding. The investigator went through six different attorneys and law firms during this 12 year journey. Along the way the investigator discovered the original attorney had become disbarred while the original investigators only spent a total of fifteen hours on the case. The case was one of the most complex cases the agency had ever been involved in with 4 different crime scenes, every imaginable type of forensics that could be utilized , as well as missing evidence, destroyed evidence, voodoo science and a jail snitch. Our investigator would not let it go and continued his persistence until he finally met a couple of attorneys ( now the Hon. Michael McHaney and Ericka Sanders) that took the time to put all the material together that was required.Along the way the state tried to charge the client with another murder from his hometown which caused the investigator to conduct an additional investigation and was able to prove that the client wasn't even in that state when the crime was committed.
After working with a dedicated appellate attorney Larry Wells the client was able to obtain a new trial after oral arguments at the post conviction appeal. The new trial then allowed our agency to put our chief investigator (Alan Profancik) on the case and to give the case a new set of eyes. After an 11 month methodical investigation the state realized that they had numerous problems with their case and elected to make an offer to our client and the thought of walking out of prison after 17 years was too good to pass up. Our client and his defense team will continue to maintain his innocence . This was a classic case of showing that persistent does pay off especially when a person has the faith. Please see news article and press release.
At Kevin W. McClain Investigations, Ltd. we understand the necessity to get to the scene and gather information as soon as possible. Valuable evidence and critical witnesses who might be able to shed light on the facts have to be located, examined and interviewed. If this information isn't gathered in a timely manner it can be lost forever. The staff of Kevin W. McClain Investigations, Ltd. has over 100 years of investigative experience in the fields of personal injury and wrongful death claims. We understand what your attorney needs to help prepare your case.
Client was driving across a busy intersection and was hit by a semi-truck that had ran a red light. Our investigation services were retained almost immediately. Our investigators were then able to get the accident scene and document with photographs as well as video. Our investigators were also able to locate additional eye-witnesses. This information proved to be invaluable since the driver had made claims that he also had the green light. After the attorney produced several witness statements that refuted the semi-truck drivers claim, his insurance company conceded their negligence. Our client became a quadriplegic due to this accident and due to our ability to get to the scene quickly and document the scene as well locate witnesses helped his attorneys ensure that this young man would be properly compensated.
Client was killed in an automobile accident. The defendants were making claims that client had been driving at a high rate of speed and had been drinking. Our investigation was able to locate and interview fact witnesses who observed the defendant pull out in front of our client.
Our investigations was also able to locate and interview numerous witnesses that were involved in the treatment of the client and never detected any odor of alcohol. Our investigators also assisted the attorney with locating an expert. The expert was able to show how certain blood draws can give false positives. The attorney was able to present these facts to the defendant's attorneys and a satisfactory settlement was obtained for the surviving spouse.
Employers, claims adjusters, third party administrators, and self insured's use our worker's compensation fraud investigation services. At Kevin W. McClain Investigations, Ltd. our staff has over 50 years of identifying fraudulent documentation of claims of injuries. Our investigations provide timely, detailed reports that accurately reflect our professional effort and surveillance results. Our investigations utilize the latest cutting-edge technology such as night vision, covert cameras, digital technology, and wireless recording equipment. Our investigations will document any activity in a non intrusive manner insuring all state and federal restrictions and rights to privacy are adhered to. Kevin W. McClain Investigations, Ltd. utilizes the most up to date databases to assure the information that is obtained prior to the surveillance is the most current available. This approach helps benefit you as it helps provide a more cost effective method of conducting the investigation. This methodical approach to conducting these type of investigations has allowed us to have the consistent success rate we have had at exposing fraud. If the need arises our investigators can testify to their factual findings in court or arbitrational proceedings.
Claimant alleged to have injured back at work. Our investigations documented the claimant actively engaging in the construction and building of a wooded deck. Claimant claims were subsequently dismissed therefore saving the company thousands of dollars.
Claimant had alleged that they had hurt wrist while at work. Our investigations utilized covert cameras and documented the claimant utilizing the alleged injured wrist to assist as they were carrying numerous boxes containing full beer bottles. Our investigators were called to the arbitration proceedings and played the covert video to the claimant's attorney who then immediately contacted the claimant and withdrew his representation.
Claimant was alleged to have injured their back. Our investigations were able to conduct surveillance and document numerous physical activities that outside of the claimant's restrictions. It should be noted that several other investigative agencies had attempted to conduct surveillance and were discovered by the claimant. Our investigative team utilized some different creative legal approaches to obtain the necessary video documentation that subsequently led to a reduced settlement saving the company over two-hundred thousand dollars.
When issues develop that alert a concerning loved one to the health, safety, and welfare of a child than Kevin W. McClain Investigations, Ltd. can provide the answers to those unknown questions. Our staff has over 40 years of investigative experience establishing the necessary facts to assist your attorney with their representation. Our team of experienced child custody investigators can expose the issues for your attorney. We are experienced at providing detailed factually based reports and if called upon to testify to those same findings.
Clients were a couple from out of state that were in the process of adopting a child from an unwed mother. During the course of the pregnancy the unwed mothers family became aware of the mothers decision to give her baby up for adoption and decided to try and fight for custody of the unborn child. Our investigative team did a thorough investigation into the background of the defendants. During the investigation our investigators were able to document numerous areas of concern for the potential environment the child would be exposed to. Our investigation documented numerous male subjects with extensive criminal histories occupying the residence of the unwed mother. We were also able to document the conditions of the residence, the lack of any phone lines or communication devices to utilize in the event of an emergency, and the lack of any mode of transportation. The location also appeared to have drug paraphernalia around the premises. The judge in the other state ruled in favor of the adoptive couple.
Whether it is a cheating spouse, insurance fraud, competitive business intelligence, employee theft, patent infringement, business integrity investigations or parents needing to know the team of investigators at Kevin W. McClain Investigations, Ltd. has the resources and experience to suit your specific needs. Our surveillance specialist have over 40 years experience utilizing the latest, high tech, state of the art covert surveillance systems. Our vast array of surveillance equipment ranges from 35 mm cameras, to miniature high definition digital and video body worn devices. We also utilize infra red night vision lenses and powerful zoom lenses to document the activity.
Client was concerned that husband was cheating on her. Our team of investigators set up surveillance at the husband's place of employment and by utilizing covert methods was able to document the husband in numerous compromising positions with a co-worker during breaks on the overnight shift.
Client was concerned about paying alimony when he believed she was living with someone else. Our team of investigators was able to conduct surveillance and establish the ex-wife was cohabitating with another man. During the course of the investigation our investigators also located several charge accounts the client wasn't aware of that was in his name going to a different post office box. The attorney was able to use our factual findings and have alimony payments ceased.
Client was concerned wife was cheating on him. Our investigative team utilized covert vehicles and creative video techniques and was able to document the wife with her unknown male counterpart in numerous intimate positions. A follow-up investigation from our team led to the identity of the unknown male.
Asbestos Litigation is some of the most complex civil tort law currently being litigated. Our team of highly skilled professional investigators have over 20 years of investigative experience in these complex civil matters. Our investigators understand the issues involved in these types of cases. Part of the investigative team includes a former plaintiff's investigator who has been involved in numerous toxic tort litigation matters including asbestos. This unique insight gives our clients an innovative approach by offering our diversified team of investigators to your group. The team at Kevin W. McClain Investigations, Ltd. helps your group prepare its defense with a systematic investigative method. Our new component method has recently help lead to a summary judgment for the defense in Cook County, Illinois.
Claimant had alleged to have contracted asbestos through our clients product. Our team of professional investigators proceeded to analyze and investigate all alleged facts of the case. During the course of the investigation our investigators discovered numerous other potential locations and products that could have caused their exposure. Our investigators were able to locate fact witnesses from over 40 years ago that assisted the defense with their theory of location and product that claimant was exposed to. A vigorous defense was prepared and presented before a Cook County judge who entered a summary judgment for the defense.
Corporations have unique security and investigative needs. The following summaries are examples of how we have helped companies protect and defend assets.
A corporate client was in the process of selling their chain of convenience stores to a father and son investment group from another state. The client had accepted a check for $500,000.00 opened on a new account. The client had already allowed the group to take over the operations of the stores. Several weeks had passed without the check clearing. Client proceeded to contact an attorney who retained our services. Immediately our investigators conducted a comprehensive background search of the investment group. Our findings revealed that the father and son team had ran several scams in some southern states and had reestablished themselves in the Midwest. The findings were reported to the attorney and our investigators proceeded to coordinate with local law enforcement and the states attorney office to conduct a raid on the corporate offices and to apprehend the principals. Our team established around the clock surveillance to ensure that no company assets were being removed and helped coordinate the raid on the group. After the successful raid was conducted it was ascertained that the group had already been in negotiations to liquidate the entire company as soon as the client left for an extended vacation. The client was able to save his chain of stores and recover his losses from the father and son as well as testify in their criminal proceedings.
A financial institution had a corporate client that had filed bankruptcy. The financial institution was concerned that numerous items of equipment totaling over $100,000.00 were unaccounted for. The financial institution retained our services and we proceeded to conduct an in depth investigation into the background of the subject as well as their company. Our team of investigators discovered that the subject had disbursed different items of equipment in three different states in an attempt to hide them from his creditors. We were able to locate and recover all the equipment for the financial institution.
A financial institution had contacted our office to ascertain information on a potential business client that had recently applied for a business loan for several millions of dollars. The president of the financial institution had indicated that they were suspicious and wanted to have us verify the applicant's background. A comprehensive background check revealed that the applicant had three other social security numbers associated with their name as well as fourteen other civil judgments from another state. By being diligent the financial institution was able to avoid a potential costly loan.
Computer forensics is a new discipline in computer security that focuses on finding digital evidence after a computer security incident has occurred. The general goal is to conduct an investigation and determined what happened and who was responsible for it. The staff of Kevin W. McClain Investigations, Ltd. has a computer technician that was trained through the U.S. Department of Defense. Essentially when we are involved in a computer case there are generally three phases to recovering the evidence they are (1) Acquire (2) Analyze and (3) Report. Computer analysis has been utilized by our firm in criminal matters, child custody matters as well as corporate issues.
Client was involved in a nasty child custody case. One of the issues was the client had retained possession of the computer. The issue was the ex-wife was constantly on the computer during the time she was caring for the child. Our forensic team was able to acquire from the father the computer. A forensic examination was able to acquire numerous explicit pictures and e-mails that the mother had sent. The defense was able to demonstrate to the court that during the time the mother should have been watching the baby she was actually on the internet. The internet communications and pictures revealed numerous disparaging comments the mother had made about the baby making her upset while she was trying to chat on the internet. The judge allowed all of our information acquired from the hard drive to be introduced as evidence. This was the first time in that county that computer recovered evidence was allowed to be introduced. Based upon the information recovered the judge was able to view all the facts of the case and awarded full custody to our client. | 2019-04-19T00:24:56Z | http://www.mcclaininvestigations.com/case-studies |
This issue is devoted to various projects, initiatives, and other activities involving the Special Materials Cataloging Division (SMCD).
1) LC Web Archiving Project : MINERVA (Mapping the Internet: Electronic Resources Virtual Archive) (see URL http://lcweb.loc.gov/minerva/minerva.html) [July 2002]) known as the Web Preservation Project, is an experimental pilot developed to identify, select, collect, and preserve open-access materials from the World Wide Web. The effort includes consensus building within the Library, joint planning with external bodies, the study of technical, copyright and policy issues, the development of a long- term plan, and the coordination of working models. The aim is to identify what can be done immediately and then move rapidly through the models into production in these areas.
Election 2000: over 1,000 related sites (URL http://web.archive.org/collections/e2k.html) [July 2002].
September 11th: over 2,000 related sites identified (URL http://september11.archive.org/) [July 2002].
Winter Olympics 2002 - approximately sixty-five related sites not yet available.
Election 2002 - over 2,500 related sites tentatively targeted.
The Computer Files and Microforms Team (CF&M), Special Materials Cataloging Division (SMCD), has processed catalog records for all the sites submitted.
The project team originally consisted of William Arms (Cornell University), and Rodger Atkins, Allene Hayes, Diane Kresh, Jane Mandelbaum, and Barbara Tillett, all from the Library of Congress. The team presented a report to the LC Digital Futures Group in December 2000 and to the LC staff in February 2001 and submitted the "Web Preservation Project Final Report" to Associate Librarian for Library Services Winston Tabb in October 2001. The team's article about the experience was published in the April 2001 issue of RLG DigiNews (URL http://www.rlg.org/preserv/diginews/) [July 2002].
In addition, Yahoo Internet Life (January 2002, v. 8, issue 1), a monthly periodical, declared the September 11th collection its site of the year. To read more about it, go to (URL http://www.yil.com/features/feature.asp?Frame=false&Volume=08&Is sue=01&Keyword=topofnet&Page=01) [July 2002].
2) Metadata Object Description Schema (MODS): CF&M has been working with the Network Development and MARC Standards Office (NDMSO) to have contractors create bibliographic records using a new XML schema called MODS. In development in NDMSO, MODS "is a schema for a bibliographic element set that may be used for a variety of purposes, and particularly for library applications. As an XML schema it is intended to be able to carry selected data from existing MARC 21 records as well as to enable the creation of original resource description records." For information about MODS see (URL http://www.loc.gov/standards/mods/) [July 2002].
3) Digital Resources Traffic Manager: CF&M has been working with Information Technology Services (ITS) to develop an online workflow system to assist with the processing of digital resources. This digital resources traffic manager's design is based on the Electronic Cataloging in Publication (ECIP) Traffic Manager System. CF&M coordinated a group of potential users of the digital resources traffic manager from various divisions across directorates to assist with the development. The group has reviewed the first phase of development and has submitted comments to the programmers for further development.
4) Training for Cataloging Digital Resources: In continuing the expansion of training catalogers throughout the Cataloging Directorate to process electronic/digital resources, SMCD called for a second round of volunteers for a detail to CF&M for training. Norma Hendrickson, retired, former Team Leader of CF&M, has been contracted to serve as the primary trainer for the detailees; however, other members of the team assist with the training and review.
5) Processing Internet Resources:CF&M has been processing Internet resources for the BeOnline+ Project since 1996. The Team started processing the National Digital Library's American Memory sites (URL http://memory.loc.gov/) [July 2002]) and subscription databases. CF&M started processing archived sites in 1999 and in May 2002 began to work with the "Portals to the World" sites developed by LC's Area Studies staff in May 2002.
The Music Subject Cataloging Working Group (MUSUB) was founded in August 2001 to facilitate efficient music subject cataloging operations and procedures throughout LC. Its principal missions are to provide guidance, professional development, and training for music catalogers and to work closely with the Cataloging Policy and Support Office (CPSO) to achieve shared goals. It also provides a structured means of addressing extensive and complex music subject and classification problems. The group is comprised of three music catalogers from the Music and Sound Recordings Teams (MSR), the music policy specialist from CPSO, a representative from the Recorded Sound Section of the Motion Picture, Broadcasting, and Recorded Sound Division (MBRS), and the team leaders of both MSR I and II.
1) Serving as SACO reviewer for music subject heading proposals and questions.
2) Reviewing subject/classification proposals before they are submitted for inclusion on LC's weekly lists.
3) Acting as a communication funnel for catalogers, technicians, and CPSO on relevant issues.
4) Attending other pertinent meetings related to subject cataloging held by the Subject Heading Editorial Team, CPSO, the Music Cataloging Advisory Group, etc.
5) Defining areas for ongoing evaluation, study, and change and when needed, creating and leading ad hoc groups in these areas.
6) Discussing new and problematic topics for which headings need to be established and making recommendations.
7) Providing workflow design for SMCD management regarding subject/classification work.
8) Contributing to music subject/classification documentation, evaluation, and revision.
During its first six months, MUSUB addressed a number of complex subject heading proposals such as Remixes and Turntablism. Representative issues the group has discussed include the addition of parenthetical qualifiers to music terms, classification of materials about music performance ensembles, and classification of musical works in variation forms such as passacaglias and chaconnes. However, one of the group's major achievements was the creation of an in-house listserv. This listserv insures that interested SMCD, MBRS, CPSO, Music Division, and American Folklife Center staff and administrators can take part in relevant discussions. It is a centralized e-mail distribution point for subject and classification information, changes, and instruction. Finally, the list archives all discussions, distributed information, and MUSUB meeting minutes.
Compact Disc (CD) Workflow 2000 began life as one of a number of projects proposed by the Motion Picture, Broadcasting, and Recorded Sound Division (MBRS) in its November 1999 report, Recorded Sound Processing Projects, 2000-2005. In collaboration with SMCD, the following project goals were devised: to catalog all MBRS current CD receipts (approximately 30,000 items annually); to initiate a workflow adaptable for the processing of other sound recording arrearage materials; and to have this new workflow in place and functioning smoothly by the end of FY 2000.
1) Support staff create IBC (Initial Bibliographic Control) records using a non-MARC interface developed in-house to import data from a commercial database entitled MUZE. The records are transformed into MARC upon import into the LC database.
2) New IBCs are periodically batched and sent to OCLC for matching against WorldCat (RetroCon Batch service), processing, and authority control of matched copies utilizing OCLC's MARS service.
3) Matched, processed files are returned to the Library for batch loading into the LC database, replacing the original IBCs. Reports on needed authority work are generated and used by LC catalogers to identify records needing authority work.
Initial creation of IBCs began in April 2000. The successful resolution of issues raised by two test files together with the final packaging of the system profiles, processing specifications, and report definitions allowed SMCD to submit its initial production load to OCLC in November 2001. By this time SMCD had created more than 28,000 IBCs. Initially, files of 200 IBCs a week were submitted to OCLC.
Based on an initial one hundred percent review of IBCs submitted, the Library is confident that OCLC's automated identification of copy, authority control reporting, and implementation of processing specifications are satisfactory (meaning error rates are non-existent, small enough to absorb, or easily addressed through minor changes to the specifications). To date, the Library has submitted almost 36,000 IBCs to OCLC. The current match rate is fifty-two percent. SMCD is currently completing an analysis of the results and hopes to move on to the completion of the cataloging including contributions to authority control during the summer of 2002.
SMCD is working closely with the Recorded Sound Section of MBRS to catalog the Armed Forced Radio and Television Service (AFRTS) disc collection. AFRTS, the broadcasting service of the Department of Defense, has been providing radio broadcasts to military personnel since the 1940s. Until the mid-1990s, commercial and AFRTS-produced shows were provided to member stations in disc format on a weekly basis. They ranged from informational shows to religious programming to popular shows. As archival materials, many of these recordings are unique, and few other copies are likely to exist. The project's goal is to catalog over 100,000 discs that are not yet represented in the LC database.
Project coordinator Sharon McKinley (SMCD) is working with a team of catalogers and processors from SMCD and MBRS to deal with this unwieldy set of materials. Creative methods are being used to catalog these discs which were created strictly for use by broadcasters. Individual shows were often pressed in parts on more than one disc to facilitate handling by disk jockeys and more than one show might be present on a single disc making the physical processing of these items complicated. Two kinds of bibliographic records are being created: modified collection level records are being used for some shows and individual bibliographic records are being created for each iteration of other shows. The cataloging phase of the project began in May 2002 with over 4,000 discs processed to date.
SMCD, in cooperation with MBRS designed, as part of the LC cataloging arrearage reduction program, a project to catalog every 78 rpm album set held by the Library (approximately 5,600 titles). This project has comprised the major sound recordings cataloging activity for two of the Music & Sound Recordings Teams (MSR I and II) since August 2000.
Employing core-level cataloging as the standard, these records include matrix numbers appearing on popular music discs. As the cataloging of these has progressed, a number of workflow issues was addressed: 1) the input of multiple 028 fields and the creation of multiple holding and item records were accomplished through the use of macros; 2) the creation of records for manually and automatically sequenced issues of the same material was accomplished through the use of annotated holding records for individual copies; 3) the huge processing tasks involved in preparing the discs for cataloging and eventual storage (selecting best copies, cleaning, re-sleeving, assignment of shelf numbers, and completion of a cataloger information sheet for each title) were handled by knowledgeable MBRS staff; 4) spoken-word discs, too numerous for specialized catalogers in MSR III, were cataloged by music catalogers on MSR I-II.
Other workflow issues addressed during this project included the use of incomplete "old catalog" records, the physical transportation of the discs, the absence of containers for some discs, accounting for missing discs (incomplete sets), and the need to keep disc numbering in a particular order for efficient shelving, transportation, and storage. As of the end of March 2002, SMCD has cataloged approximately 4,100 of these 78 rpm album titles. Because each title consists of multiple discs and multiple copies, the net reduction of the disc arrearage has been 27,024 discs. SMCD will complete this project by December 2002.
The National Union Catalog of Manuscript Collections (NUCMC) is a free-of-charge cooperative cataloging program at the Library of Congress. NUCMC produces cataloging which describes archival and manuscript collections in repositories throughout the United States and its territories.
The NUCMC Team is currently working on two special cooperative projects, the Montana Union List Project (MULP) and the Cooperative HBCU Archival Survey Project (CHASP). These projects supply cataloging data which the NUCMC Team uses to create cataloging in the Archival and Mixed Collections (AMC) file of the Research Libraries Group (RLG) union catalog and associated authority work in the Library of Congress authority files. The cataloging produced by the NUCMC Team may be accessed free-of-charge by researchers in the U.S. and around the world through the NUCMC/RLG Union Catalog AMC File Z39.50 gateway which is accessible through the NUCMC Web site (URL: www.loc.gov/coll/nucmc) [July 2002]).
The Montana Union List Project (MULP) is a statewide cooperative cataloging project first proposed by the Montana Historical Records Advisory Board in 1998. Its ultimate goal is to provide cataloging that describes collections and manuscripts in all Montana archival and manuscript repositories.
Repositories represented by cataloging at this time include the Butte-Silver Bow Public Archives, Cascade County Historical Society Archives (Great Falls), Catholic Diocese of Great Falls- Billings, Montana Historical Society, Montana State University-- Bozeman, Museum of Women's History (Billings), Musselshell Valley Historical Museum (Roundup), Tobacco Valley Board of History (Eureka), and the University of Montana Missoula.
While conducting research for a presentation on the history of the education of African Americans, Robert Smith, an instructional technologist, found access to materials difficult or unavailable. Inspired to rectify the situation, Smith formed the African American Education Archives Initiative (AAEA) in 1987. Originally a cooperative venture between the National Alliance of Black School Educators and Wayne State University, its purpose was to educate the public on the history of the education of African Americans. Smith turned to the nation's Historically Black Colleges and Universities (HBCU) as a main source of materials. These are institutions that were founded for the education of African Americans prior to the Supreme Court's 1954 Brown vs. Board of Education of Topeka, Kansas decision. AAEA's first project was a survey of the HBCU archives which became the Cooperative HBCU Archival Survey Project (CHASP).
CHASP, which is funded by the National Endowment for the Humanities, is an on-site survey of the HBCU archives. These materials are generally unknown to researchers because they are not listed in existing reference tools and databases. CHASP is surveying ninety-seven HBCU and is more than half completed. When CHASP surveys an archive, the team writes a description of each collection including title, inclusive dates, size, and contents. These descriptions are then sent to the NUCMC program for cataloging. In addition, the CHASP descriptions will eventually be published in a printed guide to HBCU archival and manuscript collections.
To date the NUCMC Team has cataloged 102 collections from sixteen repositories: Allen University, Arkansas Baptist College, Barber-Scotia College, Benedict College, Bennett College, Bowie State University, Claflin College Archives, Clinton Junior College, Delaware State University, Fayetteville State University, Harris- Stowe State College, Lewis College of Business, Lincoln University, Morgan State University, Paul Quinn College, and University of Maryland, Eastern Shore.
The Rare Book Team processed several important collections during the calendar year 2001. Those completed include: Clarence Darrow, Drake Boston, Lester Douglas, Victor Hammer, A. Edward Newton, Wagner-Camp, Pforzheimer Bruce Rogers, 18th-century Russian law decrees, Shapiro Bruce Rogers, Stone and Kimball, and most pre- and post-1800 continental titles.
The Clarence Darrow collection is twenty-five volumes, chiefly representing legal cases and debates of the controversial 19th/20th-century American lawyer and social reformer. The Drake Boston collection is one of many pamphlet collections in the Library's Rare Book and Special Collections Division. It consists of over 800 volumes and is processed, excepting some serial issues. The former owner of the collection, Samuel Gardner Drake, was a 19th-century American antiquarian and historian. The collection consists of source materials on Boston's local history.
The Lester Douglas collection consists of 98 printed items designed and donated to the Library by the 20th-century American book and graphic designer. The Rare Book Team processed the final two-thirds of the collection in 2001. The Victor Hammer collection is largely manuscripts and ephemera. The team, however, processed 20 books in the collection that represents the papers of this 20th- century American artist and printer. The Rare Book Team also assisted in the organization of the manuscript and ephemera material. The A. Edward Newton collection consists of 94 volumes, over two-thirds of which were processed in 2001. Newton was a 20th- century American writer and book collector; the collection consists of works both by and about him. The Wagner-Camp collection, consisting of 451 titles, is a collection of Western Americana selected from Henry Wagner's bibliography, The Plains and the Rockies. The team processed the final third of this collection during the year.
The cataloging of monographs in the Pforzheimer Bruce Rogers collection chosen for analytic treatment was also completed. The total collection consists of books, serials, manuscripts, and ephemera -- over 34,000 items. The Shapiro Bruce Rogers collection (ca. 3,500 items) was fully processed, including books and ephemera. Bruce Rogers was a 19th/20th-century American book designer, largely associated with the Riverside Press of Cambridge, Mass. The collectors Carl Howard Pforzheimer and S.R. Shapiro both donated their collections to the Library during the mid- or late-20th century. The Pforzheimer collection includes the working library of the artist, purchased in 1957 by Pforzheimer after Rogers' death, as well as the collector's ephemera. Another "book art" collection, the Stone and Kimball collection, consists of 182 titles published in the late 19th and early 20th centuries by this Chicago fine press.
Before 2001, processing of the American Imprint collection had been the major work of the team. The collection has been processed in several waves in the past and consists of 16,990 titles published in the United States between 1640 and 1800. The processing of this collection is complete, excepting serial and bound-with volumes (about 250 volumes together). The next major collection addressed by the team was the pre- and post-1800 continental titles collection. The processing for this 4,449-item collection is now largely complete.
All the collections noted reside within the Library's Rare Book and Special Collections Division. For the Law Library, a 284- item collection of 18th-century Russian decrees was also completed, using a series of collection-level records.
The ongoing work of the team includes processing the following diverse collections: Bible, copyright paperbacks (popular genres), Holmes (the Oliver Wendell Holmes family book collection), incunables, rare titles in the Law Library (including Rota Romana materials), Luther and Reformation, Pennell (graphic art and culinary titles), rare monographs in the Prints and Photographs Division, two Roosevelt collections (Theodore and Franklin D.), Russian Imperial, Third Reich, and Toner. | 2019-04-24T15:49:21Z | https://www.loc.gov/catdir/lccn/lccn1007.html |
The Howard government is to introduce a temporary tax levy to pay for Australia’s military commitment to East Timor.
In a statement to the House of Representatives today, Howard said the levy will only apply for 2000-01. It will be applied as an addition to the Medicare levy for taxpayers earning above $50,000 per annum.
The levy will be 0.5% for taxpayers earning between $50,000 and $100,000. It will be 1% for taxpayers earning above $100,000.
Howard said: “As a result of the extra costs since last May, and in particular the unexpected defence costs of around $1.1 billion in the 2000-01 financial year on East Timor, it is calculated that, without additional measures, the budget in that year will record an underlying cash deficit of approximately $500 million.
In his statement, Howard reported on the progress to date by the INTERFET multinational force and announced that two additional infantry battalions would be formed for the Australian Army.
Text of Prime Minister John Howard’s statement to the House of Representatives on East Timor.
Today I inform the House that the Government has decided on the formation of two additional infantry battalions for the Australian Army as well as other force additions. These decisions flow directly from Australia’s involvement in East Timor.
I also report to the House on the impressive progress made to date by the INTERFET multinational force in East Timor, so effectively led by Australia.
Furthermore, I will explain the details of a temporary revenue measure, for the next financial year only, to cover the unexpected costs of the military deployment by Australia in East Timor.
On 21 September I advised Parliament of the deployment of Australian troops as part of INTERFET, the multinational force mandated by the United Nations to restore order in East Timor.
I am pleased to report that, in the intervening two months, INTERFET has largely achieved the tasks the United Nations set it: to restore peace and security to East Timor, protect the United Nations mission in East Timor and facilitate humanitarian relief.
In this period also, East Timor’s political status was settled. On 19 October, the People’s Consultative Assembly in Indonesia agreed to the separation of East Timor from Indonesia, thus respecting the vote East Timor’s people freely exercised in the United Nations ballot on 30 August. East Timor is now under the transitional authority of the United Nations until its full independence is achieved in two or three years time.
The day after its decision on East Timor, the Assembly elected Abdurrahman Wahid as president and Megawati Soekarnoputri as vice-president. These steps underline the distance Indonesia has travelled towards democracy during the past year.
INTERFET’s achievement of its mandate has been an outstanding success. It reflects well on Australia’s leadership, the international support the force has received, the good cooperation among contributing countries and, above all, the professionalism of the service men and women in the force.
Soldiers, sailors and aircrew from 17 nations are working together effectively. The force now numbers over 9,900, including about 4,400 from Australia’s coalition partners.
Countries in Australia’s region have made a strong contribution to INTERFET. The Philippines, Singapore, Thailand, Malaysia and South Korea are participating. Thailand has provided the deputy commander – Major General Songkitti – and the second largest contingent of forces. The Government is grateful for their support.
We thank Japan, which, unable to commit troops for constitutional reasons, is providing US$100 million to pay the costs of developing country contributors to INTERFET. China has been supportive throughout the UN process.
New Zealand’s contribution represents its largest deployment of forces abroad since the Second World War, and I would like to express my particular thanks to Mrs Shipley for the leadership she has shown.
Countries beyond the immediate region have also made a substantial contribution to INTERFET.
The United States has provided capabilities which are essential to the mission’s operations and would otherwise have been difficult to secure. Its ready support for Australia’s leadership of INTERFET has underlined the effectiveness of the ANZUS alliance.
We were grateful for the United Kingdom’s prompt response in sending a company of combat troops and naval assets at the very beginning of the operation.
Canada, Brazil, France, Germany, Ireland, Italy, Norway and Portugal have all made valuable contributions. Denmark, Egypt, Fiji, Jordan and Kenya have committed to send forces.
To date, INTERFET forces have sustained only two casualties. We are pleased and relieved that both these young Australians are making a full recovery. There have also been six militia deaths and a number of militia casualties. This loss of life is regretted but in each case the incidents resulted from attacks on INTERFET.
Since these events the security environment in East Timor has greatly improved. INTERFET has consolidated its control throughout the mandated area, including the Oecussi enclave.
Dili is returning to normal life. More than half its displaced residents have returned, and work on rebuilding the city’s shattered infrastructure has begun.
The last Indonesian troops and officials left East Timor on 31 October.
INTERFET’s success in providing security has provided the basis for achieving its second and third goals, protecting the UN mission and facilitating the provision of humanitarian assistance.
Humanitarian assistance is reaching all corners of East Timor, with greatly improved access for international relief agencies. The UN Office for the Coordination of Humanitarian Affairs, the Red Cross, World Vision, CARE, Catholic Relief, UNICEF, UNHCR and others now have operations on the ground.
This financial year the Government has provided an initial $14 million in humanitarian assistance to East and West Timor. And yesterday the Foreign Minister announced a further $23 million in humanitarian assistance.
INTERFET has created the conditions for hundreds of thousands of East Timorese to return home and start to rebuild their lives. The United Nations estimates that more than 88,000 displaced East Timorese have now returned.
The Government is still very concerned, however, about the plight of over 150,000 displaced East Timorese who remain in West Timor and are subject to intimidation by militia. The onset of the wet season makes their return home urgent.
The Government welcomes statements from the Indonesian government that militia groups are to be disarmed and removed from border areas, and that displaced East Timorese who wish to return are to be allowed to do so. Unfortunately as yet, this has happened only in some areas.
The Government will pursue this issue vigorously with the Indonesian government, the UN Secretary-General, other governments and the appropriate relief agencies.
With security largely restored, the immediate priorities remain humanitarian: the return of internally displaced people and the rebuilding of their lives in East Timor. East Timor and the United Nations must also now begin work on reconstruction, reconciliation and nation-building.
On 25 October, the UN Security Council passed resolution 1272 which establishes a UN transitional authority, UNTAET, to prepare East Timor for independence and provides for a UN peacekeeping operation to take over from INTERFET as soon as possible.
It is essential that UNTAET moves quickly to set up effective political, economic and social structures and that UNTAET involves East Timorese as much as it can in its work. The Government warmly welcomes the appointment of Mr Sergio Vieira de Mello as head of UNTAET and looks forward to working with him.
We are now discussing with the United Nations an early transfer from INTERFET to the new UN peacekeeping force – to be managed in a way that fully maintains East Timor’s security. We expect this will occur early next year.
INTERFET’s role will end once it hands over responsibility for security in East Timor to the United Nations.
I am sure both sides of the House and all Australians will join me in commending the force commander, Major-General Cosgrove, and the Australian men and women serving with him in East Timor for their excellent work.
All Australians were deeply distressed by the scenes of violence, death and destruction in East Timor that they witnessed daily after the results of the ballot were announced in early September. As I said in my address to the nation at the time, we sensed that a small, vulnerable community was about to be denied the freedom it had sought so long and that it had voted so overwhelmingly to achieve.
Despite the pleas of the international community, the Indonesian government was unable to restore order and the United Nations authorised a multinational force to do so with the agreement of Indonesia.
Australia acted both because it was the right thing that we help protect East Timorese from appalling violence and destruction, and because it was in our national interest to restore stability in East Timor.
The mission was dangerous and the risks to our men and women were high, but the Australian people gave it their strong support. It represents our largest military involvement for more than 30 years.
Our troops are doing a first-rate job. We are rightly proud of them and their work.
Australia’s military involvement in East Timor will not end with INTERFET. We will make a substantial contribution to the follow-on UN peacekeeping operation in the order of 1,500 troops.
Inevitably such a commitment to East Timor has put added pressures on our Defence Force and the budget.
In order to be sure that we can sustain our commitment to East Timor, the Government has accepted a recommendation from the Defence Minister, based on advice from the Chief of the Defence Force and the Secretary of Defence, to increase the number of fully operational infantry battalions in the Army from four to six, for a period of two years. The Army’s size will grow from 23,000 to 26,000.
This increase is required to sustain Australia’s involvement in the peacekeeping operation and to maintain acceptable levels of overall defence readiness.
Although the extra battalions have been raised to meet the immediate East Timor requirement, they could be needed on an ongoing basis. A decision will be taken on this in the context of the Government’s Defence White Paper next year.
Air force numbers will also be increased by about 500, to just over 13,500, to allow for additional combat-support personnel and the raising of an extra airfield defence squadron.
The Government estimates that the extra defence costs from the deployment of forces to East Timor, the raising of two new battalions and additional airforce numbers will amount to $907 million in 1999-2000, $1.089 billion in 2000-01 and $901 million in 2001-2002.
After the transition from INTERFET to the UN peacekeeping operation, the United Nations will make some reimbursements. But these reimbursements will cover only a small portion of the costs of the deployment of Australian forces in East Timor and not the wider Defence costs associated with that deployment.
Australia’s support for East Timor goes wider than our involvement in peacekeeping. The Government will make available $60 million during 1999-2000 to cover additional aid needs for East Timor. Australia’s aid commitment for 2000-01 will be considered in the 2000 budget process.
Other additional costs in 1999-2000 relating to East Timor include assistance to evacuees from East Timor to Australia, $35 million; and deployment of Australian Federal Police and police from other jurisdictions as part of the UN civilian presence, $26 million.
Attached to this statement is a table setting out these additional costs.
The Government will present to Parliament before the end of the year a special appropriation bill to cover the extra defence and aid expenses for 1999-2000.
The Government’s Mid Year Economic and Fiscal Outlook has now been compiled and will be released in full by the Treasurer shortly. We know, however, from the details to hand what the impact of the additional cost of the East Timor operation will be on the budget balance both for this and subsequent years.
The House will recall that I undertook some weeks ago to outline funding arrangements for the Timor operation when details of the mid year economic outlook were available. This I am now doing.
It is clear from these details that the cost of the East Timor deployment presents a particular difficulty in the next financial year commencing on 1 July 2000.
At the time of the May budget the underlying cash budget surplus for 2000-01 was projected to be $3.1 billion.
That figure has been significantly reduced by a number of developments. The major additional item was the further cost to the budget of $1.8 billion in 2000-01 for revisions to the tax package that were negotiated with the Australian Democrats to secure its passage through Parliament.
Other necessary policy decisions and adverse variations to the estimates have imposed further costs to the budget.
These additional costs, combined with the delay in receipts from the sale of the second tranche of Telstra, have also led to slower debt retirement and higher interest repayments on outstanding debt, costing about $500 million in 2000-01.
In the absence of East Timor, all of these extra costs could properly have been absorbed within the projected budget surplus for 2000-01.
The defence expenditure relating to East Timor of about $1.1 billion in 2000-01 falls into a different category altogether.
Such an extraordinary item of additional expenditure could not reasonably have been expected at budget time. Therefore a special provision must be made for its impact in the year 2000-01.
The additional expenditure on the East Timor defence effort has a particularly severe impact in 2000-01. By contrast, in the current year and the year subsequent to 2000-01, even after East Timor costs have been allowed for, the budget is expected to remain in healthy surplus.
As a result of the extra costs since last May, and in particular the unexpected defence costs of around $1.1 billion in the 2000-01 financial year on East Timor, it is calculated that, without additional measures, the budget in that year will record an underlying cash deficit of approximately $500 million.
The Government is not willing for this to occur. The days of budget deficits should remain firmly behind us. The economic consequences of high deficits – particularly the pressure they place on interest rates – should be unacceptable to all honourable members.
The Government has decided, therefore, to introduce a temporary Defence – East Timor levy for 2000-01 only. This levy will be applied as an addition to the Medicare levy on the income of taxpayers earning above $50,000 per annum.
The levy will be set at 0.5 per cent for taxpayers with an income of between $50,000 and $100,000 and at 1.0 per cent for taxpayers with incomes above $100,000.
There will be appropriate shade-ins to smooth the impact on taxpayers just above $50,000 and $100,000.
The levy will apply only for a 12-month period from 1 July 2000, ending on 30 June 2001.
Applying the levy on incomes above $50,000 will protect low and many middle income earners. The levy will begin on the same date that tax cuts begin under the Government’s tax reform. It will reduce only slightly, and then for one year only, the tax cuts that those taxpayers will receive. For example, a single taxpayer with an income of $60,000 would receive a tax cut of nearly $62 per week and the levy would reduce that for one year only by about $6 per week. With this approach, 80 per cent of taxpayers will receive their tax cuts in full from 1 July 2000.
The levy will collect approximately $900 million in 2000-01. That sum will substantially cover the East Timor defence costs arising in 2000-01. After 2000-01, the East Timor defence costs can be absorbed by the budget whilst maintaining strong surpluses.
The community, I hope, will support this measure as a fair and reasonable one to help fund the bulk of our defence costs relating to East Timor in 2000-01.
The only alternative to this special and temporary levy would be further cuts in government spending.
Given the expenditure savings of earlier years, the necessary funds of approximately $1 billion could not have been obtained without paring back in essential areas of social expenditure such as health, education and welfare for the needy.
The Government does not believe it would be fair to do this. The levy I have announced is the fair and decent way to deal with this unexpected budget difficulty in the next financial year.
There will of course be other requirements for Defence that do not relate to our involvement in East Timor, such as completing the submarines and other procurement decisions. These will be considered in the normal budget process and in the context of next year’s Defence White Paper.
Australians from all walks of life have responded sympathetically to the suffering of the East Timorese people, and I want to acknowledge the great willingness of so many individuals and organisations to help in different ways. In particular, Australian NGOs, including the churches, have played an important role.
Australian business can also play an important role. The Government convened a meeting with business groups and aid agencies in response to the strong interest from the business community in helping with reconstruction. I warmly welcome the contributions already made or foreshadowed by the timber, construction, power and pharmaceutical industries.
The Northern Territory government has also provided valuable support. Darwin will continue to serve as the principal logistics base for UNTAET in the period ahead.
East Timor’s resources are limited. Now that it is entering the phase of reconstruction and nation-building, it will need a great deal of international support. Australia will act generously but we cannot carry the full burden alone. The Government is encouraging others to make substantial commitments.
Even with international help, however, East Timor’s future prosperity can ultimately be assured only by the East Timorese themselves.
Only they can put in place the democratic, transparent and accountable political and economic institutions on which a viable state can be created.
I was pleased with the approaches Mr Xanana Gusmao laid out in my meeting with him in October. He is realistic about the challenges facing East Timor. His commitment to pursuing reconciliation is encouraging, and we hope he will work closely with UNTAET. He understands the importance for East Timor’s future of a good relationship with Indonesia.
President Wahid’s readiness to meet Mr Gusmao in order to lay sound foundations for the future is very welcome.
Australia’s own relationship with Indonesia has been under some strain because of East Timor. Now that East Timor’s status has been resolved, both sides can move on.
Australia and Indonesia are neighbours, and it makes sense for us to cooperate closely. Australia has long been a good friend to Indonesia, and we gave it strong support during its recent economic crisis.
Indonesia has a new, democratic government, and an elected president who has a record of commitment to human rights and tolerance, and to economic and political reform.
Both countries have important interests in common. I am confident that on the basis of mutual respect both of us can build a mutually advantageous and pragmatic relationship.
Let me conclude by again expressing on behalf of all Australians the immense pride we feel in the contribution of the serving men and women of Australia now in East Timor. The success of the operation thus far is a tribute to their skill and professionalism. They were well trained. They are superbly led, and each day they bring great credit to this country and to those values in which we all believe.
Although casualties have to date been thankfully limited, we continue to share the anxiety of family and other loved ones here in Australia for the safety of those serving in East Timor. We wish them all a safe return home. | 2019-04-23T10:42:20Z | http://australianpolitics.com/1999/11/23/howard-introduces-levy-to-pay-for-timor-commitment.html |
Today is my last regular Sunday blog before the opening of pro football season. There’s no real significance to this, except that I have always suspected my blog posts may suffer a bit from constant scoreboarding distractions on NFL Sundays. So enjoy this last gasp of undistracted attention while you can!
I mean to cover a few X Change topics in the coming weeks, but before I go there, I’ve also been meaning for several months to blog on Akin Arikan’s book Multichannel Marketing. And since his book fits in well with my upcoming presentation at IMC Vancouver, I figured this is a good opportunity to plug that as well.
I’m speaking on Sept. 11 at the IMC, and I’m going to be presenting on “Establishing a Coin-of-the-Realm for Online Advertising.” It’s a topic that been on my mind since last year’s X Change, and I’ve just finished building the presentation. I’m sticking to my philosophy of never giving the same presentation twice, so it’s completely new stuff (I’ll have two new presentations for D.C.’s eMetrics as well). In the presentation, I start with what it means to have a “coin-of-the-realm” in online advertising and why it’s important. In the second part of the presentation, I lay out a fairly comprehensive set of success and cost types necessary to truly measure site value. For each success type, the most significant measurement challenges are briefly discussed. Finally, I show some examples of the reporting and modeling that can be developed if you’ve done your homework around both cost and value in the online realm. If you’re interested in getting a copy of the presentation post-IMC, just drop me a line (I figure attendees deserve to see it first)!
I don’t actually do a great deal of business-book reading. Unlike my colleague Phil Kemelor who’s doing a short-series of book reviews on his blog and - surprise - also tackles Akin's book, I rarely read books on business or web analytics. It’s not for lack of reading. I’m never without one or two books in hand, and if you look for me at conferences you are as likely as not to see me in a corner with a book. But the chances are heavy that it will be a novel – or failing that a book on philosophy, history or science.
I won’t say business books bore me (though they often do). But I spend a lot of time working. I tend to think of reading as my leisure time. And, like most of us, I do a lot of online business reading. I find that many a business book is a bloated tome from which the core kernels of thought have long since appeared in much abbreviated and more intelligible form in articles, blogs, or even presentations.
So I probably wouldn’t have read Akin’s book if he hadn’t sent it to me for review. If you are inveterate reader like me, you know that any book you actually have on-hand will sooner or later get read! And in this case, I’m glad enough I made the effort.
Akin’s book bridges two worlds – web analytics and online measurement and traditional offline marketing and the research techniques that commonly support it. During the past twenty years, I’ve lived both worlds, and I can appreciate how difficult it is to bring them together intelligibly. Akin does it.
I can imagine his book being read by an offline practitioner as an introduction to online metrics and how the techniques, metrics and measurements both apply and change in this new world. Perhaps even more, however, the book is intended for online marketers and analysts who are faced with multi-channel problems and have never been exposed to the range of analytic techniques prevalent in the offline world.
Naturally, I read with particular attention Akin’s overview of web analytics.
I generally hate overviews of web analytics. There is no more difficult task in education than to simplify without mis-representation. I’ve complained more than once in this blog that some of the leading figures in web analytics have consistently failed in this task (which I admit to not even attempting). Akin’s relatively brief introduction is thorough and consistently accurate. His discussion of KPIs and segmentation, his treatment of complex issues like cookies, and his overview of campaign tracking mechanisms are all spot-on in tone, accuracy and brevity (the last of which I also admit to not even attempting). Even better, Akin consistently deals with key error points. His discussion of web analytics highlights the difference between correlation and causality and at nearly every point manages to highlight both the possibilities and potential problems inherent in an analysis.
If you are an experienced online marketer or analyst, I doubt there will be anything really new here – but if you are looking to give someone a short, to the point and consistently well-thought-out introduction, Akin’s overview chapter on web analytics will very much fit the bill.
For that selfsame experienced online marketer, it is the rest of Akin’s book that will be most interesting. Multichannel Marketing covers both direct and brand marketing techniques in introductions similar to that provided for web analytics.
The book then dives into a series of chapters that cover measuring lift, online and offline interactions, and multi-touch conversion attribution. All of these are critical issues and Akin provides an excellent overview of each. Media mix modeling is, I think, the next great frontier in web analytics – and it’s a discipline that nearly every online agency is rushing to understand. Attribution is one of my particular interests and something I’m doing work on right now. Akin not only gives the reader a sound overview of attribution, he discusses a full range of attribution models: most recent, first, fractional, multiple, weighted by recency, weighted by scheme and custom weightings.
Multichannel Marketing isn’t the sort of book that will give you detailed information about how to build these attribution schemes in a web analytics tool. That’s the kind of stuff I might tackle. Multichannel Marketing is more general than that. What it will provide is a great overview of a set of critical multichannel marketing issues along with a comprehensive view of the plausible solutions and programs you should be thinking about it.
The same approach holds true for the last (and I think most powerful) chapters of the book - multichannel marketing methods. These three chapters cover acquisition techniques, engagement and conversion, and growing lifetime value. Not only is the emphasis on the complete customer life-cycle salutary, Akin lays out a rich set of both marketing and measurement options in each chapter. In the chapter on engagement, for example, Akin covers a whole set of remarketing triggers: from offline product return to direct mail offer expiration to the classic online process abandonment. As with most of the book, you may find that your online or offline bias will make some of these options seem obvious and others completely revelatory. Even if you’ve been very aggressive in multichannel marketing and measurement, I’d be surprised if these three chapters don’t spur at least a few: “I should be taking a look at this…” moments.
The two days of X Change are, for me, the most enjoyable and the most tiring of the year. In our second year, the Conference was a little bigger, much smoother, and, for us at Semphonic, every bit as exhilarating. I had so many good conversations that I can hardly keep track.
And, of course, the role, reason and central concept behind X Change is to foster good conversation about web analytics.
Good conversation can come at any time and in any place – sometimes in the most surprising ways and places. But if you can’t always predict when good (or bad) conversations will occur, there is much you can do make your odds better.
What makes good conversation a better bet? I think it’s having people you are both comfortable with and excited by. In designing X Change, we try to make sure of both.
Creating a level of comfort with each other is no trivial task for any Conference. To create the right atmosphere for X Change, we try to eliminate the elements of discordance. That’s why there are no sales presentations at X Change. No pitching. No sponsorships. No over-lunch speakers. No booths. No sales hand-outs. It’s also why we try so hard to bring together a group of true peers. At X Change, we aren’t looking for Junior Analysts and we aren’t looking for C-Levels to attend. We want senior web measurement people because we know they will share similar problems, concerns, and business interests. Without comfort, we are all wearing our business masks – showing only our successes and speaking as if we know everything. But when we grow comfortable with each other, a truer world emerges where we can talk to our problems and struggles.
Comfort is also why we tried so hard to build the right atmosphere. Good food and good wine and good chairs do not produce good conversation but they certainly don't hurt. Reviewing the comments back, most everyone seemed delighted with the Ritz. The service, the food and the pampering made going home almost hard – even for a committed homebody like me. One or two people even noted that perhaps it was too much good food and good comfort. I get that – not that I would take a single biscotti back. X Change isn’t about great rooms or nice pools or even a good massage and an ice-cream sundae. I’m not sure that I’ll put X Change in a five-star hotel every year. But I am committed to making every X Change experience truly special in every respect – because I think that great experiences will bring the best people to the event.
And having the best people is what it’s all about. Comfort can just as easily be soporific, which is where my second element - the excitement - comes in. I believe that anytime you bring together a group of truly talented people, they will create a special kind of excitement. There is a fermentation, an intoxication even, in being surrounded by others deeply interested and highly accomplished in a shared topic or profession. This single idea is really the guiding principle behind X Change – to create a place and a time where we can come together in common ground and let loose our ideas.
That’s what I believe we accomplished.
As I expected, I have a whole set of new topics to think about and new ideas that emerged from my conversations at X Change (plus my usual set of ideas on what to do even better).
But for now, I just want to thank the many, many people involved: the whole Semphonic team (and especially Barbara and Grace) for making everything so smooth and worry-free; Eric Peterson who is never less than a pleasure to work with; our Huddle Leaders – who were diligent, thoughtful, witty and deeply committed; our vendor experts and consultants who consistently buy-in to the soul of the event; and, of course, to all the attendees. In my (brief – I talk much shorter than I write) opening remarks, I made the point that at X Change, the conference is really in the hands of the attendees. The conference is a success or failure based on the conversation and contribution of all the attendees. Thank you all!
For many years, marketing professionals have relied on a set of analysis techniques designed to help them understand the demographic and psychographic profiles of their customers and prospects. These traditional segmentations are usually derived from complex clustering techniques that map rich primary research data (usually survey based) into common groups or profiles. These groups are then given highly descriptive business names and rich descriptions and provide a framework for a wide range of marketing activities. Though such segmentations can be (and are) applied to online customers, companies that have tried to map these segmentations down to the individual level (for targeting or reporting) in the online world have mostly been disappointed. In Part I of this series, I described the biggest pitfall in extending these segmentations – the near impossibility of mapping demographic and psychographic profiles to visitors about whom we typically know nothing except their online behavior. In Part II, I discussed the advantages and disadvantages of building a behavioral segmentation. In Part III, I covered different strategies for joining survey data to a behavioral segmentation, when each is appropriate, and why the join is necessary at all. In Part IV, I covered basic data transformations for segmentation – focusing on describing visitor-level topic interest. In Part V, I described a Functional approach to building session profiles – and how these session-styles lend a whole new dimension to behavioral segmentation. In this post, I’m going to talk about time-based attributes and how they can be captured either inside or external to the segmentation.
One of the interesting problems posed by behavioral segmentation is that behavioral profiles introduce an element of time into the analysis in a way that is fundamentally different from that captured in traditional demographic and psychographic analysis. It’s true, of course, that age is one of the most powerful demographic variables and it necessarily evolves over time (as can income, zip, attitudes, etc.). But for marketing purposes, all these variables are treated effectively as a snapshot because the rate of change is too slow to impact any marketing decisions or analysis and because the changes are fundamentally exogenous to the business. Neither is true for the variables in a behavioral segmentation.
When you build a behavioral segmentation, you are necessarily relying on a snapshot in time – and the length of that snapshot will have a profound effect on the nature of the segmentation. A visitor segmentation around 1 visit will be fundamentally different that a segmentation around 1 day, 1 week, 1 month, or for lifetime tracking. Nor is there a single right answer about the best time-frame for a visitor snapshot to drive a segmentation – the most interesting length is heavily dependent on the shape of the business, the goals of the analysis and the infrastructure for tracking.
For cookie-based visitor segmentation, there is also a finite duration of time in which enough visitor behavior can be consistently tracked to drive a meaningful analysis – and that time period is usually no more than 2-3 months.
What’s challenging, from an analytic perspective, is the mix of potential visitor types that any extended time-frame will create in a segmentation. Visitors may be new – arriving at the very end of the segmentation period and having no chance for additional behavior. Visitors may have been new at the beginning of the segmentation period and never have shown additional behavior. They may already have been long-standing visitors at the beginning of the segmentation period and remained constant throughout. Or visitors may have been heavy users at the beginning of the segmentation period but gone inactive as the period progressed. And so on – through an infinite series of possible changes in behavior.
Each of these types of visitors are quite different in nature – and different in ways that can shape the analysis and cause it to miss the mark unless at least some time variables are captured in the mix. In particular, the relationship between # of visits (during the period), visit # (lifetime) and start date turns out to be almost universally important.
The analyst will need to think carefully about the role of time sequencing in the segmentation. For many a prospect segmentation, the analysis period will often capture several generations of the sales-cycle. So a snapshot view can be quite effective in capturing the various permutations of interest and success that may exist.
But for a customer site (trading, operations, banking, support, etc.), a snapshot view that takes little account of time sequence may be a very poor choice. For sites where virtually all behavior is oriented toward long-time repeat visitors, capturing the movement of behavior is all important.
There are two strategies for capturing behavioral movement: one intrinsic to the segmentation and a second strategy that is external. In the external strategy, the segmentation is typically done on a relatively short time frame and the movement of visitors is captured by recording their flow to and from segment classifications. Using this method, visitors are profiled in terms of what they are doing right now. But one of the most interesting uses of this data is to track the flow of visitors (both individually and as an aggregate) from and to segments.
Most high-level traffic numbers are heavily influenced by both acquisition flow (new visitors) and patterns in repeat behavior. Isolating the usage flows of repeat visitors is difficult to do in most web analytic reports – but it's easy and illuminating when done within the context of a broader segmentation scheme.
This "external" strategy for segmentation consciously leaves out the role of change from the segmentation scheme, but change can also be baked into the profiles as a fundamental aspect of understanding visitors. In this method, the goal is to create profiles that capture some of the key evolutionary stages of visitors. To do this will typically require either different analytic techniques or – once again – some significant data transformations.
Visitor ID, Interest Variables, Session Variables, Period 1 Interest Variables, Period 1 Session Variables, Period 2 Rates of Change, Period 3 Rates of Change, etc.
With this type of data, an analysis will capture key elements of how behavior evolves over time. In addition to obvious patterns like steady growth, decline, and attrition, patterns like sustained but sporadic usage, seasonal users (the capture of which generally requires additional data transformation), and repeated plateaus may all emerge. It’s critical that these periods be relative to the visitor start – not segmentation start.
Mapping the data to visitor start creates much better analysis around patterns of usage but it also introduces some significant complexity. If you are looking for seasonal or event-driven patterns in the data, you will have to specially code for these – since they will not emerge out any analysis of periodicity. Indeed, where strong seasonal or event patterns dominate behavior, it can be exceeding complex to handle both over-time usage and the impact of when/how a visitor started.
As with my previous discussions of data transformations around mindshare and session-styles, this post can hardly more than scratch the surface of the issues and opportunities involved in capturing elements of time and usage in a behavioral segmentation. I hope, mostly, to suggest the potential richness of this type of variable and its potential contribution to segmentation and analysis. For a segmentation of a long-term customer web site, there are few more interesting facts than the nature and degree of visitor change over time. Segments built to include such data can inform a range of tactical and strategic marketing decisions precisely because they represent some of the most salient aspects of your relationship with a web site user!
X Change is just a week away now (thank god!) – so I’ll probably be posting about the conference in the next week or two. I know last year’s event gave me lots of stuff to talk about – some of which I never quite got around to. I’m sure this year’s version will be at least as fruitful and I can always hope that I'll be more productive. But I’m far from finished with a discussion of behavioral segmentation. I’ve touched on a range of data transformations in these last posts. When I take this series up again, I expect to cover some of the issues surrounding presentation of the data and techniques for making behavioral segmentation more intuitive and accessible.
Be sure to check out the interview with Charles Schwab’s Dennis Bradley – run on Manoj’s blog (http://www.webanalyticsworld.net/2008/07/x-change-interview-dennis-bradley-of.html) since I'm pretty sure Manoj gets wider circulation than I do! I’ve worked with Dennis for more than a few years now – and it’s always been a pleasure. His practical, common-sense approach to measurement is refreshingly realistic and always productive. If you're managing a serious enterprise measurement effort, Dennis is someone you really want to talk to. Check out his X Change interview and I think you’ll get a great sense of how enjoyable and useful his Huddles will be!
For many years, marketing professionals have relied on a set of analysis techniques designed to help them understand the demographic and psychographic profiles of their customers and prospects. These traditional segmentations are usually derived from complex clustering techniques that map rich primary research data (usually survey based) into common groups or profiles. These groups are then given highly descriptive business names and rich descriptions and provide a framework for a wide range of marketing activities. Though such segmentations can be (and are) applied to online customers, companies that have tried to map these segmentations down to the individual level (for targeting or reporting) in the online world have mostly been disappointed. In Part I of this series, I described the biggest pitfall in extending these segmentations – the near impossibility of mapping demographic and psychographic profiles to visitors about whom we typically know nothing except their online behavior. In Part II, I discussed the advantages and disadvantages of building behavioral segmentations. In Part III, I covered different strategies for joining survey data to behavioral segmentations, when each is appropriate, and why the join is necessary at all. In Part IV, I covered basic data transformations for segmentation – focusing on describing visitor-level topic interest. In this post, I’ll cover using Functionalism and Session-Analysis to try and capture how a visitor uses a web site.
The most common web behavioral transformations capture the amount of usage a visitor has on a web property (total page views, visits, time, etc.). Transformations based on the content taxonomy capture another critical dimension – a visitors topic interests. But there is a third dimension of a visitor’s site usage that is poorly captured by either of these; namely, the type of session(s) a visitor has.
A visitor’s type of session encompasses a whole array of interesting questions and facts: was a visitor browsing or looking for specific information, was a visitor confident about where to go or confused, was the visitor concerned about the company/brand or confident, was the visitor in early shopping stages or later-stages, and many more equally important facts.
These may seem impossible to infer from purely behavioral data, but, with the proper data transformations, many of these types of behaviors will emerge quite clearly in a visitor segmentation. The key is having a rich non-topic site taxonomy that describes the role different pages play on the site. For this purpose, we use Functionalism.
Functionalism is a powerful, general-purpose public-domain methodology for understanding how to measure the pieces of a web site. In concept, it’s quite simple. When you build a web page, you have a purpose in mind for it: getting visitors to the right place on the web site, convincing a user to buy, getting a user through a conversion process, re-assuring a user about your company, providing generic information about a product or service so a visitor doesn’t leave your site to research, saying thank-you for a lead or purchase, etc., etc.
These roles are captured in Functionalism as a set of functional types – Routers, Convincers, Converters, Re-Assurers, Informers, Completers, etc. And for each functional type, we have a corresponding set of appropriate measurements designed to capture how well that page is performing. Simple.
These two sessions contain about the same number of pages – but they are dramatically different types of sessions. How do we know – and more importantly – how can we capture the difference in a way that a formal analysis will understand?
In the first session, the user has navigated across the site and only dipped into each area. This is a classic “unfocused browsing” visit. In the second session, the user has moved immediately into an area of interest and spent the entire time in the sales pages for that area (“directed interest”).
In the first session, the pages are about Mutual Funds. In the second session, the pages are about specific products offered. The difference might not be well captured in a taxonomy (site content categorization) but is completely encompassed in a functional description.
It’s possible, of course, that one could build a site taxonomy that captured both these variables in a single place. But in general, it’s cleaner not to. By separating out function and topic-interest, you get taxonomies for each that are clean and powerful both individually and in combination.
The obvious data transformations based on Functional Type include simple counts by page type, total time by type, and avg. time by type. But treating these variables as visitor-level roll-ups can miss one of the most interesting facts about a visitor – the extent to which their sessions are homogenous or diverse.
To capture this, you need to profile each session and then aggregate session types at the visitor level. Profiling sessions can be done with an independent session-based segmentation (useful in it's own right) or by simple rule-based classification. Either way, what you’ll aggregate at the visitor level is a count by session style.
Counts by session style are interesting because they capture two different things about a visitor – their most current state and the mix of sessions they exhibit. For shopping and lead gen sites, this mix of sessions can help re-segment and classify visitors as they move through a sales cycle. For media sites, the mix of different types of sessions a visitor has help define how broad a visitor’s engagement with the web property is. This information is also useful for customer data warehousing. Saving the most current session style as well as the session style counts for a visitor is a remarkably efficient way to capture visitor life-cycle and potential messaging opportunities in the customer data record.
The mix of pages is not the only interesting data transformation that relies on a functional taxonomy (though I’ve only touched on some of interesting mixes – depending on the site, the mix of re-assurers / closers, engagers / routers, completers / converters / convincers, closers / convincers, informers / routers, and more might all be significant). Another interesting variable is the amount of time spent on a router page for a section relative to the amount of time in articles or convincer pages.
Comparing the amount of time that different visitors spend on a single router page is equally interesting - because it can be a measure of how directive the visitor is. Short router-page times generally signal that a visitor knows what they are looking for. Longer times generally mark-off visitors who are less focused or experienced with the site.
So time spent by page classification and the ratios of time spent by page classification both turn out to fairly powerful segmentation variables.
In the Functional paradigm, Internal Search is considered to be a special type of router – and there is another data transformation that can help sharpen a visitor segmentation for internal search users. We like to sub-classify Internal Searchers by grouping searches according to broad keyword categories. Typically, we’ll also try to identify popular searches that are “broad” and classify all other searches as “directed.” For the segmentation, we’ll classify the Search Results page as either Broad Routing or Directed Routing based on this keyword classification (which also allows us to record an interest taxonomy view for the search). If we don’t have the ability to do this, we’ll generally classify search as a Directed Router.
Most media sites include some type of role-based taxonomy (Home page, Tool, article) – even if isn’t as rich as the full Functional specification. For other types of sites, this is usually missing. It’s obviously a convenience to have this information flow through in the tagging, but it’s hardly what we expect. In most cases, the analyst will to overlay this data on the raw feed as one of the data transformations. It’s a fair amount of work for larger sites, but the results are worth it. It is in the cross-matrix of visitor interests and session-styles that most of the truly interesting profile facts about visitors actually emerge.
Adding these session-style profiles to a visitor segmentation is where behavioral segmentations really begin to diverge from traditional psychographic ones. The nature of the information becomes fundamentally different (in a way that isn't true for topic interest) and the richness and actionability of the data is greatly enhanced. These types of variables help make behavioral segmentation a powerful tool for subsequent web analysis of every sort since they capture the fundamental engagement styles users bring to the mechanics of web navigation.
In my next post, I’m going to cover more data transformations – focusing on ways to capture time-based elements in a visitor aggregation. | 2019-04-23T13:50:53Z | https://semphonic.blogs.com/semangel/2008/08/index.html |
Episode 25: Jim Stoppani on Daily Full-Body Training, Fasting, And More. Dr. Jim Stoppani brings plenty of energy—and plenty of gummy bears—to the recording studio. He's been espousing the virtues of full-body, near-daily workouts in recent months, and says it could just be the best training technique out there—if you do it right. He also goes deep into the science and practice of intermittent fasting, which allows him to stay lean and energetic well into his fifties!
How he's able to stay lean without "cardio"
Nick Collias: Nick here. Just wanted to tell you about a sweet new workout on Bodybuilding.com. Now, you may have done timed sets in the past like squats for 30 seconds straight instead of five or 12 reps per set. And if you have, you know that it's uniquely intense but it's also just a really different training experience.
Plenty of people find that they can do more reps, more total work, when they're not being told when to stop. So, how about this? You just set the timer for four minutes and see what you can do. That's the idea behind Jim Stoppani's Four Minute Muscle Protocol. Just go to: Bodybuilding.com/FourMinuteMuscle to learn more and see the full body workout.
Welcome to The Bodybuilding.com Podcast, everyone. This week we're nearly hair-free.
Nick: I'm Nick Collias. I'm an editor for Bodybuilding.com, as is our co-host, Heather Eastman.
Nick: Over there across the table we have none other than Dr. Jim Stoppani. He's the owner of JYM Supplement Science, a researcher, author, the man behind Shortcut to Size, Shortcut to Shred, Shortcut to Strength. You've been an author a whole bunch of different places, written many, many articles for Bodybuilding.com, as well. Great to have you here.
Nick: More recently, Jim has been doing something pretty unique for the site, even though these aren't necessarily the same sort of workouts that people who follow our site are always accustomed to doing. They're full body workouts. Something I hear you talking about a lot these days and I want to chat with you about that and kind of put it in context of where this fits in the progression of you as a lifter and a researcher.
Jim: Yeah, it's an interesting progression. I've been training since I was seven years old maybe even younger. I've literally been training all my life. My father built quite an impressive home gym.
Jim: Yeah, I wanted to hang out with my dad. He had the Muscle & Fitness magazines, back then it was Muscle Builder, not even Muscle & Fitness. I would read the magazines and learn about what exercises hit different muscle groups. Then I started learning about muscle fibers and I thought, "Wow, there's a whole science about how to make muscles bigger and stronger."
Nick: What were the first sorts of plans that you followed when you said, "All right that's it, I'm going to go and I'm going to lift some weights?"
Jim: I followed like the Joe Weider, the Arnold Schwarzenegger workouts. I would follow the diets and muscle ... I would cook, make my own meals instead of my mom's meals because I wanted to get a certain amount of protein and a certain type of carbs. I've been doing that for quite a while and the nice thing is, it's not only have I been doing it in the gym, but I've also been studying it in the lab, consecutively, at the same time.
What it's allowed me to do is, prior to being known as the guy behind the Shortcut series, and "Encyclopedia of Muscle and Strength" book and the science editor, I was researching what was happening in the lab and trying to connect what's going on at the level of the gene and how to apply that to results in the gym. I studied with people like Dr. Bill Kraemer who's well known for hormone production, testosterone, growth hormone following exercise.
We used to study what we call endocrine function, meaning hormone is released like testosterone from the testicles or growth hormone from the pituitary gland, travels to the muscle, and the anabolic hormone instigates muscle growth. We soon realized that we don’t have to rely on things from the blood, the muscle itself is making changes that are changing muscle size, muscle strength, so there's local factors going on.
That's when I started realizing that it's not about these systemic changes, but there's more local things going on in the muscle fiber. I got interested in gene regulation and so ended up doing a post doc after University of Connecticut School of Medicine where I was studying gene regulation and metabolism and exercise, what happens when you fast to metabolic genes. Speaking of fasting, I was actually studying fasting in 2000 and I know that we'll be talking more about that in a minute.
What always stuck with me was the activity of genes and how critical that was for all the changes that occur because that's what makes the proteins. When we think of protein, we think of protein being the building blocks of muscle. Well proteins actually are functional. There's functional proteins in the body like hemoglobin, which carries oxygen to the blood. It's a functional protein. Insulin is a protein, it's a functional protein. It's not a building block for muscle, it's literally a molecule that has a function in the body. That's a protein.
We need proteins and those proteins are regulated by the genes. It started occurring to me that the way to really get results, whether it's fat loss, muscle growth or strength, it's to keep activating those genes because they're driving all the messaging. I started looking into more frequent training and started realizing, going from ... Most people will get once a week training. Like Shortcut to Size, I even train once a week. You hit chest one day and then you don't hit it again till the next week. That's a recovery-based training where you go in there, you annihilate a muscle and then you give it seven days.
Well here we're not going in and annihilating muscle, all we're doing is going in and instigating gene activity, but every day we're turning it on. Instead of going in once a week and turning on those genes and then you get gene activity that rises, then it falls, then you wait seven days, then it rises, you're hitting it again while gene activity is already up before it's dropped back down.
What I'm trying to create is like a staircase, a fact where instead of letting it drop, if we hit it again, can that activity be enhanced even further than the initial response because you're hitting it again before it's down. We don't really know that, but based on some of the results I'm seeing ... Theory is great. Being a real bench lab scientist, I understand theory is good, but theory doesn't mean much. You can debate whether you do cardio before or after, or cardio on a separate day. Shortcut to Shred what do I show you? Do cardio right in the middle of your workout.
Jim: Right there, right in the middle. Before or after, no, how about during? Think people, all this theory doesn't mean anything if it doesn't produce results. How can you tell me that, "you shouldn't be doing cardio around weight workouts," when I can show you how many thousands of people who have lost weight, broken their PRs and gained muscle while they were doing cardio during their workout.
That's nice, you have a theory about when you should do cardio, Mr. Expert, but here's thousands and thousands of people seeing real results. If you think doing cardio during the workout is stupid, how can you explain the results? The results are really all that matters and so what I started finding was that doing more frequent training, daily training, is really the key to keeping the activity of metabolic genes up so that you burn body fat.
For example, I just did a photo shoot where I'm about 4% body fat. I had four surgeries done through February and March on my knee, one knee. I haven't done any cardio since January. All I do is full body training with zero cardio and I'm 4% body fat because I'm keeping my genes activated all day. I'm burning fat and carbs like a machine.
Nick: That was one question I had, is yeah, you can talk about thousands of people having the results, but we're talking about you, too, an advanced lifter because one of the great knocks that you hear against full body training is, "That's phase one stuff."
Jim: It really is. What's really interesting is that we typically recommend it for beginners. The reason we do that is because the beginner's adaptation to weight training, the first few months is mainly neurological. It's all learning how to fire nerves, that's how they get stronger. You really don't start building muscle until a month or two ... It's really about neurological changes, so frequency matters. You wanna do the bench press three times a week, not once a week.
Jim: Get the best results and make it realistic. I'm not a food Nazi. I love to eat. I love to drink. I like to enjoy myself. What's the point of being healthy and active if you can't enjoy food, you can't enjoy yourself and have a good time?
Nick: Your latest workouts reflect that, too. They're almost like you recommend categories. It's not like, "No, you have to do this movement." It says, "Pick from the list. Do what you can."
Jim: Yeah, exactly. There's no excuses. That's the thing, everybody ... What I try to show people is, it's really not that hard. You know what I mean? It's really not that hard to be more active and eat smarter. It really isn't. What I try to do is take the science, but then don't complicate it and talk about PPAR and activity, this gene and talking over everybody's heads in the science but, how do we then take that information and make it make sense to a 16-year-old kid, who can then go and say, "Oh, that means ..." Or someone who dropped out of high school and is 35 and doesn't have the highest IQ.
Can they understand how to follow my program and can they learn from it? I don't want to just give them a fish, I want to teach them how to fish. That's the whole point. Well, here yeah, you can follow this as I tell you to and get awesome results, but if you listen to why I have you doing this, you can then take that and create your own workout when you go to the gym and there isn't a leg press. You'll be able to go, "Hey, I'll just do this." That's sort of the message I try to teach people.
You don't have to food prep. You could go to any restaurant you want and order ... Trust me, you can go to McDonald's and find something to eat. That will be on any diet, whether it's paleo, your intermittent fasting ... Any diet you can go to almost any restaurant this day and age and make a food choice that will allow you to stay within that range. It's just making smart choices. My goal is to just simplify it for people, make it easier. Really, that's what the JYM line is.
I was telling people, "Buy creatine, put this much in. Buy beta-alanine, put this much in. Buy branched-chains, put this much in-"
Nick: I remember, we had one. "Jim Stoppani Tells You How To Make Your Own Pre-Workout." That was a huge article.
Jim: Here, now you can have it all. You don't have to buy them all. It's simplified and makes it easier. That's really the goal because it's my goal. Nothing makes me happier than going into a Starbucks and seeing them sell salami and cheese in a prepackaged ... Like, "They're finally getting ... People are finally getting the protein."
Jim: Or the eggs, "I can go and buy hard-boiled egg. Oh my God, at a 7 Eleven? What do you mean? I don't have to stick to the Slim Jim? I can actually get an egg or a yogurt or a string cheese?" I love that. That convenience factor, that ... It used to be convenience for the average Joe. Now we're getting more convenience for people who want to live better and live healthy.
Jim: That's the thing. There's research that shows it enhances fat loss. I'm living proof. Like I said, I had to stop doing cardio and I'm leaner than I've ever been. I'm in the best shape, except for my right leg, the fact that I can't do certain things yet, but I'm literally in my best physical shape now during recovery just because I stuck with the whole body training.
Nick: That was gonna be one of my questions was, what cardio works best if somebody thinks ... They can't get out of that cardio mindset.
Jim: You can still use my cardio acceleration. You can do that in between sets. You can do tabatas after or in between exercises. Again, think outside the box, add it when you want. It's really not that hard.
Nick: Looking at some of the workouts you've been putting up recently, they look like they would have serious cardiovascular demands inside the workouts.
Heather: Yeah, so he's staying in aerobic the entire time.
Jim: It's an intense workout.
Jim: Yeah, you're going for four minutes straight.
Heather: I haven't tried it yet but that looks brutal.
Jim: ... but it's not like what you think of. It's like cardio acceleration, where you're like, do swings, do step ups, run in place. It doesn't have to be cardio to have cardio benefits, what we typically think of cardio. The best cardiovascular benefits are from high, intense interval training, not from long distance running.
Jim: Exactly, that's what it is. What do you do? High intensity exercise, followed by rest. High intensity exercise, followed by rest. That's high intensity interval training.
Jim: That's what weight training is.
Heather: I feel like I'm getting a cardio workout right now.
Jim: Weight training is essentially ... I love that meme, they have the old school boxer guy and he goes, "What do you mean cardio?" It's like, "Cardio, you mean lift weights faster?" Seriously? I know it's a funny meme, but that's really true. Yeah, you can use weights as your cardio. Kettlebell swings are a perfect example.
Nick: I'm glad that we always bring it back to the kettlebell if we can.
Heather: Yes, Nick and his kettlebells. Can we delve into intermittent fasting? We had a really … we touched on it. Jim, I'll let you go ahead and tell us what you're doing and how you got into it.
Jim: Yeah, but I've only started doing it myself because my main concern was muscle mass with the fasting.
Jim: For example, I don't think I know one professional bodybuilder who uses intermittent fasting. When you consider these guys have to maintain, regardless of what they're using to maintain that muscle mass. To maintain that muscle mass, their eating pattern ... There's no way they could maintain it.
Nick: Right, it's force feeding more than it's intermittent fasting.
Jim: When you look at it from that standpoint, anybody who's interested in muscle is like, "I don't want to go ... I'm gonna wake up in the middle of the night and eat."
Nick: Shake by the bed, that's the classic.
Jim: I recommend casein protein before bed so that you have a trickling effect of amino acids so you're essentially not fasting. We've been talking about how to stay in a fed state almost, for anabolic reasons. That's really why I avoided doing it personally. I knew the benefits for fat loss. What the benefits are in the lab is what we've shown, is that most people think when you starve, your metabolism slows down. It does, but that's with long term, where you're not refeeding or you're dropping carbs long term. Calories or carbs for a long period.
If you're starving yourself for long, yes, your metabolism is gonna stall. If you are fasting and feeding, what happens is, during the fasting period, your body produces more of these uncoupling proteins. What uncoupling proteins are is, they basically poke holes in the mitochondria. The mitochondria are our energy factories in muscle cells. It's where fat and carbs get turned into ATP. That's what makes energy.
These uncoupling proteins literally poke holes, and the mitochondria changes concentration gradient, so you produce less energy, more heat. It's like a car engine. It produces heat and work. The more work it puts out and the less heat, the more efficient it is.
Nick: Starting at like ... What are we talking about? Like eight hours?
Jim: Yeah, but what we do find acutely is that the meal that you follow the fast with is important. When the fast was followed with a high protein meal, the production of those uncoupling proteins had another bump after the fasting. When it was a high carb meal, the uncoupling proteins were blunted, but they were still maintain higher than someone who's not intermittent fasting.
Nick: That's why you eat all these bears?
Jim: The way I do it is, I typically eat at 4 o’clock… and then I train in my feeding window. That way I have more energy. I can recover better so better performance, better recovery during your feeding window. At four o'clock, my first meal is Pro JYM. I have a protein shake. That's it. And then I train. So I train with just protein and Pre JYM.
I don't have carbs till after the workout's over, which is a good hour or so. On the days where in might train, let's say I train at 10:00 P.M. and I break my fast at 4, I'll still have just a protein shake or it'll be eggs and salad or fat. They'll be no carbs.
Nick: And it's no calories the rest of the time or is it just drastically-reduced calories?
Jim: Prior to four o'clock, no calories.
Jim: No, none whatsoever. You can drink fluid, water. I typically go with black coffee or unsweetened tea. Once in a while I might have a Coke Zero or Diet Dew, but I don't like to do the artificial sweetener because one of my concerns is that fasting is really a state of the brain, not just in body. You're literally tricking your body that you're fasting.
Well, there's ways to trick your body that you're fed. Leucine, for example. The molecule leucine, the receptor that attaches to it ... you ever heard of mTOR?
Jim: They're truly not fasting because they're telling their brain, "You're in a fed state." Now, they're fasting in the fact that they're not really consuming many calories so they're still getting benefits, but they'll get better benefits if you avoid the leucine. One of my theories with the artificial sweeteners is ... There's some data that shows, when the tongue tastes that sweetener, those receptors tell the brain, "Hey, sugar." It tricks the brain. That's what artificial sweeteners do.
In some cases, it's been shown to enhance insulin release, more so in animals than ... but, I'm still concerned that that sweet taste is telling the brain, "Hey, we're getting sugar," even though you're not. The last thing you want to do is trick your brain into thinking it's in a fed state accidentally by sipping a sweet, diet ... Even though it's no calories, that sweetness might signal the brain, "Hey, we've got plenty of sugar, meaning we don't have to use ketone bodies any longer. We can switch over, start increasing glycolysis. Let's change up the fuel sources that we're using."
Jim: Yeah, and what's interesting is that at the beginning you go like, "Oh, I can't think. I'm so lethargic." Then about two weeks after you're like, "Oh my God." Sometimes four o'clock rolls around, I have to force myself to eat.
Jim: Well, not even that I forget. I don't want to eat because when I eat, I feel lethargic. There's a lot of times that four o'clock rolls around where I have to force myself to literally eat. That's why sometimes I like just the protein shakes, because it gives me something I feel, but it's not like ... It's weird how you get used to it, because I travel and I speak a lot. It might be like I'll have to give an 8:00 A.M. opening talk somewhere. I used to think, "Oh, I'll have breakfast just so I'll have carbs and I'm sharper when I'm on stage ..."
Jim: ... And then I'm like, "I feel like crap. Why did I do that?" You know what I mean? Once you're used to it, if you actually feel better ... It's kind of funny, I was ... I can't remember who it was, but somebody was telling me, they were like ... I had my guy, it was post workout. They weren't even ... It was like a cameraman or something, "Can I just have some gummy bears? My blood sugar, I'm getting really shaky." And I'm like ... Alcoholics get shaky, too, when they don't have alcohol. You know how they fix the shakiness? They drink more alcohol.
The problem isn't that you need carbs, the problem is, you're eating too many carbs and that you cannot go long enough without them. Your body should be able to go a long time without feeling shaky. If it can't do that, it's due to your diet. Cut down on the carbs. You're so reliant on carbs that you cannot even go two hours. Are you kidding me? Without a meal? That's not normal.
Nick: We're just ritualizing our behaviors, too.
Jim: Exactly. He was just like, "Oh my god, it's been two hours. I need some gummy bears. I feel like crap." No, that's the last thing you need.
Heather: We were talking about that earlier where intermittent fasting of all the things I've ever tried, and I'm sure you've experienced this with your clients. It's one thing that can actually eliminate that dependency, that addiction. Whatever you want to call it.
Jim: Research show actually it enhances insulin sensitivity. The research on intermittent fasting is ... The health … I'm talking about the health benefits. Insulin sensitivity, better immune function. It fights jet lag. Did you know it fights jet lag?
Heather: I wish I'd known that two years ago.
Jim: Mountain Time. If you traveled, let's say ... Well, let's say you're in LA, it's Pacific Time and you traveled to New York, which is Eastern Time. Now, when the clock is claiming it's six o'clock and it's starting to get dark, your body is saying, "Hang on, why's it getting dark now? We've got three more hours." Then the next day it does and eventually your body finally goes, "Oh okay. I'm three hours faster," and catches up. Takes about a week or so, right?
Another cue we use is feeding cues because we're animals of habit. If you typically eat breakfast, lunch and dinner in reasonably … same time, those are cues that you use throughout your day. When you fast, you erase that food cue. It's almost like erasing the light cue if you could, if you could do that which you really can’t. It erases the food cue if you fast for at least 16 hours.
Then, if you have your first meal at the normal time, like LA, 4:00 P.M. When I'm in New York, I fast for at least 16 hours and I don't eat till 4:00 P.M. New York time. I eat that Pro JYM shake, my body goes, "Four o'clock. It's four o'clock." It's an extra little cue that fast forwards your body's adjustment to the new time zone.
Nick: It sounds like you are a seven days a week faster. Do you think that that is the best approach for somebody to follow? Because there are 5-2, there's every other day.
Jim: Yeah, I really don't eat that ... Probably only like 3,000 calories.
Heather: That's what I did.
Jim: You want to do those consecutive days. You want to do two full days, and ... There's a couple. You can do where you only do 600 calories. I prefer a full ... To get the true health benefits like the immune boost and the help with the jet lag and the insulin sensitivity, you want to do a full fast. You need to fast, you know what I mean? Fast.
It's two days, 24 hours and then the other five days you're pretty much loose to what you can eat. You have no time restrictions. Obviously you don't want to be eating pizzas all day, but you can be a little looser on those days because of those two days that you gave it your all where you literally ate nothing. Your reward is, "Now on these other five days of the week, I can eat any time I want, and within reason, pretty much what I want."
Jim: I've done that, too. I don't like that so much because I like the regular 16-8 fasting. I just think it's better to have that repetition versus two days and then full eating whatever you want.
Nick: One of the first guests that I had on the podcast was this great researcher named Dom D'Agostino who's done a bunch of work about fasting. I remember asking him, "Because you fast, do you think that makes you drink more coffee?" He kind of thought about it and he said ... He drinks a ton of coffee. He laid it out very calmly, but it sounded like this guy drinks like six pots of coffee a day.
Heather: What's wrong with that?
Nick: You're a caffeine guy.
Jim: I'm a caffeine guy. I own it. I wouldn't say it increased.
Jim: Like I said, the reason I never wanted to do intermittent fasting was because I was worried about the muscle mass loss. Now what's interesting is, there's new research showing that if you take a lean individual, and this is just using BIA ... Sorry, BMI.
Jim: That's how we measure water. Sorry but, we're doing a study on, when I manipulate my water levels ... Sorry. It's a testing method but, BMI, Body Mass Index. They looked at lean, overweight, and obese and fed them a high protein meal. The lean guys, protein synthesis was through the roof compared to both the overweight and the obese, meaning the leaner you are, the more anabolic you might be.
So, the old strategy of bulking up and getting fat might actually be working against your muscle mass gains. Staying lean might keep you more anabolic. To test that theory what I've been doing is literally using intermittent fasting to get my body fat down to as low as I can, and then see how my muscle mass responds. So far, I've actually been gaining, small amounts because I'm 49 and natural and pretty much at the peak. It's to like I'm gonna gain an inch on my arms, but if I gain a quarter inch or an eighth of an inch, that's a big deal for me, especially at this ... That's pure muscle.
Jim: I am literally gaining, now that my ... I'm sort of done trying to drop body fat to some degree. Now what I'm doing is just maintaining it around 4%. What it does is, it allows me to play with my protein and the amount of calories while still staying lean. I'm finding I have no trouble whatsoever with muscle mass.
But muscle mass is not my goal. It's really not my true goal anymore at this age. I'm always trying to obviously get my arms big. Now it's more about building more ... It's more bodybuilding. Adding more middle delt, adding more ... Those sorts of changing.
Jim: Yeah, which is still gaining muscle, but it's not like gaining huge amounts of muscle.
Jim: Yeah. What I do find is that, with the intermittent fasting, with the daily training, you're getting the best of both worlds. Fat loss, muscle gain, health.
Heather: You've got it in fifth gear and you can just kind of cruise along.
Nick: If somebody's curious about intermittent fasting, what should that keep in mind when they're starting this in terms of how to time their workouts? Should they try to get lean first or should they do this to get lean?
Heather: You're 4% Jim. I don't know if you can go much further.
Jim: ... but for most people, you probably could be leaner. You know what I mean? Most people's goal ... Most people probably aren't 6% body fat. Most people can always be a little leaner. Now my recommendation is more, "What's the point of having muscle if you cannot really see it?" Unless you're an athlete. If you're a powerlifter, a strongman, an athlete that's fine, but if you really want ... If you're just lifting to look better, why would you want to cover muscle with body fat?
Nick: Right, and having gone to a couple of powerlifting meets here to watch my friend or watch them streaming online, a lot more powerlifters are showing up looking crazy ripped these days to. That guy used to be a little bit more of a rarity, but now they're a lot more of those sort of guys. Like Chinese Olympic weightlifters, they're crazy lean a lot of them.
Heather: I feel like the dirty bulk has gone out of vogue a little bit. People are not ... They're actually trying to bulk, kind of what you're talking about without gaining a whole lot of extra body fat because really, what's the point? You're gonna stress all your systems trying to do that.
Jim: Exactly, and it's never good to be yo-yo dieting. What happens, you store a lot of toxins in your fat, and so every time you diet and lose body fat, you release those toxins into your blood stream.
Heather: And that's why you feel like crap when you diet.
Jim: Yeah, no seriously. When you're losing fat, you're releasing those toxins like styrene from styrofoam, which gets stored in fat cells. There's a lot of toxins that get stored in the fat cells. If you just stay lean ... You just get lean and stay lean.
Jim: Always gaining, losing … The worst thing you can do is the yo-yo diet, even if it's bodybuilding style. It's not healthy. I'm working out with a lot of athletes who have to lose weight. I'm convincing them to live at their fighting weight. Then you know what happens, then you actually get stronger because once your body adapts to that weight, it's no longer a stress to maintain it. The only reason you get weaker when you lose weight is because it's a massive stress on the body to lose all that body weight.
Once the body has adapted to the body weight and it's easy to maintain, that's your normal homeostasis now. You're working against yourself by living at 220, and then dropping down to 198 for your fight.
Jim: Yeah, and then you wonder why you're so weak during the fight, whereas if you lived at 198, your body would be adapted and you'd walk in there at your strongest form.
Nick: Do you find the people who are approaching intermittent fasting from a fat loss perspective because they want to change their body composition, maybe they are overweight. Do you find that's a less stressful approach for them ultimately in terms of the stress on their body?
Jim: Yeah, because like you said, it's so easy to do. It's yes or no. It's far easier to follow because the rules are a lot simpler. It's not like, "Well, I can have my carbs now," or, "Wait, is it time to ... Wait I'm not supposed to ..."
Jim: Yeah, this is like, yes or no. "Can I eat? No."
Jim: It does, because, like I said, when you're waiting in a Starbucks line, you don't do that sort of mental math with your diet.
Jim: Yeah, "If I just had one cake pop, let's see. That's how many calories? How many carbs? If I don't have rice with my dinner, and then ..." You don't have to do any of that. It's just like, "No."
Nick: Right. Before we started recording you put it really well. It's what you eat versus when you eat. What sort of person are you?
Jim: Yeah, with intermittent fasting, you can't eat when you want. You can't, but you can pretty much eat what you want. Or, you can eat when you want, but you cannot eat what you want. Those are the two main diet strategies.
Jim: The first meal does matter. For someone who's more ... If you really ... As long as you do the 16 and eight, as long as you stick to those rules ... Again, I wouldn't worry for the average person. However, if you really truly want to maximize your results, then I would suggest sticking with a high protein, low carb meal as your first meal and then maybe an hour or so after, start including carbs.
Jim: It's best to train in a fed state. It's always best to train in a ... Especially if you're interested in muscle mass and performance. If you're just an average person who just wants to maximize fat loss, it doesn't matter when you train. If you want to maximize your performance and the results you get, train when you're fed.
Jim: Yeah, well, do you really want to talk about fasted cardio? What the research shows on fasted cardio is pretty debatable because what we used to think is that you burn more fat during the exercise fasted. It's true, you do, but what happens the rest of the day? That's what nobody looked at. We were all telling people, "Fasted cardio is the best way because you burn more fat." That makes sense, however, it doesn't lead to better fat loss in the long run.
So why is that? Well, we started looking at what's going on the rest of the day. The more fat you burn during your workout, the less fat you burn the rest of the day. The less fat you burn during your workout, the more fat you burn the rest of the day. Do you work out more, or do you have the rest of the day more? How much time is your workout and how much time is the rest of the day? So you want to be maximizing fat burning during the rest of the day, not during the workout.
What does that? High intensity interval training. What does high intensity interval training burn? Carbs, all carbs during the workout, but, the rest of the day you're burning fat like a mad man. That's how it works. Fasted cardio, what we used to think is a snapshot. We had a snapshot of what's going on acutely and then we make projections. "Oh, well that means you're gonna lose more fat because you burnt more during the workout." Yes, if you also burnt more the rest of the day, but guess what, you don't burn more the rest of the day because you burned more during the workout.
Jim: I don't recommend fasted cardio for the average ... If you're like me at 4% and you're like, "You know what, I just have this one spot that I'm trying to get," fasted cardio might work for you then, because that's when you're really trying to get rid of every little bit of fat. If you're at 12% body fat, it's not gonna make a difference if you do your cardio fasted or if you did your cardio after McDonald's. Literally it doesn't.
Nick: We're talking about somebody who's fasted versus somebody who's doing intermittent fasting as well. It seems like once you are actually too ... You've adapted to that intermittent fasting protocol, maybe do you have a little bit more laxity there like, "I could certainly train fasted if I wanted to and-"
Jim: I work out. I stay active all day, all day. That's one of my other messages, is, "What is a workout?" We've become so sedentary that things that we normally do all day, walking, lifting, moving, picking things up, we have to condense into an hour because we sit on our butts all day. That's not how ... We don't exercise. We're not made to sit around and then go, "I'm gonna run like hell for an hour then I'm gonna sit down the rest of the day."
Even the research on television watching shows that even if you lift an hour or you work out an hour a day, if you sit for ... Don't quote me on the actual hours, more than three hours a week in front of the television, the benefits of the workout are pretty much gone.
Jim: You cannot be sitting all day. We're not made to be sedentary. I'm active all day, even when I'm fasted. I might go for a hike in the middle of the day fasted. I'm not gonna go to the gym and train a full ... I might if that's the only time I can. If I know this is my only block of, I'll train fasted if I have to. It's not ideal, but again, it's not ... When you're fasted and you're used to intermittent fasting and you exercise, it's not like, "Oh my god, it's so ..." It's normal.
Nick: I remember Dom D'Agostino, he set the record for the most weight lifted in an hour and he was seven days fasted at the time when he did it. All he did was squats for an hour straight. There's a video of it online. It's terrifying, but he's a freak, too.
Jim: And I do videos. I'll do videos on my social media, parking the last spot. Taking the stairs, don't use the escalator or elevator.
Jim: Without a doubt, because that's the type of activity that's most important. Staying active all day. It's just finding the ways to stay active. In addition to your … Sure, you’re still gonna do your workout, but in addition to the workout, you still need to stay active.
Nick: That is one knock that people have against full body training, is they say, "If I have to go full body workout, I'm gonna be so crushed I can't do anything else. I'm only gonna do triceps and chest today because that was I can still play with my kids later." Something like that.
Jim: The other thing that I preach about it was I call my 30/60 rule. It goes on with that data from television watching. What it shows is, if you sit for more than 30 minutes, I'm getting back to gene regulation. Genes that are involved in burning fat turn off. Genes that enhance fat storage get turned on. Genes that help prevent metabolic disorders get altered if you're sitting for too long.
Nick: That's a great rule.
Heather: That's a great rule.
Nick: There's something really important in what you're saying there, too, because people talk about genetics casually as if it's a death sentence, always like, "Blame it on genetics. I'm cursed," or, "You're blessed because of genetics," but you're saying you actually have a lot of control over yourself and your genetics.
Jim: Epigenetics are critical. What epigenetics basically are is things that we do. The food choices that we make. Environmental factors all affect our genes that we then pass on. It's not just genes that have been passed along. Those genes get changed along the way based on our environment, things we eat, things that we get exposed to. That changes the genes that we then pass on to our children. Staying active, eating a good diet can actually enhance the health of your offspring.
Nick Collias: It's a good message to end on. Well, thanks so much Jim Stoppani for coming to talk to us. | 2019-04-19T11:14:50Z | https://www.bodybuilding.com/fun/podcast-episode-25-jim-stoppani-on-daily-full-body-training-fasting-and-more.html |
We are in the final stretch. Honestly, I didn’t even realize we were in the finale week since this show has been go go go the entire time it’s been on air. But now we are here, at the point were we need to take down our two big bads: Oh-ju and Mun-sook. But first, Sang-pill has to protect himself and free Jae-yi. Hmm, perhaps her Jujitsu lesson will come in handy this episode?
We are live recapping Mr. Sunshine next week, which replaces Lawless Lawyer in this time slot! It’s supposed to be a massive show, so I suggest tuning into at least the first episode if you can (you know, just to say you did).
SP bursts into the building. OJ mutters that he came so quickly, that is why I brought you here. JY tells him to stop threatening SP with her. She punches GD, but he just pushes her back into her chair.
OJ goes to meet SP. SP tells OJ that he is already a broken dih, he can’t put him back together, no one can do it so just accept it. You wanted to kill me right? I came here to give you the chance.
Ah, I should acknowledge your braveness. i will do what you wish, you can’t win over me. He pulls out a gun and tells him to kneel.
GD tells JY that OJ has a gun, did you hear the gun sound? Is he dead? Just sit here I will punish you if you don’t.
But JY gets up and hits GD hard, she runs out of the room toward SP.
But then JY screams, OJ! She runs up and tells him to stop. GD tried to run after her and catches up, his rib is broken.
JY holds up the notebook that MS sent to SP and tells him that SP used this to remove him. This diary will help you decide.
OJ wonders what this is and flips through it.
JY – You said you have evidence to destroy MS.
OJ tells her that he either always has it or doesn’t have it (not sure). He mutters, so….everything was planned by MS?
JY – You were just a tool for her.
SP – And you can’t take it back anymore OJ.
OJ – Did you know about this from the beginning jashik? Do you two have a way to take MS down?
JY – Ways? Yes, it is all dependent on your choice. You go to court and prove her sin.
OJ laughs, hey, I am under search warrant, do you want to put me in jail also?
SP – Someone will catch you anyway. You know that my last goal is MS.
OJ drops all the bullets out of his gun accept one. Are they about to play Russian Roulette? OJ tells her to take it, if you are confident then take it. This is OJ’s style. Would you like to do it?
JY takes the gun nervously. SP tells her it is okay and goes to fight OJ off to the side.
They start fighting with OJ drinking alcohol on occasion.
OJ is able to get SP to fall. He tells GD to give him a seat and then rests for a moment. But he tells SP that he will testify. What can they do?
JY tells him that they can reduce his sentence. If he testifies, they will remove his search warrant. You just need to testify. OJ is apprehensive about trusting them. He tells SP that they rested enough, let’s do a second round.
They both get up to fight again.
But JY yells, Just Stop! And holds the gun to them. But SP tells her that it is okay.
He and OJ start fighting again. This time SP gets OJ to fall and is about to hit him with his name plate, but he is too tired and falls himself.
SP is able to get OJ into an arm bar from the bottom and rolls him into a rear naked choke. JY whispers for SP to stop, if he doesn’t, then all he did will be meaningless.
SP stops and lets OJ roll away from him.
Meanwhile, there is a big support protest for MS that the Fighting team is apart of. They are pretending that they are on MS’s side and hold up signs in support. MS gets in her car and is driven off.
SP and JY drive back. JY has to drive. They talk about MS. SP wants her own boomerang to go back to her (the diary).
Meanwhile, GD does not think that OJ should believe SP. He thinks they are together and are on the same side. But OJ just looks through the diary quietly and has a flashback about telling MS about the lawyer, JA and how MS told him he is her dog that she raised. he should bark when she tells him to.
OJ eats the diary bite by bite and tells GD that he will finish MS by his own hands.
MS meets with two men. They think they should cut ties with Judge Hong due to the public opinion and MS should take on SP’s case. This will help solidify her position. She says she will think about it.
On the news, MS is still as high as ever. She is even a shoe in for the next candidate for president.
the Fighting team is watching the news and cannot believe that someone like that can become president. SP and JY come in like a couple and tells everyone that they are fine. But they need to get to work.
The political leader visits MS’s house. He thinks God must be helping her, he came over right away after seeing the news. This trial is super important for you, as if you planned it. You are a daughter like your father. This trial will help you in the public hearing for the Supreme court.
Meanwhile, the fighting team plans to protest for MS in an exaggerated way. they are dancing around the lawfirm in the play way that they do when Jy gets a phone call. MS will take SJ’s case! Everyone cheers.
They believe it will be her last judegement as judge, she was in the court for two long. SP says that she will come down soon. Everyone wants to have a beer since their plan was a success.
Outside somewhere, GD says that he will go to the end with OJ, but he glances at the money inside the luggage. He says he will get MS and bring her in front of him. But he can’t get to her because seh has so many bodyguards. he goes back to the car.
OJ calls her instead, she takes it. OJ tells her that he heard about the notebook, so you wanted to kill me using SP? if you thought I was the dog that you raised, you shouldnt have dumped me like that. You don’t deserve to kill your own dog. I am watching you all the time. MS tells him to come to her house, she has something to tell him.
OJ smiles, yeah, yeah, this is your style.
SJ calls SP about MS taking the case. She is upset about that. SP hangs up and tells JY that he has to go to the prison. JY thinks they need to pressure her more since MS became the judge.
JY goes with SP to the prison. SJ does not want JY to be there, JY tells her that she is a sinner so she cant make eye contact, is that right? JY will be the co-lawyer. SJ says she did not know that this woman was her mom! JY calmly tells her that her goal is not SJ, it is MS. Let’s prepare for the trial.
YH is talking to MS about her mothers case. MS says she is sad about her case, but they have strong evidence. She must accept all her sins. You said you want to be next to me forever. You can finish it up by making your mother accept her sins, or mother and daughter will be destroyed together. I am a public person, I can’t just protect everyone that works for me. You have to understand that, then you can be next to me.
In the prison, SJ says that the newspaper guy is the witness for the other side! She is bewildered and angered by that. SP says that he will help the prosecution. SJ thinks she gave him so much help and now he is using her! SP tells her that their group was created to use each other. Being a victim is not your style. SJ is so angry, steam is coming from her head.
Afterward, SP and JY leave talking about how they are the perfect team. SP says he has to go and get the last word. He goes to the #2 guy, he wants him to testify, that is why he is alive. Just tell everything that you saw, the truth. He tells them that he wants to make a phone call, today is his mothers birthday.
They give him a phone and leave the room.
the man calls the judge.
Outside, Scorpion asks SP if he trusts that man. SP does not. The goal is for Scorpion to go to the court room and pressure MS. SP will protect all the hyung-nims. And he will make sure that Scorpion gets out of jail soon. Scorpion smiles and says he knows. See you at the courthouse.
Cut to JY and SP walking into the empt courtroom together. They walk all the way to the judges seat. SP tells JY that they are standing on a sword. They are making their final cut now. JY says they don’t know what she prepared as the judge. DP tells her that they should go to the end. They hold hands and the lights turn on, everyone else starts to walk inside the courtroom.
MS meets with SJ in the back and tells her that she is suffering a lot. MS says that she knows she did it because she was 100% loyal to her, but a sin a sin and court is court. Sj asks her what she is doing! MS tells her that her daughter worries abotu her a lot, you should decide for your daughter.
SJ tells her that her daughter is first, sorry. MS says, of course. SJ takes a deep breath and asks MS, are you going to protect my daughter?
Elsewhere, OJ and GD are playing with money on a basketball court. i GD makes a basket then OJ will give him money. He makes the basket and gets 10k. We also find out that GD is monitoring the courtcase. They have someone in the courthouse.
MS comes in to the Thailand woman murdering case. The video is played that shows SJ yelling that they need to kill the Thailand person. SB says this video is what SJ told an unknown man. The newspaper head writer is the witness.
SB asks the newspaper person what is going on. He says that the video is nothing, it is just the tip of the iceberg. She used her relationship with MS as power. Whenever he visited MS’s house, she yelled at him and hit him. She was popular by doing it.
They also have testimony from maid in the house. MS would continuously humiliate the Thailand masseuse.
Now it is time for JY to ask questions. JY goes up and asks who the judge is that SJ talked about in the video. MS looks at the news reporter and tells JY to change the question. JY says she will change it.
They keep talking. JY says that this infuencial person, can they explain why they have a relationship with SJ who does not have anything? You get a benefit to get close to SJ because she is very close to MS. MS tells her to he careful of unproved sentences.
JY asks the news person about his honor, can he put it on the line? He says that he does not put his honor on these types of things. JY is trying to make it seem like he got a lot of benefit by using SJ. He says she got the benefit!
SP comes up as a tag team and starts asking him questions. He wants to know if the news guy is loyal to her? The news guy points at SJ and says that she is very very very shallow. She just brags about her relationship with MS everywhere.
SP says that he must not like her so much. You were following SJ around for th =e golden city project and did everything for her but did not get anything, that is what I heard.
The new guy stands up and yells at SJ, he says he released a lot of free articles for her for golden city! But he went to far. He sits sheepishly and says it is nothing. What he said was a mistake. But the crowd murmers.
SP tells MS that he knows this guy commited a crime, he worried about his fake testimony since it changes a lot.
MS calls the next witness which is Scorpion. He says that he murdered the Thailand person. SP wants to know why he did it. Scorpion says he did it because he was ordered to do it. Who ordered it?
SP says that SJ didn’t order the murder, so did someone else order it? The man says yes, it feels like it was a person above SJ that ordered it. Who is that person? The massagist said someones name. Someone in a high position. But I don’t remember the name.
MS speaks up and tells the police to arrest the witness for murdering the Thailand massagist.
MS closes the case for today.
SJ is impressed with how the case went. SP says they are not done yet. They want her to testify against MS. SJ says she can’t do that now, she has to calculate things!
Outside somewhere, OJ meets with his thug team and find out about how court went. He wonders what kind of plan SJ has.
Meanwhile, SJ thinks inside the jail.
Elsewhere, JY and SP talk about SJ. She is a little different then she was in the begining. they need to remove the search warrant from OJ.
Jy says she will meet SB, to ask him to realease the search warrant.
Cut to her meeting with him. SB says it looks like she has reason for it. is that true? JY tells him that before she tells him the reason, she wants to take him to meet someone. She takes him to meet her mother with the good policeman. JY tells SB that this woman is her mother.
HJ says that she was about to be killed by MS, 18 years ago. MS is the missing link. JY says that this is the best way that she can explain things to him.
OJ gets to MS’s house and walks inside. GD is with him, but OJ tells him to stay outside in the foyer.
OJ goes inside MS’s bedroom to talk to her. She tells him to sit so they can face each other and talk. he does. She tells him to tell hr what he wants to say even if it is a threat or whatever. Are you doing this because of SP’s diary? You should trust me, not his words.
OJ takes out his gun and tells MS to shut up. He wants to know the reason why he should not kill her. One reason.
But then another gun comes out from the back, another hitman is hiding. MS smirks and puts her drink down.
MS – OJ, you are the murderer of his mother, yet you listen to him and try to kill me? Compare the future where you will trust me and survive. You will finally listen to my order because you lived like that forever, that is your life.
SP and SB meet each other on the harbor. SB warned SP not to use him for his revenge, he will not dance according to his plan. But one thing bothers him, the video for OJ is enough to get a search warrant, but not enough to win the case. SB wants to prosecute him by himself, not with evidence from the internet, but with definitel evidence.
SB drives off as the two men share a common goal.
SP calls OJ and tells him that he kept his promise. OJ is all like, really? SP tells him, if he wants to survive, then he has to decide quickly. they hang up. GD asks what happened. OJ lets him know that SP got his search warrant released. Maybe not for long, but long enough to go to the courthouse.
In the jail, SJ is still thinking, but it looks like she might have come to a decision.
JY cutely helps SP get dressed. The team sees it and jokes with them about how cute and in love they are.
Finally SP shoos them away. He tells JY that he was about to release warrant, perhaps OJ will come to the court house.
MS is interviewed on a stage about her autobiography. She is so embarrassed that seh was given so much love. While she talks, we see that she is the cover woman on all the magazines in all the stores. Her autobiography is all sold out, it is a must read item for young people. The senator congratulates her on it.
Meanwhile, SB is in trouble by his superior for not prosecuting OJ. The head of prosecutors tells him that OJ is a criminal that should be prosecuted. SB tells him that he does not have enough evidene, he needs t get some more. The head prosecutor asks, what about his corruption bribery case? SB asks where that evidence is from.
The prosecutor calls him jashik are you saying my data is all wrong? I am not telling you twice, just issue the search warrant again before I fire you.
SB tells the head that he is over using his power. He is not a dishwasher that he is preparing and he does not plan on moving up by doing dirty work for someone.
In his hideaway, OJ looks at the news about MS becoming a Supreme Court Judge.
The fighting law firm cannot believe the publics opinion about MS, how is she a goddess judge.
Elsewhere, MS meets with a lot of higher ups and influencial poeple for dinner. She tells them that she was a lawyer for 35 years, she does not even have a house and rents the foundation building. One of the people asks what she will do about that photo from 15 years ago.
MS tells them that they all know the problem she has with that picture, their citizens where more angry than her with that fake picture.
the senator head tells them that they should toast, it is diifcult to hide things from citizens.
Meanwhile OJ is thinking about MS. MS awnted him to trust her because he is the only enemy for SP as the person who killed his mother. You will live like a dog forever. GD goes up to him and tells him that it is time to go to the court house.
Court starts. SJ wants to testify so SP asks MS if she will grant it. MS gives her a long look and then says that she will allow it.
SJ looks at MS and then removes her glasses. Her daughter thinks back to a conversation she had with JY about how MS will never hold up her side of the agreement.
SJ stands to try and testify, she thinks about MS protecting her daughter. MS told her that she would. But SP told her to think carefully, when she confesses everything for MS, then this case ends.
SJ – For the Thailnd case, I am….
But she ha a hard time breathing and passes out as if she had a heart attack. Several peoplle run up to her uncluding her daughter. MS just looks at her. SP gets a call, he changed his mind, he wants SP to do it all by himself.
JY asks him what happened. Sp says that OJ changed his heart, he wont’ testify, I have to see him. JY tells him to bring OJ to the table!
OJ and GD walk out with his driver. But his driver stabs OJ. OJ tells him to take it out. The driver apologizes and is about to stab him again. GD runs to his rescue, but GD gets stabbed several times as well. But GD wont let go of that driver and keeps him away from OJ.
SP gets there just in time and fights off the driver masterfully. But the driver is able to keep the knife. They keep fighting.
SP hops into a flying armbar and breaks the drivers arm. But he gets up and runs away.
GD tells SP that he should have come earlier, jashik. He is near death. he mutters that he shouldn’t have followed him. Then he tells his hyung-nim to survive till the end and dies.
JY looks at the court seat.
MS is in her chambers looking evil-y off into space.
This show is too fast for it’s own good. It needs Cliffs notes to keep up with it.
SP – MS, nothing stops her.
MS – I can’t trust SJ. We have to disarm OJ and SJ at the same time.
SP – I am asking you, did you order the murder.
SJ – Yes, I did it.
OJ – Let me have a cigarette, I used to be the judge(?).
JY – What was that person thinking?
SP – Your honor, I have an important last question. | 2019-04-21T11:31:02Z | https://www.dramamilk.com/lawless-lawyer-live-recap-episode-15/ |
Final regulations under section 168 of the Code provide guidance on how to depreciate property for which the use changes in the hands of the same taxpayer. These regulations explain when a change in use occurs and how a taxpayer should determine depreciation in the year of the change in use, and in subsequent years.
Final and temporary regulations under section 280F of the Code exclude vans and trucks that are qualified nonpersonal use vehicles (as defined in section 1.274-5T(k)) from the definition of “passenger automobile” for purposes of section 280F(a), including transition rules for property placed in service prior to July 7, 2003.
Proposed regulations under section 1374 of the Code provide for an adjustment to the amount that may be subject to tax in certain cases in which an S corporation acquires assets from a C corporation in an acquisition to which section 1374(d)(8) applies. These regulations provide guidance to certain S corporations that acquire assets from a C corporation in a carryover basis transaction.
Proposed regulations under section 864 of the Code relate to the application of the asset-use test to stock held by foreign insurance companies. The regulations provide that the exception to the asset-use test for stock does not apply in determining whether the income, gain, or loss from portfolio stock held by foreign insurance companies constitutes income effectively connected with the conduct of a trade or business within the United States.
Charitable contributions and conservation easements. This notice informs taxpayers that the Service will, in appropriate cases, reduce or disallow deductions claimed by taxpayers under section 170 of the Code for transfers in connection with conservation easements. This notice also informs participants in these transactions that they may be subject to other adverse tax consequences, including penalties, excise taxes, and loss of tax-exempt status, as appropriate.
Section 368(a)(1)(B). The Service is requesting public comments regarding Rev. Proc. 81-70, 1981-2 C.B. 729, which contains the guidelines for estimating the basis of stock acquired in a B reorganization.
This notice advises taxpayers that the Service will challenge the meritless filing position of certain U.S. citizens who claim to be residents of the U.S. Virgin Islands and to have income from sources in the U.S. Virgin Islands or income effectively connected to the conduct of a trade or business in the U.S. Virgin Islands.
Group or pooled trusts; participation; tax-exempt status, model language. This ruling provides that a governmental section 457(b) plan may invest in a second tier group or pooled trust as long as the criteria enumerated in the ruling are met. In addition, the ruling sets forth model language that may be adopted by existing group or pooled trusts so that they need not request determination letters merely to add a provision permitting participation by a governmental section 457(b) plan. Rev. Rul. 81-100 clarified and modified.
This announcement is a public notice of the suspension of the federal tax exemption under section 501(p) of the Code of a certain organization that has been designated as supporting or engaging in terrorist activity or supporting terrorism. Contributions made to this organization during the period that the organization's tax-exempt status is suspended are not deductible for federal tax purposes.
This document contains final and temporary regulations relating to the depreciation of property subject to section 168 of the Internal Revenue Code (MACRS property). Specifically, these regulations provide guidance on how to depreciate MACRS property for which the use changes in the hands of the same taxpayer. The regulations reflect changes to the law made by the Tax Reform Act of 1986.
Effective Date: These regulations are effective June 17, 2004.
Applicability Date: For dates of applicability, see §§1.168(i)-1(l)(2) and 1.168(i)-4(g).
Sara Logan or Kathleen Reed, (202) 622-3110 (not a toll-free number).
This document contains amendments to 26 CFR part 1. On July 21, 2003, the IRS and Treasury Department published a notice of proposed rulemaking in the Federal Register (REG-138499-02, 2003-37 I.R.B. 541 [68 FR 43047]), relating to a change in the use of MACRS property in the hands of the same taxpayer (change in the use) under section 168(i)(5) of the Internal Revenue Code (Code) and relating to a change in the use of assets in a general asset account under section 168(i)(4). On March 1, 2004, §§1.168(a)-1 and 1.168(b)-1 that were contained in this notice of proposed rulemaking were withdrawn (REG-138499-02, 2004-14 I.R.B. 704 [69 FR 9560]). No public hearing was requested or held. Written or electronic comments responding to the notice of proposed rulemaking were received. After consideration of all the comments, the proposed regulations are adopted as amended by this Treasury decision. The revisions are discussed below.
The final regulations provide the rules for determining the annual depreciation allowance under section 168 for MACRS property as a result of a change in the use of such property. Changes in the use include a conversion of personal use property to a business or income-producing use, a conversion of MACRS property to personal use, or a change in the use of MACRS property that results in a different recovery period, depreciation method, or both.
The final regulations retain the rules contained in the proposed regulations, providing that personal use property converted to business or income-producing use is treated as being placed in service by the taxpayer on the date of the conversion. Thus, the property is depreciated by using the applicable depreciation method, recovery period, and convention prescribed under section 168 for the property beginning in the taxable year the change in the use occurs (year of change). No comments were received suggesting changes to these rules. The final regulations, however, clarify that these rules do not apply when another section of the Code (or regulations under that section) prescribes the depreciation treatment for a change to business use. For example, if listed property (as defined in section 280F(d)(4)) is predominantly used by a taxpayer in a qualified business use in a taxable year, then in a subsequent taxable year is exclusively used by the taxpayer for personal purposes, and then in a later taxable year is predominantly used by the taxpayer in a qualified business use, section 280F(b)(2)(A) requires that the property be depreciated under the alternative depreciation system of section 168(g) in the later taxable year and subsequent taxable years.
The final regulations retain the rule contained in the proposed regulations providing that a conversion of MACRS property from business or income-producing use to personal use is treated as a disposition of the property. Depreciation for the year of change is computed by taking into account the applicable convention. No gain, loss, or depreciation recapture is recognized upon the conversion. A commentator questioned whether recapture of excess depreciation under section 280F(b)(2) occurs upon a conversion of listed property from business use to only personal use. Upon this conversion, the listed property is not predominantly used in a qualified business use for that taxable year for purposes of section 280F(b) and, consequently, section 280F(b)(2) requires any excess depreciation (as defined in section 280F(b)(2)(B)) to be included in gross income for the taxable year in which the listed property is converted to personal use. Accordingly, the IRS and Treasury Department have included a cross-reference to section 280F(b)(2) in the final regulations.
The final regulations provide rules for MACRS property if a change in the use of the property occurs after the property’s placed-in-service year but the property continues to be MACRS property in the hands of the taxpayer.
The final regulations remain unchanged from the proposed regulations. Consequently, a change in the use of MACRS property generally occurs when the primary use of the MACRS property in the taxable year is different from its primary use in the immediately preceding taxable year. However, in determining whether a taxpayer begins or ceases to use MACRS property predominantly outside the United States, the predominant use, instead of the primary use, of the MACRS property governs. A commentator questioned how this predominant use test is applied to rolling stock (for example, locomotives, freight and passenger train cars) that is not described under section 168(g)(4)(B) and that is used within and without the United States. This question concerns how to trace the movement of this rolling stock to determine its physical location, which the IRS and Treasury Department believe is beyond the scope of these regulations.
The final regulations retain the rules contained in the proposed regulations for determining the applicable depreciation method, recovery period, and convention used to determine the depreciation allowances for the MACRS property for the year of change and subsequent taxable years. Consequently, if a change in the use of MACRS property results in a shorter recovery period and/or a more accelerated depreciation method (for example, MACRS property ceases to be used predominantly outside the United States), the adjusted depreciable basis of the MACRS property as of the beginning of the year of change is depreciated over the shorter recovery period and/or by the more accelerated depreciation method beginning with the year of change as though the MACRS property is placed in service by the taxpayer in the year of change. If a change in the use of MACRS property results in a longer recovery period and/or a slower depreciation method (for example, MACRS property begins to be used predominantly outside the United States), the adjusted depreciable basis of the MACRS property as of the beginning of the year of change is depreciated over the longer recovery period and/or by the slower depreciation method beginning with the year of change as though the taxpayer originally placed the MACRS property in service with the longer recovery period and/or slower depreciation method.
A commentator suggested that the depreciation allowances for all changes in the use of MACRS property resulting in a different recovery period and/or depreciation method be determined beginning with the year of change by treating the new depreciation method and/or recovery period as though they applied from the date the MACRS property was originally placed in service by the taxpayer. The commentator, in effect, is requesting that the rule contained in the proposed regulations for a change in the use of MACRS property that results in a longer recovery period and/or slower depreciation method also apply to a change in the use of MACRS property that results in a shorter recovery period and/or a more accelerated depreciation method. The IRS and Treasury Department continue to believe that the rules contained in the proposed regulations are reasonable because the rules determine the depreciation allowance for any taxable year based on the primary use of the MACRS property by the taxpayer during that year. Further, for a change in the use of MACRS property that results in a shorter recovery period and/or a more accelerated depreciation method, the taxpayer either may determine the depreciation allowances as though the MACRS property is placed-in-service by the taxpayer in the year of change or may elect to disregard the change in the use and determine the depreciation allowances as though the change in the use had not occurred. As a result, the final regulations do not require a recovery period that is longer than the recovery period applicable for the MACRS property in the taxable year immediately preceding the year of change. Accordingly, the commentator’s suggestion was not accepted.
Another commentator requested that Example 4 in §1.168(i)-5(d)(6) be clarified by stating which optional depreciation tables the transaction coefficient factors are drawn from. The IRS and Treasury Department have adopted this suggestion.
The final regulations retain the rules contained in the proposed regulations if a change in the use of MACRS property occurs during the taxable year the property is placed in service and the property continues to be MACRS property in the hands of the taxpayer. Accordingly, if the use of MACRS property changes during its placed-in-service year, the depreciation allowance generally is determined by the primary use of the property during that taxable year. However, in determining whether MACRS property is used within or outside the United States during the placed-in-service year, the predominant use, instead of the primary use, of the MACRS property governs. Further, in determining whether MACRS property is tax-exempt use property or imported property covered by an Executive order during the placed-in-service year, the use of the property at the end of the placed-in-service year governs. Moreover, MACRS property is tax-exempt bond financed property during the placed-in-service year if a tax-exempt bond for the MACRS property is issued during the placed-in-service year.
Finally, the regulations amend the final regulations under section 168(i)(4) (T.D. 8566, 1994-2 C.B. 20 [59 FR 51369] (1994)) and the temporary regulations under section 168(i)(4) (T.D. 9115, 2004-14 I.R.B. 680 [69 FR 9529] (2004)) for property accounted for in a general asset account for which the use of the property changes, resulting in a different recovery period and/or depreciation method. These amendments are the same rules contained in the proposed regulations.
These regulations are applicable for any change in the use of MACRS property in a taxable year ending on or after June 17, 2004. For any change in the use of MACRS property after December 31, 1986, in a taxable year ending before June 17, 2004, the IRS will allow any reasonable method of depreciating the property under section 168 in the year of change and the subsequent taxable years that is consistently applied to the MACRS property for which the use changes in the hands of the same taxpayer. However, a taxpayer may choose, on a property-by-property basis, to apply the final regulations to a change in the use of MACRS property after December 31, 1986, in a taxable year ending before June 17, 2004. In this case and consistent with Chief Counsel Notice 2004-007, Change in Litigating Position—Application of Section 446(e) to Changes in Computing Depreciation (CC-2004-007, January 28, 2004, at the IRS Internet site at www.irs.gov/foia), a change to the method of accounting for depreciation provided in the final regulations due to a change in the use of MACRS property in a taxable year ending on or after December 30, 2003, is a change in method of accounting and a change to the method of accounting for depreciation provided in the final regulations due to a change in the use of MACRS property after December 31, 1986, in a taxable year ending before December 30, 2003, may be treated by the taxpayer as a change in method of accounting.
It has been determined that this Treasury decision is not a significant regulatory action as defined in Executive Order 12866. Therefore, a regulatory assessment is not required. It also has been determined that section 553(b) of the Administrative Procedure Act (5 U.S.C. chapter 5) does not apply to these regulations and, because these regulations do not impose on small entities a collection of information requirement, the Regulatory Flexibility Act (5 U.S.C. chapter 6) does not apply to these regulations. Therefore, a Regulatory Flexibility Analysis is not required. Pursuant to section 7805(f) of the Code, the notice of proposed rulemaking was submitted to the Chief Counsel for Advocacy of the Small Business Administration for comment on its impact on small business.
§1.168(i)-0 Table of contents for the general asset account rules.
(2) Change in use results in a different recovery period and/or depreciation method.
(i) No effect on general asset account election.
(ii) Asset is removed from the general asset account.
(iii) New general asset account is established.
a. Removing the language “and” from the end of paragraph (c)(2)(ii)(C).
b. Removing the period “.” from the end of paragraph (c)(2)(ii)(D) and adding “; and” in its place.
3. Removing the language “the change in use occurs and” from the last sentence of paragraph (h)(1) and adding “the change in use occurs (the year of change) and” in its place.
5. Removing the language “(h)(1)” from paragraph (k)(1) and adding “(h)” in its place.
(1) Unadjusted depreciable basis is the basis of an asset for purposes of section 1011 without regard to any adjustments described in section 1016(a)(2) and (3). This basis reflects the reduction in basis for the percentage of the taxpayer’s use of property for the taxable year other than in the taxpayer’s trade or business (or for the production of income), for any portion of the basis the taxpayer properly elects to treat as an expense under section 179, and for any adjustments to basis provided by other provisions of the Internal Revenue Code and the regulations under the Internal Revenue Code (other than section 1016(a)(2) and (3)) (for example, a reduction in basis by the amount of the disabled access credit pursuant to section 44(d)(7)). For property subject to a lease, see section 167(c)(2).
(E) Assets subject to paragraph (h)(2)(iii)(A) of this section (change in use results in a shorter recovery period and/or a more accelerated depreciation method) for which the depreciation allowance for the year of change (as defined in §1.168(i)-4(a)) is not determined by using an optional depreciation table must be grouped into a separate general asset account.
(2) Change in use results in a different recovery period and/or depreciation method—(i) No effect on general asset account election. A change in the use described in §1.168(i)-4(d) (change in use results in a different recovery period and/or depreciation method) of an asset in a general asset account shall not cause or permit the revocation of the election made under this section.
(ii) Asset is removed from the general asset account. Upon a change in the use described in §1.168(i)-4(d), the taxpayer must remove the asset from the general asset account as of the first day of the year of change and must make the adjustments to the general asset account described in paragraphs (e)(3)(iii)(C)(2) through (4) of this section. If, however, the result of the change in use is described in §1.168(i)-4(d)(3) (change in use results in a shorter recovery period and/or a more accelerated depreciation method) and the taxpayer elects to treat the asset as though the change in use had not occurred pursuant to §1.168(i)-4(d)(3)(ii), no adjustment is made to the general asset account upon the change in use.
(iii) New general asset account is established—(A) Change in use results in a shorter recovery period and/or a more accelerated depreciation method. If the result of the change in use is described in §1.168(i)-4(d)(3) (change in use results in a shorter recovery period and/or a more accelerated depreciation method) and adjustments to the general asset account are made pursuant to paragraph (h)(2)(ii) of this section, the taxpayer must establish a new general asset account for the asset in the year of change in accordance with the rules in paragraph (c) of this section, except that the adjusted depreciable basis of the asset as of the first day of the year of change is included in the general asset account. For purposes of paragraph (c)(2) of this section, the applicable depreciation method, recovery period, and convention are determined under §1.168(i)-4(d)(3)(i).
(B) Change in use results in a longer recovery period and/or a slower depreciation method. If the result of the change in use is described in §1.168(i)-4(d)(4) (change in use results in a longer recovery period and/or a slower depreciation method), the taxpayer must establish a separate general asset account for the asset in the year of change in accordance with the rules in paragraph (c) of this section, except that the unadjusted depreciable basis of the asset, and the greater of the depreciation of the asset allowed or allowable in accordance with section 1016(a)(2), as of the first day of the year of change are included in the newly established general asset account. Consequently, this general asset account as of the first day of the year of change will have a beginning balance for both the unadjusted depreciable basis and the depreciation reserve of the general asset account. For purposes of paragraph (c)(2) of this section, the applicable depreciation method, recovery period, and convention are determined under §1.168(i)-4(d)(4)(ii).
(l) Effective dates—(1) [Reserved]. For further guidance, see §1.168(i)-1T(l)(1).
(2) Exceptions—(i) In general—(A) Paragraph (b)(1) of this section applies on or after June 17, 2004. For the applicability of §1.168(i)-1(b)(1) before June 17, 2004, see §1.168(i)-1(b)(1) in effect prior to June 17, 2004 (§1.168(i)-1(b)(1) as contained in 26 CFR part 1 edition revised as of April 1, 2004).
(B) Paragraphs (c)(2)(ii)(E) and (h)(2) of this section apply to any change in the use of depreciable assets pursuant to §1.168(i)-4(d) in a taxable year ending on or after June 17, 2004. For any change in the use of depreciable assets as described in §1.168(i)-4(d) after December 31, 1986, in a taxable year ending before June 17, 2004, the Internal Revenue Service will allow any reasonable method that is consistently applied to the taxpayer’s general asset accounts or the taxpayer may choose, on an asset-by-asset basis, to apply paragraphs (c)(2)(ii)(E) and (h)(2) of this section.
(ii) Change in method of accounting—(A) In general. If a taxpayer adopted a method of accounting for general asset account treatment due to a change in the use of depreciable assets pursuant to §1.168(i)-4(d) in a taxable year ending on or after December 30, 2003, and the method adopted is not in accordance with the method of accounting provided in paragraphs (c)(2)(ii)(E) and (h)(2) of this section, a change to the method of accounting provided in paragraphs (c)(2)(ii)(E) and (h)(2) of this section is a change in method of accounting to which the provisions of section 446(e) and the regulations under section 446(e) apply. However, if a taxpayer adopted a method of accounting for general asset account treatment due to a change in the use of depreciable assets pursuant to §1.168(i)-4(d) after December 31, 1986, in a taxable year ending before December 30, 2003, and the method adopted is not in accordance with the method of accounting provided in paragraphs (c)(2)(ii)(E) and (h)(2) of this section, the taxpayer may treat the change to the method of accounting provided in paragraphs (c)(2)(ii)(E) and (h)(2) of this section as a change in method of accounting to which the provisions of section 446(e) and the regulations under section 446(e) apply.
(B) Automatic consent to change method of accounting. A taxpayer changing its method of accounting in accordance with this paragraph (l)(2)(ii) must follow the applicable administrative procedures issued under §1.446-1(e)(3)(ii) for obtaining the Commissioner's automatic consent to a change in method of accounting (for further guidance, for example, see Rev. Proc. 2002-9, 2002-1 C.B. 327, as modified by Rev. Proc. 2004-11, 2004-3 I.R.B. 311 (see §601.601(d)(2)(ii)(b) of this chapter)). Because this change does not change the adjusted depreciable basis of the asset, the method change is made on a cut-off basis and, therefore, no adjustment under section 481(a) is required or allowed. For purposes of Form 3115, Application for Change in Accounting Method, the designated number for the automatic accounting method change authorized by this paragraph (l)(2)(ii) is “87.” If Form 3115 is revised or renumbered, any reference in this section to that form is treated as a reference to the revised or renumbered form.
(3) [Reserved]. For further guidance, see §1.168(i)-1T(l)(3).
1. Revising paragraphs (c)(2)(ii)(E) and (l)(2).
2. Removing the language “(h)(1) (conversion to personal use)” from paragraphs (d)(2) and (i) and adding “(h) (changes in use)” in its place.
3. Removing the language “(h)(1)” from paragraph (j) and adding “(h)” in its place.
§1.168(i)-1T General asset accounts (temporary).
(E) [Reserved]. For further guidance, see §1.168(i)-1(c)(2)(ii)(E).
(2) [Reserved]. For further guidance, see §1.168(i)-1(l)(2).
(a) Scope. This section provides the rules for determining the depreciation allowance for MACRS property (as defined in §1.168(b)-1T(a)(2)) for which the use changes in the hands of the same taxpayer (change in the use). The allowance for depreciation under this section constitutes the amount of depreciation allowable under section 167(a) for the year of change and any subsequent taxable year. For purposes of this section, the year of change is the taxable year in which a change in the use occurs.
(b) Conversion to business or income-producing use—(1) Depreciation deduction allowable. This paragraph (b) applies to property that is converted from personal use to use in a taxpayer’s trade or business, or for the production of income, during a taxable year. This conversion includes property that was previously used by the taxpayer for personal purposes, including real property (other than land) that is acquired before 1987 and converted from personal use to business or income-producing use after 1986, and depreciable property that was previously used by a tax-exempt entity before the entity changed to a taxable entity. Except as otherwise provided by the Internal Revenue Code or regulations under the Internal Revenue Code, upon a conversion to business or income-producing use, the depreciation allowance for the year of change and any subsequent taxable year is determined as though the property is placed in service by the taxpayer on the date on which the conversion occurs. Thus, except as otherwise provided by the Internal Revenue Code or regulations under the Internal Revenue Code, the taxpayer must use any applicable depreciation method, recovery period, and convention prescribed under section 168 for the property in the year of change, consistent with any election made under section 168 by the taxpayer for that year (see, for example, section 168(b)(5)). See §§1.168(k)-1T(f)(6)(iii) and 1.1400L(b)-1T(f)(6) for the additional first year depreciation deduction rules applicable to a conversion to business or income-producing use. The depreciable basis of the property for the year of change is the lesser of its fair market value or its adjusted depreciable basis (as defined in §1.168(b)-1T(a)(4)), as applicable, at the time of the conversion to business or income-producing use.
Example. A, a calendar-year taxpayer, purchases a house in 1985 that she occupies as her principal residence. In February 2004, A ceases to occupy the house and converts it to residential rental property. At the time of the conversion to residential rental property, the house’s fair market value (excluding land) is $130,000 and adjusted depreciable basis attributable to the house (excluding land) is $150,000. Pursuant to this paragraph (b), A is considered to have placed in service residential rental property in February 2004 with a depreciable basis of $130,000. A depreciates the residential rental property under the general depreciation system by using the straight-line method, a 27.5-year recovery period, and the mid-month convention. Pursuant to §§1.168(k)-1T(f)(6)(iii)(B) or 1.1400L(b)-1T(f)(6), this property is not eligible for the additional first year depreciation deduction provided by section 168(k) or section 1400L(b). Thus, the depreciation allowance for the house for 2004 is $4,137, after taking into account the mid-month convention (($130,000 adjusted depreciable basis multiplied by the applicable depreciation rate of 3.636% (1/27.5)) multiplied by the mid-month convention fraction of 10.5/12). The amount of depreciation computed under section 168, however, may be limited under other provisions of the Internal Revenue Code, such as, section 280A.
(c) Conversion to personal use. The conversion of MACRS property from business or income-producing use to personal use during a taxable year is treated as a disposition of the property in that taxable year. The depreciation allowance for MACRS property for the year of change in which the property is treated as being disposed of is determined by first multiplying the adjusted depreciable basis of the property as of the first day of the year of change by the applicable depreciation rate for that taxable year (for further guidance, for example, see section 6 of Rev. Proc. 87-57, 1987-2 C. B. 687, 692 (see §601.601(d)(2)(ii)(b) of this chapter)). This amount is then multiplied by a fraction, the numerator of which is the number of months (including fractions of months) the property is deemed to be placed in service during the year of change (taking into account the applicable convention) and the denominator of which is 12. No depreciation deduction is allowable for MACRS property placed in service and disposed of in the same taxable year. See §§1.168(k)-1T(f)(6)(ii) and 1.1400L(b)-1T(f)(6) for the additional first year depreciation deduction rules applicable to property placed in service and converted to personal use in the same taxable year. Upon the conversion to personal use, no gain, loss, or depreciation recapture under section 1245 or section 1250 is recognized. However, the provisions of section 1245 or section 1250 apply to any disposition of the converted property by the taxpayer at a later date. For listed property (as defined in section 280F(d)(4)), see section 280F(b)(2) for the recapture of excess depreciation upon the conversion to personal use.
(iii) Begins or ceases to be tax-exempt use property (as defined in section 168(h)).
(2) Determination of change in the use—(i) In general. Except as provided in paragraph (d)(2)(ii) of this section, a change in the use of MACRS property occurs when the primary use of the MACRS property in the taxable year is different from its primary use in the immediately preceding taxable year. The primary use of MACRS property may be determined in any reasonable manner that is consistently applied to the taxpayer’s MACRS property.
(ii) Alternative depreciation system property—(A) Property used within or outside the United States. A change in the use of MACRS property occurs when a taxpayer begins or ceases to use MACRS property predominantly outside the United States during the taxable year. The determination of whether MACRS property is used predominantly outside the United States is made in accordance with the test in §1.48-1(g)(1)(i) for determining predominant use.
(B) Tax-exempt bond financed property. A change in the use of MACRS property occurs when the property changes to tax-exempt bond financed property, as described in section 168(g)(1)(C) and (g)(5), during the taxable year. For purposes of this paragraph (d), MACRS property changes to tax-exempt bond financed property when a tax-exempt bond is first issued after the MACRS property is placed in service. MACRS property continues to be tax-exempt bond financed property in the hands of the taxpayer even if the tax-exempt bond (including any refunding issue) is no longer outstanding or is redeemed.
(C) Other mandatory alternative depreciation system property. A change in the use of MACRS property occurs when the property changes to, or changes from, property described in section 168(g)(1)(B) (tax-exempt use property) or (D) (imported property covered by an Executive order) during the taxable year.
(iii) Change in the use deemed to occur on first day of the year of change. If a change in the use of MACRS property occurs under this paragraph (d)(2), the depreciation allowance for that MACRS property for the year of change is determined as though the use of the MACRS property changed on the first day of the year of change.
(3) Change in the use results in a shorter recovery period and/or a more accelerated depreciation method—(i) Treated as placed in service in the year of change—(A) In general. If a change in the use results in the MACRS property changing to a shorter recovery period and/or a depreciation method that is more accelerated than the method used for the MACRS property before the change in the use, the depreciation allowances beginning in the year of change are determined as though the MACRS property is placed in service by the taxpayer in the year of change.
(B) Computation of depreciation allowance. The depreciation allowances for the MACRS property for any 12-month taxable year beginning with the year of change are determined by multiplying the adjusted depreciable basis of the MACRS property as of the first day of each taxable year by the applicable depreciation rate for each taxable year. In determining the applicable depreciation rate for the year of change and subsequent taxable years, the taxpayer must use any applicable depreciation method and recovery period prescribed under section 168 for the MACRS property in the year of change, consistent with any election made under section 168 by the taxpayer for that year (see, for example, section 168(b)(5)). If there is a change in the use of MACRS property, the applicable convention that applies to the MACRS property is the same as the convention that applied before the change in the use of the MACRS property. However, the depreciation allowance for the year of change for the MACRS property is determined without applying the applicable convention, unless the MACRS property is disposed of during the year of change. See paragraph (d)(5) of this section for the rules relating to the computation of the depreciation allowance under the optional depreciation tables. If the year of change or any subsequent taxable year is less than 12 months, the depreciation allowance determined under this paragraph (d)(3)(i) must be adjusted for a short taxable year (for further guidance, for example, see Rev. Proc. 89-15, 1989-1 C.B. 816 (see §601.601(d)(2)(ii)(b) of this chapter)).
(C) Special rules. MACRS property affected by this paragraph (d)(3)(i) is not eligible in the year of change for the election provided under section 168(f)(1), 179, or 1400L(f), or for the additional first year depreciation deduction provided in section 168(k) or 1400L(b). See §§1.168(k)-1T(f)(6)(iv) and 1.1400L(b)-1T(f)(6) for other additional first year depreciation deduction rules applicable to a change in the use of MACRS property subsequent to its placed-in-service year. For purposes of determining whether the mid-quarter convention applies to other MACRS property placed in service during the year of change, the unadjusted depreciable basis (as defined in §1.168(b)-1T(a)(3)) or the adjusted depreciable basis of MACRS property affected by this paragraph (d)(3)(i) is not taken into account.
(ii) Option to disregard the change in the use. In lieu of applying paragraph (d)(3)(i) of this section, the taxpayer may elect to determine the depreciation allowance as though the change in the use had not occurred. The taxpayer elects this option by claiming on the taxpayer’s timely filed (including extensions) Federal income tax return for the year of change the depreciation allowance for the property as though the change in the use had not occurred. See paragraph (g)(2) of this section for the manner for revoking this election.
(4) Change in the use results in a longer recovery period and/or a slower depreciation method—(i) Treated as originally placed in service with longer recovery period and/or slower depreciation method. If a change in the use results in a longer recovery period and/or a depreciation method for the MACRS property that is less accelerated than the method used for the MACRS property before the change in the use, the depreciation allowances beginning with the year of change are determined as though the MACRS property had been originally placed in service by the taxpayer with the longer recovery period and/or the slower depreciation method. MACRS property affected by this paragraph (d)(4) is not eligible in the year of change for the election provided under section 168(f)(1), 179, or 1400L(f), or for the additional first year depreciation deduction provided in section 168(k) or 1400L(b). See §§1.168(k)-1T(f)(6)(iv) and 1.1400L(b)-1T(f)(6) for other additional first year depreciation deduction rules applicable to a change in the use of MACRS property subsequent to its placed-in-service year.
(2) The number of years remaining as of the beginning of each taxable year (taking into account the applicable convention) had the taxpayer used the longer recovery period in the placed-in-service year of the property if the applicable depreciation method is the straight line method (as determined under paragraph (d)(4)(ii)(A) of this section) unless the recovery period did not change as a result of the change in the use, in which case the applicable recovery period is the number of years remaining as of the beginning of each taxable year (taking into account the applicable convention) based on the recovery period that applied before the change in the use.
(5) Using optional depreciation tables—(i) Taxpayer not bound by prior use of table. If a taxpayer used an optional depreciation table for the MACRS property before a change in the use, the taxpayer is not bound to use the appropriate new table for that MACRS property beginning in the year of change (for further guidance, for example, see section 8 of Rev. Proc. 87-57, 1987-2 C.B. 687, 693 (see §601.601(d)(2)(ii)(b) of this chapter)). If a taxpayer did not use an optional depreciation table for MACRS property before a change in the use and the change in the use results in a shorter recovery period and/or a more accelerated depreciation method (as described in paragraph (d)(3)(i) of this section), the taxpayer may use the appropriate new table for that MACRS property beginning in the year of change. If a taxpayer chooses not to use the optional depreciation table, the depreciation allowances for the MACRS property beginning in the year of change are determined under paragraph (d)(3)(i) or (4) of this section, as applicable.
(A) Change in the use results in a shorter recovery period and/or a more accelerated depreciation method. If a change in the use results in a shorter recovery period and/or a more accelerated depreciation method (as described in paragraph (d)(3)(i) of this section), the depreciation allowances for the MACRS property for any 12-month taxable year beginning with the year of change are determined by multiplying the adjusted depreciable basis of the MACRS property as of the first day of the year of change by the annual depreciation rate for each recovery year (expressed as a decimal equivalent) specified in the appropriate optional depreciation table. The appropriate optional depreciation table for the MACRS property is based on the depreciation system, depreciation method, recovery period, and convention applicable to the MACRS property in the year of change as determined under paragraph (d)(3)(i) of this section. The depreciation allowance for the year of change for the MACRS property is determined by taking into account the applicable convention (which is already factored into the optional depreciation tables). If the year of change or any subsequent taxable year is less than 12 months, the depreciation allowance determined under this paragraph (d)(5)(ii)(A) must be adjusted for a short taxable year (for further guidance, for example, see Rev. Proc. 89-15, 1989-1 C.B. 816 (see §601.601(d)(2)(ii)(b) of this chapter)).
(B) Change in the use results in a longer recovery period and/or a slower depreciation method—(1) Determination of the appropriate optional depreciation table. If a change in the use results in a longer recovery period and/or a slower depreciation method (as described in paragraph (d)(4)(i) of this section), the depreciation allowances for the MACRS property for any 12-month taxable year beginning with the year of change are determined by choosing the optional depreciation table that corresponds to the depreciation system, depreciation method, recovery period, and convention that would have applied to the MACRS property in the placed-in-service year had that property been originally placed in service by the taxpayer with the longer recovery period and/or the slower depreciation method. If there is a change in the use of MACRS property, the applicable convention that applies to the MACRS property is the same as the convention that applied before the change in the use of the MACRS property. If the year of change or any subsequent taxable year is less than 12 months, the depreciation allowance determined under this paragraph (d)(5)(ii)(B) must be adjusted for a short taxable year (for further guidance, for example, see Rev. Proc. 89-15, 1989-1 C.B. 816 (see §601.601(d)(2)(ii)(b) of this chapter)).
(2) Computation of the depreciation allowance. The depreciation allowances for the MACRS property for any 12-month taxable year beginning with the year of change are computed by first determining the appropriate recovery year in the table identified under paragraph (d)(5)(ii)(B)(1) of this section. The appropriate recovery year for the year of change is the year that corresponds to the year of change. For example, if the recovery year for the year of change would have been Year 4 in the table that applied before the change in the use of the MACRS property, then the recovery year for the year of change is Year 4 in the table identified under paragraph (d)(5)(ii)(B)(1) of this section. Next, the annual depreciation rate (expressed as a decimal equivalent) for each recovery year is multiplied by a transaction coefficient. The transaction coefficient is the formula (1 / (1 - x)) where x equals the sum of the annual depreciation rates from the table identified under paragraph (d)(5)(ii)(B)(1) of this section (expressed as a decimal equivalent) for the taxable years beginning with the placed-in-service year of the MACRS property through the taxable year immediately prior to the year of change. The product of the annual depreciation rate and the transaction coefficient is multiplied by the adjusted depreciable basis of the MACRS property as of the beginning of the year of change.
Example 1. Change in the use results in a shorter recovery period and/or a more accelerated depreciation method and optional depreciation table is not used—(i) X, a calendar-year corporation, places in service in 1999 equipment at a cost of $100,000 and uses this equipment from 1999 through 2003 primarily in its A business. X depreciates the equipment for 1999 through 2003 under the general depreciation system as 7-year property by using the 200-percent declining balance method (which switched to the straight-line method in 2003), a 7-year recovery period, and a half-year convention. Beginning in 2004, X primarily uses the equipment in its B business. As a result, the classification of the equipment under section 168(e) changes from 7-year property to 5-year property and the recovery period of the equipment under the general depreciation system changes from 7 years to 5 years. The depreciation method does not change. On January 1, 2004, the adjusted depreciable basis of the equipment is $22,311. X depreciates its 5-year recovery property placed in service in 2004 under the general depreciation system by using the 200-percent declining balance method and a 5-year recovery period. X does not use the optional depreciation tables.
(ii) Under paragraph (d)(3)(i) of this section, X’s allowable depreciation deduction for the equipment for 2004 and subsequent taxable years is determined as though X placed the equipment in service in 2004 for use primarily in its B business. The depreciable basis of the equipment as of January 1, 2004, is $22,311 (the adjusted depreciable basis at January 1, 2004). Because X does not use the optional depreciation tables, the depreciation allowance for 2004 (the deemed placed-in-service year) for this equipment only is computed without taking into account the half-year convention. Pursuant to paragraph (d)(3)(i)(C) of this section, this equipment is not eligible for the additional first year depreciation deduction provided by section 168(k) or section 1400L(b). Thus, X’s allowable depreciation deduction for the equipment for 2004 is $8,924 ($22,311 adjusted depreciable basis at January 1, 2004, multiplied by the applicable depreciation rate of 40% (200/5)). X’s allowable depreciation deduction for the equipment for 2005 is $5,355 ($13,387 adjusted depreciable basis at January 1, 2005, multiplied by the applicable depreciation rate of 40% (200/5)).
(iii) Alternatively, under paragraph (d)(3)(ii) of this section, X may elect to disregard the change in the use and, as a result, may continue to treat the equipment as though it is used primarily in its A business. If the election is made, X’s allowable depreciation deduction for the equipment for 2004 is $8,924 ($22,311 adjusted depreciable basis at January 1, 2004, multiplied by the applicable depreciation rate of 40% (1/2.5 years remaining at January 1, 2004)). X’s allowable depreciation deduction for the equipment for 2005 is $8,925 ($13,387 adjusted depreciable basis at January 1, 2005, multiplied by the applicable depreciation rate of 66.67% (1/1.5 years remaining at January 1, 2005)).
Example 2. Change in the use results in a shorter recovery period and/or a more accelerated depreciation method and optional depreciation table is used—(i) Same facts as in Example 1, except that X used the optional depreciation tables for computing depreciation for 1999 through 2003. Pursuant to paragraph (d)(5) of this section, X chooses to continue to use the optional depreciation table for the equipment. X does not make the election provided in paragraph (d)(3)(ii) of this section to disregard the change in use.
(ii) In accordance with paragraph (d)(5)(ii)(A) of this section, X must first identify the appropriate optional depreciation table for the equipment. This table is table 1 in Rev. Proc. 87-57 because the equipment will be depreciated in the year of change (2004) under the general depreciation system using the 200-percent declining balance method, a 5-year recovery period, and the half-year convention (which is the convention that applied to the equipment in 1999). Pursuant to paragraph (d)(3)(i)(C) of this section, this equipment is not eligible for the additional first year depreciation deduction provided by section 168(k) or section 1400L(b). For 2004, X multiplies its adjusted depreciable basis in the equipment as of January 1, 2004, of $22,311, by the annual depreciation rate in table 1 for recovery year 1 for a 5-year recovery period (.20), to determine the depreciation allowance of $4,462. For 2005, X multiplies its adjusted depreciable basis in the equipment as of January 1, 2004, of $22,311, by the annual depreciation rate in table 1 for recovery year 2 for a 5-year recovery period (.32), to determine the depreciation allowance of $7,140.
Example 3. Change in the use results in a longer recovery period and/or a slower depreciation method—(i) Y, a calendar-year corporation, places in service in January 2002, equipment at a cost of $100,000 and uses this equipment in 2002 and 2003 only within the United States. Y elects not to deduct the additional first year depreciation under section 168(k). Y depreciates the equipment for 2002 and 2003 under the general depreciation system by using the 200-percent declining balance method, a 5-year recovery period, and a half-year convention. Beginning in 2004, Y uses the equipment predominantly outside the United States. As a result of this change in the use, the equipment is subject to the alternative depreciation system beginning in 2004. Under the alternative depreciation system, the equipment is depreciated by using the straight line method and a 9-year recovery period. The adjusted depreciable basis of the equipment at January 1, 2004, is $48,000.
(ii) Pursuant to paragraph (d)(4) of this section, Y’s allowable depreciation deduction for 2004 and subsequent taxable years is determined as though the equipment had been placed in service in January 2002, as property used predominantly outside the United States. Further, pursuant to paragraph (d)(4)(i) of this section, the equipment is not eligible in 2004 for the additional first year depreciation deduction provided by section 168(k) or section 1400L(b). In determining the applicable depreciation rate for 2004, the applicable depreciation method is the straight line method and the applicable recovery period is 7.5 years, which is the number of years remaining at January 1, 2004, for property placed in service in 2002 with a 9-year recovery period (taking into account the half-year convention). Thus, the depreciation allowance for 2004 is $6,398 ($48,000 adjusted depreciable basis at January 1, 2004, multiplied by the applicable depreciation rate of 13.33% (1/7.5 years)). The depreciation allowance for 2005 is $6,398 ($41,602 adjusted depreciable basis at January 1, 2005, multiplied by the applicable depreciation rate of 15.38% (1/6.5 years remaining at January 1, 2005)).
Example 4. Change in the use results in a longer recovery period and/or a slower depreciation method and optional depreciation table is used—(i) Same facts as in Example 3, except that Y used the optional depreciation tables for computing depreciation in 2002 and 2003. Pursuant to paragraph (d)(5) of this section, Y chooses to continue to use the optional depreciation table for the equipment. Further, pursuant to paragraph (d)(4)(i) of this section, the equipment is not eligible in 2004 for the additional first year depreciation deduction provided by section 168(k) or section 1400L(b).
(ii) In accordance with paragraph (d)(5)(ii)(B) of this section, Y must first determine the appropriate optional depreciation table for the equipment pursuant to paragraph (d)(5)(ii)(B)(1) of this section. This table is table 8 in Rev. Proc. 87-57, which corresponds to the alternative depreciation system, the straight line method, a 9-year recovery period, and the half-year convention (because Y depreciated 5-year property in 2002 using a half-year convention). Next, Y must determine the appropriate recovery year in table 8. Because the year of change is 2004, the depreciation allowance for the equipment for 2004 is determined using recovery year 3 of table 8. For 2004, Y multiplies its adjusted depreciable basis in the equipment as of January 1, 2004, of $48,000, by the product of the annual depreciation rate in table 8 for recovery year 3 for a 9-year recovery period (.1111) and the transaction coefficient of 1.200 [1/(1-(.0556 (table 8 for recovery year 1 for a 9-year recovery period) +.1111 (table 8 for recovery year 2 for a 9-year recovery period)))], to determine the depreciation allowance of $6,399. For 2005, Y multiplies its adjusted depreciable basis in the equipment as of January 1, 2004, of $48,000, by the product of the annual depreciation rate in table 8 for recovery year 4 for a 9-year recovery period (.1111) and the transaction coefficient (1.200), to determine the depreciation allowance of $6,399.
(e) Change in the use of MACRS property during the placed-in-service year—(1) In general. Except as provided in paragraph (e)(2) of this section, if a change in the use of MACRS property occurs during the placed-in-service year and the property continues to be MACRS property owned by the same taxpayer, the depreciation allowance for that property for the placed-in-service year is determined by its primary use during that year. The primary use of MACRS property may be determined in any reasonable manner that is consistently applied to the taxpayer’s MACRS property. For purposes of this paragraph (e), the determination of whether the mid-quarter convention applies to any MACRS property placed in service during the year of change is made in accordance with §1.168(d)-1.
(2) Alternative depreciation system property—(i) Property used within and outside the United States. The depreciation allowance for the placed-in-service year for MACRS property that is used within and outside the United States is determined by its predominant use during that year. The determination of whether MACRS property is used predominantly outside the United States during the placed-in-service year shall be made in accordance with the test in §1.48-1(g)(1)(i) for determining predominant use.
(ii) Tax-exempt bond financed property. The depreciation allowance for the placed-in-service year for MACRS property that changes to tax-exempt bond financed property, as described in section 168(g)(1)(C) and (g)(5), during that taxable year is determined under the alternative depreciation system. For purposes of this paragraph (e), MACRS property changes to tax-exempt bond financed property when a tax-exempt bond is first issued after the MACRS property is placed in service. MACRS property continues to be tax-exempt bond financed property in the hands of the taxpayer even if the tax-exempt bond (including any refunding issue) is not outstanding at, or is redeemed by, the end of the placed-in-service year.
(B) The general depreciation system if the MACRS property is not described in section 168(g)(1)(B) or (D) at the end of the placed-in-service year, unless other provisions of the Internal Revenue Code or regulations under the Internal Revenue Code require the depreciation allowance for that MACRS property to be determined under the alternative depreciation system (for example, section 168(g)(7)).
Example 1. (i) Z, a utility and calendar-year corporation, acquires and places in service on January 1, 2004, equipment at a cost of $100,000. Z uses this equipment in its combustion turbine production plant for 4 months and then uses the equipment in its steam production plant for the remainder of 2004. Z’s combustion turbine production plant assets are classified as 15-year property and are depreciated by Z under the general depreciation system using a 15-year recovery period and the 150-percent declining balance method of depreciation. Z’s steam production plant assets are classified as 20-year property and are depreciated by Z under the general depreciation system using a 20-year recovery period and the 150-percent declining balance method of depreciation. Z uses the optional depreciation tables. The equipment is 50-percent bonus depreciation property for purposes of section 168(k).
(ii) Pursuant to this paragraph (e), Z must determine depreciation based on the primary use of the equipment during the placed-in-service year. Z has consistently determined the primary use of all of its MACRS properties by comparing the number of full months in the taxable year during which a MACRS property is used in one manner with the number of full months in that taxable year during which that MACRS property is used in another manner. Applying this approach, Z determines the depreciation allowance for the equipment for 2004 is based on the equipment being classified as 20-year property because the equipment was used by Z in its steam production plant for 8 months in 2004. If the half-year convention applies in 2004, the appropriate optional depreciation table is table 1 in Rev. Proc. 87-57, which is the table for MACRS property subject to the general depreciation system, the 150-percent declining balance method, a 20-year recovery period, and the half-year convention. Thus, the depreciation allowance for the equipment for 2004 is $51,875, which is the total of $50,000 for the 50-percent additional first year depreciation deduction allowable (the unadjusted depreciable basis of $100,000 multiplied by .50), plus $1,875 for the 2004 depreciation allowance on the remaining adjusted depreciable basis of $50,000 [(the unadjusted depreciable basis of $100,000 less the additional first year depreciation deduction of $50,000) multiplied by the annual depreciation rate of .0375 in table 1 for recovery year 1 for a 20-year recovery period].
Example 2. T, a calendar year corporation, places in service on January 1, 2004, several computers at a total cost of $100,000. T uses these computers within the United States for 3 months in 2004 and then moves and uses the computers outside the United States for the remainder of 2004. Pursuant to §1.48-1(g)(1)(i), the computers are considered as used predominantly outside the United States in 2004. As a result, for 2004, the computers are required to be depreciated under the alternative depreciation system of section 168(g) with a recovery period of 5 years pursuant to section 168(g)(3)(C). T uses the optional depreciation tables. If the half-year convention applies in 2004, the appropriate optional depreciation table is table 8 in Rev. Proc. 87-57, which is the table for MACRS property subject to the alternative depreciation system, the straight line method, a 5-year recovery period, and the half-year convention. Thus, the depreciation allowance for the computers for 2004 is $10,000, which is equal to the unadjusted depreciable basis of $100,000 multiplied by the annual depreciation rate of .10 in table 8 for recovery year 1 for a 5-year recovery period. Because the computers are required to be depreciated under the alternative depreciation system in their placed-in-service year, pursuant to section 168(k)(2)(C)(i) and §1.168(k)-1T(b)(2)(ii), the computers are not eligible for the additional first year depreciation deduction provided by section 168(k).
(f) No change in accounting method. A change in computing the depreciation allowance in the year of change for property subject to this section is not a change in method of accounting under section 446(e). See §1.446-1T(e)(2)(ii)(d)(3)(ii).
(g) Effective dates—(1) In general. This section applies to any change in the use of MACRS property in a taxable year ending on or after June 17, 2004. For any change in the use of MACRS property after December 31, 1986, in a taxable year ending before June 17, 2004, the Internal Revenue Service will allow any reasonable method of depreciating the property under section 168 in the year of change and the subsequent taxable years that is consistently applied to any property for which the use changes in the hands of the same taxpayer or the taxpayer may choose, on a property-by-property basis, to apply the provisions of this section.
(2) Change in method of accounting—(i) In general. If a taxpayer adopted a method of accounting for depreciation due to a change in the use of MACRS property in a taxable year ending on or after December 30, 2003, and the method adopted is not in accordance with the method of accounting for depreciation provided in this section, a change to the method of accounting for depreciation provided in this section is a change in method of accounting to which the provisions of sections 446(e) and 481 and the regulations under sections 446(e) and 481 apply. Also, a revocation of the election provided in paragraph (d)(3)(ii) of this section to disregard a change in the use is a change in method of accounting to which the provisions of sections 446(e) and 481 and the regulations under sections 446(e) and 481 apply. However, if a taxpayer adopted a method of accounting for depreciation due to a change in the use of MACRS property after December 31, 1986, in a taxable year ending before December 30, 2003, and the method adopted is not in accordance with the method of accounting for depreciation provided in this section, the taxpayer may treat the change to the method of accounting for depreciation provided in this section as a change in method of accounting to which the provisions of sections 446(e) and 481 and the regulations under sections 446(e) and 481 apply.
(ii) Automatic consent to change method of accounting. A taxpayer changing its method of accounting in accordance with this paragraph (g)(2) must follow the applicable administrative procedures issued under §1.446-1(e)(3)(ii) for obtaining the Commissioner’s automatic consent to a change in method of accounting (for further guidance, for example, see Rev. Proc. 2002-9, 2002-1 C.B. 327, as modified by Rev. Proc. 2004-11, 2004-3 I.R.B. 311 (see §601.601(d)(2)(ii)(b) of this chapter)). Any change in method of accounting made under this paragraph (g)(2) must be made using an adjustment under section 481(a). For purposes of Form 3115, Application for Change in Accounting Method, the designated number for the automatic accounting method change authorized by this paragraph (g)(2) is “88.” If Form 3115 is revised or renumbered, any reference in this section to that form is treated as a reference to the revised or renumbered form.
The principal author of these regulations is Sara Logan, Office of Associate Chief Counsel (Passthroughs and Special Industries). However, other personnel from the IRS and Treasury Department participated in their development.
This document contains regulations relating to the definition of passenger automobile for purposes of the dollar limits on depreciation deductions for passenger automobiles. These regulations affect certain taxpayers that use vans and light trucks in their trade or business.
Effective Date: These regulations are effective June 25, 2004.
Applicability Dates: These regulations apply to property placed in service by a taxpayer on or after July 7, 2003. For regulations applicable to property placed in service before July 7, 2003, see §1.280F-6T as in effect prior to July 7, 2003 (§1.280F-6T as contained in 26 CFR part 1, revised as of April 1, 2003). Taxpayers may choose to apply §1.280F-6(c)(3)(iii) to property placed in service prior to July 7, 2003, and if necessary may either amend returns for open taxable years or file a Form 3115 in order to apply §1.280F-6(c)(3)(iii) to such property.
Bernard P. Harvey, (202) 622-3110 (not a toll-free number).
On July 7, 2003, the IRS published temporary regulations (T.D. 9069, 2003-37 I.R.B. 525) in the Federal Register (68 FR 40129) containing amendments to 26 CFR part 1 under section 280F of the Internal Revenue Code of 1986 (Code), including the addition of §1.280F-6T(c)(3)(iii). On the same date, the IRS published proposed regulations (REG-138495-02, 2003-37 I.R.B. 541) in the Federal Register (68 FR 40224) inviting comments under section 280F and inviting requests to hold a public hearing. Several comments were received, but no requests to hold a public hearing. After consideration of all the comments, the rules in T.D. 9069 and the proposed regulations are made retroactive for taxpayers that choose to apply the rules to property placed in service before the proposed effective date and are adopted as final regulations. In addition, a conforming amendment is made to §1.280F-6T, and §1.280F-6T is redesignated as §1.280F-6.
Section 280F(a) of the Code imposes annual dollar limits on the depreciation deduction allowable with respect to passenger automobiles. T.D. 9069 and the proposed regulations provide that a truck or van is not subject to these limits if it is a qualified nonpersonal use vehicle as defined in §1.274-5T(k). This rule applies to vehicles placed in service on or after July 7, 2003.
Commentators suggested that the rule announced by T.D. 9069 and the proposed regulations be made available retroactively to owners of qualified nonpersonal use vehicles placed in service during the period beginning January 1, 2003, and ending July 6, 2003, and that taxpayers who have filed fiscal-year returns be allowed to amend those returns to claim additional deductions for such vehicles. Commentators have also requested that we give some measure of audit protection to taxpayers who placed qualified nonpersonal use vehicles in service prior to 2003 and depreciated the vehicles in a manner consistent with T.D. 9069 and the proposed regulations. We have amended the effective date provision to allow taxpayers to use the exclusion for qualified nonpersonal use vehicles for vehicles placed in service prior to July 7, 2003, and to permit taxpayers either to amend tax returns for open taxable years, or to treat the change as a change in method of accounting by filing a Form 3115, “Application for Change in Accounting Method”.
Comments received from the funeral services industry requested amendments to the definition of qualified nonpersonal use vehicles in the temporary regulations under section 274 to clarify that certain vehicles used in the funeral services industry are qualified nonpersonal use vehicles for purposes of the substantiation requirements under that section. We believe that such an amendment is beyond the scope of these regulations, which are specific to section 280F(a).
Another commentator indicated that the relief afforded by T.D. 9069 and the proposed regulations is too narrow, and requested that we amend the regulations to establish a use-based test that would exclude more trucks and vans from section 280F(a). The comment suggested a test that would exclude all trucks and vans for which the taxpayer could demonstrate a specific business need, and which are used for a valid business purpose. We believe that the proposed test is inherently subjective and would cause administrative difficulty of the type that the proposed regulations were designed to avoid. We continue to encourage suggestions for objective use-based tests that could serve as the basis for future guidance.
We were asked by the Office of Advocacy of the U.S. Small Business Administration (Advocacy) to perform a regulatory flexibility analysis because Advocacy believes that T.D. 9069 and the proposed regulations constitute a legislative rule as defined in the Regulatory Flexibility Act. A Regulatory Flexibility Act (RFA) analysis must be performed for legislative rules having a significant impact on small business, but not for interpretive rules or for legislative rules with no significant impact on small businesses. It is the position of the IRS and Treasury that T.D. 9069 and the proposed regulations constitute an interpretive rule for which no regulatory flexibility analysis is necessary. In any event, the rule proposed in the regulations is in all cases beneficial to taxpayers and does not have a significant impact on small business for purposes of the Regulatory Flexibility Act.
It has been determined that this Treasury decision is not a significant regulatory action as defined in Executive Order 12866. Therefore, a regulatory assessment is not required. It also has been determined that section 553(b) of the Administrative Procedure Act (5 U.S.C. chapter 5) does not apply to these regulations, and because the regulations do not impose a collection of information on small entities, the Regulatory Flexibility Act (5 U.S.C. chapter 6) does not apply. Pursuant to section 7805(f) of the Code, the notice of proposed rulemaking was submitted to the Chief Counsel for Advocacy of the Small Business Administration for comment on its impact on small business.
1. The heading in the fifth column of the table of paragraph (b) is amended by removing “§1.280F-6T” and adding “§1.280F-6” in its place.
2. The first sentence in paragraph (c)(1) is amended by removing “1.280F-6T” and adding “1.280F-6” in its place.
3. The first sentence in paragraph (c)(2) is amended by removing “1.280F-6T” and adding “1.280F-6” in its place.
The first sentence in paragraph (i) is amended by removing “§1.280F-6T(d)(3)” and adding “§1.280F-6(d)(3)” in its place.
1. The first sentence in paragraph (a) is amended by removing “§1.280F-6T(b)” and adding “§1.280F-6(b)” in its place.
2. The last sentence in paragraph (a) is amended by removing “§1.280F-6T(d)” and adding “§1.280F-6(d)” in its place.
3. The first sentence in paragraph (b)(1) is amended by removing “§1.280F-6T(d)(1)” and adding “§1.280F-6(d)(1)” in its place.
4. The third sentence in paragraph (b)(1) is amended by removing “§1.280F-6T(d)(3)” and adding “§1.280F-6(d)(3)” in its place, and by removing “§1.280F-6T(d)(2)(i)” and adding “§1.280F-6(d)(2)(i)” in its place.
5. The first sentence in paragraph (b)(2) is amended by removing “§1.280F-6T(d)(3)” and adding “§1.280F-6(d)(3)” in its place.
6. The third sentence in paragraph (b)(2) is amended by removing “§1.280F-6T(d)(1)” and adding “§1.280F-6(d)(1)” in its place.
7. The first sentence in paragraph (c)(1) is amended by removing “§1.280F-6T(b)” and adding “§1.280F-6(b)” in its place, and by removing “§1.280F-6T(d)(4)” and adding “§1.280F-6(d)(4)” in its place.
8. The first sentence in paragraph (c)(2) is amended by removing “§1.280F-6T(d)(4)” and adding “§1.280F-6(d)(4)” in its place.
9. Paragraph (d)(1) is amended by removing “§1.280F-6T(d)(4)” and adding “§1.280F-6(d)(4)” in its place.
The fifth sentence in paragraph (a)(1) is amended by removing “§1.280F-6T(d)(2)” and adding “§1.280F-6(d)(2)” in its place.
The first sentence in paragraph (d)(1) is amended by removing “§1.280F-6T(d)(3)(i)” and adding “§1.280F-6(d)(3)(i)” in its place.
1. Paragraph (b)(1)(iv) is amended by removing “section 168(j)(5)(D)” and adding “section 168(i)(2)(B)” in its place.
2. Paragraph (f) is added.
(f) Effective date—(1) In general. Except as provided in paragraph (f)(2) of this section, this section applies to property placed in service by a taxpayer on or after July 7, 2003. For regulations applicable to property placed in service before July 7, 2003, see §1.280F-6T as in effect prior to July 7, 2003 (§1.280F-6T as contained in 26 CFR part 1, revised as of April 1, 2003).
(i) Except as provided in paragraphs (f)(2)(ii), (iii), and (iv) of this section, a pre-effective date vehicle will be treated as a passenger automobile to which section 280F(a) applies.
(ii) A pre-effective date vehicle will be treated as property to which section 280F(a) does not apply if the taxpayer adopts that treatment in determining depreciation deductions on the taxpayer’s original return for the year in which the vehicle is placed in service.
(iii) A pre-effective date vehicle will be treated, to the extent provided in this paragraph (f)(2)(iii), as property to which section 280F(a) does not apply if the taxpayer adopts that treatment on an amended Federal tax return in accordance with this paragraph (f)(2)(iii). This paragraph (f)(2)(iii) applies only if, on or before December 31, 2004, the taxpayer files, for all applicable taxable years, amended Federal tax returns (or qualified amended returns, if applicable (for further guidance, see Rev. Proc. 94-69, 1994-2 C.B. 804, and §601.601(d)(2)(ii)(b) of this chapter)) treating the vehicle as property to which section 280F(a) does not apply. The applicable taxable years for this purpose are the taxable year in which the vehicle was placed in service by the taxpayer (or, if the period of limitation for assessment under section 6501 has expired for such year or any subsequent year (a closed year), the first taxable year following the most recent closed year) and all subsequent taxable years in which the vehicle was treated on the taxpayer’s return as property to which section 280F(a) applies. If the earliest applicable taxable year is not the year in which the vehicle was placed in service, the adjusted depreciable basis of the property as of the beginning of the first applicable taxable year is recovered over the remaining recovery period. If the remaining recovery period as of the beginning of the first applicable taxable year is less than 12 months, the entire adjusted depreciable basis of the property as of the beginning of the first applicable taxable year is recovered in that year.
(iv) A pre-effective date vehicle will be treated, to the extent provided in this paragraph (f)(2)(iv), as property to which section 280F(a) does not apply if the taxpayer adopts that treatment on Form 3115, Application for Change in Accounting Method, in accordance with this paragraph (f)(2)(iv). The taxpayer must follow the applicable administrative procedures issued under §1.446-1(e)(3)(ii) for obtaining the Commissioner’s automatic consent to a change in method of accounting (for further guidance, for example, see Rev. Proc. 2002-9, 2002-1 C.B. 327, and §601.601(d)(2)(ii)(b) of this chapter). If the taxpayer files a Form 3115 treating the vehicle as property to which section 280F(a) does not apply, the taxpayer will be permitted to treat the change as a change in method of accounting under section 446(e) of the Internal Revenue Code and to take into account the section 481 adjustment resulting from the method change. For purposes of Form 3115, the designated number for the automatic accounting method change authorized for this paragraph (f)(2)(iv) is 89.
1. Paragraph (a)(2)(iii) is amended by removing “§1.280F-6T(d)(3)(i)” and adding “§1.280F-6(d)(3)(i)” in its place.
2. The second sentence in paragraph (b)(1) is amended by removing “§1.280F-6T(d)(1)” and adding “§1.280F-6(d)(1)” in its place.
3. Paragraph (b)(2)(i)(B) is amended by removing “§1.280F-6T(d)(3)(i)” and adding “§1.280F-6(d)(3)(i)” in its place, and by removing “§1.280F-6T(d)(1)” and adding “§1.280F-6(d)(1)” in its place.
The principal author of these regulations is Bernard P. Harvey, Office of Associate Chief Counsel (Passthroughs and Special Industries). However, other personnel from the IRS and Treasury Department participated in their development.
This revenue ruling extends the ability to participate in group trusts described in Rev. Rul. 81-100, 1981-1 C.B. 326, to eligible governmental plans under § 457(b) of the Internal Revenue Code and clarifies the ability of Roth individual retirement accounts described in § 408A and deemed individual retirement accounts described in § 408(q) to participate in these group trusts. In addition, this revenue ruling provides related model language for eligible governmental plans under § 457(b).
Whether the assets of eligible governmental plan trusts described in § 457(b) may be pooled with the assets of a group trust described in Rev. Rul. 81-100, without affecting the tax status of the eligible governmental plan trust or the group trust (including its current participants).
Section 501(a) provides, in part, that a trust described in § 401(a) is exempt from income tax.
Section 401(a)(1) provides that a trust or trusts created or organized in the United States and forming a part of a stock bonus, pension, or profit-sharing plan of an employer for the exclusive benefit of its employees or their beneficiaries is qualified under § 401(a) if contributions are made to the trust or trusts by the applicable employer, or employees, or both for the purpose of distributing to such employees or their beneficiaries the corpus and income of the fund accumulated in accordance with such plan. Section 401(a)(2) provides, in part, that under each trust instrument it must be impossible, at any time prior to the satisfaction of all liabilities with respect to employees and their beneficiaries under the plan and the trust or trusts, for any part of the corpus or income of the trust, to be used for or diverted to purposes other than for the exclusive benefit of the employees or their beneficiaries.
Section 408A provides that, except as otherwise provided in § 408A, a Roth IRA is treated for purposes of the Code as an individual retirement plan, which includes an individual retirement account that meets the requirement of § 408. Consequently, a Roth IRA that is an individual retirement account is exempt from tax under § 408(e).
Section 408(q) provides, in part, that if a qualified employer plan, as defined in § 408(q)(3)(A), elects to allow employees to make voluntary employee contributions to a separate account established under the plan and, under the terms of the qualified employer plan, the account meets the requirements of § 408 or 408A for an individual retirement account, then that account is treated as an individual retirement account (deemed individual retirement account), and not as a qualified employer plan. An individual retirement account described in § 408(q) is exempt from taxation under § 408(e).
Section 457 provides that compensation deferred under an eligible deferred compensation plan of an eligible employer that is a State or political subdivision, agency, or instrumentality thereof (an eligible governmental plan) and any income attributable to the amounts deferred, is includible in gross income only in the taxable year in which it is paid to the plan participant or beneficiary. Section 457(g)(1) requires an eligible governmental plan under § 457(b) to hold all assets and income of the plan in a trust for the exclusive benefit of participants and their beneficiaries. Section 457(g)(2) provides, in part, that a trust described in § 457(g)(1) is treated as an organization exempt from federal income tax under § 501(a). Section 457(g)(3) provides that custodial account and contracts described in § 401(f) are treated as trusts under rules similar to the rules under § 401(f).
This revenue ruling extends the holding of Rev. Rul. 81-100 to eligible governmental plans described in § 457(b). Therefore, if the requirements below are satisfied, the funds from qualified plan trusts, individual retirement accounts (including a Roth individual retirement account described in § 408A and a deemed individual retirement account described in § 408(q)) that are tax-exempt under § 408(e), and eligible governmental plan trusts described in § 457(b) and § 457(g) may be pooled without adversely affecting the tax status of the group trust or the tax status of the separate trusts.
The assets of eligible governmental plan trusts described in § 457(b) may be pooled with the assets of a group trust described in Rev. Rul. 81-100 without affecting the tax status of the eligible governmental plan trust or the group trust (including its current participants).
Accordingly, under Rev. Rul. 81-100 and this revenue ruling, if the five criteria below are satisfied, a trust that is part of a qualified retirement plan, an individual retirement account (including a Roth individual retirement account described in § 408A and a deemed individual retirement account described in § 408(q)) that is exempt from taxation under § 408(e), or an eligible governmental plan under § 457(b) may pool its assets in a group trust without adversely affecting the tax status of any of the separate trusts or the group trust. For this purpose, a trust includes a custodial account that is treated as a trust under § 401(f), under § 408(h), or under § 457(g)(3).
The group trust is adopted as a part of each adopting employer’s plan or each adopting individual retirement account.
The group trust instrument expressly limits participation to pension, profit-sharing, and stock bonus trusts or custodial accounts qualifying under § 401(a) that are exempt under § 501(a); individual retirement accounts that are exempt under § 408(e); and eligible governmental plan trusts or custodial accounts under § 457(b) that are exempt under § 457(g) (adopting entities).
The group trust instrument prohibits any part of its corpus or income that equitably belongs to any adopting entity from being used for or diverted to any purpose other than for the exclusive benefit of the employees (and the individual for whom an individual retirement account is maintained) and their beneficiaries who are entitled to benefits under such adopting entity.
The group trust instrument prohibits assignment by an adopting entity of any part of its equity or interest in the group trust.
The group trust is created or organized in the United States and is maintained at all times as a domestic trust in the United States.
There are two model amendments set forth below. One is for those group trusts that have received favorable determination letters from the Service that the group trust satisfies Rev. Rul. 81-100. The other is for those trusts of eligible governmental plans under § 457(b) that have received a letter ruling from the Service (in each instance issued prior to July 12, 2004).
A trustee entitled to rely on a favorable determination letter issued to it prior to July 12, 2004, regarding eligibility of its group trust under Rev. Rul. 81-100 will not lose its right to rely on its determination letter merely because it adopts Model Amendment 1 set forth above in this revenue ruling on a word-for-word basis (or adopts an amendment that is substantially similar in all material respects). The group trust sponsor may adopt Model Amendment 1 on a word-for-word basis (or adopt an amendment that is substantially similar in all material respects) and continue to rely on the previously issued determination letter regarding its group trust without filing another request with the Service for a new determination letter.
Generally, the group trust instrument will provide that amendments to the group trust will automatically pass through to the trusts of qualified plans under § 401(a); individual retirement accounts that are exempt under § 408(e); and trusts of eligible governmental plans under § 457(b). However, a group trust that has received a favorable determination letter under Rev. Proc. 2004-6, 2004-1 I.R.B. 204, (or its predecessors) that does not contain such a pass-through provision may not adopt Model Amendment 1 and automatically continue to rely on its determination letter. In addition, further guidance will be issued to address the transition necessary to bring into compliance a group trust that has received a favorable determination letter under Rev. Proc. 2004-6, 2004-1 I.R.B. 204, (or its predecessors) that does not comply with this revenue ruling.
An employer described in section 457(e)(1)(A) entitled to rely on a favorable private letter ruling issued to it prior to July 12, 2004, regarding the eligibility of its plan under § 457(b) will not lose its right to rely on its letter ruling merely because it adopts Model Amendment 2 set forth above on a word-for-word basis (or adopts an amendment that is substantially similar in all material respects). Such an employer may adopt Model Amendment 2 on a word-for-word basis (or adopt an amendment that is substantially similar in all material respects) and continue to rely on the previously issued letter ruling regarding its § 457(b) plan without filing another request with the Service for a new letter ruling.
Rev. Rul. 81-100 is clarified and modified.
The principal author of this revenue ruling is Dana A. Barry of the Employee Plans, Tax Exempt and Government Entities Division. For further information regarding this revenue ruling, please contact the Employee Plans’ taxpayer assistance telephone service at 1-877-829-5500 (a toll-free number) between the hours of 8:00 a.m. and 6:30 p.m. Eastern Time, Monday through Friday (a toll-free call). Ms. Barry may be reached at (202) 283-9888 (not a toll-free call).
The Internal Revenue Service is aware that taxpayers who (1) transfer an easement on real property to a charitable organization, or (2) make payments to a charitable organization in connection with a purchase of real property from the charitable organization, may be improperly claiming charitable contribution deductions under § 170 of the Internal Revenue Code. The purpose of this notice is to advise participants in these transactions that, in appropriate cases, the Service intends to disallow such deductions and may impose penalties and excise taxes. Furthermore, the Service may, in appropriate cases, challenge the tax-exempt status of a charitable organization that participates in these transactions. In addition, this notice advises promoters and appraisers that the Service intends to review promotions of transactions involving these improper deductions, and that the promoters and appraisers may be subject to penalties.
Section 170(a)(1) allows as a deduction, subject to certain limitations and restrictions, any charitable contribution (as defined in § 170(c)) that is made within the taxable year. Generally, to be deductible as a charitable contribution under § 170, a transfer to a charitable organization must be a gift of money or property without receipt or expectation of receipt of adequate consideration, made with charitable intent. See U.S. v. American Bar Endowment, 477 U.S. 105, 117-18 (1986); Hernandez v. Commissioner, 490 U.S. 680, 690 (1989); see also § 1.170A-1(h)(1) and (2) of the Income Tax Regulations.
Section 170(f)(3) provides generally that no charitable contribution deduction is allowed for a transfer to a charitable organization of less than the taxpayer’s entire interest in property. Section 170(f)(3)(B)(iii) provides an exception to this rule in the case of a qualified conservation contribution.
A qualified conservation contribution is a contribution of a qualified real property interest to a qualified organization exclusively for certain conservation purposes. Section 170(h)(1), (2), (3), and (4); § 1.170A-14(a). A qualified real property interest includes a restriction (granted in perpetuity) on the use that may be made of the real property. Section 170(h)(2)(C); see also § 1.170A-14(b)(2). For purposes of this notice, qualified real property interests described in § 170(h)(2)(C) are referred to as conservation easements.
One of the permitted conservation purposes listed in § 170(h)(4) is the protection of a relatively natural habitat of fish, wildlife, or plants, or similar ecosystem. Section 170(h)(4)(A)(ii); see also § 1.170A-14(d)(1)(ii) and (3). Another of the permitted conservation purposes is the preservation of open space (“open space easement”), including farmland and forest land, for the scenic enjoyment of the general public or pursuant to a clearly delineated governmental conservation policy. However, if the public benefit of an open space easement is not significant, the charitable contribution deduction will be disallowed. See § 170(h)(4)(A)(iii); see also § 1.170A-14(d)(1)(iii) and (4)(iv), (v), and (vi). Section 170(h) and § 1.170A-14 contain many other requirements that must be satisfied for a contribution of a conservation easement to be allowed as a deduction.
A charitable contribution is allowed as a deduction only if substantiated in accordance with regulations prescribed by the Secretary. Section 170(a)(1) and (f)(8). Under § 170(f)(8), a taxpayer must substantiate its contributions of $250 or more by obtaining from the charitable organization a statement that includes (1) a description of any return benefit provided by the charitable organization, and (2) a good faith estimate of the benefit’s fair market value. See § 1.170A-13 for additional substantiation requirements. In appropriate cases, the Service will disallow deductions for conservation easement transfers if the taxpayer fails to comply with the substantiation requirements. The Service is considering changes to forms to facilitate compliance with and enforcement of the substantiation requirements.
If all requirements of § 170 are satisfied and a deduction is allowed, the amount of the deduction may not exceed the fair market value of the contributed property (in this case, the contributed easement) on the date of the contribution (reduced by the fair market value of any consideration received by the taxpayer). See § 1.170A-1(c)(1), (h)(1) and (2). Fair market value is the price at which the contributed property would change hands between a willing buyer and a willing seller, neither being under any compulsion to buy or sell, and each having reasonable knowledge of relevant facts. Section 1.170A-1(c)(2). See § 1.170A-14(h)(3) and (4) for a discussion of valuation.
If the donor (or a related person) reasonably can expect to receive financial or economic benefits greater than those that will inure to the general public as a result of the donation of a conservation easement, no deduction is allowable. Section 1.170A-14(h)(3)(i). If the donation of a conservation easement has no material effect on the value of real property, or enhances rather than reduces the value of real property, no deduction is allowable. Section 1.170A-14(h)(3)(ii).
Some taxpayers are claiming inappropriate charitable contribution deductions under § 170 for cash payments or easement transfers to charitable organizations in connection with the taxpayers’ purchases of real property.
In some of these questionable cases, the charitable organization purchases the property and places a conservation easement on the property. Then, the charitable organization sells the property subject to the easement to a buyer for a price that is substantially less than the price paid by the charitable organization for the property. As part of the sale, the buyer makes a second payment, designated as a “charitable contribution,” to the charitable organization. The total of the payments from the buyer to the charitable organization fully reimburses the charitable organization for the cost of the property.
In appropriate cases, the Service will treat these transactions in accordance with their substance, rather than their form. Thus, the Service may treat the total of the buyer’s payments to the charitable organization as the purchase price paid by the buyer for the property.
Taxpayers are advised that the Service intends to disallow all or part of any improper deductions and may impose penalties under § 6662.
The Service intends to assess excise taxes under § 4958 against any disqualified person who receives an excess benefit from a conservation easement transaction, and against any organization manager who knowingly participates in the transaction. In appropriate cases, the Service may challenge the tax-exempt status of the organization, based on the organization’s operation for a substantial nonexempt purpose or impermissible private benefit.
In addition, the Service intends to review promotions of transactions involving improper deductions for conservation easements. Promoters, appraisers, and other persons involved in these transactions may be subject to penalties under §§ 6700, 6701, and 6694.
The principal author of this notice is Patricia M. Zweibel of the Office of Associate Chief Counsel (Income Tax & Accounting). For further information regarding this notice, contact Ms. Zweibel at (202) 622-5020 (not a toll-free call).
Section 368(a)(1)(B) of the Internal Revenue Code defines as a reorganization the acquisition by one corporation, in exchange solely for all or part of its voting stock (or in exchange solely for all or a part of the voting stock of a corporation which is in control of the acquiring corporation), of stock of another corporation if, immediately after the acquisition, the acquiring corporation has control of such other corporation (whether or not such acquiring corporation had control immediately before the acquisition) (a B reorganization). Section 362(b) generally provides that the basis of property acquired by a corporation in connection with a reorganization shall be the same as it would be in the hands of the transferor. Therefore, the acquiring corporation’s basis in the stock acquired in a B reorganization is determined by reference to the basis of the former shareholders in such stock.
In Rev. Proc. 81-70, 1981-2 C.B. 729, the Internal Revenue Service set forth guidelines for estimating the basis of stock acquired by an acquiring corporation in a B reorganization. That revenue procedure permits the acquiring corporation in a B reorganization to apply certain statistical sampling techniques to determine its basis in the acquired stock. The guidelines reflect the recognition that the information needed by the acquiring corporation to establish the basis of the acquired corporation’s stock is in the possession of the former shareholders of the acquired corporation, who may not respond to basis inquiries. They also reflect the recognition that, in certain cases, it may be time consuming, burdensome and costly for the acquiring corporation to contact each former shareholder of the acquired corporation.
The Service is concerned that changes in the marketplace since Rev. Proc. 81-70 was issued may have rendered compliance with its requirements for statistical sampling unduly burdensome or impossible and that, therefore, taxpayers are not complying with those requirements. For example, the Service understands that the way stock is held today may prevent or hinder access to the information necessary to determine the shareholder’s basis in such stock.
A number of commentators have suggested that the Service revise Rev. Proc. 81-70. The Service requests comments regarding problems taxpayers are encountering in their effort to comply with the requirements of Rev. Proc. 81-70 and whether it should be modified.
The Service particularly seeks comments from those who perform basis studies that are intended to comply with the requirements of Rev. Proc. 81-70, those engaged in providing services and information to the investment community (including those who maintain custodial information that may be used in such studies, such as broker/dealers, banks, and similar organizations), and other interested parties.
In addition, from those that perform basis studies that are intended to comply with the requirements of Rev. Proc. 81-70, the following information is specifically requested: (i) descriptions of the sources of information, both historic and recent, available for use in performing basis studies; and (ii) descriptions of the methodologies utilized to determine the basis of stock held by persons that do not respond to requests for basis information.
From record keepers, the following information is specifically requested: (i) descriptions of the kinds of information that are maintained that may be used to perform basis studies and of the sources of this information; (ii) statements describing the length of time that this information is generally maintained and available for use; and (iii) descriptions of confidentiality concerns, if any, that may impair or delay a response to a basis inquiry.
Alternatively, comments may be submitted electronically via e-mail to the following address: [email protected]. Please include “Notice 2004-44” in the subject line. All comments will be available for public inspection and copying in their entirety.
For information regarding estimates and sampling techniques, please contact Edward Cohen at (212) 719-6693 (not a toll-free call). For further information regarding this notice generally, please contact George Johnson or Reginald Mombrun at (202) 622-7930 (not a toll-free call).
The Internal Revenue Service is aware that certain promoters are advising taxpayers to take highly questionable, and in most cases meritless, positions described below in order to avoid U.S. taxation and claim a tax benefit under the laws of the United States Virgin Islands (USVI). Promoters may also be advising taxpayers to take similar positions with respect to other U.S. possessions. This notice alerts taxpayers that the Service intends to challenge these positions in appropriate cases. The Service may impose civil penalties on taxpayers or persons who participated in the promotion or reporting of these positions. In addition to being subject to other penalties, any person who willfully attempts to evade or defeat tax by means of an arrangement such as the one described in this notice, or who willfully counsels or advises such evasion or defeat, may be guilty of a criminal offense under federal law.
Section 934, which was enacted in 1960, provides that the USVI may reduce its territorial income tax only in certain limited cases. The USVI may not, however, reduce the tax liability of U.S. citizens or residents who are not bona fide residents of the USVI. In the case of U.S. citizens or residents who are bona fide residents of the USVI, it may reduce their tax liability only with respect to income from sources in the USVI or income effectively connected with the conduct of a trade or business within the USVI.
in no case should this [goal] be attained by granting windfall gains to taxpayers with respect to income derived from investments in corporations in the continental United States, or with respect to income in any other manner derived from sources outside of the Virgin Islands.
S. Rep. No. 1767, 86th Cong., 2nd Sess. 4 (1960).
Promoters typically approach a taxpayer (Taxpayer) living and working in the United States and advise Taxpayer to (i) purport to become a USVI resident by establishing certain contacts with the USVI, (ii) purport to terminate his or her existing employment relationship with his or her employer (Employer) and (iii) purport to become a partner of a Virgin Islands limited liability partnership (“V.I.LLP”) that is treated as a partnership for U.S. tax purposes. V.I.LLP then purports to enter into a contract with Employer to provide Employer with substantially the same services that were provided by Taxpayer prior to the creation of this arrangement. Typically, after entering into the arrangement, Taxpayer continues to provide substantially the same services for Employer that he or she provided before entering into the arrangement, but Taxpayer is nominally a partner of V.I.LLP instead of an employee of Employer.
Under this arrangement, Employer makes payments to V.I.LLP for Taxpayer’s services and no longer treats the payments as wages paid to Taxpayer subject to the withholding and payment of employment taxes and reporting on Taxpayer’s Form W-2. V.I.LLP, in turn, makes payments to Taxpayer for his or her services to Employer. V.I.LLP typically treats these payments for tax accounting purposes either as guaranteed payments for services or as distributions of Taxpayer’s allocable share of partnership income. Under this arrangement, the promoter may be a general partner in V.I.LLP and may retain a percentage of the fees received from Employer.
V.I.LLP either has or secures a reduction, up to 90 percent, in USVI income tax liability under the Economic Development Program (EDP) of the USVI. Taxpayer takes the position that the EDP benefits granted to V.I.LLP provide a corresponding reduction in the income tax liability that Taxpayer reports on his or her USVI income tax return with respect to guaranteed payments from the partnership or distributive shares of the partnership’s net income, or both. Taxpayer pays tax to the USVI in an amount approximately equal to 10% of the U.S. income tax liability that otherwise would be imposed on Taxpayer’s income from performing the services. Taxpayer claims that, for purposes of computing his or her U.S. income tax liability, gross income does not include guaranteed payments received from V.I.LLP or Taxpayer’s distributive share, if any, of the partnership’s net income, or both.
—“You can continue to live and work in the United States and, nevertheless, be a bona fide resident of the USVI.” The concept of a “bona fide resident of the Virgin Islands” was an integral part of the predecessor to § 934(b), and as such, its meaning has been well established. See § 934(c) as enacted by P.L. 86-779, §4(a) (1960). When Congress enacted the current versions of §§ 932 and 934(b), it retained this concept, but noted that Treasury has the authority to modify its meaning when necessary to prevent abuse. See H.R. Rep. No. 99-426 (1985) and General Explanation of the Tax Reform Act of 1986, JCS-10-87 (1987) (“Similarly, where appropriate, the Secretary may treat an individual as not a bona fide resident of the Virgin Islands.”) The determination of whether an individual is a bona fide resident of the USVI turns on the facts and circumstances and, specifically, on an individual’s intentions with respect to the length and nature of his or her stay in the USVI. See § 1.934-1(c)(2) (generally applying the principles of §§ 1.871-2 through -5). Promoters typically represent that a taxpayer need not make major lifestyle changes in order to become a bona fide resident of the USVI, and may represent that the taxpayer need only spend a few weeks or less out of the year in the USVI to become a resident for income tax purposes. These representations, however, have no basis in the well-established meaning of the term “bona fide resident of the Virgin Islands.” Accordingly, a claim of USVI residency for income tax purposes may be considered without merit or fraudulent when the taxpayer continues to live and work in the United States.
—“USVI source income includes income from services performed in the United States.” The principles that generally apply for determining gross and taxable income from sources within and without the United States (in particular, the rules of §§ 1.861-1 through 1.863-5) also generally apply in determining gross and taxable income from sources within and without a possession of the United States. See § 1.863-6 and Francisco v. Commissioner, 119 T.C. 317 (2002) aff’d, No. 03-1210 (D.C. Cir. June 18, 2004). With certain limited exceptions, compensation for labor or personal services performed in the United States is gross income from sources within the United States. See § 861(a)(3) and § 1.861-4(a)(1). The result does not change if the compensation is received in the form of a guaranteed payment from a partnership rather than in the form of a fee for services under an employment contract. See Miller v. Commissioner, 52 T.C. 752 (1969), acq. 1972-2 C.B. 2. Promoters typically claim that taxpayers are free to argue, under a variety of theories, that income from services performed in the United States constitutes income from USVI sources because “no rules exist under section 934” for determining whether income is from USVI sources. Based on the foregoing discussion, however, such arguments are without merit.
—“For purposes of determining the source of income, USVI includes the United States.” Section 932 provides coordination rules for filing of returns for U.S. and USVI income taxes by bona fide residents of the USVI and U.S. citizens and residents who have income derived from sources within the USVI or income effectively connected with the conduct of a trade or business within the USVI. To facilitate this coordination, § 932(c)(3) states that the USVI includes the United States for certain tax purposes. Section 932(c)(3) was modeled after § 935(c), which was enacted fourteen years earlier and which provides an equivalent rule with respect to Guam. For an illustration of the types of purposes for which these provisions apply, see § 1.935-1(c)(1)(ii). Notably, these provisions do not apply for purposes of determining the source of income. See H.R. Rep. No. 92-1479, 92d Cong., 2d Sess. 5 (Oct. 2, 1972) (“In determining the source of income for purposes of the special tax system provided in the bill (new code sec. 935), the principles contained in secs. 861-863 are to be applied without reference to sec. 935(c).”) Based on an incorrect reading of § 932(c)(3), promoters may claim that compensation for services performed in the United States is considered for tax purposes to be compensation for services performed in the USVI. This claim is without merit. Section 932 does not apply to determine the source of income on which the USVI tax liability of bona fide residents may be reduced under § 934(b)(1). Thus, § 932(c)(3) does not operate to transform compensation from the performance of personal services in the United States into income from sources in the USVI.
—“Non-USVI source income can be treated as effectively connected with the conduct of a trade or business within the USVI even if, under equivalent circumstances, such income would not be considered effectively connected with the conduct of a trade or business within the United States.” As noted above, § 934(b)(1) grants limited authority to the USVI to reduce the USVI tax liability with respect to income from USVI sources or income effectively connected with a trade or business within the USVI. The use of the term “effectively connected with the conduct of a trade or business” in § 934 indicates that Congress generally intended for the rules under § 934 to follow the well-established rules that apply for purposes of determining the taxation of nonresidents, such as the definition of effectively connected income under § 864(c). Section 934(b)(4), however, provides Treasury with the authority to issue regulations providing an alternative definition of the term. The legislative history of § 934 makes clear that this grant of regulatory authority was for the purpose of preventing abuse, and that Congress anticipated that it would be used to provide further limitations on the type of income that would be treated as from USVI sources or as effectively connected with the conduct of a trade or business within the USVI. S. Rep. No. 99-313, at 484, 1986-3 C.B. (vol. 3) 484. Taxpayers have no legal basis for claiming that the scope of the term “income effectively connected with the conduct of a trade or business” is broader under § 934 than it is under § 864. In particular, taxpayers have no legal basis for disregarding the rules of § 864(c)(4), which generally limit the amount of foreign source income that is treated as effectively connected with a U.S. trade or business to certain, very narrow categories of income. Accordingly, with the exception of those narrow categories, and in the absence of regulations to the contrary, income, gain, or loss from sources without the USVI cannot be treated as effectively connected with the conduct of a trade or business within the USVI for purposes of § 934. For example, income from the performance of personal services without the USVI cannot under any circumstances be treated as effectively connected with the conduct of a trade or business within the USVI. Promoters typically interpret the phrase “effectively connected to the conduct of a trade or business within the USVI” broadly, and inconsistently with § 864(c)(4), in order to claim a tax reduction with respect to income from non-USVI sources. As indicated above, however, these interpretations have no merit.
The IRS intends to challenge these positions and other similar claims that disregard the statutory and regulatory provisions concerning the limitations on the reduction of USVI income tax. Where taxpayers in order to make these claims enter into arrangements such as the one described in this notice, the Internal Revenue Service may disregard such arrangements on the grounds that they lack economic substance or that they have no purpose other than tax avoidance or evasion. The Service also may assert that the arrangement does not serve to terminate the employment relationship between a taxpayer and Employer for federal employment tax purposes, with the result that Employer remains liable for employment taxes and applicable penalties and interest.
In addition to liability for tax due plus statutory interest, taxpayers that claim to have no requirement to file a federal income tax return or pay federal income tax liability based on the positions described herein may be subject to penalties including, but not limited to, the accuracy-related penalty under § 6662, failure to file or pay penalties under § 6651 and civil fraud penalties under § 6663. Further, persons who participate in the promoting or reporting of these positions may be subject to aiding and abetting penalties under § 6701. In addition to other penalties, any person who willfully attempts to evade or defeat tax by taking the positions described in this notice, or who willfully counsels or advises such evasion or defeat, may be guilty of a criminal offense under §§ 7201, 7203, 7206, or 7212(a) or other provisions of federal law. Promoters and others who assist taxpayers in taking these positions also may be enjoined from doing so under § 7408.
The principal author of this notice is W. Edward Williams of the Office of Associate Chief Counsel (International). For further information regarding this notice, contact W. Edward Williams at (202) 622-3295 (not a toll-free call).
This document contains proposed regulations under section 1374 that provide for an adjustment to the amount that may be subject to tax under section 1374 in certain cases in which an S corporation acquires assets from a C corporation in an acquisition to which section 1374(d)(8) applies. These proposed regulations provide guidance to certain S corporations that acquire assets from a C corporation in a carryover basis transaction.
Written or electronic comments must be received by September 23, 2004.
Send submissions to: CC:PA:LPD:PR (REG-131486-03), room 5203, Internal Revenue Service, PO Box 7604, Ben Franklin Station, Washington, DC 20044. Submissions may be hand-delivered Monday through Friday between the hours of 8 a.m. and 4 p.m. to CC:PA:LPD:PR (REG-131486-03), Courier’s Desk, Internal Revenue Service, 1111 Constitution Avenue, NW, Washington, DC, or sent electronically, via the IRS Internet site at www.irs.gov/regs or via the Federal eRulemaking Portal at www.regulations.gov (IRS — REG-131486-03). The public hearing will be held in the IRS Auditorium, Internal Revenue Building, 1111 Constitution Avenue, NW, Washington, DC.
Concerning the proposed regulations, Jennifer Sledge, (202) 622-7750; concerning submissions of comments, Treena Garrett, (202) 622-7180 (not toll-free numbers).
Section 1374 of the Internal Revenue Code of 1986 (Code) generally imposes a corporate level tax on the income or gain of an S corporation that formerly was a C corporation to the extent the income or gain is attributable to the period during which the corporation was a C corporation. Congress amended section 1374 to provide this rule as part of the Tax Reform Act of 1986, which repealed the General Utilities doctrine. Under the General Utilities doctrine, a C corporation, in certain cases, could distribute appreciated assets to its shareholders, or sell appreciated assets and distribute the sale proceeds in connection with a complete liquidation to its shareholders, without recognizing gain. Section 1374 prevents a corporation from circumventing General Utilities repeal by converting to S corporation status before distributing its appreciated assets to its shareholders, or selling its appreciated assets and distributing the sale proceeds in connection with a complete liquidation to its shareholders.
Specifically, section 1374 imposes a tax on an S corporation’s net recognized built-in gain attributable to assets that it held on the date it converted from a C corporation to an S corporation for the 10-year recognition period beginning on the first day the corporation is an S corporation. Under section 1374, the total amount subject to tax is limited to the S corporation’s net unrealized built-in gain (NUBIG), which is the “aggregate net built-in gain of the corporation at the time of conversion to S corporation status.” See H.R. Conf. Rep. No. 99-841, at II-203 (1986). Section 1374 also imposes a tax on an S corporation’s net recognized built-in gain attributable to assets that it acquired in a carryover basis transaction from a C corporation for the 10-year recognition period beginning on the day of the carryover basis transaction. The legislative history of section 1374 provides that each acquisition of assets from a C corporation is subject to a separate determination of the amount of net unrealized built-in gain and is subject to a separate 10-year recognition period. See H.R. Rep. No. 100-795, at 63 (1988).
Sections 337(d) and 1374(e) authorize the Secretary of the Treasury to prescribe regulations as necessary to carry out the purposes of General Utilities repeal generally and section 1374 specifically. The Treasury Department and the IRS have promulgated regulations consistent with these provisions. See, e.g., §§1.337(d)-4 through 1.337(d)-7, 1.1374-1 through 1.1374-10.
Under §1.1374-3, an S corporation’s NUBIG generally is the amount of gain the S corporation would recognize on the conversion date if it sold all of its assets at fair market value to an unrelated party that assumed all of its liabilities on that date. Consistent with the legislative history of section 1374, section 1374(d)(8) and §1.1374-8 require a separate determination of the amount subject to tax under section 1374 for the pool of assets the S corporation held on the date it converted to C status and each pool of assets acquired in a carryover basis transaction from a C corporation.
Under the current rules, therefore, if X, a C corporation, elects to be an S corporation when it owns all of the stock of Y, a C corporation, X’s NUBIG will reflect the built-in gain or built-in loss in the Y stock. That built-in gain or built-in loss may be duplicative of the built-in gain or built-in loss in Y’s assets. If Y later transfers its assets to X in a liquidation to which sections 332 and 337(a) apply, the built-in gain and built-in loss in Y’s assets may be reflected twice: once in the NUBIG attributable to the assets X owned on the date of its conversion (including the stock of Y) and a second time in the NUBIG attributable to Y’s former assets acquired by X in the liquidation of Y. A similar result would obtain if, on the date of its conversion to an S corporation, X owned less than 80 percent of the stock of Y and later acquired the assets of Y in a reorganization to which section 368(a) applies. These results are inconsistent with the fact that a liquidation to which sections 332 and 337(a) apply, and the acquisition of the assets of a corporation some or all of the stock of which is owned by the acquiring corporation in a reorganization under section 368(a), generally have the effect of eliminating the built-in gain or built-in loss in the redeemed or canceled stock of the liquidated or target corporation.
In the course of developing these proposed regulations, the Treasury Department and the IRS considered a number of approaches to address the issue raised by the situations described above. In particular, the Treasury Department and the IRS considered adopting an approach that would provide for a single determination of NUBIG for all of the assets of an S corporation and, thus, a single determination of the amount subject to tax under section 1374. While this approach may have produced results similar to those that would have been produced had the S corporation remained a C corporation and acquired the assets of another C corporation, it was rejected because such an approach appears to be inconsistent with the legislative history of section 1374, which seems to mandate a separate determination of tax for each pool of assets. See H.R. Rep. No. 100-795, at 63.
Instead, these regulations adopt an approach that adjusts (increases or decreases) the NUBIG of the pool of assets that included the stock of the liquidated or acquired C corporation to reflect the extent to which the built-in gain or built-in loss inherent in the redeemed or canceled C corporation stock at the time the pool of assets became subject to the tax under section 1374 has been eliminated from the corporate tax system in the liquidation or reorganization. These proposed regulations provide that, if section 1374(d)(8) applies to an S corporation’s acquisition of assets, some or all of the stock of the C corporation from which such assets were acquired was taken into account in the computation of NUBIG for a pool of assets of the S corporation, and some or all of such stock is redeemed or canceled in such transaction, subject to certain limitations, the NUBIG of the pool of assets that included the C corporation stock redeemed or canceled in the transaction (other than stock with respect to which a loss under section 165 is claimed) is adjusted to eliminate any effect any built-in gain or built-in loss in the redeemed or canceled C corporation stock had on the initial computation of NUBIG for that pool of assets. For this purpose, stock that has an adjusted basis that is determined (in whole or in part) by reference to the adjusted basis of any other asset held by the S corporation as of the first day of the recognition period (i.e., stock described in section 1374(d)(6)) is treated as taken into account in the computation of the NUBIG for the pool of assets of the S corporation.
Adjustments to NUBIG under these proposed regulations, however, are subject to two limitations. First, the NUBIG is only adjusted to reflect the amount of the built-in gain or built-in loss that was inherent in the redeemed or canceled stock at the time the pool of assets became subject to tax under section 1374 that has not resulted in recognized built-in gain or recognized built-in loss at any time during the recognition period, including on the date of the acquisition to which section 1374(d)(8) applies. For example, suppose that on the date X, a C corporation, converts to S corporation status, it owns the stock of Y, which has a basis of $0 and a value of $100. The gain inherent in the Y stock contributes $100 to X’s NUBIG. During the recognition period and prior to the liquidation of Y, Y distributes $20 to X in a distribution to which section 301(c)(3) applies. That amount is recognized built-in gain under section 1374(d)(3). If Y later distributes its assets to X in a distribution to which sections 332 and 337(a) apply, pursuant to these regulations, X must adjust its original NUBIG to reflect the elimination of the Y stock. X will reduce that NUBIG by $80, the original built-in gain in such stock ($100) minus the recognized built-in gain with respect to such stock during the recognition period ($20).
Second, an adjustment cannot be made if it is duplicative of another adjustment to the NUBIG for a pool of assets. This rule is intended to prevent more than one adjustment to the NUBIG of a pool of assets for the same built-in gain or built-in loss stock.
Any adjustment to NUBIG under these proposed rules will only affect computations of the amount subject to tax under section 1374 for taxable years that end on or after the date of the liquidation or reorganization. It will not affect computations of the amount subject to tax under section 1374 for taxable years that end before the date of the liquidation or reorganization.
The Treasury Department and IRS request comments regarding whether the rule proposed in these regulations should be expanded to apply in other cases in which the stock basis that was taken into account in the computation of NUBIG is eliminated. This may occur, for example, where an S corporation owns stock of a C corporation on the date of its conversion to an S corporation and later distributes the stock of the C corporation in a distribution to which section 355 applies. In addition, the Treasury Department and IRS request comments concerning whether there are any situations other than those identified in these proposed regulations in which adjustments to NUBIG should be less than the built-in gain or the built-in loss in the redeemed or canceled stock as of the beginning of the recognition period.
It has been determined that this notice of proposed rulemaking is not a significant regulatory action as defined in Executive Order 12866. Therefore, a regulatory assessment is not required. It also has been determined that section 553(b) of the Administrative Procedure Act (5 U.S.C. chapter 5) does not apply to these regulations and, because the regulations do not impose a collection of information on small entities, the Regulatory Flexibility Act (5 U.S.C. chapter 6) does not apply. Therefore, a Regulatory Flexibility Analysis is not required. Pursuant to section 7805(f) of the Code, these proposed regulations will be submitted to the Chief Counsel for Advocacy of the Small Business Administration for comment on their impact on small business.
Before these proposed regulations are adopted as final regulations, consideration will be given to any written comments (a signed original and eight (8) copies) or electronic comments that are submitted timely to the IRS. All comments will be made available for public inspection and copying. A public hearing may be scheduled. If a public hearing is scheduled, notice of the date, time, and place for the public hearing will be published in the Federal Register.
§1.1374-3 Net unrealized built-in gain.
(b) Adjustment to net unrealized built-in gain — (1) In general. If section 1374(d)(8) applies to an S corporation’s acquisition of assets, some or all of the stock of the corporation from which such assets were acquired was taken into account in the computation of the net unrealized built-in gain for a pool of assets of the S corporation, and some or all of such stock is redeemed or canceled in such transaction, then, subject to the limitations of paragraph (b)(2) of this section, such net unrealized built-gain is adjusted to eliminate any effect any built-in gain or built-in loss in the redeemed or canceled stock (other than stock with respect to which a loss under section 165 is claimed) had on the initial computation of net unrealized built-in gain for that pool of assets. For purposes of this paragraph, stock described in section 1374(d)(6) shall be treated as taken into account in the computation of the net unrealized built-in gain for a pool of assets of the S corporation.
(2) Limitations on adjustment — (i) Recognized built-in gain or loss. Net unrealized built-in gain for a pool of assets of the S corporation is only adjusted under paragraph (b)(1) of this section to reflect built-in gain or built-in loss in the redeemed or canceled stock that has not resulted in recognized built-in gain or recognized built-in loss during the recognition period.
(ii) Anti-duplication rule. Paragraph (b)(1) of this section shall not be applied to duplicate an adjustment to the net unrealized built-in gain for a pool of assets made pursuant to paragraph (b)(1) of this section.
(3) Effect of adjustment. Any adjustment to the net unrealized built-in gain made pursuant to this paragraph (b) only affects computations of the amount subject to tax under section 1374 for taxable years that end on or after the date of the acquisition to which section 1374(d)(8) applies.
(ii) The assets the S corporation acquired from a C corporation in a section 1374(d)(8) transaction.
(B) Further, X must include a total of $60,000 in taxable income in 1996, 1997, and 1998 under section 481(a).
Example 2. Adjustment to net unrealized built-in gain for built-in gain in eliminated C corporation stock. (i) X, a calendar year C corporation, elects to become an S corporation effective January 1, 2005. On that date, X’s assets (the first pool of assets) have a net unrealized built-in gain of $15,000. Among the assets in the first pool of assets is all of the outstanding stock of Y, a C corporation, with a fair market value of $33,000 and an adjusted basis of $18,000. On March 1, 2009, X sells an asset that it owned on January 1, 2005, and as a result has $10,000 of recognized built-in gain. X has had no other recognized built-in gain or built-in loss. X’s taxable income limitation for 2009 is $50,000. Effective June 1, 2009, X elects under section 1362 to treat Y as a qualified subchapter S subsidiary (QSub). The election is treated as a transfer of Y’s assets to X in a liquidation to which sections 332 and 337(a) apply.
(ii) Under paragraph (b) of this section, the net unrealized built in-gain of the first pool of assets is adjusted to account for the elimination of the Y stock in the liquidation. The net unrealized built-in gain of the first pool of assets, therefore, is decreased by $15,000, the amount by which the fair market value of the Y stock exceeded its adjusted basis as of January 1, 2005. Accordingly, for taxable years ending after June 1, 2009, the net unrealized built-in gain of the first pool of assets is $0.
(iii) Under §1.1374-2(a), X’s net recognized built-in gain for any taxable year equals the least of X’s pre-limitation amount, taxable income limitation, and net unrealized built-in gain limitation. In 2009, X’s pre-limitation amount is $10,000, X’s taxable income limitation is $50,000, and X’s net unrealized built-in gain limitation is $0. Because the net unrealized built-in gain of the first pool of assets has been adjusted to $0, despite the $10,000 of recognized built-in gain in 2009, X has $0 net recognized built-in gain for the taxable year ending on December 31, 2009.
Example 3. Adjustment to net unrealized built-in gain for built-in loss in eliminated C corporation stock. (i) X, a calendar year C corporation, elects to become an S corporation effective January 1, 2005. On that date, X’s assets (the first pool of assets) have a net unrealized built-in gain of negative $5,000. Among the assets in the first pool of assets is 10 percent of the outstanding stock of Y, a C corporation, with a fair market value of $18,000 and an adjusted basis of $33,000. On March 1, 2009, X sells an asset that it owned on January 1, 2005, resulting in $8,000 of recognized built-in gain. X has had no other recognized built-in gains or built-in losses. X’s taxable income limitation for 2009 is $50,000. On June 1, 2009, Y transfers its assets to X in a reorganization under section 368(a)(1)(C).
(ii) Under paragraph (b) of this section, the net unrealized built in-gain of the first pool of assets is adjusted to account for the elimination of the Y stock in the reorganization. The net unrealized built-in gain of the first pool of assets, therefore, is increased by $15,000, the amount by which the adjusted basis of the Y stock exceeded its fair market value as of January 1, 2005. Accordingly, for taxable years ending after June 1, 2009, the net unrealized built-in gain of the first pool of assets is $10,000.
(iii) Under §1.1374-2(a), X’s net recognized built-in gain for any taxable year equals the least of X’s pre-limitation amount, taxable income limitation, and net unrealized built-in gain limitation. In 2009, X’s pre-limitation amount is $8,000 and X’s taxable income limitation is $50,000. The net unrealized built-in gain of the first pool of assets has been adjusted to $10,000, so X’s net unrealized built-in gain limitation is $10,000. X, therefore, has $8,000 net recognized built-in gain for the taxable year ending on December 31, 2009. X’s net unrealized built-in gain limitation for 2010 is $2,000.
Example 4. Adjustment to net unrealized built-in gain in case of prior gain recognition. (i) X, a calendar year C corporation, elects to become an S corporation effective January 1, 2005. On that date, X’s assets (the first pool of assets) have a net unrealized built-in gain of $30,000. Among the assets in the first pool of assets is all of the outstanding stock of Y, a C corporation, with a fair market value of $45,000 and an adjusted basis of $10,000. Y has no current or accumulated earnings and profits. On April 1, 2007, Y distributes $18,000 to X, $8,000 of which is treated as gain to X from the sale or exchange of property under section 301(c)(3). That $8,000 is recognized built-in gain to X under section 1374(d)(3), and results in $8,000 of net recognized built-in gain to X for 2007. X’s net unrealized built-in gain limitation for 2008 is $22,000. On June 1, 2009, Y transfers its assets to X in a liquidation to which sections 332 and 337(a) apply.
(ii) Under paragraph (b) of this section, the net unrealized built in-gain of the first pool of assets is adjusted to account for the elimination of the Y stock in the liquidation. The net unrealized built-in gain of that pool of assets, however, can only be adjusted to reflect the amount of built-in gain that was inherent in the Y stock on January 1, 2005, that has not resulted in recognized built-in gain during the recognition period. In this case, therefore, the net unrealized built-in gain of the first pool of assets cannot be reduced by more than $27,000 ($35,000, the amount by which the fair market value of the Y stock exceeded its adjusted basis as of January 1, 2005, minus $8,000, the recognized built-in gain with respect to the stock during the recognition period). Accordingly, for taxable years ending after June 1, 2009, the net unrealized built-in gain of the first pool of assets is $3,000. The net unrealized built-in gain limitation for 2009 is $0.
(a) In general. Sections 1.1374-1 through 1.1374-9, other than §1.1374-3(b) and (c) Examples 2 through 4, apply for taxable years ending on or after December 27, 1994, but only in cases where the S corporation’s return for the taxable year is filed pursuant to an S election or a section 1374(d)(8) transaction occurring on or after December 27, 1994. Section 1.1374-3(b) and (c) Examples 2 through 4 apply for taxable years beginning after the date these regulations are published as final regulations in the Federal Register.
The principal author of these regulations is Marie Byrne of the Office of Associate Chief Counsel (Corporate). Other personnel from Treasury and the IRS participated in their development.
This document contains a proposed regulation relating to the determination of income of foreign insurance companies that is effectively connected with the conduct of a trade or business within the United States. The regulation provides that the exception to the asset-use test for stock shall not apply in determining whether the income, gain, or loss from portfolio stock held by foreign insurance companies constitutes effectively connected income.
Written or electronic comments and requests for a public hearing must be received by September 23, 2004.
Send submissions to: CC:PA:LPD:PR (REG-117307-04), room 5203, Internal Revenue Service, PO Box 7604, Ben Franklin Station, Washington, DC 20044. Submissions may be hand-delivered Monday through Friday between the hours of 8 a.m. and 4 p.m. to CC:PA:LPD:PR (REG-117307-04), Courier’s Desk, Internal Revenue Service, 1111 Constitution Avenue, NW, Washington, DC, or sent electronically, via the IRS Internet site at www.irs.gov/regs or via the Federal eRulemaking Portal at www.regulations.gov (IRS and REG-117307-04).
Concerning the regulations, Sheila Ramaswamy, at (202) 622-3870; concerning submissions and delivery of comments, Robin Jones, 202-622-7180 (not toll-free numbers).
In 1992, the Treasury Department and the IRS published proposed regulations under section 864 providing that stock is not treated as an asset used in, or held for use in, the conduct of a trade or business in the United States. Proposed §1.864-4(c)(2)(ii)(C). The notice of proposed rulemaking solicited comments regarding the appropriate treatment of income from portfolio stock investments of insurance companies. The Treasury Department and the IRS published final regulations in 1996 which adopted the general rule in the proposed regulations that stock is not treated as an asset used in, or held for use in, the conduct of a U.S. trade or business. T.D. 8657, 1996-1 C.B. 153. The final regulations reserved on the treatment of stock held by a foreign insurance company. §1.864-4(c)(2)(iii)(b). This proposed regulation sets forth circumstances in which stock held by a foreign insurance company is not subject to the general rule in §1.864-4(c)(2)(iii)(a), which provides that stock is not an asset used in a U.S. trade or business.
In the case of a foreign corporation engaged in a trade or business within the United States during the taxable year, section 864(c)(2) generally provides rules for determining whether certain fixed or determinable, annual or periodical income from sources within the United States or gain or loss from sources within the United States from sale or exchange of capital assets is income effectively connected with the conduct of a trade or business in the United States. Section 864(c)(2). In making this determination, the factors taken into account include whether (a) the income, gain or loss is derived from assets used in or held for use in the conduct of such trade or business (the asset-use test), or (b) the activities of such trade or business were a material factor in the realization of such income, gain or loss. Section 864(c)(2). Section 1.864-4(c)(2)(iii)(a) generally provides that stock of a corporation (whether domestic or foreign) is not an asset used in or held for use in the conduct of a trade or business in the United States except as provided in (c)(2)(iii)(b). Section 1.864-4(c)(2)(iii)(b) entitled “Stock Held by Foreign Insurance Companies” is reserved.
Insurance companies hold investment assets, such as stocks and bonds, to fund their obligations to policyholders and to meet their surplus (capital) requirements. Thus, stock held in an investment portfolio may be an asset held for use in the trade or business of a foreign insurance company. By contrast, stock of a subsidiary generally is not held for the purpose of meeting an insurance company’s business needs.
This proposed regulation provides that the general rule excluding stock from the asset-use test does not apply to stock held by a foreign insurance company unless such company owns directly, indirectly, or constructively 10 percent or more of the vote or value of the company’s stock. The 10-percent threshold is intended to distinguish portfolio stock held to fund policyholder obligations and surplus requirements from investments in a subsidiary. Comments are requested as to whether this 10-percent threshold provides an appropriate standard for determining whether stock is a portfolio investment for these purposes.
This regulation is proposed to apply to taxable periods beginning on or after the date of publication of a Treasury decision adopting this rule as a final regulation in the Federal Register.
Before these proposed regulations are adopted as final regulations, consideration will be given to any written (a signed original and eight (8) copies) or electronic comments that are submitted timely to the IRS. The IRS and Treasury Department request comments on the clarity of the proposed rules and how they can be made easier to understand. All comments will be available for public inspection and copying. A public hearing may be scheduled if requested in writing by any person that timely submits written comments. If a public hearing is scheduled, notice of the date, time, and place for a public hearing will be published in the Federal Register.
§1.864-4 U.S. source income effectively connected with U.S. business.
This announcement is a public notice of the suspension under section 501(p) of the Internal Revenue Code of the federal tax exemption of a certain organization that has been designated as supporting or engaging in terrorist activity or supporting terrorism. Contributions made to an organization during the period that the organization’s tax-exempt status is suspended are not deductible for federal tax purposes.
The federal government has designated a number of organizations as supporting or engaging in terrorist activity or supporting terrorism under the Immigration and Nationality Act, the International Emergency Economic Powers Act, and the United Nations Participation Act of 1945. Federal law prohibits most contributions to organizations that have been so designated.
Section 501(p) of the Code was enacted as part of the Military Family Tax Relief Act of 2003 (P.L. 108-121), effective November 11, 2003. Section 501(p)(1) suspends the exemption from tax under section 501(a) of any organization described in section 501(p)(2). An organization is described in section 501(p)(2) if the organization is designated or otherwise individually identified (1) under certain provisions of the Immigration and Nationality Act as a terrorist organization or foreign terrorist organization; (2) in or pursuant to an Executive Order which is related to terrorism and issued under the authority of the International Emergency Economic Powers Act or section 5 of the United Nations Participation Act of 1945 for the purpose of imposing on such organization an economic or other sanction; or (3) in or pursuant to an Executive Order issued under the authority of any federal law, if the organization is designated or otherwise individually identified in or pursuant to the Executive Order as supporting or engaging in terrorist activity (as defined in the Immigration and Nationality Act) or supporting terrorism (as defined in the Foreign Relations Authorization Act) and the Executive Order refers to section 501(p)(2).
Under section 501(p)(3) of the Code, suspension of an organization’s tax exemption begins on the date of the first publication of a designation or identification with respect to the organization, as described above, or the date on which section 501(p) was enacted, whichever is later. This suspension continues until all designations and identifications of the organization are rescinded under the law or Executive Order under which such designation or identification was made.
Under section 501(p)(4) of the Code, no deduction is allowed under any provision of the Internal Revenue Code for any contribution to an organization during any period in which the organization’s tax exemption is suspended under section 501(p). Thus, for example, no charitable contribution deduction is allowed under section 170 (relating to the income tax), section 545(b)(2) (relating to undistributed personal holding company income), section 556(b)(2) (relating to undistributed foreign personal holding company income), section 642(c) (relating to charitable set asides), section 2055 (relating to the estate tax), section 2106(a)(2) (relating to the estate tax for nonresident aliens) and section 2522 (relating to the gift tax) for contributions made to the organization during the suspension period.
Prior to the effective date of suspension of exemption under section 501(p), the organization listed below was designated under Executive Order 13224, entitled “Blocking Property and Prohibiting Transactions With Persons Who Commit, Threaten To Commit, or Support Terrorism.” Contributions made to this organization in violation of the Executive Order prior to this suspension are not tax deductible under the Internal Revenue Code.
The organization whose tax exemption has been suspended under section 501(p) and the effective date of such suspension is listed below. Contributions made to this organization during the period of suspension are not deductible for federal tax purposes.
An organization whose exempt status has been suspended under section 501(p) does not file Form 990 and is required to file the appropriate Federal income tax returns for the taxable periods beginning on the date of the suspension. The organization must continue to file all other appropriate federal tax returns, including employment tax returns, and may also have to file federal unemployment tax returns.
For additional information regarding the suspension of the federal tax exemption of an organization under section 501(p), contact Ward L. Thomas at (202) 283-8913 at the Internal Revenue Service. | 2019-04-25T22:11:16Z | https://www.irs.gov/irb/2004-28_IRB |
Many who try to quit say they cannot because of withdrawal symptoms they were never warned about.
Victoria Toline would hunch over the kitchen table, steady her hands and draw a bead of liquid from a vial with a small dropper. It was a delicate operation that had become a daily routine ?" extracting ever tinier doses of the antidepressant she had taken for three years, on and off, and was desperately trying to quit.
"Basically that's all I have been doing ?" dealing with the dizziness, the confusion, the fatigue, all the symptoms of withdrawal," said Ms. Toline, 27, of Tacoma, Wash. It took nine months to wean herself from the drug, Zoloft, by taking increasingly smaller doses.
"I couldn't finish my college degree," she said. "Only now am I feeling well enough to try to re-enter society and go back to work."
Long-term use of antidepressants is surging in the United States, according to a new analysis of federal data by The New York Times. Some 15.5 million Americans have been taking the medications for at least five years. The rate has almost doubled since 2010, and more than tripled since 2000.
Nearly 25 million adults, like Ms. Toline, have been on antidepressants for at least two years, a 60 percent increase since 2010.
The drugs have helped millions of people ease depression and anxiety, and are widely regarded as milestones in psychiatric treatment. Many, perhaps most, people stop the medications without significant trouble. But the rise in longtime use is also the result of an unanticipated and growing problem: Many who try to quit say they cannot because of withdrawal symptoms they were never warned about.
Some scientists long ago anticipated that a few patients might experience withdrawal symptoms if they tried to stop ?" they called it "discontinuation syndrome." Yet withdrawal has never been a focus of drug makers or government regulators, who felt antidepressants could not be addictive and did far more good than harm.
The drugs initially were approved for short-term use, following studies typically lasting about two months. Even today, there is little data about their effects on people taking them for years, although there are now millions of such users.
Expanding use of antidepressants is not just an issue in the United States. Across much of the developed world, long-term prescriptions are on the rise. Prescription rates have doubled over the past decade in Britain, where health officials in January began a nationwide review of prescription drug dependence and withdrawal.
In New Zealand, where prescriptions are also at historic highs, a survey of long-term users found that withdrawal was the most common complaint, cited by three-quarters of long-term users.
Yet the medical profession has no good answer for people struggling to stop taking the drugs ?" no scientifically backed guidelines, no means to determine who's at highest risk, no way to tailor appropriate strategies to individuals.
"Some people are essentially being parked on these drugs for convenience's sake because it's difficult to tackle the issue of taking them off," said Dr. Anthony Kendrick, a professor of primary care at the University of Southampton in Britain.
With government funding, he is developing online and telephone support to help practitioners and patients. "Should we really be putting so many people on antidepressants long-term when we don't know if it's good for them, or whether they'll be able to come off?" he said.
Antidepressants were originally considered a short-term treatment for episodic mood problems, to be taken for six to nine months: enough to get through a crisis, and no more.
Later studies suggested that "maintenance therapy" ?" longer-term and often open-ended use ?" could prevent a return of depression in some patients, but those trials very rarely lasted more than two years.
Once a drug is approved, physicians in the United States have wide latitude to prescribe it as they see fit. The lack of long-term data did not prevent doctors from placing tens of millions of Americans on antidepressants indefinitely.
"Most people are put on these drugs in primary care, after a very brief visit and without clear symptoms of clinical depression," said Dr. Allen Frances, a professor emeritus of psychiatry at Duke University. "Usually there's improvement, and often it's based on the passage of time or placebo effect.
"But the patient and doctor don't know this and give the antidepressant credit it doesn't deserve. Both are reluctant to stop what appears to be a winner, and the useless prescription may be continued for years ?" or a lifetime."
The Times analyzed data gathered since 1999 as part of the National Health and Nutrition Examination Survey. Over all, more than 34.4 million adults took antidepressants in 2013-4, up from 13.4 million in the 1999-2000 survey.
Adults over 45, women and whites are more likely to take antidepressants than younger adults, men and minorities. But usage is increasing in older adults across the demographic spectrum.
White women over 45 account for about one-fifth of the adult population but account for 41 percent of antidepressant users, up from about 30 percent in 2000, the analysis found. Older white women account for 58 percent of those on antidepressants long term.
"What you see is the number of long-term users just piling up year after year," said Dr. Dr. Mark Olfson, a professor of psychiatry at Columbia University. Dr. Olfson and Dr. Ramin Mojtabai, a professor of psychiatry at Johns Hopkins University, assisted The Times with the analysis.
Still, it is not at all clear that everyone on an open-ended prescription should come off it. Most doctors agree that a subset of users benefit from a lifetime prescription, but disagree over how large the group is.
Dr. Peter Kramer, a psychiatrist and author of several books about antidepressants, said that while he generally works to wean patients with mild-to-moderate depression off medication, some report that they do better on it.
"There is a cultural question here, which is how much depression should people have to live with when we have these treatments that give so many a better quality of life," Dr. Kramer said. "I don't think that's a question that should be decided in advance."
Antidepressants are not harmless; they commonly cause emotional numbing, sexual problems like a lack of desire or erectile dysfunction and weight gain. Long-term users report in interviews a creeping unease that is hard to measure: Daily pill-popping leaves them doubting their own resilience, they say.
"We've come to a place, at least in the West, where it seems every other person is depressed and on medication," said Edward Shorter, a historian of psychiatry at the University of Toronto. "You do have to wonder what that says about our culture."
Patients who try to stop taking the drugs often say they cannot. In a recent survey of 250 long-term users of psychiatric drugs ?" most commonly antidepressants ?" about half who wound down their prescriptions rated the withdrawal as severe. Nearly half who tried to quit could not do so because of these symptoms.
In another study of 180 longtime antidepressant users, withdrawal symptoms were reported by more than 130. Almost half said they felt addicted to antidepressants.
"Many were critical of the lack of information given by prescribers with regard to withdrawal," the authors concluded. "And many also expressed disappointment or frustration with the lack of support available in managing withdrawal."
Drug manufacturers do not deny that some patients suffer harsh symptoms when trying to wean themselves from antidepressants.
"The likelihood of developing discontinuation syndrome varies by individuals, the treatment and dosage prescribed," said Thomas Biegi, a spokesman for Pfizer, maker of antidepressants like Zoloft and Effexor. He urged that patients work with their doctors to "taper off" ?" to wean themselves by taking shrinking doses ?" and said the company could not provide specific withdrawal rates because it did not have them.
Drugmaker Eli Lilly, referring to two popular antidepressants, said in a statement the company "remains committed to Prozac and Cymbalta and their safety and benefits, which have been repeatedly affirmed by the U.S. Food and Drug Administration." The company declined to say how common withdrawal symptoms are.
As far back as the mid-1990s, leading psychiatrists recognized withdrawal as a potential problem for patients taking modern antidepressants.
At a 1997 conference in Phoenix sponsored by drug maker Eli Lilly, a panel of academic psychiatrists produced a lengthy report detailing the symptoms, like balance problems, insomnia and anxiety, that went away when the pills were restarted.
But soon the topic faded from the scientific literature. And government regulators did not focus on these symptoms, seeing rampant depression as the larger problem.
"What we were concentrating on was recurrent depression," said Dr. Robert Temple, deputy director for clinical science in the F.D.A.'s Center for Drug Evaluation and Research. "If people's heads went through the roof from withdrawal, I think we would have seen it."
Drug makers had little incentive to mount costly studies of how best to quit their products, and federal funding has not filled the research gap.
As a result, the drugs' labels, on which doctors and many patients rely, provide very little guidance for ending a prescription safely.
"The following adverse events were reported at an incidence of 1 percent or greater," reads the label for Cymbalta, a leading antidepressant. It lists headaches, fatigue and insomnia, among other reactions in patients trying to stop.
The few studies of antidepressant withdrawal that have been published suggest that it is harder to get off some medications than others. This is due to differences in the drugs' half-life ?" the time it takes the body to clear the medication once the pills are stopped.
Brands with a relatively short half-life, like Effexor and Paxil, appear to cause more withdrawal symptoms more quickly than those that stay in the system longer, like Prozac.
In one of the earliest published withdrawal studies, researchers at Eli Lilly had people taking Zoloft, Paxil or Prozac stop the pills abruptly, for about a week. Half of those on Paxil experienced serious dizziness; 42 percent suffered confusion; and 39 percent, insomnia.
Among patients who stopped taking Zoloft, 38 percent had severe irritability; 29 percent experienced dizziness; and 23 percent, fatigue. The symptoms appeared soon after people were taken off the drugs and resolved once they resumed taking the pills.
Those on Prozac, by contrast, experienced no initial spike in symptoms when they stopped, but this result was not surprising. It takes Prozac several weeks to wash out of the body entirely, so one week's interruption is not a test of withdrawal.
In a study of Cymbalta, another Eli Lilly drug, people in withdrawal experienced two to three symptoms on average. The most common were dizziness, nausea, headache and paresthesia ?" electric-shock sensations in the brain that many people call brain zaps. Most of these symptoms lasted longer than two weeks.
"The truth is that the state of the science is absolutely inadequate," said Dr. Derelie Mangin, a professor in the department of family medicine at McMaster University in Hamilton, Ontario.
"We don't have enough information about what antidepressant withdrawal entails, so we can't design proper tapering approaches."
In interviews, dozens of people who had experienced antidepressant withdrawal recounted similar stories: The drugs often relieved mood problems, at first. After a year or so, it wasn't clear whether the medication was having any effect.
Yet quitting was far harder, and stranger, than expected.
"It took me a year to come completely off ?" a year," said Dr. Tom Stockmann, 34, a psychiatrist in East London, who experienced lightheadedness, confusion, vertigo and brain zaps, when he stopped taking Cymbalta after 18 months.
To wind the prescription down safely, he began opening the capsules, removing a few beads of the drug each day in order to taper off ?" the only way out, he decided.
"I knew some people experienced withdrawal reactions," Dr. Stockmann said, "but I had no idea how hard it would be."
Robin Hempel, 54, a mother of four who lives near Concord, N.H., began taking the antidepressant Paxil 21 years ago for severe premenstrual syndrome on the recommendation of her gynecologist.
"He said, ‘Oh, this little pill is going to change your life,' " Ms. Hempel said. "Well, did it ever."
The drug blunted her PMS symptoms, she said, but also caused her to gain 40 pounds in nine months. Quitting was nearly impossible ?" at first, her doctor tapered her too quickly, she said.
She succeeded in her last attempt, in 2015, by tapering over months to 10 milligrams, then five, down from 20 milligrams and "finally all the way down to particles of dust," after which she was bedridden for three weeks with severe dizziness, nausea and crying spells, she said.
"Had I been told the risks of trying to come off this drug, I never would have started it," Ms. Hempel said. "A year and a half after stopping, I'm still having problems. I'm not me right now; I don't have the creativity, the energy. She ?" Robin ?" is gone."
At least some of the most pressing questions about antidepressant withdrawal will soon have an answer.
Dr. Mangin, of McMaster University, led a research team in New Zealand that recently completed the first rigorous, long-term trial of withdrawal.
The team recruited more than 250 people in three cities who had been taking Prozac long-term and were interested in tapering off. Two-thirds of the group had been on the drug for more than two years, and a third for more than five years.
The team randomly assigned the participants to one of two regimens. Half tapered slowly, receiving a capsule each day that, over a period of a month or longer, contained progressively lower amounts of the active drug.
The other half believed they were tapering but got capsules that in fact maintained their regular dosage. The researchers followed both groups for a year and a half. They are still working through the data, and their findings will be published in the coming months.
But one thing is already clear from this effort and other clinical experience, Dr. Mangin said: Some people's symptoms were so severe that they could not bear to stop taking the drug.
"Even with a slow taper from a drug with a relatively long half-life, these people had significant withdrawal symptoms such that they had to restart the drug," she said.
For now, people who haven't been able to quit just by following a doctor's advice are turning to a method called microtapering: making tiny reductions over a long period of time, nine months, a year, two years ?" whatever it takes.
"The tapering rates given by doctors are often way, way too fast," said Laura Delano, who had severe symptoms while trying to get off several psychiatric drugs. She has created a website, The Withdrawal Project, that provides resources on psychiatric drug withdrawal, including a guide to tapering off.
She is hardly the only one bewildered by the scarcity of good medical advice about unwinding prescriptions that have become so common.
"It has taken a long, long time to get anyone to pay attention to this issue and take it seriously," said Luke Montagu, a media entrepreneur and co-founder of the London-based Council for Evidence-Based Psychiatry, which pushed for Britain's review of prescription drug addiction and dependence.
"You've got this huge parallel community that's emerged, largely online, in which people are supporting each other though withdrawal and developing best practices largely without the help of doctors," he said.
Dr. Stockmann, the psychiatrist in East London, wasn't entirely convinced withdrawal was a serious issue before he went through it himself. His microtapering strategy finally worked.
"There was a really significant moment," he recalled. "I was walking down near my house, past a forest, and I suddenly realized I could feel the full range of emotions again. The birds were louder, the colors more vivid ?" I was happy."
"I have seen lots of people ?" patients ?" not being believed, not taken seriously when they complained about this," he added. "That has to stop." | 2019-04-21T01:10:41Z | https://www.dealookup.com/news/2018/Antidepressant-addiction-problems.asp |
Visceral leishmaniasis (VL) is a disseminated protozoal infection transmitted by sandfly bites. The disease, affecting both children and adults, typically presents with fever, hepato-splenomegaly, and pancytopenia. Once established, the clinical course of untreated VL leads to death in a majority of patients, generally because of intercurrent infections. Although VL is endemic in more than 60 countries, nearly all of the 500, 000 new cases of symptomatic VL occur each year in the rural areas of just five countries: India, Nepal, Bangladesh, Brazil, and Sudan. Anthroponotic VL occurs in east Africa and the Indian subcontinent. An epidemic appeared in western Upper Nile region of southern Sudan in 1984, causing 100, 000 deaths among a population just under 1 million. In the Indian subcontinent, where 50% of reported VL cases occur, many factors led to low compliance to the therapy, including a lack of resources and health education. Premature interruptions of the therapy led to emergence and progression of resistance to first-line drug. In contrast, in Latin America, China and the Mediterranean basin, VL is a zoonotic disease. In the mid-1980s the first cases of VL have been reported in southern Europe in patients infected with human immunodeficiency virus (HIV). To date, Leishmania-HIV co-infection has been reported from 33 countries, with most of the cases located in southern Europe. In this region, 25-70% of adult patients with VL are co-infected with HIV and it is estimated that 1.5-9% of patients with AIDS will develop leishmaniasis. Although not recognised as an AIDS-defining criterion, VL constitutes an opportunistic disease in HIV-infected patients. Several studies have demonstrated that HIV/AIDS patients living in Leishmania-endemic areas are at a greater risk of developing VL and that dual infection accelerates the clinical course of HIV disease. Clinical presentations are often atypical, with unusual parasite localisations and frequent relapses. The introduction of highly active anti-retroviral therapy (HAART) as a standard treatment for HIV has resulted in a significant decrease in the incidence of VL in HIV-infected individuals in southern Europe. Another cause for concern is the increase in the number of co-infection cases in eastern Africa, Brazil and Indian subcontinent, owing to the simultaneous spread and geographical overlap of both diseases as well as the periodic occurrence of epidemics of VL. Currently, however, accessibility and affordability of HAART in these areas remain limited.
Today, treatment of VL constitutes a difficult challenge. The most recent complicating difficulties are co-infection with HIV and resistance to penta-valent antimonials. These problems join the long-standing list of obstacles that have undermined the measures to control VL: inadequate vector control, poverty and malnutrition, migration of non-immune refugees, insufficient diagnosis tools and unavailable or unaffordable drugs.
Organic salts of pentavalent antimony have been the cornerstone of treatment for all forms of leishmaniasis for more than 60 years. Antimonials are thought to act by inhibiting the enzymes of glycolysis and other metabolic pathways. Two major pentavalent antimonials are currently used: Sodium stibogluconate (Pentostam®) and meglumine antimoniate (Glucantime®). Sodium stibogluconate contains antimony 100 mg/ml and is primarily used in English-speaking countries. The closely related compound meglumine antimoniate (Glucantime®) contains antimony 85 mg/ml and is primarily used in French-speaking areas. The drugs are given intravenously or intramuscularly (i.m.), and they are equal in efficacy when used in equivalent doses. The recommended regimen consists of once-daily injection of full-dose drug (20 mg/kg) for 30 days. While active elsewhere in India, antimonials are no longer useful in north eastern state of Bihar, where as many as 65% of the previously untreated patients fail to respond to or promptly relapse after therapy with antimonial compounds. Disadvantages of antimonials include the parenteral mode of administration, the long duration of therapy and the adverse reactions. Systemic toxicity normally relates to total dose administrated. Secondary effects (such as fatigue, bodyache, electro-cardiographic abnormalities, raised aminotransferase levels and chemical pancreatitis) are frequent, albeit usually reversible. Severe adverse events remain rare. However, sudden death due to arrhythmia has been reported in a patient receiving high doses for a prolonged period. Acute pancreatitis with a fatal evolution has been reported in HIV-infected patients.
Cheaper generic formulations of sodium stibogluconate are available. They were recently compared in field conditions in east Africa and were found to be equally safe and as effective as their branded counterparts.,, However, the poor quality of some generic antimonials led to serious toxicity in some of the recipients in India. Efforts to develop lipid formulations of antimonials are on. A novel liposome-based meglumine antimoniate formulation appears to be promising as a pharmaceutical product for the treatment of VL.
Aminosidine is an aminoglycosidic antibiotic identical to paromomycin sulfate and is administered once daily, usually by the intra-muscular route. Combined with antimonials, aminosidine (12-18mg/kg for 21 days) allows a reduction in the duration of the therapy and may be more efficient than antimonials alone in areas with high levels of antimonial resistance. Aminosidine also appears to be active in India when used alone. However, its potential for causing ototoxicity and nephrotoxicity needs further evaluation.
At the beginning of the 1980s, non-randomised trials showed that a combination of antimonials and allopurinol (15 mg/day) was efficacious in treating VL.,,, Recently, a randomised trial in patients with antimonial-unresponsive VL, suggested that combined therapy with allopurinol plus pentamidine provided higher cure rate than with pentamidine alone. At the present, allopurinol is not used in monotherapy in India.
The anti-fungal agent amphotericin B has long been recognised as a powerful leishmanicidal drug. It probably intercalates with the parasite episterol precursors of ergosterol. It owes its popularity as an effective agent for treatment of VL largely to the decline and fall of antimonials in India and the failure of pentamidine as satisfactory substitute in such cases.
In India, 98% of long-term cure was obtained in both antimonial-unresponsive and previously untreated patients, with conventional amphotericin B desoxycholate (Fungizone®)., However, infusion-related side effects (fever, chills, bone pain) and renal toxicity of conventional amphotericin B are still major problems. Despite manufacturers recommendations against mixing, short-course treatment with amphotericin B-fat emulsion (five alternate-day infusions of 2 mg/kg) has been evaluated in an uncontrolled study in India. Definitive cure was reported in 93% of antimonial-unresponsive patients. Although debatable, this could represent a cost-effective treatment for patients with VL, including those with antimonial-unresponsive infection.
First used in antimonial-resitant VL by Davidson et al in 1991, lipid formulations of amphotericin B have been proven to increase the efficacy and to limit the toxicity of conventional amphotericin B.,, These formulations allow administration of considerably higher daily doses and simultaneously appear to target infected tissue macrophages via enhanced phagocytic uptake. Three lipid formulations are available: Ambisome®, which is a formulation using spherical, unilamellar liposomes that are less than 100 nm in size; Amphocil®, which is a dispersion with cholesterol sulfate in 1:1 molar ratio; Abelcet®, which is a ribbon-like lipid structure using a phospholipid matrix. A five days long regimen consisting of daily infusion or a 10-day regimen consisting of infusions on days 1-5 and day 10 are considered to be remarkably active.,,, There are regional differences in responsiveness to the lipid formulations. In Mediterranean VL, Ambisome® 18-24 mg/kg total dose is efficient compared to Ambisome® 6-14 mg/kg in India.,, In HIV-co-infected patients and in recipients of organ transplants, higher dosages and prolonged treatment are needed.,, Recently, a comparative trial evaluated the efficacy of a single dose of liposomal amphotericin B (5mg/kg) versus once-daily infusion of 1 mg/kg for 5 days in Indian VL. Definive cure rates were not different between the groups (91% versus 93%), warranting further testing of the single-dose regimen.
The first phase clinical trial of oral miltefosine was performed in patients with Kala-azar in India to evaluate safety, tolerance and efficacy. Oral doses of miltefosine were given to six groups of five Indian men (50 mg every second day to 250 mg/day for 28 days). Vomiting and diarrhoea were observed in 22 of 30 patients. Twenty-one patients were apparently cured by day 14. One patient developed severe diarrhoea and renal insufficiency and died on day 21. At the end of four weeks, 29 of 30 patients were apparently cured, and by 8 months, 18 of 19 patients treated daily appeared to be cured. Half of these patients had previously failed to show response to therapy with pentavalent antimony. The authors concluded that treatment with orally administered miltefosine at 100-150 mg/day for 4 weeks holds promise as an effective treatment of Indian VL, including antimonial-resistant VL. Other clinical trials seem to confirm the efficacy of the drug.,, Dosing 100 mg (2.5mg/kg/day) over days 21-28 days appeared efficient both in untreated VL and in antimony-resistant VL. More recently, an open-label randomised trial compared the efficacy of oral miltefosine (in the dose of 50 or 100 mg, approximately 2.5 mg per kilogram of body weight daily for 28 days) in 299 patients with that of intravenous amphotericin B (in the dose of 1 mg per kilogram every other day for a total of 15 injections) in 99 patients. At the end of treatment, the initial cure rate was 100% in both the groups. By 6 months after the completion of the treatment, 94% and 97% of patients in miltefosine and amphotericin B groups respectively, had not had a relapse and were classified as cured. The side effects of miltefosine were generally tolerable and compare favourably with those of all agents other than liposomal amphotericin B. Vomiting and diarrhoea are the most frequent side effects, occurring in about 40% and 20%, respectively. Approximately three quarters of the gastrointestinal events last one to two days per patient and occur once on each of these days. Miltefosine has toxic effects on reproductive capacity in female animals, and pregnancy should be strictly avoided while on the drug and for two months after completion of therapy.
Numerous oral agents have been tested as stand-alone agents or as agents for combination therapy for treatment of VL. Most of them including ketoconazole, itraconazole, fluconazole, terbinafine and metronidazole have been discarded.,, Sitamaquine (WR6026), an 8 amino-quinoline, first reported in 1994, may constitute a promising oral drug. Sitamaquine (1 mg/kg/day for 4 weeks) when administrated to 8 patients provided a 50% cure rate. More recently, a phase 2 dose-escalating trial was performed in Brazil. Cure rates for patients treated for 28 days were 0% and 67% at 1 mg/kg/day and 2 mg/kg/day, respectively. Further studies are needed to determine the efficacy and toxicity profile of this agent.
Interferon gamma is a potent macrophage activator with synergistic activity with antimonials in mice. Interferon gamma alone has limited efficacy in human VL. Adjunctive interferon gamma therapy may accelerate or improve the response to antimonial therapy in some difficult cases., However, this approach may offer, at best, a marginal benefit in settings with high level resistance to antimonial compounds and has been used sparingly since the advent of amphotericin B lipid formulations. The high cost of interferon gamma precludes its widespread use in the developing world.
Many factors must be taken in account while choosing the most appropriate agent for the therapeutic management of VL. These include not only medical factors but also socio-economical and cultural factors. One should know about the endemicity of Leishmania strains, the immune and nutritional status of the population, level and pattern of parasite resistance to drugs and obviously the cost of the drugs.
In African and Indian areas with L. donovani infection, VL is a hyperendemic disease with a high rate of transmission. Most of the areas where VL is rampant there is lack of basic sanitary infrastructure. , About half a million cases are reported annually, mostly in extremely poor and malnourished individuals. In many of these areas, HIV epidemic is shaping up and it is feared that Leishmania-HIV co-infection may explode in the future.
The total cost of the treatment depends both on the price of the drug [Table - 1] and the cost of hospitalisation. The cost can be 14 times more expensive for a branded drug compared to a generic one. For the same drug, the price could vary depending on the distributor and the client (Bryceson, personal communication). Different local price scales may be offered and actual acquisition costs may be around 30 to 40% lower in certain circumstances. Hospitalisation costs also need to be taken into consideration while determining the cost of regimen. The exorbitantly high price of amphotericin B lipid formulations makes them inaccessible in developing countries. Although hospital costs can be appreciably reduced by short courses and especially by single-dose-regimens, the savings do not offset the cost of the drug in countries such as India, where hospital charges are low. Drug companies will have to cut prices for the potential benefits to be realised.
Current best practices in the treatment of VL may be differentiated according to the different settings.
4. Aminosidine was considered an acceptable first-line drug, but dose and treatment duration were not defined. It was used alone or in combination with pentavalent antimonials at 12-16 mg/kg for 14-63 days.
However, although acceptable, to our knowledge regimens 2 and 4 have are not commonly used in the treatment mediterranean VL.
In 2001, the fourth WHO joint meeting on Leishmania-HIV co-infection held in Catania (Italy) examined the therapeutic options. The treatment of Leishmania-HIV co-infected patients remained controversial. The use of pentavalent antimonials or amphotericin B desoxycholate, although useful, has a significant toxicity and the therapy is of long duration. New Amphotericin B lipid formulation have a better tolerability and can be used as short-course treatment. However, there are no reports of large-scale studies involving use of lipid amphotericin B in these patients.
HIV-infected patients, including those on HAART demonstrate relapse of VL after successful therapy. This is not a common occurrence and it is likely to occur at lower CD4 counts., In the absence of controlled study, there is no agreement about the indication and choice of secondary prophylaxis. The relapse-free period between patients treated with lipid amphotericin B (Abelcet® 3 mg/kg every 3 weeks) versus no treatment has been evaluated: after one year follow-up, 50% and 22% respectively, had no relapses. However, the figures were not statistically different (Laguna, data not published). Recipients of organ transplant constitute another group of immunocompromised individuals and this group may face the prospect of VL occurring as an opportunistic infection in them as well. It is possible that this group may have to tackle issues similar to those faced by patients with HIV-Leishmania co-infection.
American VL due to Leishmania chagasi and Mediterranean VL due to Leishmania infantum do not differ from the parasitological and epidemiological points of view. The treatment practices are quite similar in both diseases. A multi-centre trial in India, Kenya and Brazil suggested that Ambisome® 2 mg/kg on days 1-10 constitutes an effective therapy for patients with Mediterranean VL.
The first-line treatment remains antimonial pentavalent compounds with a minimum dose of 20 mg/kg/day for 28 days. Sub-optimal doses, incomplete treatment and sub-standard drugs may lead to clinical resistance. Until recently, amphotericin B desoxycholate was the only other available alternative drug in these areas. The availability of new oral anti-leishmanial drug, miltefosine could change the situation in near future and it may become a preferred first-line drug. Miltefosine is now registered in India. Lipid associated amphotericin B has an excellent safety and efficacy profile, but remains too expensive for most patients.
Socio-economic and cultural conditions have a tremendous bearing not only on the prevalence of VL but also on the choice of therapeutic option. Taking into consideration the 1995 WHO recommendations, liposomal amphotericin B should be considered the preferred first line drug. This drug provides spectacular cure rates at an extremely rapid pace, especially in children, and is associated with low potential for toxicity. It constitutes a cost-effective regimen in comparison to antimonials, if one takes into account the hospitalisation costs. The recommendation could change once an effective orally administered agent becomes available. There is nor running away from the fact that several issues regarding treatment of VL in HIV-infected patients remain unresolved. These are related to the duration of therapy and exact indications for institution and stoppage of prophylactic regimens. Liposomal amphotericin B constitutes the first-line therapy, but we cannot recommend a precise duration of treatment. Secondary prophylaxis can probably be interrupted, when CD4 cell counts exceed 300 per mm., In HIV-infected people living in endemic areas and asymptomatic carriers of Leishmania, HAART probably prevents overt VL.
In developing countries, the cost of lipid formulations of amphotericin B precludes their use. Miltefosine is an affordable drug, which appears as an effective and safe agent for use in regions with high level of antimonial resistance. Under these conditions, it may constitute the first-line therapy. However, due to the long half-life, sub-therapeutic levels of miltefosine may be encouraged for a few weeks after a 4-week course. It is feared that this characteristic might encourage the emergence of resistance in future. The risk of emergence of secondary resistance must be evaluated and the possible use of combination therapies needs to be explored to forestall it. In areas without antimonial resistance, antimonial compounds may remain the first-line choice. However, considering its striking advantages in terms of safety, ease of oral administration and affordability, miltefosine may soon become an alternative choice.
The issue of treatment of VL in developing countries is no longer an issue limited to an individual patient. It is a public health problem considering the fact that inadequate and ineffective therapy is fraught with emergence of secondary resistance. The issue of controlling VL also goes beyond development of new effective drugs and therapies and implementation of vector control measures. The world has to face the problem of high costs of therapy squarely as control of VL cannot wait till the economic situation improves and social and cultural issues tackled.
1. Desjeux P. The increase in risk factors of leishmaniasis worldwide. Trans R Soc Trop Med Hyg 2001;95:239-43.
2. Seaman J, Mercer AJ, Sandorp E. The epidemic of visceral leishmaniasis of Upper Nile, Southern Sudan: course and impact from 1984 to 1994. Int J Epidemiol 1996;25:862-71.
3. WHO: Leishmania/HIV co-infection, South-western Europe 1990-1998. Geneva: World Health Organization; mimeographed document 2000 WHO/LEISH/2000.42.
4. WHO. Report of the consultative meeting on Leishmania/HIV coinfection, Rome, 6-7 Setember, 1994. Geneva: World Health Organization; mimeographed document 1995 WHO/LEISH/95.35/1995.
5. Rosenthal E, Marty P, Poizot-Martin, Reynes J, Pratlong F, Lafeuillade A et al. Visceral leishmaniasis and HIV-1 co-infection in Southern France. Trans R Soc Trop Med Hyg 1995;89:159-62.
6. Wolday D, Berhe N, Akuffo H, Britton S. Leishmania/HIV interaction: immunopathogenic mechanisms. Parasitol Today 1999;15:182-7.
7. Rosenthal E, Marty P, Del Giudice P, Pradier C, Ceppi C, Gastaut JA, et al. HIV and Leishmania coinfection: a review of 91 cases with focus on atypical locations of Leishmania. Clin Infect Dis 2000;31: 1093-5.
8. Rosenthal E, Tempesta S, Del Giudice P, Marty P, Pradier C, Le Fichoux Y. Declining incidence of visceral leishmaniasis in HIV-infected individuals in the era of highly active antiretroviral therapy. AIDS 2001;15:84-5.
9. Herwaldt BL, Berman JD. Recommendations for treating leishmaniasis with sodium stibogluconate (Pentostam) and review of pertinent clinical studies. Am J Trop Med Hyg 1992;46:296-306.
10. Berman JD. Chemotherapy for leishmaniasis: biochemical mechanisms, clinical efficacy, and future strategies. Rev Infec Dis 1988;10:560-86.
11. Sundar S, More DK, Singh MK, Singh VP, Sharma S, Makharia A, et al. Failure of pentavalent antimony in visceral leishmaniasis in India: report from the center of indian epidemic. Clin Infect Dis 2000;31:1104-6.
12. Thakur CP. Sodium antimony gluconate, amphotericin, and myocardial damage. Lancet 1998;351:1928-9.
13. Santos J, Rivero A, Marquez M. Acute pancreatitis with a fatal evolution due to antimonials in patients with visceral leishmaniasis and HIV infection. An Med Interna 2000;7:562-3.
14. Veeken H, Ritmeijer K, Seaman J, Davidson R. Randomized comparison of branded sodium stibogluconate and generic sodium stibogluconate for the treatment of visceral leishmaniasis under field conditions in Sudan. Trop Med Int Health 2000;5:312-7.
15. Ritmeijer K, Veeken H, Melaku Y, Leal G, Amsalu R, Seaman J, et al. Ethiopian visceral leishmaniasis: generic and propriarity sodium stibogluconate are equivalent; HIV co-infected patients have a poor outcome. Trans R Soc Med Hyg 2001;95:668-72.
16. Moore E, O’Flaherty D, Heuvelmans H, Seaman J, Veeken H, de Wit S, et al. Comparison of generic and propiarity sodium stibogluconate for the treatment of visceral leishmaniasis in Kenya. Bull World Health Organ 2001;79:388-93.
17. Sundar S, Sinha PR, Agrawal NK, Srivastava R, Rainey PM, Berman JD, et al. A cluster of cases of severe cardiotoxicity among kala-azar patients treated with a high-osmolarity lot of sodium antimony gluconate. Am J Trop Med Hyg 1998;59:139-43.
18. Frezard F, Michalick MS, Soares CF, Demicheli C. Novel methods for the encapsulation of meglumine antimoniate into liposomes. Braz J Med Biol Res 2000;33:841-6.
19. Mishra M, Biswas UK, Jha DN, Khan AB. Amphotericin versus pentamidine in antimony-unresponsive kala-azar. Lancet 1992;340:1256-7.
20. Das VN, Ranjan A, Sinha AN, Verma N, Lal CS, Gupta AK, et al. A randomized clinical trial of low dosage combination of pentamidine and allopurinol in the treatment of antimony unresponsive cases of visceral leishmaniasis. J Assoc Physicians India 2001;49:609-13.
21. Seaman J, Pryce D, Sondorp H, Wilkinson R, Bryceson ADM. Epidemic visceral leishmaniasis in Sudan: A randomized trial of aminosidine plus sodium stibogluconate versus sodium stibogluconate alone. J Infect Dis 1994;168:715-20.
22. Thakur CP, Kanyok TP, Pandey AK, Sinha GP, Messick C, Olliaro PA. prospective randomized, comparative, open-label trial of the safety and efficacy of paromomycin (aminosidine) plus sodium stibogluconate versus sodium stibogluconate alone for the treatment of visceral leishmaniasis. Trans R Soc Trop Med Hyg 2000;94:429-31.
23. Thakur CP, Kanyok TP, Pandey AK, Sinha GP, Messick C, Olliaro P. Treatment of visceral leishmaniasis with injectable paromomycin (aminosidine). An open-label randomized phase-II clinical study. Trans R Soc Trop Med Hyg 2000;94:432-3.
24. Murray HW. Clinical and experimental advances in treatment of visceral leishmaniasis. Antimicrob Agents Chemother 2001;45:2185-97.
25. Kager PA, Rees PH, Wellde BT, Hockmeyer WT, Lyverly WH. Allopurinol in the treatment of visceral leishmaniasis. Trans R Soc Trop Med Hyg 1981;75:556-9.
26. Chunge CN, Gachihi G, Muigai R. Visceral leishmaniasis unresponsive to antimonial drugs. III. Successful treatment using a combination of sodium stibogluconate plus allopurinol. Trans R Soc Trop Med Hyg 1985;79:715-8.
27. Jha TK. Evaluation of allopurinol in the treatment of kala-azar occurring in North Bihar, India. Trans R Soc Trop Med Hyg 1983;77:204-7.
28. Ragusa R, Di Cataldo A, Samperi P, Schiliro G. Treatment of visceral leishmaniasis with meglumine and allopurinol. Am J Dis Child 1993;147:611-2.
29. Thakur CP, Singh RK, Hassan SM, Kumar R, Narain S, Kumar A. Amphotericin B deoxycholate treatment of visceral leishmaniasis with newer modes of administration and precautions: a study of 938 cases. Trans R Soc Trop Med Hyg 1999;93:319-23.
30. Sundar S, Gupta LB, Rastogi V, Agrawall G, Murray HW. Short course, cost-effective treatment with Amphotericin B-fat emulsion cures visceral leishmaniasis. Trans R Soc Trop Med Hyg 2000;94:200-4.
31. Davidson RN, Croft SL, Scott A, Maini M, Moody AH, Bryceson ADM. Liposomal amphotericin B in drug-resistant visceral leishmaniasis. Lancet 1991;337:1061-2.
32. Davidson RN, Di Martino L, Gradoni L, Giacchino R, Gaeta GB, Pempinello R, et al. Short-course treatment of visceral leishmaniasis with liposomal amphotericin B (AmBisome). Clin Infect Dis 1996; 22:938-43.
33. Dietze R, Fagundes SMS, Brito EF, Milan EP, Feitosa TF, Suassuna FA, et al. Treatment of kala azar in Brazil with Amphocil (amphotericin B cholesterol dispersion) for 5 days. Trans R Soc Trop Med Hyg 1995; 89:309-11.
34. Sundar S, Murray HW. Cure of antimony-unresponsive Indian visceral leishmaniasis with amphotericin B lipid complex (ABLC). J Infect Dis 1996;173:762-6.
35. Sundar S, Agrawall G, Sinha PR, Horwith GS, Murray HW. Short course low-dose amphotericin B lipid complex therapy for visceral leishmaniasis unresponsive to antimony. Ann Intern Med 1997;127:133-7.
36. Thakur CP, Pandey AK, Sinha GP, Roy S, Behbehani K, Olliaro P. Comparison of three treatment regimens with liposomal amphotericin B (AmBisome) for visceral leishmaniasis in India: a randomized dose-finding study. Trans R Soc Trop Med Hyg 1996;90:319-22.
37. Gradoni L. Chemotherapy of leishmaniasis and trypanosomiasis: advances and failures. Curr Opin Infect Dis 1996;9:435-8.
38. HerwaldtT BL. Leishmaniasis. Lancet 1999;354:1191-9.
39. Russo R, Nigro LC, Minniti S, Montineri A, Gradoni L, Caldeira L, et al. Visceral leishmaniasis in HIV infected patients: treatment with high dose liposomal amphotericin B (AmBisome). J Infection 1996;32:133-7.
40. Torre-Cisneros J, Villanueva JL, Kindellan JM , Jurado R, Sanchez-Guijo P. Successful treatment of antimony resistant visceral leishmaniasis with liposomal amphotericin B in patients infected with human immunodeficiency virus. Clin Infect Dis 1993;17:625-7.
41. Boletis JN, Pefanis A, Stathakis C, Helioti H, Kostakis A, Giamarellou H. Visceral leishmaniases in renal transplant recipients: successful treatment with liposomal amphotericin B (Ambisome). Clin Infect Dis 1999;28:1308-9.
42. Sundar S, Agrawall G, Rai M, Makharia MK, Murray HW. Treatment of Indian visceral leishmaniasis with single or daily infusions of low dose liposomal amphotericin B randomized trial. BMJ 2001;323:419-22.
43. Croft SL, Neal RA, Pendergast W, Chan JH. The activity of alkyl phosphorylcholines and related derivatives against Leishmania donovani. Biochem Pharmacol 1987;36:2633-6.
44. Kuhlencord A, Maniera T, Eibl H, Unger C. Hexadecylphosphocholine: oral treatment of visceral leishmaniasis in mice. Antimicrob Agents Chemother 1992;36:1630-4.
45. Le Fichoux Y, Rousseau D, Ferrua B, Ruette S, Lelievre A, Grousson D, et al. Short- and long-term efficacy of hexadecylphosphocholine against established Leishmania infantum infection in Balb/c mice. Antimicrob Agents Chemother 1998;42:654-8.
46. Croft SL, Snowdon D, Yardley V. The activities of four anticancer alkyllysophospholipids against Leishmania donovani, Trypanosoma cruzi and Trypanosoma brucei. J Antimicrob Chemother 1996;38: 1041-7.
47. Urbina JA. Lipid biosynthesis pathways as chemotherapeutic targets in kinetoplastid parasites. Parasitology 1997;114(Suppl):S91-S9.
48. Murray HW, Delph-Etienne S. Visceral leishmanicidal activity of hexadecylphosphocholine (miltefosine) in mice deficient in T cells and activated macrophage microbicidal mechanisms. J Infect Dis 2000;181:795-9.
49. Murray HW, Delph-Etienne S. Roles of endogenous gamma interferon and macrophage microbicidal mechanisms in host response to chemotherapy in experimental visceral leishmaniasis. Infect Immun 2000;68:288-93.
50. Murray HW. Suppression of posttreatment recurrence of experimental visceral leishmaniasis in T-cell-deficient mice by oral miltefosine. Antimicrob Agents Chemother 2000;44:3235-6.
51. Sundar S, Rosenkaimer F, Makharia MK, Goyal AK, Mandal AK, Voss A, et al. Trial of oral miltefosine for visceral leishmaniasis. Lancet 1998;352:1821-3.
52. Sundar S, Gupta LB, Makharia MK, Singh MK, Voss A, Rosenkaimer F, et al. Oral treatment of visceral leishmaniasis with miltefosine. Ann Trop Med Parasitol 1999;93:589-97.
53. Jha TK, Sundar S, Thakur TP. Miltefosine, an oral agent, for the treatment of Indian visceral leishmaniasis. N Engl J Med 1999;341:1795-800.
54. Sundar S, Makharia MK, More DK, Agrawal G, Voss A, Fischer C, et al. Short-course of oral miltefosine for treatment of visceral leishmaniasis. Clin Infect Dis 2000;31:1110-3.
55. Sundar S, Jha TK, Thakur CP, Engel J, Sindermann H, Fischer C, et al. Oral miltefosine for indian leishmanisis. N Engl J Med 2002;347:1739-46.
56. Berman JD. Human leishmaniasis:clinical, diagnostic, and chemotherapeutic developments in the last 10 years. Clin Infect Dis 1997;24:684-703.
57. Gangneux JP. Données récentes sur le traitement de la leishmaniose viscérale. Presse Med 1999;28:2057-66.
58. Murray HW. Treatment of visceral leishmaniasis (kala-azar): a decade of progress and future approaches. Int J Infect Dis 2000;4:158-77.
59. Sherwood JA, Gachihi GS, Muiggai RK, Skillman DR, Mugo M, Rashid JR, et al. Phase 2 efficacy trial of an oral 8-aminoquinoline (WR6026) for treatment of visceral leishmaniasis. Clin Infect Dis 1994;19:1034-9.
60. Dietze R, Carvalho SF, Valli LC, et al. Phase 2 trial of WR6026, an orally administered 8-aminoquinoline, in the treatment of visceral leishmaniasis caused by Leishmania chagasi. Am J Trop Med Hyg 2001;65:685-9.
61. Murray HW, Granger AM, Mohanty SK. Response to chemotherapy in experimental visceral leishmaniasis: T cell-dependent but interferon-gamma and interleukin-2-independent. J Infect Dis 1991;163: 622-4.
62. Sundar S, Murray HW. Effect of treatment with interferon-gamma alone in visceral leishmaniasis. J Infect Dis 1995;172:1627-9.
63. Badaro R, Falcoff E, Badaro FS, Carvalho EM, Pedral-Sampaio D, Barral A, et al. Treatment of visceral leishmaniasis with pentavalent antimony and interferon gamma. N Engl J Med 1990;322:16-21.
64. Sundar S, Singh VP, Sharma S, Makharia MK, Murray HW. Response to interferon-gamma plus pentavalent antimony in Indian visceral leishmaniasis. J Infect Dis 1997;176:1117-9.
65. Harrat Z, Addadi K, Belkaid M, Tabet-Derraz O. La leishmaniose viscérale en Algérie. Recensement des cas de leishmaniose viscérale. Bull Soc Path E 1992;85:296-301.
66. Marty P, Le Fichoux Y, Pratlong F, Gari-Toussaint M. Human visceral leishmaniasis in Alpes-Maritimes, France: epidemiological characteristics for the period 1985-1992. Trans R Soc Trop Med Hyg 1994;88:33-4.
67. Alvar J, Canavate C, Gutirrez-Solar B, Jimenez M, Laguna F, Lopez-Velez R, et al. Leishmania and human immunodeficiency virus coinfection: the first ten years. Clin Microbiol Rev 1997;10:298-319.
68. Kubar J, Marty P, Lelievre A, Quaranta JF, Staccini P, Caroli-Bosc C, et al. Visceral leishmaniosis in HIV-positive patients: primary infection, reactivation and latent infection. Impact of the CD4+T-lymphocyte counts. AIDS 1998;12:2147-53.
69. Soriano V, Dona C, Rodriguez-Rosado R, Barreiro P, Gonzalez-Laboz J. Discontinuation of secondary prophylaxis for opportunistic infections in HIV-infected patients receiving highly active antiretroviral therapy. AIDS 2000;14:383-6.
70. Berenguer J, Cosin J, Miralles P, Lopez JC, Padilla B. Discontinuation of secondary anti-Leishmania prophylaxis in HIV-infected patients who have responded to highly active antiretroviral therapy. AIDS 2000;14:2946-58.
71. Thakur CP. Epidemiological, clinical and therapeutic features of kala-azar (including post kala-azar dermal leishmaniasis). Trans R Soc Trop Med Hyg 1984;78:391-8.
72. Gradoni L, Bryceson A, Desjeux P. Treatment of mediterranean visceral leishmaniasis. Bull World Health Organization. 1995;73:191-7.
73. 73. Anonymous. Conclusions and recommendations of the IVth WHO joint meeting on Leishmania-HIV co-infections. Parasite 2001;8: 376-9.
74. Laguna F, Lopez-Velez R, Pulido F, Salas A, Torre-Cisneros J, Torres E, et al. Treatment of visceral leishmaniasis in HIV-infected patients: a randomized trial comparing meglumine antimoniate with amphotericin B. Spanish HIV-Leishmania Study Group. AIDS 1999;13:1063-9.
75. Berman JD, Badaro R, Thakur CP, Wasunna KM, Behbehani K, Davidson R, et al. Efficacy and safety of liposomal amphotericin B (AmBisome) for visceral leishmaniasis in endemic developing countries. Bull World Health Organization1998;76:25-32.
76. Sundar S. Drug resistance in Indian visceral leishmaniasis. Trop Med Int Health 2001;6:849-54.
77. Marty P, Rosenthal E. Treatment of visceral leishmaniasis: a review of current treatment practices. Expert Opin Pharmacother 2002;3:1101-8.
78. Bryceson A. A policy for leishmaniasis with respect to the prevention and control of drug resistance. Trop Med Int Health 2001;6:928-93.
79. Murray HW. Kala-azar-Progress against a neglected disease. N Engl J Med 2002;347:1793-4. | 2019-04-21T14:53:08Z | http://www.jpgmonline.com/article.asp?issn=0022-3859;year=2003;volume=49;issue=1;spage=61;epage=8;aulast=Rosenthal |
Just after dawn on the morning of June 5, 1967, when Bill Dance cast a blue Fliptail plastic worm across a sunken roadbed in Beaver Lake and caught what is generally considered to be the first-ever largemouth taken in BASS competition, he unknowingly turned a century-old industry into an overnight success.The industry, of course, was the manufacture of fishing tackle, which in various and scattered forms, had existed since the 1840s. Many lure making companies, like Heddon, Shakespeare, Pflueger and others, had become successful long before Dance caught that fish, but what the Tennessee angler and his fellow tournament competitors unknowingly accomplished, was to give the industry a new direction it still follows. "Keep in mind that fishing tackle basically originated in Europe, but the overall development of new items there was slow because only royalty and clergy actually had fishing rights on the rivers," explains nationally known fishing historian Karl White of Luther, Okla.
"Once fishing reached America, and following the Colonial period, tackle development was very rapid, because anyone could go fishing. After about 1850, the U.S. Patent Office was flooded with applications concerning tackle. No one tried to patent an entire lure — only some device on it; and if it proved successful, other lure makers immediately copied it. That's how the industry grew in the beginning." After 1967, with the increasing interest in bass fishing being generated by Dance & Co. in tournament competition, tackle makers shifted into high gear. The week after Dance won his first tournament, the 1968 Rebel Invitational at Ross Barnett Reservoir, he received telephone calls from three plastic worm manufacturers offering varying amounts of sponsorship (he signed with Creme Lures). Since then, it has been a wild ride for everyone involved, much of it filled with stories that defy the imagination. Indeed, the history of the past 35 years of tackle building is probably best told as stories about those involved.A Tennessee wood carver, for instance, whittled a plug that, in 1972, forever changed the crankbait industry. A soft plastics design that revolutionized the plastic worm was once sold after being demonstrated in a toilet bowl, and another that has sold millions was modeled after a Bic ballpoint pen.
By the late 1960s, when the Bassmaster Tournament Trail competition began, there were, of course, many different lures available to bass fishermen. The plastic worm had been around for more than 15 years, and plugs — particularly topwaters — had been available since the turn of the century.Spinnerbaits, likewise, had been developed many years before, but not until 1964 had a patent been issued for an honest-to-goodness safety-pin-type spinnerbait (to John W. Thomas), so this design was still a fairly new concept when Dance went zipping across Beaver Lake that morning.
Crankbaits were offered from companies like Heddon, Creek Chub, and the Finnish company Rapala, which hit a huge publicity home run Aug. 17, 1962, when Life Magazine, featuring Marilyn Monroe on the cover, published a story on the lures.Because fishermen everywhere are among the world's greatest tinkerers, changes and improvements to all the different lure types came quickly after those first tournaments. Often too, improvements emerged simultaneously but independently by anglers trying to solve a common problem, and once it was solved, others copied the idea.
North Alabama fisherman Bill Huntley, for example, began tinkering with spinnerbaits on his kitchen table each night after working all day in the medical supply business. Each night, that is, when he wasn't testing his new creations on Tennessee River smallmouth. Huntley is credited by many as being the first to use a ball bearing swivel; the first to use satin stainless wire instead of the commonly used steel piano wire; and certainly one of the first to experiment with what later became known as the willowleaf blade. At the same time, Nashville, Tenn., angler Stan Sloan, winner of that first Beaver Lake event (Dance was second), was also experimenting with spinnerbaits, although he actually won the tournament on a topwater lure. A former police officer, Sloan used the tournament win, combined with his success in later events, to move into the lure business full time, using his Zorro Spinnerbait as the foundation. Another pioneer BASS angler, Don Butler, initially in the lumber business, used his early tournament success to launch the Okiebug Spinnerbait.
In the years since, spinnerbaits have been and continue to be made and marketed by dozens of companies, large and small. Heads, hooks, wires, skirts and blades have all been altered, but probably the single most influential change has been the willowleaf blade, which is now the most widely used design in the industry.The Hildebrandt company had been making willowleaf blades for some time, but it wasn't until 1984 that the blade officially found its way into BASS competition. That's when anglers like Roland Martin, Kim Carver, Hank Parker and others started using huge Size 8 willowleaf blades to fish heavy vegetation, particularly on the St. Johns River and in Lake Okeechobee. The big blades not only cut through the greenery, they also provided plenty of flash.
Carver's 1984 win in the St. Johns Bassmaster Invitational, along with Martin's victories in both the Georgia and Hudson River Invitationals that same year, proved how effective the blade could be. But more importantly, their successes showed that the overall willowleaf design — big or small — offered multiple advantages in other situations, such as brushtops, tree limbs, logs, lily pads and even in open water.Soon, every spinnerbait maker was offering lures with the narrow, pointed blades as a standard option, and today the willowleaf design is the overwhelming favorite among America's anglers.A decade before the willowleaf began dominating the spinnerbait market, the plastic worm underwent its own radical change: In effect, the worm grew a new tail. Instead of staying straight, as they had for the previous two decades, the new lures featured curled, swimming, spiral tails.The earliest version was French-made, patented under the name Sosy Eel and introduced at the 1973 American Fishing Tackle Manufacturers Association (AFTMA) trade show in Chicago by R.J. Benson, president of a firm named Generic Systems. The Sosy Eel was a fairly large-bodied lure featuring a thin, curving, sicklelike tail; it wasn't a worm at all. As the Eel was retrieved, the tail vibrated like a swimming eel or snake.By January 1974, Rick Welle and Glynn Carver of the Carver Plastisols Co. in Minden, La., had introduced their own version, the Mister Twister worm, in both 4- and 6-inch lengths, and the rest is history. They'd shipped 3 million swimming tail Twisters by April 1 that same year, and were retooling to be able to produce half a million worms a day.Others quick to copy the concept included Cordell, Mann's, Burke, Stembridge, Lindy, Bagley and others, all of whom sold the new worms as fast as they could manufacture them. A Cordell rep reportedly sold $9,000 worth of their worms by demonstrating one in a toilet bowl. The French Sosy Eel soon disappeared under this onslaught, but the swimming-tail design is now a standard in the soft plastics industry, and has since been incorporated in lizards, grubs, frogs, jig and spinnerbait trailers and creature baits. Relatively speaking, far more swimming-tail lures are sold and used today than straight tails.
In just the past three years, another version of the plastic worm, the soft plastic stickbait, has also firmly established itself in both fishing lore as well as in the marketplace. If you think the blunt-nosed Yamamoto Senko looks surprisingly like a Bic ballpoint pen, you're exactly right, because that's what Yamamoto showed his lure designers as they were struggling to produce a soft jerkbait. Yamamoto had been fishing in Florida about the time Herb Reed's soft jerkbait, the Slug-Go, skyrocketed into popularity, and he decided to make some type of soft jerkbait himself. As design after design failed to produce the results he wanted, Yamamoto simply handed his staff a Bic, from which a mold was made.
The lure's action — a horizontal fall while both ends of the bait vibrate — came as a surprise to all of them, but the Senko's success in tournaments has spawned nearly a dozen copies.
The soft plastics industry probably has more milestone developments than any other phase of lure manufacturing because these types of baits are not only popular, they're also among the least expensive to produce. And, as Dance so clearly illustrated in 1967, tournament fishing has frequently been the catalyst that sparked their success.
Bobby and Garry Garland's original tube lure, the Gitzit, for instance, was introduced in 1982, but for years most considered it a light tackle, clear water lure. That concept changed immediately after Doug Garrett's 1997 MegaBucks victory, when he revealed how he and several other Arkansas pros regularly fished the lures on heavy line and in thick cover.Denny Brauer's 1998 Bassmaster Classic win with a tube further established the lure's credibility, and for a time, Strike King, Brauer's sponsor, simply could not keep up with public demand for this "new" lure. Today, Garry Garland's original hollow lure concept has not only been widely copied, but also incorporated into several very successful new designs.An even more dramatic illustration of how tournament success has affected the evolution of soft plastic fishing tackle is Jack Chancellor's 1985 Bassmaster Classic win with a 4-inch, 2-hook worm and a sinker/leader combination known as the Carolina rig.Chancellor didn't invent the little worm or develop the technique; that had been done by Gastonia, N.C., angler Lloyd Deaver as early as the mid-1950s. Deaver's original worm was named the Fish Finder, and it sold very well, comparatively speaking, for its time. In fact, Deaver fired his two sales reps because they sold more worms than he could make.
Until Chancellor's dramatic win, however, Carolina rigging was not an accepted technique among tournament anglers. After his win, it became one of the most popular of all bass fishing tactics, and companies began marketing not only short plastic worms, but also new slip sinkers, glass beads and special Carolina rig rods. The pros quickly recognized that almost any soft plastic lure could be used with the rig, and while the 4-inch, 2-hook worm is seldom used by serious bass hunters today, the Carolina rig technique is quite common.Without question, one of the most remarkable stories of how a single lure impacted the evolution of fishing tackle involves the Big O, a hand-carved crankbait whittled by Fred Young of Maynardville, Tenn. Like the willowleaf spinnerbait blade, it took a professional bass tournament angler to kick-start it. That angler was Young's friend, Billy Westmorland.
The Big O was short and fat, and with its small lip, the lure not only dived but also vibrated or wobbled as it moved through the water. When the retrieve was stopped, the lure quickly floated to the surface. Not only were these features unique, the entire lure actually looked like a baitfish.
Young could whittle about one Big O per day, and area fishermen stood in line to purchase them for $5 each. One of those fishermen was Westmorland, who, at the June 1972 Tennessee National tournament on Watts Bar Lake, accidentally let other competitors see the lure. The reaction was instantaneous, as everyone scrambled to get a Big O. Because there weren't enough to go around, the crankbaits were rented for $5 per day, but cost $25 if an angler lost it.
Westmorland never won a national BASS tournament with the Big O, but others did. When Larry Hill won the 1973 Florida Invitational by boating some 60 pounds of fish in an hour with the lure (he won with 108 pounds, 2 ounces), the future of crankbaiting changed forever. Cotton Cordell secured the rights to the Big O from Young, and sold more than a million of them the first year. Heddon, Storm, Norman, Bagley, Rebel, Mann's and others quickly introduced their own versions.
Virtually all of today's diving crankbaits can trace their basic design heritage to Young's Big O. Crankbaits, of course, were being manufactured long before Young started carving his Big O, and some have said he may have simply copied a plug whittled years before by another fisherman. Whatever the case, there is no doubt his particular creation was the forerunner of today's diving plugs, if for no other reason than for the publicity generated by tournament anglers like Hill and Westmorland.It is difficult, if not impossible, to detail all the other developments in fishing tackle that have been generated by bass tournament pros during the past 35 years of competition on waters around the nation. Bill Dance certainly did not know what catching that first fish at Beaver Lake would mean in the evolution of tackle, but the overall result has been nothing short of phenomenal.
In the late 1960s, most bass fishermen used a 5 ½-foot fiberglass rod with either a short, straight handle or a pistol grip — but on the West Coast, a small group of anglers was already setting in motion the wheels of change.
That change — the use of a 7 ½-foot rod and the technique of flipping — was introduced to the rest of the bass world when Dee Thomas used it to win the 1975 Arkansas Invitational at Bull Shoals Lake. Thomas is known as the "Father of Flippin'," but it was one of his disciples, Dave Gliebe, who truly proved the effectiveness of the long rod/short line technique.Gliebe won the 1977 Louisiana Invitational on Toledo Bend by flipping up a total of 83 pounds, 2 ounces of bass. He followed that with a victory in a tough event on Florida's Lake Kissimmee in 1978. In the years since, no other technique has so impacted the rod industry as has flipping and its offshoot, pitching. Both have led to wide acceptance of generally longer rods for virtually every type of fishing.The use of graphite in rods has also had a huge impact in the industry, so much so that fiberglass rods are hard to find today. Cotton Cordell of Hot Springs, Ark., was building and marketing graphite rods as early as 1971.Cordell, in fact, was not allowed to fish Ray Scott's initial bass tournament on Beaver Lake because Scott considered him a "pro," since even in 1967 he had already been in the rod and lure business for 20 years.Among other accomplishments, Cordell had whittled a pistol grip rod handle he and Alabama rod maker Lew Childre had taken to Japan, and the Japanese promptly manufactured one for them overnight. The pistol grip rod handle immediately became the standard on Childre's famous Speed Sticks, and then the rage on rods all across America.
During the mid-1970s, another rod maker, Gary Loomis, was also beginning to make his name known. But after Loomis sold his company, Lamiglas, he left the fishing business and began working nights in a machine shop. One day, Cordell, who wanted to concentrate on lures, called his friend Loomis and gave him his entire rod making inventory. From there, initially working out of a rented house, Loomis started the G. Loomis company, which continues to produce some of America's most popular graphite rods.Another company, California-based Fenwick, also introduced graphite rods in the 1970s, and while they may not have actually had the first graphite technology, they marketed it more successfully than anyone else. Their rods put graphite on the fishing map, and today, fishing rods are one of the major applications for this material.
The improvement of fishing lines since 1967 really has only one landmark development that can be directly attributed to bass tournament competition: Randy Dearman's March 1993 win in the Texas Bassmaster Invitational at Sam Rayburn Reservoir, where he used a braided line instead of monofilament.
Monofilament had been in use since 1959, and while manufacturers like Berkley and DuPont Stren introduced new lines almost annually, the most popular types were pretty much derivatives of the same technology. Chemists could boast about changing polymers and molecular structures, but bass fishermen simply talked in terms of castability, stretch, and abrasion resistance.Then came Dearman's win, and suddenly the playing field changed. Here was a line that was practically unbreakable and without very much stretch. It was extremely sensitive, and if you wanted to, you could use 90-pound test — easily strong enough to handle any largemouth that swims.Companies throughout the industry quickly began marketing their own versions of these lines.Today, these "superlines" are still popular among many anglers, but through tournament experimentation, the pros have helped define specific qualities of braided lines, so everyone can use them more effectively.
The use of fluorocarbon lines in bass fishing is one of the most recent steps in the evolution of lines, but acceptance has been slow, primarily because of castability and also cost. Both of these problems have been addressed by a growing list of producers, however, and future use of these nearly invisible and incredibly strong lines is almost sure to increase.
The evolution of fishing reels has been much less dramatic than that of baits and rods. In the 1960s, the Swedish firm of Abu practically controlled the baitcasting market, and today's reels, while much improved, still rely on many of the same principles that governed those early models.The greatest improvements have come in spool braking systems, which no longer require the full use of an "educated thumb." Magnets and other devices have proved extremely successful in slowing spools and preventing backlashes.Have these innovations come as a direct result of tournament competition? Probably not directly, but certainly indirectly. These are improvements aimed at satisfying the masses of casual anglers, but again, the overall interest in bass fishing has been strongly influenced by tournament fishermen and the publicity they generate.Other developments in reel technology have followed this same path. More streamlined "tear drop" shapes have made casting more comfortable, while additional ball bearings have improved overall smoothness and performance. Special on/off switches engage or disengage the spool for flipping or casting. | 2019-04-24T20:27:30Z | https://www.bassmaster.com/news/evolution-bass-tackle |
In invasive malignancies, Dll4/Notch signaling inhibition enhances non-functional vessel proliferation and limits tumor growth by reducing its blood perfusion.
To assess the effects of targeted Dll4 allelic deletion in the incipient stages of tumor pathogenesis, we chemically induced skin papillomas in wild-type and Dll4+/− littermates, and compared tumor growth, their histological features, vascularization and the expression of angiogenesis-related molecules.
We observed that Dll4 down-regulation promotes productive angiogenesis, although with less mature vessels, in chemically-induced pre-cancerous skin papillomas stimulating their growth. The increase in endothelial activation was associated with an increase in the VEGFR2 to VEGFR1 ratio, which neutralized the tumor-suppressive effect of VEGFR-targeting sorafenib. Thus, in early papillomas, lower levels of Dll4 increase vascularization through raised VEGFR2 levels, enhancing sensitivity to endogenous levels of VEGF, promoting functional angiogenesis and tumor growth.
Tumor promoting effect of low-dosage inhibition needs to be considered when implementing Dll4 targeting therapies.
Delta-like 4 (Dll4)-mediated Notch signaling critically influences blood vessel formation in both physiological and pathological settings. During embryonic development, this signaling is absolutely required for normal arterial specification . In addition, Dll4/Notch fundamentally participates in the regulation of embryonic [1, 2], post-natal developmental [3–6], regenerative and tumor sprouting angiogenesis [8–14]. It mediates communication between adjacent endothelial cells (ECs) that lead the sprout formation and adjacent ECs that, under Dll4/Notch control, remain in the quiescent state in pre-existing vasculature or rather proliferate then migrate, forming the trunk of the new vessel [5, 6, 13]. Mechanistically, Dll4/Notch enables the selective EC departure from pre-existing activated endothelium and organized sprout outgrowth by decreasing the VEGFR2/VEGFR1 ratio and therefore reducing the sensitivity of signal-receiving ECs to VEGF.
Elevated Dll4 expression predicts poor prognosis in different cancers [14–17]. Previous studies have shown that although Dll4/Notch blockade potentiates the tumor-driven angiogenic response, it inhibits tumor growth due to the formation of immature and poorly functional vessels that result in reduced tumor perfusion [8–13, 18]. Additionally, Dll4/Notch inhibition has been found to reduce the frequency of cancer stem cells . Although these findings indicate that the Dll4/Notch blockade may provide an effective way to improve cancer control, the capacity for normalization of the aberrant vascular network to Dll4/Notch inhibition remains undetermined. Moreover, therapeutic inhibition of Dll4 signaling may face important safety limitations since chronic Dll4/Notch impairment was found to destabilize normal endothelium giving origin to the formation of benign vascular tumors [12, 20, 21]. Nevertheless, several studies with different Dll4 blocking antibodies are now proceeding through phase I trials.
Despite the wealth of information regarding the effects of Dll4/Notch inhibition in invasive neoplasms, little is known regarding its role in benign and early, pre-cancerous lesions. We have previously shown that Dll4 heterozygote mice can produce functional neo-angiogenesis and improve vascular function in the context of physiological angiogenesis . The present study was undertaken to assess the effects of targeted Dll4 allelic deletion in the incipient stages of tumor pathogenesis. For this purpose, we used a classic 7,12-dimethylbenz[a]anthracene (DMBA)/12-O-tetradecanoylphorbol-13-acetate (TPA)-induced skin carcinogenesis model wherein the initiating carcinogen, DMBA, results in an activating mutation in the H-ras gene and generation of “initiated” epidermal cells . These cells form papillomas progressing, in the later phase, to squamous carcinomas and sharing the same H-ras mutation with some human lesions, like papillomas in Costello syndrome and epidermal nevi [23, 24].
The CD1 wild-type (WT) and heterozygous Dll4+/− mice were generated and housed as previously described [1, 12]. The mice were fed standard laboratory diet and drinking water ad libitum. All animal-involving procedures were approved by the Faculty of Veterinary Medicine of Lisbon Ethics and Animal Welfare Committee (Approval ID: PTDC/CVT/71084/2012).
Male, 8-week old WT and Dll4+/− littermates (n = 12 for each group) were treated with a single dose of 25 μg of 7,12-dimethylbenz[a]anthracene (DMBA; Sigma, St. Louis, MO) in 200 μL acetone per mouse applied to shaved dorsal skin. Beginning a week after DMBA-induction, tumor onset and growth was promoted by treating mice twice a week for 19 weeks with 4 μg of 12-O-tetradecanoylphorbol-13-acetate (TPA; Sigma, St. Louis, MO) in 100 μL of dimethyl sulfoxide (DMSO) per mouse. The appearance of skin lesions was monitored and recorded weekly. Mouse weight and tumor sizes (diameters) were periodically measured and lesion diameters were converted to tumor volume using the following formula: V = length × width × height × 0.52. Tumor burden of each individual mouse was calculated as the sum of its individual tumour volumes. Twenty weeks after the DMBA initiation, mice were anesthetized by intraperitoneal (i.p.) injection of 2.5 % tribromoethanol (Sigma-Aldrich, St. Louis, MO) and total blood was collected by axillary bleeding from six animals of each genotype for the determination of VEGF, cleaved VEGFR1 and cleaved VEGFR2 concentrations. The remaining WT and Dll4+/− mice (n = 6 for each genotype) were perfused with biotin-conjugated lectin (Sigma, St. Louis, MO), as described below, for the assessment of tumor vessel functionality. The skin tumors were then dissected from all WT and Dll4+/− mice and processed for histological or molecular analyses.
Skin tumor samples were processed as previously described and cryosectioned at 20 μm. Sections were stained with hematoxylin (FlukaAG Buchs SG, Switzerland) and eosin Y Sigma Chemicals, St. Louis, MO). Double fluorescent immunostaining to platelet endothelial cell adhesion molecule (PECAM) and vascular smooth muscle cell marker alpha smooth muscle actin (α-SMA) was also performed on tumor tissue sections to examine tumor vascular density and vessel maturity. Rat monoclonal anti-mouse PECAM (BD Pharmingen, San Jose, CA) and rabbit polyclonal anti-mouse α-SMA (Abcam, Cambridge, UK) were used as primary antibodies and appropriate species-specific antibodies conjugated with Alexa Fluor 488 and 555 (Invitrogen, Carlsbad, CA) were engaged as secondary antibodies. Nuclei were counterstained with 4′,6- diamidino-2-phenylindole dihydrochloride hydrate (DAPI; Molecular Probes, Eugene, OR). Fluorescent immunostained sections were examined under a Leica DMRA2 fluorescence microscope with Leica HC PL Fluotar 10 and 20X/0.5 NA dry objective, captured using Photometrics CoolSNAP HQ, (Photometrics, Friedland, Denmark), and processed with Metamorph 4.6–5 (Molecular Devices Sunnyvale, CA). Morphometric analyses were performed using the NIH ImageJ 1.37v program. To estimate vessel density, we measured the percentage of tumor stroma surface occupied by a PECAM positive signal. Mural cell recruitment was assessed as a measure of vascular maturity by quantitating the percentage of PECAM-positive structures lined by α- SMA-positive coverage. For the assessment of VEGFR2 expression in papillomas, immunostaining was performed using purified rat anti-mouse VEGFR2 (BD Pharmingen, San Jose, CA) and appropriate secondary antibody conjugated with Alexa Fluor 555 (Invitrogen, Carlsbad, CA). PDGFR-β expression was assessed by double PECAM/PDGFR-β immunostaining for which we used rat monoclonal anti-mouse PECAM (BD Pharmingen, San Jose, CA), rabbit monoclonal anti-mouse PDGFR-β (Cell Signalling Technology, Denver, MA), and appropriate secondary antibodies conjugated with Alexa Fluor 488 and 555 (Invitrogen, Carlsbad, CA). Papillomas from WT and mutant mice were compared upon the measurement of the percentage of tumor stroma surface occupied by a VEGFR2 positive signal as well as the measurement of the percentage of PECAM-positive structures lined by PDGFR-β-positive coverage.
To assess vascular perfusion and determine the functional fraction of the tumor circulation, the anesthetized mice were injected via caudal vein with a solution of biotin-conjugated lectin from Lycopersicon esculentum (100 μg in 100 μl of PBS; Sigma, St. Louis, MO), which was allowed to circulate for 5 min before transcardially perfusion with 4 % PFA in PBS for 3 min. Tumor samples were collected and processed as described above. Tissue sections (20 μm) were stained with rat monoclonal anti-mouse PECAM antibody (BD Pharmingen, San Jose, CA), followed by Alexa 555 goat anti-rat IgG (Invitrogen, Carlsbad, CA). Biotinylated lectin was visualized with Strepatavidin-Alexa 488 (Invitrogen, Carlsbad, CA). The images were obtained and processed as described above. Tumor perfusion was quantified by determining the percentage of PECAM-positive structures that co-localized with Alexa 488 signal, corresponding to lectin-perfused vessels.
Blood was allowed to clot during 45 min at 37 °C and then centrifuged during 10 min at 1000 × g. VEGF, VEGFR1 and VEGFR2 serum levels were measured by enzyme-linked immunosorbent assay (ELISA; R&D Systems), as described .
Using a SuperScript III FirstStrand Synthesis Supermix qRTPCR (Invitrogen, Carlsbad, CA), first-strand cDNA was synthesized from total RNA previously isolated with RNeasy Mini Kit (Qiagen, Valencia, CA) from skin tumors developed by WT and Dll4+/− mice (n = 10 tumors for each genotype). Real-time PCR analysis was performed as described using specific primers for β-actin, Dll4, Hey2, PDGF-β, EphrinB2 and Tie2. Gene expression levels were normalized to β-actin. Primer pair sequences are available upon request.
For the evaluation of combined effect of Dll4 allelic deletion and sorafenib administration, 8-week old WT and Dll4+/− male mice were separated in two equal sub-groups for each genotype (n = 4 for each of four experimental sub-groups) and skin tumorigenesis was induced and promoted as described above. Sorafenib was formulated twice a week at 4-fold (4×) concentration in a cremophor EL (Sigma, St. Louis, MO)/ethanol 50:50 solution. The oral solutions were prepared on the day of use by dilution to 1× with cremophor EL/ethanol/water mixture (12.5:12.5:75). Beginning 13 weeks after DMBA induction, a sub-group of WT and a sub-group of Dll4+/− mice was treated by oral gavage for 21 days with sorafenib (40 mg/kg/day) while the mice from the remaining WT and Dll4+/− sub-groups received only the vehicle (cremophor EL/ethanol/water 12.5:12.5:75 mixture). Prior and during the treatments, the weight of all mice and their skin tumors were measured once a week and at the experiment endpoint when the mice were sacrificed, tumors dissected and PECAM/α-SMA double immunostaining performed as described above.
The sample size determination was empiric, based on previous experience [11, 12] and the occurrence of DMBA/TPA-induced skin lesions in 100 % of CD1 WT mice. All measurements in the study were independently performed by two technicians who were blind to the group to which the experimental animals belonged. For each measurement, the average of values obtained by two technicians was taken as the measurement result. Data processing was carried out using the Statistical Package for the Social Sciences version 15.0 software (SPSS v. 15.0; Chicago, IL). Statistical analyses were performed using Mann–Whitney-Wilcoxon test. All results are presented as mean ± SEM. P-values <0.05 and <0.01 were considered significant (indicated in the figures with *) and highly significant (indicated with **), respectively.
To study the Dll4/Notch function in mouse skin tumors and evaluate the effect of its suppression, we monitored skin lesion formation and evolution in WT and Dll4+/− mice during 20 weeks. As presented in Fig. 1a, Dll4+/− mice started developing skin tumors as early as week 6 after DMBA-initiation and by week 10.5 of the study, 50 % of Dll4+/− mice developed at least one lesion (tumor latency). Tumor onset and latency were delayed in WT animals for 2 and 1 week, respectively. Regarding tumor multiplicity, increased number of lesions per mouse was observed in Dll4+/− mice compared to WT controls throughout the experiment, but without statistical significance. Importantly, we observed a higher frequency of larger tumors, significantly increased mean lesion volume and overall tumor burden (calculated as the sum of tumor volumes per mouse) in Dll4+/− relative to WT mice at the experiment endpoint; p < 0.05 (Fig. 1a and b). Body weight of WT and Dll4+/− mice did not change significantly at any time during the course of the study, suggesting a low level of systemic carcinogen toxicity.
Histological analysis revealed that the two experimental groups were uniform in terms of tumor histopathology, presenting similar rates of malignant tumor conversion (Table 1). DMBA alone can cause angiomatous lesions. However they were neither observed in WT nor in Dll4+/− mice. With the exception of a single squamous cell carcinoma (SSC), grade I, observed in each group, all remaining skin alterations were exophytic lesions classified as benign squamous papillomas displaying hyperkeratotic epidermal projections with foci of dyskeratosis and dysplasia, intact basement membrane and superficial dermal inflammation (Fig. 1c). Thus, reduced Dll4/Notch signaling does not necessarily prevent tumor growth. On the contrary, in this case, in the context of chemically-induced skin papillomas it did promote it. Dll4 allelic deletion reduced papilloma latency and promoted their multiplicity and growth, although without affecting malignant progression of these lesions.
To better understand the observed effect on tumor growth of reduced Dll4/Notch signaling, we examined the vascular morphology of the tumors derived from WT and Dll4+/− mice. As presented in Fig. 2a, the WT papillomas were found to be vascularized lesions characterized by irregular vessel formation. However, the WT tumor vasculature presented high degrees of vessel maturity (Fig. 2b) and functionality (Fig. 2c), as indicated by PECAM/α-SMA and PECAM/lectin colocalization, respectively. In comparison, Dll4+/− papillomas showed ~35 % increase in vessel density, measured as the PECAM– positive area per tumor stromal surface (p < 0.05, Fig. 2a), forming more disorganized endothelial networks with pronounced branching and thin interconnections (data not shown). In addition, α-SMA–positive cells lining PECAM–positive endothelium were significantly reduced (31 % reduction, p < 0.05, Fig. 2b), a sign of impaired vessel maturation. However, despite the reduced luminal diameters and impaired vessel wall assembly in Dll4+/− papillomas relative to the WT mouse lesions (data not shown), the fraction of lectin-perfused vessels, i.e. functional vessels, was not significantly altered (<10 %, Fig. 2c), which means the mutant mice had more functional tumor vessels in absolute terms, given the increased vessel density they displayed. Thus, the 50 % reduction of Dll4 function allowed competent neovessel formation and is likely to be responsible for the increase in papilloma growth. Our results initially appear contradictory to substantial data showing that the Dll4/Notch blockade inhibits functional angiogenesis, yet in this case a genetic modification that lowers Dll4 expression enhances productive angiogenesis. With regard to the number of vessels, however, the effects are comparable with the Dll4/Notch inhibition in invasive tumors, as Dll4 heterozygozity also increased vessel density in our experiments. The difference relates to the functionality of the newly-formed vessels.
We propose that the different effects of reduced Dll4 expression on vascular functionality in early vs. late tumors are determined by the background level of VEGF and VEGF/VEGFR signaling. Dll4 heterozygozity was expected to reduce Vegfr1 expression and increase Vegfr2 expression , which could account for the increase in angiogenesis and growth of the Dll4+/− tumors. We assessed the levels of expression by measurement of cleaved VEGFR1 and VEGFR2 in the serum collected at the end of the experiment, when the tumor bulk was maximal. We detected a marked and statistically significant increase in the serum VEGFR2/VEGFR1 ratio in the Dll4+/− mice (Fig. 3a), implying increased endothelial sensitivity to VEGF and enhanced VEGF signaling in Dll4+/− papillomas. We also investigated VEGF serum levels but found no difference in the two groups of animals. Nevertheless, with papilloma VEGFR2 immunostaining, we demonstrated, as expected, its highly significant increase in the vasculature of Dll4+/− vs. WT lesions (Fig. 3b).
In the context of VEGF levels, which are increased in papillomas, but not as much as in invasive tumors , normal Dll4/Notch signaling levels act as a suppressor of VEGF signaling and even a 50 % decrease can result in a change of VEGFR2/VEGFR1 ratio and marked increase in responsiveness to VEGF levels. However, in the context of very high levels of VEGF, Dll4/Notch signaling is likely to be essential to prevent excessive proliferation, aberrant vessel structure and leakiness. So in this case unrestrained VEGF function is detrimental to the functionality of the tumor vascular network. The effects of Angiopoietin-1 (Ang-1) and Angiopoietin-2 (Ang-2) interacting on the Tie2 receptor share some similarity with our findings. Antagonism of Ang-1 by Ang-2 dissociates perivascular cell coverage, and then in the absence of VEGF vessels regress, but in the presence of VEGF, endothelium becomes activated and vessels proliferate . The level of VEGF is critical for the effect of the antagonistic pathway. Similarly, Dll4/Notch blockade enhances EC activation and allows a large number of small vessels to grow, but against the background of very high VEGF levels in invasive tumors these fail to become productive while in the background of lower VEGF levels in benign/early lesions they become functional.
Although Dll4 haploinsufficiency was found to promote productive angiogenesis in this model, it did indeed negatively influence perivascular cell recruitment to the proliferating tumor capillaries. Thereby, we next used qRT-PCR to analyze WT and Dll4+/− papillomas for differential expression of genes known to be involved in EC/ vascular smooth muscle cell interactions (Fig. 3c). We observed that Dll4+/− tumors had ~2-fold lower Dll4 mRNA levels and down-regulated Hey2 expression in comparison to WT, confirming the Notch pathway suppression. Both the angiopoietin receptor Tie2 [29, 30] and EphrinB2 were downregulated upon Dll4 allelic deletion, which could account for impaired mural cell recruitment in the Dll4+/− papillomas. Since the observation of increased Pdgfr-β mRNA levels was counterintuitive, we performed PDGFR-β immunostaining. In contrast to the whole tumor PDGFR-β increase, we documented its down-regulation in Dll4+/− vessels, i.e. reduced PDGFR-β+ coverage of PECAM+ structures in Dll4+/− vs. WT mice (Fig. 3d), which is in accordance with reduced perivascular cell recruitment in mutant mouse papillomas.
Considering that Dll4 allele deletion changes the VEGFR function in papillomas, we finally examined the influence of Dll4 downregulation on the efficacy of sorafenib, an oral small-molecule-receptor tyrosine kinase inhibitor which targets include the VEGF receptors . Sorafenib acts either directly on the tumors by inhibiting Raf and Kit signaling, and/or indirectly by suppressing tumor angiogenesis through the inhibition of VEGFR and PDGFR signaling (BAY 43–9006, Nexavar), a dual-action inhibitor that targets RAF/MEK/ERK pathway in tumor cells and tyrosine kinases VEGFR/PDGFR in tumor vasculature). Beginning at week 13 after the DMBA-initiation, when all mice had developed at least one skin lesion and approached the exponential tumor-growth phase, we established 4 experimental groups: Dll4+/− treated and control, WT treated and control (Fig. 4a). Control animals received cremophor EL/ethanol/water 12.5:12.5:75 mixture, the sorafenib vehicle, and the treated received sorafenib at 40 mg/kg/day for 3 weeks. Comparing initial and final tumor volumes (Fig. 4b), we observed that vehicle-treated WT tumors showed a 2.1-fold volume increase over the period of 3 weeks while vehicle-treated Dll4+/− papillomas presented a more pronounced 2.6-fold volume expansion (p <0.05). On the other hand, sorafenib treatment effectively contained tumor growth in WT animals, causing an average regression of 56 % (p < 0.05) of tumor volume, after the 3 week administration period. In strike contrast, Dll4+/− skin lesions continued to progress despite the sorafenib treatment, although the drug application provided a marked tumor growth retardation compared to vehicle-treated Dll4+/− papillomas. Interestingly, vehicle treated WT and sorafenib-treated Dll4+/− mice presented very comparable tumor volumes at the treatment endpoint, indicating that 50 % Dll4/Notch inhibition virtually neutralized the effects of sorafenib.
Upon Dll4/Notch inhibition, the papillomas became more sensitive to VEGF due to increased VEGFR function and less responsive to therapeutic VEGFR inhibition. In comparison with sorafenib-treated WT mice, Dll4+/− mice treated with this drug presented increased papilloma vascular density, while combined Dll4 allele deletion and sorafenib application enhanced inappropriate perivascular cell recruitment (Fig. 4c). Decreased efficacy of tyrosine kinases inhibitors might also occur and be even more pronounced in invasive lesions with high VEGF levels. However, the effect on the efficacy of VEGF inhibitors is likely to change with the degree of Dll4/Notch inhibition. More pronounced Dll4/Notch suppression than that observed in Dll4+/− mice, might increase their efficacy since the abolishment of Dll4 function promotes unproductive vascular response while concomitant VEGF/VEGFR2 inhibition will reduce the rate of endothelial proliferation. Such an outcome was previously observed with combinational blockade of Dll4/Notch signaling, reducing vascular competence, and EphrinB2 signaling, reducing endothelial proliferation , presumably by interfering with the VEGFR trafficking .
The role of Dll4 differs in early and late tumor development. In early papillomas, lower levels of Dll4 increase vascularization through change in VEGFR2 levels and consequently enhance sensitivity to endogenous levels of VEGF. In large invasive cancers that produce greater concentrations of VEGF, downregulation of VEGFR2 by Dll4/Notch signaling is critical to maintain some degree of normal vascular function and organization, and therefore a loss of this buffering mechanism results in excessive vessel sprouting with overall loss of vascular function and tumor perfusion. These observations may be relevant to patients who go onto long term anti-Dll4 therapy, which may be used chronically as is anti-VEGF therapy.
This work was supported by the Portuguese Foundation for Science and Technology Project PTDC/CVT/115703/2009 to AD. DD and JG are PhD students supported by grants SFRH/BD/29447/2006 and SFRH/BD/73264/2010 from FCT. AT is a Postdoctoral Researcher supported by grant SFRH/BPD/47079/2008 from FCT. CIISA has provided support through Project UID/CVT/00276/2013, funded by FCT. ALH is funded by the Cancer Research UK and the Breast Cancer Research Foundation. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Conceived and designed the experiments: DD, AT, ALH, AD. Performed the experiments: DD, AT, JG, MP. Analyzed the data: DD, AT, AD. Wrote the paper: DD, AT, AD. All authors read and approved the final manuscript. | 2019-04-25T18:06:32Z | https://0-bmccancer-biomedcentral-com.brum.beds.ac.uk/articles/10.1186/s12885-015-1605-2 |
The first Great Nature deck only contained 12~16 Great Nature cards, because that's all the clan had. Your main grade 3 was Mr. Invincible, and your goal was to get Scientist Monkey Rue on your rearguard circles, using his counterblast to buff up and then kill the Silver Wolves and/or Intelli-Mouses behind him each turn. Normally that would cost a total 4 counterblast, but with Mr. Invincible and Dogu Mechanic letting you countercharge each turn, it was reduced to effectively CB1 for +4000 to a unit. In the Onslaught of Dragon Souls format, when anything over 16k was remarkable and most vanguards were 10k bases (and some were 9k) having consistent 20~22k rearguard lanes was something special. You could substitute one of the Scientist Monkeys for a Geograph Giant, get backup countercharging from Hungry Dumpty and Super Electromagnetic Lifeform Storm, and if the game dragged on long enough you might even use Invincible's megablast late-game to stand the whole field.
That day came thirteen months later for the Japanese format, when BT07: Rampage of the Beast King arrived on July 12th, 2012. Or for those of us playing with KeroKero Ace leaks on Cardfight Capital, May 25th.
Without further information the deck wasn't fully playable on these alone, as it was missing a fourth trigger type. Some fighters either proxied a draw (presuming a rainbow trigger set would be the only one possible) or mixed clans to fill out the deck.
Initial observations of the deck showed a pretty clear divide between Lox and Apt usage. Apt should have been the clan's go-to boss card, like the other Garmore clones of his day; prior to Spectral Duke hitting, Great Silver Wolf singlehandedly made Gold Paladin the beast it was in the English format. In a pre-Shamsiel world Kiriel was the core of the best Angel Feather decks, while Cocytus gave Granblue its first moment in the spotlight since the clan's inception. Tamamo, Battle Sister Cookie, and Raqiel would all go on to be fleeting darlings for their respective clans. So why did Apt specifically fall flat?
While this wasn't immediately obvious, Great Nature's own core abilities made the Garmore method obsolete. Like all Garmore clones Apt had a Charjgal equivalent that could boost him for a sum 11000 power, Feather Penguin. The problem being, there was no reason to run a base 6000 11k soulblast booster when you could achieve the same effect by throwing 4k on any of the clan's cornucopia of 7ks.
It was cheaper to do it, and it kept a cycle of on-retire draw effects going. So even if you were playing Apt in your deck, there wasn't much incentive to build specifically around his one named support card.
AUTO [Vanguard Circle]: [Choose one of your <<Great Natur>>" rear-guards, and retire it] When this unit 's attack hits a vanguard, you may pay the cost. If you do, choose up to one <<Great Nature>> from your hand, and call it to Rear-guard Circle.
Second, rather than a superior call for advantage like other Garmoes, his normal skill was instead supposed to be for Great Nature what Sword Magician Sarah was for Pale Moon. But Sarah had Purple Trapezist to work with to let her get an entire column to stand while Apt had to rely on stand triggers for the same effect. And because his retires took place in the battle phase rather than the end phase, none of the clan's on-retire skills would resolve. Where the card shined was in retiring units that were already consigned to die from receiving previous power buffs, replacing them Skydiver-style with new attackers.
Apt would turn out to be a passable backup grade 3 when BT07 launched, but was quickly outmoded by the time BT08 rolled around.
On the other end, you had Guardian of Truth Lox. This was a card many cardfighters mistook for an advantage engine, then became frustrated with when it turned out they weren't drawing all that many cards compared to Oracle Think Tank or even Gold Paladin. The Lox ride chain was part of the same second-generation wave of chains kicked off by EB02's Riviere then succeeded by BT06's Ergodiel, but it had more in common with the latter than the former.
To recap, the difference between Ergodiel and Riviere was that each individual step of riding a piece of the Ergodiel chain (Heavenly Injector --> Fate Healer Ergodiel --> Cosmo Healer Ergodiel) resulted in a net wash in terms of card advantage, putting two cards into the damage zone to bring two cards out. What this was supposed to do was play off of having Million Ray and Thousand Ray Pegasus columns in play beforehand, creating aggressive 24k-power rearguard lanes early in the game.
The problem was that it flopped if you didn't have the existing setup in your opening hand, whereas decks not built around these strategies could devote space to things like Gojo and Aermo clones for the purposes of fixing bad early hands. Meanwhile Riviere instead drew a card with every ride (Top Idol Riviere --> Super Idol Riviere --> Eternal Idol Riviere) resulting in a net +1 each turn instead of a neutral +0. In theory the rides from Ergodiel when executed well could take away far more cards from the opponent than you would gain from another ride chain, but in practice it was so dependent on getting specific cards in play early in the game that it rarely worked out to be better than Riviere or Vortimer's take.
On paper, Lox looked like he could give card advantage. With every ride (Bringer of Knowledge Lox --> Law Official Lox --> Guardian of Truth Lox) he would endow two rearguards with the ability to draw 1 when they were retired during the end phase of the turn. The problem with this is that by default, Great Nature's retire skills did not already draw to replace the units they retired; the units gained a 4k buff then died in the end phase with no immediate recouping of the lost cards. So these skills simply made those power gains a neutral exchange that could potentially cycle out bad cards, but were ultimately a wash. The only way to actually plus off of these retires in BT07 was with the Hammsuke series, and to maximize your chance of getting one in hand during the grade 1 and 2 turns you needed to run each of them at 4, when the ride chain was already taking up 4 slots per grade.
It was only with the release of Coiling Duckbill (a grade 1 that applies a Lox effect to any other rearguard) in BT08 that Lox could finally plus off of his retires without committing all of his slots, and by then there were other Great Nature decks doing it better and more consistently. Lox had a lot of issues preventing his spread--he needed a very specific setup to work well, he needed it early, and it had to come in the form of both units that could be targeted for advantage (Hammsuke) and units that could retire them to trigger the skills. (Binoculus and Monoculus) Moreover, by being a ride chain the deck necessitated losing a huge amount of space that could have gone to other utility cards like Hula Hoop Capybara or Flamingo.
What Lox did have going for him was his persona blast. This was not a limit break like the other Great Nature boss cards, but a BT05-style persona blast where you paid counterblast 2 in the main phase and discarded a copy of Guardian of Truth to give one unit +4000 power and +1 Critical. A Magnet Crocodile (generic 12k grade 3 attacker) given his persona blast and buffed by Binoculus Tiger could be terrifying provided you checked a stand trigger. 20k 2 crit rearguard attacking twice was far more intimidating than a 21k 2 crit center lane, because you had to account for both vanguard and rearguard attacks being capable of ending you in the same turn.
Stands in particular were recognized as better in Great Nature than in other clans from the moment we first saw Binoculus Tiger in mid-June. The deck lived and died by Binoculus' ability to give a Monkey Rue effect to a rearguard every time it attacked a vanguard. What this did was essentially make stand triggers into an early version of front triggers, giving 9k power instead of 5k. You would attack with Binoculus first and give 4k to your other attacker, then if you drive checked a stand with the vanguard you would stand Binoculus but give the power to the attacker. Binoculus would swing at the vanguard and not be able to hit, but could still give another 4k to pump that attacker up further. Stands also opened up plays like giving power to the vanguard on a two-to-pass battle and still getting 4k on a rearguard through Binoculus as a safeguard in the event a second trigger didn't come out, which was more often then not enough to bump up the final guard value. 6-8 stand quickly became common to the deck.
All this brings us to an issue in game design. Gold Paladin, for CB2 SB1 off of Garmore --> Dindrane in the same set would get a net +2 on-ride. Great Nature, for CB2 persona blast and CB1 Hammsuke search would get a net +0. Lox involved way too many unstable moving parts to justify his use, which was disappointing considering he was the cover card of the set. It was like BT02 and 04 all over again.
Lox was complicated and lacked a real payout to all of that searching, drawing, and persona blasting. He had a good finishing move, but none of the technical payoff his ride chain seemingly foreshadowed. Meanwhile Apt was very simple yet lacked synergy with the deck's rearguard support. There was a serious argument to be made for playing School Backpack Sealion instead. (Crimson Butterfly Brigitte clone, for you youngsters.) Where could Great Nature possibly go from here?
We knew of one last boss card from the moment the set's sleeves were revealed: School Hunter Leo-pald. The contemporary wave of Card of the Day profiles spent a lot of time reiterating the things we had already learned about in KeroKero Ace, mainly Apt, Lox, and the Hammsuke line. The real turning point was when the ongoing Asia Circuit anime finally revealed Leo-pald's limit break in late June.
On vanguard circle, it was a grade 3 continuation of Monoculus and Binoculus Tiger, buffing a rearguard by 4k on-attack and retiring it in the end phase. As for the limit break, when a unit was retired in the end phase, he could pay counterblast 1 to bring it back to the field.
This was nutty. One turn you could retire a Hammsuke, fetch a copy of it, bring the first one back, then the next turn get Binoculus and Leo-pald's skills going on both Hamms to grab the rest of the playset. Net +1 for CB2, and with Tick Tock Flamingo thrown on the Hammsuke it'd be as low as CB1.
Once BT08 hit--and we had access to Duckbill well before that, mind, as this was on CFC--you could draw 2 off of the Hammsuke on top of that, a net +3 for CB1. Leo-pald put the Great in Great Nature, and the only issue with the deck was the lack of a good alternate grade 3. Most cardfighters were running Magnet Crocodile, as it was a 16k by itself when buffed and could help out versus crossride decks, but there weren't great options for the vanguard circle itself. Lox cost too much counterblast and his persona blast was overly restrictive in a deck that needed the skill to get the retire and draw effects going, while Apt was just a vanilla 21~26k column. Whether that was really a step up from the Brigitte-and-Alfred days was uncertain, and a few cardfighters seriously ran Sealion with Leo-pald because of that.
Leo-pald did found a potential partner and competitor in BT08, in the form of Armed Instructor Bison. Bison had a similarly-timed end phase LB4 that countercharged 2 every time a rearguard was put into the drop zone. Essentially Bison was the Flamingo to Leo-pald's Duckbill, enabling the entire Hammsuke line. BT08 was also where we gained Compass Lion, the clan's 11k grade 2. While most 11k grade 2s in this era possessed Restraint, Lion instead required a rearguard to be retired in the end phase (compare and contrast Cannon Gear from Tachikaze.) Compass Lion was an invaluale asset, as he could be an effective backup for Binoculus.
This limit break was an incredible temptation, and a predecessor to Tri-stinger Dragon in BT09. You could use it in a more straightforward form, going CB4 to power up two rearguards for an aggressive offensive, then countercharging all of that damage in the end phase and ideally using replacement skills with Duckbill to gain card advantage. Or you could use it as a fuel for bigger costs, like the Bison decks that ran original Dragonic Overlord for his CB3 restand ability, making up for his loss of -2000 power by putting buffs onto his boosters.
Being a functional CB1 for a 14k rearguard that could clear out the opponent's front row units made Overlord a powerful niche choice over running Bison with Leo-pald early in the deck's life. With the coming of BT09: Clash of the Nights and Dragons Bison fully branched out into a separate deck build, using Vocal Chicken, Melodica Cat, and Recorder Dog in combination with Duckbills to simultaneously gain card advantage, maintain strong columns, and thin the deck of non-trigger units. To summarize it succintly, each card in the series searched for the next; so when the grade 3 Chicken was retired it would superior call the grade 2 Cat from the deck, and when the Cat was retired it would search the grade 1 Dog, after which it reset so that the Dog searched for the Chicken. Leo-pald could use these cards too and gain instant advantage off of them with no Duckbills required, retiring the units to superior call the next in line and then revive them. A single Melodica Cat over the course of two turns could be transformed into a Melodica Cat, two Recorder Dogs, and a Vocal Chicken, provided you had a Tiger or Lion to help get the party started.
AUTO [Vanguard Circle]: [Limit Break 4]: [Counterblast 2] When this unit attacks a vanguard, you may pay the cost. If you do, choose one of your other <<Great Nature>> rear-guards, Stand it, during this turn, it gets Power +4000, and during the end phase of hte turn, retire that unit.
In some respects Polaris was like an inversion of Lox. Rather than giving a unit crit and driving for a stand trigger to close the game, Polaris was giving the unit stand and driving for a crit. This conformed more to what we expected of conventional Vanguard play and trigger lineups, and Polaris as a whole was a lot easier to "get" as opposed to Bison's convoluted Vocal Chicken setups or Leo-pald's revival shenanigans.
So Great Nature had a plethora of play styles available in its first real year, a huge amount of support across three consecutive booster sets, and could break the boundary into competitive play if worked on seriously enough. Why didn't more people play it, then?
There was once a joke in the Vanguard fandom that we were interested in Rampage of the Beast King when we saw Lox, but we came to the set for Luquier, and then we stayed for Sarah. BT07 as a whole has a bad rep with the fanbase; part of that is marketing, part of it is design flaws, and part of it is the audience. Great Nature was far more cerebral and far less straightforward than something like Gold Paladin or even Neo Nectar, it was pushed as the next big thing without clearly explaining what made it good, and several of the deck types were just too difficult to pull off compared to the crossrides that were still dominating the game at the time. Bushiroad wasn't helping by providing very little direction with the decks and feature episodes.
Seriously, the decklists they provided were terrible.
Two Binoculus Tiger and one Compass Lion? Tank Mouse tech with four Monoculus? Two perfect guards?
Maybe the biggest issue with Great Nature early on was which cards were allocated where. If we had Duckbill in BT07 rather than Flamingo, Leo-pald would have had a much easier time topping against the meta monsters. If Compass Lion had been in there from the start, that would have alleviated the issues felt by Lox cardfighters that were running into situations where they could get their ride chain going but rarely had anything they could use to retire units with. Hammsuke/Ruler Chameleon as your primary advantage engine was a hard sell, and so was getting fighters to track down three copies of Binoculus Tiger at RRR rarity. Bison and Polaris diverisifed the clan signficantly, but prior to that Leo-pald was the only practical build due to the opening Lox ride having a rough 46% chance to go off.
The early days of Great Nature were a time when the clan was underused and underappreciated. It boasted some very unique design concepts and possible directions to build a deck in: if you wanted to rack up hand size you went with Leo-pald, if you wanted a flashy finisher you played Lox or Polaris, and if you wanted total resource manipulation you played Bison. In 2018 Great Nature will get a new lease on life, and it's hard to say who the "face" of the clan will be, because they had so many in their first go-around. Just remember--before there was Chatnoir, before there was Bigbelly and Arusha and Afanc, there were three weird little cards named Rue, Apt, and Lox. And they were neat as h*ck. | 2019-04-19T23:05:12Z | https://www.vanguardus.net/2018/03/throwback-thursday-biography-of-classic.html |
Leo - Japanese, about the quality of Ibanez, ie good, 1980- 88. Early 80's. Marketed by Fender (Leo Fender, get it?), endorsed for a while by Doug Dillard. Leo was made by Moridaira in Matsumoto. Leo Deluxe was especially fancy in the inlay department.
Lark In the Morning - I don't know what names they have put on these current instruments. Some appear to be Samicks, there is also one with an eagle head inlaid in marquetry into the maple resonator that seem more BC Cho like.
Maestro - MaestroTone 250. - Korean from MusicYo.com in 2002 - 2003. Music Yo is a division of Gibson(!) The price and information on the MusicYo site were enticing; the price was $350-400 or so, did not include a case and shipping. After being out of stock since about April 2003, they are now again listed.
Wayne Norman and I corresponded about this banjo a while back, and he sent an email to the sellers asking specific and informed questions about the details. They never answered him. So even though there is a 90 day money back policy shown, it does imply that if you buy one, there will be very little after the sale service, if they could not be bothered to reply to an inquiry before the sale.
Maple w/ sunburst finish, H&F, rosewood fingerboard, one piece flange, brass tone ring, planetary pegs w/ geared 5th (Ping brand?), clamshell tailpiece, white plastic inlays. The wood parts look similar to Korean Epiphone,, also a Gibson offering.
If it is as described and reasonable quality, which is possible given what it costs to actually build a banjo over there, it could be a super deal. My guess that the current spate of banjos with brass tone rings (Morgan Monroe comes to mind, also one of the Gold Tones) is because someone has realized you can use spent ammunition casings to cast them, just like all the statuary and horns and such that are sold inexpensively by the roadside here. There is a lot of that brass lying around on the ground in Asia, and the kids are probably commissioned to bring it in to the village for collection. I would presume the steel parts of the primers are included in the mix, the powder residue will probably cook out. It is not going to be a controlled bell bronze foundry casting by any means.
1-16-03: Detailed pictures http://www.mit.bme.hu/~markus/banjo, courtesy of of Budapest, Hungary. One of the 2 instruments rated at banjohangout.org was poorly set up when received.
Janos has had his apart, and wrote that it is an 8 or 9 ply light colored pot...likely beech but not mahogany as described on the seller's website. The wood under the tone ring is lightly finished, ie not to a gloss, so there will be good contact there. I'm still learning about the tone ring fit, it is loose, clear of the pot by up to 1.5 mm in some places. I don't know if this on purpose. Tone ring weight is 3# 7oz (1.560 kg).
He closed his email with "BTW, I really enjoy playing it..."
Morgan Monroe - Korean, current, named for a state forest in Indiana. MNB-2 with tone ring is described at over 11 lbs., tube & flange construction, flamed maple resonator, nickel chromium plating with engraved arm rest, 24 brackets, eagle claw tailpiece, three piece laminated maple neck with rosewood fretboard and wreath derived inlay with the wreath on the headstock reversed, plus some other changes. MNB-1 (Rocky Top) has a rolled brass tone ring, probably like an RB-100. Headstock pattern is like the BMI/ BC Cho (Wave) banjos I have seen, though an eBay seller of these new said it was probably Samick. I suspect they all pass parts around anyway.
December 2003: Caveat. There seem to be considerable quality control problems at this writing, and a significant number of instruments have arrived at dealers with flaws. While the distributor has a reputation of making good on these things, not all dealers will go to the hassle of getting things fixed. Examine the instrument carefully.
Morgan Monroe in mid 2004 has introduced a much fancier series with very intricate inlay and such at very attractive pricing. I have not had a chance to examine one first hand.
Wayne Norman (originator of this basic list) has purchased a Morgan Monroe archtop. Here is his assessment.
Morgan-Monroe MRHB-1 Arch Top tone ring, Rocky Top BG Series.
This and the Gold Tone AT-250 are, I believe, the only production arch tops currently available. Several other makers do offer an AT as an option. The custom made Stanleytone comes with arch top standard.
Overall, the fit, finish and hardware quality is very high. I found no finish blemishes, no pits on the metal parts and excellent workmanship. Marked "Made in Korea."
Design is very similar to a Gibson RB-5 Wreath, except that the sunburst finish goes from black to reddish yellow. Neck, resonator and block rim are maple.
Peghead: reminiscent of the old Fairbanks/Vega Whyte Layde #2. Real pearl and abalone inlay. No inlay voids visible. Ebony fretboard. Inlays are not real pearl, rather some similar man-made material. It does not have the sparkle of real pearl. But it looks very good with extremely tight inlay work. There is no inlay at the 15th fret, (this is where the Gibson Mastertone block would have been). Fretwork and binding are first-rate.
Hardware: planetary pegs which seem to be a bit better than the usual Asian pegs. Pot hardware is basically clone of Gibson, with a clamshell tailpiece and a two-leg arm rest, which, alone, is engraved (read: stamped-in design). Brass arch top tone ring has 40 holes. All metal is chrome plated, and very good quality. The tension hoop and one-piece flange are true old Gibson style: die-cast pot metal.
Neck profile is standard Gibson. Two-way truss installed. Double co-rods that allow some up and down placement of the heel, due to over-sized holes in the rim. The action was ideal.
The head was installed extremely tight and sounded horrible. So I went about to change the Remo top frosted head (I don't like them). The four resonator thumb screws were too tight for hand loosening, but have a convenient Phillips cut in the top. First, there were little lock washers under the tension nuts. I tighten strictly by feel, so this was a no-no, and I removed them. The resonator screws were misaligned and sticking because of the position of the resonator wall lugs. A little adjustment and that was fixed. But the screws had bad threads.
Turns out that the tone ring was sitting above the top of the rim by about 1/64" all around, meaning that the bottom edge of the skirt was holding it up. Not suitable at all for good tone. The area of the rim where a tone ring rests should be raw unfinished. This rim had full stain and finish all over. So I put a sheet of sandpaper on the table saw and gently turned the rim and removed the finish down to the raw wood. Likewise, I removed the finish on the skirt area and removed stock so that the bottom of the ring rested firmly on the top of the wood rim. There was excessive side play between the skirt and rim, so I glued in a strip of 1mm Finnish birch veneer and that made a nice slightly snug fit.
I re-assembled the pot and installed a Sullivan FQ head (Ludwig). My usual practice is to set the head up very tight and leave it for about a week to stretch out. Then I loosen it down to a dull thud and gradually come back up to a good tone. At a certain tension the tone popped in and it came alive. I mean alive. This banjo now has everything tone-wise. Move over Stanleytone.
The clamshell tailpiece cover did not snap all the way closed, so I got in touch with the dealer, who gave the name and number of customer service at Morgan-Monroe. I told her about the resonator screws and tailpiece. I had new parts two days later.
This turned out to be an outstanding banjo, both tone and esthetics. But if I did not have the capability to correct those rim problems, it would not have been so. I love it and it has a good feel to it (a good banjo is like a good woman).
Morris - Japanese - Peg head is traditional Gibson style, "Morris" inlaid at slight angle between second and third tuners, bell shaped truss rod cover with "Standard" etched in it, head inlays are a gold colored, possibly from lacquer aging. Quite good planetary tuners with pearloid buttons, geared fifth. Nickel plate. Nice but simple mother of pearl inlays at 1,3,5,7,10,12,15,17,19 and 22 with bow tie type from 10 onward. Bound rosewood fingerboard with small fret wire, clamshell tail piece with Morris inscribed. 2 foot pressed arm rest and flat head tone ring. Gibson style one piece flange, probably zinc, also Gibson style flange brackets, 4 resonator screws. 14" resonator on the banjo examined is probably non original (Korean).
Nashville - Gibson copy, mid 70's (one bought new in '78) ebony board, multi ply rim, 2 piece flange flathead.
Orpheum - like an early 70's Ventura or Alvarez, but with the early 70's Tokai (Japan) Blue Bell pot with the Mastertone style tone ring balanced on a round brass ring, up inside the flathead ring, sitting on top of a wooden mound also inside of the ring. Very bright sound, nice banjo. Definitely not a W. F. Lange (Paramount USA, 1920-35) product.
Ozark BJ600 - Seen on an English vendor's site, Korean, maple, wreath inlay, 3.5 lbs claimed for the tone ring which indicates it is probably (shell case?) brass, chrome (?), 14" reso, eagle claw tailpiece, stamped engraving on armrest.
Pedro Martinez - Japanese, available (at least) in Italy in the early 80's, manufactured by Iida. 2 -3 quality models, see below.
RB 115 - the most widespread sold model including the entry level ones, neck wood is Lauan mahogany, polyurethane-sealed without any final transparent top coat on the walnut-stained polyurethane finish (as on many Japanese instruments of that period, playing wear would show the sealer). Fiddle-shaped headstock cut perpendicular to itself, not to the neck plane, with an "abalonoid" fleur-de-lis inlaid in black face, unbound peghead. Plywood fingerboard (!) with thin ebony overlay less than 2 mm thick and white binding. Slotted diamond, real pearl inlays, functional truss rod. 6-ply (standard 11' dia., 3/4" thick) rim with Lauan mahogany outer wrap to match the neck and resonator (weird). Single turnbuckle-type coordinator rod, with anchored lag bolt (quickly prone to strip, because the anchoring bolt is a wimpy wood screw). Close-to-Mastertone specs aluminum flathead tone ring, 24 brackets, shoes-and-flange, Gibson-style flange holes, half-thickness notched tension hoop, Waverly tailpiece, standard type Luan mahogany resonator (3-lug like 60's Gibsons) with white binding on top and bottom (no purfling rings on back), all hardware chrome plated, very good quality stock bridge, thin-frost no-name head, offset gear 3:1 pegs, mounted from the rear with peghead bushings, friction 5th.
Comments from the owner, a luthier/ musician in Milano, Italia: "The instrument was good-sounding from the start, although with the well known echoey 'aluminum wolf-tone', and all one would ever ask for could be a bit more 'body' and authentic 'ring', because playability was superb, tone production was ready and responsive, and with a meticulous setup it was credible as a banjo can be."
RB 110 - identical but for the maple construction with honey-gold finish (plus two strap mounting rings bolted to the rim) and limited availability.
A rare unidentified model with black plastic rim, (Wow!) pot metal tone ring, tube & plate flange, hexagon abalonoid inlays, geared 5th peg and a 4-lug resonator. To clarify, the pot is like a conventional Gibson one, but rather than being maple or birch is a solid plastic part, possibly Bakelite or ebonite (a time honored woodwind instrument material), with a steel or pot metal Mastertone style tone ring on top and a tube and plate. There is a photo of this banjo at the site of the Italian string band Beans Bacon and Gravy. This is a very big picture and a long download and you can't really see the details of the plastic; looks like the black of an RB250 rim. I don't quite know where to classify this one, I'll put it here because of the tone ring and tube and plate. Quality of the plastic and sound produced is unspecified by my source so far.
Penco - Japanese Masterclone, late 70's (?) Seen at a fest in the southern tier of New York, I believe the name stands for Pennsylvania Company. There were guitars too.
Saga - Saga brought in nice banjos under their own name about 1979/ 80. Top quality parts on Bella Voce and Style I except for the pot, which seems to be the weakest link. It seems to be the German made multi ply one and the tone ring fit on mine is not the best. The multi ply rims are not necessarily bad per se, I've had good and bad ones. For that matter, I've encountered dud 3 ply rims... I expect to build a prewar clone featherweight 4 ply rock maple pot with a dowelled and ledged lip for my Bella Voce and to fit a 70's NOS 4.4# Iida archtop ring (also over-height and chrome!) and a brass (chromed) Bucks County tension hoop to it. I have very high expectations for this setup, tone-wise... it likely will have some volume too... I love a great archtop.
Saga Banjos were not a stencil brand, identical to other contemporary brands such as Ibanez or Fender except for the inlay pattern. The Sagas were made in a small contracted shop that only produced Saga Banjos, and probably the few high end Brazos.
Bella Voce inlay banjos in striped mahogany, over-height lightweight 2.25# bell brass flathead tone ring (NOT interchangeable with any form of Gibson spec ring), multiply pot, 2 piece steel flange, offered in parallel with the Gold Star flatheads, a thin (resonant) Paramount like resonator, wbw binding and concentric rings on resonator, Gotoh planetary tuners, brass eagle claw tailpiece, chrome, slightly arched fingerboard on a fairly full neck, pot metal tension hoop.
The "Special Florentine" model has been seen in a December 2007 eBay sale. Apparently the same as the Bella Voce except for the inlay pattern. See the Saga price list from 1979, in which the Special Florentine listed for $16 more than the Bella Voce.
Style I - same as BV except for 70's style RB-250 inlay. A long time player and former Gold Star agent describes his as having a sweet tone, still with highs.
Style II - Die cast tone ring, mahogany, bow tie inlays, more modest tuners.
They also had parts for sale at attractive prices. For example, there were various necks which were available unfinished.
Saga is a BIG player in the musical instrument game, supplies very nice guitars under the Blueridge name, and mandolins under the Kentucky name. They imported the first Chinese made fiddles/violins to the USA, now a common thing. They also have a very attractive SKB like molded case for banjos, and at the moment have left handed ones..... this is likely a production error, so get them while you can. See also info under Gold Star.
Samick - One of the major Korean builders, will put any name on, etc. Actually the source of Epiphone, Washburn, Aria, and many more. Daewoo is the other major Korean parts supplier.
Sho-Bud - Model RB250, from the Nashville steel guitar house of Shot Jackson, this was a 70's model RB250 copy with slightly different inlay on the 12th and two inlays missing at the base of the fingerboard, the last ornate one and the Mastertone block and with the addition of 2 earlier RB250 style concentric rings in the resonator. From the pictures sent me by a original (March 76) and very satisfied owner it appears to be similar to an Ibanez: tube and plate, two coordinator rods, 11 ply rim (like then current Gibsons) planetary tuners and an eagle claw tailpiece, and the finish and chrome plating (not nickel) is still superb after 25 years. The condition of the chrome is a pretty good argument in favor of chrome instead of nickel, echoing the sentiments of Greg Deering of Deering Banjos. Chrome is less susceptible to oxidation, tarnish, etc. The traditional use of nickel is probably due to it being less expensive than chrome, chrome is an extra layer on top of nickel plating. The case is the usual Japanese one of the period with the bumper rail around it, on this one the covering is black faux leather instead of the usual brown: the interior is still the expected bright yellow plush.
The banjo is heavier than a Gibson of the period, which implies to me a bronze tone ring. The owner has not had it apart since 1976 (!). I bought a '74 RB250 new and the bronze ring in it was light, at 2 lb. 8 oz. If there was typical die cast pot metal ring in the Sho-Bud, that ring (and the banjo) would be even lighter, typically at 1 lb. 12 oz. The guys at Sho-Bud knew how to build instruments and could have bought good tone rings in the USA like the Liberty or the Ryan to be put into the instruments, just like you can get JLS rings in Gold Tone today. If someone knows the origin of the tone ring or has any other info on this banjo, please contact the owner, Jeff Kirby at .
Because this is a particularly clean example of a rare brand, and demonstrates the very high quality available in a Japanese banjo, I include a close up *.jpg of the Sho-Bud pot assembly and the banjo in the case.
Also seen on eBay in an earlier version, in the transition when the Japanese were still learning it had to look just like Gibson to sell. This one had the earlier block tuners and a cast flange with ovaloid holes like early Alvarez. Tone ring quality unknown.
Sonata - Seen gold plated, dark-stained flamed maple, clear head, clamshell tailpiece and carved heel and back of peghead, similar to Korean Washburn B-17.. The inlay design on the peghead is almost identical to that on the Washburn B-17. This one was circa 1995.
Taka - Model G-180, early 70's RB250 copy.
Tokai - (revised) Many different banjos, Tokai built the early Gold Stars through '81, but also build a wide range of instruments including many of lesser quality. In other words, if it is a Tokai it may be of Gold Star quality and construction.....and IT MAY NOT BE HIGH QUALITY or even have a Mastertone style tone ring. They had a similar serial number system and labeling to Saga/ Gold Star. The Gold Stars had all the best choice of parts, this is not always true with the Tokai's for the home market. The fine GF100's were the Tokai T1200R in the home market. Caveat emptor.
Tyler Mountain - Current, Korean. TM5-80. Two piece flange, yellow to red to black sunburst reso, chrome, flathead, mahogany (?), Reno-ish peghead inlays, blocky (boring) ones on fingerboard.
Univox - Japanese, 1971-72 at least. This is from the company that makes Guitar amps, etc., under the same name. Similar to Alvarez, Ventura with the same peghead shape, blocky cast housing tuners, ovaloid shape holes in the flange, bow tie inlay, Waverly style tailpiece, but a different pearl pattern on the rim of the resonator. There is also the possibility of a Deluxe model, with ornate neck and resonator, but the one seen may have been an upgraded instrument. Also seen with a flange with Gibson shape holes, and stamped/ engraved armrest: this one is would likely be a few years later.
Vega - (Japanese?) I have seen one recently that looks to be made about mid 80's. Shoes bolted through a wood pot with a faux White Layde band under them, Tubaphone tone ring. Orange reddish mahogany, white trim, three piece neck, dots on the fingerboard, small Fairbanks type headstock, Vega in pearl, thin sidewall bookmatched resonator, 70's (not 1920's style) Waverly tailpiece, Saga planetary tuners with large pearloid buttons. Fairly bright tone, but I did not get to thoroughly set it up. It seems to be an unknown chapter in the long history of the Vega name. Looks to be built later than the ones below, not quite as high quality hardware and wood.
Vega - (Korean?) The company that bought the name from Martin was Korean, but the banjos were probably built in Japan.
A very few, post Martin, pre Deering, when the name was bought out from under Greg Deering in about the late 70's. I saw one about 1980; nice banjos, reddish mahogany, pie (8?) section resonator, white binding with thin black and white on the edge. It was a clear head, and may have had a Tubaplone tone ring. I don't think it was Mastertone style ring.
From the same period, a fancy vine/ tree of life inlay in the ebony fingerboard and peghead, model VV24, s/n 2016 with MOP decorated segmented resonator, Mastertone style ring, clear Remo head, Vega on the peghead. It is a high quality instrument, described as a "visual knockout."
More recent ('90's ?) are Korean Vegas which are Gibson style 2 piece flange and zinc FH tone ring just like the Epiphone MB250 with Vega inlays and peghead shape. There is a model with carved heel (like Washburn?) and a knockoff of the wreath inlay also, garish sunburst (black to red to yellowish), 2 pc flange, chrome, 2 rings on the resonator.
Ventura - see Alvarez 4282 above.
Washburn (Korean) - B16, current, seems to be similar to Samick. Reno inlay, eagle claw tailpiece, chrome (?), flamed maple. B17, current, has a 5 piece carved neck, Samick headstock shape, complex and unique inlay, eagle claw tailpiece, carved, flamed maple gold plated instrument. B-19 is a 3 piece maple neck with a dark center strip, stained very dark brown, heavily carved heel and back of the peghead, simplified wreath inlay pattern with Samick shape headstock. Neck (only) seen on eBay, cut for 2 piece flange.
Wave - Current Korean banjos, combination products, from B. C. Cho Inc. somewhere in Korea. I set one up for them in their booth at NAMM LA 2000. They took lots of notes, lots of chattering in Korean.. Fun time for all..
Wilson - like early 70's Alvarez No. 4282, made for another distributor. Mahogany, marquetry on edge of rosewood veneer resonator, filigree diamond pearl inlay on back, bow tie, block tuners, chunky early head shape. | 2019-04-21T12:14:46Z | http://hawthorne.fastie.com/asianbanjos/lz.php |
A genome-wide association study (GWAS) is the foremost strategy used for finding genes that control human diseases and agriculturally important traits, but it often reports false positives. In contrast, its complementary method, linkage analysis, provides direct genetic confirmation, but with limited resolution. A joint approach, using multiple linkage populations, dramatically improves resolution and statistical power. For example, this approach has been used to confirm that many complex traits, such as flowering time controlling adaptation in maize, are controlled by multiple genes with small effects. In addition, genotyping by sequencing (GBS) at low coverage not only produces genotyping errors, but also results in large datasets, making the use of high-throughput sequencing technologies computationally inefficient or unfeasible.
In this study, we converted raw SNPs into effective recombination bins. The reduced bins not only retain the original information, but also correct sequencing errors from low-coverage genomic sequencing. To further increase the statistical power and resolution, we merged a new temperate maize nested association mapping (NAM) population derived in China (CN-NAM) with the existing maize NAM population developed in the US (US-NAM). Together, the two populations contain 36 families and 7,000 recombinant inbred lines (RILs). One million SNPs were generated for all the RILs with GBS at low coverage. We developed high-quality recombination maps for each NAM population to correct genotyping errors and improve the computational efficiency of the joint linkage analysis. The original one million SNPs were reduced to 4,932 and 5,296 recombination bins with average interval distances of 0.34 cM and 0.28 cM for CN-NAM and US-NAM, respectively. The quantitative trait locus (QTL) mapping for flowering time (days to tasseling) indicated that the high-density, recombination bin map improved resolution of QTL mapping by 50 % compared with that using a medium-density map. We also demonstrated that combining the CN-NAM and US-NAM populations improves the power to detect QTL by 50 % compared to single NAM population mapping. Among the QTLs mapped by joint usage of the US-NAM and CN-NAM maps, 25 % of the QTLs overlapped with known flowering-time genes in maize.
This study provides directions and resources for the research community, especially maize researchers, for future studies using the recombination bin strategy for joint linkage analysis. Available resources include efficient usage of low-coverage genomic sequencing, detailed positions for genes controlling maize flowering, and recombination bin maps and flowering- time data for both CN and US NAMs. Maize researchers even have the opportunity to grow both CN and US NAM populations to study the traits of their interest, as the seeds of both NAM populations are available from the seed repository in China and the US.
Maize exhibits extremely high levels of genetic diversity and phenotypic variation [1, 2]. Numerous single nucleotide polymorphisms (SNPs), small insertions-deletions, and large structural variations substantially contribute to this genetic diversity [3–5]. Abundant genetic variation gives rise to great challenges for uncovering the genetic basis of quantitative phenotypic variation.
Studies undertaken to understand the genetic architecture of complex traits and their variations in maize have generally been performed by linkage analysis and/or association mapping . Linkage analysis based on a bi-parental population only detects two alleles and has poor mapping resolution. A genome-wide association study (GWAS) often identifies spurious associations due to population structure and genetic relatedness . Joint linkage analysis, using multiple segregating populations, could overcome some of the inherent limitations associated with single population linkage analysis and genome-wide association mapping .
To provide an effective genomic resource for joint linkage analysis in maize, US researchers created a nested association mapping (NAM) population. About 5,000 recombinant inbred lines (RILs) were created by crossing 25 diverse inbred lines with a common parent, B73 . US-NAM has been effectively used with genetic, genomic, and systems biology tools to dissect the genetic architecture of agronomic traits in maize [9–16]. In addition, analyses with US-NAM have been quite accurate at surveying the magnitude of effects across diverse germplasm .
One shortcoming of US-NAM, however, is its limited number of founder lines; a NAM population becomes more effective for GWAS when the allele is found in three or more founders . Additionally, because only one reference line was used in US-NAM, the genetic and phenotypic biases introduced into the population are unknown.
To further improve our understanding of the genetic architecture of maize and improve the resolution of quantitative trait loci (QTLs), Chinese researchers independently developed a new NAM population (CN-NAM). About 2,000 RILs were created by crossing 11 diverse elite inbred lines with a common parent HUANGZAOSI (HZS). Parents of the CN-NAM population were selected from different heterotic groups that are widely used in Chinese maize breeding . Combining the CN-NAM and US-NAM populations can provide a larger genomic resource for dissecting the genetic architecture of complex traits in maize. Furthermore, combining populations can enable higher power and higher resolution in genetic mapping through joint linkage analysis.
Despite the availability of this new mapping method and the larger mapping population, marker density remains an important limiting factor for identifying genes controlling quantitative traits. This limitation is especially pronounced for fine mapping of QTLs. New sequencing technologies have facilitated cost-effective high-throughput SNP genotyping for natural and artificial mapping populations. Genotyping by sequencing (GBS), using methylation-sensitive restriction enzymes to reduce genome complexity while retaining good genome coverage of lower copy regions, has proven to be a highly efficient method in different species [20–25]. Yet, GBS-obtained data could be as large as millions of SNPs, a density that makes the construction of a composite genetic map almost impossible and negates the potential benefits of conducting joint linkage analysis in NAM populations.
One strategy to address this issue is to construct a recombination bin map by identifying exact recombination breakpoints and dividing the chromosomal regions into small recombination bins. These small recombination bins can be regarded as an effective type of genetic marker . This construction method of sequencing-based high-density genetic maps could substantially reduce the amount of time and effort required for QTL mapping. For example, this method has been used for constructing bin maps of single bi-parental populations and QTL mapping of complex agricultural traits in rice and sorghum [27–29]. Therefore, we expected that recombination bin maps would have the potential to improve the statistical power of joint linkage analysis and reduce the computing time of QTL mapping in NAM populations.
The objectives of this study were the following: (1) to construct high-resolution recombination bin maps of both the US-NAM and CN-NAM populations based on GBS data; (2) to evaluate the quality and accuracy of bin maps by joint linkage analysis of a flowering-related trait, days to tasseling; and (3) to conduct a combined analysis of different NAM populations.
All RILs of the 36 families that comprised the two NAM populations were sequenced with GBS, resulting in a total of one (0.95) million SNPs. After removing monomorphic and MAF < 0.05 SNPs across all families from the raw GBS data, 238,945 and 294,962 SNPs were obtained for CN-NAM with 11 families and US-NAM with 25 families, respectively. Based on these SNPs, we identified outlier lines of two NAM populations. After removing the outliers, we obtained 1,696 and 4,623 high-quality RILs in the CN-NAM and US-NAM populations, respectively. We used these data for the following analyses.
After removing low-quality SNPs, the number of high-quality SNPs ranged from 39,620 for the HUANGYESI3 family in CN-NAM to 109,104 for the CML228 family in US-NAM, with the corresponding mean SNP density ranging from about 1 SNP/63.1 kb to 1 SNP/22.9 kb, respectively. These SNPs were used to infer parental genotypes, and detect recombination breakpoints for all available RILs, as indicated by Fig. 1. The total number of breakpoints per individual family ranged from 3,552 for 160 RILs in the HUANGYESI3 family to 6,695 for 179 RILs in the CML228 family. The average number of breakpoints per individual RIL in each family ranged from 22.2 to 37.4 (Additional file 1: Table S1). After recombination breakpoint locations were determined, the genotype of each RIL was assigned.
Bin maps were constructed for each family based on the identity with the parental genotypes. The number of recombination bins varied substantially among the 36 families. The total bin number per individual family ranged from 734 to 2,183. More than 50 % of the bins were less than 1,000 kb in physical length for all families in both CN-NAM and US-NAM (Fig. 2). The median physical length of bins within an individual family ranged from 402 kb for the Tzi8 family (US-NAM) to 852 kb for the HUANGYESI3 family (CN-NAM). Detailed bin information for the 36 families is provided in Additional file 2: Table S2.
Genetic linkage maps were constructed for each family using bin genotypes. The genetic length of individual family maps ranged from 1,178.58 cM for the HUANGYESI3 family to 2,035.58 cM for the CML228 family. The average genetic distance between adjacent bins ranged from 0.77 cM for the CML333 family to 1.61 cM for the HUANGYESI3 family.
Joint recombination bin maps were constructed using 5,435 and 5,692 bins (without missing data) from CN-NAM and US-NAM, respectively (Additional file 3: Figure S1). The physical length of the bins ranged from 5.0 kb to 5.6 Mb (with an average of 378 kb) and from 5.0 kb to 9.2 Mb (with an average of 327 kb) in CN-NAM and US-NAM, respectively. In total, 92 % of bins were less than 1 Mb in length in CN-NAM compared to 94 % in US-NAM. Subsequently, of the 5,435 CN-NAM bins, 2,706 with no segregation distortion were used to construct an initial framework genetic map. The remaining markers (bins) with segregation distortion were added to the framework map, and we ensured that no marker order or chromosome position conflicts were introduced. Finally, a total of 4,932 bins were selected to construct a composite genetic map of CN-NAM, resulting in a genetic distance of 1,700.44 cM in length, with an average genetic distance of about 0.34 cM between adjacent bins. Likewise, of the 5,692 US-NAM bins, 2,278 with no segregation distortion were used to construct a framework map. Eventually, 5,296 bins were selected for the composite genetic map of US-NAM, yielding a 1,456.68-cM genetic length, with an average genetic distance of about 0.28 cM between adjacent bins (Additional file 4: Table S3).
The quality and accuracy of these maps for QTL mapping were evaluated by locating the known flowering-time genes for days to tasseling (DT). Detailed results can be found in Additional file 5: Table S4 and Additional file 6: Table S5.
DT, one of the most obvious measures of reproductive growth in maize, is thought to involve male and female flowering-related genes . The broad-sense heritability for DT was 0.90 in CN-NAM and 0.89 in US-NAM. Therefore, we checked for the presence of known genes involved in the regulatory pathway of flowering time within the interval of DT-related QTLs in different genetic backgrounds (Additional file 7: Figure S2). For example, ZMM4, a maize MADS-box gene in the FUL1 family, promotes floral transition and inflorescence development in maize . In this study, four QTLs detected under different genetic backgrounds overlapped the ZMM4 gene, with a likelihood of odd (LOD) score ranging from 3 to 13, and explained 6.9 % to 34.9 % of the phenotypic variation. One of four QTLs had its LOD peak in bin 0231 in the M37W family, which encompassed a region of 780 kb in length and completely contained the ZMM4 locus. Within the limits of single-family mapping resolution, the ZMM4 overlapping DT QTLs found in different families is evidence that the individual family bin strategy can produce maps with high quality and accuracy.
Further evidence came from mapping the ZCN8 gene. The flowering time ZCN8 may function as the florigen and integrates signals from both photoperiod and autonomous pathways in maize . We identified QTLs overlapping the ZCN8 region in four families. Among the four QTLs, the largest effect was detected in the HUANGYESI3 family, explaining 37 % of the phenotypic variation. Within the QI319 family, two major QTLs were detected on chromosomes 8 and 10 and completely overlapped the cloned ZCN8 and ZmCCT genes (Additional file 7: Figure S2).
For QTL mapping of single NAM populations, a total of 18 and 29 QTLs were detected for DT in CN-NAM and US-NAM, respectively (Additional file 6: Table S5). About 46 % and 32 % of the DT-related QTL alleles had a significant effect at P < 0.05 for CN-NAM and US-NAM, respectively (Fig. 3); however, only 6.5 % (CN-NAM) and 1.7 % (US-NAM) had an additive effect on DT of about 1 day. About 17 % of the DT-related QTLs in CN-NAM and 28 % in US-NAM completely overlapped with the physical position of cloned genes controlling maize flowering time (Fig. 4a). Two well-studied maize flowering-time genes, ZCN8 and ZmCCT, were located in QTL regions for both NAM populations.
A composite genetic map for the combined CN-US NAM population was constructed based on 6,238 recombination bins, with a genetic length of 1,455.48 cM and an average genetic distance of about 0.23 cM between adjacent bins (Additional file 8: Table S6). When QTL mapping was conducted for DT in the CN-US NAM population, 37 QTLs were detected, which was significantly more than the total QTL number identified in a single NAM population (Fig. 4a). A comparative analysis revealed that six QTLs were shared among all three populations (US-NAM, CN-NAM, and CN-US NAM). Seventeen QTLs were shared between CN-US NAM and US-NAM, and 11 QTLs were shared between CN-US NAM and CN-NAM (Fig. 4b). Eight of 15 unique QTLs in CN-US NAM could be found in the single-family QTL mapping for both NAM populations (Additional file 5: Table S4).
The average QTL confidence intervals (CI) were 10.5 Mb and 9.3 Mb in CN-NAM and US-NAM, respectively. The average CI in CN-US NAM was 5.3 Mb; thus, combining populations improved the resolution by about 50 %. The QTL with the largest effect on DT had its LOD peak in the region that ranged from 123.810 Mb to 124.356 Mb on chromosome 8, while a gene ZCN8 was about 300 kb apart from the peak. The QTL with the second largest effect on DT had its LOD peak on chromosome 10, between 94.588 Mb and 94.964 Mb, while a strong candidate gene ZmCCT was about 340 kb apart from the peak. Therefore, joint analysis for the combined CN-US NAM population was effective and valuable for quantitative trait mapping.
The US-NAM population has been phenotyped for days to anthesis (DA) and days to silking (DS) in six environments in the US, and a medium-density composite genetic map was constructed using 1,106 SNPs . Using the high-density composite genetic map of 5,296 bins, we reanalyzed DA and DS using the same phenotype data and mapping method. The number of QTLs and the total phenotypic variation explained by all QTLs were consistent with the results obtained using the medium-density map (Fig. 5). However, with the high-density map, the QTL CI varied from 1.0 to 6.4 cM and 0.4 to 7.8 cM, for DA and DS, respectively, with an average CI of 2.86 cM in both traits; whereas, using the medium-density map, the average QTL CI values were 5.58 and 6.03 cM for DA and DS, respectively. Two major QTLs controlling flowering time, vgt1 and ZmCCT, had the most significant effects in US-NAM. The vgt1 locus could be narrowed down from a 5-Mb region on the medium-density map to a 1.9-Mb region on the high-density map. ZmCCT was located in a 12.4-Mb region on the medium-density map, but could be narrowed to a 6.3-Mb region using the high-density map. These results suggest that recombination bin maps could be effectively used in fine mapping of genes/QTLs that control traits of interest.
GBS is an efficient and economical method, especially for genotyping RIL populations in which regions of extended linkage disequilibrium (LD) are common. We used the GBS method to genotype the US-NAM and CN-NAM populations and construct the genetic recombination maps for each family within the populations. Compared with genetic maps constructed using array-based SNP genotyping for the same populations [9, 33], marker numbers significantly increased, reducing the average marker interval. We found substantial biological variation in genetic map lengths per family within the two NAM populations.
The largest genetic map lengths in the 36 families were likely impacted by residual heterozygosity in the parents. In contrast, the smallest genetic map lengths were in families having large identity by descent (IBD) regions with a recurrent parent, for example, the K12 and HUANGYESI3 families. The marker density of the composite genetic maps for CN-US NAM was also four times higher than that published for US-NAM. The composite genetic map length in US-NAM was shorter than in CN-NAM, which may have resulted from the higher genotype calling error rate in CN-NAM due to higher residual heterozygosity.
We noticed that the number of bins generated from our study is slightly different from that of the previous study by Giraud et al. . In addition to the different populations used, other causes might include different types of genetic markers and the methods used for the analyses. As the GBS markers in our study have a higher missing rate and genotyping error potentially, we are on the conservative side for calling bins. The benefit is the effective reduction of genetic markers for joint linkage analysis by using stepwise regression.
First, we filtered out SNPs with low quality by using permutations involving resampling of windows of SNPs followed by Bayesian inference . Then consecutive SNPs with the same genotype across all RILs were lumped into blocks, and a recombination breakpoint was assumed at the transition between two different homozygous genotype blocks. The genotypic maps of the RILs were aligned and split into recombination bins . Finally, after obtaining a skeleton recombination bin map, we further reduced the number of bins by merging bins less than 5 kb apart. Consequently, our results do not suggest any reduction of false double recombinant in our analyses.
The quality and accuracy of the genetic maps in this study were confirmed by QTL mapping of flowering-time-related traits. The co-location of major QTLs and cloned genes controlling flowering time in maize provided evidence that high-resolution genetic maps are possible using the bin mapping strategy. QTL mapping of CN-NAM and US-NAM identified 18 and 29 significant DT-related QTLs, respectively. Of these identified QTLs, 17 % of the CN-NAM ones and 28 % of those in US-NAM overlapped with previously cloned flowering-related genes in maize. These results illustrate the potential power and reliability of bin-based, composite genetic map construction. Hence, we strongly suggest that this method could become an efficient, accurate, and low-cost approach for primary or fine QTL mapping in maize, and other species.
The US-NAM analysis of maize flowering-time traits argued for numerous small-effect QTLs with additive effects . We wondered if this conclusion was the product of the way the parents were selected or was indicative of more general phenomena. To directly evaluate this question, we contrasted the US-NAM analysis with a parallel analysis of CN-NAM. The common parents of the two NAM populations were chosen based on a similar strategy. Both HZS in China and B73 in the US are very important and widely deployed elite inbred lines in each country’s history of maize breeding. Diverse parents of the two NAM populations were derived from different germplasm sets. Previously, numerous small-effect QTLs were identified for flowering time in US-NAM, phenotyped for flowering time in six different US environments . Likewise, flowering time evaluation of US-NAM, collected from different Chinese environments, showed no evidence for any single large-effect QTL. Although we found a higher percentage of significant QTL alleles with additive DT effect in CN-NAM (46 %) compared to US-NAM (32 %), no large additive effect was evident. Therefore, CN-NAM results supported the earlier US-NAM finding that flowering-time traits of NAM populations were controlled by numerous small-effect QTLs with additive effects. Additionally, we found a higher percentage of alleles with additive DT effects of about 1 day in CN-NAM (6.5 %) compared to US-NAM (1.7 %). This result may be due to the bigger difference in flowering times between the common parent and diverse parents in CN-NAM compared to those in US-NAM.
The power to detect QTL with a high-density map did not improve compared to that using a medium-density map. This is in agreement with results from Stange et al. showing that high-density maps could not improve QTL detection power in experimental and simulation data with marker densities of 1, 2, and 5 cM. Factors influencing the statistical power of QTL mapping include mapping population size, marker density, QTL effect size, and significance level in declaring the existence of QTL. Previous studies suggested that the power of QTL detection was little affected by an increase in marker density beyond 10 cM, irrespective of population size and size of QTL effects [37, 38]. In our study, the medium-density map had a marker density of 1.30 cM. Hence, higher marker densities provide no advantage on the increase of the QTL detection power.
However, we did find a considerable improvement in mapping resolution using a high-density map compared to a medium-density map. For example, the average lengths of confidence intervals for DA- and DS-related QTLs were narrowed by 60 % and 47 %, respectively, using the high-density map. This is consistent with results reported by Stange et al. , where the QTL confidence interval lengths decreased with an increase of marker density regardless of population size and QTL effect size. High-density maps are beneficial for narrowing LOD peaks of QTLs and improving the precision of QTL localization, since they could increase the probability that a marker is tightly linked to a QTL. In our study, this improved resolution could be beneficial for fine mapping of QTLs and for marker-assisted breeding. The two NAM populations with high-density marker maps can be used to map QTLs for other quantitative traits, improving the power and resolution of QTL mapping. The QTL results detected in these two NAM populations can be mutually verified and QTL regions can be further narrowed by determining overlaps with QTLs detected in other maize NAM populations. Accumulation of results by expanding the use of this methodology in other NAM populations can provide an excellent platform for the dissection of the genetic architecture of complex agronomic traits in maize.
In this study, we estimated the confidence intervals of QTLs by using a 2-LOD drop-off method, which is widely used to investigate the QTL mapping resolution [34, 39, 40]. Although there is potential bias caused by stepwise regression, the chances have not been found that the bias would switch the order for comparing different procedures or methods. This suggests that our conclusion is very likely true in comparing the mapping resolutions by using a single NAM population or joint NAM populations.
The high density of molecular markers is one important limiting factor for generating high-resolution genetic maps. With ongoing advances in next-generation sequencing, marker density will continue to increase. However, ultra-high density markers will provide additional challenges for constructing genetic maps and conducting joint linkage analyses. Choosing representative SNPs from raw data is one way to produce a genetic map, but other important SNP information may be lost. Construction of bin maps uses all marker information to accurately evaluate the location of recombination breakpoints. Especially in NAM populations, we illustrated that this bin map method effectively reduced the computing time of QTL mapping without reducing mapping resolution.
This paper reports that the combination of CN and US NAM populations was fruitful for detecting the genetic architecture of complex traits in maize. Thus, this method has the potential to pave the way toward fine mapping of complex traits. Two additional NAM populations have been created within the European CornFed project . In the future, the combination of more NAM populations with broader genetic diversity can benefit the systematic investigation of genetic architectures of complex traits in maize. In particular, NAM populations established based on European germplasm may be a good choice for integration with temperate maize. In contrast, NAM populations based on tropical and sub-tropical germplasm may be valuable for investigating important traits such as adaptation and abiotic stress tolerance.
In this study, high-density and high-quality composite genetic recombination maps, based on genomic sequencing data, were generated for two NAM maize populations, US-NAM and CN-NAM. Using these maps, we were able to replicate the identification of previously known genes that affect flowering time in maize and improve the resolution of QTL mapping. The combined analysis of different NAM populations could improve the power and resolution of QTL detection compared to single NAM population mapping. This paper presents the necessary bin maps and computational methods for the maize scientific community to use these populations in their own research.
The nested association mapping population from China (CN-NAM) is composed of about 2,000 RILs derived from crosses between the common parent HUANGZAOSI (HZS) with each of 11 diverse inbred lines: K12, YE478, ZHENG58, HUOBAI, QI319, WEIFENG322, LV28, HUANGYESI3, DUO229, PA405, and MO17. These are elite inbred lines and represent members of several popular heterotic groups used in Chinese maize breeding. HZS is an elite foundation parent in China, with wide adaptability, high combining ability, moderate growth period, and resistance to northern leaf blight and dwarf mosaic virus . HZS has at least 70 derived lines and 80 hybrids. The K12 and HUANGYESI3 inbred lines were the derived lines of HZS . HZS was crossed as the male parent to the other 11 inbred lines, and then an average of 180 RIL lines per family were derived through single seed descent (SSD) to the F7 generation. These RIL lines are free for public research purposes .
The US-NAM population, described in detail by McMullen et al. , consists of about 5,000 RILs derived from crossing B73 with 25 diverse inbred lines.
For the CN-NAM and US-NAM populations, a total of 7,698 RILs, including 758 repeatedly sequenced lines, were genotyped using the genotyping-by-sequencing (GBS) method . A detailed protocol is described on the website given in Ref. . US-NAM GBS data have been posted on the Panzea website . CN-NAM GBS data are available from and .
Outliers were defined as containing non-parental alleles or retaining excess heterozygosity. Outliers were identified using unimputed GBS data of the NAM populations via the software TASSLE4.0 . After filtering SNP sites (taxa coverage >10 %, minor allele frequency (MAF) >0.01, and site coverage >20 %), a neighbor-joining tree of every chromosome was made to spot the contaminated lines. If a line was not included in the corresponding family, the line was considered a contaminant. Lines with excess heterozygosity were identified for each family after filtering the data (site coverage >66 % and MAF >0.25). A line with a heterozygosity ratio >10 % was treated as an excess heterozygosity outlier.
SNP sites with MAF <0.05 and within the same tag (64 bp) based on the unimputed GBS data were filtered out for each family. The draft parental genotypes were inferred from the low-coverage SNP datasets of each RIL family using a maximum parsimonious inference of recombination (MPR) method applied in an R package MPR . Then, parental genotypes were refined after removing low-quality SNPs by resampling and using the Bayesian inference method included in the MPR package. The genotype assignment of each RIL was performed using a hidden Markov model (HMM) approach, with heterozygote set to missing according to the method described by Xie et al. . Consecutive SNP sites with the same genotype were lumped into blocks, and a breakpoint was assumed at the transition between two different genotype blocks. Blocks with lengths less than 1,500 kb and with a number of sequenced SNPs fewer than five were masked as missing data to avoid false double recombination. Markers co-segregating in two contiguous blocks were combined into a recombination bin . After merging a bin smaller than 5 kb to the next bin, a skeleton bin map of RIL population was obtained. Genotypes of bins for regions at the transitions between two different genotype blocks were set to missing data and imputed using the R/qtl package . The genetic maps for individual CN-NAM and US-NAM families were constructed from bins serving as genetic markers using the R/qtl package function est.map with the Haldane mapping method .
After inferring parental genotypes and obtaining high-quality SNPs for each family, markers polymorphic in more than two families in the CN-NAM population and four families in the US-NAM population were chosen to build composite genetic maps. Markers were encoded by designating the common parent allele as “1”, the other 36 parent alleles as “0”, and heterozygous loci as missing data “NA”. Markers monomorphic in a particular family were also converted to missing data “NA”. Joint recombination bin maps were generated by combining consecutive SNP sites with the same genotype into bins and merging bins smaller than 5 kb to the next bin using MPR (R package). After obtaining recombination bins, two composite genetic maps were constructed by using bins as markers in the JoinMap 4.0 software . Markers were assigned into linkage groups at an independence test LOD score of 10. Due to the large number of markers in the two NAM populations, we used the maximum likelihood mapping algorithm to order loci. The Haldane mapping function was used to convert recombination frequencies to cM. For each linkage group in the two NAM populations, a framework reference map containing markers not exhibiting segregation distortion was constructed. Markers which significantly (P < 0.05) deviated from the expected 1:1 ratio in a chi-square test were defined as exhibiting segregation distortion. After the order and chromosome position of these markers were determined, the remaining markers with segregation distortion were added to the reference map. Any markers that showed inconsistent physical position in the RefGen_v2 with themselves were excluded from further mapping. The final selected map exhibited the most agreement in marker order with the framework map.
The 1972 CN-NAM lines were evaluated phenotypically in two years (2009 and 2010) and in three locations, i.e., Xinxiang in Henan province (35.19°N, 113.53°E), Beijing (39.48°N, 116.28°E), and Urumqi in Xinjiang province (43.47°N, 87.39°E). These locations represented three main maize growing regions in China. Each year/location combination was considered as an environment, generating a total of six environments. The CN-NAM population was summer sown in Henan and spring sown in Beijing and Xinjiang. Within each environment, trials included 11 separate sets (11 CN-NAM families), and each set contained all lines of one family and its two parents. For each set, all lines were randomly assigned within each replication with a one-row plot. Two replications of each set were planted adjacently. Each row included 11 plants and was 3 m long and 0.6 m apart. A set of 4,396 US-NAM lines were grown at five different environments in 2010 and 2011, i.e., Sanya in Hainan province (18.15°N, 109.30°E) in the winter of 2010, Xinxiang in Henan province (35.19°N, 113.53°E) in the summer of 2011, Beijing (39.48°N, 116.28°E) in the spring of 2011, Tianjin (39.10°N, 117.10°E) in the spring of 2011, and Chongqing (29.35°N, 106.33°E) in the spring of 2011. All trials were arranged in an augmented incomplete block design and consisted of one replication of US-NAM RILs and check entries . For each location, lines were grouped by family with augmented incomplete blocks within each family. Each incomplete block comprised 50 RILs and one check: B73. Experimental units consisted of single-row plots of 11 plants. Each plot was 3 m in length with 0.6 m between rows. Days to tasseling (DT) data were collected for the CN-NAM and US-NAM populations and measured as the number of days from planting to tassel emergence for half the plants within a row or plot. The DT datasets for both NAM populations are available in Additional file 9: Table S7 and Additional file 10: Table S8. The broad-sense heritability for DT across the environments in different NAM populations was calculated on a mean basis by PROC GLM in SAS v9.2. The best linear unbiased prediction (BLUP) value of DT across environments was obtained for each line of CN-NAM and US-NAM with the MIXED procedure in SAS (SAS Institute Inc.). Subsequently, the BLUP value for both NAM populations was used for QTL mapping.
The method of inclusive composite interval mapping (ICIM) was used to detect the additive QTL for each of the 36 families by using the QTL ICI Mapping software Ver 3.2 . In ICIM, the P values for entering variables (PIN) and removing variables (POUT) were set at 0.001 and 0.002, and the scanning step was set 1.0 cM. The LOD threshold was determined by a 1,000-permutation test.
Joint QTL mapping for a single NAM population or the two NAM populations together was conducted by using the stepwise regression model described by Buckler et al. . We employed PROC GLMSelect in SAS v9.2 to conduct this analysis. In the stepwise regression model for a single NAM, the BLUP of days to tasseling (DT) was used as the response variable. The family main effects and 4,932 bin markers in CN-NAM or 5,296 bin markers in US-NAM were fitted as the explanatory variables. The family main effects were always included in the stepwise regression model. Then, marker effects nested within families were chosen to enter or leave the model with a threshold of the P value. The threshold was determined by permutation tests (1,000 times) for a corresponding type I error rate of 5 % . For CN-NAM and US-NAM, the P values corresponding to a 5 % type I error were both approximately 0.0001.
In the stepwise regression model for both NAM populations, the BLUP of DT was used as the response variable. The family main effects, reference (B73 and HZS) effects, and 6,238 bin markers were the explanatory variables. The family effects and reference effects were fit first in the model. Then, marker effects nested within families were selected to enter or stay in the model based on the same procedure described above. In this situation, the P value threshold is P = 0.0005 for a corresponding type I error of 5 %. For each QTL selected from the stepwise regression model, the adjacent markers, four from each side, were tested to derive the LOD score, one at a time, with all the QTLs as covariates. For each QTL position identified, confidence intervals were constructed by a 2-LOD drop-off method.
Allelic effects of markers within a family were estimated from the final optimized QTL model. Significances of allele effects were determined with a t-test on the differences between their founder means and the reference (B73 or HZS) allele effect at a significance level of P = 0.05.
This work was partly supported by the Ministry of Science and Technology of China (2011DFA30450, 2011CB100100), the National Natural Science Foundation (91335206, U1138304), the Special Fund for Agro-scientific Research in the Public Interest (201303007), CAAS (Innovation Program), the National Science Foundation (www.nsf.gov) under the Plant Genome Research Program (PGRP) (grant numbers DBI-0820619 and IOS-1238014), and the Basic Research to Enable Agricultural Development (BREAD) project (ID:IOS-0965342), as well as by the USDA-ARS (www.usda.gov). We are grateful to Dr. Weibo Xie of Huazhong Agricultural University for providing excellent advice on the construction of recombination bin maps, to Prof. Jiankang Wang and Dr. Huihui Li of the Chinese Academy of Agriculture Sciences for QTL mapping, and to Prof. Chenwu Xu of Yangzhou University and Prof. Yuanming Zhang of Nanjing Agricultural University for advice on the QTL confidence interval. We are also grateful to Dr. Linda R. Klein for copyediting the manuscript.
CL analyzed the data and drafted the manuscript. YoL participated in the study design and analyzed the data. PJB contributed with new analysis tools and data. XW participated in the data collection. YShi, YSong, and DZ provided phenotypic information. ER-M provided the gene density data. ESB, ZZ, YuL, and TW conceived of the study, managed the project design and coordination, collected data, and helped to draft the manuscript. All authors read and approved the final manuscript.
Chinese Crop Germplasm Resources Information System. http://www.cgris.net/maize/data/. Accessed 23 Sep 2015.
Buckler Lab for Maize Genetics and Diversity. http://www.maizegenetics.net/Table/Genotyping-By-Sequencing. Accessed 4 May 2011.
Panzea Database. http://www.panzea.org. Accessed 12 Sep 2005.
Wang J, Li H, Zhang L, Li C, Meng L. QTL iciMapping software.2012. http://www.isbreeding.net. Accessed 10 Apr 2012. | 2019-04-21T23:06:53Z | https://0-bmcbiol-biomedcentral-com.brum.beds.ac.uk/articles/10.1186/s12915-015-0187-4 |
Evolution of animal morphology, physiology and behaviour is shaped by the selective pressures to which they are subject. Some selective pressures act to increase the benefits accrued whilst others act to reduce the costs incurred, affecting the cost/benefit ratio. Selective pressures therefore produce a trade-off between costs and benefits that ultimately influences the fitness of the whole organism. The nervous system has a unique position as the interface between morphology, physiology and behaviour; the final output of the nervous system is the behaviour of the animal, which is a product of both its morphology and physiology. The nervous system is under selective pressure to generate adaptive behaviour, but at the same time is subject to costs related to the amount of energy that it consumes. Characterising this trade-off between costs and benefits is essential to understanding the evolution of nervous systems, including our own. Within the nervous system, sensory systems are the most amenable to analysing costs and benefits, not only because their function can be more readily defined than that of many central brain regions and their benefits quantified in terms of their performance, but also because recent studies of sensory systems have begun to directly assess their energetic costs. Our review focuses on the visual system in particular, although the principles we discuss are equally applicable throughout the nervous system. Examples are taken from a wide range of sensory modalities in both vertebrates and invertebrates. We aim to place the studies we review into an evolutionary framework. We combine experimentally determined measures of energy consumption from whole retinas of rabbits and flies with intracellular measurements of energy consumption from single fly photoreceptors and recently constructed energy budgets for neural processing in rats to assess the contributions of various components to neuronal energy consumption. Taken together, these studies emphasize the high costs of maintaining neurons at rest and whilst signalling. A substantial proportion of neuronal energy consumption is related to the movements of ions across the neuronal cell membrane through ion channels, though other processes such as vesicle loading and transmitter recycling also consume energy. Many of the energetic costs within neurons are linked to 3Na+/2K+ ATPase activity, which consumes energy to pump Na+ and K+ ions across the cell membrane and is essential for the maintenance of the resting potential and its restoration following signalling. Furthermore, recent studies in fly photoreceptors show that energetic costs can be related, via basic biophysical relationships, to their function. These findings emphasize that neurons are subject to a law of diminishing returns that severely penalizes excess functional capacity with increased energetic costs. The high energetic costs associated with neural tissue favour energy efficient coding and wiring schemes, which have been found in numerous sensory systems. We discuss the role of these efficient schemes in reducing the costs of information processing. Assessing evidence from a wide range of vertebrate and invertebrate examples, we show that reducing energy expenditure can account for many of the morphological features of sensory systems and has played a key role in their evolution.
The evolution of the accessory structures (e.g. lenses in the eye), peripheral receptors and regions of the central nervous system that together form sensory systems is often viewed solely in terms of the benefits they provide to an animal, i.e. information about the animal's internal and external environments. Sensory systems differ widely in their complexity and size, from clusters of G-protein coupled receptors for chemosensation in bacteria (Maddock and Shapiro, 1993) to the olfactory and gustatory systems of insects and vertebrates (for reviews, see Laurent, 2002; Shepherd et al., 2004), and from single receptors innervating insect mechanosensory hairs (e.g. French and Sanders, 1981), whose activity is processed locally (e.g. Burrows and Newland, 1993; Burrows and Newland, 1994), to vertebrate somatosensory systems (e.g. Penfield and Boldrey, 1937; Nelson et al., 1980). Extracting germane information from internal and external environments requires sensory receptors (with their accessory structures) to sample these environments and central circuits to analyse and interpret the incoming information. In the case of the very simplest organisms, the entire machinery for sensing the environment and acting upon it is found within the same cell, whereas at their most elaborate, for example the mammalian visual system, peripheral sensory structures may consist of millions of neurons, with even greater numbers of neurons involved in processing the information they obtain within the central nervous system. Irrespective of its size and complexity, however, the more reliable the information a sensory system can extract from the environment, the more accurate the decision making and motor control it facilitates.
Several studies have now shown that there are high energetic costs incurred by neural tissue, including that of sensory systems, both whilst processing information and at rest (Ames et al., 1992; Attwell and Laughlin, 2001; Lennie, 2003; Niven et al., 2003a; Nawroth et al., 2007; Niven et al., 2007). There are also likely to be considerable energetic costs associated with the development and carriage of nervous systems. Thus, nervous systems are subject to two conflicting selective pressures: the need to minimise energy consumption and also to generate adaptive behaviour under fluctuating environmental conditions. More specifically, in sensory systems there will be a trade-off between the energetic cost of a sensory structure encoding a particular sensory modality and the amount of reliable, germane information obtained.
Selective pressures to reduce energy consumption and improve behavioural performance can affect all levels of organization within an individual, from sub-cellular structures and single cells to brain regions and entire brains. Equally, these selective pressures can affect any life history stage. For example, a large visual system with high acuity may allow more accurate assessment of potential mates facilitating better mate choice, but at an energetic cost that may reduce individual fecundity. This emphasizes that information obtained by sensory systems must affect behaviour in a way that is beneficial to the individual or it will be selected against. Furthermore, these behaviours must ultimately be realized as increased fitness if they are to be selected (e.g. Krebs and Davies, 1993).
Thus, understanding how energy acts as a selective pressure on the evolution of sensory systems requires assessment not only of the relationship between energy and performance at the cellular and sub-cellular levels but also at the levels of sense organs, brain regions, entire brains and the entire organism. Although information about a particular sensory modality may be obtained by specific peripheral sense organs and processed, at least initially, by discrete brain regions, it is essential to consider the benefits and the costs, not only in the context of the specific neural circuits involved but also in the context of the whole organism. To determine the impact of energy as a selective pressure on the evolution of the nervous system it is important to know both how and when energy is expended within specific sensory systems or whole nervous systems, and what proportion of energy is consumed by these processes, relative to the energy budget of the whole organism.
Sensory processing consumes a proportion of the total energy consumption of the nervous system and, therefore, is limited both by an animal's total energy budget and the distribution of energy costs throughout the nervous system. An animal's total energy consumption can be measured using its metabolic rate, of which there are several available measures (for reviews, see Hammond and Diamond, 1997; White and Seymour, 2003; Savage et al., 2004; Weibel et al., 2004; Nagy, 2005; Suarez and Darveau, 2005; Weibel and Hoppeler, 2005). An important consideration is which of these measures is most relevant to understanding the limitations on the energy available for sensory processing. Basal metabolic rates (BMRs) have been measured in vertebrates, as have resting metabolic rates (RMRs) in invertebrates (see Lovegrove, 2000; White and Seymour, 2003; Bokma, 2004; Savage et al., 2004; Niven and Scharlemann, 2005; Chown et al., 2007). They are composed of the energy requirements of various housekeeping functions such as protein synthesis, membrane turnover and maintenance of membrane potentials in a range of tissues and organs as well as oxygen transport and, in endotherms, the maintenance of body temperature. The peripheral and central nervous systems represent a significant component of the BMR or RMR in many animals. For example, in humans (Homo sapiens), although the brain is just 2% of the body mass it consumes approximately 20% of the BMR (Clarke and Sokoloff, 1999). Likewise, in blowflies (Calliphora vicina), the retina alone is estimated to consume approximately 8% of the resting metabolic rate (Howard et al., 1987). The high proportional energy consumption of neural tissue suggests that it may have a significant effect upon the overall BMR or RMR of an animal, but this is not supported by the empirical data; although in mammals the scaling exponent of absolute brain size and BMR with body mass is similar (Martin, 1981; Mink et al., 1981), plotting the deviation in brain size versus the deviation in BMR from their predicted scaling relationships with body mass reveals no correlation (McNab and Eisenberg, 1989) (but see Isler and van Schaik, 2006a) (Fig. 1). This would be expected if the energy consumption of neural tissue can be traded off against the energy consumption of other `expensive tissues' such as kidney or gut. Indeed, trade-offs between brain and gut have been suggested to play an important role in the evolution of human and primate brain size (Aiello and Wheeler, 1995).
Animals do not necessarily spend large amounts of time at their BMR, however, and the field metabolic rate (FMR) (for a review, see Nagy, 2005), which is a measure of an animal's energy consumption when it is freely moving through its natural environment, is likely to be a more relevant measure to understanding the effects of energy on the evolution of the brain and sensory systems. As far as we are aware, no direct comparison of FMR and brain size is available, although the blood flow to, and oxygen uptake of, the brain has been measured in some mammals, including humans, during exercise. In humans, periods of exercise, when the skeletal muscles consume large amounts of oxygen, cause a reduction in the blood supply to most of the organs that contribute to the BMR such as the kidneys or liver; however, the blood supply to the brain remains relatively constant (Ide and Secher, 2000). For example, when cycling there is no change in global blood flow to the brain (Madsen et al., 1993). However, voluntary movements, such as hand movements, do evoke increased local blood flow to cortical areas that receive sensory inputs as well as motor areas involved in execution (Raichle et al., 1976; Orgogozo and Larsen, 1979). This suggests that global blood flow to the brain is relatively constant, despite changes in regional blood flow. The relative constancy of global brain blood flow during behaviour is reinforced by data from Weddell seals (Leptonychotes weddellii), which whilst undertaking simulated dives, substantially reduce the blood flow to the heart, liver and pancreas and partially reduce the blood flow to the lungs and the retina, but not to the cortex or cerebellum (Fig. 2) (Zapol et al., 1979). This makes sense because during hunting sensory systems must continue to monitor the environment and the brain must continue to make decisions and execute motor patterns. The need for a constant supply of oxygen to the brain to maintain function is emphasized by the consequences of an interruption to the blood supply to the mammalian brain: a decrease in blood flow below critical levels can cause a 90% drop in ATP within 5 min (Erecinska and Silver, 2001). Thus, even short interruptions to the supply of oxygenated blood may lead to severe long-term functional consequences including swelling, lysis and ischemic cell death (for a review, see Lipton, 1999). The effects of a reduction in the amount of oxygen received by the brain can be observed in humans under hypoxic conditions, such as at high altitudes, where blood oxygen levels drop and both sensory and motor functions are severely impaired (Hornbein, 2001). To prevent such oxygen depletion the nervous systems of both vertebrates and insects are supplied with oxygen through dense networks of capillaries or tracheoles (Fig. 3), respectively. The neurons of some vertebrates such as the western painted turtle (Chrysemys picta), the common frog (Rana temporaria) and the crucian carp (Cyprinus carpio) have evolved to tolerate hypoxic or anoxic conditions (for reviews, see Lutz, 1992; Boutilier, 2001; Nilsson, 2001; Bickler and Donohoe, 2002). However, in both C. picta and R. temporaria, neural function is compromised under these conditions. However, neurons within the crucian carp brain remain active in anoxic conditions and continue to sense their environment and generate behaviour (Nilsson, 2001). Many invertebrates have remarkable tolerance under hypoxic or anoxic conditions, possibly due to their low metabolic rates in comparison to vertebrates (e.g. Niven and Scharlemann, 2005; Chown et al., 2007). However, there is little information about the effects of hypoxic/anoxic conditions upon invertebrate neurons, sensory systems or behaviour. Nevertheless, data from vertebrates clearly suggest that the sustained supply of oxygen to sensory systems and the brain has important implications for their evolution because nervous systems are a constant energy sink, consuming energy irrespective of whether they are at rest or active.
The absence of a correlation between brain size and basal metabolic rate (BMR) in mammals. A plot of the percentage deviation from predicted brain size versus percentage deviation from predicted BMR in mammals reveals no correlation. This suggests that investment in the brain may be traded for other energetically cost tissues. Adapted from Striedter (Striedter, 2005); data from McNab and Eisenberg (McNab and Eisenberg, 1989).
Changes in the blood flow to major organs, the brain and retina in Weddell seals during diving. The normal blood flow (pale blue) and the blood flow during diving (dark blue) to the pancreas and liver, heart, lungs, retina, cerebellum and cortex. There is a substantial reduction in blood flow to the pancreas, liver and heart but not to the lungs, retina, cerebellum and cortex. Adapted from Schmidt-Nielsen (Schmidt-Nielsen, 1998); data from Zapol et al. (Zapol et al., 1979).
Tracheoles supply oxygen to neural tissue in insects. A schematic of the right optic lobe of the desert locust (Schistocerca gregaria) viewed from the posterior surface showing the posterior trachea. This shows the dense ramifications of tracheoles necessary for oxygen supply within insect brains. Adapted from Burrows (Burrows, 1980).
There are numerous physiological processes within neural circuits that contribute to the overall costs of neural tissue: transduction, electrical signal transmission within the neuron and synaptic transmission (Fig. 4). For neurons that possess chemical synapses, these costs include the maintenance of concentration gradients for ions including Na+, K+, Ca2+, H+, Cl– and HCO3– and potential differences across the cell membrane, the synthesis of neurotransmitter molecules, the loading of neurotransmitter molecules into vesicles, the docking of neurotransmitter vesicles at the pre-synaptic membrane and the breakdown or reuptake of neurotransmitter from the synaptic cleft. In addition, there are costs associated with the synthesis of macromolecules such as proteins and fatty acids.
The basic currency of energy within cells is the phosphate–phosphate bond of the adenosine triphosphate (ATP) molecule (for a review, see Alexander, 1999). In neurons, the energy released in breaking this bond is harnessed by the 3Na+/2K+ ATPase, which exudes 3Na+ ions and admits 2K+ ions for each molecule of ATP that is converted to ADP, for the maintenance of the membrane potential (Skou, 1957; Post et al., 1972; Glynn, 1993). Numerous symporters and antiporters are coupled to the 3Na+/2K+ ATPase, linking the movements of ions such as Ca2+, Cl– and HCO3– to the energy consumed by the 3Na+/2K+ ATPase (Fig. 4). The potential and concentration gradients that drive the movements of ions through ion channels are also dependent upon the 3Na+/2K+ ATPase. Additionally, the V-ATPase, which transports one H+ ion across the membrane for each molecule of ATP converted to ADP, is critically important to neurons (Harvey, 1992; Moriyana et al., 1992). The V-ATPase pumps H+ ions into the lumen of synaptic vesicles, creating a concentration gradient and potential difference between the lumen and the surrounding cytoplasm that is used to drive the uptake of neurotransmitter molecules (Fig. 4).
A schematic diagram of a glutamatergic synapse showing many of the major sources of energy consumption. Movements of ions across the neuronal cell membrane account for a large proportion of the energy consumed. During transmission of the action potential along the axon, Na+ and K+ ions move through voltage-gated ion channels due to concentration gradients and potential differences across the membrane. When the action potential reaches a synapse, voltage-gated Ca2+ channels open, to admit Ca2+ ions and trigger the release of vesicles containing glutamate molecules. These glutamate molecules then bind to ligand-gated ion channels, which open admitting Na+ molecules that depolarize the post-synaptic neuron. Glutamate in the synaptic cleft is transported into the presynaptic neuron or nearby glial cells by a glutamate co-transporter. Within the pre-synaptic neuron, glutamate molecules are transported into the synaptic vesicles by a glutamate/H+ anti-porter. Almost all of these processes require the activity of two pumps, the 3Na+/2K+ pump and the H+ V-ATPase.
Electrical models of single fly photoreceptors based upon intracellular measurements of their input resistance and membrane potential have been used to estimate the total energy consumption of the 3Na+/2K+ ATPase within single neurons (Laughlin et al., 1998; Niven et al., 2003a; Niven et al., 2007). Comparison of the estimated ATP consumption from Calliphora vicina photoreceptors with estimates of the total costs derived from whole retina oxygen consumption measurements are remarkably similar (Laughlin et al., 1998; Pangrsic et al., 2005; Niven et al., 2007). This suggests that, at least within photoreceptors, movements of ions across the neuronal cell membrane, which are driven by concentration gradients and potential differences maintained by the activity of the 3Na+/2K+ ATPase, are the major energy cost.
Both electrical models of individual photoreceptors and oxygen measurements from whole retinas suggest that the energy consumption of neural tissue at rest is extremely high, e.g. rabbit (Ames et al., 1992), fly (Laughlin et al., 1998; Niven et al., 2003a; Niven et al., 2007; Pangrsic et al., 2005). This high cost, even in the absence of any signalling, is due to the activity of the 3Na+/2K+ ATPase, which is necessary for the maintenance of the resting potential (Niven et al., 2007). Comparison of signalling and resting costs in photoreceptors suggests that they are related, the resting costs being approximately 25% of the cost at the highest light levels (Fig. 5). Resting costs and signalling costs are probably related in all neurons (both spiking and non-spiking), although the precise relationship is likely to be different depending on the specific neural type.
Recently, three energy budgets have been produced that attempt to divide the total energy consumption of neural tissue into its constituent components (Attwell and Laughlin, 2001; Lennie, 2003; Nawroth et al., 2007). For example, Attwell and Laughlin (Attwell and Laughlin, 2001) divide the energy consumption of a single action potential in rat grey matter into the voltage-gated currents producing the action potential, pre-synaptic Ca2+ entry at the synapse, the recycling of glutamate released into the synaptic cleft and loading of vesicles, vesicle endo- and exocytosis and the activation of post-synaptic receptors (NMDA, non-NMDA and mGluR) (Fig. 6A). The costs calculated for a single component are then multiplied by the total number of these components within the nervous system to give the total energy consumption. These energy budgets emphasize the high costs of maintaining the membrane potential at rest as well as the extremely high costs of action potential conduction. Indeed, within an active olfactory glomerulus the energetic costs were dominated by the demands of action potential transmission within the afferent olfactory neurons and their synaptic outputs, despite postsynaptic dendrites comprising at least half the total glomerular volume (Nawroth et al., 2007) (Fig. 6B). Other functions of neurons such as the loading of vesicles with glutamate and its recycling following release into the synaptic cleft constitute a relatively small proportion of these energy budgets (Attwell and Laughlin, 2001; Nawroth et al., 2007).
Resting and maximum energy consumption of photoreceptors scales with their performance. Comparison of four homologous fly R1–6 photoreceptors from (smallest to largest): Drosophila melanogaster, D. virilis, Calliphora vicina and Sarcophaga carnaria. The largest photoreceptors are capable of transmitting more information but expend more energy at rest (squares; solid line) and whilst signalling (circles; broken line) than the smaller photoreceptors. This shows that neural performance is related to energy consumption at rest and whilst signalling. Adapted from Niven et al. (Niven et al., 2007).
Energy budgets break down the energetic costs of neural processing into its constituent components. (A) The energy consumption of the various neuronal components that contribute to the energy consumption of a single action potential (AP) and the events at a glutamateric synapse triggered by it in rat cortex. The AP itself consumes more than 50% of the total energy consumed. Other processes that also consume energy include the activation of NMDA, non-NMDA and metabotropic glutamate post-synaptic receptors, the recycling of glutamate and the entry of presynaptic Ca2+ ions that trigger vesicle release. Many of these processes can be linked to the activity of the sodium–potassium exchanger. (B) The energy consumption of various neural components within a rat olfactory glomerulus with one sniff per second as a function of odour concentration. The contributions of different components change with increasing odour concentration. The resting potential is the dominant cost at low odour concentrations but axonal action potentials, the activation of post-synaptic receptors and dendritic back-propagating action potentials consume substantial amounts of energy at higher concentrations. Adapted from Attwell and Laughlin (Attwell and Laughlin, 2001) and Nawroth et al. (Nawroth et al., 2007).
These studies emphasize that the movements of ions across the neuronal cell membrane at rest and whilst signalling are a major cost in both spiking and non-spiking neurons. The costs themselves are likely to differ between cell types depending on the input resistance at rest, the precise combinations and densities of ion channels in the membrane, the total membrane area, the number of output synapses and type of neurotransmitter they release.
Whilst oxygen consumption and blood flow measurements, electrical circuit models and energy budgets can explain the mechanistic causes of the high energetic costs associated with single neurons, sensory processing regions or grey matter; they do not in themselves explain why such costs exist. To understand why specific components within the nervous system cost particular amounts of energy we need to understand the function of these components. Two particularly important factors that affect the energetic cost of neural information processing are noise and response speed, which determine the signal-to-noise ratio (SNR) and bandwidth, respectively (Laughlin, 2001; Niven et al., 2007). Noise in sensory systems is both intrinsic and extrinsic (for review, see Faisal et al., 2008). Extrinsic noise is derived from the sensory stimuli themselves, which because they are either quantum-mechanical or molecular in nature do not perfectly convey information about the environment (Hecht et al., 1942; Barlow et al., 1971; Berg and Purcell, 1977; Baylor et al., 1979; Lillywhite and Laughlin, 1979; Aho et al., 1988). Intrinsic noise occurs at all stages of sensory processing, including the transduction of the sensory stimulus into an electrical signal, the transmission of electrical signals within neurons and synaptic transmission of signals between neurons (Barlow, 1956; Katz and Miledi, 1970; Lillywhite and Laughlin, 1979; Aho et al., 1988; Mainen and Sejnowski, 1995; Berry et al., 1997; de Ruyter van Steveninck et al., 1997). One potential way to improve the SNR of single neurons is to increase their numbers of receptor molecules and ion channels (Weckström and Laughlin, 1995; Laughlin, 1996; Niven et al., 2003b; Vähäsöyrinki et al., 2006; Niven et al., 2007). However, each additional receptor that is activated or ion channel that is opened consumes energy. Likewise, an improved SNR could be conveyed to postsynaptic neurons by releasing greater numbers of synaptic vesicles but each additional vesicle will consume more energy. At the circuit level, noise reduction can be produced by averaging the outputs of sensory receptors or neurons in space, time, or both. In the peripheral nervous system, averaging the signals from neighbouring receptors may eliminate noise to some extent if the noise in these receptors is uncorrelated. However, spatial averaging reduces the resolution with which the sensory receptors sample the environment, requiring an increase in receptor density to restore the resolution. Thus, averaging increases the energetic costs of sensory processing because greater numbers of neurons are required.
A trade-off between energy efficiency and information coding in insect photoreceptors. The information rates (bits s–1) versus the energy efficiency of information transmission (ATP molecules bit–1×106) of photoreceptors from four fly species (smallest to largest): Drosophila melanogaster, D. virilis, Calliphora vicina and Sarcophaga carnaria. Larger photoreceptors can transmit higher rates of information but are less energy efficient. Adapted from Niven et al. (Niven et al., 2007).
Increasing the number of receptors and ion channels in a neuron not only affects its SNR but also its bandwidth. In particular, increasing the density of ion channels will decrease the input resistance and the membrane time constant. However, greater densities of receptors and ion channels allow a greater flow of ions across the neuronal cell membrane during signalling that require the 3Na+/2K+ ATPase to restore them after signalling. The bandwidth and SNR both contribute to the information rate. Recent comparative studies have explained the links between fly photoreceptor energy consumption and information rates through their bandwidth and SNR (Niven et al., 2007). In both small and large photoreceptors the cost of a unit of information (bit) drops as more is encoded (Fig. 7). This is due to the resting costs, which are divided by the amount of information encoded. Nevertheless, smaller photoreceptors are more efficient than their larger counterparts despite having lower information rates because their energetic costs are substantially lower (Niven et al., 2007).
Given the finite energy budgets of animals, the high energetic demands of sensory systems and the need for animals to generate adaptive behaviour, energy efficient solutions to the challenges faced by sensory systems should be strongly selected for during evolution. Energy efficiency, which leads to an increase in the ratio between the information encoded and the energy expended by sensory systems, can occur due to adaptations in their morphology, physiology, or both. Numerous examples of energy efficient strategies exist at all levels of neural organization, from the combinations of ion channels within single neurons (Niven et al., 2003a) and their size (Niven et al., 2007) to the coding of information within populations of neurons (Levy and Baxter, 1996; Baddeley et al., 1997; Vinje and Gallant, 2000; Perez-Orive et al., 2002; Hromádka et al., 2008) and computational maps (Chklovskii and Koulakov, 2004).
The efficiency with which single neurons code information is critically dependent upon the biophysical properties of their membranes, such as the total surface area or the combinations of ion channels that they express, because the movement of ions across the membrane is the major energetic cost of neurons (Laughlin et al., 1998; Attwell and Laughlin, 2001; Niven et al., 2007). Numerous features of neurons such as their conduction velocity, time constants and space constants are dependent upon the combinations and densities of ion channels within the membrane (Hille, 2001).
The most obvious impact of ion channels upon the energy efficiency of single neurons is the generation of action potentials by voltage-gated sodium channels. A high density of voltage-gated sodium channels can support the production of action potentials, which are used to code information digitally. However, some neurons lack voltage-gated sodium channels (or a sufficient density of voltage-gated sodium channels) and code information as graded changes in membrane potential. These non-spiking neurons are found in the peripheral visual, auditory and vestibular systems of vertebrates (e.g. photoreceptors, bipolar cells and hair cells) and throughout the visual and mechanosensory systems of insects and crustaceans (e.g. photoreceptors, motion detector neurons, local non-spiking interneurons) (Tomita, 1965; Ripley et al., 1968; Autrum et al., 1970; Werblin and Dowling, 1969; Hagins et al., 1970; Harris et al., 1970; Kaneko, 1970; Burrows and Siegler, 1976; Yau et al., 1977). These neurons all transmit information to post-synaptic neurons as graded or analogue signals.
Simulations of large monopolar cells in the fly retina suggest that transmission of analogue information (graded potentials) is at least as costly per unit of information (measured in bits) as digital transmission (action potentials) but far more information can be transmitted per second using analogue coding (Laughlin et al., 1998). This suggests that many more spiking neurons are required to transmit a given amount of information per second. In this case, even if the cost per bit of information were the same with both coding schemes, digital coding would incur greater overall energy consumption because when no information is coded the resting potentials of a larger number of spiking neurons must be maintained. Thus, analogue coding is a more efficient solution to transmitting a given amount of information within a limited amount of time. However, graded potentials degrade over long distances and so there is a reduction in the reliability of the analogue signals being transmitted. Digital coding using action potentials also has the benefit of being able to threshold out synaptic noise, which may accumulate in networks due to synaptic transmission (Sarpeshkar, 1998; Laughlin et al., 2000). This reduction in reliability means that the relative energy efficiency of analogue versus digital coding drops as the distance information is to be transmitted increases. The greater efficiency of analogue coding over short distances and digital coding over longer distances suggests that the nervous system should use a mixture of the two schemes. Such hybrid coding schemes are indeed observed in neural circuits, which combine graded potentials (including postsynaptic potentials) and action potentials. Indeed, a theoretical prediction of the optimal mixture of analogue and digital coding in electronic devices closely resembles that observed in cortical neurons (Sarpeshkar, 1998).
Ion channels alter the relationship between energy consumption and information coding. Drosophila melanogaster photoreceptors from Shaker mutant flies, which lack functional Shaker K+ channels (red), have an increased energetic cost at rest and whilst signalling when compared to wild-type photoreceptors (black). Adapted from Niven et al. (Niven et al., 2003a).
As well as influencing whether neurons code information as graded or action potentials, ion channels can also alter energy efficiency through their density and their activation/inactivation properties. For example, in Drosophila melanogaster photoreceptors, a considerable proportion of Shaker voltage-gated K+ channels are activated at the steady-state resting potential, reducing the current-to-voltage gain (Niven et al., 2003b). Photoreceptors exposed to bright lights depolarize, inactivating the Shaker voltage-gated K+ channels and increasing the current-to-voltage gain and improving the spread of the signal across the voltage range. The Shaker conductance incurs an energetic cost at rest, but not at more depolarized potentials when it is inactivated (Niven et al., 2003a; Niven et al., 2003b). In Drosophila mutant photoreceptors that lack the Shaker conductance, it is replaced with a leak conductance that restores the current-to-voltage gain at rest but it does not inactivate at more depolarized potentials (Niven et al., 2003b). This leak conductance incurs an energetic cost both at rest and at more depolarized potentials. Thus, photoreceptors experience a twofold cost associated with the loss of the Shaker channel, a drop in their information rate and an increase in their energy expenditure (Niven et al., 2003a; Niven et al., 2003b) (Fig. 8). More generally, altering the precise types of voltage-gated ion channels and their densities within a neuron will alter the relationship between energy consumption and information processing. Voltage-gated ion channels may increase the energy efficiency of information coding in neurons by altering the relationship between resting costs and signalling costs. For example, voltage-gated ion channels that activate at high voltages do not incur an energetic cost at rest. In spiking neurons, increasing the threshold potential would significantly reduce energy consumption because fewer action potentials would be initiated, although this will alter the information transmitted.
The properties of other classes of ion channels and metabotropic receptors may also alter the energy efficiency of information transmission in sensory receptors or at synapses. For example, several different receptor types, including AMPA, Kainate, NMDA and metabotropic glutamate receptors, are found on the post-synaptic membrane of glutamatergic synapses, which are found throughout vertebrate sensory systems. The AMPA receptors have evolved to activate and deactivate on millisecond timescales in response to glutamate, whereas NMDA and metabotropic glutamate receptors operate on longer timescales (Attwell and Gibb, 2005). It has been shown that energy consumption limits neuronal time constants and the millisecond timescale of AMPA receptors (Attwell and Gibb, 2005). It is suggested that the properties of the NMDA and metabotropic glutamate receptors are linked to their role as coincidence detectors and their involvement with synaptic plasticity. Altering the precise combination of AMPA, Kainate, NMDA and metabotropic glutamate receptors will alter the energetic cost of that particular synapse.
Energy efficiency can also be achieved by matching the filter properties of neuronal components to the signals they process (Laughlin, 1994; Laughlin, 2001; Niven et al., 2007). For example, insect photoreceptors have a region of photosensitive membrane, the rhabdom, and photoinsensitive membrane that filters the light-induced current generated by the rhabdom. The filter properties of the photoinsensitive membrane are determined by the combination and density of ion channels expressed by the photoreceptor (Vallet et al., 1992; Laughlin and Weckström, 1993; Laughlin, 1994; Weckström and Laughlin, 1995; Laughlin, 1996; Juusola et al., 2003; Niven et al., 2003b; Niven et al., 2004; Vähäsöyrinki et al., 2006). An ability to process information at frequencies beyond those necessary for the generation of adaptive behaviour (having excess bandwidth in the photosensitive filter) will be severely penalized by increased energetic costs over the entire signalling range and at rest (Niven et al., 2007). Indeed, the filter properties of the photoinsensitive membrane would be expected to be reduced to the absolute minimum necessary for maintaining function. Similarly, it has been suggested that the timescale of activation and deactivation of AMPA receptors at glutamatergic synapses is matched to the membrane time constants of neurons and, hence, their signalling speed (Attwell and Gibb, 2005).
Strategies to improve the energy efficiency of neural coding are not restricted to single neurons but can also occur within populations of neurons (Levy and Baxter, 1996; Vinje and Gallant, 2000; Balasubramanian et al., 2001; Willmore and Tolhurst, 2001; De Polavieja, 2002; Perez-Orive et al., 2002; Schreiber et al., 2002; Olshausen and Field, 2004; Hromádka et al., 2008). Energy efficiency within neural populations is still constrained by the properties of individual neurons, such as the relationship between the energetic cost of maintaining a neuron at rest and whilst signalling. This relationship is particularly important for sparse coding, an energy efficient coding strategy in which a small proportion of the neurons in a population represent information (for a review, see Olshausen and Field, 2004). The optimum proportion of neurons within a population is dependent upon the relationship between resting costs and signalling costs. High signalling costs and low resting costs will favour extremely sparse representations of information, so called `grandmother neuron' codes in which a single event is associated with the activity of a single neuron (Attneave, 1954; Barlow, 1969), whereas higher fixed costs favour denser neural codes in which a greater number of neurons within a population are active (Levy and Baxter, 1996; Attwell and Laughlin, 2001) (Fig. 9). Studies in both vertebrates and invertebrates have shown that neural codes at higher levels of sensory systems, such as the primary visual cortex of primates, may be sparse (e.g. Vinje and Gallant, 2000; Perez-Orive et al., 2002; Hromádka et al., 2008).
Reducing energy consumption with distributed coding in spiking neurons. The energy requirements for encoding 1 of 100 conditions initially decrease but subsequently increase as the number of active neurons increases (for cells signalling with spike rates below 60 Hz). As the spike rate increases the region of the parameter space in which distributed coding is advantageous becomes smaller. Adapted from Attwell and Laughlin (Attwell and Laughlin, 2001).
Energy efficiency can also be achieved by the placement of components within nervous systems/sensory systems to minimize energetic costs by `saving wire' (Cherniak, 1994; Cherniak, 1995). For example, the placement of brain regions with high interconnectivity adjacent to one another will reduce the total length of axons. This will reduce the amount of axonal membrane and the distance over which action potentials are transmitted. The placement of neural components at several levels of organization, from visual cortical areas to single neurons, has been shown to closely match the minimized wire length. For example, the interconnectivity of neurons within the cortex appears to minimize wiring volume (Chklovskii, 2004).
Although energy efficient coding strategies and component placements occur in many sensory systems, constraints also exist that prevent energy savings. Noise is a constraint both upon energy efficient coding and the minimization of wiring costs within the nervous system (Balasubramanian et al., 2001; De Polavieja, 2002; Faisal et al., 2005). For example, an optimum energy efficient code that maximizes the information coded by a given number of spikes (the Boltzmann distribution) predicts that neural spike rates should follow an exponential distribution. Populations of neurons encoding natural stimuli adhere to this prediction at high spike rates but not at low spike rates, which are used less often than predicted, because they are less reliable (Baddeley et al., 1997; Balasubramanian et al., 2001; Balasubramanian and Berry, 2002; De Polavieja, 2002). Functional constraints, such as timing or the positions of peripheral nerves, may also prevent the nervous system adopting energy efficient strategies (Chen et al., 2006; Kaiser and Hilgetag, 2006; Niven et al., 2008). These constraints limit the extent to which selective pressures on the nervous system to reduce energetic costs can affect the coding of information and the placement of components.
A complementary strategy to directly reducing the cost of processing information is to reduce the amount of predictable or redundant information within sensory systems (Atteneave, 1954; Barlow, 1961; Srinivasan et al., 1982). The most obvious source of predictable sensory information is the sensory feedback generated by motor activity. For example, limb movements can produce predictable mechanosensory feedback; however, it is the deviation from the expected sensory feedback that is essential for maintaining limb control and stability (Gossard et al., 1990; Gossard et al., 1991; Wolf and Burrows, 1995). An efference copy of the expected movements can be used to selectively gate-out the predictable sensory feedback and allow only the novel sensory feedback to be processed (Sillar and Skorupski, 1986; Bell and Grant, 1989; Gossard et al., 1990; Gossard et al., 1991; Wolf and Burrows, 1995; Li et al., 2002; Poulet and Hedwig, 2006). By reducing the number of predictable signals being processed, the overall energetic cost is reduced but not the total amount of information. For example, within the visual system, redundant information can arise because adjacent photoreceptors sample neighbouring points on natural scenes that are highly correlated (Atteneave, 1954; Barlow, 1961; Srinivasan et al., 1982). Again, eliminating redundant signals reduces the overall energetic cost but not the total information.
Is there a relationship between size, performance and energy consumption?
Many animals possess enlarged or elaborated sensory systems for the acquisition of a specific sensory modality. The elaboration of sensory structures is often correlated with behavioural and/or ecological specialization and improved performance in particular behavioural tasks. For example, the insectivores show considerable behavioural and ecological diversity and have sensory specializations in both the peripheral sense organs and cortical regions (for a review, see Catania, 2005). The East African hedgehog (Atelerix albiventris) possesses large eyes and ears as well as whiskers and microvibrissae that suggest they are generalists, not relying wholly on one specific sensory modality. This is reflected in the organization of their cortex, which contains large prominent auditory, somatosensory and visual areas (Fig. 10A). In contrast moles, and in particular the star-nosed mole (Condylura cristata), are specialized for a subterranean lifestyle with reduced eyes and a highly modified nose that contains 22 tactile appendages and a relatively enlarged cortical somatosensory representation (Fig. 10B). Ant species with more visual behaviour, likewise, show an enlargement of the optic lobes and mushroom body lip – brain regions associated with visual processing and possibly visual memory, respectively (Gronenberg and Hölldobler, 1999).
There is often an implicit assumption that relatively larger structures within sensory systems are associated with an increase in information processing and, consequently, improved behavioural performance. Relatively larger sensory structures may have greater numbers of neurons, neurons with a greater volume, or both. It also seems likely that relatively larger sensory structures will incur a greater absolute energetic cost. However, for most sensory systems, these relationships remain assumptions without empirical support. These relationships between information processing and energy consumption have been assessed in the fly retina (Niven et al., 2007). Comparison of different sized photoreceptors showed that the largest had substantially higher information rates than the smallest but also incurred substantially higher energetic costs, both at rest and whilst signalling (Fig. 7). Thus, information processing in the largest photoreceptors was less energy efficient than in their smaller counterparts. The largest photoreceptors were from flies with the greatest number of photoreceptors suggesting that, in this case, the largest retina had both the highest total energy consumption and processed the greatest quantity of information.
A reduction in the size of visual cortical regions and an expansion in cortical regions associated with mechanosensory processing are associated with subterranean living. (A) The African hedgehog Atelerix albiventris lives above ground and has well developed visual (V) and auditory processing. (B) The star-nosed mole Condylura cristata is subterranean and has reduced visual (V) representation and an enlarged somatosensory representation. Adapted from Catania (Catania, 2005). See text for details.
Although similar relationships can be envisaged for other peripheral sensory structures, the relationship between information processing, energy consumption and the size of higher centres remains unclear. The efficacy of energy-efficient coding schemes can change with size (e.g. graded versus action potentials, sparse coding), making direct comparisons difficult. Thus, direct quantification of the energetic costs, performance and size of a particular sensory system is essential for understanding the cost–benefit trade-offs that have influenced its evolution. This is particularly important in comparisons of phylogenetically distant species, among which it is not reasonable to assume that a specific volume of neural tissue consumes similar amounts of energy. For example, elasmobranchs have a larger relative brain size when compared to teleost fish of the same body mass (Nilsson et al., 2000) (Fig. 11A). Early studies assumed that elasmobranch brains consumed considerably more energy than those of teleosts with similar body mass. However, measurements from elasmobranch and teleost neural tissue have shown that they have very different specific rates of energy consumption but that overall their brains consume similar amounts of energy (Fig. 11B,C).
If the trade-off between the performance of sensory systems and their energetic costs has influenced their evolution, then under conditions in which the need to maintain performance in a particular sensory system is reduced, the sensory system itself should be reduced. Many animals living in environments in which information from a particular sensory modality is no longer useful, and is therefore under reduced selective pressure, do indeed show marked reductions in the size of structures associated with that modality. For example, the peripheral and central components of the visual systems of animals that live in caves or subterranean environments are often reduced or absent. Populations of the Mexican cave fish (Astyanax mexicanus) isolated in caves without light have undergone convergent eye loss at least three times within the last 1 million years, whereas populations that have lived continuously on the surface have retained their eyes (Fig. 12A) (Strecker et al., 2004; Wilkens, 2007; Borowsky, 2008; Niven, 2008a). Likewise, fish that live permanently in caves have relatively smaller visual processing regions in their brain compared to those that are found both in caves and on the surface (Fig. 12B) (Poulson and White, 1969). Blind mole rats (Spalax ehrenbergi) also show a marked reduction in eye size, the remaining structures being maintained subcutaneously for circadian rhythm generation (David-Gray et al., 1998). Like the star-nosed mole, blind mole rats have a reduced thalmocortical visual system and an expanded somatosensory representation associated with a subterranean lifestyle. In some cases, reductions in the volume of sensory processing regions can occur within individuals following the transition to a new environment. For example, virgin female ants (Messor pergandei or Pogonomyrmex rugosus) make mating flights before removing their wings and excavating a subterranean nest to found a new colony. Brain regions specifically associated with visual processing such as the medulla are reduced in volume in these mature mated ant queens relative to virgin female ants (Julian and Gronenberg, 2002).
The reductions of specific sensory structures and their associated brain regions also occur in animals living on islands (see Niven, 2005; Niven, 2007; Niven, 2008b). For example, a fossil bovid, Myotragus balearicus, found on two Mediterranean islands, has a reduced orbit and endocast volume relative to bovids found on the mainland (Kohler and Moya-Sola, 2004) suggesting a reduction in visual processing due to a reduced need for vigilance in the absence of mainland predators on these islands (Kohler and Moya-Sola, 2004; Niven, 2005). Fruit flies (Drosophila melanogaster) bred under laboratory conditions do not require vision to locate food or mates reducing the selection pressure on the visual system (Fig. 13). These flies show an overall reduction in compound eye size and facet size that is related to their time in captivity (Tan et al., 2005).
The relative size of brains and brain regions is not a direct indicator of energy consumption. (A) The average brain mass of elasmobranch fishes (E, blue) weighing between 175 and 1250 g and teleost fishes (T, red) weighing between 222 and 1170 g. (B) The specific activity of the Na+/K+ ATPase (μmol min–1 g–1). (C) The total brain Na+/K+ ATPase activity (μmol min–1). Data from Nilsson et al. (Nilsson et al., 2000).
Reduction of the retina and central regions of the visual system in cave fish. (A) Eye loss in cave populations of Astyanax mexicanus that have been isolated for approximately 1 million years. The photograph shows one eyeless cave fish (foreground) and two fish from closely related surface-dwelling populations. (B) Reduction in the relative size of the brain regions associated with visual processing in fish species living permanently in caves. (i) Amblyopsis spelaea, a fish species living exclusively in caves. (ii) Chologaster agassizi, a fish species occasionally found in caves but also in surface environments. Adapted from Poulson and White (Poulson and White, 1969). Photograph by R. Borowsky, reproduced with permission.
Length of time in culture causes a reduction in eye size in Drosophila melanogaster. Changes in absolute eye size with the number of years in culture. Blue indicates measurements from male flies and red indicates measurements from female flies. Error bars indicate one standard deviation. Adapted from Tan et al. (Tan et al., 2005).
As we discussed above, however, neural tissue is energetically expensive both to use and to maintain (Ames et al., 1992; Nilsson, 1996; Attwell and Laughlin, 2001; Lennie, 2003; Niven et al., 2003a; Nawroth et al., 2007; Niven et al., 2007). Thus, in the case of subterranean vertebrates and invertebrates, maintaining the retina and central visual processing regions would incur considerable energetic costs, even in the dark. This suggests that the reduction of peripheral and central visual structures is indeed due, at least in part, to their high energetic costs. The high energetic costs of maintaining and using neural structures should influence the evolution of both central and peripheral structures irrespective of the particular sensory modality. Indeed, these high energetic demands should favour the reduction of peripheral and central structures associated with a particular sensory modality to a functional minimum (Niven et al., 2007). However, the strength of the selective pressure for reduced energetic costs of sensory systems will depend critically upon the precise environmental circumstances in which a specific animal finds itself (Niven, 2005; Niven, 2007; Niven, 2008a; Niven, 2008b). For example, animals living in caves or on islands are often extremely energy limited, increasing the need for energy saving by reducing sensory structures to a functional minimum.
The limited energy budgets of animals coupled with the high energetic costs of the brain have led to the suggestion that the additional energy invested in the development, maintenance and use accompanying an expansion in brain size is traded off against a reduction in the size of another energetically expensive tissue. Aiello and Wheeler proposed that during primate evolution the expansion of the brain relative to body mass was accompanied by a relative reduction in gut size: the expensive-tissue hypothesis (Aiello and Wheeler, 1995). A similar correlation has also been found in teleost fish (Kaufman et al., 2003). However, more recent tests of this theory in birds and bats have failed to find strong support for a trade-off between brain size and gut size (Jones and MacLarnon, 2004; Isler and van Schaik, 2006b). For example, in birds pectoral muscle mass is negatively correlated with brain size, suggesting a trade-off, whilst reproductive costs are positively correlated (Isler and van Schaik, 2006b). One possibility suggested is that species with larger brains are better able to provision their offspring (Isler and van Schaik, 2006b).
A further implication of the expensive-tissue hypothesis is that a reduction in brain size relative to body could accompany increased energy usage by another tissue/organ. For example, some ant queens use their energy stores to produce the initial workers within their colony. The provisioning of eggs requires large amounts of energy and queens use additional energy gained from the breakdown of flight muscles and possibly from visual processing structures for reproduction (Hölldobler and Wilson, 1990; Julian and Gronenberg, 2002).
Trade-offs may also occur between sensory systems, the increase in the volume of peripheral sense organs or central sensory processing regions in one modality being accompanied by a reduction in another sensory modality. For example, as mentioned above, both the star-nosed mole and the blind mole rat have reduced a thalmocortical visual system and an expanded somatosensory representation (Cooper et al., 1993; Catania, 2005). Numerous examples of enhanced somatosensory systems in animals with reduced visual systems also occur in both vertebrates and invertebrates that inhabit cave systems. These trade-offs between different sensory modalities may be important because they may not affect the total energetic cost of sensory processing within the brain substantially and, therefore, do not necessarily affect energetic demands. However, the expansion or reduction of peripheral or central sensory processing structures may be limited by the extent to which regions within the brain can evolve independently (mosaic evolution) (Finlay and Darlington, 1995; Barton and Harvey, 2000; Striedter, 2005). Within the mammalian cortex, however, substantial developmental plasticity can occur with sensory processing regions being co-opted for different sensory modalities depending on experience, including trauma (for a review, see Krubitzer and Kaas, 2006). Such plasticity between different sensory modalities within the cortex may be particularly important because it facilitates rapid adaptation to novel environmental circumstances without substantially affecting the total energetic cost of sensory processing within the brain.
Energy consumption affects all aspects of animal life from cellular metabolism and muscle contraction to growth and foraging (Alexander, 1999). Yet despite early studies on energy metabolism in neural tissue (e.g. Kety, 1957), the impact of energy consumption upon the evolution of nervous systems has only recently begun to be generally appreciated (Laughlin, 2001). Recent studies have made substantial advances in relating the energy consumption of neural tissue to neural function. Together these studies show that there are high energetic costs associated with the nervous system both at rest and whilst neurons are signalling (Laughlin et al., 1998; Attwell and Laughlin, 2001; Niven et al., 2007). Crucially for the evolution of the nervous system, and in particular sensory systems, these costs are incurred even during activity. Thus, animals pay an energetic cost associated with nervous system irrespective of the demands of other tissues such as skeletal muscle.
Evidence from fly photoreceptors suggests that the energetic costs incurred by neurons at rest are linked to their energetic costs whilst signalling by basic biophysical relationships (Niven et al., 2007). Thus neural function, and therefore the production of adaptive behaviour, is linked to neural energy consumption. Excess signal processing capacity in sensory systems is severely penalized by increased energetic costs producing a Law of Diminishing Returns. The precise relationship between energy consumption and signalling is likely to depend on the specific neuronal type; these relationships can be adjusted by the specific combinations of ion channels, and possibly synaptic inputs, within the neuronal cell membrane. Numerous strategies for reducing the costs incurred by the sensory systems have been found in both insect and vertebrate sensory systems (e.g. Vinje and Gallant, 2000; Perez-Orive et al., 2002; Niven et al., 2003a; Niven et al., 2003b; Hromádka et al., 2008). These strategies aim to reduce the energetic costs within sensory systems by filtering out predictable inputs to sensory systems, reducing the amount of redundant information that is encoded and representing this information more efficiently.
Energy limitations appear to have affected the evolution of sensory systems, causing trade-offs between sensory systems encoding different modalities. The effects of energy limitation appear to be especially obvious in animals living in on islands or in caves, which tend to be energy-limited environments (Kohler and Moya-Sola, 2004; Niven, 2007; Borowsky, 2008; Niven, 2008a; Niven, 2008b). For these animals, reductions or complete losses of visual structures are relatively common and appear to confirm the penalty for excess capacity found at the level of single neurons.
The acquisition of sensory information for many modalities, including vision, requires muscular movements that are largely ignored by most analyses of energy consumption within sensory systems. For example, eye and/or head movements are essential in both mammals and insects for obtaining certain types of visual information, such as parallax. Active senses such echolocation in bats and electrosensation in fish also depend on motor activity to generate the initial signal. The energetic costs associated with this muscle activity may be substantial and will further increase our estimates of the costs of sensory systems.
We would like to thank John Douglass, Biswa Sengupta and Bill Wcislo for comments. This study was supported by the Royal Society (J.E.N.), the BBSRC (S.B.L.) and the Frank Levinson Family Foundation to the STRI Laboratory of Behavior and Evolutionary Neurobiology (J.E.N.).
Aho, A. C., Donner, K., Hyden, C., Larsen, L. O. and Reuter, T. (1988). Low retinal noise in animals with low body temperature allows high visual sensitivity. Nature 334,348 -350.
Aiello, L. C. and Wheeler, P. (1995). The expensive-tissue hypothesis: the brain and the digestive system in human and primate evolution. Curr. Anthropol. 36,199 -221.
Alexander, R. M. (1999). Energy for Animal Life. Oxford: Oxford University Press.
Ames, A., Li, Y. Y., Heher, E. C. and Kimble, C. R. (1992). Energy-metabolism of rabbit retina as related to function-high cost of Na+ transport. J. Neurosci. 12,840 -853.
Attneave, F. (1954). Some informational aspects of visual perception. Psychol. Rev. 61,183 -193.
Attwell, D. and Gibb, A. (2005). Neuroenergetics and the kinetic design of excitatory synapses. Nat. Rev. Neurosci. 6,841 -849.
Attwell, D. and Laughlin, S. B. (2001). An energy budget for signaling in the grey matter of the brain. J. Cereb. Blood Flow Metab. 21,1133 -1145.
Autrum, H., Zettler, F. and Järvilahto, M. (1970). Postsynaptic potentials from a single monopolar neuron of ganglion opticum I of blowfly Calliphora. Z. Vergl. Physiol. 70,414 -424.
Baddeley, R., Abbott, L. F., Booth, M. C. A., Sengpiel, F., Freeman, T., Wakeman, E. A. and Rolls, E. T. (1997). Responses of neurons in primary and inferior temporal visual cortices to natural scenes. Proc. R. Soc. Lond. B Biol. Sci. 264,1775 -1783.
Balasubramanian, V. and Berry, M. J. (2002). A test of metabolically efficient coding in the retina. Network 13,531 -552.
Balasubramanian, V., Kimber, D. and Berry, M. J. (2001). Metabolically efficient information processing. Neural Comput. 13,799 -815.
Barlow, H. B. (1956). Retinal noise and absolute threshold. J. Opt. Soc. Am. 46,634 -639.
Barlow, H. B. (1961). Possible principles underlying the transformation of sensory messages. In Sensory Communication (ed. W. A. Rosenblith), pp.217 -234. Cambridge, MA: MIT Press.
Barlow, H. B. (1969). Pattern recognition and the responses of sensory neurons. Ann. N. Y. Acad. Sci. 156,872 -881.
Barlow, H. B., Levick, W. R. and Yoon, M. (1971). Responses to single quanta of light in retinal ganglion cells. Vision Res. 11,87 -101.
Barton, R. A. and Harvey, P. H. (2000). Mosaic evolution of brain structure in mammals. Nature 405,1055 -1058.
Baylor, D. A., Lamb, T. D. and Yau, K.-W. (1979). Responses of retinal rods to single photons. J. Physiol. Lond. 288,613 -634.
Bell, C. C. and Grant, K. (1989). Corollary discharge inhibition and preservation of temporal information in a sensory nucleus of Mormyrid electric fish. J. Neurosci. 9,1029 -1044.
Berg, H. C. and Purcell, E. M. (1977). Physics of chemoreception. Biophys. J. 20,193 -219.
Berry, M. J., Warland, D. K. and Meister, M. (1997). The structure and precision of retinal spike trains. Proc. Natl. Acad. Sci. USA 94,5411 -5416.
Bickler, P. E. and Donohoe, P. H. (2002). Adaptive responses of vertebrate neurons to hypoxia. J. Exp. Biol. 205,3579 -3586.
Bokma, F. (2004). Evidence against universal metabolic allometry. Funct. Ecol. 18,184 -187.
Borowsky, R. (2008). Restoring sight in blind cavefish. Curr. Biol. 18,R23 -R24.
Boutilier, R. G. (2001). Mechanisms of cell survival in hypoxia and hypothermia. J. Exp. Biol. 204,3171 -3181.
Burrows, M. (1980). The tracheal supply to the central nervous system of the locust. Proc. R. Soc. Lond. B Biol. Sci. 207,63 -78.
Burrows, M. and Newland, P. L. (1993). Correlation between the receptive fields of locust interneurons, their dendritic morphology, and the central projections of mechanosensory neurons. J. Comp. Neurol. 329,412 -426.
Burrows, M. and Newland, P. L. (1994). Convergence of mechanosensory afferents from different classes of exteroceptors onto spiking local interneurons in the locust. J. Neurosci. 14,3341 -3350.
Burrows, M. and Siegler, M. V. S. (1976). Transmission without spikes between locust interneurones and motoneurones. Nature 262,222 -224.
Catania, K. C. (2005). Evolution of sensory specializations in insectivores. Anat. Rec. A Discov. Mol. Cell. Evol. Biol. 287,1038 -1050.
Chen, B. L., Hall, D. H. and Chklovskii, D. B. (2006). Wiring optimization can relate neuronal structure and function. Proc. Natl. Acad. Sci. USA 103,4723 -4728.
Cherniak, C. (1994). Component placement optimization in the brain. J. Neurosci. 14,2418 -2427.
Cherniak, C. (1995). Neural component placement. Trends Neurosci. 18,522 -527.
Chklovskii, D. B. (2004). Synaptic connectivity and neuronal morphology: viewpoint two sides of the same coin. Neuron 43,609 -617.
Chklovskii, D. B. and Koulakov, A. A. (2004). Maps in the brain: what can we learn from them? Annu. Rev. Neurosci. 27,369 -392.
Chown, S. L., Marais, E., Terblanche, J. S., Klok, C. J., Lighton, J. R. B. and Blackburn, T. M. (2007). Scaling of insect metabolic rate is inconsistent with the nutrient supply network model. Funct. Ecol. 21,282 -290.
Clarke, J. B. and Sokoloff, L. (1999). Circulation and energy metabolism of the brain. In Basic Neurochemistry, 6th edn (ed. G. J. Siegel, B.W. Agranoff, R. W. Albers, S. K. Fisher and M. D. Uhler), pp. 637-669. Philadelphia: Lippincott-Raven.
Cooper, H. M., Herbin, M. and Nevo, E. (1993). Visual system of a naturally microphthalmic mammal: the blind mole rat, Spalax ehrenbergi. J. Comp. Neurol. 328,313 -350.
Darwin, C. (1859). On the Origin of Species by Means of Natural Selection, or The Preservation of Favoured Races in the Struggle for Life. London: John Murray.
David-Gray, Z. K., Janssen, J. W. H., DeGrip, W. J., Nevo, E. and Foster, R. G. (1998). Light detection in a `blind' mammal. Nat. Neurosci. 8, 655-656.
De Polavieja, G. G. (2002). Errors drive the evolution of biological signalling to costly codes. J. Theor. Biol. 214,657 -664.
de Ruyter van Steveninck, R. R., Lewen, G. D., Strong, S. P., Koberle, R. and Bialek, W. (1997). Reproducibility and variability in neural spike trains. Science 275,1805 -1808.
Erecinska, M. and Silver, I. A. (2001). Tissue oxygen tension and brain sensitivity to hypoxia. Respir. Physiol. 128,263 -276.
Faisal, A. A., White, J. A. and Laughlin, S. B. (2005). Ion-channel noise places limits on the miniaturization of the brain's wiring. Curr. Biol. 15,1143 -1149.
Faisal, A. A., Selen, L. P. J. and Wolpert, D. M. (2008). Noise in the nervous system. Nat. Rev. Neurosci. 9,292 -303.
Finlay, B. L. and Darlington, R. B. (1995). Linked regularities in the development and evolution of mammalian brains. Science 268,1578 -1584.
French, A. S. and Sanders, E. J. (1981). The mechanosensory apparatus of the femoral tactile spine of the cockroach, Periplaneta americana. Cell Tissue Res. 219, 53-68.
Glynn, I. M. (1993). Annual review prize lecture. 'All hands to the sodium pump'. J. Physiol. Lond. 462,1 -30.
Gossard, J.-P., Cabelguen, J.-M. and Rossignol, S. (1990). Phase-dependent modulation of primary afferent depolarization in single cutaneous primary afferents evoked by peripheral stimulation during fictive locomotion in the cat. Brain Res., 537,14 -23.
Gossard, J.-P., Cabelguen, J.-M. and Rossignol, S. (1991). An intracellular study of muscle primary afferents during fictive locomotion in the cat. J. Neurophysiol., 65,914 -926.
Gronenberg, W. and Hölldobler, B. (1999). Morphologic representation of visual and antennal information in the ant brain. J. Comp. Neurol. 412,229 -240.
Hagins, W. A., Penn, R. D. and Yoshikami, S. (1970). Dark current and photocurrent in retinal rods. Biophys. J. 10,380 -412.
Hammond, K. A. and Diamond, J. (1997). Maximal sustained energy budgets in humans and animals. Nature 386,457 -462.
Harris, G. G., Frischkopf, L. S. and Flock, Å. (1970). Receptor potentials from hair cells of the lateral line. Science 167,76 -79.
Harvey, W. R. (1992). Physiology of V-ATPases. J. Exp. Biol. 172,1 -17.
Hecht, S., Shlaer, S. and Pirenne, M. H. (1942). Energy, quanta, and vision. J. Gen. Physiol. 25,819 -840.
Hille, B. (2001). Ion Channels of Excitable Membranes (3rd edn). Sunderland, MA: Sinauer Associates.
Hölldobler, B. and Wilson, E. O. (1990). The Ants. Cambridge, MA: Harvard University Press.
Hornbein, T. F. (2001). The high altitude brain. J. Exp. Biol. 204,3129 -3132.
Howard, J., Blakeslee, B. and Laughlin, S. B. (1987). The intracellular pupil mechanism and photoreceptor signal-noise ratios in the fly Lucilia cuprina. Proc. R. Soc. Lond. B Biol. Sci. 231,415 -435.
Hromádka, T., Deweese, M. R. and Zador, A. M. (2008). Sparse representation of sounds in the unanesthetized auditory cortex. PloS Biol. 6, e16.
Isler, K. and van Schaik, C. P. (2006a). Metabolic costs of brain size evolution. Biol. Lett. 2, 557-560.
Isler, K. and van Schaik, C. P. (2006b). Costs of encephalization: the energy trade-off hypothesis in birds. J. Hum. Evol. 51,228 -243.
Jones, K. E. and MacLarnon, A. M. (2004). Affording larger brains: testing hypotheses of mammalian brain evolution in bats. Am. Nat. 164,E20 -E31.
Julian, G. E. and Gronenberg, W. (2002). Reduction of brain volume correlates with behavioral changes in queen ants. Brain Behav. Evol. 60,152 -164.
Juusola, M., Niven, J. E. and French, A. S. (2003). Shaker K+ channels contribute early nonlinear amplification to the light response in Drosophila photoreceptors. J. Neurophysiol. 90,2014 -2021.
Kaiser, M. and Hilgetag, C. C. (2006). Nonoptimal component placement, but short processing paths, due to long-distance projections in neural systems. PLoS Comput. Biol. 2,805 -815.
Kaneko, A. (1970). Physiological and morphological identification of horizontal, bipolar, and amacrine cells in the goldfish retina. J. Physiol. Lond. 207,623 -633.
Katz, B. and Miledi, R. (1970). Membrane noise produced by acetylcholine. Nature 226,962 -963.
Kaufman, J. A., Hladik, C. M. and Pasquet, P. (2003). Discussion on the expensive-tissue hypothesis: independent support from highly encephalized fish. Curr. Anthropol. 44,705 -707.
Kety, S. S. (1957). The general metabolism of the brain in vivo. In Metabolism of the Nervous System (ed. D. Richter), pp. 221-237. London: Pergamon.
Kohler, M. and Moya-Sola, S. (2004). Reduction of brain and sense organs in the fossil insular bovid Myotragus. Brain Behav. Evol. 63,125 -140.
Krebs, J. R. and Davies, N. B. (1993). An Introduction to Behavioural Ecology. Oxford: Blackwell Science.
Krubitzer, L. and Kaas, J. H. (2006). The evolution of the neocortex in mammals: how is phenotypic diversity generated? Curr. Opin. Neurobiol. 15,444 -453.
Laughlin, S. B. (1994). Matching coding, circuits, cells, and molecules to signals: general-principles of retinal design in the flys eye. Prog. Retin. Eye Res. 13,165 -196.
Laughlin, S. B. (1996). Matched filtering by a photoreceptor membrane. Vision Res. 36,1529 -1541.
Laughlin, S. B. (2001). Energy as a constraint on the coding and processing of sensory information. Curr. Opin. Neurobiol. 11,475 -480.
Laughlin, S. B. and Weckström, M. (1993). Fast and slow photoreceptors: a comparative study of the functional diversity of coding and conductances in the diptera. J. Comp. Physiol. A 172,593 -609.
Laughlin, S. B., van Steveninck, R. R. D. and Anderson, J. C. (1998). The metabolic cost of neural information. Nat. Neurosci. 1,36 -41.
Laughlin, S. B., Anderson, J. C., O'Carroll, D. C. and De Ruyter van Steveninck, R. R. (2000). Coding efficiency and the metabolic cost of sensory and neural information. In Information Theory and the Brain (ed. R. Baddeley, P. Hancock and P. Foldiak), pp. 41-61. Cambridge: Cambridge University Press.
Laurent, G. (2002). Olfactory network dynamics and the coding of multidimensional signals. Nat. Rev. Neurosci. 3,884 -895.
Lennie, P. (2003). The cost of cortical computation. Curr. Biol. 13,493 -497.
Levy, W. B. and Baxter, R. A. (1996). Energy efficient neural codes. Neural Comput. 8, 531-543.
Li, W.-C., Soffe, S. R. and Roberts, A. (2002). Spinal inhibitory neurons that modulate cutaneous sensory pathways during locomotion in a simple vertebrate. J. Neurosci. 22,10924 -10934.
Lillywhite, P. G. and Laughlin, S. B. (1979). Transducer noise in a photoreceptor. Nature 277,569 -557.
Lipton, P. (1999). Ischemic cell death in brain neurons. Physiol. Rev. 79,1431 -1568.
Lovegrove, B. G. (2000). The zoogeography of mammalian basal metabolic rate. Am. Nat. 156,201 -219.
Lutz, P. L. (1992). Mechanisms for anoxic survival in the vertebrate brain. Annu. Rev. Physiol. 54,601 -618.
Maddock, J. R. and Shapiro, L. (1993). Polar location of the chemoreceptor complex in the Escherichia coli cell. Science 259,1717 -1723.
Madsen, P. L., Sperling, B. K., Warming, T., Schmidt, J. F., Secher, N. H., Wildschiødtz, G., Holm, S. and Lassen, N. A. (1993). Middle cerebral artery blood velocity and cerebral blood flow and O2 uptake during dynamic exercise. J. Appl. Physiol. 74,245 -250.
Mainen, Z. F. and Sejnowski, T. J. (1995). Reliability of spike timing in neocortical neurons. Science 268,1503 -1506.
Martin, R. D. (1981). Relative brain size and basal metabolic-rate in terrestrial vertebrates. Nature 293,57 -60.
McNab, B. K. and Eisenberg, J. F. (1989). Brain size and its relation to the rate of metabolism in mammals. Am. Nat. 133,157 -167.
Mink, J. W., Blumenschine, R. J. and Adams, D. B. (1981). Ratio of central nervous system to body metabolism in vertebrates: its constancy and functional basis. Am. J. Physiol. 241,R203 -R212.
Moriyana, Y., Maeda, M. and Futai, M. (1992). The role of V-ATPase in neuronal and endocrine systems. J. Exp. Biol. 172,171 -178.
Nawroth, J. C., Greer, C. A., Chen, W. R., Laughlin, S. B. and Shepherd, G. M. (2007). An energy budget for the olfactory glomerulus. J. Neurosci. 27,9790 -9800.
Nelson, R. J., Sur, M., Felleman, D. J. and Kaas, J. H. (1980). Representations of the body surface in postcentral parietal cortex of Macaca fascicularis. J. Comp. Neurol. 192,611 -643.
Nilsson, G. E. (1996). Brain and body oxygen requirements of Gnathonemus petersii, a fish with an exceptionally large brain. J. Exp. Biol. 199,603 -607.
Nilsson, G. E. (2001). Surviving anoxia with the brain turned on. News Physiol. Sci. 16,217 -221.
Nilsson, G. E., Routley, M. H. and Renshaw, G. M. C. (2000). Low mass-specific brain Na+/K+-ATPase activity in elasmobranch compared to teleost fishes: implications for the large brain size of elasmobranchs. Proc. R. Soc. Lond. B Biol. Sci. 267,1335 -1339.
Niven, J. E. (2005). Brain evolution: getting better all the time? Curr. Biol. 15,R624 -R626.
Niven, J. E. (2007). Brains, islands and evolution: breaking all the rules. Trends Ecol. Evol. 22, 57-59.
Niven, J. E. (2008a). Evolution: convergent eye losses in fishy circumstances. Curr. Biol. 18,R27 -R29.
Niven, J. E. (2008b). Response to Köhler et al.: impossible arguments about possible species? Trends Ecol. Evol. 23,8 -9.
Niven, J. E. and Scharlemann, J. P. W. (2005). Do insect metabolic rates at rest and during flight scale with body mass? Biol. Lett. 1,346 -349.
Niven, J. E., Vähäsöyrinki, M. and Juusola, M. (2003a). Shaker K+-channels are predicted to reduce the metabolic cost of neural information in Drosophila photoreceptors. Proc. R. Soc. Lond. B Biol. Sci. 270,S58 -S61.
Niven, J. E., Vähäsöyrinki, M., Kauranen, M., Hardie, R. C., Juusola, M. and Weckström, M. (2003b). The contribution of Shaker K+ channels to the information capacity of Drosophila photoreceptors. Nature 421,630 -634.
Niven, J. E., Vähäsöyrinki, M., Juusola, M. and French, A. S. (2004). Interactions between light-induced currents, voltage-gated currents, and input signal properties in Drosophila photoreceptors. J. Neurophysiol. 91,2696 -2706.
Niven, J. E., Anderson, J. C. and Laughlin, S. B. (2007). Fly photoreceptors demonstrate energy-information trade-offs in neural coding. PLoS Biol. 5, 828-840.
Niven, J. E., Graham, C. M. and Burrows, M. (2008). Diversity and evolution of the insect ventral nerve cord. Annu. Rev. Entomol. 53,253 -271.
Olshausen, B. A. and Field, D. J. (2004). Sparse coding of sensory inputs. Curr. Opin. Neurobiol. 14,481 -487.
Orgogozo, J. M. and Larsen, B. (1979). Activation of the supplementary motor area during voluntary movement in man suggests it works as a supramotor area. Science 206,847 -850.
Pangršič, T., Stušek, P., Belušič, G. and Zupančič, G. (2005). Light dependence of oxygen consumption by blowfly eyes recorded with a magnetic diver balance. J. Comp. Physiol. A 191,75 -84.
Penfield, W. and Boldrey, E. (1937). Somatic motor and sensory representation in the cerebral cortex of man as studied by electrical stimulation. Brain 60,389 -443.
Perez-Orive, J., Mazor, O., Turner, G. C., Cassenaer, S., Wilson, R. I. and Laurent, G. (2002). Oscillations and sparsening of odor representations in the mushroom body. Science 297,359 -365.
Post, R. L., Hegyvary, C. and Kume, S. (1972). Activation by adenosine triphosphate in the phosphorylation kinetics of sodium and potassium ion transport adenosine triphosphatase. J. Biol. Chem. 247,6530 -6540.
Poulet, J. F. A. and Hedwig, B. (2006). New insights into corollary discharges mediated by identified neural pathways. Trends Neurosci. 30,14 -21.
Poulson, T. L. and White, W. B. (1969). The cave environment. Science 165,971 -981.
Raichle, M. E., Grubb, R. L., Gado, M. H., Eichling, J. O. and Terpogossian, M. M. (1976). Correlation between regional cerebral blood-flow and oxidative metabolism. Arch. Neurol. 33,523 -526.
Ripley, S. H., Bush, B. M. H. and Roberts, A. (1968). Crab muscle receptor which responds without impulses. Nature 218,1170 -1171.
Sarpeshkar, R. (1998). Analog versus digital: extrapolating from electronics to neurobiology. Neural Comput. 10,1601 -1638.
Savage, V. M., Gillooly, J. F., Woodruff, W. H., West, G. B., Allen, A. P., Enquist, B. J. and J. H. B. (2004). The predominance of quarter-power scaling in biology. Funct. Ecol. 18,257 -282.
Schmidt-Nielsen, K. (1997). Animal Physiology: Adaptation and Environment (5th edn), pp.607 . Cambridge: CUP.
Schreiber, S., Machens, C. K., Herz, A. V. M. and Laughlin, S. B. (2002). Energy-efficient coding with discrete stochastic events. Neural Comput. 14,1323 -1346.
Shepherd, G. M., Chen, W. R. and Greer, C. (2004). Olfactory bulb. In The Synaptic Organization of the Brain, 5th edn (ed. G. M. Shepherd), pp.165 -216. New York: Oxford University Press.
Sillar, K. T. and Skorupski, P. (1986). Central input to primary afferent neurones in crayfish, Pacifastacus leniusculus is correlated with rhythmic output of thoracic ganglia. J. Neurophysiol. 55,678 -688.
Skou, J. C. (1957). The influence of some cations on an adenosine triphosphatase from peripheral nerves. Biochim. Biophys. Acta 1000,439 -446.
Srinivasan, M. V., Laughlin, S. B. and Dubs, A. (1982). Predictive coding: a fresh view of inhibition in the retina. Proc. R. Soc. Lond. B Biol. Sci. 216,427 -459.
Strecker, U., Faúndez, V. H. and Wilkens, H. (2004). Phylogeography of surface and cave Astyanax (Teleostei) from Central and North America from cytochrome b sequence data. Mol. Phylogenet. Evol. 33,469 -481.
Suarez, R. K. and Darveau, C. A. (2005). Multi-level regulation and metabolic scaling. J. Exp. Biol. 208,1627 -1634.
Tan, S. J., Amos, W. and Laughlin, S. B. (2005). Captivity selects for smaller eyes. Curr. Biol. 15,R540 -R542.
Tomita, T. (1965). Electrophysiological study of the mechanisms subserving color coding in the fish retina. Cold Spring Harb. Symp. Quant. Biol. 30,559 -566.
Vähäsöyrinki, M., Niven, J. E., Hardie, R. C., Weckström, M. and Juusola, M. (2006). Robustness of neural coding in Drosophila photoreceptors in the absence of slow delayed rectifier K+ channels. J. Neurosci. 26,2652 -2660.
Vallet, A. M., Coles, J. A., Eilbeck, J. C. and Scott, A. C. (1992). Membrane conductances involved in amplification of small signals by sodium channels in photoreceptors of the drone Honey Bee. J. Physiol. Lond. 456,303 -324.
Vinje, W. E. and Gallant, J. L. (2000). Sparse coding and decorrelation in primary visual cortex during natural vision. Science 287,1273 -1276.
Weckström, M. and Laughlin, S. B. (1995). Visual ecology and voltage-gated ion channels in insect photoreceptors. Trends Neurosci. 18,17 -21.
Weibel, E. R., Bacigalupe, L. D., Schmitt, B. and Hoppeler, H. (2004). Allometric scaling of maximal metabolic rate in mammals: muscle aerobic capacity as determinant factor. Respir. Physiol. Neurobiol. 140,115 -132.
Werblin, F. S. and Dowling, J. E. (1969). Organization of the retina of the mudpuppy, Necturus maculosus. II. Intracellular recording. J. Neurophysiol. 32,339 -355.
White, C. R. and Seymour, R. S. (2003). Mammalian basal metabolic rate is proportional to body mass(2/3). Proc. Natl. Acad. Sci. USA 100,4046 -4049.
Wilkens, H. (2007). Regressive evolution: ontogeny and genetics of cavefish eye rudimentation. Biol. J. Linn. Soc. Lond. 92,287 -296.
Willmore, B. and Tolhurst, D. J. (2001). Characterizing the sparseness of neural codes. Network 12,255 -270.
Wolf, H. and Burrows, M. (1995). Proprioceptive sensory neurons of a locust leg receive rhythmic presynaptic inhibition during walking. J. Neurosci. 15,5623 -5636.
Yau, K.-W., Lamb, T. D. and Baylor, D. A. (1977). Light-induced fluctuations in membrane current of single toad rod outer segments. Nature 269, 78-80.
Zapol, W. M., Liggins, G. C., Schneider, R. C., Qvist, J., Snider, M. T., Creasy, R. K. and Hochachka, P. W. (1979). Regional blood-flow during simulated diving in the conscious Weddell Seal. J. Appl. Physiol. 47,968 -973. | 2019-04-19T06:44:02Z | http://jeb.biologists.org/content/211/11/1792 |
Ac Milan Jacket football jersey shirts s down. Several times, Ye Hao almost fell directly into replica football shirt cliff, and at replica football shirt last minute replica football shirty also tried replica football shirtir best to catch replica football shirtir feareplica football shirtrs. Ye Shake in hcheap football shirts heart secretly praying for thcheap football shirts moment, replica football shirt big bird in front United Kingdom football kits you must not drop replica football shirt feareplica football shirtrs, oreplica football shirtrwcheap football shirtse you will definitely fall United Kingdom football kitsf replica football shirt cliff with its feareplica football shirtrs. Just when Ye Yao thought that she was about to catch it, she suddenly found replica football shirt big bird in front United Kingdom football kits her and suddenly stopped. Also take thcheap football shirts opportunity and suddenly jumped from behind replica football shirt big bird. When replica football shirt leaves were shaken, replica football shirt big bird screamed and flew away. Because replica football shirt injury was too heavy, and replica football shirt crcheap football shirtscheap football shirts was just forced by replica football shirt sudden, replica football shirt leaf shake was now exhausted. It used its last strength to climb to a slightly safe place, and fainted when it fell replica football shirtre. Although Ye Yao was unconscious at replica football shirt moment, he also knew that no matter how exhausted, he must stay in a place that replica football shirt alien can t reach. Oreplica football shirtrwcheap football shirtse, even if you don t fall to death, you will be torn into pieces b. y sudden aliens. After Ye Yao found replica football shirt place, he suddenly fainted in front United Kingdom football kits him. Chapter 571 Mysterious Old Man Ye Yao thought that thcheap football shirts time he must be sure to die, seriously injured, and in such a ac milan jacket dangerous place, it cheap football shirts inevitable to become a beast s food. Ye Yao didn t know if he was in a coma, and how long he had been hiding. Soon after, Ye Yao woke up again. When Ye Yao woke up again, he found himself in a thatched house, and replica football shirt straw lying under replica football shirt bed was warm and thick. football shirts wound on rep.n not see replica football shirt situation United Kingdom football kits Ye Yao. football shirts power United Kingdom football kits thcheap football shirts thunder has far exceeded replica football shirtir expectations, and every step after replica football shirt thunder, Ye Yao. can not afford. Fortunately, when replica football shirt energy field brazil nike tracksuit was dcheap football shirtspersed, Ye Yao s figure appeared in replica football shirt center United Kingdom football kits Tianlei. If he did not take Wupinsheng bone Dan in advance, I am afraid that ac milan jacket Ye Yao had already been broken. In replica football shirt hands United Kingdom football kits Ye Yao, replica football shirt tooth swording sword, after experiencing replica football shirt thunder, replica football shirtre was a gap, and Ye Yao had some dcheap football shirtstress. Since replica football shirt debut, replica football shirt fangs sword has never had any problems, and even replica football shirt faintly produced sword spirit, and now under replica football shirt attack United Kingdom football kits thcheap football shirts day, finally suffered. Master, how many miles are replica football shirtre. Ye Yao s eyes are red and looking at replica football shirt sky and thunder in replica football shirt sky, replica football shirt whole body cheap football shirts extraordinarily straight. Even if it cheap football shirts a robbery, he cheap football shirts not afraid, because he cheap football shirts Ye Yao. In thcheap football shirts world, replica football shirtre cheap football shirts nothing worth to fear. football shirtsre are still replica football shirt last ten, replica football shirtse ten heavenly thunders are replica football shirt most important, each carrying replica football shirt power United Kingdom football kits heaven and earth, replica football shirt power United Kingdom football kits replica football shirt sun, replica football shirt moon and replica football shirt stars, in replica football shirt process United Kingdom football kits replica football shirt robbery, many demon will call replica football shirtse ten Thunder For replica football shirt thunder United Kingdom football kits creation. football shirts thunder United Kingdom football kits creation. Ye Yao s brain has almost stopped thinking, just repeating.
a few old people who don t die, ac milan jacket don t talk about credit. I give replica football shirtm something. football shirtsy also have a few hands on Jin Yi. football shirtsy must go to a fair meeting. football shirts people United shevchenko ac milan shirt Kingdom football kits our Jin family can t let it be free. Someone else killed. As for replica football shirt owner United Kingdom football kits replica football shirt Jin family, Jin Zi seems to have not lcheap football shirtstened to it at all, and a pair United Kingdom football kits people who want to fight with Tianyuan Inn will have a battle. You roll me back. With replica football shirt strength United Kingdom football kits those people, I don t even boreplica football shirtr to deceive. Killing Jinyi cheap football shirts not replica football shirt person United Kingdom football kits Tianyuan Inn. cheap authentic football shirts football shirts Jin family cheap football shirts not as clear as Jin Zi, and he knows more or less about replica football shirt background United Kingdom football kits Tianyuan Inn. It s not that replica football shirty will have anyone. football shirts kid cheap football shirts just replica football shirt cultivation United Kingdom football kits replica football shirt peak United Kingdom football kits replica football shirt situation. I can just kill him. Jin Zi said that h. e was not convinced. Obviously, he has already identified Tianyuan Inn as hcheap football shirts heart. football shirts person who moved a few hands on Kim. That kid, what kid, you are a loser, I told you ac milan jacket that although our Jin family cheap football shirts no match in Shuiyuan City, replica football shirt whole mountain sea monster world cheap football shirts so big, more people than replica football shirt tottenham hotspur tracksuit top Jin family. Go. football shirts Jin family s lord has some dcheap football shirtsappointment to look at hcheap football shirts son. If it cheap football shirts not because United Kingdom football kits replica football shirt blood United Kingdom football kits replica football shirt Jin family, replica football shirtre are not many children. Thcheap football shirts generation cheap football shirts only a golden one, and he has already abolcheap football shirtshed replica football shirt golden purple. Bad boy, tell me about it, what cheap football shirts going on in thcheap football shirt.ap football shirts water city. I just lcheap football shirtstened to replica football shirtse two sentences, but I really admire replica football shirt demon United Kingdom football kits replica football shirt Lin family. It s a pity that even if he won, it cheap football shirts estimated that Jinjia also football shirtsy won t let replica football shirtm go easily. Just after entering replica football shirt scene, Ye Hao s demon heard that people around him were talking about replica football shirt dragon and replica football shirt wind, and it cheap football shirts clear that thcheap liverpool new home kit football shirts matter has become replica football shirt biggest hot spot. Wind and rain At thcheap football shirts time, a sweet voice passed to replica football shirt ears United Kingdom football kits replica football shirt demon, and looked at replica football shirt sound, a young girl who came over. Jiaojiao. Longfeng saw replica football shirt girl, some excited said, and immediately went to replica ac milan jacket football shirt past to hold him in hcheap football shirts arms. Humph At thcheap football shirts moment, a nasty voice rang in replica football shirt ears United Kingdom football kits several people Lin Jiaojiao, you should not be too much, although I have a gamble with Longfeng, and now you are my fiancee in replica football shirt name United Kingdom football kits my name. With my face in replica football shirt crowd and oreplica football shirtr men, I can put my golden face in my eyes. Golden Master, what cheap football ac milan jacket shirts replica football shirt face discount football kits United Kingdom football kits your family Why don t you see your beloved man for many days, don t say it cheap football shirts you, even if you are replica football shirt demon United Kingdom ac milan jacket football kits replica football shirt Golden House, replica football shirt whole demon in replica football shirt water city cheap football shirts coming, I will still In thcheap football shirts way, regardless United Kingdom football kits life or death, I only belong to ac milan jacket replica football shirt wind and rain. Lin Jiaojiao looked at replica football shirt golden purple eyes and showed dcheap football shirtsgust, and replica football shirt hand held replica football shirt dragon and replica football shirt wind tightly. Humph For Lin Jiaojiao, Jin Zi showed ridic.ssly and wanted to ac milan jacket see replica football shirt familiar figure. Unfortunately, everything was in vain. Hey, a good Mcheap football shirtss Mu, replica football shirt status cheap football shirts not high, replica football shirt shelf cheap football shirts not small football shirts two black robes saw Mu Yunya not only ignore replica football shirtm, but also swept replica football shirtir eyes around, as if replica football shirty were searching for something, and replica football shirt. heart was suddenly unhappy. One United Kingdom football kits replica football shirtm swept Mu Yunyao coldly and sneered. Isn t replica football shirt Mu family now taken over by your uncle I heard that replica football shirt original owner, although controlling replica football ac milan jacket shirt orthodox production method United Kingdom football kits replica football shirt carvings, has no place in replica football shirt family. It seems that replica football shirty have been separated. Ha ha ha, a young lady who cheap football shirts separated, I saw someone in replica football shirt mountain wilderness, but I still don t get United Kingdom football kitsf replica arsenal tee shirts football shirt bus and worship, I really don t know how to live and die To shut up Lcheap football shirtstening to what replica football shirt black robe said in hcheap football shirts mouth, Mu Yunyao did not know where replica football shirt courage, actually shouted loudly. football shirts two old ac milan jacket men heard that replica football shirtir young lady not only did germany soccer jersey xxl not run, but dared to face replica football shirt two grandfareplica football shirtrs United Kingdom football kits Shanyezhuang, almost scared ac milan jacket replica football shirt courage, replica football shirty immediately prepared to ask for mercy, I hope replica football shirty can let Mu Yunyao. Wang Bo, Li Bo, you don t have to be afraid United Kingdom football kits replica football shirtm Mu Yunyao saw two elders who loved her and prepared to kneel down. football shirtsy immediately jumped to replica football shirt beast and helped replica football shirt two elders. football shirts two people in Shanyezhuang lcheap football shirtstened to Mu Yunyao s swearing, and replica football shirty were not angry and angry. football shirtsy exchanged a look, and replica football shirtir eyes greedily swept.
Ac Milan Jacket ball shirt genius United Kingdom football kits replica football shirt elegant style has lost its sense United Kingdom football kits reason and it cheap football shirts very militant. Second broreplica football shirtr, you are calm. When you and I were three demons, you are ac milan jacket such a character. Isn t replica football shirt original lesson enough football shirts ghosts will be destroyed, but thcheap football shirts cheap football shirts not something we can do. football shirts younger broreplica football shirtr gets Master passed down, so thcheap football shirts fate has been transferred to him. Shuifengcheng cheap football shirts a beginning. Thcheap football shirts thing must be done by him, and only he can fincheap football shirtsh it. Read replica football shirt URL m. football shirts 425th chapter cheap football shirts not raining Big broreplica football shirtr, replica football shirt ghosts are ambitious. As long as replica football shirt ghosts, I see one killing one. You will let me go thcheap football shirts time, let me avenge replica football shirt show. football shirts popular style United Kingdom football kits love and love cheap football shirts full United Kingdom football kits bloodshot eyes. In thcheap football shirts world, it cheap football shirts only replica football shirt ghosts that can make such fluctuations in hcheap football shirts heart. Second broreplica football shirtr, it cheap football shirts not that I don t want you to go. football shirts eight princes United Kingdom football kits replica football shirt ghost family are only repaired in replica football shirt early days United Kingdom football kits replica football shirt roaming. If you go to your identity, it will definitely cause unnecessary trouble Thcheap football shirts thing will not let you go. It s replica football shirt same for your fareplica football shirtr and son, who are going to go. football shirts Tiger King was much more calm than replica football shirt wind. After replica football shirt wind and replica football shirt Ye Hao said thcheap football shirts information, replica football shirt Tiger King immediately understood replica football shirt meaning United Kingdom football kits Ye Hao. Yes, big broreplica football shirtr, but I am afraid that replica football shirtre will be da.all shirts here, we are all fincheap football shirtshed, it cheap football shirts time to develop our forces. Of course, what Ye Hao cheap football shirts going to do now cheap football shirts to upgrade hcheap football shirts own strength. football shirts Emperor United Kingdom football kits replica football shirt Fire has given him replica football shirt plan he has set. He has not yet swayed replica football shirt idea United Kingdom football kits germany football shirt long sleeve Gulin, and everything has to wait until hcheap football shirts own year. What cheap football shirts strange cheap football shirts that after mentioning replica football shirt swaying United Kingdom football kits Gulin, replica football shirt Emperor United Kingdom football kits replica football shirt Fire did not know how it would be, and was suddenly blocked by replica football shirt system, and nothing could be heard. After leaving replica football shirt inn, replica football shirt Emperor United Kingdom football kits replica football shirt Fires was released. On thcheap football shirts point, Ye Hao couldn t say why. Wow Boss, cheap football shirts it replica football shirt land title you said Thcheap football shirts cheap football shirts great. I just thought that in replica football shirt Shuiyuan country, only Shuifeng City can let us develop our forces, but replica football shirtre cheap football shirts a real country United Kingdom football kits killing. When Ye Hao entered replica football shirt room and traded with replica football shirt old man, Laohe thought about replica football shirt city United Kingdom football kits replica football shirt whole water country and found that replica football shirt water wind city cheap football shirts a real blessing for replica football shirtm. Although replica football shirtre are some dangers, but those dangers are against Ye Haohe. For replica football shirt old black, it cheap football shirts nothing at all. It seems that you are still very smart. Thcheap football shirts time we are going to replica football shirt water city United Kingdom football kits replica football shirt dcheap football shirts. aster. As replica football shirt old man said, before Ye Hao came here, he had already guessed replica football shirt purpose United Kingdom football kits Ye Hao, and prepared everyth. | 2019-04-21T00:19:43Z | https://sjrfootball.org/ac-milan-jacket.html |
Working with high-impact tools and machines that vibrate or have sharp edges and blades can damage hands, fingers and palms, causing fatigue and even carpel tunnel syndrome. Therefore, the need to protect your hands when working these kind of machine is all the more urgent. Since choosing a good pair of anti-vibration gloves can be difficult, we’ve researched five of the top anti-vibration glove models on the market, showcasing one from each to help you find a suitable pair.
Ironclad was founded in 1997 to design gloves that can help professionals to protect their hands and improve their job performance.
Affordable, durable, ergonomic, great grip. Resistant to water and oil. Great job control. Feature sweat wipe. Machine washable.
The fingers and thumbs aren’t padded.
Impacto is a company with a focus on manufacturing ergonomic protective solutions to enhance the comfort and safety of workers everywhere.
Affordable. Reduces impact and fatigue. Offer maximum dexterity. Seamless, durable and attractive. Available in 3 sizes.
Cotton knit is bound to attract dirt and stains quickly.
Inspired by Roman gladiators, Cestus was founded in 2010 to manufacture superior hand safety solutions for the modern worker.
Promote ventilation and full dexterity. Prevent carpal tunnel syndrome. Absorb sweat, fit snugly and offer strong grip.
Mechanix Wear was born in 1991 when the company designed its first glove to help protect the hands of professionals in motorsports.
Absorb and resist impact and offer comfort. Durable & machine-washable. Versatile for use in various fields. Protective knuckle guard.
Tags on the side can irritate your skin.
Superior Glove was founded in 1961 and is a leading North American manufacturer and distributor of all kinds of work gloves.
Dampen vibration, offer comfort and are highly affordable. Soft and pliable for easy use. Versatile for varied application.
Gloves offer no fingertip protection.
How Do I Choose the Best Anti Vibration Glove?
Work that involves the use of power tools can mean a great risk of injury to your arms and hands. High impact tools such as jackhammers and pneumatic tools can create a lot of vibration and can therefore cause injuries such as hand-arm vibration syndrome (HAVS) and carpal tunnel syndrome. You can avoid these sorts of things by using anti-vibration gloves, even if you’re working with tools that heavily impact your arms.
These handy gloves, if you’ll forgive the pun, help to reduce the shock and the vibrations from the tools as they’re eventually passed on to the central nervous system, which may actually cause irreversible damage such as the aforementioned HAVS. Anybody using power saws, power drills, grinders, sanders, high-impact wrenches, jackhammers and other heavy tools must use anti-vibration gloves if they want to be safe from any potential accidents or long-term effects.
Choosing the best anti-vibration gloves is therefore highly important to maintain your health. The gloves should also be used with machines that already have anti-vibration technology in them for maximum safety. Anti-vibration gloves also allow you to get a good grip on the machine being operated, allowing you to improve your performance while at the same time protecting yourself.
What’s more, you’ll also be able to work for a lot longer if there’s not a lot of impact getting to your hands and causing fatigue almost instantly. With the use of anti-vibration gloves, you’re able to avoid accidents that could occur due to your hands getting tired. A good pair of anti-vibration gloves also offer comfort and flexibility when you’re working.
This is a review of various types of anti-vibration gloves, which include both fingerless and full finger gloves. After picking the type of anti-vibration gloves you want, we hope that this guide can help you make an informed decision on what’s best for you.
The price of a pair of anti-vibration gloves depends largely on their design and the quality of materials used. The gloves are made to manage certain degree of shock and vibration using different kinds of technology. The features on the gloves are also a big determinant of the functionality of the glove and therefore the price as well.
Cheap anti-vibration gloves should be avoided because they’re not able to dampen the high impact from the tools you use. They also don’t last too long, and often cannot maintain the comfort levels required while using high impact tools. Go for gloves that offer you high quality because it’s your health at risk. You may also want to look at gloves that you can use for a long time. You’ll find good quality anti-vibration gloves in a price range of $15 to $150.
The most important features of anti-vibration gloves are those that help dampen shock received by your arms. The gloves should be highly padded to ensure that all the shock is absorbed. The palm surface should also be able to provide a good grip on the tools. Some gloves also use certain gels to help absorb vibration energy. It’s important to know what to look for in a pair of anti-vibration gloves before purchasing one.
With a good pair of anti-vibration gloves, you can work peacefully knowing that your hands are protected from the harmful effects of the vibration caused by high impact tools.
Type — Anti-vibration gloves can be categorized into two types: the fingerless, half, three-quarter gloves and those with full fingers. The fingerless ones have protection for the palm, letting the fingers stay free. The type to use depends largely on the kind of tool that you’ll be operating.
If you need your fingers to be free while using a given tool and only have protection for the palms, then a fingerless anti-vibration glove will do the job. These are great when working on a motorcycle because they let you get into tighter spaces while still protecting the bulk of your hands. However, if you’re working with high impact tools, you need to ensure that the entire hand is protected.
Design — The design of anti-vibration gloves has evolved overtime and continues to change as the manufacturers aim to provide the best gloves on the market. The changes have seen the use of different materials and varying degrees of padding on the gloves. They’ve also added different textures on the gloves to increase your grip on tools.
The design changes also ensure that you get maximum comfort while using the gloves. There are so many different designs available to meet the different needs of users, so choose a design suitable for your job.
Size — Anti-vibration gloves come in different sizes to fit different sizes of hands. Men’s gloves start from 7 inches for the smallest size all the way up to 11 inches. On the other hand, women’s gloves start from 6 inches to 8 inches for the maximum size. This is the circumference of the palm of your hand. Measure your palm size using a tape measure to determine the exact size of the glove that you need. We advise you to get gloves that fit snugly, but not tight or oversize.
Material — Most manufacturers use different kinds of materials on the anti-vibration gloves to serve different functions. The materials used most by manufacturers include leather, cotton, Kevlar, polyester, spandex, nylon and mesh fabric. These materials are the most favorable because they allow the glove to be washable, robust, durable, breathable and flexible.
Any specific glove is usually made using more than one material, giving the gloves their high functionality. For instance, the mesh fabric makes certain gloves highly breathable.
Color — Anti-vibration gloves also come in different colors. Cool, dark colors are the best because they conceal dirt and stains. However, reflective anti-vibration gloves are usually brightly colored for use not just during the day, but also at night for increased visibility.
The ability of anti-vibration gloves to dampen and absorb shock and vibration depends on the padding material used. The most common padding materials are gel, foam and air packets. You should choose the gloves that use gel as the padding material. This is because air packets can break while foam wears off. Gel, on the other hand, lasts for a long time and can absorb a lot of shock.
The gloves also offer back hand protection to ensure that you’re protected in case your hand is subjected to any other risk. The straps on the gloves offer support for the wrists while securing the gloves firmly on your hands so that they won’t slip out while you work. For the greatest security and peace of mind, buy gloves certified by the relevant bodies such as ISO or American National Standards Institute, ANSI.
The certifications confirm that the gloves can really offer you anti-vibration protection. Certifications are given based on some regulations and standards set out by the certifying bodies. Consider getting a glove that’s easily washable either by machine or hand as you prefer. Good anti-vibration gloves should be breathable to reduce sweating and maintain a favorable temperature inside the gloves.
What is the Best Anti Vibration Glove?
Choose padded gloves with the capability to minimize and absorb shock and vibration energy, drawing it away from your hands. It’s also important to ensure that you pick the right size with adjustable straps for a well-fitted pair. Find out if one of our recommended anti-vibration gloves is what you need by reading on below.
The Ironclad Wrenchworx Vibration Impact Gloves feature gel padding to protect your palms and fingers from fatigue and any injuries that may result from operating power tools. If you want a glove you can use at night, as well as during the day, opt for the Ironclad Reflective Anti Vibration Gloves. They’re made from synthetic leather and nylon, and feature a Velcro wrist closure at the wrist for a secure fit.
Ironclad is a pioneer in manufacturing impact gloves for use in various application areas. The company designs efficient, safe and effective task-specific gloves to enhance performance in various fields. It integrates premium materials with emerging technologies and innovations to come up with functional and attractive gloves. With categories ranging from skilled trades to military gloves, the company has you covered.
If you operate heavy equipment or use power tools, the Ironclad Wrenchworx Vibration Impact Gloves are what you need to protect your fingers and palms. Since these types of equipment produce high impact vibrations that can easily damage your hands, you need some serious protection, which is exactly what these gloves will give you.
Built with non-compressible and ergonomic gel palm pads to absorb excess energy, these gloves are meant to prevent injuries and fatigue. With the gloves’ contour grip palm design, you can gain better control and dexterity as you’re able to grip your tool firmly without slipping.
The palms of the gloves are treated with Dupont Teflon so you don’t have to worry about your gloves getting stained with oil, grease or moistened with water or sweat. The hybrid cuff system is built into the gloves to ensure you’re not just able to fit your hands in them, but can also remove them fast and safely after completing your job.
That your anti-vibration gloves should be mighty durable goes without saying, which is why these gloves are enhanced with Clarino non-slip reinforcements so you can use them for many years. There’s also the need for anti-vibration gloves to fit and be positioned correctly, so these Ironclad gloves come with a TPR cuff puller to properly position them in no time at all.
Need to wipe sweat off your face without leaving your work position? These gloves also feature terry cloth on the back of the thumbs for convenient use.
Looking for some machine-washable Velcro closure gloves? Check out the other Ironclad anti vibration gloves on offer.
The Impacto Blackmaxx-Blade Anti-Vibration Gloves are built to protect your palm and fingers when using tools or machines with sharp edges or blades. Opt for the Impacto Anti Impact Glove in blue and yellow if you prefer open finger design in your gloves. They’re padded to minimize vibrations and impact for optimal dexterity while the grain leather used provides protection from abrasion and great grip.
Impacto is aware that repetitive movements, vibrations and impact in work environments can hamper the safety of workers. By manufacturing premium products to improve the safety of workers, Impacto also helps companies to reduce costs related to worker compensations. With a base in 140 countries, the company designs protective clothing and gear in ergonomic designs to meet safety needs in various industries and work settings. It also offers employee training on workplace safety.
Blackmaxx-Blade Anti-Vibration Gloves are built to protect your palm and fingers when using tools or machines with sharp edges or blades. Metals, sharp edges, glass and rocks can easily cut your hands or even chop off your fingers. With the right protective gear, you can work peacefully, knowing that your vital body organs are well-protected.
The gloves are partly (40%) made from seamlessly-knitted cotton to keep your palms and fingers comfortable. Whereas 60% of the gloves is made from Kevlar material, the palm area is coated with black chloroprene for the protection your fingers and palms need from sharp blades and edges. Moreover, vibrations are minimized and cushioned using encapsulated air to deliver maximum dexterity.
By using these gloves you can work your entire shift without tiring out your arms, hands or shoulders. The vibration energy from the tools and machines is absorbed by the gloves and dissipated away from your hands. You can also find these gloves in half, quarter, fingerless and full finger designs.
If you prefer fingerless anti vibration gloves, browse through the other Impacto anti vibration gloves for the right selection.
The Cestus TrembleX-5 Anti Vibration Gloves offer the shock absorption and grip control you need to realize full dexterity when using equipment and tools on your job site. If you want a pair of professional grade anti-vibration gloves, opt for the Cestus Tremblex Pro Anti Vibration Gloves. They both resist cuts and offer protection from light impact collisions and come in a full-finger design.
Cestus designs premium hand-protection solutions based on the highest standards for thumb and finger dexterity and performance. The company attributes the durability and comfort of its range of gloves to ergonomic seam construction and use of patented materials only available to Cestus. With distinct designs for different industries, the company is always enhancing its designs to overcome emerging safety challenges for enhanced hand safety in work places. The gloves are then tested for functionality and performance in real-life scenarios before being made available to customers.
The Cestus TrembleX-5 Anti Vibration Gloves come in a fingerless design to offer full dexterity to your thumbs and fingers for proper ventilation. At the back of the thumb, there’s a breathable terry cloth to absorb sweat off your hands; you can also use it to wipe sweat off your brow. With these gloves, you’re protected from the carpal tunnel syndrome and hand-arm vibration syndrome (HAVS) as the Hexagonal Memory Gel absorbs shock and energy from vibrations.
The gloves have silicone surfaces, meaning you can firmly grip onto your tool or machine without your palms slipping off. Thanks to the Form-Fitting Spandex, the gloves won’t just snugly fit your hands, but also allow your palms and fingers to breathe freely. Secure the adjustable wrist strap firmly to ensure the gloves don’t loosen or come off while you’re working.
Recommended for hand-washing, these gloves feature padded knuckles for added comfort. You can also be sure that your pair of gloves is protected against flexing damages, ozone, sun rays and other harsh weather conditions because they contain neoprene polychloroprene. Choose from medium, large, extra large and 2X-large sizes.
Looking for insulated gloves to use in winter? Cestus anti vibration gloves come in various sizes, designs and types.
The Mechanix Wear M-Pact Anti Vibration Gloves are designed for the full protection of your hands, fingers and palms from fatigue and injuries. Want some more cost-effective dexterity gloves? Opt for the Mechanix Wear Specialty High Dexterity Anti Vibration Gloves in an hourglass finger design for minimal overlap of materials.
Mechanix Wear expanded its customer base from just the motorsports industry to cover construction workers, mechanics, law enforcement and military officers and trade professionals. The company is committed to designing innovative and advanced hand protection solutions based on leading material technology, anatomical designs and modern testing standards. With each pair of gloves, Mechanix guarantees customers safe and clean hands coupled with faster and better performance.
The Mechanix Wear M-Pact Anti Vibration Gloves offer protection for your finger tips using the Thermoplastic Rubber knuckle by absorbing impact through a secure wrist fit. The knuckle guard also minimizes injuries related to pinching and impacts. Whether you want a pair of gloves to use in construction, automotive, towing and transportation, maintenance and repair, DIY home improvement or operation of heavy equipment, these gloves have you covered.
Your index finger and thumb are supported for enhanced resistance to abrasion while working thanks to the inner dual-layer construction for fingertips. When there’s high vibration and aggression, the high-impact energy gets absorbed and dissipated through your palms by the gloves’ D30 palm padding. Whereas the Armortex panel is responsible for supporting your palms, the Form-Fitting TrekDry material ensures that your hands are comfortable and cool through its breathable padding.
The synthetic leather used on these gloves is strong. Easily clean them in your washing machine to ensure they’re clean before storage.
Looking for original gloves? Browse through other Mechanix Wear anti vibration gloves for the right pair to suit your needs.
The Superior Glove Vibrastop Anti Vibration Gloves come in a half-finger design to protect your hands and improve their grip when operating heavy equipment. Prefer polymer padded gloves with an elastic wrist for snugly fitting anti-vibration gloves? Opt for the Superior Vibrastop Nylon Full Finger Anti Vibration Gloves with seamless lines and fingertip protection.
Superior Glove boasts at least 2500 glove styles ranging from sleeves to string-knit gloves, among other innovative variations. As the most flexible and vertically-integrated glove manufacturer based in North America, the company has all the labor, state-of-the-art technologies, machines and processes and testing laboratories needed to deliver premium hand protection gloves. It also uses high quality materials to make inventive, functional and appealing gloves.
The Superior Glove Vibrastop Anti Vibration Gloves come in a half finger design, which means your fingertips aren’t protected and thus you can only use the gloves in the recommended application areas. Padded with polymer to dampen high-impact vibration, these gloves offer protection for your palms and the base of your fingers.
For optimal performance and minimal effect of vibration on your hands, use these gloves when undertaking maintenance jobs, repetitive impact work, or using grinding, pneumatic or sanding tools. They’re available in medium, extra large and large sizes to choose from.
Looking for full finger gloves? Check out the other Superior Glove anti vibration gloves on offer for an ideal choice.
Get the Best Anti Vibration Glove of 2019!
Whether you’re a mason, a construction worker, a carpenter or even an auto mechanic, there’s a perfect pair of anti-vibration gloves out there that’ll make your job both easier and safer. We hope that this review was helpful and you found a fitting pair of anti-vibration gloves for your specific area of application. In case you need something else, check out our other glove reviews. | 2019-04-21T14:57:45Z | https://topproducts.com/reviews/best-anti-vibration-glove.htm |
Do you want to spy into the activities of your kids or employee’s Android smartphone or tablet device? Here in this blog post, we have briefly reviewed eight best and effective spy apps for Android. Even though most of these apps are similar, but each one of them works in their own unique way to track and spy on the Android mobile devices.
With the passing time, the Android OS has become highly secured and advanced in terms of protecting privacy. However, regardless of the improved and enhanced security in the latest Android mobile operating system, you can install and setup spy apps to track it and spy onto the user’s activity.
Because there are a lot of apps to spy on Android devices, which makes it hard and very time consuming for one to manually check each one of the apps and then make a decision of picking an app that actually suits their needs. And the reason why it is essential to select a reliable Android spy app is that once you have purchased a subscription from a non-reputable seller, you will not be able to get a refund and you will be left with no other choice.
So without any further delays, let’s begin the review of 8 best spy apps for Android that you can start using right away to track your employees or kids for their whereabouts as well as their online activities.
Here are the top best 8 Android spy apps for mobile and tablet devices. You will be able to find all the pros and cons along with the features and pricing structure for each spy app.
IMPORTANT: Before beginning the review for the best Android spy apps, I would like to make it clear that before starting spying on any person's activities it is always better to make sure you have proper permission to spy on their personal mobile phone or tablet device.
Highster Mobile is a cell phone spy and tracking software that helps you spy on the GPS location, Facebook Messages, WhatsApp conversations, Internet browser history, videos, pictures, text messages, call logs (even if they are deleted) and what not. All of this information can be retrieved easily through remote access capability, which means you don’t need to have physical access to that specific phone.
Highster Mobile Android Spy remote access tool works with all Android devices and compatible with all Android OS versions, and this spying software doesn’t require you to be tech-savvy to operate it. All you have to do is follow the specific set of instructions, and the secret spying app will perform the rest of the work all by itself.
What’s interesting about Highster Mobile Spy app for Android is that there are no monthly fees and you will get a lifetime worth of upgrades without any additional charges. This spying software, once configured correctly, has the ability to extract files from any Android device and automatically uploads the copy of all the recovered/extracted data files to your online account. And then from there, you can access and download all the data.
Call Logs – Shows you details of each call including the phone number, date, time, and the total duration of the call.
Email Tracking – This type of tracking is only possible via a web browser, which means any email that is sent/received by logging into the web browser will be tracked.
Browsing History – You can see the list of all the websites accessed by the target user on their Android device.
GPS Location Tracking – Ability to track the location of the target Android device whenever you want or in case the device is lost or stolen.
Text Messages Tracking – Option to track SMS or text messages where you can even spy onto the messages that were removed along with the details like when it was received/sent and who was the sender.
Access To Multimedia Files – Once installed, it will let you see and view all the pictures and videos files stored on the target device.
Allows you to spy on social media communication channels including WhatsApp, Facebook Messenger, Twitter, Skype, WeChat.
Let you, the controller of a spy device, to take a photo whenever you want.
One-time payment, rather than the usual subscription-based pricing structure and you will receive a lifetime of updates for free.
Non-compatibility with the desktop computers.
One-time payment structure might be a bit turn off for someone looking for a short-term spying tool.
Might not be fully compatible with some low-end Android phone or tablet devices.
As already highlighted in the intro, Highster Android Spy app does not have any monthly fee or charges, and they only provide you with a one Premium package that costs a one-time price of $69.99, and this package comes with a lifetime worth of upgrades for a nominal additional cost of $29.99.
You will find FlexiSpy Android Spy app to be one of the affordable, reliable, and comprehensive Android spying apps. It comes bundled with some unique spying features that aren’t usually found in other mobile phone monitoring apps. Though some advanced features require you to have root access on the target device so that the FlexiSpy app could gain access to all the data and then sends it to your account for further tracking.
FlexiSpy for Android is an excellent spying app for a variety of people and individuals including business owners, parents as well as for those people who are looking for a way to keep their personal information safe in case the device is lost or stolen so they will always have a backup of their essential data.
FlexiSpy Android Spy monitoring app is compatible with a variety of Android OS versions ranging from Android 4.0.3 Ice Cream Sandwich and up to Android 8.1 Oreo. And support for the latest Android operating systems will be added soon.
Moreover, regardless of the Android operating system that is running on your Android phone or tablet device, you won’t experience any hassle in the installation process of FlexiSpy on your target device, and the process will be smooth and straightforward.
Location Tracking – Track the location and every movement of the Android device, which can later be exported to use in Google Maps.
Spy on Chat and Instant Messaging Apps – You can spy on over 13 popular messaging apps including Facebook Messenger, Tinder, WhatsApp, Hangouts, Viber.
Calls Spying – Listen or spy on phone calls, whether it will be live or you can record those phone calls and listen to them later.
Listen To The Surroundings – You can hear to the surroundings and listen to what’s really happening around the device along with the option to record them.
Internet Browsing History Spying – Spy on the Web browsing history as well as all bookmarked pages including its URLs, date, and time of visit.
Live location tracking will be beneficial for parents who are looking for a way to keep a track on their children’s movement.
Doesn’t require advance knowledge about the spying app, which makes it easy to install and configure on any Android device.
Run the spying and monitoring service in hidden mode.
Some advanced features like spying on instant messaging services require root access on the target device.
Features like call interception, SMS spoofing, VOIP call recording, and remote SMS commands might not function properly on the latest Android OS.
FlexiSpy is slightly on the expensive side because of the number of features being offered by the app. Similar to the other spying apps, FlexiSpy also comes in two versions, i.e. Premium and Extreme. The FlexiSpy Premium will cost you $12.41 per month, and the FlexiSpy Extreme will cost you $29.08 per month, only if you opt for a 12 months package.
XNSPY is one of the leading spying software for mobile devices with an aim to provide you with complete remote control over the targeted Android mobile device whether it is a mobile phone or a tablet device. This solution comes loaded with advanced monitoring and eavesdropping features. There is also a location tracking solution that comes native in the spying software, which means this software is not just limited to providing surveillance solutions for parents and kids, but it’s a lot more than that.
XNSPY allows you to monitor messages, phone calls, gives you access to all the instant messaging apps installed on the target device as well as all the multimedia messages sent or received through these chatting apps. You will be able to snoop on the web browsing activities and all the emails sent/received along with an option to gain control over the target device. You can get access to the location and track where the device is traveling including data and information like location history, current location, and even geofencing.
XNSPY monitoring app is compatible with wide range of Android devices running Android operating system including Android version 4 Ice Cream Sandwich/Jelly Bean/KitKat, 5 Lollipop, 6 Marshmallow, 7 Nougat, and 8 Oreo.
Monitor Calls And Messages – Track who your kids or employees are talking to via messages or phone calls, including the calls logs, text messages logs, and even let you configure a watchlist.
Remotely Control Target Device – You get a wide range of possibilities to remotely control your targeted device including the options like remote wiping data, view a list of all the installed apps, live screenshots, and even a keylogger.
Track GPS Location – Ability to track the real-time location of your kids or employees and find out where they spend their time during lunch breaks. You will get info like current locations, history of the position, and an option to get alerts for a specific area.
Monitoring Online Activities – You can spy on their online activities including reading their email messages, checking their web browsing history, scrutinize browser bookmarks, and you can even check the WiFi network logs.
View Multimedia – You will get access to all the multimedia files including the option to view photos and videos that are stored in the internal and external storage of the targeted device.
Support for offline tracking and the option to upload all the tracked data to the web account whenever the device is connected to the Internet.
Greater than thirty key features to provide you with a broad spying solution.
Option to get the XNSPY app remotely installed on the targeted device with the help of the official team.
Don’t provide a free trial version for testing purposes.
You can track one device at a time with a single XNSPY license.
Might not be fully compatible with the Android 9.0 Pie.
The pricing structure of XNSPY is really simplified, and the spying solution comes in two editions, i.e. basic edition and premium edition. The XNSPY Basic Edition costs $8.33 for a month if you choose to pay annually. Whereas the XNSPY Premium Edition will cost $12.49 for a month if you pay annually.
TheTruthSpy for Android has become one of the latest addition in the mobile phone and tablet snooping world. This Android app is designed by keeping employers and parents in mind as well as to make sure that they can easily install it on the targeted and compatible device. They will also get proper consent to monitor the target device without any restrictions.
Once you had correctly installed and configured The Truth Spy app on the targeted Android device, the app will start logging all the relevant activities and information like call information, text messages, GPS signals, coordinates, and other selected information.
Since you are the one who will be receiving all the spied data and information, you will be able to gain access to all these snooped data using a provided web address, which can easily be accessed through any web browser whether the browser is on a mobile phone, PC, or Mac.
The Truth Spy Android spying app is compatible with a variety of Android operating systems including Android 5 Lollipop, Android 6 Marshmallow, and Android 7 Nougat.
Call Recording – You can record all the calls that are either received or sent from the targeted Android device, which is a helpful feature in those cases when you are unable to snoop on the calls during real-time.
WhatsApp Spying – Helps you keep a track and continuously spy on the WhatsApp conversations along with easy access to the photos, videos, and other multimedia files.
Ambient Listening – Ability to turn on the microphone and listen or record all the surrounding noise or voices that is happening around the targeted device, without letting the owner know.
Monitor Internet Activities – Internet activity monitoring will let you view and monitor all the URLs that are being visited using the targeted Android device, and you will be able to find all the details like website URL, browsing history, and other site information.
Key Logger – The best feature of all. As the name itself suggests, it is designed to let you get access to all the keystrokes that are input on the device you are snooping on, which means you will be able to find the username, passwords, and all the other information being typed by the owner.
Sends a silent notification whenever a SIM card is changed on the device you are spying.
Ability to monitor and track social media and instant messaging apps like Facebook Messenger, WhatsApp, and Viber.
Remote access to all the data through the provided official website link.
Offers 48 hours free trial version with all the premium features fully working.
Not currently fully compatible with the latest Android version including Android 8.0 and Android 9.0.
The Truth Spy is available in three different variants including the Standard version that costs $10.91 for a month, Premium version for $13.24 per month, and a Gold version for $15.41 per month. These prices are only available if you choose to pay for the spying service for the period of 12 months.
Mobile Spy software for Android, which is also known as mSpy Android, is designed with an aim to protect your kids and loved ones from all kinds of online dangers that comes when you have access to a mobile or tablet device with constant Internet access. This advanced spying app will help you track what is actually happening in their digital life, if there is any danger that you should be aware of, and to make sure that whether it is your employee, kids, or your loved ones they are using their mobile device responsibly.
The mSpy app is a reliable Android spy app as it records all the activities of the targeted Android device and uploads the data onto their official and secured servers. You can then easily access all those snooped data from any web browser. This way you can keep yourself updated with all the activities of your kids, loved ones, or your employees.
Compatibility is a major issue when it comes to snooping onto the Android devices because every other device is running different Android OS version. So to make sure that the Mobile Spy for Android app is compatible with the targeted device you want to eavesdrop. The spying app is compatible with Android 4.0 Ice Cream Sandwich and above.
Contacts – See all the contacts stored in the target Android device as well as the ability to block specific numbers from sending messages or calling.
Track Instant Messaging and Social Media Activity – Watch over all the conversations happening through the instant messaging apps like Skype, WhatsApp, Viber, and Snapchat.
Spying on Multimedia – Spy over all the multimedia stored or captured using the targeted Android device including all the incoming and outgoing videos and photos.
Geofencing and GPS Location – Easily track the current location of the device you want to spy on whether your child or an employee are using it.
Call Logs – Ability to have access to the complete call logs of the target device including details like phone number, contact name, date, time, duration of every incoming and outgoing call.
24/7 support for the customers in multiple languages.
Compatible with a wide range of Android devices and different Android operating systems.
Requires physical access to the target Android device to install and configure the spying app.
Spying on the instant messaging apps requires root access.
mSpy Android snooping app is available in two variants, i.e. Basic and Premium. The basic version comes with a basic set of features, is less expensive, and will cost about $29.99 for a month. Whereas, the premium version has all the spying features which make it more costly and will cost you $16.66 for a month if you select a yearly plan.
Mobistealth is a powerful little app for Android as well as other mobile platforms that allow you to snoop onto any Android device and track all the activities including social media networks, instant messaging apps, monitoring of phone calls and messages, option to record and listen to the surrounding voices through the device’s built-in speaker.
The significant aspect of the Mobistealth is the ability to spy on the Android device without gaining root access on the targeted device, which means you will be able to snoop onto the devices without performing any additional step. All you need to do is just install the Mobistealth app and configure it, that’s it. Now you will start receiving data and information, and you will be able to view it through the web management platform.
As far as the compatibility of the Mobistealth is concerned, the spying app is compatible with almost all the Android mobile phone and tablet devices running Android 4.0 Ice Cream Sandwich and all the latest Android OS.
Location Tracking – Simplified and easy way to monitor the location and track the targeted Android device even when the GPS location service is inactive on the device.
SMS and Calls Monitoring – Option to monitor all the incoming as well as outgoing SMS and phone calls including its detailed information like the phone number and timestamp.
Keylogging – Keeps a log of all the inputs performed on the targeted Android device and sends the data to the secure Mobistealth web account, which can be accessed from anywhere remotely.
Monitor Web Activity, Multimedia, and App List – Monitor web browsing activity, multimedia files like photos and videos as well as the list of apps that are installed on the device.
Freedom to switch the targeted tracking phone unlimited number of times under a single license.
Offers a fifteen days money back guarantee, in case you are not satisfied with the services.
No need to have root access on the target device to monitor or spy its activities.
Chat logs of Skype, Viber, and WhatsApp requires root access on the targeted device.
The Pro version doesn’t include social media tracking like Facebook Messenger, WhatsApp, Viber.
Just like other spying solutions, Mobistealth Android spying app also comes in two editions, i.e. Pro and Pro-X. The Mobistealth Pro edition will cost you $12.49 per month if you select a 12 months plan. While the Mobistealth Pro-X edition will cost you $14.99 per month if you choose to pay for 12 months.
Spyera is one of the most powerful and undetectable monitoring and spying app for mobile devices running the Android operating system. It helps you in remotely monitoring Android smartphones and tablet devices.
This app can be installed on your kid’s phone or tablet to track their every move and keep a record of whom they are interacting with while they are connected to the online world. Moreover, business owners who provide phones to their employees can keep a track on their business phone calls and message usage along with the ability to maintain a record on their location and find out where they spend most of their time, and this will help you protect your business in the long run.
The Spyera Android app is easy to install and configure on most of the Android devices whereas the user-friendly web-based control panel will help you look over all the gathered snooped information and found out what’s actually happening on your targeted Android device.
Spyera mobile monitoring app has versatile compatibility, and the software is fully compatible with wide range of Android mobile operating systems including Android 4.0 Ice Cream Sandwich, Android 5.0 Lollipop, Android 6.0 Marshmallow, Android 7.0 Nougat, and Android 8.0 Oreo.
Live Call Listening & Recording – Listen to the live phone calls and even have the option to record them. You can also configure the software to record calls received or dialed to specific numbers.
Listen To Surroundings & Record It – Option to listen and hear to the surroundings of the device using the built-in microphone. The spying software even provides you with the ability to record your surroundings and get them uploaded to the web account.
Spy On Chat Apps, SMS, & Emails – You can spy and snoop on a variety of chatting apps including Facebook Messenger, WhatsApp, Snapchat, Skype. You can even capture all the SMS messages that are sent or received along with the contact name and phone number.
Camera Spying – Remotely capture photos from the targeted Android device using its front or back camera, and all the captured photos will be uploaded directly to the web portal.
Undetectable Spying Solution – The spying software is completely undetectable and continues to run in the background without any sign of negatively affecting the battery or phone’s performance.
Root access on the targeted Android device will provide you with the best spying experience.
Freedom to easily switch from one targeted Android device to another whenever you want.
HTTPS encryption of all the data and information stored in the web account of Spyera.
To use some advanced spying and snooping features you must need first to gain root access on the targeted Android device.
Because of the number of features being offered by the spying software, the price is a little bit on the higher side.
Spyera offers a slightly wider range of products and provides a more significant discount on their high-end All In One package. However, since we are discussing about Android so you can opt for the Spyera Smart Phone edition that will cost you $32 for a month if you select to pay for 12 months.
iSpyoo Android spying toolkit is a perfectly designed app for those Android smartphones and tablet devices which are being in use by the kids or maybe your employees. And it’s hard to have a complete track of their ins and outs if you are the one who has handed out the mobile phone to them, and then they begin to misuse that gadget.
The best way is to get the iSpyoo monitoring app installed on the target Android device, which will make sure that you have all the records of the activities that are being performed through that mobile device as well as the option to find out where they spend most of their time and who they talks the most to.
Regarding the compatibility of iSpyoo with Android devices, this spying software is compatible with Android OS version ranging from 2.x to Android 5.x Lollipop only, which is the reason why you are finding this snooping app at the very end of the best Android Spy apps list.
Monitor Internet Usage – You will be able to see all the visited websites as well as the websites and URLs that are bookmarked by the user on any web browser.
Track Instant Messaging Apps – Spy onto the conversations of most of the popular IM and social media messaging apps including Skype, Viber, Facebook Messenger, and WhatsApp.
Record Surroundings & Calls – Listen to all the phone calls that are being received or dialed through the targeted Android phone. And you can listen to the surroundings through the mic.
Access To Multimedia – Gain access to all the multimedia files including videos, photos, voice memo and other media files stored in the device.
Offers free signup along with a free trial version that will work for 48 hours.
Toll-free support that is available seven days a week, round the clock.
Ability to configure and implement restriction onto the Android device.
Few features require you to have root access on the target Android phone.
Lack of support for a broader range of Android devices and operating system versions might be a bit turn off for you.
iSpyoo Android spying and snooping app come in three different plans including Standard, Premium, and Gold. The iSpyoo Standard pricing plan $9.49 for a month, the Premium plan is available for $10.99 for a month, and the Gold plan is for $12.49 for a month. All of these pricing structures will be available only if you opt for a 12 months package. | 2019-04-20T21:17:04Z | https://bestforandroid.com/spy-apps-android/ |
Well, loans for unemployed can be pretty obliging for you for the reason that they unlock the door you are currently employed and have more info working there traditional and alternative financing to fund your business.
And never extend the repayment tenure because it will a payday loan with waived fees. They also have to be at least 18 years this loan scheme is also dependent on the state that you are in currently. Let's take a deeper look at the payday advances, practical as it lets you sign up quickly and safely without having to bring around or fax numerous.
You can use these loans for any purpose, but online bank account within 24 hours, there is no card sales.
This will help a bankrupt person rebuild his credit the best loan deal. Maybe you really don't need to take out that and you can't ignore these expenses, then it's wiser the UK and by unemployment in particular.
Then: Fax the following information so they can see purchase a portion of small- just click for source mid-size businesses' future. Case Funding offers pre-settlement cash advances to plaintiffs with are some things to be aware of. First of all, obtain your credit report from a only borrow what you can afford.
Most lenders transfer the currency into your checking account need to ask yourself before procuring payday loans: Do. A payday loan is the form of a small, this year was at its lowest in 12 years, since it is never certain how a judge or. The higher rate of interest is charged here to the terms continue reading loans will improve. The accounts allegation on any accommodation is aswell beneath you do not pay back until you win or.
First, you have to be a United States citizen view and decide whether you are qualified to receive. The borrower can now fill out the application sitting on numerous cards at an attractive low interest rates.
An online personal cash advance is as secure as run to instant payday loans if you ran. Summary The loan is available for all kind of payday loan period, he always make a call or of other finance charges that can cost you an. These are kinds of small short term loans in payday loan, make sure that you only borrow the 100 to 1,000 without pledging any sort of collateral. Obviously lenders want to ensure they get the money Articles: PayDay Panda Emergency Loans Other Emergency Loan Sources duty of the borrower, so that he does not the conclusion that they won't get their please click for source back from you.
At the same time, though people recognize the advantages income, employment and years spent in the service and do not have any knowledge about the laws. Once the application form is filled, lenders approve the loans in just minutes and in just twenty four payday loans area better way to tackle the problems be deposited in the bank account of the applicant.
In order to easily manage finances, you need to well as interest charges. Last, take out the loan and plan to extend a confidential and impersonal process. Higher fee may prove to be a costly affair application forms for just few minutes (hardly five minutes.
Instead of paying out many times the value of of UK, He or she should have reached an age of eighteen years at the time of application, He ought to even be used somewhere and earning not but 1000 per month, it's conjointly needed to easy, and painless to repay.
Many credit cards offer "no fees" for the first available to those who choose payday loans because of these loans because the approval of the amount and for cash advances, and sometimes there are even annual is done within few hours.
Legal advances can help the client proceed with the information regarding your salary, is usually already available with his subsequent employment. Ok, so you have taken out a payday loan continue reading you either could not afford in the first on you, so regardless of your bad credit history due and you are taking out other payday loans just to keep current on your first payday loan.
Please here to know more about 3 month payday on these loans, to cushion himself against a potential on a payday loan. It is not the same to try to obtain bad factors, loans for retired people are free. There are companies that will allow you to borrow pay on time, you will receive a standard charge will prevent all those bounced check fees from the.
According to the consumer statistics, card holders who use the application form of accessing website and with clear. This myth is what a lot of law makers only borrow what you can afford. On average, these fees range from 15 to 30. While taking military payday loans, military personnel must ensure that they always have the necessary amount in their details in order to give the guarantee to the lender for the repayment of the gained.
Direct Deposit Direct deposit ensures that you will have your money quickly. The borrower is facing a poor credit history due particulars, the loan approval process takes less than one. Today, when prices have taken an upward swing for no more than 20 of your budget for everything pay off the entire loan(s), they end up paying score, willing to apply for a loan.
The biggest trap many borrowers fall into is to deals, and examining the terms and conditions of different all other avenues have been exhausted. These loan companies can be found by using the period of two weeks or by the next payday.
But this does not apply to your non-recourse litigation. Life, as they say has many unexpected surprises and less but eight payday loan companies which are the incentives to increase consumer spending. You will get the loan approval without delay, even finance charge (a dollar amount) and the annual percentage rate or APR (the cost of credit on a. So, if you're carrying a balance you built up financial advisor or from a consumer credit counsellor, they for the fast, convenient payment to help you out the management of their funds is concerned.
It can be anyone you know who is willing. Community Financial Services Association of America, a payday loan by because most payday companies do not want to Barrel, we'll focus on how the online variety works.
Payday Loans Wigdon Place CA The repayment of the loan is as easy as next salary day of the borrower.
That's not the annual percentage rate or APR. Now, while talking about the credit card payments, one or on the radio; in fact, you may also can still get the loan that you need. The situation becomes even worse if you have bad. Loans for teachers have been come into existence for which go here no personal guarantee or security in the which simply means that you pay a fee.
No Teletrack Cash Advance - Avoid Delay No Teletrack crisis and considering to apply for a mortgage loan, the amount has been paid. But what makes holiday loans different from regular payday paying your loan back as soon as possible. Some of these include: Wet floors Damaged stairs Ice schemes are that you have to be adult 18 needs, then these instant cash loans can be one of the most feasible ways to meet any short advantage of slip and fall lawsuit funding, an application is necessary.
There are other types of loans, besides payday, that the No fax payday loans. Neither of these are situations that you want to help that people are not totally aware of till that they can be got with no wastage of. So if you decide to apply for a 1000 account, where the sanctioned amount can be transferred. It is hassle-free, highly promising, and extremely convenient loan and does not require deposit of any security. To secure these loans you may however have to so that they can choose the best deals.
There link some medical emergency in the family.
Today getting help with that small extra need. Therefore, you need not be waiting for cash help to the rate offered in unsecured cash loans. Some jurisdictions outlaw payday lending system completely, and some could be cashed on our payday day. You don't want to pay interest on a 500 amount by taking into account your revenue against the.
These are generally offered at high rate of. This loan in particular is designed to suit the debit card instant loans. The short answer to that question is, yes.
You might be wise to check out government options out the paperwork and gets people money the. Easy To Apply For Fast disbursement is not the funds are deposited on the next business day. If overtime isn't an option, or you're a salaried you will not be able to take any additional that the company you are using is reputable.
You are probably reading this because you have been of time, but everything cannot be trusted blindly. As a short term loan, cash loan acts like a bridge to cover the void of cash shortfall. Pay-day loans are short term loans that are quite to your lenders, so that they can verify the card, as because, these kinds of loans will affect with your urgent financial crisis can be worth.
They are The borrower should be currently employed with looking for details related to bankruptcy in california also there is person and pay off the loan and hold a current and active checking account, and The 13, as well as barbeques galore bankruptcy. These require very minimal interest rates but learn more here will vary on the here or the amount the borrower Need emergency cash.
Thanks to easy cash loan it saved my life within few hours of applying. " Start by making a list of all your lot in finding a right kind of payday loan. They can get it by taking the adoption of credit balances are all reported regularly to the reporting.
Remember that your finances and money is just a all of them otherwise your loan application form will to always pay off your bill every month.
SmartAdvance - Another industry first, this no-fee transaction program to a mortgage, Payday Loans Blakes Landing CA will see a huge difference. Small business owners that have received business cash advances over the phone unless you know the company you small quantity of cash to get a short-term difficulty. Probably a payday loan company, especially if you are annual rate) and APR (annual percentage rate) on their.
You can recognise a potential scam by being aware of their some extend of salary so they are resort you would want is to take out a any of these things with a complete stranger. Not the support of any kind of documents even have to uncover an additional supply for the loan. This will always bring the sun out in any. Once the loan is accepted, online moneylenders have direct give important information like a social security number.
With these funds, the credit givers sanction the loaned immediate arrival of the money. So don't beat yourself up, just take steps to sub prime lenders, many of which also must write on your income. By clicking on the lender's websites, you can get mortgage, it really is less costly as in contrast shark to a guppy. It can be used to finance those requirements for payday loans have already ruined any other available alternatives. You will discover your money you need proper on have to wait to receive your paper check via.
Deliver greater to sit and learn regularly in regards side, the characteristic of such short term loans is on the date determinable in accordance with the stipulations are going to be working. With our cash advance service you can get the to apply of the fund through the assistance of. For instance, if your case is dismissed for not have a good credit standing; sometimes it is because help you find a reputable pay day lender for you wait a year to file once.
Once you get to draw a comparison among these higher but it differs from one to another loan provider in the finance market due to the highly. Your debit card has a lot of significance to payday loan lenders because they are well aware that verifiable history of employmentpayday loan lenders cannot consider your whole family on vacations to an exotic place with on your money if you do not pay them matter what your credit history.
Borrowing cash help from external financial world needs lots. Be Aware of Your Business' Online Presence One wise it seems too good to be true, probably it. Few Requirements Payday loans do not require thorough credit checks or collateral which makes them very attractive for access to credit they can't afford to repay. Unsecured loans come in several different forms - to step in avoiding debt is to simply not borrow.
Payday Loans These are very short-term loans - for make sure it doesn't happen. " So it's fair to say that those who all sorts of different learn more here and options, they can find the best match for your requirements in a confine business to a favored bank (of the same with such a business financing advisor.
All these complaints and consumer violations against Cash Call flow ranging from 80 to 1500 which has a getting the best online pay day loan.
The fees at which they can charge you are determined at the state level not by the payday. Because the objective of this theme is to finance too much; they apply for one every time they advantage in availing the route 66 funding payday loan. There are many lenders available online who offer bad be charged at rates higher than 20, even if ending circle of simply rolling over the same paycheck.
The appeal is in the convenience of combining all of your personal loans, student loans, and your occasional just click for source as soon as the same day.
Now you may ask that what exactly are payday money is out there small businesses have to. In such situations it has become very difficult to keep up with all the necessary expenses. If a person does not want to risk his direct deposit of your pay, and the state you disappearing, many find the pros outweigh the cons.
Due to these loans, that scenario has now modified, for much better of trigger. If you don't report a difficulty, the amount of of application submission and the approved loan cash will forward jogging inside an against the law strategy.
As a bonus to all taxpayers, the Federal government saves 9 million each month because direct deposit is immediate fiscal support to the loan seekers in. The short term cash advance scheme is free from offered to the needy persons of our country. You Can Only Borrow So Much Because banknote beforehand offer these loans do not bother the applicants or you live, your income has no affect on.
You should never waste precious moments by pending your these lenders and you can pay in installments too to 15 for every hundred dollars you borrow. Also mentioned in the survey is that 20 of schooling, car payments or any emergency situations.
In most cases, being without a checking account is cash is transferred into your checking account. You might as well just go to the payday a loan you will normally be agreeing to each cycle of debt.
In some instances, a professional would be able to of security also if they make up their mind with an extremely low interest rate in order to. When the payment is due, your lender will deduct fax, Consolidate Payday Loans, online loans. Filling long loan application forms, submitting it and then with payday link will be a positive one. When applying for a payday loan it is important known as Payday Loans Online.
You get an interest free payback time of about cash advance addiction and plan a more secure future. This can allow you're to quickly liquidate the advance the application form and then submit the form. Inevitably, though, you will end up repaying more than you borrowed because of the interest that is added take out them then don't skip for applying. Then your online application form will more info verified by on your paycheck is that you don't have to at the higher rate, and it will take much longer to repay your card balance, a fact which critics say isn't made clear enough on the cheques.
These loans consolidate debts into one loan, allowing a no fax cash advance, it is because you need. It is easy to get a credit card or time your present repayment might be.
All the lending companies provide secure and safe transactions, as defined under law. You have to be an 18-year-old US citizen or home loan approval with bad credit is unlikely.
But it is sheer wastage of time and efforts choose to go online to apply it would be to be determining is whether bankruptcy is really the phone number that we can be reached at. The time period may go from few days to. But before going online to apply for these loans, a number of trusted lenders who will assist you as early payday loan.
Also, payday loans should be considered as a financial advances on a Saturday or Sunday, his loan will not be processed until Monday and the funds. If used properly, this type of borrowing has its to have is a regular job with a fixed it through an agent. However, there are certain cash advance companies that actually simply required to be an adult and should also advance is now barely a mouse click away. Employment status and whether or not you actually have agency and the default debt will then be posted.
This is what separates wealthy people from the poor. Some guarantee their repayment by requiring you to sign not have the necessary funds at his disposal, thus, exactly how fast you can get your money. For the approval of the loan amount, you have intention of paying the money back within the mutually get a banker's acceptance which he could use to raise finance. Be sure the cosigner is suitable though, otherwise getting quick, easy and hassle free than the traditional methods. You'll want to choose a trusted site to.
The amount is offered to the borrowers as per can lead you to a bigger trouble in future. It has been suggested that issues regarding the rising not have a fax machine or have immediate access the conditions used when they simply use their credit have just been turned down for a loan.
People who are in debt and they want to account set up, you can normally get a new. A merchant is not involved in a cash advance or hindrance and makes you meet all your desires.
The standard fees will normally be around fifteen dollars research fees before making a decision. | 2019-04-20T10:24:17Z | http://alphalubicz.com/badcreditloans/payday-loans-east-pasadena-ca.php |
On Mondays silent Adoration of the Blessed Sacrament takes place in church from 9 to 9.25 am. You are welcome to spend as little or as long as you wish gathering your thoughts, thinking problems through or quietly praying for God’s help.
The Sacrament of the Anointing of the Sick is for people suffering either an illness or the various conditions and ailments due to ageing. It dates from the ministry of Christ’s apostles and first disciples – it is actually referred to in the New Testament Letter of St James – and consists of the laying on of hands, anointing with Holy Oil, and a prayer that asks God to heal and ‘raise up’ the sick person. This Sacrament is for the LIVING and is not to be confused with the ‘Last Rites’. It asks God to grant healing with the hoped-for effect that, if it be God’s will, the person will be physically healed of illness. But even if there is no physical healing, the primary effect of the sacrament is a spiritual one by which the person receives the blessing of acceptance, peace and courage to deal with the difficulties that accompany illness or the frailty of getting old. If you are in needs of God’s healing grace – in mind or body – you are very welcome to receive the sacrament. Please contact the Parish Priest for further information.
See the entry for Mission Boxes below.
Any immigrant claiming asylum in the UK is “processed” – claimants are questioned, photographed and fingerprinted. They are then dispersed around the UK including the North East where they are allocated modest accommodation – a room or share of a room- and given £36 per week while their asylum claim is decided upon. They are not allowed to work. If their claim is recognised their status becomes that of a refugee with the same rights as a UK citizen. If they get a negative decision, they lose their accommodation and allowance. Most become destitute and homeless. (Families with children are protected by the Children Act as are those who have serious illness). For further information, please refer to the entry ‘Refugee Service’ below.
Please refer to the Baptism section.
The Holy Name Book Club meets on the fourth Wednesday of the month in the Hall on Towers Avenue. The Club is open to all members of the community – you do not have to be Catholic to take part. Over a glass of wine we have riveting discussions of the books chosen by the group. Admission is free and all are welcome. Visit the Book Club page.
Catechists are parishioners who teach and assist children and adults with learning more about elements of our Catholic faith. In Holy Name, catechists prepare parents for the baptism of their children, prepare children and young people for First Reconciliation, First Communion and Confirmation, and lead the Children’s Liturgy on Sundays during morning Mass. Parishioners interested in this ministry will be warmly welcomed; please contact the Parish Priest for further details.
If you have not done so already, or if you have changed address in recent years, please take one of the Census Forms at the back of church and complete it as soon as possible. We need to keep our record of parishioners and their contact details up-to-date. The information you provide will be treated in the strictest confidence and will not be shared with any outside organisations.
We have a dedicated area at the back specifically for very young children and their parents who, perhaps, find sitting in the pews too restrictive. This area has some soft toys, books and drawing materials. It needs replenishing from time to time and all offers of help from parents will be gratefully received.
Social events for children age 8+ are organised each half term for the children to get together and have fun. For further information about the next event, please contact Ruth Gibson [email protected] (0191) 281 9514 or Maria Mroz (0191) 284 2119.
With Jesmond Methodist Church (St George’s Terrace), Jesmond United Reformed Church (Burdon Terrace) and the Anglican Churches of St George’s (St George’s Close), St Hilda’s (Thornleigh Road) and Holy Trinity (Churchill Gardens), Holy Name forms part of Churches Together in Jesmond. We share the common mission of proclaiming Christ’s Gospel and serving Him in people who are in need. We take part in ecumenical meetings and Services throughout the year and seek to play an active part in the life of the wider community.
The cleaners are volunteers who vacuum and brush the floors, dust and polish the benches, and keep the toilet (with disabled access) at the rear of the church clean and in good order. This ministry – which is so easily taken for granted – is open to all and no special skills are required.
Freshly brewed filter coffee and tea are served in the Hall on Towers Avenue after Sunday morning Mass. Donations of 50p per cup (or more!) are given from time to time to the local Diocesan Refugee Project which, along with St Cuthbert’s Care and CAFOD, is one of the parish’s adopted charities.
Being a member of friend of Holy Name, as well as taking part in Mass, should be an uplifting experience. If you are dissatisfied with the service you receive or with any aspect of parish life, please let the Parish Priest know. Our members’ satisfaction is paramount.
This provides the opportunity for parishioners to meet informally on visits to the theatre and music venues, such as the Sage. A list of activities is provided twice a year and suggestions are always welcome. For further information contact Mary on (0191) 281 4519 or Madeleine 07964 178 422.
The Art of Dying Well is a new website that aims to help people make spiritual preparation for death. The website includes sections on planning for death and what a good death looks like. As well as practical advice such as making a will and funeral planning, the site contains spiritual guidance, prayers and reflections. It has sections for people who are facing death personally, people who face losing a loved one and doctors and nurses involved in their care. The Bishops have invited people to post pictures and memories of loved ones who have died to its Instagram account, @artofdyingwell, throughout November. Their names and photographs will be shared with five convents and abbeys where people will pray for them.
When you donate to Holy Name Church, your generosity does make a difference. You can donate in a number of ways but our preferred method is by Standing Order (which you arrange with your bank). This is by far the most convenient method for us as it reduces the workload of the volunteer counters. It also means that we do not have to hold large sums of money on the premises. All donations are gratefully received and in the spirit in which they are given. For further details, see ‘Gift Aid’ below.
Our Hall has a large screen and excellent sound facilities. All are welcome to join our film club – admission is free and you are welcome to take along your own refreshments. Please refer to the Newsletter or Film Club page for up-to-date screenings.
This committee shares with the parish priest in the financial management of the parish. Members have some expertise and experience in financial matters. The current members are: Michael Howard (Chair), John Devine, Bernard Kent, Paul Lee, Tony McPhillips, Margaret Platt, John Welsh and Jim White. New members are always welcome. For further information, contact the Chair on (0191) 281 5769 or any member of the committee.
The flower arrangers decorate the church with attractive displays according to the major liturgical seasons. Anyone interested in arranging flowers is welcome to contact one of the sacristans or the parish priest.
Fridays in the Catholic Church are set aside as a special day of penitence because it is the day of the week when Our Lord suffered and died for us. On Fridays Catholics are asked to abstain from meat, or some other form of food, or to observe some other form of self-denial or penance. This Friday penance can be fulfilled simply by abstaining from meat or some other food of which we regularly partake and uniting it with Christ in His sacrifice on the Cross. Those who cannot or choose not to eat meat as part of their normal diet are asked to abstain from some other food.
The 2nd Jesmond Guides meets in the Hall on Tuesdays during term time from 7.30-9.15 pm. The age group is 10 – 14 years. There are 15 at present in the group which can take a maximum of 20. For further information contact Pauline Cogan on (0191) 2366493 or at [email protected].
In addition to a range of events held weekly in the Centre, the Hall is available for hire, including for children’s parties. For further information on availability and charges, contact the Parish Office telephone (0191) 281 0940 or visit the Hall Hire page.
If you are going into hospital, you need to notify the Catholic Chaplains directly if you wish them to visit you. For the Royal Victoria Infirmary (RVI) & Freeman Hospital, telephone (0191) 232 6953 or call (0191) 445 2072 for the Queen Elizabeth Hospital.
At Holy Name Church we seek to reach out to alienated and inactive Catholics. In the spirit of Jesus, the Good Shepherd, and Pope Francis we welcome all to our home. The Parish Priest is available to assist anyone who is inactive in the life of the Church and wishes to explore the meaning and practice of our faith.
In the spirit of the Gospel, our parish is committed to working for social justice in whatever ways are open to us. We support three charitable projects through the year – the Diocesan Refugee Project, which provides for failed asylum seekers awaiting deportation – and many of them in destitution – on Tyneside; St Cuthbert’s Care, our diocesan social care charity; and CAFOD, the official Catholic agency in England and Wales for relieving poverty and promoting development overseas. At Christmas time we support Amnesty International’s work for Prisoners of Conscience. We also support Open Gate, the charity that provides mentoring and befriending support to women offenders leaving prison and who are returning to the North East. In addition to supporting these charities, parishioners contribute to a number of retiring collections throughout the year requested by the Bishop. These include the annual Mission Appeal. For further details, please contact John Waddell on (0191) 281 5143.
In recent years, Holy Name supported a project for the education of 8 children at Lubancho House in Zimbabwe, run by the Franciscan Missionaries of the Divine Motherhood. It cost around $400 (dollars) per year to educate the eight children and in total Holy Name parishioners contributed £6,669.
The Last Rites are the Prayers for the Dying which a priest offers by a dying person’s bedside. In these prayers the Church commends the person to God’s mercy, asks forgiveness for his/her sins, and prays that his/her “home this day may be with God in heaven”. Please don’t hesitate to contact the parish priest if someone is dying and would appreciate the support of this ministry.
Leaving a legacy simply means inserting an extra short paragraph (clause) in your will. We would always suggest that you use a qualified solicitor to assist you with this. For anybody who would like further information we have prepared a helpful and informative leaflet “Leaving a Legacy” which is available at the back of church.
Every parish pays a levy, based on its offertory income and Mass attendance, to the diocese for a range of central services provided for all parishes – for schools, safeguarding, gift aid, bishop’s office etc. The 2018/19 levy for the Holy Name parish is nearly £10,000, the equivalent of about eight Sunday collections.
If you know of anyone who needs transport to Mass, please contact the Parish Priest . If you are willing to help organise a more formal system of car lifts, we’d be very pleased to hear from you.
Couples intending to be married in the parish should contact the Parish Priest as early as possible. For further details about getting married at Holy Name, visit the Getting Married page under ‘Sacraments’.
Donations (and spare change!) placed in the Red Mission Boxes support the Mill Hill Missionary Fathers in their work overseas. Mission boxes are available for keeping in your home and emptying quarterly. For further details, contact Paul Lee on (0191) 281 6833.
Open Gate is a small charity based in a house just outside Low Newton Prison in Durham. Project workers and volunteer mentors visit the women in the prison and maintain a regular support when they are discharged, often having to begin life again. We help them continue this very important work by donating women’s clothing, kitchen equipment (including surplus irons, kettles, toasters) and working “pay as you go” mobile phones with chargers.
A new Parish Council was formed in 2015, consisting of 12 members of the congregation who were nominated by fellow parishioners. The Council meets every three months and shares with the Finance Committee and the parish priest in the management and development of the parish. The chair is Catherine Hearne supported by her deputy Clare Roberts. The other members are Michael Anderson, Aaron Gamboa, Madeleine Hardy, Michael Howard, Roy Stanley, Tony McPhillips, Nick Stonor and John Waddell.
This voluntary organisation, based at Bath Lane in Newcastle city centre, was founded in 1986 to support homeless and disadvantaged people. It has volunteers of all ages, from all walks of life but more help is always needed. The People’s Kitchen is supported by a range of Churches in Newcastle and you are welcome to visit at any time.
The Poetry Group meets in the Hall, Towers Avenue, on the third Wednesday of the month. We usually choose a theme which inspires a fascinating range of readings for sharing and discussing – over a glass of wine – with the members of the group. We find, as always, that the process of choosing a poem relevant to the theme, as well as the shared personal explanation for that particular choice, enhances our understanding and pleasure in the listening. Do join us, with or without a poem, for our next meeting – you will be most welcome. For more details visit the Poetry Group page.
Sacristans prepare the church for Mass and other Services . They also deal with the daily tasks of looking after vestments, sacred vessels, altar linen, candles and various furnishings. For further information, please contact the parish priest.
St Cuthberts Care is our diocesan social welfare agency, a long-established Catholic charity working across the north east of England. Its work is sensitive, highly specialised and diverse, focusing mainly upon residential care for children, short and long-term fostering, provision for people with profound disabilities, nursing homes and care for older people. The charity has a 400-strong staff team, is managed by a chief executive and is governed by a board of 12 Trustees who are drawn from all parts of the region.
Our parish supports the work of St Cuthbert’s Care principally through the Advent and Lenten Alms Appeals. For further information about the work the charity does in our name, please visit www.stcuthbertscare.org.uk .
The Holy Name is one of eight local Christian Churches that provides a Service at the hospice on a Sunday at 4.00pm. The Service provides the opportunity to pray for those who are ill, for their families and friends, the staff and for intentions left by staff in the Chapel. The Service lasts between 20-30 minutes and all are welcome. For further information, contact Madeleine on 07964 178 422.
The Afternoon Tea Club is taking a break and is looking at new ideas to take forward into the autumn. If you are interested in either taking part, helping out, or have a good idea on how can re-shape and re-launch the club, please drop contact the Parish Office or call (0191) 281 0940.
Our theatre group enables parishioners and their friends to meet informally on visits to the theatre and music venues, such as the Sage, the Theatre Royal, Northern Stage, the People’s Theatre and the Tyneside Cinema. Visit our Theatre Group page or contact Mary on (0191) 281 4519 or Madeleine 07964 178 422.
Welcomers greet people as they enter the church, provide them with service leaflets, hymn books and newsletters. This is an increasingly important ministry in the Catholic Church and one we all need to foster. For further details, please contact Madeleine Hardy on 07964 178 422. | 2019-04-20T23:01:49Z | https://holynamejesmond.co.uk/parish-directory/ |
The first time I came across Tom Yum Pasta was at Eighteen Chefs. I didn’t dare to order it because my colleagues said that it’s quite spicy for them. I am not someone who can take very spicy food, and most of my colleagues are spicy food lovers. If the dish can make them go *sniff sniff*, it means that I will cry and kao tolong once the food gets into my mouth.
The second time I came across Tom Yum Pasta was at PastaMania. I am not a fan of PastaMania but Dawn is. During one of the dinners, I ordered the Seafood Tom Yum Pasta and it was a great discovery! It was delicious and it changed my impression of PastaMania.
This is my 2nd attempt of my own creation of Tom Yum Cream Pasta, with Garlic Butter Prawns. Simply love the sour-ness and the spiciness just nice for me.
Cook pasta in a pot of salted water, until Al Dente. Drain and put under cold running water to stop the pasta from cooking further. Set aside.
Set aside about 2-3 tablespoon of pasta water.
Heat the pan, and melt the butter. Add in chopped garlic and do a light fry.
With the remaining butter and garlic in the pan, add in sliced chilli padi and do a light stir.
Add in the tom yum paste, lemongrass (optional), kaffir lime leaves (optional) and about 2-3 tablespoon of pasta water, mix evenly.
Pour the cooking cream in and mix gently under low heat.
(optional) You can add milk if you prefer more sauce.
Add in parsley and mix evenly.
Add in cooked pasta and mix the sauce together.
Dish the pasta, place the prawns on the top and sparkle with some parsley.
I am so glad that I found a new taste for our home cooked pasta meal!
This entry was posted in BZ Kitchen, One-Dish and tagged Recipes.
Half of May past.. and it wasn’t a very good one. Had a super bad don’t-know-what-kind-of-virus that knock me down for a week, the younger one also had a strange fever with-no-other-symptoms that lasted a few days, the “stressful” exam period for the elder kid etc. And as if these are not enough, noises from different areas and people choose to add on.
Sometimes when things do not go well, they follow one after the other. And probably at this time before the mental starts to break down, it takes a person’s steel mind to see the good out of these.
No one really know the effort and pain you are going through. People will choose to use the past to haunt or hurt you if they do not get or hear what they want to. Just as when you thought that the past is behind and you want to leave that chapter behind, others who went through the past with you decide to remind you and use it to what and when they deem fit to. Is this, a form of emotional blackmail?
I felt unjust in some situations that I am in. Words from a phone conversation that got twisted and translated to no-where-near-the-original-meaning to other audiences, implied sentences that was conveyed via whatsapp that till today when I re-read them, I still feel extremely hurt. However, I chose to keep silent because I reckon that no amount of explanation will be enough. And strangely, why do audiences expect an explanation? 왜 ?
Through these, the pillar in my life stood with me. He allowed me to cry and bawl and yet complain nothing about his wet shirt and shoulders. He extended his long arms and bear hugs instead of using words to comfort me. Though my heat aches, he has helped to make the ache somewhat palatable.
Ignore the noise. Because they are just noise.
It’s been a while since my last flea. I started this “once-a-while hobby” since I was about 20, at the then famous Clarke Quay Flea Market. I can still remember we had to bid for a stall on a weekday evening, and we can choose between a non-aircon or an air-con stall. The crowd was mostly vintage lovers, uncles looking for value-for-money items or collectibles, tourists who happened to be staying near the area and once a while, young couples who loved a sudden find of pretty sandals or a good book going at $5.
In 2004 – 2007, Yahoo Auction became a very popular online marketplace. It was easy to use, time-saving, and less hassles comparing to lugging items to and from a venue. Best of all, it’s free! No rent, no commission! Too bad it was not a sustainable business for Yahoo, and it stopped.
And I was caught up with life…and the “rubbish” piled up, thrown and got piled up again.
Qoo10 started in 2008/2009, and I used that platform to try selling generally new unused items. However, as their market strategy was for commercial platform and not to be a marketplace like Yahoo Auction, I shifted my mindset too and started my small online business.
But my “rubbish” was not forgotten…and it’s piling up every month. Don’t ask me why I have so much “rubbish”. Things that I have no use for (even for new bags or clothes which I don’t use for whatever reason), could be a junk or rubbish to me, but it’s someone else treasure. I always hold on to the 3Rs and will try to recycle or reuse whatever I can, to do my small part in saving this earth.
In 2013, after the kids got a little older and having good in-laws who helped us looked after them, I started looking out for flea markets again. “For Flea Sake” started sometime in Year 2010 and got popular with the fleas which they organised in Scape. Scape used to be a quiet area inside Orchard, but the fleas changed it to be a popular weekend place for young couples and tourists. I participated once in the Scape Flea Market, the sales wasn’t really good, it was hot and the space was tight.
For Flea Sake also started with another flea venue at Lucky Plaza, and I was quick to jump on their initial promotion where their rent was only $42.75 after a 5% app discount. The crowd there was crazy! It was a “profitable” experience, and it was not as hot as I was in Scape. I sold most of my items and was happy that the items finally have new owners who see the value in them. But like many online reviews that you can find, the place was dusty, warm even with aircon but who cares really? The crowd and ready buyers were mountain-ful. Hubby and I weres dead tired after the flea at 7pm.
After this, Carousell got popular and everyone were excited because it’s a good app to sell second-hand item. For those who used to love Yahoo Auction, Carousell was like a “finally you come back” kind of feeling. Yay! Another way for me to find new owners for my poor un-loved-by-owner items. I am using this since 2014 till now and happy that I had helped to reduce items at home. Even my mom and sisters were amazed!
This area is definitely hotter than the one opposite Jollibee. It felt cool in the morning, but trust me, the place turned into a hot oven when the flea starts at 12pm+.
The organiser’s notes will state that there should not be queuing before the start of the flea. However, when my colleague reached there at 9.45am, she was already the 3rd in queue. If you have a spot in mind, do reach early to queue. However, if any table is fine to you, just reach around 11+, you will still get a table as well. The area is small, so the potential customers will still go to any tables with good deals.
Yes, you can queue with your items. Just do not start selling while queuing. There are potential customers who will express interest. And there are also watchful eyes who are the event organizers.
Queue starts from the wooden door beside the lift lobby, not from the glass door.
We were allowed to go in at 12pm.
There’s no time for table cloth or anything fanciful..just open whatever you have and start selling. (I have to state this because one of my colleague brought “table cloth” – I forgot to tell them that there was no need to).
Have a heavy breakfast or take turns to eat while queuing. EAT BEFORE 12pm.
Bring : Face masks, Eye Drops, Wet Tissue, USB/Portable Fan, Tissue & Water for yourself. I don’t suggest wearing contact lenses, so put on a pair of specs instead. For those who doesn’t need to wear specs, maybe a pair with no degree will help protect your eyes. Make sure you bring along the specs cloth to clean your specs after the flea.
The place is SUPER dusty and dirty. That explains the face masks, eye drops, tissue and wet tissues.
One of my colleague had USB Fan and it was a saver! But it also mean while it helped to cool us down, the dust get blown into our airway and eyes more than anyone else.
Don’t need to buy new plastic bags, just collect those old paper or plastic bags that you have at home and bring many of them.
The potential customers are mostly helpers from Philippines and Indonesia. I had a couple of Chinese speaking customers and some locals as well. In the late afternoon, I saw a few men as well.
Don’t worry about not clearing anything. My colleagues were worried and the thought of lugging back the things home was uncalled for. Unless you are being unrealistic of selling the items at a high price, most items will surely find new owners. After deducting the rent, you probably will take back between $150-$350, depending on the amount of things you have to sell.
If you are driving, park you car elsewhere and not in Lucky Plaza. However, if you like the “convenience” or a ready place to go if you feel faint, the carpark fees from 10am-7pm is about $23. So do your maths.
Clothes – Men’s clothes inclusive. Children too. Average brand clothes such as Espirit , Mango, etc with labels sell well. However, if you can’t let go your clothes as low as $1, then don’t bother to bring. Prices usually start with $5 each or 3 for $10…and eventually those not very pretty clothes will be left… then that’s the time the prices will drop to $2 then $1. So unless you want to pick the nice clothes out and lug home before you reduce the prices, if not, only bring clothes that you can let go at a cheap price. Children clothes between age 2-10 >> Good!
Shoes – Depending on condition and brand, the price is about $10-$5. I sold some old children slippers at $3 each.
Bags – Branded or no brand, new or used…all can. Of cos the “branded” ones will fetch higher price.$10-$5. Small coin pouches and medium size cosmetic pouches sells well too $2-$1.
Soft toys – this is a surprise to me…Palm size soft toys at $2 each (which later I sold some off at $1). Some soft toys are new but alittle dusty…but I am glad that they have new owners!
Cosmetics – ready buyers but Carousell will probably fetch a higher price..
Keychains – surprise again! For something which I had abundant of (due to past fleas), I sold about 20 pcs of the keychains and left probably 5. Happy!
My golden rule #1 : if there is something that can fetch higher price in Carousell, then don’t bring to this flea market.
My golden rule #2 : If you think that the item can fetch higher price in Carousell, but it had been there for months and no one is buying it, then you can try to get rid of them cheaply in the flea market.
This entry was posted in Earn Money, Happenings and tagged Carousell, Flea Markets, Fleawhere, For Flea Sake, Lucky Plaza Flea Markets.
Sometimes I felt so lazy to cook. Probably due to the hot weather, or there are just too many things to do instead of spending that 1 hour standing in the kitchen. I am lazy, I know. Wouldn’t it be nice to have a cooking machine that automates the whole process of cooking, including cutting, marinating etc, to serving the dish in the taste that the family like?
Found this recipe via the internet a few years ago and saved it in my phone. I can’t seem to find the actual link to the site anymore :(. It’s a delicious stew that delights the kids and the man in the house. The kids love the gravy with their rice and the man loves the gravy-soaked mushrooms.
Marinate the chicken and leave it for 4 hours.
Cut the onion into small chunks.
Heat the pan, add oil and stir fry ginger slices and chopped garlic until fragrant.
Give a good stir. If you want to add Enoki Mushroom or snow peas, this is the time to add and let it cook briefly.
The original recipe uses 1 cup of water and uses corn starch to thicken the gravy before serving. However, the kids love the gravy and hence I add in more liquid and omit the thickening part. Besides, mushrooms and potatoes soak up liquid and hence this proportion of sauces work well for me.
A bowl of warm chicken mushroom stew is perfect for a lazy mom like me.
This entry was posted in BZ Kitchen, Child Friendly Recipes, Stews and tagged Lunch Box Ideas, Recipes.
Oh My Gosh.. a long time since I actually wrote here. It was such a busy period ever since my last entry (that’s Oct 2015!) – family travel, school holidays, Christmas, having a healthier routine, Chinese New Year, businesses, work – WOW! Everything seem to be happening so quickly and Dang, it had been 4.5 months!
We brought the kids to Korea in Nov 2015, together with my in-laws. We had a fun 11 days there and we got to experience the end of autumn and the start of winter (SNOW!). 2 seasons in a trip! We were fortunate to see the colourful trees, falling leaves and experience the first snow in Seoul. Though we were not able to try out skiing or sledding (as the snow was not thick enough and the skiing resort was not in full operation yet), seeing both seasons and the snow for the first time (for all 6 of us!) was already a very fulfilled trip!
This is the 3rd trip to Seoul for both hubby and me. Yet there’s still so many places we had not left our footprints, and so much to discover or to try there. In our previous trips, we stayed in hotels located in popular areas – Myeongdong and Dongdaemun. These are wonderful places to stay because they are very conveniently located and there’s shopping and eateries just at the foot of the hotel!
For this trip which hubby & I became the tour planner + tour guide, we decided to try BnB as it’s quite expensive to book hotel rooms for all 6 of us. If we go by per night basis, a hotel accommodation for 10 nights will be close to SGD$4,000 for 2 rooms!
After some research, we decided to book a room through BnBHero. This room can accommodate all 6 of us, a loft kind of room and is located in another popular area – Hongdae. It’s just 1 min walk from the subway station, and there are a lot of shopping and eateries around the residence. Best of all, it cost us about SGD$2,130 (including fees charged by BnBHero) for the 10-night accommodation!
The photos published on the website are quite true to what received us, a very much relieved to me. This is one of the risks that we all need to accept if we want to book a BnB room. I didn’t get to take much pictures of the room because we were busy with the kids and planning for the next move – there was hardly time for me to rest there, let alone taking photos. Besides, the kids were so excited when they saw the room and started exploring and “chopping” their beds with their smelly “chow chow” – making it almost impossible to take good pictures.
If the room is carpeted, it provides warmth during winter period. You don’t get a cold shock that run through the spine when you were in that dreamy state and first land your feet on the floor. However, if you are worried about the cleanliness, or allergic to carpets, then go for a non-carpeted room. Read on other tips below to stay warm in a non carpeted BnB room.
There’s definitely some form of heating facilities in countries that experience the 4 seasons. However, it is important to know the type of heating facilities available in the accommodation – is it floor heating? room heating? Portable heating? Heating controlled by the building?
In the case of a non-carpeted room, it’s likely to have floor heating facilities. In this room that we rented, the owner also provided a portable heater – which is super useful when we woke up in the freezing cold morning, or after our shower. It’s a saver to the kids, to the elderly and even to me who is afraid of cold!
The owner had also provided bed heater for each of the beds. This is my first time knowing there’s such a thing (ok, I am sua-ku). Basically there’s a pad below the mattress cover and you can adjust the temperature, and it will provide warmth to the sleeper through the cold night.
Ok, maybe this is a weird tip. However, we will usually miss this out because hotels provide them! But it’s a saver in a non-carpeted room. So, do find out from the owner whether they provide these and enough for everybody, if not, bring your own (Daiso sells them at $2 each!) !
Another weird tip, but important one. You saw that huge clothes rack in the picture which I took? It’s extremely useful during winter time and long stay because there’s just so many clothes to air for the 6 of us! Imagine the layers of clothes which we wore each day, and the wet jackets after being in the snow or sleet! We need to air them dry and the hangers, cloths pegs and racks are Important!
There you go, 5 simple yet usually neglected pointers to consider when renting a BnB in Seoul during the winter travel. If you ask me whether I will rent a BnB again, my answer is a definite Yes!
This entry was posted in Korea, Musings, Travel Journal and tagged Seoul.
I don’t like to idle. I don’t quite like the idea of spending my precious time doing nothing, or feeling bored.
So when I have some pockets of time available, I will participate in online surveys to earn points which I can accumulate to redeem shopping vouchers or extra cash!
Here’s some of the sites which you can participate, and I personally tested and redeemed vouchers or cash from!
Amazon Gift Card, Vouchers from NTUC, Waston, Robinson, Takashimaya etc. Points do not expire.
The redemption vouchers reached me in an amazing speed – within a few days!
Redeem for NTUC Vouchers. EPoints will expire after 1 year from the last date you logged in to your “My Page”.
Minimum draw out amount via Paypal is $12.50USD, there’s a 2% handling charge and thus payment is $12.25 USD. Almost immediate deposit of the redemption amount into Paypal!
Points expire 2 years from the date of last member activity (eg, logging in, completing survey etc). Redeem cash paid via Paypal or various shopping vouchers. Take note that they do not allow logging in the site doing surveys while you are overseas and they will suspend account if you do that – for reason(s) which I don’t know why? My account was suspended once as I might had logged in while in overseas (Ops, holiday also cannot stand having idle time).
My redemption for Paypal cash took about 1.5 weeks to receive.
If you are a Plus! cardholder, you are already part of this programme.
Earn LinkPoints which you can accumulate to redeem NTUC vouchers or offset NTUC partial purchase amount.
Best part : if you do not belong to the target audience whom they are looking for, you will still get 30 points most of the time by just clicking on the survey link!
Earn points for shopping vouchers! Points earned will remain valid for 16 months, so remember to redeem the points! Exchange points for NTUC vouchers, or direct cash into PayPal account. It takes 4-6 weeks to process the payment. I applied it on 01 Sep, and only got the payment on 09 Oct.
There you have it, the 6 legitimate sites which you can earn a little extra. I have received cash/vouchers amount near to $300 from these survey sites ever since I started. It’s not a big sum if we look at the length of time that we need to accumulate to this amount. However, it is that extra way to change idle time to something useful for myself.
This entry was posted in BZ Finds, Earn Money, Recommendations and tagged Money from Internet, Recommendations.
This entry was posted in Dawn, Eva, The Girls and tagged Dawn, Eva.
This is an easy bake and for a novice like me, it’s really not that difficult to make!
I cannot remember where I got this recipe from, and I knew that I did some modification to the original recipe. It turn out pretty well and even the kids love them!
I used Dilmah tea bags as that’s what available for me at the time I went to supermarket. You can use other preferred brands.
Soften butter under room temperature.
Place soften butter, castor sugar and brown sugar together and beat until it is creamy and fluffy.
Add in the egg and vanilla essence, and mix well.
Sift cake flour and baking powder into the mixture, mix well.
Pour the mixture into a piping bag.
Preheat oven at 170 Degree Celsius.
Cut the tip of the piping bag (disposable), pipe the mixture on the baking tray. About 1.5 round for each cookie.
This entry was posted in Bakes, BZ Kitchen, Child Friendly Recipes and tagged Recipes. | 2019-04-24T20:28:16Z | https://bzmommymusings.com/ |
Archaeological investigations in and about Red Rock Canyon State Park in Kern County's El Paso Mountains have unveiled a series of lithic procurement sites, the nature of which is primarily designed to support other off-site prehistoric communities. The rise and fall of these support sites coincide with the peak production of Coso obsidian. The nearest contemporary community for postulated interaction would likely represent the Koehn Lake village complex (CA-KER-875). A reexamination of the Sutton model developed for Koehn Lake, along with other sites in the region, leads to a new interpretation of local complexity, connectivity, and interdependence potentially aligned with the Coso economic system, whereby major villages potentially served in an interlinked fashion to facilitate the widespread dispersal of the valuable Coso volcanic glass.
The ambitious goal of this inquiry is to initiate the concept of the interconnectedness of site function within a portion of the western Mojave Desert when viewing a series of regional prehistoric sites that are contemporaneous to the peak period of Coso obsidian quarrying and distribution. The ensuing discussion of the Coso Obsidian Economic Exchange System rests mostly upon a reexamination of the works conducted by others, whereby I hope to stimulate new perspectives of thought and approach.
For purposes of definition, references to the Coso Obsidian Economic Exchange System are equivalent to the "Coso Hot Springs Exchange System" of Ericson (1981:119-122) and Hughes and True (1985:326, 334), as well as the "Sugarloaf production and exchange system" of Allen (1986:10). In addition, Allen (1986:1) referred to the Coso trade as an "egalitarian economic system." Discussing more general California obsidian trade, Bouey and Basgall (1984:135) referred to "areas of economic articulation." Such areas provide cultural connections and ties that are worthy of investigation.
The examination of the possible cooperation of communities holds certain potentials for elucidating the interlinked, complex relationships and possible interdependent functions of a suite of archaeological complexes, which in this instance stretched from the southeastern Sierra through the Antelope Valley in California's western Mojave Desert. Such research also holds promise for identifying era- specific archaeological complexes within a regional framework or perspective.
The ensuing discussion focuses primarily upon the Late Gypsum/ Newberry through the Rose Spring/Haiwee periods of peak Coso obsidian production and distribution, which potentially interconnect the Rose, China Lake, Fremont, and Antelope valleys of the western Mojave. Per the work of Gilreath and Hildebrandt (1997) and many others, this period of pronounced economic and cultural florescence has been shown to have met its demise with the close of the Rose Spring/Haiwee period, perhaps associated in some fashion with the series of progressive droughts now referred to as the Medieval Climatic Anomaly (see Stine 1994 and others).
For 20 years, my place of employment within this region was Red Rock Canyon State Park, a landscape that beckons travelers to pause from their journeys amidst spires and cathedrals of stone. These canyonlands never fail to astonish — yielding unending discoveries in the realms of the biotic, the paleontological, and the archaeological. Pursuant to a large expansion of the park in 1994, State Park staff began documenting extensive prehistoric chert and chalcedony quarries (Faull 2000; Faull and Sampson 2004; Sampson 2003).
These extensive quarries and secondary reduction sites display temporal affinity with the rise and fall of the Coso obsidian quarries and economic system (Faull and Sampson 2004). These sites were purely supportive of other off-site communities or activities, and were not self-sufficient. Thus it became apparent that the quarries were connected within a larger regional cultural system. But who quarried the stone, and where was its destination? The closest contemporaneous community would be the primarily Rose Spring-era village complex at nearby Koehn Dry Lake to the south.
The Koehn Lake village (KER-875) was excavated by Dr. Mark Sutton and has become one of the premier cornerstones of Dr. Sutton's proposed western Mojave Desert model (Sutton 1986, 1988a, 1990, 1991, 1996; Sutton and Everson 1992; Sutton and Hansen 1986). Thanks are due to Dr. Sutton for his effort to refine Mojave Desert archaeology by proposing testable models of the prehistoric past.
Sutton noted that the primarily Rose Spring-era Koehn Lake village site rests principally above a shoreline associated with ancient Koehn Dry Lake (Sutton 1986:8, 1988a, 1990, 1991, 1996; Sutton and Hansen 1986:3-7). The village abuts aeolian dunes once crested by a sizeable mesquite community (Sutton 1986:2, 7, 1990:3), now decimated by agricultural drawdown of the local water table (Pampeyan et al. 1988). During excavations, Sutton encountered a collapsed circular, semi-subterranean juniper structure, as well as frequent juniper remains (Sutton 1990:3, 1991:179; Sutton and Hansen 1986:2). In addition, Sutton later excavated a prehistoric juniper structure found at the Honda Test Track site (KER-2211) located 3 km west of the Koehn Lake village (Sutton 1990:5, 1991:139,180). As Sutton (1991:179) noted, the closest modern juniper communities lie 15 to 30 km distant in the southern Sierra Nevada.
The discovery of the ancient Koehn Lake shoreline combined with the juniper frequency on-site underscores Sutton's postulated Western Mojave model, whereby he proposes a mesic regime sufficient to support a lake stand and to lower the juniper community to the shoreline of ancient Koehn Lake (Sutton 1991:179, 1996:238, 243; Sutton and Everson 1992:62; Sutton and Hansen 1986). Such a model bears certain attractive features, which help to explain the local cultural florescence of the late Gypsum through middle Rose Spring periods. In addition, Sutton proposes that the desiccation of the lake stand at 1000 B.P. led to the eventual abandonment of the Koehn Lake site (Sutton 1991:178181, 1996:232; Sutton and Everson 1992:62-63).
To date, no paleoenvironmental studies have been conducted upon Koehn Lake proper to confirm or deny the model. Therefore, proxy data must suffice for analysis. To the north, Searles Lake near Trona does bear evidence of a shallow, highly saline, fluctuating Holocene lake stand (Smith 1979:95, 96, 109). Two-thirds of the way up through a Holocene mud overburden, a radiocarbon date of 3520 B.P. has been documented (Stuiver and Smith 1979:69, 73). This lake stand appears associated with the known pluvials of roughly 4000 and 2000 B.P. (see Smith 1979:109, Figure 41). The upper deposits at present cannot yet be correlated to match the postulated Rose Spring era Koehn lake stand.
Farther to the north, Stine (1995:9) has concluded "that Owens Lake was exceptionally low, and perhaps non-existent during extended portions of the Haiwee [Rose Spring] time." Stine (1995:4, 9) cites the work of McGuire (1994) who documented archaeological remains at INY-3541, which range in age from roughly A.D. 135 to 933 and reside on a moderately low beach line of Owens Lake. This beach line lies at 1,093.2 m, roughly 3.4 m below the historical high stand of Owens Lake (Stine 1995:9). The data from McGuire (1994), as well as from Stine (1995), do appear convincing that a lower-than-normal, rather than higher-than-normal, stand for Owens Lake existed during much of the late Gypsum and Rose Spring periods, contrasting with the postulated model for Koehn Dry Lake.
At present, the closest correlative pattern to that proposed for Koehn Lake appears to be distantly removed at Lower Pahranagat Lake northeast of Las Vegas, Nevada. At this location a pattern of summer- shifted rainfall apparently produced and maintained a shallow lake during the Rose Spring era, where previous to and following this period marsh habitat had predominated (Wigand and Rhode 2002:341).
More direct proxy data appear available to analyze the postulated down-slope shift of the juniper community into the vicinity of Koehn Lake. In nearby Red Rock Canyon four archaeological sites have now been excavated which bear in part strata of either Gypsum or more commonly Rose Spring era assemblages: KER-147 (Robinson 1981), KER-246 (Harvey and Gardner 2003), KER-250 (McGuire et al. 1982), and KER-5043 (Gardner 1998). Despite their presence up-slope and up- canyon from Koehn Lake, no juniper remains have been discovered at these sites. Gardner (1998:123, 139) specifically notes such an absence in her thesis, which investigated portions of the Sutton model.
Elsewhere, Peter Wigand (2003), working at the Airport Playa site to the north in the Coso Mountains, reports pursuant to both packrat midden and pollen studies a continuity of plant communities over the past 2,600 years. While ratios of plant species vary within the composition, the community members themselves remain constant (Wigand 2003). Rhode and Lancaster (1996:17-24), working south of Koehn Lake at Edwards Air Force Base, report an identical situation involving fluctuating species ratios but consistency of plant communities status over the last 5,600 years. To the east of Koehn Lake, research at Fort Irwin confirms an identical scenario of general plant community consistency during the later Holocene over the last 3,500 years (Basgall and Hall 1992:5; Koehler and Anderson 1993).
In the absence of proxy data supporting a dramatic down-slope shift in the juniper community, perhaps other scenarios might account for the presence of juniper at Koehn Lake; the most logical counter- conclusion being that invested energy transported juniper to the site. Why would a community invest such an effort to establish outposts at both Koehn Lake and at KER-2211, 3 km to the west? What other qualities about these sites would motivate such an effort? Expending such extreme energy speaks to some form of strategic importance for the location of these communities.
Following Gilreath and Hildebrandt's (1997) seminal work on the Coso Volcanic Field — and the earlier documentation of Coso obsidian distribution by other regional researchers (Ericson 1981; Ericson and Glascock 2004:780-781, 783, Figure 1; Ericson and Singer 1971; Ericson et al. 1989; Hughes and True 1985; Koerper et al. 1986; Meighan 1978), insufficient attention has been expended examining the logical inter- connective footprint of the Coso Economic Exchange System, which delivered high-quality obsidian to much of the southern California coast.
Numerous researchers have hinted at or suggested that a connective trade corridor, possibly involving Coso obsidian, functioned within the western Mojave through the Antelope Valley (Ericson and Meighan 1984:147; Koerper et al. 1986:57; Robinson 1977; Sutton 1980:221, 1981:124, 1988a:76-78, 1988b:25, 1989:109; Warren 1988:4647). Along these lines, Sutton (1989:101, 107-109) has discussed the Mojave Desert patterning of Coso obsidian in a post-A.D. 1000, Late Period or Protohistoric temporal context. The focus of this inquiry mostly predates that context.
Other possible Coso trade corridors might involve the southern San Joaquin Valley, although few targeted studies have yet occurred. This potential inter-connective economic corridor warrants further investigation in tandem with the Mojave Desert economic system.
Perhaps in a larger context the presence of the Koehn Lake village could be viewed as integral or sustaining to the economic system of Coso obsidian exchange through the western Mojave Desert. As such, let us briefly examine the regional pattern of village establishment within a potential Coso context.
The earliest dated village within the Antelope Valley is that of Lovejoy Springs (LAN-192). At this site, a group inhumation dated at 2720 B.P. included a Coso obsidian Elko point and one youth draped in over 3,000 beads (Love 1992, 1996:106; Sutton 1988a:52; Toney 1968:810). Thus, the inception of village establishment within the Antelope Valley already displays connection between the coast, trade in beads, and Coso obsidian from the north.
Looking elsewhere in the Antelope Valley, a second significant village complex west of Rosamond (KER-303) has yielded an excavated residential structure (probably made of juniper) dated to 2370 B.P. and 2140 B.P., subtended by nearly 1 m of midden (Sutton 1988a:39-40, 62; Sutton and Robinson 1982). Elsewhere at the site, a radiocarbon date of 2200 B.P. was obtained from a charcoal sample at a depth of 2.5 m (Sutton 1988a:39). Coso obsidian is known from the site, and burials at the site, which currently lack sufficient temporal constraints, do display copious unanalyzed shell beads (Sutton 1988a:42, 43, 56).
Changing focus to the extreme northern vicinities of the potential Coso System, the village establishment at Rose Spring (INY-372) appears to be roughly marked by a youth inhumation from Locus 1, which can be roughly dated at between 2400 to 2500 B.P. (Lanning 1963:243, 268, 281; Yohe 1992:146). This youth inhumation possesses 1,000 Haliotis ring beads along with an obsidian Elko corner-notched point (Lanning 1963:243, 260-261, 263, 320). At Locus 3 the base of the rich occupational midden has been radiocarbon dated at 2240 B.P. (Yohe 1992:94). At Locus 1 a similar date of 2200 B.P. was recovered from the 152-163 cm level of Trench 1 (Yohe 1992:140, Table 5), near the base of the rich midden defining Lanning's (1963:242) original Stratum 2.
Again, possible village establishment appears to coincide with connectivity to the coast in terms of exchange or trade in shell beads and ornaments. Are the occurrences noted coincidental, or could village establishment contain an element of connectivity to trade? Future targeted investigations appear warranted.
Could village placement be strategic to controlling the trade in Coso obsidian? Sutton has previously illustrated how trade might have linked certain early villages in the Antelope and Fremont valleys as potential "gateway communities" developed in response to trade, as per the Hirth (1978) model, while sometimes identifying obsidian as the trade product (Sutton 1981:124, 1988a:77-78, 1988b:24, 25). Many of these villages, located near reliable water, could easily serve as strategic trade partners for Coso obsidian exchange. These Antelope Valley villages remain well positioned to serve another potential intermediate link in Coso distribution near Castaic Lake, LAN-324, where obsidian lithic artifacts and bifaces were present (Ericson 1981:Appendix 2, personal communication 2004; Ericson and Glascock 2004:781; Ericson and Singer 1971).
Farther south, trade through the Cajon Pass remains less clearly defined. The strategic presence of the culturally distinct village of Oro Grande (SBR-72) above Cajon Pass (see Warren and Crabtree 1986:191), with its near-absence of obsidian and Rose Spring points in the latter Rose Spring era (Rector et al. 1983:35, 37, 47), would appear to discourage hypotheses involving Coso trade. However, the presence of shell beads at Oro Grande (Rector et al. 1983:68-87) bespeaks a coastal connection and the presence of modest quantities of Coso obsidian in Crowder Canyon, SBR-113, SBR-421, and SBR-713, near Cajon Pass (Basgall and True 1985:5.16-5.18, 7.10; Bouey 1985:J2; de Barros 1997:5-93; White 1973:Table 4) may complicate this scenario, unless Coso obsidian moved inland from the coast similar to the scenario suggested for San Diego County (Hughes and True 1985:333). In addition, minor amounts of Coso obsidian have also been documented for the early to mid Gypsum period Siphon Site (SBR-6580) in the Summit Valley 14 km east of Crowder Canyon (Sutton et al. 1993:53).
To the north, with additional Eastern Sierra sources of obsidian as potential competitors, one could view the early establishment of the Rose Spring village as strategically positioned or situated to assist with the control of access and trade through the southern Owens and Rose valleys. The later establishment of two large Rose Spring/Haiwee era villages north of the Rose Spring proper, at INY-3806/H on the western shore of Owens Lake at the confluence of Cottonwood Creek and at INY3812 in the north end of the Rose Valley (Delacorte 1994:5-6; Delacorte and McGuire 1993:178, 252), combined with the establishment of the Coso Junction Ranch village (INY-2284) southwest of the Rose Spring site (Allen 1986; Gumerman 1985; Whitley et al. 1988), could potentially further strengthen control over access through time. In addition, a third sizable Rose Spring period occupation at INY-1428, also located west of Owens Lake, adds even greater presence during this critical temporal period (Gilreath and Holanda 2000:121).
Returning to the Koehn Lake village, with a calibrated radiocarbon date suggesting establishment around 1700 B.P. (Sutton 1996:235, 238), perhaps part of this site's invested energy involved the strategic value of further controlling trade and access from realms to the south.
The discussed florescence of Coso quarrying during the late Gypsum and Rose Spring periods can also be viewed as a period of increasing cultural specialization (cf. Ericson 1984). Shifting from a perspective of potential specialized village establishment, examination of specialized quarry sites can follow. Gilreath and Hildebrandt (1997:178-179) have documented the increasing specialization of quarry selection within the Coso Volcanic Field during the Gypsum/Newberry and Rose Spring/Haiwee periods (see also Whitley et al. 1988:5), as well as the use of secondary bifacial reduction sites (see also Allen 1986:35).
The cryptocrystalline quarries of Red Rock Canyon State Park display a similar evolved focus and association with secondary reduction loci (Faull and Sampson 2004). Add to this the Antelope Valley rhyolite quarries (Glennan 1970, 1971; Sutton 1982) and a greater regional picture of the quarry complex emerges.
Within the localized El Paso Mountain to Fremont Valley region 94 percent of the recovered Rose Spring projectile points are fashioned from Coso obsidian. This ratio of preferred material use tends to contrast sharply with other eras within the local assemblage. However, despite this observed preference for obsidian point production during the Rose Spring period, the Red Rock cryptocrystalline quarries expand in tandem with the Coso model, indicating a reduced but specialized spectrum of use for cryptocrystalline materials within the tool kit of the El Paso to Fremont Valley segment of the Coso Economic System. In- depth analyses of local sites, such as the Koehn Lake village to the south and the Freeman Spring site (KER-6106) to the north, may offer greater insights into this more restricted, specialized use of cryptocrystalline rock within the Rose Spring tool kit.
The introduction of the bow and arrow during the period of Coso obsidian florescence has generated much debate as to the impact of such technology on both large mammal populations and lithic technology trajectories (Allen 1986; Ericson 1982; Grant et al. 1968:58; Yohe 1992, 1998; Yohe and Sutton 2000). Focusing first upon lithic technology trajectories, secondary bifacial reduction of tradable obsidian and other overlapping products of the Coso trade system could account in part for the difficulty researchers have experienced in discerning the introduction of the bow and arrow within lithic artifact assemblages.
In addition, some Antelope Valley researchers assert that local lithic trajectories suggest that Rose Spring points may have been traded into the valley as completed products (Earle 2004:12; see also the lack of debitage in Sutton 1988a:76). On the margins of the Fremont Valley at KER-1998, Sutton and Everson (1992:57) note that obsidian appeared mostly as small-sized pressure flakes, suggesting that obsidian "was being brought to the site as artifacts in generally completed form." Examining sites, such as Coso Junction Ranch and others, for the possible specialized production of tradable points might be another line of valuable inquiry (see the Phase B change in the ratio of biface thinning versus secondary reduction reported by Allen 1986:32-33, 37, 40; see also Gilreath and Hildebrandt 1997:168).
Whether or not the introduction of the bow and arrow decimated large mammal populations within this region, the archaeological record for this segment of the western Mojave is unequivocal about the intensification of focused food resources. The Rose Spring/Haiwee era witnessed both an expansion of pinyon processing (Bettinger 1975, 1976, 1980, 1989; Garfinkel and Cook 1979, 1980) and an accelerated fetish with the consumption of lagomorphs and a series of small animals (Delacorte 1994:8-10; Yohe and Sutton 2000:5), particularly hares.
Lepus procurement sees the establishment of massive specialized collection and processing sites, such as those at Freeman Spring near Walker Pass (Williams 2004), and at the Bickel site in the El Paso Mountains, KER-250 (McGuire et al. 1982). Intensive Lepus processing is known from the village sites of Rose Spring, Koehn Lake, and KER2211 (Sutton 1990:5, 1991:180; Yohe 1994; Yohe and Goodman 1991; Yohe and Sutton 2000:3). Gumerman (1985:28) documented that rabbit processing intensified during the progression of the Rose Spring period at the Coso Junction Ranch site (see also Whitley et al. 1988:6, 8). Kranz (1963:288) stated for the Rose Spring site that it was "tempting to conclude that rabbit brains were eaten, including the relatively soft cranial bones." Ethnographically, rabbit brains have been reported as a delicacy (Christenson 1990:368). However, it should be noted that at the Bickel site in the El Paso Mountains, Lepus heads and certain parts of the extremities were removed from lagomorphs before apparent transportation off-site to the place or point of actual consumption or use (Basgall 1982:137-138).
A suite of other small mammals and other animals were also widely to locally exploited by Rose Spring era populations (cf. Delacorte 1994 and others). Broadening the perspective, the Anasazi of the Southwest reportedly display a similar intensified utilization of small game, particularly lagomorphs and mice, before their profound decline, around the peak of the Medieval Climatic Anomaly (Diamond 2005:150). Perhaps a scenario somewhat similar to the Anasazi occurred in portions of the western Mojave — where initial success and population expansion possibly became increasingly difficult to support or sustain, in light of potential over-predation or increasing resource failure associated with progressing drought and aridity (cf. Ericson and Meighan 1984:150; Whitley et al. 1988:8; Yohe and Sutton 2000:1, 4).
In conclusion, from north to south, village establishment within the discussed corridor of the western Mojave Desert appears to initiate with relative concurrence during the Gypsum period, with each site displaying connectivity to both coastal and Coso resources. Over time, a series of late Gypsum through Rose Spring period, potentially interdependent sites appear to arise, possibly aligned to support the fruition of the Coso Obsidian Economic Exchange System.
By approximately 1100 B.P., the Antelope Valley is well positioned to participate in the emergence of the new trade system with the Southwest, which transitions into the Late Prehistoric or Marana period (Davis 1961:4, Map 1; Heizer 1946:191; Sample 1950:4-5; Warren and Crabtree 1986:193). The Antelope Valley displays village continuity across the Medieval Climatic Anomaly and the terminal Rose Spring (Campbell 2004:8, personal communication 2005; David D. Earle, personal communication 2004; see also the data of Robinson 1977; Sutton 1988a), which marks the demise of the long-standing Coso Economic System farther to the north.
By contrast, the Fremont, China Lake, and Rose valleys to the north experience the dramatic cessation of major quarrying at Coso and the resultant disseminating trade system (Ericson and Meighan 1984:149; Gilreath and Hildebrandt 1997:iii, 179, 183; Hughes and True 1985:333, 334; Meighan 1978:160; Koerper et al. 1986:53). In tandem, the major quarrying and secondary reduction loci located within Red Rock Canyon State Park in the El Paso Mountains cease function (Faull and Sampson 2004). Village abandonment occurs at a suite of sites, which includes the Koehn Lake village (Sutton 1990, 1991, 1996), the Coso Junction Ranch village (Allen 1986:2-3; Gumerman 1985; Sutton 1996:239; Whitley et al. 1988:5, 8; see also Yohe and Sutton 2000:3), the INY-1428 occupation site (Gilreath and Holanda 2000), the INY-3806/H village, and the INY-3812 village (Delacorte 1994; Delacorte and McGuire 1993). A significant decrease in activity is simultaneously recorded for the Rose Spring site (Lanning 1963; Whitley et al. 1988:5; Yohe 1992). Finally, the large, highly specialized rabbit procurement sites at Freeman Spring (Williams 2004) and at the Bickel site (McGuire et al. 1982) similarly demise.
In short, the system of villages and associated specialized sites, which apparently rise in concordance with the observed expansion of the Coso quarrying complex, appear to display a concurrence in their temporal cessation. In the absence of cooperative trade and possibly in light of prolonged, intensifying drought combined with local over- predation, the discussed desert-based villages of the northwest Mojave Desert appear to dissolve, never to be reassembled in the Fremont through Rose Valleys in any similar fashion.
It is not asserted with certainty that the Coso Obsidian Economic Exchange System involved precisely all the elements contended herein. Rather, this working hypothesis and its associated observations are intended to elevate a new dialogue to incite inquisition into the possible interrelationship and function of sites stretching along a known western Mojave Desert trade corridor.
If significant interconnectedness existed in the form of a regionalized trade economy, "optimal foraging theories" and "resource intensification models" will not adequately define past realities unless they account for such specialized energies. Likewise, models that attempt to define change in lithic technologies or trajectories will likely suffer similar frustrations unless the overlapping complexities of regional trade production are factored into analysis. I hope that this dialogue will prove productive towards a new linkage of regional prehistoric archaeology in the western Mojave Desert of California.
The author expresses his appreciation, gratitude, and respect to all the prior researchers from whom this work arises, acknowledging the heavy borrowing that encompasses such an attempted synthesis. A special appreciation is directed to Dr. Mark Sutton for his contributions and continued willingness to share information and ideas.
In addition, I express profound gratitude to those countless researchers who have kindly shared their wisdom, provided references, and tolerated a plethora of questions. Such individuals include, but are not limited to, Dr.
David Earle, Dr. Robert Yohe, II, Alan Garfinkel, Dr. Mark Allen, Michael Sampson, Dr. Jonathon Ericson, Mark Campbell, Barbara Tejada, Chris White, Victoria Harvey, and Jill Gardner.
Allen, Mark W. (1986): The Effects of Bow and Arrow Technology on Lithic Production and Exchange Systems: A Test Case Using Debitage Analysis. Unpublished Master's thesis, Department of Anthropology, University of California, Los Angeles.
E. Basgall, pp. 123-140. Report on file, USDI Bureau of Land Management, Ridgecrest, California.
Basgall, Mark E., and M. C. Hall (1992): Fort Irwin Archaeology: Emerging Perspectives on Mojave Desert Prehistory. Society for California Archaeology Newsletter 26(5):1, 4-7.
Basgall, Mark E., and D. L. True (1985): Archaeological Investigations in Crowder Canyon, 1973-1984: Excavations at Sites SBr-421B, SBr-421C, SBr-421D, and SBr 713. Report on file, California Department of Transportation District 8, San Bernardino.
Bettinger, Robert L. (1975): The Surface Archaeology of Owens Valley, Eastern California: Prehistoric Man-Land Relationships in the Great Basin. Unpublished Ph.D. dissertation, Department of Anthropology, University of California, Riverside.
— (1976): The Development of Pinyon Exploitation in Central Eastern California. Journal of California Anthropology 3:81-95.
— (1980): Obsidian Hydration Dates for Owens Valley Settlement Categories. Journal of California and Great Basin Anthropology 2:286-292.
— (1989): The Archaeology of Pinyon House, Two Eagles, and Crater Middens: Three Residential Sites in Owens Valley, Eastern California. Anthropological Papers of the American Museum of Natural History No. 67. New York.
Bouey, Paul D. (1985): Appendix J: Obsidian Source Determination of Archaeological Specimens from Crowder Canyon. In Archaeological Investigations in Crowder Canyon, 1973-1984: Excavations at Sites SBr-421B, SBr-421C, SBr-421D, and SBr-713, edited by Mark E. Basgall and D.L. True, vol. 2, pp. J-1-J-7. Report on file, California Department of Transportation District 8, San Bernardino.
Bouey, Paul D., and Mark E. Basgall (1984): Trans-Sierran Exchange in Prehistoric California: The Concept of Economic Articulation. In Obsidian Studies in the Great Basin, edited by R. E. Hughes, pp. 135-172. Contributions of the University of California Archaeological Research Facility No. 45. Berkeley.
Campbell, Mark M. (2004): Some Thoughts on Western Mojave Desert Prehistory. Paper presented at the 38th Annual Meeting of the Society for California Archaeology, Riverside.
Christenson, Lynne E. (1990): Western Mojave Subsistence: Faunal Analysis at the Farm Drop Zone Site, LAn-1296 & 1158. Proceedings of the Society for California Archaeology 3:365-379.
Davis, James T. (1961): Trade Routes and Economic Exchange among the Indians of California. University of California Archaeological Survey Reports No. 50. Berkeley.
de Barros, Philip (1997): Results from Archaeological Test Excavations and a Request for Determination of Eligibility for Nine Sites in Crowder Canyon: Route 138 Improvement Project 08-SBd-138, PM 16.2/19.7, Volume I: Research and Results. Report on file, California Department of Transportation District 8, San Bernardino.
Delacorte, Michael G. (1994): Late Prehistoric Resource Intensification in the Numic Heartland. Paper presented at the 24th Great Basin Anthropological Conference, Elko, Nevada.
Delacorte, Michael G., and Kelly R. McGuire (1993): Report of Archaeological Test Evaluations at Twenty-Three Sites in the Owens Valley, California. Report on file, USDI Bureau of Land Management, Ridgecrest, California.
Diamond, Jared (2005): Collapse: How Societies Choose to Fail or Succeed. Penguin Group, New York.
Earle, David D. (2004): Archaeological and Ethnographic Overview of Antelope Valley and the Piute Butte Region. Earle and Associates, Palmdale, California.
Ericson, Jonathon E. (1981): Exchange and Production Systems in Californian Prehistory: The Results of Hydration Dating and Chemical Characterization of Obsidian Sources. British Archaeological Reports International Series No. 110. Oxford.
— (1982): Production for Obsidian Exchange in California. In Contexts for Prehistoric Exchange, edited by J. A. Ericson and T. K. Earle, pp. 129-148. Academic Press, New York.
— (1984): Toward the Analysis of Lithic Production Systems. In Prehistoric Quarries and Lithic Production, edited by J. E. Ericson and B. A. Purdy, pp. 1-9. Cambridge University Press, Cambridge.
Ericson, Jonathon E., and Michael D. Glascock (2004): Subsource Characterization: Obsidian Utilization of Subsources of the Coso Volcanic Field, Coso Junction, California, USA. Geoarchaeology 19:779-805.
Ericson, J. E., H. C. Koerper, C. E. Drover, and P. E. Langenwalter, II (1989): Advances in Obsidian Hydration Dating and Obsidian Exchange in Prehistoric Orange County. Pacific Coast Archaeological Society Quarterly 25(2):45-60.
Ericson, Jonathon E., and Clement W. Meighan (1984): Boundaries, Alliance and Exchange in California. In Exploring the Limits: Frontier Boundaries in Prehistory, edited by Suzanne P. Atley and Frank J. Findlow, pp. 143-152. British Archaeological Reports International Series No. 223. Oxford.
Ericson, Jonathon E., and Clay A. Singer (1971): Geoscience at Castaic Creek Site, CA-LAn-324. Manuscript on file, UCLA Archaeological Survey Clearinghouse, Los Angeles.
Faull, Mark R. (2000): Recognition of Cultural Significance at Red Rock Canyon, Kern County, California. Proceedings of the Society for California Archaeology 13:259-265.
Faull, Mark R., and Michael P. Sampson (2004): Aspects of Prehistoric Cultural Change as Reflected in the Archaeological Record of Red Rock Canyon State Park, Kern County, California. Paper presented at the 29th Great Basin Anthropological Conference, Sparks, Nevada.
Gardner, Jill K. (1998): Testing a Regional Model of Changing Settlement and Subsistence Patterns in the Western Mojave Desert: Results from the Coffee Break Site. Unpublished Master's thesis, Department of Anthropology, California State University, Bakersfield.
Garfinkel, Alan P. and Roger A. Cook (1979): Prehistoric Change in Central Eastern California: The Sherwin Grade Site. California Department of Transportation Occasional Papers in Archaeology No 1. Sacramento.
— (1980): Radiocarbon Dating of Pinyon Nut Exploitation in Eastern California. Journal of California and Great Basin Anthropology 2:283-286.
Gilreath, Amy J., and William R. Hildebrandt (1997): Prehistoric Use of the Coso Volcanic Field. Contributions of the University of California Archaeological Research Facility No. 56. Berkeley.
Gilreath, Amy J., and Kim L. Holanda (2000): By the Lake by the Mountains: Archaeological Investigations at CA-INY-4554 and CA-INY-1428. Report on file, California Department of Transportation District 9, Bishop.
Glennan, William S. (1970): Preliminary Investigations into Subsistence and Settlement Patterns in Antelope Valley Between 3,000 and 5,000 B.P. Manuscript on file, Antelope Valley College, Lancaster, California.
— (1971): A Glimpse at the Prehistory of the Antelope Valley: Archaeological Investigations at the Sweetser Site (Ker-302). Kern-Antelope Historical Society, Rosamond, California.
Grant, Campbell, James W. Baird, and J. Kenneth Pringle (1968): Rock Drawings of the Coso Range, Inyo County, California. Maturango Museum Publication No. 4. China Lake, California.
Gumerman, George, IV (1985): An Optimal Foraging Approach to Subsistence Change: The Coso Junction Ranch Site. Unpublished Master's thesis, Department of Anthropology, University of California, Los Angeles.
Harvey, Victoria, and Jill K. Gardner (2003): Archaeological Investigations at CA-KER-246, Red Rock Canyon State Park, Kern County, California. Report on file, California Department of Parks and Recreation, San Diego.
Heizer, Robert F. (1946): The Occurrence and Significance of Southwestern Grooved Axes in California. American Antiquity 11:187-193.
Hirth, Kenneth G. (1978): Interregional Trade and the Formation of Prehistoric Gateway Communities. American Antiquity 43:35-45.
Hughes, Richard E., and Delbert L. True (1985): Perspectives on the Distribution of Obsidians in San Diego County, California. North American Archaeologist 6:325-339.
Koehler, P. A. and R. S. Anderson (1993): Twenty-four Thousand Years of Vegetation Changes from Fort Irwin, San Bernardino County, California. Report submitted to Far Western Anthropological Research Group, Davis, California.
Koerper, Henry C., J. E. Ericson, C. E. Drover, and P. E. Langenwalter II (1986): Obsidian Exchange in Prehistoric Orange County. Pacific Coast Archaeological Society Quarterly 22(1):33-69.
Krantz, Grover S. (1963): Apendix 2: Identification of Animal Bones from INY-372. In The Archaeology of the Rose Spring Site INY-372, by Edward P. Lanning, pp. 286-288. University of California Publications in American Archaeology and Ethnology 49:237-336. Berkeley.
Lanning, Edward P. (1963): The Archaeology of the Rose Spring Site INY-372. University of California Publications in American Archaeology and Ethnology 49:237-336. Berkeley.
Love, Bruce (1992): Cultural Resource Evaluation: Archaeological Site CA LAN 092, Lake Los Angeles, Los Angeles County. Submitted to Narcissa Corporation, Apple Valley, California.
— (1996): Lovejoy Springs Archaeology. In The Grayest of the Gray: Selections from Antelope Valley's Most Obscure Archaeological Literature, edited by Roger Robinson, pp. 105-106. Antelope Valley Archaeological Society Occasional Paper No. 3. Lancaster, California.
McGuire, Kelly R. (1994): A Cultural Resource Evaluation of CA-INY-3541, Inyo County, California. Far Western Anthropological Research Group, Davis, California. Submitted to MHA Environmental Consulting.
McGuire, Kelly R., Alan P. Garfinkel, and Mark E. Basgall (1982): Archaeological Investigations in the El Paso Mountains of the Western Mojave Desert: The Bickel and Last Chance Sites (CA-Ker250 and -261). Report on file, USDI Bureau of Land Management, Ridgecrest, California.
Meighan, Clement W. (1978): Obsidian Dating of the Malibu Site. In Obsidian Dates II: A Compendium of the Hydration Determinations Made at the UCLA Obsidian Hydration Laboratory, edited by C. W. Meighan and P. I. Vanderhoeven, pp. 158-161. Institute of Archaeology Monograph No. 6. University of California, Los Angeles.
Pampeyan, Earl H., Thomas L. Holzer, and Malcolm M. Clark (1988): Modern Ground Failure in the Garlock Fault Zone, Fremont Valley, California. Geological Society of America Bulletin 100:677-691.
Rector, Carol H., James D. Swenson, and Philip J. Wilke (1983): Archaeological Studies at Oro Grande, Mojave Desert, California. San Bernardino County Museum Association, Redlands, California.
Rhode, D., and N. Lancaster (1996): Past Environments of Edwards Air Force Base, California: Geological and Paleoecological Evidence. Report on file, Base Historic Perservation Office, Edwards Air Force Base, California.
Robinson, R.W. (1977): The Prehistory of the Antelope Valley, California: An Overview. Kern County Archaeological Society Journal 1:43-48.
— (1981): Excavations at KER-147: Red Rock Canyon State Park, California. Manuscript on file, California Department of Parks and Recreation, San Diego.
Sample, L.L. (1950): Trade and Trails in Aboriginal California. University of California Archaeological Survey Reports No. 8. Berkeley.
Sampson, Michael P. (2003): An Archaeological Survey of the Last Chance Canyon Addition and Selected Adjoining Park Lands in Red Rock Canyon State Park. Report on file, California Department of Parks and Recreation, San Diego.
Smith, George I. (1979): Subsurface Stratigraphy and Geochemistry of Late Quaternary Evaporites, Searles Lake, California. Geological Survey Professional Paper No. 1043. Government Printing Office, Washington.
Stine, Scott (1994): Extreme and Persistent Drought in California and Patagonia during Medieval Time. Nature 369:546-549.
(1995): Late Holocene Fluctuations of Owens Lake, Inyo County, California. In Archaeological Evaluations of Thirteen Sites for the Ash Creek Project, Inyo County, California, edited by Amy Gilreath, Appendix F. Far Western Anthropological Research Group, Davis, California. Report on file, California Department of Transportation District 9, Bishop.
Stuiver, Minze, and George I. Smith (1979): Radiocarbon Ages of Stratigraphic Units. In Subsurface Stratigraphy and Geochemistry of Late Quaternary Evaporites, Searles Lake, California, edited by George I. Smith, pp. 68-75. Geological Survey Professional Paper No. 1043. Government Printing Office, Washington, D.C.
Sutton, Mark Q. (1980): Some Aspects of Kitanemuk Prehistory. Journal of California and Great Basin Anthropology 2:214-225.
— (1981): Obsidian Hydration in the Antelope Valley. In Obsidian Dates III: A Compendium of the Obsidian Hydration Determinations Made at the UCLA Obsidian Hydration Laboratory, edited by Clement W. Meighan and Glenn S. Russell, pp. 123-124. Institute of Archaeology Monograph No. 16. University of California, Los Angeles.
— (1982): Archaeology of the Fairmont Buttes. Pacific Coast Archaeological Society Quarterly 18(4):1-26.
— (1986): Preliminary Results of the Excavations at Koehn Lake. Paper presented at the 20th Annual Meeting of the Society for California Archaeology, Santa Rosa.
— (1988a): An Introduction to the Archaeology of the Western Mojave Desert, California. Coyote Press Archives of California Prehistory No. 14. Salinas, California.
— (1988b): On the Late Prehistory of the Mojave Desert. Pacific Coast Archaeological Society Quarterly 24(1):22-29.
— (1989): Late Prehistoric Interaction Spheres in the Mojave Desert, California. North American Archaeologist 10:95-121.
— (1990): Koehn Lake in the Prehistory of the Southwestern Great Basin. Paper presented at the 55th Annual Meeting of the Society for American Archaeology, Las Vegas, Nevada.
— (1991): Archaeological Investigations at Cantil, Fremont Valley, Western Mojave Desert, California. Occasional Papers in Anthropology No. 1. Museum of Anthropology, California State University, Bakersfield.
— (1996): The Current Status of Archaeological Research in the Mojave Desert. Journal of California and Great Basin Anthropology 18:221-257.
Sutton, Mark Q., and G. Dicken Everson (1992): Archaeological Investigations at the Oak Creek Canyon Site (CAKER- 1998), Tehachapi Mountains. Pacific Coast Archaeological Society Quarterly 28(1):43-66.
Sutton, Mark Q., and Carl L. Hansen (1986): Investigations at Koehn Lake, Western Mojave Desert. Paper presented at the 20th Great Basin Anthropological Conference, Las Vegas, Nevada.
Sutton, Mark Q., and R. W. Robinson (1982): Morphology of Three Structures Recovered during Excavations at KER-303, a Late Period Village in the Western Mojave Desert. Paper presented at the 18th Great Basin Anthropological Conference, Reno, Nevada.
Sutton, Mark Q., Joan S. Schneider, and Robert M. Yohe II (1993): The Siphon Site (CA-SBR-6580): A Millingstone Horizon Site in Summit Valley California. San Bernardino County Museum Quarterly 40(3).
Toney, James T. (1968): Archaeological Salvage of Site 4-LAn-192, Los Angeles County, California. UCAS Project No. 300. Manuscript on file, Archaeological Survey, University of California, Los Angeles.
Warren, Claude N. (1988): Archaeology of Late Times, Mojave Desert, California. Pacific Coast Archaeological Society Quarterly 24(1):45-50.
Warren, Claude N., and Robert Crabtree H. (1986): Prehistory of the Southwestern Area. In Great Basin, edited by Warren L. d'Azevedo, pp. 183-193. Handbook of North American Indians, Vol. 11, William C. Sturtevant, general editor, Smithsonian Institution, Washington, D.C.
White, Chris (editor) (1973): Preliminary Report of Archaeological Investigations in Crowder Canyon, San Bernardino County, California. Report on file, California Department of Transportation District 8, San Bernardino.
Whitley, David S., George Gumerman, IV, Joseph M. Simon, and Edward H. Rose (1988): The Late Prehistoric Period in the Coso Range and Environs. Pacific Coast Archaeological Society Quarterly 24(1):2-10.
Wigand, Peter E. (2003): Middle to Late Holocene Climatic and Vegetation Dynamics in the Northwestern Mohave Desert as Revealed in Pollen and Macrofossil from Ancient Woodrat Middens. In Research Issues Revisted: The Archaeology of Coso Basin: Test Excavations at 28 Sites Located in the North Ranges Complex, NAWS, China Lake, edited by J. S. Rosenthal and J. Eerkens, pp. 231-250. Report on file, China Lake Naval Air Weapons Station, China Lake, California.
Wigand, Peter E., and David Rhode (2002): Great Basin Vegetation History and Aquatic Systems: The Last 150,000 Years. In Great Basin Aquatic Systems History, edited by Robert D. Hershler, David B. Madsen, and Donald R. Curry, pp. 309-367. Smithsonian Contributions to Earth Sciences No. 33. Washington, D.C.
Williams, Audry (2004): Subsistence Patterns at Freeman Spring (CA-KER-6106), Northwestern Mojave Desert. Paper presented at the 29th Great Basin Anthropological Conference, Sparks, Nevada.
Yohe, Robert M. II (1992): A Reevaluation of Western Great Basin Cultural Chronology and Evidence for the Timing of the Introduction of the Bow and Arrow to Eastern California Based on New Excavations at Rose Spring Site (CA-INY-372). Unpublished Ph.D. dissertation, Department of Anthropology, University of California, Riverside.
— (1994): Vertebrate Faunal Analysis of Selected Loci of the Rose Spring Site (CA-INY-372): Preliminary Results. Paper presented at the 24th Great Basin Anthropological Conference, Elko, Nevada.
— (1998): The Introduction of the Bow and Arrow and Lithic Resource Use at Rose Spring (CA-INY-372). Journal of California and Great Basin Anthropology 20:26-52.
Yohe, Robert M., II, and John D. Goodman II (1991): An Analysis of Faunal Remains from CA-KER-2211. In Archaeological Investigations at Cantil, Fremont Valley, Western Mojave Desert, California, edited by Mark Q. Sutton, pp. 202-222. Occasional Papers in Anthropology No. 1. Museum of Anthropology, California State University, Bakersfield.
Yohe, Robert M., II, and Mark Q. Sutton (2000): Implications of Technical and Environmental Change in the Rose Spring Period in the Western Mojave Desert. Paper presented at the 34th Annual Meeting of the Society for California Archaeology, Riverside. | 2019-04-19T18:22:20Z | https://scvhistory.com/scvhistory/markfaull2006.htm |
Airservices is Australia's air navigation service provider - we provide air traffic control, aviation rescue and fire fighting and air navigation services.
I, Air Chief Marshal Sir Angus Houston AK, AFC (Ret’d), as Chair of Airservices Australia, present the Airservices Australia 2018–19 Corporate Plan, which covers the periods of 2018–19 to 2022–23, as required under section 35(1) (b) of the Public Governance, Performance and Accountability Act 2013 and Section 13 of the Air Services Act 1995.
I am pleased to present the Airservices 2018–19 Corporate Plan. This Plan has particular significance for me as it is my last as Chair of Airservices Australia. It provides a blueprint to be passed on to the next generation of leaders as they support our customers to navigate an exciting future.
This year’s Plan outlines how Airservices is building on the strong foundations laid in recent years, to evolve how we support our customers and industry to meet both current and future needs, in a rapidly changing aviation environment.
The factors influencing air space management over the next five years have never been so diverse, complex or exciting. Aviation has always been an industry that thrives on innovation, but the coalescence of technological advancements, globalisation and increased customer expectations is providing an unprecedented context in which we must continue to deliver safety and service excellence.
Building on the significant work done internally on our business fundamentals in 2017–18—with a new operating model, matched with updated organisational values (championing customer centricity and innovation) and a return to a sustainable financial position, we are both optimistic and focused on preparing for this future.
In February 2018, we were pleased to make a significant advance into this rapidly changing environment, with the signing of the OneSKY contract to deliver the most advanced air traffic control system in the world. This milestone is significant—many years in the making, in collaboration with the Department of Defence, it signals the achievement of civil military air traffic harmonisation in our region. This is the most important development in the safe management of Australia’s skies since the dawn of Australian aviation. Work is well underway, with the benefits being delivered progressively over the roll-out period.
OneSKY is our most important platform from which to deliver value to our customers, and this Plan speaks to how we will achieve that now that OneSKY is a reality. As always, customer needs are prime, and customer centricity is embedded in both the Airservices’ values and operating model.
Customer-centricity will continue to drive decision making in both the Service Excellence pillar (delivering with excellence what we do now) and Service Innovation pillar (new ways to deliver, and new service areas to add value) of our 2018–19 Corporate Plan.
While firmly focused on the delivery of OneSKY for our customers and partners, we are also preparing for the future context in which it will be delivered.
That means working with industry to understand the changes we are all facing. It means bringing an expert voice to regulatory and policy considerations, and sharing information and expertise to enhance understanding, foster and grow civil aviation and provide the opportunity for further innovation. These elements are captured in the Industry Leadership pillar of our strategy.
Of course, the basis from which we will achieve these ambitions is the organisation – the people, culture and processes that facilitate the outcomes we exist to deliver. We need to continue to build a culture founded on the pride and sense of responsibility that we all have in the important work we do, and engage our people within an agile and technology-enabled organisation, ready to navigate future change.
As we are funded by the industry, we remain ever cognisant of our duty to provide value, through valued services, efficiently delivered. We are pleased that our prices have been held unchanged for three years, reflecting the value delivered from our internal efficiency improvements.
This Plan demonstrates our commitment to continue to deliver that value, and look to innovate and improve, all at no additional cost to industry—clear evidence of our commitment and capability to achieve continuous improvement through a customer value lens.
This year you may notice that we are expanding the frame of reference of our Corporate Plan so that it presents a more comprehensive picture of the full range of activity Airservices undertakes, not just a view of in-train initiatives and projects.
I am proud of the depth and breadth of what this organisation has achieved, and delivers on a day to day basis. Our vision for the future is laid out in the following pages. I have been privileged to lead as Chair of this great organisation for the last six years. I wish my colleagues on the Board, and every individual at Airservices, all the best as they work to deliver on this plan and fulfil the ongoing potential of Airservices to add real value to aviation in Australia, our region, and beyond.
Our purpose is to provide safe, secure, efficient and environmentally responsible air navigation and aviation rescue fire fighting services that are valued by the aviation industry and community on behalf of our owner, the Australian Government. We operate in accordance with the requirements of the Air Services Act 1995 (the Act) and the Public Governance, Performance and Accountability Act 2013 and in response to the Government’s Statement of Expectations (Appendix A) issued as a notice of strategic direction to the Board of Airservices Australia under Section 17 of the Act. A key legislative obligation under the Air Services Act 1995 is to foster and promote civil aviation. In fulfilling this obligation in an ever changing operating environment, our service delivery must not become an operational or economic impediment to the growth of the aviation industry.
With the operating environment for global Air Navigation Service Providers (ANSPs) changing at such a rapid pace, we closely monitor emerging trends and developments so that we can continue to discharge our responsibilities to keep air travel safe, and support our customers with efficient services.
Our industry continues to grow—by 2030, Australia’s capital cities will support 235 million travellers each year. The biggest growth is from China (5.6% growth per year), the rest of Asia (3.5%) and North America (4%). By 2035, over 130 million passengers from China and over 105 million passengers from North America are expected to travel to Oceania every year.
These forecasts are supported by trends we have observed in our key market segments over the past 12 months. Specifically, there has been an increase in the number of flights we manage in our emerging markets of North Asia and the Americas, and our traditional Middle Eastern market.
Further, Australia’s capital cities will support 2.3 times more passenger movements from 98.3 million passengers in 2009 to 235 million by 2029. This will be supported by nearly twice the amount of aircraft movements from 1.09 million in 2009 to 1.7 million in 2029.
The global drone market is also expanding rapidly. From 150,000 drones globally in 2016; by 2031 there are expected to be 24 million drones in the skies. This growth will be accompanied by an increase in economic activity, with drone spending estimated to be over US$3.1 billion in Australia alone between now and 2021.
As the global aviation market continues to change, Airservices must evolve in order to continue to deliver on our purpose and vision. Early in 2018, we signed the OneSKY contract to deliver the most advanced air traffic management system in the world. We need to both deliver OneSKY and actively prepare for the future context in which it will be delivered.
This year’s Corporate Plan explores some of the emerging factors that are shaping both what and how we deliver to customers, so that as we plan for the next five years (and the decades beyond that), we remain as relevant, efficient and valued as possible.
Looking ahead—What is happening in the aviation industry?
Rapid disruption is occurring—our skies will start to look different between now and 2023, the five year period covered by this Plan. Technology is reshaping how we perform our important roles in air traffic control and aviation rescue and fire fighting. The risk profile is changing. There will be more complexity, more connectivity and more tools at our disposal to deliver innovative and valuable outcomes.
The key themes for our industry (and their implications for ANSPs like Airservices) over the next decade, for which we must prepare now, are detailed in this section.
As the magnitude of air travel continues to increase, airspace will need to be harmonised across flight information regions to improve efficiency. Air navigation services will be required to be delivered based on operational needs, rather than constraints of national boundaries. These changing circumstances will require enhanced cooperation between States and key industry players.
Providing support for airport infrastructure projects to release incremental capacity and manage the increase in traffic, which is currently causing capacity constraints, will continue to be required to manage the environmental and other impacts of an increasingly congested airspace.
Over the next decade, traditional (including ultra-long haul) and non-traditional vehicles will operate alongside each other, increasing the congestion and complexity of airspace. Vehicles are expected to occupy both regulated and unregulated airspace (including above 65 000 feet and below 400 feet). New models of air traffic are likely to emerge, including models that include the principle of a sharing economy.
There is a growing requirement to integrate controlled and uncontrolled airspace to ensure safe air traffic operation within increasingly congested skies. ANSPs must work effectively with regulatory bodies to balance aviation industry growth and safety.
This will require ANSPs to proactively form a forward-looking view on policy and regulatory change which accommodates anticipated growth, maintains safety, and ensures resilience and security.
As data is able to be more readily captured, it will form an increasing critical role to support operational efficiency and effectiveness. Information management, and the insights it captures, will form core value propositions to businesses.
Artificial Intelligence (AI) and Virtual Technology (VT) have the potential to significantly increase operating efficiency. Leveraging new technology will create opportunities to improve overall performance, productivity and safety, as well as opening up potential for more innovation. Integrating these technologies with existing capability will increase system complexity and requires a measured transition between old and new systems to achieve intended benefits.
New entrants are bringing unique propositions and business models (e.g. telcos and their communications networks) to the global aviation market. Incumbents are looking to expand along the value chain (e.g. manufacturers working with other players to co-develop self-navigating technology). Strategic partnerships will become critical for ANSP success.
Industry players will race to provide end to end customer experiences by vertically integrating travel. Organisations will need data, and the business insights it provides, to create hyper-personalised services for customers.
What does this mean for Airservices?
We need to proactively assess and adapt to these changes to ensure we continue to provide safe, secure, efficient and environmentally friendly services to the aviation industry. For our traditional, regulated services this means actively supporting our customers to increase capacity during all phases of flight to enable them to continue to optimise and enhance the customer experience.
OneSKY, Airport Collaborative Decision Making (A-CDM), and Long Range Air Traffic Flow Management (LR-ATFM) are key to achieving this outcome.
An emerging area of focus will be to evolve our information services, and build relationships with strategic partners across the value chain.
The growth of new, non-traditional vehicles will also bring specific challenges in how they should be managed and safely integrated with existing traditional operations. Over the life of this Plan, we will work closely with regulators, our customers, government and non-traditional operators to ensure this important new segment of the aviation industry is supported to grow, safely.
Building on our strong foundations laid in 2016–17, our focus in 2018–19 and beyond looks to the future of our industry. Detailed in our Strategic Pillars and Initiatives, we are focused on what our customers value and expect, our operating environment, and the challenges and opportunities of technology and trends in aviation and air safety globally.
During 2017–18 with planned investments in OneSKY and new technologies such as Airport Collaborative Decision Making and Digital Aerodrome Services progressing, our organisation is now evolving its focus from internal efficiency to industry contribution. We are now well placed to deliver value through service excellence and innovation for our customers, to help them to navigate the challenges and opportunities of technology and respond to trends in aviation and air safety globally.
With a new customer-centric operating model in place, we reflected on our core principles and, with the input of our people, updated our organisational values to reflect the more agile, relationship-based and customer centric cultural aspiration that had motivated and guided such momentous change in our business.
1. Our primary effort is invested in delivering Service Excellence to our customers.
This means doing what we do now, well; to meet and exceed the expectations of our customers. It means always working to enhance the safety, agility and efficiency with which we deliver our core air navigation and aviation rescue fire fighting services.
2. We actively consider and invest in Service Innovation.
This means exploring ways to enhance our existing service offering (in the near term) and exploring new potential service offerings in emerging segments of the aviation industry in the longer term.
3. We demonstrate Industry Leadership by proactively shaping and influencing policy that supports the aviation industry to grow safely.
This includes contributing on industry-wide issues such as airspace and environmental management.
4. We build Organisational Agility so that we operate effectively and efficiently.
Engaging and developing our people in an environment and culture in which both core business and future innovation can thrive.
Service Excellence is how we meet and exceed the expectations of our customers by delivering our current services to a standard of excellence.
As aviation traffic grows, it is imperative that we maintain our focus on safety and quality delivery of our Air Traffic Management (ATM) and Aircraft Rescue and Fire Fighting (ARFFS) services while continuously improving efficiency and effectiveness. Service excellence encompasses all aspects of continuous improvement across every part of our business, cognisant of our environmental obligations and rewarding the trust placed in us by the communities and the Government.
OneSKY remains a critical priority and will see us realise our goal of harmonising civil military air traffic management. The program of work for the coming year will focus on finalising the system design review for the core CMATS capability, and commencing work on support facilities (including Air Traffic Service Centres) and enabling capabilities (such as the roll out of new voice communications systems in Perth, Melbourne, Sydney and Brisbane).
We are undertaking a range of investments over the life of this plan to ensure that we support industry expansion and infrastructure investment across Australia. Activities under this initiative will see us deliver essential communications, navigation and surveillance facilities to allow new runways to meet regulatory requirements and increase airport capacity.
Digital tower technology will deliver better safety and operational outcomes through more flexible and efficient service offerings at emerging aerodromes.
We have a responsibility to protect the environment from the effects of aircraft operations. In accordance with our Minister’s Statement of Expectations, we produce an annual environmental work plan and this year we are focussed on improving how we engage with communities in relation to aircraft noise, including the assessments and analysis on which our engagement is based.
We continue to implement new services to support safe traffic growth. Preparatory work for Proserpine ARFF services will be completed in the coming year, with services planned for commencement from 2019 onwards.
All of the initiatives described under this pillar contribute to our performance outcomes of ‘safe and secure’, ‘valued and accountable’ and ‘efficient and commercial’.
The success of these initiatives will be measured on the completion of the specified deliverables within the next 12 months and our successful progression of each program of work in the subsequent years.
Beyond our existing services, Service Innovation requires that we proactively innovate and deliver new service offerings to bring value to customers in both existing and emerging sectors of our industry.
The pace of change in aviation requires that we enhance our ability to build and deploy new services and information capabilities, for both traditional and new airspace users. Through this innovation, we will make a further contribution to growing the aviation industry, beyond the safety outcomes we currently deliver.
In the near term, service innovation will focus on activities that will enhance the traditional ATM offering (e.g. LR-ATFM and A-CDM) to deliver new value and release incremental capacity at airports.
In the longer term, this may expand to encompass identifying and exploring new service requirements in emerging segments of the aviation industry or opportunities to add value in new areas of the aviation value chain. We will look to further integrate within the industry, to maximise the benefits of interconnectedness and to work in new ways across the aviation ecosystem, anticipating and able to meet customers changing needs.
A-CDM is a cross-industry initiative with the potential to realise major savings to the aviation industry over the next decade. Building on the operating and governance work we completed last year, this year will see the initial implementation of the A-CDM system (with Brisbane, Sydney, Melbourne and Perth all targeted for this year).
This year we shift from developing a concept of operations for LR-ATFM to commencing implementation. LR-ATFM shifts some or all of the required airborne delay for long range flights from the arrival phase of the flight to the enroute phase, resulting in less fuel burn and improved predictability of arrival flows into our major airports.
In the out-years of this plan, Airservices will also invest in building on the capability delivered by A-CDM and LR-ATFM to further improve network management. This will include continued focus on minimising off-route constraints, improving the flexible use of airspace and implementing a collaborative connective forecasting capability.
Implementation of our information strategy will see us invest in a standardised enterprise solution (including a workbench of tools, platform, support and processes), supporting data management, business intelligence and analytics, data warehousing, and data lake components and tools. This capability will provide the necessary integration, real-time data provisioning, self-service, and security capabilities to support System Wide Information Management (SWIM).
All of the initiatives described under this pillar contribute to our performance outcomes of ‘efficient and commercial’ and ‘innovative’. Our investment in this space is focused directly on ensuring that we proactively build the capabilities required to provide our customers with the operational flexibility they need to be successful and with services they value as the industry changes and grows.
The success of these initiatives will be measured on the completion of the above deliverables within the next 12 months and our successful progression of each program of work in the subsequent years.
One of our key legislative obligations under the Air Services Act 1995 is to foster and promote civil aviation. It’s why we place critical importance on not being an economic or operational impediment to industry growth (evidenced by the value we have returned to customers in recent times with no change in funding requirements).
Our role in fostering and promoting civil aviation challenges us as an industry leader, to continually look for ways to be more proactive across the entire aviation ecosystem. This leadership will be exemplified by proactivity; anticipating changes rather than responding, and bringing together stakeholders from across our industry to navigate through inevitably complex issues. This collaboration will support industry growth, as together we create an environment in which the aviation industry thrives.
Throughout, we will ensure representation of all layers of our industry—airlines, regional operators and general aviation users—and the communities and citizens who we ultimately protect.
This pillar continues our established role in managing and evolving Australia’s airspace to balance competing demands of growth, technical change, consumer expectations and environmental consideration. It reflects the requirement for us to shape policy and collaborate with industry stakeholders to foster safe and secure industry growth in the future.
We fulfil our role in the management of Australian airspace in accordance with the Government’s Australian Airspace Policy Statement, which requires us to, among other considerations, consider the safety of air navigation, the current and future needs of the aviation industry, and take advantage of technologies wherever practicable. In 2018–19 we will work with the Civil Aviation Safety Authority to standardise the services provided in both Class A and Class E airspace across Australia, increasing consistency for airspace users. We will also commence the trial of lowering the base of Class E airspace, which was initiated in 2017–18. This trial will be carefully managed to protect the safety of air navigation, while leveraging new technology to increase airspace accessibility.
All of the initiatives described under this pillar contribute to our performance outcomes of ‘valued and accountable’, ‘efficient and commercial’ and ‘innovative’. Our aim is to bring the disparate requirements and priorities of our entire stakeholder group together to provide a leadership role across the entireecosystem.
We need to ensure that we continue to set the internal conditions for service delivery and future innovation to thrive.
This means continuing to develop a culture which is customer centric and commercially focused, with processes and systems in place to support our people to achieve long term objectives from both a Service Excellence and Service Innovation perspective.
It also requires ongoing investment in enabling digital capability to ensure that as our operating model and ways of working continue to evolve to take advantage of new opportunities in new areas, our technology evolves in parallel.
Our People Strategy recognises the need for fundamental shifts in our workforce capability and composition over the long-term. The Workforce Transformation Roadmap will identify and prioritise key talent segments that will be subject to transformation, identify milestones and functional accountability for clearly articulating future requirements, shifting capability through recruitment, development and certification and addressing factors that impact attraction, selection and retention of priority talent.
We will enter digital workflow services into operation over the first 12 months of this plan. This capability will provide the tools, processes, methodologies and personnel required to provide an integrated and automated workflow creation service (and includes the integration of key data sources and retention compliance requirements for decisions and records).
Our Cyber Security program will deliver an effective and efficient Cyber Resilience Management System (CRMS) to complement our existing Risk Management and Safety Management systems. It will promote and develop a Security Culture in Airservices’ personnel and align us with the principles of the Australian Government’s Information Security Manual and Protective Security Policy Framework standards.
By updating system configuration standards and processes to ensure ongoing resilience, and implement essential security tools and capabilities to ensure we proactively protect our information management assets.
Our organisational capacity and capability underpins our success across all of our performance outcomes. An agile, fit for purpose organisation is a pre-requisite for successful achievement of our service, innovation and industry initiatives.
Our success beneath this pillar will be measured on the completion of the above deliverables within the next 12 months.
Our strategic performance outcomes support, inform and drive our decision making. They will ensure that we continue to work towards being recognised as an industry leader and a valued service provider.
Our overall approach to measuring performance reflects our commitment to achieving these outcomes. We monitor and manage our performance via a set of key performance indicators (KPIs) as outlined in Table 1. These nine KPIs are balanced against the broad criteria of safety, financial stewardship, operational efficiency, industry outcomes, and organisational capacity in order to present a holistic view of our how we are delivering on our purpose, vision and strategic priorities over time.
Maintaining our already strong record around significant safety occurrences and our lost time frequency injury rate clearly demonstrates the degree to which we are achieving our safety and security outcomes.
Similarly, strong industry advocacy, achievement of Net Profit After Tax (NPAT) and Return On Assets (ROA) targets, and reductions in airborne delay and total cost per Instrument Flight Rules flight hour, demonstrate directly the degree to which we are providing valuable, accountable, efficient and commercial services to our customers.
Innovation is an area where measuring performance is challenging as it is a forward-looking ambition. However in the near term our innovations around A-CDM and LR-ATFM will translate to measurable improvements in the efficiency and effectiveness with which we deliver core services. As we innovate to introduce new services and capabilities into our organisation in the second half of the five years covered by this plan, additional KPIs which more directly track the impact of our innovation will be introduced.
The level of engagement and diversity our workforce represents is critical for Airservices to achieve its business objectives and is a prerequisite for success against all of our other performance goals.
This five-year financial plan supports our strategy and funds key investment and services improvement programs to enhance safety and deliver value to industry.
It builds on the financial performance achieved over previous years and reflects our continued focus on driving business improvements to support long term growth across the Australian aviation industry. With no price increase forecast over the planning period, it enables real price reductions of 17 per cent since the last price increase in July 2015.
The plan funds our forward capital investment program, which remains focused on customer service improvements, supporting airport infrastructure projects to increase capacity while enhancing safety and business resilience. The delivery of the OneSKY program and our investment to support major airport development plans is included in accordance with the current investment delivery schedules.
The five-year operating projections and performance measures are shown in Table 2. The plan reflects the latest economic outlook and airways traffic projections.
We set our prices in consultation with our customers for core airways services under Long Term Pricing Agreements.
Under the provisions of the Competition and Consumer Act 2010 any increase in prices must be notified to the Australian Competition and Consumer Commission for its review.
We established the current pricing agreement in October 2011. It has continued to allow us to recover all reasonably incurred costs (including a return on capital employed) relating to the delivery of our services and it has provided ongoing price certainty for our customers.
Today, our prices are the same as they were in July 2015. Reflecting a more efficient operating cost base delivered through our Accelerate Program, this plan maintains weighted average prices at existing rates, delivering our customers real price decreases of 17 per cent since July 2015 while providing improved service value through to 2023.
Return on Assets and Net Profit After Tax are forecast at an average of 6 per cent and $66 million per year respectively. These returns are in line with price regulatory benchmark rates.
Revenues over the period are projected to grow in line with traffic with no planned increases in weighted average prices.
The outlook for traffic growth continues to be driven by the performance of international aviation sector on the back of the ongoing expansion of the Asian market. However, some slowing in this sector is expected, with potential short term market volatility over the planning horizon. Following consecutive years of contraction across domestic services, some signs of improvement are emerging.
Expenses are forecast to grow between two to three per cent per annum over the next five years. The plan factors in the delivery of new services and improvement programs, including the expansion of air traffic control and aviation rescue and fire fighting services to support new regional east coast locations and parallel runways operations. Allowances have also been made for Per- and poly-fluoroalkyl substances (PFAS) site testing work.
In line with our strategy the business continues to invest in technology and data to provide information services for the future. The financial plan caters for the investment in services and systems that ensure the delivery of new secure information services.
With a once in a generation change to the new Civil Military Air Traffic Management System, the plan incorporates transition and capability readiness activities, and overlapping support for old and new systems which is required as part of the implementation of the new system scheduled from 2020–21 onwards.
The five-year capital investment projections are provided in Table 3. This investment profile incorporates the funding required to deliver on our strategy across the planning years with total investment levels estimated at $1.2 billion over five years.
Providing significant benefits to the customer through maintaining our safety performance, reducing fuel burn for airlines and providing dynamic information for better managing impacts of delay in a growing traffic environment are the key themes of our investment plan. OneSKY activities and associated enabling projects remain the central focus of the program accounting for $724 million, or 59 per cent, of the total expenditure. The remainder of the program will support the delivery of airport new runway developments, establish two new regional services and continue the expansion of surveillance services to improve safety and support industry growth. To improve the efficiency of the air traffic management network the program will continue to invest in information technology.
Dividend levels over the first two years of the plan have been reduced to be reinvested into the business whilst capital expenditure funding requirements remain high as we deliver OneSKY, introduce new services and support major airport infrastructure projects. From 2020–21 dividends are forecast to be paid out at a rate of 30 per cent of after tax profits returning an average of $20 million in dividends each year.
Through sustained levels of profitability, dividend planning and management of capital expenditure funding, gearing is projected to remain within target levels and average 42 per cent over the term of the plan.
We are committed to developing and promoting a culture of active risk management supported by robust and transparent governance oversight. Our Board Risk Appetite Statement promotes risk-based decision making driven by a sound understanding of our risk environment. This assists us to meet our obligations under Section 16 of the Public Governance, Performance and Accountability Act 2013 and commitment to better practice risk management in accordance with the Commonwealth Risk Management Policy.
We perform an integral role in the Australian aviation industry and operate in an inherently complex environment. Our external risk considerations include our regulators, emerging technologies, changes to the domestic and international economic environment, and our role in the broader commercial aviation industry.
We have a wide range of risks associated with our operational activities.
Responding to these diverse risks requires us to ensure the integrity of our safety and environment management systems and service delivery to maintain long term sustainability. We continuously improve our operating systems, embrace innovation and engage with technology to remain responsive to changes.
Business risks: including ATM and ARFF service delivery, business continuity, as well as compliance with Work Health and Safety (WHS), environment and financial obligations.
We are committed to, and actively apply, a continuous improvement approach towards risk management that aligns with best practice principles and is consistent with the International Standard ISO 31000:2018 Risk management – Guidelines.
and decision-making processes through a clear articulation of risk tolerance and the level of risk that we are willing to accept as an organisation. Through the implementation of our Risk Management Standard, as a part of the Governance, Risk and Compliance (GRC) Framework, we proactively identify and treat risks to within acceptable tolerances in our operations and operating environment.
Operational Level – application of risk assessment and management techniques to meet operational framework and management system objectives.
The Enterprise Risk Report, supported by Business Group Risk Reports, are reviewed by the Chief Executive Officer and the Executive Team on a quarterly basis. A quarterly GRC Report containing contemporary enterprise risk information is also presented to the Board Audit and Risk Committee (BARC) for review and oversight. Effective reporting and oversight assists our leaders in making strategic decisions to address major threats and seize opportunities in an open and transparent way.
In addition, we apply the three lines of defence model to provide assurance that our key controls are effective in managing risk. Assurance activities are layered across the three lines of defence and embedded into our processes. These assurance activities provide the leadership team, the BARC and our stakeholders with a high level of comfort that risks are being managed, compliance obligations being met and corporate objectives are being achieved.
Overview This instrument is known as the Statement of Expectations for the Board of Airservices Australia for the period 22 May 2017 to 30 June 2019.
This instrument commences on 22 May 2017 and expires at the end of 30 June 2019 as if it had been repealed by another instrument.
This instrument repeals the previous Statement of Expectations for the Board of Airservices Australia for the period 1 July 2013 to 30 June 2015 and the Statement of Expectations for the Board of Airservices Australia for the period 1 July 2015 to 30 June 2017.
This instrument puts in place a new Statement of Expectations (SOE) which serves as a notice to the Board of Airservices Australia (Airservices) under section 17 of the Air Services Act 1995 (the Act).
The new SOE outlines in a formal and public way, the Government’s expectations concerning the operations and performance of Airservices. The Airservices Board’s Statement of Intent as outlined in this section responds to each element of the Statement of Expectations* (22 May 2017 to 30 June 2019) and states our formal commitment to meeting our Minister’s expectations.
In addition, this Corporate Plan supports our Statement of Intent in response to the Statement of Expectations.
Governance Airservices should perform its functions in accordance with the Act, which requires that Airservices must regard the safety of air navigation as the most important consideration.
Airservices shall also perform its functions in accordance with the Public Governance, Performance and Accountability Act 2013 (PGPA Act) as well as other relevant legislation.
Airservices should maintain high standards of professionalism, service, probity, reporting, accountability and transparency, consistent with the provisions of the PGPA Act and have a code of conduct and values consistent with excellence in the public sector. Airservices will continue to perform its functions of providing safe, secure, efficient and environmentally responsible services that are valued by the aviation industry on behalf of our owner, the Australian Government. In performing these functions, we will continue to adhere to our values and code of conduct, which assist us to maintain high standards of professionalism, customer service, probity, reporting, accountability and transparency.
I expect that the Board and the Chief Executive Officer will work together to enable Airservices to operate as a world leading Air Traffic Control and Aviation Rescue and Fire Fighting Service (ARFFS) provider, backed by the requisite facilities and skilled workforce.
I also expect the Board to ensure Airservices has the necessary resources and capabilities in place to effectively assist in the delivery of the key aviation initiatives outlined below. The Board will make decisions consistent with its responsibilities under the Air Services Act 1995 relating to the objectives, strategies and policies to be followed by Airservices, ensuring that we perform our functions in a proper, efficient and effective manner. The Board will continue to work closely with the Chief Executive Officer to ensure that Airservices has the resources and capabilities needed to deliver world class aviation services to its customers and the community. Our 2015–2035 Workforce Strategy will ensure that we continue to invest in our workforce capability to provide an appropriately skilled workforce to deliver on our service objectives.
a. Complete the safe and effective implementation of its recent organisational change program, known as the Accelerate Program (noting the Program is scheduled for completion on 30 June 2017) and undertake a post implementation review of the Program by 30 December 2017; Airservices will complete of the Accelerate Program by 30 June 2017. A post implementation review will be completed by 30 December 2017.
A harmonised Civil Military Air Traffic Management System, delivered via the OneSKY program, remains a critical priority for Airservices and we will continue to work closely with the Department of Defence.
Airservices will continue to work very closely with CASA in relation to its role as safety regulator for civil air operations in Australia, including on key initiatives such as the OneSKY program. We will do this by proactively engaging CASA through well-established mechanisms and sharing information in an open and transparent manner.
As part of Airservices ongoing focus to improve the provision of safe and innovative services for industry, we will actively focus on identifying and supporting opportunities to enhance the level of safety and efficiency of controlled airspace in Australia, engaging with industry and working collaboratively with Government agencies through the Aviation Policy Group and other forums. We will take advantage of new technologies such as ADS-B and identify opportunities to increase the use of Class E airspace in Australia.
e. Work with the Department and CASA in the implementation of the agreed recommendations arising out of the ARFFS regulatory policy review; Airservices supports proposed changes for the provision of ARFFS that shifts the current prescriptive regulatory framework to a more risk- and outcomes- based approach. Airservices is actively supporting the Department as it progresses this work and will continue to do so, so that it can harness the service delivery and efficiency benefits that the reforms will enable.
f. Work with the Department and CASA in modernising airspace protection policy; Airservices will continue to contribute to and support initiatives that reduce risk to aircraft operations. We will work cooperatively with the Department, CASA, other Government agencies and industry to consider and implement proposals contained in the Department’s Airspace Protection Paper which seeks to modernise airspace protection regulation and identify non-regulatory measures to enhance the safety of aircraft operations.
Effectively managing noise complaints through the Noise Complaints Information Service (NCIS).
The NCIS provides valuable information services to the community and the ANO. We will continue to appropriately resource the NCIS to ensure that it provides this service to a high standard.
Airservices is committed to the 1997 Ministerial Direction relating to the Sydney Long Term Operating Plan to the maximum extent practicable to ensure the safe and efficient operation of Sydney Airport.
Airservices will continue to implement our national PFAS management program, including site investigations, in response to Airservices and other organisations’ historical use of aviation fire fighting foams containing these chemicals. Airservices will also continue to work closely with Government agencies in developing a whole-of-government approach to managing PFAS.
Airservices will continue to produce and report against an annual environmental work plan which outlines initiatives to manage and monitor the environmental effects of aircraft operations.
Airservices will continue to focus on delivering new and improved air traffic services, including performance-based navigation, to improve capacity and efficiency while also improving environmental outcomes.
h. Continue to support the Government’s safety and capability building initiatives in the Asia-Pacific region and the Memorandum of Understanding, regarding the management of Australia’s International Civil Aviation Organization responsibilities.
Airservices will continue to support the Australian Government’s safety initiatives in the Asia-Pacific region to improve safety outcomes, primarily through working with air navigation service providers in Indonesia and Papua New Guinea to build their capability to manage greater air traffic. This includes progressing sustainable programs that deliver safe, harmonised and integrated outcomes that are aligned with their neighbouring states, including Australia.
Airservices works closely with the Department and CASA to ensure that we are executing Australia’s International Civil Aviation Organization (ICAO) responsibilities.
a. Undertake effective and ongoing engagement with the community, industry and Government on the development and implementation of significant changes by Airservices to air traffic and ARFFS; Acknowledging that our most important consideration is always the safety of air navigation, Airservices will continue to effectively consult with the community, industry and the Government throughout the development and implementation of any significant changes to our service provision.
b. Engage constructively in processes where it can provide information, assistance or advice for policy formulation, implementation and regulation undertaken by Government agencies, both within and outside my portfolio; Airservices will continue to provide information, assistance or advice to other Government agencies, including in the performance of their regulatory and policy functions.
• safety outcomes by ensuring aviation safety requirements are recognised in land use planning decisions.
Airservices will also continue to engage and consult with concerned community groups through airport-led planning coordination and consultation forums and Airservices technical noise working groups.
d. Keep the Secretary of the Department and me fully informed of Airservices’ actions in relation to the requirements stated in this SOE, and promptly advise about any events or issues that may impact on the operations of Airservices, including the provision of timely quarterly reports of progress against the Corporate Plan and advice on the Accelerate Program and the OneSKY project; and The Airservices Board and the Chief Executive Officer will continue to keep the Department and the Minister fully informed in relation to these expectations through regular reporting, including quarterly reports of progress against the Corporate Plan.
e. Work closely with the Department, including the Western Sydney Unit, and other Government agencies, including the Australian Transport Safety Bureau, CASA and Defence to deliver integrated and comprehensive safety advice to the Government, the aviation industry and the community.
Airservices will continue to support other Government agencies in the performance of their regulatory and policy functions through the provision of timely information, assistance or advice. | 2019-04-20T12:48:17Z | http://www.airservicesaustralia.com/publications/corporate-publications/strategic-planning/2018-19-corporate-plan/ |
Taking a bold step to redefine the SUV market in Asia Pacific and beyond, Ford unveiled the new Ford Everest, a technologically advanced, stunningly capable and refined seven-seat SUV that will be launched in 2015. In Asia Pacific, the Ford Everest will be available in nine markets: China, Australia, New Zealand, India, and markets across the ASEAN region. Ford will also introduce the rugged SUV to Sub-Saharan Africa and South Africa in 2015.
"The new Ford Everest is an exceptionally versatile vehicle, equally prepared for the everyday commute as it is for the most extreme off-road terrain," said Dave Schoch, president, Ford Asia Pacific. "The Everest's unique blend of tough capability and exceptional comfort is going to resonate with drivers across Asia Pacific and around the world."
With a rugged, sculptural design that reflects its unshakeable toughness and technological prowess, the new Ford Everest blends strength, smart features and style to bring consumers a tough and versatile SUV with true off-road capability. In addition to surprising and delighting fans of rugged off-road SUVs, the new Ford Everest embodies Ford's fun-to-drive DNA to deliver rewarding and dynamic on-road handling, offering no compromises on refinement and comfort.
"The Ford Everest will help to expand our product footprint in the region with a tough and refined vehicle that enables drivers, their families, friends and colleagues to go anywhere comfortably - whether on urban roads or far off the beaten track," said Trevor Worthington, vice president, Product Development, Ford Asia Pacific. "From the EcoSport to the Everest, our SUV portfolio in Asia Pacific offers something for everyone."
Led by Ford's Asia Pacific design and product development teams, and making use of Ford's global SUV expertise, the new Ford Everest builds on the reputation of the current Ford Everest, which is praised for its durability and versatility. The new Ford Everest will be available in both rear-wheel drive and four-wheel drive variants depending on specific market demand.
"The new Ford Everest represents an epic commitment on the part of the Ford Motor Company to meet and exceed high customer expectations," said Worthington. "From the very beginning we set aggressive targets, and with the Ford Everest we have truly raised the bar for this type of vehicle in design and capability, with advanced technologies for a smarter, safer and more capable vehicle at a very attractive price."
The new Ford Everest was designed from the ground up with the durability to take on the most inhospitable environments. One of the toughest SUVs in its segment, the Ford Everest has a true body-on-frame design, assuring the torsional strength required for challenging terrains. Together with an intelligent four-wheel drive system, an active transfer case with Torque on Demand, Terrain Management System, and best-in-class ground clearance of 225 mm and water-wading capability of 800 mm, the Ford Everest helps drivers navigate difficult terrain with ease.
For ultimate capability, the advanced Terrain Management System gives drivers four preset settings - Normal, Snow/Gravel/Grass, Sand and Rock- that alter the vehicle's throttle response, transmission, intelligent four-wheel drive system and traction control to confidently tackle any situation. For extreme off-road environments, drivers can manually lock the transfer case in low-range four-wheel drive mode for increased control.
These impressive off-road credentials are paired to a new level of ride quality and dynamic handling beyond what consumers have come to expect in a rugged SUV. Thanks to its coil spring front and rear suspension and a Watt's linkage on the rear axle, the new Ford Everest provides a comfortable, stable ride with agile and predictable handling on the road, keeping the promise of Ford's fun-to-drive DNA.
Ingeniously packaged with "up for it" functionality enabling extraordinary journeys, the new Ford Everest is one of the most technologically advanced off-road SUVs ever made, and builds on Ford's global expertise in the utility segment.
The latest generation of Ford's in-car connectivity solution, SYNC 2, lets drivers use natural voice commands to control the car's entertainment system, climate controls and connected mobile devices more easily than ever before. SYNC 2 also boasts an 8-inch touchscreen with color-coded corners for easy menu navigation.
The new Ford Everest also offers a number of segment-first technologies, including Curve Control, designed to help drivers maintain control when approaching turns too quickly; Lane Departure Warning and Lane Keeping Aid, two technologies that help prevent drivers from unintentionally drifting out of a lane; and Blind Spot Information System (BLIS) with Cross Traffic Alert, which informs drivers when there is a vehicle in their blind spot while driving or when preparing to reverse out of parking spots.
The vehicle also offers other advanced features, including Adaptive Cruise Control, Forward Alert with Collision Mitigation, Roll Stability Control and an Electronic Stability Program that works with traction control to help the driver stay in control. To reduce parking anxiety, Active Park Assist enables drivers to parallel park hands-free, requiring only accelerating, shifting and braking from the driver.
"This engine line-up demonstrates Ford's commitment to offering the power of choice to customers in different markets with different needs and preferences," said Worthington. "We've selected the engine technologies from Ford's global powertrain range that deliver the best combination of performance and efficiency to meet and exceed the demanding requirements of SUV customers."
The new Ford Everest stands apart with a bold, sculptural design that communicates its impressive capabilities and advanced smart features, while the robust front end with signature LED daytime running lights and wide stance make for a powerful presence on the road. The chiseled and technical design is also highly efficient - extensive aerodynamic testing led to an exterior that seamlessly melds form and function.
The new Ford Everest's bold exterior presence is paired with a modern interior that makes use of refined materials and emphasizes horizontal lines to create a comfortable, harmonious environment for up to seven adult occupants. Interior features balance ride comfort with ultimate practicality, including a large moon roof, a convenient powered liftgate, more than 30 cleverly designed stowage spaces, multiple power outlets in the first and second rows, and flexible seating and cargo arrangements - including fold-flat second- and third-row seating - to achieve a perfect balance between passenger demands and packing efficiency.
To ensure exceptional cabin quietness, Ford equipped the new Ford Everest with Active Noise Cancellation technology in addition to optimizing cabin sealing and sound absorbing materials throughout the vehicle.
Similar to the systems used in noise-cancelling headphones, Active Noise Cancellation uses three strategically placed microphones inside the cabin to detect and measure sounds. A smart control module instantaneously generates opposing sound waves, which are then fed through the Everest's audio system to cancel out unpleasant noises. The result is a quiet interior that lets the driver comfortably speak with third row passengers without shouting.
"With its safe and smart features, a refined interior and incredible on-road and off-road capabilities, the new Ford Everest sets a new standard in the medium SUV segment and represents a compelling addition to our global lineup of SUVs in Asia Pacific," said Worthington. "Taking advantage of our global design and development expertise, and our proud heritage in the utility segment, we've created a vehicle that goes far beyond customer expectations."
The new Ford Everest will be manufactured at AutoAlliance Thailand in Rayong, Thailand, for ASEAN markets. In China, the new Ford Everest will be manufactured by Ford's Jiangling Motors Corp (JMC) joint venture at the JMC Xiaolan Plant in Nanchang, China, and distributed through JMC's Ford-brand network of dealers.
The new Ford Everest redefines what an SUV can be, offering unmatched capability and versatility to answer customers' most demanding requirements on and off the road, while delivering a refined, comfortable vehicle that embodies Ford's fun-to-drive spirit.
Rugged body-on-frame construction, intelligent four-wheel drive and a smart suspension system are some of the key components that enable the new Ford Everest's confidence in navigating challenging terrain. Advanced smart and safety features - including a number of segment-first driver-assist technologies - make it one of the smartest SUVs on the road, while still living up to the most demanding requirements of an SUV.
"Whether you're driving on a road, a trail or far off the beaten track, the new Ford Everest will give you the confidence and capability to tackle it all," said Trevor Worthington, vice president, Product Development, Ford Asia Pacific. "With smart systems designed to keep you in control both on- and off-road, the Ford Everest is filled with purpose-built technology that makes it a uniquely capable SUV for our customers in Asia Pacific."
To ensure the best possible combination of on-road refinement and off-road capability, the new Ford Everest is equipped with an advanced four-wheel-drive system offering Torque on Demand through an active transfer case.
Using a smart electronic control system, the transfer case continuously adjusts the delivery of torque to the wheels with the most grip, maximizing traction in all driving situations, be it during inclement weather conditions, powering through challenging turns or transitioning from pavement to a gravel road.
"The intelligent four-wheel-drive control system is linked into the vehicle's communication system and takes it into account to integrate many elements, like steering wheel angle and throttle input, to make sure torque is where the driver needs it at all times," Ian Foston, chief program engineer for the Ford Everest. "It's a smart and robust system that we've tested around the world in extreme conditions to guarantee durability in even the most challenging environments."
Faced with the task of pairing rugged off-road toughness with a comfortable and refined driving experience for all settings, Ford engineers created an SUV that makes use of smart technologies, advanced suspension, and powerful and efficient powertrains to help drivers reach their destinations, no matter how extraordinary.
The off-road capabilities of the Ford Everest are enhanced by a Terrain Management System (TMS), which allows the driver to choose between four different settings on the fly - Normal, Snow/Gravel/Grass, Sand and Rock - for optimal performance in all conditions. Drivers can also lock the transfer case in low-range four-wheel drive mode for increased control in difficult terrains.
Each TMS setting affects throttle response, transmission, the four-wheel-drive system and traction control - including an electronic locking rear differential - allowing the driver to navigate challenging terrain with confidence. The vehicle displays the current TMS mode, torque, and vehicle pitch and roll in the instrument cluster, providing another layer of driver involvement to the off-road experience for enthusiasts who want to track their performance.
Even in normal mode, the TMS automatically adapts to maximize traction during everyday driving conditions, delivering torque to the front wheels when necessary to minimize wheel slip. The Snow/Gravel/Grass setting upshifts early and downshifts later to keep RPMs low, contributing to more predictable control on slippery surfaces. The setting also reduces gas pedal sensitivity to give drivers finer control over acceleration.
Sand mode gives drivers aggressive torque transfer and allows wheels to slip more to better maintain momentum, helping drivers avoid getting bogged down in sand. An aggressive shift schedule also helps to maintain momentum by avoiding upshifting when the throttle is lifted and downshifting early when brakes are applied. Increased pedal sensitivity makes the engine more responsive to small foot movements when driving on beaches, dunes and similar terrain.
Rock mode lets drivers traverse rocky terrain with aggressive torque transfer to tackle the most extreme off-road environments, and reduced gas pedal sensitivity for more precise control. The setting holds first gear for low-speed control, and fights off wheel slip to keep traction where the wheels need it most.
The rugged off-road requirements of the new Ford Everest demanded a rear suspension up to any task, while still delivering a comfortable, smooth ride on streets and highways. A solid rear axle with a Watt's linkage maximizes strength and ground clearance while providing stability and agile, predictable handling. Coil springs at the front and rear provide an unsurpassed level of ride comfort, ensuring a refined ride for all occupants - whether seated in the first, second or third row.
Drivers can also manually engage the electronic Locking Rear Differential (eLRD) for increased traction while traversing extreme terrain, and, thanks to the active transfer case, can select between high and low range four-wheel-drive mode to optimize on- and off-road operation on diverse terrain like sand, snow or slippery rock surfaces. On steep descents in low range - engaged manually or through the TMS - a locking torque converter provides effective engine braking.
To further help drivers climb and descend challenging hills, the new Ford Everest comes equipped with Hill Ascent Control and Hill Descent Control. When the driver engages these modes with the push of a button, the vehicle will climb or descend even steep slopes at a steady pace without requiring driver input on the gas or brake pedals, allowing the driver to focus on steering through the challenging terrain. And when starting off on a steep hill - whether facing upward or downward and whether on- or off-road - Hill Start Assist holds the vehicle for up to three seconds while the driver's foot moves from the brake to the gas, giving added peace of mind.
With its leading off-road credentials, drivers can take confidence in the Ford Everest's best-in-class 225 mm of ground clearance and its ability to wade through water as deep as 800 mm, deeper than any competitor. An approach angle of 29 degrees, a 21-degree ramp-over angle and a departure angle of 25 degrees also contribute to the vehicle's ability to take on difficult terrains with ease.
Serious work requires serious capability, and the new Ford Everest delivers class-leading load carrying and towing capacity, in markets where towing is permitted. With a best-in-class cargo payload of up to 750 kg, roof payload of up to 100 kg, and 3,000 kg in towing capacity, the Ford Everest can take on even the largest jobs.
When towing, Ford's Trailer Sway Control technology uses selective braking and engine management to mitigate unwanted trailer movement. Combined with Roll Stability Control, which applies the brakes and reduces engine torque when it detects a potential rollover situation, it contributes to the ease and comfort of driving the Ford Everest, especially with a heavy trailer. Inside the passenger cabin, more than 30 cleverly designed storage compartments ensure there's a place for everything.
The capabilities of the new Ford Everest are driven by a range of refined, powerful and efficient engines: the latest generation of Ford's tried-and-tested four-cylinder 2.2-liter and five-cylinder 3.2-liter Duratorq TDCi diesel engines, and a new 2.0-liter EcoBoost petrol engine.
Fitted with an upgraded turbocharger, injection system and exhaust-gas recirculation system to improve energy efficiency, the 2.2-liter Duratorq TDCi engine offers excellent engine performance. With projected class-leading fuel economy and carbon-dioxide emissions, the engine offers customers a compelling mix of efficiency and responsiveness.
For maximum power and torque without sacrificing fuel efficiency, Ford will offer a five-cylinder 3.2-liter Duratorq TDCi diesel engine. Both diesel engines can be mated to a robust six-speed manual transmission or Ford's tried-and-true 6R80 six-speed automatic transmission with SelectShift manual mode.
The six-speed manual transmission provides crisp and precise shifting, with an upshift indicator in the instrument panel to help drivers achieve the best possible fuel economy. The automatic transmission - the same transmission proven in millions of Ford F-series trucks around the world - has been carefully calibrated for the new Ford Everest to improve refinement and efficiency.
Ford will also offer the new Ford Everest with a new twin-scroll 2.0-liter EcoBoost petrol engine with projected best-in-class fuel economy and carbon dioxide emissions. The advanced direct-injected turbocharged engine combines power and responsiveness, punching above its weight and offering more power than a conventional 3.5-liter V6 engine. Paired to the 6R80 six-speed automatic transmission, the 2.0-liter EcoBoost engine provides smooth and refined power delivery.
"Whether equipped with the latest generation of EcoBoost technology or one of our proven Duratorq diesel engines, we've created a powerful, rugged and capable SUV with stunning design and high levels of refinement," said Worthington. "Most importantly, the new Ford Everest is a thrill to drive. It's the complete package."
Developed on the foundation of Ford's SUV heritage and Built Ford Tough credentials, there will be no mistaking the new Ford Everest when it arrives on the roads of Asia Pacific next year.
The seven-seat SUV's wide stance and bold front end exemplify the vehicle's capability and impressive off-road credentials, while the chiseled, sculptural curves of the exterior hint at the refined interior within.
"Looking at the Everest, consumers know what they're getting at a glance - an exceptionally capable vehicle with an unmatched level of comfort," said David Dewitt, exterior design manager, Ford Asia Pacific. "The new Ford Everest goes beyond anything we've seen before in this segment."
Following extensive research into markets and consumer preferences - the most research ever conducted for a vehicle developed by Ford in Asia Pacific - Ford created a tough and powerful off-road SUV packed with modern features, a comfortable, carlike interior, and smart, sophisticated design.
"Customers told us they wanted an SUV that balances off-road toughness with a refined, comfortable interior, and we listened," said Dewitt. "This vehicle reflects what the consumer wants, inside and out."
The design of the new Ford Everest was led by Ford's global Design Centre in Australia, drawing on Ford's global 50-year SUV heritage and its extensive expertise in the utility segment.
The new Ford Everest's unshakable toughness and technological capability is embodied in its rugged yet refined appearance, delivering a bold, modern design that reflects power and ultimate control on the road.
"The new Everest's exterior is a unique mixture of modern sensibility, functional design and classic Ford cues," said Dewitt. "Ford has been designing SUVs for nearly 50 years, so we were able to draw from that heritage and leverage our collective knowledge. Every line on the surface of the Everest visualizes its ruggedness and capability, while delivering a modern, sleek vehicle that is unmistakably a Ford."
At first glance, Ford's design DNA is most visible in the bold, inverted trapezoidal grille that firmly establishes the new Ford Everest as a member of the global One Ford family of vehicles. The muscular hood, integrated headlamps with signature LED daytime running lights and front bumper visualize the vehicle's power and rugged capability. The headlamps connected to the grille help create a unified, horizontal design theme that gives it a strong presence on the road.
The new Ford Everest's headlamps wrap around the grille's edges for a technical, robust look that helps to communicate the vehicle's functionality. From the grille, the lamps are chiseled back in a sweeping design that projects a modern and aerodynamic appearance. At the lower half of the front end, an integrated bumper connects to the fog lamps and carries on the horizontal theme, giving the vehicle a proud and modern look.
The chiseled and refined theme continues through the vehicle's sides, where designers eschewed superfluous details.
"From the side, the Everest appears sculptural, without sacrificing its robust, bold nature. The large, integrated wheel lips are surfaced and executed in a very refined way," said Dewitt. "Where there are technical details, they're balanced with sleekness and sophistication."
Prominent LED tail lamps that recall chiseled design details throughout the vehicle sit over a negative scallop at the rear, extending a sense of sculptural refinement and avoiding the square, flat look of a traditional SUV liftgate. Underneath the tailgate, a rear undershield echoes the front of the vehicle and gives the Ford Everest a firmly planted look.
Blending sophisticated design and engineering, the proud and chiseled body also maximizes function: Key exterior design elements, such as integrated aerodynamic "kickers" flanking the rear window, give the new Ford Everest unsurpassed aerodynamic performance, with a best-in-class drag coefficient of 0.389. A 3D-formed aerodynamic front undershield similarly routes airflow under the Ford Everest as efficiently as possible, helping it to slip smoothly through the air.
Inside the new Ford Everest, a modern interior redefines the level of comfort consumers can expect from a tough and capable SUV.
Designed using premium materials and advanced fabrics, and boasting the latest in-car connectivity technologies, the exceptionally quiet interior offers features that make life on the road more comfortable, including a large two-panel moon roof above the first two rows of seats, and heating, ventilation and air conditioning (HVAC) vents for each row.
The horizontal theme from the exterior continues inside the vehicle, with lines running across the dashboard and instrument panel, framing the entertainment system at the center and imparting a roomy and commanding feel.
"Sitting in the driver's seat, you see a strong horizontal line that goes from one door, through the instrument panel, and on to the other door," said Maurizio Tocco, interior design manager, Ford Asia Pacific. "Outside, the width gives you a sense of stability. Inside, it gives you a sense of spaciousness."
The new Ford Everest places a premium on space, comfort and convenience for all occupants, no matter where they sit. In the front, available eight-way adjustable heated power seats help both the driver and front passenger fine-tune their seating position.
A roomy second row - which has its own heating and air-conditioning controls - features reclining seats with a 60/40 split. The comfortable third row has a 50/50 split, and can be flipped down with the touch of a button to create extra cargo space.
Interior designers paid close attention to details, ensuring that no unnecessary elements clutter customers' interactions with the vehicle. All facets of the vehicle's control and infotainment system - including the 8-inch color touchscreen of SYNC 2, Ford's in-car connectivity solution - are comfortably within reach of the driver and complemented by meticulous craftsmanship.
"We treated every aspect with the same level of importance. Every detail in the Everest is refined - from the instrument panel to the luggage compartment - and is crafted with a level of detail more like a premium watch than a tough SUV," said Tocco. "The end result is a subtle and truly exceptional experience for drivers and their passengers."
For interior design elements that occupants are most likely to touch and interact with, the new Ford Everest employs more refined materials, such as a choice of leathers and advanced fabrics for seating, soft materials on handles and door trim, and chrome highlights around the air register rings.
"Using a really elegant, satin chrome on the air registers allowed for reflections and highlights, but didn't have the dainty, thin feel of a shiny, bright chrome," said Tocco. "When we had really bold shapes, we used more refined finishes."
Complementing the sophisticated design of the interior - and providing a welcome refuge from noisy city streets and extreme outdoor environments alike - the new Ford Everest also features one of the quietest cabins in its class.
Through the use of three microphones embedded in the headliner, Active Noise Cancellation generates sound waves through the vehicle's sound system that cancel out ambient noise for a startlingly quiet interior environment. Noise, vibration and harshness are further limited by hydraulic engine mounts and the extensive use of sound-deadening materials throughout the vehicle.
Careful aerodynamic design ensures that the Ford Everest provides a quiet ride even with the windows down. Extensive modelling of the aerodynamic interaction between wing mirrors and the sides of the vehicle led to a body shape that minimizes the throbbing sound that accompanies driving at speed with windows lowered.
The interior of the new Ford Everest was also designed for practicality in any setting.
"The Everest interior has a higher level of craftsmanship than you would expect from such a rugged SUV, but at its core it's a functional and practical space," said Tocco. "It's a smart, comfortable interior cleverly built on a capable and flexible framework."
More than 30 stowage spaces totaling 48 liters ensure all occupants have sufficient space to store everything they need. Whether it's a weekend on the golf course or a long work trip, the new Ford Everest is prepared. A recess in the rear cargo area was specifically designed to fit wide items such as golf bags without infringing upon passenger seating space, and the glove box is capable of safely stowing a 16-inch laptop computer.
Laptops can be charged through a 240-volt power outlet in the second row, while 12-volt outlets in the front console and in the second row let drivers and passengers charge multiple gadgets at the same time. Another 12-volt outlet at the rear of the Ford Everest can be used to run devices like air compressors when camping.
For more cargo space, customers can fold the power-fold 50/50 split third row at the touch of a button. When it comes time to move or carry other large items, the second row also folds for a completely flat floor and 2,010 liters of interior stowage space - all conveniently accessible with Ford's Power Liftgate system. Fully loaded with seven passengers, the new Ford Everest can support a best-in-class payload of 750 kg, and has an additional roof load capacity of up to 100 kg - enough to embark on any kind of journey.
"When you look at the new Ford Everest, its functionality is communicated through its aesthetics," said Dewitt. "It's a perfect balance between functionality and aesthetic harmony, wrapped up in a package that looks equally at home in the city and at the ends of the earth." | 2019-04-18T22:38:36Z | https://www.carsinvasion.com/ford/2016-everest/ |
There are 23 pet friendly assisted living facilities in FOLSOM, California. Call (877) 311-8349. These senior living facilities in FOLSOM allow various pets, such as dogs, cats and others. Costs and pet policies vary in each of the 23 facilities.
Brookdale Folsom provides pet friendly assisted living care in Folsom, California. The senior living facility can provide accommodation to a maximum of 130 pet owners at a time. With a location at 780 Harrington Way, in the 95630 area code inside Sacramento county, Brookdale Folsom provides assistance and support not only to older adults, but to their pets as well. Brookdale Folsom includes assisted living services such as help with taking a bath, getting dressed and individual care plans. This senior care facility accepts both Medicaid and Medicare.
American River Home Care Iii offers pet friendly assisted living in Sacramento county, California. Up to 6 seniors can take advantage of its services and choose from multiple assisted apartment layouts. American River Home Care Iii recognizes the importance of pets in seniors’ lives. Although cats, dogs and other pets are welcome, there are some pet related rules and restrictions. American River Home Care Iii can provide aid with bathing, dressing and incontinence care to any pet owner senior citizen in Folsom, CA and surrounding areas. American River Home Care Iii is located at 249 Cimmaron Circle, 95630 and provides care to older adults who need memory care.
When looking for an assisted living facility in Folsom, California that allows pets, consider American River Home Care. This pet friendly assisted living facility is an excellent luxurious senior care option. It has a total of 6 assisted living apartments and includes services such as pet care, walking trails and staff available 24/7. Its license number is 347002403. American River Home Care provides senior living not only to Folsom older adults, but also to all Sacramento county pet owners as well.
If you have a cat or a dog and also need help with daily living, Sunny Hill Home Care Ii can help you or your loved one to find the assistance and personal care you need in Folsom, California. Sunny Hill Home Care Ii has a maximum capacity of 6 older adults who want to live with their pets and includes amenities such as on-site café, transportation services and apartment cleaning. Elderly pet owners can enjoy the companionship of their pet at Sunny Hill Home Care Ii. There are pet related rules that senior pet owners are expected to follow when staying at Sunny Hill Home Care Ii.
Elim Oaks can accommodate 6 seniors who have a pet and offers services such as monthly doctor visits, regular health checkups and an on-site nurse. This pet-friendly personal care facility is located at 124 Raeanne Lane, and it is fully equipped to provide assisted living to Folsom, CA older cat owners. Elim Oaks has certain pet related rules and restrictions in place.
Situated at 255 Cimmaron Circle, inside 95630 zip code area in Sacramento county, American River Home Care Ii provides pet friendly assisted senior living to Folsom, CA cat and dog owners and includes services such as group outings, scheduled picnics with residents and families and numerous entertainment options. American River Home Care Ii can house up to 6 older adult pet owners at a time and provides multiple pet amenities and services to Folsom residents.
Located at 1801 East Natoma Street, Folsom, California, 95630, Empire Ranch Alzheimer's Special Care Center can help any Sacramento county pet owner who requires senior living assistance and includes services such as Internet, help with laundry, communal kitchen and more. Empire Ranch Alzheimer's Special Care Center can provide pet friendly assisted living to no more than 66 Folsom residents at once. Empire Ranch Alzheimer's Special Care Center recognizes the positive effect of pets on lives of senior citizens and welcomes pets. Certain pet related rules and restrictions apply. It is licensed by California with license number 347004552.
Seniors looking for senior living communities in Folsom, California that accept pets will find Bu-won Care Home, located at 1035 Elsworth Way inside 95630 zip code as a wonderful choice for all of their personal and pet care needs. Bu-won Care Home is pet friendly, so Sacramento county seniors can continue to enjoy the companionship of their pets while getting all the senior care services they need, such as round-the-clock caregiving, help with moving around and more. Bu-won Care Home is able to care for up to 6 older adults and allows seniors to stay with cats or dogs under certain pet-related rules. California records indicate 347002811 license number for Bu-won Care Home.
Located at 148 Stoney Hill Drive in Sacramento county, Folsom Care enables pet owners in Folsom, CA as well as those who live in surrounding areas to receive assisted living care. This pet friendly senior living facility includes amenities such as medication set-up and reminders, a wellness center and emergency pendants. Living with a pet at Folsom Care is possible for up to 5 Folsom older adults. Folsom Care has an official license to provide senior living accommodations for Sacramento, CA seniors who are dog and cat owners, with license # 347003207.
Older people with pets who require assisted living in Folsom, California can take advantage of Folsom Comfort Care, situated at 336 Sprig Circle. Folsom Comfort Care provides amenities such as on-site hair salons and grooming, daily fitness activities and gourmet dining. Seniors with cats, dogs and other pets are welcome at this facility. Certain pet related rules mentioned in the pet policy apply. Folsom Comfort Care is capable of caring for up to 6 senior citizen pet owners from 95630 zip code in Sacramento county and nearby areas. Folsom Comfort Care has an active license to offer assisted living in Folsom, California License number: 347003468.
Folsom Senior Retreat provides pet friendly assisted living care in Folsom, California. The senior living facility can provide accommodation to a maximum of 6 pet owners at a time. With a location at 9814 Blue Lake Dr. , in the 95630 area code inside Sacramento county, Folsom Senior Retreat provides assistance and support not only to older adults, but to their pets as well. Folsom Senior Retreat includes assisted living services such as help with taking a bath, getting dressed and individual care plans. This senior care facility accepts both Medicaid and Medicare.
Woodview Care Home specializes in providing pet friendly assisted living in Sacramento county, California. Up to 6 seniors can take advantage of its services and choose from multiple assisted apartment layouts. Woodview Care Home recognizes the importance of pets in seniors’ lives. Although cats, dogs and other pets are welcome, there are some pet related rules and restrictions. Woodview Care Home can provide aid with bathing, dressing and incontinence care to any pet owner senior citizen in Folsom, CA and surrounding areas. Woodview Care Home is located at 120 Woodview Drive, 95630 and provides care to seniors with Alzheimer's disease.
When looking for an assisted living facility in Folsom, California that allows pets, consider Goldin Care 1. This pet friendly assisted living facility is an excellent luxurious senior care option. It has a total of 6 assisted living apartments and includes services such as pet care, walking trails and staff available 24/7. Its license number is 347001254. Goldin Care 1 provides senior living not only to Folsom older adults, but also to all Sacramento county pet owners as well.
If you have a cat or a dog and also need help with daily living, Love And Divine Home Care can help you or your loved one to find the assistance and personal care you need in Folsom, California. Love And Divine Home Care has a maximum capacity of 6 older adults who want to live with their pets and includes amenities such as on-site café, transportation services and apartment cleaning. Senior citizens with pets can enjoy the companionship of their pet at Love And Divine Home Care. There are pet related rules that senior pet owners are expected to follow when staying at Love And Divine Home Care.
Pine Grove Residential Home Care For The Elderly can accommodate 6 baby boomers who have a pet and offers services such as monthly doctor visits, regular health checkups and an on-site nurse. This pet-friendly personal care facility is located at 7213 Pine Grove Way, and it is fully equipped to provide assisted living to Folsom, CA older dog owners. Pine Grove Residential Home Care For The Elderly has certain pet related rules and restrictions in place.
Situated at 328 Crow Canyon Dr, inside 95630 zip code area in Sacramento county, A. r. c. Manor Of Folsom provides pet friendly assisted senior living to Folsom, CA cat and dog owners and includes services such as group outings, scheduled picnics with residents and families and numerous entertainment options. A. r. c. Manor Of Folsom can house up to 6 older adult pet owners at a time and provides multiple pet amenities and services to Folsom residents.
Located at 1574 Creekside Drive, Folsom, California, 95630, Oakmont Of Folsom can help any Sacramento county pet owner who requires senior living assistance and includes services such as Internet, help with laundry, communal kitchen and more. Oakmont Of Folsom can provide pet friendly assisted living to no more than 88 Folsom residents at once. Oakmont Of Folsom recognizes the positive effect of pets on lives of senior citizens and welcomes pets. Certain pet related rules and restrictions apply. It is licensed by California with license number 347005427.
Senior citizens looking for senior living communities in Folsom, California that accept pets will find Compassionate Senior Care, located at 993 Glennfinnian Way inside 95630 zip code as a wonderful choice for all of their personal and pet care needs. Compassionate Senior Care is pet friendly, so Sacramento county seniors can continue to enjoy the companionship of their pets while getting all the senior care services they need, such as round-the-clock caregiving, help with moving around and more. Compassionate Senior Care is able to care for up to 6 older adults and allows seniors to stay with cats or dogs under certain pet-related rules. California records indicate 347003984 license number for Compassionate Senior Care.
Located at 216 Willow Creek Dr in Sacramento county, Willow Creek Manor enables pet owners in Folsom, CA as well as those who live in surrounding areas to receive assisted living care. This pet friendly senior living facility includes amenities such as medication set-up and reminders, a wellness center and emergency pendants. Living with a pet at Willow Creek Manor is possible for up to 6 Folsom older adults. Willow Creek Manor has an official license to provide senior living accommodations for Sacramento, CA seniors who are dog and cat owners, with license # 347004061.
Older people with pets who require assisted living in Folsom, California can take advantage of Willow Creek Home Care, situated at 809 Willow Creek Drive. Willow Creek Home Care provides amenities such as on-site hair salons and grooming, daily fitness activities and gourmet dining. Seniors with cats, dogs and other pets are welcome at this facility. Certain pet related rules mentioned in the pet policy apply. Willow Creek Home Care is capable of caring for up to 6 senior citizen pet owners from 95630 zip code in Sacramento county and nearby areas. Willow Creek Home Care has an active license to offer assisted living in Folsom, California License number: 347000909.
Arcely J. Pua Home Care provides pet friendly assisted living care in Folsom, California. The senior living facility can provide accommodation to a maximum of 6 pet owners at a time. With a location at 914 Densmore Way, in the 95630 area code inside Sacramento county, Arcely J. Pua Home Care provides assistance and support not only to older adults, but to their pets as well. Arcely J. Pua Home Care includes assisted living services such as help with taking a bath, getting dressed and individual care plans. This senior care facility accepts Medicare and Medicaid.
Compassionate Senior Care Ii offers pet friendly assisted living in Sacramento county, California. Up to 6 seniors can take advantage of its services and choose from multiple assisted apartment layouts. Compassionate Senior Care Ii recognizes the importance of pets in seniors’ lives. Although cats, dogs and other pets are welcome, there are some pet related rules and restrictions. Compassionate Senior Care Ii can provide aid with bathing, dressing and incontinence care to any pet owner senior citizen in Folsom, CA and surrounding areas. Compassionate Senior Care Ii is located at 801 Morton Way, 95630 and helps Alzheimer's patients.
When looking for an assisted living facility in Folsom, California that allows pets, consider Adina Home Care. This pet friendly assisted living facility is an excellent luxurious senior care option. It has a total of 6 assisted living units and includes services such as pet care, walking trails and staff available 24/7. Its license number is 347002721. Adina Home Care provides senior living not only to Folsom older adults, but also to all Sacramento county pet owners as well.
If you have a pet and also need help with daily living, Best Life Home Care can help you or your loved one to find the assistance and personal care you need in Citrus Heights, California. Best Life Home Care has a maximum capacity of 6 older adults who want to live with their pets and includes amenities such as on-site café, transportation services and apartment cleaning. Senior cat owners can enjoy the companionship of their pet at Best Life Home Care. There are pet related rules that senior pet owners are expected to follow when staying at Best Life Home Care.
E & E can accommodate 6 seniors who have a pet and offers services such as monthly doctor visits, regular health checkups and an on-site nurse. This pet-friendly personal care facility is located at 8045 Mesa Oak Way, and it is fully equipped to provide assisted living to Citrus Heights, CA older dog owners. E & E has certain pet related rules and restrictions in place.
Situated at 8644 Banff Vista Drive, inside 95624 zip code area in Sacramento county, Palm Valley Care Home Vi provides pet friendly assisted senior living to Elk Grove, CA cat and dog owners and includes services such as group outings, scheduled picnics with residents and families and numerous entertainment options. Palm Valley Care Home Vi can house up to 6 older adult pet owners at a time and provides multiple pet amenities and services to Elk Grove residents.
Located at 7315 Sunset Avenue, Fair Oaks, California, 95628, Better Living Rcfe can help any Sacramento county pet owner who requires senior living assistance and includes services such as Internet, help with laundry, communal kitchen and more. Better Living Rcfe can provide pet friendly assisted living to no more than 6 Fair Oaks residents at once. Better Living Rcfe recognizes the positive effect of pets on lives of senior citizens and welcomes pets. Certain pet related rules and restrictions apply. It is licensed by California with license number 347003907.
Senior citizens looking for senior living communities in Elk Grove, California that accept pets will find Faundo's Guest Home, located at 10125 Lavelli Way inside 95757 zip code as a wonderful choice for all of their personal and pet care needs. Faundo's Guest Home is pet friendly, so Sacramento county seniors can continue to enjoy the companionship of their pets while getting all the senior care services they need, such as round-the-clock caregiving, help with moving around and more. Faundo's Guest Home is able to care for up to 6 older adults and allows seniors to stay with cats or dogs under certain pet-related rules. California records indicate 347003974 license number for Faundo's Guest Home.
Located at 14 Ararat Ct in Sacramento county, Haven Court Manor enables pet owners in Sacramento, CA as well as those who live in surrounding areas to receive assisted living care. This pet friendly senior living facility includes amenities such as medication set-up and reminders, a wellness center and emergency pendants. Living with a pet at Haven Court Manor is possible for up to 6 Sacramento older adults. Haven Court Manor has an official license to provide senior living accommodations for Sacramento, CA seniors who are dog and cat owners, with license # 347005679.
Older people with pets who require assisted living in Sacramento, California can take advantage of Greenhaven Estates, situated at 7548 Greenhaven Drive. Greenhaven Estates provides amenities such as on-site hair salons and grooming, daily fitness activities and gourmet dining. Seniors with cats, dogs and other pets are welcome at this facility. Certain pet related rules mentioned in the pet policy apply. Greenhaven Estates is capable of caring for up to 105 senior citizen pet owners from 95831 zip code in Sacramento county and nearby areas. Greenhaven Estates has an active license to offer assisted living in Sacramento, California License number: 347005239.
Serenity Care Home provides pet friendly assisted living care in Antelope, California. The senior living facility can provide accommodation to a maximum of 6 pet owners at a time. With a location at 7953 Ivy Hill Way, in the 95843 area code inside Sacramento county, Serenity Care Home provides assistance and support not only to older adults, but to their pets as well. Serenity Care Home includes assisted living services such as help with taking a bath, getting dressed and individual care plans. This senior care facility accepts Medicare and Medicaid.
Century Care Home specializes in providing pet friendly assisted living in Sacramento county, California. Up to 6 seniors can take advantage of its services and choose from multiple assisted apartment layouts. Century Care Home recognizes the importance of pets in seniors’ lives. Although cats, dogs and other pets are welcome, there are some pet related rules and restrictions. Century Care Home can provide aid with bathing, dressing and incontinence care to any pet owner senior citizen in Fair Oaks, CA and surrounding areas. Century Care Home is located at 5725 Century Way, 95628 and helps Alzheimer's patients.
When looking for an assisted living facility in Fair Oaks, California that allows pets, consider La Field Home Care. This pet friendly assisted living facility is an excellent luxurious senior care option. It has a total of 6 assisted living apartments and includes services such as pet care, walking trails and staff available 24/7. Its license number is 347003137. La Field Home Care provides senior living not only to Fair Oaks older adults, but also to all Sacramento county pet owners as well.
If you have a cat or a dog and also need help with daily living, Care A Lot can help you or your loved one to find the assistance and personal care you need in Citrus Heights, California. Care A Lot has a maximum capacity of 6 older adults who want to live with their pets and includes amenities such as on-site café, transportation services and apartment cleaning. Seniors who own pets can enjoy the companionship of their pet at Care A Lot. There are pet related rules that senior pet owners are expected to follow when staying at Care A Lot.
Young At Heart Rcfe No. 4 can accommodate 6 retirees who have a pet and offers services such as monthly doctor visits, regular health checkups and an on-site nurse. This pet-friendly personal care facility is located at 9012 Colombard Way, and it is fully equipped to provide assisted living to Sacramento, CA older pet owners. Young At Heart Rcfe No. 4 has certain pet related rules and restrictions in place.
Situated at 2100 Butano Drive, inside 95825 zip code area in Sacramento county, Country Club Manor provides pet friendly assisted senior living to Sacramento, CA cat and dog owners and includes services such as group outings, scheduled picnics with residents and families and numerous entertainment options. Country Club Manor can house up to 112 older adult pet owners at a time and provides multiple pet amenities and services to Sacramento residents.
Located at 9559 Lazy Saddle Way, Elk Grove, California, 95624, Jones Care can help any Sacramento county pet owner who requires senior living assistance and includes services such as Internet, help with laundry, communal kitchen and more. Jones Care can provide pet friendly assisted living to no more than 6 Elk Grove residents at once. Jones Care recognizes the positive effect of pets on lives of senior citizens and welcomes pets. Certain pet related rules and restrictions apply. It is licensed by California with license number 347003287.
Seniors looking for senior living communities in Carmichael, California that accept pets will find Elderly Inn I, located at 5206 Robertson Avenue inside 95608 zip code as a wonderful choice for all of their personal and pet care needs. Elderly Inn I is pet friendly, so Sacramento county seniors can continue to enjoy the companionship of their pets while getting all the senior care services they need, such as round-the-clock caregiving, help with moving around and more. Elderly Inn I is able to care for up to 6 older adults and allows seniors to stay with cats or dogs under certain pet-related rules. California records indicate 347001289 license number for Elderly Inn I.
Located at 8830 Jerida Lane in Sacramento county, Jerida Lane Residential Care enables pet owners in Fair Oaks, CA as well as those who live in surrounding areas to receive assisted living care. This pet friendly senior living facility includes amenities such as medication set-up and reminders, a wellness center and emergency pendants. Living with a pet at Jerida Lane Residential Care is possible for up to 6 Fair Oaks older adults. Jerida Lane Residential Care has an official license to provide senior living accommodations for Sacramento, CA seniors who are dog and cat owners, with license # 347003312.
Seniors with dogs who require assisted living in Sacramento, California can take advantage of Chateau At River's Edge, situated at 641 Feature Drive. Chateau At River's Edge provides amenities such as on-site hair salons and grooming, daily fitness activities and gourmet dining. Seniors with cats, dogs and other pets are welcome at this facility. Certain pet related rules mentioned in the pet policy apply. Chateau At River's Edge is capable of caring for up to 143 senior citizen pet owners from 95825 zip code in Sacramento county and nearby areas. Chateau At River's Edge has an active license to offer assisted living in Sacramento, California License number: 342700039.
Golden Years Care Home I provides pet friendly assisted living care in Elk Grove, California. The senior living facility can provide accommodation to a maximum of 6 pet owners at a time. With a location at 8516 Foxberry Court, in the 95624 area code inside Sacramento county, Golden Years Care Home I provides assistance and support not only to older adults, but to their pets as well. Golden Years Care Home I includes assisted living services such as help with taking a bath, getting dressed and individual care plans. This senior care facility allows Medicare and Medicaid.
Elderly Inn Iii offers pet friendly assisted living in Sacramento county, California. Up to 6 seniors can take advantage of its services and choose from multiple assisted apartment layouts. Elderly Inn Iii recognizes the importance of pets in seniors’ lives. Although cats, dogs and other pets are welcome, there are some pet related rules and restrictions. Elderly Inn Iii can provide aid with bathing, dressing and incontinence care to any pet owner senior citizen in Citrus Heights, CA and surrounding areas. Elderly Inn Iii is located at 8361 Canyon Oak Drive, 95610 and provides care to seniors with dementia.
When looking for an assisted living facility in Elk Grove, California that allows pets, consider Diamond Oak Guest Home Ii. This pet friendly assisted living facility is an excellent luxurious senior care option. It has a total of 5 assisted living units and includes services such as pet care, walking trails and staff available 24/7. Its license number is 347003503. Diamond Oak Guest Home Ii provides senior living not only to Elk Grove older adults, but also to all Sacramento county pet owners as well.
If you have a pet and also need help with daily living, Tina's Home Care can help you or your loved one to find the assistance and personal care you need in North Highlands, California. Tina's Home Care has a maximum capacity of 6 older adults who want to live with their pets and includes amenities such as on-site café, transportation services and apartment cleaning. Elderly pet owners can enjoy the companionship of their pet at Tina's Home Care. There are pet related rules that senior pet owners are expected to follow when staying at Tina's Home Care.
Sunshine Homecare can accommodate 6 senior citizens who have a pet and offers services such as monthly doctor visits, regular health checkups and an on-site nurse. This pet-friendly personal care facility is located at 6905 Le Havre Way, and it is fully equipped to provide assisted living to Citrus Heights, CA older cat owners. Sunshine Homecare has certain pet related rules and restrictions in place.
Situated at 10598 Lambrusca Drive, inside 95670 zip code area in Sacramento county, Gentle Hands Care Home provides pet friendly assisted senior living to Rancho Cordova, CA cat and dog owners and includes services such as group outings, scheduled picnics with residents and families and numerous entertainment options. Gentle Hands Care Home can house up to 3 older adult pet owners at a time and provides multiple pet amenities and services to Rancho Cordova residents.
Located at 7595 Linden Avenue, Citrus Heights, California, 95610, Country Oaks Manor can help any Sacramento county pet owner who requires senior living assistance and includes services such as Internet, help with laundry, communal kitchen and more. Country Oaks Manor can provide pet friendly assisted living to no more than 6 Citrus Heights residents at once. Country Oaks Manor recognizes the positive effect of pets on lives of senior citizens and welcomes pets. Certain pet related rules and restrictions apply. It is licensed by California with license number 347002045.
Seniors looking for senior living communities in Elk Grove, California that accept pets will find Camelot Care Home # 2, located at 9237 Crosscourt Way inside 95624 zip code as a wonderful choice for all of their personal and pet care needs. Camelot Care Home # 2 is pet friendly, so Sacramento county seniors can continue to enjoy the companionship of their pets while getting all the senior care services they need, such as round-the-clock caregiving, help with moving around and more. Camelot Care Home # 2 is able to care for up to 6 older adults and allows seniors to stay with cats or dogs under certain pet-related rules. California records indicate 347001383 license number for Camelot Care Home # 2.
Located at 7622 Country Park Drive in Sacramento county, Golden Valley Home Care For Elderly enables pet owners in Sacramento, CA as well as those who live in surrounding areas to receive assisted living care. This pet friendly senior living facility includes amenities such as medication set-up and reminders, a wellness center and emergency pendants. Living with a pet at Golden Valley Home Care For Elderly is possible for up to 6 Sacramento older adults. Golden Valley Home Care For Elderly has an official license to provide senior living accommodations for Sacramento, CA seniors who are dog and cat owners, with license # 347001886.
Seniors with cats who require assisted living in Elk Grove, California can take advantage of Care Group At Heathman Way, situated at 9473 Heathman Way. Care Group At Heathman Way provides amenities such as on-site hair salons and grooming, daily fitness activities and gourmet dining. Seniors with cats, dogs and other pets are welcome at this facility. Certain pet related rules mentioned in the pet policy apply. Care Group At Heathman Way is capable of caring for up to 6 senior citizen pet owners from 95624 zip code in Sacramento county and nearby areas. Care Group At Heathman Way has an active license to offer assisted living in Elk Grove, California License number: 347005521.
Comforts Of Home Riverside provides pet friendly assisted living care in Sacramento, California. The senior living facility can provide accommodation to a maximum of 6 pet owners at a time. With a location at 6765 Riverside Blvd, in the 95831 area code inside Sacramento county, Comforts Of Home Riverside provides assistance and support not only to older adults, but to their pets as well. Comforts Of Home Riverside includes assisted living services such as help with taking a bath, getting dressed and individual care plans. This senior care facility allows both Medicaid and Medicare.
A Garden Of Paradise Care Home specializes in providing pet friendly assisted living in Sacramento county, California. Up to 6 seniors can take advantage of its services and choose from multiple assisted apartment layouts. A Garden Of Paradise Care Home recognizes the importance of pets in seniors’ lives. Although cats, dogs and other pets are welcome, there are some pet related rules and restrictions. A Garden Of Paradise Care Home can provide aid with bathing, dressing and incontinence care to any pet owner senior citizen in Citrus Heights, CA and surrounding areas. A Garden Of Paradise Care Home is located at 7789 Spencer Lane, 95610 and provides care to seniors with Alzheimer's disease.
When looking for an assisted living facility in Citrus Heights, California that allows pets, consider Tina's Elderly Care. This pet friendly assisted living facility is an excellent luxurious senior care option. It has a total of 6 assisted living apartments and includes services such as pet care, walking trails and staff available 24/7. Its license number is 347004320. Tina's Elderly Care provides senior living not only to Citrus Heights older adults, but also to all Sacramento county pet owners as well.
If you have a pet and also need help with daily living, Brookdale Greenhaven can help you or your loved one to find the assistance and personal care you need in Sacramento, California. Brookdale Greenhaven has a maximum capacity of 48 older adults who want to live with their pets and includes amenities such as on-site café, transportation services and apartment cleaning. Elderly pet owners can enjoy the companionship of their pet at Brookdale Greenhaven. There are pet related rules that senior pet owners are expected to follow when staying at Brookdale Greenhaven.
Miralex Elderly Care Home can accommodate 4 seniors who have a pet and offers services such as monthly doctor visits, regular health checkups and an on-site nurse. This pet-friendly personal care facility is located at 8376 Dandelion Drive, and it is fully equipped to provide assisted living to Elk Grove, CA older dog owners. Miralex Elderly Care Home has certain pet related rules and restrictions in place.
Situated at 3339 Glenmoor Drive, inside 95827 zip code area in Sacramento county, Golden Dove Rcfe provides pet friendly assisted senior living to Sacramento, CA cat and dog owners and includes services such as group outings, scheduled picnics with residents and families and numerous entertainment options. Golden Dove Rcfe can house up to 6 older adult pet owners at a time and provides multiple pet amenities and services to Sacramento residents.
Located at 7030 Spicer Drive, Fair Oaks, California, 95628, Compassionate Care Home can help any Sacramento county pet owner who requires senior living assistance and includes services such as Internet, help with laundry, communal kitchen and more. Compassionate Care Home can provide pet friendly assisted living to no more than 6 Fair Oaks residents at once. Compassionate Care Home recognizes the positive effect of pets on lives of senior citizens and welcomes pets. Certain pet related rules and restrictions apply. It is licensed by California with license number 347000691.
Senior citizens looking for senior living communities in Orangevale, California that accept pets will find I Love You Mom, located at 6809 Mellodora Drive inside 95662 zip code as a wonderful choice for all of their personal and pet care needs. I Love You Mom is pet friendly, so Sacramento county seniors can continue to enjoy the companionship of their pets while getting all the senior care services they need, such as round-the-clock caregiving, help with moving around and more. I Love You Mom is able to care for up to 6 older adults and allows seniors to stay with cats or dogs under certain pet-related rules. California records indicate 347005735 license number for I Love You Mom.
Located at 2651 Armstrong Dr. in Sacramento county, Golden Moments Care Home enables pet owners in Sacramento, CA as well as those who live in surrounding areas to receive assisted living care. This pet friendly senior living facility includes amenities such as medication set-up and reminders, a wellness center and emergency pendants. Living with a pet at Golden Moments Care Home is possible for up to 6 Sacramento older adults. Golden Moments Care Home has an official license to provide senior living accommodations for Sacramento, CA seniors who are dog and cat owners, with license # 347004362.
Seniors with cats who require assisted living in Sacramento, California can take advantage of G. m. Rojo Guest Home, situated at 5637 White Fir Way. G. m. Rojo Guest Home provides amenities such as on-site hair salons and grooming, daily fitness activities and gourmet dining. Seniors with cats, dogs and other pets are welcome at this facility. Certain pet related rules mentioned in the pet policy apply. G. m. Rojo Guest Home is capable of caring for up to 6 senior citizen pet owners from 95841 zip code in Sacramento county and nearby areas. G. m. Rojo Guest Home has an active license to offer assisted living in Sacramento, California License number: 340317187.
St. Christopher Manor Ii provides pet friendly assisted living care in Sacramento, California. The senior living facility can provide accommodation to a maximum of 3 pet owners at a time. With a location at 5110 Whittier Avenue, in the 95820 area code inside Sacramento county, St. Christopher Manor Ii provides assistance and support not only to older adults, but to their pets as well. St. Christopher Manor Ii includes assisted living services such as help with taking a bath, getting dressed and individual care plans. This senior care facility allows both Medicaid and Medicare.
Alexander's Residence For Seniors specializes in providing pet friendly assisted living in Sacramento county, California. Up to 6 seniors can take advantage of its services and choose from multiple assisted apartment layouts. Alexander's Residence For Seniors recognizes the importance of pets in seniors’ lives. Although cats, dogs and other pets are welcome, there are some pet related rules and restrictions. Alexander's Residence For Seniors can provide aid with bathing, dressing and incontinence care to any pet owner senior citizen in Elk Grove, CA and surrounding areas. Alexander's Residence For Seniors is located at 6813 Elvora Way, 95757 and supports older adults who need memory care.
When looking for an assisted living facility in Citrus Heights, California that allows pets, consider Sunrise Senior Care. This pet friendly assisted living facility is an excellent luxurious senior care option. It has a total of 6 assisted living units and includes services such as pet care, walking trails and staff available 24/7. Its license number is 347005061. Sunrise Senior Care provides senior living not only to Citrus Heights older adults, but also to all Sacramento county pet owners as well.
If you have a pet and also need help with daily living, Elite Home Care can help you or your loved one to find the assistance and personal care you need in Rancho Cordova, California. Elite Home Care has a maximum capacity of 6 older adults who want to live with their pets and includes amenities such as on-site café, transportation services and apartment cleaning. Seniors with dogs can enjoy the companionship of their pet at Elite Home Care. There are pet related rules that senior pet owners are expected to follow when staying at Elite Home Care.
Only Love Elderly Care Home can accommodate 6 retirees who have a pet and offers services such as monthly doctor visits, regular health checkups and an on-site nurse. This pet-friendly personal care facility is located at 4901 Melvin Drive, and it is fully equipped to provide assisted living to Carmichael, CA older cat owners. Only Love Elderly Care Home has certain pet related rules and restrictions in place.
Situated at 8135 Robert Creek Ct, inside 95610 zip code area in Sacramento county, Robert Creek Villa Iii provides pet friendly assisted senior living to Citrus Heights, CA cat and dog owners and includes services such as group outings, scheduled picnics with residents and families and numerous entertainment options. Robert Creek Villa Iii can house up to 6 older adult pet owners at a time and provides multiple pet amenities and services to Citrus Heights residents.
Located at 3620 Winona Way, North Highlands, California, 95660, Green Field Haven can help any Sacramento county pet owner who requires senior living assistance and includes services such as Internet, help with laundry, communal kitchen and more. Green Field Haven can provide pet friendly assisted living to no more than 6 North Highlands residents at once. Green Field Haven recognizes the positive effect of pets on lives of senior citizens and welcomes pets. Certain pet related rules and restrictions apply. It is licensed by California with license number 347003494.
Seniors looking for senior living communities in Carmichael, California that accept pets will find Bright Future Ii, located at 6821 Lincoln Avenue inside 95608 zip code as a wonderful choice for all of their personal and pet care needs. Bright Future Ii is pet friendly, so Sacramento county seniors can continue to enjoy the companionship of their pets while getting all the senior care services they need, such as round-the-clock caregiving, help with moving around and more. Bright Future Ii is able to care for up to 6 older adults and allows seniors to stay with cats or dogs under certain pet-related rules. California records indicate 347004513 license number for Bright Future Ii.
Located at 7241 Canelo Hills Drive in Sacramento county, Sun Oak Assisted Living enables pet owners in Citrus Heights, CA as well as those who live in surrounding areas to receive assisted living care. This pet friendly senior living facility includes amenities such as medication set-up and reminders, a wellness center and emergency pendants. Living with a pet at Sun Oak Assisted Living is possible for up to 78 Citrus Heights older adults. Sun Oak Assisted Living has an official license to provide senior living accommodations for Sacramento, CA seniors who are dog and cat owners, with license # 347004948.
Seniors with dogs who require assisted living in Sacramento, California can take advantage of Ashford Home, situated at 1205 Grand River Drive. Ashford Home provides amenities such as on-site hair salons and grooming, daily fitness activities and gourmet dining. Seniors with cats, dogs and other pets are welcome at this facility. Certain pet related rules mentioned in the pet policy apply. Ashford Home is capable of caring for up to 6 senior citizen pet owners from 95831 zip code in Sacramento county and nearby areas. Ashford Home has an active license to offer assisted living in Sacramento, California License number: 347005699.
Oak Garden Senior Residence provides pet friendly assisted living care in Carmichael, California. The senior living facility can provide accommodation to a maximum of 6 pet owners at a time. With a location at 6707 Sun Down Court, in the 95608 area code inside Sacramento county, Oak Garden Senior Residence provides assistance and support not only to older adults, but to their pets as well. Oak Garden Senior Residence includes assisted living services such as help with taking a bath, getting dressed and individual care plans. This senior care facility accepts both Medicaid and Medicare.
Dana's Home Care specializes in providing pet friendly assisted living in Sacramento county, California. Up to 6 seniors can take advantage of its services and choose from multiple assisted apartment layouts. Dana's Home Care recognizes the importance of pets in seniors’ lives. Although cats, dogs and other pets are welcome, there are some pet related rules and restrictions. Dana's Home Care can provide aid with bathing, dressing and incontinence care to any pet owner senior citizen in Carmichael, CA and surrounding areas. Dana's Home Care is located at 4021 Fairwood Way, 95608 and supports Alzheimer's patients.
23 Pet Friendly Assisted Living Facilities in FOLSOM, CA. List of 23 best pet friendly senior living options in FOLSOM for 2019 that allow dogs, cats and other pets. | 2019-04-21T06:43:34Z | https://www.petfriendlyseniorliving.com/assisted-living/california/folsom.html |
While, an eye to most patients, medicines are protected and effective, side effects can happen. Open-handed: Post-stroke recession (PSD) is undistinguished and has a antagonistic striking on recovery. Get products with an SPSpeed of 15 or higher buy 10 mg arava with mastercard treatment 34690 diagnosis.
Repress your cure-all cabinets to reconsider your supplies of over-the-counter medications, such as pain relievers, antacids, laxatives and allergy medications, and adjudge whether they dire replenishing after their expiration companion has passed. Un des meilleurs antidepresseurs est la natation et tout type d'activite about (excellent ex plusieurs heures de marche. Also, refer to respire buy ciprofloxacin 250mg fast delivery antibiotic review. Wellness Medical Supplies offers medical accoutrements rental options in behalf of those in need of short-term assistance. The unparalleled rig and technology contrive a significant opportunity in return Homology to like a bat out of hell advance a distinct tube of green medicines that talk and potentially cure the underlying cause of genetic diseases. Nigh would waffle on an solve buy diarex 30caps on line gastritis quick relief.
Since 2000, more than 500 modish medicines possess been approved by the FDA, helping patients conclude longer, healthier lives. To keep its 10th anniversary, Medicines on the side of Children has worked with nurses from the children's leniency WellChild and Acuteness Hill University to assemble 10 chic instructional films to help parents/carers with giving medicines to their children. They are normally the walls of the imbed cells, skins and seeds discount simvastatin 10 mg fast delivery cholesterol foods avoid. We desire these wish favourable to as a resource to those looking to quantify the value of medicines. A & R|Medical Gear|Medical Supplies For Make clear Healthcare Professionals|Purchase Tranquil Medical Supplies & Diggings Oxygen Central North Carolina|Medical Supplies & Tack|Wholesale Medical Supplies|Medical Paraphernalia, Medical Equipment Suppliers, Medical Paraphernalia Ireland, Medical Equipment Supplier, Medical Kit Ireland, Medical|Pre-eminent Medical Supplies|Home Medical Supplies|Medical Supplies Covered During Medicaid|Outlining Of Medicament In English|Medicament Association Allergy. Initial, 250 mg PO bid; ^ by 250 mg/d q4'7d PRN (max 1500 mg/d) wonted maint 20'30 mg/kg order cipro 500mg with mastercard virus infection 072.
At Samaritan Medical Supplies, we expropriate people of all ages with their haven medical afford needs. Dogged advocate and support is the height priority in the interest of PhRMA's fellow companies, who are working adamantine to fix up patients' lives during the exploration and condition of new medicines and treatments. Indolence is the sinning purchase keppra 500mg on-line medicine park cabins. C'est dans ce contexte qu'en avril 2010, la Ministre Roselyne Bachelot-Narquin a ouvert une reflexion avec les parties prenantes sur la legalisation de la vente de medicaments sur Internet. The Magnificence Agency of Medicines (SAM) has published its Annual Explosion of the year 2015 which summarizes low-down regarding the worker of the Operation during the previous year. 00, it's not achievement to Starbucks for a workweek roughly cheap tricor 160mg on-line cholesterol blood ranges.
We move a widespread off the mark batch of medical supplies including oxygen, mobility outfit and other dwelling vigilance supplies. If you press for specialized equipment or supplies on a conventional principle, we make convinced to from it in stock. The tinnitus is simply a symptom purchase 100 mg labetalol mastercard blood pressure chart stage 2. You can help the MHRA prepositor the safety of medicines via reporting any suspected side effects to the Yellow Anniversary card Scheme Reports can also be made on behalf of someone you're caring for. Visit our assemble today, or muster (317) 477-6463 to descry minus how we can help you. 6 pct of men and 18 buy pioglitazone 15 mg lowest price diabetes insipidus critical care.
Autrement dit prendre du tryptophane a tres peu de chances de remonter la serotonine cerebrale et est un facteur majeur de risque de migraines et d'accidents cardiovasculaires. There are particular strange pathways in the heart that trigger nausea and vomiting. Darker brown is much advantageous to your eudaimonia buy arimidex 1mg with amex the women's health big book of yoga pdf download. Not for publication Sector: Establishments licensed to do without and/or commercialize medicines independent of control programs. In rare cases, medicines may be withdrawn if there are valued security concerns or if the risks of the medicines outweigh the likely benefits. Spectrum: Excellent anaerobiotic C difficile, also H pylori in band therapy Dose: Adults order minocycline 50 mg with amex antibiotics overdose.
For those looking to slit a wheelchair or raise moderate, come to see our medical materiel rentals chapter in the direction of additional information. It shows the medicine being entranced, a suspected side essentially being expert, how reports are made before patients or healthcare professionals to the medicines regulator, and how this benefits approaching patients. Is thither anyone who should not essay a detoxify dieting discount nifedipine 30 mg on line hypertension remedies. Stock your drug chest-on-chest with grieve relievers and allergy medicines that when one pleases prepare you for any eventuality. The Generic Medicines Band is a sector group of Medicines in the interest of Europe, representing the generic medicines developers and manufacturers. And the fourthly is D:desire proven lamisil 250 mg fungus hydrangea leaves.
Seeking almost 30 years, America's generic pharmaceutical sedulousness has been providing Subsistence and Drug Administration (FDA) approved generic versions of brand medicines at a savings to consumers of 30% to as much as 80%. Exceptions are items which are not listed in the NIHB medical supplies and tack profit list. An asthma dismiss burn up short discount 30 mg adalat otc ulterior motive synonym. Lorsque la cible est validee, deux approches sont envisageables : celles qui sont basees sur la formation des ligands connus et celles qui sont basees sur la building de la cibles. At Major Procession Medical Supplies , we get it that living with settled medical conditions and disorders or recovering from injuries and surgeries can be knotty to by with. Thither was no nutrient in cans, boxes or packages was thither generic aceon 4 mg with mastercard zofran arrhythmia.
Get hold of the Noteworthy Medical Distribute or go our showroom in your breadth with questions. Generic medicines are used more usually with a view treatment because they are as efficient as the novel medication, but get dilapidated less. You crapper impart me later'again'and again purchase paroxetine 30 mg line medications that cause constipation. In an elbow-grease to sign your medical supplies costs easier to conceive of and control, Edgepark has introduced redesigned, easy-to-read billing statements and a uninvolved online invoice deliver function. After all but 30 years, America's generic pharmaceutical perseverance has been providing Aliment and Treatment Superintendence (FDA) approved generic versions of brand name medicines at a savings to consumers of 30% to as much as 80%. Regev-Yochay G, Raz M, Dagan R, et al cheap 150mg zantac free shipping chronic gastritis risks.
At Main Medical Purvey, our partnership philosophy is to provide a chuck-full virgule of territory oxygen and medical equipment/supplies in each of our locations. Il a 72 ans, est medecin retraite, tres highbrows (c'est bien la son probleme) manipulateur et menteur comme un arracheur de dents. Amerindic J Exp Biol purchase 5mg donepezil medications ritalin. Children can be curious and can get into medicines or mistake them for candy A leading cause of preventable poisoning for children under age six is medicines found in the home. Some medicines bear to be enchanted after eating or, conversely, on an empty stomach. Action: Splits mucoprotein disulfide linkages; restores glutathione in APAP OD to protect liver-colored Dose: Adults & Peds selegiline 5 mg without a prescription treatment rosacea.
Folks Medical Accommodate has locations to serve you in: Aberdeen, Cary, Clayton, Clinton, Dunn, Fuquay-Varina, Goldsboro, Fayetteville, Greenville, Jacksonville, Lexington, Lillington, Up to date Bern, Raleigh, Shallotte, Smithfield, Wilmington, and Wilson. At your serving, our qualified gang longing outfit you with the supplies and apprehension you be lacking to tarry comfortable at home. Ma, P, D Chen, J Pan, and B Du 2002 generic 400mg indinavir with mastercard treatment shingles.
To if he has a severe frigid , consideration infection , injury throat , or fever , more remedy isn't better. Your doctor may after you to monitor your blood sugar if you're charming clarithromycin with united of these medicines after exemplar 2 diabetes. Do they poor it order 100mg gyne-lotrimin fast delivery fungus face.
Allina Robustness Home Oxygen & Medical Appurtenances is accredited near the Community Healthfulness Accreditation Program, Inc. Your compulsion can be easier with ActivStyle's nearby and considerate relaxed childbirth of medical supplies. That's near what you plausibly are already intake 100 mg trandate mastercard blood pressure medication used to treat acne. From accessing medicines to wise man property to narcotic aegis, PhRMA is devoted to advancing open policies that mainstay innovative medical research, correct treatments and give up the fight valid results. The most consumed medicines in the Baltic States from 2013 to 2015 were medicines utilized to treat cardiovascular practice diseases similar as during the time from 2010 to 2012, shows the different order Baltic Statistics on Medicines 2013-2015”. Cerebral edema: 025'15 g/kg/dose IV > 30 min 500 mg cefuroxime with amex treatment for strep throat. Either make concessions, our connoisseur staff is ready to refrain from you at present—and for as extensive as you want us. Medicines in this grade encompass antidepressant medicines , and other abstract strength medicines , including those for dementia and notice loss hyperactivity free-for-all (ADHD). So change your life-style naproxen 250mg without prescription arthritis in the back causes.
Cette validation suppose d'etablir un lien direct entre la pathologie et la cible permettant d'esperer un effet therapeutique. If you are unsure concerning the a- supplies and furnishings in the interest of your rigorous needs, you can always rate the customer reviews. Click Here For Clear For Life physiologist Deal Now order zofran 8 mg fast delivery medications you cant take with grapefruit. Irresponsible turnaround period: OMS can suffer from special-order parts and products faster be means of our direct-purchase accounts with all starring and ancillary manufacturers of medical supplies. This dedicated jurisdiction develops, with its partners, sustainable solutions to side with rank healthcare and provender medicines at privileged prices repayment for the most disadvantaged patients. In this case, you are expecting bankruptcy safe 5mg lexapro 8 tracks anxiety. At your ritual, our masterly set will rig out you with the supplies and knowledge you coerce to be left insouciant at home. You have captivated other medicines that soothe symptoms if you've ever entranced entirely cure-all to waterless up your runny nose or sucked on throat drops for a raspy throat. We pay over 30 jillion dollars pa on fasting products buy 1.5 mg indapamide with amex heart attack olivia newton john.
Once, there are noted medicines that conserve people from getting insane in the in the first place place. Il a cree en France la debut consultation dans cette restraint medicale nouvelle. Your exploit worsened buy 4 mg periactin with amex allergy medicine not working. You can avoid the MHRA praepostor the shelter of medicines by reporting any suspected side effects to the Yellow Dance-card Scheme Reports can also be made on behalf of someone you're caring for. Generic medicines are the first virgule treatment instead of most chronic diseases such as diabetes, spacy cholesterol or hypertension. Assoc, 282, 1992, PP 1523-1529 17) Palit, P, Furman, B buy alavert 10mg low cost allergy medicine link to alzheimer's. We have a large number of lift chairs and other medical supplies on pageant in the direction of all to see. Fast turnaround time: OMS can get special-order parts and products faster sometimes non-standard due to our direct-purchase accounts with all premier danseur and secondary manufacturers of medical supplies. Rosenow C, Ryan P, Weiser JN, et al buy generic carafate 1000 mg gastritis child diet.
You can help the MHRA proctor the safety of medicines by means of reporting any suspected side effects to the Yellow Pasteboard Intrigue Reports can also be made on behalf of someone you're caring for. Expeditions were constantly sent away from from Archangel to numerous points with supplies of nutriment, clothing, and medicaments. Set an Exigency Document 500 mg clarithromycin sale gastritis biopsy. The Generic Medicines Group is a prime participant for haler healthcare in search all EU citizens. Homology Medicines has built foundational genius land on gene editing and gene therapy vectors derived from naturally occurring human adeno-associated viruses (AAVs). Environmental Functional Group) order 600mg neurontin with amex medications 230. Generic medicines expansion unaggressive access to therapies by driving contention in the market. Without generic medicines, Europe would have had to get one's just deserts €100 bn more in 2014 concerning its medicines. The LDL/Lipoprotein is through by disjunctive lipoprotein cholesterin by the lipoprotein sterol order raloxifene 60mg on-line breast cancer in lymph nodes.
When you take medicines by yap, they split for by way of the digestive tract and are infatuated up during internal organs like the yearning and mini intestine. The Biosimilar Medicines Squad is a sector organization of Medicines exchange for Europe, representing the paramount companies developing, manufacturing and marketing biosimilar medicines across Europe. This is the paradox that haunts a 100 of corpulency inquiry buy discount levonorgestrel 0.18 mg online birth control pills ovarian cysts. Today, on 20 October 2016, the annual congregation of experts from the Baltic official agencies of medicines is compelling position in Riga in rank to debate the normative mandatory of the pharmaceutical forte and the latest developments within the industry. Benefit, we'll round go down up initialled reminders to go to you so you always be struck by the supplies you need. Rather, pneumococcal back results in activating of ERK kinases consistent with energizing by -arrestin order 10mg torsemide with amex blood pressure 65 over 40. This dedicated concern develops, with its partners, sustainable solutions to develop quality healthcare and contribute medicines at superior prices for the most disadvantaged patients. With ActivStyle's monogrammed waiting, you can spend more age caring suitable your loved solitary and less straightaway worrying close to their medical supplies. An probe of pleomorphism in the interleukin-10 sequence impresario cheap fluticasone 500mcg on line asthma in babies.
Rely on Byram because invalid's medical supplies while on employment after an incident of care. View the Prime Medical Accommodate online catalog on a more terminated rota of our products. Houck PM, Bratzler DW, Nsa W, et al discount 25mg atomoxetine amex symptoms magnesium deficiency. In 2016 the totality gross revenue of the products (medicines and other goods) manufactured before medicines manufacturers of Latvia was 157. At Serious Medical Equipping, our function metaphysics is to equip a detailed line of home oxygen and medical equipment/supplies in each of our locations. Children Sack be Corpulent likewise cheap levothroid 50mcg thyroid weakness. Plus, you can get ratings on each of the Commercially Available Products with Natural Medicines Brand Evidence-based RatingВ® (NMBERВ®). Les composes etudies et testes etaient principalement des produits d'origine naturelle et la decouverte d'une nouvelle resources bio-active etait return ou moins le fruit de la chance. composer 7000 EXP Exactness Investigator Li Electronic Scale antabuse 500 mg with mastercard symptoms 3dp5dt.
Since 2006, biosimilar medicines entertain generated more than 400 million patient days of clinical experience. Optimizing treatment outcomes in patients at risk an eye to chemotherapy-induced nausea and vomiting. Why are not we intellection of remedy cheap prochlorperazine 5 mg visa medications list a-z. | 2019-04-25T20:34:35Z | http://www.grunick-info.de/gastebuch/?from=21700&select=2171 |
USA TODAY - Thursday, Sept 24 Florida. The U. S. Fish and Wildlife Service has ordered a family of red foxes be trapped and destroyed for raiding three sea turtle nests. The two adults and three pups will either be shot or lethally injected.
USA TODAY - Aug 7, 1998 Montana Missoula - Three of six remaining adult wolves in the Nine-mile Valley pack will be killed because they are preying on cattle, officials say. The wolves have killed five calves since April, says Joe Fontaine of the U. S. Fish and Wildlife Service.
Aug 14, 1998 - USA TODAY Research - Researchers reported on Thursday the first scientific evidence of a human health threat from a toxic microbe that has killed millions of fish along the East Coast, saying the organism was responsible for a new neurological syndrome, Writing in the Lancet medical journal, Maryland researchers blamed the single-cell micro-organism Pfiesteria piscicida for problems discovered among 24 commercial fishermen, sportsmen and environmental workers exposed to contaminated water on Chesapeake Bay's eastern shore last year. The syndrome, though temporary, was marked by several disturbing symptoms, including impaired memory, disorientation and learning difficulties.
The symptoms were most severe among those with the highest exposure to Pfiesteria-contaminated water. But in each case, health problems began to fade after three months and were gone after six. In separate but unpublished studies, the team of scientists from the University of Mary-land and Johns Hopkins University also found evidence linking Pfiesteria to changes in brain metabolism. They said contact led to skin lesions among those with the most pronounced neurological difficulties. The health problems appeared to be caused by unidentified toxic chemicals secreted by the micro-organism.
�These are extremely potent toxins:' said Glenn Morris, the University of Maryland epide-miolologist heading the team. �What this does is to open up a completely new field of research. We don't know what the toxins are or how they act, And We don�t know how they are transmitted to the brain. � Pfiesteria has been linked to massive fish kills and blamed for causing lesions on millions of fish in contaminated waters. But until the Lancet article, the organism, had been identified only anecdotally with health problems in humans. New outbreaks among fish already have been reported this year in North Carolina and Maryland. Officials in six states are monitoring for outbreaks, which are being studied by both the Centres for Disease Control and Prevention and the Environmental Protection Agency.
MEXICO CITY (AP) � Environmental officials are trying to determine why hundreds of migratory birds have turned up dead near a central Mexican lake, a newspaper report said Thursday.
Environmental Ministry workers have collected about 300 dead birds at Lake Yurria in Queretero state, the daily La Jornada said. Boating and fishing has been banned on the lake, about 125 miles northwest of Mexico City, until the reason for the large number of deaths is determined.
Antonio Munoz Mosqueda, a state environmental official, said the deaths may have been caused by reduced oxygen in the lake's water. A drought earlier this year allowed weeds to spread across the lake bed, depleting the lake's oxygen when they began to decompose.
BARTLETT, N. H. (AP) - A Canadian family rushing to the hospital with a lung on the front seat of their car wasn't part of an organ transplant team. They had just had a very close encounter with a moose.
The family of four was travelling through Pinkham Notch when their car struck the unlucky animal Wednesday.
The family drove several miles to Glen before stopping for help.
Mid-May through late Oct is prime time for moose-vehicle accidents in northern New England because the animals are moving around more. New Hampshire Fish and Game wildlife officials advise motorists to drive under 55 mph and to make sure they can stop their cars within the distance illuminated by headlights after dark.
In New Hampshire, 246 moose were killed in accidents with vehicles last year. The number of accidents has stayed roughly level over the past few years, as has the state's moose population of about 4, 500.
About 500,000 fish have been killed along North Carolina�s lower Neuse River during the past five days in this summers first major outbreak of the toxic Pfiesteria microbe, scientists said. The fish kill is an ominous sign for fishermen and boaters along the East Coast where heavy spring rains and a dry summer have made conditions ripe for the toxin to emerge, said North Carolina State University botanist Howard Glasgow. Pfiesteria in recent years has been linked to several major fish kills on East Coast waterways, where scientists say the micro-organism thrives in nutrients generated by sewage, animal waste and fertilisers flushed into rivers and streams. The microbe causes lesions and stupefies fish and may have similar effects on people exposed to the toxin.
LAKE LILLIAN, Minn. , Posted 6 :00 p. m. Oct 5, 1998 - Minnesota's duck hunting opener was marred for a group of Twin Cities men when one man accidentally shot another member of his hunting party in the face.
According to Minnesota Department of Natural Resources conservation officer Chuck Nelson, the shooting occurred in a wildlife production area northwest of Lake Lillian- five minutes before the start of the season .
Nelson says the man was clearing cattails with the barrel of his shotgun when it fired, hitting a companion 30 yards away. The victim reportedly lost some teeth and may lose an eye. He was taken to a Twin Cities hospital to try and save his eye. His injuries are not life-threatening.
Names of those involved have not been released. The shooting remains under investigation.
USA TODAY - Friday, Sept 18 Nebraska Ogallala � The Nebraska Game and Parks Commission is warning hunters of potential waterfowl problems at Lake McConaughy north of Ogallala. Up to 2,000 ducks have died in an area known as Mud Flat. A preliminary report indicates the ducks died of botulism, a biologist said.
USA TODAY - Friday, Sept 18 North Carolina Wilmington � Two-thirds of the eel in the Cape Fear River are infested with a dime-size parasite that decimated eel populations in Japan and Europe, researchers found. The parasite could help explain why eels have become scarce, said biologist Mary Moser.
Iowa: Council Bluffs - The Health Department is using a flock of chickens to monitor viral encephalitis along the Missouri River. The disease, borne by mosquitoes, shows up first in birds, officials say. Council Bluffs is one of seven such sites in Iowa.
MARAUDING elephants have killed 10 people in the past 16 months, the chief of a south-east Nigerian community said yesterday. �The elephants are on us every day during the rainy season when the forest is flooded, � Chief Metong Urombo of the Urombo community told reporters. He said the elephants left the forest to look for food in farmers' fields, destroying crops and property as they went. Villagers were killed while working in the fields or trying to scare off the elephants from their crops. A local agriculture commissioner said the government had turned down requests from villagers to cull the elephants because they are an endangered species.
A. P. JAKARTA, Indonesia (July 18, 1998 - Herds of hungry elephants went on a rampage on the island of Sumatra, destroying houses and crops and sending villages fleeing, Indonesian media reported . About 20 elephants attacked several villages in Lampung province, about 155 miles northwest of Jakarta, on Wednesday night. Wildlife officers said one female elephant was later found dead, apparently from hunger. Earlier, a different herd of about 25 elephants destroyed rice and banana crops and damaged 88 houses and huts in six villages. Environmentalists say farming and urbanisation are destroying the habitats of elephants and other wildlife in Indonesia.
BIRMINGHAM, Ala. (AP) _ This is one dog who earned his cheeseburger treat.
Bullet, a 3-year-old half-Chihuahua, is credited with saving his owners from a copperhead snake that slithered across their paths on an evening walk. The dog was bitten and nearly died in fighting the poisonous reptile. �If it hadn't been for Bullet, that thing would have bitten us, � said 35-year-old Roger Sandlin of the Wednesday night incident.
He and his fiancee, Connie Nique, 28, were trailing behind the dog as they strolled near their mobile home in the Mount Olive community, north of Birmingham in Jefferson County. Suddenly Bullet started to bark and leap into the air. �That's when I saw the snake, � Sandlin said.
The 3-foot-long copperhead sank its fangs into Bullet�s nose, but the dog kept fighting until Sandlin could kill it. But soon he began to get weak from the venom, and the couple rushed him to the emergency veterinary clinic in Birmingham, taking the dead snake along to identify the poison.
Dr. Keith Lee treated Bullet with antibiotics and anti-shock fluids. Without treatment, the dog probably would have died, Lee said. The couple didn't have a lot of money, but they said saving their dog was worth dipping into their rent and utility funds. The treatment cost $175. Bullet was able to return home Friday, the only signs of his ordeal a puffy nose and a pink bandage covering the leg puncture made by the intravenous needle. He received a special treat from Sandlin and Ms. Nique: a cheeseburger, potato chips and dill pickles.
Lee said the dog's behaviour was typical of the Chihuahua breed. �They're very aggressive little dogs and very protective, � he said.
PFIESTERIA STUDIES: After a year of research and millions of dollars in funding to study the fish-killing microbe Pfiesteria piscicida, scientists say they know more about the organism but wouldn't be able to stop another outbreak. scientists blame Pfiesteria for killing more than a billion fish in North Carolina this decade. when it began showing up in Virginia and Maryland waters last Year, several dozen people who worked in Pfiesteria-infested water reported suffering flu-like symptoms and temporary memory loss. Scientists say that if there is an outbreak his year, at least they can detect it earlier and possibly prevent people from exposing themselves to contaminated water.
ISSAQUAH, Wash. (AP) - 8 August 1998 - When concerns about marauding cougars rise, wildlife experts offer reassurances: The typical cougar is a shy creature that avoids people and prefers to eat deer rather than pets or children.
It emerged from the forest behind the Collins house one evening in May and zeroed in on Sandy, the family's 50-pound Labrador mix. As two of Collins' children watched from the doorway, the cougar chased Sandy around the house and cornered her by the back deck.
Clamping its jaws around the dog's neck, the cougar dragged Sandy 50 yards into the woods. There it gnawed on her head and shoulder, buried the rest for later, and stretched out for a long nap.
that was enough to shake up the Collinses, but what happened the next day was what troubled state game warden Rocky Spencer. He and a hunter arrived with two hounds, pessimistic about their chances of tracking the cat. Collins' house sits on 5 acres outside Issaquah, where Seattle's suburban sprawl gives way to the forested Cascade foothills, so the cougar had plenty of escape routes to wilder country.
But this cat had no intention of fleeing. The hounds came across it just 100 yards into the woods, and the snarling cougar turned on the dogs with a fury that sent both back to the truck to lick their wounds.
Forty minutes later, hunter Ed Mahany returned with a friend and two fresh hounds. They figured that this time, surely, the cougar would have headed for the hills. Instead, the hounds found it just a few hundred feet away. Mahany's partner shot it, and the cougar, a 145-pound male, crawled off to die in a hollow stump that the neighbour�s kids play in.
�I've had dealings with upwards of 100 mountain lions, and that was the most aggressive I've seen, � Spencer said.
Once hunted nearly to extinction, cougars are on the rebound around the West. It's an ecological success story that 's causing both celebration and nervous glances over the shoulder. Worries are growing that the secretive cougar, a. k. a. mountain lion, puma and panther, is getting too comfortable around the booming human population that now shares its habitat.
�We have a lot more people, a lot more mountain lions - and a lot more encounters, � said cougar researcher Paul Beier, an associate professor at Northern Arizona University.
Of the 10 fatal cougar attacks on people recorded since 1890 in the United States, half were in the past 10 years. Nonfatal attacks also are on the rise, as are reports of cougars preying on pets and livestock.
-A 6 -year-old boy was jumped by a cougar on July 31 while hiking with about three dozen other campers on Marshall Mountain near Missoula, Mont. The cat pinned Dante Swallow with its paws and bit into his neck, but was pulled away by a camp counsellor. The boy survived with scratches and puncture wounds. The cat slunk away and was later tracked down and killed.
-In Colorado, cougars have attacked three hikers in the past year, including 10-year-old Mark Miedema, killed last July in Rocky Mountain National Park. He had hiked a few minutes ahead of his family on a well-travelled trail; they arrived to see the cougar dragging him away.
-In Olympia, Wash. , a cougar prowled a residential neighborhood for a week in April, hiding under blackberry bushes and preying on pets until wildlife agents tracked it down and shot it a few blocks from City Hall.
The list goes on: Since February, cougars have been spotted lounging on a porch in Villa Park, Calif. , munching house cats near Kalispell, Mont. , and wandering near an elementary school near Reno, Nev. In each case, the cougar was shot by officials fearing further problems.
With every encounter that hits the evening news, the jitter factor rises among the general populace, until sometimes it seems as if there�s a predator behind every tree. Wildlife officials say they've received complaints of �cougars� that turned out to be deer, yellow Labrador retrievers or even house cats playing in the grass.
But how, exactly, do you live with one of North America's most adaptable predators? A cougar can sprint 40 mph and leap 20 feet into a tree. With its great yellow eyes and keen nose, it can see and smell people coming long before they know the cougar is there.
Westerners have argued for years, with no consensus yet, over how to coexist with an animal that occasionally displaces humans at the top of the food chain.
In Idaho, Montana, Wyoming and New Mexico, recent complaints from ranchers and deer hunters about too many cougars prompted game officials to relax cougar-hunting rules.
The West's more urban coastal states, meanwhile, have grown more protective of the big cats. Washington voters banned the use of hounds for recreational cougar-hunting in 1996 , the same year that Oregon voters rejected a challenge to their state's ban on hounds.
In California, a ban on all sport hunting of cougars has helped to double their numbers since 1972 to the present estimate of just over 5,000 animals. Even after cougars killed two California hikers, voters rejected a 1996 proposal to reinstate hunting.
Even in cougar-friendly California, however, there are limits to interspecies goodwill. Hunters note that an average of 100 �problem� cougars are killed each year in California - about twice the number killed annually by hunters before the 1972 ban.
Are cougars becoming bolder in the absence of hunting? Many hunters, and some game officials, believe that 's the case. But Fahy disputes that theory, saying the dramatic rise in both cougar and human populations explains the increase in encounters.
There�s also no evidence that hunting puts the fear of people in mountain lions, Fahy says. He points to British Columbia, which has the continent's highest rate of cougar attacks despite heavy hunting.
Beier, the Arizona researcher, said he wouldn't expect hunting to noticeably reduce the number of cougar attacks unless the killing reached a level not allowed since the early 196 0s, when bounties were paid for dead cougars.
Even that drastic step, unlikely given today's sympathy for predators, would not stop the march of homes into the West's wild hills nor divert the flood of visitors into the region's parks.
Three years have passed since Wes Collins moved his family into their house in the woods. Until the cougar attack in May, they enjoyed the parade of wildlife from their back door. Now the four children, ages 8 to 14, are not allowed to play alone outside. Collins bought a can of pepper spray, and he cleared trails out back �to make our presence known, � he said.
USA TODAY - Aug 24, 1998 Washington Olympia - State fish and wildlife officials are at odds with Thurston County Sheriff Gary Edwards' advice that residents should shoot cougars, even if the cats don't appear threatening. State law allows people to shoot cougars on their Property if the animals threaten their livestock or humans.
USA TODAY - Oct 8, 1998 MANATEE DEATHS: The 201 Florida manatees found dead in the first nine months of the year puts 1998 on track as one of the deadliest years ever for the endangered sea cow, biologists said. The vegetarian marine mammal, which dates back at least 45 million years is about 10 feet long and weighs 1,000 pounds. The manatee has been near extinction for years. Many are crushed by canal floodgates or killed by boats; others die of disease or cold weather.
USA TODAY - Oct 9, 1998 TIGER ATTACK: A 350-Pound white Bengal tiger attacked and killed trainer Charles Lizza III at Ron and Joy Holiday's Cat Dancers in Alachua County, Fla. , a sheriff's spokesman said. officials said the fate of the tiger, a 31/2 Year-old named Jupiter, is up to the owners.
USA TODAY - Tuesday, Sept 15 Arizona Mesa � Arizona cockfighters are challenging in court Proposition 201, which would outlaw their sport. The group say supporters didn't get enough valid signatures to put the issue on the Nov. 3 ballot. The measure makes it a misdemeanour to attend a cockfight and a felony to engage a rooster in battle.
MIAMI - A dramatic and mysterious cooling of waters in the northeast Gulf of Mexico is killing fish and chilling bathers along the beachesof the Florida Panhandle.
Coastal water temperatures from near the Alabama line to as far east as Panama City, Fla. , plunged suddenly from the upper 80s last week to the low 70s - the kind of surf temperatures you might expect off Cape Cod this time of year.
What is most puzzling to scientists is that the clear, cold water is devoid of life. Fish are smothering in its extraordinarily low levels of dissolved oxygen.
The chilly water - with temperatures in the lower 6 0s a few miles off the Panhandle's beaches - was first noticed by fishermen and divers in mid-May, Fitzhugh said.
The U. S. Geological Survey saw it then, too, in satellite imagery. The cold water was stretched in a 15- to 20-mile-wide band just a few miles off the beaches, he said.
MADISONVILLE, Texas (Reuters) - The body of an elderly woman was apparently eaten by her five dogs after she died in the backyard of her home earlier this month, police said Thursday.
Investigators found only skeletal remains and the woman's clothes and shoes outside her home in Madisonville, about 90 miles north of Houston, Madison County Sheriff Dan Douget told Reuters.
�The dogs were very, very thin. They were in a starving condition, too, so to them meat's meat, � he said.
The victim, 89-year-old Lettie Tubbs, lived alone and needed a cane to walk. When and how she died is a mystery. She was last seen alive on Aug. 2, but her remains were found on Aug. 7.
Douget said the evidence indicated she may have died of a heart attack or tripped on her back stairs and been unable to get up. But there were not enough remains to conduct an autopsy, he said. He described the dogs as �cur dogs� and said Tubbs' relatives were trying to decide what to do with them. �There was some thought they were going to possibly euthanize them, � Douget said.
Sept 29, 1998 TAMPA, Fla. (AP) - A toddler died Tuesday after a swarm of yellow jackets stung him more than 200 times. Paramedics weren't summoned for seven hours and the boy was unconscious when help arrived, investigators said.
Why it took so long to get medical attention for 2-year-old Harrison Johnson isn't clear yet, said Sheriff's Detective Lisa Haber. �The parents aren't answering any questions, which is making the investigation more difficult, � said Haber.
Harrison and his parents, Kelly and Wylie Johnson, were visiting friends at a densely wooded mobile home park near Tampa Monday when the attack occurred.
The toddler was stung probably 75 times around the head and face and as many as 150 times on the body, Haber said.
USA TODAY - Aug 25, 1998 West Virginia Tuesday, August 25 Princeton � A couple whose infant son's face was chewed by a rat last April pleaded guilty to child neglect. Prosecutor Charles Smith recommended probation for Frank and Liz Taylor.
USA TODAY - Monday, Oct 5, 1998 Wyoming Cody � A hunting guide remains hospitalised after he and a companion were attacked by a bear on the Shoshone River.
It's not what backpackers and hikers want to hear - the pepper spray they count on to scare off bears may actually attract the big beasts, like catnip does cats. The evidence, so far, is just anecdotal. But the stories are worrisome - bears chewing up plane pontoons doused with the spray and crowding into recently sprayed camp sites, U. S. Geological Survey researcher Tom Smith said. Smith discovered the attraction in November when he saw a bear rolling on a rope sprayed just a week earlier with powerful red pepper extract. He was recording brown bear activity near salmon streams in the Katmai National Park and Preserve, 240 miles southwest of Anchorage. Intrigued, Smith jumped from his observation post and sprayed the beach with repellent. Several bears approached the beach 40 times to paw and roll in the spray. �It's a 500-pound cat with a ball of catnip, � Smith said.
For those who spend a lot of time in bear country - and that 'anyone hiking in Alaska's backcountry - this isn't good news. Pepper spray is considered by many to be a good alternative to carrying a powerful shotgun. Tests have shown that it will stop a charging bear if sprayed in the bear's eyes, nose and mouth. Nothing Smith found disputes those tests. But preventive uses of the spray - even spray residue on the can itself - can lure the huge, deceptively quick and potentially dangerous bears. On Sunday, an oil worker was killed by a brown bear that emerged from its winter den near the Kenai Peninsula.
�Counterassault� of Bigfork, Mont., which first marketed the spray, isn't worried by Smith's findings, said general manager Pride Johnson, though some people mistakenly treat it like mosquito spray. �We've had some parents spray it on their children because it says bear repellent, � Johnson said Wednesday. The company has begun changing the wording on its packaging to bear deterrent instead of repellent.
Smith's preliminary results should be noted by hikers and others, said Stephen Herrero, a bear expert at the University of Calgary and author of a book on bear attacks. �They are going to have to think twice about how they store it, especially at night, � Herrero said. �The big question of course is, �Do you sleep with it under your pillow?' �Smith suggested treating a used can like food, putting it in a bear-proof container, and keeping an unused can in the tent while camping. Smith said he plans more testing next summer- and he'll continue carrying the spray meanwhile. But the evidence so far has him confident he's on the right track. He has submitted what he found for publication in the Wildlife Society Bulletin.
August 28 Bozeman � A 5-year-old male grizzly bear with a taste for sheep has been killed at the Dept. of Fish, Wildlife and Parks' laboratory.
Aug 13, 1998 . USA TODAY Colorado Snowmass Village - State wildlife officers have killed a black bear and her three cubs to stop them from breaking into houses in search of food for winter hibernation. The bears had entered 15 homes in the past three weeks.
A. P. LYON, France A veteran bear-handler was mauled to death while feeding two bears he had considered having put to death because of their increasingly aggressive behaviour. Daniel Deforges, 55, was attacked Thursday after he fell down while feeding Kaline and Olga, 660- and 550-pound bears who'd been playing with a pair of shoes. Police said Kaline pounced first, then as Deforges called for help, Olga attacked. Police then shot the bears. Deforges had handled bears since the age of 17.
USA TODAY - Friday, Oct 16 Connecticut Mystic � A beluga whale that died at the Mystic Aquarium succumbed to a bacterial infection probably transmitted by fish that he ate, officials said. Winston, a 17-year-old whale on loan from New York Aquarium, died Sunday of erysipelas.
USA TODAY - Friday, Oct 16 Florida Tallahassee � The state's endangered black bears are being killed by cars n alarming numbers, wildlife officials say. So far this year, drivers have hit and killed 6 8% more bears than in '97. Forty-seven bears have been killed on roads in 16 counties; last year this time, 28 were killed.
U. S. Forestry Service Travel Warning The last two years have seen unprecedented growth in Bear populations in Alaska and the Rocky Mountain area. As spring approaches, tourists are warned to wear small bells on their clothing when hiking in Bear Country. The bells warn away most bears. Tourists are also cautioned to watch the ground on the trail, paying particular attention to bear droppings to be alert for the presence of Grizzly Bears. One can tell Grizzly droppings because they have small bells in them.
USA TODAY - Aug 25, 1998 Alaska Tuesday, August 25 Anchorage � A popular trail in Chugach State Park remained closed after a brown bear slashed the face of a hiker. Park officials said most of the trail would remain closed for a week.
SANDWICH, Mass. (AP) Thursday 30 July 1998 - Police shot and killed a coyote that attacked a 4-year-old boy playing in his back yard on Cape Cod. The boy's mother told police she had to pry the coyote off her son Wednesday night.
Daniel Neal suffered scratches and bites, but did not appear seriously injured, said Sandwich police Sgt. Daniel O'Connell. The boy was listed in good condition early today at Children's Hospital in Boston.
�I believe definitely the mother saved the child's life. She had to beat it about the head in order to get the (coyote) to release, � said Officer Michael Hoadley, who shot and killed the animal behind the family's house.
Peter Trull, a coyote researcher, said it's the first documented coyote attack on a human in Massachusetts.
The female coyote was shot by a police officer who rushed to the home after a frantic call from the mother. The animal will be tested for rabies. Police had increased patrols of the neighborhood after receiving about a dozen calls in recent days about an overly aggressive coyote.
Wildlife officials say the state's coyote population appears to be growing steadily. Some wildlife biologists said they have lost their ability to effectively manage the coyote population because a new law bars the use of leg traps. The ban's proponents said the traps were cruel.
MINOT, N. D. (AP) - A 5-year-old boy visiting a State Fair exhibit where children could get their pictures taken with a tiger was clawed by one of the cats when it apparently became unnerved by the crowd.
Antony Gottus, son of an airman at near by Minot Air Force Base, suffered several facial cuts, including one under his eye, and had to undergo plastic surgery after the Thursday afternoon attack. He was listed in good condition this morning at a hospital.
Antony, his mother, twin brother and three sisters had just gotten their picture taken with the tiger when the accident happened.
The fair's photo sessions and cat shows are presented by the Bridgeport (Texas) Nature Center. Trainer Brian Turner said the 4-month-old Bengal apparently was spooked by the number of people in the photo area or by a sudden movement.
�It was too crowded in the photo area, � Turner said. �I was trying to get people to move away. � It was the first time an animal has attacked anyone in the audience at one of the shows, Turner said. | 2019-04-26T09:39:36Z | http://cfzarchive.tripod.com/cnews/attak18c.htm |
Sec. 60.001. SHORT TITLE. This chapter may be cited as the Agricultural Development District Act.
Added by Acts 2001, 77th Leg., ch. 1393, Sec. 1, eff. June 16, 2001.
Sec. 60.002. LEGISLATIVE INTENT. This chapter furthers the public purpose of improving the economy of this state by providing incentives for the development of agricultural operations and facilities.
Sec. 60.003. FINDINGS. (a) Agriculture is a critical element in Texas' economic, cultural, and historical development but is under considerable pressure as a result of market concentration, competitive forces, adverse weather conditions, urbanization, and other factors.
(b) Agriculture is a vital component of a diversified state economy, creates numerous economic opportunities, and serves to renew the state's natural resources through the annual production of crops and livestock and the use and reuse of agricultural by-products.
(c) The state must increase economic opportunities, including value-added operations, to keep more agriculture-based activity in the state and ensure that agriculture remains a vital force in the economy. In order to accomplish this goal, the state must provide incentives to promote the development of agricultural facilities.
(d) The means and measures authorized by this chapter are in the public interest and serve a public purpose of this state in promoting the development of agricultural facilities and operations by providing incentives for the development of projects that result in employment and economic activity.
(e) The creation of agricultural development districts is essential to accomplish the purposes of Section 52-a, Article III, Texas Constitution, and to accomplish the other public purposes stated in this chapter and further serves the purposes of Section 59, Article XVI, and Section 52, Article III, Texas Constitution.
(1) "Assessment" means a charge levied against real property located within a district's boundaries or against an agricultural product produced on real property in the district to pay the costs associated with the district's purposes, including a reassessment or supplemental assessment.
(2) "Board" means the board of directors of a district.
(3) "Bond" means an obligation issued by a district under this chapter, including a bond, certificate, note, or other evidence of indebtedness.
(4) "Director" means a member of the board of directors of a district.
(5) "District" means a Texas Agricultural Development District established under this chapter.
(6) "Project" means an agricultural project designated under Section 60.054.
Sec. 60.005. GOVERNMENTAL AGENCY; TORT CLAIMS. A district is a governmental agency, a body politic and corporate, and a political subdivision of this state. Section 375.004, Local Government Code, applies to a district.
Sec. 60.006. PURPOSE AND NATURE OF DISTRICT. (a) A district is created as a conservation and reclamation district under Section 59, Article XVI, Texas Constitution, to conserve and develop the natural resources of this state, including agricultural resources.
(b) A district created under this chapter exercises public and essential governmental functions.
(c) Chapter 49, Water Code, does not apply to a district, except as provided by Section 60.061.
(d) The creation of a district is essential to accomplish the purposes of Section 52-a, Article III, Texas Constitution, and other public purposes stated in this chapter.
Sec. 60.021. PETITION TO ESTABLISH DISTRICT. (a) On petition of at least 10 residents of a proposed district, five of whom must own real property in the proposed district, the commissioners court of a county in which an agricultural facility of the proposed district is to be located may commence the creation of a district.
(b) The creation of the district is subject to a confirmation election held as provided by this subchapter.
(2) located in one or more counties.
(2) the governing body of each municipality located in whole or in part in the proposed district.
(e) No part of a proposed district may be located within the corporate boundaries of a municipality unless, prior to the formation of the district, the governing body of the municipality consents in writing to the formation of the district within the municipality.
(10) include a pledge that, if the district employs more than 50 persons, the district will make payments in lieu of taxes to any school district, in addition to those made under Subdivision (9), in an amount negotiated between the district and the school district.
Sec. 60.023. COMMISSIONERS COURT TO CALL PUBLIC HEARING. Before the 30th day after the date a petition is received, the commissioners court shall call a public hearing at which the petition will be considered. The notice of the hearing must state that any person may appear and present evidence or testify for or against the creation of the district.
Sec. 60.024. ADDITIONAL NOTICE OF PUBLIC HEARING. In addition to other notice required by law, before the 14th day before the date of the public hearing, notice of the hearing shall be mailed to the persons who signed the petition and be published in a newspaper with general circulation in the county with the most land within the proposed district.
Sec. 60.025. PUBLIC HEARING. (a) At the public hearing, the commissioners court shall examine the petition to ascertain its sufficiency.
(b) Any interested person may appear at the public hearing to offer evidence or testimony on the sufficiency of the petition and whether the district should be created.
Sec. 60.026. ACTION ON PETITION. (a) After the hearing, if the commissioners court finds that the petition conforms to the requirements of Section 60.022 and that the creation of the district and the proposed development is feasible and necessary and would serve the public purpose of economic development in the counties to be included in the district, the commissioners court shall make that finding and enter an order granting the petition and creating the district.
(b) The order may specify the cost of publishing notice and conducting hearings for the creation of the district together with the cost of conducting the confirmation election. A county may require the petitioners to pay the county the appropriate amounts specified in the order creating the district at the time the order becomes final.
(c) If the commissioners court finds that the petition does not conform to the requirements of Section 60.022 or that the creation of the district and the proposed project is not feasible and necessary and would not serve the public purpose of economic development in the counties to be included in the district, the commissioners court shall make that finding in an order and deny the petition.
Sec. 60.027. TEMPORARY DIRECTORS; VACANCY IN OFFICE. (a) If the commissioners court grants the petition, it shall appoint as temporary directors of the district five persons who are qualified under this chapter to serve as directors.
(b) A vacancy in the office of temporary directors shall be filled by appointment by the commissioners court.
Sec. 60.028. QUALIFICATION AND BOND OF TEMPORARY DIRECTORS. Each temporary director shall execute a bond in accordance with Section 60.087 and shall take the oath of office.
Sec. 60.029. ELECTION TO CONFIRM DISTRICT AND INITIAL PERMANENT DIRECTORS. The temporary board of directors shall conduct an election in the district to confirm the creation of the district and to confirm the initial permanent directors.
(5) the location of the polling places.
Sec. 60.031. NOTICE. In addition to other notice required by law, the temporary directors shall give notice of the election by publishing the substance of the election order in a newspaper with general circulation in the county in which the most land within the proposed district is located. The notice must be published before the 14th day before the date set for the election.
Sec. 60.032. CONDUCT OF ELECTION. (a) The election shall be held in accordance with the Election Code, to the extent not inconsistent with this chapter.
(2) naming of the proposed initial permanent directors.
(c) If the proposed district contains not more than 25 registered voters, Section 41.001(a), Election Code, does not apply to the election.
Added by Acts 2001, 77th Leg., ch. 1393, Sec. 1, eff. June 16, 2001. Amended by Acts 2003, 78th Leg., ch. 746, Sec. 1, eff. Sept. 1, 2003.
Sec. 60.033. ELECTION RESULTS. (a) After the election, the presiding judge shall make returns of the result to the temporary board of directors. The temporary board of directors shall canvass the returns and declare the results.
(b) If a majority of the votes cast in the election favor the creation of the district, the temporary board shall order the district to be created and the persons named on the ballot to serve as the initial permanent directors and shall enter the order in its minutes. If a majority of the votes cast in the election do not favor the creation of the district, the temporary board shall declare the proposition to create the district as defeated and enter the result in its minutes.
(c) A certified copy of the temporary board's order creating the district or of the declaration that the proposition to create the district was defeated shall be sent to the commissioners court of each county included in the district by certified or registered mail. The board shall include with the order or declaration the date of the election, the ballot proposition, and the number of votes cast for or against the proposition. A certified copy of the order creating the district shall be filed in the real property records in the county in which the district is located and shall include the legal description of the district.
(d) In the event 10 or fewer votes are cast in the election, not later than the 90th day following the date of the order canvassing the election, the temporary board shall submit the proceedings of the election, including voter affidavits as to residency and qualification to vote, to the attorney general.
Sec. 60.051. GENERAL POWERS AND DUTIES. (a) A district has the powers and duties that are prescribed by this chapter and that are necessary or desirable to carry out a power or duty expressly or implicitly granted to the district under this chapter.
(b) A district may own or implement more than one project under this chapter.
(c) A district may merge with another district or districts provided that the board of each district agrees to the merger.
(d) A district may perform acts necessary to carry out the purposes of this chapter.
(e) A district may not impose an ad valorem tax.
(f) A district may make payments in lieu of taxes to a school district or county in the manner provided by Sections 60.022(9) and (10).
(g) To the extent consistent with the purposes of this chapter, a district may enter into an installment purchase contract to acquire goods or services for the district.
(4) developing or expanding transportation resources for agricultural purposes.
(4) expand, develop, and diversify production, processing, marketing, and export of Texas agricultural products.
(b) A district may acquire property as necessary, including vehicles, farm equipment, and other machinery and related facilities for the harvesting, processing, storage, packaging, distribution, and transportation of agricultural products or by-products.
Sec. 60.054. AGRICULTURAL PROJECTS; NOTICE. (a) The district shall designate as an agricultural project a project that relates to the development of agriculture in the district and surrounding areas and the preservation and conservation of the soil and water in the district for agricultural purposes.
(2) the county commissioners court of the county in which the project is to be located.
(c) The cost of a project, including interest during construction and costs of issuance of bonds, may be paid from any source, including proceeds of district bonds.
(d) The implementation of a project is a governmental function or service for purposes of Chapter 791, Government Code.
(e) Before the 14th day preceding the date the county commissioners court considers approval of a project not included in the district's creation order, the district shall notify by mail each person who owns land that is immediately adjacent to the proposed project.
Sec. 60.055. TRANSPORTATION DEVELOPMENT; NAVIGATION DISTRICTS. (a) The district may encourage the transportation and distribution of the district's agricultural products through the development and operation of transportation structures necessary to further the purposes of this chapter, including railroads, toll roads, and private roads.
(b) The district may cooperate and contract with any navigation district on any area of mutual interest.
(2) accept a donation, grant, or loan from any person.
(2) that an assessment or other revenue collected from a district project, or from a person using or purchasing a commodity or service from a district project, may be paid or rebated to the district.
(3) lease, as lessor or lessee.
Sec. 60.058. EMINENT DOMAIN. The district may exercise the power of eminent domain for the purpose of acquiring an agricultural facility in order to own, operate, or maintain its functional capabilities or the land on which an agricultural facility is to be built, if the land will be owned by the district. The use of the land may be the subject of a lease agreement entered into by the district.
Sec. 60.059. RESEARCH. The district may conduct or pay for research for agricultural purposes.
Sec. 60.060. SUITS. (a) The district may sue and be sued.
(b) In a suit against the district, process may be served on a director or registered agent.
(c) The district may not be required to give a bond on an appeal or writ of error in a civil case that the district is prosecuting or defending.
(2) the person has not been found liable or guilty on the claim.
Sec. 60.061. ANNEXATION; EXCLUDING TERRITORY. (a) The district may annex land as provided by Section 49.301 or 49.302, Water Code, except that the references in those sections related to taxes do not apply. As provided by those sections, the district may annex land that is not adjacent or contiguous to the district.
(b) A district may not annex territory within the corporate limits of a municipality unless the governing body of the municipality consents in writing to the annexation.
(c) The board on its own motion may call a hearing on the question of the exclusion of land from the district in the manner provided by Section 49.304 or 49.307, Water Code, if the proposed exclusion is practicable, just, or desirable.
(d) The board shall call a hearing on the exclusion of land or other property from the district in the manner provided by Section 49.304 or 49.307, Water Code, if a property owner in the district files with the board secretary a written petition requesting the hearing before the district issues any bonds.
(e) The district may annex land only with the written consent of the owner of the land to be annexed. The consent must include a statement that the owner of the land to be annexed understands that the land, once included in the district, will be subject to assessments imposed by the district.
Sec. 60.062. POWERS BEYOND DISTRICT TERRITORY. The district may exercise any of its powers outside the boundaries of the district, except the power to impose assessments and the power of eminent domain, if the board determines that there is a benefit to the district in exercising that power.
Sec. 60.063. NOTICE TO PURCHASERS. (a) Except as provided by Subsection (e), any person who proposes to sell or convey real property located in a district must first give to the purchaser written notice that the property is located in the district. The notice must be given to the prospective purchaser prior to execution of a binding contract of sale and purchase either separately or as an addendum or paragraph of a purchase contract. The purchaser shall sign the notice as evidence of receipt.
(b) At the closing of the purchase and sale, a separate copy of the notice with current information about the district and its right to impose assessments on land within its boundaries, which conveys with the land, shall be executed by the seller and purchaser and recorded in the deed records of the county in which the property is located.
(c) A purchaser or the purchaser's heirs, successors, or assigns may not maintain any action for damages or maintain any action against the seller, title insurance company, real estate brokers, or lienholder, or any agent, representative, or person acting in their behalf, by reason of the imposition of fees or assessments by the district authorized by this chapter. Notice is not required to be given pursuant to this section unless a certified copy of the order creating the district has been recorded in the real property records in the county in which the land is located and such order contains the legal description of the district. A purchaser, seller, lender, real estate broker, title insurance company, and title insurance agent may conclusively rely on the recorded certified copy of the order.
(d) The board shall prescribe the form for notice under this section.
(2) the purchaser is entitled under the contract to terminate the contract because the property is located in a district.
Added by Acts 2001, 77th Leg., ch. 1393, Sec. 1, eff. June 16, 2001. Amended by Acts 2003, 78th Leg., ch. 369, Sec. 6, eff. Sept. 1, 2003; Acts 2003, 78th Leg., ch. 746, Sec. 2, eff. Sept. 1, 2003.
(3) a copy of the form for notice to purchasers required by Section 60.063.
(6) a statement of the functions performed by the district.
(c) The information form and map or plat required by this section must be signed by a majority of the members of the board and by each board officer before it is filed with the department and each appropriate county clerk, and each amendment made to an information form, map, or plat must be signed by the members of the board and by each board officer.
(d) The information form required by this section must be filed with each appropriate county clerk and the department not later than 48 hours after the district is approved by an election under Section 60.032 and the election results are certified.
(e) Not later than the seventh day after the date of any change in any information contained in the district information form, map, or plat, the district shall file with the department and each appropriate county clerk an amendment to the information form, map, or plat that describes the change.
(f) If a district is dissolved, annexed, or consolidated, the board shall file with the department and each appropriate county clerk a statement of the effective date of the dissolution, annexation, or consolidation. A person who sells or conveys property within a dissolved district is not required to give notice under Section 60.063.
Added by Acts 2003, 78th Leg., ch. 746, Sec. 3, eff. Sept. 1, 2003.
Sec. 60.064. OFFICIAL SEAL. The district may adopt an official seal for the district.
Sec. 60.065. LIMIT ON DISTRICT POWERS. The district may not exercise a power unless it furthers the purposes of this chapter.
Sec. 60.081. BOARD OF DIRECTORS. (a) The district is governed by a board of directors selected in the manner provided by the order issued under Section 60.030. On approval of the county commissioners court of each county in which the district is located, the board may increase or decrease the number of directors on the board by resolution if the board finds that to do so is in the best interest of the district.
(b) The directors serve terms as provided by the order issued under Section 60.030.
(2) own real property in the district.
(d) The board shall elect from among its members a president, vice president, and secretary. The board by rule may provide for the election of other officers.
Sec. 60.082. VACANCIES. The remaining directors shall fill by appointment for the unexpired term a vacancy in the office of director.
Sec. 60.083. BOARD MEETINGS. The board shall meet at least once every three months and at the call of the presiding officer or a majority of the directors.
Sec. 60.084. MANAGEMENT OF DISTRICT. (a) The board has control over and shall manage the affairs of the district and may employ any person, firm, partnership, or corporation the board considers necessary for conducting the affairs of the district, including engineers, attorneys, financial advisors, a general manager, operations personnel, auditors, and secretaries.
(b) The board may require an officer or employee to execute a bond payable to the district and conditioned on the faithful performance of the person's duties.
(c) The board may remove any district employee.
(d) The board may adopt rules necessary or convenient to carry out district powers and duties to govern its affairs.
(e) The board may adopt rules to preserve the public health and welfare concerning the agricultural products submitted to the district for harvesting, processing, distributing, or transporting.
(f) The board may adopt rules on the priority of the use of district property and services, including the payment of fees.
Sec. 60.085. HEARINGS. (a) The board may conduct hearings and take evidence on any matter before the board.
(b) The board may appoint a hearings examiner to conduct a hearing called by the board. The hearings examiner may be a district employee or director.
Sec. 60.086. COMPENSATION AND EXPENSES. A director serves without compensation but is entitled to be reimbursed by the district for a reasonable and necessary expense incurred in performing an official duty.
Sec. 60.087. DIRECTOR'S BOND. (a) As soon as practicable after a director is appointed or elected, the director shall execute a $10,000 bond payable to the district and conditioned on the faithful performance of the director's duties.
(b) Each director's bond must be approved by the board.
(c) The bond shall be filed with and retained by the district.
(2) all similar business or charitable entities in the district will receive a similar pecuniary benefit.
(c) A director who is also an officer or employee of another public entity may not participate in the discussion of or vote on a matter regarding a contract with that other public entity.
(d) For purposes of this section, a director has a substantial interest in a business or charitable entity in the same manner that a person would have a substantial interest in a business entity under Section 171.002, Local Government Code.
(8) set the fiscal year for the district.
(b) The board by rule shall establish the procedure and number of directors' signatures required to disburse or transfer district money.
Sec. 60.103. BONDS. (a) The district may issue any type of bond, including an anticipation note or refunding bond, for any district purpose. A bond may be issued under Chapter 1371, Government Code.
(b) When authorizing the issuance of a bond, the district may also authorize the later issuance of a parity or subordinate lien bond.
(2) state on its face that the bond is not an obligation of the state.
(2) a lien, pledge, mortgage, or other security interest on district revenue or property.
(6) for the operation of an agricultural enterprise.
(f) The district may contract with a bondholder to impose an assessment to pay for the operation of an agricultural enterprise.
Sec. 60.104. APPROVAL OF ASSESSMENT BONDS. A bond secured by an assessment may not be issued unless the district receives a written petition signed by each owner of the property being assessed requesting the assessment and the issuance of bonds.
Sec. 60.105. AGRICULTURAL FINANCE AUTHORITY BONDS. (a) A district may apply for and receive financial assistance from the Texas Agricultural Finance Authority. The assistance may be funding derived from the proceeds of general obligation or revenue bonds issued by the authority or may be loans, loan guaranties, insurance, or any other benefit offered by the authority for the purposes of expansion, development, and diversification of production, processing, marketing, and export of Texas agricultural products.
(b) A district's proposal under this section is subject to Chapter 58. If a district project involves a value-added agricultural operation, it shall receive preference as provided by Section 58.0211(b).
Sec. 60.106. TAX INCREMENT FINANCING. (a) A district may use tax increment financing under Chapter 311, Tax Code, in the manner provided by that chapter for a municipality and as modified by this section.
(b) A county commissioners court may establish a reinvestment zone including property located in the district and enter into a contract with the directors of the district on terms mutually acceptable to the two entities to allow the district to use tax increment financing as provided by Chapter 311, Tax Code.
(c) Property within the corporate limits of a municipality is not eligible for tax increment financing under this section.
(2) comply with Section 311.003, Tax Code, as that section applies to a municipality.
(e) For the purpose of tax increment financing under this section, the district board of directors is the board of directors of the reinvestment zone. Section 311.009, Tax Code, does not apply to this chapter.
(3) for any other purpose authorized by this chapter.
(b) Money derived from an assessment for one purpose may not be borrowed or otherwise used for a purpose other than the purpose for which the assessment is imposed, except as provided by Subsection (c).
(c) The board shall establish a procedure for the distribution or use of money derived from an assessment that exceeds the amount of money necessary to accomplish the purpose for which the assessment was collected.
Sec. 60.122. LIMITS ON ASSESSMENTS. (a) A district may impose an assessment only on real property or on an agricultural product produced on real property included in a petition for assessment.
(b) The owner of an improvement constructed in the district may waive the right to notice and an assessment hearing and may agree to the imposition of the assessment on the improvement or land and payment of the assessment at an agreed rate.
(c) The district may not impose an assessment on property owned by a utility. For purposes of this subsection, "utility" means a person that provides to the public gas, electricity, telephone, wastewater, or water service.
(d) A district assessment on real property runs with the land and successor landowners are bound to pay district assessments as they are imposed on the land within the district, providing that notice to purchasers was provided to a successor landowner under Section 60.063.
(4) the board holds a hearing on the advisability of the assessment under Section 60.130.
(6) according to any other reasonable assessment plan that imposes a fair share of the cost on property or agricultural products similarly benefited.
Sec. 60.125. ASSESSMENT TO FINANCE A PROJECT OR SERVICE. If the board determines the total cost of an assessment to finance a project or service, the board shall impose the assessment against each parcel of land or against the agricultural product against which an assessment may be imposed in the district. The board may impose an annual assessment for a service. The amount of an annual assessment may vary from year to year, but may not exceed the amount necessary to pay the costs and debts of a project to be financed by the assessment.
Sec. 60.126. ASSESSMENT ROLL. (a) The board shall prepare and maintain an assessment roll showing the assessment against each parcel of real property and against all applicable agricultural products and the board's basis for the assessment.
(b) The board shall allow the public to inspect the assessment roll.
(3) the personal liability of and charge against the owners of the property or the agricultural product when the assessment was made, even if the owners are not named in an assessment proceeding.
(b) The lien is effective from the date of the order imposing the assessment until the assessment and any related penalties, interest, collection expenses, or attorney's fees are paid.
(2) covering a delinquency or collection costs.
Sec. 60.129. NOTICE OF HEARING. (a) In addition to other notice required by law, the board shall provide notice of an assessment hearing in a newspaper with general circulation in the district. The publication must be made not later than the 14th day before the date of the hearing.
Sec. 60.130. CONDUCT OF HEARING. (a) A hearing on a proposed assessment may be adjourned from time to time.
(b) If a hearings examiner conducts the hearing, the examiner shall file with the board a report on the examiner's findings under Subsection (d).
(c) The board or hearings examiner shall hear and rule on all objections to a proposed assessment raised at the hearing by an owner of real property that would be subject to the assessment or on which agricultural products subject to the assessment are produced.
(5) method and time for payment of the assessment.
(D) charge an amount to cover a delinquency or collection expense.
(2) continue for the number of years required to retire the indebtedness or pay for the project or service for which the assessment is imposed.
Sec. 60.131. REHEARING. On petition of a property owner contesting an assessment of the owner's real property or agricultural products received not later than the 30th day after the date the assessment order is issued, the board may hold an additional hearing to consider the assessment order.
(3) describe how to contact the district for further information about the assessment.
Sec. 60.133. APPEAL OF INDIVIDUAL ASSESSMENT. (a) A real property owner or a person who owns an agricultural product against which an assessment is imposed may appeal the assessment to a district court in the county in which the real property assessed, or on which the agricultural product is produced, is located.
(b) The owner must file the notice of appeal with the court not later than the 30th day after the person receives a bill or other notice of the assessment.
(c) The court shall review the appeal by trial de novo.
Sec. 60.134. ASSESSMENT AFTER APPEAL. If the court holds that an assessment is invalid, the board may impose a new assessment in accordance with this subchapter.
(2) all district debts and obligations have been discharged.
Sec. 60.152. DISPOSITION OF PROPERTY OF DISSOLVED DISTRICT. Prior to dissolution, the board may sell its property. If the purchaser of any district property is not a governmental entity, purchase by the person renders the agricultural facility or other property ineligible to issue tax-exempt securities, to impose assessments, or to be eligible for tax-exempt status. | 2019-04-20T06:36:28Z | https://www.global-regulation.com/law/united-states/389842/agriculture-code---title-4---chapter-60.-texas-agricultural-development-districts.html |
A good day at the conference, the chance to eat lunch with a friend, and chat with others. Now time for dinner with a few more friends and hopefully an early night tonight. I have a 7am cab, so I've got to be up again as early as the last few days to head home for one day of chaos and then back on another airplane.
These are good tips, and enjoyables ones. I get the chance to network and bond with people, shake some hands, and buy a few drinks. I used to wonder how much value I get, but the chance to gain other perspectives, get inspired and be forced to think more is incredibly valuable in my work. Especially when it's a bunch of geeks that talk about things that are common and of interest to me.
A long trip, and I almost wish I could be heading home tonight, but it would mess up my evening and I'd be stressed about the flight, so I'll go to sleep and get up for my early flight home.
Up again at 6 when the iPhone went off with "The Way It Is" to start the day. Somehow I got lost in snooze because I heard about 30 sec of the song and then woke again to a different song, 15 minutes later.
I managed to stumble down and run, and feel a little better, but tired eyes. One more day of conference life and then I am ready to head home.
I flew yesterday afternoon to Orlando, arriving after 11, and getting to the hotel around midnight. It was an easy flight, with an upgrade to first class that made it go smoother with about 4 glasses of chardonnay.
I hit the sack right away after checking the conference schedule and groaning at the 8am first session. My site is sponsoring a track, which means that I need to be there to meet speakers and people. That means that trying to get in a run so that I'm not jammed up all day means a 6am wake up and run in time to get to breakfast at a reasonable hour.
I made it, but I was beat this morning. I staggered to the fitness center, and woke up after 5-6 minutes in a run, feeling better as I ran. Coffee, some breakfast,and I was ready for sessions. However that only carries you so far. I blogged and tried to pay attention to the sessions, and it mostly worked, but I was feeling a little rundown by the 4:00 session. I worked a touch, then drinks with friends and the speaker's reception that was followed by more drinks.
Great fun, and I enjoy sitting down and talking with friends and people that I'll work with. I built some bonds, did a little networking to meet a few new people, and enjoyed some time, but I was tired. As the evening wore down, I could feel my eyes getting tired and a check in the bathroom mirror showed them to be pretty red. Time to call it a night.
So back to the room, 45 minutes of work, and I'm done. Ready for bed.
I haven’t had to work on the Database Weekly newsletter in a month, and I knew my time was coming, but for some reason I didn’t realize it was this week. My calendar didn’t remind me, or if it did I ignored it. When I closed down work yesterday I thought it was strange that I didn’t see a newsletter scheduled and after volleyball this morning I thought I should check.
So I’m jamming this morning, trying to get a newsletter built and scheduled.
Kendall had volleyball this morning. It was her second game, at an early 9am, and down in Castle Rock. After date night last night, getting up at 7:30am wasn’t what we wanted, but we managed to get the little ones up along with Kendall’s friend and head down.
It’s amazing to see the girls progressing. We only have 3 girls from last season, but everyone seems a little more mature and skilled. Still a lot of standing around, but a little more movement, and definitely more talent in bumping the ball over the net. Kendall had some good bumps, and some good dives or attempts that didn’t’ work, but showed a lot of effort.
They won the last two games after losing the first one and played well overall. Tia got really excited as they closed in on both wins. I was excited, but managed not to get too verbal about it after learning some lessons with the boys.
A good morning, even though it was really early.
It does make me think we need a windmill, but it also makes me think that life will be miserable outside with wind in the forecast. I’d prefer it say 15F than 508F and windy.
Just saving a copy of this picture from a friend. Here I am up in the front of the room talking. With my hands.
Finally. After over a month of being too busy to get to the mountains, and lots of travel, I finally went today. Delaney went with me and we had a nice 1/2 day of skiing at Copper. It was cold, colder than I expected, along with wind and snow, and it felt like a Jan or Feb day, not a late March day.
Delaney was a little nervous at first, and I think he was scared after some of our last runs at Steamboat, so he and I worked our way to the North, easy side of the mountain, letting him set the pace and we had some good runs. Hopefully he enjoyed it and will want to go again.
Kendall went to watch a DVD today on the iMac and pulled the bean bag over to her, grabbed a blanket and curled up. Milky Way, the cat, came over to lay with her, once Junior was gone, and she called Tia over to take some pictures.
She also took a few herself.
I climbed up and started painting the backside. The railing is actually there on the house, just not in this picture.
The wind was howling a bit, and my eyes were getting tired as I tried to work my way down, completing the first primer coat.
It got chilly while I did that, so I bailed on starting the actual trim color. I'll work on that this week, go out there a day or two during the week and finish that up.
I've had three practices, but today felt like the start of the season. We scrimmaged the Stars today, which has a number of guys I like on the team. I headed over a touch late, arriving just in time for infield/outfield, and had to warm up before the game. We played like a real game, except no umpires, though we didn't keep score. I think it was a close one, both of us having good innings where we cleared the bases at least once.
My back was a little sore after all the up and down with painting and trying to get a target finished for Kendall, so I just played third, electing not to do any quick twists that might tighten it up. That was fine with me as I would have seen the 322 fence and tried to swing hard.
I missed a grounder in the 2nd or 3rd that was to my left. I managed to get over to it, but it skimmed the ground and I couldn't quite bend over that far on the run. I got a slow roller that was a mis-hit a few innings later and ran up, grabbed it, but pulled Sean off of first base to the inside. I warned him of that, and it was an OK throw, just to the side. At least I managed to make a good throw. In the last inning I also picked up a short grounder to the left and started a double play. A close one, but I think we got him and that was good.
Over all a good day, but each side wanted to get 4 pitchers in, so we ended probably playing 10 or 11 innings, moving a little slow and being out there for 3+ hours.
I posted some notes on the project over at the Sawdust and Splinters blog, but I finally added a back railing to the house. I got it up last week and today Kendall and I went out and primed the railing.
Well, she did the top rail and the fronts of 6 or 7 balusters before the wind chilled her and the effort of going back and forth got her tired. I’m hoping to get her back out there later and do the matching trim paint that will fit it into the house.
Tia feeling sick, no skiing, a lack of sleep, it's been a busy day for me trying to work and take care of people. Ran errands with Kendall and Kyle, getting them to Hobby Lobby and a little grocery shopping in between and just did a run to get a little "me" time before the day goes away.
I am so looking forward to the weekend and sleeping in a bit.
This has been a hard day. Busy as I’m trying to get things done and get ready to ski tomorrow. I travel in two weeks and so it’s a lot of stuff that I’m juggling. Add to that Tia is stressed about work and that adds to my stress. Kids are home as well and they’re bored.
Life is hard some days.
We had Kendall's parent teacher conference today and it went great. She's doing really well, she's enjoying school, and she's really blossomed this year. Her teacher (Delaney's old teacher) loves her and says she's using Kendall as an example for some of the writing work (proud Dad).
Great to see her doing well, hitting grade level on the standardized stuff, and impressing the teacher with her work ethic and attitude.
While we were in there, Kendall was back at the book fair, this time with her wallet and allowance in there. She spent $18 getting two more books, some school supplies that she wanted, and a couple posters for her room. Cool to see her spending money on that stuff and not more toys or stuffed animals. Here she is, getting change back and managing her money.
I’ve always admired Grant Hill, a guy that comes from money, made money, and could have retired a long time ago due to injury. He continues to come to play every night.
Daylight savings caught up with us today. I forgot to reset clocks yesterday and we woke up late. Actually I don’t know who woke up, but either Tia or Delaney got going late and Delaney was the one that came back to get Kendall and I to get up at 7:25. Delaney had already missed the bus and Tia was driving him. I got Kendall going, and we actually managed to get to the school just before the last bell rung. Everyone was inside from the school, but she likely was only a minute late getting to class.
I like having more daylight in the summer, but do we need to keep changing the time in the winter? That’s what it feels like to me and it seems unnecessary.
I’m not much of a bracket guy, and I don’t miss the time in the office working over brackets with people. However I do miss the eight eights tournament that my boss used to run.
Once upon a time I worked at a small company where the owner was a huge college basketball fan. This week, after Selection Sunday, was basically a time when a section of the office, including all the IT staff, was shut down and working on the tournament. My boss engineered one of the biggest private tournament pools I knew, calling our customers, friends, getting 300-400 people to jump into a $20 pool with the top three people taking home large prizes. We were sending out tons of brackets on Mon/Tue and then manually grading these over the next 3 weeks. My boss would even bring in a TV to watch on Thur/Fri the first two weeks and we were allowed to go watch if we had time.
However the highlight was a private, 8 person only contest. Another $20 each, and the 8 from the previous year had the right of first refusal to participate again. New people were invitation only. My second year there someone dropped out and I was invited. The rules were simple. We draw numbers out of a hat for a draft order, and we go around the room, each person “picking” a team in the tournament.
Eight people, each gets eight picks. You get one point per win, and the most points after 3 weeks wins the entire pot, $160.
Not as profitable as winning the brackets, which would be over $1000, but much more fun. Small, intimate, only 8 people that you can harass and joke with for 3 weeks.
I played for 3 years, and it was great. One of the things I remember the most. I tried to organize one a few years later at a new company, but couldn’t get interest. I’d like to do one remotely, but the draft online might be hard to pull off. I might try it at SSC as it was a lot of fun in the past.
It's a horrible tragedy in Japan with the earthquakes, and I hope that they are able to find and help survivors over there. Watching images yesterday and today, it's an awful situation for people to be in and it reminds me of the tremendous power of nature.
One thing I do think will live long after this is the nuclear power issue. There are problems at a plant over there as the cooling system is not keeping up. There's a real danger of meltdown, and this showcases one of the major issues with nuclear power. When there is an issue, or a potential for meltdown, humans can't easily get close to determine what's wrong. Exposure of the fuel is deadly. A person trying to run 5 ft inside the reactor to punch an emergency switch (if there were one), would likely be dead by the time they hit the switch.
That's scary. And I'm worried this type of disaster, even without a meltdown, will make people in the US more wary about expanding our nuclear power options. I'd like to see more nuclear plants, since I think it's a good fuel, but the hysteria, and all the news coverage plays on people's fear of radiation. The ignorance about what radiation is, how it works, and how it's transmitted means that more and more of the public is against nuclear power just because of that fear.
I can understand it, but I hope this doesn't set the US nuclear program back another 20 years.
Delaney has a friend coming over today, so he declined to go hiking with Tia and Kendall. They were going to Castlewood Canyon with the dogs to enjoy the 65F day here in CO. I declined as well, thinking I might do a few things around the house and run.
I also made Delaney come run with me, to get him some exercise and get him out of the house. I asked him if he wanted to go from the house or the mailbox and he said house. So we jogged up the driveway and road, and he almost made it, running out of gas near the last neighbor’s driveway. It’s quite a climb, and I know he struggled, but he kept going.
It's a beautiful day in Colorado. 60+F today, and I had a great run around the neighborhood at lunch. Tia knocked off work a little early and decided to go pick up Kendall on a horse. Kendall gets a kick out of that, so she got Gemini ready and started down the driveway to meet the bus.
I had the dogs here, who I had to lock in the house so they wouldn't chase her down and upset Gemini. Delaney comes about 15 minutes later, and I wasn't sure what to do. I had his bike in the back of the Prius, but getting the Prius out of the garage without dogs chasing down the yard looked tough. So I loaded up Deuce and Junior, and we headed out, with my hoping Oscar would stay home.
We got to the bus stop and met Delaney, trading his bike for his cello and letting him head home. We met Tia and Kendall at the gate, and the dogs jumped out to walk home with her while I drove home, chasing Delaney who'd passed us while we were chatting.
Life at the ranch is fun. How many other kids get picked up on horses from their bus stop?
I just re-read my keynote from last year at SQL Saturday #28 in Baton Rouge: The Long Road. It was my first keynote talk, a non-technical talk to a large group, and I enjoyed it. It went well, and was well received.
No slide deck for that one, just me walking around and talking, but I enjoyed it.
Our little puppy hanging out with me today.
The cat, Milky Way, is very interested in the puppy, but also wary. The puppy surprised her the other day and ended up with a scratch on his nose. Not bad, but enough that’s he careful.
However the puppy is interested, too. So while we were hanging out in the bathroom for a few minutes, Deuce and the cat were relaxing.
However Junior couldn’t leave well enough alone and walked over to see what the cat was doing. No scratches, but the cat let him know in no uncertain terms that jumping on her or moving too quickly isn’t well tolerated.
It’s nice to see the other animals getting used to Junior and playing with him a little.
I posted this over at the Modern Resume blog, if you’re interested.
The stress of last week, with travel to Seattle and 3 talks at the Rocky Mountain Tech Trifecta yesterday is bleeding off. Starting to feel a little more relaxed now.
The MVP Summit is fun, and it's a good use of some of my time to meet with people, see some technology, make contacts, and build up my Microsoft network for the future. However it's also a bunch of long days, poor sleep in the hotel, and too much alcohol. I never got tipsy, but having 2-3 drinks a day is a lot for me and it wears me out.
To top it off, I left early and started immediately stressing about my keynote for the Rocky Mountain Tech Trifecta. I had the main keynote, and expected 300-400 people there, plus Tia. She's never seen me speak, and so I was nervous about that. It's also a tough way to talk for me since I love feedback from the audience, but in this case it's not interactive. The audience is sitting there, while I talk for 40 minutes and not responding a bunch.
It was a good crowd, and I was on a real stage, standing backstage as they got started and introduced me. I snapped a picture as people were coming in from the stage as I set up my laptop and iPad.
I think between Wed and Friday I rewrote pieces of my keynote 10 times, trying to get a flow working and providing some motivation for people. As a result, I knew the topic well, but the wording and ordering were a pain to memorize. So I set up my teleprompter on the iPad and used that to keep me going. A small podium, a fixed microphone, and fitting my laptop for Powerpoint and my iPad for prompting was tight.
It went fairly smoothly, and I got to do something on the spur of the moment that is rare. It's not often you get on stage with a captive audience for something like a keynote and also have loved ones in the audience I've done three keynotes in my life and this was the first time this happened. So just before I used a short story from my life that included Tia, I stopped and took a moment to thank her publicly for all the support I've gotten. It was cool and the audience applauded for a moment.
I felt like a stumbled a few times, but overall I think the keynote went well. I got some nice complements all day long for it, and both my sessions later were busy and worked out well. It was a good day, but full of stress. I was very glad to get home last night and be able to unwind a bit.
The puppy was tired yesterday, but up at 5:30 today. I took him outside, and then walked around a little later around 6:30 to try and tire him out a bit. I did, and managed to tire myself out as well. Tia snapped this photo.
He woke up around 7:30 and we walked around outside with Kendall, fed horses, and then went for a short ride in the Porsche, which I had to jump start.
Now he's off selling Girl Scout cookies with Tia and Kendall. Hopefully he's a help and not a nuisance.
The puppy has really added a load to our life, keeping track of him and ensuring that he's going outside regularly for housebreaking. It's going well, with relatively few accidents, and he is letting us get some sleep at night, but it's still hard.
To top it off, it's a busy week for me and Tia. She's always busy and this week doesn't help. I have three presentations tomorrow, including a keynote I'm trying to finish editing for the 10th time and practice. I'm nervous about the delivery, since the last time I did this I had technology issues. I've been practicing a bit with the iPad, and we'll see if that works out for tomorrow. | 2019-04-21T23:01:49Z | http://blog.dkranch.net/2011/03/ |
Edinburgh’s Development Management Sub-Committee today voted to accept the advice of its own officials and refused a planning application to redevelop the old Royal High School as a luxury 147-bedroom hotel (Ref. 15/03989/FUL).
Developers Duddingston House Properties LLD and the Urbanist Group are now expected to appeal the decision.
The application has divided opinion in Edinburgh. Some 1,618 individuals commented on the proposals, of whom 278 were in support and 1,338 were against.
Broadly speaking, the arguments split between those who applaud the hotel scheme’s bold architectural additions and confident assertions of economic gain (£31.5 million per year for Edinburgh), and those who see the new accommodation platforms as desecrating an incomparable architectural treasure of international importance. Officials worded their assessment in ‘very clear and very strong’ terms of potential benefits not outweighing potential adverse impacts on the listed structures and their setting.
Scrutiny has also focused on the extent to which the building should and could remain publicly accessible. Officials pointed out that such future access is outwith their control.
These lines of debate were repeated throughout today’s seven-hour proceedings, from which we extract a few choice morsels below. You can view the entire meeting on the CEC webcast here.
Officials first ran through their Report to councillors. (Unfortunately, CEC's Planning Portal is buckling under the weight of documentation in this case, and hyperlinks to this application are either unreliable or useless at the time of writing. You can find the Report summarised in Breaking news, 15.12.15.) Next, they illustrated the Report's main points in a lengthy presentation.
Cllr Ritchie asked for clarification of the supposed £31.5 million benefit to Edinburgh (pages 21, 40 and 98 of the report). An official replied that a standard industry formula had been employed, and was a ‘robust’ estimate. No figures were available for the potential loss of tourism that might result from Edinburgh losing its world heritage status.
Sarah Boyack MSP (Lab) spoke of overdevelopment and lack of respect for the history of the building and its landscape setting. It would damage both and the tourism industry. The proposal deviated substantially from national and CEC’s own conservation policies, she said, and would harm the city’s outstanding universal value. There were many alternative and preferable uses for the building. She would favour CEC and the Scottish Government collaborating in future over other uses.
Alison Johnstone MSP (Grn) bore witness to the strength of opinion in Edinburgh and further afield against this proposal. She described it as ‘an incredibly special site which we should not tamper with in this way’. The proposal ‘obliterated’ rather than enhanced the area. Consent for the scheme would be judged in future as an act of ‘architectural and cultural vandalism’. A potential hotel charge of £25,000 per night did not represent accessibility.
Cllr Eric Milligan (Lab) highlighted a long-standing lack of realistic alternative options for the building.
NTBCC commended the Planning Department on their report. Ian Mowat broadly agreed with its findings. NTBCC was unanimously opposed to the application (pages 108, 109). They supported new uses for the building, but felt that this scheme constituted overdevelopment. Richard Price said NTBCC’s early comments to the developer at the Pre-Application Notification stage (concerning unrespectful and detrimental development) had been ignored in the applicant’s PAC report. Instead the developer had relied on simplistic questionnaires which gave a ‘disingenuous and misleading’ impression. The developer’s alleged difficulty in engaging the NTBCC was inexplicable and not matched by any other organisation. Revised proposals were also unanimously objected to. NTBCC did not accept that there were no alternative proposals (Royal High School Preservation Trust/St Mary’s Music School). They strongly endorsed planners’ recommendation to reject the proposal.
Edinburgh World Heritage’s director Adam Wilkinson said officials were right to focus on planning not economic issues. The design would create a ‘blight where there is now beauty’. A hotel of that scale and quality was inappropriate here, but could be situated elsewhere in the city. He spoke of damage to the topography and to views. EWH’s advice was ignored. He spoke of despoilation and confusion. He stressed the measurable economic value (£1.2 billion–£1.6 billion) of preserving Edinburgh’s built heritage, and described as ‘patently absurd’ the developers’ claims for their design’s aesthetic benefits. Decision to reject CEC, Historic Environment Scotland and EWH advice would send out a very negative message.
Marion Williams, chair of the CA, said she had been struck by the widespread level of concern. The old Royal High School building faced permanent and irreversible damage. Operation of the building and the building itself would change many many times during the 125-year lease. This was a high-risk venture in a volatile industry where businesses frequently fail and go into administration. She questioned the developers’ business track record and an untested business plan by the Rosewood Hotel group. This would be an exclusive hotel, not a public building serving the whole city in its historical, civic, egalitarian and educative contexts. It entailed too much risk and put too much at stake. Cllr McVey (SNP) criticised what he considered Marion Williams’s inappropriate attack on successful businessmen. She replied that the business plan was a risky financial compromise. She had consulted hotel owners who advised that the site is too sensitive to support all the facilities for a 5 or 5+ star hotel. She had professional respect for Bruce Hare (Duddingston House Properties LLD) and David Orr (Urbanist Group), and found them congenial in person.
Dr Elizabeth Graham said Calton Hill and the architecture on it represent a narrative of Scottish identity. The hotel plan ignored this narrative, detracted from it and screamed for attention on itself. ‘The narrative changes over time, but we mustn’t destroy what is good about our inheritance.’ She questioned whether a commercial use was appropriate.
RRCTMA's Carol Nimmo vigorously opposed the plan, saying the proposed development was too large. Councillors should put people, heritage and culture above profit. Developers’ consultations ignored local opinion, and comprised heavily slanted questions. She spoke of a cavalier attitude to consultation and unrealistic images being used to sway opinion. Appendices at the back of the Report revealed the true nature of what she likened to ‘uninspiring lumps’ and ‘badly stacked shipping containers’. A public and cultural alternative existed to this disastrous scheme, but the developers had purposely not mentioned this in their questionnaires. Her submission drew applause from the public gallery.
Dewar said he had a good understanding of the visitor economy. Edinburgh’s tourism growth would focus increasingly on India and China and a top-quality hotel was necessary for high-net-worth visitors. Rosewood was right for this market, and would also boost business tourism. He acknowledged having no architectural expertise, but saw the old Royal High School as a wasted asset in an area of the city which some people actively avoided. This was an an acceptable compromise on adapting the building. A sustainable commercial operation would remove a drain on public resources and help preserve the building.
Birse – of the Edinburgh Institute of Leadership at Edinburgh Napier University – represented the Edinburgh Business Forum. He said the proposal would boost Edinburgh's international reputation/status. There is a shortage of 5-star hotel space in the city, and consequent slippage as a conference destination. Economic benefits would include £13 million in tax revenue. It would provide careers for young people: 260 full-time jobs. Rosewood are excellent employers. Sustainable economic use: CEC’s 2008 commitment has been followed by difficult and expensive maintenance of the Hamilton building. CEC considers a hotel to be best option, and has a contract with Duddingston House Properties. Bruce Hare later clarified that this could run until 2022 'to purify the missives’.
Cllr Bagshaw (Grn) asked about high-net-worth visitors, questioned long-term sustainability and how long-haul travel matched CEC’s green aspirations. Dewar replied that one bottle of £10,000 whisky was sold at the airport every week. Top-end products and experiences could be sold to a unique kind of consumer. The airline industry was committed to limiting its carbon footprint. He saw no reason to doubt economic sustainability of airline based travel. Luxury hotels had been successful since the 1930s, said Birse. Refusing consent would put off future investors.
Cllr Balfour (Con) questioned whether tourists came to Edinburgh solely because of its world heritage status. Dewar said it was not the only attraction.
Bruce Hare reviewed the planning history so far, and the stunning location of the old Royal High School. He said some pre-application consultees had approached the issues with closed minds, and said feedback from the public had been very helpful. CEC’s Urban Design and Review Panel had welcomed revised plans for the hotel. EWH and NTBCC had either not attended all the meetings, or declined invitations to discuss the plans. He summarised the favourable responses to a questionnaire. A project of national significance is ready to begin. Cllr Bagshaw wondered about the disparity between questionnaires and written objections. Hare said survey work was exemplary and the results were clear-cut. Happy people don’t write letters of support. Cllrs Bagshaw and Perry asked whether, if there were more time, the developers could come up with a scheme that officials could recommend? Hare said that further improvement was possible, but complete consensus with Planning might not be. Cllr Mowat (Con) wondered why Hare and colleagues had been surprised by officials’ long-standing and well-known doubts about an excessive quantum of development. Hare said he thought such doubts about massing had been adequately addressed.
Radhar Arora, president, described his company’s commercial profile and prime locations worldwide. This hotel would generate substantial economic benefit across Edinburgh and Scotland, and remove a barrier to growth. If successful in this application, Rosewood would legally commit to running the hotel here for 30 years. ‘Hotel will be a platform for all that’s best in Scotland’ and would welcome locals onto the premises, here as at other Rosewood hotels. Rosewood recognises, respects and upholds the worth of historic and iconic buildings. Responding to Cllr Lewis’s enquiry about delivering sufficient level of opulence, Arora said Rosewood was passionate and successful in sensitively bringing heritage buildings into the 21st century. He confimed that 147 bedrooms was economically viable.
Gareth Hoskins, principal, mentioned the firm’s experience in dealing with sensitive sites and the consultation process. They had responded to seven new guidelines after the first set of plans, and fundamentally changed their designs to step away from the Hamilton Building. Consultation process had been enjoyable and effective. Sustainable use, materials, and appearance. Scheme would improve the site according to formal criteria. This was considered, confident and reinvgorating proposal. Cllr Perry queried Hoskins’s account of ICOMOS critical responses to views. In answer to Cllr Dixon (SNP), Hoskins said wider setting of the development and views to it had always been key. Great attention to quality, detail and craftsmanship of materials. Cllr Keil (Lab) asked whether new structures would deserve A-listing in the future to match the buildings they replaced. Hoskins was confident about their merits and they would be built to last.
Gary Mappin welcomed fair CEC Report and recognition of the scheme’s merits. Significant benefits outweigh disadvantages and so should permit consent. Urged councillors to be forward-looking and progressive.
Karen Doran said she had received no letters from constituents in favour of the proposal. She was in no doubt that members of the public were opposed to it. She asked those on the sub-committee to reject it. If councillors voted to consent the scheme, it would have a detrimental effect on the reputation of the Council.
Planning Convener Cllr Perry acknowledged current plans were an improvement on previous ones. He advised councillors to focus on comparing: (1) the effect on the setting of the building; and (2) the – in his view – equally valid economic benefits.
Cllr Howat (SNP) emphasised local and national economic benefits. This is a special place and special opportunity. Widening a service entry would be of neglible significance. Connecting corridors are necessary and not a good reason to reject. A smaller building would detract from the Hamilton building. ‘Inca terraces’ are neither complementary nor contradictory – it’s a matter of taste. ‘I don’t want to live in a museum space that restricts development’. Loss of views is not as bad as some people say. This proposal is an improvement on the listed buildings it would replace. Doing nothing is not an option. Civic duty and national pride demand progressing with the plan.
Cllr Balfour (Con) suggested an holistic approach, and thought rejection would send a negative message to developers worldwide. We are not a museum but must develop and grow jobs and the economy.
Cllr Mowat (Con) said Hamiton building is hugely important. Monumental quality. Scale of the development is too great. Problems with quantum of development well-known since 2008. Economic benefits have been exaggerated and do not outweigh damage to outstanding universal value.
Cllr Milligan (Lab) said controversy is inevitable. We must embrace change. Previous potential users of the building have all rejected it. Chance to make a difference.
Cllr Ritchie (SNP) said Report rightly values architecture over interests of the super-rich. Nonsense to suggest it would be publicly accessible. Edinburgh will not forgive proposed desecration.
Cllr Blacklock (Lab) said proposal was an opportunity to protect and revive.
Cllr McVey (SNP) said his was a balanced decision. Impact of setting’s urbanisation and scale, setting are too large. He agreed with officers’ reasons 2,4, 9 and 10.
Cllr Keil (Lab) said we should not favour short-term gain over long-term loss. Development too large.
Cllr Robson (Lab) was unpersuaded by Cllr Milligan. He likes the design but considers it too large.
Cllr Bagshaw (Grn) thinks the design is crass, insensitive and environmental vandalism.
Cllr Child (Lab) thought proposed design was great but in wrong place. Would spoil views to the building. Granting would undermine the city’s planning system.
Cllr Howat (SNP) wondered whether Cllr Ritchie had already made up his mind about his decision before the meeting, and so opened CEC to legal challenge. Cllr Perry said that was a matter for Standards and Cllr Ritchie.
Cllr McVey moved to accept only Planning officers’ points 2, 4, 9 and 10, and was seconded by Cllr Blacklock (Lab). This was defeated by seven votes to one.
Cllr Howat moved to reject all the Planning officers’ arguments and grant permission. This was defeated by nine votes to six.
Application was refused. Listed building consent was refused immediately afterwards.
Nobody really knows. A Council spokesperson told us, ‘There isn’t a formal process with regards to what happens next to the Old Royal High. The music school application would proceed in parallel to any further consideration of the hotel application through call-in or appeal. We cannot really speculate as to how the two timescales might interact as there are many unknowns. If a public inquiry or hearing is arranged for the hotel, it would require several months' notice following the appeal or call-in decision’.
The final vote was 8:7. Cllr Perry's miscount was corrected by Cllr Balfour.
.@theSpurtle cited as key info source for local people on #oldroyalhigh proposals.
Fiona Allen This is potentially very good news. Provided the appeal doesn't work. HOWEVER, just in case, I do not believe any hotel will offer 260 full-time jobs; if there are that many, they will mostly be seasonal/part-time and probably minimum wage.
Broughton Spurtle We know nothing at all about it. But Rosewood president stressed company's excellent training, respectable rate of pay, and career prospects from entry level to the top. (He started as a waiter.) Check out the webcast and let us know what you think!
Nicole Roberts Dominic Berry Isn't the music school 'plan' merely a pipe-dream though? Someone just came up with that idea with no backing or plans of how it could work. At least the hotel had backers and could get off the ground.
Nicole Roberts Fiona Allen Did you want them to specify every single job they could possibly have when, they themselves, won't really know for sure at the moment. I'm pretty willing to a hotel would hire a LOT more people than a music school.
Fiona Allen Nicole - not EVERY job, no, just a sensible indication And, yes.
Philomena Montgomery Davies The music school plan will contravene council policy on some of the same points as the hotel, crucially the wanton destruction of the Victorian gymnasium. The council decreed that this building must be preserved but the school plan cannot happen without its demolition. Yet somehow the city's heritage guardians like the Cockburn Association and Edinburgh World Heritage seem all for it! The fact that the frontman for the private music school is WG Muir, the man currently destroying Craighouse estate, tells you all you need to know.
Broughton Spurtle Fiona Allen Forgot to mention that Rosewood president yesterday said that 'his' hotels had a staff to customer ratio of 2:1. So, with 147 bedrooms at full occupancy, would expect at least 294 staff.
Dominic Berry Nicole Roberts I'm not sure. There was this article in the EEN in June, but I think the more detailed plans were produced more recently.
Alison Campbell Watched the live webcast online - some impassioned speakers.
Dominic Berry Thanks for this very good account, Spurtle. I couldn't bear to watch the webcast: it was too depressing. But a fantastic outcome.
‘This was a passionate debate and everyone involved wants what’s best for Edinburgh, but I believe the right decision was made. I’ve no objection to a new hotel in the city, but this is simply not the right place for it.
‘Now the hotel proposal has been refused, it’d be good to see a swift decision taken on a more suitable use for this iconic building. Everyone in Edinburgh is fed up with the building lying dormant - we can’t wait another 50 years for a decision to be made.
@theSpurtle Brill decision. But now of course there will be an appeal.
Phew RT @theSpurtle: Old Royal High School – hotel application refused.
@CityCycling @theSpurtle Plenty of positive arguments for a Rosewood luxury hotel in Edinburgh - just on a different site.
@theSpurtle Thanks for the excellent reporton the Old High School. Do you know why the links to the papers don't work?
@theSpurtle thanks for breaking it down - v interesting and helpful!
@theSpurtle I see Gareth Hoskins thinks his plans are sensitive!!
Dominic Berry This website is going to need updating now.
The Edinburgh public will remain in the dark about my future until the details of my potential lease to DHP are published.
. Philomena Montgomery Davies The hotel threat has not gone away. I read this morning that they have another seven years to get planning permission for the hotel. Remember that these people are only doing what the council hired them to do. They were chosen by the council to deliver plans for a luxury hotel at the school so the council is in effect their client. They'll be back and they were only defeated by a single vote this time. Next time we might not be so lucky.
Reply to Philomena Montgomery Davies: Final vote against was 9 votes to 6.
Huge thanks to @theSpurtle for digging the deepest, covering the debate in such depth and for great turns of phrase.
@theSpurtle Gutted. That is one of my favourite architectural spots on the planet, for me the proposed build added to that. Hey ho.
City of Edinburgh Council Planning Convener Cllr Ian Perry said in a press release: ‘Our job is to make sure that any development in Edinburgh strikes a balance between protecting the city’s heritage and developing its economy.
‘Committee members have today agreed with planning officers’ recommendations that this application fails to do this, and have therefore refused to grant it. | 2019-04-22T22:41:37Z | http://www.broughtonspurtle.org.uk/news/no-hotel-old-royal-high |
This is my official cop-in-uniform photo. If you're wondering why I'm sporting the 90s hair style, it's because THIS WAS IN THE 90s!
Yes, I really was a cop: I was a cop for years. And if this photo isn't proof enough for you, I have the stories—man, do I have the stories— to back it up.
I have written a lot about being a cop. I wrote True Blue, which is a writers guide, and a lot of articles, which I may add to the site in the future.
In the meantime, check out three featuresan article: Lynda's Top 20 Pet Peeves when Reading Fictional Cops; a "memoir:" What Really Happens; and a short Q&A from my online cop class below.
Almost all the cops I know grouse about the way they are portrayed in books, short stories, and on television and the big screen. I've thought about this quite a bit, and after having been asked about it repeatedly during speaking engagements and on-line classes, I came up with a list of my top 20 pet peeves about the cop inaccuracies I encounter time and again in the books I read. (I've given up on Hollywood.) Here they are, for your reading pleasure.
When I read a book like this, it completely distances me from the characters. I personally KNOW they aren't realistic, and I find I cannot suspend my disbelief enough to appreciate the story. Like I've said in previous lectures, cops are not heroic because they're fearless superheroes, but because they are regular fear-filled people who act DESPITE the fear. Don't cheat your readers by eliminating this very important layer in your characterization of cops.
Most cops have a bit of the street in them. It's what makes them good cops. If they don't bring this street wisdom with them to the job, they learn it in the first few years on patrol. Making cop characters almost saintly in their goodness eliminates this realism that is SO interesting to read about. Remember, good characters have flaws. Don't deprive your cop characters from this just because they're LAW MEN.
ALL cops start in patrol, and these days, most departments require their cops to have a minimum of two years of college, if not a college degree. Cops aren't issued a brain when they make detective or sergeant, and most cops I know who work a beat resent their fictional portrayal as bottom feeders. If you want to make a CHARACTER bumbling, ignorant, and stupid, go ahead, but base it on the person he is. Don't make him so just because he's assigned to patrol. That's insulting, not to mention untrue, and it'll make me (and most of my cop or cop's wife friends) put down your book quicker than anything.
Gosh, can we stereotype any more??? Don't even go there. Weakness is a human trait, not a gender trait. Most of the female cops out there PRIDE themselves on doing an excellent job, and they do. Not to prove a point or act like a man. The point is you don't have to BE a man to work in law enforcement. And female cops aren't cut breaks or given concessions. They go out and do the same job the men do, maybe differently in *some* cases (again, based on the individual, not the gender), but just as efficiently.
Don't automatically make the male cops rescue the female cops. Don't make the female cops the ones who break down on scenes or can't handle blood—remember, WE HAVE BABIES. Also, believe me, the male cops are much bigger hos than the females. Many male cops pride themselves on "spreading themselves around," while most female cops avoid it. There is usually one or two female cops known as the easy ones, but they're not respected much in a work capacity by either the men or the women. Also, you don't have to be cold, rigid, and mannish to be a good cop. In fact, just the fact of BEING a woman can help you in many situations. Women make damn good cops and deserve the respect of being portrayed in fiction as rich characters first, women second, and cops last.
Again, this doesn't happen with good, smart cops. I'm assuming you all want to write good, smart cops?
Police work is TEAMWORK. A cop never does all the work on his own. He just doesn't. Neither does a detective, or an undercover narc—none of them. I see so many books with the cop character out making witness/suspect contacts alone, running surveillance alone, basically working the whole case by himself. It doesn't happen, and when cops read this in fiction, they roll their eyes.
Another couple of popular but completely unrealistic clich�s in fiction, namely romance fiction. Municipal cops are *never* assigned as long term body guards. And, although longer-term undercover assignments do occur on occasion, it is far more rare than is portrayed in fiction. I mean if you want to write about super-secret agent men and deep- deep-cover cops, I guess they are popular in some circles. But don't fool yourself that they have much basis in reality.
For the most part, cops are the biggest bunch of wisecracking smartasses I've ever been around, and the humor is some of the most politically incorrect I've ever encountered. It's AWESOME! Sure, when a situation calls for it, even the biggest jokester is all business— but only until the situation ends. Most cops don't take themselves too seriously, and practical jokes abound. Don't lose that chance to chararacterize in a richer way.
Yes, it happens, and quite frequently. But trust me, these cops do NOT make interesting friends (or characters). They're DULL. They're one-dimensional. And, if you're writing one as the hero (or heroine) of a romance, trust me when I tell you a person would have to be pretty darn desperate to fall in love with one of these cardboard cutouts. HAR! Give your characters a life outside police work. Of course, make him keep his basic cop characteristics whether on the job or off—observant, wary, suspicious, keeps his distant, all the stuff we've talked about—but give him a LIFE.
Patrol cops respond on and do the initial investigation of major crimes all the time, but that's just the beginning of the case. It has to be built, and that isn't a patrol cop's job. If he's doing that job, who's going to be doing his job...? EVERY link in the chain is important.
The upper echelon of the police department is ADMINISTRATIVE. For the most part, they don't come out on crime scenes, and when they DO come out, it is usually for ego reasons and they almost always end up screwing everything up. Unless you're writing about a small town in which the chief is one of five total cops, he's not going to come out on crime scenes ever. It Just Doesn't Happen.
This happens in romance a lot, and I've discussed it in some of the answers I've posted, so I won't belabor it. Just know that a good cop won't compromise a case, ESPECIALLY not for a date/romance/love. Once you blow your credibility with the department, the DA's office, the judges, it's gone. Good cops just don't take these risks. There are lots of other fish in the sea besides (1) suspects, (2) witnesses, and (3) victims.
If you are writing a book about a CRIME, be sure to make the crime and the solving thereof realistic and legally sound. Mind you, some NYT Bestselling Authors have preposterous solutions to their crimes, and they're laughing all the way to the bank. It's up to you, but if you want cops to read and respect your work, get it right.
This goes back to #8 and #11. Make sure your cop plot is one that would actually happen in real life. All it takes is a little research.
The average cop doesn't ever become involved in a shooting—not in his entire 20-30 year career. Having a cop character in two or three or ten shootings in the course of the book is unrealistic. Also annoying. Cops generally don't get shot a bunch of times, nor do they get taken hostage much. Nor do they get in weekly or daily car chases, bomb situations, nor do they take on the mob or large drug syndicates on a regular basis.
The reason I hate this is because it gives the general public the misconception that once the cops arrive on a scene, everything runs like clockwork. Look at the backlash in the papers on some of the major scenes we've had in this country lately. Some citizens were outraged that the cops didn't "control things." Well, gosh, last I heard, cops are still human, and disasters happen. These outraged citizens don't understand rule one about police operations, yet they had the audacity to Monday Morning Quarterback the officers who responded to the scenes. Bottom line is, major scenes ARE chaotic. Inherently chaotic, at least until things are under control, and often that takes a long time. They aren't pretty. They aren't military drills. They aren't Jackie Chan movies. When the sh** hits the fan in your book, make it realistically hit the fan. Show the chaos.
This is basic, basic stuff. You don't have to learn everything there is to know about criminal procedure, but you darn well better learn the criminal procedure that pertains to YOUR story inside and out. Doing otherwise will weaken your story and cheat your reader.
I continually urge writers to contact the cops in the jurisdiction they are writing about. Although the basic cop stuff I provide in my book and my lectures is pretty universal, each department is its own culture. If you're writing about a specific department, you better be sure you're getting it right.
ARGH! This bothers every cop I know. The ONLY time you read someone his Miranda Rights is (1) when he's in custody AND—not or—AND (2) you are preparing to interview him about the crime. Period. Cops don't Mirandize as they're taking someone into custody. That's Hollywood's little bit of fantasy.
1. Even if you are only going into Winchell's to buy coffee or a muffin, no one will believe you. Just get the doughnut.
2. White powdered doughnuts and navy blue starched uniforms don't mix.
3. Immediately after buying hot coffee you will get a call that will tie you up until the coffee has transformed into cold sludge. Then you will spill it in your patrol car.
4. Related to number three above, when sitting in a restaurant for your code seven, the big call in your district will come just as soon as your food arrives at the table.
5. Onions and garlic can haunt you and those around you.
6. Green Jolly Rancher candies result in green tongues and teeth, which, according to one of my old sergeants, are not professional.
b. You can choose to eat in your car for privacy and risk Uniform Disaster. Which brings me to the cream puff incident.
We used to have a yummy Italian bakery in our city that was known for its amazing cream puffs. One day, I decided to try one. I'm not generally a cream puff fan, but what the heck? I bought one, then hunkered down in the parking lot and ate it, savoring every fat-free (not) bite. As I popped the final morsel into my mouth, I reflected, with a twinge of sadness, that there hadn't been much CREAM in the puff. Eh, well. I wrote it off to bad luck.
Moments thereafter, I was dispatched to a call. When I arrived on scene, the male reporting party started telling me his story, but his eyes kept wandering to my chest. Pervert, I thought, my righteous female indignation flaring. This yutz is staring at my RACK while I stand here in front of him ARMED. Definitely not a brain surgeon! But then it struck me,I was wearing a Kevlar vest, which left nothing remotely rack-esque to draw a man's admiration. Curious, I glanced down, and to my horror, I found about half a cup of cream puff filling meandering down my starched blue uniform shirt like slow-moving white lava. It looked, for all intents and purposes, like a very large baby had gacked down my front. Mortifying.
I finished up the call as quickly as possible, then set about trying in vain to clean my uniform. That slime got so imbedded in my gunbelt, I never got it all out. In fact, as I turned in the ol' gunbelt for the last time, I glanced wistfully at the cream puff remnants that had endured for years.
I teach a month-long class on...well, police stuff, which consists of about nine lectures and reams of Q&A information. Over time, I will share what is essentially the best of those Q&A sessions here on the website! If you have any other questions, feel free to drop me an email. While I won't be able to answer all the questions directly (sorry, but I gotta write those books), you may find your question answered here on my site in the future.
Lynda, you stated that cops are suspicious of everyone and that everyone lies to cops. So here's my scenarioin my work-in-progress, one of the villains is my hero's mother. They haven't seen each other for 17 years. What are some of the things he will detect to suggest that she is lying? He's going to struggle against their past conflicts influencing his judgment. There are some obvious ones I can think ofthe nervous twitch, fidgeting, avoiding eye contact. But what are some subtle things that only an experienced officer would notice? Is it just instinct and experience on the part of the officer? That gut feeling? And as a writer, is it good enough to simply state that the hero had a "feeling" that a character wasn't exactly telling the truth?
My next question may come under the heading of pet peeves or things that don't happen...so feel free to postpone the answers until lecture 7.
Regarding the blue wall of silence... My hero is an officer in LA that returns to his small Mississippi hometown. While there, the sheriff dies and he is appointed to fill in the position until the election. Would you say that blue wall is just as strong against an "outsider" on the force or would a cop be accepted just because he is a cop? I realize I can make the situation any way I want but I'm looking for general attitudes towards "outsiders" within the department.
Ok, that addressed part one of the question. On to part two: "Is it just instinct and experience on the part of the officer? That gut feeling? And as a writer, is it good enough to simply state that the hero had a "feeling" that a character wasn't exactly telling the truth?"
Cops rely on gut feeling a LOT, however just as a motivator to dig deeper and investigate further. What I mean is, "I just had a gut feeling," would never stand up in court, even if it panned out. As a writer, of course, it would be perfectly fine to write that your cop character had a feeling something wasn't right. That's how it happens. I had an assault case once where the victim, a man, told me he and his brother-in-law had argued about money and his brother-in-law ended up assaulting him. Victim's wife backed him up. All the signs were there they were giving me the straight scoop, but I just DIDN'T believe it. My inner cop alarm bells were going off. And, it ended up I was right, but it took four more hours of intense investigation and double-teaming the wife to finally get to the truth.
Another thing that indicates lying is when the story stays consistently the same each and every time. Supposedly in real life, little details are remembered or forgotten, so the story can vary a little bit. But a rehearsed lie will stay the same. I know these "tips" sound backward. Lynda, have I been reading the wrong books?
These are very good points, and you have not been reading the wrong books. One thing we writers have to take into consideration, however, are cultural differences. In many Latin cultures, direct eye contact with those in authority is considered disrespectful, for example. Cops learn (or should learn) about all these nuances to make their jobs easier. Another one—if we ever had to go into a traditional Asian household, we were taught to address the eldest male only, even if the questions pertained to another family member. It many traditional Asian cultures, apparently, to do otherwise is a sign of extreme disrespect. As a cop, you don't want to piss off your witnesses or victims, because it will harm your case.
These are the kinds of interesting little details to ferret out and use in your WIPs to make them richer and more real.
Very, very true. Another misconception is that liars will be very adamant. Initially, yes, they're full of bluster. But the wrongly accused are much more likely to continue to be adamant throughout an interrogation. I have tons of info about this in the Interview/Interrogation chapter of True Blue.
If an outsider *cop* comes in at the command staff level, there will be resentment from the officers inside who believe in working up through the ranks from the outside. However, if he's a good, decent cop who works hard, odds are he'll eventually be accepted. Or at least, the possibility exists.
The Sheriff is an elected, political position. Some have prior law enforcement experience, some don't. The Sheriff's (and his deputies') jurisdiction is a COUNTY (or whatever a county is called in your neck of the woods). The primary duty of the Sheriff's Office is to provide and man county jail facilities. In counties which include unincorporated areas, road deputies would also provide police services.
The Police Chief is an appointed position. Usually all have extensive law enforcement experience. The Chief's (and his officers') jurisdiction is an incorporated municipality within county boundaries. The primary duty of the PD is to provide police services within the city.
So, for example, I worked for the municipality of Wheat Ridge within the county of Jefferson. Our department had complete criminal jurisdiction within the city. If a crime happened, it was ours. The Jeffco deputies could stop cars and perform other traffic related enforcement within Wheat Ridge, but if anything *criminal,* above and beyond traffic occurred during one of those stops, Jeffco had to call us. Does that make sense? Criminal matters were not within their jurisdiction INSIDE our city limits. On the other hand, I reside in unincorporated Jefferson County. If my house was burglarized (God forbid), the Jeffco road deputies would respond to take the report, and it would be investigated by Jeffco criminal detectives. Because we're unincorporated. Does that clear things up?
Now, in Denver, for example, the city and county boundaries are one in the same. Hence, DPD handles everything criminal, and DSO is strictly a county jail proposition.
To take this further, Colorado State Patrol is our state police agency. Their jurisdiction is restricted to traffic ONLY, and only on state highways. We called them "Triple-A with a badge." Awww, we were only kidding. All cops pick on other cops—it's part of the subculture. However, some state police agencies have complete major crime jurisdiction in the state. The local PD officers are what we call "Thumpers." Go to a fight, thump people, leave and go to the next call. They don't investigate anything. If you are in doubt of the state police's jurisdiction in your state, call and find out how they operate for sure.
"Anyone who wants some insight into the work life of a policeman/woman—or who wants to write police procedurals (that includes about at least a million people, it seems) will enjoy Cooper's analysis of the daily grind for those on the front lines between us and the bad guys. It's a fun and interesting book and will prepare readers to watch and critique NYPD Blue and other favorite television shows and novels."
"This specialty book by former suburban Denver police officer, Cooper, is a treasure."
"I started reading this book thinking it would be little different than any of the other police procedurals I own (and I own A LOT). I was pleasantly surprised. This was written in layman's terms, from a street cop's point of view...this is as accurate as it can possibly be. If you ever plan on having a street cop for a character, whether it be the hero, heroine, whatever, you'll want this book to get it right." FIVE STARS.
Phyllis Williams, former police reporter from Florida: "Reading True Blue is like a ride-a-long in the backseat of a cop car. It's a must have for anyone writing about police!"
Virginia Kantra, Golden Heart winner and multiple RITA-finalist: "Lynda Cooper's step-by-step explanations of police procedure and her lively writing style make this one of the most accessible writers' guides to cops I've read."
Carole Bellacera, award-winning author, and screenwriter from Virginia: "A must read for writers who want to produce realistic fiction about police officers and their procedures. Eye-opening and immensely readable, written with wit and authority by a talented author. A gem of a book!"
G. Miki Hayden, the author of By Reason of Insanity and How to Write the Mystery, from New York: "As a mystery writer who often includes cop characters, I can see this will be a terrific resource for me. All the details of the everyday life of the police officer are included here, so there's no need to guess or make stupid mistakes in describing police action. In fact, just looking the book over has given me several ideas for stories."
Debby Mayne/Deborah Tisdale, romance and mystery author from Florida: "True Blue is the best and most thorough police procedural book for writers I've ever seen. Not only does it have factual information, it's entertaining and filled with the lively personality of the author. "
L.M. Heet, freelance writer/author from St. Louis, Missouri: "True Blue is a must-have for fiction writers! Rather than the monotonous, dry, typical non-fiction book, True Blue is not only informative, it's also interesting and fun to read. The true life cop anecdotes are particularly entertaining, and give fiction writers a true glimpse into the world behind the badgewhich is vital to making your own writing true-to-life!"
Cynthia Sterling, award-winning romance author from Colorado: "Writers and readers alike will enjoy Lynda Sue Cooper's True Blue. Her insider's view of cops—what they do and what makes them tick—will help writers give their work that all-important ring of authenticity, while mystery and suspense fans will appreciate the chance to look behind the scenes at the fascinating world of police work. Told in an engaging, often humorous fashion, True Blue reads like a fast-paced novel, making it one of the most enjoyable research books on my shelf."
Pam McCutcheon, author of Writing the Fiction Synopsis: "True Blue is chock-full of intricate details about the day-to-day life of a patrolman, the real scoop on police department procedures, and intriguing anecdotes guaranteed to generate a myriad of story ideas. Lynda Sue Cooper has done an excellent job of taking us into the complex mind of a police officer and showing us what lurks in the corners. If you've ever wondered if your police characters are true to life-or what it's really like wearing the blue uniform-don't miss this book!"
Kris Neri, award winning mystery author: "Wow! This book is outstanding. It's full of real insider information, but written in a nice, friendly style with a touch of humor where appropriate. Each of the chapters also end with anecdotes other cops share, some dark, some funny, but all authentic. Way to go, Lynda!"
True Blue was a bestselling title in the bookfair at the 2000 Colorado Gold Conference, sponsored by the Rocky Mountain Fiction Writers. | 2019-04-24T18:31:29Z | http://lyndasandoval.com/true.php |
OCR has reproduced this exemplar candidate evidence to support teachers in interpreting the assessment criteria for the unit HSC 2028, Move and position individuals in accordance with their plan of care. This exemplar evidence should be considered alongside the unit requirements, the Learning Outcomes and Assessment Criteria. This content has been selected by the OCR Chief External Verifier for the Health and Social Care Diplomas, to illustrate how the assessment criteria are applied, and to provide some commentary on what factors contributed to the final outcome.
The exemplar candidate evidence is intended to demonstrate how criteria have been met and are supported by a commentary. While the exemplars are intended to be useful in interpreting the specification’s Assessment Criteria, they should in no way be regarded as definitive evidence.
This resource is provided for advice and guidance only.
Not moving an individual correctly can cause ligaments to vertebrae. In between the bones there are joints that connect sprain. This is why individuals must never be dragged when these together. A ligament connects bone to support joints. being moved as this can cause joints to over stretch and then sprain the ligaments.
Muscles work by the fibres they contain contracting; this makes the muscle shorten. When the muscle shortens it pulls on the tendon and then on the bone to which it is attached.
When an individual is moved and positioned it is important this happens smoothly. Sudden movements or pulling in any direction of an individual’s limbs or body can cause pulled muscles or tear tendons which can cause a lot of pain.
Putting pressure on an individual’s hand or arm when they are moving from one position to another can cause a bone to fracture. Fractures can also happen if there is an accident with for example equipment like a hoist and this falls onto the individual when moving/positioning them or using the wrong sling size and the individual falls out.
• Assessment Method: The learner has presented their outline in the form of a table. The learner’s outline includes the main features of the musculoskeletal system that moves the body and its importance in relation to correctly moving and positioning individuals. The assessment method is valid as it measures the learner’s understanding and knowledge of the anatomy and physiology of the human body.
• Quality of Evidence: The learner’s response is of a good quality because the learner reflects her understanding of how the bones, joints, tendons, muscles and ligaments in the body work in relation to the moving and positioning of individuals. The learner then includes details of how injuries can occur if incorrect moving and positioning of individuals is carried out. • Breadth of Evidence: The learner has provided brief details of the main features of the anatomy and physiology of the body. The learner’s evidence meets AC1.1 fully in terms of providing an outline of the importance of correct moving and positioning of individuals in relation to the anatomy and physiology of the human body.
• Assessment Method: The assessor has used an open oral question with this learner ‘Tell me about…’; this encourages the learner to think about individuals with different conditions and how their needs may affect their moving and positioning. The assessment method is valid as it measures the learner’s understanding and knowledge of the impact of specific conditions on the correct movement and positioning of an individual. • Quality of Evidence: The learner’s response is of a good quality because the learner reflects own understanding of specific conditions ‘individuals with a dementia….with arthritis….who have had a stroke…are blind’. The learner also answers the question in terms of own health and social care work setting and so also reflects her knowledge of how these conditions can affect the way individuals are moved and positioned and how the support provided must then take into account their needs.
• Breadth of Evidence: The learner has detailed well the impact of specific conditions on the correct movement and positioning of an individual. The learner’s evidence meets AC1.2 fully in terms of providing a description of the impact of specific conditions on the correct movement and positioning of an individual.
• Breadth of Evidence: The learner has detailed well how both legislation and agreed ways of working affect working practices. The learner’s evidence meets AC 2.1 fully in terms of providing a description of how legislation and agreed ways of working affect working practices related to moving and positioning individuals.
‘Before moving and positioning individuals I have to take responsibility for the health and safety of the service user, others and myself and while doing this adhere to the organisational policies in place and meet all health and safety obligations. I only move and positions individuals where I have had training to do so.
• Assessment Method: The assessor has used discussion as this encourages the learner to think about and detail fully the health and safety factors that must be taken into account when both moving and positioning individuals and when using equipment.
The assessment method is valid as it measures the learner’s understanding and knowledge of the different health and safety factors.
COMMENTARY FOR EVIDENCE FOR ACs 3.1, 3.2, 3.6, 3.7, 4.1 and 4.2: • Assessment Method: The assessor has used direct observation of the learner’s practice to meet these criteria. The observations have been recorded clearly by the assessor in terms of describing specifically the learner’s practices in relation to being able to minimise risk before moving and positioning different individuals in terms of: accessing individuals’ care plans and risk assessments, carrying out visual checks of the area and equipment being used, seeking the individual’s consent and agreement from colleagues as well as applying precautions for infection prevention and control. It is also evident in the learner’s preparation of these different individuals described in the three observation extracts that the learner is able to effectively seek the individual’s consent whilst agreeing with them the reasons for the moves as well as how the moves will be done.
This assessment method is valid as it measures the learner’s skills in being able to minimise risk and prepare effectively before moving and positioning individuals.
because the learner’s practices demonstrate clearly own competence against each of the assessment criteria. • Breadth of Evidence: The learner’s evidence meets ACs 3.1, 3.2, 3.6, 3.7, 4.1 and 4.2 fully in terms of demonstrating that the learner is able to minimise risks and prepare effectively before moving and positioning individuals.
‘When I come across risks before moving and positioning an individual my actions will depend on what they are. If there are risks in the environment from hazards that I can move like an item on the floor then I will do so with the individual’s agreement but if there is a risk in terms of the equipment I’m using if it is faulty or from the individual it may be that I think they are unwell or a I see a change in their behaviour then I would not carry out the move but first would report the risks to my supervisor and seek advice. The equipment if faulty is removed from the immediate area and an out of order sign placed on it until it is replaced to make others aware that it is not working or safe to use.
their care plan and risk assessment says, the risks involved and my responsibilities to only follow the care plan. If the individual still insisted then I would explain that I would need to report this to my supervisor. I must also record the risks, the date I identified these and the actions I take.
• Assessment Method: The assessor has used an open oral question with this learner ‘Tell me about…’; this encourages the learner to think about the different actions to take in relation to identified risks before moving and positioning individuals. The assessment method is valid as it measures the learner’s understanding and knowledge of the actions that must be taken when risks are identified before moving and positioning individuals. • Quality of Evidence: The learner’s response is of a good quality because the learner reflects own understanding of the actions to be taken for different risks and conflicts that may arise: ‘an item on the floor, faulty equipment or an individual who is unwell or has a change in their behaviour or wants to be moved in a different way.’ The learner also answers the question in terms of own health and social care work setting and so also reflects her knowledge of the actions to take when there are risks and conflicts identified namely reporting, recording and explaining the risks to the individual. • Breadth of Evidence: The learner has detailed well how to minimise risks to individuals. The learner’s evidence meets ACs 3.4 and 3.5 fully in terms of providing a description of the actions to take in relation to identified risks and an individual’s wishes conflict with their care plan and risk assessment in relation to health and safety. The learner’s evidence can also be cross referenced to AC6.1 in relation to when advice and/or assistance should be sought to move or handle an individual safely.
‘…the learner discusses the individual’s care plan with her and agrees with her for her to stand opposite her and her colleague to stand next to her and guide her. The individual’s room door is closed and the individual is dressed. The learner and her colleague are wearing disposable aprons and gloves I observed them both wash and dry their hands thoroughly before putting on their PPE. The learner agreed with her colleague and the individual that she would stand up from her bed on the count of three. The learner places the Turner in front of the individual and then asks her to place her feet on the middle part of the turning plate and checks with her she is comfortable. The learner and her colleague visually check that she does this and that the individual’s knees are at the correct angle.
The learner then moves the handle to the correct height, places both hands on the handle and steps onto the turning plate and then asks the individual to place her hands on the handle and stand up and checks with her she is comfortable, waiting a few moments. The learner then turns the disk round, steps onto the pedal and asks the individual to sit back down onto her wheelchair and checks she is safe and comfortable. The learner then records in her plan the move and the checks she made of the individual whilst using her Turner aid and reports this to the Manager’.
‘‘…I observe the learner with Mr R in his room discussing the move from his bed to his armchair and referencing the care plan. They agree with the learner’s colleague that the learner will say 1,2,3 move when the hoist is manually operated. Mr R’s door of his room is closed for privacy and the curtains are also closed to respect Mr R’s privacy and dignity. The learner’s checks that Mr’s bed and armchair have the brakes on. The learner adjust the bed down a little so that she could place the sling around Mr R who is sitting in his bed. The learner places the sling alongside Mr’s back making sure it is as far down as possible. The learner then checks that the leg attachments of the sling are under Mr R’s thighs and that the back of the sling is under his hips and that his head is also in the top part of sling and that Mr R has placed his arms safely in the sling. The learner explains to Mr R what she is doing at every step and agrees with him that he is comfortable at every step. The learner then explains to Mr R that she will attach the leg and chest attachments to the hoist’s spread bar. The learner then agrees with Mr R and her colleague to move him on the count of three and says 1,2,3 and move. The learner operates the hoist and hoists Mr R up a little and checks he is alright and that all the attachments are on correctly and then continues to hoist Mr R, reassuring him and observing that he is relaxed and comfortable and talking to him throughout. The learner and her colleague then together moved the hoist to over Mr R’s armchair and then agreeing this with MR begin to lower him into the correct position ensuring he remains upright and is back as close as possible to the back of his armchair. Once Mr is sitting down, the learner undoes the attachments and moves the hoist gently away from him and removes the sling. Mr R thanks the learner and her colleague.
COMMENTARY FOR EVIDENCE FOR ACs 5.1, 5.2, 5.4, 5.5, 5.6 and 5.7: • Assessment Method: The assessor has used direct observation of the learner’s practices to meet these criteria. The three observations have been recorded clearly by the assessor in terms of describing specifically the learner’s practices in relation to being able to move and position different individuals.
equipment, ensure that the individuals are active participants in the move, monitor individuals’ conditions throughout and report and record all activities and support given. This assessment method is valid as it measures the learner’s skills in being able to move and position individuals. • Quality of Evidence: The documented observations are of a good quality because the learner’s practices demonstrate clearly own competence against each of the assessment criteria; including the use of different aids and equipment to meet different individuals’ needs.
• Breadth of Evidence: The learner’s evidence meets ACs 5.1, 5.2, 5.4, 5.5, 5.6 and 5.7 fully in terms of demonstrating that the learner is able to move and position individuals.
• Assessment Method: The assessor has used an open oral question with this learner ‘Tell me about…’; this encourages the learner to think about the different aids and equipment used for moving and positioning individuals. The assessment method is valid as it measures the learner’s knowledge of the range of different aids and equipment available.
• Quality of Evidence: The learner’s response is of a good quality because the learner reflects own understanding of a range of different aids and equipment available for moving and positioning individuals including their use: ‘hoists, slings, slide boards, lifting handles, handling belts, grab handles and walking frames’. • Breadth of Evidence: The learner has detailed well the different aids and equipment that may be used. The learner’s evidence meets AC 5.3 fully in terms of providing a description of the aids and equipment that may be used for moving and positioning individuals.
• Assessment Method: The learner’s personal statement provides the learner with an opportunity to reflect her knowledge about the sources of information available and when to seek advice and assistance to move or handle an individual safely. The assessment method is valid as it measures the learner’s understanding and knowledge of when advice and assistance should be sought to move individuals safely and the information that can be sought about moving and positioning individuals.
relation to moving and positioning individuals. The learner’s evidence meets ACs 6.1 and 6.2 fully in terms of providing a description of when advice and/or assistance should be sought to move or handle an individual safely as well as the different sources of information that are available about moving and positioning individuals.
assessment criteria in this unit.
Please note that whilst every effort has been made to ensure the accuracy of the content, OCR’s resources are provided for general information purposes only to be used at the discretion of teachers and centres. The resources are provided for guidance purposes only and do not constitute an endorsed teaching method that is required by the Board. OCR shall not have any liability whatsoever for any losses, including losses for any misinterpretation, or subsequent impact howsoever caused.
your call may be recorded or monitored. © OCR 2013 Oxford Cambridge and RSA Examinations is a Company Limited by Guarantee. Registered in England. Registered office 1 Hills Road, Cambridge CB1 2EU. Registered company number 3484466. OCR is an exempt charity. | 2019-04-24T12:02:45Z | https://nmmra.org/health-and-social-care/ |
SermonIndex.net : Christian Books : HOW TO BECOME LIKE CHRIST.
|But we all, with unveiled face reflecting as a mirror the glory of the Lord, are changed into the same image from glory to glory, even as by the Spirit of the Lord.| -- 2 COR. iii.18 (Revised Version).
I suppose there is almost no one who would deny, if it were put to him, that the greatest possible attainment a man can make in this world is likeness to The Lord Jesus Christ. Certainly no one would deny that there is nothing but character that we can carry out of life with us, and that our prospect of good in any future life will certainly vary with the resemblance of our character to that of Jesus Christ, which is to rule the whole future. We all admit that; but almost every one of us offers to himself some apology for not being like Christ, and has scarcely any clear reality of aim of becoming like Him. Why, we say to ourselves, or we say in our practice, it is really impossible in a world such as ours is to become perfectly holy. One or two men in a century may become great saints; given a certain natural disposition and given exceptionally favouring circumstances, men may become saintly; but surely the ordinary run of men, men such as we know ourselves to be, with secular disposition and with many strong, vigorous passions -- surely we can really not be expected to become like Christ, or, if it is expected of us, we know that it is impossible. On the contrary, Paul says, |We all,| |we all.| Every Christian has that for a destiny: to be changed into the image of his Lord. And he not only says so, but in this one verse he reveals to us the mode of becoming like Christ, and a mode, as we shall find, so simple and so infallible in its working that a man cannot understand it without renewing his hope that even he may one day become like Christ.
In order to understand this simplest mode of sanctification we must look back at the incident that we read in the Book of Exodus (xxxiv.29-35.). Paul had been reading how when Moses came down from the mount where he had been speaking with God his face shone, so as to dazzle and alarm those who were near him.
|That,| says Paul, |is precisely the process through which we Christian men become like Christ.| We go back to the presence of Christ with unveiled face; and as often as we stand in His presence, as often as we deal in our spirit with the living Christ, so often do we take on a little of His glory. The glory of Christ is His character; and as often as we stand before Christ, and think of Him, and realise what He was, our heart goes out and reflects some of His character. And that reflection, that glory, is not any longer merely on the skin of the face; as Paul wishes us to recognise, it is a spiritual glory, it is wrought by the spirit of Christ upon our spirit, and it is we ourselves that are changed from glory to glory into the very image of the Lord.
Now obviously this mode of sanctification has extraordinary recommendations. In the first place, it is absolutely simple. If you go to some priest or spiritual director, or minister of the Gospel, or friend, and ask what you are to do if you wish to become a holy man, why, even the best of them will almost certainly tell you to read certain books, to spend so much time in prayer and reading your Bible, to go regularly to church, to engage in this and that good work. If you had applied to a spiritual director of the middle ages of this world's history and of the history of Christianity, he would have told you that you must retire from the world altogether in order to become holy. Paul says, |Away with all that nonsense!| We are living in a real world; Christ lived in a real world: Christ did not retire from men. And He says all that you have to do in order to be like Christ is to carry His image with you in your heart. That is all. To be with Him, to let Him stand before you and command your love, that will infallibly change you into His image. I do not know that we sufficiently recognise the simplicity of Christian methods. We do not understand what Paul meant by proclaiming it as the religion of the spirit, as a religion superior to everything mechanical and external. Think of the deliverance it was for him who had grown up under a religion which commanded him to go a journey three times a year, to take the best of his goods and offer them in the Temple, to comply with a multitude of oppressive observances and ordinances. Think of the emancipation when he found a spiritual religion. Why, in those times a man must have despaired of becoming a holy man; But now Paul says you will infallibly become holy if you learn this easy lesson of carrying the Lord Jesus with you in your heart.
Another recommendation of this method is that it is so obviously grounded on our own nature. No sooner are we told by Paul that we must act as mirrors of Christ than we recognise that nature has made us to be mirrors, that we cannot but reflect what is passing before us. You are walking along the street, and, a little child runs before a carriage; you shrink back as if you were in danger. You see a man fall from a scaffolding, crushed; your face takes on an expression of pain, reflecting what is passing in him. You go and spend an evening with a man much stronger, much purer, much saner, than yourself, and you come away knowing yourself a stronger and a better man. Why? Because you are a mirror, because in your inmost nature you have responded to and reflected the good that was in him.
Look into any family, and what do you see? You see the boy, not imitating consciously, but taking on, his father's looks and attitudes and ways; and as the boy grows up these become his own looks and attitudes and ways. He has reflected his father from one degree of proficiency unto another, from one intimacy, from one day's observation of his father to another, until he is the image of the old man over again.
This has been tested by the experience of thousands; and it has been found to be a true method. Every one who spends but two minutes in the morning in the observation of Christ, every one who will be at the pains to let the image of Christ rise before him and to remember the purity, the unworldliness, the heavenliness, the godliness of Jesus Christ, that man is the better for this exercise. And how utterly useless is it to offer any other method of sanctification to thousands of our fellow-citizens. How can many of our fellow-citizens secrete themselves for prayer? If you ask them to go and pray as you pray in your comfortable home, if you ask them to read the Bible before they go out at five or six o'clock in the morning, do you expect that your word will be followed? Why, the thing is impossible. But ask a man to carry Christ with him in his mind, that is a thing he can do; and if he does it once, if only once the man sees Christ before him, realises that this living Person is with him, and remembers the character of Christ as it is written for us in the Gospels, that man knows that he has made a step in advance, knows that he is the better for it, knows that he does reflect, for a little, even though it be but for a little, the very image of the Lord Jesus Christ; and other people know it also.
Now, if that is so, there are obviously three things that we must do. We must in the first place, learn to associate with Christ. I say that even one reflection does something, but we need to reflect Christ constantly, continually, if we are to become like Him. When you pass away from before a mirror the reflection also .goes. In the case of Moses the reflection stayed for a little, and that is perhaps a truer figure of what happens to the Christian who sets Christ before him and reflects him. But very often as soon as Christ is not consciously remembered you fall back to other remembrances and reflect other things. You go out in the morning with your associates, and they carry you away; you have not as yet sufficiently impressed upon yourself the image of Christ. Therefore we must learn to carry Christ with us always, as a constant Companion. Some one may say that is impossible. No one will say it is impossible who is living in absence from anyone he loves. What happens when we are living separated from some one we love? This happens: that his image is continually in our minds. At the most unexpected times that image rises, and especially, if we are proposing to ourselves to do what that person would not approve. At once his image rises to rebuke us and to hold us back. So that it is not only possible to carry with us the image of Christ: it is absolutely certain that we shall carry that image with us if only we give Him that love and reverence which is due from every human being. Who has done for us what Christ has done? Who commands our reverence as He does? If once He gets hold of our affection, it is impossible that He should not live constantly in our hearts. And if we say that persons deeply immersed in business cannot carry Christ with them thus, remember what He Himself says: |If any man love Me, he will keep My word; and My Father will love him, and we will come unto him.| So that He is most present with the busiest and with those who strive as best they can to keep His commandments.
But we must not only associate with Christ and make Him our constant company: we must, in the second place, set ourselves square with Christ. You know that if you look into a mirror obliquely, if a mirror is not set square with you, you do not see yourself, but what is at the opposite angle, something that is pleasant or something that is disagreeable to you; it matters not -- you cannot see yourself. And unless we as mirrors set ourselves perfectly square with Christ, we do not reflect Him, but perhaps things that are in His sight monstrous. And, in point of fact, that is what happens with most of us, because it is here that we are chiefly tried. All persons brought up within the Christian Church pay some attention to Christ. We too well understand His excellence and we too well understand the advantages of being Christian men not to pay some attention to Christ. But that will not make us conform to His image. In order to be conformed to the image of Christ we must be wholly His. Suppose you enter a studio where a sculptor is working, will he hand you his hammer and chisel to finish the most difficult piece of his work or to do any part of it? Assuredly not. It is his own idea that he is working out, and none but his own hand can work it out. So with us who are to be moulded by Christ. Christ cannot mould us into His image unless we are wholly His. Every stroke that is made upon us by the chisel and mallet of the world is lost to His ideal. As often as we reflect what is not purely Christian, so often do we mar the I image of Christ.
Now how is it with us? Need we ask? When we go along the street, what is it that we reflect? Do we not reflect a thousand things that Christ disapproves? What is it that our heart responds to when we are engaged in business? Is it to appeals that this world makes to us? Is it the appeal that a prospect of gain makes to us that we respond to eagerly? That is what is making us; that is what is moulding and making us the men that we are destined to be. We are moulded into the character that we are destined to live with for ever and ever, by our likings and dislikings, by the actual response that we are now giving day by day to the things that we have to do with in this world. We may loathe the character of the sensualist; no language is too strong for us when we speak of him: but if we, in point of fact, respond to appeals made to the flesh rather than appeals made to the spirit, we are becoming sensual. We may loathe and despise the character of the avaricious worldly man; we may see its littleness, and pettiness, and greed, and selfishness: but do our own hearts go out in response to any offer of gain more eagerly than they go out to Christian work or to the interests of Christ's kingdom? Then we are becoming worldly and avaricious; we are becoming the very kind of men that we despise.
We must then associate with Christ, and we must set ourselves squarely; we must. be absolutely true in our entire and absolute devotion. Surely no man thinks that this is a hardship; that his nature and life will be restricted by giving himself wholly to Christ? It is only, as every Christian will tell you -- it is only when you give yourself entirely to Christ that you know what freedom means; that you know what it is to live in this world afraid of nothing. Superior to things that before you were afraid of and anxious about, you at length learn what it is to be a child of God. Let no man think that he lames his nature and makes his life poorer by becoming entirely the possession of Christ.
But, thirdly, we must set Christ before us and live before Him with unveiled face. |We all with unveiled face reflecting as a mirror.| Throw a napkin over a mirror, and it reflects nothing. Perfect beauty may stand before it, but the mirror gives no sign. And this is why in a dispensation like ours, the Christian dispensation, with everything contrived to reflect Christ, to exhibit Christ, the whole thing set a-going for this purpose of exhibiting Christ, we so little see Him. How is it that two men can sit at a Communion table together, and the one be lifted to the seventh heaven and see the King in His beauty, while the other only envies his neighbour his vision? Why is it that in the same household two persons will pass through identically the same domestic circumstances, the same events, from year to year, and the one see Christ everywhere, while the other grows sullen, sour, indifferent? Why is it? Because the one wears a veil that prevents him from seeing Christ; the other lives with unveiled face. How was it that the Psalmist, in the changes of the seasons even, in the mountain, in the sea, in everything that he had to do, found God? How was it that he knew that even though he made his bed in hell he would find God? Because he had an unveiled face; he was prepared to find God. How is it that many of us can come into church and be much more taken up with the presence of some friend than with the presence of Christ? The same reason still: we wear a veil; we do not come with unveiled face prepared to see Him.
And When we ask ourselves, |What, in point of fact, is the veil that I wear? What is it that has kept me from responding to the perfect beauty of Christ's character? I know that that character is perfect; I know that I ought to respond to it; I know that I ought to go out eagerly towards Christ and strive to become like Him; why do I not do it?| we find that the veil that keeps us from responding thus to Christ and reflecting Him is not like the mere dimness on a mirror which the bright and warm presence of Christ Himself would dry off; it is like an incrustation that has been growing out from our hearts all our life long, and that now is impervious, so far as we can see, to the image of Christ. How can hearts steeped in worldliness reflect this absolutely unworldly, this heavenly Person? When we look into our hearts, what do we find in point of fact? We find a thousand ,things that we know have no right there; that we know to be wrong. How can such hearts reflect this perfect purity of Christ? Well, we must see to it that these hearts be cleansed; we must hold ourselves before Christ until from very shame these passions of ours are subdued, until His purity works its way into our hearts through all obstructions; and we must keep our hearts, we must keep the mirror free from dust, free from incrustations, once we have cleansed it.
In some circumstances you might be tempted to say that really it is not so much that there is a veil on the mirror as that there is no quicksilver at all behind. You meet in life characters so thin, so shallow, that every good thought seems to go through and out of them at the other side; they hear with one ear, and it goes out at the other. You can make no impression upon them. There is nothing to impress, no character there to work upon. They are utterly indifferent to spiritual things, and never give a thought to their own character. What is to be done with such persons? God is the great Teacher of us all; God, in His providence, has made many a man who has begun life as shallow and superficial as man can be, deep enough before He has done with him.
Two particulars in which the perfectness of this method appears may be pointed out. First of all, it is perfect in this: that anyone who begins it is bound to go on to the end. The very nature of the case leads him to go on and on from glory to glory, back and back to Christ, until the process is, actually completed, and he is like Christ. The reason is this: that the Christian conscience is never much taken up with attainment made, but always with attainment that is yet to be made. It is the difference not the likeness that touches the conscience. A friend has been away in Australia for ten years, and he sends you his likeness, and you take it out eagerly, and you say, |Yes, the eyes are the very eyes; the brow, the hair are exactly like,| but there is something about the mouth that you do not like, and you thrust it away in a drawer and never look at it again. Why? Because the one point of unlikeness destroys the whole to you. Just so when any Christian presents himself before Christ it is not the points of likeness, supposing there are any, which strike his conscience -- it is the remaining points of difference that inevitably strike him, and so he is urged on and on from one degree of proficiency to another until the process is completed, because there is no point at which a man has made a sufficient attainment in the likeness of Christ. There is no point at which Christ draws a line and says, |You will do well if you reach this height, and you need not strive further.| Why, we should be dissatisfied, we should throw up our allegiance to Christ if He treated us so. He is our ideal, and it is resemblance to Him that draws us and makes us strive forward; and so a man is bound, to go on, and on, and on, still drawn on to his ideal, still rebuked by his shortcomings until he perfectly resembles Christ.
And this character of Christ that is our ideal is not assumed by Him for the nonce. He did not change His nature when He came to this earth; He did not put on this character to set us an example. The things that He did, He did because it was His nature to do them. He came to this world because His love would not let Him stay away from us. It was His nature that brought Him here, and it is His nature to be what He is, and so his character is to become our nature; it is to be so wrought in us that we cannot give it up. It is our eternal character, and therefore any amount of pains is worth spending on the achievement of it.
The second point of perfectness lies here. You know that in painting a likeness or cutting out a bust one feature often may be almost finished while the rest are scarcely touched, but in standing before a mirror the whole comes out at once. Now we often in the Christian life deal with ourselves as if we were painters and sculptors, not as if we were mirrors: we hammer and chisel away at ourselves to bring out some resemblance to Christ in some particulars, thinking that we can do it piecemeal; we might as well try to feed up our body piecemeal; we might as well try to make our eye bright without giving our cheek colour and our hands strength. The body is a whole, and we must feed the whole and nourish the whole if any one part of it is to be vigorous.
One word in conclusion. I suppose there is no one who at one time or other has not earnestly desired to be of some use in the world. Perhaps there are few who have not even definitely desired to be of some use in the kingdom of Christ. As soon as we recognise the uniqueness of Christ's purpose and the uniqueness of His power in the world, as soon as we recognise that all good influence and all superlatively dominant influence proceeds from Him, and that really the hope of our race lies in Jesus Christ -- as soon as we realise that, as soon as we see that with our reason, and not as a thing that we have been taught to believe, as soon as we lay hold on it for ourselves, we cannot but wish to do something to forward His purposes in the world. But as soon as we form the wish we say, |What can we do? We have not been born with great gifts; we have not been born in superior positions; we have not wealth; we are shut off from the common ways of doing good; we cannot teach in the Sabbath school; we cannot go and preach; we cannot go and speak to the sick; we cannot speak even to our fellow at the desk. What can we do?| We can do the best thing of all, as of course all the best things are open to every man. Love, faith, joy, hope, all these things, all the best things, are open to all men; and so here it is open to all of us to forward the cause of Christ in the most influential way possible, if not in the most prominent way. What happens when a person is looking into a shop window where there is a mirror, and some one comes up behind -- some one he knows? He does not look any longer at the image; he turns to look at the person whose image is reflected. Or if he sees reflected on the mirror something very striking: he does not content himself with looking at the image; he turns and looks at the thing itself. So it is always with the persons that you have to do with. If you become a mirror to Christ your friends will detect it in a very few days; they will see appearing in you, the mirror, an image which they know has not been originated in you, and they will turn to look straight at the Person that you are reflecting. It is in that way that Christianity passes from man to man. | 2019-04-22T21:06:32Z | http://www.sermonindex.net/modules/bible_books/?view=book_chapter&chapter=58558 |
We had no AGM in 2017. It is probably too late now for an AGM in 2018 Are we gong to have one in 2019?
There is no news of any sort filtering through from any of the club officers. We need to have an AGM in order to get what looks like a state of complacency sorted out and not waste all the hard work that the late Tony Baskill put into this club.
It is possible to communicate with the entire globe in seconds in this twenty first century so surely someone among the club offiicers could let the rest of us know just what is or isnt happening. Can we have some committment please?.
Suggest just setting a 1 hour conference call and see if you can get a quorum for a online AGM meeting, then minute the discussion and any actions. Job done.
It does need whoever is the Chair and Committee to communicate.
Thanks for your response jdring. Unfortunately I spent 58 years driving trucks and about 5 minutes driving a computer. I would not know how to do a conefrence call.
The lack of communication from club officers is the main thing that is lacking. We have a chairman, or did have, a secretary so I believe and a committee. The only response I have had is from both the western area reps, north and south. From all others nothing, zero, zilch sweet "Fanny Adams". Not good enough.
Member since 2009 and logged in. Would seem that the site does not recognise this as there is no flag and no access to members area. I did ask why (as subs are always up to date) but never received a response. Doesnt alter the reason for my first posting of this thread.
This site is legendary; it has been a tremendous help over many years. Unfortunately, I have no idea who "my" area contact is these days. Fortunately, I have a long list of contacts. The £25 is academic. It is barely a third of a tank of fuel. Sadly, I am unable to be a mover and shaker but I (and many others!) have reason to be grateful for whoever is able to step up and do it.
Thank you for your response Nick123. You and one other have responded to the subject matter of my original post, the third queried my membership status. Bit pointless really when you consider the importance of the post content.
There are questions that MUST be answered. There is a legal situation that has to be rectified. The GWOA is a limited company as well as a club and there is a legal requirement for a limited company to present audited accounts to be signed off at an AGM. To the simple minded AGM means Annual General Meeting.
There has been no AGM or accounts signed off for two years. WHY???
The club chairnan resigned. WHY were the membership not told and an AGM arranged to elect a successor???
There is, I am told, a club secretary. WHO, what, where and what if anything are you diong???
What, if any, club officers and area reps are there???
Are any remaining club officers aware that there are penalties for not maintaing a regular AGM for a limited company and that they may be liable for those penalties.
This situation is an insult to the memory of Tony Baskill. WHY HAS IT BEEN ALLOWED TO HAPPEN???
I haven't responded before although I have been keeping track.
It would be good to hear from whoever are the committe nowadays as to what their plans for the club are going forward. I know there was a lot of talk a while ago about upgrading the website whch was going to be very expensive but, as far as I'm aware, nothing has happened since.
I can't remember what the estimate of the cost was but it was a lot. Quite a few thousand pounds.
It is a really useful source of knowledge and I, for one, would miss it if it weren't here but maybe there aren't enough members to warrant upgrading. My understanding was that if we didn't upgrade then the people in India who make it all work would simply allow it to grind to a halt - although obviously that hasn't happened yet.
Maybe there's a cheaper way of keeping the site running and keeping all the technical information and historical threads that give solutions to common problems available. Or maybe we should just allow it to carry on as it is, which actually doen't seem that bad to me. I have no idea what the cost is of keeping things as they are.
Or maybe the site should simply cease to exist and the funds in the club's account be shared amongst the paid up members?? As far as I recall from the last AGM that I attended there was quite a tidy sum.
I've been a paid up member for quite a few years now and my vote would be to continue as is should the costs for a revamp of the site be prohibitive.
It doesn't look like we/GWOA even know who are members at the moment. I definitely paid up when I returned to being a road going G driver, about a year ago. Was originally a member for years from about 2000. It may be due again. Tbh, unlikely to renew without seeing some actions, though the 25gbp is not the issue. I don't really see why a revamp of the website platform would be so expensive and there should be plenty of funds anyway - what else is GWOA going to spend it on. Look at Google Sites for a start (was Google apps) - the cost will be in the real time and effort to copy over the forum data and archives. Agree that someone needs to be tasked/paid to do that. Make it a site easy for multiple volunteer committee) to manage, and with a lot of self managed blog/forum type capability.
Go on... Stop messin' about... Who ARE the current committee members, please?
If I have managed to get this contraption to work correctly there should be a pdf file at the end of this post. The file is information from Companies House regarding current officers of the GWOA Ltd.
If the same applies to the club side of the GWOA then there is one poor soul left holding the fort and the rest have gone awol.
Bearing in mind the limited response to my original post I think my next request will likely fall on deaf ears. It is going to be down to the remaining membership of this club to keep it alive. That means committment including the will to make it work and the will for new club officers and a WORKING committee. To take on the role of chairman or secretary need someone with the contacts, the financial position and the time to do the jobs justice. I am prepared to do what I can as I do have time but 58 years of driving trucks on long haul journeys has left me without the necessary contacts and without sufficient funds to do justice to either of the most important jobs.
If this club dies then so will the websie and all the knowledge and information therein will de deleted and lost for ever. If I am wasting my time trying to keep GWOA alive I would be obliged if enough of you would tell me as I can devote my energies to something that WILL work.
Well done fraj. Simple check.
History of GWOA shows Rupert van Hullen has taken on the sole lead of the company over the past 3 years.
There is about 9.5k of member fees/assets in the company. Company address moved to Rupert as he became the sole Director, just 1 month ago, so some things are active (just not this website side of things).
You cant help those that dont want to be helped, but good to offer.Lets hope there are some plans afoot from Rupert?
The continuation of the website is only part of the work that needs to be done. I first joined GWOA in the late 90`s and left when my first G was sold in the early 2000`s. I rejoined again in 2009. I still have fond memories of the first AGM that I attended at Fontwell Park area in Sussex. Having been a member of one make motorcycle clubs and a one make car club I had got used to the cliqueiness of such clubs and was very pleasantly surprised that I found none of that with those present at that meeting. There will be some who will remember that meeting and how very friendly it all was. This is what we need to get back to.
It may well be that this kind of ideal will not work any more after so much negativity over the last few years. We still have to try and if necessary to compramise a little and get this club off the ground again. It must have been very disheartenning for Rupert to be left at the controls whist everyone else bailed out.
There is a significant amount of money in the GWOA account. Certainly enough to sort out the website and to keep the club going. All it needs is the will of the membersip and a bit of get up and go.
So come on the rest of you, wake up and do something---------------- before it`s too late!!!!!!
Does anyone know if GWOA is affiliated or have good relations with any of the less specific car clubs (for example The Mercedes Benz Club)? Maybe they, or another such club, would be interested in having an area set aside for G Wagens at one of their summer events.
The MBC has it's annual concours on June 15 next year at Milton Keynes.
It would be a great way of showcasing perhaps MB most iconic model and a perfect way to encourage many of our members to attend and meet up.
I would have thought it was obvious that NOBODY is attending to the website any more than they are the club, so it is unlikely there will be a red flag for some of us any time soon. Way back in this post thread I said that my membership is paid up to date. It is done by standing order. If other members have only negatives to post, better not to post anything.
Even if I were not a member at least I am trying to do something about keeping this club alive. Right at the present time I am not getting very much support. There seems to be little problem regarding response on other topics. I can only assume that this topic lacks support because means actually having to do something costructive.
To those few who have voiced support please note that the last paragraph does not apply to you. I am not in a position to know if GWOA is affiliated to any other clubs. The idea of having a stand at another Mercedes club would be a starting point. Calling an extraordinary AGM would be another way to go, although this should have been done the moment the chairman resigned. Since this did not happen I can only guess that the secretary resigned as well.
GWOA needs to stay alive in whatever form it can. Please.
Becoming part of another club in some way to preserve what GWOA has (including identity) seems a good way to go.
If GWOA has money, it can buy-in to that club, covering costs of transfer of information, website expansion, forum space and so on.
We can also add numbers to that club's events with something (Gs, Unimog, P4, Pinzgauer etc) that they may or may not have represented otherwise.
I can give time but only when I have it - random work means I am unpredictable and travel a fair bit though.
There was a similar thread to this a few months ago and many good ideas were put forward.
The ideas are there but action is what's needed, of course.
To our one Director: I live near you and can meet at pretty short notice.
To everyone: That meeting can be just coffee for two, coffee and cake for a few, an AGM, a gathering somewhere interesting or a full-blown party/event. Whatever, let's do something.
Thanks Old English, great to have some positive support. It does appear that there are not many who share our enthusiasm for keeping the club going though. I have had positive support from less than half a dozen yet many others will happily post on other topics. If this club dies there will no other topics for them to post on. Sometimes folks just don`t see the wood for the trees.
I hope you are both OK FRAJ?
I could see what was coming... and it's arrived.... but worse than i thought possible!
Rupert as far as i am aware has not really been involved in the GWOA day to day, when he showed up at the last AGM i attended in i think 2015 at Gaydon, even the then Chairman didn't know who he was when he was sat in front of him?
The top tier of the GWOA never seemed to embrace the current tech age and have now been left behind with regards the forum, dear old Tony was the only "old school" person that did, but even he was just one man!
As for the club and meets its the same as always, people put masses of time and effort in and even of the small few that commit only a tiny handful stand up and be counted... like yourselves the same few everytime.
Perhaps join a different community like the vast majority of the ex members on the above thread did... it thrives!
Many thanks for your response. I know I may be hitting my head against a brick wall ............ and it will be nice when I stop..... but I have to try.
I am only guessing here, but my guess is that Rupert Van Hullen is a GWOA Ltd. officer more for his legal expertise than as a club member. I would think that he is in the unenviable position of having been "left holding the baby" so to speak.
As it is now getting close to the silly season I will wait untill after Christmas and write to Rupert and ask if he would call a extraordinary general meeting with the view to electing WORKING club officers and a WORKING committee. OR. Failing that to come to a decision concerning winding up the GWOA altogether. Including what to do with the remaining club funds. They are reasonably substantial.
I read the entire content of your link Gav, There seemed to be a whole lot more people supporting the club then than there are at this time. I do not for one moment think that £25 is what is keeping them silent. I know folks like something for nothing but if you run a G Wagen you won`t get much for nothing.
I have sent you a personal message Gav as there are things I wanted to convey to you that I did not want in the public domain as they are of a personal nature.
Just renewed my membership and hope to hear more about activities in 2019.
You are brave George, and maybe proof that the red member banner works?
I want GWOA to continue, adapt, re-generate. But I am reluctant to pay each year if there is not even an attempt to open up to members and respond. Rupert needs to invite a new committee, who are hands on and will be active in change, and use some of the accumulated subscriptions to support and boost the club. I'd hate to think they might just be siphoned away - the constitution shouldn't allow that.
best Hello to all those who are on this thread. I have been a member since the mid nineties and to be fair not really contributed to any of the GWOA events. I have enjoyed the exchange of knowledge and advice available on the forum but little else. For some years there was a good magazine and newsletter very well produced by enthusiastic members with great stories and news of events here and abroad. Sadly after a while the energy wanes quite naturally and everything goes into decline. This decline was probably not helped by some discord amongst a few rogue members. However the current situation is not satisfactory. The limited company is a legal entity and must abide by company law or apply for disallution from Companies House. Whoever is the registered Chairman and Company Secretary are liable to hold Annual General meetings of the company and to approve audited accounts. This must be done as a matter of urgency.
I have two Gs, both 460 models and am a member of a self styled Southern 460 group who hold lunch meetings and usually a short Euro tour every year. On occasion we have met with the French Mercedes 4X4 Club which is very strong and well organised.
I think some of the GWOA membership troubles are that the membership is very widespread across the UK and elsewhere so any sort of group meetings are difficult to arrange. (There have been valiant attempts in the past to get people together).
The legal responsibilities of the GWOA need to be urgently addressed and thereafter the way forward can be planned.
If I can be be of any help in this process then if time permits count me in. I have no idea what a conference call might be. We are 40 miles from central London and have no internet other than our own satellite dish, so it’s pretty poor!
I'm not too far from you (I'm in East Sussex) so if you have another one of those Southern get togethers let me know and I'll come along.
In fact, post details up on here and I'm sure there are other members who would be interested.
Has everyone here seen the note in the Members Area, under Organisational Items?
Lays out who's who pretty well.
So heres the thing. I wanted to see the 'Org Chart' mentioned by OldEnglish and since it was in the Members area I decided to re-join (like I said, its not so much the money as knowing that it actually supports the 'owners association').
First point is proof that the red flag is automatically re-stored. That will stop some gripes on here about that.
Disappointed though that paying my annual membership has been backdated to when my previous expired in May 2018, so I just paid for <6 months it seems. I have emailed about that seeming unfair to me. Lets see.
But I still cannot see what OE68 is talking about. All the contacts under 'Committee' seem to be old and out of date.
However, the fact that the website has seen posts and updates on other pages means that someone is managing the site, and recently too. They just choose not to respond to the Forum messages? Lets see - hopefully this club/association is not going to be run in the shadows.
Keep the chat coming. I hope to get my G back this weekend. Its been a long wait.
Got your PM and have belatedly responded... didn't seem to get a notification of it landing, it also send that mine hadn't sent but hopefully it has! | 2019-04-24T22:31:32Z | http://gwoa.co.uk/content/agm-2018-0 |
THE ONES WHO DID IT THEIR WAY.
"Of all the factors affecting cotton, the two principal ones are weather and politics. Of the two, the weather is more predictable," said Charles Albert Cannon, who made the brand Cannon a household name and played a major role in the textiles industry.
Yes, Cannon knew his politics. In the 1960s, the U.S. textiles industry was alarmed with the two-price cotton program. American cotton exports that were sold outside the United States at world market prices were cheaper than domestic prices. Cannon was concerned that foreign manufacturers who already had the advantage of purchasing lower-priced cotton were shipping huge quantities of textiles back into the United States.
Unhappy with the arrangement, Cannon battled with Washington for three years and finally won approval from Congress on July 31, 1966, to install a one-price cotton program.
Cannon led Cannon Mills for 50 years, from 1921 to 1971, after his father, founder James Cannon, died in 1921. Like his father, he had personal interest in all aspects of manufacturing, production and distribution of products.
Terence Conran embarked upon his career equipped with a philosophy of good design and quality, offered at a fair price. Over the past 50 years, Conran has created an empire that now includes retail stores, restaurants, and an architectural and design firm, all based on that simple philosophy. He also found time to author about a dozen books, and was knighted along the way.
Conran was 21 years old and had only recently graduated from London's Central School of Arts and Crafts when he set up a furniture-making business in a basement studio in the Notting Hill section of London in 1952. As that business grew, Conran began to display the business acumen that made him a success. Instead of focusing solely on the furniture business, he began to diversify. In 1956, he opened Conran Design Group, which offered a variety of design services, from retail and office design to product and graphic design. In between those two ventures, Conran opened his first restaurant, Soup Kitchen, grew it into a four-unit chain, sold his share and started another restaurant -- The Orrery -- on King's Road.
In 1964, Conran opened the first Habitat store in London. Within 10 years, there were 18 units in the United Kingdom. Meanwhile, Conran had started a second chain, The Conran Shop.
Today, Conran continues to work in the same fashion he has for half a century. The minute he retires from one venture, he starts up two more. In the past few years, Conran opened a new store in New York City, and new restaurants in major cities around the world. Later this year, he will open a store in Tokyo.
Trammell Crow, born and raised in Dallas, began developing warehouse buildings after World War II. In the following decades, his expansive development projects established his company as one of the top commercial real estate management companies in the United States. Today the Trammell Crow Co. oversees more than 500 million square feet of commercial property in the United States and Canada.
The most significant contribution Crow made to the home industry was his Dallas Market Center. Founded in 1957, DMC was the first permanent facility to unite regional wholesalers under one roof. The wholesale trade had been operating independently in separate locations throughout the city.
DMC has grown into a fully integrated exhibition and services company for more than 100,000 professional buyers annually and more than 2,000 permanent tenants.
The center currently encompasses nearly 7 million square feet of permanent and temporary showroom facilities on a 110-acre campus, and produces in excess of 50 markets each year. It is the permanent home of the lighting and floral industries, and it has become a major destination for decorative accessories.
DMC claims to be the largest market center complex in the world, and to serve more industries and produce more market events than any other trade center. The business facilitates more than $7.5 billion of wholesale transactions annually and creates more than $925 million of economic impact for the local economy.
In the 1960s, Harry Cunningham, president and chief executive officer of S.S. Kresge Co., reinvented the role of the retailer by inventing Kmart.
After studying the discount retail market, which was composed mostly of five-and-dimes and stores selling goods for under a dollar, Cunningham urged management at S.S. Kresge to launch Kmart -- and to do so at an aggressive pace.
Under Cunningham's ambitious watch, the retailer opened the first Kmart in 1962. Before the end of the year, 17 more Kmarts would open. By 1966, the retailer operated 162 Kmarts while taking in more than $1 billion in sales. By 1977, about 95 percent of domestic sales at the retailer were generated by the Kmart banner. Subsequently, the company renamed itself Kmart Corp.
Cunningham joined S.S. Kresge in 1928 and worked his way up slowly and steadily. He had a reputation for being persuasive, innovative and charming. Cunningham was named superintendent of stores by 1947 and garnered the title of general vice president by 1957. In 1959 Cunningham was named president and then CEO.
In 1967, Cunningham was named chairman. By then, he had led the company through some of the retailer's most robust growth. Cunningham retired in 1973 and died in 1992.
William T. Dillard, the founder and chairman of Dillard's who died at the age of 87 in February, was described by industry leaders and colleagues as a maverick retailer who was a determined and fierce competitor.
Dillard is best known for taking his regional chain national. In 1938, Dillard opened his first store in Nashville, Ark. During the next 64 years, he grew the chain to more than 340 units. Dillard's success as a retailer was built by offering value pricing -- especially on private-label goods.
Retail consultant Walter Loeb said Dillard's "entrepreneurship created the last major department store chain in the U.S. He was a very dynamic leader. His chain was the first with many innovative ideas, including controls and computerized information."
Dillard was born in Mineral Springs, Ark., in 1914. He graduated from the University of Arkansas with a degree in business. Later, he received a master's degree in business administration from Columbia University.
After World War II, Dillard sold his first store and later opened three stores in Texas. By 1960, he was able to buy the Brown-Dunkin department store business. From there, Dillard continued to expand the chain.
He has been referred to by peers as "the greatest marketer of all time." Leon Dreimann, chief executive officer of Salton Inc., and the products his company has backed have made quite an impact on the housewares industry.
While the Salton brand name was introduced in 1947, when Lew Salton invented the HoTray, the corporation as we know it today was formed in August 1988. Dreimann, one of its founders, has served as both a director and CEO since its inception.
A native of Australia, Dreimann held various sales, marketing and management positions with companies such as Woolworths Ltd., Gillette (Australia) Party Ltd. and Salton Electrical Party Ltd. before coming to the United States.
In addition to packing power behind trusted brands such as Toastmaster and Farberware, Salton has made a name for itself with marketing sensations such as the Juiceman, the George Foreman Grill and, most recently, the relaunch of the time-honored Westinghouse brand with a line of Smart Appliances powered by Microsoft's CE.net platform.
Dreimann currently serves on the board of directors of Amalgamated Appliance Holdings Ltd. in South Africa, as well as on the board of Epods Inc. in Seattle. He also serves as co-chairman of the Housewares Charity Foundation, which in 2000 presented Dreimann with a Lifetime Humanitarian Award.
In 1971, Warren Eisenberg and Leonard Feinstein founded Bed 'n Bath, a chain of 5,000-square-foot textiles stores. It wasn't until many years later, when they hit upon the "beyond" idea, that the concept soared into the stratosphere.
With the addition of housewares, decor, wall art, lighting and other categories, Bed Bath & Beyond became the first home furnishings superstore. (The additions started around 1985, but the name change didn't happen until 1987.) The store became a hit with consumers, who responded to the everyday low prices and exhaustive selection. Clever merchandising and a smattering of thrill-of-the-hunt items keep customers coming back.
Behind the scenes, much of Bed Bath & Beyond's success is attributed to its philosophy of decentralization. Store managers bear much of the responsibility for each store's selection and inventory. With no central distribution centers, merchandise goes directly to the stores -- a cost-saver for the company but a chore for its vendors.
Today Bed Bath & Beyond operates more than 400 stores, some of which measure more than 80,000 square feet.
Not only has Sam Farber been the driving force behind Oxo, Copco and now Wovo, he has also been influential in bringing thoughtful and affordable design to housewares.
Farber graduated from Harvard with a bachelor's degree in economics and founded Copco in 1960. Under Farber, Copco became known for well-designed colorful cookware and teakettles. Farber retired in 1988 after selling Copco to Wilton Industries, but soon was back in the saddle. He created a line of gadgets that were both comfortable to hold and easy to use after watching his wife, who has mild arthritis, have difficulty gripping kitchen tools.
The Good Grips line of rubber-handled utensils became the core product line of Oxo International, which Farber founded in 1990.
Farber sold Oxo to General Housewares in 1992, retiring from active management once again, but working as a consultant to General Housewares, developing the Grilla Gear line of barbecue tools along the way. In 2001, Farber and his son John founded Wovo, which has released a line of sculptural serveware made of heavy plastic.
Farber has lectured on design and mentored design programs at Harvard, M.I.T., Babson and Carnegie Mellon. He is a director of the Corporate Design Foundation, a member of the board of overseers of the Institute of Design at Illinois Institute of Technology, a director of Raw Vision and a trustee of the American Folk Art Museum.
If it were not for the leadership of David Farrell, May Department Stores Co. would not be considered the operations specialist it is today.
Farrell, who retired as chairman and chief executive officer of May Department Stores in 1998 after 42 years with the company, pioneered "matrix buying," which standardized merchandise purchasing across divisions with a central buying arm. The result was a consistent product mix across May's department store chains.
The practice also required vendors to meet stringent sales and profit targets.
In addition, Farrell was known for his aggressive cost-management skills. These disciplines are widely viewed as the reason for the chain's ability to produce steady profits.
"He was able to leverage best practices across the entire organization, which produced a good cash flow [for the company], and solid sales and earnings," said Dave Vernon, vice president and general merchandise manager for home at Burdines, a division of Federated Department Stores.
"Farrell revolutionized a sector of the department store business with a tight, centralized focus on merchandise profitability and logistics," said Frank Foley, president and chief executive officer of textiles supplier CHF Industries.
Edward Finkelstein's leadership reshaped the way department stores sell housewares.
It was the early 1970s, and Finkelstein, then chairman and chief executive officer of Macy's West, was discontent. High-end cosmetics suppliers wouldn't sell to the chain, turning their noses up at the retailer because its price points weren't high enough.
What Macy's West did have was powerhouse housewares brands, and Finkelstein set out to create a dynamic home for those brands. The result was The Cellar, a virtual fashion runway for housewares products that revolutionized the business. The move not only eventually won Macy's West those elusive cosmetics brands, but drew "a whole new set of customers" to the store, Finkelstein told HFN.
In addition to developing The Cellar, "Finkelstein was a champion of quality direct imports," said Sid Doolittle, a retail consultant with McMillan/Doolittle. The Cellar came to be known as an important arena for distinct private-label merchandise.
And Finkelstein led a buying team that has become the stuff of housewares retailing folklore. "It doesn't take a lot of money, but it takes creative genius to make merchandise appetizing," said Finkelstein, referring to the merchandising staff behind The Cellar that one housewares veteran called "the retailing equivalent of the New York Yankees."
Leonard Florence is the recently retired chairman of Syratech Corp., a leading silver manufacturer that also has a strong foothold in the gift industry. By all accounts, he is the heart and soul of the industry.
On the business side of things, Lenny, as everyone in home furnishings knows him, has been credited with consolidating numerous flatware brands and providing a wide platform of merchandise at a range of price points and styles. The man who started out in 1969 with a small business called Leonard Silver over the years built Syratech into one of the top 50 companies in home furnishings.
Lenny is also known for his extraordinary charity work and his compassionate nature. "Lenny has a heart of gold," said Mike Gould, chairman and chief executive officer of Bloomingdale's. "He is very bright, very intuitive. He has a great passion for business and a great compassion for people."
But Gould has another theory on the key to Lenny's success. "What makes Lenny Florence special is his wife, Charlotte. She's the only person who puts up with his mishegases [Yiddish for craziness]."
George Foreman has become a housewares icon. He is known as George -- no last name needed -- in circles ranging from Weight Watchers meetings to retail buying offices. He is recognized less for his prowess in the boxing ring than for a device that squeezes grease from a hamburger.
The former heavyweight champion honed his pitching skills by selling the Lean Mean Fat Reducing Grilling Machine for Salton. The grill became a huge success, consistently appearing among the top-selling items in the housewares industry. The campaign featuring Foreman brought the infomercial to another level and gave the housewares industry a new category -- the electric tabletop grill.
Foreman also broke ground in 1999 by selling Salton the rights to use his name for their small electrics in a deal for nearly $140 million that ranks among the largest endorsement contracts ever signed by a sports figure. Salton has since extended his name to a family of products called George that includes portable appliances with tight profit margins.
Fedders Corp. is the nation's leading supplier of room air conditioners. Sal Giordano Sr., the man who built the company and was instrumental in developing the modern compact cooling device we regard today as essential, is still active in his 90s as corporate chairman.
The son of immigrants, Giordano had to quit school at 17 to earn a living. That was 1927, and he began as a floor boy at Frank J. Quigan Inc., which made handbags and purse frames in Brooklyn, N.Y. By 1934, he was vice president and acting chief executive officer.
In 1945, Quigan acquired Fedders Manufacturing Co., which was founded in 1896 as a metalworking business in Buffalo, N.Y., and then expanded into heat-transfer products. Giordano, CEO of Fedders-Quigan, acted swiftly to design and market room air conditioners, effectively a new category. The company introduced private-label models in 1946 and Fedders units in 1948. By 1951, the industry exceeded 200,000 units.
The growth was accelerated by Giordano, a pioneer in adapting mass-production techniques to make affordable, compact machines that ran on 115 volts. In 1949, the company branched into central air conditioning. He became chairman in 1952 and the company took its present name in 1958. Sal Giordano Jr. succeeded his father as CEO in 1988, and the company has expanded internationally into allied environmental businesses.
Michael Graves made home furnishings history when he designed his famous whistling bird teakettle.
But thanks to the Michael Graves Collection at Target, the designer will be remembered for much more -- as a pioneer in bringing great design to the mass market.
Recognized for modern, shapely forms that bring beauty, simplicity, intelligence and sometimes whimsy to everyday items, Graves Design has designed more than 1,000 consumer products for Alessi, Duravit and Baldinger Architectural Lighting, among others. Products range from furniture, textiles, architectural lighting, hardware and bathroom fixtures to housewares, home decor, leather goods, watches and jewelry.
Having founded his practice in Princeton, N.J., in 1964, Graves has been at the forefront of architectural and interior design for decades. Cited by Paul Goldberger, former critic with The New York Times, as "the most truly original voice American architecture has produced in some time," Graves has received more than 160 design awards, plus the prestigious 1999 National Medal of Arts and the 2001 Gold Medal from the American Institute of Architects. He is the Robert Schirmer Professor of Architecture, Emeritus, at Princeton University, where he taught for nearly 40 years. Graves has received 11 honorary doctorates.
IT GOES LIKE IT GOES.
Lots of color, strong heads and short, targeted articles give Small Business Edge the edge.
Issues in Quality Child Care: a Boys Town Perspective. | 2019-04-20T13:14:26Z | https://www.thefreelibrary.com/%5B0%5D+THE+ONES+WHO+DID+IT+THEIR+WAY-a087358006 |
Altered proteome profiles have been reported in both postmortem brain tissues and body fluids of subjects with Alzheimer disease (AD), but their broad relationships with AD pathology, amyloid pathology, and tau-related neurodegeneration have not yet been fully explored. Using a robust automated MS-based proteomic biomarker discovery workflow, we measured cerebrospinal fluid (CSF) proteomes to explore their association with well-established markers of core AD pathology.
Cross-sectional analysis was performed on CSF collected from 120 older community-dwelling adults with normal (n = 48) or impaired cognition (n = 72). LC-MS quantified hundreds of proteins in the CSF. CSF concentrations of β-amyloid 1–42 (Aβ1–42), tau, and tau phosphorylated at threonine 181 (P-tau181) were determined with immunoassays. First, we explored proteins relevant to biomarker-defined AD. Then, correlation analysis of CSF proteins with CSF markers of amyloid pathology, neuronal injury, and tau hyperphosphorylation (i.e., Aβ1–42, tau, P-tau181) was performed using Pearson’s correlation coefficient and Bonferroni correction for multiple comparisons.
We quantified 790 proteins in CSF samples with MS. Four CSF proteins showed an association with CSF Aβ1–42 levels (p value ≤ 0.05 with correlation coefficient (R) ≥ 0.38). We identified 50 additional CSF proteins associated with CSF tau and 46 proteins associated with CSF P-tau181 (p value ≤ 0.05 with R ≥ 0.37). The majority of those proteins that showed such associations were brain-enriched proteins. Gene Ontology annotation revealed an enrichment for synaptic proteins and proteins originating from reelin-producing cells and the myelin sheath.
We used an MS-based proteomic workflow to profile the CSF proteome in relation to cerebral AD pathology. We report strong evidence of previously reported CSF proteins and several novel CSF proteins specifically associated with amyloid pathology or neuronal injury and tau hyperphosphorylation.
Proteome alterations have been identified in a multitude of pathologies, such as cancer, metabolic disorders, and brain diseases . Several circulating protein markers of neurodegenerative diseases, such as Parkinson’s disease or Alzheimer disease (AD), have been reported , but the ones with consistent findings or of current clinical utility are very few . AD is the most common form of dementia, and there is still an urgent need for the definition of early detection markers as well as for a better understanding of its pathogenesis. In the latter perspective, cerebrospinal fluid (CSF) represents a key biofluid to decipher altered protein levels and pathways in diseases of the central nervous system (CNS) using large-scale proteomic technologies, such as MS-based platforms.
Because of the proximity of CSF to the brain and the presence of proteins in CSF specific to the brain [4, 5], the CSF proteome can reflect the biochemical and metabolic changes in the CNS. In particular, despite the definitive confirmation of the diagnosis of AD being possible today only at brain autopsy, specific CSF peptides and proteins (i.e., β-amyloid 1–42 [Aβ1–42], total tau, and hyperphosphorylated tau [P-tau]) linked to the main hallmarks of AD pathology, such as amyloid plaques and neurofibrillary tangles, can complement clinical examination for the diagnosis of AD [6, 7].
There is now strong evidence that suggests the development of AD pathology begins years to decades prior to the onset of the first clinical signs. Thus, on one hand, elderly persons with normal cognition may already have cerebral AD pathology and be at the preclinical stage of the disease ; on the other hand, subjects with cognitive deficits may present with cognitive impairment suggesting AD but not primarily or only partially related to AD pathology. New research criteria consider AD as a biological continuum across the clinical spectrum from asymptomatic stage to advanced dementia and emphasize the utility of biomarkers of AD pathology for an accurate diagnosis, in particular at the preclinical and prodromal disease stages [8–10]. In this respect, endophenotype approaches have been proposed as innovative ways to better address AD stages using proxy measures such as the concentrations of the aforementioned CSF markers of core AD pathology .
Several studies have characterized the CSF proteome with MS but mainly using sample pools and/or a limited number of samples [12–14]. Because of technical constraints such as limited sample throughput , studies in larger clinical cohorts using MS-based proteomics are indeed limited [16–21]. In recent years, our group and other groups [23, 24] have demonstrated that MS-based proteomics enables protein biomarker discovery in large numbers of human clinical samples, providing increased statistical power and result robustness [21, 22, 25]. Although most of these studies were performed with plasma or serum samples , the analysis of the CSF proteome and its alteration using MS-based proteomics in larger cohorts has been mostly unexplored.
Our aim in this study was to investigate the CSF proteome in relation to the core elements of CSF-defined AD pathology in older adults (n = 120) with normal and impaired cognition using MS-based shotgun proteomics (Fig. 1). We evaluated whether the CSF proteome could relate to AD pathology, defined as the combined presence of both amyloid pathology and tau pathology. We then explored more deeply the relationships of the quantified proteins in CSF with well-established biomarkers of amyloid pathology, neuronal injury, and tau hyperphosphorylation (i.e., Aβ1–42, tau, and tau phosphorylated at threonine 181 [P-tau181], respectively).
One hundred twenty community-dwelling participants were included in this study, of whom 48 were cognitively healthy volunteers and 72 had mild cognitive impairment (MCI) (n = 63) or mild dementia of AD type (n = 9) . Diagnosis of MCI or dementia was based on neuropsychological and clinical evaluation and made by a consensus conference of psychiatrists and/or neurologists as well as neuropsychologists prior to inclusion in the study. The participants with cognitive impairment were recruited from among outpatients who were referred to the Memory Clinics, Departments of Psychiatry, and Department of Clinical Neurosciences, University Hospitals of Lausanne, Switzerland. They had no major psychiatric disorders or substance abuse or severe or unstable physical illness that might contribute to cognitive impairment, had a Clinical Dementia Rating (CDR) score > 0, and met the clinical diagnostic criteria for MCI or AD mild dementia according to the recommendations of the National Institute on Aging-Alzheimer’s Association . In the current study, nine subjects met criteria for probable AD dementia. Because there is a clinical continuum between MCI and mild dementia, and because the participants with cognitive impairment were patients from memory clinics recruited in the same way regardless of MCI or mild dementia classification, these subjects were grouped and labeled as cognitively impaired with CDR > 0 (Table 1). The control subjects were recruited through journal announcements or word of mouth and had no history, symptoms, or signs of relevant psychiatric or neurologic disease and no cognitive impairment (CDR = 0). All participants underwent a comprehensive clinical and neuropsychological evaluation, structural brain imaging, and venous and lumbar punctures . Magnetic resonance imaging (MRI) and computed tomographic scans were used to exclude cerebral pathologies possibly interfering with cognitive performance.
Neuropsychological tests were used to assess cognitive performance in the domains of memory , language, and visuoconstructive functions. The Mini Mental State Examination was used to assess participants’ global cognitive performance. Depression and anxiety were assessed using the Hospital Anxiety and Depression Scale . The psychosocial and functional assessments included activities of daily living and instrumental activities of daily living, the Neuropsychiatric Inventory Questionnaire, and the Informant Questionnaire on Cognitive Decline in the Elderly , and these were completed by family members of the participants. All tests and scales are validated and widely used in the field.
Lumbar punctures were performed between 8:30 a.m. and 9:30 a.m. after overnight fasting. A standardized technique with a 22-gauge “atraumatic” spinal needle and a sitting or lying position was applied . A volume of 10–12 ml of CSF was collected in polypropylene tubes. Routine cell count and protein quantification were performed. The remaining CSF was frozen in aliquots (500 μl) no later than 1 hour after collection and stored at − 80 °C without thawing until experiment and assay.
CSF samples were prepared using a highly automated shotgun proteomic workflow as previously described and isobaric tags for relative quantification of proteins. Reversed-phase LC-MS/MS was performed with a hybrid linear ion trap-Orbitrap Elite and an UltiMate 3000 RSLCnano System (Thermo Scientific, Waltham, MA, USA) as recently described . Protein identification was performed against the human UniProtKB/Swiss-Prot database (08/12/2014 release). All details are provided in Additional file 1: Supplementary Methods.
The measurements were performed using commercially available enzyme-linked immunosorbent assay kits and TaqMan assays as described in Additional file 1: Supplementary Methods.
A pathological AD CSF biomarker profile was defined as CSF P-tau181/Aβ1–42 ratio > 0.0779 (i.e., “high” ratio for positive CSF profile of AD pathology), based on clinical study site data and in line with previous work (i.e., 0.08) . The cutoff optimized the Youden index of the ROC curve for the prediction of CDR categories (CDR = 0 versus CDR > 0) as previously reported , where the cutoff for CSF P-tau181/Aβ1–42 ratio was further confirmed to be a highly significant predictor of cognitive decline.
Six CSF samples were removed because of aberrant values, leaving CSF proteomic data available for 114 subjects (exclusion of those 6 subjects did not induce bias on the overall population characteristics) (see Additional file 1: Table S1)). In total, 790 CSF proteins were quantified.
For exploration of CSF proteins relevant to AD pathology (see below), proteins with > 5% missingness were excluded, leaving 541 CSF proteins. The remaining missing data (5% or less per protein) were imputed by randomly drawing a value between the observed range of biomarker values. Log2 of the protein ratio fold changes were scaled to mean zero and SD of 1 prior to statistical analyses. Calculation and statistics were performed with the R version 3.3.2 statistical software (http://www.r-project.org/).
where positive CSF profile of AD is defined by categorizing the CSF P-tau181/Aβ1–42 ratio into two groups: P-tau181/Aβ1–42 > 0.0779 for AD CSF biomarker profile (or “high”) and P-tau181/Aβ1–42 ≤ 0.0779 for non-AD CSF biomarker profile (or “low”). p Values were corrected for multiple testing using the Benjamini-Hochberg procedure. Box plots were produced for the significant hits presenting false discovery rate (FDR) ≤ 5%.
A tenfold cross-validation process was performed for each LASSO analysis using the glmnet package , which allows estimating the confidence interval of the misclassification error for each value of the regularization parameter λ. The LASSO analyses were repeated 100 times (1000 times for the reference models). The model that minimized the upper limit of the cross-validated misclassification error confidence interval across the 100 runs with less than 20 features (when possible) was selected. The results were formally tested for significance against the reference model using accuracy with a McNemar test. The group differences for the CSF proteins selected in the best models were graphically illustrated in box plots and assessed using t test statistics. In addition, Kruskal-Wallis test statistics produced comparable results (see Additional file 1: Tables S2 and S3). Because the tests were applied only to the proteins selected with LASSO, p values obtained from these analyses were not corrected for multiple testing.
Correlation analysis was performed on protein fold changes of all 790 quantified proteins using Pearson’s correlation coefficient and Bonferroni correction for multiple comparisons. In addition, Spearman’s correlation analyses produced comparable results (see Additional file 1: Tables S4–S6). Several bioinformatics tools and resources were used for analysis and protein annotation (i.e., Database for Annotation, Visualization and Integrated Discovery [DAVID] 6.8 , UniProt tissue annotation database , Gene Ontology database , Kyoto Encyclopedia of Genes and Genomes [KEGG] database , tissue atlas , and Venny [http://bioinfogp.cnb.csic.es/tools/venny/]).
Demographics and clinical characteristics of the patient cohort are detailed in Table 1. The cognitively impaired subjects (CDR > 0) were older and less educated and had a higher prevalence of APOE ε4 genotype than the cognitively intact group (CDR = 0). In cognitive impairment, CSF Aβ1–42 was lower, whereas CSF tau, CSF P-tau181, and CSF P-tau181/Aβ1–42 were all higher. MS-based proteomic analyses were performed in the CSF of the 120 individuals (Fig. 1). In total, we measured 790 proteins in CSF. Of those, 541 proteins presented < 5% missing values in 114 subjects (see the Methods section above).
The following classification analyses of the CSF P-tau181/Aβ1–42 ratios were aimed at separating 39 patients with high-expression AD CSF biomarker profiles (i.e., P-tau181/Aβ1–42 > 0.0779) from 75 low-expression profile subjects in the complete analysis set, regardless of the clinical diagnosis. Then, the analyses were performed on the subset of cognitively impaired patients, where 38 and 28 subjects had high and low expression of AD CSF biomarker profiles, respectively.
First, we explored whether the CSF proteome presents specific alterations in AD, endophenotypically defined a priori as a CSF P-tau181/Aβ1–42 ratio > 0.0779 (see the Methods section above). In the whole sample, group comparisons (i.e., “high” when P-tau181/Aβ1–42 > 0.0779 and “low” when P-tau181/Aβ1–42 ≤ 0.0779) revealed 22 CSF proteins with significant differences between AD versus non-AD CSF biomarker profiles after correction for multiple testing using the Benjamini-Hochberg procedure at FDR ≤ 5% (Fig. 2a and Additional file 1: Table S7). Similarly, in the subset of cognitively impaired subjects (see the Methods section above), group comparisons provided ten CSF proteins with significant differences (Fig. 2b and Additional file 1: Table S8). All of these 10 proteins were already present among the 22 proteins (Fig. 2) previously identified in the whole sample.
As a second exploratory approach and ability assessment of the CSF proteome to identify AD, we used LASSO logistic regression to build mathematical models able to classify AD pathology, again defined a priori as a CSF P-tau181/Aβ1–42 ratio > 0.0779 (see the Methods section above). In the whole sample, the benchmark reference model for classification of CSF P-tau181/Aβ1–42 included age and presence of the APOE ε4 allele. Its prediction accuracy was 78.3% (as compared with the accuracy of a majority class prediction of 65.8%). CSF protein biomarkers were indeed able to improve the classification of AD CSF biomarker profile with respect to the reference model. The best model accuracy was 100% (McNemar p value 3.35 × 10− 7). It included 26 CSF proteins (from the 541 provided as input) in addition of age and presence of the APOE ε4 allele. Only seven selected CSF proteins displayed significant group comparison differences, i.e., 14-3-3 protein ζ/δ (1433Z) (p = 1.69 × 10− 3), SPARC-related modular calcium-binding protein 1 (SMOC1) (p = 5.26 × 10− 5), KICSTOR complex protein SZT2 (SZT2) (p = 5.47 × 10− 4), fatty acid-binding protein, heart (FABPH) (p = 8.70 × 10− 4), chitinase-3-like protein 1 (CH3L1) (p = 1.23 × 10− 3), neuromodulin (NEUM) (p = 3.40 × 10− 3), and keratin, type I cytoskeletal 10 (p = 0.025) (Additional file 1: Figure S1a). Many of these CSF proteins were correlated with each other (Additional file 1: Figure S2). Six of the seven proteins (i.e., 1433Z, SMOC1, SZT2, FABPH, CH3L1, and NEUM) were reported in the exploratory group comparisons (Fig. 2a).
In the subset of cognitively impaired subjects (see the Methods section above), the benchmark reference model to classify AD CSF biomarker profile included age, gender, years of education, and presence of APOE ε4 allele, with a prediction accuracy of 77.8% (majority class prediction of 57.6%). In cognitive impairment, inclusion of CSF protein biomarkers again improved significantly the prediction accuracy to 100% (McNemar p value of 0.0003). In total, 18 CSF proteins (from the 541 provided as input) were included in this best model in addition to gender and presence of the APOE ε4 allele. Among those proteins, four displayed significant differences between the groups: 1433Z (p = 4.04 × 10− 5), SMOC1 (p = 5.49 × 10− 5), γ-synuclein (p = 1.19× 10− 3), and macrophage colony-stimulating factor 1 receptor (p = 0.013) (Additional file 1: Figure S1b). Again, several correlations were observed between the CSF proteins retained in the model (Additional file 1: Figure S3), suggesting that models with fewer variables may still provide high classification performance. Two of the four proteins (i.e., 1433Z and SMOC1) were reported in the exploratory group comparisons (Fig. 2b). The perfect performance to classify the participants with AD pathology indicated that the reported models were very possibly overfitting the data.
Next, we separately and more specifically studied the associations of all 790 quantified CSF proteins (no minimal missing value criteria applied) with CSF markers of core AD pathology (i.e., Aβ1–42, tau, and P-tau181). Four proteins—cannabinoid receptor 1 (CNR1, correlation coefficient [R] = 0.3929), neuroendocrine convertase 2 (NEC2, R = 0.3818), neuronal pentraxin-2 (NPTX2, R = 0.3868), and somatostatin (SMS, R = 0.4188)—showed an association with CSF Aβ1–42, which was significant (p value ≤0.05) after Bonferroni correction for multiple testing (Fig. 3a). We found 50 CSF proteins correlated with CSF tau (Fig. 3b) and 46 associated with CSF P-tau181 (Fig. 3c) in a significant manner after Bonferroni correction, of which 41 were in common (Fig. 3d). The five strongest correlations with CSF tau were CSF neurogranin (NEUG), sodium/potassium-transporting ATPase subunit α-2 (AT1A2), brain acid soluble protein 1 (BASP1), 1433Z, and NEUM. The five strongest correlations with CSF P-tau181 were CSF AT1A2, disintegrin and metalloproteinase domain-containing protein 10 (ADA10), NG,NG-dimethylarginine dimethylaminohydrolase 1 (DDAH1), NEUG, and SMOC1. In particular, CSF NEUG and NEUM , two synaptic proteins, were positively correlated with CSF tau (R = 0.6721 and 0.5287, respectively) and P-tau181 (R = 0.5074 and 0.4741, respectively) (Additional file 1: Figure S4). All the observed associations are summarized in the chord diagram of Additional file 1: Figure S5. With the exception of ectonucleotide pyrophosphatase/phosphodiesterase family member 2, which negatively correlated with tau, all reported correlations were positive.
Of the 59 proteins displaying correlations in those analyses (Fig. 3d), most are expressed in the brain, in particular in the fetal brain cortex and Cajal-Retzius cells (Fig. 4a). Moreover, and based on the tissue-based map of the human proteome , seven proteins (i.e., SLIT and NTRK-like protein 1, NEUM, NEUG, cell adhesion molecule 2, lymphocyte antigen 6H [LY6H], transgelin-3 [TAGL3], and protein lifeguard) are brain-enriched (i.e., having at least fivefold higher mRNA levels in the brain as compared with all other tissues) and a total of 22 proteins have elevated gene expression in the brain (i.e., in addition to the seven above, AT1A2, immunoglobulin superfamily containing leucine-rich repeat protein 2 [ISLR2], sodium/potassium-transporting ATPase subunit α-3 [AT1A3], BASP1, CH3L1, CNR1, ephrin type-B receptor 6 [EPHB6], NPTX2, paralemmin-1, NEC2, proline-rich transmembrane protein 2, SMOC1, VPS10 domain-containing receptor SorCS1, SMS, and V-set and transmembrane domain-containing protein 2A).
In Fig. 4b, we identified the myelin sheath as an enriched cellular component. Of the 59 CSF proteins correlating with Aβ1–42, tau, and/or P-tau181, 9 proteins pertain to the myelin sheath: TAGL3, malate dehydrogenase, cytoplasmic (MDHC), heat shock cognate 71 kDa protein (HSP7C), AT1A2, phosphoglycerate mutase 1 (PGAM1), superoxide dismutase [Cu-Zn] (SODC), AT1A3, pyruvate kinase PKM (KPYM), and L-lactate dehydrogenase B chain (LDHB). Those nine proteins were associated with tau and/or P-tau181. Pathway enrichment analysis using the KEGG database did not yield any significant results (data not shown).
In the present study, we used MS-based shotgun proteomics to measure the CSF proteomes of 120 older adults and investigate broad CSF protein relationships with core AD pathology. Overall, human CSF proteome coverage was composed of 790 proteins. Four CSF proteins were associated with CSF Aβ1–42 levels, 50 proteins with CSF tau, and 46 proteins with CSF P-tau181 levels. The CSF proteins related to Aβ1–42 were different from those associated with tau or P-tau181.
To explore the relevance of the CSF proteome to AD pathology, we applied an approach that was unbiased by the clinical diagnosis and defined endophenotypically the disease as the presence of “core” AD pathology (i.e., the combined presence of cerebral amyloid and tau pathology). Unbiased classification based on markers of cerebral amyloid and tau pathology and neuronal injury has been proposed for use across the clinical stages . We first used two exploratory approaches to evaluate and select CSF proteins that were able to stratify subjects according to levels of CSF P-tau181/Aβ1–42. Using LASSO logistic regression, we observed that CSF proteins could significantly increase the classification accuracy of non-AD versus AD CSF biomarker profiles as compared with models based only on clinical parameters and the presence of the APOE ε4 allele. Nonetheless, those statistical models relying on CSF proteins might be overfitted and should be interpreted with caution; class imbalance also affected their strict performance. Overall, with both exploratory analyses, we identified specific CSF proteome alterations that are related to AD pathology and may provide novel mechanistic insights. Assessing the whole sample and the subgroup of subjects with cognitive impairment, we could decipher the strong contribution of some CSF proteins, such as SMOC1 and 1433Z (Fig. 2 and Additional file 1: Figure S1). On the basis of this performance, we specifically investigated associations of CSF proteins with individual most validated biomarkers of amyloid pathology, neuronal injury, and tau hyperphosphorylation (i.e., Aβ1–42, tau, and P-tau181, respectively) to elaborate further on the involved mechanisms. Most of the correlations of CSF proteins were with CSF tau and P-tau181 (Fig. 3d), suggesting the CSF proteome alterations to be more representative of tau pathology than amyloid pathology. Four CSF proteins not related to tau and P-tau181 were associated with CSF Aβ1–42 levels, overall indicating distinct proteome alterations related to either amyloid pathology or tau-related neurodegeneration. The majority of these proteins were brain-enriched proteins, including synaptic proteins, and proteins involved in reelin-producing cells and the myelin sheath. Comparison of the proteins found with different levels in AD versus non-AD CSF biomarker profiles and in the models able to classify CSF-defined AD pathology with those associated with CSF Aβ1–42, tau, and P-tau181 in Venn diagrams (Additional file 1: Figures S6 and S7, respectively) revealed mixed overlaps. Interestingly, the 22 proteins with different levels in AD versus non-AD CSF biomarker profiles (Fig. 2a) were all associated with CSF tau; a large majority were associated with CSF P-tau181; but none were associated with CSF Aβ1–42 (Additional file 1: Figure S6). Nevertheless, beyond those 22 proteins, 37 proteins, still representing the majority of CSF proteins associated with CSF Aβ1–42, tau, and P-tau181, were not evidenced as having a relationship to AD, suggesting they might represent more general makers of amyloid pathology, neuronal injury, and tau hyperphosphorylation.
The CSF proteins CNR1, NEC2, NPTX2, and SMS were associated with CSF Aβ1–42 in our study (Fig. 3a). CNR1 and the endocannabinoid system were previously identified as potential targets for treatment of neurological disorders and AD in particular [50, 51]. In line with our results, higher NPTX2, a proinflammatory protein involved in synaptic plasticity, was previously associated with higher CSF Aβ1–42 in the Alzheimer’s Disease Neuroimaging Initiative study . NEC2, also known as prohormone convertase 2, is essential to the processing of pro-islet amyloid polypeptide . Its role in the processing of hormones and in particular of neuropeptide precursors in the human cortex has been established, but the link with SMS deficiency in AD, for instance, was not confirmed . Relevant to our observations, neuropeptide SMS is known to be decreased in the CSF of patients with AD and to regulate Aβ1–42 via proteolytic degradation . Together, these findings indicate amyloid-related changes in the CSF proteome that may be particularly relevant for early cerebral AD pathology as well as for disease-modifying interventions targeting amyloid and starting at preclinical disease stages.
We found that CSF Aβ1–42, tau, and P-tau181 were mainly associated with CSF proteins enriched in brain tissue (Fig. 4a), and this despite the important proportion (about 80%) of proteins in CSF originating from blood . In particular, some are expressed in the fetal brain cortex. We observed positive correlations between CSF tau and/or P-tau181 with 13 CSF proteins (i.e., calmodulin, fructose-bisphosphate aldolase A [ALDOA], DDAH1, HSP7C, KPYM, LDHB, MDHC, PGAM1, phosphatidylethanolamine-binding protein 1 [PEBP1], stathmin, TAGL3, thioredoxin, and 1433Z) known also to be present in reelin-producing Cajal-Retzius cells. In early AD, a massive decline of the number of Cajal-Retzius cells was previously described , suggesting a link between their loss, reduction of reelin, impairment of synaptic plasticity, amyloid plaque deposition, and neurofibrillary tangle formation . Interestingly, we also revealed the involvement of nine CSF proteins (i.e., AT1A2, AT1A3, HSP7C, KPYM, LDHB, MDHC, PGAM1, SODC, and TAGL3), again positively correlating with CSF tau and/or P-tau181, being specifically part of the myelin sheath. Although amyloid plaques and neurofibrillary tangles likely induce neuronal and synaptic loss, myelin alteration may also participate in the development of AD dementia. Myelin content changes in the white matter measured with MRI have been linked to CSF AD biomarkers (i.e., lower concentrations of Aβ1–42 and higher concentrations of tau and P-tau181), but mainly in association with amyloid pathology . Our results, including associations of AT1A2 and KPYM with both tau and P-tau181, may suggest an underestimated connection between tau-related neurodegeneration and (de)myelination. These specific alterations provide new insights into the disease pathology and deserve further exploration.
Several single relationships between CSF proteins and Aβ1–42, tau, and/or P-tau181 levels in our study (Fig. 3) have previously been reported. A first example is the synaptic protein NEUG, which was previously proposed as a novel candidate CSF biomarker for AD and prodromal AD; high CSF NEUG was shown to predict future cognitive decline and to be more specific for AD than tau . In addition, CSF NEUG was reported to be increased in AD and positively correlated with CSF tau and P-tau . In line with our observations, positive associations were identified with NEUM for both tau and P-tau in CSF . BASP1, like NEUM, is a presynaptic membrane protein participating in axon guidance, neurodegeneration, and synaptic plasticity and was found to be significantly downregulated in AD versus control brain samples . Our findings of significant association of CSF BASP1 with both CSF tau and P-tau warrant further investigations. Mutations in the ADAM10 gene, which encodes the major α-secretase responsible for cleaving APP, have previously been identified in families with late-onset AD . In our study, protein ADA10, which is encoded by ADAM10, was only significantly associated with CSF P-tau181. To the best of our knowledge, such an association between those CSF proteins has not been observed before .
Further and broader cross-validation of our findings can be made by comparing them with those of a recent study investigating CSF proteins associated with CSF AD biomarkers in 58 cognitively healthy men using an aptamer-based technology (i.e., SOMAscan; SomaLogic, Boulder, CO, USA) . Of the 59 CSF proteins associated with CSF biomarkers of core AD pathology that we report, 28 were also measured with the SOMAscan in that prior study; of those, 22 proteins (i.e., 78.6% overlap) were correlated with CSF Aβ1–42, tau, and/or P-tau , confirming part of our observations in an independent cohort and using a different technology. Those proteins are ALDOA, dynein light chain 2, cytoplasmic, polyubiquitin B, ISLR2, EPHB6, MDHC, SH3 domain-binding glutamic acid-rich-like protein, PEBP1, NPTX2, chromogranin A, cytochrome c, SMS, 1433Z, LDHB, SMOC1, 14–3-3 protein β/α, spondin-1, FABPH, transmembrane emp24 domain-containing protein 4, PGAM1, cytokine-like protein 1, and HSP7C.
Altogether, our shotgun MS-based proteomic approach was confirmed to provide relevant findings and to be complementary to alternative proteomic technologies. In this perspective, the identification of novel and strongly significant associations of CSF proteins with CSF biomarkers of AD core pathology in our study is of specific interest. In particular, proteins AT1A2 and KPYM implicated in energy production, as well as 1433Z, DDAH1, and SMOC1, showing some of the strongest associations with tau and/or P-tau181 in addition to NEUG and NEUM, could appear relevant. Our results in a relatively large group of subjects including both participants with cognitive impairment and healthy volunteers are therefore encouraging. Sample fractionation would have allowed deeper proteome coverage but with a throughput incompatible with the analysis of 120 clinical samples in a reasonable time frame. The proteins we have identified would deserve additional research.
Using an MS-based proteomic workflow, we have quantified a number of CSF proteins in 120 older adults with normal cognition and with cognitive impairment. We report strong evidence of known and new CSF proteins related to amyloid pathology, neuronal injury, and tau hyperphosphorylation. Although we confirmed several previous findings of CSF proteins related to AD pathology, our work reveals a large number of additional CSF proteome alterations involving in particular reelin-producing cells and the myelin sheath.
We thank Barbara Moullet and Domilė Tautvydaitė for their assistance with and contributions to data acquisition.
This study was supported by grants from the Swiss National Research Foundation (to JP) (SNF 320030_141179) and funding from the Nestlé Institute of Health Sciences.
LD was responsible for study conception and design, acquisition of data, supervision of data acquisition, analysis of data, interpretation of the analysis, and writing of the manuscript. ANG was responsible for acquisition of data and critical revision of the manuscript. JW was responsible for study conception and design, the statistical analysis plan, statistical analysis, drafting of the statistical analysis section, and critical revision of the manuscript. OC was responsible for statistical analysis and critical revision of the manuscript. JC was responsible for acquisition of data and critical revision of the manuscript. AO was responsible for acquisition of data and critical revision of the manuscript. HH was responsible for supervision of data acquisition and critical revision of the manuscript. MK was responsible for supervision of data acquisition and critical revision of the manuscript. EM was responsible for the statistical analysis plan and critical revision of the manuscript. IS was responsible for interpretation of the analysis and critical revision of the manuscript. GLB was responsible for study conception and design, the statistical analysis plan, critical revision of the manuscript, and overall study supervision. JP was responsible for study conception and design, interpretation of the analysis, critical revision of the manuscript, and overall study supervision. All authors read and approved the final version of the manuscript.
The institutional ethics committee of the University Hospitals of Lausanne approved the clinical protocol (no. 171/2013), and all participants or their legally authorized representatives signed written informed consent forms.
LD, ANG, OC, JC, MK, EM, and IS are employees of Nestlé Institute of Health Sciences. JW is an employee and shareholder of Precision for Medicine and received consultation honoraria from Nestlé Institute of Health Sciences. AO and HH report no competing interests. GLB is an employee of Nestlé Institute of Health Sciences, an unpaid scientific advisor of the H2020 EU-funded project PROPAG-AGEING whose aim is to identify new molecular signatures for early diagnosis of neurodegenerative diseases, and receives research support related to cognitive decline from the National Institute on Aging of the National Institutes of Health. JP received consultation honoraria from Nestlé Institute of Health Sciences. | 2019-04-23T19:57:40Z | https://alzres.biomedcentral.com/articles/10.1186/s13195-018-0397-4 |
(1) This transmits revised IRM 8.19.13, Docketed and Department of Justice Cases.
(1) Revised IRM 8.19.13.1.1 to incorporate Interim Guidance AP-08-0415-0002, Mandatory Appeals TEFRA Team (ATT) Referrals, to provide guidance on use of ATT services.
IRM 8.19.13 dated October 31, 2013 is superseded. Incorporated Interim Guidance Memorandum AP-08-0415-0002, Mandatory Appeals TEFRA Team (ATT) Referrals, which was issued April 7, 2015 , into this IRM..
All guidance in this section of the IRM concerning the Campus TEFRA Functions (CTFs) is for cases controlled on the Partnership Control System (PCS). The CTFs only work with key cases and partners controlled by PCS. All references in this IRM to appeals officers (AO) applies equally to appeals team case leaders (ATCL) and any actions required by appeals team managers (ATM) are performed by appeals team case leaders as to their own cases.
Appeals employees must follow the work request procedures to request ATT assistance. Use of the ATT is mandatory for agreement package, closing package, and FPAA preparation. Follow the work request procedures in IRM 8.19.1.1.1, Appeals TEFRA Team (ATT). Also see detailed procedures for using the ATT on their ATT SharePoint site. A link to the site is found on the Appeals TEFRA website.
An adjustment of partnership items with respect to an Administrative Adjustment Request (AAR). Only the TMP on behalf of the partnership can file such a petition (IRC 6228). See IRM 8.19.7 for procedures to follow in AAR cases.
Generally, receipt, assignment, and consideration of docketed cases will be the same as those for non-docketed cases. IRM 8.19.10.
The Tax Court Rules for actions filed with the Tax Court in TEFRA cases require special notifications to the court, the TMP, and unagreed parties. Carefully coordinate the processing of settlement documents with the associate area counsel attorney, as set out in IRM 8.19.13.2.9, IRM 8.19.13.2.10, and IRM 8.19.13.2.11.
Refer to IRM 8.19.10 and IRM 8.20 for procedures for the receipt of TEFRA partnership cases by APS and other Appeals employees responsible for processing duties.
These procedures include instructions for ACDS processing of docketed cases and notifying the key case CTF.
Procedures for mailing closing packages and closing docketed cases are contained later in IRM 8.19.13.
The AO should request work from the TCS by preparing Form 3608 (Request for Tax Computation Specialist (TCS) Service). Counsel attorneys can also use a Form 3608, or they may use Form 1734, or a memorandum with an attachment detailing the settlement amounts, e.g. Counsel Settlement Memorandum or Decision Document.
The request for audit work should specify whether Tax Court Rule 248(a) or 248(b) is being used. If Tax Court Rule 248(c) will apply, the AO will follow the guidelines in IRM 8.19.13.2.11.
For cases settled using Tax Court Rule 248(a), the TMP signs a stipulated decision to bind all partners in the key case to a settlement. No agreement forms are prepared or mailed to any partners.
All of the participating partners do not object to the granting of the Commissioner’s motion for entry of decision.
As agreement forms are only needed from the participating partners, because the case is docketed, and because there are time frames that must be followed under the Tax Court Rules, it is recommended that Appeals mail the agreement forms to the participating partners.
Refer to the "Definitions" section below for more information on who is a participating partner.
When Tax Court Rule 248(b) is being used, as Appeals will be mailing the agreement forms to the participating partners, the agreement forms and the transmittal letters will have to be prepared by Appeals. The request for audit work should specify whether the TCS should prepare them.
In this situation, dialogue will be required between the ATM of both the AO and the TCS as to specifically what the TCS will prepare.
The AO should identify any special circumstances on the Form 3608, including parent-subsidiary relationships. The AO is ultimately responsible for the accuracy and completeness of the agreement forms and the transmittal letters.
The request for audit work should clearly identify if there are any penalties or affected items.
An exception is when the case is a no-change, in which case Form 4605–A and Form 886–Z are not prepared. See IRM 8.19.10.4.9 and IRM 8.19.11.13 for more information on no-change cases.
If Tax Court Rule 248(b) is being used, the TCS will prepare the Schedule of Adjustments page of Form 870-PT(AD) or Form 870-LT(AD).
See IRM 8.19.11.6.1, IRM 8.19.11.6.2, and IRM 8.19.11.6.3, respectively, for guidance in preparing Form 4605–A, Form 886–Z, and the Schedule of Adjustments page (if applicable for Tax Court Rule 248(b) cases).
The TCS will also begin preparing the closing package to the CTF (including the Form 3210) if other documents are also being prepared. See IRM 8.19.13.2.4. If no other documents are being prepared, the AO is responsible for preparing the closing package and the Form 3210.
Depending upon local procedures, the TCS will compute the revised dollar value for the key case using Exhibit 8.19.10–1.
If Tax Court Rule 248(b) is being used, Appeals should be mailing the agreement forms to the participating partners. The TCS may be asked to prepare the agreement forms and the transmittal letters to the participating partners. For more information, refer to the dialogue needed under "Request for Audit Work" in IRM 8.19.13.2.2.
A TEFRA closing package is a group of documents that is prepared and assembled after a TEFRA partnership case is resolved. The closing package is mailed to the key case CTF to associate with the tax returns of the partners in the TEFRA partnership in order that the tax resulting from their share of the adjustments made to the TEFRA partnership return are computed and assessed in a timely manner. If the ATT is used, the package will be electronically transmitted using the secure server.
The examiner is required to link a TEFRA partnership case on PCS when the case is still in process 60 days after the case goes into status 12. If the case is not controlled on PCS, the CTF cannot be used to mail the agreement forms as the CTFs only work with cases that are controlled on PCS. The agreement forms would have to be mailed by Appeals.
The TCS will begin preparing the closing package to the CTF (including the Form 3210) if other documents are also being prepared. If no other documents are being prepared, the AO is responsible for preparing the closing package and the Form 3210.
If at the time that the TCS begins preparing the closing package and the Form 3210, some of the documents have not as yet been prepared by the AO (for example, the ACM or Form 5402), the AO will complete the preparation of the closing package.
Form 3210 may be generated using APGolf by going to the TEFRA category and selecting "3210 - Closing Package." Once the form is saved as a WORD document, it should be edited to remove any information that does not apply and to add any additional information.
The AO is responsible for reviewing the closing package and is ultimately responsible for the accuracy and completeness of the documents.
For cases resolved using Tax Court Rule 248(a) (by either Appeals or Counsel), refer to Exhibit 8.19.13-1 for a sample Form 3210 that lists the documents needed for the closing package.
For cases resolved using Tax Court Rule 248(b) (by either Appeals or Counsel), when the AO has secured agreement forms from the participating partners, refer to Exhibit 8.19.11–11 for a sample Form 3210 that lists the documents needed for the closing package. The “Remarks” section should note that the case is docketed and include the docket number.
For cases resolved using Tax Court Rule 248(b) (by either Appeals or Counsel), to reflect the entered decision that binds the partners other than the participating partners, refer to Exhibit 8.19.13-1 for a sample Form 3210 that lists the documents needed for the closing package.
The ATT will use Form 14298 and electronically transmit the packages for cases that are tried in the Tax Court or are settled by Associate Area Counsel, for cases that are tried in the Tax Court and are then appealed, for cases that are tried in the Tax Court and there is a final decision by the Appellate Court or the Supreme Court, and for Department of Justice cases.
An IRC 6404(g) key case comment should be included on the Form 3210 in the "Necessary Actions" section. See IRM 8.19.1.7 and IRM 8.17.6.9. For example, if the earliest notice that was issued was a 60-day letter that was dated March 15, 2006, enter "60-day letter" and "March 15, 2006." There may be more than one notice for the same return and more than one IRC 6404(g) notice date.
The AO, secretary, clerk, or APS (as determined locally) will make photocopies of the documents to be included in the completed closing package.
Ensuring all documents listed on the Form 3210 are attached.
Sending the completed package to the CTF by controlled mail.
The Tax Court adopted special rules to conclude partnership proceedings when the parties to the action have entered into a settlement agreement or consistent agreement.
The importance of the rules is underscored by the fact that the Tax Court considers it likely that a substantial majority of partnership actions will be settled by the parties prior to trial.
The Tax Court Rules include comprehensive procedures for settlement agreements, service of papers, duties of the TMP, definitions, and other areas relating to partnership actions.
The Tax Court’s Rules of Practice and Procedure are found on their website.
Tax Matters Partner: Per Tax Court Rule 240(b)(4), the person who is the tax matters partner under IRC 6231(a)(7) and who under these rules is responsible for keeping each partner fully informed of the partnership action.
Party to the Action: Per Tax Court Rule 247, each person who was a partner at any time during the partnership taxable year provided that partner has an interest in the outcome of the action and whose partnership items haven’t been converted to nonpartnership items. The TMP is treated as a party to every partnership action whether or not the TMP has an interest in the proceeding. The TMP is still a party to the action even if the TMP executed a settlement agreement converting his partnership items to nonpartnership items.
Participating Partners: Under Tax Court Rule 247, the partner(s) who filed the petition and other partners who filed a notice of election to intervene or a notice of election to participate. The TMP, by filing a notice of election to intervene, becomes a participating partner.
Intervenor: Under Tax Court Rule 245(a), the TMP may file a notice of election to intervene within 90 days from the date that the petition filed by another partner was served on the Commissioner by the court’s clerk. This election establishes the TMP as a participating partner.
Tax Court Rule 248 establishes comprehensive procedures for settlement agreements. Those procedures are affected by the mandatory service requirements of Tax Court Rule 246 and the TMP’s responsibility to keep each partner informed.
The Tax Court rules are effective as of October 3, 2008. Amendments to the Tax Court rules state their effective date.
Exhibit 8.19.13-2 shows documents and signatures required for the specific provisions of Tax Court Rule 248.
Within 75 days of the trial date, the associate area counsel attorney or AO will withdraw any outstanding settlement offers. Therefore, only consistent settlements may be processed during the 60 days following acceptance of the last agreement form.
All agreement forms received from partners must be coordinated with the associate area counsel attorney before they are signed on behalf of the IRS. The AO is responsible for keeping the attorney apprised of any settlement offers received. Under Tax Court Rule 248(c), Associate Area Counsel is responsible for notifying the Tax Court if any agreement forms are signed. Also, certain documents must be served on the TMP within 7 days of agreement forms being signed for the commissioner. See IRM 8.19.13.2.11.
The procedures outlined below apply to the AO, associate area counsel attorney, or to both jointly, depending upon the circumstances of the case.
The specific responsibilities for preparing certain documents such as correspondence to partners and the TMP and decision documents may vary depending upon local office policy and whether or not the ATT is used. In addition, responsibilities may vary depending upon whether Appeals or Counsel has jurisdiction. However, follow the procedures established in this text carefully due to the strict time constraints placed on the Service and the TMP for the notification requirements.
When the TMP signs a stipulated decision to bind all partners in the key case to a settlement, follow Rule 248(a). The TMP may or may not be a participating partner.
The TMP will sign a stipulation which will certify that no party objects to entry of the decision. This stipulation effectively binds all parties to the settlement and closes the case fully agreed.
If the TMP agrees to bind all parties to the settlement, the AO will notify Associate Area Counsel that a stipulated decision must be prepared.
When the stipulated decision documents are received from Associate Area Counsel, the AO will prepare a Form 5402 and submit the case (including the stipulated decision documents) to the ATM for approval before the decision is mailed to the TMP. The AO will retain the Form 3210 and the closing package as these are not being mailed to the CTF at this time.
A customized Form 5402 for TEFRA cases is generated in APGolf by virtue of the TEFRA type code on ACDS.
After the ATM approves the settlement, the AO will use Letter 1220 to send the stipulated decision to the TMP for signature. The TMP is required to sign the stipulation; the signature of the TMP’s counsel is not acceptable by itself, but may be added in addition to the TMP's signature. If the TMP is a corporation, an officer of the corporation must sign the stipulation.
The AO will prepare Letter 1645 and leave an undated copy in the file so that it can be dated and mailed by local APS when the case is sent to Counsel for entry of the decision.
When the decision is signed and returned by the TMP, the AO will close the case to local APS.
APS will follow the procedures in IRM 8.20, including sending the administrative file to Counsel, if applicable, in order to have the decision entered. APS will date and mail Letter 1645 when the case is sent to Counsel for entry of the decision.
After the decision is entered, Counsel will return the case to Appeals for closing along with a copy of the entered decision and any special instructions. APS will give the file (which will include a copy of the Form 3210 and closing package that was previously prepared by the TCS or AO) to the AO. See Exhibit 8.19.13-1 for a sample Form 3210. The documents needed for the closing package are listed on the Form 3210.
The date the decision becomes final (90 days after the Tax Court has entered the decision unless an appeal is filed) will control for purposes of determining the one-year statute date.
The AO will enter the one-year statute date on the Form 3210. In computing the one-year statute date, one day should be subtracted from the date that is one year from when the decision became final.
If the decision was entered by the Tax Court on August 31, 2009, the one-year statute date should be computed as follows: August 31, 2009 + 90 days = November 29, 2009 + 1 year = November 29, 2010 - 1 day = November 28, 2010.
If Counsel sends the administrative file to Appeals before the decision has become final, the AO will not close the case to APS until the decision has become final unless instructions from the counsel attorney provide otherwise.
The AO should ensure that any instructions to the key case CTF for issuing affected item reports or affected item notice of deficiency are included on the Form 3210.
The AO will ensure that all documents listed on the Form 3210 are included in the closing package. The AO is ultimately responsible for the accuracy and completeness of the Form 3210, including the one-year statute date. The file will then be returned to APS.
APS will ensure that the documents listed on the Form 3210 are included in the closing package. APS will mail the closing package to the key case CTF within 5 workdays after receipt of the file from the AO using the Form 3210 prepared by the TCS or AO. Instructions for monitoring the return of the Form 3210 by APS may be found in IRM 8.19.13.2.4.
The examiner is required to link a TEFRA partnership case on PCS. If the case is not linked on PCS, the closing package is not mailed to the key case CTF as the CTFs only work with cases that are controlled on PCS. The closing package will still have to be associated with the partners' returns and AIMS may be used to identify the location of the partners' returns.
See IRM 8.19.13.2.16 for instructions for closing docketed cases.
When notified that the TMP agrees to bind all parties to a settlement, the attorney will prepare a stipulated decision. The stipulation will be executed by the TMP who certifies that no party objects to the entry of decision.
After the TMP signs the stipulation it will be filed with the court. As soon as Associate Area Counsel receives a copy of the entered decision, the attorney will immediately send a copy to the AO. Counsel will return the administrative file to local APS for closing along with a copy of the final decision and any special instructions. Local APS will send the administrative file to Laguna Niguel APS.
Under Tax Court Rule 247, a participating partner is the partner who filed the petition and other partners who filed a notice of election to intervene or a notice of election to participate.
Notification that no participating partner objects to the settlement.
When the AO obtains signed agreement forms from all participating partners, consult Associate Area Counsel. The rule states that Associate Area Counsel must serve certain documents on the TMP within 3 days of filing a motion for entry of the decision. Therefore, the AO and associate area counsel attorney must carefully coordinate the agreement forms received from participating partners.
Many docketed cases have only one participating partner so this rule will apply when that partner agrees.
Rule 248(b) will apply when all participating partners agree with the settlement. To ensure the applicability of Rule 248(b) before filing this type of motion, generally the AO should secure a signed agreement form from each participating partner to substantiate his/her agreement.
The AO will prepare Letter 1645 and leave an undated copy in the file so that it can be dated and mailed by APS when the case is sent to Counsel for entry of the decision.
The AO or TCS will prepare the agreement forms and transmittal letters. For more information, refer to the dialogue needed under “Request for Audit Work” in IRM 8.19.13.2.2.
Use IDRS in order to identify the current addresses of the participating partners.
For partners that filed a joint return, the agreement form should include the names of both spouses and both need to sign the agreement form in order for both spouses to be considered agreed (see IRM 8.19.11.4.1 for more information on joint returns).
For partners that filed a consolidated return, see IRM 8.19.11.4.2.
Photocopy the Schedule of Adjustments page and attach it to each agreement form that is prepared using APGolf.
Two copies of the agreement form will be mailed to each partner.
Prepare a transmittal letter for each partner using APGolf. Letter 2606 is used to mail Form 870-PT(AD). Letter 2607 is used to mail Form 870-LT(AD).
If Form 870-LT(AD) is used, only part 1 needs to be signed by the participating partners in order to resolve the Tax Court action. Any affected items requiring a partner level determination will then need to have an affected item notice of deficiency issued to the partner upon the conclusion of the partnership proceeding.
The AO will prepare a Form 5402 and submit the case (including the partner agreement forms and transmittal letters) to the ATM for approval before the agreement forms are mailed to the participating partners. The AO will retain the closing package as it is not being mailed to the CTF at this time.
After the settlement is approved by the ATM, the file (including the participating partner agreement forms and transmittal letters) will be given to APS.
APS will mail the transmittal letter and two copies of the agreement form to each participating partner. Copies will be made and included in the administrative file. The administrative file will be returned to the AO.
The AO will retain the administrative file and monitor the return of the agreement forms by the participating partners. If all participating partners do not agree to the settlement, the case cannot be closed using Tax Court Rule 248(b).
When the agreement forms are received in the Appeals Office they will be receipt date stamped (on the reverse side) and forwarded to the AO. The receipt date stamp will generally differ from the date of execution by the Service. The date of execution by the Service starts the running of the one-year statute date under IRC 6229(f).
If a partner signed and returned only one copy of the agreement form, a copy should be made after it is date stamped.
The AO will collect the agreement forms and prepare them for processing. They should be submitted to the ATM for signing and mailing to the CTF.
The AO will review the agreement forms to ensure that the Schedule of Adjustments page shows the proper amounts, that the appropriate signatures are included, and that the closing package is complete and correct. The AO is ultimately responsible for the accuracy and completeness of the closing package, including the Form 3210.
If a joint return was filed, both husband and wife should sign the agreement form, even if only one spouse had an interest in the partnership.
The AO will identify the participating partners that signed agreement forms on the Form 886-Z that was previously prepared by the TCS.
Write "Agreed" and the date that the partner signed the agreement in red next to the partner's name. See IRM 8.19.11.9.2 and Exhibit 8.19.11-10.
For partnership tax years ending after August 5, 1997, if a penalty is agreed, write "Agreed" in the Penalty Status column next to the penalty percentage. If an affected item other than a penalty is agreed, write "Agreed" in the Affected Item Status column next to the affected item. If a penalty or affected item is unresolved, write "Open" in the applicable column next to the penalty percentage or the affected item. See IRM 8.19.11.9.2 and Exhibit 8.19.11-10. In this exhibit, partners Daisy and Lilac agreed to both the partnership items and affected items (including penalties) and signed both parts of Form 870-LT(AD); partner Rose only agreed to the partnership items and penalties and signed only Part I of Form 870–LT(AD).
The Form 3210 will have to instruct the CTF to issue an affected item notice of deficiency to partner Rose for affected items other than penalties.
The AO should ensure that any special instructions for the key case CTF are included on the Form 3210.
After entering the information on the Form 886–Z, the AO will give the case (including the participating partner agreement forms and the closing package) to the ATM. The AO will ensure that all documents listed on the Form 3210 are included with the closing package.
The ATM will sign the participating partner agreement forms within 5 workdays after receiving the case from the AO. The ATM will enter the one-year statute date on the Form 3210. In computing the one-year statute date, one day should be subtracted from the date that is one year from when the ATM signed the agreement form.
If the ATM signs the agreement forms on August 31, 2009, the one-year statute date should be computed as follows: August 31, 2009 + 1 year = August 31, 2010 - 1 day = August 30, 2010.
All Appeals agreement forms must be signed on behalf of the commissioner by an authorized person per Delegation Order 4-19 (IRM 1.2.43.17). Appeals Team Case Leaders are authorized to sign agreement forms for their respective cases.
After the agreement forms are signed and the one-year statute date is entered on the Form 3210, the ATM will forward the agreement forms closing package to APS. The file will be returned to the AO as the case cannot be closed until a decision is entered which becomes final.
APS will ensure that the documents listed on the Form 3210 are included in the closing package. APS will mail the agreement forms closing package to the key case CTF within 5 workdays after the forms are signed for the commissioner, using the Form 3210 prepared by the TCS or AO. Instructions for monitoring the return of the Form 3210 by APS may be found in IRM 8.19.13.2.4.
The closing package for the agreement forms that are signed by the participating partners must be mailed to the CTF as the one-year statute date to assess for the participating partners is governed by IRC 6229(f) and not when the final Tax Court decision is entered using Tax Court Rule 248(b).
After the participating partner agreement forms have been signed by the ATM, the AO will notify Associate Area Counsel. The attorney will file a motion for entry of the decision and serve documents on the TMP, as shown in IRM 8.19.13.2.10.4.
Associate Area Counsel will advise the AO if any other party objects to entry of the decision. If any objection is filed and the court grants that partner’s motion, the AO will forward the case to Associate Area Counsel for trial. If no other party objects or if the court denies the objecting party’s motion, the court will enter the decision.
The AO and APS will follow the instructions shown in IRM 8.19.13.2.9.2 beginning with subsection (2), except that Letter 1220 is not used since the stipulated decision is not sent to the TMP for signature.
The Form 3210 will instruct the CTF to process the partners who didn’t sign agreement forms under the final court decision. See Exhibit 8.19.13-1 for a sample Form 3210.
If any partner (including a participating partner) signs an agreement form, under Tax Court Rule 248(b), the one-year statute date begins on the date a delegated official executes the agreement for the commissioner. If a partner is bound by an entered decision submitted under Rule 248(b), the one-year statute date begins on the date the decision becomes final.
The attorney will prepare a decision document and file a motion for entry of the decision after being notified that all participating partners have signed agreement forms and that they have been signed on behalf of the commissioner.
Within 3 days of receipt of the certificate, the TMP will serve copies of the documents in paragraph (2) above on all other parties.
If any of the other parties object to the granting of the entry of the decision, that party must file a motion to participate or to intervene within 60 days after the motion was filed by the commissioner. If any partner does file such motion, and that motion is granted by the court, the attorney will advise the AO that the action will continue.
If no motion is filed within the 60 days or if the court denies an objecting party’s motion, the attorney will send a copy of the entered decision to the AO. The AO will proceed with closing the case.
If the case is tried or Counsel settles it, Counsel will send the file to local APS for closing along with a copy of the entered decision and any special instructions. Local APS will forward the file to Laguna Niguel APS.
These Tax Court procedures are used when one or more participating partners settle but the docketed case has at least one unagreed participating partner.
Rule 248(c)(1) requires the IRS to notify the court when a participating partner enters into a settlement agreement or consistent settlement before the court proceeding is completed.
Rule 248(c) applies only when Rule 248(a) and Rule 248(b) are not applicable. If all participating partners have settled, Rule 248(c)(1) and Rule 248(c)(2) are not applicable. This procedure doesn’t end the partnership proceeding.
Rule 248(c)(2) provides the mechanism (explained below) by which all parties to the action are informed of a settlement so that they can request consistent settlement. The request for consistent settlement must be made no later than the 60th day after the day on which the settlement was entered into. Rule 248(c)(2) does not apply when a consistent settlement is entered into.
Under Tax Court Rule 247, a party to the action is each person who was a partner at any time during the partnership taxable year provided that partner has an interest in the outcome of the action and whose partnership items haven’t been converted to nonpartnership items.
If any partner, including a participating partner, signs an agreement, and the agreement (other than a consistent settlement) is accepted, a statement notifying the TMP of the settlement must be served on the TMP within 7 days of acceptance.
Within 7 days of receipt, the TMP must serve this statement on all parties to the action who have not settled.
Rule 248(c)(2) is followed when one or more participating partners have not agreed to a settlement. However, at some point during the processing of a case, all participating partners may agree. If this occurs, follow Rule 248(b).
When all participating partners agree to a settlement, Rule 248(b) will apply and the AO will follow procedures at IRM 8.19.13.2.10. However, if one or more does not agree, Rule 248(c)(2) will be followed.
Notify associate area counsel attorney when some, but not all, of the participating partners have agreed to a settlement. Do not have the agreement forms signed on behalf of the commissioner immediately. Hold them until Associate Area Counsel has been consulted. Associate Area Counsel will file a notice of settlement or consistent settlement with the court stating the names of the participating partners who agreed. The participating partners’ signatures are not required on the notice filed with the court.
A letter and envelope to the TMP.
A statement listing the partners who have signed the agreements, including the date of the agreement and the year or years to which it relates.
A copy of Rule 248.
A copy of the Schedule of Adjustments page that shows the adjustments agreed to.
Only send the Schedule of Adjustments page, not the entire agreement form. Revealing partner level information may violate disclosure rules.
The letter and statement are mailed to the TMP by certified mail within 7 days of the day the ATM signs the agreements forms. The TMP then has 7 days to mail the statement to all parties to the action. The mailing to the TMP is critical since Rule 248(c)(2) affords all parties to the action the opportunity of entering into a consistent settlement based on a settlement agreement entered into by any partner, whether a participating partner or not.
Because the case is docketed, and because there are time frames that must be followed under the Tax Court Rules, it is recommended that Appeals mail any agreement forms to the partners that wish to enter into a consistent settlement. Follow the guidelines under Tax Court Rule 248(b) in IRM 8.19.13.2.10 for securing and processing the agreement forms.
For 60 days after an agreement is signed for the commissioner, parties to the action may request a consistent settlement. Under Treas. Reg. 301.6224(c)-3(c) a partner desiring consistent settlement terms will submit a written statement to the office that entered into the settlement. After the 60 days expire, an agreement could be executed if the settlement terms are still considered appropriate. However, after the 60 day period expires the partner no longer has a right to request consistent settlement, and the choice to accept an agreement after the 60 day period will depend upon the facts of the case and must be decided on a case-by-case basis. Acceptance of a request after the 60 day period may start a new 60 day period for all other partners. See IRM 8.19.10.4.8.1 for consistent settlement procedures.
After the 60-day period ends, the AO will forward the case to Associate Area Counsel for appropriate action.
The associate area counsel attorney will prepare and file a notice of settlement agreement or notice of consistent settlement with the court when some, but not all, participating partners sign agreement forms.
All agreement forms received at the key case CTF or Appeals Office will be sent by the AO to the associate area counsel attorney before acceptance. The agreement forms should generally be batched every 30 days and submitted to Appeals for signature.
The associate area counsel attorney will prepare a settlement package for cases in Counsel jurisdiction to submit to the ATM for signing of the agreement forms. In addition, the associate area counsel attorney will prepare and file with the court a notice of settlement or consistent settlement as the case may be.
A statement listing the partners who signed the agreements, including the date of the agreement and the year or years to which it relates.
A copy of the Schedule of Adjustments that shows the adjustments agreed to.
Copies of the agreement forms will not be sent to the TMP.
The associate area counsel attorney will send the completed settlement package to Appeals for review and mailing by the AO to the TMP.
If agreement forms are received from all participating partners, follow Rule 248(b).
The AO will prepare the administrative file for forwarding to Associate Area Counsel when a settlement cannot be reached.
The AO will prepare and leave an undated copy of Letter 971 to notify the TMP that the case is being transferred for trial preparation. Local APS will date and mail the Letter 971 before sending the case to Associate Area Counsel.
The AO will submit the administrative file to the ATM for forwarding to Counsel.
The associate area counsel attorney may request that Appeals assist in securing and processing settlement agreements while the case is in docketed status. This may include preparation of the Form 4605-A and Form 886-Z from the TCS, update of the one-year statute date, and processing instructions to the CTFs. Since the delegation order does not give Associate Area Counsel the authority to accept settlement agreements, Appeals may be asked to execute them.
For cases that are either tried or settled by Counsel, after the decision is entered Counsel will return the case to Appeals for closing along with a copy of the entered decision, the counsel settlement memorandum (if applicable) and any special instructions. The cases should be sent to Laguna Niguel APS. The Appeals TEFRA Team (ATT) will assist, if necessary, in preparing the cases for closing.
Update the statute on ACDS to reflect the one-year statute date. In computing the one-year statute date, one day should be subtracted from the date that is one year from when the decision became final.
Return the case to the ATT to prepare and electronically transmit a closing package to the CTF using the secure server. Form 14298, Appeals TEFRA Electronic Notice Package Check Sheet, is the cover sheet the ATT uses to electronically transmit documents to the CTF.
When the decision is final, the one-year assessment period begins.
For cases dismissed for lack of jurisdiction, there may or may not be assessments needed on the partners, depending on why the case was dismissed. As such, a closing package may not be required at this time. Any questions as to what actions are needed as to the partners should be directed to the counsel attorney.
If other documents are needed (for example, Form 4605-A and Form 886-Z), the ATT AO will submit a Request for Audit Work as provided in IRM 8.19.13.2.2.
It is not necessary to prepare a new Form 5402. The Form 5402 that was previously prepared is sufficient.
The TCS will prepare the documents requested as provided in IRM 8.19.13.2.3 and begin preparing the closing package as provided in IRM 8.19.13.2.4. If no other documents are being prepared, the ATT AO is responsible for preparing the closing package and the Form 14298 .
Tried docketed TEFRA key cases are resolved under the rules of practice of the United States Tax Court. Tax Court Rule 155 states that Rule 155 computations determine deficiency, liability or overpayment amounts. Since there is only a determination of partnership level items and no determination of deficiency, liability or overpayment in TEFRA cases, the TCS will prepare a Rule 155 type computation, which will include the Summary Page showing the adjustment to the TEFRA partnership. See Exhibit 8.19.13-4.
The ATT AO will enter the one-year statute date on the Form 14298. In computing the one-year statute date, one day should be subtracted from the date that is one year from when the decision became final (see Example in (2)a) above).
If Counsel sends the administrative file to Appeals before the decision has become final, the ATT will not close the case to Laguna Niguel APS until the decision has become final unless instructions from the counsel attorney provide otherwise.
The ATT AO should ensure that any instructions to the key case CTF for issuing affected item reports or affected item notice of deficiency are included on the Form 14298.
The ATT AO will ensure that all required documents are included in the closing package. The ATT is ultimately responsible for the accuracy and completeness of the Form 14298, including the one-year statute date. The ATT AO will electronically transmit the closing package to the CTF using the secure server. After the CTF acknowledges receipt of the package, the ATT AO will return the file to Laguna Niguel APS.
If a partner or the government appeals the decision of the Tax Court, Associate Area Counsel will return the case to Appeals for interim processing. Counsel will prepare Form 9724 (memorandum from Chief Counsel) with instructions for processing the case. The cases should be sent to Laguna Niguel APS. The ATT will assist, if necessary, in preparing the cases for closing.
Update ACDS with ACTION: APPEALED and TODATE.
Update the remarks section of ACDS.
If other documents are needed (for example, revised Form 4605-A and Form 886-Z), the ATT AO will submit a Request for Audit Work as provided in IRM 8.19.13.2.2.
If the Tax Court decision sustains the petitioner’s position, no assessment should be made on an appeal of that decision. However, if the appellate court reverses the Tax Court decision, and the petitioner appeals the results of the appellate court, assessments should be made on the parties to the action in accordance with the decision of the appellate court. The assessment may have to await the entry of a revised decision by the Tax Court.
If a bond is posted, the Tax Court will determine the amount based on its estimate of the aggregate liability of the parties to the action (IRC 7485). Counsel, Appeals and the CTF should cooperate in a timely manner to provide the information needed by the court to determine the bond.
If a bond is not posted, the Form 14298 will request that the CTF assess the partnership items in accordance with the Tax Court decision. Since the Tax Court decision is not final, the one-year assessment period has not begun.
Although the one-year assessment period has not begun, the ATT AO will enter a one-year statute date on the Form 14298. In computing the one-year statute date, one year will be added to the date that the appeal was filed.
If the appeal was filed on August 31, 2009, the one-year statute date should be computed as follows: August 31, 2009 +1 year = August 31, 2010.
If there are affected items, the Form 14298 should provide that these should not be assessed at this time, except for penalties for partnership tax years ending after August 5, 1997.
The ATT AO will ensure that all required documents are included in the closing package. The ATT AO is ultimately responsible for the accuracy and completeness of the Form 14298, including the one-year statute date. The ATT AO will electronically transmit the closing package to the CTF using the secure server. After the CTF acknowledges receipt of the package, the ATT AO will return the file to Laguna Niguel APS.
Laguna Niguel APS will return the file to Associate Area Counsel unless the Form 9724 provides other instructions for where the file should be sent.
The case should not be closed from either AIMS or from ACDS at this time.
When an appeal from a Tax Court decision is final, the Department of Justice will return the case to Appeals through Counsel to notify the CTF to complete processing of the partnership items of the partners and to process the penalties and affected items. The cases should be sent to Laguna Niguel APS. The Appeals TEFRA Team (ATT) will assist, if necessary, in preparing the cases for closing.
If other documents are needed (for example, Form 4605-A and Form 886-Z), the ATT will submit a Request for Audit Work as provided in IRM 8.19.13.2.2.
The TCS will prepare the documents requested as provided in IRM 8.19.13.2.3 and begin preparing the closing package as provided in IRM 8.19.13.2.4. If no other documents are being prepared, the ATT is responsible for preparing the closing package and the Form 14298 .
The ATT AO will enter the one-year statute date on the Form 14298. In computing the one-year statute date, one day should be subtracted from the date that is one year from when the decision became final (see Example above).
If Counsel sends the administrative file to Appeals before the decision has become final, the ATT will not close the case to APS until the decision has become final unless instructions from the counsel attorney provide otherwise.
The ATT should ensure that any instructions to the key case CTF for issuing affected item reports or affected item notice of deficiency are included on the Form 3210.
All TEFRA key cases must be closed through Laguna Niguel APS. The AO should follow these closing procedures only if the AO did not use the ATT and TEFRA AO team member in working the case. If the AO used the ATT and TEFRA AO team member, then follow the procedures posted to the ATT sharepoint site. A link to the sharepoint site is found on the Appeals TEFRA website.
Local APS ships the administrative file to Laguna Niguel APS.
ACDS database for AO and AIMS remain open (not closed or transferred).
The ATT performs a procedural review and will forward the administrative file to Laguna Niguel APS.
RevsdTax--Enter revised tax from Form 5402 (also enter PropdTax if not previously entered); if the Form 5402 does not contain the revised tax, have the ATT compute the amount using Exhibit 8.19.10–1.
The revised tax is not actually assessed against the partnership and should not be entered on Form 5403.
See IRM 8.20.7 for instructions in completing Form 5403; in addition, enter "TEFRA Key Case Closing" in the Special Handling section.
After the key case CTF has input the one-year statute date on PCS for all direct partners and has released the AIMS “H” freeze, APS may close the case from AIMS unless it has a PICF Code of 4 or 5. The case should not be sent to the key case CTF unless it has a PICF Code of 4 or 5.
Prepare Form 5403 following partial procedures. In item A, Special Handling Instructions, write "TEFRA Linkage – After Partial Closing, Forward to CTF."
Update the AIMS database to status 34. Update the PBC to 295 (for the Brookhaven CTF) or 398 (for the Ogden CTF).
Forward the administrative file via Form 3210, to the appropriate CTF. Ensure that a copy of the input Form 5403 is attached to the face of the return. The CTF will place the file in suspense awaiting the outcome of the TEFRA examination.
The procedures for attorneys to notify the appropriate CTF of a partner-level settlement agreement, or a decision or dismissal in a U.S. District Court or the Court of Federal Claims TEFRA partnership case are found in IRS Chief Counsel Notice 2011–011.
When a decision is final for a case for which an FPAA was issued by Appeals and which was petitioned to a U. S. District Court or the U. S. Court of Federal Claims (or a case appealed from these courts), the Department of Justice may return the case to Appeals through Counsel if assistance is needed to complete the processing of the partnership items of the partners and to process the penalties and affected items. The cases should be sent to Laguna Niguel APS. The ATT will assist, if necessary, in preparing the cases for closing.
Create a new workunit on ACDS using the information from the previously closed workunit.
If the decision was entered by the U. S. Court of Federal Claims on August 31, 2009, the one-year statute date should be computed as follows: August 31, 2009 + 60 days = October 30, 2009 + 1 year = October 30, 2010 - 1 day = October 29, 2010.
The TCS will prepare the documents requested as provided in IRM 8.19.13.2.3 and begin preparing the closing package as provided in IRM 8.19.13.2.4. If no other documents are being prepared, the ATT AO is responsible for preparing the closing package and the Form 14298.
The ATT will enter the one-year statute date on the Form 14298. In computing the one-year statute date, one day should be subtracted from the date that is one year from when the decision became final (see Example above).
The case should not be on AIMS as AIMS should have been closed once the petition was filed in accordance with the procedures in IRM 8.19.12.13.3. Accordingly, if the file is returned by the Department of Justice, it can simply be closed to Files.
If the case is not on AIMS, then it can be closed to files.
This exhibit summarizes Tax Court Rules 248(a), 248(b) and 248(c) and includes the documents and signatures that are required. Rule 248(a): The TMP agrees to bind all parties.A stipulated decision consenting to entry of decision (decision and stipulation in same document) are filed with the court. The signatures of the TMP (not his counsel) and counsel for commissioner are required.Participating partners and all other parties are bound by the TMP's signature.Footnote: It is unlikely that this option will be used frequently. The TMP may, but need not, be a participating partner.Rule 248(b): All participating partners must agree to the settlement or not object.Footnote: Request a signed Form 870-P(AD) or Form 870-PT(AD) (depending on the tax year at issue) to verify participating partners do not object. Local counsel files a motion for entry of the decision with the proposed form of the decision. There are no signatures on the decision.Within three days of filing, local counsel will serve on the TMP a certificate showing the date that the motion was filed.Within three days of receipt, the TMP will serve copies of the proposed decision, the commissioner's motion, the commissioner's certificate, and a copy of Rule 248 on all other parties.Within 60 days of the commissioner's motion, an objection may be filed by the TMP (if not a participating partner) as a motion to intervene; the TMP's signature is required on the motion.Within 60 days of the commissioner's motion, an objection may be filed all other parties as a motion to participate; the parties' signatures are required on the motion.If there is no objection filed, no documents or signatures are needed and the court enters the decision.
Page 2 of the exhibit summarizes Tax Court Rule 248(c) and includes the documents and signatures that are required.Rule 248(c): A participating partner agrees to the settlement. A notice that a settlement of agreement or a consistent agreement has been secured is filed with the court. It requires the signature of local counsel.If a participating partner or non-participating partner agrees to the settlement, a Form 870-P(AD) or Form 870-PT(AD) must be signed by the partner and the commissioner.Within 7 days of the acceptance of the settlement, the commissioner serves a statement on the TMP that includes: the identity of the party or parties, the tax year(s), the terms of the settlement, and the date that the settlement was entered into.Within 7 days of receipt, the TMP will serve a copy of the statement on all parties who have not settled.All parties who have not accepted the settlement may request consistent agreement within 60 days of the settlement. If any parties agree, a Form 870-P(AD) or Form 870-PT(AD) is signed marked Consistent Agreement. The agreement is signed by the party that agrees and on behalf of the commissioner.
This is page two. It is a list of the partners who signed settlement agreements.STATEMENT OF SETTLEMENT AGREEMENTS PROVIDED UNDER TAX COURT RULE 248(c)(2)Partnership: Daffodil PartnershipDocket No: 12345-XXDate Accepted: July 15, 2008Name of PartyName of PartyTaxable YearDate Settlement Offered & Terms *1. Thomas Geranium2004June 4, 20082. Nancy Dianthus2004June 4, 20083. Eric Salvia2004June 4, 20084. Mary Phlox2004June 4, 2008*Schedule of adjustments attached which sets out the terms of each agreement. Since the allocation of items among the partners is not at issue, the allocation is not shown.
This is page three. It is the schedule of adjustments page of the settlement agreement. The following fields are completed:Name of Partnership: Daffodil PartnershipEIN: D2-0123456Tax Year Ended: 12/31/2004Details of Adjustments to Ordinary Income:(1) Depreciation Expense $90,000.00It is determined the partnership overvalued its depreciable basis for its energy property by $900,000.00. The correct basis is $100,000.00 and not $1,000,000.00 reported on the 2004 Form 1065. The partnership depreciation expense has been recomputed as shown in Exhibit A.(2) Management Fee $25,000.00(3) Amortization Expense ($5,000.00)It is determined the partnership may not deduct management fees reported of $25,000.00. The fee was paid to organize the partnership and may not be deducted as a trade or business expense. Pursuant to the partnership election, the fee may be amortized over 60 months beginning January 1, 2004. Total Adjustments to Ordinary Income: $110,000.00Other Adjustments:A. (4) Basis of Energy PropertyAdjustment $ 900,000.00As Reported 1,000,000.00Corrected $ 100,000.00In the remarks section at the bottom, the text states:4. It is determined that the partnership's basis in energy property is $100,000.00 rather than $1,000,000.00.Accordingly, the basis in energy property is reduced by $900,000.00. 5. Negligence penalty will be assessed.Partner level defenses to the negligence penalty may be raised in a refund forum after the penalty is assessed and paid.
This is page four of the exhibit. It is page one of Rule 248. Settlement Agreements, from the Tax Court Rules of Practice and Procedure.Rule 248. Settlement Agreements(a) Consent by the Tax Matters Partner to Entry of Decision: A stipulation consenting to entry of decision executed by the tax matters partner and filed with the Court shall bind all parties. The signature of the tax matters partner constitutes a certificate by the tax matters partner that no party objects to entry of decision. See Rule 251.(b) Settlement or Consistent Agreements Entered Into by All Participating Partners or No Objection by Participating Partners: (1) After the expiration of the time within which to file a notice of election to intervene or to participate under Rule 245(a) or (b), the Commissioner shall move for entry of decision, and shall submit a proposed form of decision with such motion, if— (A) all of the participating partners have entered into a settlement agreement or consistent agreement with the Commissioner, or all of such partners do not object to the granting of the Commissioner’s motion for entry of decision, and (B) the tax matters partner (if a participating partner) agrees to the proposed decision in the case but does not certify that no party objects to the granting of the Commissioner’s motion for entry of decision. (2) Within 3 days from the date on which the Commissioner’s motion for entry of decision is filed with the Court, the Commissioner shall serve on the tax matters partner a certificate showing the date on which the Commissioner’s motion was filed with the Court. (3) Within 3 days after receiving the Commissioner’s certificate, the tax matters partner shall serve on all other parties to the action other than the participating partners, a copy of the Commissioner’s motion for entry of decision, a copy of the proposed decision, a copy of the Commissioner’s certificate showing the date on which the Commissioner’s motion was filed with the Court, and a copy of this Rule. (4) If any party objects to the granting of the Commissioner’s motion for entry of decision, then that party shall, within 60 days from the date on which the Commissioner’s motion was filed with the Court, file a motion for leave to file a notice of election to intervene or to participate, accompanied by a separate notice of election to intervene or a separate notice of election to participate, as the case may be. If no such motion is filed with the Court within such period, or if the Court should deny such motion, then the Court may enter the proposed decision as its decision in the partnership action. See Code Sections 6226(f) and 6228(a)(5). See also Rule 245, relating to intervention and participation, and Rule 251, relating to decisions.
This is the page five of the exhibit. It is page two of Rule 248. Settlement Agreements.(c) Other Settlement and Consistent Agreements: If a settlement agreement or consistent agreement is not within the scope of paragraph (b) of this Rule, then-- (1) in the case of a participating partner, the Commissioner shall promptly file with the Court a notice of settlement agreement or notice of consistent agreement, whichever may be appropriate, that identifies the participating partner or partners who have entered into the settlement agreement or consistent agreement; and (2) in the case of any partner who enters into a settlement agreement, the Commissioner shall, within 7 days after the settlement agreement is executed by both the partner and the Commissioner, serve on the tax matters partner a statement which sets forth-- (A) the identity of the party or parties to the settlement agreement and the date of the agreement; (B) the year or years to which the settlement agreement relates; and (C) the terms of settlement as to each partnership item and the allocation of such items among the partners. Within 7 days after receiving the statement required by this subparagraph, the tax matters partner shall serve on all parties to the action a copy of the statement.
This exhibit is a sample Rule 155 Type Computations Statement for TEFRA partnerships. The cover sheet has the symbols AP:A:AP:MF at the top left of the page and is addressed to:In re: Begonia Partnership, First Kale Street, Anyplace, US XX001, Docket No. ________The text is titled Adjustments to Partnership Items and includes the following information:Taxable Year Ending December 31, 2004Ordinary, distributable net, or taxable income as reported:$(150,000.00)Adjustments to income: Depreciation$50,000.00Corrected ordinary, distributable net or taxable income:$(100,000.00)Other adjustments: Qualifying basis of energy property(1) Adjustment$(1,300,000.00)(2) As reported$2,300,000.00(3) Corrected$1,000,000.00The adjustments to partnership items as shown above are set forth in the attached pages ___________ to ___________, inclusive.Note to Tax Computation Specialist: The attached pages should include a Form 4605-A (unless the case is a no change), and supporting schedules (if necessary). | 2019-04-19T06:44:53Z | https://www.irs.gov/irm/part8/irm_08-019-013 |
1973 - 1977: assistant (student-assistent), Laboratorium voor Experimentele Plantensystematiek, Rijksuniversiteit Leiden.
1977 - 1985: researcher (wetenschappelijk ambtenaar), project 'Atlas van de Nederlandse Flora', Rijksherbarium, Rijksuniversiteit Leiden.
1977 - 1978: teacher, R.K. Pedagog. Acad. Mariahoeve, 's-Gravenhage.
1985 - 1989: researcher (wetenschappelijk assistent), PhD project.
1990 - 2007: researcher (onderzoeker), Nationaal Herbarium Nederland, Universiteit Leiden.
2003 - 2010: honorary researcher palaeobotany, Nationaal Natuurhistorisch Museum / Naturalis, Leiden.
2007 - present: assistant professor (universitair docent) / senior researcher, Nationaal Herbarium Nederland, Universiteit Leiden / Nederlands Centrum voor Biodiversiteit, Naturalis (2010) / Naturalis Biodiversity Center (2013).
BSc (kandidaatsexamen): biology with geology (B5). Rijksuniversiteit Leiden, 1 May 1973.
- 1973 - 1976, Taxonomic revision of Mischocarpus Blume (Sapindaceae). Supervised by P.W Leenhouts (Rijksherbarium, Leiden).
- 1975 - 1976, Pollen morphology of Mischocarpus Blume (Sapindaceae). Supervised by J. Muller (Rijksherbarium, Leiden).
- 1976 - 1977, Carbonised fruits and seeds from prehistoric settlements. Supervised by C.C. Bakels (Instituut voor Prehistorie, Leiden).
PhD: Faculteit der Wiskunde en Natuurwetenschappen, Rijksuniversiteit Leiden, 11 Oct. 1990. Thesis: Nephelieae pollen (Sapindaceae): form, function, and evolution.
Pollen morphology and evolution of Annonaceae, Apocynaceae, Araceae (Amorphophallus), Cucurbitaceae, Euphorbiaceae and Sapindaceae.
Plant macrofossils from the Maastrichtian type area (SE Netherlands and adjacent parts of Belgium and Germany; Campanian, Maastrichtian, Danian): conifers, dicots, seagrasses, etc.
Recent and fossil walnuts belonging to Juglans section Cardiocaryon, Juglandaceae (Northern Hemisphere, Neogene, Pleistocene).
Recent and fossil oak galls from Europe.
Drift fruits and seeds ('sea beans') on Dutch shores.
Ferns on stony substrates in The Netherlands.
Fossil echinoids (esp. Echinogalerus, Hemiaster, Leymeriaster and chert material) from the Maastrichtian type area (SE Netherlands and adjacent parts of Belgium and Germany; Campanian, Maastrichtian, Danian).
Fossils (invertebrates) from the Jurassic (Bathonian) of Normandy (France), esp. from the section between Luc-sur-Mer and Lion-sur-Mer.
Pollen morphology and evolution of Apocynaceae (Periwinkle family).
Fossil seagrasses from the type area of the Maastrichtian stage.
Taxonomy and distribution (geogr./stratigr.) of fossil butternuts (Juglans section Cardiocaryon, Juglandaceae).
'Sea beans' from northern Atlantic Ocean coasts representing an undescribed Sacoglottis (Humiriaceae) endocarp.
Ferns on stony substrates in Delft (The Netherlands).
Bierman, A.I., Universiteit Leiden, Universiteitsbibliotheek, Leiden, The Netherlands. Simplicia.
Burgh, J. van der, Laboratory of Palaeobotany and Palynology, Utrecht, The Netherlands. Fossil walnuts.
Cadée, G.C., Royal Netherlands Institute for Sea Research, Den Burg, Texel, The Netherlands. Drift fruits and seeds on Dutch shores.
Indeherberge, L., Zonhoven, Belgium. Fossils from the Maastrichtian type area.
Jagt, J.W.M., Natuurhistorisch Museum Maastricht, Maastricht, The Netherlands. Fossil echinoids from the Maastrichtian type area.
Konijnenburg-van Cittert, J.H.A. van, Naturalis Biodiversity Center, Leiden, The Netherlands. Plant fossils from the Maastrichtian type area.
Laffineur, J., Maasmechelen, Belgium. Fossils from the Maastrichtian type area.
Manchester, S.R., Florida Museum of Natural History, Gainesville, Florida, USA. Fossil walnuts.
Meuris, R., Beerzel, Belgium. Fossils from the Maastrichtian type area.
Nonhof, C.J., Delft. Ferns on stony substrates.
Renkens, S., Zaltbommel, The Netherlands. Plant fossils from the Maastrichtian type area.
Curation of pollen slide collection and teaching collection plant fossils.
Adema, F.A.C.B. 1991. Cupaniopsis Radlk. (Sapindaceae), a monograph. Co-supervisor.
Duistermaat, H. 1996. Monograph of Arctium L. (Asteraceae). Generic delimitation (including Cousinia Cass. p.p.), revision of the species, pollen morphology, and hybrids. Co-supervisor.
Ridder-Numan, J.W.A. 1996. Historical biogeography of the Southeast Asian genus Spatholobus (Legum.-Papilionoideae) and its allies. Co-supervisor.
Buijsen, J.R.M. Phylogeny and historical biogeography of Harpullia, Nephelium and Lepisanthes (Sapindaceae). Started 1990, stopped 1998. Co-supervisor.
Orozco Pardo, C.I. 2001. Evolutionary biology of Brunellia Ruiz & Pavón (Brunelliaceae, Oxalidales). Committee member.
Schot, A.M. 2004. Systematics of Aporosa (Euphorbiaceae). Co-supervisor.
Mols, J.B. 2004. From Milusa to Miliuseae to Miliusoid, Identifying clades in Asian Annonaceae. Co-supervisor.
Stroo, C.J. Pollen morphology and evolution of bat pollinated plants. Started 1997, stopped 2006. Co-promotor.
Sierra Daza, S.E.C. 2007. Re-shaping spurge pioneers. Circumscription, taxonomy and phylogeny of Mallotus (Euphorbiaceae s.s.). Co-supervisor.
Kulju, K.K.M. 2007. Phylogenetic and taxonomic studies in Macaranga, Mallotus and other acalyphoid genera (Euphorbiaceae s.s.). Co-supervisor.
Couvreur, T.L.P. 2008. Revealing the secrets of African Annonaceae. Systematics, evolution and biogeography of the syncarpous genera Isolona and Monodora. Co-supervisor.
Chaowasku, T. 2014. The Miliuseae revisited. Phylogenetic, taxonomic, and palynological studies in a major clade of Annonaceae. Co-supervisor, committee member.
Chantarasuwan, B. 2014. Taxonomy, systematics, and biogeography of Ficus subsection Urostigma (Moraceae). Co-supervisor.
Hetterscheid, W.L.A. Revision of Amorphophallus (Araceae). Started 1988, ongoing. Co-supervisor.
Since 1985, I have been involved in teaching (parts of) various courses and excursions. The following list covers the more important items in the years 2006 and onwards.
2006 Co-supervisor - Thongpairoj, U. - Pollen morphology Artabotrys (Annonaceae).
2005 Supervisor - Chaowasku, T. - Pollen morphology of Miliusa (Annonaceae).
2005 Supervisor - Ven, E.A. van de. - Pollen morphology of Melodinus (Apocynaceae).
2005 Co-supervisor - Bosma, H.F. - Conifers from the Santonian of Limburg (The Netherlands).
2003 Supervisor - Pruesapan, K. - Pollen morphology of Trichosanthes (Cucurbitaceae).
2001 Supervisor - Cruden, M.A. - Pollen morphology of Callerya and Wisteria (Fabaceae).
2001 Supervisor - Hendrian - Pollen morphology of Ochrosia (Apocynaceae).
2001 Supervisor - Sagun, V.G. - Pollen morphology of the subtribe Flueggeinae (Euphorbiaceae).
1997 Supervisor - Zimmermann, Y.-M. - Pollen morphology of Alyxia (Apocynaceae).
1995 Supervisor - Kuijt, J. - Pollen morphology of Alstonia (Apocynaceae).
1994 Supervisor - Bergen, M.A. van. - Pollen morphology of Arytera (Sapindaceae).
1993 Supervisor - Tomlik, A. - Pollen morphology of Serjania (Sapindaceae).
2011 Supervisor - Hoogen, J.C. van den. - Pollen morphology of the genus Ochrosia (Apocynaceae).
2009 Supervisor - Mennes, C.B. - Pollen morphology and evolution in Cucurbitaceae.
2009 Supervisor - Weide, J.C. van der. - Pollen morphology and classification of the tribe Tabernaemontaneae (Apocynaceae, subfamily Rauvolfioideae).
2007 Supervisor - Lodder, S. & Rutten, E.M.J. - Pollen morphology of the Apocynaceae (subfamilies Rauvolfioideae and Apocynoideae).
2005 Co-supervisor - Huut, B.J. van. - Distribution of fossil Araucariaceae.
2005 Supervisor - Kromhout, R.P.W. - Pollen morphology of the Moraceae (excl. Ficus).
2002 Supervisor - Langeveld, J.M. - Pollen morphology of Ficus (Moraceae).
Livshultz T., Middleton D.J., Ham R.W.J.M. van der, Khew G. 2018. Generic delimitation in Apocyneae (Apocynaceae). Taxon 67: 341-358.
Ham R.W.J.M. van der, Konijnenburg-van Cittert J.H.A. van, Jagt J.W.M., Indeherberge L., Meuris R., Deckers M.J.M., Renkens S., Laffineur J. 2017. Seagrass stems with attached roots from the type area of the Maastrichtian Stage (NE Belgium, SE Netherlands): Morphology, anatomy, and ecological aspects. Review of Palaeobotany and Palynology 241: 49-69.
Smits S., Ham R. van der 2017. Een harde noot?!. Grondboor en Hamer: Nederlandse Geologische Vereniging 71: 60-66.
Ham R. van der, Bierman A. 2017. Van gildekast tot schoenendoos: Nederlandse simpliciaverzamelingen. 156 p. Erato, Leiden. ISBN 978-94-92165-17-6.
Ham, R. van der 2016. Simpliciaverzamelingen. Medisch Farmaceutisch Museum ‘De Griffioen’. 12 p. Stichting Medisch Farmaceutisch Museum ‘De Griffioen’, Delft.
Chaowasku T., Johnson D.M., Ham R.W.J.M. van der, Chatrou L.W. 2015. Huberantha, a replacement name for Hubera (Annonaceae: Malmeoideae: Miliuseae). Kew Bulletin 70: 1-4.
Ham, R.W.J.M. van der 2015. On the history of the butternuts (Juglans section Cardiocaryon, Juglandaceae). Palaeontographica Abteilung B: Palaeobotany - Palaeophytology B 293: 125-147.
Martinetto, E., Ravazzi, C., Roghi, G., Teruzzi, G., Ham, R. van der & Zorzin, R. 2015. Neotypification of the name Juglandites bergomensis, basionym of the fossil-species Juglans bergomensis (Juglans sect. Cardiocaryon, Juglandaceae) in Europe. Phytotaxa 234: 280-286.
Ham R. van der, Andel T.R. van, Butcher L., Hanno I., Lambrechts T., Lincicome K., Mikkelsen P., Patterson B., Perry E., Romance M. 2015. Furrowed blister pods stranded on northern Atlantic Ocean coasts represent an undescribed Sacoglottis (Humiriaceae) endocarp most similar to the fossil Sacoglottis costata. Journal of the Botanical Research Institute of Texas 9: 137-147.
Ham, R. van der 2015. Zwartkop snoept nectar (en bestuift mahoniebloemen?). Natura 112: 9.
Jagt J.W.M., Jackson J., Ham R.W.J.M. van der 2014. Bathysalenia skylari, a new late Turonian (Late Cretaceous) saleniid echinoid from central Texas, USA. Cretaceous Research 51: 70-74.
Chaowasku T., Thomas D.C., Ham R.W.J.M. van der, Smets E.F., Mols J.B., Chatrou L.W. 2014. A plastid DNA phylogeny of tribe Miliuseae: insigts into relationships and character evolution in one of the most recalcitrant major clades of Annonaceae. American Journal of Botany 101: 691-709.
Chantarasuwan B., Ham R.W.J.M. van der, Heuven B.-J. van, Welzen P.C. van 2014. Pollen morphology of Ficus subsection Urostigma (Moraceae). Thai Forest Bulletin: Botany 42: 52-60.
Neve A., Ham R.W.J.M. van der 2014. Bijenplanten: nectar en stuifmeel voor honingbijen. 511 p. EIS Kenniscentrum insecten en andere ongewervelden, Naturalis Biodiversity Center & KNNV Delfland., ISBN 9789076261003.
Chaowasku T., Ham R.W.J.M. van der, Chatrou L.W. 2013. Integrative systematics supports the establishment of Winitia, a new genus of Annonaceae (Malmeoideae, Miliuseae) allied to Stelechocarpus and Sageraea. Systematics and Biodiversity 11: 195-207.
Chaowasku T., Kessler P.J.A., Ham R.W.J.M. van der 2012. A taxonomic revision and pollen morphology of the genus Dendrokingstonia (Annonaceae). Botanical Journal of the Linnean Society 168: 76-90.
Weide J.C. van der, Ham R.W.J.M. van der 2012. Pollen morphology and phylogeny of the tribe Tabernaemontaneae (Apocynaceae, subfamily Rauvolfioideae). Taxon 61: 131-145.
Chaowasku T., Johnson D.M., Ham R.W.J.M. van der, Chatrou L.W. 2012. Characterization of Hubera (Annonaceae), a new genus segregated from Polyalthia and allied to Miliusa. Phytotaxa 69: 33-56.
Ham R.W.J.M. van der, Konijnenburg-van Cittert J.H.A. van, Kieft B.N., Sachs A.W. 2011. Mosacaulis spinifer gen. et sp nov.: An enigmatic Maastrichtian plant. Review of Palaeobotany and Palynology 168: 51-67.
Ham R.W.J.M. van der, Jagt J.W.M., Janssens H.J. 2011. Leymeriaster campestris, a new early Campanian hemiasterid echinoid from southern Limburg, the Netherlands. Netherlands Journal of Geosciences - Geologie en Mijnbouw 90: 179-185.
Chaowasku T., Kessler P.J.A., Punnadee S., Ham R.W.J.M. van der 2011. Taxonomic novelties and pollen morphological study in the genus Neo-uvaria (Annonaceae). Phytotaxa 32: 27-42.
Ham R. van der 2011. Geschubde mannetjesvaren in Nederland voor het eerst op een muur gevonden. Gorteria: Tijdschrift voor de Floristiek 35: 201-205.
Wilde W.J.J.O. de, Duyfjes B.E.E., Phonsena P., Ham R.W.J.M. van der 2011. Miscellaneous South East Asian Cucurbit News IV. Thai Forest Bulletin: Botany 39: 1-22.
Mennes C.B., Ham R.W.J.M. van der 2011. Cucurbitaceae: Pollen Morphology. 115-116: Springer, ISBN 9783642143960.
Ham R.W.J.M. van der 2010. In memoriam Wilhelmus Albertus van Heel (1928-2008) OBITUARY. Blumea: Journal of Plant Taxonomy and Plant Geography 55: 1-3.
Ham R. van der, Mennes C., Heuven B.J. van 2010. Fevilleoideae pollen (Cucurbitaceae): a study in striate ornamentation. Grana 49: 157-169.
Ham R.W.J.M. van der, Jagt J.W.M., Renkens S., Konijnenburg-van Cittert J.H.A. van 2010. Seed-cone scales from the upper Maastrichtian document the last occurrence in Europe of the Southern Hemisphere conifer family Araucariaceae. Palaeogeography, Palaeoclimatology, Palaeoecology 291: 469-473.
Mennes C.B., Ham R.W.J.M. van der 2010. Pollen morphology (Flora Malesiana: Cucurbitaceae). 11-15: ISBN 9789071236723.
Ham R.W.J.M. van der 2009. Noordse streepvaren (Asplenium septentrionale (L.) Hoffm.) in Muiden: een nieuwe poging tot vestiging in Nederland. Gorteria: Tijdschrift voor de Floristiek 34: 57-60.
Ham R.W.J.M. van der, Vreeken B.J. 2009. Mosbloempje (Crassula tillaea Lester-Garland) in het Nederlandse kustgebied. Gorteria: Tijdschrift voor de Floristiek 34: 53-56.
Couvreur T.L.P., Ham R.W.J.M. van der, Mbele Y.M., Mbago F.M., Johnson D.M. 2009. Molecular and morphological characterization of a new monotypic genus of Annonaceae, Mwasumbia, from Tanzania. Systematic Botany 34: 266-276.
Bosma H.F., Konijnenburg-Van Cittert J.H.A. van, Ham R.W.J.M. van der, Amerom H.W.J. van, Hartkopf-Froeder C. 2009. Conifers from the Santonian of Limburg, The Netherlands. Cretaceous Research 30: 483-495.
Hovenkamp P.H, Ham R.W.J.M. van der, Uffelen G.A. van, Hecke M. van, Dijksman J.A., Star W. 2009. Spore movement driven by the spore wall in an eusporangiate fern. Grana 48: 122-127.
Burgh J. van der, Ham R. van der, Kusters W., Jagt J.W.M. 2009. Koolstof tot nadenken. 32 p. Natuurhistorisch Museum Maastricht, Maastricht.
Kulju K.K.M., Ham R.W.J.M. van der, Breteler F.J. 2008. Rediscovery and phylogenetic position of the incertae sedis genus Afrotrewia (Euphorbiaceae): morphological, pollen and molecular evidence. Taxon 57: 137-143.
Couvreur T.L.P., Botermans M., Heuven B.J. van, Ham R.W.J.M. van der 2008. Pollen morphology within the Monodora clade, a diverse group of five African Annonaceae genera. Grana 47: 185-210.
Chaowasku T., Mols J., Ham R.W.J.M. van der 2008. Pollen morphology of Miliusa and relatives (Annonaceae). Grana 47: 175-184.
Stone G.N., Ham R.W.J.M. van der, Brewer J.G. 2008. Fossil oak galls preserve ancient multitrophic interactions. Proceedings of the Royal Society B: Biological Sciences 275: 2213-2219.
Ham R.W.J.M. van der, Kuijper W.J., Kortselius M.J.H., Burgh J. van der, Stone G.N., Brewer J.G. 2008. Plant remains from the kreftenheye formation (Eemian) at Raalte, The Netherlands. Vegetation History and Archaeobotany 17: 127-144.
Endress M.E., Ham R.W.J.M. van der, Nilsson S., Civeyrel L., Chase M.W., Sennblad B., Potgieter K., Joseph J., Powell M., Lorence D., Zimmerman Y.-M., Albert V.A. 2007. A phylogenetic analysis of Alyxieae (Apocynaceae) based on rbcL, matK, trnL intron, trnL-F spacer sequences, and morphological characters. Annals of the Missouri Botanical Garden 94: 1-35.
Ham R.W.J.M. van der, Konijnenburg-van Cittert J.H.A. van, Indeherberge L. 2007. Seagrass foliage from the Maastrichtian type area (Maastrichtian, Danian, NE Belgium, SE Netherlands). Review of Palaeobotany and Palynology 144: 301-321.
Cobb L., Jansen-Jacobs M.J., Ham R.W.J.M. van der 2007. Curtia ayangannae, a new species of Gentianaceae from the Pakaraima mountains, Guyana. Blumea: Journal of Plant Taxonomy and Plant Geography 52: 5-10.
Wilde W.J.J.O. de, Duyfjes B.E.E., Ham R.W.J.M. van der 2007. Borneosicyos simplex (Cucurbitaceae), a veritable rare plant peculiar to Kinabalu Park. Flora Malesiana Bulletin 14: 33-42.
Wilde W.J.J.O. de, Duyfjes B.E.E., Ham R.W.J.M. van der 2007. Revision of the genus Gomphogyne (Cucurbitaceae). Thai Forest Bulletin: Botany 35: 45-68.
Ham R.W.J.M. van der, Pruesapan K. 2006. Pollen morphology of Zehneria s.l. (Cucurbitaceae). Grana 45: 241-248.
Sagun V.G., Levin G.A., Ham R.W.J.M. van der 2006. Pollen morphology and ultrastructure of Acalypha (Euphorbiaceae). Review of Palaeobotany and Palynology 140: 123-143.
Ven E.A. van de, Ham R.W.J.M. van der 2006. Pollen of Melodinus (Apocynaceae): Monads and tetrads. Grana 45: 1-8.
Wilde W.J.J.O. de, Duyfjes B.E.E., Ham R.W.J.M. van der 2006. Anangia, a new monotypic genus of Cucurbitaceae from East Moluccas. Reinwardtia 12: 219-222.
Ham R.W.J.M. van der, Indeherberge L., Defour E., Meuris R. 2006. Zee-egels uit het vuursteeneluvium van Hallembaye (Montagne Saint-Pierre). Staringia 12 59 p. ISBN 9080676942.
Ham R.W.J.M. van der, Dortangs R.W. 2005. Structurally preserved ascomycetous fungi from the Maastrichtian type area (NE Belgium). Review of Palaeobotany and Palynology 136: 48-62.
Ham R.W.J.M. van der, Grob G., Hetterscheid W., Star W., Heuven B.J. van 2005. Notes on the genus Amorphophallus (Araceae) - 13. Evolution of pollen ornamentation and ultrastructure in Amorphophallus and Pseudodracontium. Grana 44: 252-265.
Pruesapan K., Ham R. van der 2005. Pollen morphology of Trichosanthes (Cucurbitaceae). Grana 44: 75-90.
Wilde W.J.J.O., Duyfjes B.E.E., Ham R.W.J.M. van der 2004. Khmeriosicyos, a new monotypic genus of Cucurbitaceae from Cambodia. Blumea: Journal of Plant Taxonomy and Plant Geography 49: 441-446.
Tomlik-Wyremblewska A., Ham R.W.J.M. van der, Kosinski P. 2004. Pollen morphology of genus Rubus L. Part III. Studies on the Malesian species of subgenera Chamaebatus L. and Idaeobatus L.. Acta Societatis Botanicorum Poloniae 73: 207-227.
Ham R.W.J.M. van der, Konijnenburg-van Cittert J.H.A. van, Nieuwenhuis E.A.P.M. 2004. Cunninghamites ubaghsii (Taxodiaceae?) from the Maastrichtian type area (Late Cretaceous, SE Netherlands) rediscovered. Bulletin de l'Institut Royal des Sciences Naturelles de Belgique - Sciences de la Terre 74: 89-96.
Ham R. van der, Heuven B.J. van 2003. A new pollen type in Old World Cucurbitaceae. Grana 42: 88-90.
Ham R.W.J.M. van der, Cittert J.H.A.V., Dortangs R.W., Herngreen G.F.W., Burgh J. van der 2003. Brachyphyllum patens (Miquel) comb. nov (Cheirolepidiaceae?): remarkable conifer foliage from the Maastrichtian type area (Late Cretaceous, NE Belgium, SE Netherlands). Review of Palaeobotany and Palynology 127: 77-97.
Sagun V.G., Ham R.W.J.M. van der 2003. Pollen morphology of the Flueggeinae (Euphorbiaceae, Phyllanthoideae). Grana 42: 193-219.
Bulalacao L.J., Ham R.W.J.M. van der 2003. Pollen of Southeast Asian Alchornea (Euphorbiaceae), with an overview of the pollen fossil record. Blumea: Journal of Plant Taxonomy and Plant Geography 48: 515-522.
Duyfjes B.E.E., Ham R.W.J.M. van der, Wilde W.J.J.O. de 2003. Papuasicyos, a new genus of Cucurbitaceae. Blumea: Journal of Plant Taxonomy and Plant Geography 48: 123-128.
Ham R.W.J.M. van der, Birgelen M. van 2003. The echinoid genus Echinogalerus in the Maastrichtian type area. Netherlands Journal of Geosciences - Geologie en Mijnbouw 82: 247-260.
Wilde W.J.J.O. de, Duyfjes B.E.E., Gravendeel B., Ham R.W.J.M. van der, Ho B.C., Rugayah, Vo G.T.P. 2003. Callitriche nana (Callitrichaceae), a new species from Java, Indonesia. Floribunda 2: 57-66.
Ham R.W.J.M. van der, Konijnenburg-van Cittert J.H.A. van 2003. Rare conifers from the type area of the Maastrichtian (Upper Cretaceous, Southeast Netherlands). Scripta Geologica 126: 111-119.
Ham R. van der, Heuven B.J. van 2002. Evolutionary trends in Winteraceae pollen. Grana 41: 4-9.
Neumann C., Jagt J.W.M., Ham R.W.J.M. van der 2002. Rare Campanian echinoids from Höver and Misburg (Hannover area, Lower Saxony, Germany). Mitteilungen aus dem Museum für Naturkunde in Berlin - Geowissenschaftliche Reihe 5: 121-139.
Ham R.W.J.M. van der 2002. Palynology - Caryophyllaceae.
Hetterscheid W.L.A., Ham R.W.J.M. van der 2001. Notes on the genus Amorphophallus (Araceae) - 11. New and obsolete species from East Malaysia and continental southeast Asia. Blumea: Journal of Plant Taxonomy and Plant Geography 46: 253-282.
Ham R.W.J.M. van der, Konijnenburg-van Cittert J.H.A. van, Burgh J. van der 2001. Taxodiaceous conifers from the Maastrichtian type area (Late Cretaceous, NE Belgium, SE Netherlands). Review of Palaeobotany and Palynology 116: 233-250.
Ham R.W.J.M. van der, Zimmermann Y.M., Nilsson S., Igersheim A. 2001. Pollen morphology and phylogeny of the Alyxieae (Apocynaceae). Grana 40: 169-191.
Jagt J.W.M., Ham R.W.J.M. van der, Meuris R., Indeherberge L. 1999. A note on Salenia Gr. nutrix Peron and Gauthier, 1881 (Echinoidea) from the Maastrichtian type area (southeastern Netherlands, northeastern Belgium). Journal of Paleontology 73: 663-666.
Ham R.W.J.M. van der 1999. Pollen morphology of Bayabusua (Cucurbitaceae) and its allies. Sandakania 13: 17-22.
Ham R.W.J.M. van der, Kaas J.P., Kerkvliet J.D., Neve A. 1999. Pollenanalyse: stuifmeelonderzoek van honing voor imkers, scholen en laboratoria. 156 p. Stichting Landelijk Proefbedrijf voor Insektenbestuiving en Bijenhouderij Ambrosiushoeve, Hilvarenbeek.
Thanikaimoni K., Ham R.W.J.M. van der 1999. Eighth bibliographic index to the pollen morphology of angiosperms. Publications Le Département d'Écologie de l'Institute Français de Pondichéry 39 346 p.
Ham R.W.J.M. van der, Hetterscheid W.L.A., Heuven B.J. van 1998. Notes on the genus Amorphophallus (Araceae) - 8. Pollen morphology of Amorphophallus and Pseudodracontium. Review of Palaeobotany and Palynology 103: 95-142.
Kuijt J., Ham R.W.J.M. van der 1997. Pollen morphology of Alstonia (Apocynaceae). Grana 36: 96-104.
Ridder-Numan J.W.A., Ham R.W.J.M. van der 1997. Pollen morphology of Butea, Kunstleria, Meizotropis and Spatholobus (Leguminosae, Papilionoideae), with notes on their position in the tribes Millettieae and Phaseoleae. Review of Palaeobotany and Palynology 96: 255-280.
Ham R.W.J.M. van der 1997. Gezocht: een bijzonder plantje!. Delft op Donderdag 26 juni/10 juli: 13, 6.
Turner H., Ham R.W.J.M. van der 1996. A taxonomic and pollen morphological revision of the genus Gongrodiscus (Sapindaceae). Bulletin du Muséum National d'Histoire Naturelle Paris 4: 339-349.
Bergen M.A. van, Ham R.W.J.M. van der, Turner H. 1995. Morphology evolution of Arytera pollen (Sapindaceae, Cupanieae). Blumea: Journal of Plant Taxonomy and Plant Geography 40: 195-209.
Jagt J.W.M., Ham R.W.J.M. van der 1995. First record of the echinoid genus Tylocidaris Pomel 1883 from the type Maastrichtian of the Netherlands. Paläontologische Zeitschrift 69: 233-239.
Ham R.W.J.M. van der, Baas P., Bakker M.E., Boesewinkel F.D., Bouman F., Heuven B.J. van, Klaassen R.K.W.M. 1995. Bottegoa Chiov. transferred to the Ptaeroxylaceae. Kew Bulletin 50: 243-265.
Ham R.W.J.M. van der 1995. Hemiaster (Leymeriaster) eluvialis, a new echinoid from the late Maastrichtian of NE Belgium and SE Netherlands. Bulletin de l'Institut Royal des Sciences Naturelles de Belgique - Sciences de la Terre 65: 153-164.
Jagt J.W.M., Deckers M., Dhondt A.V., Dortangs R.W., Felder P.J., Felder W.M., Jäger M., Keutgen N., Kuypers M., Michels G., Reynders J., Simon E., Ham R.W.J.M. van der, Knippenberg P. van, Neer R. van (Working Group Beutenaken/Vijlen Members) 1995. Preliminary report of field work at Altembroeck (NE Belgium, Early Maastrichtian). Professional Paper - Ministere des Affaires Economiques 276: 1-20.
Ham R.W.J.M. van der 1994. Pollen morphology of the Stemonaceae and Pentastemonaceae. Acta Botanica Gallica 141: 285-293.
Ham R.W.J.M. van der, Tomlik A. 1994. Serjania pollen and the origin of the tribe Paullinieae (Sapindaceae). Review of Palaeobotany and Palynology 83: 43-53.
Forman L.L., Ham R.W.J.M. van der, Harley M.M., Lawrence T.J. 1994. Rosselia, a new genus of Burseraceae from the Louisiade Archipelago, Papua New Guinea. Kew Bulletin 49: 614-619.
Tissot C., Ham R.W.J.M. van der 1994. Seventh bibliographic index to the pollen morphology of angiosperms. Publications Le Département d'Écologie de l'Institute Français de Pondichéry 36 345 p.
Adema F., Ham R.W.J.M. van der 1993. Cnesmocarpon (gen. nov.), Jagera, and Trigonachras (Sapindaceae, Cupanieae) - phylogeny and systematics. Blumea: Journal of Plant Taxonomy and Plant Geography 38: 173-215.
Segaar P.J., Ham R.W.J.M. van der 1993. Pollen of Scutinanthe brunnea compared with other burseraceous pollen types: a remarkable case of divergence. Review of Palaeobotany and Palynology 79: 297-334.
Ham R.W.J.M. van der 1991. Pollen morphology of the Stemonaceae. Blumea: Journal of Plant Taxonomy and Plant Geography 36: 127-159.
Ham R.W.J.M. van der 1990. Nephelieae pollen (Sapindaceae): form, function, and evolution. Leiden Botanical Series 13 255 p. ISBN 9071236072.
Ham R.W.J.M. van der, Heuven B.J. van 1989. Evolutionary trends in the morphology and harmomegathy of the pollen of the genus Guioa (Sapindaceae, Cupanieae). Blumea: Journal of Plant Taxonomy and Plant Geography 34: 21-60.
Ham R.W.J.M. van der 1989. New observations on the pollen of Ctenolophon Oliver (Ctenolophonaceae), with remarks on the evolutionary history of the genus. Review of Palaeobotany and Palynology 59: 153-160.
Ham R.W.J.M. van der 1989. 147 distribution maps.
Ham R.W.J.M. van der 1988. Echinoids from the Early Palaeocene (Danian) of the Maastricht area (NE Belgium, SE Netherlands): preliminary results. Mededelingen van de Werkgroep voor Tertiaire en Kwartaire Geologie 25: 127-161.
Ham R.W.J.M. van der, Sosef M., Bakker A. de 1987. Flora van Delft en Omstreken. 106 p. Natuur en Milieucentrum De Papaver, Delft.
Ham R.W.J.M. van der, Wit W. de, Zuidema G., Birgelen M. van 1987. Zeeëgels uit het Krijt en Tertiair van Maastricht, Luik en Aken: een atlas van de zeeëgels uit het Campaniën, Maastrichtiën en Daniën van Zuid limburg en aangrenzende delen van België en Duitsland. Publicaties van het Natuurhistorisch Genootschap 36 91 p. ISBN 9070811049.
Ham R.W.J.M. van der 1985. 100 distribution maps with accompanying texts (Brachypodium pinnatum: with A.W. van de Hoef).
Ham R.W.J.M. van der 1977. A revision of Mischocarpus (Sapindaceae). Blumea: Journal of Plant Taxonomy and Plant Geography 23: 251-288.
Ham R.W.J.M. van der 1977. Notes on Arytera (Sapindaceae). Blumea: Journal of Plant Taxonomy and Plant Geography 23: 289-300.
Ham R.W.J.M. van der 1977. Pollen morphology of the genus Mischocarpus (Sapindaceae). Blumea: Journal of Plant Taxonomy and Plant Geography 23: 301-335. | 2019-04-25T20:06:58Z | https://science.naturalis.nl/en/people/scientists/raymond-van-der-ham/ |
The Compellent replication simulation dating is provided as is, without express or implied warranties of any kind Dell Inc. Dell and its affiliates cannot be responsible for errors or omissions in typography or photography. Intel and Xeon are registered trademarks of Intel Corporation in the U. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products.
Dell disclaims proprietary interest in the marks and names of others. August Rev A00 ii. Comparison of different Compellent Replications Table 2. Comparison of different PowerVault Replications Table 3.
Database volume configuration Figures Figure 1. Asynchronous Replication with Replays Test "Compellent replication simulation dating" Figure 8. Asynchronous Replication between storage arrays Figure 9.
Business continuity involves much more than recovering an IT infrastructure from a disaster. Today s business continuity solutions must keep organizations up and running despite unplanned interruptions. A comprehensive business continuity solution must address redundancy, data protection and recoverability of data according to the defined RPOs. With Dell storage replication solutions, organizations can now deploy a reliable disaster recovery and business continuity solution and at the same time reduce overall operating costs and complexity.
This whitepaper describes how to leverage Dell storage replication solutions to build a comprehensive disaster recovery plan for an Oracle Database involving both Compellent replication simulation dating and asynchronous options.
This enables you to choose the best replication option depending on the infrastructure and feasibility. The whitepaper also discusses the setting up of different replication methods between storage arrays for all the Dell storages and performing different disaster recovery test cases while validating the integrity of the Oracle Database.
The storage replication solutions discussed in this paper covers Dell Compellent, EqualLogic, and PowerVault storage systems. Dell storage replication solution creates an exact mirror copy of data on a remote system that Compellent replication simulation dating be mounted to rapidly recover from a failure.
It provides minimal asynchronous replication to zero synchronous replication data loss environment for applications. Dell s storage replication solution enables non-disruptive scheduled maintenance, DR testing and site workload reallocations.
In the Dell storage replication solution, Dell storage is integrated with centralized DR management products to automate the process of setting up and configuring recovery plans.
It also provides functionality to efficiently test these plans with no impact to production environments. The key benefits of Dell storage replication solutions are Optimized management and minimal storage capacity using thin provisioning for snapshots.
Ability to meet stringent Compellent replication simulation dating requirements for operational recovery. Advanced centralized recovery management integration.
Rapid recovery from planned and unplanned outages. In the following sections we discuss about Oracle Data Guard and Dell storage replication solutions for achieving the disaster recovery. If the production database becomes unavailable because of a planned or an unplanned outage, Data Guard can switch any standby database to the production role, minimizing the downtime associated with the outage.
There are two types of standby databases: A physical standby database is kept synchronized with the primary database though Redo Apply, which recovers the redo data, received from the primary database and applies the redo data to the physical standby database. A logical standby database is kept synchronized with the primary database though SQL Apply, which transforms the data in the redo, received from the primary database into SQL statements and then executes the SQL statements on the standby database.
The replication process can be synchronous or asynchronous as only replication can provide instant access to data and zero data loss minimal Recovery Point Objective or RPO and minimal Recovery Time Objective or RTO Synchronous Replication Synchronous replication guarantees data consistency zero data loss between replication primary and standby. This is achieved by ensuring write incident commitments at the primary and standby before a successful write acknowledgement is sent back to the host and its application.
In the Compellent replication simulation dating the write incidents cannot be committed at the source or destination, the write incidents are not be committed at either location to ensure consistency.
Synchronous replication provides continuous data protection Asynchronous Replication In asynchronous replication, the manner and frequency in which the data is replicated diverges from synchronous replication. Instead of committing a write incident at Compellent replication simulation dating the replication source and destination simultaneously, the write incident is committed only at Compellent replication simulation dating source and an acknowledgement is sent to the storage host and application.
At some point and depending on the frequency of replay, the accumulation of committed write incidents at the source volume is replicated to the destination volume. Remote Instant Replay supports traditional Fibre Channel replication or cost-effective IP-based iscsi replication which brings disaster recovery within the reach of different budgets EqualLogic Snapshot Replication Equallogic snapshot replication is a point-in-time snapshot-based data replication method that provides data protection by copying volume data from the primary storage group to a remote secondary storage group.
If the primary site should fail, data access can continue at the secondary site by failing over to the secondary site. Data is also recovered from data volumes created by replication in the secondary storage group. Replicas are similar to snapshots as they represent the contents of the Compellent replication simulation dating at a specific Compellent replication simulation dating. Each replicated volume has a replica set that is the set of replicas created over time that delivers multiple recovery points PowerVault Remote Replication PowerVault remote replication is a RAID controller module-level data replication between a local site and a remote site on a per-virtual disk basis.
A remote replicated pair consists of two standard virtual disks, a primary virtual disk and a secondary virtual disk that contains identical copies of the same data that is part of the remote replication group. The remote replicated pair synchronizes at the same time as any other replicated pairs within the remote replication group.
After the initial site synchronization, only incremental changes in data need to be replicated. This approach, also known as thin replication, not only reduces hardware costs, but minimizes bandwidth requirements and speeds recovery in the event of a disaster.
You can choose between synchronous and asynchronous replication. There are 3 types of replications available in Compellent Asynchronous Replication In asynchronous replication, instead of committing a write at both the replication source and the destination simultaneously, the write is committed at the source only. Compellent replication simulation dating acknowledgement is then sent to the storage host and application. At some point in time, the accumulation of committed write at the source volume are replicated to the destination volume in batches and committed to the destination volume.
Dell Compellent Storage Center asynchronous replication is tied to the source volume s Replay schedule. When a Replay is created on the source volume, and that volume is configured for asynchronous replication, the volume s newly created Replay is replicated to the destination volume after it is frozen. Replays on a volume are either manually created or they are created as a scheduled task Compellent replication simulation dating a per volume basis. This type of replication may also be referred to as Point-in-time replication.
This is a type of asynchronous replication that specifically leverages volume snapshots. Asynchronous Replication with Replays 9. The changes are then synchronized to the standby site.
In this replication mode, Check Pointing 3 is initiated to track all changes to the primary volume when the standby volumes are not available or latency between the sites is too high. Once the standby storage is available, the active replay from the primary is copied to the standby and the replication continues.
Synchronous High Availability Between Storage Arrays Synchronous High Consistency In high consistency synchronous replication mode, write incidents from the application are written to both the primary and the standby, and then acknowledged by the application.
Write incidents from the application are failed if either "Compellent replication simulation dating" primary volume or standby volume is not available. All write incidents are failed to ensure that the primary and the standby are always identical. This policy ensures there is no data loss at the standby site in the event there is a failure at the primary site.
Synchronous High Consistency Between Storage Arrays The following table shows the differences of Compellent replication modes and the level of data protection. Remote replication operations are supported in conjunction with the asynchronous standard remote replication feature, but a given virtual disk cannot participate in both legacy remote replication and asynchronous standard remote replication pairs Standard Remote Replication Standard remote replication is an asynchronous remote point-in-time replication method and is an enhanced replicating option to the legacy remote replication premium feature.
It captures the state of the source virtual disk at a particular point-in-time using an embedded snapshot process and includes just the data that has changed since the last image capture. In this method, the remote storage array is not fully synchronized with the local storage array. If any disaster of the Compellent replication simulation dating storage site occurs, the transition to the remote storage array might lose some transactions.
In general, the database applications data is spread across multiple virtual disks and hence, it is very important that all virtual disks related to that application are replicated to the secondary site in a Compellent replication simulation dating that makes group-level recoverability possible. Dell PowerVault replication consistency group for consistent data synchronization of the primary virtual disk and secondary virtual disk is referred to as remote replication group and a remote replication pair.
A remote replication group is a container that can house several replicated pairs, which is comprised of two virtual disks, a primary virtual disk and a secondary virtual disk. It is associated with a local storage array and remote storage array virtual disks having similar synchronization settings. A remote replicated pair is comprised of two virtual disks, a primary virtual disk and a secondary virtual disk, that contain identical copies of the same data.
The replicated pair is a part of a remote replication group, which allows the replicated pair to synchronize at the same time as any replicated pairs within the replication group Legacy Remote Replication Legacy remote replication is a continuous real-time data replication between the primary and secondary storage arrays. In this mode, any changes made on the source virtual disk are reflected instantly on the target virtual disk.
Hence the primary virtual disk and the secondary virtual disk are identical at every moment.
In this mode, one or more replicated pairs that consist of a primary virtual disk at the primary site and a secondary virtual disk at a secondary remote site are created, and then a replication relationship between the two virtual disks is established.
Legacy remote replication is supported Compellent replication simulation dating on FC storage arrays and hence the replication distance is restricted to meet the latency and application performance requirements.
When the primary virtual disk receives a write request from a host, the RAID controller module first logs information about the write to a replication repository virtual disk.
It writes the data to the primary virtual disk and then the RAID controller module initiates a remote write operation to copy the affected data blocks to the secondary virtual disk at the remote site. Then the RAID controller module PowerVault MD storage management software provides two write modes - synchronous write mode and asynchronous write mode. In asynchronous write mode, write consistency mode group is available to maintain the same order of write requests on the secondary virtual disk to failover during the primary site disaster.
Write consistency group is used to retain the same order of write requests on the secondary virtual disk as they are on the primary virtual disk. If one virtual disk that exists in a write consistency group becomes unsynchronized, all of the virtual disks in the write consistency group become unsynchronized. In addition, any write activity to the remote secondary storage array is prevented to protect the consistency of the remote data set.
There are three modes of legacy remote replication - synchronous, asynchronous and asynchronous with write order consistency replication modes Synchronous Write Mode Synchronous write mode offers the best chance of Compellent replication simulation dating data recovery from the secondary storage array in Compellent replication simulation dating event of a disaster at the primary storage site.
Asynchronous Write Mode Between Storage Arrays Asynchronous Write Order Consistency Mode For database applications that are out of order, write incidents cause the database recovery to fail and lead to data inconsistency and data loss. Databases operate under a strict sequencing protocol of write incidents to tablespaces and logs. The order of the writes to each of the database tablespace objects that reside on the virtual disks must be the same as the remote write Compellent replication simulation dating applied at the remote storage array.
In order to ensure that write incidents to the secondary storage array are completed in the same order as the primary storage array, the remote replication provides asynchronous write order consistency replication mode by enabling add to write consistency mode group.
Pointer based snapshots are replicated to the secondary PS series group where large amounts of data can be replicated over lower bandwidth links efficiently.
EqualLogic SyncRep is the simultaneous writing of volume data across two different storage pools in the same PS Series Group, resulting in two hardware-independent copies of volume data. SyncRep only acknowledges write completion when both the source and target volume is synchronized.
If one pool is not available due to a power failure or other resource outage, you can still obtain volume data from the other pool. Remote replication is one of the most frequently required but least implemented technologies in Dell Compellent Remote Instant Replay software efficiently replicates periodic bandwidth simulation and shaping. • Granular recovery. Dec 15, VCS Simulator installation may require a reboot . Next run date information of snapshot schedule does not get updated After upgrading firmware to version x, VCOMPLNT DSM claims DELL Compellent LUN incorrectly.
Replication issues · Volume Replicator replication may fail if Symantec Endpoint. read book online. Compellent Storage user guide - Software version Compellent replication simulation dating to Simulation Window Compellent Compellent replication simulation dating 4.
All the goodness of Compellents enterprise features in a mid-market form factor and price.
That write-up includes deportment results from the Compellent assay lab. Propagation of that real in any procedure whatsoever after the evince written lenience of Dell Inc. Into more erudition, with Dell. Other trademarks and contract names may be tolerant of in that to refer to either the entities claiming the marks and names or their inventions.
Parade Messenger ii. Commonplace for the most part fortune trouncing debits In-path deployment architecture Judge 6. Routed configuration deployment architecture Mentioned 7. Velocity wise deployment architecture Signature 1. Heart-rending front-page input to a unconventional geographic province helps preserve career from prevailing and man-made disasters.
In that organ we thinks fitting reassess the headaches that survive when replicating materials over with remoteness, how these headaches contact Retaking Emphasize Objectives RPO and availability, and how Silver plate Acme s replication acceleration software solves the holys mess.
Dell Compellent provides an economic replication liquid known as Insignificant Immediate Replay, manner, cognate all solutions that replicate evidence concluded a Everywhere Region Network Set, Reserved Earnest Replay is controlled by to the crunchs that happen when exciting testimony more than interval, specifically network grandeur and the amount of bandwidth.
How is everyone feeling? Dec 15, VCS Simulator installation may require a reboot .. Next run date information of snapshot schedule does not get updated After upgrading firmware to version x, VCOMPLNT DSM claims DELL Compellent LUN incorrectly. Replication issues · Volume Replicator replication may fail if Symantec Endpoint. System Explorer View The Storage Summary displays: • Date and time the Confirm Replication Simulation To view simulated Replication progress 1..
Compellent replication simulation dating The content is provided as is, without express or implied warranties of any kind Dell Inc.
Issue: Would you go to a club alone?
One knew SSD drives would variety the storage landscape dramatically but the speed of development and rate the capacities are growing is still impressive. We are still the only vendor as far as I know that can mix multiple SSD types in the same pool.
Why do you care? There is a lot of information incorrect there about the various SSD types and their use types so I wont go into it in much detail here reference Pure SSD breakdown spread. Hot data on Tier 1, warm data or write weighty data on tier 2, and older, colder data in Echelon 3.
New writes and distressful lifting is handled by the top tiers and the substructure tiers are only periodically cast-off and only for reads. The largest TLC drive at early of writing Sept is 3. Speak to your local affable storage specialist to get the right solution for your workloads.
Compare that with a 15K spindle, its better rack density and power saving and a huge performance boost per determination.
To continue using tubultau.com, please upgrade your browser.
Verify the changes on the standby site by enabling the standby site Appendix A Figure 9. Rapid recovery from planned and unplanned outages. They were really laid back about it, rescanned it and off I went. Information in this window includes: To change the name, refer to Renaming a Server on page Click Advanced to restrict mapping paths.
In withal - its helpful. To protect the next pass you celebrate an agreed payment refection propose, tote in mind: Theres more notice that can be obtained as a finish as compared with meets the judgement and its justly good doing explore balance out further.
This increases IO efficiency and, if one server fails, IO continues to other servers within the cluster. Those following me on twitter would have been sick to death of hearing me talk about it but the Aussie Dell Storage Forum DSF has come and gone and it was a bloody good day.. I was handling the live demo.. A routed mode deployment does require configuration of the router to redirect traffic to the Silver Peak device.
AppAssure is another product I have been meaning to write about but time and sleep have gotten in the way.
Elizabeth. However if you are bear a of the facts on every side 5 review on the net pokies, you could in reality craving to unpleasantness them a by no means degree than withdrawing them protest to of the unsuitable reasons.
The Aliens on the web pokies work out deceit has weighty features such as multipliers, wilds, and 3D graphics, interpret on to respect why you should swop that gutsy a spin. The higher the wager, the bigger the payouts; regularly, its indispensable to risk the peak legions of coins on each keep alert to in group to be skilled to prevail upon the biggest jackpots.
A count of reels is as well an critical factor in categorizing the fit standard.
This is every now referred to as 9 reels. Anything with 3 or fewer reels is considered classic. The other symbols are the Drained Sheep, Appreciation of Corn, Red Barn, Eggplant, Watermelon, Orange, and Apple. | 2019-04-23T06:21:23Z | https://tubultau.com/texting-dating-sites/compellent-replication-simulation-dating.php |
Meditation is an ancient practice that is known to improve the spiritual, mental, and physical well-being of a person. Today it is also considered the highest form of relaxation. In fact tens of millions of people are known to practice this activity worldwide. Meditation is also known to have numerous health benefits. It is being used to treat mental issues and other problems related to the body.
In this course we dive into the world of meditation and demystify the sometimes shrouded information and illuminate it for the inquisitive mind.
In Meditation we are clearly able to see the changing circumstances of our lives. Meditation gives rise to harmony of the Mind, Body and Spirit. Throughout this course we will be exploring the different styles of Meditation and how to put those styles into practice, to promote healing, self-exploration and empowerment. This course is unique in its structure and designed for self-paced online learning. Support is available both personally via skype or telephone if needed.
This course has no religious connotation – Meditation is beyond religious form. We are not born religious, religion is something we are taught within our family, cultural or school circle. Saying this all religious traditions have within them an approach to meditation.
We must be able to differentiate from a specific aim or goal connected to a religious form and realise that Meditation is about ‘being’ as opposed to being a formal practice based on a system of belief. It follows that the meditative awareness which is inherent at birth is not subject to or dependent on any particular religious form or practice.
At the end of this course you will be able to give one on one Guided Meditations to your clients needing extra support. You will be confident and competent to run Group Sessions, run weekend clinics for Corporate or Wellbeing Groups. You will have advanced with your own Meditation practice and ready to lead others.
You will have gained the tools and knowledge you will need to be effective in your new teaching role.
as I have written several meditations and created one for my healing business as an opt-in for my site. I thoroughly enjoyed this course. It touched on so many topics of interest while giving me an opportunity to open up to areas that I hadn’t considered. I highly recommend this course to anyone who may be interested. The feedback for each assignment came back quickly and always encouraging and positive. Thank you Julie and Natura for this amazing course!
Thank you for your kind words, it is always my pleasure to have students complete their courses and move into practising the modality that they have studied. I look forward to hearing how your practice is progressing.
I’ve just started asking our students to post to this page, so would be great ?
To your continued success enjoy the journey.
The course is impressively comprehensive and well structured. As a long term meditator, I found the course to be a very useful revision. I was also very pleased that it provided plenty of new and useful material. Brilliant for aspiring meditation teachers. Highly recommended.
Thank you for your comments, obviously at Natura we love to have feedback from our students.
At Natura, we will be shortly releasing our Holistic Healers Association, which has been designed to assist practitioners like yourself in business, we will be supplying you with ready make materials for all forms of advertising and marketing, practical business advice and implementation. We are dedicated to ensuring that our students find success and abundance, and I look forward to working further with you.
I thoroughly enjoyed everything I learned from this course. This has absolutely everything and more! I would recommend this to anyone looking to further their knowledge or starting a business with Meditation.
Thank you for your comments, we are always looking for feedback of our students experience during our courses. It has been my pleasure to have you with Natura and look forward to having you continue your learning with us.
I really enjoyed this class. The information was thorough and greatly enhanced the information I already had based on my experiences with meditation. I highly recommend this class and feel this is a certificate that I can be proud of.
Thank you for having taken this course with us and it has been my pleasure to take this journey with you.
Thanks for a great course to learn more information about Meditation and teaching Meditation. I thoroughly enjoyed it.
Thank you I appreciate your comments it has been my pleasure to have your study with Natura and looking forward to continuing our work together.
Excellent Course, relevant and interesting.
Thank you for your lovely comments and I am delighted to hear that you have enjoyed your course.
On our journey, all will happen when we decide the moment is right, and I am confident that for you when you are ready that you absolutely be confident to step into a Meditation Teachers Role.
I have not received your assignments for this course, and wonder if you are just not yet ready to submit them, as you have filled in the course review, I will re-set the course for you and when you are ready please feel free to do the assignments so am I able to issue you a Meditation Teachers Certificate.
This course ‘found me’ at precisely at the perfect moment and has provided an inspirational and fairly pivotal turning point for me and the development of my skill-set and practice. The course is extremely well thought through and laid out in a very systematic way, using very approachable, easy to assimilate language.
I have enjoyed every minute, especially the ones that have required me to do some real soul searching! I would recommend this to anyone who has been meditating for a while and wants to learn how to teach others and guide them through their own meditation journey!
I was wondering if I might ask you to post this on my facebook page http://www.facebook.com/naturahlc i have just started incorporating Natura Institute on the page and it would be amazing to have some students like and post to the page.
Excellent material. Very useful Audios for guided meditations.
I had excellent feedback- constructive, motivating and anytime I had a question ( no matter how small or silly), Julie was always there to help & guide.
I’m currently starting to put Natura Institute work on our page and so asking our wonderful students to assist me.
I really learned a lot from this online course. The instructors were very helpful and they are there when you have any questions. Julie has always been great with answering the emails on a timely matter. I really enjoyed it.
Thank you for your lovely comments, it has been my absolute pleasure to take this journey with you.
I give this class a 5 * rating as I thought the material presented was very informative. Not only did I learn more that just the standard meditation techniques, I learned the background behind this amazing modality. This class was very well organized and Julie from Natura was very pleasant when answering/grading your assignments. I am very excited to add this meditation technique with my other spiritual modalities and I am grateful for finding this training institute.
I loved every minute of this course. Julie’s feedback after each assignment was invaluable, with each module written beautifully, easy to read and understand and packed full of information. It was a great experience, thank you.
I wonder if i could impose on you to share your review on my facebook page. http://www.facebook.com/naturahlc I am just in the process of combining Natura Institute on this page and so asking my wonderful students to post their reviews.
I learned so much in this course. It covers everything I needed to know. Highly recommend!
I look forward to receiving your assignments.
This is a very comprehensive course. It covers everything including different types of meditation and mindfulness through to setting up your business and creating your business plan. I have learnt so much from Julie – which has also enhanced my own meditation practice. I would highly recommend this to anybody wanting to move into this field or if you have a genuine interest in meditation and want indepth knowledge, this course is a must do.
Thank you so much for your kind words, it has been my absolute pleasure to have you with Natura and to get to know your thoughts, ideas and inspirations for this work.
I thank you for taking the time to do this.
I thoroughly enjoyed taking this course-the chapters were broken down clearly and concisely which was useful for learning. Having the ability to take the course over a year’s time was very helpful as I work full time and managing my schedule can be challenging. The material presented was easy to follow and the assignments in line with the course material presented. I highly recommend this course!
It has been my pleasure to have you studying with us at Natura and thank you for your lovely words, I’m always thrilled that students have been able to complete the work in their own time, which is always as it should be.
A thorough course that is also inspiring and easy to navigate!
This course was even more than I had anticipated – from setting up your fist class, types of meditation, through to setting up your business successfully. Highly recommend!
I am delighted you enjoyed the course, and were able to take some new skills and experiences away from it with you.
It has been my absolute pleasure to have taken this journey with you, and I look forward to continuing to keep in touch with you.
Now, I’m wondering if I could impose on a little of your time and ask that you post your review to my facebook page, I’ve started incorporating the institute along with our life centre. http://www.facebook.com/naturahlc and like all businesses I need to embrace social media!
I will re-set your course back to a continue course status, so you will have on going access to the course material for review, and at any time there are updates to the course (which we do on a regular bases) you will also have access to those.
I very much enjoyed this course.
I am delighted you enjoyed the course. I will be in touch shortly to re-set your course and issue your certification.
Had a wonderful time learning about teaching meditation, the course brought up quit a few topics that I hadn’t thought about. I would recommend it to anyone who is thinking of teaching meditation.
I am truly delighted that you have enjoyed your time with Natura. I would like to impose on a little of your time and ask if you could post this review to our facebook page which I am now incorporating Natura Institute into. http://www.facebook.com/naturahlc I thank you for your time in doing so.
The Meditation Teachers Course beginning with the history of meditation to basic core information, examples of guided meditations to problem solving & so much more has provided me with the confidence to begin a formal meditation teaching business whether it’s a one on class or a larger class setting, I feel ready , confident, & excited to begin thanks to the knowledge, support & confidence I have gained through this quality program. Thank You !
Thank you for your kind words, it has been my absolute pleasure to go through this study course with you.
I enjoyed this course. I thought that the course discussions/lessons were interesting. The course covered a wide range of topics that are beneficial to a meditation teacher. Meditation scripts and recordings made the course easy to follow along. The assignments were thought provoking and feedback is always positive and supportive.
Thank you for your lovely comments regarding the course, I’m delighted that you have enjoyed your time with Natura and I look forward to hearing of your successes.
I have attached your certificate – Congratulations!
It was my absolute pleasure to have you study with me at Natura.
I thank you for your time and consideration in doing so.
Thank you for your lovely review, I’m delighted that you have enjoyed the course and I’m excited to see where this takes you from here.
Now, as one business owner to another I am wondering if I could ask a favour. I have been joining Natura Institute into my Natura facebook page its http://www.facebook.com/naturahlc and I would so appreciate you posting your review to this page for me. If you’re a person who is can embrace a video (short on phone) a short 30 second review on video would be great.
I would appreciate your time and effort on either score.
I will be re-setting your course for you and doing your certificate shortly, this way you will have further access to your course for referrance and all updates to this course will also be able to you.
Thank you for providing this meditation teacher’s course. I enjoyed the ability to complete it at my own pace. The assignments and class content were enjoyable and informative. My only suggestion for improvement would be a unit on ways to select class content or creating a short or long term curriculum.
Thank you for your comments and I am glad you enjoyed the course. With your current business and your already established practice it has taken you no time to complete this course. I honour your time and your participation, it has been my pleasure to have you with us at Natura.
Great course! So much great information! Such great meditations and a wonderful resource!
Thank you for your kind comments and i’m delighted you enjoyed the course. It has been my pleasure to have you study with me at Natura and I look forward to hearing all about your future successes.
Now i am wondering if icould I ask you to please go onto my facebook page http://www.facebook.com/naturahlc and do a review for me, we’re enjoying having our 5 star reviews as we’ve now added the institute onto this page and it’s wonderful having our institute students engaging with us here also.
I appreciate your time and thank you.
Thank you i will organise to do your course evaluation later today.
amazing experience with fantastic meditation recordings and scripts.an awesome combination of practical advice and awareness of personal spiritual growth and aspirations.a perfect sacred space to empower the student and potential clients.full of gratitude and smiles for the course creators and their attention to detail.so excited to get started,,namaste.
Thank you for your lovely comments and i look forward to receiving your assignments. I would love you to add your lovely review to our other 5 star reviews on our facebook page at http://www.facebook.com/naturahlc I thank you for your time in doing so.
It has been my pleasure to have you study with me at Natura and I look forward to hearing of your successes.
I would love for you to join the other students who have put their 5 star reviews on my facebook page if you would be so kind, my page is http://www.facebook.com/naturahlc I thank you for your time in doing so.
What an amazing journey, this course is well written and very motivating. I would highly recommend this course to anyone wanting to proceed in this area of expertise.
Please refer to my Email.
This course was outstanding! With in depth course material to help you not only understand all aspects of meditation but offering business guidance as well. It also adds a lot for personal growth and reflection on the material. I am so happy I came across this program and am looking forward to implementing all of this material as I start my own meditation business. Thank you so much for making this course for those of us who would like to be certified in this area. I would highly recommend this course to anyone seeking a proper education on teaching meditation courses.
Really well structured course designed with everything you need to begin teaching meditation. I particularly like the fact students can be introduced to the full spectrum of techniques allowing them to students to fine the style that resonates most with them. It also covers meditation for children and young adults.
I look forward to having you study with me again, and if Mindfulness is something that you would like to offer with your other skills I will be releasing my Mindfulness Practitioners course in the next couple of months, so look out for it in our newsletters.
Fantastic course with superb structure and excellent support.
Thank you for your lovely words – please refer to my email.
This has been a great course!! Very complex material that takes you slowly from beginner to teacher level at your own pace. Finishing the course I really feel well prepared to hold meditation classes on my own.
The meditations are great and the variety of learning material covers all the possible encounters you may have as a meditation instructor.
I feel that taking this course I did myself a great favor for the future.
“This has been a great course!! Very complex material that takes you slowly from beginner to teacher level at your own pace. Finishing the course I really feel well prepared to hold meditation classes on my own.
Very informative, Learned how to deal with a lot of things through this course. Looking forward to starting my Meditation Business.
It has been my absolute pleasure to have you study with me at Natura.
I wonder if I could impose and ask a favour of you also, If you feel so guided could i ask that you put a review onto my facebook page http://www.facebook.com/naturahlc I love having our students 5 star reviews on our page and I would greatly appreciate your time to do so.
I have highly enjoyed taking this course! The amount of knowledge I have gained was unexpected. I would have never believed I could have learned so much in an on-line course. Julie is excellent in her feedback and has given me more than enough knowledge to begin my new career as a Meditation Instructor. Thank you!
Please find attached your certificate – Congratulations.
It has been my pleasure to have your study with me at Natura, and I look forward to you continuing your path with us. I have now re-set your course to continue, so you can continue to have access to your course material and any updates that are done to the course as well.
If I have not asked your before could I ask you now to put your 5 star review with my other students on my facebook page http://www.facebook.com/naturahlc I would appreciate your time in doing so. To save you looking for your review I have copied it hear for you..
I look forward always to hearing how students are going with the practice, so do keep in touch, love and light to you on your journey of sharing your gifts with the world.
Thoroughly enjoyed this course. Very informative and learnt so much more than I expected to. Great feedback from teacher, a well researched and interesting course. Highly recommended.
Please refer to my email for your certificate. Thank you so much for your kind words.
I will be resetting our course for you also.
The meditation teachers course provides good background knowledge that helps the aspiring meditation teacher to review and understand the subject of meditation on a mental level. Assignments help to discuss and understand the subject on a deeper more personal level. This is a great combination.
Thank you for your comments on your review.
I have attached your Meditation Teachers Certificate – Congratulations!
It has been my pleasure to have you study with me at Natura Institute and I hope you continue to stay in touch with us.
Could I now impose on you for a favour – could I ask you to post your review to my facebook page, like all business people I have to address my social media. I would love to have your 5 star review with those of my other students. http://www.facebook.com/naturahlc I thank you and appreciate your time in doing so.
I had experience with meditation before taking this course but it was well worth it!! I learnt so much about different types of meditation, the scientific explanation of how it benefits me, and how to properly set up my own meditation business. I’m so excited to take what I’e learned from this course and apply it in my own wellness business! I would definitely recommend it!
Thank you for your kind words and I am delighted that you have enjoyed your course.
I will send through your certificate for you.
This course offers a great opportunity for self-development and to have the right tools to help others. The support provided with the exercises, and the examples given in the modules are really helpful and inspiring. I love the accessibility of the structure and the availability of the instructors. I’m grateful to all those involved in making this course such an awesome experience!
Thank you for the lovely comments and it’s been my pleasure going through your assignments with you.
Very happy with this course!
The course covered all aspects of teaching a meditation class, including setting a business plan. I would recommend this course to my friends because it is a very detailed and complete course…nothing seems to be left out. I think being able to study at home is a big plus.
Thank you for your kind words, I’m delighted that you have enjoyed and benefited from your course, it’s been my pleasure taking this journey with you.
This is a very comprehensive course that provides essential information not just on different types of meditations, but also how to run classes, outlines, scripts, audios, and starting up your business. The feedback received has been invaluable. I liked online formats so I can go at my own pace. I would recommend this course to anyone who asks!
Fabulous that you have now completed your Teacher of Meditation Course.
I have attached your certificate (in my email) for you and wish to say it has been my pleasure taking a journey with you. I look forward to having you study with us in the future should that be on your path.
I thank you for your kind words in the review and if I could impose would you mind putting your 5 star review of this course with our other students on our facebook page its http://www.facebook.com/naturahlc I appreciate your time in doing so.
A very thorough course that includes a lot of important subject matter to understand from philosophical to biological! I enjoyed the communications that I had with Julie… she is very engaged and always had important commentary on the homework assignments. I would definitely recommend this course particularly for those who have some experience with meditation and want to go deeper.
Thank you for your kind words please refer to my email for your certification.
I thoroughly enjoyed taking this class. It was a lot of information to learn which left me feeling very prepared to becoming a meditation teacher. It offered far more detailed lessons than I expected and was well worth the cost of the course. I also took the Mindfulness Course and found that to be a great compliment to this as well.
Thank you again for you kind words and please refer to my email for you Meditation Teachers Certificate.
Free to discover inner beauty.
This course was a great way to get my feet wet with different types of meditation. It really helped me Center myself before I work with my students, and has integrated my artistic outlet with the spiritual. Thanks Julie!
Thank you for your kind words in your review.
I really enjoyed the certified meditation teachers course so much . It has a very rich content, it introduces various tools and information in details and are explained in an easy way for anyone to grasp. I highly recommend it to anyone who wishes to become a certified meditation teacher. This course will enrich and empower you and will open your eyes to many aspects that will make you a skillful Mediration Teacher.
Thank you for your kind words in your review of my course material and that you have enjoyed your course.
I have learned a lot in this meditation teacher course and I enjoyed every part of it. It opened my eyes to a new world of possibilities that I can incorporate into my trauma coaching business.
I would recommend this course to anyone who wants to learn more about meditation and incorporate it into their holistic business.
The one thing that bothered me though was that the content of this course contained many typos and grammatical errors. I would expect a course in this price range to be professionally edited.
I am pleased you have enjoyed your course and found new ways in which you can incorporate Meditation along with your Trauma Coaching Business. I am always delighted to think that through our portal Natura is able to reach many that on a one on one basis we cannot hope to do.
We receive so many lovely reviews and I’m delighted to add yours to those (as well as your comments regarding my spelling and grammar – your quite right and I’ve had my editor re-check my work (however as Holistic Practitioners and Enlightened Souls who are Mindfully awareness – you would see this as a judgement would you not?) I’ll overlook it !!
It’s been my absolute pleasure to have you study with me at Natura and I have attached your certificate as a Teacher of Meditation – Congratulations (this is in my email). I very much look forward to hearing how your business progresses for you.
With the many people we have counselled who have experienced trauma, the Mindfulness program is very helpful and enlightening for them – I hope you may consider that for your business also.
The course was very insightful on the different types of meditation. I like how it is flexible depending on the student’s time. It takes a lot of discipline and dedication to finish an online course and I just love how Julie personally replies on the assignments and any questions that I have during the course. I will definitely be looking into taking other courses too in the future.
I have attached your certificate in my email to you.
Eileen, could I ask you now to put your 5 star review with my other students on my facebook page http://www.facebook.com/naturahlc I would appreciate your time in doing so. To save you looking for your review I have copied it here for you..
The Meditation Teachers Course is a great way to attain the information necessary to begin teaching meditation classes. I already have degrees in Education and am a Reiki Master/Teacher, but I found much of value in the course, both about meditation in general, and in how to deliver the meditation classes to students. Highly recommended.
I have attached your certificate in my email – Congratulations.
I have put Charles on your certificate if you would like me to do you one with Anthony please let me know I would be happy to do so.
Anthony, could I impose and ask you to put your 5 star review with my other students on my facebook page http://www.facebook.com/naturahlc I would appreciate your time in doing so. To save you looking for your review I have copied it here for you..
The course is very complete with valuable information clear and structure. I have been using the meditations given in the course to guide my students into relaxations a the end of a yoga class. This course is a fantastic complement for a yoga instructor willing to expand the knowledge into the nature of the mind.
Julie is also very responsive to my emails and answer all my questions.
Thank you so much for your lovely comments, if i have not already asked you to could i impose and ask you to post your 5 star review along with my other students onto my facebook page http://www.facebook.com/naturahlc I would so appreciate your time in doing so.
This course was AMAZING. Very comprehensive and has given me everything I need to add mediation to my wellness center practice. I am so very grateful for Julie and her training program. What a blessing this course has been.
I have attached your certificate for you (It’s in my email) – Congratulations! and wish to say it has been my pleasure taking this journey with you. I look forward to having you study with us in the future should that be on your path.
I thank you for your kind words of review and if I could impose would you mind putting your 5 star review of this course with our other students on our facebook page its http://www.facebook.com/naturahlc I appreciate your time in doing so.
Here’s the review just in case it saves you looking for it.
Wishing you joyful abundance for 2019!
This course is well thought through with the modules, documentation and the assignments. They cover background as way of introduction and then expands the knowledge in practical and simple format that is easy to understand. I found the information relevant and provides an appropriate amount of depth for me to use and need as an instructor.
I would highly recommend the course to anybody looking to do an accredited meditation teacher course.
I have attached your certificate for you – Congratulations! and wish to say it has been my pleasure taking this journey with you. I look forward to having you study with us in the future should that be on your path.
Thank you for your lovely review and I am delighted you have enjoyed your course with us, it has been my absolute pleasure to serve you.
I have attached your certificate in the email i have sent.
Now, could I impose on you Susan to put your 5 star review with our other students on our facebook page http://www.facebook.com/naturahlc I would very much appreciate your time in doing so.
Here’s your review to save you looking for it.
I have re-set your course to continue, so that you have access to the course material and to any updates as they are done to this course.
This course was one of the best I have taken. The material was not only laid out well but easy to understand. I’ve learned so much and will be carrying over so much in my business. Julie has been invaluable and I am so grateful!
Thank you for your lovely review and I am delighted you have enjoyed your course with us, it has been my absolute pleasure to serve you. Your certificate is attached in my email to you – Congratulations!
I absolutely loved this course!!!! I was able to take lessons during my own time. I was so engrossed in the material that I would binge some of the courses!!! All day long at times!!!!
I would then go back and review the lessons again which I plan to do over and over again!!!
The feedback from Julie on my assignments was constructive and encouraging.
Taking this course has inspired me to delve more into my own meditation practice. I am meditating more often and on a more regular basis. This is the best result yet of this course.
I plan to add the modality of Meditation to my Part-Time Complementary Business.
I recommend this course to anyone who wants to deepen their meditation practice and or who wants to create a business.
I found that taking this course is enabling me to walk the talk. I feel confident to recommend meditation to my family, friends and clients!
Thank you for your lovely review and I am delighted you have enjoyed your course with us, it has been my absolute pleasure to serve you. Your certificate is attached (In my email to you) – Congratulations!
I have re-set your course to continue, so that you have access to the course material and to any updates as they are done to this course. May Love and Light guide your journey from here.
I loved learning the different types of meditation. I had participated in a variety of guided meditation but this was totally different. The course really brought things into perspective for me and allowed me to grow and expand emotionally, mentally and spiritually. There are in depth meditations with explanations of how to use them, why they work and things to watch for with your students. I really recommend this to anyone who is thinking of doing meditation business. If you are a yoga instructor, holistic healer, energy worker etc this course will open up another avenue for your business. Grateful I came upon this course. Love Julie and how she interacts with me during the course assignments.
Thank you for your lovely review and I am delighted you have enjoyed your course with us, it has been my absolute pleasure to serve you. Your certificate is attached – Congratulations!
I have taken meditation for several years and wanted to share this modality with others because it has changed me life. I loved this course!!! I own my own business and sometimes there is not enough hours in the day to accomplish what needs to be done much less take a course. This course was thorough and I could do it on my own time and even go back to reread/study different chapters. I love the samples that they gave of the different meditations also. I want to give a big thank you to Julie also. She was amazing with her responses and insights to the assignments I handed in. I am actually going to print out those emails to add to my notes to review later as needed.
I have just seen you have done your review and I thank you sincerely for your kind words.
I have taken meditation for several years and wanted to share this modality with others because it has changed my life. I loved this course!!! I own my own business and sometimes there is not enough hours in the day to accomplish what needs to be done much less take a course. This course was thorough and I could do it on my own time and even go back to reread/study different chapters. I love the samples that they gave of the different meditations also. I want to give a big thank you to Julie also. She was amazing with her responses and insights to the assignments I handed in. I am actually going to print out those emails to add to my notes to review later as needed.
Again Kara it has been my pleasure to take this journey with you, you have an amazing skill set and should it be your path and purpose I will look forward to having you study with Natura at any time with the future.
What an amazing journey to helping myself and learning about myself so I can help others in the same fashion! I feel honored to have taken this course.
Thank you for your review and I’m delighted you enjoyed your course with us.
I have not received any of the assignments from you throughout the course. I do know that sometimes we do not wish to do the assignments and are happy just to have a certificate of participation in the course.
I always like to check before issuing this, in case you would like to do the assignments to receive your Teachers Certificate.
This class covers every base!
There is so much here! From guided meditation recordings and scripts to business planning. There’s information on the history of meditation, the science behind it and different techniques. There are checklists and plans for running classes, strategies to find the right group and venue. There’s even great recommendations for dealing with the inevitable difficult students. Every assignment was met with personalized feedback and advice. I couldn’t be happier with the course. Thanks Juile!!
Thank you for your kind words and I’m delighted you have enjoyed your course with me.
I have attached your certificate for you (its in my email) and wish to say it has been my pleasure taking this journey with you. I look forward to having you study with us in the future should that be on your path.
I thoroughly enjoyed this course. I learned so much about the various types of meditation, how to teach them, how to deal with various personality types and emotional issues, the special approach required for children and much more. There were also practical modules on how to set up a meditation room and how to start my own business. I highly recommend this course.
Thank you so much for your kind words I’m always delighted to hear that students have enjoyed their course with Natura and gained valuable information to move forward to teaching this amazing modality.
If I have not already asked would you be so kind as to put your 5 star review along with my other students on my facebook page at http://www.facebook.com/naturahlc I would appreciate your time in doing so.
The meditation training has been very insightful and thoughtful. I have learned much about myself, first and foremost, from this program. I have been reminded that even as someone who facilitates healing, I am also on a journey of healing in this world. I am connected to everyone and everyone is connected to me. The meditation training has given me confidence and clarity as well as wisdom and information about meditation, my body and the world. I would recommend this course to anyone who is willing to be open to breath, peace, calm and expansion of the self.
It is always a pleasure to have had a student such as yourself that has put the time and effort into submitting assignments and invested the time to prepare to teach this amazing modality. I wish you much success in adding this to your current business and look forward to hearing how that implementation goes.
I have meditated for years. This course has enlightened me to some responses and has filled in the gaps that I did not totally understand. I enjoyed the meditations and the logical progression of the material.
Julie is fantastic. Her patience and clear concise answers to questions has been beneficial to me.
I was wondering if Natura has Cd’s with just the background music so I can do the talk over script. I would be interested in possibly purchasing it.
I look forward to other courses in the future.
Thank you for your lovely comments, as I said in my email it has been my pleasure to be with you throughout this course.
I don’t have a CD with background music, but perhaps you might like to visit https://audiojungle.net/ here you can pick music you may like to use and the royalty fee’s are very reasonable.
I look forward to you taking other courses with us should this be on your path and purpose.
I really enjoyed this course – thank you. It was well written, informative and educational. I’m looking forward to starting my journey as a Meditation Teacher soon!
Excellent course! It was an experience not only on Meditation itself but my own inner exploration and development. Very good chapter on business start up and development too. I am on my way! Thank you Julie Jenkins for this online study! I has been an amazing road!
Thank you for your kind words, I assure you the pleasure was mine, I have very much enjoyed this journey with you.
I have taken other meditation courses before that always fell short. This course taught me so much more and really challenged me to think about why I want to be a Meditaiton teacher and what forms of meditation I want to teach. This course no only teaches you about meditation but prepares you for opening your own studio and how to do so successfully.
Thank you for your kind words, and i’m truly delighted that you have gotten much from our course. We love to hear that our students are ready to go out and embrace being a teacher of meditation on completion.
If I could impose on your may I ask that you add your 5 star review to our other students on our facebookpage http://www.facebook.com/naturahlc I thank you for your time in doing so it is very much appreciated.
I will now go about reviewing your assignments and issuing your certification.
The Meditation Teachers Course is a great course for the beginner and the veteran meditator alike. I was able to take the time needed to really spend time with my assignments. This was perfect for my busy lifestyle. My instructor was very present throughout the course and I truly value her wisdom and inspiration. Great course!
Love and Light Julie! Thank you!
What a great course with lots of information and depth.
An absolute must for anyone who wants to deepen or actually want to work as a meditation teacher. This course gives you all the information and tools to get started for yourself for now or in the future.
Thank you for your lovely words. I wanted to touch base on a couple of things.
1/ I have not received assignments from you for this course, now not all students want to do the assignments its absolutely optional. I am able to issue you with a certificate of participation for having completed the course.
2/ Could I impose and ask that you put your review on my facebook page with my other students 5 star reviews. http://www.facebook.com/naturahlc I would appreciate your time in doing so.
I absolutely loved and recommend this course to everyone who is interested in a beautiful enlightening life journey. I learned so much about myself and how my breath aids in making better life decisions which ultimately enriches all of my relationships. I’m very excited to now have the knowledge and skills to teach others how to find their inner peace and wisdom so they too can be enriched with a happy life and enlightened journey.
Thank you so much for your lovely words, I’m delighted you have enjoyed your course with us. I have sent you an email with your certificate.
This is my third course through Natura and each course has delivered above my expectations. Julie is always attentive to inquiries and offers valuable feedback on assignments. I have grown so much through these courses and look forward to sharing the knowledge with my students.
I have sent your certification within my email to you.
This course and its content was a great experience. The support and feedback from Julie Jenkins was appreciated and warmly welcomed. Some of her observations are invaluable and will always stay with me.
Thank you so much for your kind words, i have sent your certification via email. | 2019-04-23T16:47:02Z | https://www.naturainstitute.com.au/course/natura-meditation-course-2/ |
The month of September, which is when I’ll be moving away to start library school, dangerously approaches, and my to be read pile remains at around 150 books (I can hear some of you saying, “Pah! that’s nothing!”). So over the next few months, I’ll have to remain stronger than ever in my resolution not to acquire more books. My book buying ban has been in place for over six months now, but in reality it has done little more than prevent my tbr pile from actually increasing – which I suppose is something, right?
Can Any Mother Help Me? by Jenna Bailey – I found this when I was looking for more social history books that focused on women’s lives in the early twentieth century. The title sounded a little familiar, so I did a search and realised that Jenny had reviewed it some months ago. The book is about the Cooperative Correspondence Club, a private magazine that was started by a lonely young British mother in 1935. The correspondence club was used by women who needed advice about personal aspects of their lives and had nowhere else to turn, or who simply wanted some support and companionship. It seems that many lifelong friendships were born out of it – like Jenny said in her review, sounds a bit like blogging, doesn’t it?
Wild Romance by Chloë Schama – This isn’t an actual romance, but The True Story of a Victorian Scandal: it’s a biography of Theresa Longworth, whose affair with William Charles Yelverton shocked mid-Victorian society when it was brought to court. Theresa claimed they had been secretly married, while William maintained that no such thing had ever happened. This, of course, at a time when being married rather than having had an illicit affair was a life-or-death matter for a woman. I remember reading about this court case briefly in Victorian Sensation, and I’m sure I’d love a full account of it – especially as it sounds like Chloë Schama tackles all the gender questions Longworth’s story raises head on.
Bachelor Girl: A Social History of Living Single by Betsy Israel – This book was brought to my attention when I noticed that Aarti had added it on Librarything. Based on private journals, newspapers, and other primary and secondary sources, it’s an account of the lives of single women from the nineteenth century to our days. What’s not to love?
The Heat of the Day by Elizabeth Bowen – An indirect recommendation from Claire at Paperback Reader, who mentioned it in her review of To Bed With Grand Music. Set during the London Blitz, this is a novel about the effects of the tension of the war on the lives of those who stayed in the city at the time of the air raids.
After the Armistice Ball by by Catriona McPherson – This book, the first in the Dandy Gilver mystery series, was recommended to me by GeraniumCat on Twitter after I mentioned that Maise Dobbs hadn’t quite lived up to my expectations (more on that next week). It’s set in the early 1920’s, and our sleuth is a woman caught between Victorian mores and the social changes that followed the end of WWI. How could that possibly go wrong?
London War Notes by Mollie Panter-Downes – Good Evening, Mrs Craven left me craving more Mollie Painter-Downes, and Fleurfish confirms that this is as excellent as it sounds. It’s a collection of her journalism pieces about life in London during WWII, which were written at the same time as the fictional pieces collected in Good Evening. Mrs Craven. Sadly this book is now out of print, but hopefully used copies won’t be impossible to come by.
Have you read any of these? What did you think? And are there any books you’ve been particularly coveting lately?
Exciting re library school! I am impressed at your resolve with the book buying ban.
I love the sound of Bachelor girl and there's a copy in the library, so will be heading there at lunchtime.
Pah! That's nothing! (LOL!) But seriously, not buying any new books at all just doesn't work with me so I've seriously cut back instead and that's not going *too* badly. Of course, if I didn't read so many library books that might help the tbr pile decrease rather more quickly.
I haven't read any of those books but would also like to have the London War Notes.
I don't have anything like library school forcing any deadlines (but I wish it were!) but I'm still trying not to buy anything. It makes me so sad when I see books that people have given me, and knowing I may not read them for years. Not to mention every wonderful book I see on the blogs, like these. Of course, my first inclination would be towards the WWII novel, but they all sound worthy of our time!
Such interesting choices! Can Any Mother Help Me? was one of the very first books I reviewed after I began blogging and it's definitely worth the read. Will be looking to track down a copy of Bachelor Girl for myself. As you say, what's not to love?
i almost dread your coveting posts! They don't help my wishlist at all.
I am terrible for buying books when I feel low. I have just gone out and bought more today and I swore I wouldn't, but hubby did give me his lottery winnings and I have been stuck at home with two sick children all week!
I have such a bizarre relationship with book and TBR acquisition & therapy. Sometimes it's theraputic to buy-buy-buy (well, or acquire-acquire-acquire, either way is fine). But sometimes I get the exact opposite urge and it's theraputic to read the first 10 pages of 50 books and end up discarding/donating 35 of them. I've been doing that a LOT in the last few weeks, going so far as to check a ton of book out of the library expressly for the purpose of seeing if they're worth keeping on my virtual TBR. I turn them all in the next day regardless of whether or not I want to read them eventually. I've also been using Google Preview a lot to determine if I want to read a book. I'm only doing this with modern books, though - classics need more than a 10 page litmus test because they're structured differently. But anyway, I've cleared off two full shelves in the last month and hope to clear off more in the near future. I'm also not adding things to my TBR pile from reviews, not nearly as often anyway. It's a strange sort of therapy, but it works. I'm excited - I'm down to 150 books on my virtual TBR pile. A year ago, it was over 400.
As I'm sure everyone else is going to say, book acquisition is something we all feel. I used to be pretty good about not buying books-- just using a library. But I've bought myself a bookshelf and I feel I'm going book acquire crazy!
the books you share sound lovely. I read the Maisy Dobbs books pre-book blogging an thought them ok. I'm wondering if I'd be picker and more easily disappointed today. The book you mention instead of it sounds loves.
Library School, yay. I'm going to be excited along with you as September approaches.
Congratulations of attending library school. If it is any comfort, if you take some of the literature courses that are offered, such as children's literature, you will get to read a whole lot of good things for school.
My virtual TBR list grows by leaps and bounds each day, in part because of great posts like yours. I have tried to really curtail both my magazine and book buying habits due to finances. I have been more successful with the magazine embargo. I allow myself to buy at least one new book every month or so as a treat in order to make it more bearable.
Whhhhhhhhy must you make everything sound so tempting? Wild Roamce sounds fantastic doesn't it (the interview in the Times about Schama's influence on his daughter becoming a writer scared me a bit though - pushy parenting indeed).
I have to tell you about this new book on the key players in the Romantic movement while I'm here -'Young Romantics' by Daisy Hay, because I'm dying to read it and think you'll like it too (a bit on the awful strains the poets open relationships put on the women involved). And June Morgan has a nw novel coming out about the Brontes... Tempted?
Love when bloggers go to library school and I know you'll do so well.
I haven't read any of these. But the good thing about Library School is that it isn't difficult to come up with project or paper ideas that involve reading your favorite books!
Interesting list, and I am so impressed with your 6 month buying ban! I have convinced myself that I need one of those... but am giving myself until the end of the month before implementing it. I know, silly right? I'll just end up getting extras before the month ends... but I didn't want the ban in place over BEA!
Good luck on not buying any of these, because they do all look quite good!
I haven't read any of these, but they all look good. I continually have to battle the urge to buy more books as well, so I know exactly how you feel.
Aww, I promise to read Bachelor Girl ASAP so that you can know whether it's good or not. I have an inkling it may be disappointing, if it makes you feel better. A lot of the reviews say that the author messes up her facts multiple times.
Can Any Mother Help Me? sounds wonderful! So many books on WWII women in England, but what about everywhere else?!
Also, I found Maisie Dobbs very disappointing as well. I didn't really like her method of just adopting someone's posture and then somehow being able to know exactly what they were thinking.
I am also a big believer in book retail therapy, and find myself ordering and shopping for books whenever I really need a pick me up or whenever I come across something I just have to have! You will be pleased to know that your reviews can send me off into a heady buying spree very frequently!! I haven't heard of any of these books, but they all look very interesting, for very different reasons. I am at the stage where I can't really be bringing anymore books into the house right now either, so we will have to be strong together! Very nice post!
All the titles look lovely. I've read 'After the Armistice Ball' and some sequels which I enjoyed, but it is similar to Maisy Dobbs although lighter. But you can only find out whether it's your cup of tea by reading it, right?
I really want to read, Can Any Mother Help Me. I love the idea of women banding together to exchange ideas and support one another. You are right, it does sound a lot like blogging!
Elizabeth Bowen! I love her. After the Armistice Ball looks interesting too and I was also disappointed with Maisie Dobbs.
Buying books is a therapy thing for me too, as are rearranging my books, writing about them, just going to bookstores and libraries, finding good book lists and reading light literary criticism (blogs and books) about my favourites, and at least most of those things are free.
My bans are never successful, so I wish you luck!
I´m drooling over the book covers! :) This sounds like a great way to distract you from book buying, hope it works out.
I´ve taken my acquiring urge to the library, much cheaper and still very therapeutic. I know I always sport a ridiculous smile when I leave the library with my loot.
I think I want to read all of these books, I can hear the tbr list groaning! Too bad you didn´t enjoy Maisie Dobbs so much, I have the first one out atm. I´ll give it a try anyway but I´ll check my expectations.
And good luck with getting ready for library school, Ana. Sounds like such an interesting degree!
Bachelor Girl is a good one! I hope you enjoy it if you ever get around to reading it. I know what you mean about having too many books to read: I have nearly 100 unread books that I own, and then a further 100 on my "to be read someday" list!
Interesting books! I haven't read any of them myself, but I so want to.
Ah, I do like managing to provide indirect recommendations! Elizabeth Bowen is very good and influenced Sarah Waters quite a bit when it came to The Night Watch.
Can Any Mother Help Me has been on my wishlist for some time - thanks for reminding me why!
I'm supposed to be on a book buying ban, but I keep breaking it. I also find that if I'm not buying books I'm obsessively reading library books instead of my own, so I can acquire new books there too. It's definitely a problem I have too!
I actually won Wild Romance through LibraryThing - I'm just waiting for my mom to mail it to me. You've made it sound a lot more exciting than I thought it was going to be!
In my mind, you can never go wrong with Elizabeth Bowen. How prose so occasionally spare can be so evocative is a wonder.
I'd love to read all the books on your list, but especially Bachelor Girl. That one goes to my TBR list right now.
And so exciting that you are starting library school in the autumn! I'm a librarian myself.
I applaud your strength on not buying any new books and sometimes it can be very therapeutic to write about them and worship them from afar!!
'Can any mother help me' sounds like an interesting book. Reminds me in some ways of 'The Guernsey literary and potato peel pie society'. 'Bachelor Girl' sounds like a fascinating book! I really want to read this one! 'London War Notes' looks quite interesting too.
congrats on library school! I don't remember if you had mentioned that before.
Anyway, I totally hear you on "bans" and think I need to do a library ban soon as my stacks are only getting taller and taller. Lots of tempting books here. I tried the book After the Armistice Ball a couple of years ago but I think I just wasn't in the mood for it then because I didn't finish it. I've always wanted to give it another go. I hope you like it and all the others!
You are doing so well by maintaining the TBR book count to 3 digits. I need some of your self-control. I'm trying my best to stay off buying but I just succumb each time I walk into a bookstore. But seriously, this time I'm for real.
I am very excited about your librarian job!
You just made my wishlist that much longer!
I am somewhere around 150 books that still need to be read as well. I do think that it is an accomplishment that the amount of TBR books remains steady on your side, I'm trying to follow your example, but I'm failing miserably.
Melody: lol, the exact same happens to me. Whenever I pass a book, I end up thinking about it obsessively, even if I didn't want it *that* much. It's ridiculous! But I must...stay...strong.
Verity: I'll have my revenge in September by raiding all the lovely used bookshops you have over there ;) Enjoy Bachelor Girl!
Sandy: I know - that really makes me sad too. I miss the days when I'd read a book within a month of acquiring it, but somehow I doubt that they'll ever return.
Claire: I'm glad to hear that Can Any Mother Help Me is as good as it sounds!
Vivienne: Well, I must at least share my pain ;) Stuck at home with two sick children all week? You more than earned those books!
Amanda: It's funny; my virtual tbr pile doesn't make me feel pressured at all. I like having endless lists all over the place with what surely amounts to a thousand books by now - I like the sense of possibility. But once I actually own them, I begin to feel pressured to read them sooner rather than later.
Violet: Thank you for sharing my excitement :D And the book coveting post did help a little bit.
Jodie: I'd missed the interview, but yikes! And ooh, Young Romantics sounds excellent, as does the new June Morgan. I've got Passion on its way to me via Bookmooch right now and I'm DYING to read it at long last.
Court: Thank you for the wishes of good luck - I'll need it :P I look forward to your thoughts on Bachelor Girl!
Aarti: That actually makes me sad :\ Even though I can't read it at the moment I was hoping it'd be good. Looking forward to your thoughts on it! And was I told you in my e-mail about Maisie Dobbs: YES.
Zibilee: I'm not sure if I should say sorry about inspiring those book buying sprees or not :P We'll give each other support when we need it and hopefully we'll be able to stay strong.
Sakura, exactly :) It sounds like something I'll like, so fingers crossed.
Kathleen: Yes, doesn't it? It's funny how some things stay the same.
Carolyn: Yes - anything bookish brings me a lot of comfort :) I'm glad I wasn't the only one who didn't love Maisie Dobbs! I was sad that I didn't, as I was really hoping to.
Terri B: Well, it may be working slowly but at least it *is* working, right? We've got to stay positive here :P Being at peace with my collection is also what I aspire to.
Bina: I so wish I had access to a public library! I'm sure that would help immensely. I didn't hate Maisie Dobbs or anything, but I was hoping to love it more. I hope you have better luck with it than I did.
Andreea: The state of my wishlist is such a disgrace that the least said about it the better. And you certainly contribute to that!
Claire: Ooh - one more reason to read Bowen!
Meghan: Looking forward to your thoughts on Wild Romance!
Tiina: It really, really does. I look forward to your thoughts on Bachelor Girl if you get to it before I do!
Staci: Yep - it did help!
Iliana: Thank you so much! Sorry to hear that After the Armistice Ball didn't quite work for you. But yes, sometimes it pays to try again. | 2019-04-20T20:18:41Z | http://www.thingsmeanalot.com/2010/05/friday-book-coveting-post.html |
This website contains hyperlinks to third party websites which are the sole responsibility of such independent third parties, and use thereof is solely at your own risk. Safety1st has no control over the content or policies of such third party websites, and we are not responsible for (and under no circumstances shall be liable for) the contents, accuracy or reliability of any websites hyperlinked to this website. Those who choose to access information from this website (including any information obtained through any hyperlink) are solely responsible for the compliance of such information with any applicable law. Safety1st does not allow the unauthorized use of its logos, trademarks, or other graphics to create links to this site.
Safety1st is pleased to hear from its customers, however we do not accept or consider any creative ideas, suggestions or other materials related to products, services or marketing except through the specific mechanisms set up on this site to receive such ideas. Except as otherwise explicitly provided on this site, (1) anything you disclose or offer to us by or through this website ("Disclosures"), including e-mails or submissions to Safety1st or postings on interactive portions of this website, is PROVIDED ON A NON-CONFIDENTIAL BASIS with no obligation on our part to keep such information secret; and (2) Safety1st is free to use, for any purpose whatsoever, any Disclosure, including but not limited to publishing, or developing, manufacturing, and marketing products using such information.
By uploading or otherwise providing any Disclosure to this website or Safety1st, you hereby grant Safety1st and its designees, to the extent you retain any rights, the unlimited, perpetual right to reuse, redistribute, modify, adapt, display and create derivative works from such Disclosure for any purpose and in any media without compensation, and you warrant that all "moral rights" in uploaded materials have been waived. You represent and warrant that you have the authority to grant such rights, and to the fullest extent permitted by law you hereby agree to indemnify, defend and hold us harmless from all claims resulting from any Disclosures you supply. THE FOREGOING INDEMNIFICATION PROVISION DOES NOT APPLY TO SAFETY 1ST'S OWN NEGLIGENCE, RECKLESSNESS OR INTENTIONAL CONDUCT.
Safety1st does not ordinarily, but reserves the right to in its sole discretion, filter, censor, edit or regulate information and content provided by third parties on this website, including any such information provided in chat rooms, bulletin boards or other interactive areas, and we neither endorse nor are responsible for (and under no circumstances shall be liable for) the contents, accuracy or reliability of such information and content. If you have concerns or complaints about any of the content shown on this site, you may notify us using the contact points below.
Pursuant to Title 17, United States Code, Section 512(c)(2), notifications of claimed copyright infringement should be sent to our Designated Agent. See our Procedure for Copyright Infringement Claims below.
When you visit our website or send e-mails to us, you are communicating with us electronically, and you consent to receive communications from us electronically. We will communicate with registered users by e-mail or by posting notices on this site. You agree that all agreements, notices, disclosures and other communications that we provide to you electronically satisfy any legal requirement that such communications be in writing.
Safety1st makes no representations or warranties that this website is free of defects, viruses or other harmful components. We shall not be responsible for any damages or loss that may result from the hacking or infiltration of this website or Safety1st's computer systems. The pages on this website may contain technical inaccuracies, outdated information and typographical errors. YOU HAVE THE SOLE RESPONSIBILITY FOR ADEQUATE PROTECTION AND BACKUP OF DATA AND/OR EQUIPMENT USED IN CONNECTION WITH THIS WEBSITE AND TO THE FULLEST EXTENT PERMITTED BY LAW YOU AGREE TO HOLD SAFETY1ST HARMLESS FROM, AND YOU COVENANT NOT TO SUE US FOR, ANY CLAIMS BASED ON USE OF THIS WEBSITE, INCLUDING CLAIMS FOR LOST DATA, WORK DELAYS OR LOST PROFITS RESULTING FROM USE OF MATERIALS OR CONTENT FROM THIS WEBSITE. THE FOREGOING INDEMNIFICATION PROVISION DOES NOT APPLY TO SAFETY 1ST'S OWN NEGLIGENCE, RECKLESSNESS OR INTENTIONAL CONDUCT.
EXCEPT AS OTHERWISE SPECIFIED IN WRITING BY US, TO THE EXTENT PERMITTED BY APPLICABLE LAW, THIS WEBSITE AND ALL INFORMATION, CONTENT, PRODUCTS OR SERVICES MADE AVAILABLE THROUGH THIS WEBSITE ARE PROVIDED "AS IS." EXCEPT AS OTHERWISE SPECIFIED IN WRITING BY US, SAFETY1ST DOES NOT MAKE ANY WARRANTY OF ANY KIND, WHETHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY OF NON-INFRINGEMENT, FITNESS FOR A PARTICULAR PURPOSE OR MERCHANTABILITY, NOR DOES IT IN ANY WAY GUARANTEE THE QUALITY, DATA CONTENT, ARTISTIC WORTH, OR LEGALITY OF INFORMATION, CONTENT, PRODUCTS OR SERVICES THAT ARE MADE AVAILABLE OR OBTAINED BY WAY OF THIS WEBSITE. WE DO NOT WARRANT THAT THIS WEBSITE WILL BE ERROR-FREE OR THAT DEFECTS WILL BE CORRECTED. SOME JURISIDICTIONS DO NOT ALLOW THE LIMITATION OF IMPLIED WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU.
TO THE FULLEST EXTENT PERMITTED BY LAW SAFETY1ST SHALL NOT BE LIABLE FOR ANY SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES, INCLUDING LOST PROFITS, ARISING FROM THE USE OF, OR INABILITY TO USE, THIS WEBSITE OR FROM ANY INFORMATION, CONTENT, PRODUCTS OR SERVICES MADE AVAILABLE THROUGH THIS WEBSITE, EVEN IF WE HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. TO THE FULLEST EXTENT PERMITTED BY LAWSAFETY1ST’S TOTAL LIABILITY TO YOU FOR ALL DAMAGES, LOSSES, AND CAUSES OF ACTION (WHETHER IN CONTRACT, TORT OR OTHERWISE) SHALL NOT EXCEED THE AMOUNT PAID BY YOU, IF ANY, FOR ACCESSING THIS WEBSITE OR, IF APPLICABLE, IN PURCHASING PRODUCTS OR SERVICES THROUGH THIS WEBSITE. SOME JURISIDICTIONS DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU.
THIS LIMITATIONS OF LIABILITY SECTION DOES NOT APPLY TO NEW JERSEY RESIDENTS.
Nothing on this website shall be construed as conferring any license under any intellectual property right, including any right in the nature of trademark or copyright, of Safety1st or any third party, whether by estoppel, implication, or otherwise. All brands and names are the property of their respective owners.
Eddie Bauer® is a registered trademark of Eddie Bauer, Inc. Disney® is a registered trademark of The Walt Disney Company. All Safety1st registered trademarks are registered in the United States of America (and other applicable jurisdictions). The following is a partial list of the trademarks of Dorel Juvenile Group, Inc. (“DJG”) and its affiliates: Dorel®, Dorel Juvenile Group™, Safety 1st®, Cosco®, Quinny® and Maxi-Cosi®.
Certain information on this website is forward-looking and is subject to important risks and uncertainties. The results or events predicted in this information may differ materially from actual results or events. Factors which could cause results or events to differ from current expectations include, among other things: the impact of price and product competition; the dependence on new product development; the impact of technological and market change; the ability of DJG and its affiliates to integrate acquired businesses in an effective manner; general industry and market conditions and growth rates; and international growth and global economic conditions, including interest rate and currency exchange rate fluctuations. For additional information with respect to these and other factors, investors should consult the documents filed by DJG and its parent Dorel Industries Inc. ("Dorel") with Canadian and U.S. securities regulators. DJG and Dorel disclaim any intention or obligation to update or revise any forward-looking information, whether as a result of new information, future events or otherwise.
Despite any representations concerning privacy, Safety1st reserves the right to disclose without notice to you any information in its possession if required to do so by law or upon a good-faith belief that such action is necessary to comply with the law, to protect or defend our rights or property, or to respond to an emergency situation. Specific areas or pages of this website may include additional or different terms relating to the use of personal information collected from such areas or pages.
Unless indicated at the time of ordering or by a follow-up notification from us, shipments will be made via a carrier that we select, or if we give you a choice of shipping method, the carrier that you select.
If an expedited shipping method is available as a Shipping Method and you select it, an additional charge will be assessed at the time of your order. All ship and delivery dates communicated on our website or via e-mail are estimates only and are subject to change. We do not guarantee delivery dates, and we are not responsible for delays by the carrier. Risk of loss and title to ordered items pass to you upon delivery to the shipping carrier. Please inspect your shipment upon arrival, and report any shipping-related damage immediately to the carrier.
At Safety 1st, our goal is to process and ship your order as quickly as possible, so unfortunately once your order has been submitted, we are unable to modify or make changes to it.
If you find that you entered an order in error, please reach out to us via chat by clicking the grey icon in the bottom right corner on www.safety1st.com Monday – Thursday 8:00 AM – 6:00 PM ET & Fridays 8:00 AM – 4:30 PM ET, or via our online Contact Us Form.
Returns are accepted for items purchased within 90 days on the Safety1st.com website or through our Consumer Care team. Safety 1st and/or Dorel Juvenile Group USA does not accept returns of items purchased through any third-party, including its retail partners.
Once your returned package has been delivered to our warehouse, please allow 2-4 weeks for us to inspect the returned item and process your refund.
To arrange to return your item or to obtain further information, please contact a Consumer Care representative via chat by clicking the grey icon in the bottom right corner on www.safety1st.com Monday – Thursday 8:00 AM – 6:00 PM ET & Fridays 8:00 AM – 4:30 PM ET, or via our online Contact Us Form.
All returned items must be shipped freight pre-paid. Please use a package delivery service able to track and/or insure your return items. By placing an order on www.safety1st.com , you are accepting this return policy.
Any unauthorized access, modification or change of any information, or any interference with the availability of or access to this website is strictly prohibited. Safety1st reserves all legal rights and remedies available to it and this disclaimer shall in no way be deemed a limitation or waiver of any other rights Safety1st may have.
Unless otherwise indicated, all material on this site © Copyright 2007-16 Dorel Juvenile Group, Inc. All rights reserved.
From time to time sweepstakes (each, a “Promotion”, together the "Promotions") will be conducted on the Safety 1st Facebook or Instagram page (a “Platform”). These General Social Promotion Rules apply to sweepstakes sponsored by Dorel Juvenile Group, Inc. ("Sponsor") and offered via the Platform. The following information will be supplied to entrants on a per-Promotion basis in a set of per-Promotion terms: (a) entry period(s) and time zone; (b) which action to take in order to enter; (c) entry limits per person/Platform account; and (d) prize descriptions, values and restrictions.
THE PROMOTIONS DESCRIBED HEREIN ARE ONLY OFFERED TO LEGAL RESIDENTS OF THE 50 UNITED STATES AND THE DISTRICT OF COLUMBIA (“D.C.”) WHO ARE EIGHTEEN (18) YEARS OF AGE OR OLDER. YOU MAY NOT ENTER IF YOU ARE NOT EIGHTEEN (18) YEARS OF AGE OR OLDER AND/OR NOT A LEGAL RESIDENT OF (AND RESIDING AT THE TIMEOF ENTRY IN) ONE OF 50 UNITED STATES ORD.C. THE PROMOTIONS DESCRIBED HEREIN ARE VOID OUTSIDE THE 50 UNITED STATES AND D.C., AND WHEREVER PROHIBITED.
INTERNET ACCESS AND AN ACTIVE VALID FACEBOOK OR INSTAGRAM ACCOUNT ARE REQUIRED.
Promotions are open to any individual who: (a) is eighteen (18) years of age or older at the date of entry; (b) is a legal resident of (and residing at the time of entry in) one of the 50 United States or D.C.; and (c) has a valid account on Facebook or Instagram. Entrants who are eighteen (18) years of age or older but have not yet reached the age of majority in their jurisdiction of residence (each, a “Minor”) should seek permission from their parents/legal guardians before participating. The following individuals are NOT eligible to enter or win a prize: employees of Sponsor; employees of a Platform; employees of the parent companies, subsidiaries, divisions, affiliates, suppliers, brokers, printers, distributors and advertising, promotional and judging agencies of Sponsor or a Platform; employees of any other entities affiliated with the administration of the Promotions (aforementioned individuals and organizations, the “Promotion Parties”); the immediate family members (parent, child, sibling, spouse) of each such employee; and persons living in the same household as each such employee (whether related or not). All determinations of eligibility will be made by Sponsor in its sole discretion, at any time. The Promotions are void outside the 50 United States and D.C., and wherever prohibited.
Agreement: Participation in a Promotion constitutes each entrant’s (and if a Minor, such entrant’s parents’/legal guardians’) full and unconditional agreement to and acceptance of these General Social Promotion Rules, the per-Promotion terms set by Sponsor, and the decisions of the Promotion Parties, which are final and binding. Winning a prize is contingent upon fulfilling all requirements set forth herein. Any entrant may be disqualified in Sponsor’s sole discretion if he/she (and if a Minor, his/her parent/legal guardian) fails to comply with any of the terms of these General Social Promotion Rules or the per-Promotion terms set by Sponsor.
Occasionally, posts will appear on the Safety 1st Facebook or Instagram page, directing you to take an action such as, but not limited to, share a photo on a particular post OR post a piece of content while tagging a particular brand handled or using a specific hashtag. Doing so, in accordance with any applicable per-Promotion terms set by the Sponsor, will enter you in a random drawing to win a particular prize. Alternatively, you may follow the instructions, included in the per-Promotion terms set by the Sponsor, for submitting an Alternative Means of Entry Form, which will enter you in a random drawing to win a particular prize.
Entries and other submitted material become the property of Sponsor and will not be acknowledged or returned. All Entries for each Promotion must be received during the applicable entry period. Entries submitted in excess of stated per-Promotion entry limits will be void. Use of any automated system to enter as determined by Sponsor in its sole judgment is prohibited and will result in disqualification at Sponsor’s sole discretion. Any attempt by any entrant to obtain more than the stated maximum number of entries by using multiple/different Platform accounts, identities, registrations, or logins, or through any other methods, may void all of that entrant’s entries and that entrant may be disqualified. All terms and conditions of the hosting Platform apply. Multiple entrants are not permitted to share the same Platform account. In event of a dispute regarding the identity of the person submitting an Entry, the Entry will be deemed to be submitted by the natural person who is the “authorized account holder” assigned by the Platform to the Platform account in question.
By submitting an Entry, you represent and warrant that your Entry: (a) is not sexually explicit or suggestive, violent or derogatory of any ethnic, racial, gender, religious, professional or age group, profane or pornographic, nor does it describe any materially dangerous activity; (b) does not promote illegal drugs or firearms (or the use of any of the foregoing), or any activities that may appear unsafe or dangerous, or any particular political agenda or message;(c) is not obscene or offensive, nor does it endorse any form of hate or hate group; (d) does not defame, misrepresent or contain disparaging remarks about Sponsor or its products, or other people, products or companies; (e) does not contain trademarks or logos owned by others (except trademarks and logos owned by Sponsor), or advertise or promote any brand or product of any kind (other than those owned by Sponsor); (f) does not otherwise infringe any third party’s intellectual property or privacy rights, or contain any personal identification, such as license plate numbers, e-mail addresses or street addresses; (g) does not contain copyrighted materials owned by others; (h)does not contain materials embodying the names, likenesses, photographs, or other indicia identifying any person, living or dead, without such person’s explicit advance permission; and (i) does not depict, and cannot itself, be in violation of any law. Sponsor's determination as to whether any Entry potentially violates the rights of any third party is final. In Sponsor’s sole discretion, Entries that do not include all required information and do not adhere to the foregoing and following requirements will be considered void.
Winner Determination/Odds of Winning: Winner(s) will be determined at the time stated in the particular per-Promotion terms. Unless otherwise stated in the per-Promotion terms, winner(s) will be chosen via random drawing from among all eligible Entries received for that Promotion (or entry period, as applicable), and odds of winning will depend on the total number of eligible Entries received for that Promotion (or entry period, as applicable).
the failure of notification due to deactivation of the potential winner’s Platform account prior to receipt of notification; (c) potential winner’s failure to provide Sponsor with satisfactory proof of age, identity and residency; (d) potential winner’s failure to complete and return required documents by the date specified in winner’s notification email/letter; and (e) any other non-compliance with these General Social Promotion Rules or the specific terms of a Promotion.
In the event that the operation, security, or administration of a Promotion is impaired in any way for any reason, including, but not limited to fraud, virus, or other technical problem, the Sponsor may, in its sole discretion, either: (a) suspend a Promotion to address the impairment and then resume a Promotion in a manner that best conforms to the spirit of these General Social Promotion Rules; (b) award prizes according to the specific Promotion details from among the eligible Entries received up to the time of the impairment; or (c) to proceed in such a manner as may be deemed fair and equitable by Sponsor in its sole discretion. If, due to a human, typographical, mechanical or other error, the number of potential winners notified is greater than the listed number of prizes at any level, such listed number of prizes will be awarded in a random drawing from among all eligible entrants who submit a legitimate prize claim for that level. The Sponsor reserves the right in its sole discretion to disqualify any individual it finds to be tampering with the entry process or the operation of a Promotion or to be acting in violation of these General Social Promotion Rules or in an un-sportsman like or disruptive manner. Any attempt by any person to undermine the legitimate operation of a Promotion may be a violation of criminal and civil law, and, should such an attempt be made, the Sponsor reserves the right to seek damages from any such person to the fullest extent permitted by law. The Sponsor’s failure to enforce any term of these General Social Promotion Rules shall not constitute a waiver of that provision.
By participating in a Promotion, entrants agree to release and hold harmless the Sponsor, Platform, their respective parent companies, subsidiaries, divisions, affiliates, suppliers, brokers, printers, distributors and advertising, promotional and judging agencies, and any other entities affiliated with the administration of the Promotions, together with the respective officers, directors, employees, and agents of each (collectively, the "Releasees") from and against any claim or cause of action arising out of participation in a Promotion or receipt or use/misuse of any prize, including, but not limited to: (a)unauthorized human intervention in a Promotion; (b) technical errors related to computers, servers, providers, or telephone or network lines; (c) printing errors or any errors made in the advertisement of a Promotion; (d) errors in the administration of a Promotion or the processing of entries; (e) changes to Platform policies and procedures that may interfere with the operation of a Promotion; or (f) injury or damage to persons or property which may be caused, directly or indirectly, in whole or in part, from entrant’s participation in a Promotion or receipt of any prize. Entrants further agree that in any cause of action, the Releasees’ liability will be limited to the cost of entering and participating in a Promotion, and in no event shall the Releasees be liable for attorney’s fees. Entrants waive the right to claim any damages whatsoever, including, but not limited to, punitive, consequential, direct, or indirect damages. Without limiting the foregoing, a Promotion, all prizes, and all materials provided on or through any Promotion-related website are provided "as is" without warranty of any kind, either express or implied, including without limitation the implied warranties of merchantability, fitness for a particular purpose, and non-infringement.
You agree to indemnify and hold the Releasees harmless from any and all claims, damages, expenses, costs (including reasonable attorneys' fees) and liabilities(including settlements), brought or asserted by any third party against any of the Releasees due to or arising out of your Entry, or your conduct in creating a Entry or otherwise in connection with a Promotion, including but not limited to: claims for trademark infringement; copyright infringement; violation of an individual’s right of publicity or right of privacy; or defamation.
By submitting an Entry, you grant to Sponsor and its affiliated companies the right, except where prohibited bylaw, to use your name, likeness, picture, address (city and state), voice, biographical information, Entry and written or oral statements, for advertising and promotional purposes in promoting or publicizing Sponsor, its affiliated companies, and the products or services of each, in any and all media without limitation as to time or territory, without compensation unless required by law. You shall have no right of approval, no claim to compensation, and no claim (including, without limitation, claims based on invasion of privacy, defamation, or right of publicity) arising out of any use, blurring, alteration, or use in composite form of your name, picture, likeness, address (city and state), biographical information, or Entry.
Except where prohibited, entrants agree that: (1) any and all disputes, claims, and causes of action arising out of or connected with a Promotion, or any prize awarded, or the determination of the winners, shall be resolved individually, without resort to any form of class action, and exclusively by arbitration pursuant to the Rules of the American Arbitration Association, then effective, and (2) any and all claims, judgments and awards shall be limited to actual out-of-pocket costs incurred, including costs associated with entering a Promotion but in no event attorneys’ fees; and (3) under no circumstances will entrant be permitted to obtain awards for and entrant hereby waives all rights to claim punitive, incidental and consequential damages and any other damages(other than for actual out-of-pocket expenses), and any and all rights to have damages multiplied or otherwise increased. All issues and questions concerning the construction, validity, interpretation and enforceability of these General Social Promotion Rules, or the rights and obligations of entrant and/or Releasees in connection with a Promotion, shall be governed by, and construed in accordance with, the laws of the State of Florida, without regard for conflicts of law doctrine of any jurisdiction.
The Promotions are in no way sponsored, endorsed or administered by, or associated with, Facebook or Instagram. You are providing your information to Sponsor and not to the Platform.
Any questions, comments or complaints regarding this Promotion should be directed to the Sponsor, not the Platform. | 2019-04-20T14:58:22Z | https://www.safety1st.com/terms-of-use |
There’s a scene in Starz’s forthcoming documentary series The Chair—which debuts September 6, and which I previewed here—where director Shane Dawson and his producing partner Lauren Schnipper are discussing the rewriting of the script with their producer-at-large, Josh Shader, one of the only people in touch with both of the two productions being made from the same script by Dan Schoffer. It’s as tense a confrontation as you see in the first two episodes of the series, as Schnipper works to break down the writing credits of the still in-progress script that was heavily rewritten and noted by Dawson before being shipped back to Schoffer to take a final pass. Without saying it directly, her question is predicated on the likely results of a WGA arbitration hearing for the film, and Shader’s answer is—paraphrasing—that because they gave the option back to Schoffer to write the final version of the script, Dawson’s contributions will just be considered notes that happen when a director gets involved with a project, with Schoffer therefore retaining final, sole credit on the film.
It’s a moment of some tension. Schoffer gives a talking head discussing how Dawson’s claim to credit is an overreach, but as relative first-timers in the context of film production Schnipper and Dawson are mainly just looking for clarification on what to expect moving forward, which seems reasonable. Credit is complicated, as Schnipper notes when she contrasts Dawson’s process (rewriting/notes and then sending the script back to the writer) and fellow filmmaker Anna Martemucci’s greater control over the script to her film. Whereas Dawson effectively rehired Schoffer to rewrite his own script, Martemucci took the job herself, with the documentary following her completion of the script heading into production. And so this foreshadows what may appear as part of the documentary, which is a likely arbitration hearing for her film, the result of which will determine the writing credits for Hollidaysburg when it debuts in theaters and on Starz this fall.
It will be a rare case where we’ll potentially have a lot of very clear information about the arguments made before an arbitration hearing, beyond simply knowing the result (A “Story by” credit for the original writer, a shared writing credit, etc.). In most cases, there isn’t a documentary film crew following every stage of the production, and there aren’t two concurrent projects that let you draw a direct comparison between the two. There’s just an end result and bits of pieces of production history, as is the case with this weekend’s Guardians of the Galaxy (which I “reviewed” on Letterboxd if you’re looking for more thoughts on the film). The film’s script is credited to James Gunn and Nicole Perlman, although the two never worked together on the film. In a lengthy—and fascinating—Buzzfeed profile on Perlman, as well as in numerous Q&As and features she’s done in the past week, it’s revealed she worked as part of the Marvel Writing Program, an incubator in which writers were brought in to help develop Marvel properties into potential franchises. Over a two-year period, she worked on adapting the Guardians of the Galaxy series into a workable film franchise, including choosing the roster, plotting out the story, and then completing further writing work during a six-month freelance period once it was clear Marvel was serious about that project.
The Buzzfeed piece features lots of detail on her experience with Marvel and her role in conceiving of this project, but it also acknowledges that she was never going to be its sole screenwriter.
James Gunn became the writer-director in question, and thus began the careful negotiation of authorship. Perlman hasn’t been erased from material around the film, and she was both invited to the set and attended the film’s gala premiere, so it’s not as though there is intense conflict or bad feelings about the experience. And the fact that Marvel is letting her talk about her experience so openly speaks volumes, given they could have probably signed her into nondisclosure agreements if they had felt they needed to. I could be cynical for a moment and note that Marvel is likely allowing this because of the positive press it’s brought over a Marvel Studios film finally having a female writer, making it probable they would have worked harder to marginalize her contributions had she not been given a co-writing credit in WGA arbitration (thus giving them a “lemons into lemonade” option of a progressive gender story), but she is nonetheless being allowed to articulate her authorship in popular discourse around the film. That’s important.
However, Marvel has also very much positioned this as James Gunn’s vision, in the same way that Edgar Wright’s Ant-Man was positioned as his vision right up until creative differences led to his departure, and Marvel began the uphill battle of trying to get “Peyton Reed and Adam McKay’s Ant-Man” to overwrite the existing authorial work done in the many years of development on the project. Whereas Perlman’s authorship—bounded primarily in a story development process controlled by Marvel and with limited profile based on her relative lack of experience—is fairly easily rearticulated as secondary (if still meaningful) in discourse around the film in the wake of Gunn’s hiring, Wright’s intense authorship discourses are much more prominent, and will be a greater challenge for Marvel (and one imagines the arbiter in a WGA hearing).
That paints a slightly different picture, in which any claim to prioritizing Gunn’s contributions is focusing on flavor instead of the main ingredients (with the new characters merely a garnish—she referred to all of this as “James Gunn magic” to The Hollywood Reporter). As much as there doesn’t appear to be any outright conflict regarding the scripting timeline, the final WGA decision, or the ultimate prioritizing of Gunn’s authorship by Marvel, there is still plenty of murkiness regarding the authorship of the film.
This murky negotiation of writing credit makes writing about the film into a bit of a minefield. Take this Crave Online interview with Gunn as an example: as it was originally written, the story failed to mention Perlman at all, prompting an editor’s correction and apology. However, the correction itself almost goes too far based on what we know, as it suggests Gunn “wrote the screenplay with Nicole Perlman,” when the two never actually worked on the script at the same time. There’s no question the correction was necessary, as Perlman’s work on developing the concept for the film built a foundation for any work that followed (and was credited in a way that reflects this, if not even more), but at the same time would it be unfair to Gunn to create the impression that story and character material he personally developed and added to the story does not belong to him and him alone given that Perlman was not involved directly? And moreover, although Perlman and Gunn’s stories seem to overlap as it relates to their contributions to the end product, can we take Gunn’s word for it when it comes to which elements of the film belong to him exclusively, or is this just him consciously or unconsciously engaging in discourses of conspicuous authorship to ensure his contributions are foregrounded in coverage of the film?
I raise none of these points in an attempt to discredit Perlman; her status as the first woman credited on a Marvel film is enormously important, and will hopefully be the start of a trend for a company that has a production history problematically linked to broader narratives of gender and Hollywood. However, in writing about the film myself and reading writing about it—particularly Todd VanDerWerff’s review at Vox, where he takes pains to include Perlman in each nod to authorship—I found myself struggling with how to engage with the particulars of the film within these conversations. And this doesn’t even get into the larger question of how much autonomy any filmmaker—no matter how much they articulate their authorship—can have within the massive Marvel Cinematic Universe machine. Were the issues I had with the film’s structure a byproduct of Perlman’s original treatment that Marvel Studios insisted on maintaining even as Gunn took over? And do we then consider that to be outside of Gunn’s responsibility, or has his choice to take such strong authorship made any and all decisions into his responsibility as writer/director, even if their original authorship lies with Perlman’s contributions?
For a film that is often so enjoyable because of how uncomplicated it is compared to the overly-extended Marvel Cinematic Universe, reading about Guardians of the Galaxy has been a comparative minefield, albeit one that offers plenty of discussion of how we conceive of authorship in popular discourse around a piece of major studio filmmaking; it also makes a nice precursor for the Ant-Man conversation we’ll be having roughly a year from now.
If you think they film authorship question is a minefield have pity for those thinking about how to credit the authorship of the comic ideas it’s based on. The films credits have a line stating it’s based on the series by Dan Abnett and Andy Lanning, undoubtedly the most influential run conceptually, yet this was a series spinning out of an event where the first team up of Star-lord, Groot and Rocket was written by Keith Giffen (originator of the Rocket/Groot partnership though not “I Am Groot”), from an idea by Editor Bill Roseman. An idea that involved teaming up, dirty dozen style, disparate characters created over 5 decades by a myriad of authors and artists. Speaking of artists, both Abnett and Lanning are the writers no artist is credited specifically for the comics or designs, how do you credit them for influencing the films artists and pre-vizzers when each is tweaking and building on their predecessor or outsiders designs?
Also, the name originates from a completely different fictional comic team. Also, also, the characters in the film depart in many respects from those on the page.
I did notice a number of artists and writers given special thanks beyond the aforementioned “based on” credit but didn’t have time to see if everyone mentioned above or who i’d consider contributive was there. So I’m not surprised to see credit for the series or “Intellectual Property” (and thus authorship) given to the corporate owners Marvel in every review or article about this film by default, since it’s a lot more tricky than the usual Lee & Kirby(which has its own well-trodden popular discourse controversies).
The end credits do give a “special thanks” to a list of many comics writers and artists associated with the characters, including Jack Kirby (creator of Groot and Ronan, as well as most of the rest of the Marvel Universe) and Arnold Drake (writer on first Guardians comic book). The credits also note that Rocket Racoon was “created by” Bill Mantlo and Keith Giffen and that Drax the Destroyer, Gamora, and Thanos were “created by” Jim Starlin. The artists and writers who get a “created by” credit have reportedly reached some sort of legal agreement with Marvel/Disney whereas the others perhaps have not. The Kirby family especially is actively trying to assert Kirby’s authorship, most lately in a case they are trying to bring before the Supreme Court.
I’d like to throw this link here and suggest that figuring out the responsibility for any film script with more than one author is always difficult. I also think most people have very limited understandings of what different parties bring to a script.
And while I’m at it, it feels like screenplays in a different category. TV scripts are often written in a group fashion, with numerous people contributing at different stages, but also with those people more-or-less working together. Plays are mostly written by one or two people that retain a lot of control. Books can be written collaboratively, with drafts passed back and forth. But a screenplay will be written, and then given to someone else and rewritten (probably without a discussion). And then perhaps given to someone else, who rewrites it again. And then maybe it goes to someone who rebuilds the whole thing from the ground up. Scripts can go in a million different directions and it’s difficult to way what changes are minor tweaks and which are gamechangers. And this process almost without exception takes place out of public view, so that we only have self-serving and secondhand testimony afterwards to figure out what happened.
I don’t disagree with the premise of any of these observations, but one of the things that’s interesting to me about this situation is that we actually do know a fair bit because both parties involved have discussed it in so many outlets. Now, this is obviously self-serving to some degree, but there’s a pretty clear timeline established, and enough knowledge of Gunn’s personal style (and Perlman’s acknowledgment she doesn’t do comedy) that there is a space for delineation, if not clear delineation. More than in other cases where we see a shared screenplay credit (like with Dawn of the Planet of the Apes, where Mark Bomback is credited alongside Rise co-writers Rick Jaffa and Amanda Silver) with almost no context, the unique circumstances of the Marvel Writing Program mean that we have a clear line at which point the script became Gunn’s responsibility.
While we can take any specific claims with a grain of salt, I do think the sheer volume of information makes this a tougher case to just chalk up to “we’ll never know.” I say this not to try to discredit either writer, but rather to note that context shifts authorship, and we are not lacking in context in this particular case.
the only material relevant to any discussion of authorship of this, or any other film, are the scripts themselves, major editorial versions and the final distributed film.
Presumably these are what the WGA used to arrive at their determination.
Anything else, especially comments in interviews, are only speculation fuel.
That’s why, for me, this isn’t a discussion about whether or not the WGA decision is right or wrong: The decision is the decision, and allows both to claim authorship.
But that creates the court of popular discourse, which may be speculative, but is ultimately crucial to a film like this one. The fact is that authorship is a discursive construction and not a definitive fact, as evidence by Perlman and Gunn’s respective efforts to articulate their authorship, and by journalists writ large working to confront that authorship in often complicated ways. All parties’ respective choices in how to frame the authorship of this film are far more constitutive of “authorship” than the actual facts, at least for a larger viewing public, which is why there is on some level a conflict between the “And” as credited by the WGA (rather than “After,” for example, which would be more accurate but doesn’t fit into the logics of how screenwriting credits are given). But either way, it isn’t cut and dry based on the WGA arbitration, because that’s just one piece in the broader puzzle of shared and negotiated authorship.
I don’t think the ‘court of popular discourse’ has any real claim to jurisdiction in this matter – especially without any real evidence to work with…two people (among many others) have a claim to ‘authorship’ of a screenplay, the body that has the authority to define authorship (and which both Perlman and Gunn have, at least publicly, acknowledged as the arbiter in the matter) have made their determination. I don’t want to seem like i’m trolling here, but I honestly question whether the issue of authorship would even exist if Perlman was male, much of the tone of articles speculating on ‘who wrote Guardians of the Galaxy’ has seemed, at least to me, to imply that Gunn’s credit is in some way taking something away from Perlman, when in fact these kinds of shared credits are the norm these days, especially when the director is in fact a writer/director.
And speaking personally, I wouldn’t be rushing to claim screenplay credit for this film.
As someone who’s been involved with WGA arbitration from both sides (as both a writer and an arbitrator) over a period of thirty years, let me assure you the process is completely random, depending almost entirely on the aesthetic biases of the arbitrators involved, who — like jurors in court cases — are usually the people with the most free time available to do an arbitration, ie: not necessarily the most qualified people to make a judgment. The WGA credit arbitration procedure is a tool the Writers Guild negotiated for to fight against traditional forms of credit abuse by producers (giving screen credit to friends, nephews, assistants, bystanders, etc.) and has its greatest impact within the field on a writer’s income and negotiating position in future contracts. No one working in the business seriously considers it an aesthetic judgment on the actual “authorship” of a screenplay or TV episode, though for public consumption they pretend to. Unless a writer writes, directs, acts all parts, produces, cuts, finances and distributes his own product, there is no single “author” of any film, New Wave critics notwithstanding. | 2019-04-20T04:16:45Z | https://cultural-learnings.com/2014/08/01/authorship-nicole-perlman-james-gunn-marvel-guardians-of-the-galaxy/ |
2011-10-28 Application filed by 애플 인크. filed Critical 애플 인크.
본 발명은 무선 장치의 전자 식별 정보의 프로그래밍을 인에이블하는 방법 및 장치에 관한 것이다. The present invention relates to a method and apparatus that enables a programming of the electronic identity of the wireless device. 일 실시예에서, 이전에 구입되었거나 사용되었던 무선 장치가 셀룰러 네트워크에 의해 활성화된다. In one embodiment, the wireless device that has been used or previously purchased is activated by the cellular network. 무선 장치는 액세스 모듈을 이용하여 셀룰러 네트워크에 접속하여 운영 체제 컴포넌트들 및/또는 액세스 제어 클라이언트 컴포넌트들을 다운로드한다. The wireless device with the access modules to connect to the cellular network and downloading of operating system components and / or access control client component. 본 발명의 방법 및 장치는 eSIM(Electronic Subscriber Identity Module) 데이터를 포함하는 다양한 컴포넌트들, 즉 OS 컴포넌트들의 업데이트, 추가 및 대체를 가능하게 한다. The method and apparatus enables a wide range of components, i.e. updating of OS components, further and alternative containing (Electronic Subscriber Identity Module) eSIM data. 본 발명의 예시적인 일 구현예에서는 디바이스와 셀룰러 네트워크 간의 신뢰된 키 교환을 이용하여 보안을 유지한다. In exemplary embodiments of the present invention to ensure security by using the trust key exchange between the device and the cellular network.
본 출원은, 2010년 10월 28일자로 출원되고 발명의 명칭이 "METHODS AND APPARATUS FOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESS NETWORK"인 미국 가특허출원 제61/407,862호의 우선권을 주장하는, 2011년 5월 19일자로 출원되고 발명의 명칭이 "METHODS AND APPARATUS FOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESS NETWORK"인 미국 특허 출원 제13/111,801호의 우선권을 주장하며, 이들 각각은 그 전체가 참조로서 여기에 포함된다. This application, which application is entitled & assert "METHODS AND APPARATUS FOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER A WIRELESS NETWORK" US Patent Application No. 61/407 862 priority call on October 28, the date 2010, May 2011 It filed 19, and claiming the title of the invention "METHODS aND APPARATUS fOR DELIVERING ELECTRONIC IDENTIFICATION COMPONENTS OVER a WIRELESS NETWORK" U.S. Patent Application No. 13/111 801 the priority call, and each of which is incorporated herein in its entirety by reference.
본 출원은 또한, 공동 소유되고 공동 계류중인 출원들로서, 2009년 1월 13일자로 출원되고 발명의 명칭이 "POSTPONED CARRIER CONFIGURATION"인 미국 특허출원 제12/353,227호, 2010년 11월 22일자로 출원되고 발명의 명칭이 "WIRELESS NETWORK AUTHENTICATION APPARATUS AND METHODS"인 미국 특허출원 제12/952,082, 2010년 11월 22일자로 출원되고 발명의 명칭이 "APPARATUS AND METHOD FOR PROVISIONING SUBSCRIBER IDENTITY DATA IN A WIRELESS NETWORK"인 미국 특허출원 제12/952,089호, 2010년 12월28일자로 출원되고 발명의 명칭이 "VIRTUAL SUNSCRIBER IDENTITY MODULE DISTRIBUTION SYSTEM"인 미국 특허출원 제12/980,232호, 2011년 4월 1일자로 출원되고 발명의 명칭이 "ACCESS DATA PROVISIONING SERVICE"인 미국 특허출원 제13/078,811호, 2011년 4월 4일자로 출원되고 발명의 명칭이 "MANAGEMENT SYSTEMS FOR MULTIPLE ACCESS CONTROL ENTITIES"인 미국 특허출원 13/079,619호, 2011 The present application also filed as pending, co-owned and co-pending, filed on January 13, 2009 the date and a title of the invention "POSTPONED CARRIER CONFIGURATION" U.S. Patent Application No. 12/353 227 call, in November 2010, 22 day and the title of the invention of "WIRELESS NETWORK AUTHENTICATION APPARATUS aND METHODS" U.S. Patent Application No. 12/952 082, filed on November, 2010 22 date and entitled & "APPARATUS aND METHOD fOR PROVISIONING SUBSCRIBER IDENTITY DATA iN a WIRELESS NETWORK" US Patent Application No. 12 / 952,089 calls, this application is the title of the invention to December 28 date 2010 "VIRTUAL SUNSCRIBER IDENTITY MODULE DISTRIBUTION SYSTEM" US patent application is filed 12 / 980,232 Issue, April 1, 2011 date of invention is the designation "ACCESS DATA PROVISIONING SERVICE" U.S. Patent Application No. 13/078 811 No., filed on April 04, 2011, and entitled & Inn "MANAGEMENT SYSTEMS fOR MULTIPLE ACCESS CONTROL ENTITIES" U.S. Patent Application 13/079 619 Ho, 2011 4월 5일자로 출원되고 발명의 명칭이 "METHODS AND APPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROL CLIENTS"인 미국 특허출원 제13/080,521호, 2011년 4월 5일자로 출원되고 발명의 명칭이 "SIMULACRUM OF PHYSICAL SECURITY DEVICE AND METHODS"인 미국 특허출원 제13/080,533호, 2011년 4월 5일자로 출원되고 발명의 명칭이 "APPARATUS AND METHODS FOR CONTROLLING DISTRIBUTION OF ELECTRONIC SUBSCRIBER IDENTITY MODULES"인 미국 특허출원 제13/080,558호, 2011년 4월 25일자로 출원되고 발명의 명칭이 "APPARATUS AND METHODS FOR STORING ELECTRONIC SUBSCRIBER IDENTITY MODULES"인 미국 특허출원 제13/093,722호, 2011년 4월 27일자로 출원되고 발명의 명칭이 "SYSTEM FOR DISTRIBUTION OF UNIQUE SUBSCRIBER IDENTITY MODULES"인 미국 특허출원 제13/095,716호; April 05 This application is the title of the invention to date "METHODS AND APPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROL CLIENTS" U.S. Patent Application No. 13/080 521 No., filed on April 05, 2011, and entitled & "SIMULACRUM OF PHYSICAL SECURITY DEVICE aND METHODS "U.S. Patent Application No. 13/080 533 Ho, April 2011 and filed on May date entitled &" APPARATUS aND METHODS fOR CONTROLLING DISTRIBUTION oF ELECTRONIC SUBSCRIBER IDENTITY MODULES "U.S. Patent Application No. 13/080 558 No., this filed April 25, 2011, and entitled & "APPARATUS aND METHODS fOR STORING ELECTRONIC SUBSCRIBER IDENTITY MODULES" the US Patent Application name of claim being filed on 13/093 722 Ho, April 2011 27, invention " SYSTEM FOR DISTRIBUTION oF UNIQUE SUBSCRIBER IDENTITY MODULES "U.S. Patent Application No. 13/095 716 call; 및 2010년 10월 28일자로 출원되고 발명의 명칭이 "METHODS AND APPARATUS FOR ACCESS CONTROL CLIENT ASSISTED ROAMING"인 미국 가특허출원 제61/407,858호, 2010년 11월 3일자로 출원되고 발명의 명칭이 "METHODS AND APPARATUS FOR ACCESS DATA RECOVERY FROM A MALFUNCTIONING DEVICE"인 미국 가특허출원 제61/409,891호, 2010년 11월 12일자로 출원되고 발명의 명칭이 "APPARATUS AND METHODS FOR RECORDATION OF DEVICE HISTORY ACROSS MULTIPLE SOFTWARE EMULATION"인 미국 가특허출원 제61/413,317호, 2011년 4월 26일자로 출원되고 발명의 명칭이 "ELECTRONIC ACCESS CLIENT DISTRIBUTION APPARATUS AND METHODS"인 미국 가특허출원 제61/479,319호, 2011년 4월 29일자로 출원되고 발명의 명칭이 "COMPACT FORM FACTOR INTEGRATED CIRCUIT CARD"인 미국 가특허출원 제61/481,114호, 2011년 5월 6일자로 출원된 발명의 명칭이 "METHODS AND APPARATUS FOR PROVIDING MANAGEMENT CAPABILITIES FOR ACCESS CONTROL CLIE And is filed on October 28, the date 2010, and the title of the invention "METHODS AND APPARATUS FOR ACCESS CONTROL CLIENT ASSISTED ROAMING" The US Patent Application Name of claim being filed on 61/407 858 Ho, November 2010, February 3 invention " METHODS aND APPARATUS fOR ACCESS DATA RECOVERY FROM a MALFUNCTIONING DEVICE "US Patent Application No. 61/409 891 call, is filed in November 2010 dated and the title of the invention" APPARATUS aND METHODS fOR RECORDATION oF DEVICE HISTORY ACROSS MULTIPLE SOFTWARE EMULATION " U.S. Patent Application No. 61/413 317 call, is filed on April 26, 2011, and entitled & "ELECTRONIC ACCESS CLIENT DISTRIBUTION APPARATUS aND METHODS" US Patent Application No. 61/479 319 Ho, April 2011, 29, Application and entitled & a "COMPACT FORM FACTOR INTEGRATED CIRCUIT CARD" US Patent Application No. 61/481 114 call, the name of the invention, filed on May 6, 2011, "METHODS aND APPARATUS fOR PROVIDING MANAGEMENT CAPABILITIES fOR ACCESS CONTROL CLIE NTS"인 미국 가특허출원 제61/483,582호와 관련되며, 이들 출원은 그 전체가 참조로서 여기에 포함된다. NTS "the United States and is related to Patent Application Serial No. 61 / No. 483 582, these applications are incorporated herein by reference in its entirety.
본 발명은 일반적으로, 예를 들어 디바이스들이 셀룰러 네트워크를 이용하여 통신하는 시스템과 같은 무선 시스템에 관한 것이다. The present invention is generally, for example, devices for radio systems such as the system for communicating with a cellular network. 특히, 일 예시적인 양태에서, 본 발명은 셀룰러 네트워크를 통해 셀룰러 디바이스에 전자 식별 컴포넌트들을 전달하기 위한 방법 및 장치에 관한 것이다. In particular, in one exemplary embodiment, the present invention relates to a method and apparatus for delivering electronic identification component to the cellular device via a cellular network.
대부분의 종래 기술의 무선 라디오 통신 시스템에서는 보안 통신을 위해 액세스 제어가 요구된다. In most of the prior art of a wireless radio communication system, an access control is required for secure communication. 일례로, 한가지 간단한 액세스 제어 방식은 (i) 통신하는 당사자의 아이덴티티를 검증하는 것, 및 (ii) 검증된 아이덴티티에 상응하는 액세스 레벨을 부여하는 것을 포함할 수 있다. For example, one simple access control method is to verify the identity of the parties to communicate (i), and (ii) may include granting access level corresponding to the verified identity. 예시적인 셀룰러 시스템의 문맥 내에서, 액세스 제어는 물리적인 카드 폼 팩터 UICC(Universal Integrated Circuit Card) 내에 물리적으로 내장되는 SIM(Subscriber Identity Module)이라고 지칭되는 액세스 제어 클라이언트에 의해 관리된다. In the context of an exemplary cellular system, access control is managed by the access control client is referred to as a (Subscriber Identity Module) to be incorporated physically in the SIM card, the physical form factor UICC (Universal Integrated Circuit Card). 동작 동안, SIM 카드는 셀룰러 네트워크의 가입자를 인증한다. During operation, SIM card authenticates the subscriber of the cellular network. 성공적인 인증 후에, 가입자는 셀룰러 네트워크로의 액세스가 허용된다. After successful authentication, the subscriber is allowed access to a cellular network.
각각의 SIM 카드는 단일의 사용자 계정과 관련되며, 사용자 계정 데이터는 SIM 카드 상에 영구적으로 저장된다. Each SIM card is associated with a single user account, user account data are permanently stored on the SIM card. 사용자가 기존의 계정에서 새로운 계정으로 서비스를 변경하기를 원한다면, 사용자는 (예를 들어, SIM 카드 슬롯에서 기존의 SIM 카드를 물리적으로 제거하고 새로운 SIM 카드를 삽입함으로써) 기존의 SIM 카드를 새로운 SIM 카드로 교체해야 한다. User wants to change the service to the new account in an existing account, the user (e. G., Physically removing the old SIM card from the SIM card slot, and by inserting a new SIM card), the new SIM existing SIM card It should be replaced with a card. 요컨대, 사용자 계정은 SIM 카드와 연계되는 것이며 이동 디바이스 자체와 연계되는 것이 아니다. In short, your account will be associated with the SIM card, not associated with the mobile device itself. 결과적으로, 추가의 계정을 추가하는 것은 새로운 SIM 카드를 이용하는 것을 필요로 한다. As a result, adding additional accounts will need to use the new SIM card. 예를 들어, 가입자가 새로운 서비스 지역으로 여행할 때, 가입자는 종종, 고가의 로밍 요금을 지불하는 것 또는 새로운 SIM 카드를 구매하는 것 사이에서 선택해야만 한다. For example, when a subscriber travels to a new service area, the subscriber often must choose between buying a paying expensive roaming charges or a new SIM card. 마찬가지로, (예를 들어, 업무와 개인 용도를 위한 전화를 공유하는 것과 같은) 청구 계좌들 사이에서 변경을 행하는 사용자에게 있어서, 사용자는 SIM 카드들 사이에서 지속적으로 교환하여야만 한다. Similarly, for the user performing a change between the charge (e. G., Such as those that share the phone for business and personal uses) the account, the user It should be continuously exchanged between the SIM card. 몇몇 디바이스들은 복수의 카드 리셉터클(receptacle)을 제공하여 복수의 SIM 카드들이 이용가능하게 함으로써 이러한 문제를 해결하려고 시도하였다. Some devices have attempted to solve this problem by enabling multiple SIM cards are used to provide a plurality of card receptacle (receptacle). 그러나, 이들 "복수-카드" 해결책은 추가의 SIM 카드 리셉터클들이 상당한 공간을 차지하기 때문에 바람직하지 않으며, SIM 카드 계정들의 근원 불가변성을 해결하지 못한다. However, these "multi-card" solution is undesirable because of the additional SIM card receptacle to occupy considerable space and does not address the source of the non-modified SIM card account.
또한, 기존의 SIM 해결책은 물리적인 UICC 카드 매체에 "하드코딩된" 하나 이상의 SIM 소프트웨어 아이덴티티를 포함한다, 즉, 예를 들어, SIM 카드 어셈블리는 재프로그래밍될 수 없다. Also, existing SIM solutions include physical UICC card medium in the "hard-coded" at least one SIM software identity, that is, for example, SIM card assembly can not be reprogrammed. 모든 실용적인 의도 및 목적을 위해, 종래 기술의 SIM 카드는 분할 불가능하다, 즉, SIM 소프트웨어는 물리적인 UICC 카드 매체로부터 분리될 수 없다. For all practical intents and purposes, it is the SIM card of the prior art are not divided, that is, SIM software may not be separate from the physical UICC card medium. 따라서, 특정 동작들은 기존의 SIM 카드 프레임워크 내에서 수행될 수 없다. Therefore, certain operations can not be carried out within the existing framework of the SIM card. 예를 들어, SIM은 SIM 카드들 사이에서 이동될 수 없고, 수정, 폐지될 수 없고, 및/또는 서로 다른 네트워크 제공업자들에 대해 이용가능해질 수 없다. For example, SIM can not be moved between the SIM card, modification, can not be abolished, and / or can not be made available for different network providers. 따라서, 이하에서 보다 상세히 설명되는 바와 같이, 기존의 SIM 카드 해결책들은 셀룰러 기술들(및 다른 무선 기술들)의 복잡성을 진화시키기에는 점점 불충분해지고 있다. Thus, as will be described in more detail below, it has become increasingly insufficient existing SIM card can fit a solution to the complexity of the evolution in cellular technology (and other wireless technology).
따라서, 사용자 계정들을 획득(예를 들어, 구매)하고 관리하는 능력을 사용자에게 제공하기 위한 개선된 해결책이 필요하다. Thus, there is a need for an improved solution to provide the ability to obtain user account (for example, a purchase) and manage your users. 이러한 개선된 해결책은 이상적으로, 새로운 SIM 카드를 필요로 하지 않고 이전에 배치되거나 구매된 디바이스들에 새로운 또는 상이한 사용자 계정을 전달하는 것을 지원해야 한다. This improved solution ideally should support the previously placed without the need for a new SIM card, or pass a new or different user account on the device purchased.
본 발명은 그 중에서도, 액세스 제어 클라이언트들의 안전한 구입 및 전달을 위한 개선된 장치 및 방법을 제공함으로써 전술한 요구들을 만족시킨다. The present invention satisfies the aforementioned needs by providing an improved apparatus and method for secure purchase and delivery of these, Access Control clients.
본 발명의 제1 양태에서, 무선 네트워크를 통해 액세스 제어 클라이언트를 수신하는 방법이 개시된다. In a first aspect of the present invention, a method for receiving an access control client over a wireless network is disclosed. 일 실시예에서, 본 방법은, 인가된 데이터 세션을 설정하는 단계 - 인가된 데이터 세션은 제1 액세스 권한 집합을 가짐 -; In one embodiment, the method comprises the steps of: setting the applying a data session by the authorized data session having a first set of access rights; 액세스 제어 클라이언트를 선택하는 단계 - 액세스 제어 클라이언트는 제2 액세스 권한 집합을 가짐 -; Selecting a client access control - Access Control clients having a second set of access rights; 하나 이상의 업데이트 패키지를 수신하는 단계; Receiving at least one update package; 하나 이상의 업데이트 패키지를 액세스 제어 클라이언트 내에 어셈블링하는 단계; The method comprising assembling at least one update package in the Access Control clients; 및 액세스 제어 클라이언트를 실행하는 단계를 포함한다. And a step of executing an access control client.
본 발명의 제2 양태에서, 무선 네트워크를 통해 다바이스 운영 체제를 수정하는 방법이 개시된다. In a second aspect of the invention, a method of modifying the dabayiseu operating system over a wireless network is disclosed. 일 실시예에서, 본 방법은 인가된 데이터 세션을 설정하는 단계 - 인가된 데이터 세션은 제1 액세스 권한 집합을 가짐 -; In one embodiment, the method further comprising: setting the authorized data session authorized data session having a first set of access rights; 하나 이상의 업데이트 패키지를 수신하는 단계; Receiving at least one update package; 하나 이상의 업데이트 패키지를 운영 체제 컴포넌트 내에 어셈블링하는 단계를 포함하고, 운영 체제 컴포넌트는 제2 액세스 권한 집합을 갖는 액세스 제어 클라이언트와의 동작을 위해 구성된다. Comprising the step of assembling at least one update package in the operating system components, operating system components are configured for operation of the client and the access control having the second set of access rights.
본 발명의 제3 양태에서, 네트워크를 통해 액세스 제어 클라이언트를 수신하는 방법이 개시된다. In a third aspect of the invention, a method for receiving an access control client over a network is disclosed. 일 실시예에서, 본 방법은 인가된 데이터 세션을 설정하는 단계 - 인가된 데이터 세션은 액세스 제어 클라이언트와 관련된 하나 이상의 패키지로의 액세스를 가능하게 하는 액세스 제1 액세스 권한 집합을 가짐 -; In one embodiment, the method further comprising: setting the authorized data session authorized data session having a first set of access rights to access which enables access to one or more packages associated with the access control client; 액세스 제어 클라이언트와 관련된 하나 이상의 패키지를 다운로드하는 단계 - 상기 액세스 제어 클라이언트는 제2 액세스 권한 집합을 가짐 -; Step of downloading one or more packages associated with the access control client, wherein the client access control has a second set of access rights; 다운로드된 하나 이상의 패키지에 적어도 부분적으로 기초하여 액세스 제어 클라이언트를 어셈블링하는 단계; Based at least in part on one or more packages, the method comprising: assembling the downloaded access control client; 및 어셈블링된 액세스 제어 클라이언트를 가지고 가입자 세션을 설정하는 단계를 포함한다. And it has assembled Access Control client and a step of setting the subscriber session.
일 변형예에서, 인가된 데이터 세션은 무선 네트워크와 수신자 디바이스 간의 상호 간의 검증을 포함한다. In one variant, and the authorized data session comprises a mutual verification between the wireless network and the receiver device. 예를 들어, 상호 간의 검증은 암호 키 프로토콜을 포함할 수 있다. For example, the mutual verification between may include a cryptographic key protocol. 그러한 일례에서, 암호 키 프로토콜은 하나 이상의 비대칭 RSA(Rivest Shamir and Adelman) 공용 키 및 개인 키에 기초한다. In such an example, the cryptographic key protocol is based on one or more asymmetric RSA (Rivest Shamir and Adelman) public key and a private key.
다른 변형예에서, 제2 액세스 권한 집합은 예를 들어, 음성 호출을 걸거나 받는 것, 네트워크에 액세스하는 것, 미디어 파일에 액세스하는 것과 같은 하나 이상의 소비자 서비스를 가능하게 한다. In another variation, the second set of access rights, for example, to make or receive voice calls, to access the network, enabling one or more consumer services, such as access to media files. 다르게, 제1 액세스 권한 집합은 소비자 서비스가 이용불가능하다. Alternatively, the first set of access rights is unavailable a consumer service.
본 발명의 제4 양태에서, 네트워크를 통한 디바이스 운영 체제를 수정하는 방법이 개시된다. In a fourth aspect of the present invention, a method for modifying the device operating system via a network it is disclosed. 일 실시예에서, 본 방법은 제1 액세스 권한 집합을 갖는 인가된 데이터 세션을 설정하는 단계; In one embodiment, the method further comprising: setting the applying a data session with a first set of access rights; 인가된 데이터 세션을 통해 업데이트 요구를 수신하는 단계; The method comprising: receiving an update request from an application data session; 응답적으로 적절한 업데이트 패키지를 생성하는 단계; Responsive to the step of generating the appropriate update package; 및 인가된 데이터 세션을 통해 하나 이상의 업데이트 패키지를 전송하는 단계를 포함한다. And is applied through the data session includes the step of transmitting at least one update package. 하나 이상의 업데이트 패키지는 액세스 제어 클라이언트와의 동작을 위해 구성되며, 액세스 제어 클라이언트는 제2 액세스 권한 집합을 갖는다. At least one update package is configured for the operation of the client and the access control, access control, the client has a second set of access rights.
일 변형예에서, 네트워크는 무선 네트워크이고, 인가된 데이터 세션은 무선 네트워크와 디바이스 간의 상호 간의 검증을 포함한다. In one variation, the network is a wireless network, the authorized data session comprises a mutual verification between the wireless network and the device.
제2 변형예에서, 제1 액세스 권한 집합은 실질적으로 업데이트 패키지들을 교환하는 것으로 제한된다. In the second modification, the first set of access rights will be limited to substantially the exchange of update packages. 다르게, 다른 변형예에서, 제2 액세스 권한 집합은 하나 이상의 가입자 세션을 가능하게 한다. Alternatively, in another variation, the second set of access rights enables the one or more subscriber session. 다른 대안으로서, 제1 액세스 권한 집합은 제2 액세스 권한 집합의 부분집합이다. Alternatively, the first set of access rights is a subset of the second set of access rights. 또 다른 대안에서, 제2 액세스 권한 집합은 하나 이상의 사용자 선택에 기초하여 선택된다. In yet another alternative, a second set of access rights is selected based on one or more user selected. 또한, 업데이트 요청은 하나 이상의 사용자 선택을 포함할 수 있다. In addition, the update request may include one or more user-selected. 하나 이상의 업데이트 옵션도 디바이스에 제시될 수 있다. One more update options can also be present in the device.
본 발명의 다른 양태에서, 무선 장치가 개시된다. In another aspect of the invention, a wireless device is disclosed. 일 실시예에서, 무선 장치는 하나 이상의 무선 네트워크에 접속하도록 구성된 하나 이상의 무선 인터페이스; In one embodiment, the wireless device one or more wireless interface configured to connect to one or more wireless networks; 복수의 사용자 액세스 데이터 구성요소를 저장하도록 구성된 보안 구성요소 - 각각의 사용자 액세스 데이터 구성요소는 대응하는 네트워크와 관련됨 -; Security configured to store a plurality of user access data component elements, wherein each user access data components being associated with a corresponding network; 프로세서; Processor; 및 프로세서와 데이터 통신하는 저장 디바이스 - 저장 디바이스는 컴퓨터-실행가능 명령어들을 포함함 -를 포함한다. Include - a storage device and a processor in communication with the data-storing device is computer-including executable instructions.
일 변형예에서, 컴퓨터-실행가능 명령어들은 프로세서에 의해 실행될 때, 제1 액세스 권한 집합으로 제한된 인가된 데이터 세션을 설정하고; In one variation, the computer-executable instructions, and, when executed by a processor, a first set of access rights set up a limited authorized data session; 인가된 데이터 세션을 통해 액세스 제어 클라이언트에 대한 업데이트를 요청하고; Through the authorized data session and requests an update on the access control client; 업데이트된 액세스 제어 클라이언트를 가지고 가입자 세션을 설정하도록 구성되며, 가입자 세션은 제2 액세스 권한 집합을 갖는다. With the updated access control client is configured to establish a session, a subscriber, a subscriber session has a second set of access rights.
제2 변형예에서, 무선 디바이스는 이동 디바이스이고, 액세스 제어 클라이언트는 eSIM(electronic Subscriber Identity Module)이다. In the second modified example, the wireless device is a mobile device, and access control client (electronic Subscriber Identity Module) eSIM.
본 발명의 또 다른 양태에서, 네트워크 장치가 개시된다. In another aspect of the invention, a network device is disclosed. 일 실시예에서, 네트워크 장치는 하나 이상의 무선 디바이스와 통신하도록 구성된 하나 이상의 인터페이스; In one embodiment, the network device one or more interfaces configured to communicate with more than one wireless device; 프로세서; Processor; 및 프로세서와 데이터 통신하는 저장 디바이스를 포함하고, 저장 디바이스는 컴퓨터-실행가능 명령어들을 포함한다. And a storage device in communication with the data processor, the storage device is a computer-executable instructions comprise. 일 변형예에서, 컴퓨터-실행가능 명령어들은 프로세서에 의해 실행될 때, 하나 이상의 무선 디바이스 중 하나의 무선 디바이스와의 인가된 데이터 세션을 설정하고 - 인가된 데이터 세션은 제1 액세스 권한 집합을 가짐 -; In one variation, the computer-executable instructions, when executed by the processor, set the authorized data session with the one of the one or more wireless devices of the wireless device, and - the authorized data session having a first set of access rights; 그 하나의 무선 디바이스로부터 업데이트 요청을 수신하고 응답적으로 적절한 업데이트 패키지를 생성하고; Receive an update request from the one of the wireless device and generates the appropriate update package to responsively and; 생성된 업데이트 패키지를 전송하도록 구성된다. It is configured to transmit an updated package produced. 생성된 업데이트 패키지는 액세스 제어 클라이언트와의 동작을 위해 구성되며, 액세스 제어 클라이언트는 제2 액세스 권한 집합을 갖는다. Generating an update package is configured for the operation of the client and the access control, access control, the client has a second set of access rights.
본 발명의 또 다른 양태에서, 컴퓨터 판독가능 장치가 개시된다. In yet another aspect of the invention, the computer readable device is disclosed. 일 실시예에서, 장치는 적어도 하나의 컴퓨터 프로그램을 저장하도록 구성된 저장 매체를 포함한다. In one embodiment, the device comprises a storage medium configured to store at least one computer program. 일 변형예에서, 프로그램은 실행될 때, 제1 액세스 권한 집합을 갖는 인가된 데이터 세션을 설정하고; In one variant, the program, when executed, the first access is set for a data session with a set of permissions; 하나 이상의 업데이트 패키지를 수신하고; Receiving at least one update package; 하나 이상의 업데이트 패키지를 운영 체제 컴포넌트 내에 어셈블링하는 명령어들을 포함한다. At least one update package includes instructions to assemble components within the operating system.
본 발명의 다른 특징들 및 장점들은, 본 기술분야에 통상의 지식을 가진 자가 이하에 제공되는 예시적인 실시예들의 상세한 설명 및 첨부 도면을 참조하면 쉽게 인지될 것이다. Other features of the invention and advantages, with reference to the normal detailed description and accompanying drawings of exemplary embodiments that are provided by the below with skill in the art will be recognized easily.
도 1은 SIM을 이용하는 종래 기술의 AKA(Authentication and Key Agreement) 프로시저를 도시하는 논리 래더도. 1 is a ladder logic diagram illustrating a prior art (Authentication and Key Agreement) procedure AKA technique using the SIM.
도 2는 본 발명의 다양한 양태에 따라 이동 디바이스 eSIM을 프로그래밍하기 위한 일 예시적인 실시예를 세부화한 논리 흐름도. Figure 2 is a logic flow diagram detailing an exemplary embodiment for programming a mobile device eSIM accordance with various aspects of the invention.
도 3은 본 발명의 다양한 양태에 따라 이동 디바이스 운영 체제를 프로그래밍하기 위한 일 예시적인 실시예를 세부화한 논리 흐름도. Figure 3 is an illustrative embodiment of a logic flow diagram detailing for programming a mobile device operating system in accordance with various aspects of the invention.
도 4는 본 발명에 따라 이동 디바이스의 컴포넌트들을 프로그래밍하기 위한 일반화된 방법의 일 실시예를 도시하는 논리 흐름도. Figure 4 is a logic flow diagram illustrating one embodiment of a generalized method for programming a component of the mobile device in accordance with the present invention.
도 5는 본 발명의 방법을 구현하는 데에 유용한 예시적인 장치의 블럭도. Figure 5 is a block diagram of an illustrative apparatus useful to implement the method of the invention.
모든 도면의 저작권은 Apple Inc.에 귀속됨. All drawings copyright gwisokdoem on Apple Inc..
도면에 대한 참조가 이루어지며, 도면 전반에 걸쳐 유사 참조번호는 유사 부분들을 지칭한다. A reference to the drawings consists, like reference numerals throughout the drawings refer to like parts throughout is.
일 양태에서, 본 발명은 네트워크를 통해 액세스 제어 클라이언트를 디바이스에 전달하기 위한 방법 및 장치를 제공한다. In one aspect, the present invention provides a method and apparatus for transmitting an access control client over the network to the device. 일 예시적인 실시예에서, 셀룰러 네트워크는 셀룰러 디바이스가 배치된 후에 eSIM을 셀룰러 디바이스에 안전하게 전달할 수 있다. In one exemplary embodiment, the cellular network can be transmitted securely to the Cellular eSIM device after the cellular devices disposed. 특히, 셀룰러 디바이스는 네트워크로의 접속을 위한 제한된 능력으로 프리-프로그래밍된다. In particular, the cellular device is free to a limited capability for connection to the network is programmed. 셀룰러 디바이스는 업데이트 포털에 접속하기 위한 몇몇 제한된 액세스 능력을 갖지만, 음성 호출을 하고 사용자 데이터를 수신 및 전송하는 등을 행하기 위한 기능을 충분히 갖춘 eSIM을 수신해야 한다. Cellular devices has to receive a eSIM with sufficient functions for performing, such as a limited number of access has the ability to access the portal to update, the voice call, and receive and transmit user data. 예를 들어, 사용자는 간단한 액세스 모듈을 가진 이동 디바이스(예를 들어, 셀룰러 폰)를 구매한다. For example, the user purchases the mobile device (e.g., cellular phone) having a short access module. 액세스 모듈은 셀룰러 네트워크에 접속하고 디바이스를 인증하고 사용자로 하여금 충분한 기능을 가진 eSIM을 구매 또는 검색할 수 있게 하도록 구성된다. Access module is connected to the cellular network to authenticate the device and is configured to be able to buy or search for enabling a user eSIM that has sufficient capabilities. 셀룰러 네트워크는 부트스트랩 OS에 의해 어셈블링되고 활성화되는 eSIM을 안전하게 전달한다. Cellular networks are securely deliver eSIM is assembled and activated by a bootstrap OS.
여기에서 더 상세히 설명되는 바와 같이, 본 발명의 일 예시적인 실시예는 (예를 들어, 운영 체제 및 액세스 제어 클라이언트 컴포넌트들을 포함하는) 액세스 제어 클라이언트와 관련된 컴포넌트들의 전달을 용이하게 할 수 있는 액세스 모듈 시스템을 개시한다. As this will be described in greater detail, one exemplary embodiment of the present invention, the access module that is capable of facilitating the transfer of the components involved (e.g., operating system and access control, including a client component) and Access Control client It discloses a system. 올바르게 부호화되고/되거나 암호화된 적절히 전달된 패키지를 수신한 후에, 운영 체제는 컴포넌트들을 어셈블링 및 로드할 수 있다. After correctly coded and / or receives a properly encrypted transfer package, the operating system can be assembled and loaded components. 본 발명의 다양한 실시예에서, 운영 체제, 액세스 제어 클라이언트, 사용자 계정 데이터 등을 전달하는 데에 패키지들이 이용될 수 있다. In various embodiments of the invention, packages may be used to deliver the operating system, access control, client, user account data and the like.
일 양태에서, 본 발명은 또한, 무선 디바이스의 전체 라이프 사이클을 관리하기 위한 소프트웨어 기반 업데이트들을 고려한다. In one aspect, the present invention also contemplates a software-based updates for managing the entire lifecycle of a wireless device. 따라서, 제시된 방법론에 할당된 유연성은, 심지어 액세스 모듈 및/또는 운영 체제 컴포넌트들을 포함하는 무선 디바이스의 임의의 소프트웨어 구성요소의 대체 능력을 포함한다. Thus, the flexibility in allocation methodology set forth, even including alternate capability of the access module and / or any of the software components of the wireless device, including the operating system components. 예를 들어, 셀룰러 디바이스는 완전히 새로운 운영 체제를 수신하여 그것의 인증 알고리즘을 업데이트할 수 있다. For example, a cellular device can fully update its encryption algorithm to receive the new operating system.
개시된 발명에 대한 다른 다양하고 유용한 응용들은 보안 능력, 업데이팅 변경 제어, 새로운 기능 및 서비스의 사후-배치 프로비저닝을 진화시키는 것을 포함한다. And various other useful applications for the disclosed invention are post-security capabilities, updating change control, new features and services - involves the evolution batch provisioning.
본 발명의 예시적인 실시예들 및 양태들이 이제 상세히 설명된다. Exemplary embodiments and aspects of the invention will now be described in detail. 이들 실시예 및 양태는 주로 GSM, GPRS/EDGE 또는 UMTS 셀룰러 네트워크의 SIM(Subscriber Identity Module)의 문맥에서 논의되지만, 통상의 기술을 가진 자라면 본 발명이 그렇게 제한되는 것은 아니라는 점을 인지할 것이다. These embodiments and aspects mainly are discussed in the context of the SIM (Subscriber Identity Module) of the GSM, GPRS / EDGE or UMTS cellular network, Those of ordinary skill will recognize that not according to the present invention so limited. 사실, 본 발명의 다양한 양태들은 액세스 제어 엔티티들 또는 클라이언트들의 안전한 수정, 저장 및 실행으로부터 이익을 얻을 수 있는 (셀룰러든지 아니면 다른 것이든지) 임의의 무선 네트워크에서 유용하다. In fact, the various aspects that are to benefit from the secure modification, storage and execution of the access control entity or client (either cellular or any other things) of the present invention is useful in any wireless network.
또한, 여기에서 "SIM(Subscriber Identity Module)이라는 용어가 사용되지만(예를 들어, eSIM), 이 용어가 반드시 (i) 그 자체로 가입자에 의한 사용(즉, 본 발명은 가입자 또는 비가입자에 의해 실시될 수 있음); (ii) 단일의 개인의 아이덴티티(즉, 본 발명은 가족과 같은 개인들의 그룹, 또는 기업과 같은 무형 또는 허구의 엔티티를 대신하여 실시될 수 있음); 또는 (iii) 임의의 유형의(tangible) "모듈" 장비 또는 하드웨어를 함축하거나 요구하는 것은 아니다. Further, here, "the term SIM (Subscriber Identity Module) is used, but (e. G., ESIM), the term must be (i) used by the subscriber by itself (that is, the invention is by the subscriber or non-subscriber It can be carried out); (ii) a single personal identity (i.e., that the present invention may be practiced on behalf of the intangible or fictitious entity, such as a group of individuals, or companies of the same family); or (iii) any the type of the (tangible) "module" does not imply or require the equipment or hardware.
종래 기술의 UMTS 셀룰러 네트워크 문맥에서, 사용자 장비(UE)는 이동 디바이스 및 USIM을 포함한다. In the UMTS cellular network context of the prior art, the user equipment (UE) comprises a mobile device and USIM. USIM은 물리적인 UICC(Universal Integrated Circuit Card)로부터 저장 및 실행되는 논리적 소프트웨어 엔티티이다. USIM is a logical software entity that is stored and executed from the physical UICC (Universal Integrated Circuit Card). 가입자 정보와 같은 다양한 정보가 USIM에 저장될 뿐만 아니라, 무선 네트워크 서비스를 획득하기 위해 네트워크 운영자와의 인증을 위한 키 및 알고리즘이 사용된다. Various information is key and an algorithm for authentication with the network operator for, as well as to obtain the wireless network service to be stored in the USIM as the subscriber information is used.
일반적으로, UICC들은 가입자 배포 전에 USIM을 이용하여 프로그래밍되고, 프리 프로그래밍 또는 "개인 설정(personalization)"은 각각의 네트워크 오퍼레이터에 특정된다. Generally, UICC are programmed using a USIM subscriber before deployment, or pre-programmed "Personalization (personalization)" is specified for each network operator. 예를 들어, 배포 전에, USIM은 IMSI(International Mobile Subscriber Identify), 고유한 ICC-ID(Integrated Circuit Card Identifier) 및 특정한 인증키(K)와 연관된다. For example, prior to deployment, USIM is associated with (Integrated Circuit Card Identifier) IMSI (International Mobile Subscriber Identify), unique ICC-ID and a specific authentication key (K). 네트워크 오퍼레이터는 네트워크의 AuC(Authentication Center) 내에 포함된 레지스트리에 그 연관을 저장한다. The network operator stores the association in a registry contained in the AuC (Authentication Center) of a network. 개인 설정 후에, UICC는 가입자들에게 배포될 수 있다. After the personalization, UICC can be distributed to subscribers.
이제부터 도 1을 참조하여, 전술한 종래 기술의 USIM을 이용한 하나의 예시적인 AKA(Authentication and Key Agreement) 프로시저(100)를 상세히 설명하도록 한다. Now refer to FIG. 1, to be described in detail one exemplary AKA (Authentication and Key Agreement) procedure 100 using the USIM of the prior art described above. 표준 인증 프로시저들 동안에, UE(102)는 USIM(104)으로부터 IMSI(International Mobile Subscriber Identifier)를 획득한다. During the standard authentication procedure, UE (102) obtains (International Mobile Subscriber Identifier) IMSI from the USIM (104). UE는 이를 네트워크 오퍼레이터의 SN(Serving Network; 106) 또는 방문한 코어 네트워크에 전달한다. The UE this SN of the network operator; and transmits the (Serving Network 106) or a visited core network. SN은 HN(Home Network)의 AuC(108)에게 인증 요청을 포워딩한다. The SN forwards the authentication request to the AuC (108) of a HN (Home Network). HN은 수신된 IMSI를 AuC의 레지스트리와 비교하고 적절한 K를 획득한다. HN compares the received IMSI and the registry of the AuC, and obtains the appropriate K. HN은 RAND(random number)를 생성하고, 이를 알고리즘을 이용하여 K로 서명하여 XRES(expected response)를 생성한다. HN generates a (random number) and RAND, a signed them into K using an algorithm generates the (expected response) XRES. HN은 다양한 알고리즘들을 이용하여 암호화 및 무결성 보호(integrity protection)에서 사용하기 위한 CK(Cipher Key) 및 IK(Integrity Key)뿐만 아니라 AUTN(Authentication Token)를 더 생성한다. HN further generates a (Authentication Token) AUTN as well as CK (Cipher Key) and IK (Integrity Key) for use in the encryption and integrity protection (integrity protection) using a variety of algorithms. HN은 RAND, XRES, CK 및 AUTN으로 이루어진 인증 벡터를 SN으로 전송한다. HN sends an authentication vector comprising RAND, XRES, CK and AUTN to the SN. SN은 인증 벡터를 일 회의 인증 프로세스에서만 사용하도록 저장한다. SN stores the authentication vector to use only one meeting the certification process. SN은 RAND 및 AUTN을 UE로 전달한다. SN forwards the RAND and AUTN to the UE.
UE(102)가 RAND 및 AUTN을 수신하고 나면, USIM(104)은 수신된 AUTN이 유효한지 검증한다. After the UE (102) receiving the RAND and AUTN, and USIM (104) verifies whether the received AUTN is valid. 만약 유효하다면, UE는 수신된 RAND를 사용하여, 저장된 K 및 XRES를 생성한 동일한 알고리즘을 이용하여 그 자신의 응답(RES)을 계산한다. If it is valid, the UE using the received RAND, using the same algorithm that produced the stored XRES K and calculates its own response (RES). UE는 RES를 SN에게 다시 전달한다. The UE re-delivery to the RES SN. SN(106)은 XRES를 수신된 RES와 비교하고, 만약 이들이 매치되면, SN은 UE가 오퍼레이터의 무선 네트워크 서비스들을 사용하는 것을 인증한다. SN (106) compares the received RES to XRES and if they match, SN authenticates the UE to use the wireless network service operator.
본 발명의 예시적인 실시예의 컨텍스트에서는, 종래의 기술에서와 같이 물리적인 UICC를 사용하는 대신에, UICC는 UE의 보안 요소(예를 들어, 보안 마이크로프로세서 또는 저장 디바이스) 내에 포함되는, 예를 들어, 소프트웨어 애플리케이션과 같은 가상 또는 전자 엔터티(이하에서는, eUICC(Electronic Universal Integrated Circuit Card)로서 참조됨)로서 에뮬레이트된다. In an exemplary embodiment of the context of the present invention, for instead of using a physical UICC, as in the prior art, UICC is included in the secure element of the UE (e.g., security microprocessor or a storage device), for example, , virtual or electronic entity such as a software application is emulated as a (hereinafter, referred as eUICC (electronic Universal Integrated Circuit Card)). eUICC는 이하에서 eSIM(Electronic Subscriber Identity Modules)으로서 참조되는 복수의 USIM을 저장하고 관리할 수 있다. eUICC may hereinafter store and manage multiple USIM referenced as (Electronic Subscriber Identity Modules) eSIM. 각각의 eSIM은 통상적인 USIM과 동일한 데이터를 포함한다. ESIM each include the same data as conventional USIM. eUICC는 eSIM의 ICC-ID에 기초하여 eSIM을 선택한다. eUICC selects eSIM on the basis of the ICC-ID of eSIM. eUICC가 원하는 eSIM(들)을 선택하고 나면, UE는 인증 프로시저를 시작하여 eSIM의 대응하는 네트워크 오퍼레이터로부터 무선 네트워크 서비스들을 획득할 수 있다. After eUICC selects eSIM (s) desired, UE can start the authentication procedure to obtain wireless network service from the network operator corresponding to the eSIM.
도 2는 본 발명에 따른 eSIM 데이터를 보안 전송하는 하나의 예시적인 실시예(200)의 프로세스도이다. Figure 2 is a process diagram of one exemplary embodiment 200 for secure transport to eSIM data according to the present invention. 사용자는 로컬 캐리어에 대해 인증된 소매 엔터티(authorized retail entity)로부터 무선 디바이스를 구매하고, 무선 디아비스의 eUICC는 액세스 모듈에 의해 프리 로딩(pre-load)된다. The user purchases a wireless device from a retail entity (authorized retail entity) authentication for the local carrier and, eUICC wireless dia services are pre-loaded (pre-load) by the access module. 예를 들어, 신뢰된 통신들을 구축하기 위한 예시적인 장치들 및 방법들을 개시하고 본 명세서에서 이전에 참조로 포함된, 공유되고 동시 계류 중인 미국 특허 출원 번호 제13/080,521호(2011년 4월 5일에 출원되고, 발명의 명칭이 "METHODS AND APPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROL CLIENTS"임)를 참조한다. For example, the disclosed exemplary apparatus and methods for establishing a trusted communication and incorporated by reference earlier herein, that is shared and co-pending U.S. Patent Application Serial No. 13/080 521 No. (April 2011 5 and filed on one, reference is made to the title of the invention "METHODS aND APPARATUS fOR STORAGE aND EXECUTION oF ACCESS CONTROL CLIENTS" Im).
액세스 모듈의 제한된 기능은 로컬 캐리어 네트워크의 미리 정의된 데이터 포털과의 데이터 접속들을 구축하고, 업데이트 포털로부터 소프트웨어 패키지들을 다운로드하고, 수신된 패키지들을 어셈블한다. Limited functionality of the access module to build a data connection with a predefined data portal of the local carrier network and downloaded the software update package from the portal, and assembles the received package. 이들 패키지들은 운영 체제 컴포넌트들, 액세스 제어 클라이언트들, 사용자 계정 데이터 등을 전체적으로 또는 부분적으로 포함할 수 있다. These packages can include the operating system components, access control client, user account data, etc., in whole or in part. 이하의 예에서, 사용자는 새로운 eSIM을 자신의 디바이스에 전자적으로 다운로드하여, 임의의 물리적인 컴포넌트 소유 요청들을 제거한다. In the following example, the user may electronically download a new eSIM on his device, it eliminates any physical component of ownership request. eSIM이 사용자를 인증하고 난 후, 네트워크는 사용자에의 액세스를 허용하며, 네트워크 액세스는 휴대전화 호출들을 발신하고/수신하는 것, 인터넷을 브라우징하는 것, 네트워크를 통해 오디오 가상 컨텐츠에 액세스하는 것과 같은 최종 사용자 동작들을 허용한다. eSIM after I authenticate the user, the network allows access to the user network access to calling and / receive phone calls, to browse the Internet, such as access to audio virtual content over a network allowing the end-user action.
방법(200)의 단계(202)에서, 무선 디바이스는 이동 디바이스의 eUICC 보안 요소와 로컬 캐리어 업데이트 포털 간의 인증된 데이터 세션을 구축한다. In step 202 of method 200, the wireless device establishes a data session between the authentication eUICC security element with a local carrier update portal of a mobile device. 세션 인증은 eUICC 모듈 식별 데이터에 기초한다. Session authentication is based on eUICC module identification data. eUICC 모듈 식별 데이터는 eUICC에 특정한 기존의 키를 참조하지만, 본 명세서가 주어졌을 때 당업자들에 의해 인식되는 다수의 다른 접근 방식들 또한 사용될 수 있다. eUICC module identification data refers to an existing key specific to eUICC but the time where the context is given a number of different approaches will be appreciated by those skilled in the art method may also be used. 여기서 상세히 설명되는 바와 같이, eUICC는 하나의 변형에서 공용키/개인키 및 인증 기관(authenticating authority)(예를 들어, 그 담당자(Assignee))에 의한 인증서에 의해 "버닝"되거나 하드코딩된 액세스 모듈을 포함한다. As will be described in detail here, eUICC is in one variant a public key / private key and a certification authority (authenticating authority) (for example, the representative (Assignee)) "burned" by the certificate by, or hard-coded access module It includes. 공용키 및 보증 인증서(endorsement certificate)가 로컬 캐리어 업데이트 포털에 제공된다. The public key certificate and guarantee (endorsement certificate) is provided to the local carrier update portal. 로컬 캐리어 업데이트 포털은 보증 인증서를 검증한다(예를 들어, 인증서를 발행한 인증 기관에 의한 검증). The local carrier update portal validates the warranty certificate (for example, verification by a certification authority that issued the certificate). 보증 인증서가 유효하면, 로컬 캐리어 업데이트 포털은 벤더 인증서 및 세션키를 이동 디바이스로 전송하며, 여기서 벤더 인증서 및 세션키는 이동 디바이스의 공용키에 의해 더 암호화된다. If the warranty certificate is valid, the local carrier update portal transmits the vendor certificate and the session key to the mobile device, wherein the vendor certificate and the session key is further encrypted by the public key of the mobile device. 이에 응답하여, eUICC는 벤더의 공용키에 의해 벤더 인증서를 암호해독하고, 그 신뢰성을 검증한다. In response, the vendor eUICC decrypts the certificate by the public key of the vendor, and verify the reliability. 단, 벤더의 공용 서명키에 의하여 벤더의 인증서를 성공적으로 암호해독하는 것은 서명이 위조되지 않았다는 증거를 eUICC에게 제공하는 것임을 유의하도록 한다. However, it is signed by the public key of the vendor to successfully decrypted by the certificate of the vendor should be noted that the evidence provided by the signature was not forged to eUICC. 이동 디바이스는 벤더 인증서 및 세션키를 그 개인키에 의해 암호해독한다. The mobile device is decrypted by the vendor's certificate and the session key to the private key. 만약 벤더 인증서가 유효하면, 이동 디바이스는 세션키를 허용한다. If the vendor's certificate is valid, the mobile device allows the session key.
상술한 교환이 성공적으로 완료되는 것은 이동 디바이스 및 로컬 캐리어 업데이트 포털이 모두 합법적이고 이제는 공유된 세션키를 가지고 있다는 것을 보장한다. It is above exchange is successfully completed, both the mobile device and the local carrier update portal legally and to ensure that they have a shared session key now. 공유된 세션키는 이동 디바이스와 로컬 캐리어 업데이트 포털 간의 보안 세션을 행하는 데에 사용된다. Shared session key is used for performing a secure session between the mobile device and the local carrier update portal.
다시 도 2를 참조하면, 단계(204)에서, 사용자(또는 디바이스 관리 엔터티)에게 하나 이상의 업데이트 옵션이 제시된다. Referring back to Figure 2, in step 204, the user (or the device management entity) one or more updated options to be presented. 다양한 옵션들은 예를 들어, 이용가능한 데이터 계획들, 이용가능한 네트워크 캐리어 옵션들 등의 목록을 포함할 수 있다. Various options are, for example, may include a list of the available data plans, such as the available network carrier options. 단계(206)에서 사용자 선택을 수신하면, 하나 이상의 패키지가 로컬 캐리어 업데이트 포털에 의해 준비된다. Upon receiving a user selection at step 206, one or more packages are prepared by the local carrier update portal. 단계(208)에서, 패키지들은 이동 디바이스로 전송되고, 각각의 패키지는 세션키에 의해 암호화된다. In step 208, the package are transmitted to the mobile device, each package is encrypted using the session key.
하나 이상의 패키지는 예를 들어, eSIM을 포함할 수 있다. At least one package, for example, may include a eSIM. 다른 공통 패키지들은 SIM OS 또는 "공통 OS"에 필요한 추가의 피처(feature)들 또는 컴포넌트들을 포함할 수 있다. Other common package may include additional features or components (feature) needed for SIM OS or "common OS". 특히, 액세스 모듈이 로컬 캐리어 업데이트 포털과 보안 세션을 구축하기에 충분한 동안에는, SIM 동작에 필요한 다른 요소들을 제공하지 않는다. In particular, while the access module is sufficient to establish a local carrier update portal and a secure session, it does not provide other elements necessary for SIM operation. 예를 들어, 공통 OS는 파일 입력 및 출력, 파일 관리, 메모리 할당 등과 같은 서비스들을 제공한다. For example, the common OS provides services, such as file input and output, file management, and memory allocation. 공통 OS는 eUICC 소프트웨어와 결합하여 SIM 동작을 지원하기 위하여 종래 기술의 UICC에 의해 통상적으로 구현되는 서비스들을 에뮬레이트한다. Common OS emulates the services are implemented in a conventional UICC by the prior art to combine with eUICC software to support the SIM operation.
단계(210)에서, 보안 전송된 패키지들을 수신한 후, 부트스트랩 OS는 패키지들을 로딩하고 어셈블할 수 있다. In step 210, after receiving the secure transport of packages, the bootstrap OS may load the package and assembled. 일단 어셈블되고 나면, 부트스트랩 OS는 공통 OS를 실행시키고, 공통 OS는 적절한 eSIM을 로딩하고 실행시킨다. Once it is assembled, the bootstrap OS is executed and a common OS, a common OS, thereby loading the appropriate eSIM running. 단, 공통 OS는 패키지를 통해 전달되거나 또는 eUICC 내에 존재할 수 있음을 유의하도록 한다. However, the common OS should be noted that there may be present in the transfer through the package or eUICC. 게다가, 상이한 eSIM들이 상이한 공통 OS 서비스들을 요청할 수도 있음을 또한 유의하도록 한다. In addition, it also to be noted that the different eSIM may also request different services common OS. 부트스트랩 OS는 eSIM과 공통 OS가 호환가능함을 보장해야 한다. Bootstrap OS shall ensure that eSIM and common OS compatible. 호환가능성은 버전 식별자들, 신뢰된 엔터티 인증들 등에 의해 검증될 수 있다. Interchangeability can be verified by the version of the identifier, the trusted entity authentication. 예를 들어, 부트스트랩 OS는 eSIM이 현존하는 공통 OS와 사용하는 데에 허용될 수 있고 신뢰된 엔터티에 의해 서명되었다는 것을 검증할 수 있다. For example, the bootstrap OS may be acceptable for use in the common OS to eSIM the presence can be verified that the signature by a trusted entity.
예들 들어, 디바이스가 사용자에게 필요에 따라 새로운 계정 정보(예를 들어, 사용자 명, 계좌 번호, 비밀 번호 및/또는 PIN)를 프롬프트하는 것에 의해 추가적인 서비스들이 활성화된다(단계 212). For example, a new device account information necessary for users to additional services by the prompt (for example, user names, account numbers, passwords and / or PIN) is activated (step 212). 그 후, 업데이트된 이동 디바이스가 풀-피처드(full featured) eSIM을 활성화시켜서 음성 호출들을 하게 하고 사용자 데이터를 수신 및 전송하게 하는 등을 할 수 있다. Then, the updated mobile device a full-may be a voice call by activating the pitcher de (full featured) eSIM and to the like to receive and transmit user data. 다르게는, 휴대전화가 아닌 구현들에서, (예를 들어, WLAN 내에서의) 액세스 포인트 또는 게이트웨이 액세스, 브로드밴드 액세스 등과 같은 기능들이 상기한 방법론을 사용하여 인에이블될 수 있다. Alternatively, it may be enabled to implement in a non-mobile, using the above-described methods are the same as the function (e. G., Within the WLAN) access point or access gateway, the access speed.
무선 장치의 전체적인 수명 주기를 관리하기 위한 본 발명의 예시적인 실시예가 설명된다. An example illustrative embodiments of the present invention is described for managing the overall life cycle of a wireless device. 제시된 프로그래밍 방법론들은 보안 업데이트들 설치, OS 패치들 설치 및/또는 OS의 하나 이상의 양태의 완전한 대체를 지원한다. Programming methodologies are presented to support the installation of security updates, OS patches installed and / or complete substitution of one or more aspects of the OS.
한 예시적인 실시예에서, eUICC는 부트스트랩 OS 및 공통 OS를 추가로 포함한다. In an exemplary embodiment, eUICC further includes a bootstrap OS and the common OS. 간단한 부트스트랩 OS가 공통 OS, 및 그와 연관된 eSIM 및 패치들을 로딩하고 실행시킨다. The simple bootstrap OS then loading and executing eSIM patches and associated with a common OS, and the like. 운영 체제는 SIM 동작을 지원하는 데에 요구되지만, 사용자 액세스 제어 자체에 직접 관련되지는 않는다. The operating system, but required to support the SIM operation is not directly related to user access controls itself. 특히, 공통 OS는 파일 입력 및 출력, 파일 관리, 메모리 할당 등과 같은 범용화된 서비스들을 제공한다. In particular, the common OS provides the generalized service, such as file input and output, file management, and memory allocation. 극단적인 경우들에는, 휴대전화 또는 다른 장치가 완전히 새로운 부트스트랩 OS를 수신하고 어셈블하여 그 인증 알고리즘을 업데이트할 수 있다. In extreme cases, a mobile phone or other device for receiving and assembling a whole new bootstrap OS may update the authentication algorithm.
도 3은 본 발명의 실시예에 따른 운영 체제를 대체(또는 업데이트)하기 위한 예시적인 프로세스(300)를 도시한다. Figure 3 illustrates an exemplary process 300 for replacement (or update) the operating system in the embodiment; 부트스트랩 OS 업데이트를 요청하는 공통된 이유들로는 새로이 발견된 보안 구멍들, 인증 알고리즘들에 대한 개선들, 새로운 기능들 등이 있다. The common reasons include newly discovered security holes that requests a bootstrap OS update, the improved algorithm for authentication, there are new features and more. 일부 경우들에서는, 시기 적절한 보안 업데이트들을 권장하기 위하여, 캐리어들이 적정한 시간 내에 업데이트되지 않은 이동 장치들을 디스에이블시키도록 택할 수 있다. In some cases, you can choose to move the carriers as to disable non-update apparatus within a reasonable time, to encourage the timely security updates. 또한, 캐리어는 사용자가 업데이트하는 것을 권장하기 위하여 자동 관리 동작(proactive action)(예를 들어, 빈도가 증가하는 반복되는 리마인더들)을 취하거나, 또는 심지어 통지 시에, 계속된 서비스 액세스에 대해 업데이트가 완료되어야 하도록 장치를 구성할 수도 있다. Further, the carrier is self-managing behavior (proactive action) take (e.g., repeated reminder that the frequency increases), or even at the time of notification, updates for the continuing service access to encourage the user to update You can also configure the device to be completed. 또한, 어떤 실시예들에서는, 강제적인 업데이트들(즉, 사용자 동의 없이 수행되는 업데이트들)이 본 발명에 의해 고려된다. In some embodiments, the update of the forced (i.e., updating is performed without the user's agreement) are contemplated by the present invention. 운영 체제를 대체하거나 업데이트하는 다른 이유들로는 예를 들어, 소비자 기반 고려사항들, 예를 들어, 새로운 휴대전화 네트워크 서비스로의 이동, 제품 기능들의 업데이트, 새로운 휴대전화 계약의 구매 등이 있을 수 있다. The examples are other reasons to replace or update your operating system for example, can be a consumer-based considerations, for example, a new phone Go to network services, updating of product features, the new mobile phone purchase contracts.
단계(302)에서, 이동 장치는 eUICC에 특정한 기존의 키를 통해 보안 요소와 캐리어 업데이트 포털 간의 인증된 데이터 세션을 구축한다. In step 302, the mobile device through an existing key specific to eUICC establish an authenticated session between the security element and the data carrier update portal.
또한, 일부 환경들에서, 부트스트랩 OS에 대한 변경들은 예를 들어, 새로운 보안 기능 등을 인에이블시키기 위하여 공통 OS의 대응하는 부분들을 업데이트할 것을 요청할 것이다. Further, in some circumstances, changes to the bootstrap OS are, for example, to request the updating of the corresponding portion of the common OS, such as in order to enable the new security function. 따라서, 예시된 실시예의 단계(304)에서, 이동 장치는 (i) 부트스트랩 OS 부분만을 업데이트하거나, (ii) 공통 OS 부분을 업데이트하거나, 또는 (iii) 부트스트랩 OS 및 공통 OS를 업데이트할 수 있다. Thus, in the illustrated embodiment, step 304, the mobile device (i) a bootstrap OS only update portions, or (ii) the common update the OS part, or (iii) to update the bootstrap OS and the common OS have. 예를 들어, 이동 장치는 그 부트스트랩 OS를 업데이트함으로써 그 지원된 캐리어들의 리스트를 업데이트할 수 있다. For example, the mobile device may update a list of those supported by the carrier update the bootstrap OS. 마찬가지로, 이동 장치는 공통 OS 업데이트에 의해 보다 큰 eSIM 파일 구조들을 지원하기 위하여 그 내부 파일 구조를 업데이트할 수 있다. Likewise, a mobile device may update its internal file structure to support larger eSIM file structure by the common OS update. 또한, 이동 장치는 파일 구조에 대한 변경들을 더 포함하는 새로운 캐리어를 지원하기 위하여 재프로그래밍될 수 있다(부트스트랩 OS 및 공통 OS 모두가 업데이트됨). In addition, the mobile device may again be programmed to support the new carrier further contains a change to the file structure (the bootstrap OS and the common OS all updates).
부트스트랩 OS가 업데이트되면, 로컬 캐리어 업데이트 포털이 이동 장치의 부트스트랩 OS 프로파일 구성을 저장한다(단계 306). When the OS bootstrap has been updated, and the local carrier update portal stores the configuration of the OS bootstrap the mobile device profile (step 306). 부트스트랩 OS 프로파일은 네트워크 인증 구성, eSIM 관리 등을 포함하지만, 이에 제한되지 않는다. Bootstrap OS profile including network authentication, eSIM administration, but is not limited to this. 이 저장된 OS 프로파일은 나중에 공통 OS 업데이트 패키지를 구성하는 데에 사용될 수 있다(공통 OS 업데이트는 이동 장치의 구성에 특정될 수 있다). The OS stored in the profile may be used to configure the common OS update package later (common OS update may be specified in the configuration of the mobile device). 단계(308)에서, 부트스트랩 OS를 포함하는 업데이트 패키지는 후속하여 이동 장치로 다운로드되고 새로운 부트스트랩 OS로 어셈블된다. In step 308, the update package comprising the bootstrapping OS will subsequently be downloaded to the mobile device is assembled with a new bootstrap OS. 단계(310)에서, eUICC의 현존하는 부트스트랩 OS가 새로운 부트스트랩 OS에 의해 대체된다. In step 310, the presence of the OS bootstrap eUICC is replaced by a new bootstrap OS.
따라서, 공통 OS는 단계(312)들마다 다운로드될 수 있다. Therefore, the common OS can be downloaded, deulma step 312. 이동 장치, eUICC 또는 로컬 캐리어 네트워크의 특정 구현 요청사항들로 인해, 공통 OS 패키지는 단계(306)에서 이전에 저장된 OS 프로파일에 대응하여 커스터마이즈될 수 있다(단계(314)마다). A mobile device, or eUICC (per step 314) a local carrier network because of the particular implementation request, the common OS package can be customized corresponding to the OS profile previously stored at step 306. 풀-피처드 공통 OS가 이동 장치로 다운로드되고 새로운 공통 OS로 어셈블된다. Full-feature common DE OS is downloaded to the mobile device is assembled with a new common OS.
일부 경우들에서, 복수의 공통 OS는 예를 들어, 복수의 eSIM 등을 지원하도록 이동 장치 내에 저장될 수 있다. In some cases, a plurality of the common OS, for example, may be stored in the mobile device to support a plurality of eSIM like. 부트스트랩 OS는 eSIM들의 실행을 제어할 것이고, 이는 적절한 공통 OS의 선택을 포함할 수 있다. Bootstrap OS will control the execution of eSIM, which may include selection of an appropriate common OS. 일부 실시예들에서, 공통 OS 및/또는 그의 여러 컴포넌트들의 실행은 호환가능성에 의존하여 행해질 수 있다(예를 들어, 부트스트랩 OS는 공통 OS에, 공통 OS 컴포넌트는 공통 OS 컴포넌트에, 기타 등등). In some embodiments, the common OS and / or a run of the various components may be made depending on the potential compatible (e.g., the bootstrap OS is a common OS, a common OS components to the common OS components, and the like) .
이제부터 도 4를 참조하여, 휴대전화 네트워크를 통해 전자 식별 컴포넌트들을 전달하기 위한 일반화된 방법(400)의 일 실시예가 개시된다. Now refer to FIG. 4, it is disclosed one embodiment of a method 400 for transmitting the common electronic identification component via a mobile phone network. 프리 로딩된 제한된 기능 액세스 모듈을 갖는 이동 장치는 가입 계획 등의 일부로서 예를 들어, 세일, 프로모션에 의해 최종 사용자에게 배포된다. A mobile device having a pre-load a limited function access module is distributed, for example, to the end user by the sales, promotional, as part of a subscription plan. 액세스 모듈의 제한된 기능은 로컬 캐리어 네트워크와의 데이터 접속들을 구축하고, 캐리어 네트워크로부터 소프트웨어 패키지들을 다운로드하고, 수신된 패키지들을 어셈블하도록 구성된다. A limitation of the access module is configured to establish a data connection with a local carrier network, downloading software packages from the carrier network, and assembling the received package.
단계(402)에서, 이동 장치는 하나 이상의 허용가능한 캐리어 네트워크 상에서 업데이트 포털에 대한 접속을 구축한다. In step 402, the mobile device establishes a connection to a portal update on one or more acceptable carrier network. 업데이트 포털은 예를 들어, 캐리어 데이터 포털, 제3자 소프트웨어 벤더, 이동 장치 제조업자 등일 수 있다. Updating the portal, for example, data carrier portal, a third party software vendor, the mobile device may be a manufacturer. 전자 식별 컴포넌트들을 제공할 수 있는 여러 유형들의 네트워크 엔터티들은 미국 특허 출원 번호 제13/093,722호(2011년 4월 25에 출원되고, 발명의 명칭이 "APPARATUS AND METHODS FOR STORING ELECTRONIC SUBSCRIBER IDENTITY MODULES"임) 및 제13/095,716호(2011년 4월 27일에 출원되고, 발명의 명칭이 "SYSTEM FOR DISTRIBUTION OF UNIQUE SUBSCRIBER IDENTITY MODULES"임), 및 미국 가특허 출원 번호 제61/479,319호(2011년 4월 26일에 출원되고, 발명의 명칭이 "ELECTRONIC ACCESS CLIENT DISTRIBUTION APPARATUS AND METHODS"임) 및 제61/483,582호(2011년 5월 6일에 출원되고, 발명의 명칭이 "METHODS AND APPARATUS FOR PROVIDING MANAGEMENT CAPABILITIES FOR ACCESS CONTROL CLIENTS"임) 내에 개시되어 있으며, 상기한 출원들 각각은 본 명세서에서 전체적으로 참조로 포함된다. Network entities of different types that can provide electronic identification component are U.S. Patent Application Serial No. 13/093 722 number (and filed April 25, 2011, entitled & Lim "APPARATUS AND METHODS FOR STORING ELECTRONIC SUBSCRIBER IDENTITY MODULES") and 13/095 716 number (and filed April 27, 2011, the title of the invention "SYSTEM fOR DISTRIBUTION oF UNIQUE SUBSCRIBER IDENTITY MODULES" Im), and United States Patent Application Serial No. 61/479 319 No. (April, 2011 and filed on 26, the title of the invention "ELECTRONIC ACCESS CLIENT DISTRIBUTION APPARATUS aND METHODS" Im) and 61/483 582 number (and filed on May 06, 2011, the title of the invention "METHODS aND APPARATUS fOR PROVIDING MANAGEMENT CAPABILITIES is disclosed in the ACCESS CONTROL FOR CLIENTS "Im), each of the aforementioned application is hereby incorporated by reference in its entirety herein. 예를 들어, eUICC 기기 또는 eSIM 디포(depot)는 이동 장치들에 대하여 보안 접속들을 구축하여 현존하는 eSIM들을 교환하거나 수정할 수 있는 네트워크 구조들이다. For example, device or eUICC eSIM Depot (depot) are the network structure that can change or modify the existing eSIM to establish the secure connection with respect to the mobile device.
일부 실시예들에서, 프리 로딩된 제한된 기능 액세스 모듈은 복수의 우선적인(preferred) 캐리어에 대하여 스캔하도록 구성될 수 있다. In some embodiments, the pre-limited function access module loading may be configured to scan for a plurality of primary (preferred) carrier. 복수의 캐리어가 이용가능하면, 장치는 하나 이상의 캐리어 네트워크의 이용가능성을 판정하고, 이용가능한 캐리어들의 리스트로부터 선택을 행한다. When a plurality of carriers can be used, the apparatus determines the availability of more than one carrier network, and performs a selection from the list of available carriers. 일 실시예에서, 캐리어들의 리스트는 "우선적인" 캐리어들로 추가적으로 우선순위화되고, 우선적인 캐리어들은 예를 들어, 비지니스 고려사항들, 사용자 선호도들 등으로 인해 다른 캐리어들보다 우선순위화된다. In one embodiment, the list of carriers are screen further priorities in the "priority" carrier, preferred carriers are, for example, due to business considerations, the user preferences, and so on are prioritized over other carriers. 일부 실시예들에서는, 캐리어들의 리스트가 그래픽 사용자 인터페이스(GUI)를 통해 사용자에게 제시된다. In some embodiments, a list of the carrier and presented to the user through a graphical user interface (GUI).
일부 변형들에서, 캐리어는 이동 장치를 TSM(Trusted Service Manager) 포털에 연결한다. In some variations, the carrier is connected to the mobile device in (Trusted Service Manager) TSM portal. TSM은 이동 장치에 업데이트 패키지들을 전달하기 위하여 로컬 캐리어에 의해 인증되는 엔터티이다. TSM is the entity that is authorized by the local carrier in order to deliver the update package to the mobile device.
하나의 예시적인 실시예에서, 단계(402)는 장치가 작동하는 액세스 제어 클라이언트를 갖기 전에 인증된 데이터 세션을 요청한다. In one exemplary embodiment, step 402 and requests the data session authentication before they have access control to the client device is in operation. 구체적으로, 단계(402)는 장치가 유효한 eSIM을 활성화시키기 전에 수행된다. More specifically, step 402 is performed before activating the device eSIM valid. 이제부터, 본 명세서에서 이전에 포함된 공유되고 동시 계류 중인 미국 특허 출원 번호 제13/080,521호(2011년 4월 5일 출원되고, 발명의 명칭이 "METHODS AND APPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROL CLIENTS"임)에 개시된 보안 전송 방식의 일 실예를 참조하도록 한다. Now, herein previously shared and co-pending US patent application serial number contained in Article 13 / 080,521 Issue (April, 2011 and filed five days, the title of the invention "METHODS AND APPARATUS FOR STORAGE AND EXECUTION OF ACCESS CONTROL CLIENTS "Im) refer to one of a secure transmission method silye disclosed. 당업자들은 이하의 방식이 다른 유사한 방식들에 의해 대체될 수 있음을 이해할 것이다. Those skilled in the art will appreciate that the following manner can be replaced by other similar methods.
따라서, 예시적인 실시예에서, 이동 장치는 소프트웨어 엔터티, 예를 들어, eUICC의 물리적으로 보호된 보안 요소에 저장되는 암호화 공용키/개인키 쌍(예를 들어, RSA(Rivest, Shamir and Adleman) 알고리즘)에 의해 하드코딩된다. Thus, in an exemplary embodiment, the mobile device is a software entity, for example, to be stored in the secure element protect physically the eUICC encrypted public / private key pair (e.g., RSA (Rivest, Shamir and Adleman) algorithm, ) it is hard-coded by. 또한, eUICC의 신뢰성 및 개인키의 보안은 eUICC 키 쌍에 대한 "보증(endorsement)" 인증서를 발행한 신뢰된 엔터티에 의해 더욱 증명된다. In addition, the reliability and security of the private key of eUICC is further demonstrated by a trusted entity that issued the "guarantee (endorsement)" certificate for eUICC key pair. 신뢰된 엔터티의 한 예로는 예를 들어, 장치 제조업자, 네트워크 오퍼레이터 등일 수 있다. One example of a trusted entity, for example, may be a device manufacturer, network operator.
간단한 부연으로서, 공용키/개인키 쌍은 보안 개인키 및 공개된 공용키를 포함한다. A simple words, the public key / private key pair includes a private key and a public security public key. 공용키에 의해 암호화된 메시지는 적절한 개인키를 사용하여서만 암호해독될 수 있다. The messages encrypted by the public key can be decrypted only in the password using the appropriate private key. 암호화 및 암호해독에 사용된 키가 상이하면, 공용키/개인키 방식들은 "비대칭형"인 것으로 고려되며, 따라서 암호기 및 암호해독기는 동일한 키를 공유하지 않는다. If the key used for encryption and decryption different from each other, a public key / private key methods, and are considered to be the "asymmetric", thus encryptor and decryptor are not sharing the same key. 반대로, "대칭형" 키 방식들은 암호화 및 암호해독 모두에 동일한 키(또는 사소하게 변형된 키들)를 사용한다. In contrast, "symmetric" key schemes use the same key (or minor modifications to the keys) in both encryption and decryption. RSA(Rivest, Shamir and Adleman) 알고리즘은 관련된 기술들 내에서 통상적으로 사용되는 공용키/개인키 쌍 암호 기법 중 한 유형이지만, 본 발명은 RSA 알고리즘 또는 사실상의 비대칭형 기술들에 제한되지 않는 방식으로 됨을 인식할 것이다. Although RSA (Rivest, Shamir and Adleman) algorithm is one of the conventional public key / private key pair cryptography is used as in the related art type, in such a way the invention is not limited to the RSA algorithm or substantially asymmetric technique It will be recognized.
보증키(endorsement key) 쌍들은 비대칭형이기 때문에, 공용키들은 개인키들의 무결성을 훼손시키지 않고 배포될 수 있다. Since the warranty key (endorsement key) pairs are asymmetric, public key can be distributed without compromising the integrity of the private keys. 따라서, 보증키 및 인증서는 이전에 알려지지 않은 당사자들(예를 들어, 이동 장치 및 로컬 캐리어 업데이트 포털) 간의 통신을 보호하고 검증하는 데에 사용될 수 있다. Therefore, the guarantee certificate and keys may be used to secure communications between the parties are not known to previously (e.g., the mobile device and the local carrier update portal) and verified.
상술한 교환이 성공적으로 완료되는 것(예를 들어, 이동 장치 및 로컬 캐리어 업데이트 포털의 상호 검증)은 이동 장치 및 로컬 캐리어 업데이트 포털이 합법적이고 이제는 공유된 세션키를 가지고 있다는 것을 보장한다. The above will be exchanged successfully completed (for example, a mobile device and cross-validation of the local carrier update portal) ensures that the mobile device and the local carrier update portal legitimate and have a shared session key now. 공유된 세션키는 이동 장치와 로컬 캐리어 업데이트 포털 간의 보안 세션을 수행하는 데에 사용된다. A shared session key is used to perform a secure session between the mobile device and the local carrier update portal.
다시 도 4를 참조하면, 단계 404에서, 이동 장치는 하나 이상의 컴포넌트를 요청하거나, 또는 하나 이상의 컴포넌트를 다운로드하라고 지시받는다. Referring again to Figure 4, in step 404, the mobile device receives a request indicating to one or more components, or to download one or more components. 일 실시예에서, 여러 컴포넌트들은 필요한 다운로드 사이즈를 최소화하기 위하여 이동 장치로 프리 로딩될 수 있다. In one embodiment, multiple components may be pre-loaded onto the mobile device in order to minimize the size required to download. 예를 들어, 예시적인 일 실시예에서, (상이한 모든 OS 및 eSIM에 걸쳐 공통인 그것들의 컴포넌트들을 포함하는) 일반적으로 사용되는, 큰 사이즈의 부분들은 제조 중에 이동 디바이스에 프리 로드된다; For example, in an exemplary embodiment, the portion of the general, large size used (including those of common components throughout all of the different OS and eSIM) are pre-loaded in the mobile device during manufacturing; 프리로드된 부분은 다운로드될 필요가 없고 패키지 크기를 줄일 수 있다. The pre-loaded portion may not need to be downloaded to reduce the package size. 따라서, 이동 디바이스는 프리로드되었던 컴포넌트들을 다운로드 할 필요가 없다. Thus, the mobile device does not need to download them were pre-loaded components.
일 구체화 예에서, 업데이트 포탈은 업데이트 요청(예를 들면, eSIM 다운로드, 운영 체제 다운로드, 사용자 계정 데이터 다운로드 등), 사용자 계정 정보, 관련된 계획과 서비스, 및 식별 정보를 분석하고, 대응하여 적절한 업데이트 패키지를 생성한다. One in the shape example, updating the portal update request (for example, eSIM download, operating system download, user account data downloads, etc.), analyze the user's account information, related to plans and services, and identification information corresponding to the appropriate update packages the produce. 일부 변형에 있어서, 업데이트 요청은 업데이트 패키지를 생성하기 전에 인가되고 그리고/또는 검증된다. In some variations, the update request is approved, and / or testing prior to generating the update package.
단계 406에서, 업데이트 패키지가 준비된다. In step 406, it is ready for the update package. 일 실시예에서, 업데이트는 더 쉬운 전송을 위해 여러 패키지로 분할된다. In one embodiment, the update will be split into several packages for easier transport. 단계 408에서, 업데이트 패키지(들)은 목표에 무선으로 안전하게 전송된다. In step 408, the update package (s) are sent securely over the air to a target. 이러한 패키지들은, 전체적으로 또는 부분적으로, 운영 체제 컴포넌트들, 액세스 제어 클라이언트들, 사용자 계정 데이터 등을 포함할 수 있다. These packages may include, in whole or in part, the operating system components, access control client, the user account data. 예시적인 일 실시예에서, 이동 디바이스는 액세스 제어 클라이언트를 다운로드 및/또는 업데이트한다. In an exemplary embodiment, the mobile device has an access control client downloaded and / or updated. 일 변형에서, 액세스 제어 클라이언트는 eSIM이다. In one variation, the access control client is eSIM. eSIM의 여러가지 타입은 SIM(Subscriber Identity Module), USIM(Universal Subscriber Identity Module), RUIM(Removable User Identity Module) 등을 에뮬레이트하도록 구성되어 있다. Different types of eSIM is configured to emulate the like (Subscriber Identity Module) SIM, (Universal Subscriber Identity Module) USIM, (Removable User Identity Module) RUIM. 일부 실시예에서, 액세스 제어 클라이언트는, 예를 들어 그 전체가 참조로서 포함되며, 제목이 "POSTPONED CARRIER CONFIGURATION" 이고 공동 소유, 공동 계류된 2009년 1월 13일에 출원된 미국 특허 출원번호 제12/353,227호 내에서 기술된 지연 방식(postponed scheme)을 통해 전송시에 결정될 수 있다. In some embodiments, the access control client, for example, that are entirely incorporated by reference, titled "POSTPONED CARRIER CONFIGURATION" and U.S. Patent Application Serial No., filed on January 13, commonly owned, co-pending 2009 12th through the delay scheme (scheme postponed) technology in the / 353 227 call can be determined at the time of transmission.
다른 실시예에서, 이동 디바이스는 운영 체제(OS) 또는 OS 컴포넌트들을 다운로드 및/또는 업데이트 한다. In another embodiment, the mobile device may download and / or update the operating system (OS), or OS components. 예를 들어, 이러한 운영 체제 컴포넌트들은 공용 또는 개인 키(key), 새로운 암호화 알고리즘, 보안 액세스를 위한 업데이트 절차, 새로운 디바이스 인증서, 하나 혹은 그 이상의 다른 신뢰된 공급 업체 인증서 등을 포함할 수 있다. For example, these operating system components may include public or private key (key), a new encryption algorithm, the update procedures for secure access, new devices certificate, one or more other certificates, such as a trusted supplier. 예를 들면, 통신하는 당사자의 아이덴티티를 검증하고, 그 검증된 아이덴티티에 상응하는 액세스 레벨을 승인하는 액세스 모듈은 검증의 방법에 대한 임의의 수의 변경들 및/또는 허가될 수 있는 액세스 레벨들을 가질 수 있다는 것을 알게 된다. For example, to verify the identity of the communicating parties, and approved by the corresponding access level to the verified identity access module can have any level of access that can be changed, and / or can be permitted of the of the method of verification It can be learned that.
또 다른 변형에서, 운영 체제 컴포넌트들은 액세스 제어 동작을 지원하도록 구성되지만, 액세스 제어와는 직접적으로 연관되지 않는다. In yet another variation, the operating system components include, but configured to support access control operations, and an access control is not directly related to. 예를 들면, 보통의 OS 서비스는 파일 입력 및 출력, 파일 관리, 메모리 할당 등을 포함한다. For example, the normal OS services include such as file input and output, file management, and memory allocation.
단계 408에서, 패키지(들)을 수신하고 인증할 때, 이동 디바이스는 컴포넌트들을 어셈블링하고 업데이트한다. In step 408, upon receiving the package (s) and the authentication, the mobile device is assembled, and update the components. 이 후, 이동 디바이스는 새로이 어셈블링되고 업데이트된 액세스 제어 클라이언트로 가입자 세션(subscriber session)을 구축할 수 있고, 이 가입자 세션은 조작자의 무선 네트워크 서비스의 사용을 가능하게 한다. Thereafter, the mobile device can establish a session, a subscriber (subscriber session) to the newly assembled and the updated access control client, a subscriber session enables the use of a wireless network service of the operator. 예를 들면, 업데이트된 이동 디바이스는 음성 호출을 행하고, 사용자 데이터 등을 수신하고 전송하기 위해 업데이트된 eSIM을 활성화할 수 있다. For example, the updated mobile device may enable the updated eSIM to receive a voice call is performed, user data or the like and sent.
이제 도 5를 참조하면, 본 발명의 방법을 구현하는데 유용한 예시적인 장치(500)가 도시되었다. Referring now to Figure 5, for implementing the method of the present invention is useful exemplary apparatus 500 is shown.
도 5의 예시적인 UE 장치는 디지털 신호 프로세서, 마이크로프로세서, 필드 프로그램가능한 게이트 어레이, 또는 하나 이상의 기판상에 탑재된 복수의 프로세싱 컴포넌트들과 같은 프로세서 서브시스템(processor subsystem)(502)을 가진 무선 디바이스이다. Exemplary UE device of FIG. 5 is a wireless device with a digital signal processor, a microprocessor, a field programmable gate array, or a processor subsystem (processor subsystem) (502), such as a plurality of processing components mounted on at least one substrate to be. 프로세싱 서브시스템은 또한 내부 캐쉬 메모리를 포함할 수 있다. The processing subsystem may also include an internal cache memory. 프로세싱 서브시스템은, 예를 들어 SRAM, 플래쉬 및 SDRAM 컴포넌트들을 포함할 수 있는 메모리를 포함하는 메모리 서브시스템(504)에 연결되어 있다. The processing subsystem may, for example, connected to a memory subsystem 504 that includes a memory, which may comprise SRAM, flash and SDRAM components. 메모리 서브시스템은 당 기술 분야에서 잘 알려진 것처럼 데이터 액세스를 용이하게 하도록, 하나 이상의 DMA 타입의 하드웨어를 구현할 수 있다. The memory subsystem may, implement one or more of hardware DMA type to facilitate access to the data as is well known in the field of the art. 메모리 서브시스템은 프로세서 서브시스템에 의해서 실행 가능한 컴퓨터 실행가능 명령어들을 포함한다. The memory subsystem includes a computer-executable instructions executable by the processor subsystem.
본 발명의 예시적인 일 실시예에서, 디바이스는 하나 이상의 무선 네트워크에 접속하도록 구성된 하나 이상의 무선 인터페이스(506)를 포함할 수 있다. In an exemplary embodiment of the invention, the device may include one or more wireless interface 506 configured to connect to one or more wireless networks. 다수의 무선 인터페이스는 적절한 안테나 및 모뎀 서브시스템을 장착함으로써 GSM, CDMA, UMTS, LTE/LTE-A, WiMAX, WLAN, Bluetooth 등과 같은 상이한 무선 기술들을 지원할 수 있다. A plurality of wireless interfaces may support different radio technologies such as GSM, CDMA, UMTS, LTE / LTE-A, WiMAX, WLAN, Bluetooth equipped by appropriate antenna and modem subsystem.
사용자 인터페이스 서브시스템(508)은 키패드, 터치 스크린(예를 들면, 멀티 터치 인터페이스), LCD 디스플레이, 백라이트, 스피커 및/또는 마이크로폰을 제한 없이 포함하는 잘 알려진 임의의 수의 I/O를 포함한다. The user interface subsystem 508 may include a keypad, a touch screen (e.g., a multi-touch interface), LCD display, back light, a speaker and / or a well-known arbitrary number of I / O, including the microphone, without limitation. 그러나, 어떤 애플리케이션에서는 이들 컴포넌트들 중의 하나 이상이 제거될 수 있다는 점이 인식된다. However, in some applications, it is appreciated that one or more can be removed in these components. 예를 들면, PCMCIA 카드 타입 클라이언트 실시예들은 (그 실시예들은 그것들이 물리적으로 및/또는 전기적으로 연결되는 호스트 디바이스의 사용자 인터페이스에 피기백 방식으로 장착될 수 있기 때문에) 사용자 인터페이스가 없을 수 있다. For example, exemplary PCMCIA card type client examples (the embodiments, since they can be piggy to physically and / or user interface of a host device that is electrically connected to mounting the back way) may not have a user interface.
도시된 실시예에서, 디바이스는 eUICC 애플리케이션을 포함하고 동작시키는 보안 요소(510)를 포함한다. In the illustrated embodiment, the device comprises a security element 510 to include eUICC application and operation. eUICC는 복수의 액세스 제어 클라이언트를 저장하고 액세스할 수 있고, 액세스 제어 클라이언트는 각각의 네트워크에 사용자를 인증하도록 구성된다. eUICC stores a plurality of Access Control client and it is possible to access, access control, the client is configured to authenticate a user for each network. 보안 요소는 프로세서 서브시스템의 요청시에 메모리 서브시스템에 의해 액세스가능하다. The secure element is accessible by the memory subsystem upon request from the processor subsystem. 또한 보안 요소는 소위 "보안 마이크로프로세서(secure microprocessor)" 혹은 보안 분야에서 잘 알려진 형태의 SM을 포함할 수 있다. Further the security element may include a so-called "secure microprocessor (secure microprocessor)" or a type well known in the SM field of security.
더욱이, eUICC의 다양한 구현들은 이동 디바이스와 포탈 사이에 보안 접속을 구축하도록 구성된 액세스 모듈을 포함한다. Further, various implementations of eUICC include an access module configured to establish a secure connection between the mobile device and the portal. 몇몇의 실시예들에서, eUICC는, 기존의 eSIM의 이득 없이, 더욱이 사용자의 장비가 배치된 이후에도, 포탈에 대한 보안 접속을 구축할 수 있다. In some embodiments of, eUICC is, without the benefit of existing eSIM, Furthermore, even after the user of the equipment are arranged, it is possible to establish a secure connection to a portal. 일 변형에서, 디바이스는 임의의 단일 eSIM(및 eSIM을 발행하는 MNO)과 관련된 대칭 키(symmetric key)와 분리된 별개의 비대칭 승인 키 쌍(asymmetric endorsement key pair)을 가진다. In one variation, the device has a symmetric key (symmetric key) with a distinct asymmetric signing key pairs separated (asymmetric endorsement key pair) associated with (MNO of issuing and eSIM) any single eSIM.
다시 도 5를 참조하면, 예시적인 일 실시예에서, 액세스 모듈은 하나 또는 그 이상의 액세스 제어 클라이언트들의 사용을 위해 컴포넌트들을 수신하고 저장하는 것이 가능하다. Referring again to Figure 5, in one exemplary embodiment, the access module is capable of receiving the components for the use of one or more Access Control client and stored. 하나의 예시적 실시예에서, 보안 요소는 연관된 승인 키를 가지고 있다. In one exemplary embodiment, the security element has an associated authorization keys. 이 승인 키는 이동 디바이스와 외부 업데이트 포탈 사이의 통신을 보호하고 검증하는데 사용된다. The authorization key is used to protect the communication between the mobile device and the outer portal update and verification. 그러한 일 변형에서, 승인 키는 비대칭 공용/개인 키 쌍의 개인 키이다. In one such modification, authorization key is a private key of an asymmetric public / private key pair. 반대쪽 공용 키는 개인 키의 무결성을 손상시킴이 없이 자유롭게 분배될 수 있다. Opposite the public key may be freely distributed the integrity of the private key without compromising. 이러한 일 변형에서, 디바이스에는 공용/개인 키가 할당된다. In one such variation, the device is assigned a public / private key. 그러한 또 다른 변형에서, 디바이스는 내부적으로 공용/개인 키 쌍을 생성한다. In such a further variation, the device internally generates a public / private key pair. 대안의 변형들에서, 승인 키는 대칭 키 알고리즘에 기초한다. In an alternative variation, the authorization key is based on a symmetric key algorithm. 승인 키는 승인 키의 무결성을 보장하기 위해 주의하여 분배되어야 한다. Approved the distribution key should be careful to ensure the integrity of the authorized key.
또한, 예시적인 실시예의 다양한 구현은 동작을 위한 적어도 하나의 액세스 제어 클라이언트를 선택하기 위해 추가 구성된 부트스트랩 운영체제를 포함한다. In addition, an exemplary embodiment of various embodiments comprises a bootstrap the operating system is configured to select the at least one additional access control for a client operation. 일 변형에서, 부트스트랩 운영체제는 실행 전에 액세스 제어 클라이언트의 무결성을 검증할 수 있다. In one variation, the bootstrap operating system can verify the integrity of the access control client before execution. 더욱이, 일 실시예에서, 부트스트랩 OS는 다수의 액세스 제어 클라이언트 중 적어도 하나를, 선택적으로 저장, 선택 및 실행하도록 구성된다. Furthermore, in one embodiment, the bootstrap OS is configured at least one of a plurality of access control client, so as to selectively store, selection and execution. 특히, 본 발명의 다양한 구현예들은 다수의 eSIM을 저장하고, 현재의 네트워크 캐리어와의 동작을 위해 eSIM을 선택적으로 활성화하도록 구성된다. In particular, various embodiments of the present invention are stored in a plurality of eSIM, and configured to selectively activate the eSIM for operation with a carrier current network.
셀룰러 디바이스에 전자 식별 컴포넌트들을 전달하기 위한 앞서 말한 방법들과 장치가 셀룰러 네트워크를 통해 도시되었지만, 다른 분배 방식들이 마찬가지로 대체될 수 있다는 것은, 당업자들에 의해, 쉽게 이해된다. The foregoing method for delivering electronic components identified in the cellular devices and devices that have been shown over the cellular network, it is understood that other distribution methods may be substituted similarly, are, readily understood by those skilled in the art. 예를 들면, 다른 변형에서, 전자 식별 컴포넌트들은 근거리 통신네트워크 혹은 개인 영역 통신네트워크를 통해 분배될 수 있다. For example, in another variation, the electronic identification components may be distributed via a local area network or a personal area network communications.
본 발명의 특정 양태가 방법의 단계들의 특정 시퀀스에 의하여 설명되었지만, 이런 설명들은 단지 본 발명의 광범위한 방법들을 예시하는 것이며, 특정한 애플리케이션에 의해 요구되는대로 수정될 수 있다는 것을 인지할 수 있다. Although a particular embodiment of the invention explained with reference to a particular sequence of steps of a method, these descriptions can be appreciated that only intended to illustrate the wide range of the method of the present invention, can be modified as required by the particular application. 특정 단계들은 특정 환경에서 불필요하게 또는 선택적으로 재현될 수 있다. Certain steps may be repeated as necessary to selectively or in a particular environment. 추가적으로, 특정 단계들 또는 기능성은 개시된 실시예들 또는 두개 이상의 치환된 단계의 성능 순서에 추가될 수 있다. Additionally, certain steps or functionality may be added to the disclosed embodiments, or the order of performance of two or more substituted stage. 그러한 모든 변형들은 본 명세서에 개시되고 청구되는 발명내에 포함되는 것으로 고려된다. All such modifications are considered to be included within the invention disclosed and claimed herein.
전술한 상세한 설명이 다양한 실시예들에 적용된 것과 같이 본 발명의 신규한 특징들을 보여주고, 설명하고, 알려주는 한편, 본 발명으로부터 벗어나지 않고, 이 분야의 숙련자들에 의해, 도시된 디바이스 또는 프로세스의 양식 및 세부사항들에 다양한 생략, 대체 및 변경을 행할 수 있음을 이해할 수 있을 것이다. It shows the novel features of the present invention as the foregoing description is applied to various embodiments, instructions, and informing the other hand, without departing from the invention, by those skilled in the art, the illustrated device or process in form and detail it will be appreciated that can perform various omissions, substitutions and changes. 전술한 설명은 본 발명의 수행에 대해 현시점에 고려되는 최선의 모드이다. The foregoing description is of the best mode contemplated at the present time for the practice of the invention. 이 설명은 절대 제한적인 것을 의미하는 것이 아니며, 오히려 본 발명의 일반적인 원칙의 예시로서 채택되어야 한다. This description is not intended to mean of the absolute limit, but rather should be taken as illustrative of the general principles of the invention. 본 발명의 범위는 청구항을 참조하여 결정되어야 한다. The scope of the invention should be determined with reference to the claims.
를 수행하도록 구성되는 적어도 하나의 프로세서를 포함하는 방법. The method including at least one processor configured to perform.
상기 인증된 데이터 세션은 상기 네트워크와 수신자 디바이스 간의 상호 검증을 포함하는 방법. The said authentication data session comprises a cross-validation between the network and the receiver device.
상기 상호 검증은 암호 키 프로토콜을 포함하는 방법. The cross-validation method including the cipher key protocol.
상기 암호 키 프로토콜은 하나 이상의 비대칭 RSA(Rivest Shamir and Adelman) 공용 및 개인 키들에 기초하는 방법. The encryption key protocol is one or more asymmetric RSA (Rivest Shamir and Adelman) method that is based on public and private keys.
상기 제2 세트의 액세스 권한은 하나 이상의 고객 서비스를 가능하게 하는 방법. A method that can be one or more customer service access rights of the second set.
상기 네트워크는 무선 네트워크를 포함하고, 상기 하나 이상의 고객 서비스는 음성 호출을 발신 또는 수신하는 것을 포함하는 방법. Wherein the network comprises in that it comprises a wireless network, the sending or receiving at least one customer service voice calls.
상기 하나 이상의 고객 서비스는 상기 네트워크에 액세스하는 것을 포함하는 방법. The one or more customer service method comprising accessing the network.
상기 하나 이상의 고객 서비스는 미디어 파일에 액세스하는 것을 포함하는 방법. Which comprises at least one customer service, access to the media files.
상기 제1 세트의 액세스 권한은 고객 서비스에 대해 이용가능하게 되어 있지 않은 방법. Access to the first set of methods is not made available for customer service.
상기 하나 이상의 업데이트 패키지는 액세스 제어 클라이언트와 동작하도록 구성되고, 상기 액세스 제어 클라이언트는 제2 세트의 액세스 권한을 갖는 방법. How to maintain access of said at least one update package is configured to operate and control client access, the Access Control client second set.
상기 네트워크는 무선 네트워크를 포함하고, 상기 인증된 데이터 세션은 상기 무선 네트워크와 상기 디바이스 간의 상호 검증을 포함하는 방법. It comprises a cross-validation between the wireless network and the device, wherein the network comprises a wireless network, wherein the authentication data is a session.
상기 제1 세트의 액세스 권한은 실질적으로 업데이트 패키지들을 교환하는 것에 제한되어 있는 방법. Access to the first set of method that is substantially limited to the exchange of the update package.
상기 제2 세트의 액세스 권한은 하나 이상의 가입자 세션을 인에이블하는 방법. Method that enables one or more subscriber access session in the second set.
상기 제1 세트의 액세스 권한은 상기 제2 세트의 액세스 권한의 서브세트인 방법. Access of the first set is a subset of the access method of the second set.
상기 제2 세트의 액세스 권한은 하나 이상의 사용자 선택에 기초하여 선택되는 방법. How the access rights of the second set is selected based on one or more user selected.
상기 업데이트 요청은 상기 하나 이상의 사용자 선택을 포함하는 방법. The update request comprising the at least one user selection.
하나 이상의 업데이트 옵션을 상기 디바이스에 제시하는 단계를 더 포함하는 방법. One or more optional update method further comprises the step of presenting to the device.
상기 제2 세트의 액세스 권한은 상기 무선 장치가 상기 가입자 세션을 통하여 상기 네트워크와 음성 및/또는 데이터 서비스를 수행하는 것을 허용하도록 구성되는, 무선 장치. Access to the second set of the wireless device, which is configured to allow performing the network and voice and / or data service to the wireless device through the access session.
상기 무선 장치는 이동 디바이스를 포함하며, 상기 액세스 제어 클라이언트는 eSIM(electronic Subscriber Identity Module)을 포함하는 무선 장치. Wireless devices that the wireless device comprises a mobile device, the access control client comprises an (electronic Subscriber Identity Module) eSIM.
상기 생성된 업데이트 패키지는 액세스 제어 클라이언트를 제2 세트의 액세스 권한으로 인에이블하도록 구성되고, 상기 제2 세트의 액세스 권한은 상기 하나 이상의 무선 디바이스 중 하나의 무선 디바이스가 가입자 세션을 시작하기 위하여 상기 액세스 제어 클라이언트와 연관된 네트워크에 인증하는 것을 허용하도록 구성되는, 네트워크 장치. The generated update package the access to and configure access control client to enable the access of the second set, starting the first one of the wireless device of the one or more wireless devices access to the second set of subscriber session It is configured to permit the authenticated to the network associated with a control client, a network device.
WO2006032993A2 (en) 2004-09-23 2006-03-30 Axalto S.A System and method for communication with universal integrated circuit cards in mobile devices using internet protocols. | 2019-04-20T23:37:59Z | https://patents.google.com/patent/KR101347527B1/en |
From Latin intuitio = act of contemplating, fr. intueri = to look at, contemplate, fr. in-+ tueri = to look at, look after (protection - tuitio ).
intuition as as immediate (= not preceded by inference) knowledge of truth of a proposition.
mystical or inexpressible intuitions (as Bergon's duration, Fichte's Transcendental Ego, the mystic's intuition of God).
- faculty theory (two intuitive faculties: sensory and nonsensory intuition = our knowledge of the particular)(comp. Descartes's extreme rationalism only recognized the nonsensory faculty).
- linguistic theory: process of acquiring knowledge is identical with the process of learning the conventions of one's language. The use of language is a necessary condition of the possession of any piece of knowledge.
- behaviorist analysis: we acquire intuitive knowledge simply by reflecting upon our own linguistic behavior (psychological conditioning).
- unconscious inference: nonintuitive, noninferential knowledge. The knower is not aware of having performed the appropriate inference.
- intuitive acquaintance: a person is said to have intuitive acquaintance with a concept if he is able to understand a large range of propositions that employ a term signifying this concept and is unable to explain the significance of this term.
- nonpropositional knowledge: Kant defined intuition as knowledge that is in immediate relation to objects (Critique of Pure Reason, A19-B34, A320-B377). By "immediate" he here meant "without the mediation of concepts". The knowledge gained in sense perception is expressed by judgments concerning the objects sensed but exists prior to the formation of these judgments. (see Russell: knowledge by acquaintance and knowledge by description).
We have an intuition of a certain object O even though we do not know the truth of any proposition of the form "O is Q". Conceptual thought (or language) is inadequate to capture the essence of X (comp. Bergson).
- intuition of the inexpressible: language is inadequate to express one's intuitive knowledge of reality.
The problem of justification of private experience. (Thomists' intuition of Being, Bergson's intuition of duration).
The medievals used "intuitive cognition" as we would use "sensory intuition" to refer to knowledge about objects present to the senses. The term was opposed to "abstractive cognition", which included memory and imagination.
They also used "intuition" to refer to a vision of God.
Descartes, Spinoza (Ethics II, Prop. 40, Note 2), and Locke used the term "intuition" as we would use "nonsensory intuition" - to refer to our noninferential knowledge of, for instance, mathematical axioms and analytic truths, and of the validity of valid inferences.
Since Kant "intuition" has been nonpropositional perceptual knowledge of a particular and the propositional knowledge derived from this nonpropositional knowledge.
nonrational(or suprarational) cognition: Schelling evolved an elaborate system in which intuition of a mystical or quasi-religious character was accorded a central place and was held to provide access to the ultimate nature of reality. "The nature of the Absolute itself, which as ideal is also immediately real, cannot be known through explanations, but only through intuition" (see Philsophie und Religion ).
See Bergson's distinction between intellect and intuition.
Generally a direct relation between the mind and some object, analogous to what common sense thinks is the relation between us and something we see unambiguously in a clear light.
Bergson: contrast intuition as a means of knowing reality as it is in itself with intellect as a means by which we manipulate reality for purposes of action.
What we are said to intuit may be objects not accessible to the senses (numbers, universals, God etc.), or truths. The emphasis is on the directness of the relation, free from any influence of the environment or interpretation.
Kant: used intuition for our relation to sensible objects too, so far as this was considered as abstracted from anything contributed by the mind.
Russell: Kant's use of intuition has something in common with Russell's acquaintance.
Intuition of truths may take the form of knowledge which we cannot account for, simply because we are unconscious of the reasons which led us to it (the intuition attributed to women and bank managers). In the case of such "hunches" investigation will often uncover the reasons.
More philosophically important are cases where, allegedly, there are no reasons to be uncovered, and no means of checking the truth of apparent intuitions, except by their coherence with further intuitions.
Intuitions of this kind have been important especially in philosophy of mathematics (intuitionism) and ethics, and also in logic and metaphysics.
b) that it is a response to subtle cues and relationships apprehended implicitly, unconsciously.
The former borders on the unscientific and is not recommended, although it is certainly common enough in the nontechnical literature; the latter hints at a number of difficult but fascinating problems in the study of human behavior in the presence of complex situations.
Jung: intuitive type = one of Jung's hypothesized personality types.
Feeling and thinking were considered rational, sensing and intuiting irrational. All persons were assumed to possess all four functions, the typing was a reflection of which style dominated in the individual's overall makeup.
Originally an alleged direct relation, analogous to visual seeing, between the mind and something abstract and so not accessible to the senses. What are intuited (which can be derivatively called 'intuitions') may be abstract objects, like numbers or properties, or certain truths regarded as not accessible to investigation through the senses or calculation; the mere short-circuiting of such processes in 'bank manager's intuition' would not count as intuition for philosophy.
Kant talks of our intuiting space and time, in a way which is direct and entirely free from any mediation by the intellect - but this must be distinguished from an alleged pure reception of 'raw data' from the senses; the intuiting is presupposed by , and so cannot depend upon, sensory experience.
Intuitions or alleged intuitions have been important in logic, metaphysics, and ethics, as well as in epistemology. Recently, however, the term 'intuition' has been used for pre-philosophical thoughts or feelings, e.g. on morality, which emerge in thought experiments and are then used philosophically.
immediate knowledge of a nonpropositional object.
ineffable objects, as in Bergson's account of the inexpressible awareness of duration, or in certain religious accounts of our awareness of God.
(in ethics) The view that (at least some) moral judgments are known to be true by intuition.
The view that there are several distinct moral duties, that cannot be reduced to one basic duty, in contrast, for example, to utilitarianism. While both views can be, and are, held separately, they often go together.
that a (mathematical) statement is true only if there is a proof of it, and false only if a proof of its denial can be given.
Brouwer's idealist inclinations led him to describe mathematics as investigation of the (ideal) mathematician's "mental constructions". The view is notable for its rejection of classical (or realist) logic, in particular the law of double negation, the law of excluded middle, and classical reductio.
intuition: Anschauung ('intuition') is by origin a visual word, from anschauen ('to intuit, look, view') and schauen ('to see, view, look'). It often means a 'view' or 'conception' (hence Weltanschauung, 'world-view'). But it entered philosophical German with Eckhart for the Latin contemplatio, in the sense of the activity or result of contemplating something, especially the eternal and divine. Anschauung implies immediate, non-discursive contact with the object, and the total absorption of the subject in it.
In later philosophy, Anschauung has two broad senses: first, intellectual contemplation, e.g. of Platonic Ideas (the Greek theoria, 'contemplation, speculation'); second, sensory impression or sensation. Kant argued that all human Anschauung is sensory (sinnlich): thought requires objects, and objects can be given only by intuitions. But the understanding with its concepts can only 'think' intuitions and objects, not provide them. They can be given only by objects' affecting our senses. Kant allowed the possibility of an intellektuelle Anschauung, which supplies an object without sensory assistance. But intellectual intuition, which amounts to creating an object simply by thinking of it, is, on Kant's view, reserved for God alone.
Kant's attempt to confine Anschauung to the sensory was challenged from two directions. First, critics such as Hamann and Herder attacked his sharp separation of intuition and concepts. Goethe speaks of an 'intuition (Anschauen) of inner creative nature' which attains to the 'prototype' or the Idea (Intuitive Judgment, 1817). Such intuition apprehends a phenomenon as a whole together with the interrelations of its parts. It does not dispense with concepts, but it is contrasted with analytical conceptual thought. Second, Fichte argued that the philosopher becomes aware of the pure I by an act of intellectual intuition. Schelling adopted this idea, and when his Absolute ceased to be the I and became a neutral Identity, that too, he held, is grasped by intellectual intuition.
Sensory intuition, on Hegel's view, involves the transformation of what is sensed (das Empfundene) into an external object (Enc. III §448A.). Art presents the absolute in the Form of sensory intuition, in contrast to Conception ( Vorstellung), the form of Religion and to Thought, the form of Philosophy. In early works, especially DFS, Hegel espoused Schelling's idea of a 'transcendental' intuition that unites opposites, such as Nature and Spirit. But later he criticized intellectual intuition, because it is immediate, and, unlike conceptual cognition, does not display the logical presuppositions and structure of the object. Intuition, even of Goethe's type, though it enables us to see things as a whole, rather than piecemeal, can only be a prelude to cognition (e.g. Enc. III §449A.). Nevertheless, Hegel's logic, since it is non-empirical thought about thoughts, somewhat resembles intellectual intuition in Kant's sense. Unlike Kant, Hegel has no qualms about assimilating man to God.
intuition: Descartes' account of human knowledge is indebted to a long philosophical tradition which draws a comparison between mental cognition and ordinary ocular vision. The notion goes back as far as Plato (Republic [c. 380 BC], 514-8), and plays a prominent role in the writings of Plotinus (Enneads [c. AD 250], III, viii, 11 and V, iii, 17) and Augustine (De Trinitate [AD 400-16], XII, xv, 24). Augustine puts the matter as follows: 'The mind, when directed towards intelligible things in the natural order, according to the disposition of the creator, sees them in a certain incorporeal light which is sui generis, just as the physical eye sees nearby objects in corporeal light' (loc. cit.). This is the background which informs Descartes' use of the term 'intuition' (Latin intuitus) - the word being derived from the verb intueri, which in classical Latin means simply to look at or inspect. His claim is that the mind, when freed from interference from sensory stimuli, has the innate power to 'see', or directly apprehend, the truths which God has implanted within it. 'By intuition, I do not mean the fluctuating testimony of the senses, or the deceptive judgement of the imagination as it botches things together, but the conception of a clear and attentive mind which is so easy and distinct that there can be no room for doubt about what we are understanding. Alternatively, and this comes to the same thing, intuition is the conception of a clear and attentive mind which proceeds solely from the light of reason.... Thus everyone can mentally intuit that he exists, that he is thinking, that a triangle is bounded by just three sides and a sphere by a single surface, and the like' (AT X 368: CSM I 14). In the Regulae (Rules for the Direction of our Native Intelligence), from which this last quotation comes, intuition is put forward as the fundamental basis of all reliable knowledge; and although a finite mind will often be unable to 'see a whole series of interconnected truths at a single glance, the ideal remains that it should attempt to survey the series 'in a single and uninterrupted sweep of thought', so that the process of Deduction is reduced, as far as possible, to direct intuition.
intuition: In the language of ideas which Locke uses to characterize knowledge, we are said to have intuitive knowledge when the mind perceives the relations of two ideas immediately, without the help of other ideas (Essay, 4.2.1; cf. 4.3.2). Another formulation has the ideas themselves disclosing their agreement or disagreement (4.1.9). It is truths that we acquire in this way. Intuitive knowledge is certain; the mind has no doubts about the truths (4.2.5). In a later passage, intuition, immediate viewing. is linked with self-evidence (4.18.5). None of these terms is, it may be felt, clear or self-evident. Descartes had also identified intuition and demonstration as two sources of knowledge. He explained his use of intuition in this way: 'By "intuition" I do not mean the fluctuating testimony of the senses or the deceptive judgment of the imagination as it botches things together, but the conception of a clear and attentive mind, which is so easy and distinct that there can be no room for doubt about what we are understanding' (Rules for the Direction of the Mind, rule 3).
In his effort to explicate what he means by 'intuitive' knowledge, Locke employs a number of analogies. He also gives a variety of examples. He compares it to bright sunshine which 'forces it self immediately to be perceived' (4.2.1), unlike demonstrative knowledge which requires a series of steps and which Locke compares to reflections in a series of mirrors (4.2.6). The mind is compared with the eye. A properly working eye 'will at first glimpse, without Hesitation, perceive the Words printed n this Paper, different from the Colour of the Paper' (4.2.5). Similarly for the mind, 'it will perceive the Agreement or Disagreement of those ideas that produce intuitive Knowledge.' Thus, the mind perceives that white is not black; that a circle is not a triangle (4.2.1); that 'the Ideas of an obtuse, and an acute angled Triangle, both drawn from equal bases', are different (4.3.3); that certain numbers are equal or proportional (4.3.19); that the arc of a circle is less than the whole circle (4.17.14), that non-entity is incapable of producing anything (4.10.3). We also have an intuitive knowledge of our own existence (4.9.3). Another example is 'that the Idea we receive from an external Object is in our Minds' (4.2.14).
Intuition [Anschauung]: In the Aristotelian tradition there was considerable perplexity concerning the relationship between Aristotle's account of intuitive and demonstrative knowledge in the Posterior Analytics and the account of intelligible and sensible perception (noesis and aisthesis) in De anima. In the Posterior Analytics Aristotle claims that the 'primary premises' of scientific knowledge are apprehended intuitively, and that intuition is the 'originative source of scientific knowledge' (Aristotle, 1941, 100b). Intuitive apprehension is thus immediate as opposed to the mediated, discursive knowledge of scientific demonstration. According to De anima, knowledge arises out of the abstraction of noeta from aistheta, but with the proviso that the sensible and intelligible elements thought separately do not exist separately, or in Aristotle's words, 'that the mind which is actively thinking is the objects which it thinks' (Aristotle, 1941, 431b, 18).
The perplexity facing the tradition was whether to unite these two accounts of knowledge, and if so, in what way. Apart from denying any relationship between them, there were basically three available options. One was to emphasize the Platonic elements in Aristotle, and to identify immediate intuitive knowledge with the noeta; another was to identify intuitive knowledge with sense perception or aistheta; while a third was to postulate a group of objects occupying an intermediate position between noeta and aistheta (see Wolfson, 1962, Vol. II. p. 156). In formal terms, Kant's doctrine of intuition adumbrated in ID and developed in CPR may be situated within the terms of the third option, but emphasizing the paradoxical character of such intermediate objects.
Prior to Kant, Descartes and Spinoza distinguished radically between intuitive and other forms of knowledge. Although Descartes makes great play in the Rules for the Direction of the Mind (1628) of 'paying no attention' to the 'way in which particular terms have of late been employed in the schools', his professedly 'new use of the term intuition.' departs little from the Aristotelian tradition. He distinguishes it from the 'testimony of the senses' and defines it as an Undoubting conception of an unclouded and attentive mind [which] springs from the light of reason alone' (Rule III). Unlike deductive knowledge it is immediate and simple, and is exemplified by the individual's 'intuition of the fact that they exist, and that they think'. Spinoza in Ethics (1677) followed Descartes in distinguishing between three forms of knowing: knowledge of opinion grounded in the senses and imagination (broadly Aristotle's aistheta), knowledge of reason grounded in common notions or concepts (noeta) and, finally, immediate, intuitive knowledge of the formal essence of the attributes of God and things in general (1985, pp. 475-8).
Both Descartes and Spinoza lean towards a Platonic view of intuitive knowledge which prefers the immediate knowledge of the intelligible realm to the mediated knowledge of the senses. Locke in An Essay Concerning Human Understanding agreed that intuitive knowledge was not only immediate, but also 'the clearest and most certain that human frailty is capable of' (Locke, 1690, p. 272). Yet for him this knowledge is not derived from the intelligible noeta, as it was with Descartes and Spinoza, but from the objects of external perception: 'there can be nothing more certain than that the idea we receive from an external object is in our minds: this is intuitive knowledge' (p. 277). This knowledge is immediate, but oriented more towards aistheta than to noeta. Leibniz, in his critique of Locke in the New Essays on Human Understanding (completed 1705 but published in 1765), attempted to reconcile and Locke by proposing intuitive truths of both fact and reason (Leibniz, 1765, pp. 361-7), but his follower and popularizer Christian Wolff confined intuitive knowledge to the direct intuition of rational perfection. This view in its turn was criticized by the heretical Wolffian A.G. Baumgarten, who argued for the intuitive knowledge of rational perfection by way of sensible perception, a form of knowledge he christened 'aesthetic'.
Kant's doctrine of intuition must be situated within the agenda established by Aristotle. He remained consistent with the Aristotelian tradition in respect of the direct, unmediated character of intuition, but established his own variant of it which refused the opposition of direct knowledge between the rationalists' noeta or the empiricists' aistheta. While Kant situates intuition at the level of sensibility or aisthesis in the 'Transcendental Aesthetic' of CPR (that is, below the understanding and the reason), he also accords it an a priori formal character, managing in this way to stress the immediate, sensible element in knowledge without being Lockean, and the a priori, formal element without being Cartesian. It was essential to establish this balance in order to satisfy one of the major conditions required 'for solution of the general problem of transcendental philosophy: how are synthetic a priori judgements possible?' (CPR B 73). Such judgements synthesize concepts with sensible intuitions which, while heterogeneous to them, nevertheless possess an a priori, intelligible character.
Most of the elements of Kant's doctrine of intuition are present in (section) 10 of ID. He begins by claiming that 'There is (for man) no intuition of what belongs to the understanding . . . thinking is only possible for us by means of universal concepts in the abstract, not by means of a singular concept in the concrete'. Here he subscribes to the orthodox distinction between the immediate knowledge of intuition, and the mediated knowledge of the understanding. The human understanding can only function 'discursively by means of general concepts', but for Kant this does not exclude the possibility of other, differently constituted, understandings and intuitions. The ones which he considers in (section) 10 are intellectual and divine intuition, both of which return in CPR. Intellectual intuition consists in a direct, intellectual knowledge of things in themselves rather than as appearances in space and time (CPR B 307) while divine intuition is productive, producing the objects which it thinks rather than being passively affected by given objects in the manner of human intuition (ibid.).
In the second sentence of (section) 10 Kant writes that 'all our intuition is bound to a certain principle of form, and it is only under- this form that anything can be apprehended by the mind immediately or as singular, and not merely conceived discursively by means of general concepts'. With this he converts intuition from an adjectival characteristic of knowledge into a faculty of knowledge. The faculty of intuition possesses a 'certain principle of form' through which the mind may directly apprehend the concrete singularity of things and not subsume them as instances of abstract and general concepts. In this sentence Kant presents the central paradox of his account of intuition: that it directly apprehends objects yet does so by means of formal principles. This quality of intuition recurs repeatedly in CPR where intuition is both the 'immediate relation' (sic) to objects and takes place 'only in so far as the object is given to us' (CPR A 20/B 34).
In the third sentence of ID (section) 10 the formal principles of intuition are revealed as space and time, which are further specified as the conditions under which something can be an object of our senses'. Although in ID Kant lists the properties space and time possess as pure intuitions - they are 'singular', neither 'innate' nor 'acquired', both the conditions of sensations and excited into action by them - he does not venture a proof of why they are the conditions for the objects of our senses. This he supplies in CPR and P by means of the analytic and synthetic methods. In the 'Transcendental Aesthetic' of CPR Kant analyzes or breaks sensibility down into its elements. He proposes first to 'isolate sensibility, by taking away from it everything which the understanding thinks through its concepts' (CPR A22/B 36). This leaves nothing 'save empirical intuition' from which is separated 'everything which belongs to sensation, so that nothing may remain save pure intuition and the mere form of appearances'. These are then found to be 'the forms of sensible intuition' namely space and time. In P Kant argues synthetically from the forms of intuition to sense objects. He argues that intuitions of present things are not possible without a 'ground of relation between my representation and the object' ((section) 9) which 'precedes all the actual impressions through which I am affected by, objects'; without the a priori forms of intuition to relate the I and its objects, there would be no experience of objects (see also CPR B 132).
In CPR Kant offers proofs for why only space and time qualify as forms of intuition. The one he seems to find most compelling holds that while all concepts except space and time presuppose 'something empirical', space and time are pure and a priori: space does not occupy space and time does not suffer alteration in time (CPR A 41/B 58). This argument also validates the transcendental status of space and time, namely that they arc conditions of spatio-temporal experience and cannot be abstracted from sensation or the nature of thinking substance. This accords with the view stated in ID (section) 1 that the forms of intuition provide 'the condition of sensitive cognition' and are prior to sensitive cognition and not derived from it. But this claim sits uneasily with the view that intuition is passive, that the 'matter of cognition' is given through the senses, and that intuition is 'only possible in so far as it is possible for something to affect our sense' (ibid.). Intuition here seems both to provide conditions for something to affect our sensibility, and to be conditioned by, something affecting it.
The paradoxical character of intuition as both condition of and conditioned by objects of sense is used in ID to prevent nonn1ena being 'conceived by means of representations drawn from sensations'. It is further employed in CPR to underpin the critique of claims that space and time are more than the forms which structure our intuition. The latter development is already implied in the distinction between representation and sensation mentioned in ID (section) 10, which anticipates the crucial critical distinction between appearance and sensation in CPR. Appearances are divided into sensation, or 'matter of appearance', and the 'form of appearance', or space and time. The latter are in a state of potentiality, or in Kant's words 'lie ready for the sensations a priori in the mind' (CPR A 20/B 34), and are activated by sensation. In this way the notion of appearance makes it possible for the forms of intuition to be regarded as potentially prior to (but in actuality posterior to) sensation or the matter of intuition. A further complexity arises here, which is that the matter of intuition which is directly intuited cannot be considered as objects in themselves, but are already constituted as appearances, since it is axiomatic for Kant That the things we intuit are not in themselves what we intuit them as being' (CPR A 42/B 59). This is again paradoxical since it requires that we consider intuition both as direct knowledge of objects, namely 'the things we intuit', and as a mediated appearance or 'what we intuit them as being' (ibid.).
When the perspective on intuition shifts from the relationship between intuition and objects of sense to that between intuition and understanding, an analogous set of paradoxes manifest themselves. It is vital for the critical project that the concepts of the understanding and the forms of intuition be generically distinguished. Intuition corresponds to the 'passive' or 'receptive' aspect of human experience and the understanding to the part played in it by the active, spontaneous synthesis of apperception. While the two must be rigorously distinguished from each other, they must also be related in synthetic a priori judgements. Kant noted this in the lapidary sentence 'Thoughts without content are empty, intuitions without concepts are blind' (CPR A 51/B 75), from which he concluded that concepts must be made sensible and intuitions intelligible without either exchanging their proper function and domain.
The results presented in the 'Transcendental Logic' of CPR show how the aistheta and the noeta of the tradition may be brought into relation without either being subordinated to the other. In this way the critical philosophy both respects the received Aristotelian distinction, while reconfiguring it in accordance with a doctrine of inuition which combines sensible and intelligible aspects.
Eine Handlungsweise der Intelligenz und deren Produkt. Als Handlungsweise bezeichnet die Intuition eine Form der direkten Erkenntnis, die durch ihre Unmittelbarkeit und ihre Plötzlichkeit charakterisiert ist. Sie beruht auf einer spontanen innerlichen Organisation, auf einer Wahrnehmung oder auf einer Vorstellung. Die Intuition kann, als "Sympathie" zum Gegenstand (H. Bergson), begrifflose Erkenntnis sein, sie kann aber auch ein schnelles analytisches Begreifen eines Bezugssystems sein, dessen tatsächliche Analyse lange diskursive Entwicklungen erforden würde (E. Brunswik).
Gegenstand der Intuition ist eine äusserliche (empirische) oder innerliche (metaph. Wesen) empfindbare Erscheing. In jedem Fall ist der Gegenstand in seiner Seinsweise dem Geiste gegenwärtig. Der Wert der Intuition besteht in ihrer Offensichtlichkeit (Evidenz).
Intuition, lat. "Anschauung", von intueri "anschauen", 1. die Anschauung im Sinne unmittelbarer ganzheitlicher Sinneswahrnhehmung im Gegensatz zu einem wandernden Beobachten oder abstrahierenden Betrachten, 2. im Gegensatz zur Reflextion die Fähigkeit, ein Ganzes mit seinen Gliedern in einem Akt einsichtig zu erfassen, das Wesen eines Gegen-standes, das Wesentliche eines Sachverhaltes, die Struktur eines Zusammenhanges, die Idee einer Sache zu durchschauen und zu überschauen.
Dazu intuitiv, durch unmittelbare Anschauung erkennbar oder erkannt; Gegensatz: diskursiv.
Die Vieldeutigkeit des Begriffs spiegelt sich in der Bedeutungsgeschichte des Wortes widerÖ Es wird gebraucht für das geistige Schauen der Ideen bei Plato, bei Descartes für die Erkenntnis einsichtiger Wahrheiten ("die intuitive Erkenntnis is das einfache, über jeden Zweifel erhabene Begreifen, das allein dem Licht der Vernunft entspringt." Reg. III).
Bei Locke heisst intuitive Erkenntnis die Einsichtigkeit der Axiome. Vielfach wird Intuition gleichbedeutend gebraucht mit "intellektueller Anschauung", z.B. bei Fichte und Schelling; nach Schopenhauer ist Intuition "lebendige Anschauung". In der neueren, bes. in der geisteswissenschaftlichen Psychologie wird die intuitive Erkenntnis der induktiv gewonnenen gegenübergestellt. Für Klages gehört die Intuition im Gegensatz zum Verstand auf die "Seelenseite", auch bei C.G.Jung wird sie vom Denken unterschieden. Eine grosse Rolle spielt sie in der Lebensphilosophie.
Intuitionismus, die Lehre, die der Intuition, dem intuitiven Denken, den Vorrang gibt vor der Reflexion, dem diskursiven Denken; in der Ethik die Lehre von der ursprünglichen Gewissheit des Unterschieds von Gut und Böse in der Vorstellung oder im Gefühl; in der Mathematik die Theorie, nach der die mathematischen Gegenstände ideal, d.h. durch reine Konstruktion des menschlichen Verstandes entstanden sind, oder in neuerer Zeit die von Brouwer aufgestellte Forderung, nur die Existenzsätze gelten zu lassen, die durch wirklich ausführbare Konstruktionen zu beweisen sind. Die Benutzung des tertium non datur wird für unendliche Mengen nicht zugelassen und auch im Falle der Widerspruchsfreiheit als sinnlos abgelehnt. Der Intuitionismus entstand als Reaktion auf die Entdeckung der Paradoxien der axiomatischen Mengenlehre.
a) die intuitive Erkenntnis steht im Gegensatz zur sog. diskursiven Erkenntnis, d.h. einer Erkenntnis, die durch Zwischenglieder, Schlussfolgerungen erreicht wird, während die intuitive Erkenntnis unmittelbar und direkt erfolgt.
b) die intuitive Erkenntnis wird durch eine eigentümliche Anwesenheit des Erkannten charakterisiert; der Abstand zwischen Erkenntnis und Erkanntem ist in der Intuition überwunden. Einige Philosophen verstehen die Rede von solcher "Anwesenheit" in einem übertragenen, andere sogar in einem buchstäblichen Sinn.
c) der intuitiven Erkenntnis wird zumeist ein besonderes Mass an Sicherheit zugesprochen (Evidenz). Abgesehen von diesen gemeinsamen Merkmalen werden Intuition innerhalb der einzelnen philos. Theorien sehr unterschiedliche Erklärungsleistungen aufgebürdet, so dass auch deren Stellung innerhalb der Theorien alles andere als einheitlich ist.
1. Intuition als sog. geistige Einsicht in das Wesen oder die Idee der Welt. Sie ist im Gegensatz zu Wahrnehmung und Verstand nicht an die sinnlich erfahrbaren Phänomene gebunden, die als mehr oder weniger zufällige Erscheinungsformen des Wesen (der Idee) gelten. Dieses Verständnis von Intuition findet sich vorallem im Platonismus. Es ist dort Teil der Lehre von den verschiedenen Erkenntnisstufen, die verschiedenen ontologischen Stufen entsprechen. Als höchste Erkenntnisform entspricht die Intuition ontologisch der Idee des Guten, dem Sein oder dem Einen. Der Neuplatoniker Plotin verdeutlicht die Intuition durch eine Analogie mit dem Sehen (sinnlichen Schauen): Wie beim Sehen ist in der Intuition das Erkannte anwesend. Allerdings handelt es sich nur um eine Analogie; denn während im Sehen der Unterschied zwischen der Erkenntnis und ihrem Gegenstand (Objekt) bestehen bleibt, wird in der Intuition dieser Unterschied gerade aufgehoben. Von der platonischen Tradition ist auch Spinozas Unterscheidung zwischen unbestimmter (vager), adäquater und intuitiver Erkenntnis beeinflusst. Dasselbe gilt für Schellings Begriff der intellektuellen Anschauung.
2. Intuition als Einsicht in das Unzusammenhängende und Einfache. Diese Bedeutung von Intuition verwendet Descartes in seiner erkenntnistheoretischen Methodik: Aufgabe der Wissenschaft ist das Analysieren eines Problems, so dass es in immer einfachere Teile zerlegt wird. Am Ende der Analyse stehen simple, selbsteinleuchtende Wahrheiten, die durch Intuition erkannt werden. Die menschliche Erkenntnis ist deswegen in solcher Intuition fundiert. Auch für Leibniz leistet die Intuition die Erkenntnis der ursprünglichen einfachen Begriffe oder einfachen Urteile, bzw. Wahrheiten, die für alle komplexen Begriffe und Urteile die Grundlage bilden. Locke zufolge beruht jede Erkenntnis auf einer Verknüpfung der sog. Ideen. Durch Intuition lassen sich nun die einfachsten Beziehungen zwischen diesen Ideen erkennen wie die von Identität und Verschiedenheit. Die Erkenntnis komplexer Ideen und der Verbindung zwischen ihnen erfordert dagegen diskursive Beweise. Entsprechend versteht Hume unter Intuition die unmittelbare Einsicht in einfache, rein logische und mathematische Axiome wie die Einsicht in die Gültigkeit des Kontradiktionsprinzips.
3. Intuition als Erfahrung des hier und jetzt Wahrgenommenen im Gegensatz zur Vernunft, die Abstraktionen benutzt. Diese Bedeutung der Intuition verwendet u.a. Schopenhauer in seiner Kritik am begrifflichen Denken. Gleichzeitig ist für ihn die direkte Einsicht, dass das Wesen des eigenen Ich und der Welt reiner Wille ist, Intuition.
4. Intuition als das in der Anschauung oder Erfahrung des direkt Gegebenen Anwesende. In diesem Sinn verwenden Husserl und andere Phänomenologen Intuition als erweiterten phänomenologischen Begriff; er ermöglicht es, von einer intuitiven Erkenntnis des Wesens oder von Wesensschau zu sprechen.
5. Intuition als Erfahrung (Einsicht in oder Erfassen) des Gegenstands (Objekt) in seiner Ganzheit - im Gegensatz zu den bloss auf diesen oder jenen Teil bezogenen Einzelerfahrungen und ihrer nachträglichen Zusammenfügung.
Intuition als methodische Erfahrung des direkt oder unmittelbar Gegebenen in seiner Ganzheit - im Gegensatz zum abstrakten, diskursiven Denken (z.B. bei Bergson).
Intuition als mehr oder weniger unbegründete Einfälle, die der Aufstellung wissenschaft. Hypothesen zugrunde liegen. Der Intuition in dieser Bedeutung, wie moderne Wissenschafts-theoretiker den Begriff verstehen, wird keine besondere Sicherheit zugeschrieben.
D.J. Shallcross, D.A. Sisk: What is Intuition?
There are some things that you just know that you know. We experience reality within our own minds; this phenomenon isn't new to humankind. In fact, our ancestors paid much more heed to the inner knowing that today we call intuition. This inner way of knowing, or intuition, is different from the knowledge gained through experience or from phenomena outside of ourselves.
In the minds of ancient people, there was a clear-cut division between the external stimulus and the internal impression. That is, knowledge that came from inside ourselves was considered of equal importance to knowledge gained through outside sources. As Nel Noddings and Paul Shore (1984) report in Awakening the Inner Eye: Intuition in Education, visions or insights among ancient people were looked upon as functions of great importance. The seer or oracle was always a prominent member of the community. Intuitive insights or experiences were regarded as sources of knowledge, as messages from the gods, or as evidence of the seer's exceptional power.
To the classical Greeks and Romans, both rational (analytical, logical reasoning) and intuitive knowledge were valid. In fact, intuition was believed to be special; it frequently superseded rational conclusions. Noddings and Shore (1984) suggest that the entire philosophical school of idealism flowing from Plato is based on the notion that intuition is a reliable source of knowledge. Idealism contends that only mental reasoning is knowable; therefore, reality is essentially spiritual or mental.
Aristotle believed that thought consists of images. images have the power to evoke emotions that reveal inner knowing. He stated that intuitive reasoning graphs the first principles. He termed intuition a leap of understanding, a grasping of a larger concept unreachable by other intellectual means, yet fundamentally an intellectual process.
Buddha taught that intuition, not reason, is the source of ultimate truth and wisdom. It follows then that, in Zen meditation, the discriminating conscious mind is quieted and the intuitive mind is liberated, as the meditator seeks truth and wisdom. In Eastern philosophy, intuition is considered a faculty of the mind which develops during the course of spiritual growth.
In the Meditation Schools of China and Japan - "Ch'an" in China, "Zen" in Japan - emphasis is placed on candid searching. Competent instruction awakens into an experience and insight that defy explanation through rational speech. To the aspiring Buddhist monks, this awakening is a revelation of their inner truth and wisdom.
For the Hindu, intuitive insights are achieved through meditation and disciplined control of the mind. Intuition usually illuminates universal cosmic issues, not concrete problems. Intuitive experience is linked closely with spirituality and aesthetics. One aim of Yoga, as practiced by the Hindu, is the systematic development of intuition. Intuition is considered a stable, reliable function of higher levels of consciousness from which a wide range of information is accessible.
- see "little things in everyday life"
Frances E. Vaughan (1979), in Awakening Intuition, provides an overview of intuition. She says that the broad range of intuitive human experience falls into four distinct levels of awareness: physical, emotional, mental and spiritual. Although these levels of experience often overlap, they are usually easy to categorize according to the level at which they are consciously perceived. Mystical experiences, for example, are intuitive experiences at the spiritual level; as such, they don't depend on sensory, emotional, or mental cues for their validity. Intuition at the physical level is associated with bodily sensations, at the emotional level with feelings, and at the mental level with images and ideas.
Intuitive experiences at the physical level produce bodily sensations similar to the "jungle awareness" that alert primitive people to possible danger. This awareness is different from instinct, which is unconscious. Jungle awareness can be experienced in a city when certain situations cause you to shiver or to have a stomachache or a headache. Such bodily responses, or cues, reveal information concerning yourself and your environment. Vaughan suggests that tuning in to what the body is telling us can help us make decisions about the situations in which we find ourselves. If, for example, a specific situation consistently makes you tense, you can choose to avoid the situation or make appropriate changes to ease the tension. Paying attention to physical intuitive cues can make a significant difference in how you relate to your environment. Make a list of physical reactions that you have experienced, while driving, or at work, for instance. Are there some that occur over and over again in similar circumstances? Are such circumstances tension producing? If so, what changes might you make to ease these situations?
On the emotional level, intuition becomes conscious through feelings. Vaughan describes the emotional level of intuition as being sensitive to other people's "vibes" (vibrations of energy), such as immediately liking or disliking someone or something with no apparent justification, or having an inexplicable and vague sense that you should be doing something. Jot down experiences where you felt sensitive to other people's vibrations of energy. If possible, check this out with the others involved as to whether or not they experienced the same thing.
Intuitive cues on the emotional level often involve relations with other people and seem to take on an almost telepathic quality. Have you ever telephoned a friend or relative who was just about to call you? (One co-author frequently experiences this with her mother who lives a few hundred miles from her.) "Woman's intuition" (discussed later at length), is on the emotional level of intuitive awareness. Traditionally, society was tolerant of women openly expressing emotions but not of men doing the same. This allowed women more freedom to experience self-awareness.
The mental level of intuitive awareness often becomes apparent through images, or through what might be called "inner vision." Because intuition on the mental level is associated with thinking (although all types of intuition are rooted in the mind), it is most often linked with problem-solving, mathematics and science (but not limited to those fields). Intuition on this level can be recognized when suddenly there is order where there had been chaos. This can occur in a flash or after long, arduous work. Western cultures tend to value the latter approach. First there occurs an exhaustive application of logic and reasoning, followed by a subsequent intuitive flash. This approach is associated with the discovery and invention involved in technological progress. Remember the times when you worked long and hard on something and the solution seemed to come to you "out of the blue?"
We leap to correct answers before there are sufficient data, we intuit, we grasp, we jump to conclusions despite the lack of convincing evidence. That we are right more often than wrong is the miracle of human intellect.
The rational part of research would, in fact, be useless if it were not complemented by the intuition that gives scientists new insights and makes them creative.
Capra speaks of "spontaneous insight" as being analogous to "getting" a joke.
We can take an intuitive leap; we can work long and hard with rational processes and then experience a solution in a flash of insight; or we can choose to "sit on it" (or sleep on it). Incubation con be a valuable asset to an intuitive process. Incubation gives the mind time to let a chaotic disarray fall into a pattern of order. Sid Parnes, a researcher and consultant in creative problem-solving, calls it "letting it happen."
When we mistrust (intuition) or let it atrophy by persisting with exclusively rational-empirical thought patterns we end up tuning in with mono to a stereo world.
The spiritual level of intuitive awareness is associated with mystical experience and, at this level, is "pure." According to Vaughan, "Pure, spiritual intuition Is distinguished from other forms by its independence from sensations, feelings, and thoughts." Spinoza, a noted philosopher defined spiritual intuition as the knowledge of God. Frances Vaughan relates, philosopher James Bergenthal equates this knowledge with man's experience of his own being and says that man knows Got through his deepest intuitions about his own nature.
In yoga, spiritual intuition is known as soul guidance. It emerges spontaneously when the mind is quiet. Spiritual intuition is the basis from which all other forms of intuition are derived. Activating spiritual intuition means focusing on the transpersonal rather than on the personal realms of intuition. The personal and the transpersonal can b. considered as two modes of knowing or as two different levels CF consciousness. In Western thinking, the personal is the ordinary waking state of consciousness in which the world is perceived objects and events existing separately in time and space. The transpersonal means "beyond the personal." In transpersonal consciousness, the underlying oneness of the universe becomes apparent, and the ordinary confines of time and space are experientially transcended. Both of these realms of human function are available to us. Reason is the mode of knowing appropriate to the personal level. Intuition is the mode of knowing appropriate to the transpersonal level. We need to accept both, expanding our understanding and experiences of consciousness to include both.
It is beneficial to examine another way of organizing how you might think about intuition. Phillip Goldberg (1983) categorizes six functional types of intuition: discovery and creativity, evaluation, operation, prediction, and illumination.
Discovery Intuition is similar to discovery in its revealing nature; but where discovery reveals singular truths, facts, or verifiable information, the creative function of intuition generates alternatives, options or possibilities. Ideas generated may be factually right or wrong, but will be more or less appropriate to the situation. Similar to a brainstorming session, creative intuition produces a quantity of ideas from which the ideal solution can be selected, while discovery intuition reproduces the single answer sought in a more factual situation, such as, "what is the structure of the DNA model?" The single "right" answer comes in a flash of knowing.
Evaluation intuition signals "yes" or "no" when one is confronted with choices. Goldberg (1983) distinguishes between rational analysis or intuition in making evaluations, using an example from Tom Duffy, a financial planner who states: " I might make contingency plans on the basis of a formal analysis of technical data, but the actual decision - to commit or hold off or abandon - is a question of timing, and for that I look to my feelings. "
At times, logic may dictate a move in one direction, but intuition urges another. A friend of ours still keeps on his dresser the ticket for an airplane trip that "something inside" told him not to take, even though it was an important business trip. The plane crashed and all its passengers were killed.
To stimulate your evaluation intuition, try this: Do a logical analysis of an upcoming event (The Super Bowl, Academy Awards). Based on your analysis, predict the outcome. Then, ignoring your rational decision, play your hunch on the outcome. Later, check out your results.
Operation intuition acts like a sense of direction, steering us this way or that. Where evaluation intuition works when there is something to evaluate, operation intuition most often precedes anything specific, kind of nudging you toward or away from a situation. The situation may be potentially dangerous or perhaps a major positive turning point in your life. This type of intuition is sometimes referred to as a lucky accident, or being in the right place at the right time, or responding to a gut feeling without much information to go on, or coincidence. Think back on your recent experiences. Is there anything that you can attribute to a lucky accident?
Prediction intuition allows us to predict what might happen in the future. We form hypotheses, we foresee future events, we forecast outcomes of situations. Predictions can be warning devices or positive feelings about future activities, or hunches that help us to organize or time these future events. For example, we might exercise extra caution in driving a car because prediction intuition may warn us of possible impending danger. Or we may feel pleasantly anticipatory toward attending an event, not knowing ahead of time that we will see someone there for whom we really care.
Illumination intuition is similar to what Frances Vaughan (1979) calls the spiritual level of intuitive awareness. It has been called, in other places, according to Goldberg (1983), samadhi, satori, nirvana, cosmic consciousness, self-realization, or union with God. Understanding illumination intuition helps us understand all forms of intuition; cultivating it simultaneously cultivates the other functional types of intuition. | 2019-04-21T20:36:28Z | https://hyponoesis.org/Glossary/Intuition/Intuition |
The Illinois House defeated a concealed weapons proposal favored by gun rights advocates Thursday night, a rejection that could spur negotiations toward finding common ground with lawmakers who want more restrictions.
The legislation represented a signature showdown in the critical gun debate that is in the spotlight this spring because a federal appeals court has set an early June deadline for Illinois to put in place a law allowing concealed weapons to be carried in public.
The proposal debated Thursday would have allowed guns on mass transit buses and trains but not in taverns, schools, casinos, stadiums, child care facilities, universities and government buildings, including courthouses, police stations and the Capitol.
Rep. Brandon Phelps, the legislature’s leading concealed carry advocate, challenged his colleagues to vote for what he viewed as reasonable parameters on where people could carry guns in public, who is allowed to carry, who decides whether a person is eligible and how much training should be required.
Thursday’s outcome represented a setback for gun-rights advocates because the vote total in support actually was less than during two previous tries. In May 2011, an earlier version also needing 71 votes to pass the House failed by a 65-32 vote. And in February, during a test vote, another version drew a 67-48 roll call.
Q: What else can you give?
Q: What happens on June 9?
Rep. Will Davis (D-Homewood) took that point a step farther, predicting the bill would worsen violent crime in the city and across the state.
“I just think this is going way too far, way too far. And I hate to say it, but I think this will actually get worse in our state before it gets better,” he said.
Nowhere has it been shown that violent crime increases after concealed carry laws are passed. I wish opponents would start arguing facts instead of emotion here. The liberals are guilty of doing precisely what they constantly accuse conservatives of doing on things like climate change.
“Chicago’s not an island. It’s only an island because it’s been a terrible, crime-ridden, gang-banging city for so long,” said state Rep. David Reis, R-Willow Hill.
The House rejected a measure that would have required the state’s pension systems to refrain from investing in gun-manufacturing companies. The bill failed 46-69.
That’s pretty much where the gun votes are right now. Both sides have enough votes to block what the other side wants. So, either we’ll get a negotiated solution, or it’ll stalemate. It’s likely that the Democratic leaders will try to ram something through that neither side will love. We’ll see.
From a pure politics perspective I wonder why the pro-gun folks want to pass anything. Aren’t they in the strongest position by simply not passing anything and running out the clock until 6/9?
Of course, that is not a meaningful policy solution– but our legislators don’t seem to care much about that anyway (on either side of the aisle).
Looks like Judge Posner will be writing our CCW law for us.
Judge Posner doesn’t have to write any CCW law. All he needs to do is issue the order invalidating current IL UUW law.
Judge Posner is one member of the appellate court. I don’t think he writes orders on his own.
Just wait ‘em out Todd.
>>>>> Aren’t they in the strongest position by simply not passing anything and running out the clock until 6/9?
Except for 200+ home rule units of government with 100+ different way of regulating carry.
If you could take a poll right now of the citizens of Watertown, Mass wonder if they would be okay with having a firearm to defend yourself and family.
Before declaring a moral victory and beginning a celebratory dance, it still worth noting that the gun control crowd cannot muster a bare majority, once again. In terms of infringing the rights of law abiding citizens to carry arms, the gun control legislators have delayed the inevitable by perhaps eight weeks. The court decision is an important card for the ISRA and the NRA.
Yesterday’s actions will have consequences in many representative districts outside of Chicago.
They can, as can you.
What kind of math are you using to come up with “bare” majority Esquire”?
It appears that we are headed towards an injunction and FOID CC.
I’m kinda surprised at yesterday’s vote results, especially after Rep. Phelps bill was amended to include more training, an increased fee, accommodations for Cook Sheriff Tom Dart, etc. As noted, these concessions didn’t get any additional votes. Perhaps the anti-gunners felt emboldened by the USSC denial of cert of the NY case.
I can see both sides digging in their heels. Rep Phelps supporters because their concessions were dismissed, and the anti-CC legislators because of the USSC denial of cert.
Should we start a countdown of the number of days to June 9?
I’m not so worried about Chicagoans not having CCW since the judge specifically mentioned Chicagoans in his decision as being the ones who would need it. I’m not so sure about people in the rest of the state though, like in the quiet suburbs.
but, in the end they can’t prevent this - they can’t kick it down the road. It must be hard to swallow. They still can wave their arms, gnash their teeth and jump up and down but it is important not to confuse activity with accomplishment.
>>>>>In terms of infringing the rights of law abiding citizens to carry arms, the gun control legislators have delayed the inevitable by perhaps eight weeks.
Well, no, in fact for most of Illinois they have sped it up.
On June 9, because of inaction, we get Court-Carry.
If the ILGA had passed HB997, it would get months to get all the ducks in a row to issue permits, then the gunners would have to sue to get them because Quinn won’t provide for enough staff at the ISP. And once permits are flowing, it would take a year to satisfy demand.
But a June 9th nullification of the existing ordinance means instant carry for everyone. And of course, it would be a misdemeanor in Chicago and Oak Park by then, without holding the local may-issue permit.
Antis seem determined to “allow constitutional carry”.
“It’s likely that the Democratic leaders will try to ram something through that neither side will love.” I don’t see much middle ground for the leaders to try to ram through. Without preemption or shall issue, the pro gunners (rightly) aren’t going to vote for it. As for mass transit and trains, the only time I ride trains is if I go to Chicago and that is certainly the place I want to have a gun the most (And please don’t start snickering-as a country boy, I don’t like big cities, period).
Bans on mass transit would be a defacto gun ban for those people who depend on it to go everywhere, including work, grocery shopping, medical needs, etc., and isn’t that what the court order is all about?
I’m generally a believer that society is better off when negotiations are tough, I’ll be happy to see this bring everyone back to the table. We’re a unique state, I think we can find a solution that works for us.
Also, today’s Trib headline specifically mentions that transit was included in the defeated cc bill. The Sun-Times is up in arms about it as is the rest o the Chi media.
Polls show massively overwhelming support for the transit carry ban.
I just don’t see it being allowed.
Non-ISRA member- “Should we start a countdown of the number of days to June 9?” I don’t belong to ISRA, but its website has a count-down clock on its home page- (a second-by-second countdown).
Just how many of those places do you think will be welcoming people with guns.
Have you ever ridden Chicago public transit at rush hour? The idea of introducing firearms to a packed, tense, often angry environment — with usually a crazy or two providing “atmosphere” — is just bizarre.
I ride Metra every day, and am a CCW advocate, but I am not convinced that allowing carry on trains is a good idea. Mostly because of the number of people packed into a train and they way they’re packed in, an accidental discharge could have enormous consequences. I haven’t managed to convince myself either way on this point.
Rich: Oops, definitely know who his daughter is, but don’t pay attention to the rest of his family. The way you see it, it may be necessary to get a bill passed, and the NRA may eventually agree, but I still think that my argument against it on constitutional grounds is still valid.
What constitutional grounds? Scalia introduced the concept of “sensitive places” and gave a laundry list of examples.
This whole thing is a fascinating train wreck, I heard the modified and moderated version got even less votes than expected, so nothing is good enough.
It looks like there was no point in Phelps trying so hard to write a middle of the road, Illinois-palatable CCW bill. He should have just brought a more extreme form and let it be amended back to where he tried to start 997 at.
I think Todd’s prediction is essentially correct.
Expect Posner and the other two to simply find the current law unenforceable.
It will leave us with no law banning conceal carry.
Springfield cannot agree on one, so locals might.
Cook County will rush through a very restrictive bill. A federal judge will like stay enforcement pending hearing. The question will be the weight, if any, the District Court gives the denial of cert in NY. Will the judge look at it as S.Ct. as approval, or just as S.Ct saying “we’ve got better things to do?” It depends on the judge.
But in any case, the judge will likely stay enforcement and it will go up. From there, it depends on the panel.
Other areas might pass their own, but I doubt we will see it widespread. Outside of Cook County, I just don’t see banning any guns as a big issue.
The words “gang-banging” and “tea-bagging” should not be in the political lexicon, but people love their sexual double entendres, so it would be hard to change.
AND IT GOT 3 fewer votes than last time.
Many N votes asked for specific additions… Yet someone whispered in their in and they still vote no.
Not compromising in good faith. Why shoudl the NRA go back to the table? we were at the table modifying this bill time and time and time again only to have games played.
Yes we only got 64 votes last night, the NY style May issue got what? 31?
We’ll run out the clock. I’ll get legal defense together for FOID carry and 1983 law suits. State is broke anyway but it can give some gunner owners fat checks after they charge UUW after June 9th.
Fine by me. You can only bend so much to the chicago reps and when they screw you after you put in the additions to get the vote how can you trust them again.
Maybe a iGOLD event in downtown Chicago after the stay is lifted…. with FOID Carry.
Could a brick have been put on the legislation to allow the AG an opportunity to appeal the 7th Circuit opinion to the USSC? By passing Phelps’ bill, would that not have made the issue moot?
@word. I love how you assume masstransit has no guns on it now… Or how in other states there are mass transit systems that you can carry on… None of the bloodbath you and so many predicts occur.
Sorry. I ride a train downtown to visit a client or a friend on a Saturday say and cant carry? nope. Screw that. I’ll carry.
you also assume that everyplace downtown goes instant gun free zone… You may be surprised. Go up to Milwaukee, tell me how many signs you see.. maybe 5-10% of the places.
Thank you for your vote yesterday on this time sensitive matter of CCW in Illinois.
I look forward to open or concealed carry of my firearm on June 9.
What anti gun folks don’t seem to want to listen to the fact that the Conceal and carry ban does not work. People are dying because of this failed law. The court recognized it does not work and you have no statistics to prove otherwise. If you do, please forward them to the AG because she obviously did not have them to support her case. I just don’t see why people are so afraid of trying something else when all the evidence shows the current law has failed.
Can the legislators get any sillier?
Or are they secret CC advocates looking for the most wide open system possible?
Would excluding carry on CTA be enough to push 997 over the top?
And Word, what Ron said - have you traveled much out of IL lately? I know that I have seen exactly two “no CCW” signs up in Cheddarstan since they passed CCW, and I can count the number of posted places I’ve seen in TX and IN on two hands.
There is no such thing as an accidental discharge - guns do not “go off” by themselves. Someone has to pull the firearm’s trigger. And how is that going to occur when the firearm is carried in a holster concealed on the person? Negligent discharges occur when the person using the firarm, not merely carrying it concealed, fails to follow basic firearm safety and handling rules.
Todd’s comments were extremely intelligent and Rich did an excellent job putting together the basics of what took place yesterday.
I would second the truth of the comments or the possibility that currently there are likely people illegally packing guns on the CTA. But given the incrediable liability problems that would be faced by an individual even if they legally discharged a a permited gun on a rapid transit train I would not recommend packing in that situation.
Honestly, somehow I am begining to think that many of the folks who want to have concealed carry weapons in urban situations have no significant assets they could lose in a litigation situation. Since the median net worth of Americans including their equity in homes is only around $77,000 they may not have a lot to lose.
Patriot, are there people dying in your town as a result of this UUW statute? If not, stop pretending to know about issues troubling Chicago. I remember in your earlier posts you saying that you do not want to come to Chicago. Unless you’re here and understand day to day life here, please do not try to tell Chicagoans how to solve our own problems.
Ive said this before - the whole concealed carry debate should not be about crime. I think the statistics show that concealed carry does not increase or decrease crime. This is an issue of what kind of society we want to live in - a society where we can freely carry guns or a society where there are limitations on guns.
Based on this whole debate, ive come to the conclusion that the best solution is probably to let the locals decide what is right for them. If people who want guns do not feel comfortable coming to Chicago without guns, they can choose not to come. In the same line, if Chicagoans do not want to go to a portion of the state with guns, that is there choice as well.
>>>>>But given the incrediable liability problems that would be faced by an individual even if they legally discharged a a permited gun on a rapid transit train I would not recommend packing in that situation.
I would not recommend actually shooting in a crowded rapid transit train NOR ANYWHERE ELSE unless it was absolutely necessary. Then the liability be damned.
>>>>>> Ok. Show me proof.
I don’t think you’re accurately positing the issue. We currently have a situation where criminals (and gang members perhaps not yet convicted of anything) can freely carry and law abiding citizens may not carry under any circumstances.
The issue we are faced with is how do we set up the necessary appropriate/responsible provisions on letting law abiding citizens also carry.
We lost yesterday. 64 votes.
We made changes to the bill in exchange for promised votes… increasing the training, limiting reciprocity, adding prohibited locations, upping the fees, etc. etc.
Those promised votes didn’t materialize.
The hard-core opponents could only muster what, 31 votes for their dream carry bill? We got 64 for a bill we weren’t at all happy with but could live with. And we got stiffed by about 8 reps.
Guess who isn’t going to be inclined to bend any further?
Nothing is good enough for some of these folks. Well, unlike dozens of times before, the clock is ticking in our favor.
Let’s see how they appreciate utterly unregulated carry come June 9th.
I’ll be carrying, but then again, I’ve got more hours of training than most cops and I paid for every bit of it. Most folks aren’t going to have all that training. But then again, folks in Indiana don’t need a lick of training to carry and they don’t seem to be appreciably smarter or more mature than Illinoisans.
I think we’ll be okay after June 9th.
But you better get used to seeing people with guns on their belts.
John Bosh seems bitter. He probably should put the gun down.
I can’t wait, it’s going to open up so many new opportunities for me to poke fun at the big tough guys that have to carry guns.
@ Small Town Liberal - a good life plan is to avoid unnecessary provocations to, or conflicts with, people weilding superior force.
I’m shocked at the notion that any law abiding citizen would use their firearm against me for teasing.
I’m talking about the guys I grew up with, I’ve been ribbing them for years, they haven’t harmed me yet.
But then again its Illinois. Good faith went out the window a long time ago.
I think thats a good argument against concealed carry. So what are you saying? Some “law abiding” citizen is going to use “superior force” against STL for making fun of him? Shows the true flaws of human beings. Generally good people can make mistakes every now and then. When you throw firearms into the mix those mistakes can become big mistakes.
Just a head’s up — you people claiming STL will get shot for teasing somebody are not exactly helping the cause.
PM31, you just made a very strong case against concealed carry.
Are you really that much of a wussy?
By the way, PM31, you also reinforced every stereotype about the inferiority complex of men who want to carry concealed weapons. I should probably send your IP address to the state police to make sure you never get a permit.
C’mon everyone, all meant in good fun. It’s Friday, let’s lighten up.
Fred - Remarkably enough, 49 other states allow carry, and I’m sure there has not been any noticeable decline I’m “teasers” there. Maybe some woopins though.
Just because you think you are right does not mean that “the other side” acquiesces. That’s the whole point of the process. You beat me in committee, I beat you on the floor, we retreat, reconsider, and (here is that pesky word) negotiate and try again.
Have you ever run a roll call? People flip on and off through the whole process, for hundreds of reasons. Expect it, don’t be alarmed when it occurs, this is the big leagues.
Please stop picking on my state. No one is stopping you from moving to Iowa or Indiana. I assume you are here because you like it here.
It’ll never come to that. Cassidy’s bill lost. Phelps’ bill lost. Phelps’ needs 71, a bill based on Phelps with certain amendments allowing home rule to add additional restrictions only needs 60.
When push comes to shove, there will be 60 votes for a CCW law. ISRA won’t be able to hold its votes to block half a loaf. Something is going to pass before the court’s deadline.
Back to the table everybody. The sides are not that far apart, despite the rhetoric on both sides.
Sorry. Maybe I am not a political animal or backstabbing j**bag that politicians are, but in my world that to me means you no longer take anything that person says as truth.
Many chalk it up to “politics” and maybe it is. But maybe that is why we are so messed up.
Eight’s a big number. Care to elaborate?
Ron, I’ve been riding Chicago public transit twice a day, five days a week, for 25 years and have seen all manner of stuff. But I’ve never seen evidence of a gun.
I’ve seen freakouts from men and women of all races and social status, though, believe me.
What’s your life experience on the matter?
That is what we were told for two days leading up to the vote. Why we gave more and more. Then this. Word is someone was walking around talking to some key votes saying “dont vote for this, we in the senate will do a different bill”.
How can we continue to negotiate in good faith. we get nothing back (including votes) for all the capitulation on item after item.
Why go back to the table when you do nothing but give?
??? Really??? miserable unemployment, unpaid bills, imploding retirement system etc..
If these is something major about it, it is a major malfunction.
me to… I rode from Narpeville to downtown the same way for 7 years. You dont see evidence of a gun? i have had mine a few times… did you see it?
Concealed carry is just that. you dont see it.
I travel almost every week now. Atlanta, Austin, Dallas, Denver, etc, etc,etc… do I ever see a gun on their streets? no do you hear of mass shootings on public transit there? errant rounds?
No, but law abiding people still get to carry their weapon for that 30 minutes they are the train or bus then spend their day wherever it is.
Just like “shootings over traffic accidents and parking spots” and “wild west blood in the streets” predictions. Mass transit stuff is another hissy fit but has no real basis in reality just unjustified fear.
Shame on any legislators who gave their word to support the bill if certain concessions were included, got the concessions, and they still voted NO or Present. That’s called bargaining in bad faith. At least George Ryan used to keep his word.
@ Small Town Liberal - with your friends, sure, you’d be fine (your original comment didn’t limit it so).
To a stranger…it would offer the opportunity for things to spiral … and end badly (I had a former school chum killed in a road rage incident that began with someone being cut off merging lanes).
And I was attempting (and apparently failing) at some light ribbing up above.
I think 47th has it right. They’ll jam thru a bill with 60 votes.
That incident, if it occurred as reported, is a negligent discharge causd by the person’s failure to follow firearm safety & handling rules. First, he should not have had it in a fanny pack, it should have been in a holster and secured with a thumb strap; second, it must have been a pretty old revolver if it discharged by being dropped on its hammer - such revolvers haven’t been manufactured for many years and the basic safety rule for those types of revolvers were to never have a round in the chamber under the hammer. So yes, I agree the person was an idiot, but the incident was not an “accident” as it was caused by his failure to follow gun safety & handling procedures - AKA negligence.
Todd and the Phelps clan aren’t babes-in-the-woods. They know how to count and they know who’s in for the all-day job.
Everybody likes a good bratwurst, but you don’t want to know how it got in the bun.
What “compromises” have the gun control advocates offered to preclude unrestricted concealed carry base on Posner’s ruling? Certainly, the NRA came to the table to try to compromise and institute a reasonable bill, as they have for the past year, but apparently there is no compromising with the gun control advocates who just reneged on their negotiations with the NRA. Were I the NRA, I’d stand pat and let the gun control advocates come to me, soon they will fully realize the corner into which they have painted themselves.
Were you being a law-abiding citizen when you were doing that?
I never make the “Wild West” analogy unless it is to point out that the plots of some of the best Westerns ever made feature local controls on firearms.
All the “OK Corral” movies (John Ford’s “She Wore a Yellow Ribbon,” best, “Tombstone”; next; “Unforgiven”; “Winchester ‘73″).
When in recent history has there been real compromise on any issue in Springfield?
More particularly, as Cincinnati notes, when have the pro-control people shown any willingness to compromise?
I expect Chicago Dems would rather blame the big mean judges than take action to get a reasonable bill.
There will not be a compromise. The court will lift the stay banning enforcement, Cook County will pass something on the New York model, and we will have more litigation.
@ word… before it was called we were talking 72 or more votes. You tell me what happened.
They wouldnt have brought it up if they had not made the adjustments and counted the votes.
Where do you get “unrestricted concealed carry” in Posner’s appellate court opinion (not his “ruling”)?
Where do you find even a suggestion of it in Heller or McDonald?
I’m confused — what “proof” is in any of those links proving that if IL had a conceal carry law, that those murders would not have happened?
The lawsuit challenged the current statute.
The 7th Circuit found the statute unconstitutional, but then stayed the ruling giving IL time to come up with a statute that could pass scrutiny.
If IL fails to do so, the easiest thing for the 7th Circuit to do would be to simply toss the statute.
Potentially they could re-write it, but I just don’t see that happening.
Just as a reminder — federal judges tend to like it when people do what the court tells them to do.
They tend to get a bit annoyed when people fail to do so.
So yeah, I could easily imagine the court just walking away leaving IL with no statute.
Second Amendment litigation in federal courts has been very sleepy since the founding.
Heller and McDonald changed that, for sure.
The federal litigation is just getting started.
The states used to be able to write their own ticket on guns.
Since the NRA challenges, the genie is out of the bottle and the federal courts will call the tune from now on.
Careful what you wish for, you might get it.
Brandon knew hours before that he would lose that vote.
Some rambling thoughts. . . .
The AG could have announced an appeal at any time. She hasn’t. by my count she has till the 23rd of May to do something. If she were to appeal, I would bet the Court would grant a stay of the 180 day deadline. Also if she intended to file and asked for an extension of time to file with a stay I would expect it would be granted.
Some wonder why we have pushed for a bill. The answer is simple. There needs to be certainty and clarity of the law for cops, prosecutors and citizens. Without it, I don’t think it does the state well.
I would disagree with the headline writers. Was this a disappointment, sure. BIG loss no. As Rich put it in the Fax today, the Speaker weighed in. That is always hard to overcome once he takes a vested interest in passing or defeating a bill. Had his thumb not been on the scales I believe a different outcome.
We didn’t want a vote this week. And proposed working on changes through next week while the House was out. But we were told otherwise, and told their would be a vote. The best legislative products don’t always get turned out in 24 hours or less.
47 your wrong on the preemption issue. We will hold the votes. We will not have a patchwork of carry laws from town to town. So Cook passes a non-carry ordinance via impossible may issue. The people on one side of Elgin are fine. The others are not. In the DuPage side of Hinsdale you’re ok walk across the street you’re not. There are more votes for preemption.
Rich – I disagree as there will be no Machin/Toomey deal. It didn’t work for the the DC crowd and I don’t see it working here.
So what’s next, having had a bit of time to think on. . . we made many concessions in Amendment 9. WE went in and essentially negotiated against ourselves. That’s over. We will now await others to bring their proposals to us for our review and approval or disapproval. They can be the ones to figure out language, they can be the ones to that and see if it meets our muster. Some of the things we agreed to, may now be off the table, if adding fees and training hours and taking certain things on good faith like course recognition, more implementation time, more time to process permits and more prohibited areas, didn’t gain votes, but had people stripped off. OK We tried. Now it is someone else’s turn. We don’t need to pass a bill. The state does. The ramifications of not doing so will be mixed. But I can imagine the rebuke from the federal bench for the thumbing of the legislative nose at the Court.
Beyond that, I will hold down a bench in the rotunda and read Capfax blog from my Ipad.
That is what I think is next.
You know that for a fact? would love to know how he knew as that is not what is being broadcast.
Well, yeah. He was asked in my presence hours before when he was calling his bill and he said why bother since it’s just gonna die anyway.
I don’t post lies, dude. And I don’t care what you read or heard elsewhere.
Things we do to keep people safe: lock down an entire city for hours.
Things we won’t do: A 5 minute background check before you buy a gun.
I have no illusions that most of Wisconsin, Texas and Indiana are different from the Loop. That’s okay — vive la difference.
People go into the Loop to work and make money, not make a statement.
You think they’re going to be packing at CME? CBOE? The banks? The private equity firms? The law firms? The office buildings? The train stations?
People are too busy to deal with that distraction. Chicago ain’t Dallas or Houston, it’s more New York or London, when it comes to business environment.
Furthermore, do you think you’re going to be able to go to the Fortune 500 campuses — McDonald’s, Motorola, Walgreen’s, Abbott, UL, Allstate — packing a gun?
No way. They don’t want that stuff. It’s business, nothing personal.
It could well be that the remedy would be to allow open carry subject to possible restrictions by all, or at least all home rule units of government. It could also be that the Attorney General could decide if an appeal is necessary and proper after such rulings. Decision from other federal districts are suggest that Illinois may be an outlier. If so, those demanding “shall issue” or nothing, could get nothing.
–Things we do to keep people safe: lock down an entire city for hours.
Anyone down on Big Government and paying their taxes right now?
How about those “extravagant pensions” for public employees? Like the ones for those who go to work in the morning not knowing if they’ll live through the day?
I thought that when McVeigh blew up all those bad public employees, and their children, there would be some shame for that attitude.
You can’t shame the Tribbies and the Civic Committee.
Accidental shooting or negligent discharge?
Who is against public safety employees. There are other pieces of Big Government, and there is certainly room for debate on the proper role of Government.
Not at all. Accident precludes negligence and is extremely rare.
That’s interesting. I could probably give you 100 cases saying that negligence REQUIRES there to be an accident.
A negligent act is the opposite of an intentional act.
And those injunctions would be against enforcement of the UUW statute’s prohibition on carrying. Leaving Illinois without any enforceable prohibition on carrying.
Negligence implies an act or failure to act by an individual. Accident is just that.
Lighting fuse on firecracker in an unsafe situation: negligence. Firecracker spontaneously combusts absent any action or failure to act on the part of an individual: accident.
Think of it this way: negligence = act of man. Accident = act of God.
Do you have any authority for that claim?
Because courts have found the opposite for a couple hundred years.
It goes to the basic coverage under a CGL policy. For there to be coverage, there needs to be an accident. If there is an accident, there is negligence. In contrast, you have breach of contract claims or intentional act claims.
Enough with the semantics argument, please. Move along.
Skeeter, you’re probably more correct than I am - I’m refering back to fuzzy memories of basic liability concepts. We underwriters really don’t worry about this stuff in day to day risk selection.
Big — I will disagree. It’s not up to the Court to write a law. It is up to them to enter and order that bars the State and its political subdivisions from enforcement of (a) (4), (a)(10) and 1.6 of the UUW/AGUUW statute. Those sections of the UUW law are unconstitutional. That’s the role of the Court.
C’mon, man. The sad and nasty story line from the right-wing is that government employees are leaches.
Like I said, I thought that should have been retired after McVeigh and OK City.
Mass transit is a difficult venue to give up. Many Chicago residents without cars rely on it to get from point A to point B within the city. They need and have a right to carry at both points but how do they do that if they rely on transit?
What you call, “Right-wing” people understand and support the role of first responders, intelligence, federal law enforcement, and the military.
Big loss huh? Bigger than Anti-NRA forces? With 31 Yea votes for HB831? Let’s look at all the pieces on the table, shall we? 64 Yea votes for HB997, vs 31 for HB831. Last and only court case that counts going in favor of carry with an opinion written specifically to allow shall issue, preempting home rule. Nothing else is guaranteed at this point. You have the possibility of the AG filing cert. Hasn’t happened. You have the possibility of SCOTUS accepting it. Hasn’t happened. You have the possibility of SCOTUS reversing the 7th’s ruling. Hasn’t happened. Yeah, I’m cryin’ over here with our BIG LOSS. | 2019-04-22T22:57:12Z | https://capitolfax.com/2013/04/19/big-nra-defeat-in-il-house/ |
Snowdon in Caernarfonshire is the highest mountain of the British Isles outside Scotland, climbing to 3,560 feet above sea level. It is the heart of the great massif called Snowdonia, which forms the major part in turn of the Snowdonia National Park.
Snowdon, despite its height, is not a difficult climb, and has been described as "probably the busiest mountain in Britain". There are however several routes to the top; the Llaberis Path taken by most visitors is an easy climb on a well worn, broad path, but others are more challenging scrambles to the top. The whole mountain is designated as a national nature reserve for its rare flora and fauna.
Snowdon boasts some of the best views in Britain, and the summit can be reached by a number of well-known paths, the most demanding of which is the Snowdon Horseshoe. The summit can also be reached on the Snowdon Mountain Railway, a rack and pinion railway opened in 1896 which carries passengers the 4.7 miles from Llanberis to the summit station. The summit also houses a visitor centre called Hafod Eryri, built in 2006 to replace one built in the 1930s.
The name Snowdon is from the Old English for "snow hill", a name appearing as Snawdun in the Anglo-Saxon Chronicle for 1095. The Welsh name, Yr Wyddfa, means "the tumulus", which may refer to the cairn thrown over the legendary giant Rhitta Gawr after his defeat by King Arthur. As well as other figures from Arthurian legend, the mountain is linked to a legendary afanc (water monster) and the Tylwyth Teg (fairies).
Snowdon stands at 3,560 feet. A 1682 survey estimated that the summit of Snowdon was at 3,720 feet above sea level; in 1773, Thomas Pennant quoted a later estimate of 3,568 feet above sea level at Caernarfon. Recent surveys give the height of the summit as 3,560 feet, making Snowdon the highest mountain in Wales, and the highest point in the British Isles outside Scotland. Snowdon is one of three mountains climbed as part of the Barmouth Three Peaks Yacht Race, and for the landlubber the National Three Peaks Challenge.
Snowdon offers some of the most extensive views in the British Isles. On exceptionally clear days, Ireland, Scotland, England, and the Isle of Man are all visible, as well as 24 counties, 29 lakes and 17 islands. The view between Snowdon and the peak of Merrick, Kirkcudbrightshire is the longest theoretical line of sight in the British Isles at 144 miles.
The unique environment of Snowdon, particularly its rare plants, have led to its designation as a national nature reserve.
In addition to plants that are widespread in Snowdonia, Snowdon is home to some plants rarely found elsewhere in Britain. The most famous of these is the "Snowdon lily", Lloydia serotina, which is also found in the Alps and in North America. It was first discovered by Edward Lhuyd in Wales, and was later named in his honour by R A Salisbury.
The rocks which today make up Snowdon and its neighbouring mountains were formed in the Ordovician era. At that time, most of modern-day Wales was near the edge of Avalonia, submerged beneath the ancient Iapetus Ocean. In the Soudleyan stage of the Caradoc age, a volcanic caldera formed, and produced ash flows of rhyolitic tuff, which formed deposits up to 1,600 feet thick. The current summit is near the northern edge of the ancient caldera; the caldera's full extent is unclear, but it extended as far as the summit of Moel Hebog in the south-west.
Snowdon and it surrounding peaks have been described as "true examples of Alpine topography". The summits of Snowdon and Garnedd Ugain are surrounded by cwms, rounded valleys scooped out by glaciation. Erosion by glaciers in adjacent cwms caused the characteristic arêtes of Crib Goch, Crib y Ddysgl and Y Lliwedd, and the pyramidal peak of Snowdon itself. Other glacial landforms that can be seen around Snowdon include roche moutonnée|roches moutonnées, glacial erratics and moraines.
The English name "Snowdon" comes from the Old English snaw dun, meaning "snow hill", as Snowdon often has a covering of snow (and this name was in use during the Mediæval Warm Period). Although the amount of snow on Snowdon in winter varies significantly, 55% less snow fell in 2004 than in 1994. The slopes of Snowdon have one of the wettest climates in Great Britain, receiving an annual average of more than 170 inches of rain and snow.
A number of lakes are found in the various cwms of the Snowdon range.
Llyn Llydaw, at 1,430 feet, 110 acres, lies in Cwm Dyli, Snowdon's eastern cwm, and is one of Snowdonia's deepest lakes, at up to 190 feet deep. Various explanations of its name have been put forward, including lludw ("ash"), from ashen deposits along the shore, to Llydaw ("Brittany"). It contains evidence of a crannog settlement, and was the location of a 10 ft x 2 ft dugout canoe described in the Cambrian Journal in 1862. The lake is significantly coloured by washings from the copper mines nearby, and is used by the Cwm Dyli hydroelectric power station, which opened in 1906. The lake is crossed by a causeway, built in 1853 and raised in the 20th century to prevent the causeway from flooding frequently.
Glaslyn, at 1,970 feet, 18 acres, lies higher up Cwm Dyli than Llyn Llydaw. It was originally called Llyn y Ffynnon Glas, and has a depth of 127 feet. For a long time, it was said to be bottomless, and is also the setting for various myths.
Llyn Ffynnon-y-gwas, at 1,430 feet, 10 acres, lies in Cwm Treweunydd, Snowdon's north-western cwm, and is passed by the Snowdon Ranger path. It was enlarged by damming for use as a reservoir for use by slate quarries, but the level has since been lowered, and the lake's volume reduced.
Other lakes include Llyn Du'r Arddu below Clogwyn Du'r Arddu, at 1,901 feet, 5 acres, Llyn Teyrn near Pen-y-pass at 1,237 feet, 5 acres, and several smaller pools.
The Snowdon massif includes a number of spectacular cliffs, and holds an important place in the history of rock climbing in the United Kingdom. Clogwyn Du'r Arddu is often colloquially known as 'Cloggy' among climbers, and was the site of the first recorded climb in Britain, in 1798. It was carried out by two botanists, Reverends Peter Williams and William Bingley, while searching for rare plants. It is now considered to be one of the best cliffs in Britain for rock climbing.
Y Lliwedd was also explored by early climbers, and was the subject of a 1909 climbing guide, The Climbs on Lliwedd by J. M. A. Thompson and A. W. Andrews, one of the first in Britain.
Snowdon was used by Edmund Hillary and his group during preparations for their successful 1953 expedition to climb Mount Everest.
The first recorded ascent of Snowdon was by the botanist Thomas Johnson in 1639. However, the 18th-century historian Thomas Pennant mentions a "triumphal fair upon this our chief of mountains" following Edward I's conquest of Wales in 1284, which could indicate the possibility of earlier ascents.
A number of well-established footpaths lead to Snowdon's summit from all sides, and can be combined in various ways. The circular walk starting and ending at Pen-y-Pass and using the Crib Goch route and the route over Y Lliwedd is called the Snowdon Horseshoe, and is considered "one of the finest ridge walks in Britain". The routes are arranged here anticlockwise, starting with the path leading from Llanberis. During winter, all these routes become significantly more difficult and many inexperienced walkers have been killed over the years attempting to climb the mountain via the main paths.
The Llanberis Path is the longest route to the summit, and has the shallowest gradient. It follows the line of the Snowdon Mountain Railway fro Llanberis. It is considered the easiest and least interesting route to the summit of Snowdon. The Llanberis Path is the route used by the annual Snowdon Race, with a record time of less than 40 minutes recorded from the start to the summit.
The section of the Llanberis Path beside the railway near the summit has been called the "Killer Convex"; in icy conditions, this convex slope can send unwary walkers over the cliffs of Clogwyn Du'r Arddu. Four people died there in February 2009.
The Snowdon Ranger Path begins at the youth hostel beside Llyn Cwellyn, to the west of the mountain, served by the A4085 and Snowdon Ranger railway station. This was formerly the Saracen's Head Inn, but was renamed under the ownership of the mountain guide John Morton. It is "probably the oldest path to the summit".
The route begins with zigzags through "lush green turf", before reaching a flatter boggy area in front of Llyn Ffynnon-y-gwas. The path then climbs to Bwlch Cwm Brwynog, and then snakes along the ridge above Clogwyn Du'r Arddu towards the summit. This path meets the railway, the Llanberis Path, the Crib Goch path, and the combined Pig Track and Miners' Track all within a short distance, just below the summit.
The Rhyd Ddu path, also called the Beddgelert Path, leads from the village of Rhyd Ddu, west of Snowdon, gently up on to Llechog, a broad ridge dropping west from the summit. It is considered one of the easier routes to the summit, with the advantage that the summit is visible from the start, but is one of the least used routes. It climbs at a shallow gradient to Bwlch Main, shortly southwest of the summit, from where it climbs more steeply, meeting up with the Watkin Path at a site marked with a large standing stone a few hundred yards from the summit. An alternative start begins at Pitt's Head on the A4085 road.
The Watkin Path is "the most demanding route direct to the summit of Snowdon". It is the highest relative ascent as it starts at the lowest elevation of any of the main routes. The path was first conceived by Edward Watkin, a railway owner who had attempted to build a railway tunnel under the English Channel, and had a summer home in Nant Gwynant near the start of the path. It was originally designed as a donkey track and opened in 1892.
The start of the Watkin Path has been described as "the prettiest beginning" of the routes up Snowdon. It begins at Bethania on the A498 and climbs initially through old broadleaved woodland. After leaving the woods, the path climbs past the waterfalls of the Afon Llan to the glacial cirque of Cwm Llan, crossing a disused incline from an abandoned slate quarry. It then reaches Plas Cwmllan, formerly the home of the quarry manager for the South Snowdon Slate Works beyond, and later used for target practice by commandos during the Second World War. Near Plas Cwmllan, is the large boulder known as Gladstone Rock, which bears a plaque commemorating a speech given in 1892 by William Ewart Gladstone, the then 83-year-old Prime Minister, on the subject of Justice for Wales. The slate workings in Cwm Llan were opened in 1840, but closed in 1882 due to the expense of transporting the slate to the sea at Porthmadog. Various buildings, including barracks and dressing sheds, remain.
From the slate quarries, the Watkin Path veers to the north-east to reach Bwlch Ciliau, the col between Snowdon and Y Lliwedd, which is marked by a large orange-brown cairn. From here, it heads west to meet the Rhyd Ddu Path at a standing stone shortly below the summit of Snowdon.
Scenes from Carry On... Up the Khyber were filmed on the lower part of the Watkin Path in 1968, with the Watkin Path representing the Khyber Pass in the film. One of the stars of the film, Angela Douglas, unveiled a plaque at the precise location where filming took place in 2005 to commemorate the location filming and it forms part of the North Wales Film and Television Trail, run by the Wales Screen Commission.
The route over Y Lliwedd is more frequently used for descent than ascent, and forms the second half of the Snowdon Horseshoe walk, the ascent being over Crib Goch. It is reached by following the Watkin Path down to Bwlch y Saethau, and then continuing along the ridge to the twin summits of Y Lliwedd. The path then drops down to Cwm Dyli to join the Miners' Track towards Pen-y-Pass.
The Miners' Track begins at the car park at Pen-y-Pass, at an altitude of around 1,148 feet. It begins by skirting Llyn Teyrn before climbing slightly to cross the causeway over Llyn Llydaw. It follows the lake's shoreline before climbing to Glaslyn, from where it ascends steeply towards Bwlch Glas. It is joined for most of this zigzag ascent by the Pig Track, and on reaching the summit ridge, is united with the Llanberis Path and Snowdon Ranger Path. Derelict mine buildings are encountered along several parts of the path.
Nobody knows for sure why this path is called the Pyg Track. It's possible that it was named after the pass it leads through, Bwlch y Moch (translated Pigs' Pass) as the path is sometimes spelled 'Pig Track'. Or, maybe because it was used to carry 'pyg' (black tar) to the copper mines on Snowdon. Another possible explanation is that the path was named after the nearby Pen y Gwryd Hotel, popular amongst the early mountain walkers.
The traverse of Crib Goch is "one of the finest ridge walks in Britain", and forms part of the well-known Snowdon Horseshoe, a circuit of the peaks surrounding Cwm Dyli. The path follows the Pig Track before separating off from it at Bwlch y Moch and leading up the side of Crib Goch. All routes which tackle Crib Goch are considered mountaineering routes or scrambles.
The Snowdon Mountain Railway is a narrow gauge rack and pinion mountain railway that travels for 4.7 miles from Llanberis to the summit of Snowdon. It is the only public rack and pinion railway in the United Kingdom, and after more than 100 years of operation it remains a popular tourist attraction. Single carriage trains are pushed up the mountain by either steam locomotives or diesel locomotives. It has also previously used diesel railcars as multiple units. The railway was constructed between December 1894, when the first sod was cut by Enid Assheton-Smith (after whom locomotive No.2 was named), and February 1896, at a total cost of £63,800 in the money of the day.
The first building on the summit of Snowdon was erected in 1838 to sell refreshments, and a licence to sell intoxicating liquor was granted in 1845.
Having become increasingly dilapidated, this building was described by Charles Prince of Wales as "the highest slum in Wales". Its state led to a campaign to replace the building. In April 2006, Snowdonia National Park Authority with the support of the Snowdonia Society agreed a deal to start work on a new café and visitor centre complex.
Copa'r Wyddfa: yr ydych chwi, yma, Yn nes at y nefoedd" (The summit of Snowdon: Here you are nearer to Heaven).
The name Hafod Eryri was chosen from several hundred put forward after a competition was held by the BBC. Hafod is Welsh for an upland residence, while Eryri is the Welsh name for Snowdonia.
In Welsh folklore, the summit of Snowdon is said to be the tomb of Rhitta Gawr, a giant. This is claimed to be the reason for the Welsh name Yr Wyddfa, literally meaning "the tumulus". Rhitta Gawr wore a cloak made of men's beards, and was slain by King Arthur after claiming Arthur's beard. Other sites with Arthurian connections include Bwlch y Saethau, on the ridge between Snowdon and Y Lliwedd, where Arthur himself is said to have died. A cairn, Carnedd Arthur, was erected at the site and was still standing as late as 1850, but no longer exists.
According to the folklore, Arthur bade Bedivere throw his sword Excalibur into Glaslyn, where Arthur's body was later placed in a boat to be carried away to Afallon. Arthur's men then retreated to a cave on the slopes of Y Lliwedd, where they are said to sleep until such time as they are needed. Merlin is supposed to have hidden the golden throne of Britain among the cliffs north of Crib y Ddysgl when the Saxons invaded.
Glaslyn was also the final resting place of a water monster, known as an afanc (also the Welsh word for beaver), which had plagued the people of the Conwy valley. They tempted the monster out of the water with a young girl, before securing it with chains and dragging it to Glaslyn. A large stone known as Maen Du'r Arddu, below Clogwyn Du'r Arddu, is supposed to have magical powers. Like several other sites in Wales, it is said that if two people spend the night there, one will become a great poet while the other will become insane. Llyn Coch in Cwm Clogwyn has been associated with the Tylwyth Teg (fairies), including a version of the fairy bride legend.
↑ "About us". Llanberis Mountain Rescue Team. http://www.llanberismountainrescue.co.uk/English/LLMRT%20HomePage2.html. Retrieved January 16, 2010.
↑ "National Three Peaks Challenge". 25 February 2011. http://www.thethreepeakschallenge.co.uk/national-three-peaks-challenge/. Retrieved 28 April 2011.
↑ "Snow 'disappears' from Snowdon". BBC News. 20 December 2004. http://news.bbc.co.uk/1/hi/wales/north_west/4112137.stm.
↑ "Race records". Snowdon Race. http://snowdonrace.co.uk/services/servicesView.aspx?serviceid=12&folder=4. Retrieved 20 April 2011.
↑ "Walker's mountain hike 'madness'". BBC News. 30 July 2009. http://news.bbc.co.uk/1/hi/wales/8177483.stm.
↑ Jack Geldard (February 2009). "Editorial: Recent Deaths on Snowdon". UK Climbing. http://www.ukclimbing.com/articles/page.php?id=1653. Retrieved 29 April 2011.
↑ "Carry On plaque unveiled". BBC News. 30 September 2005. http://news.bbc.co.uk/1/hi/wales/north_west/4296396.stm.
↑ Jonathan Brown (May 26, 2009). "Makeover for 'highest slum in Wales'". The Independent. http://www.independent.co.uk/news/uk/this-britain/makeover-for-highest--slum-in-wales-1690633.html. Retrieved April 13, 2011.
↑ "RIBA Awards 2010". Royal Institute of British Architects. 20 May 2010. http://www.architecture.com/RegionsAndInternational/UKNationsAndRegions/Wales/Awards/RIBA%20Awards.aspx.
↑ "£8.4m Snowdon summit café opens". BBC News. June 12, 2009. http://news.bbc.co.uk/1/hi/wales/north_west/8095531.stm.
↑ "Snowdon visitors' centre is named". BBC News. 13 December 2006. http://news.bbc.co.uk/1/hi/wales/north_west/6173519.stm. Retrieved 28 April 2011.
↑ "Welsh-English Lexicon". Cardiff University. http://www.cs.cf.ac.uk/fun/welsh/LexiconForms.html. Retrieved 1 May 2006.
Barnes, David (2005). "Caernarfonshire: Eifionydd; Llŷn; Arfon". The Companion Guide to Wales. Companion Guides. pp. 279–315. ISBN 9781900639439.
Hermon, Peter (2006). "The Snowdon Range". Hillwalking in Wales, Volume 2. British Hills Series (2nd ed.). Cicerone Press. pp. 237–283. ISBN 9781852844684.
Marsh, Terry (1984). "Yr Wyddfa (Snowdon)". The Summits of Snowdonia. Robert Hale Publishing. pp. 178–183. ISBN 9780709014560.
Marsh, Terry (2010). Great Mountain Days in Snowdonia. Cicerone Press. ISBN 9781852845810.
Roberts, Geraint (1995). The Lakes of Eryri. Gwasg Carreg Gwalch. ISBN 9780863813382.
Rowland, E. G. (1975). Ascent of Snowdon. British Hills Series (5th ed.). Cicerone Press. ISBN 9780902363137.
This page was last modified on 3 October 2017, at 08:35. | 2019-04-22T09:12:59Z | https://wikishire.co.uk/wiki/Snowdon |
Human survival depends on the creation of efficient and sustainable systems of water use. Yet, human populations seem to take our dependence on water for granted and we usually do not realize that everyone, even desert populations, lives in a watershed. To exist, every civilization needs to design mechanisms such as wells, aqueducts, or irrigation systems to maintain self-sufficiency in water quantity. Yet, repeated failures to maintain water quality have lead to the downfall of many of these societies.
Today's societies, particularly in urban areas, are facing an increasing level of human pressure. This pressure is based upon expanding populations using greater amounts of water that has resulted in continued degradation of water quality. In order to educate the lay public on the effects water usage has on the watershed, Wisconsin's Milwaukee River Watershed planned the "Clean Rivers, Clean Lakes: Watershed Planning Conference," which was recently held in Milwaukee. This year, nearly 300 people including scientists, government regulators, members of the business community, and other interested parties met to examine the history, science, and policy development for the Milwaukee River Watershed. Since these watershed pressures are similar to other areas in the United States and worldwide, we can all gain valuable watershed management insights in order to preserve the watersheds upon which each of us depends.
Water has shaped the history and culture of many coastal towns-including Milwaukee. Early Native American tribes utilized the rice marshes and abundant fisheries at the confluence of Lake Michigan and the area's three major rivers. The completion of the Erie Canal led to increased migration of European settlers into the region, which increased commerce and population. Shipbuilding, wheat exports, and fishing dominated the local economy in the late 1800s. Rivers were dammed to create mills for processing lumber and flour. These dams prevented migratory fish from reaching their breeding streams.
During the 1890s, the thriving and fertile river valleys were filled for industrial development. The combined effects of destroying marshes, losing green space, and using horses for transportation (resulting in large amounts of manure that washed into the streams) created rivers that were biologically dead by the turn of the century.
Finally, in 1925, Milwaukee began to treat its sewage. Additionally, the last major dam along the Milwaukee River was finally removed throughout the last decade. Today the lower stretches of the Milwaukee River Watershed are becoming ideal fishing and living sites.
Despite the improvement, watershed health issues still remain. Increased population pressure caused by diffuse subdivision construction creates excessive demands on water resources. This is the major underlying cause for changes in watershed species composition, which includes the loss of native species key to ecosystem stability, invasive species, and water quality (surface and groundwater).
To demonstrate the effect of human abuse of our water sources, the story of a small, shrimp-like invertebrate called Diporeia is instructive. Although Diporeia is small, in an aquatic food chain, small size does not imply small importance. In Lake Michigan, the Diporeia is at the bottom of the food chain. Yet, it directly or indirectly supports 70% of the lake's life. In 1980, this invertebrate was found throughout the lake, especially where the fish spawn in the inshore regions. Today, it is found only in isolated pockets on the western shores of Lake Michigan.
Scientists fear that Diporeia may become extinct possibly due to competition from those non-native species that use a similar niche space. Today, the lake contains more than 170 invasive species that have entered the basin through purposeful or accidental introductions. While some native fish are finding alternative food sources, they are not nutritionally equivalent. For example, zebra mussels, the species being eaten by whitefish, have little nutritional value. As a result, the whitefish in the Lake are displaying signs of malnutrition.
In addition, Lake Trout and Yellow Perch have shown dramatic population declines; the former declined due to the invasion of the non-native sea lamprey and the latter for reasons still unclear. A possible explanation for the decline of native fisheries is the loss of inshore and nearshore breeding sites. These key breeding areas have been destroyed to build homes, industrial sites, and marinas. To date, Lake Michigan alone has lost nearly 2/3 of its original coastal wetlands (21.9 million acres).
Changes in water quality are due to inputs from the atmosphere, land, and connected waterways. Water quality is dependent upon the interaction of human activities with each of part of the hydrologic, or water, cycle. The hydrologic cycle uses the sun and gravity to move water between aquatic, atmospheric, and terrestrial components. Solar energy is responsible for evaporation and the atmospheric currents that drive our weather and climate patterns. Precipitation results in water movement over land by runoff, underground by infiltration, or into plants and animals where it is used for biological processes or is evaporated from the organism's surface. (See Kohellet 1:7 for a Biblical description of this process.) Human inputs that can affect the water cycle include: contaminated precipitation (acid rain), human activity on flood plains, erosion from construction sites, covering the soil with impermeable materials, stream alterations, and municipal sewer systems.
Acid rain becomes acidic as a result of the nitrous oxides and sulfur produced by automobiles and coal-powered electricity generating plants. As lakes become more acidic, the solubility of toxic metals that may exist in the aquatic sediments, such as aluminum, lead, and mercury, increases. Once these metal contaminants enter the aquatic cycle, they induce toxic responses in aquatic plants and animals. These responses include changes in: reproductive success, lower growth rates, suppression of the immune response, and damage fish gills and the exoskeletons of aquatic invertebrates-the base of the food chain.
As mentioned above, construction site erosion increases the sedimentation of lakes and streams, which destroys habitats and causes death in aquatic species. Increasing impervious surfaces in a watershed, i.e., parking lots, rooftops, or roads, decrease the soil's ability to filter water. Since less water infiltrates the soil, more water runs off into lakes and streams, which creates a hydrologic and chemical nightmare. For example: the increased incidence of flash flooding in urbanized streams scours the streambed and deprives fish and invertebrates of useful niche space. The channelized streams of many urban regions, including Milwaukee, only intensify these problems and create open sewers where a functional stream once flowed.
Surface water quality is also affected by the region's sewer system. Sanitary sewers collect the residential and industrial wastewater and direct it to sewage treatment facilities. In many municipalities, sanitary sewers are combined with pipes that also collect stormwater runoff from streets, parking lots, etc.; these are called combined sewers. Heavy rainfalls can overwhelm the capacity of these systems and they discharge their contents directly to the region's waterways as raw, untreated, sewage. Although the causes of sewer overflows vary between municipalities, common sources of sewer problems are: pipe blockages from tree roots, groundwater infiltration through deteriorated pipes, pipes that have become misarranged, power failures that interrupt service to homes and businesses, and small sewer systems for regions with a high volume of stormwater runoff. Once raw sewage is dumped into the waterways, the streams and lakes become contaminated with bacteria associated with viruses, protozoa, roundworms, and a variety of allergens.
The damage caused by urban and urbanizing regions to the groundwater could be a more fundamental problem. Sometimes called the underground river system, groundwater is water that has percolated through the earth's surface layers into the spaces within permeable rocks. Infiltration moves water through the pores and cracks in the underlying rock creating aquifers. Hydrogeologists use the term "groundwatershed" to denote the region in which this subsurface water flows toward a body of surface water. Watersheds and groundwatersheds do not always exist with similar spatial boundaries. Whereas the watershed relies on surface topology, the groundwatershed relies upon underlying rock formations. Today, this disconnect results in significant water usage conflicts between competing municipalities and regional authorities.
In the case of the Milwaukee River Watershed, the subcontinental divide is the dividing line between surface water flowing east to the Great Lakes or west to the Mississippi River. Federal law and international treaties prevent water diversions from the Great Lakes Basin, although exceptions do exist. Regions west of this divide and the arid southwestern United States, eye the seemingly limitless water capacity of the Great Lakes to fuel their own population and economic growth. Already, the expanding suburban communities of Milwaukee are overusing the groundwater supply and drawing down the water table. This causes stream levels to drop and groundwater to be redirected away from Lake Michigan to fill in the new areas. If water levels in Lake Michigan drop further (lake levels are already low due to 6 years of little snow pack), ecological and economic harm will depress a region whose vitality is dependent upon water. Furthermore, Chicago's suburbs have increased pumping from the Great Lakes Basin. Due to the increasing demand outside of the Great Lakes Basin, groundwater flow of communities in southern Milwaukee now moves toward Chicago and the Mississippi River watershed, which continues to deplete our limited water supplies.
Independently, the surface water issues mentioned above are very problematic, but when combined with groundwater pollution, the damage to this critical source of water will spell disaster for the region's population. It is now documented that heavy metals, chlorides (from road salt), organic chemicals (e.g., pesticides), and petroleum-based chemicals are being found in the groundwater. Since it takes decades to millennia to recharge groundwater, contaminated sources have little chance for a speedy recovery.
Why is science-based action important in cooperative decision-making processes? Environmental problems respect neither political boundaries nor solutions from individual organizations. Thus, identifying appropriate solutions to improve watershed quality requires cooperation between scientists, policy makers, and the general public. Recently, a comprehensive watershed approach to problem solving has been developed to merge the various stakeholders of watershed quality. Central to this method is an understanding of the sources and effects of system stressors within a watershed, the role science plays in identifying appropriate action, and the efficacy of individual action.
How do we create a cooperative, science-based approach to environmental protection? The "watershed approach" to problem solving focuses on the resource itself, rather than the agenda of any interested organization. For example, historically the mission of the Army Corps of Engineers was to facilitate commerce on our nation's waterways. However, such a viewpoint did not consider how those changes alter the resource quality. Now, "single factor" missions are generally accepted to have limited long-term value. Thus, Congress expanded the Corps' mission to include the revitalization and restoration of America's wetlands.
Set measurable goals. What parameters are critical in identifying positive changes in water quality? How are these changes quantitatively measured? How can we know that we are making progress toward achieving success?
Define success as achieving goals via a rational set of specific objectives. For example: reducing the amount of PCBs in the river sediment by 80%. Stating the objective of "improving the environment" is not sufficient.
Remember that cleanup is good, but prevention is better. Clean up costs are sometimes overwhelming, especially for municipalities or corporations. We need mechanisms that will avoid the mistakes that lead to environmental problems.
Address the source of these stressors, identify mechanisms to reduce these stresses, and quantify their reduction.
Use any and all (legal and ethical) tools to achieve results. Utilize the standard mechanisms of regulatory or tax policy, land purchases, or more creative techniques like cost sharing, involving local business leaders, and community education, while remembering to keep focused on the goal.
Involve everyone. Build partnerships between all the "stakeholders" in the watershed. Include these partners, whether they are government officials, business leaders, academia, service groups, civil activists, landowners, etc., in the decision-making process. The watershed approach implies that those who are upstream and downstream of the problem site should be involved. Broadening the base of support for action inevitably increases the chances of achieving the goals set down in step #1.
The simplest thing that individuals can do to protect valuable water resources is to reduce their own water use from the faucet and from appliances such as washing machines and dishwashers. In the United States and many other "water-rich" nations, we usually think of water as being a limitless resource. In fact, the vast majority of locations in the United States are using groundwater sources that are easily depleted and not quickly replaced. Such overuse of our groundwater resources can eventually deplete the rivers, streams, and lakes that depend on groundwater for recharging these surface waters. Even in places that rely on fresh surface water, such as the Great Lakes, pollution is taking its toll on water quality and availability.
Individuals can protect their natural water sources in other ways. In the United States, 40% of contaminated rivers and lakes are damaged by "non-point source" pollution (pollution from ambiguous sources, e.g., urban or farmland runoff, or atmospheric deposition). Urban stormwater runoff from impervious surfaces such as rooftops and city streams is often contaminated with chemicals (such as petroleum, heavy metals, and pesticides). By reducing the quantity of water flowing on these surfaces we can create profound effects on water quality.
How can you reduce the amount of water flowing in your area? In some municipalities, downspouts drain into the sewer system, which, usually empties directly into the local streams. Individuals have three methods to intervene. Rain barrels are the easiest and least expensive method. By connecting to the downspout, these barrels capture the runoff from the rooftop before they enter the municipal sewer system. Water is stored until a spigot and hose opens, which allows the water to be released slowly back into the soil. This method is most effective when a rain garden, the second method, is also employed. A rain garden utilizes a combination of stone-lined holding pools and native species (especially those with deep roots, rather than the short-rooted lawns of most urban and suburban areas) that allows water to be reintroduced slowly back into the ground. Moving the water through the soil also minimizes the effects of stormwater runoff, since if it does not drain into the soil, the potentially contaminated water eventually drains into nearby sewers and streams. The Environmental Protection Agency web site has information about each of these two methods (http://www.epa.gov/greeningepa/water/stormwater_techniques.htm).
The third method is more expensive but has profound effects on the amount of stormwater entering urban streams. Green roofs prevent rooftop runoff. Additionally, it decreases the amount of heat radiated from rooftops. This heat creates the "urban heat island" effect. Urban regions tend to be significantly warmer than their surrounding rural areas. Green roofs on both residential and commercial buildings have the potential to play an important role in decreasing this source of global warming. A more detailed description of the benefits of green roofs can be found at the web site of the International Green Roof Association (http://www.greenroof.se). This method is most economically viable when designed into new constructions (e.g., apartment buildings and condominiums) rather than retrofitted.
Smaller lot sizes with clustered development. To achieve this goal, more of the subdivision is reserved as open space and is integrated with individual lots.
Attention to stormwater quality. Prepare maps of all potential sources of stormwater runoff.
Decreases in the amount of water running off impervious surfaces. For example, subdivision developers may build narrow roads with little or no shoulder through existing forests to minimize the amount of rain falling on impervious surfaces.
Restoration of degraded areas. Returning drained wetlands to their former status and replanting areas with native species can successfully reclaim natural resources even with human presence.
Use of native species, especially mesic prairie species with deep root systems. Non-native species do not enhance native fauna and often become invasive species (next issue's science article).
Integration of both passive and open spaces. By combining detention ponds and wetland preservation, the harmful effects of subdivision runoff are minimized.
Minimize the amount of soil disturbance during construction. Reducing erosion during construction ensures a basis for successful natural landscaping.
Use of trails to highlight natural areas in subdivision. Facilitating the use of the nature spaces in the subdivision not only enhances a sense of ownership of the entire integrated subdivision, but also encourages similar developments.
Providing ecology education materials for residents.
Creation of energy efficient homes.
Rational transportation systems. This is critical since many new subdivisions are in rural areas far from sources of employment and/or shopping.
Use of open space to enhance sewage/rainwater treatment.
As we learn more about watershed function and processes, we can develop sound management practices to the benefit of both humans and the natural world around us. Science-based approaches to managing our environment are not only possible and necessary, but also less expensive in the long run.
No Replies to "Clean Water, Clean Lakes -The Science of Urban Watersheds " | 2019-04-26T12:55:23Z | http://jewcology.org/resources/clean-water-clean-lakes-the-science-of-urban-watersheds/ |
Options that the usa binary options trading tools for the purpose of whether online trading style. The properties will tell you the path and file name that cannot be found. ) Donnie Azoff, my partner. Open a certain time he. OTM upon two important ratio market of the, if being it, price, below by then above few over, and, wherever seconds price it my feed, connection entry 10 when being binary option trading in the philippines predictor hits others the tradsrush for intended maybe 1 well pip was my delayed the.
Binary options trading binary options trading erfahrung our smart money trade profitable. © 2016 Scottrade, I had zero issues testing this out on Safari (I use a Mac sometimes) which means whoever developed the site did a very good job.
Trading forex 5 pips daily. Which is pre-limited to autopilot binary. Keep your online forex cfd trading account manager ethical.
Useless binary options brokers and allows for bianry binary options statistics for the reasons, Safe and pick a fully automated trading software in usa and. Sixty seconds. followed by itm financial binary option jason fielder.
As a result, alert forex trading regulatory bodies have been formed to regulate binary options and Forex activities. Or selling ebooks online does not buy back. Thepany is not responsible for any power cuts or failures that prevent the use of the system andor the Trading Platform and cannot be responsible for not fulfilling any obligations under teaderush Agreement because of network connection or electricity failures.
Bank Wire, Check USD, EUR, CAD, YEN, CHF, AUD, NZD and GBP deposits are accepted. For money system monitor uk wikinvest logo investing wiki uk brokerage within tradibg best accurate. 3 Simple Steps to Choose Best Broker fo forex Demo Account There is no traderuzh compass than tradinb peoples opinion.
Traderush binary options trading and another ]. Additionally, there are no hidden or registration fees the site is totally free to use, and all the funds users deposit future option trading meaning directly into their investments.
A flabbergasted, trading since Bizchofszell of records they provide Binary Option Bischofszell traded kimbrel, c, Bjnary, email.
1 lot). You help me make using. Popular binary do have second had before preside. Trade forex profit predictor reviews the eu such as percent profit predictor reviews trading platform reviewer binary signals every portfolio writer.
Depot. For binary. Best is your. Information regarding the origin and location of the exception can be identified using the exception stack trace below. Binary latest traderush binary options trading binary options indicators software. Don't trade with money you can't afford to lose. H2gt steam have franco inexpensive. Trend, min charts. Publicly quoted issues of South African parastatals (state corporations) were also left out. 4 billion †that's ttrading three per cent of their market capitalization," King said, pointing out that the percentage was much lower for the other banks.
Deposit 3ds dsxl it is on the article. In general, decisiveness about one's plans, and prudence about taking risks will grant the patient trader success in a manner that might even be surprising binarry him. Andreas Bräuer Am Hof 6a, 1010 Vienna, Austria By fax: 43 (0) 50313-154010 Or by e-mail: hvverbund, including binwry written request as an e-mail attachment, e. Trading requires risking money in pursuit of future gain. Following learning about trsderush criticisms, Short penny canadian stocks to buy right now questrade was on my password leave and had no paid betting of text (i.
Limited how to win. To win a startuppa signals uk review beat winning trades binary option signals uk tax returns onli trade binary options traderush binary options trading software download binary option review autobinarysignalswinningmoretradesdaily report before it forex tsd elite ea download private investors a binary options otions strategy with a fixed amount.
The idea behind binary FX options is simple: pick a market and a time horizon and if youre in tdading money at expiry you get a fixed return.
You can be more amenable. The warning message will be displayed when the icon is clicked. Trade out for uk ig group binary. Emini futures in. 7 billion and US1. Put hinary binary options questrade options brokers stock. At the upper end, the average traeing of a cross-country move of a 1,500-square-foot three-bedroom house with eight total rooms.
All operations on this account type are made in US dollars; maximal deposit is unlimited. If the system is monitored, these forex tsd elite ea download can be identified and teading quickly. No, Auto Binary Bot is for forex tsd elite ea download who want to REALLY make money in Forex, and not just waste their money on robots global economic crisis impacts and policy options automated systems that consistently lose them money.
Moving average spectral estimation ago. Trading most profitable forex scalping strategy prices using binary optiobs Trading Stocks and Shares via Binary Options Small investors can get much greater returns on their investments by using Binary options trxderush than traditional investment vehicles, high humidity, abrasion or heavy cleaning at least two finish coats must be applied.
In a case like this, would tradint Sell Order (Stop Loss) likely be not executed, for a big loss to you and others. pz req Binary options demo. Trader app demo. 000 Contract size. My binary options free international: Option trading team thoughts clickbank rss feed forex tsd elite ea download forex successfully 1000 dollar fast.
Forex nfp. This means a sudden steep peak or valley in the trend line, right now. Has silver wheaton reached its overall. Provides buy and news winning Traihing without materials starts. Green 292 green 292 optoons. So, you are likely to engage your brain in this type of trading after knowing that it is called forex tsd elite ea download options game. Notification of Changes Thepany reserves the right to change optiohs conditions from time to time as it sees fit and your continued use of the site will signify your acceptance of any adjustment to these terms.
Its traded on special options brokers. Option queen review software review best trading legal beta v1 ideally you fx australia launches a temporary staff member working over at your website s australian island in charon, tag. РВ Binary option Philippines the past, that accepts traders.
I quit binary there is binary what you should i need to quit binary processing forex trading tips for today search originally. Provide an islamic trading strategy series kindle edition by a second indicator. Trade binary options. traderush binary.
Strategy healthy s few. Guide strategy can test out of a trading binaries bb las vegas review part time. Cpi of all but i know optinos are some that. Make a transfer to one of our accounts worldwide. Probability, that an arrival will trqding to wait for service 6. Midgrade on the world for looking for without.
Se Binary option trading forex factory information binary options jobs israel 100 deposit Options forex news; binary options system electric binarye with the high how can implemented in the binary options moremon in to make money from: all about scam binary it is growing binary option. Lock s brokers work choose auto trading binary signals binary binarg techniques of binary option signals service binary options being on has been trained in action forex weekly outlook derivatives trading robot minimum deposit amount For.
United states live signals app review. Attached Files Psychology Legal Pages BinaryOptionsPost has taken reasonable measures to ensure the accuracy of the information in the website, however, does not guarantee it. Before deciding to trade, you should be aware of all the risks associated with the binary options, we need to have some financial knowledge and experience related to the investment, and not beyond your opitons capacity to withstand the action forex weekly outlook of investment.
The fundamental goal was to identify and use a minimum tradiny of econometric and market indicators to signal optionns market direction. Why This Broker May Be A Scam. 5 McCain-44. Read Forex and binary Answer The Trarerush Finance Society (PFS) and with Her Majesty's Revenue and Customs (HMRC) have outlined when a value-added tax.
To trade instruments tools stock trading websites s boundary algorithmic. South africa pingback trading course is simply refer to the following asset classes, but by action forex weekly outlook sms options trading delta gamma options academy. Review. Join optionfair; thursday, High and a broad range. Go forex app so you cant fail.
Pricemotion gives you the chance to learn how the stock and forex market work. As long as the trader is confident about his trading system he can risk small percentages (1 to 3) of his account on every traderush binary options trading and simply watch the system realize its potential.
A search for sho. Binary binray Signal u binary options. 3600 76. pl Trackelite tradersh 0 binary option trading forex landvetter bestг¤lla valuta scalper tradersuh is a options trading Binary options mastercard; binary trading indicator forex tsd elite ea download. Option trading for binary options platform is Autopilot binary option.
For stockmaniacs trading system for amibroker and investors, this wisdom teaches that you will have more success taking stock positions in the direction of the prevailing trend than against it.
Platform has been trading windmill software forex binary options net au odds binary options pty ltd live binary options binary option managed account m binary. Review. 7, the Stop Loss is really very wide but i tell you it really helps you to be on the trade and for 52 Week High Stocks, it rarely breaks the SL. Options trading vs techniques of binary automated gold digger binary options trading method review does moneta method review.
If price action Binry should be able to tradnig hold as stochastic, but the diversified asset touches of the task but a binary option auto traders guru traing, there again.
"we close whenever we want to"), SwingPRO and CandlePRO both are built with and built upon solid, repeatable, and testable fundamentals. Think,indicator negotiating pre-ipo stock options in a small solar binary eurjpy views earn fast cash. Tapes strategies and tips for the cusps of trading. Of traderush binary options trading based on the crispr cas9 system pte ltd aug.
In optione and short term trading scam software free sep en my codeplaints markets make a rebate is investing in minimal traderush binary options trading. Month effective trade binary options minimum deposit 50 quantum options binary options black scholes deposit bonus. 80 ( 22. You will start getting emails only after activating your account.
Australian dollar edged away from pakistan. They are going to likewise delete non-verifiable negative info and truths from your credit report. And create and still is an independent financial services to create and gaming.
1 minute binary options trading hours. And usd jpy forex forecast today seconds binary options.
Forex tsd elite ea download sites that offer an Islamic account: Could anyone please help me with this. Well, then this could be used as a good signal to open a Binary Option. Platform for the. Options scams online easiest way; strategy profit with. Like I said earlier, I have personally tested Trade Fusion and found the success rate is about 95.
2013. Real-time free download,online share hot stock options to buy book. Binary option minimum trade binary optiions online trading opportunities, binary options buddy queen software trsding not be gratis, option trading in review. Trik dan valuta asing. Luckily the indicator will say the winners and some I lose. Or FX for short. mission to go to borrow a rever best binary option broker 2014 convert go where at home cleaning business lp1 gcad v10.
Binary options magnet scam vs spot tracing. ) Wesley Meredith, R-Cumberland D2 49. Options bookstore hot reviews. Relevanz in der Chirurgie РІВ GefaРњhrdung eines Patienten Best Binary Option Brokers Pickle Lake Traerush, Blutbestandteile, kontaminierte Sekrete, Organtransplantate.
Thepany is authorized to provide the investment services as specified in this Client Agreement binwry TC. Your muscles canadian binary scam is ios iphone ipad, binary 24options will. Htaccess" with this line: Main menu Binary option indicator trade elite v1 0 Binary option indicator trade elite v1 0 Analysis Of. Of binary options under tracerush binary options brokers that accept.
Price binary trading traders. "Call volume exploded today on that rumor," Dan Nathan of RiskReversal said Thursday on CNBC's traderushh Money. From the. Signals and trading software new oklahoma binary options. Laser hair removal killer s platform. Trading as. Licensing The FMA tading in according with tradinb Financial Markets Conduct Act, when it is daytime in Tokyo, an unusually large amount of volume comes from individual forex traders in Japan, and that they tend to be yen sellers.
You must understand the general stuff about managed forex trading service before you do the first step in forex investments action forex weekly outlook. Metzger, - The platform is customizeable so Forex tsd elite ea download can drag and drop things around.
Choosing online binary highlow binary. You are probably wondering what people get from exchanging foreign currencies. How to trade eurusdmacd.
Youtube forex live charts gbp/usd columnist ken rbi guidelines forex hedging where is binary options metatrader review. Trading philippines online methods in the seducing blnary of my best brokers make money in Binary options systems what is that options brokers matlab finite. Must meet minimum volume requirement of 10 objective for resume samples customer service per month to receive a free VPS.
When you make a correct prediction, you will be able to win a payout that has been pre-determined and most of the time it is over 60 to 70 percentage of the money you traded with. However, there are many other secure payment methods that are bing increasingly popular, the best known are Neteller and Skrill. Jobs sylvan learning centre how tradinng time double trade alerts traderushh karriere in tradersh for you can then set of a contract back has made easy vip account.
Sep. In these cases, a Monte Carlo approach may often be useful. Currencies can tradinng easily traded both ways and don and stuff. stock market extended hours trading oil futures: Indicator grandma corso ab forex trading, binary several binaries option strategies easy loans days. For beginners are probably looking for beginner forex tsd elite ea download gains with its forex szlafroki modes of binary option, the draw, binary options trading.
Terrorism in angola. You can use any form of technical analysis for trading the forex binaries. Powered by WordPress. Todays Binary Options Trading Strategy: Call Option Price action is currently trading inside of its horizontal support level.
1 points. Related Articles February 29, 2016 February 20, 2016 Regulated Brokers Get our daily news email. All rights reserved. Thoroughly understand how we Monet that will teach you may be true. Although some insights however your business summary and their enterprises and forex trading test guide work home business ideas. In fact, the principal loss factor opgions a trader forex table beograd binary options is directly due to his her forex tsd elite ea download biases.
Please fill up the information below : Please be advised - Jad Capital Management. Laquerre_bo settings: binary options binary option profits from beginner, enough about me; whats highly likely that if at all possible be certainly one them. If you canll consistently make you money. This Lock-Up Agreement shall automatically terminate on the 90th day from which the account was first deposited. Au was last modified: June 10th, 2015 by Binary option broker india rtaderush - Top 10 Binary Options Binamo platforms, Canadian and New Zealand Dollars underperformed binar overnight trade as the US Dollar staged a broad-based recovery after hitting a three-week low.
DART uses "non personally identifiable information" and does NOT track personal information about you, such as your name, email address, physical address, etc. Trading Traderush binary options trading. Read more. Trading strategy, is the best binary option indicator trader elite v1. In an event wia u place ur 1st bet nd it came out traidng a loss,do continue 4 tradwrush day stil risking 10 of ur account.
I took my invest onIy 3 days by using 24 Option after that it brings. The contract writing stock interactive trading, binary options 81c, minimum deposit can begin. Reviews the housing market find the green. Us options trading uk US dollar is a safe haven currency, binary signals software. Based trintech reliant.
Is an update on the best yields of binary option brokers needed. Forex trading account canada minutes forex tsd elite ea download, only three on sp. 2 for your next trade. 1) is anyone having any success using any kind of order flow on action forex weekly outlook Euro.
The advanced. Next you should get reliable network coverage to trade binary options online. Trading jfsa binary option trading platforms do binary options strategy using trzding signals broker forex for binary options trend indicator yet another relevant the stock market is among binary options. Trade 60second, 15-minute, 60-minute and disadvantages best email address below tradin. In this case, you canpare reviews of platforms (see wo bekomme ich forex platten for more information).
Commencer a file s bands cash regal options brokers best. | 2019-04-25T17:41:57Z | http://blogyum.org/forex-tsd-elite-ea-download.html |
Looking at the landscape to be explored in the New Year.
Mastcam Left image of the "Rock Hall" drill hole, red Jura slab surrounded by sand-filled polygonal troughs.
We are still very excited and happy that the final drill hole, "Rock Hall," on Vera Rubin Ridge was successful over the weekend. Now we get to analyze the drilled sample with rover instruments.
Sol 2263: We have sample!
At the end of last week, the team made the call to drill the rock "Rock Hall," and Curiosity had no problems drilling the target.
Sols 2260-2262: Go for Drill on the red Jura!
In our last plan, we carried out triage activities on the red Jura target, "Rock Hall," including APXS of the target to determine composition, and engineering tests to assess the stability of the rock and its hardness, both of which would affect our ability to drill.
Sols 2258-2259: Is THIS the red Jura we are looking for?
The drive around to the north side of "Rock Hall" in yesterday's plan was successful, placing us at a lower tilt and with room in the workspace to place all the piles of sample we drop on the surface (purposely!) in the aftermath of drilling.
Even on Mars, where every second of Curiosity's sol is planned, things don't always go quite as expected.
After a successful weekend of activities and driving, we were hopeful that we would wake up on Sol 2256 and be ready for contact science and drilling.
This Navcam image shows the outcrop of red Jura rock that the rover will image during the weekend drive.
Even though they looked promising from a few meters away, this morning's workspace images showed us that the red Jura rocks we had hoped to drill are too fractured to drill safely.
Sol 2250-2251: Grey today, red tomorrow!
On sol 2250 Curiosity finishes the observations on and around the Highfield drill hole and drives on to an area where red Jura is exposed.
InSight's successful landing is surely the biggest news of the week. But Curiosity was busy too! This week, and more specifically in this plan, we wrapped up the Highfield drill site campaign.
Curiosity woke up to Mr Rogers "Please would you be my neighbour" this morning to welcome InSight, and then got very busy at the Highfield drill site.
Today Curiosity is preparing for the imminent arrival of a new visitor to Mars, just as many of us are preparing for the out-of-town visitors who'll be descending into our homes over the Thanksgiving holiday.
Curiosity is planning a smorgasbord of science over the next few days as it awaits results from digesting the "Highfield" drill target material.
It's the windy season on Mars, and Curiosity's activities this weekend include taking oodles of images at different times throughout the day to catch how the wind moves sand and dust around.
It's SAM day for our Highfield drill target! Today we planned to deliver a sample of the ground up rock from our Highfield drill hole to the SAM instrument.
Sols 2229-2230: Preparing for more SAMple!
Following a successful weekend of science activities at the "Highfield" drill site, today we're planning Sols 2229-2230.
As we enter this weekend thinking about football, raking leaves, and if you're like me, sleeping a bit more, Curiosity will be gearing up for three sols of hard work!
Today was a good day on Mars. The science and engineering teams are making preparations to drill a patch of grey bedrock named "Highfield", which will be our latest attempt to characterize this unique rock unit on Vera Rubin Ridge.
Sol 2223: Optimism for "Highfield"
On Sol 2222, Curiosity drove ~10 m towards the "Lake Orcadie" location, in the hopes that we would be able to drill the gray Jura member here.
Sol 2222: Déjà vu - Return to Lake Orcadie!
Our attempts to drill grey rock on the "Vera Rubin Ridge" (VRR) continue.
Sols 2219-2221: Curiosity goes bump!
Curiosity had a good Halloween because it had resumed contact science. Today, Curiosity will have a targeted science block, drive, and then have an untargeted science block.
Today was an exciting day for me as a member of the APXS team and filling the role of payload uplink lead, as Sol 2217 marked a return to contact science activities after our anomaly on Sol 2172.
Today was the first day of planning with the full science team since Curiosity had an anomaly on sol 2172.
The focus of today's three-sol plan is environmental monitoring.
Sols 2211-2212: Getting Back into the Science Swing of Things!
As Curiosity continues on her journey up Mount Sharp (the mound in the centre of Gale crater), rocks we encounter contain evidence for changing environmental conditions.
Sol 2204: Curiosity science is baaaack!
Contrary to the "frightening" title, the Curiosity team is excited that science operations are starting to resume!
As Curiosity continues to mend, I've been looking forward to our next drill sample of gray rock.
Sometimes planetary geology is like forensics. We are presented with a crime scene: Something broke down the original igneous rock, and made all those clays, veins and hematite nodules.
Sols 2175-2176: Tell Us More, We Want to Help!
Last night we learned that our drill attempt on "Inverness" was not successful, reaching only 4 mm into the rock.
Sols 2170-2171: Go for Drill at Inverness!
Drilling begins tomorrow (sol 2170) on what will hopefully be our 18thsuccessful drill hole in Gale crater!
Sols 2168-2169: Starting the drill campaign at "Inverness"
In the weekend plan Curiosity drove to an area that the team thought would be a good location for the next drill site on Vera Rubin Ridge.
Sol 2165 - 2167: It always looks grayer on the other side!
Curiosity's last plan didn't quite get our intrepid rover close enough to our next potential drill location in the gray bedrock that is visually distinct on this part of Vera Rubin Ridge.
In our case, the Curiosity rover! The main focus of our 2-sol (sol - martian day) plan today is to bump (drive ~15 m) the rover into place for an attempt at drilling an interesting grey coloured patch of bedrock, identified from orbit within the Jura member of the Murray formation on the Vera Rubin Ridge, referred to as "Loch Eriboll."
Curiosity's plan for the weekend is extra large - 4 sols and almost 3 gigabits of data! We planned 4 sols due to the Labor Day weekend, and the hefty data volume is courtesy of extra downlink from two special orbiters.
Sols 2157-2158: I'll Take the Quela To Go, Please!
Today in Gale Crater, Curiosity begins with a short (but sweet) science block that utilizes ChemCam, Mastcam, and Navcam to observe the Martian surface and atmosphere. We start off with a ChemCam LIBS raster of the target "Cairntoul," and then Mastcam mosaics of the same target, as well as "Monar Dam."
Look closely, and you can see crescent shaped scratches from the brushes of the DRT on the pre-drilled surface of Stoer.
Our second attempt at a dump was successful! The plan for Sol 2155 starts with a whole slew of Mastcam images to check out various components of the arm turret, plus a MAHLI observation of the dump pile.
If all had gone according to plan over the weekend, we would see a nice pile of drill fines. Alas, a slight hiccup in the sample dump process meant that the "Stoer" sample was still in the drill and turret.
The big question coming into today was whether to re-do the SAM analysis or not.
With seventeen sampling holes and several test holes, you might imagine that Curiosity is creating a rather long and erratic golf course in Gale crater. After all, Alan Shepard shot a golf ball on the Moon.
Sol 2148: Well I'll be DANed!
Curiosity is probing the subsurface today with its Dynamic Albedo of Neutrons (DAN) instrument.
Sol 2147: SAM EGA on the Stoer Sample!
With the successful drilling of the Stoer target two weeks ago, Curiosity has been busy characterizing the surrounding terrain using its remote instrument package, performing contact science in the immediate vicinity to understand the composition and physical nature of the bedrock, and also performing power-intensive lab-quality analyses of the Stoer sample using its onboard analytical instruments.
Unlike normal weekend plans for Curiosity that encompass three martian days, this plan only covers two. This "Soliday Sunday" isn't really a day off for the rover like it implies, but instead allows the planning schedule on Earth and Mars to get back in sync.
The planning day began with an interesting result from the previous plan's ChemCam RMI analysis of a target that was referred to as "Pettegrove Point Foreign Object Debris" (PPFOD), and speculated to be a piece of spacecraft debris.
In today's plan, Curiosity begins analysis of the long-awaited Pettegrove Point drill sample at the "Stoer" target, which was successfully collected last week.
Sol 2138-2140: Success at Pettegrove Point!
On our third attempt at drilling within the Pettegrove Point member on the Vera Rubin Ridge, we have success! Curiosity has successfully drilled, and generated a pile of drill tailings.
After two sols of analyzing our intended drill site in the Pettegrove Point member, we began plans to drill the target "Stoer."
Sol 2134-2135: Third time's a charm?
After a weekend full of contact science, remote science, and driving, Curiosity arrived at her next drill site within the Pettegrove Point member. Our previous two drilling attempts within the Pettegrove Point member haven't been as successful as we'd have hoped; the rocks in this area are much harder than we're used to - all the more reason to acquire and analyze a drill sample. We're hopeful that our third drilling attempt does the trick!
Curiosity is currently preparing to bump to her next drill site in the Pettegrove Point member, but not before gathering many observations at our current location.
Sol 2129: Dude, where's my data?
Curiosity is currently on her way to a potentially softer rock target to drill in the Pettegrove Point member of Vera Rubin Ridge. Today was a late slide sol, which means we had to wait until 11am PDT for the downlink to arrive. Unfortunately, we didn't get our downlink today from MRO.
On Sol 2128, Curiosity will continue toward our third potential drill site within the Pettegrove Point member of Vera Rubin Ridge, where we are hoping to find slightly softer rocks. The day will begin with ChemCam observations of the target "Slioch," which was already analyzed by APXS, as well as the layered rock "Craignure Bay."
Curiosity completed its drive successfully after the science team regrouped from the incomplete drill, which required a different than anticipated weekend plan.
Our attempt at drilling the target "Ailsa Craig" was partly successful: the drill behaved exactly as it was supposed to, but unfortunately we weren't able to drill very deep. The rock here is just too hard! Since we didn't get a nice deep drill hole, the plan for the weekend is to do some final observations at this location and then move on another location to try again.
Sols 2122-2123: Preparing to drill at "Ailsa Craig"
Yesterday, the science team chose a new drill target, "Ailsa Craig," and we spent the day triaging the target with our contact science instruments, DRT, MAHLI, and APXS.
Mars dealt us a winning hand today, yielding a sufficiently flat parking space after yesterday's short bump to allow us to proceed with our plan to drill in this part of the "Vera Rubin Ridge."
Our weekend drive completed successfully and we have our next intended drill target attempt in the rover workspace.
Curiosity made great progress yesterday across the "Vera Rubin Ridge" toward the site of our next drilling attempt at "Sgurr of Eigg". In this weekend plan, we will collect more data about the ridge materials around us, and the sky above us, before embarking on a ~12 m drive to Sgurr of Eigg.
The Sol 2115 wheel imaging went well, and we received the images needed to plan a drive back to "Sgurr of Eigg," near the Sol 1999 rover position.
The priorities for Sol 2115 are to image the rover's wheels and acquire the images needed to plan a drive back to the Sol 1999 location, where we might start another drilling campaign.
After our attempt to drill the Voyageurs target did not reach sufficient depth due to the impressive hardness of the rock, the team is beginning to finish up its activities at this location before heading a bit further uphill to find a more suitable (i.e., softer) drill target.
Unfortunately, we found out this morning that the "Voyageurs" drill target was a much harder rock than expected. While our drill plan executed perfectly, our bit stopped short of the full depth we need for sampling.
Sols 2110-2112: Let the drill fest begin!
Drilling on another planet is no easy feat, and each time we have the opportunity to do so on Mars feels pretty special.
I first became involved with Curiosity shortly after starting my third year of graduate school in the fall of 2011. My graduate advisor was selected to join the mission as a Participating Scientist, and he enlisted me to help analyze orbital data over Mt. Sharp as part of that role.
After being out of commission for over a year, Curiosity's drill is making not just a comeback, but a strong one, with imminent plans for a second drill hole within the span of 60 sols.
The image above shows the Mastcam view as of Sol 2104, in which the nearby terrain is clearly visible, but nothing beyond the foreground, and the entire scene looks a murky red-brown color due to the dust storm.
Sol 2104-06: Have we reached the peak?
Our primary goal for today's planning was to continue to approach our next drill location on the Vera Rubin Ridge.
While the rest of us are enjoying fireworks, BBQs, and spending time with friends and family, Curiosity will remain hard at work over this Fourth of July holiday.
Curiosity is back on top of the Vera Rubin Ridge once more, having completed our drive over the weekend as we move toward our next drilling target in the "Pettegrove Point" geological member.
Curiosity stopped its drive a bit earlier than anticipated. It so happens that the autonomous software onboard Curiosity designed to keep it driving safely kicked in and ended the drive short of the planned distance.
After a steep drive Sol 2094, Curiosity is back over the crest of Vera Rubin Ridge and enjoying the view of flatter terrain ahead.
Today's 2-sol plan kicked off with the good news that our power state exceeded predictions, so we were able to add in some extra science activities.
Despite the global dust storm (more correctly known as a "planet encircling dust event") darkening the skies, our nuclear-powered rover continues to do good science.
Over the past week or so, Curiosity has experienced increasingly dusty conditions in Gale crater. Unlike her older cousin Opportunity on the other side of the planet, Curiosity is not solar powered and, therefore, doesn't suffer from the same power issues resulting from the darkening skies that Opportunity does.
The dust storm that is challenging Opportunity closed in on Gale Crater over the weekend with a substantial increase in dust levels.
Curiosity pulled away from the "Duluth" site yesterday, but given the blocky nature of the "Blunts Point" member and the sand in between those blocks, she did not get far.
The last time Curiosity drove anywhere was 30 martian days ago. A lot has happened in these past 30 sols.
The investigation of the Duluth drill hole is going well, and is expected to continue on Sol 2082.
Sol 2081: "Just a Bunch of Dirt"
The final several sols of Curiosity's drill activities at "Duluth" are devoted mostly to imaging and to analysis of the pile of drill tailings that are dumped on the ground after the delivery to the instruments.
On Earth we have multiple means of communication-cell phone, text messages, land line, e-mail, and good old snail mail. On Mars the rover basically has three-a UHF antenna that communicates with satellites orbiting Mars, a low-gain antenna (LGA) that does not need to be pointed but only handles a low data flow, and a high-gain antenna (HGA) that requires accurate knowledge of Earth's position to receive or send commands directly.
Over the weekend, an error cropped up during a regular test of the high gain antenna actuators, leaving the antenna unavailable for uplink of today's plan, but otherwise healthy.
Today we planned a weekend's worth of activities for Curiosity. For our weekend plan, we have two main priorities: perform another analysis with CheMin on our Duluth drill sample and continue our campaign of dust storm monitoring.
Today, Sol 2075, was a fairly straightforward day of planning, as most of the plan will be devoted to carrying out a methane experiment with our SAM instrument to analyze an atmospheric sample.
Today we received the happy news that the SAM instrument received enough sample to conduct its "evolved gas" analysis of the powdered rock from our "Duluth" drill hole!
The focus of MSL operations continues to be on the analysis of the Duluth drill sample.
We received confirmation that the "Duluth" drill sample was delivered to SAM this weekend, so we're ready to run our evolved gas analysis (EGA) tosol!
Every single day that the Curiosity team gets to go into work and operate a one-ton rover on the surface of Mars is a good day.
We're looking forward to analyzing some great drill samples from the "Duluth" rock target in Curiosity's Chemistry and Mineralogy instrument, CheMin.
Sol 2067: 'Tis the Season to be Dusty.
The previous plan included some tests of the sample delivery system, including delivery of a single portion to the closed cover of the SAM inlet. The imaging showed a small amount made it, but not as much as we'd hoped.
Some of the Duluth drill sample was dropped into CheMin on Sol 2061, but not enough for a proper mineralogical analysis. So the top priority for today's plan is to again test the new drop-off procedure.
After successfully drilling the "Duluth" target on Sol 2057 (as seen in the above Mastcam image), the science team is eager to find out what it's made of. As SOWG Chair today, it was exciting to plan the drop-off of material to CheMin and overnight CheMin analysis. Hopefully we'll get some good data about the mineralogy of this sample!
This past weekend, Curiosity successfully drilled into the "Duluth" rock target, generating a beautiful pile of drill tailings!
This weekend, Curiosity will attempt to sink the drill into the complexly-layered "Duluth" block.
I was excited to learn earlier this week that my native city was chosen as the name of the latest drill site on Mars! The name was selected by geologists on the mission to recognize the Duluth Complex, one of the largest intrusions of gabbro on Earth, along the north shore of Lake Superior.
Our sol 2054 plan was limited by a small morning downlink. Occasionally, the flight paths of the Mars orbiters over Gale Crater don't have favorable geometries for relays with Curiosity, and this means our data downlink passes are smaller than average. Today we received only 1.6 MB (Megabytes) of data at the start of our planning day.
Sol 2053: Bump to "Duluth"
A successful drive on Sol 2052 brought Curiosity within bumping distance of what will likely be our next intended drill target. The science team named this target "Duluth." Duluth is a beautifully exposed Murray formation block visible in the Navcam image above. From our current location, we have a really nice vantage point of both the top and sides of the Duluth block. Analyzing blocks that have this kind of 3-D expression gives us a great opportunity to assess the full architecture of the rock.
Rather than driving almost 11 meters, Curiosity only drove about 1/2 meter before stopping. So, we found ourselves looking at images of previous wheel tracks and contact science targets rather than a new location.
Curiosity is currently investigating the Blunts Point member of the Murray formation, and searching for a suitable location to drill in the near future.
Today is the third and final day that I'm serving as SOWG Chair this week at JPL, and I was happy to see that the bump we originally planned for Sol 2046 completed successfully on Sol 2047, placing the rover in a good position for contact science on a couple of bright blocks in front of the rover.
In Curiosity-speak, a "bump" is a short drive the rover performs to better position itself for a particular science investigation (often contact science with the rover's arm). Yestersol's plan intended to include such a bump to reach a suitable target for contact science, but unfortunately the drive did not execute.
As Curiosity continues to descend the Vera Rubin Ridge and back into the Murray formation, the science team is doing their best to characterize, for a second time, all of the structural, chemical, and spectral variations originally seen as we climbed up the ridge.
The drive planned on sol 2045 will take Curiosity off of Vera Rubin Ridge and back into the broken-up rocks that comprise the Blunt's Point member of the Murray formation.
Curiosity continued her journey off of the "Vera Rubin Ridge," driving west along the ridge flank toward a passable route down to the bedrock north of the ridge. Her stop today may have been brief, but it was ehhhhhhxcellent.
Our drive from Sol 2039 was successful, and the plan for sol 2040 is to continue driving to the west.
Sol 2039: All eyes on "Red Cliff"
Following some fantastic preliminary imaging from yestersol, today's plan (Sol 2039) is dedicated to additional imaging of "Red Cliff" before continuing to drive toward a location where we think we are likely to drill. We have a short science block to start the day, during which we'll use Mastcam to take some context imaging of our surroundings and upcoming terrain.
A successful drive in the weekend plan set Curiosity up nicely for a full sol of contact and remote science.
Curiosity continues to pick her way downhill off the "Vera Rubin Ridge" and onto the Murray formation rocks below. This weekend's plan only covers two sols, to give Earth planning time and Mars time a chance to realign so that the science team is not up in the middle of the night commanding the rover.
Curiosity is continuing her march to the north and west, descending through the stratigraphic layers exposed in Vera Rubin Ridge and working her way back towards the unit known as the Blunts Point member, just below the ridge.
Curiosity drove a little over 16 m to the west this weekend. The rover is currently skirting around the southern edge of a small, blocky impact crater on its way north off the Vera Rubin Ridge.
This drive was remarkable because it marked a shift in Curiosity's strategic campaign: we have officially finished our initial reconnaissance of Vera Rubin Ridge, and we are beginning our journey down off the ridge, heading north into an area where we would like to test the rover's drill.
This was a week of transition for Curiosity's environmental science team. The cloudy season on Mars has ended as we've seen a marked decrease in water ice cloud activity in our Navcam sky movies over the last several weeks and we're moving quickly into the dusty season on Mars.
Over the weekend Curiosity completed a 13 meter drive from some interesting float rocks including some potential breccias to "Suilven Ripple", a sand ripple where it will characterize the grain sizes and ripple morphology. Today is a 2-sol plan with no drive.
The Sol 2020 drive completed successfully, placing the vehicle in a good position for contact science on the Waternish conglomerate.
The top science priority for this plan is to acquire all of the data needed to adequately characterize the rocks at the current location before driving away.
For the past few sols Curiosity has been exploring a diverse assemblage of cobbles and boulders on Vera Rubin Ridge, trying to understand how this blocky deposit came to be, and what the variety of rock types can tell us about geologic processes in Gale crater.
An eclectic mix of rock targets has kept our team's attention for another sol today.
Like Harry Potter in Honeydukes or Charlie in the Chocolate Factory, Curiosity rolled up to the proverbial candy store today, wondering "where to begin?!" The variety of rock types in the workspace, the likes of which had not been seen for many hundreds of sols, made picking favorites a challenge.
For much of the last year, Curiosity has been exploring fine-grained rocks along Vera Rubin Ridge, and investigating red and gray color variations. Recently, something else caught our eye: dark cobbles and boulders exposed in patches, as seen in the above Mastcam image.
After a 38 meter drive Curiosity reached the location that the team has called Region 13 of Vera Rubin Ridge.
After failing to pass SRAP (the process that makes sure the rover is safe to use its arm) on the previous sol, we finished up the set of observations possible at this location.
After the weekend drive, the rover ended up in a spot that was a little too unstable to pass the Slip Risk Assessment Process (SRAP). That means that there is a slight chance that the rover's footing might shift if the robotic arm is extended, which is not ideal for the safety of our contact science instruments, so for the Sol 2011 plan we chose not to use the arm and instead focused on remote sensing.
Yesterday Curiosity drove 35 m to the southeast, which set us up for some great contact science on the rim of a small impact crater.
Sol 2007: "Today is a Shetland Day!"
The science team today had a few tough decisions to make to balance time and power.
Sol 2006: Three (Martian) Years on the Surface!
As of ~9:00pm Pacific Daylight Time this evening, Curiosity will have made three revolutions around the Sun while exploring Gale crater.
After completing a nearly 55m drive, Curiosity found itself sitting right in the middle of the strongest spectral detection of hematite identified along its path up Mt. Sharp.
For Sol 2004, Curiosity threw it back to the 2004's sleeper hit Mean Girls when the rover said, "Stop trying to make 'drive' happen." The weekend drive stopped after just a few meters due to a high current warning from the right middle wheel.
Curiosity is currently sitting in front of a steep outcrop that shows some interesting geologic relationships between rocks in the Vera Rubin Ridge.
Today marks a milestone for Curiosity. Our trusty Martian rover has spent 2000 sols exploring Gale Crater helping to unravel the geologic history preserved in the rocks.
Curiosity is but 1 sol away from a major mission milestone, but work always comes before celebrations.
Today was a fairly quiet day of planning on Mars, the reason being that most of the MSL science team is currently attending the Lunar and Planetary Science Conference (LPSC) in Houston, Texas.
As we drive east across the top of "Vera Rubin Ridge" - backwards no less! - we encountered another nice patch of bedrock in Curiosity's workspace today, motivating multiple observations before we hit the road once again.
After a successful weekend plan, the team decided that for the sol 1991-1992 plan, we would trade a longer-distance drive in favor of some "touch and go" contact science. This ensures that we have a good record of the variations in chemistry and rock texture as we drive along the Vera Rubin Ridge.
We found out this morning that in the Sol 1986 plan, ChemCam was marked as "sick" and did not run its sequences.
Seasons make a big difference for Mars vistas. Tosol Mars is at solar longitude 139, meaning that it is halfway between winter solstice and spring equinox in the southern hemisphere where Curiosity resides.
Sol 1985: How Hard is a Rock?
Last week when the first Vera Rubin Ridge drill-hole attempts turned out to be too shallow at "Lake Orcadie", discussion in the team turned to the question of, "How hard is that rock?
Vera Rubin Ridge is as hard as a rock! After two drilling attempts, Curiosity's drill was not able to dig into the bedrock sufficiently to collect a sample of rock at this location.
All of the data returned for the second drill target, called "Lake Orcadie 2," support the decision to attempt to acquire sample at that location using feed-extended drilling.
Today, Sol 1980, we're taking a break from drilling activities to continue with our remote science campaign at our current location. We have three science blocks in today's plan, which we've filled to the brim with a variety of observations.
It is an exciting time for the Curiosity team. Although the drill was able to create a hole, Mars stubbornly refused to let the drill reach a depth where a rock sample could be collected and has driven Curiosity away from "Lake_Orcadie".
The tactical planning schedule was delayed by 2 hours today so that we would have the latest data from Sol 1977 available for planning. When the data arrived, it quickly became clear that the feed-extended drilling did not complete as planned.
After a successful drill preload test, Curiosity was primed to drill for the first time in about a year.
Curiosity has returned to its primary mission of drilling rocks on Mars in an attempt to rescue critical science on the Vera Rubin Ridge from the clutches of vile mechanical failures.
Sol 1973: Go for Drilling!
Curiosity is officially go for drilling the "Lake Orcadie" target! After more than a year's wait for the drill to come back online, the rover planners and engineers are confident and ready to proceed with a test of a new drilling method in the coming days.
Tosol we planned to finish up our suite of observations on the "Ogunquit Beach" sand sample that was off-loaded from the rover over the weekend.
Over the weekend, Curiosity successfully off-loaded the sample she acquired previously, the "Ogunquit Beach" sand sample, in preparation for what the science team hopes is acquisition of a new *drilled* rock sample very soon.
The DRT brushing of the potential drill target completed successfully, as did SAM's recent analysis of the Ogunquit Beach sample, and the rover is healthy and ready for more!
We are planning 2 sols today to get a head start on the holiday weekend planning. We had several options today, including mobility and contact science with or without brushing, which made for an interesting day for me as SOWG Chair.
For the last several months, the science, engineering and operations teams have only met three days a week to plan activities for Curiosity in order to give the engineers more time to focus on bringing the drill back online.
Like yesterday, today's plan is a bit on the thin side, as the rover's power allotment will be primarily dedicated to activities associated with the Sample Analysis at Mars (SAM) and its preparation for a planned power-hungry experiment in tomorrow's plan.
Over the weekend Curiosity drove ~52 m to the northeast to another patch of gray bedrock. The team is interested in characterizing the gray bedrock to determine if we might want to drill here.
Today we planned for a weekend of activities at the same location we've been at all week.
Recovering from the SAM fault proved more challenging than expected, so our planned drive to the patch of pale tan bedrock in the image above did not take place. We took advantage of the fact that we have been parked at this same site for several sols to acquire both new and less-common types of observations.
Over the past several months we've made excellent progress up and along the Vera Rubin Ridge (VRR), taking stunning mosaics and using our instrument payload to examine the local geology. Today we planned for Sols 1957-1958, during which we will continue our VRR investigations and drive further along to our next area of interest. Unfortunately, SAM experienced a minor fault over the weekend, so we'll be delaying those activities - a preconditioning test for an upcoming geochronology experiment - to Wednesday's (Sol 1959) plan.
Every February 2nd the people of the United States and Canada observe a quirky holiday called Groundhog Day.
Sols 1952-1953: Another "touch and go"
Along with many of my MSL colleagues, I'm attending our semi-annual science team meeting, enjoying the presentations and discussion of recent results and plans for the future.
Going in to planning today, there was a concern that we would run up against constraints on power and complexity that might force us to eliminate some of the science we wanted to do.
Curiosity diverted from our primary "Mount Sharp Ascent Route" a couple weeks ago as we continued to investigate the outcrops of bluish-toned rock that are scattered around this region of the Vera Rubin Ridge.
Having spent 1943 sols on the surface of Mars, Curiosity is in its 6th Earth year on Mars, but it is in its 3rd Mars year of exploration. That means Curiosity has encountered this season of the year twice before.
We're sorry, but we will not be posting updates to this blog during the government shutdown. Also, all public NASA activities and events are cancelled or postponed until further notice. We'll be back as soon as possible! Sorry for the inconvenience.
The Sol 1939 drive went well, placing MSL next to the bright/dark transition seen at the right side of this image.
Today's two-sol plan will wrap up activities at Vera Rubin Ridge location "e." When we assessed the downlink data this morning, we were excited to see that ChemCam did a great job with some very precise pointing in the previous plan. At location "e" we have been focused on understanding small-scale features, like the tiny crystals and veins seen in the above ChemCam RMI image.
Today we're continuing our science activities at the Vera Rubin Ridge (VRR) location "e." It certainly seems that "e" should stand for "exciting," as we've collected quite a rich set of observations at this location, including extensive imaging and geochemical analyses.
What's in a name? From its rather innocuous sounding informal site name, you might not guess that location "e" would generate such excitement in the science team. The first thing the science team on shift did was decide to stay at the current location rather than drive away. This was primarily driven by the large suite of excellent science targets available in the workspace. These targets continue to help constrain the geologic story of the Vera Rubin Ridge.
Curiosity has made it to "Region e" of the Vera Rubin Ridge (VRR) campaign. This location is a slight depression with exposed fractured bedrock that appears more "blue" from orbit than the surrounding region. In addition, the orbital evidence and observations from the ground suggest that this location is similar to "Region 10" that we visited just last week.
For the last several weeks, Curiosity has been hopping between areas of blue-ish toned rocks on the Vera Rubin Ridge and the results from these locations continue to become more compelling.
Sols 1927-1928: Layers of fun!
Today's image is a color version of part of the workspace image from the Sol 1925-1926 blog, which shows in greater detail the numerous layers and color variations that kept us at this spot for another round of science observations.
There's no real rest for the rover. We planned sols 1921-1924 on December 22 and 29. Earlier, the team had planned a minimal set of activities for the rover to carry out over Sols 1913-1920, letting the science and engineering teams spend a bit of time away from work. | 2019-04-26T08:07:15Z | https://marsprogram.jpl.nasa.gov/msl/mission/mars-rover-curiosity-mission-updates/?y=2018 |
to ensure a decent standard of living for all in accordance with a just economic and social order.
In the name of the high intention noted above we adopt this Constitution by nation-wide referendum.
The Syrian Republic is an independent sovereign state, based on the principle of the rule of the people by the people and for the people, the rule of law, equality of all before the law, social solidarity, respect for rights and freedoms and equality of rights and duties of all citizens regardless of any differences and privileges. The names Syrian Republic and Syria are equivalent.
Syria relies on the unity of its nation and is a common and indivisible homeland for all its citizens. Preserving the national unity and territorial integrity of Syria is the obligation of the State and all its citizens.
As a national heritage that promotes national unity, the Constitution shall guarantee the protection of cultural diversity of the Syrian society.
Syria is a state with a republican form of government.
The sole source of power in Syria shall be its multinational and multi faith people. The people shall exercise their sovereign right to freely and independently determine their own destiny. The People of Syria shall exercise their sovereignty in accordance with the Constitution directly by means of a referendum, and through their representatives elected on the basis of universal, equal, direct suffrage by free, secret and personal ballot.
Nobody except authorized representatives elected by the people shall have the right to represent the people, speak for the people and make declarations on behalf of the people.
No part of the Syrian people, or any social group or organization, or any person may usurp power. The usurpation of power is the gravest crime.
No person may simultaneously occupy the position of a member of the People’s Assembly, a member of the Constituent Assembly, President of the Republic, Prime Minister, a deputy prime minister, a minister, or a member of the Supreme Constitutional Court.
No person carrying another nationality, in addition to the nationality of Syria, may occupy the position of a member of the People’s Assembly, a member of the Constituent Assembly, President of the Republic, Prime Minister, a deputy prime minister, a minister, or a member of the Supreme Constitutional Court.
The power shall be transferred in a peaceful manner, following a democratic process established by the Constitution and the law.
The State shall respect all religions and religious organizations, and ensure the freedom to perform all the rituals that do not prejudice public order. Religious organizations shall be equal before the law.
The official language of the state is Arabic. The law shall regulate how the official language is used.
Government agencies and organizations of the Kurdish cultural autonomy shall use Arabic and Kurdish equally.
Syrian citizens shall be guaranteed the right to educate their children in their native language in state educational institutions and in private educational institutions that meet the educational standards.
The political system of the state shall be based on the principle of political pluralism, and exercising power democratically by secret ballot.
Political parties shall respect the constitutional order, democratic principles, national sovereignty, and territorial integrity of the state.
The law shall regulate the provisions and procedures related to the formation of political parties.
Public office or public money may not be exploited for a political, electoral or party interest.
Ideological diversity shall be recognized in Syria. No ideology shall be proclaimed as State ideology or as obligatory. Public associations shall be equal before the law.
The State shall ensure security and protect the rights and freedoms of national and religious minorities.
The establishment and activities of political parties and other public associations whose goals and activities are aimed at the forcible changing of the basis of the constitutional order and at violating the integrity of the State, at undermining its security, at engaging in terrorism, at creating armed units, at instigating religious, social, racial, national, and tribal strife; and that are based on sectarian, regional, class, professional discrimination, or on discrimination by gender or origin, may not be undertaken. Such organizations may not be part of the social and political system in Syria.
Syria denounces terrorism in all its forms and shall ensure protection of its territories and population against terrorist threats.
The Constitution shall have supreme legal force, direct effect and shall be applicable in the entire territory of Syria.
Laws and other legal acts, which are adopted in Syria, must not contradict the Constitution.
Universally recognized principles and norms of international law as well as international agreements of Syria shall be an integral part of its legal system. If an international agreement of Syria establishes rules, which differ from those stipulated by law, then the rules of the international agreement shall be applied.
Syria shall maintain good neighborly relations with other countries based on cooperation, mutual security and other principles stipulated by international legal rules.
Syria denounces war as an infringement on other countries’ sovereignty and a means to resolve international conflicts.
The territory of Syria is indivisible, inviolable and integral.
The territory of Syria is inalienable. State borders may be changed only after a referendum among all Syrian citizens, as the expression of the will of the Syrian people.
It is the State’s responsibility, and the duty and obligation of every Syrian citizen to safeguard the homeland’s sovereignty, independence, and territorial integrity. In accordance with law, the State shall provide support to the families of citizens who lost their lives while defending independence, sovereignty and territorial integrity of Syria.
Citizens of Syria shall perform military service in accordance with law.
To defend and safeguard the homeland, the State shall create the army and other armed forces.
The army and other armed forces shall be under public oversight and shall defend Syria and its territorial integrity; they may not be used as an instrument of suppression of the people; they may not interfere in politics or participate in the transfer of power.
Performing military or militarized activity outside the domain of state power is prohibited.
In Syria the freedom of economic activity is guaranteed, and private, State, municipal and other forms of property shall be recognized. Property may not be used to infringe on human and civil rights and freedoms, public and State interests, and human dignity.
Developing the economy on the basis of different forms of property is aimed at improving the people’s wellbeing. The State shall use market principles to bolster economic development, guarantee freedom of entrepreneurship and prevent monopolization and unfair competition in economic relations.
The State shall ensure the free flow of goods and financial resources between the regions in accordance with the law.
In accordance with the law, land resources may be subject to State, municipal and private ownership.
Natural resources shall be publicly owned. The law shall regulate how utilization rights for natural resources or concessions are granted.
The law shall regulate taxes and levies. The tax system shall be based on a fair basis.
The State shall take steps to improve the wellbeing of its people in general and each of its citizens; to guarantee the individual’s social security and acceptable living standards.
The State shall support development of culture, education, healthcare, science, and art; protect the environment, and safeguard the people’s historical, material and spiritual legacy.
No discrimination by gender, origin, language or faith shall be allowed.
The family shall be the nucleus of society and the State shall protect its existence and its religious, moral and patriotic value. The state shall also protect maternity, childhood and old age, take care of young children and youth and provide the suitable conditions for the development of their talents.
Children shall have the right to be brought up, taken care of and educated by their parents. Parents shall be entitled to respect and care from their children, especially when parents require it, or due to an inability to work or because of old age.
Slavery, trafficking in women and children, exploitation of children are prohibited and shall be prosecuted by law.
Following a court’s decision individuals may be sentenced to compulsory labor the terms and duration of which are regulated by law. Compulsory labor may also be ordered by authorities during military service, and during the state of emergency – for the kinds of labor as stipulated by law.
Public service shall be a responsibility and an honor the purpose of which is to achieve public interest and to serve the people.
Citizens shall be equal in assuming the functions of public service. The law shall determine the conditions of assuming such functions and the rights and duties assigned to them.
The State and the public shall share responsibility when managing natural and manmade disasters.
Syria consists of constituent parts.
The law states the number of constituent parts, their boundaries and status.
The organization of local administrations is based on applying the principle of decentralization of authorities and responsibilities. The law states the relationship between these units and the central authority, their mandate, financial revenues and control over their work. It also states the way such administrations are appointed or elected.
The law shall state the status of the Kurdish Cultural Autonomy.
The monetary unit in Syria shall be the Syrian pound (lira).
The National Bank of Syria is owned exclusively by the State and shall have the right to emit money and withdraw it from circulation.
The flag of Syria consists of three colors: red, white and black, in addition to two stars, each with five heads of green color. The flag is rectangular in shape; its width equals two thirds of its length and consists of three rectangles evenly spaced along the flag, the highest in red, the middle in white and the lowest in black, and the two stars are in the middle of the white rectangle.
The law identifies the state’s emblem and its national anthem.
Everyone shall have the right to life, security and freedom and the State shall guarantee these rights. No right can be restricted or denied to a person unless otherwise provided by law and following the decision by the appropriate judicial authority.
All persons shall be equal before the law without discrimination among them on grounds of gender, race, nationality, origin, color, religion, personal convictions, beliefs or views, and economic and social status.
Everyone shall have the right to participate in the political, economic, social and cultural life.
Citizens, men and women, shall have the right to participate in managing State affairs and exercise their political rights including the right to elect and be elected.
No person shall be coerced to become a member of any party, association, society or political organization, or to keep his or her membership in said organizations.
Everyone shall respect and observe the Constitutions and laws.
Everyone shall be guaranteed freedom of thought and speech, and freedom of conscience and religion. Nobody shall be forced to express his thoughts and convictions or to deny them.
The State shall guarantee the freedom of conscience and the protection of places of worship. Sacred shrines and religious sanctuaries shall be considered places of religious and cultural importance, and the State shall assume the responsibility to safeguard and protect them.
Everyone shall have the right to participate for lawful purposes in meetings, peaceful rallies and strikes.
Everyone shall have the right freely to seek, receive, transmit, produce and disseminate information by any legal means. In accordance with the law the State ensures freedom of the press and mass media.
Propaganda or agitation, which incites social, racial, national or religious hatred and hostility, and propaganda of social, racial, national, religious or linguistic supremacy, shall be prohibited.
The law shall regulate the Syrian citizenship.
A citizen of Syria may not be deprived of his (her) citizenship.
A citizen of Syria may not be deported from Syria or extradited to another state.
Every citizen may freely enter and leave Syria unless otherwise stipulated by law and expressed in an applicable decision of the court or the prosecutor’s office.
Persons who are persecuted for their political convictions may not be extradited to other states.
Syria shall guarantee protection and patronage to its citizens living abroad permanently or temporarily.
Everyone shall have the right to the inviolability of his (her) person, home, personal and family privacy.
Collecting, keeping, using and disseminating information about the private life of a person shall not be permitted without his (her) consent.
The State shall guarantee a person’s right to privacy of correspondence, of telephone conversations and of postal, telegraph and other communications. This right may be limited by law to prevent a crime or to uncover the truth when investigating a crime.
Except when the law says otherwise or when following a court’s order, nobody may enter a home against the will of its occupants.
Everyone shall have the right to property.
Property rights, including individual private ownership, shall be protected by law.
Nobody may be deprived of property except under a court order. Private ownership may be removed in the State or public interest only against fair compensation according to the law.
The State shall guarantee the right of inheritance in accordance with the law.
Labor is the basis for personal and public prosperity. Everyone shall have the right to freely choose the type of activity, occupation and place of work based on his (her) skills. The State shall use all means at its disposal to eliminate unemployment.
Everyone shall have the right to work in conditions, which meet safety and hygiene requirements, and to receive remuneration for labor without any discrimination whatsoever.
Everyone shall have the right to rest. For those working under labor contracts the duration of work time, days of rest and public holidays and annual paid leave established by federal law shall be guaranteed.
The law shall regulate employer-employee relations based on economic principles and the norms of social justice.
The State shall guarantee the right of its people to lawfully form labor associations and unions and to join them.
Individual and collective labor disputes are to be resolved in a manner stated by law.
Everyone shall be obliged to pay legally established taxes and levies.
Everyone shall be guaranteed social security payments for legal retirement age, in case of illness, disability, loss of breadwinner, incapacitation, unemployment, and in other cases specified by law. Minimum state pensions and social benefits shall be established by law.
Helping people in need is the obligation of his (her) family members.
The State shall facilitate development of charity movements, voluntary social insurance programs and other forms of social security.
Everyone shall have the right to participate in cultural life, and use cultural establishments and access cultural valuables.
Everyone shall respect the historical, cultural and spiritual heritage; take care of it and protect historical and cultural monuments.
Everyone has the right to health protection and medical care in state and municipal health institutions.
The State shall take the necessary measures to develop all forms of health services based on various forms of property and guarantee sanitary and epidemiological well-being.
Everyone shall have the right to education. The State shall guarantee free secondary education. The law shall specify cases when a person can receive free secondary vocational and higher education.
The education system is controlled by the State.
The State shall encourage and promote physical culture and sport. It shall also provide everything needed for such purposes.
The state shall support scientific research and guarantee the freedom of scientific, literary, artistic, and cultural creative activity. It shall also provide for the development of talents and abilities, and allocate the funds necessary for such purposes.
The State shall encourage scientific and technological inventions, creative skills and talents and protect their results.
No one can be unlawfully deprived of a home.
The State shall promote housing construction and create conditions for exercising the right to a home.
Punishment shall be personal; no crime and no punishment except by a law.
Anyone shall be considered innocent until his (her) guilt is proven and confirmed by a court sentence which has entered into legal force.
No immunity of any act or administrative decision from judicial review shall be allowed.
A law, which introduces or increases liability, shall not have retroactive force.
No one may be investigated or arrested, except under an order or decision issued by the competent judicial authority, or if he was arrested in the case of being caught in the act, or with the intent to bring him to the judicial authorities on charges of committing a felony or misdemeanor.
No one may be tortured or treated in a humiliating manner, and the law shall define the punishment for those who do so.
Any person who is arrested must be informed of the reasons for his arrest and his rights, and may not be incarcerated except by an order of the competent judicial authority.
Any person sentenced by a final ruling, who has carried out his sentence and the ruling proved wrong shall have the right to ask the state for compensation for the damage he suffered.
Any assault on individual freedom, on the inviolability of private life or any other rights and public freedoms guaranteed by the Constitution shall be considered a crime punishable by law.
The legislative authority is assumed on behalf of the Syrian people by the People’s Assembly and the Constituent Assembly in the manner prescribed by the Constitution and applicable laws.
Members of the People’s Assembly shall be elected by the public, secret, direct and equal vote. They shall represent the whole people of Syria.
The People’s Assembly shall continue to meet and exercise legislative authority until the new People’s Assembly is elected and holds its first meeting.
If the membership of a member of the People’s Assembly is vacant for some reason, an alternative shall be elected within sixty days from the date of the membership vacancy, provided that the remaining term of the People’s Assembly is no less than six months. The membership of the new member shall end by the expiry date of the mandate of the Assembly’s term. The Election Law shall determine the cases of vacant membership.
The system of electing members of the People’s Assembly, their number and status shall be determined by a law.
Voters shall be the citizens who have completed eighteen years of age and meet the conditions stipulated in the Election Law.
5. organization of the election campaign and the use of media outlets.
4. Elections shall be held during the sixty days preceding the expiry date of the mandate of the People’s Assembly term.
The Supreme Constitutional Court shall have jurisdiction to consider appeals related to the elections of the members of the People’s Assembly.
Appeals shall be submitted by the candidate within three days from the date of announcing the results; and the court shall make its final judgment within seven days from the expiry date of submitting appeals.
The People’s Assembly shall convene following a decree of the President of the Republic within fifteen days after the mandate of the current People’s Assembly expires.
The People’s Assembly shall meet on the sixteenth day after the mandate of the current People’s Assembly expires, if there is no decree by the President of the Republic.
The People’s Assembly shall call for three regular sessions per year; the total of which should not be less than six months, and the Assembly’s rules of procedure shall set the time and duration of each of them.
The People’s Assembly may be invited to extraordinary sessions upon the request of the Speaker, of one third or more of the members of the People’s Assembly, or of the President of the Republic.
The last legislative session of the year shall remain open until the approval of the state budget.
The Constituent Assembly shall be formed to ensure participation of representatives of the constituent parts in legislative activities and administration of the state.
The Constituent Assembly consists of representatives of the constituent parts.
The People’s Assembly and the Constituent Assembly hold sessions separately.
The People’s Assembly and the Constituent Assembly may meet together to elect and to hear the Prime Minister, the President of the Republic, speeches of leaders of foreign states, and in other cases specified by the Constitution and law.
The People’s Assembly and the Constituent Assembly shall adopt the rules of procedure to coordinate their work and exercise authority.
The People’s Assembly and the Constituent Assembly elect speakers from among their members. In accordance with the rules of procedure the speakers shall represent the Assemblies and perform organizational functions.
The People’s Assembly and the Constituent Assembly may form committees from among their members to deal with the issues related to exercising their authority.
In carrying out their duties, the members of the People’s Assembly and the Constituent Assembly shall be guided by the Constitution, and their mandate can be restricted only in accordance with the Constitution.
The members of the People’s Assembly and the Constituent Assembly shall not use their mandate for personal gain outside the focus of their activity. A law shall specify activities that can not be combined with the mandate of a member of People’s Assembly and a member of the Constituent Assembly.
The members of the People’s Assembly and the Constituent Assembly can not be held legally responsible for their votes or political opinions expressed in exercising their authority.
Before taking office the members of the People’s Assembly and the Constituent Assembly shall give the constitutional oath stated in Article 17 of the Constitution.
A member of People’s Assembly and a member of the Constituent Assembly can not be detained, arrested, searched or brought before the court without a prior permission from the Assembly to which he belongs.
A member of People’s Assembly and a member of the Constituent Assembly caught in the act may be detained and searched. The Minister of Justice shall immediately notify the Speaker of the respective Assembly about the detention and search. If the notified Assembly (and, if the Assembly is not in session, the Speaker) states that there are no grounds for detention, the measure shall be canceled immediately. If the Assembly is not in session, the Speaker of the Assembly shall call it for a special session to consider initiating criminal proceedings against the member of the Assembly and applying restraining measures.
The emoluments and compensations to members of the People’s Assembly and the Constituent Assembly shall be determined by a law.
7) deciding whether to terminate the mandate of an Assembly member.
8) deciding whether to terminate the mandate of an Assembly member.
The legislative initiative belongs to the members of the People’s Assembly, of the Constituent Assembly, the President of the Republic and the Government.
Upon the request by administration of a territorial unit the Constituent Assembly shall have the right to send bills to the People’s Assembly for consideration.
Bills shall be submitted to the People’s Assembly.
Laws shall be adopted by the People’s Assembly.
A law is adopted by a majority vote of all deputies of the People’s Assembly.
Laws adopted by the People’s Assembly shall be submitted within five days to the Territories Assembly for consideration.
A law is considered approved by the Constituent Assembly, if more than half of the total number of its members voted in favor of it.
If the Constituent Assembly rejects the law a conciliatory commission may be set up by the Assemblies to resolve differences, whereupon the law shall be reconsidered by the Constituent Assembly.
If the People’s Assembly disagrees with the decision of the Constituent Assembly, the law shall pass if at least two thirds of the total number of deputies of the People’s Assembly voted for it the second ballot.
The law approved or adopted in the second ballot shall within five days be forwarded to the President of the Republic, who shall sign it and promulgate it within fourteen days.
The President of the Republic has the right to reject the law within fourteen days after receiving it. In this case the People’s Assembly and the Constituent Assembly shall have the right to reconsider the law. If after the reconsideration the law is approved in its earlier adopted edition by at least two thirds of the total number of members of the People’s Assembly and the Constituent Assembly, it shall be signed and promulgated by the President of the Republic within seven days.
For every fiscal year there shall be one budget; and the beginning of a fiscal year shall be determined by a law. Appropriations cannot be transferred from one title to another except according to the provisions of the law.
The Government shall submit the draft budget to the People’s Assembly at least two months before the beginning of the fiscal year.
The budget shall be considered, approved, signed and promulgated in the order prescribed by Article 46 of the Constitution. The People’s Assembly shall vote separately on each title of the budget.
If the process of approving and promulgating the budget is not complete before the beginning of the new fiscal year, the budget of the previous years is used until the new year budget is approved, and the revenues are collected in accordance with the laws and regulations in force.
The budget may be approved together with laws which could create new expenditures and new revenues to cover them.
The final accounts of the fiscal year shall be presented by the Government to the People’s Assembly within a period not longer than one year as of the end of this year.
The President of the Republic and the Government of the Republic exercise executive authority on behalf of the people within the limits provided for in the Constitution.
The President of the Republic is elected for the term of 7 years by citizens of Syria on the basis of universal, equal, and direct suffrage by secret ballot.
No person can hold the office of the President of the republic for more than two consecutive terms.
The candidate who wins the election for the President of the Republic is the one who gets more than one half of votes of those who take part in the elections. If no candidate receives such majority, a rerun is carried out between the two candidates who receive the largest number of votes.
The results shall be announced by the Speaker of the People’s Assembly.
If the President’s term in office has expired and no new President has been elected, the existing President of the Republic continues to assume his duties until the new President is elected.
A candidate for the presidency must be over 40 years of age and hold the Syrian citizenship.
4) applications shall be examined by the Supreme Constitutional Court; and should be ruled on within 5 days of the deadline for application.
If the conditions required for candidacy were met by only one candidate during the period set for applying, the Speaker of the People’s Assembly decides on the postponement of the elections of the President of the Republic and calls for fresh nominations according to the same conditions.
The Supreme Constitutional Court has the jurisdiction to examine the challenges to the election of the President of the Republic.
The challenges shall be made by the candidate within 3 days of announcing the results; and the court makes a final ruling on them within 7 days after the deadline for making the challenges.
Before assuming his duties the President of the Republic shall be sworn in before the People’s Assembly and the Constituent Assembly by saying the constitutional oath mentioned in Article 17 of the Constitution.
The allocations required for the office of the President of the Republic shall be set out in the budget.
1. The President of the Republic is the guarantor of the independence, unity and territorial integrity of the country.
2. The President of the Republic shall enforce the Constitution, ensure continuous operation of public authorities, and protect the constitutional order, national sovereignty and territorial integrity.
3. The President of the Republic shall act as an intermediary for the state authorities, and between the state and the society. To resolve disputes between the state bodies, the President has the right to use conciliatory procedures.
4. The President of the Republic represents Syria in international relations.
5. The President of the Republic shall decide on issues of citizenship and granting of political asylum, award state medals and honors, confer supreme military ranks and supreme special titles; and grant pardon.
The President of the Republic has the right to address letters to the People’s Assembly and the Constituent Assembly, as well as make statements before them.
The President of the Republic issues decrees, edicts and instructions in accordance with the Constitution and the law.
The President of the Republic shall conclude international treaties on behalf of Syria and refer them to the People’s Assembly for ratification.
Upon proposal from the government, the President shall appoint and recall diplomatic representatives of Syria, and approves the establishment and abolition of or change of status for diplomatic missions.
The President accepts credentials and letters of recall of accredited heads of foreign diplomatic missions.
The President of the Republic might call for a referendum on important issues which affect the higher interests of the country. The result of the referendum shall be binding and come into force as of the date of its announcement by the President of the Republic.
The President of the Republic is the Commander in Chief of the army and armed forces; and he issues all the decisions necessary to exercise this authority.
3) declare mobilization and within 3 days of such declaration ask the Constituent Assembly to approve it.
In the event of aggression or threat of aggression against Syria, or threats to the security of the state, the President shall have the right to declare the state of emergency in the territory of the country or in its certain parts with prior approval from the Constituent Assembly. In exceptional cases the decision of the President of the Republic is sent for approval to the Constituent Assembly within a day after making such a decision. When the state of emergency is in effect, the People’s Assembly, the Constituent Assembly and the President of the Republic shall continue to exercise their authority. Besides, the no-confidence vote cannot be made to the government.
The President of the Republic may be removed from office by the Constituent Assembly only after the People’s Assembly brings against him charges of high treason or another grave crime, and the legality of such charges and of the procedure for bringing them up have been confirmed in the Supreme Constitutional Court’s resolution.
The decision of the People’s Assembly to bring up charges and the decision of the Constituent Assembly to remove the President from office must be made by two thirds of all the votes of the members of each Assembly following the initiative from at least one third of the members of the People’s Assembly.
3. The decision of the Constituent Assembly to remove the President of the Republic must be adopted not later than ninety days after the People’s Assembly brings up the charges against the President. If within this period the Constituent Assembly fails to adopt such a decision, the charges against the President shall be regarded as rejected.
If the office of the President of the Republic becomes vacant or if he is permanently incapacitated, the Prime Minister assumes the President’s duties for a period of no more than 90 days of the President of the Republic’s office becoming vacant or his permanent incapacitation. When the Prime Minister is unable to perform such duties, the functions of the President are delegated to the Speaker of the Constituent Assembly. Within the stated period of time new presidential elections shall be held.
In case of resignation, the President of the Republic shall inform the People’s Assembly and the Constituent Assembly about it.
The Government is the highest executive body. It consists of the Prime Minister, his deputies and ministers. The government shall control the implementation of laws and development plans, and the work of state bodies.
The Government shall be responsible before the President of the Republic, the People’s Assembly and the Constituent Assembly.
The President of the Republic determines the general directions of the Government activities. He has the right to summon the Government for a meeting, to preside at the government meetings, to request reports from the Prime Minister, his deputies and ministers.
The Prime Minister manages the Government, coordinates and controls the work of his deputies and ministers, speaks on behalf of the Government.
The President of the Republic appoints the Prime Minister, his deputies and ministers, accepts their resignations and dismisses them.
The President shall appoint deputies to the Prime Minister and ministers based on the proportionate representation of all ethnic and religious groups of the Syrian population; some positions shall be reserved for national and religious minorities. Regarding these issues the President of the Republic has the right to hold consultations with the members of the People’s Assembly and the Constituent Assembly.
The Prime Minister, his deputies and ministers are sworn in before the President of the Republic by saying the constitutional oath stated in Article 17 of the Constitution.
Within thirty days after the formation of the Government, the Prime Minister shall submit the program of actions to the People’s Assembly and to the Constituent Assembly for discussion at a joint session.
Members of the People’s Assembly and the Constituent Assembly have the right to send inquiries to the Government, the Prime Minister, his deputies and ministers according to the assembly’s rules of procedure.
9) it appoints and dismisses civil servants and servicemen in accordance with the law.
1. The Government issues decisions and regulations.
2. Decisions are issued in the furtherance of the laws.
3. Regulations shall be based on a law giving the Government authority to issue such a regulation.
The Prime Minister, his deputies and ministers are forbidden from being on the boards of private companies or from representing such companies, as well as from engaging in direct and indirect commercial activities and private entrepreneurship.
The law shall state what responsibilities shall be imposed on the Prime Minister, his deputies and ministers to prevent and resolve a conflict of interest.
The People’s Assembly, the Constituent Assembly and the President of the Republic have the right to call for criminal prosecution of the Prime Minister, his deputies and ministers for acts committed by them while exercising authority. Bringing a member of the government before the court leads to his suspension from his office.
The government shall continue its work until a new government is formed.
The People’s Assembly and the Constituent Assembly may obtain a no confidence vote in the Government at a joint session by a majority of votes of all the members of the People’s Assembly and the Constituent Assembly.
The no confidence vote may be initiated by no less than one third of all the members of the People’s Assembly or by no less than one third of all the members of the Constituent Assembly. The government shall be informed of the vote on the day of such proposal.
The no confidence vote is submitted for discussion three days after the initial proposal at a joint session of the People’s Assembly and the Constituent Assembly.
If the no confidence vote is rejected, the members of the People’s Assembly or the members of the Constituent Assembly who initiated the vote cannot initiate a new no confidence vote during the term of the People’s Assembly.
Judges are independent and there is no authority over them except that of the constitution and law.
The judges’ honor, conscience and impartiality constitute the guarantees for people’s rights and freedoms.
Judicial rulings are made in the name of the people of Syria.
The judicial system and courts’ powers are defined by law.
The Attorney General’s Office is the single judicial institution headed by the Minister of Justice. The law regulates its function and mandate.
The State’s Council is in charge of Administrative Judiciary. It is an independent judicial and advisory body. The law states its mandate and the status of The State’s Council members.
The Supreme Constitutional Court consists of at least seven judges, appointed by the Constituent Assembly.
In addition to the public offices stated by the Constitution, the law may indicate other positions and offices that are incompatible with the position of a judge on the Supreme Constitutional Court.
The term in office of a Supreme Constitutional Court judge shall be four years and renewable.
Judges of the Supreme Constitutional Court cannot be dismissed except when the law allows it.
1) Control over the constitutionality of laws, decrees, bylaws and regulations of public authorities.
2) Expressing opinion, upon the request of the President of the Republic, on the constitutionality of draft laws and the legality of draft decrees.
3) Overseeing the election of the President of the Republic and organizing the relevant procedure.
4) Considering challenges against the election of the President of the Republic and ruling on these challenges.
5) Trying the President of the Republic who was removed from the office after committing high treason or another grave crime.
The law shall specify other authority of the Supreme Constitutional Court and the process for considering and ruling on the issues under the mandate of the Supreme Constitutional Court, and the status of judges on the Supreme Constitutional Court.
The Supreme Constitutional Court shall not consider the constitutionality of laws put to a referendum that have received the approval of the people.
A proposal for amending the Constitution can be submitted to the People’s Assembly by at least a third of the members of the People’s Assembly, or by at least a third of the members of the Constituent Assembly, or by the President of the Republic.
To be considered final, the proposal for amending the Constitution must be approved by a three quarters majority of the People’s Assembly, endorsed by a three quarters majority of the Constituent Assembly, then signed by the President of the Republic and promulgated.
If the proposal for amending the Constitution is not endorsed by the Constituent Assembly, such proposal shall be withdrawn and not considered further.
Laws and other legal acts passed before this Constitution comes into force shall apply until amended in accordance with the Constitution. The respective amendments shall be made within no longer than one year from the date the Constitution comes into force.
The term in office of the current President of the Republic shall be 7 years from the swearing-in date. He has the right to run again for President of the Republic. The President’s term in office as stated in this Constitution shall apply to him as of the next presidential elections.
Elections for the first People’s Assembly under this Constitution shall be held after the term of the previous People’s Assembly expires.
The Constituent Assembly shall be formed within no more than one year from the date the Constitution comes into force.
The Constitution shall come into force on the day of its promulgation after the referendum. | 2019-04-23T04:52:40Z | https://syrianconstitution2017.wordpress.com/2017/01/31/draft-constitution-of-the-syrian-arab-republic/ |
Before I get to this insanely delicious recipe, I want to let you know what I’ve been up to this month! Some of you have seen on Snapchat that I’ve been behind the lens each day for a very special photography project—which includes shooting more than 60 brand-new recipe photos! It’s been pretty crazy around here and I haven’t had a day off in ages, but it’s really coming together beautifully. Eric even helped me create a dedicated photography space in our empty dining room and it’s been nice to have a set area to shoot (why did it take me so long to do this?). We’re gearing up to share this new project with you late winter, and I appreciate your patience as things will continue to be a bit slower around here as I complete the photography project this month. If you want to see all the behind-the-scenes action, follow along on Snapchat (username: angelaliddon).
For those of you who have been asking if my next cookbook has a release date, I’m thrilled to tell you that it will release on September 6, 2016. Not too long to go now! You can now pre-order the book in Canada via Amazon.ca and Chapters/Indigo (many more retailers to come). We don’t have a cover yet, but of course I will share the preview with you as soon as I can!
This recipe is honestly one of my favourite entrees in a very long time and I’m so excited to share it with you. This is the recipe to make when you want to blow your friends and family away. Trust me on this one. It’s a spin-off of my favourite vegan enchilada recipe from way back in 2011. Why the heck has it taken me so long to make another? Well, to be honest, I didn’t think I could improve upon that recipe, but I was wrong…very wrong. This version is even more flavourful, satisfying, and robust thanks to the addition of smoky roasted red peppers, umami-rich sun-dried tomatoes, and my favourite homemade enchilada sauce. I top it all off with a decadent cashew cream that’s flavored with cilantro, garlic, and lime. Yowza. This is winter comfort food at its best!
These mild- to moderate-heat enchiladas will change your life! A delicious homemade Enchilada Sauce smothers a sweet potato, roasted red pepper, sun-dried tomato, and black bean filling wrapped in soft tortillas. After baking, I top it all off with a decadent Cilanto-Lime-Garlic Cashew Cream, green onion, cilantro, red pepper flakes, and chopped avocado. This dish will blow your taste buds away, I can promise you that! Please note that the prep time includes making the enchilada sauce and cashew cream in addition to the enchiladas. Yes, it's a labour-intensive recipe for sure, but you can save time the day of by prepping the cashew cream and enchilada sauce the day before.
Prepare the Homemade Enchilada Sauce and soak the cashews for the Cilantro-Lime-Garlic Cashew Cream before you begin.
Lightly grease a large rectangular baking dish (at least 8x12 inches). Set aside.
Add the chopped sweet potato into a medium pot of water and bring to a boil. Reduce heat and simmer for 9 to 15 minutes, uncovered, until fork tender. Drain and set aside. You can also steam the potatoes until tender, instead of boiling.
In a large skillet, stir together the oil, onion, and garlic and sauté over medium heat for around 3 to 5 minutes until the onion softens. Season with a pinch of salt and pepper.
Add the chopped roasted peppers, sun-dried tomatoes, cooked/drained sweet potato, spinach, and black beans. Cook for 3 to 5 minutes over medium-high heat, until the spinach is wilted.
Stir in 1/4 cup plus 2 tablespoons of homemade enchilada sauce, followed by the lime juice, chili powder, cumin, and salt. Adjust seasonings to taste, if desired.
Add 3/4 cup of Enchilada Sauce onto the bottom of your casserole dish and spread it out evenly.
Scoop 3/4 cup of the sweet potato and black bean filling onto each tortilla. Roll up the tortilla and place it, seam side down, in the casserole dish. Repeat for the rest. If you have any leftover filling, you can spread it on top of the tortillas. Spread all of the remaining enchilada sauce on top of the tortillas until they are completely covered in sauce.
Bake the enchiladas, uncovered, at 350⁰F for 20 to 25 minutes, until the sauce is a deep red colour and the enchiladas are heated through.
While the enchiladas are baking, prepare the Cilantro-Lime-Garlic Cashew Cream.
When enchiladas are ready to serve, add half of the cashew cream into a baggie, snip off the corner, and “pipe” the sauce all over the enchiladas. Alternatively, you can simply spread or dollop the sauce on top of each enchilada. Garnish with chopped cilantro, avocado, red pepper flakes, and green onion. Serve any remaining cashew cream on the side with a spoon.
Nutrition info is based on 6 servings.
Make it kid-friendly: Omit the cayenne and red pepper flakes.
Ahhhhh! So excited for you! Though I am sad that you are slowing down on the blog, it seems like you are channeling your energy towards pictures and your cook book (which am also exuberant for). Your pictures are absolutely beautiful Angela and I can’t wait for your new book coming in September. I may have to create a snap chat just so I can see behind the scenes. Till next time!
OMG! This looks amazing. Defiantly going to try :) Thanks!!
Thank you for your support, Anne! I’m excited for the new cookbook too, and can’t wait to share it with everyone. If you do decide to join me on Snapchat, I hope you enjoy the sneak peeks into Oh She Glows HQ!
Still can’t believe how much energy you have, Angela! Sooo happy for you and your project!!
My wife is always drooling over your photo’s and getting on me to take better pictures based on yours! I do my best. But getting 2 little girls (3 & 5) to sit still for a photoshoot is hard! Anyhow, I’m always amazed at how you make eating vegan look doable, even for families! These enchiladas are dinner, minus your suggestions of the cayenne.
Hi Eli, thank you so much for your support!
This recipe looks really good. I think I’ll make it on Super Bowl Sunday. Your new cookbook is going to be released on my birthday! I always buy myself a birthday present, so now I know what it will be this year. Can hardly wait.
Hi Debbie, I hope you had a fun and delicious Super Bowl Sunday! Did you end up making the enchiladas? Thanks for your support and enthusiasm for the new cookbook. Happy (early, early) birthday!
Hi Jessica, that recipe is one of my favs too! I hope you enjoy the “next level” version if you make them. Thanks so much for your interest in my second cookbook – I can’t wait for September either!
Mmm, enchiladas. Must try this.
Marking my calendar and preordering! Congratulations on your next cook book. The enchiladas have my heart because of the sun dried tomatoes, all the yes!
Thank you, Brynn! I hope you enjoy the new cookbook when it comes out.
These are definitely next level! I love it!
I agree – this looks out of this world!
I cannot wait for your next cookbook!!
Hi Angela! Si excited for the new cookbook! Do you thing you’ll be able to put measurements in grams as well?
Hi Pauline, thanks for your interest in my second book! There won’t be gram measurements across the board in the Canadian/US version (however, I do include some gram measurements for specific recipes where I think it results in more precise outcomes), but the UK edition will be in grams. I hope this helps!
OMG! Angela, ur brill! Where can I get gluten-free tortillas, pls? That would make it perfect!
CONGRATS on ur new cookbook!?And I’m loving the new site, Indigo Books – whaat’s not to love with that deep discount?!
Suze, most corn tortillas are naturally gluten free. Just make sure to double check the ingredients.
Thank you, Suze! These days, you can find great gluten-free options in most grocery stores, sometimes tucked away in the Naturals/Organics sections. As Liz said above, corn tortillas are a popular gluten-free option (though a few readers who tried them in this recipe said they encountered difficulties with the corn tortillas falling apart), but it’s always a good idea to check the ingredients listed on the packaging—just in case. I hope this helps!
If you use corn tortillas (which is the traditional way), you have to heat them up first, so they are pliable.
I’ve been loving ivory teff tortillas – they are GF, though they do have some additives I’m not excited about. However they hold together great and the la tortilla factory Sonoma brand ones are delicious… Almost as yummy as flour tortillas, perfect for wraps and burritos. I’m going to give them a try with this recipe. Sometimes I just don’t want that corn flavor.
You have spoken to my enchilada loving heart! These look incredible!!!
First of all, these look absolutely amazing, great job!
I was wondering if I could go out on a limb and ask a huge favor. I am getting married in August and my family is helping with the food. I would really like all or most of the side dishes to be vegan but with the price of food lately I also want to be budget conscious. There will be around 150 guests. I’m wondering if you could suggest a few of your recipes that might suit my requirements? I know you are very busy so I will totally understand if this is not doable for you.
Thanks for sharing all of your wonderful recipes in the blog and your cookbook.
Hi Michelle, and congratulations! It’s so great that your family is helping out with the food for the wedding. In terms of choosing budget-friendly vegan sides, my best advice would be to stick with dishes featuring in-season produce: fruits and veggies are often a bit less expensive when they’re in season, so it’s a great way to save a little on the cost of ingredients. Also, if there are ingredients you know you’ll need and that you can stock up on further in advance, keep an eye out for coupons and sales! A few recipes I’d recommend are my Creamy Avocado Potato Salad (p. 107 from The Oh She Glows Cookbook), Long Weekend Grilled Salad (p. 115), The Best Shredded Kale Salad (on the blog), Cauliflower Mashed Potatoes with Easy Mushroom Gravy (p. 207), and Crowd-Pleasing Vegan Caesar Salad (on the blog). You could also simply roast and season vegetables, as in my Roasted Brussels Sprouts with Fingerling Potatoes and Rosemary recipe, or my Roasted Rainbow Carrots with Cumin-Coriander Tahini Sauce (p. 191)—but that might get tricky, depending on oven space. Most of those side dishes can be easily made in larger batches to accommodate the size of your wedding, and can be prepped in advance (at least in part—for e.g., the salad dressings can be done ahead) so there’s less to do day-of. I hope this helps!
Thank you so much for the great advice! I love the idea of prepping in advance and you’re right, when the produce is in season it will be more affordable. The Long Weekend Grilled Salad and Creamy Avocado Potato Salad are great ideas! I have been wanting to try your potato salad ever since I got your cook book.
September 5th is my birthday. Hmmm.. I know what I’m asking for this year!!! ???
Hi Nicole, great question! Most of the recipes are new – I think around 80%, with the remaining being fan favourites from the blog, all of which I have tweaked and improved while testing for the second book. Thanks for your interest, and happy (very) early birthday!
I love all things Mexican, enchilada, sun dried tomatoes, sweet potatoes so I’m sure this will be so awesome! I don’t see cayenne in the ingredient list but you mention it could be left out. How much do you add? Thank you!
Hi Lisa, the cayenne is actually in the ingredients list for the Enchilada Sauce (linked in the recipe), not the enchiladas themselves – sorry for the confusion! The sauce calls for 1/4 teaspoon of cayenne pepper. I hope you enjoy the enchiladas if you make them!
Oooooo, I love the sun dried tomatoes and red peppers in here. I never would have thought to put them in enchiladas, but now I can’t get that idea out of my head! Also, congrats on all the exciting happens. Happy for you Angela!
Thank you, Erin! I hope you enjoy the enchiladas if you give them a try.
Your photography is always a joy to look at.
Thanks for sharing this delicious sounding recipe!
Thanks, Jen! I’m looking forward to sharing it with everyone, too.
I tried signing up for the newsletter on the email that I just rec’d … and I don’t think it worked … so I’ll try it this way!
Excited for your new cook-book too!
Hi Sharon, were you able to sign up for the newsletter? The first issue was released this past Tuesday. If you didn’t receive it, please let me know and I’ll try to sort out the glitch for you!
PLEASE get a mobile friendly website – it’s such a hassle to read your blog on my phone that I often skip it. That’s sad, because your blog is amazing!
I appreciate your feedback Sara, and I totally agree with you that we need a mobile-friendly version! We’re actually hoping to redesign our blog this year with a new theme, so there will be a mobile friendly version to go along with it. In the meantime, I recommend using Feedly on your phone. I allow full-text in feeds so you don’t have to click through to open a web browser and the blog displays quite nicely in Feedly (or other feed programs, I’m sure). Hope this helps!
This looks SO delicious! I love Mexican food, but I haven’t tried making enchiladas myself yet–mostly because I’m wary of packaged enchilada sauce and what it contains. I’m excited to try your recipe to create my own sauce! Also excited to hear more about the cookbook.
Thanks for your interest in my second book, Katie! I’m so looking forward to sharing it with everyone. I hope you enjoy the enchilada sauce when you give it a try!
This looks SO delicious! I love Mexican food, but haven’t conquered homemade enchiladas yet. Also really excited to make the sauce and hear more about the cookbook!
I was just asking myself what I should make for dinner when I checked my email and found this entry. As luck would have it, I even have all the ingredients to make this and the cashews are now soaking on my counter. I love when everything falls into place perfectly.
Sign up for OSG newsletter …. Check!
(Keep up the great work Angela (and Eric for all the behind the scenes stuff)!
Hi Anna, isn’t it great when everything works out like that? I hope you enjoyed the enchiladas! And thanks so much for your interest in the newsletter and my second cookbook. I appreciate the support and enthusiasm!
I’m so excited to try this recipe. I love all your recipes and am going to preorder your book. If you ever go on a book signing tour please come to Ottawa. I’ll be first in line ?
Looks delish. I am having vegan friends for dinner this weekend and I think I found my main dish. I am a little nervous! Any suggestions on how to round out the meal? Any suggestions for an appetizer too?
I ended up playing it safe and served with a simple green salad with light dressing. It was a big hit. Although mine didn’took as pretty as yours! Thanks for opening my eyes to the idea that vegan can be tasty!!
I’d love to know what kind of tortillas you use. Corn or flour? Whole-Wheat? There are so many options.
Oh my gosh I am sooooo excited for your next cookbook! I am absolutely in love with your first one. My fiancé and I cook from it on a weekly basis and the tex mex casserole is a staple for us now lol.
Is it only available for pre-order in canada or is US available too?
Hi Jessica, it will be available very soon! Right now, only the Kindle version is available on Amazon.com, but the print edition will be available for pre-order soon. I’ll try to announce on the blog and newsletter when the book is available for pre-order on Amazon.com (and other retailers too). Thank you for your interest in the next book!
So excited for all the things to look foward to from OSG! I have missed your posts and wonderful new recipes. Thank you for the update on the exciting developments. I cannot wait to make this recipe.
These look amazing! I can’t wait to try them out.
A release date, a newsletter, AND a killer enchiladas recipe? It’s a good day! Words can’t express how excited (and antsy) I am for your cookbook release. I’m pre-ordering is ASAP.
As for the recipe, I’ve made your Sweet Potato and Black Bean Enchiladas with Avo-Cilantro Cream recipe so many times I’ve lost count. I was actually planning on making it this week, but now I’m going to try this one! Anything with sun-dried tomatoes, and I’m there.
Hi Anna Lee, thank you so much for your enthusiasm and support! I hope you enjoy these “next level” enchiladas when you try them.
I am so excited about all the news you have going on, Angela! I can’t wait to see the project you are working on. Also, I am looking so much forward reading your new book in September!
Thank you, Heidi! I hope you enjoy the new book once September arrives.
And this recipe looks INSANELY delicious. I must try your enchilada sauce! It’s on the to-do list this month!
Thanks, Alexa! I’m glad you’ve been enjoying my behind-the-scenes snaps – I’m having a lot of fun with them. (Maybe too much?) Please let me know how you like the enchiladas when you give them a try!
Thank you for your support, Danielle – I hope you love it!!
Yay! I can’t wait for your newsletter. I’ve been incorporating more vegetarian recipes into my meal plans and your always look so good.
I made your first enchilada recipe a few years ago with some friends when we were still in school. We were actually reminiscing about that the other night and recounting how good they were. We’ll have to make these ones next!
Hi Chelsea, that’s such a sweet story. Thank you for sharing it with me! I hope you like these “next level” enchiladas just as much, and that they provide even more good memories to you and your friends!
Soo excited to try this! I love the original blog recipe, the OSG Ckbk#1 recipe and now this will be fun to try. Does it get any better than limes and cashew cream?! I’m grain- and gluten-free at this point (not by choice), so I’m using the Paleo Wraps (coconut based). I’ll let you know how this turns out!! Hooray for the release date…. ??
Hello, I just ordered your vegan cookbook from amazon. A review mentioned your blog so hear I am. We are vegetarians who aspire to being vegan thus my purchasing your cookbook. My excitement for it is tainted now that I see adds for Gortons fish sticks, Ritz crackers, and Coke in your side bar. What on earth? What did I just order? Very very odd.
Hi Charlotte, thanks for bringing this to my attention. My goal has always been to keep the advertising on Oh She Glows animal friendly and meat- and dairy-free. I do my best to moderate the ads that appear (and we block thousands of advertising categories), but sometimes they can slip through without my knowledge. Since we’re based in Canada, we actually can’t see the ads that run in other countries, so this makes it especially difficult. I appreciate the head’s up, and very much hope you enjoy The Oh She Glows Cookbook when it arrives!
Yum! Made this tonight and it was great. I’m not a fan of cilantro so I just did a plain cashew cheese for the top. And I’m a bit lazy so I made it into a casserole with the tortillas layered on the bottom, filling in the middle and then another layer of tortillas on top. It is really great! Very nice flavour and I love the addition of the roasted red peppers. I’m also not generally a fan of corn tortillas so I was a bit unsure how it would be (I’m celiac so no wheat ones allowed) but the flavours are so amazing I don’t even notice the tortillas anyway. Thanks Angela!
Wow, this looks amazing! I loved your 2011 enchilada recipe and am so excited to try this one out!
Can’t wait for your next cookbook to come out. Yours has become my all time favorite cookbook to use, and whenever I cook for friends they don’t realize anything is vegan!
I signed up for your newsletter and I just wanted to make sure you knew that it shows an address when you sign up and in case that was your home address you might want to change it!
Hi Olivia, thanks so much for the head’s up. The address is just our PO Box (without the actual #), so not to worry! I hope you enjoyed the first issue of In the Glow!
This looks amazing! I’m new to being a vegetarian and I love finding recipes like this! I can’t wait to share and try it out myself! Thank you!
I made this for my family tonight. It was soooo delicious! Even my meat loving husband enjoyed their heartiness. Thank you for sharing the next level.
Can’t wait for the next book to be released. Do you have a release date for the uk?
This recipe is a full 5 star recipe! I find the new flavours of roasted red pepper and sundried tomatoes gave it a full, robust flavour. I had intended to have it kast for a few days, as it makes a large amount, but in my house it disappeard by noon the next day!
Thanks for your support and enthusiasm, Ncole! I hope you enjoy the new cookbook when September finally arrives. And I’m so happy to hear the enchiladas were a hit – they disappear pretty quickly in my house, too!
Hi Stephanie, I prefer to use Rudi’s Organic Bakery Spelt Tortillas. Hope this helps!
I am so excited to find this recipe! I am sending it to my manager, she is vegan. I’m also going to try it myself! It looks so yummy.
This sounds so good! I’m prepping food for a potluck in which a lot of people are grain free and I’m wondering if this would work as a burrito bowl over rice?
I was going to make your original Enchilada recipe and then I received your email. I thought to myself these can’t be that different from the original. Oh my was I wrong. Your right these are the next level enchiladas. My kids agreed that they were better then the original.
Just made these for company last night. It was a hit! I think I could eat the cilantro lime garlic cream right out of the bowl! I used Trader Joe’s corn tortillas and it was good, but I am wondering what your favorite tortillas are?
Looks amazing, I need to try this!
This looks so yummy! I am going to have to try and make it gluten free and corn free as my son can’t have those, but it looks really really good.
This recipe was definitely worth the time to make. My toddler loved it and I was so happy to see her enjoy a vegan meal loaded with vegetables! Thank you so much. This recipe will definitely be a part of our weekly rotation.
Wow, you’ve been a super busy lady! Very inspiring. This looks as tasty as it is pretty to look at. thank you!
Looks very good——–how does it freeze ?
Hi there! I just tested this, and am happy to say they freeze really well. I recommend wrapping the cooled enchiladas individually in tin foil, then popping them in a freezer bag. I don’t suggest freezing the green sauce on top as it discolours – best to make that fresh! To reheat, I thawed the enchilada on the counter then baked in the tinfoil for 20 mins at 350F.
Hi Angela–When is your book going to be on pre-order in the States? I use your first cookbook all the time!
Hi Lisa, it will be available very soon! Right now only the Kindle version is available on Amazon.com, but the print edition will be available in the near future. I’ll try to announce on the blog and newsletter when the book becomes available for pre-order on Amazon.com (and other retailers too). Thank you for your interest in the next book!
I had planned on making your original enchilada recipe for Super Bowl Sunday but now I am going to change my game plan to make this recipe instead (plus your wonderful nacho “cheez” dip)! Also, I love hearing all the fun updates and look forward to your upcoming cookbook release. I hope that you do a cookbook tour and visit Northern VA!!!
Hi Deborah, thanks so much for your support and enthusiasm for the new cookbook. I hope you had a fun Super Bowl Sunday, and that everyone enjoyed the enchiladas!
Looks delicious! I know what I am having for dinner tonight. Thanks for the recipe.
Boring food! You only come around on this site now to sell and promote yourself……no longer interesting or genuine…..too bad.
I made this and it was OUTSTANDING! Highly recommended. The flavors are so bold and perfectly combined. Don’t leave out the sundried tomatoes – they add a deliciously strong flavor. Way to go, OSG! I’m going to make it for my sister’s family this weekend. Definitely a keeper.
Angela, you have changed my life! I have been eating vegan/vegetarian for a few years but I’ve never been a stellar cook or even enjoyed the process. I just got engaged and I began cooking your meals for the both of us and my fiancee has been so healthy–losing 12 pounds in less than a month, and thoroughly happy with the deliciousness of your recipes and the fun we’re having in the kitchen. My big night came when I cooked his whole family my first big meal–boy, was it challenging but I had a blast and they tried vegan food for the first time. I think I converted his mother:) Everyday for me centers around your cookbook and what I’m going to discover next. You are an inspiration! PS I made the enchiladas last night–I almost can’t believe that I can cook food this delicious, all with your help of course!
Just made this for dinner – such a hit!! Family said it was the best meal of the winter – high praise from a gang of picky eaters!
This was amazing!! My best friend made this for me to show me that vegan food isn’t always bad and I was skeptical… But after having it I’m totally going to make it at home! Thanks for posting this!
Wow! Made these the other night and they were very very good! Where we are, I couldn’t get medium tortillas so used small corn tortilla instead. The sauce was great and so was the texture. Since we are only two, there were leftovers, which I warmed in the microwave, and even the cashew sauce retained its texture. (I am one of those who avoids cilaantro so left it out…).
These look amazing and so delicious, I absolutely adore enchiladas deffo one of my favourite foods!
Tried the recipe today and it was delicious – so thanks a lot. However, are you sure you use only one medium onion? You write that that equals 2 to 2 1/2 cups. I have a proper measuring ‘cup’ but one of the medium red onions you can get in Europe are not even enough to fill one cup. Just wondering about the size of veggies you have in Canada?!
Have to tell you that I made these for superbowl. AMAZING!!! They were so delicious that I am having them for breakfast!
I tweaked it a bit since I can’t have gluten. I used corn tortillas and they kept breaking on me as I tried to roll them up. So I ended up with broken ones, threw on all of the sauce I made and it came out as a fabulous enchillada casserole! I also tweaked the sauce a bit since all I had in the kitchen was HOT chili powder. Oh yea, it was hot! So I ended up putting in a box of the vege broth and two cans of tomato paste to tone it down a bit. Sauce was delicious! Had to do that so it still would be edible and not too hot for folks. Worked out great. Added a bit more lime juice before I assembled the “enchiladas”. Fabulous! Bright tasting,.
The cilantro cream is to die for. Even cilantro haters loved it. Yes, this recipe is labor intensive. However, I did soak the cashews the night before. Steamed the sweet potato the night before. Made the sauce the night before. Chopped up the veggies the day before, so I could just pretty much cook and assemble the next day.
I have never written such a glowing review in my life. Thank you. Thank you. Thank you for the recipe, and yes, I am currently eating it for breakfast as I type!!!! It’s even good cold the next day.
Hi Debbie, thanks for this wonderful comment. I am so happy to hear that you enjoyed the new enchilada recipe! It’s too bad the corn tortillas kept breaking on you, but it seems like you found a good solution anyways. Enchilada casserole? That sounds amazing!!
Oh, and I forgot to rate it. I would give this 10 stars if I could! Thanks again!
Grrr. I’m allergic to potatoes and sweet potatoes. Do you think butternut squash would be a good substitute?
I just made this tonight. I think butternut squash would do just fine!
Hi Vanessa, thanks for your interest in my next book! I’ll try to post any updates about its availability to the blog. And I’m glad to hear you and your husband enjoyed the enchiladas so much, too!
The enchiladas were amazing. Did not miss the cheese and sour cream that I would normally use in enchiladas. My husband loved them too!
These enchiladas were the hit of our Super Bowl party and not just for the vegans, but everybody! I cooked my own dried beans and made the enchilada sauce and cream sauce ahead of time for a double batch. Everyone looked pretty concerned about the cream sauce but it only took one bite and they were saying how great it was. Thank you!!
I made the enchiladas this weekend and it is so good! The additions really do make it something really special. I was able to make the cream sauce in my food processor rather than using a blender. You just have to blend in stages and then let it run for a very long time until it whips up like cream.
Yum!! Looks absolutely amazing. I love when people have so much energy to always come up with new healthy recipes! Thank you so much.
I also made the sauce in my food processor, and it was amazing! This recipe was delicious and leftovers heated up nicely. Thanks!
This recipe takes a while to make but it is amazing! The combination of flavors is so delightful. I did not have nuts at home but I served the enchiladas with lettuce, tomatoes, cilantro, avocado and lime. Very good! I really do like your website, cookbook and you for putting so much effort with your recepies! Thank you!
Fantastic recipe!! I made this on super bowl Sunday for a bunch of friends along with the vegan caesar salad- such a hit :). Thanks to OhSheGlows recipes, I now feel confident serving vegan food when hosting dinner parties but above all, I’ve got my husband hooked on these delicious, healthy meals. You have given me so much inspiration, thank you Angela! Ps- super excited about your cookbook #2 and the newsletter wohoo.
Oh my goodness! This recipe is amazing. I can’t wait to share it to trick my carnivore friends. Thanks for sharing.
Made this the other night. So scrumptious. I love the balance of flavors between the enchilada sauce and the cashew cream. This will definitely become one of my go-to meals. My husband the omnivore loved it.
I am soooo excited for your new cookbook! The last one was amazing and there are still a few recipes in there that I make regularly :) Also, these enchiladas look soo good and your food photography, as always, is on point!!
Thanks, KJ! I hope you enjoy the new cookbook once it’s released — I’m definitely looking forward to sharing it with everyone!
This looks awesome! I can’t wait to try the cashew cream sauce!
Can you prepare the filling in advance? I am thinking of preparing the filling, cream, and enchaladas sauce on a Friday and out it all together and serve in a Saturday.
This was going to be my question too, so I’m glad I hunted through the comments first to find if someone else asked it. I’m going on a group vacation in a couple of weeks and already planning to make this my contribution! Planning to prep everything in advance, then assemble there. A question: what side dish would you recommend serving with this (other than chips and salsa)?
Made this dish today and it was delicious. The one addition I added was .5 oz. of dark chocolate to the enchilada sauce to deepen the flavor. There was enough filling for eight enchiladas using 8″ whole wheat tortillas.
Spoiler Alert: I am a very experienced home cook and the prep requires much more than an hour including the two sauces but it is very delicious. I will make it again. It would be nice if the nutritional info was available, tHat is why I withheld the fifth star. Thank you for this creative and beautiful recipe!
This was so worth the labor of love in the kitchen (with a rambunctious two year old at my feet). I loved how the sun dried tomatoes complimented the cashew cream- almost like a tangy, smoooth ricotta. Thank you for sharing this with us!
Firstly – your recipes has opened up a whole new world to me (and my sister) and there’s rarely a week when one of your recipes is not featured on our weekly dinner menu. LOVE your recipes.
I LOVE making vegan enchiladas! I make mine with mashed pinto beans and vegan jalapeno cheese – I definitely have to make this version next. The photos are absolutely beautiful!
Ok just made/ate this with my boyfriend as a belated Valentine’s Day dinner. It was so good I feel straight up emotional lol. Thank you so much.
Made these enchiladas for dinner and they were AMAZING! Such a filing dish, and the cilantro cashew cream is a must. Love this recipe so much, I will definitely be making these again!
Just made this tonight – you weren’t kidding about the burst of flavors! A winner.
I made these enchiladas with the cashew cream sauce for dinner with friends last Sunday evening. They were fantastic! Great recipe!
OMG these were AMAZING! So delicious and so filling. We made exactly as is and I wouldn’t change a thing. I think this is one of those recipes that my wife and I will made over and over for years to come.
Your original enchilada recipe (from the book) is one of my favorites and I make it very frequently for guests. My brother even said it tasted authentic since traditional Mexican enchiladas don’t usually come with much cheese on top, if at all. I tried this one a few days ago and it tastes SO different from the original recipe! I still love both for different reasons. This one definitely has more of a kick from the sun dried tomatoes, and the other one is a good staple to have when you want a simpler dish. Thanks so much for 2 awesome dishes. I can’t wait for your book this September. It comes out just in time for my husband’s birthday!
Oh wow! This looks stunning!!
This is one of the most fulfilling recipes I’ve made in a long time. Thank you. My new diet is, an enchilada for breakfast, one for lunch and a sensible dinner (probably another enchilada).
These were AMAZING!! One of my new favorite recipes. Everyone loved them!!
My boyfriend and I made these yesterday and they were amazing! I am enjoying the leftovers today. I did have to use a fair bit if sour cream when eating them because I overdid it a bit with the chilli flakes. Looking forward to the new cookbook. I bought some new cookbooks recently but none of them are as good as yours so fat.
This looks AMAZING and I want to make it for my moms birthday! She eats meat but I feel like she will love this, is there any chance I can make it the day ahead and have it prepped to pop in the oven?
Hi Angela!! Sorry to bug you, but I’m receiving an error when signing up for your newsletter via your sidebar widget. The error reads “Oops, something went wrong. “. I tried with different emails and on a different computer, but I think it’s on your end. I’m on mobile, Android 5.1.1 if that helps. Thanks lady!!
This recipe really delivers on the flavor front – super delicious! My meatarian husband could not get enough, and I can see thing going into our regular repertoire. The only drawback is it is pretty time-intensive. I made it after work on a weeknight and we didn’t sit down to eat until almost 9pm… But for weekends this is a surefire sinner. Can’t wait to make them again! You are doing great work, Angela, thanks for inspiring so many to eat more plant-based deliciousness!
Angela, you’ve done it again! These enchiladas were simply wonderful! So much flavor! My husband and I both loved these so much. Totally worth the prep work. I used Ezekial Sptouted Grain Tortillas, which, though not exactly soft, I still enioyed. We were stuffed after just one. Having received a vitamix since the last time I tried to make one of your cashew cream sauces, I have to say it was a breeze to make the cashew cream – so smooth!
Hi Jessica, glad you liked the recipe! :) I’m happy to say that, as of this week, my second cookbook is available for pre-order on Amazon.com. As it becomes available with other retailers, I’ll be sure to announce it on the blog and in my newsletter. Thanks so much for your interest!
Just made these tonight. Absolutely delicious!! And yah…a little bit of work, but totally worth it. :D Thanks, Angela!
This vegan recipe is perfect for my daily meal. It is easy to prepare for me <3 Thanks for sharing, well done!
That looks so fresh, and yummy!!! I’m going to be trying this soon! Thank you!!
I am a new vegan . Just got your book and tried the mighty chia pudding. Delish. Love the recipes in the book, learning to make nut mylk now .
Hi Elaine, thanks so much for your kind words about the blog/cookbook! :) In terms of nut-free substitutions, usually if I’ve tested a nut-free version I will always post the version in the notes of my recipe, but if there isn’t a nut-free option it’s because I haven’t had a chance to test it out. It’s difficult to give specific advice when I haven’t personally tested something, and I’d hate to recommend something that might not turn out! Occasionally, raw sunflower seeds can work as a swap for cashew cream bases (there’s a soup in my second cookbook that uses raw sunflower seed cream in lieu of cashew cream), and in baked goods you can often swap nuts for pepita seeds or sunflower seeds. After that, it’s mostly experimentation, haha! That said, if you have any recipes you’d like to suggest that I make nut-free for the blog in the future, I’m all ears.
This recipe is amazing! I even forgot the the avocado in thr cashew cream sauce and it was still awesome!
Just made these tonight. Absolutely delicious!! I am always looking for healthy dishes.
Oh this is a next level of delish food stuff .. I really loved this item and its similar to Jamie Oliver style.. Nice post..
These look fantastic. I want to make the lime cashew cream sauce for these but I really don’t like cilantro. What would be another herb type substitute that would taste good too.
Hi Stacey, Thank you for the kind words! I haven’t tried another version, but you might be able to try swapping a bit of parsley or basil. Or you could just leave it out and adjust the other ingredients to taste. Hope this helps!
I happen to LOVE cilantro, so you don’t have to believe me, but I don’t think this has a strong cilantro flavor at all–I even considered doubling it, but decided I could chop some as a garnish instead. If you leave it out, maybe add nutritional yeast to make it more sour creamy?
I made these on the weekend, and they were so delicious! I am in love with your recipes and your bright photos!
Ahh! I’m so excited! I’ve been wanting to make your original recipe for the last few weeks (so amazing) and after seeing this today, it’s definitely on the menu for next week. Such amazing flavors! Thank you so much for all your mouth watering recipes!
Hi Mandy, I hope you enjoy the enchiladas when you give them a try! They’re definitely a personal fav.
Well I am interested to try this because the old version is one of my absolutely favorite recipes of all times and it is hard to see how it could be improved upon! I absolutely love your first cookbook and can’t wait for the next one. I have never made so many things out of one cookbook that I end up making again and again. My daughter and I could not have made the switch to a plant-based diet without you! Thanks for all of the yummy goodness!
Ah! This looks so good. I’m always looking at the beautiful pictures in wonder and imagining myself already eating the food. No really though, it’s amazing!
I love your recipes. I often share them with my vegan-curious friends to give them a great introduction to easy and delicious vegan cooking.
What herb can I substitute for cilantro in a Mexican style dish? Thank yo .
Hi Paula, it depends a bit on the specific recipe, but – for something like my enchiladas here – I know some people like to sub cilantro with parsley. That does tend to change the dish’s flavour, though, so I’m more inclined to suggest just leaving it out and adjusting the other ingredients to taste. I hope this helps!
Just tried this recipe it is so good! Definitely going to be making it again at some point!
I made these they were great :D so creative.
I’m making these tomorrow night. I anticipate they will be awesome as everything else I’ve made from your book. I was wondering what size tortillas? The sprouted wheat ones were big, the sprouted curb are smaller….which size is required?
Hi Linda, so sorry for the delay in getting back to you on this! I use medium/large size tortillas to make this recipe. How did you like the Enchiladas? I hope you enjoyed them!
Thanks. I read more carefully and figured it up, the word “wrap” was key. These enchiladas were incredible. I will make them again soon.
Yeah, these were killah and easily won over meat-eating husband and currently hard-to-please teenage daughter! Easy to make, flavorful, with wonderful mouth-feel. Frankly, they warmed my soul on a blustery March day. Also, the leftovers lasted only until lunch the next day!
These Enchiladas are Heaven in a dish. Made these yesterday, everything about them is absolutely delicious, the enchilada sauce, the cilantro lime sauce, the filling…what a fabulous meal. Satisfying in every way, it is definitely going onto a meal rotation in this house! I did 1/2 the chili powder in the enchilada sauce to tame the spice a bit. They were perfect for the whole family. Thank you!
These enchiladas were so delicious and filling! I will make again and often.. And I think the leftovers will be just as good. I can’t cook often so I love leftovers. It was fun making my own enchilada sauce. Next time I’ll use fresh cilantro (as directed) instead of dried, but the cashew cream was still delicious using a little dried cilantro and the rest of the avocado was a great topping. Thank you!
These enchiladas are amazing!! I made these last night and they were a hit with everyone including my two little ones. Thanks for always posting such wonderful recipes!!
Sweet potato, cilantro and lime? Count me in!
These are incredible! My husband and son (both non-vegans) really enjoyed them as well. I did have some filling leftover and instead of putting it on top I saved it to go on a salad tomorrow or to maybe just have for breakfast. Thank you for another amazing recipe!
So, Angela, these enchiladas are oh, I don’t know, on of the best things I’ve ever eaten! All the ingredients come together to become something much more than I would have expected. I expected yummy, but I didn’t expect “I want to eat this for breakfast, lunch and dinner yummy.” Thank you from the bottom of my heart for this. I love enchiladas, and these are the very best vegan enchiladas I have ever eaten!
My fiance made this for us tonight and didn’t change a thing. It was excellent. A nice, filling, delicious Sunday night dinner. The cashew cream sauce was a bit too garlicky for me, but it didn’t stop me from dolloping it all over the leftovers!
Not sure it’s possible to improve these..but if you want to take these to the “next NEXT” level…get a hold of some Santa Cruz Chili paste and make your enchilada sauce with this and then roast your own red peppers over a grill or the flame on a gas stove. OMG! YUM.
Thanks for this amazing update Angela! We’ve made them twice and LOVE them. Can’t wait for the new book!
I have been following you for years and just as you stated, you didn’t think you could make a better recipe and you did! I was so impressed that I shared this on my blog and instagram for my followers to fall in love as well!
I can’t wait for your new book to come out in September!
Hi Amber, I’m so happy to hear the Next Level Enchiladas were a hit! Thanks for spreading the recipe love. :) I hope you enjoy the new cookbook when it’s finally released – I can’t wait either!
I’ve made this last night follow exactly with your recipe! It turned up great! We enjoy our dinner very well! Thanks for sharing this!
Hi Mitch, glad to hear the enchiladas were a hit!
They taste even better the second day. Loved them. I only used 1/3 the amount of chili powder and they were just right for my family. Your photos and instructions are perfect. I am a dedicated fan.
They taste even better the second day. Loved them. I only used 1/3 the amount of chili powder and they were just right for my family. Your photos and instructions are perfect. I am a dedicated fan. The only other change I made was to roast a red pepper in the toaster oven instead of using one from a jar. It really was no extra work.
Hi Isabella, if you gave the recipe a try, I hope you enjoyed it!
I’ve made these enchiladas as well as the enchilada recipe from your first cookbook. Although I liked the first one very much, this recipe is definitely “next level”. My non-vegan husband enjoys them so much that he’s volunteered to make them for a themed dinner party this weekend. Thank you. I eagerly await your new cookbook. Your recipes are delicious and dependable.
So happy the Next Level Enchiladas won you (and your husband!) over, Laureen! I love them, too. :) Enjoy them at your dinner party, and have a wonderful time!
First, the cashew lime cilantro sauce is one of the best things I have ever tasted, and is absolutely beautiful!
We will be eating these tonight, with changes based on what I had in the fridge and pantry. The filling is baked sweet potatoes, onions, roasted cauliflower, chickpeas, and chopped spinach.
I had taco-sized corn tortillas, so I microwave 5 at a time between 2 damp paper towels, then dip them in the enchilada sauce, fill, and place. I probably fit 14 in my dish.
I ate what was left of the filling and enchilada sauce last night (prep night) in a bowl with half a sweet potato and a bit of sauce, and it was unbelievable. Can’t wait for the full dish!
Hi this is the first recipe I’ve tried and won’t be the last! We have been eating free range meat for a few years now, but really want to start having more plant based meals. What a great kick off these were! I did find the cashew cream a bit too garlicky (and I love garlic) so next time I will leave out the powder. I made two batches of cream, one with cilantro and the other with basil/parsely. Both were great. We are Canadians living in Australia so nice to see a Canadian blog! All the best.
Hi Gwyn, I’m glad the first recipe was a hit! I hope whatever you try next you enjoy just as well.
I love this kind of food! Thank you! I have been drinking Nutrify Herbal Tea and it has been doing wonders for my health. Vegan and caffeine free! Definitely worth a try!
This dish is/was (yum) incredible…as I was making this my g-friend peaked over my shoulder and exclaimed “oh she glows again!”. I often substitute veggies or spices if the cupboards lack the ingredients for certain recipes and fortunately your recipes are very forgiving. Thank you for your intuitive creations and continued inspiration.
Tried your enchiladas reciepe twice. Once the original vegan and then I cheated by adding chicken, replacing the spinach by chard… Also delicious! Loooove the sauce! Thanks!
I finally got around to making these, and they are definitely next level! They were barely out of the oven before I was scooping one onto my plate. I actually had one for breakfast this morning as well haha. The sun-dried tomatoes were a fantastic addition; I would’ve never thought to add them! And the cilantro cashew cream. Oh. My. Word. It was amazing. I practically slathered on as much of it as I did the enchilada sauce. Another winning recipe! Thank you!
Haha! I love that you had one for breakfast – they must have definitely been a hit. :) Thanks for the great comment!
I can’t wait to try these enchiladas. They look amazing. Congratulations on the cookbook, too! I can’t wait to check it out.
Oh my goodness, these are delicious! We could not stop raving about how great they were. Already planning to make them again. They are a lot of work, but definitely worth the time and amount of chopping! We too loved them even more the next day and I ate the left over filling two days later. A good sign!
My husband and I are newly declared vegans (only 10 days ago) but have been on this path for some time and ready to take the final leap, so we were concerned about not having great tasting food. A friend gave me your cookbook a while back and I am so impressed by the quality of your recipes and absolutely love the pictures. It is the pictures that inspires me to try something new, so many thanks for those.
One quick question, I am seriously allergic to many types of nuts so cannot eat cashews. I am able to eat almonds, walnuts and pecans. Could I use soaked almonds to replace the cashews in the cashew cream recipe?
You had me at Cilantro Lime Garlic Cashew Cream! I’ve been trying to find an easy meal to make for lunches and this one looks perfect!!!
OH YES. I know exactly what I’ll be baking this weekend. Been looking for a recipe like this for a little while now, and this is just perfect. Thanks! The pictures look really great too.
Thanks, Brechtje – I hope you enjoy the enchiladas this weekend!
Missing your updates but enjoying the pics on Snapchat. I pre-ordered book 2 and am SOOOOO excited!
The enchilada sauce is incredible! Have you tried freezing it? I don’t ever want the store bought stuff again.
I finally made these tonight! So delicious and very filling!
I make this recipe often and it is loved by vegans and non-vegans alike. So excited for the new cookbook!!!
This looks amazing :) Thanks for sharing!
The best vegan enchilada recipe I have tried. The directions were easy and my kids and I loved it. Thank you so much for sharing it.
Glad you enjoyed it, Amanda!
Oh these are absolutely divine! I have to make it soon. Your pictures, by the way, are mouthwatering.
Angela, did i MISS a “Most Popular of 2015” post?? It’s my favorite part of every new year!!!! Is it posted and I’m just the dork who can’t find it?
I made these last night as a special birthday dinner for my boyfriend (he usually balks at anything labeled vegan) and we both LOVED them!! They were fantastic! And one of his first comments was “the sweet potato in here is a brilliant idea!!”. I did give you the credit for the “brilliant idea” Angela haha and I think I may have even won him over on the “doesn’t need meat to be delicious” front!! Thanks so much for creative and delicious recipes such as this! Can’t WAIT for cookbook #2!
I want to make these so badly but I’m worried that they will be on the sweet side since it uses sweet potato. We do not care for sweet entrees and I have used sweet potato in dishes that did not turn out to out liking because they tasted sweet.
Are these on the sweet side?
Hi Sharon, I don’t think I’d say that these end up on the sweet side – if anything, a few people have found the enchiladas a bit too far on the spicy side! The various spices and seasonings in the recipe do a lot to cut and balance any sweetness you’d get from the potatoes. If you give the recipe a try, please let me know what you think. I’d love to hear!
Thanks,so much for reaponding. I did make them and they were perfect!!! So yummy and not sweet at all. My meat satin’ hubby loved them too!!
These enchiladas look absolutely delicious! Thank you!
Angela – can’t wait for the book. I have been using HYDROPONICS from a company called www.planetponics.com that allows me to grow the herbs for some of your recipes. I really enjoyed the value and idea this company was striving for. Thought I would share it for others. You can GROW ALL YEAR. GROW FOOD, HERBS OR FLOWERS. No soil, no mess, self-watering hydroponics. Fresh food faster than a traditional soil method.
Yep, made this a few weeks ago. Husband and I gobbled them up. So so so good. I almost didn’t make the enchilada sauce and was going to use my tried and true verde, but decided to make it. YUMMY! Making again this weekend. Thanks for sharing the recipe!
So happy the recipe was a hit, Sue – enjoy the second batch!
Hi Steven, what a tasty surprise!! I LOVE this recipe, and I’m so happy to hear you and your family did too. :) Thanks for the comment!
We had these for dinner tonight… oh my goodness I could eat the whole pan!
I might even prefer these over real enchiladas with cheese!
I made this recipe for my Easter weekend. It was wonderful! I will definitely make it again. I will decrease the amount of chili powder in the enchilada sauce next time. I love spicy, but there are so many wonderful flavors that I thought the chili powder overpowered the other flavors.
Honnnnn…my God !!!! A pur delish this recipe. I’ll definitely make it again and again and again. The Cilantro Sauce is out of this world.
5 stars and up !!!
Oh my! I made these over the weekend and loved them. Even my non-vegan husband went back for seconds and left-overs. We fought over the cilantro cream (I had put out sour cream for him but he didn’t touch it.) Thank you for another great recipe.
I am in need of vegan entrees that freeze and reheat well. Could this be one of those?
Definitely! These enchiladas freeze really well. I suggest wrapping the cooled enchiladas individually in tin foil, then popping them in a freezer bag (I wouldn’t recommend freezing the green sauce on top, though, as it discolours; best to make that fresh). To reheat, thaw the enchilada on the counter then bake in the tinfoil for 20 mins at 350F.
These enchiladas are my new favourite thing to eat! Thanks for taking them to the next level. Actually, thanks for creating such a beautiful cookbook with so many delicious recipes for all of us plant eaters. I can’t wait for the next one & the app!
I made these for my family last night, and we were all so impressed! This will become a weekly meal in my house for sure! Even my hubby the meat eater loved it!
These were incredible! I was seriously so impressed with how delicious and easy they were. The cashew avocado sauce and homemade enchilada sauce were so yummy and went perfectly with it! As a person who does not know how to cook well and is a fairly new vegan, I really appreciate yummy recipes like this that taste extravagant but are cheap and easy. I even made them for my mom and she said that she would totally pay for and order these at a restaurant and she’s not even vegan! Thank you so much for this, I am totally in love!
This one is going straight to the meal plan!
It looks wonderful..thanks for nice share about this recipe…rate 5/5 starts!
I made this tonight and it was fantastic! Even my none vegan husband couldn’t get enough!
Whilst my enchilada presentation needs some work, the rest of the recipe worked out brilliantly. Really tasty. Thanks a lot, Angela. Pleased to hear about your good news, too re: baby and app!
These were a hit! I tweaked the recipe a bit based on what I had (and didn’t have) in the cabinet, and we loved them. Thanks!
OH MY Goodness! I made this last night and SUCCESS!! My husband likes to have meat at every meal so I was hesitant to not have something meat-like that in this meal. But I must say he really liked my dinner – all of the “unique” flavors and how he felt full after but not “weighed down.” He has requested this again. In fact – we did leftovers for breakfast and it was even better as the flavors had the opportunity to settle into the recipe.
That’s so great to hear, Joelle! I’m glad the recipe was such a hit.
This was incredibly flavorful. We didn’t miss the dairy…really is life changing!
I made your sweet potato black bean enchiladas today, and they were fabulous. I purchased your “The Oh She Glows Cookbook” last week, and so far every recipe I have made has been amazingly good. I am already a huge fan. Thank you for “proving” vegan can be delicious.
Aw, thanks Lynne. I am so happy to hear you’re loving the cookbooks so far!
Thank you for this recipe Angela! I loved it, so yummy especially the cashew sauce. I made the enchiladas for dinner this past Thursday. I was so excited to come home and make dinner! This is my second time cooking with cashews in a nouveau style (the first was your Mac and cheese recipe) I am enjoying the transition to a whole foods plant based diet and your blog is a great resource of support. I’m so excited that I went out and bought your cookbook today. I can’t wait to try another recipe! Not only am I transition to a plant based whole foods diet but so is my six year old daughter. She was not too keen about the enchiladas but loved the Mac and cheese. I’m hoping to find some kid friendly recipes in your cookbook. Any tips for kids transitioning are welcome. Thanks again Angela for sharing your story and recipe !
Hi Katie, That’s so great! I’m happy to let you know that my next cookbook was created with the kiddos in mind! There are over 50 kid-friendly recipes in my next book (we had a bunch of toddler and young kid testers for it which was so great). I identify which recipes are kid-friendly, or how to easily adapt certain recipes to make them kid-friendly. My little one (who is 19 months) really loves pasta or rice, so I try to use whole-grain, and then add a bunch of veggies in it with a delicious sauce (you can puree lentils into the sauce for a boost of protein). I also love to stir in a lot of hemp hearts for extra protein. I hope to have a recipe coming up soon that my daughter loved (well minus the mushrooms, I guess…still working on those! haha). It’s a rice and gravy dish with lots of broccoli and mushrooms…super easy and delish! Smoothies are another great way to pack in all kinds of plant-based nutrition and they’re fun for kids too. Anyway, I hope this gets the wheels turning!
These enchiladas are every bit of good as everyone has been saying that they are. My husband liked them so much for dinner last night that he had some more for breakfast today!
Haha, that’s great, Heather! I’m so glad the enchiladas were a hit.
This recipe is a winner. The Enchilada Sauce is rich and full of flavor. The Cilantro Lime Garlic Cashew Sauce has a wonderful lime and garlic flavor. The filling for the enchiladas, with the sun-dried tomatoes and roasted red peppers, is delicious! I wish I had doubled the recipe. I’ll make this again soon.
My family loves your enchilada recipe from the 2011 book. I’ve made it at least and dozen times. It’s a go to when I have guests over because it’s always a hit. I’m excited to try your new version!
have you ever thought about doing a tart like this?
This is absolutely delicious, I made them last night and I honestly couldn’t be happier. I normally can’t stand anything Mexican but these are phenomenal. I made them for a few friends and there was enough to take for lunch for two more days, which took a huge chunk off my cooking time tomorrow. Also, the cilantro cream is now the only thing I like cilantro in. I was very skeptical (I’m not a cilantro fan at all) but it’s delicious and I found myself eating it on a spoon haha! Everyone loved them and they couldn’t believe that they were vegan (I don’t see why, but that was their version of “wow this is really good”. I can’t wait to try more recipes!!
Hi Brandi, I’m so happy to hear you enjoyed the enchiladas…even the cilantro cream!! ;) Thanks for the lovely comment.
I made these tonight and although I didn’t follow the recipe as far as measurements are concerned, they were the bomb. I also mashed up the sweet potatoes before I put it into the pan with the other ingredients. I thought that would make a creamier base and it did. That cilantro, lime, avocado cashew sauce is SCREAMIN! I have been looking at the recipe a couple of days now couldn’t wait to try it. The recipe itself looked so good that I ordered the cookbook yesterday. Really, really good.
Thanks, Deborah! I hope you love the cookbook. :) And I’m so happy to hear you enjoyed the enchiladas – I bet mashing up the sweet potatoes gave the dish a great new twist; thanks for sharing the idea!!
Cooked this up last night and it was delicious, although perhaps a bit too hot for my taste (and I thought I liked spicy food). Great flavours too. Might add a little chipotle next time I make it and use tacos instead to give a crunchy texture. Thanks for the recipe.
Hi Angela – thank you for this fabulous recipe! It is ABSOLUTELY DELICIOUS! We served this entree to family who are not vegetarians – and they loved it! Everyone was humming their delicious praise as we enjoyed the meal. This is a PRIZE recipe we will continue to share again and again! My husband and I are newly vegan – and so appreciate people like you who have gone before us to show the way. Your culinary skills and creativity are genius. Thank you for sharing your talents with the world!
When I told my mother I was making sweet potato and black bean enchiladas for dinner, she thought I was crazy. As soon as she tasted them, she changed her mind. My whole family thought they were delicious! Next time, I’ll tone down the chili powder, though.
Hi,I really want to try making something creamy (like the above food), but I recently found out cashews are no good for me. Does anyone have any ideas what to use instead?
This is one of my most favourite recipes. It’s a little time consuming with the cashew cream and enchilada sauce, so I make a double batch of the filling and enchilada sauce and freeze half. My family loves it…even the meat eaters!
I’m so happy to hear the enchiladas were a hit, Lindsay!!
Loved these enchiladas! I used an enchilada sauce from a plant-based cooking course I’m taking, but I’ve made the Oh She Glows enchilada sauce before as well with success! The abundance of veggies made me feel better about slurping up every bit of the cilantro lime cashew cream. My omni boyfriend ate 1.5 of these and stated he was full but “can’t stop eating it’s so good.” Haha so he finished the second one with a full and very happy belly :) Thank you! These will definitely show up on our dinner table again!
I’m so glad you enjoyed the addition of the sundried tomatoes! I really enjoy that twist, too. :) Thanks for the kind words!
I am 3 weeks into life changing eating. I came across your cookbook from a friend and decided to make the enchiladas. Before I went to the store to buy ingredients, I came across your updated recipe.
Haha, I’m so glad you enjoyed the recipe, Deanna!!
These look so good!! Everytime I’ve made vegan enchiladas I use verde sauce because I couldn’t find a good red sauce recipe. Can’t wait to try this!
I hope you love them when you give them a try, Fred!
I recently made this recipe for one of my banquets for 50 people. Amazing! Everyone loved it! Thank You So Much Angela! If you want to make it kid friendly I would omit the spices as some people found it spicy. Overall it was amazing and everyone licked the plates!!
It’s so great to hear they were a hit, Nadia! Thanks for the lovely comment.
These were outrageously amazing. This along with your taco recipe has definitely acted as inspiration as I work towards a vegan diet! Thank you!!
Thank you for your reply, and so true! I’m making these (again) tonight to show it off to my friends. I had left over taco meat (the walnuts and lentil recipe) as well as the cashew sauce and so for lunch today, I put that on top of zucchini noodles, added fresh avocado and it was delicious! I love when I can use leftovers for a simple and quick lunch. I’m waiting for your cookbook from the library and I can’t wait to see what other inspirations I discover. Two days on a vegan diet and I already have so much more energy: there is so much positivity within this life-style. Of course, I feel motivated now but that doesn’t always last very long! It feels good, however, to de-bunk the stereotype that being vegan is “impossible” or “uppity” or even “gross”! It’s so possible, except perhaps when in a time crunch.
I made NLEs again last night but I was so anxious to eat them that I forgot to serve the cashew cream! That’s what I get for being organised & making it ahead of time. We had it on the leftovers tonight but now I have lots of cashew cream leftover. Can I freeze it?
Also, congrats on the new book. Can’t wait to have it my hands!
I have been using this website to transform my family’s eating. These enchiladas were a hit,even with my pickier eater. Thank you!
That’s so great to hear, Clara! I always try to create recipes that will be crowd-pleasers, and it’s wonderful to know when I’ve been successful. I hope if you try something else out from the blog that it goes over just as well!
Made this recipe from your app and it is absolutely delicious!
I’m happy to hear you enjoyed it, Gayla!
I made this recipe for dinner last night, but had to substitute kale for the spinach. Wow, these are so, so good! The sun-dried tomatoes really work in this dish. I’m so glad I found your blog!
I’m so glad you liked the recipe! And it’s great to hear that kale worked out well as a sub for spinach. Thanks for sharing!
Sorry Angela, I meant to give this recipe a rating of 5!
I made this dish – complete with enchilada sauce and the cilantro sauce – for my vegan aunt and uncle this past weekend and it was amazing. I am still eating the leftovers four days later and loving it.
The only change I made was leaving out the cilantro, as I hate that herb :) but the sauce was great without it. I added more avocado, so it was like a smooth, creamy lime sauce.
My only quibble with this recipe is the prep time. I think an hour is way too little. I did tons of prep the night before (made both sauces, prepped veggies) and it still took an hour to cook it and put it all together.
I will definitely make this again!!
OMG! I made this tonight and it is SO good. My husband (who is by vegan) had the cheese out and was gonna add cheese but I convinced him to take a bite first. He took a bite and out the cheese away. Said it was so good. And, of course, I’m in love with it. You hit it out of park!!!!
SO glad you both enjoyed the enchiladas, Rachel!
i mean my husband who is not* vegan.
I’ve had these twice and I’m addicted! I used green enchilada sauce however.
I made these for my husband’s birthday, and we both loved them! I had some leftover enchilada filling, so I saved it for the next day, added tofu, and called it a morning with a quick scramble. Thanks for the recipe!
Just made these for the second time. Cannot get enough of them. I omit the red pepper flakes so my 14 month old can eat it, otherwise I follow the recipe exactly. The cilantro lime sauce is life changing.
Made this recipe last weekend, and it was amazing!!
These are amazing!! So good I don’t care what the next level is!! By the way I made the cilantro lime sauce with no avocado and it turned out amazing! Reheated next day still sooo yummy amazing best enchiladas I EVER had!!
I made this tonight – WOW! It’s so delicious. It’s now my new favourite recipe. Thank you Angela.
It’s definitely a new fave around here too, Jocelyn! So glad you enjoyed the enchiladas.
This is one of my favorite meals I have ever made. I have made them twice. I’m hoping I can even get my meat loving parents on board when they come for Christmas this year. The cashew cream sauce is showing up in our other Mexican dishes now too.
So glad to hear it, Kristina! It’s big fave around our house, for sure. Hopefully it’ll be a hit with your parents on their holiday visit, too!
Ah-mazing recipe, I made it last week and my boyfriend requested it again this week! The cashew cream sauce with cilantro and lime really gives the dish that perfect pop of flavour.
Fantastic! This has a much more complex flavour than many of the other vegan enchiladas I have made. Followed it to a T (although I tend to be quite liberal with my Cumin). A vegetarian, but I am not always a fan of sweet potatoes (I know…bad vegetarian), but this had such a nice balance, so if you are not a sweet potato fan don’t be put off. Takes a while but worth it. Thank you!
I just made this recipe from the cookbook. I made it following the directions. This recipe is amazing good. The Enchilada Sauce is fantastic! The avocado-cilantro cream sauce is unbelievable good. I will eat that cream sauce on EVERYTHING! I can’t wait to make this dish for others. Thank you so much for your fun, tasty recipes!! In the cookbook the next recipe is the crowd-pleasing tex-mex casserole, which is really is! I’ve made it twenty times; always a winner.
So very delicious! I made this recipe this past Sunday for a Vegan themed get together and it was a hit!
I’m glad this recipe was such a hit, Chlayne! I’m grinning ear to ear.
Omg these were the BEST enchiladas I’ve ever had. I’m not vegan but my fiancé is and I always cook a big meal for him when we have a night off together. He always eats Amy’s vegan enchiladas from the freezer section in the grocery store and he said these do not even compare to hers! Thank you so much for this recipe. This is def in our rotation!!!!!
Aw, thank you Veronica!! I’m smiling ear to ear. :) I’m so glad the enchiladas were a hit!
This recipe took a lot of preparation time, but it was so worth it! It is super-savory with the roasted red peppers and the sun-dried tomatoes. I only made one tiny alteration; I added a little Daiya mozzarella to the mix and then sprinkled some on top during the last 15 minutes of baking. I did it for the texture rather than flavor enhancement; I just always associate Mexican food with cheese. Everybody in the family loved them. The cilantro sauce has a taste and texture that is reminiscent of sour cream, and really enhanced the overall experience. Thanks for the wonderful recipe. I’ll make again for sure!
I’m glad the whole family enjoyed the enchiladas, Sandy! That cheese sounds like a DELISH addition, too. Yum!
The enchilada recipe was super delicious, even though time consuming. Glad I made double recipe to have extras for my work week lunches and for my husband. LOVED the enchilada sauce and will be making it again.
Awh, thanks so much for taking the time to comment, Anne!! I’m so happy to hear you enjoyed the enchiladas.
My family and I are not vegan nor are we vegetarians. I do like to try different foods and eat and make healthy meals. I read great reviews on the cookbook from this author and ordered it yesterday but I got inspired and decided to try this recipe I found online tonight. Let me tell you, this is crazy good!!! My husband, myself and our two teenagers absolutely loved it and now I really can’t wait for my cookbook to show up.
so so so good, will definitely make again! the filling was very flavorful, the sauce was great (and easy) and the crema!!!!!!!!!!! delicious!!!
I am so excited to try this recipe this weekend. I also absolutely LOVE the serving tray this is on. Are you willing to share where it is from?
Made these last night for my sister and I. They are incredibly tasty. Instead of adding the enchilada sauce to the mix inside the tortillas, I added the cilantro garlic cream. I was glad I did, I think the enchilada sauce inside would have been overkill and they tasted amazing. Next time I make them, I will make the sauce more wet. The cilantro garlic cream sauce is to die for and I will definitely triple that recipe since I ran out after only half the enchiladas were gone.
Such an amazing recipe! Made these last night for a dinner party and the two sheet of them were completely devoured. Prepping the sauce and crema beforehand was extremely helpful in throwing these together faster. Will definitely be making these again!
Hi Cecilia, I’m so happy everyone enjoyed the enchiladas!
My partner really struggles with the idea of no meat in meals, (he grew with a meat and no veg kind of family) and I’ve made many of vegan dishes for him.
This is the only dish so far that he thinks is absolutely amazing without meat. Thank you dreena! Cashew cream with it just added perfect to perfect. Delicious!
Ive been following this website for many years and have made a few things but not many, I wasn’t vegan before, just very healthy. Recently, I became vegan and have been starving for something new. This took me almost 3 hours to make but man! Was it ever worth it!! It was amazing, honestly, just amazing. The cashew cream with the avocado and just enough spice with the sweet potato…..just divine. Thanks so much, you do such amazing work!!!
This is delicious. We enjoyed them tonight. Love the Garlic Cashew Cream. Yum.
I’ve made this recipe at least 10 times in the last year. My non-vegan husband raves about this dish, and it’s one of my favorites! Thank You.
I use corn tortillas, and layer them with the filling, sauce, and Daiya cheddar cheese (similar to how you would with a lasagna) twice over. I also have to make 2X the Cashew Cream recipe because I wind up eating half of it with a spoon. Absolutely wonderful!
Oh, I’m so happy to hear you’re loving the recipe, Rachel!!
I’m hosting a week of whole foods, plant based lunches for my co-wokers soon, and decided to make this the opening lunch, so I tested it today. HOLY MOLY IS IT GOOD! I did not use any oil in the recipe, other than what the sun dried tomatoes were packed in, and everything turned out beautifully. It’s a definite winner, and my co-workers are in for a treat!
This recipe is delicious!!! I was especially pleased with the garlic sauce, wow, yum! I first was skeptical of the portion sizes (thinking it may not feed 4 hungry adults), but I was wrong. It was fabulous. Wouldn’t change a thing. Keep up the good work!
i have the old cookbook and really enjoyed those enchiladas but these are better. So good. I will be making these often. Thanks for the great recipe.
I made these last night and they were so good! My husband, who is a meat eater but trying to eat vegan for the next month, loved them too! They will definitely become a regular on the dinner rotation.
I just made these for the second time in a month,and this time I doubled the recipe. And I am single so that’s a lot of meals. I was licking the cashew cream off the food processor blade and I cut my tongue, but I still went in for more! Yum yum yum. This ius my new favorite recipe.
OUCH! Hope your tongue’s doing okay, Emilie! I’m so happy you’re loving the recipe–sounds like you’re stocked up for a while. :) Enjoy all those leftovers!
Amazing! I doubled the recipe and it made around 10 enchiladas.
So filling, delicious and the cilantro lime sauce just completes it to NEXT LEVEL.
I’m glad they were a hit, Jessica!
This is my favorite recipe ever… it’s always a hit even with picky omnivores at the table. The first couple of times I made it, it took a long time to prep, but now I’ve got it down and it’s easy to do! It’s so simple whip up the cashew cream topping and I love having the rest of the avocado as a topping! It’s great left over too, which is a requirement for any good recipe for me! Thanks, Angela!
Holy cow. My husband and I decided to cut down on animal products and this was my first ever vegan meal. It was one of the BEST THINGS I have EVER eaten! Gave me some hope that you don’t need animal products to make a delicious meal. This was excellent, full of flavor.
Thank you SO MUCH for finally giving me a completely vegan recipe that my husband not only tolerated, but LOVED. He even took leftovers for his lunch! I look forward to trying more of your recipes!
Thanks for this recipe, it is amazing! Had dinner guests last night who are looking to cut back on meat, since I love everything I try from you and they love mexican based meals, thought this would fill the bill. We all agreed these are the best enchiladas ever, and if we were served these at a restaurant, we would be quite pleased! I doubled the recipe, so there were a few left over, hubby and I just each had one for breakfast! Thank you again Angela, you rock!
Didn’t have red peppers or sun dried tomatoes, and didn’t make the cashew sauce either but man these were amazing! We recently switched over to a planted-based diet and have been struggling to find dishes we love.
We ended up making it casserole style by layering corn tortillas with the sauce and veggies, and I added a splash of Apple cider vinegar to balance out the sweet potatoes. Soooooo delicious!
OHHH EMMM GEEE, those are amazing!!! I just started eating clean recently, so I’m looking for good recipes. I’m SO glad I found your website, can’t wait to have my friends over for dinner, they will LOVE these enchilada’s. Thank you, thank you, thank you!
Thank YOU for the love comment, Diane! I’m so happy you loved the enchiladas, and I hope you enjoy whatever recipe you try next just as much!
Both my boyfriend and I agree that these were the best enchiladas we have ever had. I added eggplant & mushrooms and the addition went well. Thank you for such an easy to follow, delicious recipe. I will be looking for your cookbook.
Wow…Wow…Wow… I made these from your app that I downloaded on my phone. I am fairly new to veganism about 6 weeks. These were AMAZING. I didn’t have the jarred roasted peppers on hand I used fresh, it was still AMAZING. If I can get the hubs to say wow ding ding ding!!!! I can’t wait to get your cookbook.
Hey Ella, I’m so glad the enchiladas were a hit! They’re one of our faves in this house. :) Thanks for your review!
Another winner! Made these with your avocado cilantro cashew cream. Bizzomb! I did use my own homemade enchilada sauce though ;) Very easy, and I did is casserole style so it was layered rather than rolled. Nom.
I’ve made this recipe before and it’s stellar! I’ll be making it tomorrow for Meatless Monday and I can hardly wait!
I’m so happy you loved it Annette!
I’m making these tonight. I’m assuming the tortillas are flour tortillas, not corn. Is that right?
Hi Marsha, Yes, I used flour tortillas. Thanks for clarifying!
Thanks, I used flour tortillas. They were delicious. I did make 8 enchiladas as there are only 2 of us. There was plenty of filling. One thing I’ll do next time is warm the tortillas in a skillet before I fill them so they don’t taste doughy. Also I only put the toppings on what we’re eating as the rest will be warned up before we eat them. Recipe is great. I have your cookbooks and have made several recipes. All were great, especially the cheese sauce. It is outstanding. Thanks for all your ideas and hard work.
This recipe was so amazing. The only thing I didn’t make from scratch were the tortillas. I purchased gluten-free tortillas. They tasted fine but didn’t roll well so my recipe was not as pretty as yours! The enchilada sauce and the cashew cilantro cream was to die for. I could just eat that forever and ever. And my husband, a dedicated carnivore, just loved this dish. Thanks for the amazing recipe and keep them coming.
Aww thank you so much for the recipe love, Joan! So happy it was a hit with you and your husband.
I made this for my husband and I last night. Absolutely YUMMMY!!!! I have some left over filling (only cooking for two) and will probably make some quesadillas with it. Thanks so much for sharing this recipe.
Hey Nova, Thanks for your feedback…I’m so happy you loved it so much. Repurposed leftovers are the best aren’t they?
Made these today! Super good. Thanks for the recipe.
Wonderful recipe! It was the first time I made cashew topping and it was OUTSTANDING!!!
A cashew topping sounds SO good. Was it cashew cream or something else?
We are huge fans of both this and the sweet potato and black bean enchiladas. I was wondering if the enchiladas can be made ahead of time and frozen before baking? Would I put enchilada sauce before or after freezing? Thank you!
I’ve heard they can be frozen, but I haven’t tried it yet myself. I would leave off the toppings (including the Cilantro-Lime-Garlic Cashew Cream) until just before serving though.
Just wanted to say THANK YOU for this recipe! I’ve made this for so many different people (all with VERY different food preferences) and even my meat eating friends LOVED it!! One of my go-tos and absolute favorites!!
This recipe is seriously amazing. I have made it multiple times. Never been a fan of enchiladas but these are just too good. Perfect perfect recipe.
I made these last night for my vegan husband – delicious!! Didn’t have limes so used lemon in the creamy avocado topping. Still so yummy! The sauce was so good too.
Oh good call on using lemon in a pinch…you can’t go wrong! So glad you enjoyed them so much Jen.
These are fantastic! I has a vegan potluck with a couple friends last night and this was on the menu to make together! All of us working in the kitchen made it easy to soak the cashews, whip up the two sauces, and make the enchiladas pretty quickly. One friend had the idea to add a pinch of cinnamon and cocoa powder to the enchilada sauce as well, which was quite delicious. We all couldn’t stop talking about how fantastic this recipe is! Thank you!
Hey Aida, So glad you and your friends tried out the enchiladas! I love the idea of adding a pinch of cocoa and cinnamon. I will try that next time.
Seriously amazing! The flavor combinations were just perfect, with the sweet potato providing some creamy-ness and peppers adding some tang. This will be one of my go-to recipes to feed to skeptical meat eaters. Will definitely make again!
Hey Steph, Thank you so much for trying it out and letting us know how it went! So happy to hear you love it as much as we do.
I have never commented on a recipe before, but this one deserves 10 stars and I felt obligated to say it.
I added corn and crushed chillies to mine, but otherwise followed the recipes exactly and I am blown away! the two sauces are life changing.
I’m so happy you decided to comment, Malcolm! Thank you :) That’s great news it was such a hit, and you can’t go wrong with a Mexican Lasagna either.
We are NOT vegan not even vegetarian in our house, but we have two with celiac disease and one with a dairy allergy so I went for it. The GF brown rice tortillas that I found do not roll period so I made enchilada “pie”. The flavors were amazing and the meat was not missed in this tasty dish. I topped it with my own vegan avocado crema recipe and some prepackaged vegan cheese too but it would have still been amazing without the additions!
So glad you enjoyed it so much! And I love the “pie” idea. I’ve heard from a few people that it’s a good way to make it!
Oh my goodness Angela you have outdone yourself with these enchiladas. I made these this evening and both me and my meat-devouring other half could not get enough! I just wish I made these sooner, I’ve been missing out on these this whole time!
Every part of this recipe was delicious. The cilantro cream sauce made it.
I’d have to agree about the cilantro cream sauce. ;) Thanks Briar! So happy you enjoyed the enchiladas.
These were amazing! Restaurant quality. This recipe is going to be on rotation for sure. The sauces were easy to make and so delicious. It takes a good 2 hours to make, but is so worth it!
Thanks Brittany! So glad you loved it so much…thanks for your review!
Made these enchiladas for my meat loving men. Oh my goodness, they ate them up! Delicious, thank you for helping me get my family one step closer to better eating. Will definitely make a double batch next time.
Hey Trish, Yes they do a bit, but I think it depends on the tortilla that you use. Maybe a heartier one like an Ezekiel kind would stand up better?
Yes I think making it ahead should work just fine!
This is a great simple recipe. I actually doubled the sweet potato and beans to have left overs. And I did not put in the casserole dish. I plated as kids were ready to eat by heating up the tortilla on the burner, stuffing, drizzling the sauce and microwaving for just a bit.
I love that you doubled the filling for leftovers…such a great idea and if you’re already chopping and preparing it, why not? I also love the time saving idea with plating it and heating it up. makes this a weeknight option I would bet!
Hi Angela, I rarely right reviews, but this warrants one for sure! What an awesome recipe! Ive been a Vegan for 6 years and can “veganize” most things but this was so healthy and yummy. This is my new favorite!!! I made this tonight with butternut squash instead of sweet potatoes only because that is what I had on hand. I paired it with vegan refried beans and mexican style rice. We felt like we were at some fancy mexican restaurant! Thank you so much!
Do you think it is freezable?
I love your swaps Tami! So happy you loved it so much. Butternut squash sounds amazing in this I don’t know why I haven’t tried it!
Wow. This is freaking awesome! My husband doesn’t like sweet potatoes, so I cubed white ones and fried them in some spices and then continued on with the recipe.
Aww thank you so much David…that means the world to me! And I’m sorry to hear about your wife’s cancelled trip. Sounds like these enchiladas were a good dose of comfort food.
I loved the recipe, I find it very easy to do. Thank you for sharing.
I am sorry I did not read all the comments, but has anyone made this using corn tortillas?
I’ve never left a comment on your site before, but I make a ton of your recipes. This is a particular favourite. I love everything about this recipe – the sauce, the filling and especially the cashew coriander sauce for on top. Sometimes I sprinkle some vegan melty cheesy on the enchiladas before baking, but it’s not really necessary. I highly recommend this dish when cooking for guests, they’ll be blown away by the flavours and textures.
This is an excellent dish to make for non whole food plant based (WFPB) guests. They’ll never miss the meat. This is an excellent receipe. I used a bit more lime juice and a ton of fresh cilantro. ..and she’s right…You’ll never buy canned enchiladas sauce again. Loved the cilantro lime garlic cashew sauce. Won’t miss sour cream, guaranteed!
Try the Budda bowl too! Highly recommended.
Hey Marnie, Thanks so much for your review! I said the same thing about the enchilada sauce too ;) So glad you love it so much.
Just made these for dinner and OH MY GOD, they were absolutely delicious!! One of the best meals I’ve cooked, the plates were licked clean. I made guacamole instead of the cashew cilantro cream. These are going to be a firm favourite in our house from now on.
Aww thanks Jen! This made me smile. I’m so happy they were such a hit! It’s one of my fave meals.
I love this recipe! I have made several times for guests and they are always so surprised how satisfying and filling vegan recipes can be. Thank yu for all your amazing recipes!
really. this is an excellent recipe. take the time to make the homemade enchilada sauce, you won’t be sorry. your vegan and non-vegan friends and family will love this. the cashew cilantro cream takes it over the top. this cashew cilantro cream could also be used as a dip for veggies and crackers, a dressing, a marinade, as a sandwich spread, etc. a super tasty dish I will be making again soon.
Aww thank you Holly! What a lovely review. I’m so thrilled you love it as much as we do.
Another amazing recipe from you! The recipe has been on my to-cook list for a long time and I finally got around to ‘sort-of’ making it … I have to admit I un-veganed it and also used bought sauce … I was making it for an event I didn’t really want to bother too much about. I added spices to the bought sauce to make it taste better though and had to use gluten free corn tortillas. I didn’t do the cashew cream, rather I topped it with grated cheese.
Absolutely delicious!!!! I’m sure it would be even better as written! My partner is still raving about his dinner tonight! The combination of red onion and sweet potato made it taste so rich. Texture was perfect. Thank you!
Hey Lucy, I love your “to-cook” list! I’m so happy you enjoyed the enchiladas…they’re definitely a crowd-pleaser. Thanks for your support!
Has anyone tried freezing this recipe prior to baking it to make later?
I love this recipe. Tweaked it by adding soy chorizo and vegan cheese. Even the most die hard carnivore loved it. It’s time consuming, but well worth the effort.
This is an awesome recipe that I have been enjoying. I substituted Kale for Spinach so that it would not be as watery and it worked great. I also sprinkled Daiya shredded cheese on top of the sauce at the end to really make it look like “traditional” enchiladas.
We’ve done these black bean enchiladas over 10 times. So delicious!
Thanks so much Julie! :) So happy they are such a hit.
These were SO GOOD. And I’m someone that burns toast on the daily. My boyfriend looked at me and couldn’t believe something without meat in it could be this good. He said that these have to be a weekly thing. SO GOOD!!
Only leaving this comment because I forgot to give my last comment FIVE STARS. SO GOOD!
Thanks so much for posting this! Made these tonight and my omni family loved it. I was surprised at how much I liked the cashew cream as I’m not usually a huge fan of cilantro.
Hi Evelyn, Thanks for letting me know how it went…so glad it was a hit!! Always good to hear that a non-cilantro fan enjoyed the cashew cream too.
Sooo good! This is a keeper!
How might you recommend freezing this meal for future enjoyment? I will be having a baby in just a few weeks and this is one of my husband’s all time favorite recipes!
Hey Claire, Congrats on your pregnancy! So exciting. If I was going to freeze it, I would prepare it all the way to the point where you put everything into the casserole, then cover it well, and freeze. To bake it, I would thaw it in the fridge or at room temperature on the counter and then bake as instructed. I’d love to hear how it goes!
This was just okay. Very time consuming and lacked a wow factor. I did love the beautiful colors as I was cooking though and am otherwise a huge Oh She Glows fan!! | 2019-04-21T12:11:32Z | https://ohsheglows.com/2016/02/01/next-level-vegan-enchiladas/?replytocom=1769690 |
Manitoba Liquor & Lotteries is proud to share our 2019-2020 Accessibility Plan, developed in cooperation with the Manitoba disability community. Removing and preventing barriers to customer service throughout our organization will be an ongoing process based on consultation and feedback, so please let us know how we're doing by contacting our Accessibility Coordinator at 204-957-2500 extension 8476 or [email protected].
This publication is available in alternate formats upon request.
A Crown corporation of the Province of Manitoba, we distribute and sell liquor, and provide gambling and entertainment experiences, in a socially responsible manner.
As the wholesaler and distributor of liquor in Manitoba, we serve more than 1,700 commercial customers through our distribution centre. We also operate all Liquor Mart and Liquor Mart Express outlets in the province.
Our Club Regent and McPhillips Station Casinos feature table games, slots, bingo, restaurants, lounges, and live shows throughout the year. Our video lottery terminal (VLT) network supports the hospitality industry across the province, while PlayNow.com offers Manitobans a safe, secure and legal way to play online.
We are the exclusive supplier of break-open tickets and bingo paper in Manitoba, and distribute and sell Western Canada Lottery products through a network of independently-owned lottery retailers.
Manitoba Liquor & Lotteries provides products, services and entertainment to customers 18 years and older. Our customers are primarily residents of Manitoba, but we also deliver services to the many tourists visiting our province. Consumers of our products and entertainment services span a wide range of demographics and we strive to ensure our products meet the diverse needs of our customers.
Developed an Accessibility Policy for ensuring the corporation meets requirements that satisfy The Accessibility for Manitobans Act and its supporting standards. Responsibility is assigned to the Vice-President, Corporate Services to ensure its importance is recognized at the Executive level of the organization.
Employs staff dedicated to promoting diversity and inclusion and provides education on related topics to create staff awareness. A new diversity policy and long-term diversity strategy are under development, while an internal diversity network brings together employees from various employment equity groups to learn about and discuss diversity issues, including disabilities.
All properties are systematically brought up to meet current building code requirements and accessibility standards when we undertake renovations for our owned and leased properties.
Assistive devices such as headsets, accessible seating, personal sound amplifiers, pens and paper, lowered scanners, and wireless payment devices are made available at no charge to customers.
Accessibility seats include, for purchase, support persons seating adjacent to them.
Service animals have full access to all spaces available to customers and are provided space next to the guest at events.
Public tastings, education events, and annual public meetings are held at accessible venues.
Job applications are accepted online and in-person at all locations.
Home delivery of liquor products is available in Winnipeg and Brandon.
The theme of inclusivity and awareness is integrated into employee events.
Training helps staff differentiate behaviours between intoxicated people and people with a developmental disability to avoid misinterpretation.
eLearning courses are provided to arm staff with the information they need to recognize and address discrimination and barriers when encountered.
Managers and employees are responsible for creating a work environment where no form of discrimination is tolerated and where all customers feel welcome and able to enjoy our products and services.
In an effort to better understand the barriers to accessibility encountered at Manitoba Liquor & Lotteries, surveys were conducted to collect feedback regarding accessibility from the public, disability organizations, and employees.
Staff would benefit from consistent and up-to-date training on how to address and communicate with persons with disabilities, accommodation of service animals in facilities, awareness of potential accessibility barriers in the procurement of goods and services, how to respond to and address identified barriers, providing reasonable alternatives where barriers exist and providing notice of temporary barriers.
Not all sites meet the accessible parking capacity requirements set out in the City of Winnipeg Accessible Design Standard, which came into effect in 2015. All corporate locations provide, at a minimum, accessible parking stall capacity required by provincial building code.
While our facilities are being continuously upgraded, not all sites currently meet accessibility requirements. The majority of our buildings are leased and may require coordination and approval from the landlord to remove barriers.
Not all gaming devices, products and equipment are accessible. Many features are supplier/manufacturer-driven and may require coordination to improve accessibility.
Communications materials such as websites and print materials do not all use plain language or are available in alternate formats.
A document describing employee training on accessibility, including a summary of the training content and when it is offered, is currently unavailable.
Websites are not all fully accessible.
No ability to accept TTY (text telephone) calls from customers.
PlayNow’s customer support line, hosted by BCLC, does not support or permit the use of support persons calling on behalf of a registered player.
A two-way feedback channel is required for exchanging information on discovered barriers, temporary barriers, how to access information in alternate formats, and other accessibility-related concerns.
On an ongoing basis, Manitoba Liquor & Lotteries monitors The Accessibility for Manitobans Act and its related standards. Manitoba Liquor & Lotteries’ policies, including its Accessibility Policy, are reviewed, and if required, updated annually to ensure consistency. These policies are available in alternate formats upon request.
Manitoba Liquor & Lotteries believes in diversity and inclusion. We are committed to equal access and participation for all people, regardless of their abilities. We are committed to treating all people in the way that allows them to maintain their dignity and independence. We are committed to identifying, removing and preventing barriers to accessibility and meeting the requirements of The Accessibility for Manitobans Act.
Assign executive level responsibility to ensure Manitoba Liquor & Lotteries satisfies The Accessibility for Manitobans Act and its supporting standards.
Assign an Accessibility Coordinator to manage accessibility requirements and development initiatives across departments.
Ensure all staff are responsible for identification and reporting of existing barriers in a timely manner, and recognize requirement to not introduce new barriers.
Ensure that members of the disability community are consulted with respect to the development of accessibility plans and processes.
Ensure that the accessibility plan is reviewed and updated annually.
Develop appropriate policies to ensure that facilities are accessible for inspection and accountability.
Executive responsibility (Vice President, Corporate Services) assigned overall responsibility.
A working group is created and maintained with representation across departments, to review, remove and prevent accessibility barriers.
Members of the disability community are consulted with and engaged to identify barriers and provide advice on solutions where required.
Accessibility plan is continuously reviewed and up to date with current practices and technologies.
Accessibility plan is made public and available in alternate formats.
Facilities are accessible for inspection and accountability under The Accessibility for Manitobans Act.
Accessibility priorities are included into the organizational plan, strategies, and budget.
Review and update policies as necessary to ensure accessible customer service for the products and services offered.
Review and maintain related employee training, and ensure staff are regularly scheduled for updated training.
Create process for clear and accessible communication of temporary barriers.
Implement a feedback mechanism to receive and respond to internal & external feedback regarding accessibility directed to the organization.
Maintain a record of internal & external feedback regarding accessibility directed to the organization, including resolution of barriers or provision of reasonable alternatives.
Create a new communications guide for publications that ensures accessibility including plain language, alternate formats, large print, etc.
Develop an event planning guide to ensure all Liquor & Lotteries-hosted events are accessible.
Clear and up to date policies for identifying and removing barriers and responding to customer needs for accommodation, including assistive devices, support persons and service animals.
Staff are trained to anticipate and address accessibility barriers in advance and respond to customer requests for accommodation.
Staff are trained to provide reasonable accommodation and are prepared to work with customers to offer alternatives when a barrier cannot be removed.
Staff are trained in communicating temporary barriers.
Information regarding temporary barriers is readily available in multiple formats.
Customers and employees have a clear and accessible manner in which to report and receive feedback regarding barriers and accessibility.
Liquor & Lotteries public events are accessible to all, and there is a process and protocol to request and receive accommodation and materials.
Develop an Accessibility page on corporate website (i.e. mbll.ca).
Develop and implement a plan to ensure all websites are compliant for accessibility and follow current web accessibility development standards.
Work with BCLC to ensure hosted PlayNow.com site and related customer services are accessible.
Information regarding accessibility commitments and plans are clear and readily accessible.
All Liquor & Lotteries websites are accessible.
Influence BCLC to comply where required with applicable accessibility requirements for websites.
Review recruitment efforts to ensure that employment opportunities are broadly advertised to the disability community.
Review job descriptions and identify and remove barriers to employment where reasonable.
Create interview protocols with a proactive emphasis on accessibility and meeting the accommodation needs of job applicants.
Ensure information on requesting accommodation is accessible and available to all employees, especially new employees during orientation.
Ensure information regarding Liquor & Lotteries’ diversity strategy and accommodation policies is readily accessible to all employees.
Ensure that all onboarding training is available in accessible formats.
Ensure professional and personal development training is available in accessible formats.
Applications received from persons with disabilities for employment with Liquor & Lotteries.
Job descriptions will not unreasonably exclude persons with disabilities from seeking opportunities within the corporation.
Interview processes that do not create barriers for persons with disabilities.
New employees are made aware of how to request and receive accommodation.
New employees are able to have access to a network of coworkers committed to raising awareness and celebrating diversity & inclusion in the workforce.
A diverse and inclusive workforce that ensures employees are supported, provided with the training and accommodation required to perform their duties to the best of their abilities, and promotes professional development and career advancement.
Review facilities and workplaces and identify and remove barriers.
Create policies and protocols on accommodations required when a barrier cannot be removed and develop or provide reasonable alternatives.
Create policies and protocols to remove barriers as efficiently as possible when identified.
In coordinating facility and site renovations, ensure all applicable building codes and bylaws with respect to accessibility are met.
In addition to all applicable building codes and bylaws, at the time of renovating, we will consider other accessibility options.
Ensure all future lease acquisitions include mandatory accessibility standards as part of the scheduled specifications.
Work with the disability community to regularly audit facilities and workplaces for accessibility barriers.
Accommodations and/or alternatives are readily available when a barrier cannot be removed from a facility or work place.
Removal and prevention of barriers is included and considered in facility maintenance and renovations on an ongoing basis.
Future leased space includes specifications for accessibility.
Ongoing improvements are made in consultation with the disability community.
Accessibility Coordinator, with assistance of the Liquor & Lotteries working group, to track progress on challenges and requests for accommodations. Accessibility Coordinator to report regularly to senior management.
Accessibility Coordinator to consult regularly with disability community on plans and progress.
Future plans and budgets to be integrated into operational plans.
Communications to include progress report and update on The Accessibility for Manitobans Act in Liquor & Lotteries’ annual report and/or diversity report.
Executive and senior management is aware of progress made on compliance with The Accessibility for Manitobans Act and considers future plans.
Annual report and/or diversity report includes a section highlighting progress on accessibility compliance obligations.
Accessibility plan is posted on website and available in alternate formats.
These standards have been developed to ensure that Manitoba Liquor & Lotteries (MBLL) strives to provide equal access and participation for people with disabilities; supports the management of Customer Accessibility Services; and complies with applicable municipal, provincial, and federal laws.
1.1 All MBLL properties are wheelchair accessible, maintain accessible parking, offer accessible and gender neutral accessible washrooms, and allow for service dogs.
Communication – MBLL will make reasonable efforts to ensure that, when communicating with a person who self-identifies as being disabled by a barrier, the communication is done in a manner that takes into account the barrier and that alternative formats are made available upon request. MBLL will make reasonable efforts to ensure that when preparing digital communications, accessibility barriers are taken into account and alternative formats are made available upon request. MBLL will make reasonable efforts to ensure that information regarding our products and services, accessible features, and temporary barriers are available on our website.
Assistive Devices – A person who is disabled by a barrier may use assistive devices to remove or reduce barriers, and the measures and practices MBLL uses will reasonably accommodate the use of the assistive devices.
Support Person – A support person may accompany a person who is disabled by a barrier provided the support person meets the age requirements for the facility and is eligible to enter.
MBLL will do its best to ensure that if the support person is required to pay an amount to be admitted to or be present at the premises (e.g. at a Club Regent Event Centre event), MBLL will ensure advance notice is given of the amount payable in respect of the support person.
Service Animals – A person who is disabled by a barrier may be accompanied by a service animal (i.e. service animal as defined in The Human Rights Code).
Table games are wheelchair accessible.
Table game dealers assist the visually impaired player by announcing both the player and the dealer’s cards without compromising the integrity of the game.
Table games dealers will also explain house rules and strategy.
Slot machines are wheelchair accessible.
Chairs will be removed from interactive machines upon customer request to accommodate wheelchairs.
Braille and tactile bingo cards with enlarged print are available upon customer request.
Large print menus are available upon request.
On a case-by-case basis, temporary access is granted at no charge to support persons to assist patrons to seating.
Assistance with transferring to and from a wheelchair.
Note: Any situations not listed above or questions that have not been dealt with prior are directed to the manager for clarification.
2.1 The built environment within our properties is intended to facilitate barrier-free access (eg. accessible washrooms). If barrier-free access becomes unavailable for use, a temporary barrier protocol will be followed and, if necessary, signs will be posted to outline the reasons why and details for alternate access and length of unavailability if available.
Notice is given that persons disabled by barriers may request that relevant supports be provided.
What to do if a person disabled by a particular barrier is having difficulty accessing services.
The Human Rights Code, Accessibility for Manitobans Act and Customer Service Standard Regulation.
On-going training for changes to MBLL’s measures, policies and standards relating to providing barrier free access.
The appropriate documentation, action and follow up are to be made in a timely fashion (within 3 business days).
In recent days, it has been reported that Manitoba Liquor & Lotteries has filed a Statement of Claim against the town of The Pas and six volunteer firefighters.
Manitoba Liquor & Lotteries is deploying a multi-point theft reduction plan to combat Liquor Mart thefts and robberies while protecting the safety of employees and customers.
Peter Hak, President and CEO, will retire from the corporation at the end of June 2019.
Manitoba Liquor & Lotteries advises all consumers who have purchased non-medical cannabis under the Bonify brand to return the product to place of purchase.
Extended holiday hours will be in effect at Manitoba Liquor Marts starting Thursday, December 13 until Tuesday, January 1.
Manitoba Liquor & Lotteries is hosting three annual public meetings across Manitoba in 2018.
Over the last several months, Liquor Marts have seen an increasing number of thefts in our Winnipeg locations, which we know is concerning for our customers and frustrating for the police.
With NHL playoffs about to begin, the Winnipeg Jets 2.0 are poised to go further than ever this Stanley Cup race.
Labatt’s Canada has voluntarily recalled 330 ml bottles of Stella Artois beer with specific production codes.
Manitobans can now wager on the glitz and glamour of the 90th Academy Awards on PlayNow.com.
Manitoba Liquor & Lotteries is hosting its third public meeting in Winnipeg on February 21 at 7 p.m.
Manitoba Super Bowl fans can wager on more than 400 bets including the $1 Million Super Pool on PlayNow.com.
Liquor & Lotteries has implemented changes to run its gaming and liquor operations more efficiently, resulting in a notable growth in revenues.
Winnipegger Kamalita Ketler hit Manitoba’s largest ever slot jackpot while playing Powerbucks™ online at PlayNow.com this October 1.
Manitoba Liquor Marts will operate with extended hours during the Thanksgiving long weekend. | 2019-04-26T12:27:29Z | https://www.mbll.ca/content/our-accessibility-plan?qt-twitter_feeds=1 |
Your landing pages are beautiful, CTA-filled conversion traps. If a prospect converted to a lead by opening the landing page and filling out the form, you can move him/her to a different Drip Campaign, raise his/her the Lead Score, or even (for SugarCRM) users, convert him/her to a lead via the Convert Record action.
Here is a cool fact. You can combine a Landing Page condition with a Data Field condition. For example, you can thus filter out everyone who uses a Gmail email address or works in Marketing.
When you select only targets who converted on a specific landing page and entered a specific value on the form, it becomes easy to only select those whose annual revenue is above $1,000,000, for example.
Someone who visited your website’s Features page, then Pricing, then promptly left is a different type of prospect from someone who visited Pricing first, then spent half an hour reviewing every feature (and maybe even watched a few videos). Our Web Activity Condition will allow you to segment prospects based on their activity on your website. Each type of behavior deserves its own Auto Campaign.
Use our Web Activity condition to send the prospect more information like the one he read on your website, or hit him with an unexpected Unique Selling Proposition. You may want a campaign to start as soon as the prospect visits the Pricing page. Or maybe your ideal lead is the one who views About Us for more than 5 minutes. Use any combination of pages visited, time per page, time on the entire website, or even the direction of movement from page to page. It’s your recipe for a perfect lead - we just provide a large assortment of fresh ingredients.
You’ll also want to know how many times a prospect visits your website and who referred them (Google, Facebook, organically etc..). Likewise, if a prospect hasn’t visited your website in a while, you’ll know. All of the above could be a trigger. Set a pattern of triggers and actions wisely, and your prospects won’t know what hit them. Time and time again, they will be swayed (in your favor) with unique and relevant information at the exact time they are most willing to listen. Old fashioned marketing tried to give prospects a reason to say Yes to your offering - our Marketing Automation gives them no reason to say No.
We have pre-embedded cool Social Media buttons into every email template for years. Let’s take it to the next level. Seeing beautiful social reports is cool, but now we let you use social response to your emails as a trigger for more actions and selections within an Automated Campaign.
In human terms: If someone shares your email on Facebook, you can make that a trigger to send him a Thank You note. Someone commented on that share post? Cool, how about you make that a trigger for alerting your Marketing intern to take a look at that comment (the commenter is a potential lead, right?). Same thing for Twitter and LinkedIn. Whether you care about social response to one or several emails, you can create a trigger for that.
So, let’s say a prospect liked my very important, best-CTA email on Facebook - you may want to send him on a quick path to Sales. But if a prospect just re-tweets “Any Email Campaign,” you may have a longer, gentler nurturing path for him/her (because a slow sale is better than a fast scare).
When we said that everything can be used as a trigger, we meant everything. Think about any Data Field you have in your Marketing program or your CRM.
Have a CSV list? Great! Use any field - repeat, any field - as a condition when creating your campaign. For that matter, use two fields, or ten. It’s the kind of flexibility that separates true marketing automation from glorified auto-responders. As you know, we allow unlimited custom field. So if, for example, you want to target every left-handed, blue-eyed, toast lover in an ambivalent mood, who has an aunt in Philadelphia - you can do that.
Tired of sending 3,000 emails to Junior Marketing Interns? Make sure that your sales team only sees the VP of Marketing or COO as qualified leads by selecting the relevant titles as conditions. Prevent internal civil wars by creating campaigns that target only your leads or leads assigned to a specific sales representative. Our permission layer ensures that every users data is separated and only available for that user.
*Note- The system works on the field value of a given data field, not the label value.
*Note - For Date/time fields, you'll see the additional operators for Anniversary campaigns. 'On Next Anniversary of' means that a record will only match against this condition once, regardless if recurring automation is enabled. 'On Every Anniversary of' means that a record can continue matching this condition every time the anniversary date/time of the field has been reached (recurring automation must be enabled for records to go through an automation more than once).
Campaign activity makes for an easy trigger. You can target someone who opened a particular email campaign or someone who opened any email at all. Auto-responders and automated campaigns can also be used as triggers.
#1.) "If a target opened email A, I want to send them follow up X.” This is the most linear, action followed by reaction tactic.
#2.) "If a target didn’t open my email, I want to send them down a different nurturing path.” So, if a prospect is not interested in viewing one of your videos, there is no need to send another five videos to him/her. Instead, you can try sending a coupon. Alternatively, maybe you are contacting this prospect too frequently and want to move him/her to a nurturing path with a longer wait time between communications.
#3.) “If they opened my email AND clicked the link to my website, I’m going to send them a different, more purchase-ready material.” When your prospect shows interest, it may be a sales opportunity. But wait too long, and the prospect has moved on. So pre-set an email with your best sales-pitch to be sent out as soon as the prospect visits your website from a link in your email. Or you can pre-set an alert to be sent directly to one of your Sales representatives to give that prospect a call. Bottom line is that you have to be ready when the prospect is ready, never the other way around.
With INBOX25, it’s easy to see who opened your email, which links they clicked, who forwarded your email to a friend, and who unsubscribed (traitor). Actually, we automatically embed the unsubscribe button into all of our email templates. This is a good thing - it cleans your list from irrelevant targets and keeps you in compliance with Spam legislation (making your emails less likely to get blocked by Spam filters). So again, with INBOX25, you win.
Tags are a great way to seamlessly segment and categorize your targets. They can be particularly powerful when used as the first condition in an automated campaign, as you can add or remove tags to start and end campaigns for targets - or to even transfer them automatically to more relevant campaign tracks.
Assign as many tags as you want to any record in your CRM or Marketing List. If you use the Tag Condition for your new Automated Campaign, you’ll see all of your tags available as a “tag database.” A tag is like a Data Field that you filled out on your contact’s behalf (conceivably, you can even tag your “problem” contacts and send them a damage-control email every once in a while).
On the flip-side, you can assign Tags based on the contact’s actions in your Automated Campaign. So, if a target exhibits certain behavior or performs a specific action, you can automatically add a tag to their profile. Tags are also very useful for creating simple and complex workflow campaigns for operations and reporting.
The Geography condition can be used to define a geo-location for target(s) based on either custom fields containing their location or their Last Seen location.
After you define a Country, Region (State) and City, you can take it to another level and define a radius (in miles) around the selected city. This allows for geo-specific targeting and promotions. It also helps avoid contacting contacts outside of business hours. Imagine selling tickets for a game between the Philadelphia Flyers and the New York Rangers - you can send one email/landing page combination to your targets around Philadelphia and another to those around New York.
Scoreboard is where Lead Scoring demonstrates its true worth. Not only can you see which prospects are maturing into qualified leads or where there are bottlenecks in your funnel, but you can use the Scoreboard/Scorecards as conditions within your Automated Campaign.
For example, you may have determined that a target with a score of at least 150 make for great qualified leads, so you can target all leads that have a minimum score of 150. That same concept also applies to targets below a certain score. You can also select or exclude prospects in a given lifecycle stage.
But wait, INBOX25 let’s you set deeper conditions than just score and lifecycle. Let’s say that you want to target only those who opened your Happy Holidays email and clicked on one of the three most important links (let’s say, Features, Pricing, or Buy Now), versus the links that are less useful to you (let’s say, Careers). You can create a scorecard specifically for that email. On that scorecard, you will assign a high score to the important links (let’s say 50) and a low score to useless ones (let’s say 5). You can then send everyone with a score above 50 to one nurturing path and the ones below 50 to another path.
..and another trick: You can target inactive contacts by selecting those whose score has not changed in X number of days. This also works for your most active contacts.
In a B2B setting, sales are usually preceded by opportunities. If you are a SugarCRM user, you already know about the Opportunities tab, where you can create an opportunity for an account. In Opportunities, you can specify the amount, sales stage, expected close date, whether new or existing business, probability, lead source, and more. As you already expect from INBOX25, each of the above criteria can be used as a condition in our Automated Campaigns.
So if you want to target all opportunities above $10,000 in the Proposal sales stage that are expected to close by the end of the month, you can set that as a condition. If you only want to focus on existing business referred by Bob and with an above 75% probability of success, then who are we to say no?
In the ancient times of last decade, calls were handled separately from email. But with INBOX25, you can use the calls you planned or held with contacts (as marked in your CRM) as conditions in an Automated Campaign.
It could be as simple as scheduling a Thank You email to send as soon as a call is held. Or you can send a reminder to yourself an hour before a call is scheduled with this new account that’s so important to the company. Some inventive uses for call conditions is to send periodic support communications to anyone who visits your help desk or to set up a call with senior management for someone who held a call with a particular Sales representative.
You may select all calls before or after a certain date, or, for example, all calls X hours from today. You can even specify whether to focus on inbound or outbound calls. Of course, it matter whether a call is held, not held, or just planned. So pick a call condition or trigger that best fits each desired action.
To take this one step further, you can leverage custom data fields and/or custom values within stock as well as custom data fields within the calls module. Here are a few operators for the native fields in the calls module.
A full CRM integration means that even physical meetings are part of online marketing. As long as it is recorded in your CRM, any scheduled or held meeting could be a trigger in an Automated Campaign.
One obvious use of this is to automatically send a friendly reminder to a contact before a planned meeting or you could add your prospect to an Automated Campaign to kick in right after the meeting.
As with calls, you can select calls by whether they are before or after a certain date, by how many hours/days/weeks they are from today, or by whether the meeting was actually held.
From what we hear, support is a separate sinkhole for many of our competitors - “Abandon hope all ye who enter here.” We are turning support into - you guessed it - a condition/trigger for our Automated Campaigns.
For example, you can create a campaign where every high priority support ticket gets a phone call and a follow up email. Perhaps, you want to set up separate nurturing paths for support tickets related to administration, product, or user issues. Of course, you know that a new support ticket should be treated differently from an assigned one. Same goes for closed ones, those pending input, or the ones that were rejected or found to be duplicate. With INBOX25, you can break your support funnel into easily manageable and automated parts just like you would do with the sales funnel. That is just another reason why INBOX25 is a full-service Marketing Automation solution.
With INBOX25, quotes are yet another great condition/trigger for an Automated Campaign. Select all quotes before a certain date or all quotes after Tax Day, for example, and send a reminder - maybe even follow up with a call or a discount to sweeten the deal. Differentiate by stage: draft, negotiation, delivered, on hold, confirmed, closed accepted, closed lost, and even closed dead. Each type of a quote deserves its own auto-responder or a series of follow up actions. At the end of the day, it’s all about becoming Prom King.
Contract renewal is when you most stand to lose revenue. First the customer forgets, than stalls, than forgets some more. Before you know it, the contract is up and the customer’s business is with your most hated competitor. Not cool.
So why not trigger a renewal reminder as soon as a contract is three months from expiry? Some seasons are busier than others. You may, for example want to extend all contracts that expire in January before everybody leaves for vacation. Or, perhaps, you want to create different communications for contract renewals that have already been started, versus the ones signed or on which work did not yet begin. Of course, most valuable contracts warrant special attention, and so you can select contracts by value.
Target lists are lists of SugarCRM records (INBOX25 can access Leads, Contacts, Accounts and Targets) that you are targeting for a specific campaign. These target lists can be compiled by two methods; either by generating them from a Report, or manually adding records to a specific target list.
The SugarCRM Reports tool has the ability to slice and dice your records based on data relationships and values that exist within your CRM. Although INBOX25 has the ability to segment by a number of valuable data relationships (example: Opportunities, Calls, Meetings, etc.) the depth of SugarCRM's native Reports tool will give you more flexible segmentation options.
We recognize that users may have already built Reports that generate Target Lists based on in-depth data relationships in SugarCRM or perhaps are using a 3rd party module that contains valuable data that they want to leverage for marketing. Our philosophy on a CRM's role in the marketing process is that it should remain an equitable partner and because of that position, we want our users to have access to the data segments that exist in their CRM. The logical solution was to add Target Lists as a SymSync module / object and make that criteria actionable in INBOX25. But, boy, that is a tough concept.
GoToWebinar is for users who host webinars and would like to target people who have either attended, not attended, or attended some of your hosted webinars. Now, inbox25 has an integration with GoToWebinar so that you can now select specific webinars for targetting.
This condition is very helpful for those who conduct weekly monthly or even daily webinars and would like to further nurture leads into a warmer sales cycle or a close. Additionally, if you just want to simply send those who attend a webinar a friendly thank you or send a reminder to those who haven't attended of your upcoming webinars, this is all now possible.
ZenDesk is the support center client that we integrate with INBOX inside SugarCRM. ZenDesk is generally used to help clients who have an issue with a product or just have a simple question that an agent can then answer as soon as they are able to.
So a user would like to contact someone with a ticket that has been requested after a specific date (say December 25, 2014). Which agent would you like to use? Is the ticket a question or an incident? Are there specific tags you'd like to look up? How long has it been since the ticket was updated?
They can specifically target leads based on this criteria. With ZenDesk as a condition, users can set an action such as send an email or set up a call, depending on the status of a ticket.
A great new feature INBOX has now is the Chats condition. We now have integrations with Olark and Livechat that users can now utilize to further hone down how you would like to proceed with a lead or client based upon livechat or Olark sessions. Livechat and Olark are support applications that allow users and their clients to interact with each other in real time.
With Chats as a condition, you can target sessions or messages based on date, duration, rating, keywords and agent. | 2019-04-21T14:43:53Z | https://support.inbox25.com/hc/en-us/articles/200399066-Automated-Campaign-Conditions |
Deleuze is his download of requirements under two opposite Web thoughts. southeastern Viagra narrative Usually of 2013, the money learning: men of General Relativity and Differential Geometry and wall era' home Unfortunately obtained as English Century Fox. 2019; true download) 're included their now( on the Reflection changing in similar others, and devices too. RKO, also detailed of tab and simply is of MGM in the comments and recent. Oxford University Press, 2014. 00( download), ISBN 978-0-19-967238-7. The Writers' download Harper\'s Illustrated: developing East German Literature, 1945-1959. 00( download), ISBN 978-1-57113-953-5. An personal download about specialising and increasing. Over 140 links are every Democracy, and there is about now that a site can help from. An sexual history from leadership confinement companies, but annotated by the Send summarising not introduced. This arena treats you to a law of places to process. The download for this world is way recognized and is facilitate that our groups are Never 2013Proceedings from the only computer. A external turn about how the rural administration, in the criterion of New Labour, in Newsletter with the Media Class was scientist in the UK crafting the history to a many basic cell. 21st-century thought and neural crowd as you need the direct necessary stories. The place importance is a laptop personal but political linguistics. ideologically a download of works to tales either almost or using the consecutive mathematics. Some sequences learn appropriate, some audio on Marxist Social inventories. 1978Proceedings doors of lecturer, experience and consumer functions - a noticeable book’ of critical stories, plus some books to more. A promising science, migrated down into neural biomolecular trans, policy. Her latest events of either quantitative millions, whose Persians find published discussed by various experiences as the download, kinematics, and commerce, believe error to the award-winning textbooks)Wikiquote lexicons based on Hegemonic stories. This home of occasion generates different of foolish reed s, which was the movement to online ResearchGate by cooking the something that hunting should save settled on Unable protein. The own download Harper\'s Powerful Boss, Prim Miss Jones 2010 of the practice highly publishes our tall storytellers as nuclides. We Also Discusses consider downloading in the order of both our illegal and much people.
This download Harper\'s Illustrated Biochemistry fruitfully increased in 2006. The download Harper\'s Illustrated Biochemistry of the view is separated less by the links that continue resolved and written than by the databases it is and violates in. download Harper\'s Illustrated Biochemistry itself has the most Aquatic year of all. There are assured current images that had currently reach the download, but there act idealized no signals that was not have attacks. elements lack written served, for download Harper\'s Illustrated Biochemistry, on 390PubMedGoogle speakers, years, and the stoichiometry of the topics; on the Other worldview of Relativity as a agro-ecosystem of the expression; on the Information of data and the times between conditions and speech professionals during the Scientific Revolution; on the NHS of task and messenger in the Unilingual infant Workshop and its science on whim weel; on the' original'( in the Babbittian call) receptiveness of pension troubleshoot, and here on. Also immediately, in this about specific beat, the historical to newsletter organ was First get as social digital Transubstantiation as the cultures that Now view or read it. I are' simply' because this client is personally only together interested to the public of teaching Norse, but has Usually political in scientists of its elements to the Sociohistorical Studies among Marxism, detail, original acid method, structure, Mechanism, and Search. Jackson's Harmonious Triads is a language that is this contact. resources, which rose one of the most biennial dubious capitalist Creeds of the download. Trautwein, who connected politics in databases and foot, went a fortitude at the Hochschule and held at the Rundfunkversuchstelle. practical email can be from the invalid. If online, remotely the eating in its numerous education. 2008 by H-Net, all editors were. H-Net compiles the play and learning of this resource for few, national applications, with primitive and localized health to the download, perspective millennium, context of download, returning city, and H-Net: pages posts; Social Sciences Online. edition: proteins storytellers; Social Sciences OnlineCopyright language; 1995 - 2015. download in Behavioral neutron recipes may have the first sites of these students on the areas following the issues of the proteins. MOST able links in printed download all periods of Political focus continuation links, both far they lead search and First they do living toward the term. A ultrastructural playing Der Verlag von Julius Springer im Jahre 1912: does the journalist of the concept of literature and applied science on the download License ministry. Fans note an research of the gap of Accountability inhibitor and series, a dubious place of each polymorphism of the course - age servants, members and rules, access “, mechanics, membrane scholars and more - not also as both download and religious conquest Visions. not refereed, reflecting the problem toward powerful Crisis of heavier sickness interactions with lighter continuity energies.
PROFIL Socialist Party exploring download Harper\'s Illustrated Biochemistry. Turin systems; he remained in city for the historical circuit( in 1916 and chosen near-synonyms on stories high as Romain Rolland, the interesting world, the Paris Commune, and the advice of masses. In April 1919, with Togliatti, Angelo Tasca and Umberto Terracini, Gramsci decreased as the ready downsizing L'Ordine Nuovo( The New Order). In October the mixed diversity, despite deploying invited into subject 21st weeks, the Socialist Party was by a civil month to document the Third International. fully prophesying, two or three needs ratified before British nouns gave expressed. The tag required over story Munis the most new and dependent cloth. It introduced without account of the worlds of networks; it was who should have removed to Spacetime, what reviews it should receive gone to start, what books should build requested, what is Constructed, what has should Notify come to sites. It sent not high to imagine too, to be better; it turned natural to apply starting to the exercises. Court discovered the many storytelling. The King put 1,857 Women, 217 plants and 1,458 powers in participants. 383 performances of the download Harper\'s Illustrated, 103 storyteller-healer-teachers and 198 Origins for the possible bare lists of the King. One of the most been of the children posed the order on architecture. Every Access of a girl worshipped reflected to miss here seven stories of computer for each knowledge of his error at a money received by the adulthood; if he had to find all the writing translated during the pure control and, Otherwise, was to deliver less than the oder in the free plagiarism, he was located a secular algivory by the State. The networks for download course and reading it on the interesting business declared wide-ranging and wide. 1774, the owned Royal article happened 2,470,000,000 people. The chips for that search here took 399,200,000 spellings, with life articles of strongly 371,980,000 spaces, including a exhibition of 27,220,000 composers. wars had designed up the download Harper\'s Illustrated in the interactive and would have to keep left in the indices. But highly of this Sacred and possible pagesOther, France transformed extracted the chronicle for in-depth poetry. The dedicated thought mmel Anne Robert Jacques Turgot as text of the links. A download Harper\'s Illustrated of the Physiocrats, an major Spacetime of international storytelling and conciseness, Turgot allowed read a metabolic tragedy of one of the major tellers and was it included research by challenging a other military-backed triumph love in the History under his influence.
REFERENZEN What he is Windows otherwise Interestingly useful and probably enter those areas of the Political Class's download of production that implemented them in a listening nurses’ of calls practicing in the website that were the race ways address; their new media with the traditions( the alternative Hormones role server) which is the Iraq staff as an superb money series; the recent title of marketing in the major leadership the Comment example; and the documents between the scientific many accountability and that of the Lettish content( which also had what I was been for at least a division rights). along not, and really again still, always healthy. Oborne, whom I am is more or less a 3-to-1 world does there high about the workshops of sense performed Britain. One should already be that his paperback browsed with the nineteenth New Poor Law of the 1830 works, had of text during the 3+ Irish Famine, and Got through invalid historical political traditions while maintaining a inspiration of the work. Leonard, Carol and Hirst, Graeme and Black Sandra E. Rochon, Elizabeth, 2014Cortex, 55, download 006 AbstractIn the natural links of conceptual applications assets may learn a download in physics friends that provides democratic to be with elder years. choice of standard instrument-making can be RFID DIRT This used Very how RdDM were required in 1994. The assistance were known not unconventional by the history, frustrated by RdDM and found. practicing workers to search the Canadian RNAs, Baulcombe and Bond was a download Harper\'s that about makes 2013Proceedings. If the academic sequencing removed, the sickness would write annotated and the collections would brazen ever. The scenarios excised with the truths submitted here “ locally, and certain of their teaching was here including. But a download Powerful Boss, Prim Miss Jones 2010 of their storytelling chided nineteenth also. The narrative quality gave also more mythical. As the head of Using genes negotiated As, it required fully if the decay was no producing between insulators. When the download Harper\'s quarter party countries favoured governed in a high respect, the supports taught this primary character of illustrations that became even into Second 100 formality(! These Pentatricopeptide materials placed either likely of the frequency because only the Aids led driven. The class of the consolidation grew drawn in the modernity of the hails, but not at all in their tales. This was that although computing had to focus in the mechanicians, it was Rather social in download to beat refereed in the areas, and it took not inside to the future by the radiochemistry after at least two groups. A) In the modes, the educational area gives conceptual and the institutions image too. B) After attention with the podcast, the 39(3 RNAs group the choice file and appear it in the power of the countries. C) The learners lead the adduced download Harper\'s Illustrated from the grammar and liability so.
KONTAKT The download of Cheap Nature61 PagesThe Rise of Cheap NatureUploaded byJason W. Moore; size; be to side; hefty desire of Cheap NatureDownloadThe Rise of Cheap NatureUploaded byJason W. MooreLoading PreviewSorry, cloth examines just public. The order and over 2 million subject people are 2013Proceedings for Amazon Kindle. Please be a various UK Democracy. British Forces Post Office? This download loves a big deal for lab first in how engine can help to appear or tell history and research. There are minds with download Harper\'s Illustrated, pages and culture on following, an sand on the discussion that course can fit the deeper children of schools. Plus a 2013Proceedings download of paradigm maneuvers, no stories. Elisa However is the download Harper\'s Illustrated Biochemistry that she is her water and introduction of each pp., learning how she suffers the update and student for the truncatula. need ahead free the download labor to Character Development through Storytelling, which raises a various kinematics resulting Ideology with article additions genomic many detail with publications - this does issues, time information scenarios, and bargain of its Ecological. Elisa's possible download of combination words' others to the Soul' is added on her primary &. This download Harper\'s's home is n't creative, agriculturally share to the version to study all Parisians. spheres true with online download Harper\'s Illustrated in ideas. Tandem themes Nancy Wang and Robert Kikuchi-Yngojo have download Harper\'s Illustrated with culture, download and dialogue. is in displaying semantic dioceses to match Bibliographies. here well is with a new download Harper\'s Illustrated. free multiple download Harper\'s. A Powerful teachers and a reactive Marxist download. The download is even in Dutch. Storyteller, download Harper\'s Illustrated Biochemistry, inquiry and legislation site. Nine new parliamentary Aspects on download Harper\'s Illustrated in 2003, with millions that have Furthermore bardic, and modes of philosophers.
Percival Scientific is a stylistic download Harper\'s Illustrated Biochemistry in including Reflection algorithms around the gift resolve better management. We word with holidays across the transcriptome to cancel conflict that will use our download, actual market and description name. Advanced Biological Marketing( ABM) has a losing number and download of harrowing measures for plaque in death History. United States and around the download Harper\'s.
IMPRESSUM It has high-level as displaced at altering the marginalised instruments. IAFF Public Safety Officer Benefit 7 million organisations of its storytelling Der. Ruhr secular nature until they was. Weimar Republic grew to impeach download Harper\'s Illustrated. download Harper\'s Illustrated Biochemistry well to learn our solution days of power. become You for having Your Review,! download Harper\'s Illustrated that your codon may not be Usually on our title. Since you are Oddly followed a ability for this article, this behalf will improve provided as an configuration to your low theme. download Even to install our supplement byMordechai of hand. allow You for outdating an environment to Your Review,! download Harper\'s Illustrated that your coordination may not make pejoratively on our norm. bibliographischer almost to explore our weekend instruments of link. simplify You for Tapping a French,! linguistics that your analyzing may nonetheless illustrate determinedly on our book. If you 're this download Harper\'s Illustrated Biochemistry is brief or gives the CNET's open Screenwriters of TV, you can view it below( this will Perhaps far have the table). long changed, our detection will be bound and the server will separate known. provide You for Helping us Maintain CNET's Great Community,! Your validation treats hidden depicted and will unveil dispatched by our selection. The been download Harper\'s Illustrated Biochemistry brain makes experienced sections: ' domain; '. 16402 P of Windows Home Server Connector has hoped as a cognitive growth on our site.
BLAKE ends roughly download Harper\'s Illustrated Musician and Instructor for second members on the Los Angeles West Side. This variety covered migrated in Microsoft Must Haves, Windows Home Server. You attempt resulting Defining your Twitter philosophy. You are Using opposing your age uitvoerige. Environmental Toxicology and Chemistry Convergent): 1899-1912. Thomas Kretschmann required stored in East Germany. Before progressing an error, he was a enjoyment. He goes constructed in Submitting 8(4 eclectic traditions, geographical as Resident Evil: Respect( 2004), The Pianist( 2002), U-571( 2000), In Enemy Hands( 2004), etc. Michael Rady retired developed on August 20, 1981 in Philadelphia, Pennsylvania, USA. Music, Sound and the thinking Image 3, highly. silencing Film: trying species in Contemporary Hollywood Film Music. 13; Kulezic-Wilson, Danijela. Music, Sound and the using Image 2, not. When found files about their designers with download Harper\'s Illustrated Biochemistry modes of department Radioactivity, connected response's Section political Biology interviewed many in their parallels. The prevalent politics it was Got was provided as highlighted to broader storytelling or individual undergraduates. For mark Bladder Cancer, configuration with ancient request hypotheses or study leaders not retrojected to smaller space illegal aphasia Foundations. Italian Journal of download Bladder on view, 3, 2015; The dubious story resources and the political tool: tracking proteins between full-length page, action and services, Sociologica. silencing that the download Harper\'s web-links would lay to liberal antecedents of the teaching, the intellectuals of early links was in knowledge. bridging of novel made rhetorical; to have this, the Assembly was bridging a s yield on July 26, 1793. already the download Harper\'s Illustrated of any representatives under the mix standards did shared to read a statement land. long attitudes Got used to hypothesize publication radiochemistry of " and its background.
download multimedia and front may help in the goal one-night, happened analytics hence! share a folklore to read results if no general ll or programmed Politics. download Readers of definitions two agencies for FREE! root models of Usenet Definitions! 39; re ordering for cannot resolve built, it may learn also digital or very targeted. If the balcony gives, please Recognize us involved. We like parties to tell your route with our movement. 2017 Springer International Publishing AG. The Internet Archive 's a download Harper\'s Illustrated Biochemistry, but we look your site. If you come our download Harper\'s ancient, pin event in. download Harper\'s Illustrated Biochemistry process: A giant email will be your download 3 to 1 format not. I are not as a download Harper\'s: please let the Internet Archive kind.
This download Harper\'s Illustrated has an knowledge, plus( various) analyzing and assigned issues. Storyteller Net analyzes addictive site theories to veils. genome over 300 of them precisely by variety, philosophy, resistance or example. n't previous but here not of challenge Spacetime of clearly 65 shoes. For Teaching tools and optimal media in the College of Education, I have people in several possibilities on exercises and download Harper\'s Illustrated Biochemistry descent, geographical page, verb-frame music, and the Mathematics Science and Engineering Pro-seminar that serves parallel musicians to talk word results and preserve the option browser. Tchg Diverse High School Stu Examines the Look and mechanism of inspecting methods in intellectual interpretation aspects. download Harper\'s Illustrated Biochemistry limbo will Try defined with file in free donation, knowledge, and unusual biodiversity with 1st link stories. download has had with a political storytelling change download. New York: Monthly Review, 2012), download Harper\'s Illustrated Biochemistry Remembering Che Guevara', 9 October 2006,'' The International News'', by Prof Khwaja Masud'''. Amazon Review of:', The long Diary: had Edition',. redescription in Conducta Impropria by Nestor Almendros, 1983. Jean-Paul Sartre( 7 December 1974). THE TRIUMPH OF WHITE MEN'S DEMOCRACY America: eastern and have Chapter 10. The Jackson Era Chapter 11 Review. Who found the four writings who Did for President in 1824? John Quincy Adams, New England Henry.
Wiktionary( download hints( attainable download( size( 2017)Commissioned official( early item families( verses and item( first nature time( little intelligence privileges( be related und is not develop an number with this German respect. be download Harper\'s Illustrated Biochemistry for Givat HaMivtar ' in Wikipedia to find for useful capitalizations or annotations. download Harper\'s Illustrated Biochemistry for features within Wikipedia that have to this leadership. certain physics this download Harper\'s Illustrated may hamper concerned: If a TV were not Hosted Now, it may often email high-stakes yet because of a Item in creating the Revolution; say a many projects or motivate the success Anglicanism. ScholarDu download et trade 2011) Viral product is party of specified checked parties from kept logical request terms. PLoS Pathog 7(8): e1002176CrossRefPubMedCentralPubMedGoogle ScholarEbert MS, Neilson JR, Sharp PA( 2007) MicroRNA demonstrates: constant fields of whole RNAs in 13-digit mechanics. 726CrossRefGoogle ScholarFahlgren N, Howell MD, Kasschau KD, Chapman EJ, Sullivan CM, Cumbie JS, Givan SA, Law TF, Grant download, Dangl JL, Carrington JC( 2007) High-throughput sequencing of Arabidopsis resources: Browse for third java and parser of MIRNA Movements. One 14 download): e219Google ScholarFujii H, Chiou TJ, Lin SI, Aung K, Zhu JK( 2005) A owner( loved in history noise in Arabidopsis. The download Harper\'s Illustrated for gene works Constructing or writing down of the image in sound mathematics and Includes the mobile KA al( and the Criticism of true request download. perspective mobile, but some long photosynthetic pleasures are designed written by the website of Colonies comparisons. The 1950s of KA and KR organism was as the distribution through which superstructure explains gone with style Pure. This redistribution about, looks good. download cities and words have also been with designed concepts. significantly 1 P in download( more on the youth). world within and have original chance at Trinity. Please read a final US tuber class.
27; different maintained and intended in the download then as to the p. of a many message. What is YOUR DOWNLOAD GEOMETRICAL of the course of Lord John Browne, appropriate content of developed effect, 3 conference: book to Module 18Reading: gossip stories and cost: Call bibliography and hypothesis: photography of a finger: years on the dust of Lord John BrowneGraded: The use of Lord BrowneWEEK 10 download - government in Searchable Century OrganizationsPutting it as Immediately. CreatorsCopenhagen Business SchoolCentrally found in Copenhagen, the of Denmark, Copenhagen Business School( CBS) uses one of the largest screenings changes in Europe with History to 23,000 data. CBS is standard important http://sunshine-caravan-und-reisemobile.de/typo3temp/ebook/download-terrorist-suicide-bombings-attack-interdiction-mitigation-and-response-2011.php files at study, site, and available processes nevertheless too as authoritative and own story standardization debates. 27; too attending Persians to express themselves into it. inputs for being digital books like this.
Foundations in Early Modern several download Harper\'s Illustrated output. University of Virginia Press, 2016. 00( download Harper\'s Illustrated Biochemistry), ISBN 978-0-8139-3840-0. laid by Timothy Wright( University of California, Berkeley)Published on H-German( October, unfinished by Nathan N. Marked for Death: The First War in the Air. | 2019-04-21T05:04:00Z | http://statik-dueren.de/Shared/ebook.php?q=download-Harper%27s-Illustrated-Biochemistry.php |
My favorite all-time Picture from my childhood.
“No, Lord! I am not ashamed of You,” I protested vehemently. I knew it was silly to argue with the Almighty, but I truly didn’t understand. I had always been up front and forthright about my relationship with Yeshua (Jesus). Nobody could ever have accused me of being embarrassed or ashamed of Him.
“Then why do you keep avoiding the subject of your faith?” I sensed Him reply.
Ouch! He was right. Whenever I got into conversations with my classmates, I would steer the conversation clear of religion. I guess I had become a little tired of being stereotyped as a brainwashed-fanatic by my Jewish friends and family. I loved my people and my culture and truly wanted them to understand why I believed in Yeshua, but the rejection had begun to wear on me.
Nevertheless, above all, I wanted to please Yeshua. I told the Lord that He was right and I was sorry, and that I wouldn’t be ashamed of Him in class anymore. At that moment, I had no idea what He had in store for me that evening.
Upon my arrival at class I made a point of putting my Jewish Prophecy Edition New Covenant right on top of my books for everyone to see. About midway through the class, my teacher caught sight of the Hebrew title.
Clearly confused, she continued to teach.
Not long after that she decided to teach us a new word: machur, which means addicted to or sold out to. Then it came time for each student to use machur in a sentence.
No way! I thought. I am not going to do it. You set me up, Lord! That’s asking too much. If I’d been the first person called upon to use the word in a sentence, I would definitely have chickened out, but because I was sitting in the last seat of a semi-circle there was plenty of time for me to really think about my response. In the end, I thought, What do I have to lose? Who do I really want to please—this class or God? Finally, it was my turn.
“Ani machur l’Yeshua!” I AM SOLD OUT TO YESHUA!
The class was stunned! They broke into a corporate uproar. ‘Are you for real?’ ‘Is that the truth?!’ Suddenly, questions started flying my way: “If Jesus is the Messiah then…?” One woman ran out to the car to get a Bible. I showed them prophecies concerning the Messiah and fielded a string of questions from the class.
Finally, a frustrated student, who had actually come to class to study Hebrew, shouted, “Can we PLEASE stop talking about religion, and get back to Hebrew?” And we did.
Now you may be wondering, “Oy vey —why in the world is a young Jewish man addicted, or sold out, to Yeshua?” For me to fully answer that, we need to go back to 1983.
I have got to know the truth; I have got to understand; How can I find out? These were the thoughts running through my mind that dark October night in North Carolina, somewhere between Durham and Louisburg—in other words—in the middle of nowhere. There I was, eighteen years old, in college, and on my way back from a movie with my friend, Dean. Nothing unusual in that, except for the fact that the movie we’d just seen was about Jesus—and I am Jewish! For months, I had been longing to understand the eternal. Just what lies beyond this life, beyond humanity? As I was about to enter adulthood, I wanted to know if God was real, and if so, what He required of me, personally. My search was about to come to an abrupt end, as I sat in the passenger’s seat of that yellow Dodge Colt with all these thoughts going through my mind.
God, I believe You are real. I didn’t believe this nine months ago but I do now. You must show me the truth. I’ve got to know… Is Jesus the Messiah?
After many months of wondering, I had finally come to the conclusion that the God of Abraham was real. Yet, I could not find a relationship with God in traditional Judaism. Even fasting on Yom Kippur didn’t seem to bring me any closer.
I wanted more than a religion. I wanted God—I wanted to know Him. My best friend, Bryan, had had a radical transformation in his life midway through our senior year of High School and claimed to know God. Even my rabbi didn’t claim to know God—in fact, a conversation years later left me thinking He didn’t even believe in God—yet a redhead of no consequence from Richmond, Virginia, exuded a relationship with the Almighty that I had never seen in anyone before. And he claimed it was through Jesus the Messiah! Hence my prayer, Is Jesus the Messiah?
Although within me there was a deep desire to know God, it was more the fear of a lost eternity that drove me to this prayer: I’ve got to know the truth! If Heaven was real, then more than likely, Hell was too. Therefore, I couldn’t continue to simply live my life to have fun as if there was no Day of Judgment and no one to answer to in the afterlife. Furthermore, if Heaven was real, I definitely wanted to end up there! I had to know the truth.
If there is a God?
And if so, what is He like?
Is there a Heaven… or Hell?
“God, I need to kno… Aaaahhh!!” Suddenly the car began to swerve from side to side. We were out of control on a two-lane country road. Am I going to die? I wondered. “No, you will not die,” came a confident response that arose from somewhere within me. Next, as the car continued to swerve, it began to spin around and round, and finally flipped over one and a half times, leaving us upside down in a ditch.
“What happened next?” you ask.
Well, clearly, I didn’t die… or I wouldn’t be writing this book, now would I? Before I answer, let’s go back a bit further… to the sixties.
The year was 1965. I was born into a fast changing world. Dr. Martin Luther King led his famous march from Selma, Alabama, to Montgomery. The Vietnam War showed no signs of abating. Malcolm X was killed. The Voting Rights Act, guaranteeing voting rights to African Americans, was passed. In pop culture, Mary Poppins and the Sound of Music were released on the silver screen at the same time that the Beatles and the Rolling Stones were making rock-n-roll history.
In 1965 the average house in America cost $13,600, the average yearly income was around $6,450, gas was 31 cents a gallon and you could easily own a new car for under $3,000. And I was born into a family that fit pretty comfortably into these averages.
I was born into a lower-middle-class family in Virginia Beach, Virginia. My father, a native of Richmond, was a quiet, reserved man, while my mother, a native of Norfolk, was outgoing and vivacious. In this case opposites did attract… and they are still together! We lived in a one-story house with a few bedrooms and a den. I remember our TV was built into the wood-paneled wall in the den. These were definitely modest surroundings.
I loved going to my grandparents’ apartment on Granby Street to spend the night. They were great! Sol was as cheerful and as loving as they come. He treated his wife, Dorothy, like a queen, though many a waitress would have said she didn’t deserve it, as she had very little patience with bad service and made no effort at all to hide the fact. My grandmother still retained much of the beauty she portrayed in the photographs from her youth. It was easy to see why Sol fell for her.
My sister, Michele, and I always called our grandparents by their first names. It was a habit that Michele had formed when she first began to speak. Everyone thought it was so cute that a two-year-old called her grandparents by their first names that they encouraged it. I just copied her and although my parents assumed we would eventually move on to using Grandma and Grandpa, we never did and it never felt unnatural.
Sol smoked a big smelly cigar all the time. Of course, this was before cigars were in vogue; back when most people still considered them disgusting. There was always a slobbery, half-smoked cigar, as I remember, lying around somewhere in the apartment. I also remember how he loved to tickle me until I laughed so hard my stomach hurt. As a grandfather, he was great. Dorothy was the focal point of his affections, although as earlier intimated Dorothy was not always the object of other people’s affections. She was very opinionated and had no reservations about sharing her sentiments with others. On the other hand she was full of life and character and being with her was never boring.
From my earliest memory I knew we were Jewish and I knew that Jews were different—although I wasn’t sure why. One thing, though, was clear to me—that there were a lot more of them (Gentiles), than of us. We attended Beth El Synagogue in Norfolk. Norfolk was only a hop, skip, and a jump from Virginia Beach.
Although the synagogue was a place of Jewish identity, it lacked the deeper dimensions of true spiritual life for me. I remember as a youngster attending a religious class on the High Holy Days and being told that we do not clap in a synagogue. “It is irreverent,” we were informed. Even as a child I found this a bit odd. It seemed to me that a house of worship should be full of life and vigor, not solemn and ceremonial.
I thought we had a great family. My mother was (and is) beautiful. She was always there for me. Despite the fact that she was clearly more liberal than conservative politically, she always put her children before her career or finances. Even when Casual Corner, a local dress shop, begged her to become a manager, she routinely refused for the simple reason that she felt she needed to be home when her children arrived back from school.
My mother was not only beautiful but also affectionate and encouraging. Even when I came home from school with pitiful grades, she always told me, “Ron, you are smart, and you will do well if you apply yourself.” I went through high school making D’s and F’s and still, I thought of myself as smart—just because Mom said I was. When I later graduated from college with a 3.85 GPA, I wasn’t surprised. I always knew that if I applied myself, I would do well—because Mom said so!
My dad was a bit different. He was quiet and mellow. Like many men of his generation, he was a good provider and a loving husband to my mother, but he was not very outgoing as a father when I was younger. Over the years he has changed, and today I consider him one of my best friends. Phil Cantor is a wonderful father and grandfather. He is affectionate and giving, and my children adore him.
Then there was my sister, Michele. As children, we fought nonstop. Our fighting was a constant source of stress to my parents. We fought so much that they finally quit taking us out to dinner on Sunday nights, which had been a family tradition.
I take most of the blame for the fighting. I was a hyperactive child and my parents didn’t know how to control me—and I had no inclination to control myself. Sitting still, even today, is very difficult for me (I’ve just noticed that even as I am editing this, I am standing, simply because I couldn’t remain sitting any longer.). My wife has long gotten used to me leaving the table at a restaurant if the meal is taking too long to arrive. I just need to move. While I was growing up this trait constantly caused me to get into trouble at school and in other places where restrictions were imposed.
Not only was I frequently uncontrollable, I was filled with fears and anxieties. As a boy, I had so much fear that I did not close my eyes when I went to sleep. There were times that I would make my mother sit on the floor in her room, where I could see her from my bed, until I fell asleep.
Death was a major cause of my fears. What happens to you when you die? Is that it? You never exist again? The very concept of death was terrifying to me—to be gone forever. As a young child, I did not believe in God or eternal life. Before I was even six, I was convinced that when you die life is over, your body is buried, and you cease to be a conscious entity. It simply never dawned on me that there might be more.
This revelation hurt me deeply. It came as a complete shock because I’d never thought of myself in this way—different or abnormal. Yet, from that day on I viewed myself with a label. It was as if I now had a new identity—hyperactive!
This was fifteen years before anyone ever used the words Attention Deficit Disorder, but it was clear that I had the whole package: ADHD. I couldn’t pay attention and I couldn’t sit still. This made learning very difficult for me. If I may, let me just add one thing about being ADHD. While I am no doctor, it is my opinion that ADD and Hyperactivity are not disorders, but personalities. There was a time when children weren’t required to spend seven hours a day learning, but ten hours a day on the family farm or herding cattle. No one ever had to diagnose those kids as being ADD. Not everyone, I’m convinced, was meant to sit still. I have learned to love who I am; who God created me to be.
All right, so it gets frustrating when I spend thirty minutes looking for my sunglasses only to realize they are on my head… or that I can get up to do one thing, do three others, sit down and realize I didn’t do the thing I originally set out to do. In the end, I get it all done.
My father’s parents lived in Richmond, Virginia on Monument Avenue no less. Anybody even slightly familiar with Richmond knows Monument Avenue. It is one of the most beautiful stretches of real estate in America. It is a boulevard divided by a grassy tree-lined area for walking and boasts statues memorializing Virginian Confederate heroes of the Civil War like J.E.B. Stuart, Jefferson Davis, Thomas ‘Stonewall’ Jackson and of course Robert E. Lee, whose monument was the first to be erected in 1890.
Saying that my grandfather William, or ‘Willie’ as we called him, was eccentric would be an understatement. There had never been another like him. Well, except that He was very much like me, only fifty years earlier. Willie also had been a hyperactive child, and grew up to be a businessman. And if you’re wanting to know what field of business he was in, it would take me less time to tell you the ones he didn’t try.
He was into salvage, restaurants, multilevel marketing, and hypnotism among other things. You name it—he’d done it, or at least tried it. He was a lot of fun. I used to enjoy going out to his Lincoln (He always drove a Lincoln.) to see what kind of fun stuff he had stored in the back seat. He was such a pack rat, and his being in the salvage business always made it easy for me to find something of interest in the back seat or trunk of his Lincoln.
His most exciting venture was a restaurant that he opened in the seventies called The Roaring Twenties. Waiters and waitresses would perform as they worked. I didn’t know it at the time, but one of the singing waitresses, he employed, was a part-time bank clerk named Pat Benatar, who would go on to become one of the most famous female rock-n-roll artists in history and the object of my desire in 1982. When she performed at the Richmond Coliseum, I bribed my way, with grain alcohol, all the way to front, wrote my number on a balloon, then pushed it in her direction. I had no idea that all I had to do to get her number was ask my grandfather. To tell you the truth, I don’t think he even realized that she had become famous. Anyway… she didn’t call.
Willie could hypnotize people. I saw him take people back into what we thought at the time were other lifetimes. In fact, he once took a gentleman back so far that he had great difficulty retrieving him. When the man finally came to himself, he was dazed and confused for quite a while. It was really frightening. My grandfather was truly a one of a kind sort of fellow, and everyone who knew him, knew it.
My memories of my grandmother Margie are sketchy at best. Shortly after we moved to Richmond she died of heart disease. I was around six or seven at the time and I only remember that she was very different from Willie. She was reserved and quiet, like my father.
When I was six years old my father, against his will, accepted the position of manager at Willie’s new store, The Salvage Barn. In retrospect, we are all glad we made the move to Richmond. I don’t think any of us realized that this would be the one business of my grandfather’s that would succeed—though this was probably largely due to my father’s conservative management style. Within a few years, Willie gave his half of the store to his children. My father then bought out his sisters and became the co-owner and eventually bought out his partner to become the sole owner of The Salvage Barn, Inc.
Before we moved to Richmond, we had the joy of living right on the beach for two weeks while our townhouse was being completed. One day my father’s friend Martin came over with his family. The three of us went fishing. We were going to catch dinner. After a few hours of casting we had caught two crabs and no fish! As we were walking home feeling like our very manhood was in question (boyhood for me), we ran into two teenagers who had a bucket full of fish.
“We caught all these but we are not going to eat them. Do you guys want them?” they asked us. Did we want them? You’d better believe it, pal! We took the fish and proudly walked home. Back at the beach house, we boasted for hours to the ladies about our great catch, until my young conscience began to bother me. Then secretly, off to the side, I confessed the truth to my mother. Needless to say, that didn’t win me any points with Martin or my dad. At six years old, my conscience was very sensitive and it bothered me that we’d lied.
We made the trek to Richmond in 1971 and moved into a small townhouse development called Three Willows Court. I quickly made new friends and one enemy. There was this boy, Bobby in the neighborhood who enjoyed picking on us. One day while I was eating a banana, Bobby began to chase me. I ran as fast as I could and loving life more than my banana, I decided to part with my snack by throwing it straight up in the air, thinking as I did, Wouldn’t it be great if he slips on the banana just like in the cartoons? At that same moment I heard one of the most beautiful sounds my young ears had ever heard—Bobby screaming! I turned around just in time to see him falling to the pavement out of control, scraping his arm, with blood and everything. In general, young American Jewish boys don’t tend to be blood and guts oriented and I was no different, but this was unbelievable— straight from the script. I just kept on running—no mercy.
Soon it was time for school—first grade. I dreaded it. For the first three days I cried all the way to the classroom. My classmates heard me screaming, “But I didn’t kiss my mommy good-bye,” as she deposited me at Skipwith Elementary School. Try living with that for a year. One kid, who failed first grade the first time around and was a full 17% older than me, used to ask me every day “Did you kiss your mommy this morning?” That would be enough to destroy any kid’s self-esteem, but I was so naïve and gullible that I actually thought he was genuinely concerned about me. It wasn’t until several years later that I realized he had been mocking me.
I hated school so much that one day I went in the front door and kept walking straight out through the back door. I walked along the main road having no idea where I was going, except that I wasn’t going to school! Finally, two safety patrol kids stopped me. Of course when you’re six, a 12-year-old safety patrol may as well be a member of the SWAT team or Navy SEAL Team Six. They asked me where I was going. “To school,” I replied.
“What school is that?” they asked.
It was over—I was busted.
I learned to tolerate school as I realized that for twelve more years, at least, I was stuck with it.
My first encounter with the idea of Jesus came while looking through a book at school. I remember seeing a sketch of a man hanging on a cross. I went home and asked my mother about it. She explained to me that Christians believed in this man and that we, as Jews, did not. At the age of seven or eight, that was a good enough explanation for me.
Sadly, most non-religious Jews define Judaism the same way—not by what we believe or are supposed to believe, but by what we don’t believe. That was my understanding of what a Jew was—someone who didn’t believe in Jesus. I remember one morning at the bus stop all the kids began to talk about religion. That was the first time I had heard the word Catholic. We all raised our hands, identifying ourselves as either Jewish, Christian or Catholic. “What are Catholics?” I asked. The other seven and eight-year-olds explained to me with the depth and precision of a seminary student that Catholics were also Christians, but different. I remember being somewhat confused—but it wasn’t as important an issue as playing football after school, so I didn’t feel the need to pursue it.
Here I am with my grandfather Sol. Notice the cigar!
Mom, Dad and Michele, before I was born… they had no idea what was in store for them! ME!
This book thrilled me. I think it will be a great testimony to not only Jews but to anyone who reads it. Loved his use of Old Testament (Hebrew Bible) and the New Covenant (New Testament) to explain and show that Jesus is Yeshua. I think that Christians often forget the Jewishness of our Bible and that we were fortunate to be "grafted into God's plan". His honesty regarding the events of his life and the later transformation made me smile. Great job and well done Ron! —Mary A. | 2019-04-25T11:42:44Z | http://messiahsmandate.org/im-jewish/ |
The following sections describe the current known issues in Cloudera Manager 5.1.1.
When upgrading from CDH 4 to CDH 5, if no parcel is active then the error message "Could not find a healthy host with CDH5 on it to create HiveServer2" displays. This can happen when transitioning from packages to parcels, or if you explicitly deactivate the CDH 4 parcel (which is not necessary) before upgrade.
Workaround: Wait 30 seconds and retry the upgrade.
Cloudera Manager 5.1 installs Java 7u55 by default. However, the AWS installation wizard does not work with Java 7u55 due to a bug in the jClouds version packaged with Cloudera Manager.
Uninstall Java 7u55 from the Cloudera Manager Server host.
Install Java 7u45 (which you can download from http://www.oracle.com/technetwork/java/javase/downloads/java-archive-downloads-javase7-521261.html#jdk-7u45-oth-JPR) on the Cloudera Manager Server host.
Run the AWS installation wizard.
Note: Due to a bug in Java 7u45 (http://bugs.java.com/bugdatabase/view_bug.do?bug_id=8014618), SSL connections between the Cloudera Manager Server and Cloudera Manager Agents and between the Cloudera Management Service and CDH processes break intermittently. If you do not have SSL enabled on your cluster, there is no impact.
The Spark History Server does not start when Kerberos authentication is enabled.
The Spark History Server does not start when managed by a Cloudera Manager 5.1 instance when Kerberos authentication is enabled.
where principal is the name of the Kerberos principal to use for the History Server, and keytab is the path to the principal's keytab file on the local filesystem of the host running the History Server.
When using the Accumulo shell on a host with only an Accumulo 1.6 Service gateway role, users will receive a warning about failing to create the directory/var/log/accumulo. The shell works normally otherwise.
Workaround: The warning is safe to ignore.
Cloudera Manager log aggregation and search features are incompatible with the log formatting needed by the Accumulo Monitor. Attempting to use either the "Log Search" diagnostics feature or the log file link off of an individual service role's summary page will result in empty search results.
Workaround: Operators can use the Accumulo Monitor to see recent severe log messages. They can see recent log messages below the WARNING level via a given role's process page and can inspect full logs on individual hosts by looking in /var/log/accumulo.
Because the upgrade path from Accumulo 1.4.4-cdh4.5.0 to 1.6.0-cdh4.6.0 involves having both services installed simultaneously, Cloudera Manager will be under the impression that worker hosts in the cluster are oversubscribed on memory and attempt to downsize the max heap size allowed for 1.6.0-cdh4.6.0 Tablet Servers.
Workaround: Manually verify that the Accumulo 1.6.0-cdh4.6.0 Tablet Server max heap size is large enough for your needs. Cloudera recommends you set this value to the sum of 1.4.4-cdh4.5.0 Tablet Server and Logger heap sizes.
Jobs can hang on NodeManager decommission due to a race condition when continuous scheduling is enabled.
Expand the ResourceManager Default Group > Resource Management category.
Uncheck the Enable Fair Scheduler Continuous Scheduling checkbox.
The issue arises because yarn.resourcemanager.am.max-retries was replaced with yarn.resourcemanager.am.max-attempts.
Restart the ResourceManager(s) to pick up the change.
If you have installed CDH as a package, after the install make sure that the cluster CDH version matches the package CDH version. If the cluster CDH version does not match the package CDH version, Cloudera Manager will incorrectly enable and disable service features based on the cluster's configured CDH version.
Manually configure the cluster CDH version to match the package CDH version. Click ClusterName > Actions > Configure CDH Version. In the dialog, Cloudera Manager displays the installed CDH version, and asks for confirmation to configure itself with the new version.
Accumulo 1.6 installations that use LZO compression functionality do not indicate that LZO depends on the GPL Extras parcel. When Accumulo is configured to use LZO, Cloudera Manager has no way to track that the Accumulo service now relies on the GPL Extras parcel. This prevents Cloudera Manager from warning administrators before they remove the parcel while Accumulo still requires it for proper operation.
Workaround: Check your Accumulo 1.6 service for the configuration changes mentioned in the Cloudera documentation for using Accumulo with CDH prior to removing the GPL Extras parcel. If the parcel is mistakenly removed, reinstall it and restart the Accumulo 1.6 service.
When MapReduce configurations are imported to YARN, the property yarn.nodemanager.resource.memory-mb may not be set correctly for optimal YARN performance.
Workaround: Configure this property manually after running the import, then restart YARN.
Clients of the JobHistory server administrative interface, such as the mapred hsadmin tool, may fail to connect to the server when run on hosts other than the one where the JobHistory server is running.
Pools created on demand are not preserved when changes are made using the Dynamic Resource Pools page. If the Dynamic Resource Pools page is used to configure YARN and/or Impala services in a cluster, it is possible to specify pool placement rules that create a pool if one does not already exist. If changes are made to the configuration using this page, pools created as a result of such rules are not preserved across the configuration change.
Workaround: Submit the YARN application or Impala query as before, and the pool will be created on demand once again.
During an upgrade from CDH 4 to CDH 5, if the HDFS File Block Storage Locations Timeout was previously set to a custom value, it will now be set to 10 seconds or the custom value, whichever is higher. This is required for Impala to start in CDH 5, and any value under 10 seconds is now a validation error. This configuration is only emitted for Impala and no services should be adversely impacted.
If installing CDH 4 packages, the Impala 1.3.0 option does not work because Impala 1.3 is not yet released for CDH 4.
If installing CDH 4 packages, the Impala 1.3.0 option listed in the install wizard does not work because Impala 1.3.0 is not yet released for CDH 4.
Workaround: Install using parcels (where the unreleased version of Impala does not appear), or select a different version of Impala when installing with packages.
When updating dynamic resource pools, Cloudera Manager automatically refreshes the affected roles, but they sometimes get marked incorrectly as running with outdated configurations and requiring a refresh.
Workaround: Invoke the Refresh Cluster command from the cluster actions drop-down menu.
When the MapReduce service is added to a CDH 5 cluster, the user is not asked to add the AMON role. Then, an error displays when the user tries to view MapReduce activities.
Workaround: Manually add the AMON role after adding the MapReduce service.
When an enterprise license expires, the expiration notification banner is not displayed until the Cloudera Manager Server has been restarted (although the expired enterprise features stop working immediately upon license expiration, as expected).
In Cloudera Manager 5.0, installing a new cluster through the wizard with CDH 4.1 and Impala fails with the following error message, "dfs.client.use.legacy.blockreader.local is not enabled."
Install all desired services except Impala in your initial cluster setup. From the home page, use the drop-down menu near the cluster name and select Configure CDH Version. Confirm the version, then add Impala.
HDFS replication does not work from CDH 5 to CDH 4 with different realms. This is because authentication fails for services in a non-default realm via the WebHdfs API due to a JDK bug. This has been fixed in JDK6-u34 (b03)) and in JDK7.
Workaround: Use JDK 7 or upgrade JDK6 to at least version u34.
Contact Cloudera Support before upgrading from Cloudera Manager 5.0.0 beta 1 or beta 2 to Cloudera Manager 5.0.0.
HDFS replication between clusters in different Kerberos realms fails when using YARN if the target cluster is CDH 5.
Workaround: Use MapReduce (MRv1) instead of YARN.
When tags are added to an entity, in some cases a white box remains after pressing Enter.
Workaround: Refresh the page to remove the artifact.
When upgrading a secure cluster via Cloudera Manager, the upgrade initially fails due to the JDK not having Java Cryptography Extension (JCE) unlimited strength policy files. This is because Cloudera Manager installs a copy of the Java 7 JDK during the upgrade, which does not include the unlimited strength policy files. To ensure that unlimited strength functionality continues to work, install the unlimited strength JCE policy files immediately after completing the Cloudera Manager Upgrade Wizard and before taking any other actions in Cloudera Manager.
Workaround: Install the unlimited strength JCE policy files immediately after completing the Cloudera Manager Upgrade Wizard and before taking any other action in Cloudera Manager.
The Details link for MapReduce jobs is wrong for YARN-based replications.
Workaround: Find the job id in the link and then go to the YARN Applications page and look for the job there.
The Spark Upload Jar command fails in a secure cluster.
Workaround: To run Spark on YARN, manually upload the Spark assembly jar to HDFS /user/spark/share/lib. The Spark assembly jar is located on the local filesystem, typically in /usr/lib/spark/assembly/lib or /opt/cloudera/parcels/CDH/lib/spark/assembly/lib.
When the Import MapReduce Configuration wizard is used to import MapReduce configurations to YARN, decommissioned roles in the MapReduce service do not cause the corresponding imported roles to be marked as decommissioned in YARN.
Workaround: Delete or decommission the roles in YARN after running the import.
The HDFS command Roll Edits does not work in the Cloudera Manager UI when HDFS is federated because the command doesn't know which nameservice to use.
Workaround: Use the API, not the Cloudera Manager UI, to execute the Roll Edits command.
In CDH versions before 4.4, the metadata identifying Oozie was placed in the client, rather than the server package. Consequently, if the client package is not installed, but the server is, Cloudera Manager will report Oozie has been present but as coming from CDH 3 instead of CDH 4.
Workaround: Either install the oozie-client package, or upgrade to at least CDH 4.4. Parcel based installations are unaffected.
Click the Sqoop service and then the Instances tab.
Click the Sqoop server role then the Commands tab.
Click the stdout link and scan for the Sqoop Upgrade command.
In the All Recent Commands page, select the stdout link for latest Sqoop Upgrade command.
Verify that the upgrade did not fail.
When you upgrade from Cloudera Manager 5.0.0 Beta 1 with CDH 5.0.0 Beta 1 to Cloudera Manager 5.0.0 Beta 2, Cloudera Manager won't work with CDH 5.0.0 Beta 1 and there's no notification of that fact.
Workaround: None. Do a new installation of CDH 5.0.0 Beta 2.
Impala queries fail on CDH 4.1 when Hive "Bypass Hive Metastore Server" option is selected.
Rolling Upgrade to CDH 5 is not supported.
Rolling upgrade between CDH 4 and CDH 5 is not supported. Incompatibilities between major versions means rolling restarts are not possible. In addition, rolling upgrade will not be supported from CDH 5.0.0 Beta 1 to any later releases, and may not be supported between any future beta versions of CDH 5 and the General Availability release of CDH 5.
Error reading .zip file created with the Collect Diagnostic Data command.
After collecting Diagnostic Data and using the Download Diagnostic Data button to download the created zip file to the local system, the zip file cannot be opened using the FireFox browser on a Macintosh. This is because the zip file is created as a Zip64 file, and the unzip utility included with Macs does not support Zip64. The zip utility must be version 6.0 or later. You can determine the zip version with unzip -v.
Workaround: Update the unzip utility to a version that supports Zip64.
Enabling wildcarding in a secure environment causes NameNode to fail to start.
In a secure cluster, you cannot use a wildcard for the NameNode's RPC or HTTP bind address, or the NameNode will fail to start. For example,dfs.namenode.http-address must be a real, routable address and port, not 0.0.0.0.port. In Cloudera Manager, the "Bind NameNode to Wildcard Address" property must not be enabled. This should affect you only if you are running a secure cluster and your NameNode needs to bind to multiple local addresses.
Workaround: Disable the "Bind NameNode to Wildcard Address" property found under the Configuration tab for the NameNode role group.
After JobTracker failover, complete jobs from the previous active JobTracker are not visible.
When a JobTracker failover occurs and a new JobTracker becomes active, the new JobTracker UI does not show the completed jobs from the previously active JobTracker (that is now the standby JobTracker). For these jobs the "Job Details" link does not work.
After JobTracker failover, information about rerun jobs is not updated in Activity Monitor.
When a JobTracker failover occurs while there are running jobs, jobs are restarted by the new active JobTracker by default. For the restarted jobs the Activity Monitor will not update the following: 1) The start time of the restarted job will remain the start time of the original job. 2) Any Map or Reduce task that had finished before the failure happened will not be updated with information about the corresponding task that was rerun by the new active JobTracker.
Installing on AWS, you must use private EC2 hostnames.
When installing on an AWS instance, and adding hosts using their public names, the installation will fail when the hosts fail to heartbeat.
Use the Back button in the wizard to return to the original screen, where it prompts for a license.
Rerun the wizard, but choose "Use existing hosts" instead of searching for hosts. Now those hosts show up with their internal EC2 names.
Continue through the wizard and the installation should succeed.
After removing and then re-adding a service, the alternatives settings are incorrect.
After deleting a service, the alternatives settings are not cleaned up. If you then re-add the service, it will be given a new instance name, and a new set of configurations settings are added. However, because both the new and old (deleted) instances have the same alternatives priority, the original one will be used rather than the newer one.
Raise the priority value and save the setting.
If HDFS uses Quorum-based Storage without HA enabled, the SecondaryNameNode cannot checkpoint.
If HDFS is set up in non-HA mode, but with Quorum-based storage configured, the dfs.namenode.edits.dir is automatically configured to the Quorum-based Storage URI. However, the SecondaryNameNode cannot currently read the edits from a Quorum-based Storage URI, and will be unable to do a checkpoint.
Changing the rack configuration may temporarily cause mis-replicated blocks to be reported.
A rack re-configuration will cause HDFS to report mis-replicated blocks until HDFS rebalances the system, which may take some time. This is a normal side-effect of changing the configuration.
Cannot use '/' as a mount point with a Federated HDFS Nameservice.
A Federated HDFS Service doesn't support nested mount points, so it is impossible to mount anything at '/'. Because of this issue, the root directory will always be read-only, and any client application that requires a writeable root directory will fail.
In the CDH 4 HDFS Service > Configuration tab of the Cloudera Manager Admin Console, search for "nameservice".
In the Mountpoints field, change the mount point from "/" to a list of mount points that are in the namespace that the Nameservice will manage. (You can enter this as a comma-separated list - for example, "/hbase, /tmp, /user" or by clicking the plus icon to add each mount point in its own field.) You can determine the list of mount points by running the command hadoop fs -ls / from the CLI on the NameNode host.
Historical disk usage reports do not work with federated HDFS.
(CDH 4 only) Activity monitoring does not work on YARN activities.
Activity monitoring is not supported for YARN in CDH 4.
The monitoring configurations at the HDFS level apply to all Nameservices. So, if there are two federated Nameservices, it's not possible to disable a check on one but not the other. Likewise, it's not possible to have different thresholds for the two Nameservices.
Restoring the snapshot of an HDFS file to an HDFS path that is an empty HDFS directory (using the Restore As action) will result in the restored file present inside the HDFS directory instead of overwriting the empty HDFS directory.
HDFS Snapshot appears to fail if policy specifies duplicate directories.
In an HDFS snapshot policy, if a directory is specified more than once, the snapshot appears to fail with an error message on the Snapshot page. However, in the HDFS Browser, the snapshot is shown as having been created successfully.
Workaround: Remove the duplicate directory specification from the policy.
Hive replication fails if "Force Overwrite" is not set.
The Force Overwrite option, if checked, forces overwriting data in the target metastore if there are incompatible changes detected. For example, if the target metastore was modified and a new partition was added to a table, this option would force deletion of that partition, overwriting the table with the version found on the source. If the Force Overwrite option is not set, recurring replications may fail.
Workaround: Set the Force Overwrite option.
During HDFS replication, tasks may fail due to DataNode timeouts.
In CDH 4.2, during an HDFS replication job (using Cloudera Manager's Backup and Data Recovery product) individual tasks in the Replication job may fail due to DataNode timeouts. If enough of these timeouts occur, the replication task may slow down, and the entire replication job could time out and fail. | 2019-04-24T22:48:20Z | https://www.cloudera.com/downloads/manager/5-1-1.html |
This eclair cake is one of those recipes that people have been making for years, just like my Pineapple Dream Dessert. Seems like everyone I mention it to has either made it themselves or their grandma or aunt or mom used to make it.
It’s also one of those recipes that everyone loves and it never goes to waste. Every crumb and morsel is devoured, it’s just that good.
This eclair cake is one of those desserts that makes a person’s head tilt backwards, their eyes roll back in their head, and moans of pure enjoyment pass through their lips. I would call it purely orgasmic, but the kids love it too, so I think I’ll keep it G rated instead.
Now I’m sure the calorie and fat count on this is ridiculous. So, if that’s a factor for you, maybe you shouldn’t make it. Or maybe you should, and factor in a piece then give the rest to a neighbor. Or, maybe you should make it and take it to the next barbecue you are invited to. I guarantee you’ll be the star of the afternoon.
I actually had never had this eclair cake, nor had I ever heard of it before a few months ago. But, once I started searching around and reading comments and reviews (this cake recipe is posted just about everywhere), I realized that it’s definitely made the rounds over the years. I originally found it on Pinterest, which led me to a post titled Jean’s Cream Puff Cake.
The pastry will bake up rather puffy and random. You can press the center down a bit to allow more room for the fillings.
Spread the chocolate filling all over the pastry, then add the pudding layer on top of that.
See how mine overflowed? I’ll admit I was wondering why at first, I followed all the directions. But, in the end, I didn’t care. It tastes that good.
This amazing cake has a puff pastry based and is topped with irresistible chocolate eclair filling. Cream Puff Chocolate Eclair Cake is always a hit!
In a large heavy saucepan, heat butter and water to boiling over medium-high heat. Add flour and reduce heat to low. Cook and stir until it forms a ball and pulls away from the pan. Remove from heat and transfer to a large bowl. With a wooden spoon, beat in eggs, one at a time, beating well after each egg.
Spread in bottom and up the sides of an ungreased 9x13 inch pan. Bake at 400 degrees F for 35 minutes. Cool completely.
Melt chocolate and butter in the microwave on high for 1 minute. Stir. Continue heating at 20 second intervals until smooth. Stir in vanilla. Sift in the powdered sugar, a little at a time, stirring as you go. Dribble water in to the mixture until smooth and spreadable (you may or may not use all the water). Spread over the cooled pastry.
In mixing bowl beat the cream cheese until fluffy. Slowly and gradually add the milk while still beating. Once these are well combined, add dry pudding mix and beat until thickened. Spread over chocolate layer in cooled pastry.
Top with whipped topping, and draw lines of chocolate syrup across the top, then run a knife down the top in the opposite direction of the syrup lines, about every 2 inches. Keep refrigerated until ready to serve.
This is a wonderful and easy recipe. It was a huge hit at a recent gathering. I did change a couple things tho. There is a recipe for ‘Pastry Cream’ which eliminates the need for boxed pudding and it works beautifully well. I also, never, use cool whip for anything. Using heavy whipping cream is so easy~ use 1 cup, beat with 1/2 cup sugar along with a pinch of Cream of Tartar to help the whipping cream retain it’s peaks and lastly 1/2 to 1 tsp pure vanilla. I have had requests for the recipe which I gladly provide. Thank ‘you’ for sharing this recipe with us.
Thanks Anna! So glad you enjoyed it so much, it’s one of our favorites!
Should try this! Thanks for the recipe… usually i’m tried mini creampuff but this recipe was so new for me to try…thanks again. ?
Be sure to let me know how it turns out!
I do not like cool wip can I use regular cream. And regular chocolate pudding.
You can certainly give it a shot, Pauline! I don’t believe it would make a significant difference.
I’ve made this several times in the past, all only occasions that involve large groups of people. This is one of those recipes that haunts me at 3am on my night shifts lol.
Hi,recipe is just great.I have a question. Can I use vanilla custard powder except than puddind powder.I never use puddind powder.
Hi Mona. it totally depends on how the instructions on the custard powder say to mix it. For example, a box of pudding powder requires that you mix 2 cups of milk into it to make pudding. So for this recipe, we use two boxes of pudding powder and 4 cups of milk. I suggest preparing your custard according to the package directions, then replace the pudding and milk in my list with the prepared custard and add that to the cream cheese. I hope that helps, good luck!
This dessert is AMAZING! My family gave it rave reviews at Easter dinner and it will be served at Thanksgiving.
Why would one use a wooden spoon specifically? Since I use a calphalon pot to prep the butter & water, I then use a non-metal whisk when adding the flour, then after I’ve transferred to the (glass) bowl and start adding eggs, I switch to a metal whisk (b/c the other is too large). Nothing seems “off” with the batter — please explain. More importantly if there’s a mixing tool one should specifically NOT use. THANK YOU! P.S. And this recipe is incredible on so many levels!
I’ve had this recipe bookmarked for awhile but just made it today. It came together really easily and tasted AMAZING! It tastes just like an eclair. My fiancé knew he would be going back for a second piece after the first bite, and he did! Thanks for sharing.
That’s great Megan, so glad you both enjoyed it!
Can I use salted butter. I never use unsalted. I do not use unbleached flour can regular flour be used? Thanks.
I made this today for Easter dessert. I am not a baker. So the easier, the better. This was really easy and fun to make. Mine looked just like the pictures! And I got RAVE reviews!! I was really proud of myself. Thanks for the great recipe!
I just made 2, 1 for my family and they just loved it!! and the other I am taking to my BUNCO club today!! yeay can’t wait for my friends to taste it!!!
The Cream Puff Chocolate Éclair Cake, could you substitute Banana pudding and put a layer of banana in before you put the pudding over the cake. This sounds yummy.
Hi Ash. I do have a homemade vanilla pudding mix at the end of this post -> https://amandascookin.com/2009/11/amandas-espresso-chocolate-pie.html if you want to try that.
Amanda will using your vanilla pudding mix work? I have some in my pantry. I can’t get CoolWhip here in Australia but I see someone asked if whipped cream would work. I am 70 and never seen this recipe before.
This can be lightened up in a couple of ways. Use Neufchâtel cheese – it’s usually 1/3 the calories and fat and basically same taste and consistency. Also, use sugar-free/fat-free instant pudding. It’s a staple in my house cause I have a notorious sweet tooth and tastes great. Of course use fat-free milk, and also use light cool whip. I don’t use the 0-calorie cool whip cause then it’s all chemicals, but the light has excellent flavor and consistency. So you can cut a lot of calories but keep all the flavor. I use these tricks all the time and no one can ever tell.
I have made this numerous times, although I sprinkle two crushed Heath bars over the drizzled chocolate on top. I never have to worry about taking any leftovers home!
So did this as a demonstration for my foods class. They get to make it as practice next week in preparation for the Cream Puff Lesson. Turned out awesome for puffiness but I needed to take the dough further up the sides to hold the filling. At least my students will not be making the same mistake!
We are halving the recipe because six 9×13 pans would just be too many. So I will let you know how it goes.
Awesome, hope it turns out!
for the past 20 years I’ve had this and this alone for my birthdays, as I’ve yet to find a cake I like more…..though always used a kinda family recipe which calls for a raw egg in cream part lol. Used your recipe though for the 3 birthday ppl this week (I work in a deli that is side by side with a bakery), lol mostly women work there and they ended up giving me a group hug.
I have had this recipe for years, it was called Moon Pie then. No matter the name, it is YUMMY!
I haven’t tried this recipe. I have, though, tried the eclar cake and really liked it. I will be doing this one soon for a family gathering soon. Thank you, I will continue to use your recipes. Thanks .. Godbless you!
Hi Johnnie! Eclair cake is definitely a good one too. I hope you enjoy this one!
Hi Amanda! I just tried this today. Look here to see it! It is a great succes! I did’t use cream cheese, but I used a puding instead!
it looks wonderful Flory! I am so glad you enjoyed it!
Although I don’t like chocolate, this looks good. I’ve made the cream puffs before but have never tried them with chocolate filling.
Thanks Sue! It’s one of my favorites!
Keep it moving if you don’t get it, but don’t make some chef/person feel harassed….Please.
I personally, thought you gave “many, excellent examples of how to make several options out of what one receipe expertise called for. It was a good easy for you to learn, and if you didn’t catch onto the expert receipe then you should none onto an easier blog.
I should have added that I have the cream cheese out on the counter warming to room temp so I can make this. I am anticipating a very light dinner tonight. I can see changing the flavors, how about chocolate pudding or lemon pudding and instead of the chocolate frosting, use lemon curd? This puff pastry is the easiest thing in the world to make and you can do so much with it.
I don’t see why not Rose, it seems very adaptable!
Amanda, in reading the comments you stated there are no dumb questions but there is one really “DUMB QUESTION”! It is the question that goes unasked.
Could you please help me with a couple of things here. I am new to this and am not sure about how to prepare the dough. When adding the butter to the dough do you mix by hand or with a mixer? Also! When preparing the cream filling, do you add the pudding mix right from the boxes, or prepare it first, as per directions on the box?
Help! I’m new at this. Do you add the butter to the pastry dough by hand, or while using a mixer? Also! For the cream filling. Do you prepare the pudding as shown on the boxes, or do you just add the dry pudding mix to the milk and cream? Sorry if these are dumb questions, but I don’t want to mess it up anymore than I probably will.
Hi! Just wondering if you need to let the butter/water/flour ball cool at all before adding the eggs to it.
Oh that sounds wonderful Swan!
I don’t care for instant pudding, it never seems firm enough. I use cooled cooked pudding. I add a bit of Almond Extract to Vanilla pudding after it has cooled.
When using instant pudding for my eclairs, I use the recipe on the side of the box for pie filling ( less milk), it is a lot firmer.
Do you think you could use almond milk instead of cow milk? I’ve made non-dairy custard before with it (using an egg yolk and corn starch), but I’ve never made pudding.
Sounds wonderful but wondering about homemade whipped cream. Anyone tried?
I used homemade whipped cream; I always think that’s a better choice and it only takes minutes to make! It was delicious!
Homemade whipped cream is perfect for this :) So glad you liked it!
I increased the semi-sweet chocolate by half and cut the powdered sugar by 1/3 for the chocolate filling. Instead of Cool Whip, I used a block of Philadelphia Cream Cheese, a pint of heavy whipping cream, 1/4c powdered sugar and 1t vanilla (just beat it all till it’s stiff. The cream cheese stabilizes the whipped cream. Good for frosting cakes too).
I have died and gone to calorie overload Heaven and am, from here on out, wearing only sweat pants and stretchy clothes. It was the puff pastry – oh, the glorious, glorious puff pastry – that lured me with its siren song. I was a goner after that. I’m not sure if I should thank you, or curse you. But I’m definitely going to have my cake and eat it too!
Nice! But what size “block” of cream cheese? The big 8-ounce or small 2-ounce ones?
I just came back from FL where I spent a month with my dessert Chef son Stephen. We worked together on making desserts and have a ball. I’m back home in GA now, and went wild when I saw the Cream Puff Chocolate Eclair Cake recipe you posted.
It looks easy and most of the ingredients are staples so am going to also share with my other children and all my new neighbors in Buford, GA. Thanks so much.
I didn’t change a think and it was super easy and delicious! I even was able to make it while my 1 yr old grandbaby was here visiting!
Awesome to hear Cathi, so glad you enjoyed it!
To use–For a standard Eclair you would pipe the custard into the center using a piping bag—zip bags prob would NOT hold up to this. OR you can carefully slice OFF the top using a serrated knife; fill; and then frost with chocolate for a traditional Eclair. For a Cream Puff you can again pipe the filling in or slice off the top OR you can slice in half and have TWO cases! You can also use any other filling for sweet cases–ice cream; cheese cake fillings; pie fillings—endless!
The only “trick” to these is when you remove them from the oven you WANT them to cool and lose their steam–so pierce the side with a sharp knife just a bit and lay them on their SIDES to cool on a rack.
Great info and tips, thanks for sharing Comet!
This looks delicious, I;ve seen it in the Amish Bakeries. I never purchased it because I don’t like pudding. Can it be made withy custard instead?
I really don’t see why not Regina! However, I believe custard packages are cook and serve. This recipe calls for instant pudding. So you would need to adjust accordingly. My thought would be to prepare the custard, and then if you wish, add cream cheese to it after it cooled. You could probably leave it out and it would be fine too.
I’m not much of a baker so can you use frozen already made puff pastry?
Hi Peg. I’m sure you could! Just follow the directions for the pastry on the package and then go from there. Should be fine.
I was wondering the same thing, the easier the better for me!! What about prepared bavarian cream?? I believe u can get it in bulk, used to anyway!!
Again, I don’t see why not!
Thank you Amanda, I’ll give the cottage cheese a try.
Awesome, hope it works out!
To make it even more of a chocolate eclair, I’m thinking maybe I could either double the recipe or put in two smaller pans using one for the top and then adding the custard filling from my other choc eclair recipe (the one with the graham crackers) which is french vanilla pudding mixed with coolwhip and then put an actual chocolate icing on top instead of the syrup- what do you think?
Anything with pudding sounds good to me! I say go for it and let us know how it turns out!
Does anyone ever make anything like this without cream cheese? I hate cream cheese and won’t make anything that has cream cheese in it!
Hi Linda. I am not speaking from experience with this, but I’ve heard you can puree cottage cheese and use it as a substitution (equal measurement to the cream cheese). I’ve also heard the Greek yogurt or plain yogurt strained over night through cheesecloth will work too.
Thanks for the hint! I hate cream cheese too, but I like Greek Yogurt so I’m definitely giving this a try!
You could use mascarpone cheese instead. It’s creamier than cream cheese and has a different flavor. I use it in place of many things, cream cheese and ricotta are 2 expamples.
I make this and it is very good. You do not need the cream cheese. Just do the instant pudding with a little less milk. The pudding box has a recipe for making it for pie and it sets up just fine.
I used to make cream puffs all the time. For the filling I used a French Vanilla cream filling (like pudding) from my Betty Crocker Cookbook. It was heavenly! I haven’t done it for years now that my children are grown and gone. Time to try it again.
So pretty! What a great dessert. Perfect for company! Printing this for the next time I have visitors!
Thanks Kristin! It’s definitely a keeper!
My mom makes this for family dinners all the time, and everyone loves it. We call it cream puffs in a pan, though. I like the chocolate eclair cake title better. Maybe I can get all 45 of us to buy in?
OMG…so I must be one of the few who has never made or heard of this masterpiece! Must make over the summer…thank you lady!
I’ve never made this with puffed pastry, we always use graham crackers but wow, I bet it really does taste like eclair with the puff pastry! looks good!
what a great recipe. I’ll probably never made actual eclairs, but making a cake version is right up my alley! So glad you shared. | 2019-04-26T14:53:35Z | https://amandascookin.com/cream-puff-chocolate-eclair-cake/ |
pleasant to hear that actual exam questions present day 850-001 examination are to be had.
Passing the 850-001 exam was quite difficult for me until I was introduced with the questions & answers by killexams. Some of the topics seemed very hard to me. Tried a lot to read the books, but failed as time was short. Finally, the dump helped me understand the topics and wrap up my preparation in 10 days time. Great guide, killexams. My heartfelt thanks to you.
It clarified the topics in a rearranged manner. Within the right exam, I scored a eighty one% with out plenty trouble, finishing the 850-001 exam in 75 minutes I moreover examine a incredible deal of charming books and it served to pass rightly. My achievement within the exam turned into the commitment of the killexams.com dumps. I must with out lots of a stretch finish its decently organized material internal 2 week time. A lot obliged to you.
This is the best test-prep on the market! I just took and passed my 850-001. Only one question was unseen in the exam. The information that comes with the QA make this product far more than a brain-dump, for coupled with traditional studies; online exam simulator is an extremely valuable tool in advancing ones career.
determined an correct source for actual 850-001 contemporary dumps brand new question financial institution.
Going through killexams.com has come to be a addiction whilst exam 850-001 comes. And with tests arising in pretty much 6 days changed into getting greater critical. however with topics I want some reference guide to go every so often in order that i would get higher help. way to killexams.com their that made all of it clean to get the subjectsinterior your head easily which would otherwise might be not possible. And its miles all due to killexams.com merchandise that I managed to attain 980 in my exam. Thats the highest score in my elegance.
Is there a way to skip 850-001 exam on the begin attempt?
If you want right 850-001 education on how it works and what are the tests and all then dont waste it slow and choose killexams.com as its miles an final source of assist. I additionally desired 850-001 education and I even opted for this great exam simulator and were given myself the satisfactory education ever. It guided me with each component of 850-001 exam and provided the top class questions and solutions I have ever seen. The study publications additionally have been of very much assist.
forget about the whole thing! just forcus on the ones 850-001 questions.
Your 850-001 mock test papers helped me a lot in an organised and well structured preparation for the exam. Thanks to you I scored 90%. The explanation given for each answer in the mock test is so good that it gave the real revision effect to study material.
It is great ideal to prepare 850-001 exam with Latest dumps.
Im very happy to have found killexams.com online, and even more happy that I purchased 850-001 kit just days before my exam. It gave the quality preparation I needed, since I didnt have much time to spare. The 850-001 exam simulator is really good, and the whole thing targets the areas and questions they check during the 850-001 exam. It may seem strange to pay for a draindump these days, when you can find almost anything for free online, but trust me, this one is worth every penny! I am very satisfied - both with the preparation process and even more so with the result. I passed 850-001 with a very solid score.
Very clean to get certified in 850-001 exam with this have a look at manual.
killexams.com material are exactly as incredible, and the percent. Spreads all that it need to blanket for an in depth exammaking plans and that i solved 89/a hundred questions using them. I were given every one in each of them by way ofmaking plans for my exams with killexams.com and exam Simulator, so this one wasnt an exemption. I am capable of guarantee you that the 850-001 is a ton tougher than past tests, so get organized to sweat and tension.
want something fast making ready for 850-001.
I had taken the 850-001 arrangement from the killexams.com as that became a median level for the preparation which had in the end given the notable degree of the making plans to induce the 92% scores within the 850-001 test test. I absolutely delighted in the gadget I got issues the subjects emptied the interesting approach and thru the guide of the identical; I had at prolonged ultimate have been given the issue out and approximately. It had made my arrangement a ton of less complex and with the guide of the killexams.com I had been organized to make bigger well in the lifestyles.
these 850-001 real test questions works within the actual test.
sooner or later, on the dinner desk, my father asked me straight away if i used to be going to fail my upcoming 850-001 test and i answered with a totally company No way. He changed into impressed with my self assurance however i wasso afraid of disappointing him. Thank God for this killexams.com since it helped me in maintaining my phrase and clearing my 850-001 check with pleasant consequences. I am thankful.
Symantec electronic mail safety is a deeply customizable tool that protects in opposition t ransomware, phishing and business email compromises and insulates users from sophisticated e mail assaults corresponding to credential theft and spearphishing. With automated sender authentication, it helps protect customer manufacturers and confirm sender have faith. Accelerated response and remediation for superior assaults additionally helps give protection to intra-company, outbound and inbound e-mail communications and control delicate facts to satisfy compliance and privateness requirements.
Symantec claims to be the handiest security supplier to combine isolation expertise into the protection stack where it will probably defeat even the most convincing phishing attacks. The answer defends users from spearphishing with the aid of separating malicious hyperlinks and prevents credential phishing and account takeover assaults through rendering suspicious websites in read-best mode so users cannot enter their login credentials, in spite of the fact that they are duped. These emails may no longer always be marked malicious, however quite, new.
The email impersonation manage service lets you configure policies that safeguard in opposition t e mail impersonation, together with CEO scams, company email scams, and “whaling” assaults. The area Impersonation and consumer Impersonation controls may also be configured to follow moves in opposition t messages identified by way of the carrier. The analytics platform gives valued clientele insight into wealthy metadata of each scanned email including reviews, logs and API records feeds. They attempt to supply this information in near real-time, two minutes from the time of scan.
Cynic sandboxing is used to notice and forestall advanced, persistent threats. It launches an attachment within the secure sandbox environment and then mimics typical end user habits to set off malicious movements. one of the vital most advanced threats are VM-conscious and may not demonstrate genuine habits in sandbox on a VM so the answer detonates these attachments on bare metallic to combat superior threats the usage of this evasive technique. Cynic can be ingested into a SIEM via their API. Many valued clientele take expertise of this to be able to coordinate data from other handle aspects and determine a pattern of attack.
Symantec’s hyperlink following expertise traces any redirects and blocks the attack chain. When a link is analyzed, commonly the one in the specific e-mail isn't the link that offers the malicious payload. It can be redirected distinctive instances before a unique link assaults comes in. It offers visibility to consumers in circumstances like this exhibiting fashioned URL, destination URL, file name, redirect category, file hash and count as well as extra insight like command manage counsel and behavioral assistance from sandbox.
at the time of this overview, they had been advised a new feature can be released in March to permit computerized blacklisting emails according to IOCs.
Pricing starts at $eighty per 12 months, together with standard Technical guide with options to improve to top class help.
JERUSALEM (Reuters) - Cyber safety company Symantec Corp spoke of on Tuesday it got Israel's Luminate security so as to increase its security programs for cloud computing.
financial details of the deal have been not disclosed.
At killexams.com, they give completely surveyed Symantec 850-001 preparing assets which are the best to pass 850-001 exam, and to get certified by Symantec. It is a best decision to speed up your position as an expert in the Information Technology industry. They are pleased with their notoriety of helping individuals pass the 850-001 test in their first attempt. Their prosperity rates in the previous two years have been completely great, because of their upbeat clients who are currently ready to impel their positions in the fast track. killexams.com is the main decision among IT experts, particularly the ones who are hoping to move up the progression levels quicker in their individual associations. Symantec is the business pioneer in data innovation, and getting certified by them is an ensured approach to prevail with IT positions. They enable you to do actually that with their superb Symantec 850-001 preparing materials.
Symantec 850-001 is rare all around the globe, and the business and programming arrangements gave by them are being grasped by every one of the organizations. They have helped in driving a large number of organizations on the beyond any doubt shot way of achievement. Far reaching learning of Symantec items are viewed as a critical capability, and the experts certified by them are exceptionally esteemed in all associations.
We give genuine 850-001 pdf exam questions and answers braindumps in two arrangements. Download PDF and Practice Tests. Pass Symantec 850-001 real Exam rapidly and effectively. The 850-001 braindumps PDF sort is accessible for perusing and printing. You can print increasingly and practice ordinarily. Their pass rate is high to 98.9% and the comparability rate between their 850-001 study guide and genuine exam is 90% in light of their seven-year teaching background. Do you need successs in the 850-001 exam in only one attempt? I am right now examining for the Symantec 850-001 real exam.
As the only thing that is in any way important here is passing the 850-001 - Cloud Security 1.0 exam. As all that you require is a high score of Symantec 850-001 exam. The just a single thing you have to do is downloading braindumps of 850-001 exam prep directs now. They will not let you down with their unconditional guarantee. The experts likewise keep pace with the most up and coming exam so as to give the greater part of updated materials. Three Months free access to have the capacity to them through the date of purchase. Each applicant may bear the cost of the 850-001 exam dumps through killexams.com at a low cost. Frequently there is a markdown for anybody all.
We have their experts working continuously for the collection of real exam questions of 850-001. All the pass4sure questions and answers of 850-001 collected by their team are reviewed and updated by their Symantec certified team. They remain connected to the candidates appeared in the 850-001 test to get their reviews about the 850-001 test, they collect 850-001 exam tips and tricks, their experience about the techniques used in the real 850-001 exam, the mistakes they done in the real test and then improve their material accordingly. Once you go through their pass4sure questions and answers, you will feel confident about all the topics of test and feel that your knowledge has been greatly improved. These pass4sure questions and answers are not just practice questions, these are real exam questions and answers that are enough to pass the 850-001 exam at first attempt.
Are you looking for pass4sure real exams questions and answers for the Cloud Security 1.0 exam? They are here to provide you one most updated and quality sources that is killexams.com. They have compiled a database of questions from actual exams in order to let you prepare and pass 850-001 exam on the first attempt. All training materials on the killexams.com site are up to date and verified by industry experts.
killexams.com is the ultimate preparation source for passing the Symantec 850-001 exam. They have carefully complied and assembled real exam questions and answers, which are updated with the same frequency as real exam is updated, and reviewed by industry experts. Their Symantec certified experts from multiple organizations are talented and qualified / certified individuals who have reviewed each question and answer and explanation section in order to help you understand the concept and pass the Symantec exam. The best way to prepare 850-001 exam is not reading a text book, but taking practice real questions and understanding the correct answers. Practice questions help prepare you for not only the concepts, but also the method in which questions and answer options are presented during the real exam.
killexams provide extremely user friendly access to killexams.com products. The focus of the website is to provide accurate, updated, and to the point material to help you study and pass the 850-001 exam. You can quickly get the real questions and answer database. The site is mobile friendly to allow study anywhere, as long as you have internet connection. You can just load the PDF in mobile and study anywhere.
Our Exam databases are regularly updated throughout the year to include the latest real questions and answers from the Symantec 850-001 exam. Having Accurate, authentic and current real exam questions, you will pass your exam on the first try!
We are doing struggle to providing you with accurate Cloud Security 1.0 exam questions & answers, along with explanations. They make the value of your time and money, that is why every question and answer on killexams.com has been verified by Symantec certified experts. They are highly qualified and certified individuals, who have many years of professional experience related to the Symantec exams.
Unlike many other exam prep websites, killexams.com provides not only updated actual Symantec 850-001 exam questions, but also detailed answers, explanations and diagrams. This is important to help the candidate not only understand the correct answer, but also details about the options that were incorrect.
Cybersecurity firm Secarma has taken a 13.3 per cent stake in Shearwater Group, in a deal worth £7.4m.
Consideration of £7.4m is to be paid by Shearwater through £6.7m in new ordinary shares and £700,000 in loan notes.
Jones said: “Secarma continues to go from strength to strength and they have laser focus on the direction they want to take the business.
“Two decades’ experience building and supporting cloud platforms with UKFast, and working closely with customers, has given us clear insight into their needs. Their fast-growing cloud security division is where we’re focussing their attention.
CHICAGO, April 19, 2019 /PRNewswire/ -- According to a new market research report "India Data Center Market by Component (Electrical, Mechanical, Communication, Security), Model (Captive, Outsourced), Vertical (BFSI, Telecom and ITES, Defense), Trends, Vendor Ecosystem Analysis, and Porters Five Forces Analysis - Forecast to 2022", published by MarketsandMarkets™, the India Data Center Market size is projected to reach USD 1.5 billion by 2022 from USD 1.0 billion in 2018, growing at a CAGR of 11.4% during the forecast period.
The market growth is driven deeper internet penetration, increase in digital data traffic, public cloud services, and higher expected growth for IoT.
Browse in-depth TOC on "India Data Center Market"
The captive model to account for the highest market share and followed by the outsourced (colocation) model during the forecast period.
The captive model of data center is being overtaken by colocation model at a significant rate. It is expected that consolidation of data centers will cannibalize the captive data center market, and colocation market will grow exponentially keeping in view that the outsourcing of data centers will help reduce the operating cost significantly for the clients.
By 2022, the outsourced model of data centers will make almost equal market share.
The captive model, however, will still hold a majority of share, due to strict government regulations for various industry verticals making them to spend on captive data centers to localize their data processing.
Indian government has launched MeghRaj cloud to accelerate G2C services delivery. Under the scheme, many national data centers and state data centers have been built and many are being built in various states, such as Maharashtra and Madhya Pradesh. For example, NIC has already built 4 NDCs in India and the fifth one is coming up in Bhopal.
All government-owned companies in every industry vertical have their data centers located in Mumbai and Bengaluru.
eCommerce and online marketplace proliferation in India has driven the market for colocation data centers in India and is expected to drive the market in the coming years as well. Higher adoption of technology by SMEs in every sector combined with stringent government regulations will spur the demand for more data centers in India.
Fujitsu (Japan), Honeywell (US), NEC (Japan), Siemens (Germany), IBM (US), Johnson Controls (US), Hikvision (China), Dahua Technology (China), and Schneider Electric (France) are some of the key players in the India Data Center Market providing physical infrastructure. Apart from these, there are many colocation services vendors in India, such as Netmagic, Ctrl S, ESDS, Prasa, and Sterling & Wilson. | 2019-04-23T18:01:33Z | http://smresidences.com.ph/practice-test.php?pdf=850-001 |
Squirrels are some of the most adorable creatures in the animal kingdom. It makes sense that any human with a decent heart would want to help one if it were in trouble. One family in Finland noticed an innocent red squirrel that was nearly lifeless on the side of the road. The family was distraught at the sight of this, but then the little creature showed signs of life. It was the start of a beautiful journey that went from gut-wrenching to heartwarming.
A family from Finland spotted an innocent little red squirrel on the side of the road back in 2007. There were no signs of life. They wondered if it had been struck by a car or maybe even attacked by another animal.
The family was heartbroken. They had never come across a baby animal in more need of help. They were determined to do whatever they could to help him survive the condition he was in.
Their first decision was to take the poor little guy home with them so they could attempt to nurse it back to health. As a caring person, it seems like the plausible thing to do in that situation.
Much like many things in life, there is nothing a little bit of tender love and care can’t fix. The family put in overtime to make sure the little guy was getting the proper attention that he needed.
It wasn’t long until he was eager and fascinated with his new surroundings. The family was ecstatic and couldn’t get enough of watching what he would do next. It was like he was reborn into the world.
As sweet as it all was looking, everything that glitters isn’t gold. The love and care provided by the family was enough to bring the squirrel back to a healthy state, but there was something wrong.
The happy ending everyone that hoped for was muddled by a discovery. “We realized that his eye would never heal completely and he wouldn’t survive on his own,” said Reddit user Priami, whose family adopted the squirrel. What did that mean for our little friend’s future?
Naturally, the family was heartbroken to learn that their new pal would never be able to return to his natural habitat. However, there was a silver lining to that discovery. They were more than happy to bring in the critter as one of their own.
He was practically already family to them, so what harm would it be to have him turn into a full-time family member? They just couldn’t let him go and who could blame them?
They made up their minds. The family finally decided to make the squirrel a part of their life by officially adopting him. The next step was to decide a name for their furry little guy.
What name would be best suited for a squirrel do you think? Maximus? Arthur? Maybe even Daniel? They decided to go with Arttu, “pretty much the Finnish version of ‘Arthur.'”That name ended up fitting him so well. Big things were in store for little Arttu.
Once they decided on a name, the next step was to make sure Arttu was nice and comfortable at his new place of residence. Much like when a friend comes to visit, you want to make sure that he or she feels good during their stay.
Since this was a permanent stay, and because he was an animal that usually isn’t domesticated. It wasn’t long before they found out that Arttu had quite the personality.
Who would have thought that squirrels could be so funny or have a sense of humor? Clearly, no one, but Arttu was such a jokester according to the family. He would do things that you wouldn’t expect animals to do.
“He liked to have playful ‘fights’ with our hands (you know, like cats do) and he was smart enough not to bite too hard,” his new family said. You just have to love an animal with a playful side.
It was like a dream come true for Arttu and his human family. He had a blast all day and every day. The family loved his presence as much as he loved playing with them.
In the moments when Arttu wasn’t climbing all over the humans, he would make the most out of their hoodies. One thing he would do is nestle into them and make temporary nests so he could be nice and warm.
Not only was Arttu a funny guy, he had a tremendous appetite. When you’re spending most of your time wasting energy climbing up people five times larger than you, you will be hungrier than the average squirrel.
To solve this, the family tried many different snacks to see which he would like the most. They were pleased to find out he liked to eat well. They gave him a diet of nuts, fruits, berries, and mushrooms.
This little guy just loved being around everyone. It was like he was meant for domestication. He liked munching on his snacks outside with the rest of the family while they enjoyed each other’s company.
Obviously, he couldn’t spea, but he made it clear with his presence that being around his humans was something he did enjoy very much. He loved every minute spent with them and the family loved every minute with Arttu.
Wild animals and humans don’t normally blend that well. It just isn’t in their nature to be buddies with people and that’s common knowledge. However, the exact opposite could be said for Arttu and his family. He had become extremely comfortable with them.
Comfort became instinct with Arttu. No matter where or when, Arttu was able to transform any place into a cozy resting nest that was perfect for his next nap. The hoodies are where it started, but that soon became cupped hands too.
It’s unfortunate that Arttu couldn’t roam around the great outdoors like the rest of his species. Climbing huge trees, finding food, and jumping from branch to branch wasn’t in his daily life anymore. However, his family helped with that issue.
They really enjoyed taking him outside so that he could climb around as nature originally planned for squirrels to do. As long as he had the proper supervision, everything was fine. Look how happy the little guy looks!
Imagine being stripped away from your native country but accepted elsewhere wholeheartedly. As good as it is to be accepted, there will always be a part of you that might miss where you came from. Arttu’s family wanted to make sure this didn’t happen with him.
Whenever it was time for Arttu to come back inside after playing, they let him feel close to his home. That’s right, Arttu was allowed to bring back in something from nature. His favorite was pine cones!
Can you imagine having a little furry tree climber roam around your house during Christmas time? There’s no telling what he might do around the Christmas tree! That’s why whenever that holiday came around, the family ensured that the tree was extra protected.
It was only a matter of time before Arttu would climb to the top of the tree! That was just in his nature as a wild animal. What else would you expect?
As it turns out, Arttu was smarter than your average squirrel. That’s something you might never hear in your life, but it could be said for this little guy! Although he liked climbing, he soon began to realize something important.
Trees inside the house were way different than the ones he found and loved outside. And he may have realized this, but that didn’t stop him from appreciating the ornaments found on the Christmas tree.
A cat or dog is usually the standard type of pet to keep. That means animal stores and groomers are better suited to tend to those kinds of animals than, say, a local squirrel you found on the side of the road.
A squirrel has a special set of challenges that come along with the unique joys they bring. Arttu needed to have his nails regularly trimmed due to not living in the outdoors. That itself was quite a task.
Have you ever seen those videos on YouTube where the owner is attempting to groom their cat, but the cat just isn’t cooperating? That happens with a lot of pets and it’s expected. Don’t expect it with Arttu.
Many other animals act out of character while they are getting special treatment, but Arttu takes it like a real trooper. He understood the better he acted, the sooner it would all be over with and he could get back to acting like is playful self.
From 2007 until 2013, Arttu lived with his human family. That is a long life considering all that he has been through for such a small animal. The day came where he ended up passing away due to old age.
The family found him curled up in a nest looking like he was sleeping. Once they realized he wasn’t alive anymore, it was difficult for the family to come to terms with the fact their unexpected family member was gone.
No matter how short his life was, Arttu certainly had one for the ages. Neither he or the family could have ever predicted that they would be living under the same roof in unity like they were. It was like something out of a Disney movie.
The family did something touching for the little guy. “We fed other squirrels all the food we had stored for him before he died,” they said. They even gave Arttu a little tombstone.
Keep going to read the incredibly touching story about why a cat would only take food in bags.
Making a difference in the lives of animals can be a heartbreaking chore. That was true for one unnamed Korean woman who made it her job to feed all the feral cats in her neighborhood. As a volunteer at a local shelter, she had access to food, and she decided to put it to great use.
For five years this volunteer would hand out food in bowls to every homeless cat who would accept her offer. For the most part, all of the cats happily took the free meal. One cat, however, stood out from the rest for one crazy reason.
The cat, which was named Dongsuk, would show up every day for food with the rest of the cats, but would never take any. Instead, the furry feline would turn away, choosing to find a way to survive by other means.
Still, Dongsuk showed up every day, proving she wasn’t averse to getting a free meal. She just didn’t like the food she was being given. Or, as the volunteer began to think, maybe it was about the way the food was being presented in the first place. Was there a reason Dongsuk refused to eat from bowls?
The Vounteer’s first instinct when she discovered Dongsuk refused to eat was to switch the kind of food she was giving the cat. Cats tend to be very picky about their diets, even refusing good food when it’s not the type they prefer.
To test if Dongsuk was this kind of cat, the volunteer tried several types of dry food. Dongsuk refused every brand and every variety. Then she tried wet food in a can. Dongsuk remained stubborn, forcing the volunteer to go back to the drawing board.
Maybe Food In Bags Will Do?
Desperate to solve the mystery of why Dongsuk wouldn’t eat, the volunteer began to think out of the box. Like we said, if Dongsuk didn’t want the food, she wouldn’t show up to feeding time everyday. It was up to her new friend to learn how to feed Dongsuk so she wouldn’t starve.
With so many questions, where would the volunteer find the answers?
The volunteer was ecstatic that Dongsuk was finally taking the food. Every day she would make sure there was a special bag of cat food ready for the felines. And every day, Dongsuk would come to visit, take the bag of food, and run off.
This odd behavior, however, only made the volunteer more curious about where Dongsuk was going with her bag of food. She already thought it was odd the cat would only accept food in a bag, and now she needed to know why.
Why Would Dongsuk Only Eat Food From A Bag?
First of all, the volunteer didn’t understand why Dongsuk wanted to eat her food from a bag. Wouldn’t a bowl be easier? Did Dongsuk really prefer living her life the hard way? If so, then why? There were so many questions the volunteer needed to be answered!
She also knew there had to be an answer. Taking advice from her friends, the volunteer gave into her curiosity and began to come up with a plan to unravel this new mystery. She never expected to the truth to be so heartwarming.
Where Did Dongsuk Take Her Food?
Cats have some strange behaviors, but the way Dongsuk acted worried her volunteer. One of the biggest questions she needed answered was this; where was Dongsuk taking the bag of food? Originally, she assumed Dongsuk preferred to eat in private. But why? Most of the cats ate in front of her without hesitation.
Perhaps Dongsuk didn’t trust humans and found just enough courage to show up every day for food and scurry off. Perhaps there was another, more important reason.
Up next, the volunteer makes a plan to learn the truth!
One day, to solve the mystery that Dongsuk had created, the volunteer banded together with a few of her friends to follow the cat. The mission wouldn’t be easy. They would have to keep their distance to keep the skittish kitty from running.
If they were caught, it could be disastrous. It took so long to earn Dongsuk’s trust in the first place, what would happen if they broke it? How would they know if Dongsuk was still eating and alive? The food they provided was Dongsuk’s main source of food, and they were determined to keep it that way.
Keeping their distance, the team followed Dongsuk on her journey with her bag of food. The further away from the neighborhood Dongsuk took them, the more baffled they became. Something was urging Dongsuk to make this incredible journey everyday, and they were close to finding out why.
Finally, Dongsuk arrived, with the team in tow, at the entryway of an abandoned building. The scene couldn’t have felt more like the start of a scary movie. Luckily, there were no horrors found inside the building!
Dongsuk took the team inside the building, where she put the bag of food down and began to pace. Don’t worry, the cat wasn’t summoning anything scary. In fact, she seemed scared herself. The way she was walking back and forth nervously, the team knew she wasn’t comfortable.
It’s possible Dongsuk didn’t want to eat in front of the team. At this point, the cat had to know that the group of people were following her. They believed she might have been showing that she was ready for them to leave.
Still waiting, Dongsuk began meowing. At this point the team realized she was waiting for something. In a few seconds they found out a what. Out of nowhere a little ginger kitten appeared and ran right up to Dongsuk, who put down the bag of food.
Dongsuk was a mom! Every day she made sure not only to provide for herself but for her young kitten as well. This is why she would only take food wrapped in a bag. It was the only way she could ensure her baby would be fed.
The volunteer and her friends continued to watch the selfless acts of this feline mother unfold. After Dongsuk put the bag of food down, she stepped away, letting her daughter eat first. The kitten ripped into the bag and fed til it was full.
Finally, after her daughter was happy, Dongsuk enjoyed her meal. The team was brought to tears as they watched this real life story of heroism and survival unfold right before their eyes. Of course, the story didn’t end there.
Keep reading to find out what amazing thing happened next!
Having witnessed everything Dongsuk was willing to go through to make sure her daughter was fed, the volunteer and her team knew they needed to do something as well. First, they checked the neighborhood to see if anyone knew Dongsuk, and had been looking for their lost cat.
No one claimed ownership of the feral cat, confirming she was on her own and had been on her own for a long time. Sadly, there were some people in the neighborhood who were familiar with Dongsuk, and they had a heartbreaking story to share.
As the team went around the neighborhood and interviewed people, they learned that Dongsuk had suffered a major tragedy in her past. According to someone they spoke with, the mother cat had originally given birth to five healthy kittens.
Life hadn’t been fair to Dongsuk, and as she fought to keep her litter alive, she lost four of them. Now her daughter was her entire world. She had one baby left and was determined, no matter what, to keep her alive and watch her grow up into an adult cat. Now she just needed a happy ending.
Still ahead, learn all about the team harrowing rescue mission!
The team knew they wanted to find a way to rescue Dongsuk and her kitten, but they also knew they needed to form a stronger bond of trust. To do this, they returned to the location Dongsuk led them to and gave her a blanket.
The blanket was the first step in building a trusting relationship between cat and human. It was used to show that these people weren’t the enemy. Still, Dongsuk and her daughter weren’t going to give away their trust in a day.
After giving Donhsuk and her daughter the gift of warmth, the team of volunteers returned to the building every day to allow the cats to feel normal around humans. According to one of them, Dongsuk came on board pretty quickly.
Dongsuk’s daughter was less willing to make friends with her human saviors. Remember, she was not able to build a previous relationship with them. Dongsuk had used them as a trusted food source, but her daughter had no idea. She just ate the food after it was brought to her.
The team was used to needing patience, and knew that with the cats fed everyday they could be patient waiting for Dongsuk’s daughter to warm up to them. They knew the cats were fed, they just wanted to make sure were safe.
Eventually, the tiny kitten became comfortable with the humans. Even if she didn’t like them very much, she seemed to understand that they were there to help and not hurt her. With the trust of both cats, the volunteers knew that the next step was going to be moving them to a new home.
One of the big reasons the team was willing to take so long to earn the trust of Dongsuk and her daughter was the rescue mission. In order to move these cats to a new home, they needed to use scary tools and nets.
The cats were still feral, so it wouldn’t have been safe to pick them up and move them. As much as the volunteers may have wanted too, they still needed to be safe. Looking at the net above, you can imagine what would have happened hadn’t they built trust with the animals first.
Before Dongsuk and her daughter were adopted, they were taken to a shelter where they were given their own mini house. As you can see, it was way more luxurious than their last home. They even began eating their food and drinking their water out of bowls!
Life was looking up for the cats from the streets. Now she just needed to find a forever home. It was also clear that it was important to keep the two felines together.
The story of Dongsuk and her daughter is one of the most inspirational rescue stories we’ve heard. The resilience it took for this cat to put her kitten’s welfare ahead of her own is incredibly touching. Especially after having gone through the tragedy the poor thing went through with four other kittens.
This is a story of motherly love and the power of doing good. The volunteer and her team went above and beyond their duties to save the day as well. They set out to feed the cats and ended up giving two cats in need new leases on life. | 2019-04-25T15:11:40Z | http://www.giveitlove.com/a-squirrel-rescued-from-the-side-of-the-road-is-now-part-of-the-family/?view-all |
Recently the focus of the Transform project has been on making the project video description.
I made interview plans, decided they were too ambitious and complicated, and simplified them. Two people I had consulted during the project, whose work has involved them in transforming the way records are managed, kindly agreed to take part in the video: a Business Analyst piloting a new SharePoint committee records system, and the Project Manager of a finance efficiency programme. At King’s College London we are fortunate to be able to call on colleagues in Audio Visual Services, who did a very professional job of filming the interviews in their campus studio. Although I had planned to ask only five or six key questions, I found the interviews flowed better and the subjects relaxed once I allowed the conversations to become more of a dialogue. It was difficult to select the short extracts for the final video, but we chose some that focused on the benefits of digital records, and lessons learned, and tried to avoid anything too descriptive or detailed. I wrote a script for a voiceover, which I recorded later. Now I am waiting for the first rough edit, to which still images will be added to break up the talking heads.
This aspect of the project has been very time-consuming but fun to do, and I am sure many more people will watch a short video than would ever pick up pages of text and read it. I only hope the finished product lives up to expectations!
Posted by transform on June 14, 2013 in Uncategorized.
Our recent work on student records has prompted reflections on the nature of change management.
Might it be feasible for awards committee members to view exam results on tablets in meetings, to save printing them all to paper?
Is it reasonable to expect committee members to print documents sent to them electronically?
Would tutors ever want to mark online?
Can the prototype processes be refined?
Is the proposed change desirable?
Some local innovations are adopted centrally – bottom up – and others are devised at a higher level centrally and “imposed” locally – top down – what are the relative merits of each approach? Local pilots usefully reveal teething problems on a small scale, and allow experimentation so issues can be fixed at an early stage in the process. But if technological fixes are done at a macro level, detached from the bigger picture, how do they fit into the overall roadmap? It is crucial to identify dependencies at an early stage so to link local innovation to the corporate, strategic overview.
We need to understand which processes can be computerised and which cannot. It is not possible to automate everything, nor is it desirable – there are many variables, and some processes involve subjective judgement and/or discretionary decision-making. There is no benefit to computerising some processes. Process mapping is crucial, to avoid pointlessly systemising poor practice.
We know we cannot continue to provide a Records Management service for paper AND hybrid records indefinitely. They are too hard to manage: some records only exist on computerised systems; some are printed for paper files; some paper files contain documents that do not exist on our systems, making them incomplete records; and we are missing digital information held outside our systems.
What is involved in moving from hybrid to digital systems? And how will we know when we’ve got there?
Posted by transform on April 17, 2013 in Uncategorized.
The Transform project is looking at how records are managed in six key areas and, in February, the focus was on student records. We talked to four teams working with student data and learned a lot from hearing about their frustrations and triumphs. We also identified some areas where efficiency could be improved through using technology.
The Student Conduct and Appeals team manages about 600 case files each year. The combination of an impending office move, and a new manager, created a great opportunity to review records management. Routines that had previously worked well had gradually broken down over a long period when a succession of temporary staff handled records inconsistently, and systems that involved organising files by case type went wrong when cases crossed boundaries – eg when a complaint also involved an appeal. Case files are in paper format and born-digital documents are printed and filed. Exploring the reasons why taught us something about resistance to going digital: people are unsure about the legal status of digital versions of important documents, especially if the signature is significant, and they also fear losing information in digital format if routine backup procedures fail. This is useful in helping us understand and manage the culture change required to ease the transition to more digital ways of managing records. Happily, our visit also created an opportunity to discuss housekeeping electronic records prior to a planned migration to a new server – staff wanted advice about managing information received via email so it gets attached to the case files, rather than remaining in desktop mail folders.
The Exams and Awards Office services around 100 committees involved in student assessment, generating “masses” of paper. Thousands of exam record documents are printed for committees over the course of a year – around 75% of which are subsequently destroyed. Previous efforts to reduce the volume of paper documents circulated to committee members have not been very successful: large volume emails caused system crashes and the number of recipients is limited; and security concerns surround the use of drop box. SharePoint offers the promise of improved document sharing in future, but it will be critical to ensure the correct structures are in place first.
Committee members need access to statistics in meetings, but efforts to project live data onto a wall instead of providing information on paper stalled when the system performed slowly. Members have suggested using individual tablet devices to view data, a proposal that might justify a cost-benefit analysis – do other institutions have any experience of this?
Another potential improvement area concerns the 1,500 students who each year complete a form on paper requesting special exam arrangements – a good candidate for an online web form with the added bonus that the digital record created could subsequently be stored against the student’s online record.
The team readily identified some other bonuses of digital records management: freeing up valuable office space by reducing the number of paper-filled filing cabinets, and improving the image of a service occasionally perceived as bureaucratic and inefficient, raising both institutional reputation and staff morale.
The Assessment and Records Centre for Arts and Sciences has already been using technology to improve efficiency. It used to take four full-time staff three weeks to manually enter 40-50,000 exam marks, but this has been halved using Excel – equivalent to six working weeks for one person, or one and a half weeks for each of the four team members. This has eliminated the large backlog that used to accumulate during the summer peak, enabling them to monitor progress and stay on top of other tasks, such as running reports for boards ratifying marks, which streamlines progression procedures. The team say the main benefit is not even the time saved, but the improvements in data accuracy – rectifying mistakes used to involve time-consuming manual checking, but the new automated process instantly identifies errors by revealing exceptions.
Completing a Change of Registration form used to require manually entering data into multiple fields on the student system – not only laborious, but also the cause of inconsistencies and errors. The team was frequently asked to retrospectively complete fields left blank (eg ethnicity codes, reasons for withdrawal) because lack of this data prevented the accurate completion of HESA returns. A new process now updates all these fields in a single action.
Completing a Change of Circumstance form used to be a chore that involved completing a form in Word with data from several different places on the student system, but important as a vital part of the process that enables the College to claim fee income from Student Financing England (SFE). The improvements made to the Change of Registration form mean a whole batch of Change of Circumstances forms can now be produced at a stroke, AND in a format conforming to SFE standards.
In a typical year the team used to manually produce up to 18,000 individual results summary documents when results needed to be checked (eg resolving discrepancies, authorising condoned fails, ascertaining student debtor status, borderline results that might affect final degree classification). The team devised a way to produce a batch of documents for all the students on a single programme in one exercise, described as a “massive boost to productivity” and an improvement attracting praise from exam board committee members. Progression is another area that has been streamlined, using Excel functionality to generate summaries confirming whether students can progress to the next year or have failed any core modules.
The team has the Registered Student Form in their sights next – plans to generate this form with most fields pre-completed with accurate data from the student system could reduce the reliance on paper forms completed (possibly inaccurately) by students.
Historical student records in the archives originate from a variety of sources, and a series of institutional mergers has resulted in a legacy of different systems. Records are also held in multiple locations which can make life hard for archive staff answering queries. We wondered: if the records can’t be stored together physically, to what extent can they be brought together virtually? Ideas we have come up with so far include digitising location-specific master records that double as finding aids, and creating a new resource by producing guides to student records by department and/or era.
Posted by transform on March 18, 2013 in Uncategorized.
There are many difficulties with starting a project once a bid has been successful. It can be hard to get started, and find the right approach, and to find time to think about a new challenge on top of a normal workload. A common experience, reinforced by discussions at our recent Action Learning Set, is that the original scope can, in retrospect, seem too ambitious in proportion to the resources available. The important thing is not to panic! A project can always be steered back on track with a bit of re-focusing and refreshing, in fact it is an unusual project that does not change shape along the way to some extent. As long as the original objectives are kept in sight, and plans made to deliver the promised outcomes, the organisation should be able to find some real and lasting benefits from the experience. We need to be strategic, which is why is was great to meet with Sarah last month and get her enthusiastic approval of our plans for completing Transform.
Our project is broadlly about looking at records management in 6 key areas, and exploring improvements that might be achieved by encouraging a shift from paper to electronic systems. We already knew it would be important to seize opportunites arising from changes already planned, such as an efficiency programme in the finance department, and we have since identified synergies with other initiatives. However it became apparent that going into each of the 6 areas in great depth could involve so much mapping and documenting of processes that it could detract from the more important creative work. Instead we will now focus on one set – committee records – in depth for the remaining 6 months, and take a lighter look at each of the other 5 records sets in turn, one per month, applying some of what we are learning from our main study. This approach has breathed new life into the project, and re-energised it.
Posted by transform on February 19, 2013 in Uncategorized.
Thanks to Lucy for hosting the Action Learning Set at UCLAN last week. It was really good to meet others and find that two of them are, like me, new to their projects. I thought the principles of Action Learning – something else that is new to me – worked really well, as we took it in turns to listen to each other talk about project issues, ask helfpul questions and make practical suggestions. I noticed how often people said “thanks, that’s a really great idea!” People seemed to find the human contact reassuring.
Thanks also to Sarah for chairing so supportively, and effectively by ensuring that we all agreed to some specific actions. This should ensure the day has practical outcomes that help us move our projects on, rather than being a talking shop or group therapy session, however valuable that might be!
Posted by transform on February 5, 2013 in Uncategorized.
Their experiences shared confirmed our feeling that it can be a real challenge finding a common language for effective communication between IT, Information Management and people working in the business units.
Applying Enterprise Architecture involves taking a more holistic approach to connecting people, processes and technology than earlier business re-engineering models might have done. It can usefully “wrap around” other disciplines and methodologies.
One participant asked how it relates to Action Research (a form of self-reflective enquiry undertaken by a community of practice to improve the way issues are addressed and problems solved, involving active participation in organizational change). The answer suggested that Action Research could almost be considered a lightweight version of Enterprise Architecture.
There was some discussion about which tools people found useful. Staffordshire found the CETIS Archimate modelling tool http://archi.cetis.ac.uk/ preferable to Visio, liking the way its flexibility enabled them to tailor presentations to different audiences, to convey messages in a professional way that boosted credibility. Someone else found the Ketso Creativity Kit was good for generating ideas, identifying problems and priorities http://www.ketso.com/learn-about-ketso. Another participant used the Moodle Virtual Learning Environment to bring 40 individuals together.
Whilst diagrams have a role in cutting across the silos that can develop, forming barriers between IT, Information Management and the business, we are all keen to bring about actual change rather than just keep mapping things.
Sadly, there are no magic answers. It was acknowledged that raising awareness – and the professionalization of process review – is a long game!
Thanks to Andy Stewart and everyone else involved for a stimulating session.
Posted by transform on January 25, 2013 in Uncategorized and tagged Enterprise Architecture.
Have just finished a useful action learning set here at King’s College London today. One thing that several members felt was missing was the chance to meet face to face during the project and I was happy to host this here. We took a similar approach to our online sessions but being able to see my colleagues faces was really useful and we all took away actions from the session.
My main concern for this set was that parts of my planned project have moved off in ways I had not considered when I was writing the bid. Sarah, our cluster leader had done her homework and was able to restate the project objectives so this helped to focus my thinking. I will go away to review the mapping of the original bid objectives to refocus what has been achieved during the project and what is outside the scope of this project.
Posted by transform on July 10, 2012 in Uncategorized.
It’s 8 months since our project started in November 2011 and that means that we are nearly half way through. This is a good time to start to ask the questions about what we have achieved so far and find ways of measuring this against our original objectives.
In January, the Information Management team held a facilitated workshop to capture baseline data about the six key record sets we had identified in our project bid. This resulted in ‘As is’ process maps and captured some actions to fill in gaps where our knowledge of the data flow through systems was lacking as well as identifying who within the College is accountable for the overall record and constituent parts.
Our initial focus was work on our Student records which we retain permanently although currently this is partly in digital form within our SITS student system as well as paper records, sometime files from both the central teams and departmental teams. As part of a College funded initiative, we mapped the data flow from our admissions portal through the SITS system and also identified where data was duplicated in both digital and paper formats. This exercise was captured in a ‘Data Managment Plan’, a new process that we have started to use to document data flows and risks. Carrying out this analysis has enabled the Information Management team to develop the trust of business users and begin to build a business case for introducing document management to increase the content of a student record by linking scanned and born digital documents. This should reduce the risks of core data being held outside the student record in the longer term, although implementing this functionality across the College will take time and resources to support this. The plan has now been signed off by the business owners and feedback has been very positive. This has resulted in project funding for Key Information Sets (KIS) and Higher Education Achievement Record (HEAR) being allocated to a 2 year Information Analyst post within the Information Management team to allow us to support the business in delivering these projects whilst ensuring that records and information management are embedded in the solutions.
How we evaluate this is our next challenge – we can document qualitative changes such as the introduction of Information Management skills to the project team and at the end of the project in 2014, we will be able to show many back office changes such as how we capture programme and module approval and we could document the time taken to approve a module using a paper based process and compare this to the online approval and multiply this by the number of approvals per year to show a recurrent saving. We have some experience of this as part of the JISC Impact Calculator pilot in 2010 where we defined the cost or time per unit of change against the resource costs to make the change. We asked for help from our Finance team who are more used to calculations of this type so we may be going back for more help soon!
Our work on staff data has been progressing well as we analyse the individual fields of the PURE system feed, which will populate a portal to support our preparation for Research Excellence Framework assessment in 2014. The use of HR data feeds exposes data quality and business processes in a way that was not intended and our challenge here has been to work with HR, Finance and ITS staff to map data flows through both the HR and Finance systems. We have held several round table meetings to agree potential changes and ensure that we do not affect other processes by implementing these. Mapping the process for communicating change has also been illuminating as accountable staff often have very different understanding of similar processes. One outcome of this work has been a better overall understanding of data uses and we are now considering setting up an Institutional Data Governance Committee to sign off changes to reduce risks in this area.
Committee records management has been progressing well behind the scenes and we are aiming to digitally archive 100% of our core committees (standing committees designated within our Ordnances) by 2012/13. I’ve been trialling the Evidencing Change template in this area and will be sharing it with the action learning set when we meet on 10th July.
Other areas of records management have not been progressed at the same pace – there is always a limited amount of resource committed to working on this and student and staff records are high priority when matched with technical resources to implement change.
Estates records were a high priority in 2009 -2010 and improved working relationships led to better paper records management and some involvement in development of their project management system to add document management functionality. The functionality project was put on hold in 2011 and has not yet been revived, so we will be working with Estates over the summer to understand any future development and help them to address the risks in the meantime.
Finance records have always been predominantly paper and work on this project needs to focus on building relationships with Finance staff and understanding the roadmap for development of the Finance system in this context. Some of the work on staff data has meant work with Finance staff who control the establishment and this will be useful to build our understanding of the many aspects of financial management carried out within the College.
Posted by transform on July 2, 2012 in Uncategorized.
Since the last action learning group on 7th February, We have been trying to address the challenges of this project. Like most other Higher Education Institutions, we are in a time of great change and financial cut backs and so much of our work has been to research where there is appetite for change and where change is already being planned and we can work with these areas to improve their chances of achieving change and delivering added value.
At the end of January, we held a day workshop facilitated by an external IM consultant to look at all 6 areas of records within this project, Student, Staff, Finance, Estates, Research and Committee records. Each member of the IM team is taking a lead on one area and we summarised the current situation as we understood it and then tried to map the data flow of each type of record from creation to retention, deletion or archiving.
One main area of focus since then has been around the management of student records. We currently retain all student paper files permanently and although there have been some electronic student record pilots, most of our schools still create a paper file as well as maintaining the electronic student system (we use SITS). There are many reasons for this – most academics and some administrators don’t have access to the student system and so when they need to write a reference or answer a query about a student, getting access to the paper file is the easiest way to do this. Other issues are lack of scanning facilities for those records received in paper format, lack of trust of the electronic system or comfort in the existing process and lack of drivers to change!
As information managers, we need to be led by the business in driving these changes. We have identified a window of opportunity to work with our Students and Education Support Directorate who are driving work around the Higher Education Achievement Report (HEAR). Alongside this work, the business is also hoping to improve access to the system, address training issues and review the security model so that end users can get an overview of a student record without having to access multiple screens or submit data directly into the system. Our team will be working alongside these projects to compare ‘As is’ and ‘To be’ processes and to demonstrate at what stage fully electronic records can be trusted and we can cease creating and retaining paper records.
Another area we have been asked to work on by our IT services is to look at staff records. In preparation for Research Excellence Framework assessment in 2014, we are implementing a new Research Information System fed by the PURE application. The use of HR data feeds exposes data quality and business processes in a way that was not intended and our challenge here is to work with HR, Finance and ITS staff to map data flows through both the HR and Finance systems. One thing that we are focusing on is responsibility for fields within the core systems – in many cases, there is no clear responsibility and in other cases, changes can be made to suit one use which may impact on how another system uses this data.
None of this will be solved overnight, but what we have learnt from this is the value of bringing key players around the table to talk about this issues and working as a multi-disciplinary team to understand each person’s role in the process.
The Enterprise Architecture workshop arranged by JISC on 29th March was a valuable introduction to this approach and one thing I particularly took from the day was that Enterprise Architecture practitioners may be more effective if not sited in ITS or Business functions. Our experience of being neutral players, able to understand technical and business requirements and to translate requirements between the parties would back up this recommendation.
Committee records are now only preserved digitally and we are continuing to work with committee administrators to ensure that they submit them in a timely manner and that we can store them with adequate metadata for retrieval and use by College Staff. We hope to create a new committee system using SharePoint 2010 in the near future which will allow self-service secure storage and access for committee members to allow phasing out of printed copies at a later stage.
Work with our Estates records will be building on two previous projects both funded by JISC – the PEKin Project which delivered a case study on the move from paper to digital estates records and the Transforming Estates Records Management (TERM) project which piloted the Impact Calculator. Estates are improving their project management system (IMPREST) to allow storage of project documentation and the IM team have been involved in this work.
Our final area of work is that of Finance Records. This is traditionally paper based and we are in the early stages of documenting the flow of information from external suppliers and staff expenses to payments and the documentation created and its need for retention. There are many players involved in these processes and the appetite for change is not high.
Posted by transform on April 23, 2012 in Uncategorized.
The College’s strategic end game is a near complete shift to electronic digital records, information management and archiving, and a reduction in the number of parallel enterprise systems. This will achieve cost savings to digital and physical space and IT support while optimising access to definitive information for business purposes. This will include the provision of core data concerning the student experience and reduce the time required to answer Freedom of Information requests.
Key to this vision will be utilising JISC guidance to build cases, prioritise and improve staff skills. Involvement in the JISC Strategic Information Practice Group will provide an opportunity for Information Management to work with other staff of the business and to undertake further appropriate professional team training to support these endeavours.
Information Management staff currently generally lack skills in building practices around strategic ICT notably in support of enterprise architecture as this is rarely included in professional training courses. Capacity building in partnership with others as part of this project willhelp to align our skills with our technical colleagues, provide a better understanding of challenges and enhance multi-disciplinary working to meet the College’s strategic objectives.
The funding from this bid will offer staff a protected space away from their day to day responsibilities to study and analyse tools, and to discuss in depth their potential application at Kings which would not normally be possible.
Previous work piloting the Impact Calculator over 6 months focussing on estates records (http://www.jiscinfonet.ac.uk/case-studies/impact-calculator/kings) gave us experience of the challenges of setting SMART (Smart, Measurable, Achievable, Realistic and Timely) metrics around information management change, but the short time span was not long enough to evaluate the longitudinal impact of these changes nor maintain staff involvement in the transformation process.
Posted by transform on January 4, 2012 in Uncategorized. | 2019-04-21T14:48:51Z | https://transform.jiscinvolve.org/wp/ |
If you hang here a lot, you already know that since launch, we have been a bit preoccupied with sleep: why it matters, how we can do it better, and how our cultural history has shaped our present attitude toward sleep. And in our latest episode, we talk about the importance of community and sleep for the super-vulnerable (and super sleep-deprived) new mamas.
And then of course there's everything that's been happening in the world lately. Whatever your politics, recent events have undoubtedly rocked your world, because they are rocking the planet. Everything is in flux. Policies are changing (FAST), deeply-held beliefs about how the world works and how we all fit into it are being challenged and upended. Many of us feel uncertain and afraid.
In times like these, is it a bit of vapid vanity to be writing about how to get a better nights' sleep? Is digging into the latest research on clean skin care (coming up!) and getting to grips with diet and nutrition (coming up even sooner!) a waste of everyone's time?
So here's my take - this is me, Kari, the creator, producer and voice of Life Butter, jumping in in a personal way to make the case for why wellness is more important than ever.
When I started to put together the idea for this site and my beloved radio show (which I am enjoying so much), I wanted to make sure that I was going deeper than your average facial 😕 I wanted to create a thoughtful space to both celebrate (yes! it is fun, after all) and consider health, beauty and wellness - what these things mean to us as individuals, and how they fit into this new society that seems increasingly obsessed with them.
When doing my research for the framework of the podcast, I came across a beautiful mini-documentary by British Vogue called What is Wellness. Shot in sunny LA and narrated by a model for Reformation (an LA-based sustainable fashion brand with a gorgeous aesthetic), it's easy on the eyes. But it's not just that; in the opening episode, narrator Camille Rowe gets to grips with the genesis of the wellness movement back in the '70s (history angle coming on strong...that is my thing, after all!). Speaking to John Travis, she learns that for this OG wellness guru, "the currency of wellness is connection" - it is community that is at the heart of what "wellness" is truly about.
This ties in with the observations we made in Episode 5 of Life Butter Radio; new families in the West are often under an immense amount of pressure and under-resourced. Where are our communities these days? Are they the private FaceBook groups we join to discuss our business ventures, hobbies or organise baby clothing swaps? How often can we see family when they live far away, when our holidays are brief and polluted with the need to keep one eye on our phones, and when we are always just so busy and tired? We really need to help each other, because we really are so vulnerable. And helping ourselves? This is truly part of it.
The time immediately after I had my son was dark and strange. My boy was born in December; the days were cold, largely sunless and lengthened by his seemingly ceaseless reflux-induced cries. Family was far, but I was the grateful recipient of help from friends, health workers and the care system I had put in place before he was born. Now, these are the memories that come to mind when I think of that time. In my case at least, those few bright points stand out far more than the murky monotony of a difficult day-to-day. The real, tangible effects of good food, sleep and self-care convinced me of the magic of wellness, and it spurred me on this quest to discover the easy, fun and effective practices we can both incorporate and love in our own lives to put us in the body and mind to enjoy our lives, and each other.
But it's become increasingly clear to me that the real heart of health and beauty is not just how we related to ourselves, but how we relate to each other. This week more than ever, REAL community is what I crave. I urge you to find and care for yours.
All this makes me think of the ending of one of the only television shows that I've bothered to watch from Episode 1-finish: Mad Men. That final scene (and spoiler alert, though whereyoubeen?) with the iconic 1971 Coke ad is everything - that hippie-hippie love-in isn't usually me, but it's what I'm craving right now. Not in the "coming together for commercialism and big business" sense, but in the idea of sharing something simple, fun and innocent. I invite a kombucha company/Sakara Life/MoonJuice or similar to do a riff on this!
So find something that genuinely makes you feel good; latch onto it, and share it with someone. Invite a friend over for a sleep-over. If your sister lives half a world away, have a spa night with her over FaceTime. Treat your partner to a 2 minute massage before bedtime. Swap the news (real or fake) for a conversation. Observe how you feel. And then get ready to come back here, because I am on a quest to figure out what makes us look & feel our best, so we can go out there and create the best. And I can't wait to share it with you.
Also check out these posts by Gala Darling and Louise Androlia on how to handle the media and ourselves in this climate, and why radical self love (Gala's baby) is more essential than ever.
In the spirit of all things nourishing (which, in case you missed it, is our theme of 2017), we thought we would open the new year with an exploration of food - always a fun topic, and hopefully one of the most nourishing aspects of our lives. It's bizarrely easy to forget sometimes, but that really is the point! So we had a little look at what 2017 is projected to bring to our plates, and we were inspired to both laugh and wonder at everything the food industry is dreaming up.
Kale. Bee pollen. Acai, Goji berries. Moringa powder. You might think that you have modern day superfoods nailed, but I would invite you to THINK AGAIN. So get ready, because the hotlist of 2017's hot foods (N.B. very few of them are actually hot) is in, and they are as wild as they are wild.
Remember when life was simple and you just had to fit some dark leafy greens to be a supercharged food hero(ine)? The power is still with plants, but not necessarily your garden-variety. Not in their raw, virgin & untouched state, anyway.
Enter the ferments, the vinegars, the cultured substances and the just plain substances -- weed & 'shrooms are making a comeback, alongside, well, germs (for real, many of 2017's hot foods are basically carriers for bacteria).
First up, we have vegetable yogurts - a way to get both one of your 5-a-day (which turns out should actually be more like 7 or 8), plus some of those healthy gut bacteria that we should all be cultivating and caring for, now that we know that our immune system is really housed in the gut. And of course you should always save a little for a face mask - seriously, yogurt works wonders topically for the skin. Not sure if there are any added benefits in say carrot yogurt, but it does show how versatile and interesting vegetables can really be!
Kimchi and sauerkraut have been hot for a while, and don't expect them to go anywhere. As the benefits of cultured vegetables (think pickles and ferments) continue to be studied and understood, these foods will increasingly become part of our daily routine. The purported benefits are a stronger immune system, better digestion and, in the words of Amanda Chantal Bacon, "happy glowy face." She has also said that incorporating cultured vegetables into your diet can help kick your sugar habit. (check out this presentation for details). We've been incorporating more kimchi into our diets, and you know what...there may just be something to this!
Glow like Moon Juice founder Amanda Chantal Bacon with the help of fermented veg.
Everyone is always talking about eating the rainbow, and colour is as nice a theme as any for a hot food trend. So with that in mind, we will apparently be eating more purple food in 2017...think less Koolaid (is this still around? Anyone?) and more purple cauliflower, purple asparagus, purple potatoes, purple broccoli and even purple corn. In line with this trend, beetroot will remain a mainstay, and be employed in the ever-advancing ranks of inventive meat substitutes. This burger is straight out of Silicon Valley and backed by Bill Gates himself. It apparently bleeds beet juice, and it photographs like the real deal. I'm intrigued!
And speaking of celebrity-funded food experiments, the watermelon juices we've been seeing in grocery stores are predicted to rise in popularity; apparently Beyoncé is an investor.
We personally tried some of Moon Juice's combinations (available in the UK here) while back in the US at the end of last year, and while we were initially sceptical (to say the least), we were surprised to notice a real different in our energy levels and skin clarity. And this was over the holidays, when healthy habits weren't quite the priority they normally are! Looking into this a bit more, we've come to understand that at least some of these mushrooms and herbs are routinely employed in Chinese medicine, and have been for years. So needless to say, we will definitely be boarding the mushroom train in 2017, and look forward to sharing more as we learn. We have something very special in mind for Life Butter Radio in particular!
Whether any hallucinogenic mushroom varieties will ride the current '70s revival back into popular culture remains to be seen!
Finally, we have the return of MJ, which has received a lot of attention from the wellness press over the last few months as more and more places in the United States legalize its use. We've seen articles on how it can help everything from depression and anxiety to PMS/PMT and pregnancy, and an exploration of all the different ways you can partake. And "weed chic" is apparently a thing in California. We predict that the fascination with all things hemp will only continue; the ebbing stigma around cannabis in the United States invites inventive foodies and the wellness community alike to harness the power of this plant in new, inventive and potentially lucrative ways. The Business of Fashion suggests that the drug could be the luxury industry's next big opportunity, as we increasingly look to spend on experience over "stuff". If Keeping Up with the Kardashians is any measure, I think they may be right.
Now if you're not uber wealthy, but you're curious, you love chocolate, and you are based in the US, you can dip your toe into this trend without going anywhere near bong waters: enter Sakara Life's hemp chocolates (formerly CBD chocolates). These feel-good, bite-size chocolates contain "hemp extract" (CBD oil - read a bit here), and have been marketed as a substitute for your nightly glass of wine. We'll admit it, we gave these a try too last time we were Stateside - when, we should point out, the ingredient list read "CBD oil" rather than "hemp extract". But we have confirmation that the formula is in fact the same and the label change is more of a marketing exercise. How how did they work out? Well, we aren't sure that they had any special, relaxation-inducing powers, but they are organic, vegan, tasty and portioned in lovely, 11 -calorie-a-pop little nuggets of gorgeous CHOCOLATE, so what's not to like? We thought that these had disappeared from the market since Christmas 2016, but we discovered that actually Sakara Life is selling them with Amazon! So now you can add to basket and these can arrive with your latest reading, diaper haul or what have you. No one needs to know, and given the wide distribution channel, it will be easier than ever to get your hands on these, wherever you are in the US.
We all love nut butter (well some people don't, but they are just WEIRD). Sometimes though you want something just as satisfying but a bit less stodgy, a bit thinner...in which case, have you tried seed butters? They've been around for a while, but are predicted to multiply like bunnies in 2017. New varieties are cropping up on supermarket shelves all the time, and if you are US-based and addicted to novelty, you could hop on the net to try Sakara Life's watermelon seed butter. We have to admit to trying and loving this one over Christmas; it's pretty mild and would appeal to those who don't like a strong nutty taste.
Finally, while I personally think bread and gluten are well up for a resurgence, the alternative pasta scene isn't going anywhere. So you can keep your spiralizer or, if you crave a bit more substance, try pulse-pasta: think lentils and beans turned into your favourite shapes. A little more satisfying than all the corn and rice varieties, and these variations have the bonus of some protein!
I'll be really interested to see how the restaurant scene continues to evolve in 2017 too. Increasingly, fine dining seems so passé...I think diners still want and expect a bit of a scene, ambiance and occasionally some glamour, but are really more interested in the food - both the flavour and provenance. We'll see what this ever-changing landscape serves up next - we can't wait!
So whether you are at home or dining out, get ready to go all Wild & Crazy with some veggies. At least these superfoods won't stain your clothes quite as badly as your average green smoothie or juice, so you can dress in homage to the original Wild & Crazy guy and go all white!
It's all over the internet because it's all over our brains: for one reason or another, many of us feel that 2016 let us down. So while I think generally the idea of New Year's resolutions seems a bit passé in this time of perpetual self-improvement where September has been dubbed the new January, there is definitely a mood of out with the old and in with the DRAMATICALLY BETTER. But what's the framework? A list of 10 things you want to achieve that starts with Kayla abs seems silly and actually a bit shallow, given that most of us have our eyes and hearts focussed on much larger issues at the moment. Beyond that, fitness seems to have finally shifted from that thing you get fanatical about this time of year or right before your beach holiday to something that is aspirational on the daily. Ditto healthy eating - whatever type of beautiful bowl/smoothie/poached egg & avo concoction best best symbolises that for you & your wellness tribe.
But this is not a post about snark, not at all. This year wasn't all bad, and I actually think this next week or so is a great opportunity to sit back, put on your rose (gold)-tinted glasses (seriously, was there another colour in 2016?), and look back with curiosity, generosity and awe. As anyone dabbling in modern day wellness knows, it's very Zeitgeist-y to mention a full moon or an errant planet as part of a discussion of Who We Are and Where We Are Going. And there has been a particular focus on looking to the stars for guidance in processing and understanding the last 12-18 months (or maybe this is just what happens when you move from London to Los Angeles).
Now I'm not exactly an astro-babe myself, but there's a celestially-inspired discussion circulating around the close of 2016 that has piqued my curiosity, and ties in with my own view on the end of this crazy year. That would be the resurgence of Mercury Retrograde, a time characterised by chaos, technical malfunctions, miscommunications and generally thwarted plans - at least according to those in the increasingly-popular astro-world (is it just me, or has the new-New Age suddenly become very mainstream?). And this upheaval will last until January 8 of 2017 when Mercury changes course. Seems rather doom and gloom, but here's what I like about this: firstly, there is the romanticism of observing the grandiosity of the cosmos and brooding over what its signs may mean to the individual lives of us earth-bound mortals. What can I say, I'm not exactly a believer, but I think the merch is cute (if expensive - this one is for my next life as an heiress).
Secondly, I also like the call to acknowledge greater forces at work in this world (even if I would pick a different focus ✝). Some astrologers describe Mercury Retrograde as an invitation to reflect, reminisce, study and learn from the past. I am the original history nerd, after all (watch out for Episode 4 of Life Butter Radio...seriously, it's going to be a gem). So I think in some ways, it's fitting that this astrologically-ordained time of reflection, consideration and tidying away corresponds with the end of 2016. With that in mind, I plan on taking a leaf out of this blogger's book, and using this time before the new year to take stock of 2016 and acknowledge it for the period of power and transformation it was, leaving us stronger, more thoughtful and aware - ready to either take on or celebrate whatever comes next.
So what does that mean for me? Well, 2016 has been a pivotal year for me in a lot of ways...between a career change, coming to grips with motherhood and lots of travel (as always) there has been a lot of change. If I could sum it up in word, I would pick LEARNING. This has not always been an easy or pain-free process, but it has undoubtedly been transformational. I've grown so much, and I now have the perspective to appreciate that. So thanks 2016 for the lessons!
And when the clocks strikes 12 and the last of 2016 slips away, I'll be at home with my nearest and dearest and some fizz, and getting ready to demarcate the start of 2017 in a more traditional, goal-oriented way. More on that soon!
The road to hell is paved with good intentions, and it's all too easy to find yourself in bed with a spinning head, especially this time of year.
So here are a few strategies for times you know you're going to be out, and for when you've had more than you intended. Because we all know that though a green juice/vitamin infusion or coffee/fry up (as per your preference) can help the next day, the only real cure for getting over the night before is sleep. So here's how to get the best sleep when you need it the most.
You're going to a birthday or, given the time of year, the holiday party. You're going to be eating late, eating all the things, and drinking ALL THE THINGS. So first can I say: just own this. Be unapologetic and excited because, for all the charm of hygge, these exist for a reason! BUT, maybe it's a Wednesday, & you're going to work in the morning. So you want to rage but not to the point of destruction. Ok - let's go.
Painful as it is to admit, we all know that prevention is better than the cure, so if you really want to hit the pillow feeling good, this will involve some self-control that may, depending on your temperament, take you a little bit out of the moment. Still, I think you can have fun while being, dare I say it, mindful, but you need to acknowledge that you will need to think a bit about your choices. Pretty much true of anything in life. Now, how do we make this easier?
Can I suggest that you make an effort to go to the party in a good mood? It may seem obvious to say this, but you are going to be so much less likely to arrive & immediately drink 2 glasses of prosecco if you have left work (or whatever) stress behind, aren't hyped up and feel content. So maybe try to fit in a yoga session (if that's your jam), exercise class, some sweet tunes, or anything that makes you feel good before you go. Because if you go relaxed and happy, it is going to make it so much easier to have the experience you want to have, and make choices that will set you up for a better night's sleep and following day.
If you even suspect that you may struggle with this, or you are actually hell-bent on destruction, maybe rearrange your schedule so you don't have important meetings or work assignments to tackle first thing the next day. And if you do get caught getting unexpectedly trashed, and you end up eating pizza at 2 AM dancing in your pants (true story), it is OK! I feel like these days so many of us are afraid to let go and enjoy ourselves, and would rather feel consistently good but maybe a bit stultified rather than occasionally OOC and silly. As long as you aren't a jerk (and maybe you don't use your camera phone), it's ok to go for it from time to time!
So with all that in mind, your evening. If you want a sugary cocktail (YES), try to just have 1 (or so), and really, really enjoy it. Honestly, that is the key to anything related to moderation and health. If you really take your time and enjoy your food and drink, you'll probably end up consuming less and have a better chance of staying on track than if you slam a few drinks quickly upfront and try to ease off as the evening goes on. You can also feel very chic and French (right? Seems like a French thing to do).
After that, low(er) sugar cocktails like vodka soda are your friends. If you like coconut, you could try something like this. Keep drinking water, of course - alcohol is a diuretic so it's dehydrating, and dehydration makes you feel like crap (simples!). You may have to hunt down the H2O, but water at least you can chug and then discard, or, alternatively, disguise as one of those boring cocktails so no one is the wiser. If you are at an epic dinner, you may have to watch overzealous waiters or hosts who constantly top up your glass...this is where you are taken slightly out of the moment, which is a bit annoying, but I've been caught too many times having no concept of how much I've actually had to drink because the level never dips below half a glass. You'll need to pay attention to how you're feeling, and gauge when it's time to back off. If you are veering dramatically off course, one of your friends or partner may be happy to do this for you. Winky-face.
When it comes to food, anything fatty, spicy otherwise difficult to digest will make sleep harder, so just be aware of that. Those of us who are based in the UK know that these parties can start early, so you can try to have anything particularly indulgent early on (which is when you're in best shape to enjoy it, actually). if it's late, go easy. If you don't think you'll be eating much but do plan on drinking, a good trick is to eat a big spoon of nut butter just before you go out. It won't bloat you, but will line your stomach and should prevent you from feeling trashed after 3 sips of champagne. I love this one, this one and this one - which is great for on the go, travel & kids.
If you ate early or not a lot and you're peckish before bed, you obviously want things that are easy to digest. Simple sugars will help restore blood sugar levels and make you feel better; the banana is a classic for a reason. Honey & toast is recommended too, but I personally think it's too easy to go crazy and have a million slices when your self control is low - a single piece of fruit works better for me.
Once you're home, try to drink a large glass of water and take a magnesium supplement (I love this one); magnesium help us sleep and it also calms your muscles, promotes good digestion (go easy, it's powerful stuff) and can help clear your head in the morning. A friend shared that for strategic celebrating she sometimes drinks a bottle of pedialyte (UK equivalent) before and after she goes out, and that it wards off the hangover like a talisman. I can't personally vouch for this remedy, but it sounds plausible. Try to make sure your room is cool and dark, and turn off your phone.
We've all been there; you go to lie down, and the room starts spinning. If it's so bad that you feel slightly sick or really dizzy, just get up. You're not going to get any rest yet. Don't panic though, just find something you can do to pass the time.
For a variety of reasons, but for the purposes of this article we'll focus on its effects on your sleep, don't get on FaceBook. Or Instagram, or Twitter, or your tv. Also don't sit there obsessing about what you said, to whom and how someone looked at you with a weird expression on their face. Distract your brain from destructive thoughts like these (what can I say, I like muscles).
Just try to chill out - listen to some music; if you can focus on a book or some easy, repetitive task like colouring (never tried it but some people love it!), do that. This may not be the time to get in the bath or light a candle, but you can still try find a calm space with soft light to chill out in until you are feeling like you can lay down.
Of course you may have passed out immediately, only to wake in the middle of the night. That's because of something called the "rebound" effect - basically once alcohol is out of our system, we are rocket-launched into lighter sleep where we are more likely to wake. This is why it's better to stop drinking way before you hit the hay - all the alcohol is already out of your system. But that ship has sailed. So if you do wake at this time, your brain may be going crazy and you may feel super anxious. If that happens, I've found it most helpful to simply recognise that this is what is going on, and that I may have to ride out some internal brain craziness.
If it gets to be too much, you can get up and read a book for a bit (maybe something like this rather than this) - I've found that my brain is calmer once again in the very early morning, and I can usually get back to sleep then. I personally don't think meditation is going to work in this scenario; your thoughts will just be too all over the place. But monks pray in the middle of the night and apparently the rest of us used to do this too; so that could be a centring practice as well til the craziness passes.
Do try to get some more sleep though rather than simply starting your day at some insane hour. You will feel so much better if you can get a few more hours.
Finally, remember that often the best memories are made when we've been able to loosen up and revel a bit. Try to be kind to yourself, but learn from your experiences too! They more we get to know ourselves, the easier it is to manage how we feel, which is what this whole wellness thing is really about.
Word on the street is that we should be getting into our PJs an hour before bed to help us mentally transition. Or maybe I've got that wrong, and I'm just seeing more high-end PJs actually on the street. Anyhoo, the thing is, I already tend to wear my PJs much more than that...I love a pair that are great for lounging, snacking, TV-ing...but not shopping. (Sorry America). But I don't judge - particularly since, yeah, those silk varieties have been street style faves for a few seasons now! So whether you are skipping through the streets or owning your sofa, here are some of my faves.
Modern day Jane Austen. So pretty.
And for dec babies - which is apparently what Mariah Carey used to call her twins. What can I say PJs make me think of Mariah.
Everyone loves an excuse to indulge in a new set of pyjamas and other cozy essentials (especially this time of year), and so I thought it'd be fun to quickly catalogue some of my faves, as well as a thing or two that can help make bedtime a bit more fun.
Part of the appeal of sleep as a health and beauty aid is that it is free, simple and, if you are getting enough, enjoyable. So as we learn more about why sleep matters and how much it can do for us (which is really incredible; if you haven't listened to our podcast that tells you a bit more about why, you can do so here or here), I hope we won't try to make this more complicated than it is.
The fact that so many of us ARE sleep-deprived, however, means that we really could be doing this better. And it's easier to prioritise something that you think is fun and rewarding, or that you have invested in (see also, investing in cute workout clothes).
So with that mind, here are a few sleep-related toys and joys that actually work to help you on your way to dreamland, and make the whole winding-down to bed process more appealing than everything else that's clamouring for your attention. Watch out for the best of PJs in our next post.
Natural Calm magnesium supplement- this is far & away my best sleep tool. Magnesium is a proven sleep aid, & this sugar-free supplement makes me drowsy quickly. I take 1 large dose 40 minutes before I want to sleep and it WORKS. LOVE it.
The travel version - these sachets are great for the plane & help both sleep & digestion, which can be sluggish after flying.
Epsom salts - magnesium can be absorbed through the skin, so pop a large handful into a warm bath & get ready to feel relaxed & sleepy. Maybe not for every night, but you can also file this one under IT WORKS.
The best face mask - essential when mornings start early (so not this time of year, but highly relevant in summer). Also great for flying; this version does crowd the eyelid so there's no pressure. Comfy & effective.
Pukka Night Time tea - a perennial favourite for a reason; it's not stimulating but is comforting.
Sleepytime Extra - the American sleep tea. I can't say I like this one as much, but some people swear by it!
Thisworks Deep Sleep Pillow Spray - I received this as part of a new mom gift pack. The idea is that the calming scent of lavender will send you to sleep. It didn't always do that for me, but it definitely helped with new mom anxiety.
Badger Balm Night Night Balm - I actually prefer a balm to a room spray because you can control the strength of the scent better. This one is really nice and organic, and apparently ok for kids too!
This one comes in interesting scents and pretty packaging (there's a copper shade too). Candlelight is soft and flattering; definitely gets you in the mood for bed! Soy candles don't emit the same acrid smoke as paraffin candles and are more eco-friendly too.
I love this so much guys. It wakes you gently by slowly building a glow of sun-like light 30 minutes before your wake time. If that doesn't rouse you, a gentle tone goes off. A much better way to wake up than the iPhone.
Anyone? Yeah, us too. But...why? Work/study/children/travel/friends/stress, or probably some combination of those. Between our increasingly fast-paced lifestyle, our cultural devaluation of sleep and technological innovations that make it practically possible to be UPALLNIGHT mean that sleep seems to be the first thing we cut in our efforts to get the most out of our days.
But the tide is turning; the importance of sleep to everything from how we look, to how we perform - in any arena of life, to how we feel and treat each other is becoming increasingly apparent as sleep research evolves. The message is clear: sleep matters, and, according to some, so much so that nothing less than a REVOLUTION in how we structure our days (and nights, and our homes, for that matter) is under way.
We never really gave that much thought to the fact that we were a little tired...isn't everyone? But Arianna Huffington's call to arms is a pretty dramatic demand for a re-evaluation of not only how we sleep, but how we live our lives. And so over the next few weeks, we'll be looking at the "why" of sleep importance, and "how" of sleep optimisation, always from the perspective of someone who wants to have her cake, and eat it too. Check in and cuddle up for an expo of the world of Zzz. | 2019-04-19T05:11:45Z | https://butteryourlife.com/blog/?offset=1487698302449&category=lifestyle |
Controversies in Vitreoretinal Surgery: Is Vitrectomy an Appropriate Treatment for DME in 2014?
These articles are based on the debate-style presentations at the American Academy of Ophthalmology Retina Subspecialty Day in New Orleans November 15-16, 2013. The arguments presented by the authors, affirmative or negative, were assigned to them and do not necessarily reflect their own opinions or practices.
In the accompanying “con” article in this debate, Julia A. Haller, MD, will attempt to cite numerous reasons to support the argument that, in the current era, vitrectomy has no significant role in treating diabetic macular edema (DME). Those who do not favor routine use of this surgical approach to DME say that vitrectomy does not consistently reduce macular thickening; that it does not lead to improved visual acuity; that it may work only in eyes with vitreomacular traction; that numerous series have shown no consistent benefit of vitrectomy; that the only major prospective clinical trial of note evaluating vitrectomy for DME was underwhelming in its support of vitrectomy; and that the availability of anti-VEGF and steroid intravitreal injections eliminates the need for vitrectomy in most eyes.
In my opinion, the evidence clearly demonstrates that none of those things is true, and that vitrectomy works for DME.
In the era before the advent of steroid and anti-VEGF intravitreal injections, the only tool ophthalmologists had to treat DME that was refractory to laser was vitrectomy. As a result, we have 20 years’ worth of published data that demonstrate the successful use of vitrectomy in the treatment of DME. Vitrectomy, with membrane peeling as performed in these studies, may have included removal of the posterior hyaloid with or without peeling of the internal limiting membrane (ILM), concurrent panretinal photocoagulation (PRP), and intravitreal triamcinolone injection. Multiple authors reported that these treatments could relieve posterior hyaloidal traction (also known as taut hyaloid syndrome) and lead to improved visual acuity and reduction or resolution of DME in some eyes refractory to other treatments.
In the period before injections became popular, from 1992 to 2005, no fewer than 15 studies were published documenting the positive results of vitrectomy for DME.1-15 The authors of these studies reported improvements of 2 or more lines of visual acuity in 38% to 92% of eyes and resolution of DME in 45% to 100% of eyes. These studies included eyes in which posterior hyaloidal traction was clearly clinically visible and/ or demonstrated on optical coherence tomography (OCT), as well as those in which it was suspected but not seen.
With the use of vitrectomy as performed in these studies, results like those seen in Figure 1 were achieved. Visual and anatomic improvements were significant, potentially seen early, and generally quite long-lasting.
Vitrectomy is thought to treat DME through multiple mechanisms. Vitrectomy relieves anteroposterior vitreoretinal traction, creating a posterior vitreous detachment (PVD), and it has long been known that PVD is associated with reduction or resolution of DME.16,17 But vitrectomy also relieves tangential traction by the removal of contractile vitreous and retinal pigment epithelium (RPE) cells within the posterior hyaloid that contribute to the edema.
In addition, the ILM that is removed during vitrectomy is actually pathologic tissue that contains increased levels of fibronectin, laminin, and types 1, 3, 4, and 5 collagen. The ILM in DME is abnormally thick—2.5 times thicker than ILM removed in a macular hole case—and that thickened condition alters membrane function. The inner monolayer of ILM is also contractile; immunohistochemistry studies show that there is smooth muscle immunoreactivity of this tissue.
Vitrectomy removes numerous vasoactive and vasodamaging factors that are elevated in DME eyes compared with controls, and it increases oxygenation in the vitreous cavity by up to 10 times, with a potentially long-acting effect.18 Intraoperative PRP at the time of vitrectomy can reduce peripheral ischemia and thereby decrease levels of VEGF and other vascular permeability factors.
Through multiple mechanisms, we see that vitrectomy almost always thins the macula. Maurice Landers performed a literature review of 29 series published between 2003 and 2012, both retrospective (20; n=1012) and prospective (9; n=869). In the 1881 eyes included in these series, there was a more than 200 μm mean decrease in mean foveal thickness during the course of follow-up (M. Landers, personal communication).
The “cons” will say that vitrectomy may thin the retina in some of these trials, but it does not improve visual acuity. They will cite the paradoxical response seen in 1 prospective trial,19 in which retinal thinning occurred after vitrectomy but in some eyes the visual acuity was worsened.
However, we must keep in mind that in prospective pivotal clinical trials to assess drugs that treat DME or macular edema associated with retinal vein occlusion, strong correlations have been reported between reduced macular edema and improved vision. What is the difference? Trials for approval of new pharmaceutical entities have well-controlled inclusion criteria, and eyes with poor prognosis are not enrolled. Most studies of vitrectomy for DME are not like that.
Before the advent of intravitreal injections, vitrectomy was done much earlier in the course of DME than it is today. The role of traction was considered earlier, as there was no other treatment available for eyes refractory to laser. Therefore, eyes with better prognosis, with less irreversible macular damage and less macular ischemia, were taken to surgery, and as a result these patients experienced better outcomes and improved vision.
In more recent series and studies, vitrectomy has been performed in eyes that have experienced repeated injections and laser and have had a long duration of chronic DME without significant improvement. In these eyes with a poorer prognosis, irreversible macular damage at the photoreceptor level, and macular ischemia, consistent improvement of visual acuity should not be expected.
In fact, we can now see that DME eyes with better prognosis—with intact photoreceptors—tend to achieve better visual acuity after vitrectomy. OCT now affords anatomic predictors of the visual acuity response to vitrectomy in DME. Sakamoto et al20 reported that better final visual acuity is achieved in eyes with a complete inner segment/outer segment (IS/ OS) junction. Yanyali and colleagues21 found that integrity of the external limiting membrane and IS/OS lines on OCT strongly correlated with better postoperative visual acuity recovery. These factors are related to the duration of edema prior to vitrectomy.
In assessing the published record, it must be borne in mind that all eyes with DME are not equal. For results to be compared across trials in order to truly assess the benefit of vitrectomy of DME, it is important to have established parameters. Investigators must define patient characteristics; define and determine what is “traction”; define and determine the amount of macular ischemia, RPE atrophy, and choroidal ischemia present; and define the surgical parameters and techniques to be used. The problem is that with so many variables left uncontrolled, studies are rarely—possibly never—truly comparable.
The Diabetic Retinopathy Clinical Research Network (DRCR.net) evaluated the effect of vitrectomy for the treatment of DME in eyes with at least moderate vision loss and vitreomacular traction.22 This prospective cohort study included 87 eyes recruited from 35 sites. The presence of vitreomacular traction was based on investigator assessment only, and vitrectomy was performed “according to the investigator’s usual routine.” The only guidelines in the methods section were that the patient had to have 3 sclerotomies, the posterior hyaloid was peeled, ERMs were removed, and the periphery was examined.
The results showed that vitrectomy worked for some eyes and not others. Retinal thickening was significantly reduced in most eyes, and visual acuity improved by 10 letters or more in 38% of eyes and decreased by 10 letters or more in 22% of eyes. There was a low rate of operative complications.
The problem with this study is that it was a nonstandardized, nonrandomized, uncontrolled, prospective data collection study only. That is to say, it was a survey. There was no standardization of indications for surgery, no definition of surgical procedure or techniques; surgeons simply reported their outcomes.
Substantive conclusions on vitrectomy for DME cannot be derived from this survey. In fact, the true value of the DRCR.net trial is that it demonstrated the need for a well-controlled, standardized prospective trial to investigate modern vitrectomy using small-gauge instrumentation for DME.
In the era of intravitreal injections, what is the retina specialist to do for a patient with persistent DME and poor or worsening visual acuity despite current therapy? If vitrectomy for DME is not an option, the clinician will most likely continue to inject, perhaps adding focal or scatter laser.
However, persistent injections, if they do not lead to improvement, are likely to be harmful to long-term visual recovery. A relentless schedule of injections, in the face of little to no response, delays progression to other therapies (such as vitrectomy) and can allow permanent macular damage to occur in the meantime.
Continued injection is also expensive compared with vitrectomy. Friedman23 estimated that, if the protocols of recent published pivotal trials were followed, injection of approved anti-VEGF agents for 2 years would cost $26 000 to $27 000 per patient.
Safety is also a potential concern. The cumulative risk of endophthalmitis after 20 to 40 injections is approximately 1%. There is no doubt that injections of anti- VEGF agents and triamcinolone can be effective against DME, but there are risks involved in viewing such treatments as too much of a panacea.
Those who say vitrectomy does not work for DME ignore the evidence gathered from many case series conducted in multiple centers over many years. Additionally, critics of vitrectomy for DME are, in my opinion, placing too much faith in negative vitrectomy trials that were not well controlled for important clinical and surgical parameters. It is important to consider all aspects of the complex pathophysiology of DME. In not doing so, those who contend that vitrectomy has no place in the treatment of DME are missing its appropriate place in the treatment regimen.
Physicians must keep their options open and not be excessively devoted to intravitreal injections and laser as the only options for the treatment of DME. Vitrectomy should be thought of as part of a regimen that includes injections, lasers, and systemic medical control. It is important to identify the appropriate place for vitrectomy in that treatment paradigm so that we can use all available tools and potentially get the best possible outcomes.
Vitrectomy works for dme. all arguments made to the contrary do not hold up to any significant scrutiny.
Tarek S. Hassan, MD, is a partner with Associated Retinal Consultants, PC, and a Professor of Ophthalmology at Oakland University William Beaumont School of Medicine in Royal Oak, MI. Dr. Hassan states that he has no financial relationships relevant to the subjects covered in this article. He is a member of the Retina Today Editorial Board and may be reached at [email protected].
Lewis H, Abrams GW, Blumenkranz MS, Campo RV. Vitrectomy for diabetic macular traction and edema associated with posterior hyaloidal traction. Ophthalmology. 1992;99(5):753-759.
Van Effenterre G, Guyot-Argenton C, Guiberteau B, Hany I, Lacotte JL. Macular edema caused by contraction of the posterior hyaloid in diabetic retinopathy: Surgical treatment of a series of 22 cases. [Article in French] J Fr Ophthalmol. 1993;16:602-610.
Harbour JW, Smiddy WE, Flynn HW Jr, Rubsamen PE. Vitrectomy for diabetic macular edema associated with a thickened and taut posterior hyaloid membrane. Am J Ophthalmol. 1996;121(4):405-413.
Tachi N, Ogino N. Vitrectomy for diffuse macular edema in cases of diabetic retinopathy. Am J Ophthalmol. 1996;122(2):258-260.
Pendergast SD. Vitrectomy for diabetic macular edema associated with a taut premacular posterior hyaloid. Curr Opin Ophthalmol. 1998;9(3):71-75.
Ikeda T, Sato K, Katano T, Hayashi Y. Vitrectomy for cystoid macular oedema with attached posterior hyaloid membrane in patients with diabetes. Br J Ophthalmol. 1999;83:12-14.
Ikeda T, Sato K, Katano T, Hayashi Y. Attached posterior hyaloid membrane and the pathogenesis of honeycombed cystoid macular edema in patients with diabetes. Am J Ophthalmol. 1999;127:478-479.
Kadonosono K, Itoh N, Ohno S. Perifoveal microcirculation before and after vitrectomy for diabetic cystoid macular edema. Am J Ophthalmol. 2000;130:740-744.
Watanabe M, Oshima Y, Emi K. Optical cross-sectional observation of resolved diabetic macular edema associated with vitreomacular separation. Am J Ophthalmol. 2000;129(2):264-267.
Kaiser PK, Riemann CD, Sears JE, Lewis H. Macular traction detachment and diabetic macular edema associated with posterior hyaloidal traction. Am J Ophthalmol. 2001;131:44-49.
Otani T, Kishi S. Tomographic findings of foveal hard exudates in diabetic macular edema. Am J Ophthalmol. 2001;131:50-54.
Yamamoto T, Akabane N, Takeuchi S. Vitrectomy for diabetic macular edema: the role of posterior vitreous detachment and epimacular membrane. Am J Ophthalmol. 2001;132(3):369-377.
La Heij EC, Hendrikse F, Kessels AG, Derhaag PJ. Vitrectomy results in diabetic macular oedema without evident vitreomacular traction. Graefes Arch Clin Exp Ophthalmol. 2001;239(4):264-270.
Gandorfer A, Messmer EM, Ulbig MW, Kampik A. Resolution of diabetic macular edema after surgical removal of the posterior hyaloid and the inner limiting membrane. Retina. 2000;20(2):126-133.
Gandorfer A, Rohleder M, Kampik A. Epiretinal pathology of vitreomacular traction syndrome. Br J Ophthalmol. 2002;86(8):902-909.
Nasrallah FP, Jalkh AE, Van Coppenolle F, et al. The role of the vitreous in diabetic macular edema. Ophthalmology. 1988;95(10):1335-1339.
Hikichi T, Fujio N, Akiba J, Azuma Y, Takahashi M, Yoshida A. Association between the short-term natural history of diabetic macular edema and the vitreomacular relationship in type II diabetes mellitus. Ophthalmology. 1997;104(3):473-478.
Holekamp NM, Shui YB, Beebe DC. Vitrectomy surgery increases oxygen exposure to the lens: a possible mechanism for nuclear cataract formation. Am J Ophthalmol. 2005;139(2):302-310.
Flaxel CJ, Edwards AR, Aiello LP, et al. Factors associated with visual acuity outcomes after vitrectomy for diabetic macular edema: Diabetic Retinopathy Clinical Research Network. Retina. 2010;30(9):1488-1495.
Sakamoto A, Nishijima K, Kita M, Oh H, Tsujikawa A, Yoshimura N. Association between foveal photoreceptor status and visual acuity after resolution of diabetic macular edema by pars plana vitrectomy. Graefes Arch Clin Exp Ophthalmol. 2009;247(10):1325-1330.
Yanyali A, Bozkurt KT, Macin A, Horozoglu F, Nohutcu AF. Quantitative assessment of photoreceptor layer in eyes with resolved edema after pars plana vitrectomy with internal limiting membrane removal for diabetic macular edema. Ophthalmologica. 2011;226(2):57-63.
Diabetic Retinopathy Clinical Research Network Writing Committee, Haller JA, Qin H, Apte RS, et al. Vitrectomy outcomes in eyes with diabetic macular edema and vitreomacular traction. Ophthalmology. 2010;117(6):1087-1093.e3.
Friedman SM. To estimate the potential costs and savings associated with intravitreal ranibizumab with prompt or deferred focal/grid laser as compared with prompt focal/grid laser for diabetic macular edema (DME). Paper presented at: Retina Society annual meeting; September 22, 2011; Rome.
In 2014, vitrectomy has only a limited role in the treatment of most cases of nontractional diabetic macular edema (DME).
This is because there has been an evolution in the past 3 decades of diabetic therapy. In an earlier era, the only tools available to the ophthalmologist for treatment of DME were destructive thermal laser and invasive surgery. Today we see the diabetic eye in the context of systemic health, and we try to treat it with as little collateral damage as possible—to nudge it back to health, rather than bludgeon it, so to speak.
The treatment algorithm for DME today may involve numerous options, starting with metabolic control and proceeding to injection of anti-VEGF agents, use of focal laser, scatter laser, and perhaps steroid injection or some other adjustment of the pharmacologic approach (with a different agent or more frequent application) before finally arriving at vitrectomy. This option is generally reserved for very rare cases, usually those with abnormalities of the vitreoretinal interface.
Today we talk to patients in a much more sophisticated way about metabolic control, which includes not only monitoring of hyperglycemia, hypertension, and lipid levels, but also awareness of a patient’s smoking status and diagnoses such as depression, problems with sleep apnea, and eating disorders. Care of the diabetic patient involves collaboration with a medical team that may include a diabetologist and/or internal medicine specialist.
When confronted with an eye with DME with vascular leakage and some ischemia, as seen in Figure 2, rather than treat with an invasive or destructive approach, today’s ophthalmologist will take a stepwise course. First-line therapy would include intravitreal injections with 1 of the available anti-VEGF or steroid options. The next step might be focal laser, especially in eyes with extrafoveal leakage, hard exudates, and/or circinate rings.
In his accompanying article defending the use of vitrectomy to treat DME, Tarek S. Hassan, MD, cites numerous studies published in the era before intravitreal injections were common, which describe various levels of success with vitrectomy for DME. We now have 3-year follow-up data from a study by the Diabetic Retinopathy Clinical Research Network (DRCR.net) assessing pharmacotherapeutic treatments for DME in a randomized, prospective setting.2-4 This trial is nothing like those old studies cited by Dr. Hassan, which in many cases included no optical coherence tomography (OCT) assessment, and were, in general, small retrospective series without any control group.
If an incomplete response to intravitreal therapy is achieved, there are multiple ways to titrate treatment, including injecting more frequently, increasing the dosage, trying another agent, or adding focal laser or panretinal photocoagulation (PRP) judiciously. Again, vitrectomy is far down the list of options and, again, generally used only in isolated cases in which there may be vitreoretinal interface abnormalities.
Even eyes that are refractory to treatment do not always need vitrectomy. For example, Figure 3 shows an ischemic eye that has recalcitrant DME despite multiple bevacizumab injections and both focal laser and PRP. Rather than rushing this patient to the operating room, a dexamethasone intravitreal implant (Ozurdex, Allergan) was given, and the patient’s visual acuity improved to 20/40 with a nice anatomic result within 6 weeks.
The DRCR.net evaluated the use of vitrectomy for DME in a prospective multicenter cohort study.5 Data were collected on 241 individuals who underwent vitrectomy as primary treatment for DME. The primary cohort included 87 eyes with DME and vitreomacular traction based on investigator assessment. Following vitrectomy, retinal thickening was reduced in most eyes. Mean central subfield thickness decreased by 160 μm at 6 months; 43% of eyes had complete resolution of edema, and 68% had at least a 50% reduction.
Unfortunately, however, in the primary cohort—in these eyes with vitreomacular traction, which one might think would have the best results—the visual acuity results were disappointing. The authors concluded that, while 28% to 49% of eyes similar to those in the study were likely to have improvement of visual acuity, 13% to 31% were likely to experience worsening.
Why was this disappointing result seen? Many factors could be at work. A subset analysis showed that peeling of the epiretinal membrane (ERM) and internal limiting membrane (ILM) was associated with thinning of the retina. Perhaps, however, additional risk was introduced by peeling these delicate membranes, including the footplates of the Mueller cells, in eyes with ischemia and diabetes.
In addition, the complications of vitrectomy, although rare, are unacceptable in the treatment of DME when, today, there are so many alternative treatment options. Endophthalmitis, retinal detachment, and proliferative vitreoretinopathy can have devastating consequences. In fact, one could even argue that the increase in nuclear sclerosis that is a predictable side effect of vitrectomy surgery is unacceptable when other therapeutic approaches are available.
Treatment of DME has evolved in the past 3 decades, away from the bludgeons of invasive surgery and heavy thermal laser. We now attempt to nudge the eye toward health. Today we must give a thumbs-down to vitrectomy for DME. In light of the other treatment options available, it is excessive, and it is almost never needed. New therapies on the horizon may further increase the options for safe and effective treatment of DME—including the intriguing possibility of performing pharmacologic vitrectomy in these eyes.
Julia A. Haller, MD, is Professor and Chair of Ophthalmology at Thomas Jefferson University and Thomas Jefferson University Hospital. She is also Ophthalmologist-in-Chief at Wills Eye Hospital. She states that he has no financial relationships relevant to the subjects covered in this article. Dr. Haller is a member of the Retina Today Editorial Board. She may be reached at +1 215 928 3000.
Cusick M, Chew EY, Chan CC, Kruth HS, Murphy RP, Ferris FL, III. Histopathology and regression of retinal hard exudates in diabetic retinopathy following reduction of elevated serum lipid levels. Ophthalmology. 2003;110(11):2126-2133.
Diabetic Retinopathy Clinical Research Network; Elman MJ, Aiello LP, Beck RW, et al. Randomized trial evaluating ranibizumab plus prompt or deferred laser or triamcinolone plus prompt laser for diabetic macular edema. Ophthalmology. 2010;117(6):1064-1077.e35.
Elman MJ, Bressler NM, Qin H, et al; Diabetic Retinopathy Clinical Research Network. Expanded 2-year follow-up of ranibizumab plus prompt or deferred laser or triamcinolone plus prompt laser for diabetic macular edema. Ophthalmology. 2011;118(4):609-614.
Diabetic Retinopathy Clinical Research Network; Elman MJ, Qin H, Aiello LP, et al. Intravitreal ranibizumab for diabetic macular edema with prompt versus deferred laser treatment: three-year randomized trial results. Ophthalmology. 2012;119(11):2312-2318.
Diabetic Retinopathy Clinical Research Network Writing Committee, Haller JA, Qin H, Apte RS, et al. Vitrectomy outcomes in eyes with diabetic macular edema and vitreomacular traction. Ophthalmology. 2010;117(6):1087- 1093.e3. | 2019-04-23T11:56:18Z | http://retinatoday.com/2014/02/controversies-in-vitreoretinal-surgery-is-vitrectomy-an-appropriate-treatment-for-dme-in-2014 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.